 The Indispensable Component of Cyber Security: The Dynamics of an Effective Cyber Cooperation Prof. Nazife Baykal Director of METU Informatics Institute.

Slides:



Advertisements
Similar presentations
Stop. Think. Connect. National Cybersecurity Awareness Campaign October 2010.
Advertisements

REGIONAL (TERRITORIAL) DEVELOPMENT
Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
Establishing Cyber Security education, awareness, training and trust for SMEs Roger Dean, Executive Director
The cooperation between the various players in the public audit environment in the Flemish community of Belgium Ignace Desomer President of the Court of.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
The U.S. Coast Guard’s Role in Cybersecurity
National Cyber Security and Information (Cyber) Security Awareness Prof SH (Basie) von Solms Immediate Past President : IFIP University of Johannesburg.
Internet as a Military-Free Zone: The Kaspersky Vision Eugene Kaspersky Chairman & CEO, Kaspersky Lab.
Focus on Teamwork 1.
VISION LAUNCH Moving to action – nurturing the vision Welcome!!
18 Introduction to Macroeconomics
Health Systems and the Cycle of Health System Reform
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
1 The Profession of Business District Management Professional Certification Program Rutgers University, Newark, NJ, USA Dr. Seth A. Grossman, Ph.D.,
Laurent Dauby Director World Bank Towards a lower carbon urban mobility World and Africa perspective.
Cooperatives and Youth in the Context of Rural Development Presented at the Seminar Organized by Agri-Seta Prof. Muxe Nkondo National Small Business Advisory.
A project implemented by the HTSPE consortium This project is funded by the European Union GLOBAL EUROPE INSTRUMENT FOR STABILITY
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Patricia A. Muoio Chief National Information Assurance Research Lab.
12/12/2013 Cluster Workshop on Cybersecurity 1 Michele Bezzi (SAP) Kazim Hussain (ATOS) SecCord & CYSPA Projects.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Opportunities and Constraints of Environmental Peace Making Lessons Learned Alexander Carius, Adelphi Research The Hague Conference on Environment, Security.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
MCESA Re-Engaging Disconnected Youth Summit II “Successes of a Developed Collective Impact Model” Chekemma Fulmore-Townsend President and CEO Philadelphia.
NS4053 Winter Term 2014 Country/Region Indices. Country Indices/Rankings I There are a number of organizations that provide rankings of countries based.
Todor Tagarev, Zlatogor Minchev, Nataliya Ivanova IT for Security Department, Institute of ICT, Bulgarian Academy of Sciences October 1-2, 2012 Sofia,
Workshop on RISKS AND IMPACTS ON FLOOD FROM EXTREME EVENTS IN ASEAN COUNTRIES Bali, August 5 th 2015.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
The Canada Border Services Agency and Coordinated Border Management Regional Conference of Customs Directors General, April 22-25, 2012.
WHO WE ARE International Association of Chiefs of Police (IACP) National Organization of Black Law Enforcement Executives (NOBLE) National Sheriffs’ Association.
CYBER SECURITY IN A BORDERLESS GLOBAL ARENA Avi Hasson | Chief Scientist, Ministry of Industry, Trade and Labor Herzeliya Conference,
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Youth Cooperatives for Youth Employment by Juergen Schwettmann International Labour Organization.
The Law and Development Institute “Rule of Law and Development” Prof. Y.S. Lee 2014 Law and Development Conference May 16, 2014 Manchester, U.K.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Building National Public Inclusive Infrastructures on our way to a Global Public Inclusive Infrastructure Vancouver 2009.
Business Retention and Expansion What it is Why it is important How it works What makes it successful Business Retention and Expansion.
United Nations Framework Convention on Climate Change (UNFCCC) Twelfth Conference of Parties (COP12) – Second Meeting of Parties (MOP2) Climate Change.
Delivering the solution together: Leading by example
Federal Aviation Administration 1 Collaborative Decision Making Improving Air Traffic Management Together…
Copyright © 2015 Scott Borg/U.S. Cyber Consequences Unit. All rights reserved. Making Economics a Cyber-Security Weapon Scott Borg Director (CEO) and Chief.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
Risk and Safety in the Transport Sector (RISIT) - a research programme covering road-, sea-, air- and the railway sector Finn H. Amundsen, Head of programme.
European integration, domestic interest associations A Comparative Perspective Prof. Dr. Jan Beyers ACIM.
1 Thoughts on ERCOT-Wide Critical Infrastructure Protection Committee Bill Muston October 31, 2006.
Connecting Risk, Opportunity and Knowledge for Innovation in Water Management Bernadette Conant Executive Director Canadian Water Network CEC JPAC Meeting.
SPANISH NATIONAL POLICE INNOVATION & DEVELOPMENT SERVICE LOGISTICS GENERAL DIRECTORATE SMI2GS - H2020, BRUSSELS 26 & 27 February 2016 H2020 (CALL 2016)
”Research intelligence led community policing” - a swedish development of ILP to manage and prevent the impact of social risks, organized crime and radicalization.
Presentation at NorDoc Meeting
Security and resilience for Smart Hospitals Key findings
The Economics of Cyber Security
Enterprise risk management
Leading Change Leadership as a Contact Sport
Critical Infrastructure Protection Policy Priorities
In Search We Trust How does an EU search engine contribute to cybersecurity? EESC, Tuesday, 9 January 2018 Guillaume Vassault-Houlière, on behalf of Eric.
Risk Register I want to plan a project
8 Building Blocks of National Cyber Strategies
National Cyber Strategy Preparedness: 8 Preparatory Questions
Presidential Approaches to Cybersecurity
30 Years of Investing in Rural Leadership Valerie Shangreaux, Ph.D.
Forth International Forum
Cybersecurity Threats and Opportunities in Latin America
AVI AFRIQUE October 2018 Tshepo Peege
Luis Jorge Romero Saro ETSI Director-General
National Information Assurance (NIA) Policy
SECURITY IN THE DIGITAL AGE
Infrastructure investments – source of future well-being
Presentation transcript:

