NATO CIS Services Agency TechNet International 2009- Keynote Speech Session I – International Threats – Regional Solutions Presented by Lieutenant General.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

NATO UNCLASSIFIED Releasable to the INTERNET
NATO Consultation, Command and Control Agency
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
ACO Command Structure Total ~ 6000 NATO UNCLASSIFIED
1© Nokia Siemens Networks 2011 To change the document information in the footer, press [Alt + F8] and use the „Nokia_Siemens_Networks_–_Change_Document_Information“
E-Security Background IT Infrastructure in Sikkim Current Status of Cyber Security& Cyber Crime in SIkkimCurrent Status of Cyber Security& Cyber Crime.
South Carolina Cyber.
NATO CIS Services Agency Interoperability in Afghanistan The perspective of NCSA The ISAF CIS Coordinator and Service Provider Dag Wilhelmsen Technical.
CENTRIXS-ISAF: Phase 1 Overview
NATO Information Assurance
1 Telstra in Confidence Managing Security for our Mobile Technology.
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
NATO Network Enabled Capabilities
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Stephen S. Yau CSE , Fall Security Strategies.
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
Defence and Communications Systems EADS Secure Networks The role of TETRA in Homeland Security.PPT /HVi The Role of TETRA in a Holistic Homeland.
The Operational Application Of Commercial Technologies
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Outline  Company Profile  Services Provided  Assets  System Schema  Risk Categories  Technical Risks and Mitigation  Summary.
Brussels June Cyber-Security Cyber-Protection Cyber-Sustainability.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Computer Crime and Information Technology Security
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Director NCSA 22/04/2017 “Running NATO’s Networks in Operations” LtGen Ulrich Wolf Director NCSA AFCEA Europe Symposium SHAPE 1 June 2006 Good morning,
NATO Collaboration Bodies Einar Thorsen, CTO/CIS
16-17 October 2008,Prague1 Information sharing within Czech Armed Forces and Allies, Challenges for mission effectiveness within Czech Armed Forces and.
Information Assurance Program Manager U.S. Army Europe and Seventh Army Information Assurance in Large-Scale Practice International Scientific NATO PfP/PWP.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
Information Security What is Information Security?
NATO UNCLASSIFIED NATO Consultation, Command and Control Agency Acquisition Overview Mr. John D. Edell Director of Acquisition 15 June 2006.
Scott Charney Cybercrime and Risk Management PwC.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
DEFENCE POLICY AND PLANNING DIVISION
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Safe’n’Sec IT security solutions for enterprises of any size.
MIS323 – Business Telecommunications Chapter 10 Security.
Cyber Services Plc BRIEF SUMMARY  Founded in 2015  Founders and members are security veterans with proven international reputation  Resources.
We build a „Virtual Dome"
TRAINING OPTIONS AT CYBER SERVICES PLC Anett Mádi-Nátor, Director of International Operations Ferenc Frész, CEO.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Securing Information Systems
Securing Information Systems
Cyber Security Zafar Sadik
Team 2 – understand vulnerabilities
Information Technology Sector
Capabilities Matrix Access and Authentication
Panel Discussion: C4I Solutions for Combating
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
Today’s Risk. Today’s Solutions. Cyber security and
Cyber Security in New Jersey State Government
Securing the Threats of Tomorrow, Today.
Cybersecurity Threat Assessment
In the attack index…what number is your Company?
Thames Valley Chamber / Claire Logic
Presentation transcript:

NATO CIS Services Agency TechNet International Keynote Speech Session I – International Threats – Regional Solutions Presented by Lieutenant General Kurt Herrmann, Director NCSA 29 October 2009 Brussels, Belgium PROVISION OF CIS-SERVICES IN A DYNAMICALLY EVOLVING CYBER WORLD

NATO UNCLASSIFIED2 Understanding NCSA Free Flow of Information and Knowledge Security in the Cyber World NATO’s Response to Cyber Risks Outline

NATO UNCLASSIFIED3 To ensure the provision of secure end-to-end information exchange services and information processing services required for NATO Consultation, Command and Control, using fielded Communications and Information Systems in the most cost effective manner. NCSA Mission

NATO UNCLASSIFIED4 NCSA Organisation CIS OperationsStatic CIS Support Service Delivery Systems Management NATO INFOSECSignal Battalions

