1/18 Armed Forces in Cyber Era Namık KAPLAN, Commander Plans Projects Coordination Branch Head, Turkish Armed Forces Cyber Defence Command.

Slides:



Advertisements
Similar presentations
The U.S. Merchant Marine and America’s Maritime Security
Advertisements

ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
MINISTRY OF DEFENCE DEFENCE STAFF UNCLASSIFIED 1 BULGARIAN ARMED FORCES TRANSFORMATION PROCESS LIEUTENANT COLONEL DIMITAR DIMITROV, STRATEGIC PLANNING.
Black Sea Maritime Security & Turkey’s Role In The Caucasus By Deniz Çakar Head of Department NATO and Euro-Atlantic Infrastructure and Logistics/MFA.
United States Marine Corps
Speaker: Tamar Shapatava
CYBER AS A NEW WAR DOMAIN Cengiz ÖZTEKE Colonel Commander, TAF Cyber Defence Command.
NIS Directive and NIS Platform
Skopje, 7-8 June 2005 SEEC Southeastern Europe Clearinghouse ALBANIA DEFENCE OVERVIEW Presented by: Major Editson ZARKA, Defence Policy and Integration.
The Basics of the United States Military
Foreign Policy.
The Second Article The Executive Branch
WHAT DO YOU DO IN THE NATIONAL SECURITY PATHWAY? Protecting the nation!
Making Foreign Policy Chapter 7 Section 3.
International Peace and Security Vladimir Radunović Director, Cybersecurity and E-diplomacy 20 March 2015 WEBINAR.
United States Armed Forces
November 11, 2013 Veterans Day is on November 11. It is an American holiday to honor men and women who have completed military service or who are currently.
Chapter 17: Foreign Policy and National Defense
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Foreign Policy and National Defense Chapter 17. NATIONAL SECURITY Section 2.
FOREIGN AFFAIRS. ISOLATIONISM TO INTERNATIONALISM 1. Domestic Affairs: what’s happening within our country 2. Foreign Affairs: nation’s relations with.
How does Singapore manage conflict and ensure national security?
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
Article II The Executive Branch (President). President Facts The powers of the President are split into 5 categories: 1. Commander in Chief 2. Chief Executive.
DJ-7 Unclassified Col Nopparat Mission and Organization of the Royal Thai Armed Forces.
The Evolving Role of NATO Marko Savković Research Associate Centre for Civil-Military Relations, Belgrade.
Cyber security implementation within an organization Ltn Andri Rebane Estonian MoD CIO.
The POTUS: Making Foreign Policy Mr. Leasure 2014 – 2015 Harrison Career Center.
BELLRINGER. Chapter 7 / Section 3: Making Foreign Policy.
The Articles of Confederation. National Government Because of their experience with the British government, Americans wanted a national government which.
Russia’s Arctic security strategy: post Ukraine reassessment
Black Sea Maritime Security
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Chapter 7.3 Making Foreign Policy. The President and Foreign Policy Foreign policy is a nation’s overall plan for dealing with other nations. The basic.
Chapter Six, Section Three “Making Foreign Policy”
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
U.S. Air Force “ Above All” Founded in 1947 The mission of the U. S. Air Force is to fly, fight and win... in air, space, and cyberspace.
TÜBİTAK – BİLGEM – SGE Cyber Security Institute Asım Gençer Gökce TÜBİTAK BİLGEM Cyber Security Institute (SGE) Role: Cyber.
Chapter 17: Foreign Policy and National Defense Section 2.
Foreign affairs: National Security While at first glance, it may be easy to assume that America’s national security is a domestic affair, and it certainly.
Chapter 17 Foreign Policy And National Defense. Section 1 Foreign Affairs and National Security Isolationism to Internationalism – Domestic affairs- events.
Chapter 17 Section 1& 2: Foreign Affairs and National Security By: Mr. Thomas Parsons.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
International Law in Military Operations: a NATO practitioner’s views Mr. Vincent Roobaert Senior Legal Advisor NATO Communications and Information Agency.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Brooke Smith-Windsor, Ph.D. ACA 13 May 2016 Brooke Smith-Windsor, Ph.D. ACA 13 May 2016 NATO, Interconnected Security Threats and the Politics of Perception.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31: Foreign, security and defence.
Federal Agencies. What Is a Bureaucracy? Hierarchical authority. Pyramid structure with a chain of command running from top to bottom. Job specialization.
The Multi-Faceted Role of Maritime Training in and for NATO and Non-NATO Operations by Professor Kostas A. Lavdas* &  Dr. Marios P. Efthymiopoulos**
Asia’s Transformation:
The Tripartite Working Arrangement (TWA) of EFCA, EMSA and Frontex
Tuesday, January 19th Good Morning, Happy Tuesday! 
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Current Event Brief!.
Roles of the President Chapter 9 Section 2.
Chapter Six, Section Three “Making Foreign Policy”
Security in the Arctic - the Icelandic Perspective
Foreign Policy Ch 7.3.
Chapter Six, Section Three “Making Foreign Policy”
Ch 7 – section 3 (g2) US Foreign Policy
Security challenges in the Balkans
ROLE AND TASKS OS THE HUNGARIAN Peace Support Operations
Foreign Policy Ch 7.3.
[ 6.6 ] National Security.
Branches of the Military
Chapter 8 “Making Foreign Policy”
Chapter 8 “Making Foreign Policy”
Chapter Six, Section Three
THE ROLE OF CYBERSECURITY IN THE ROMANIAN DEFENCE EDUCATIONAL SYSTEM
International Organizations
Presentation transcript:

1/18 Armed Forces in Cyber Era Namık KAPLAN, Commander Plans Projects Coordination Branch Head, Turkish Armed Forces Cyber Defence Command

2/18 Cyber Defence As a Top Priority * Military C&C’s are the most motivational targets * NATO’s Director of Policy and Planning statement in March 2010 “Approximately 120 countries currently have or are developing offensive cyber attack capabilities”.

3/18 Cyber War A New “War Domain”: + Land Sea Space Air Cyber Space

4/18 Characteristics Of Cyber Attacks Asymmetric Attribution Problems No Borders Cyber Law Discussion (Regin Virus)

5/18 NATO Wales Summit Declaration (4 - 5 September 2014) Item 72: … We affirm therefore that cyber defence is part of NATO’s core task of collective defence. A decision as to when a cyber attack would lead to the invocation of Article 5 would be taken by the North Atlantic Council on a case-by-case basis.

6/18 Turkey’s Cyber Efforts Transportation, Maritime and Telecommunication Ministry Cyber Security Board National Cyber Security Strategy and Action Plan National Cyber Incident Response Center

7/18 TAF Cyber Defence Organization TAF CYBER DEFENCE COMMAND TGS CYBER UNIT ARMY CYBER UNIT NAVY CYBER UNIT AIR FORCE CYBER UNIT GENDARMERIE CYBER UNIT COAST GUARD CYBER UNIT

8/18 TAF Cyber Defence Organization * TAF Cyber Defence Organization has a three-tier hierarcy. The highest tier is TAF Cyber Defence Management Board which is responsible for the policy and decision making process. TAF CDMB TAF Cyber Defence Command Cyber Units for Respective Services

9/18 Cyber Defence Command Short-TermMid-TermLong-Term * Cyber Defence Operations Management Center on a 24/7 basis, * Vulnerability Analysis and Penetration Tests, * Participating Cyber Exercises, * Trainings * Enhancing its cyber defence posture

10/18 Cyber Operations * Prepare a better cyber defence system starting our activities in the peace time.

11/18 Mustafa Kemal ATATÜRK “Peace at Home Peace Abroad” Peace in Cyberspace

12/18 Cyber Weapons * Logical Cyber Weapons (Software Based Tools) * Physical Cyber Weapons (SCADA and Supply Chain Attacks) * Psychological Cyber Weapons (Social Engineering)

13/18 Effects of Cyber Weapons * Technology dependency * Cyber Defence is more effective than the Offence * Time factor * The sooner the cyber attack is the greater effect * If the response time is shorter, it is easier to mitigate the cyber attack

14/18 Cyber Exercises * Cyber Coalition Exercise held in Cyber Defence Command between Nov 2014 successfully with all the stakeholders. * Ministry of Foreign Affairs * Ministry of Transport Maritime Affairs and Communications * TUBITAK * National Cyber Incident Response Centre * Turkish Armed Forces

15/18 Cyber Exercises Cyber Coalition Exercise held in Cyber Defence Command between Nov 2014 successfully with all the stakeholders. * Ministry of Foreign Affairs * Ministry of Transport Maritime Affairs and Communications * TUBITAK * National Cyber Incident Response Centre * Turkish Armed Forces

16/18 Backup Plan * We should always have a backup plan including the cyber activities.

17/18 * These backup plans should be ready for operating the systems in peace and wartime. Be Vigilant

18/18 Thank you.