 The Indispensable Component of Cyber Security: The Dynamics of an Effective Cyber Cooperation Prof. Nazife Baykal Director of METU Informatics Institute

Cooperation  What is ‘cooperation’?  ‘Togetherness’  ‘for their mutual benefit’  Cooperation in cyber security  The magical concept of ‘trust’

Cooperation: Why so important?  Cyberspace: Extremely connected  Security & Safety: Impossible to provide alone  Maintained & developed by private sector, regulated by governments, research & development by the academia.

Cooperation: Emphasized  US President Obama’s Executive Order: Improving Critical Infrastructure Cybersecurity emphasized cooperation  Initiatives by NATO, EU and other international organizations.

An Irony: Cooperation Exists But Always Talked About  Cooperation examples everywhere yet we still talk about the ‘need’ for cooperation.  The need for cooperation repeated – Only minor examples are shown  Many cooperation efforts are piecemeal & target specific issues, not the ‘big picture’  Mostly born out of necessities – Quick and small consequences

Problematic Aspects Preventing An ‘Ideal’ Cooperation GovernmentAcademiaIndustry Reluctance for Information Sharing & Lack of Trust Focusing on short-term economic gains A Lack of Full Trust

Required for Cooperation: Sacrifice  Sacrifice: A radical yet proper concept  Not focusing on short term results and interests  Cooperation needs compromises  A compromise where everyone wins

Dimensions of an Ideal Effective Cooperation Trust Risk- Sharing Cost- Sharing Commitment S

Dimension I: Trust  Basic dimension  The foundation and starting point of effective cyber cooperation  Can be built upon the existing experiences of having securely and effectively worked with each other.

Dimension II: Risk-Sharing  Every step brings about risks  All the parties should be ready and willing to face and share risks  Examples: investments might fail in the short run or violations of data privacy might occur  Even the success itself might be a risk

Dimension III: Cost-Sharing  Cost-sharing: third major dimension of the ideal cooperation  Necessary steps of the cooperation in the cyber domain involves costs  All the actors should be ready to take on economic responsibilities on their part.  Example: The industry should be willing to work with research and development projects

Dimension IV: Commitment  Commitment of the actors: the last dimension of the ideal cooperation  The commitment to the responsibilities till the end is a major component of the process  Commitment helps the other dimensions be carried out into real life and gain their full meaning.

Four Major Dimensions: Cooperation Process TrustRisk-Sharing Cost- Sharing Commitment

Results of Effective Cooperation  Such a cooperation is full of promises  A better capacity building to combat the threats we face on cyber arena  A strong cooperation vision  Better awareness  Sharing lessons learned  Increased research and development

Thank you.