The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.

Slides:



Advertisements
Similar presentations
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Advertisements

UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Jinhyun CHO Senior Researcher Korea Internet and Security Agency.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
7 Effective Habits when using the Internet Philip O’Kane 1.
COMPLEXITY AND CYBER DEFENSE TTI/VANGUARD TAMING COMPLEXITY October 5, 2011 Michael A. Wertheimer, DoD.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
Internet, Intranet and Extranets
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Andrew Schroeder Networking Aspects of Cloud Computing.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Norman SecureSurf Protect your users when surfing the Internet.
Capacity Development Workshop on Public Information Management System and Policy in Korea on cyber attacks Jeong Min, Lee KISA.
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
Market Analysis Decision Group.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Exploring the Network.
Kim Andreasson Managing Director DAKA advisory AB Bahrain International eGovernment Forum Kingdom of Bahrain 8-10 April 2013 Measuring E-Government.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Information Technology & Communications Sensitive Data Use, Storage & Security Meeting Background Data Breach on February 18, 2014 Security Meeting with.
Akamai Technologies - Overview RSA ® Conference 2013.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Maritime Cyber Vulnerabilities in the Energy Sector Center for Joint Operations of the Sea ODU Maritime Institute Students Crow, Fresco, Lee.
Local Threat Report Vikram Kumar – Chief Executive, InternetNZ 22/08/2012.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 17 - Securing Cyberspace: Strategic Responses for a Digital Age, Pg. 213.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Hurdles in implementation of cyber security in India.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
Computer crimes.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Information Security: Current Threats Marc Scarborough Information Security Officer
LIVE TALK - Datacenter e applicazioni Speed Pitch di Elena Bonvicino, Channel Account Manger, Brocade Communication Italy.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
The Current State of Cyber Security and How to Defend Your Data.
David Wigley HCC Security Architect Security Trends for 2016.
EIC – Jornada ciberatacs cyber risk outlook June 2016.
Cloud Computing HOW PROFITABLY CLOUD COMPUTING IS TO YOUR BUSINESS?
1 © Copyright 2013 EMC Corporation. All rights reserved. Intelligence-Driven Security Art Coviello, Jr. Chairman, RSA The Security Division of EMC.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Broadband Challenges 2017 Christopher Tamarin
Industrial Control System Cybersecurity
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Executive Director and Endowed Chair
Information Security – Current Challenges
Cloud Data Security In theosophy and anthroposophy, the Akashic records are a compendium of all human events, thoughts, words, emotions and intent ever.
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Predictions For The Future of Cloud Computing. Cloud Services In India.
Securing Information Systems
Vendor of Solutions and Services Integrates Office 365 in Its Management Solution Partner Logo “Our new version of iQ.Suite makes safe and flexible.
Securing the Threats of Tomorrow, Today.
The Global Challenges of Cybersecurity and Digital Terrorism
Presentation transcript:

The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council of Chief Executives March 9, 2015

3 3rd Platform 2005-Present 3rd Platform 2005-Present Cloud Big Data Social MOBILE DEVICES BILLIONS OF USERSBILLIONS OF APPS 2rd Platform rd Platform LAN/InternetClient/Server PC HUNDREDS OF MILLIONS OF USERS HUNDREDS OF THOUSANDS OF APPS 1st Platform st Platform MainframeMini Computer TERMINALS MILLIONS OF USERS THOUSANDS OF APPS EVOLUTION OF COMPUTING Sources: Modified from IDC and RSA

Cyber Threats Fraud: Target 2013, Home Depot 2014 National Security: Estonia 2007, Iran Theft of IP/Assets: Finance/DRDC 2011, NRC 2014 Hackivism: Quebec 2012, “Anonymous” fights ISIS

New Technical Complexity  Spear phishing  Whaling  Distributed Denial of Service (DDoS) attack  Botnets  Zero-day exploit  Watering hole attack  Extortionware  Exploit kits 5

The Dark Web 6 “Dark Web”: Collection of websites that are publicly visible but hide IP addresses of servers that run them. Everything from drugs and arms to fake passports and stolen credit cards for sale.

Internet of Things 7 Everything that is networked is hackable. By 2020, an estimated 40 billion devices will transmit data over the Internet. Security of devices running our lives will be huge challenge.

Collaboration: Key to Progress Neither government nor private sector can solve this challenge alone. Private sector owns 90% of critical infrastructure and most non-critical infrastructure in North America. 8

Collaboration: Key to Progress 2 Biggest companies invest heavily in cyber. Public sector makes laws and regulations and brings key capabilities to the table. Public sector also facilities information and capability sharing. 9

Closing Questions How do we as a country get ahead of this fast evolving challenge? Are there better ways to work with our allies on cybersecurity? What is the role of Parliament in addressing these challenges? 10