Creating A CERT at WARP Speed.

Slides:



Advertisements
Similar presentations
National Infrastructure Security Co-ordination Centre
Advertisements

The Admissibility of Electronic Evidence at Court: fighting against high tech crime AGIS 2005 Fredesvinda Insa, PhD Strategic Development Manager CYBEX.
NISSG Open Meeting, 28/06/ ENISA. NISSG Open Meeting, 28/06/ The Agency ENISA: European Network and Information Security Agency Headquarters:
1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Computer Emergency Response Teams
Copyright 2006 – Biz/ed The Conference, Exhibition and Event Environment BTEC National Travel and Tourism.
Evolution of CSIRTs: how to engage Critical Infrastructures and cooperate beyond borders Giza, 19th December 2011.
Tanzania Communications Regulatory Authority - TCRA Response to Cyber incidences in Tanzania: Where are we? Presented at Cyber Security Mini Conference.
NIHE: Opportunities and Challenges of Reform Donald Hoodless Chairman Northern Ireland Housing Executive.
UKTI’s global presence UKTI has more than 1,200 staff in over 100 overseas markets 2.
The Human Firewall Creating a security aware workforce APPLIED INFORMATION SERVICES Andrew Breakwell Business Development Director Compliance Division.
DHS, National Cyber Security Division Overview
1 Case Study ESTABLISHING NATIONAL CERT By Saleem Al-Balooshi Etisalat - AE.
NIS Directive and NIS Platform
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Experiences from establishing a national Centre for Information Security in Norway TERENA Networking Conference 2003 Maria Bartnes Dahl &
1 ENISA: Fostering the European Cooperation on Network & Information Security Dr. Panagiotis Trimintzios, CISSP European Network &
1 EU Collaboration in Network and Information Security Baltic IT&T Forum 2006 Riga, 6 April 2006 Dr. Ronald de Bruin ENISA.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
1 ENISA’s contribution to the development of Network and Information Security within the Community By Andrea PIROTTI Executive Director ENISA Cyprus, 28.
CCIRN meeting, Cairns, 3 July 2004 Computer security co-operation in Europe Karel Vietsch Based on materials provided by TERENA TF-CSIRT.
Peter Burnett Head of Information Sharing National Infrastructure Security Co-ordination Centre.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
ENTERPRISE ‘ Who to Talk to’ Expo 2015 Tipperary Enterprise Week.
11 ICG Annual Conference 2012 Action on Careers – Making a Difference Sarah Finnegan-Dehn ICG President Challenges and Opportunities for the Careers Profession.
Impress Communications An employer’s perspective on potential opportunities, benefits and issues for work experience at 16+
The need for skills and R&D to enhance business opportunities in the digital economy Paul Sweetman Director, ISA and ICT Ireland, Ibec.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Alliance 4 Useful Evidence Webinar, 1 September 2015.
Technology Transfer and IP framework initiatives May 2011.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Peter Burnett Head of Information Sharing National Infrastructure Security Co-ordination Centre
Incident Response In the Cloud.  CEO of BH Consulting – Independent Information Security Firm  Founder & Head of IRISSCERT – Ireland’s first Computer.
CERT cooperation with ISP’s on Cybersecurity C ă t ă lin P ă trașcu CERT-RO 29 October 2015 RONOG 2 Meeting1.
Ian Goodman – Information Systems Team Leader Who are Lasa? “Lasa helps thousands of third sector and government organisations across the UK to deliver.
Who is protecting Internet in Latvia ? - CERT initiative Baiba Kaškina, IMCS UL Baltic IT&T April 2007, Rīga.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Sofia, 09 June Sofia, 09 June 2010 MINISTRY OF TRANSPORT, INFORMATION TECHNOLOGY AND COMMUNICATIONS Executive Agency “Electronic Communication Networks.
Improving NIS in the EU Dr
ISACA Ireland Cyber Security Policy 9 February 2016.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
1. Definition : Malicious code refers to a program that is covertly inserted into another program with the intent to Malicious activities. 2.
APCERT Dr. Suguru Yamaguchi JPCERT/CC. What’s APCERT? “Asia Pacific Computer Emergency Response Team” –Regional forum of CSIRT in Asia Pacific –Established.
Beyond corporate social responsibility. Introduction to Primark A subsidiary company of the ABF (Associated British Foods) Group Launched in 1969 in Ireland.
Building Global CSIRT Capabilities Barbara Laswell, Ph. D
WISE 2017 Collaborating Communities
The National Regional Fund Programme
The Conference, Exhibition and Event Environment
Establishing national (governmental) CERTs in CIS Countries
About the NIS directive
The Forum of Incident Response and Security Teams (FIRST)
Cyber Security coordination in Europe CERT-EU’s perspective
National Cyber Security Programme Local : Building Resilience Together
8 Building Blocks of National Cyber Strategies
Romanian National Cyberspace - Quick facts -
گروه پاسخگویی به فوریتهای رایانه ای Computer Emergency Response Team (CERT) سیدمحمدرضا رشتی اسفندماه
Identifying needs and interacting with domestic stakeholders
Decent work on plantations Sri Lanka’s TEA sector
The European Union response to cyber threats
Community of Users.
Computer Emergency Response Team
Computer Security Cooperation in Europe
MGT601 SME MANAGEMENT.
The Forum of Incident Response and Security Teams (FIRST)
Presentation transcript:

Creating A CERT at WARP Speed

2004 – The Journey Begins Copyright © 2010 IRISS

What’s Missing? 3Copyright © 2010 IRISS

Situation 4  Knowledge Economy  “Silicon Valley” Europe  Over 97% of Irish Businesses are SME  <50 Employees and Annual Turnover <€10m  Ever Increasing Dependence on ICT  No Independent Source of InfoSec information  Economy At Risk  National Security and CNI at Risk  Lack of Data for Law Enforcement  Soft Back Door to UK CNI Copyright © 2010 IRISS

Not a Fair Fight ! 5Copyright © 2010 IRISS

Stakeholders 6Copyright © 2010 IRISS

Does Ireland Need a CERT? 7Copyright © 2010 IRISS

8 Job Complete? Copyright © 2010 IRISS

9 Estonia Effect Copyright © 2010 IRISS

10 Job Complete? Copyright © 2010 IRISS

11 IRISS Is Born Copyright © 2010 IRISS

Who is IRISS-CERT? 12  Ireland’s First CSIRT (Computer Security Incident Response Team)  Provide Services On Information Security  Services Provided Free of Charge  Not For Profit Organisation Copyright © 2010 IRISS

Services Offered  Irish Focused Alerts and Warnings  Vulnerability Awareness  Incident Awareness  Sanitised Attack Notifications  Coordination Service  Irish Focused Research  Trends and Metrics  General Awareness  Knowledge Sharing  Informal discussion  Information Sharing & Dissemination 13Copyright © 2010 IRISS

We Serve  Government Bodies and Agencies  Private Sector Companies  SME Sector  Industry Bodies  Other CERTs 14Copyright © 2010 IRISS

15 IRISS Associations Copyright © 2010 IRISS

16 Sponsors Copyright © 2010 IRISS

Reaction 17Copyright © 2010 IRISS

The Future 18Copyright © 2010 IRISS

19 Planning Your CERT Copyright © 2010 IRISS

20 Engage With Stakeholders Copyright © 2010 IRISS

21 Identify Your Clients Copyright © 2010 IRISS

22 Identify Services Copyright © 2010 IRISS

23 Establish Your Requirements Copyright © 2010 IRISS

24 Identify Tools Copyright © 2010 IRISS

25 Get Funding & Support Copyright © 2010 IRISS

26 Practise, Practise, Practise Copyright © 2010 IRISS

27 Establish the IRT Copyright © 2010 IRISS

28 Deliver Your Services Copyright © 2010 IRISS

29 Be Prepared Copyright © 2010 IRISS

30 Hurdles Copyright © 2010 IRISS

31 IRISS Is A WARP Copyright © 2010 IRISS

32 What Is A WARP? Copyright © 2010 IRISS

33 WARP MSP Copyright © 2010 IRISS

34 WARP MSP Copyright © 2010 IRISS

35 WARP MSP Copyright © 2010 IRISS

36 WARP MSP Copyright © 2010 IRISS

37 WARP FWA Copyright © 2010 IRISS

38Copyright © 2010 IRISS

Why A WARP? 39Copyright © 2010 IRISS

40 More Resources  ENISA - A step-by-step approach on how to set up a CSIRT ISA.pdf  CERT-in-a-box  Handbook for CSIRTs (CERT/CC)  Forming an Incident Response Team  NIST Computer Security Incident Handling Guide  CSIRT Starter Kit Trusted Introducer for CSIRTs in Europe  Warning Advice and Warning Point (WARP) Copyright © 2010 IRISS

Questions ?