NATO UNCLASSIFIED5 CIS support to NATO Operations Military Committee OPCON (for Operations) SACEUR NAC Policy direction NCSA DCIS elements DCMs CIS Logistic Depot Supporting NATO elements NC3A NAMSA Contractors Supporting National CIS elements CIS support to Static HQ structures SLAsOpPlans/OpOrders C2 for NFS Nations’ customers Consul- tation NATO HQ Brussels C2 for NCS ACT +Sub- structure C2 for NCS ACO +Sub- structure NATO C3 Board NCSA’s Position NCSA “as a whole” (indivisible mission / organisation)  Reach back 

NATO UNCLASSIFIED6 Future Area of Responsibility EUFOR KFOR ISAF IRAQ NL. GR Norfolk Mons Brunssum Naples Northwood Heidelberg Ramstein Madrid Lisbon Izmir Sector Norfolk Sector Mons Sector Brunssum Sector Naples Sector Lisbon NCSA Squadron NCSA Detachment NCSA Support Element Stavanger Bydgoszcz Finderup Udem Larissa Poggio Renatico JALLC Monsanto La Spezia Yeovilton

NATO UNCLASSIFIED7 Darfur ISAF NTM-I ACTIVE ENDEAVOUR NHQS KFOR NCSA Connecting NATO …

NATO UNCLASSIFIED8 Federated & Integrated Architecture for ISAF SIPRNeT (US) CENTRIX S GCTF 80 nations CENTRIX S GCTF 80 nations CENTRIX S ISAF CENTRIX S ISAF ISAF Secret (FOC+, MP4, IOC, Overtask) NATO Secret NATO Secret Shared ISAF Information Domain 41 TCN National Mission Secret National Mission Secret NATO HQ Mission Secret NATO HQ Mission Secret NATO HQ Mission Secret NATO HQ Mission Secret National Mission Secret National Mission Secret National Mission Secret National Mission Secret ISAF General-Purpose Communication System

NATO UNCLASSIFIED9 FREE FLOW INFORMATION AND KNOWLEDGE: Network price performance (doubling every 12 months) Source:

NATO UNCLASSIFIED10 Globally Applied IP Networking 14 billion devices will be connected to the Internet by Billion 300 Million Source: / Forrester Research, February 2005

NATO UNCLASSIFIED11 The World Is Changing Fast Information flows freely Devices Experience Content/Applications Source:

NATO UNCLASSIFIED12 Cloud Computing 12

NATO UNCLASSIFIED13 Security Concerns 13

NATO UNCLASSIFIED14 Security in the Cyber World: The Social Revolution of the Internet Generation Social Networks Growth Instant Messaging Instant Messaging Social Networking Social Networking Global Collaboration Global Collaboration

NATO UNCLASSIFIED15 Spam Malware (viruses, worms, trojans..) Web defacements Denial of Service Active Threats

NATO UNCLASSIFIED16 Classified Information Leakage Vulnerabilities exposed by poor maintenance User indiscretions Active Threats (2)

NATO UNCLASSIFIED17 Script Kiddie Recreational Hacker Cyber Activist Organized Crime Terrorist Organization Nation-state Insider Threat The Attackers....

NATO UNCLASSIFIED18 Cyber Defence in NATO Commitment by Nations Effective Cyber Defence Policies NATO Cyber Defence Management Authority (CDMA) NATO Computer Incident Response Capability

NATO UNCLASSIFIED19 DETECT RESPONDRECOVER FEEDBACK PROTECT / PREVENT Security Activities

NATO UNCLASSIFIED20 Authorise – Inform – Advise - Report NATO CYBER DEFENCE: Functional View NATO wide CD Mgmt Body Policy Strategic Direction Response Teams Intrusion Detection Security Mgmt

NATO UNCLASSIFIED21 Cyber Defence Security Services System Hardening measures NATO-wide anti-malware support Specialist advice to projects Vulnerability Assessments (VA) and Penetration Testing NATO-wide Vulnerability Notification Training and Awareness

NATO UNCLASSIFIED22 Cyber Defence Security Services (2) Intrusion Detection System Mail Content Checking Website Monitoring 24/7 Incident Response Capability On and Off-line Computer Forensic Services

NATO UNCLASSIFIED23 NATO Core Network Voice Data VTC Land, Air & Maritime Forces Land, Air & Maritime Forces Balkan s NTMI Exercise s Service Interface Nations NATO’s CIS Network ISAF

NATO UNCLASSIFIED24 NCSA: NATO’s Driving Force for Efficient CIS Services Questions? NATO CIS Services Agency