International Peace and Security Vladimir Radunović Director, Cybersecurity and E-diplomacy 20 March 2015 WEBINAR.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Security in the use of ICTs APT-ITU workshop on the International Telecommunications Regulations Bangkok, 6-8 February 2012 Preetam Maloor, ITU.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
Cybersecurity and eTrust in the ESCWA Region Matthew Perkins 19 December 2011.
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
1/18 Armed Forces in Cyber Era Namık KAPLAN, Commander Plans Projects Coordination Branch Head, Turkish Armed Forces Cyber Defence Command.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
MINISTRY OF NATIONAL DEFENCE REPUBLIC OF POLAND CLASSIFIED INFORMATION PROTECTION DEPARTMENT COL. PIOTR GRZYBOWSKI, Director, Classified Information Protection.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
(Geneva, Switzerland, September 2014)
Strategy and Policy Unit: Current Activities and Future Tasks
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Opportunities for All: Human Rights in Norway’s Foreign Policy and Development Cooperation White paper on human rights in Norway’s foreign and development.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
A project implemented by the HTSPE consortium This project is funded by the European Union GLOBAL EUROPE INSTRUMENT FOR STABILITY
Internet Governance in the Asia Pacific region Paul Wilson APNIC 1.
Caribbean Telecommunications Union. 6th Caribbean Internet Forum (CIF), Port of Spain, October Caribbean Telecommunications Union The Internet: Governance.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Information Warfare Playgrounds to Battlegrounds.
A National approach to Cyber security/CIIP: Raising awareness.
Todor Tagarev, Zlatogor Minchev, Nataliya Ivanova IT for Security Department, Institute of ICT, Bulgarian Academy of Sciences October 1-2, 2012 Sofia,
ITU Carla Licciardello Policy Analyst
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Укрепление доверия в киберпространстве Trust and Confidence in Cyberspace.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Cyber security implementation within an organization Ltn Andri Rebane Estonian MoD CIO.
Perspectives for an effective European-wide fight against cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
MA “International Relations, Global Economy and Strategic Analysis” COURSE OUTLINE.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Information Warfare Playgrounds to Battlegrounds.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
Capacity Building Vladimir Radunović Director, Cybersecurity and E-diplomacy 1 April 2015 WEBINAR.
Ministry of Enterprise, Energy and Communications Sweden RIPE Cooperation WG ITU PP 10 update Maria Häll, Deputy Director Division of IT Policy Ministry.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
Cybersecurity Strategy in Japan May 2016 Yasu TANIWAKI Deputy Director-General National center of Incident readiness and Strategy for Cybersecurity (NISC)
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Ensuring Cyberpeace in a New World Order Dr. Hamadoun Touré Secretary General International Telecommunications Union, Geneva.
International Law in Military Operations: a NATO practitioner’s views Mr. Vincent Roobaert Senior Legal Advisor NATO Communications and Information Agency.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
Unclassified MG. L. HOXHA Skopje, 21 st of June 2005 REPUBLIC OF ALBANIA MINISTRY OF DEFENCE GENERAL STAFF OF THE ARMED FORCES.
The 9 th Track II Network of ASEAN Defence and Security Institute (The 9 th NADI Annual Meeting) Present by: Nem Sowathey Assistant to Minister of National.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31: Foreign, security and defence.
A COMPREHENSIVE APPROACH
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
Internet Governance in November 2016
Cyber Security and Georgia. New Challenges
“The Cyber Security Challenge: What Can be Done
WTSA-12 Resolutions addressing security
Cybersecurity in the ECOWAS region
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
Moscow, Russia 29 September 2016
WTSA-12 Resolutions addressing security
Modern world today There are a lot of internal and international conflicts all over the world. Force methods are often used and have high effectiveness.
Cybersecurity in Belarus a general overview of support areas
Internet Governance: An Analysis from Developing country’s perspective
Cybersecurity: global developments, challenges and strategic responses
Promoting Global Cybersecurity
Networking for Home and Small Businesses – Chapter 8
Institution and Capacity- Building
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

International Peace and Security Vladimir Radunović Director, Cybersecurity and E-diplomacy 20 March 2015 WEBINAR

Contents Cyber-armament: weapons and militarisation Cyber-conflicts: cyberwar - hype or reality? Conflict prevention: CBMs and norms, cooperation, IHL Diplomacy: ongoing fora, actors and challenges

Cyber-armament

Weapons and tools  Malware (viruses, trojans, worms)  Bot-nets (DDoS, spam, infection, frauds)  Social engineering (phishing, scams) Software flaws Protocol flaws Mind flaws

Asymmetry

Speed Policies and Law Technology and services Malware Cyber-attackers Provided by Ed Gelbstein

Cases Estonia Creeper Stuxnet „Aurora“ Sony-N.Korea PRISM

Militarisation Cyber as 5 th battlefield domain:  US: 4x Cyber-Command with Pentagon  UK: Cyber Defence Operations Group at the Ministry of Defence  Russia: FSB (Federal Security Service)  China: Cyber-warfare unit within PLA  Iran: High council for cyber-space and cyber-defence command  NATO: CCDCoE  EU: European Defence Agency (EDA) ...

Cyber-conflicts

Future in the past

Cyber-warfare v3.0

Cyber-war?

Conflict prevention

Negotiations  Legal frameworks and cooperation against cyber-crime  Confidence building measures (CBM), cooperation on critical infrastructure protection and response to cyber-incidents  Defining cyber-conflicts and application of IHL to cyber-space  Setting the norms of behavior in cyber-space  Control of proliferation of cyber-weapons and dual-use technologies  Cyber-disarmament 

CBMs views on emerging threats Share views on emerging threats terminology Discuss terminology nationallegal and operational frameworks Set up national legal and operational frameworks among national bodies Cooperate among national bodies to share information on threats avoid misperception Consult to avoid misperception, tension and conflicts protectcritical infrastructure Cooperate to protect critical infrastructure protect open and secure Internet Share measures taken to protect open and secure Internet capacity building Encourage capacity building multistakeholder approach  Strengthen multistakeholder approach and PPP capacities on regional and sub-regional  Enhance capacities on regional and sub-regional levels ...

IHL Challenges  Necessity: Defining armed attack and use of force in cyber- space? Response to cyber-attacks?  Distinction: Dual-use technology? Global (nus-)effects?  Proportionality: Assessment of effects of cyber-attacks?  Attribution: Proxies? Liability of intermediaries?

Diplomacy

International initiatives  UN: Group of Governmental Experts (GGE) on “International norms pertaining to state use of ICT” (2011-)  OSCE: Confidence Building Measures re. risks from ICT (2013)  NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE): “Tallin Manual” (2013)  OECD: Guidelines on Information Security  G8: Subgroup on High-Tech Crime on crime, terrorism and CIIP  ITU: Global Cybersecurity Agenda (2008)  WSIS, IGF, GCCS, ASEAN...  Bilateral agreements

Collective responsibility

Challenges

Provided by Ed Gelbstein

Chain effect

Human rights and cybersecurity

Questions Thank you for your @vradunovic