Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar 19.11.2013.

Slides:



Advertisements
Similar presentations
Towards a G20 supported international initiative for global Agricultural monitoring XV SBSR – Curitiba 2011 May 2 nd - JECAM Proposing a G20 supported.
Advertisements

World History - 2 nd Semester Essay #2. What was the Cold War? How did it begin? Give three incidents of conflicts caused by the Cold War, including Germany.
Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
Philippine Cybercrime Efforts
Security in the use of ICTs APT-ITU workshop on the International Telecommunications Regulations Bangkok, 6-8 February 2012 Preetam Maloor, ITU.
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.
1/18 Armed Forces in Cyber Era Namık KAPLAN, Commander Plans Projects Coordination Branch Head, Turkish Armed Forces Cyber Defence Command.
The French approach to CIIP ENISA workshop. Coordination of CIP in France ANSSI 2 A cross-ministerial issue The General Secretariat for Defense and National.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
Cyberterrorism. Critical Infrastructure Vulnerability.
South Carolina Cyber.
CYBER AS A NEW WAR DOMAIN Cengiz ÖZTEKE Colonel Commander, TAF Cyber Defence Command.
Network Security of The United States of America By: Jeffery T. Pelletier.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
NATO ASI 2011, Salamanca, Spain, September, 2011 Challenges on Human perception and understanding on situational awareness during future Maritime.
International Peace and Security Vladimir Radunović Director, Cybersecurity and E-diplomacy 20 March 2015 WEBINAR.
Marine Industry Day 2015 Sector Command Center (24 hours): (504) National Response Center: Website:
12/12/2013 Cluster Workshop on Cybersecurity 1 Michele Bezzi (SAP) Kazim Hussain (ATOS) SecCord & CYSPA Projects.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Cyber Security Nevada Businesses Overview June, 2014.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
“Cyberdéfense” A French view on cyberwarfare S. TAILLAT CREC-ST CYR
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
“Missile Defence Factor in Establishing a New Security Environment” International BMD Conference “Missile Defence Factor in Establishing a New Security.
Hurdles in implementation of cyber security in India.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts.
Cold War Notes. What was the Cold War? Battle of ideas between United States and Soviet Union. Not an actual war between those countries. Used words and.
Sofia, 09 June Sofia, 09 June 2010 MINISTRY OF TRANSPORT, INFORMATION TECHNOLOGY AND COMMUNICATIONS Executive Agency “Electronic Communication Networks.
Ayman Irziqat Katarzyna Kosarska Sergio Pradel 1.
NHII 03 Homeland Security Group A Robert Esterhay, M.D. School of Public Health and Information Sciences University of Louisville, Kentucky Robert Esterhay,
Professor Peeter Lorents, CCD COE Chief of the R&D Branch
European Union Agency For Network And Information Security Enhancing the security of CIIPs in Europe – eHealth and ENISA Dr. Evangelos Ouzounis, Head of.
Cyber Services Plc BRIEF SUMMARY  Founded in 2015  Founders and members are security veterans with proven international reputation  Resources.
Global Government Cloud Initiatives For more information, please contact Lim May-Ann
FFIEC Cybersecurity Assessment Tool Maine Credit Union League September 23, 2015 Patrick Truett, Information Systems Officer National Credit Union Administration.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Brian Marks COSC 380. Cyber War  What is Cyber War?  What attacks have happened?  Could this happen to us?  What defenses are in place to stop it?
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
Cyber Security and Georgia. New Challenges
Maritime Security as an Integral Part of an
Information Security Program
Cyberwar Becomes a Reality
Figure 1. Critical Infrastructure Organizations Believe that the Cyber-threat Landscape Is Getting Worse From: ESG Brief: Critical Infrastructure Organizations.
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
Business Counter-Intelligence
French Port Cybersecurity Initiative
Detection and Analysis of Threats to the Energy Sector (DATES)
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Miyeon Yoon, Korea Internet & Security Agency
Cybersecurity at PJM Jonathon Monken
Africa Center for Strategic Studies
Evolution Of Cybersecurity
Threat identification & analysis
Period 2, 5, & 6 We will examine the effects of the Cold War on US History Chapter 18 Notes Go over test Cold War Map Homework.
Cyber Security Ecosystem of Georgia. Experience and Challenges
Security for Safety: Enabling Digitalization of Railway Systems
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
Cybersecurity at PJM Jonathon Monken
SECURITY IN THE DIGITAL AGE
South Asia: Security Landscape
Presentation transcript:

Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar

Agenda  Defining the terms, What is..?  A Brief History  Assess the problem  Implications and nation wide strategy  Define Process  Takeaways

Defining the terms, What is? Thef t of IP Effect to Computer Network State sponsored Political or hacktivist motivation Armed Attack Man- Made Platform Cyber Space X Cyberattack X X X Cyberespionage X X Cyberwarfare X X X X X

History of Cyber Warfare

Where we are in 2013… Source

Where we are in 2013 Source

Assess the Problem Complexity Domain, actors, target Threats type and locations In any form and from anywhere International legal concern Unknown source/actors Economic impact Cost on individuals and government Interconnected world Critical systems, private sectors

Interconnectivity of Sectors

Addressing the problem in some nations Turkey  Cyber Security Strategy Plan and action items defined NATO  Cyber Defense Center European Union  European Network Security Agency (ENISA) USA  US Cyber Command (USCYBERCOM) UK  UK Defense Cyber Operations Group (DCOG) Russia  Information Warfare Framework France  French Network and Information Security Agency (FNISA) Germany  Cyber Defense Center (CDC) Korea  Korean Information Security Agency (KISA) Canada  Canadian Cyber Incident Response Center (CCIRC) ……

Implications and Nation wide strategy

Organizational Structure

Process

Takeaways Coordination Information Sharing Continues evolvement in threat and defense Develop and apply legal framework Public educational awareness

THANK YOU What type of weapons will be fought in World War III ?