Lessons learned and not learned Enn Tyugu Leading research scientist NATO Cooperative Cyber Defense Center of Excellence.

Slides:



Advertisements
Similar presentations
1 Speculations on the Future of Cyber Security in 2025 Prof. Ravi Sandhu Executive Director January 2010
Advertisements

Philippine Cybercrime Efforts
Taxpayers registration and e-services provided by the Estonian Tax and Customs Board Karin Aleksandrov Chief Expert Service Management Department.
E-services in Estonia Nele Leosk e-Governance Academy Program Director Chisinau, Moldova
SWOT analysis – V4 cooperation Political workshop: V4 cooperation - the reality check.
ICT IN THE ELECTORAL PROCESS: LESSONS LEARNED Susanne Caarls International Electoral Affairs Symposium May 2012.
EInfrastructures (Internet and Grids) US Resource Centers Perspective: implementation and execution challenges Alan Blatecky Executive Director SDSC.
HOW TO START A BUSINESS IN SPAIN. 7. Submit a Formal Declaration to Start Activity 8. Register for Tax 9. Legalise Company Books 10. Obtain an Opening.
A Working Organization 1 Gerald Musger Working Organization: Trends and Challenges for Professional and Managerial Staff Background: a bundle of new developments.
Role of Technology in GCC Integration. GCC Countries: the current status Gulf Cooperative Council Members Bahrain Kuwait Oman Qatar Saudi Arabia UAE.
Isolated use of individual exhibits might cause misunderstandings.
Strategy and Policy Unit: Current Activities and Future Tasks
International Regulatory Capacity Building Global Curriculum Project.
WELCOME TO TALLINN UNIVERSITY OF TECHNOLOGY
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
IT security seminar Copenhagen, April 4th 2002 M. Jean-Michel HUBERT Chairman of the French Regulation Authority IRG Chairman.
12/12/2013 Cluster Workshop on Cybersecurity 1 Michele Bezzi (SAP) Kazim Hussain (ATOS) SecCord & CYSPA Projects.
Creating an International Semester – the next step in a Common Education for the European Officer 1 Results of elaborating for The International Semester.
Seán Paul McGurk National Cybersecurity and Communications
Eastern Mediterranean University
1 CDA6938 Special Topic: Research in Computer and Network Security (spring’07) Class Overview.
New M&S Curriculum: The Emerging Strategy Dr. Wayne Summers TSYS Department of Computer Science Columbus State University.
Informatics Institute 6/19/081 A Draft Plan for the Informatics Institute (Graduate Program) Informatics Institute A Draft Plan for the Informatics Institute.
Cooperative Cyber Defence Centre of Excellence MAJ Raul Rikk Chief of EDF TDCCIS / Chief of CCD COE project organisation 29 FEB 2008.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Todor Tagarev, Zlatogor Minchev, Nataliya Ivanova IT for Security Department, Institute of ICT, Bulgarian Academy of Sciences October 1-2, 2012 Sofia,
How is the Federation adding value to its members? Background: Intergraf´s enquiry to member federations in spring 2005 (Managing the Future of national.
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
Photonics21 – WG2 SWOT Analysis Photonics21 – Work Group 2 Industrial Production, Manufacturing and Quality.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
E-state Estonia. What is e-state? e-state means public official databases and collection of legal acts in Internet It creates quick and diverse forum.
Participative Local democracy in Finland. The Legal Context of Local Participative Democracy in Finland An essential aspect of the local government decision-making.
Chapter 19 Economic Growth in Developing Nations.
Cyber security implementation within an organization Ltn Andri Rebane Estonian MoD CIO.
Center for Cybersecurity Research and Education (CCRE)
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Back office integration for better E-government services Crossroads Bank for Social Security Frank Robben General manager Crossroads Bank for Social Security.
DEFENCE POLICY AND PLANNING DIVISION
Sofia, 09 June Sofia, 09 June 2010 MINISTRY OF TRANSPORT, INFORMATION TECHNOLOGY AND COMMUNICATIONS Executive Agency “Electronic Communication Networks.
Lecture 19 Page 1 CS 236 Online Prolog to Lecture 19 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Growth of E-Government Services in Macedonia- (Online sophistication of e- Government services) Presentation by Prof. Dr. Marjan Gusev University Sts Cyril.
CYBER SECURITY Industry guidelines for use on- board ships Mr Angus Frew, Secretary General.
We build a „Virtual Dome"
Cyber Defense: The Industry point of view Asgeir Myhre Managing director Teleplan Globe AS (Norway)
Bucharest City Hall Bucharest in terms of e-Government Seoul, April 6 – 13, 2014 © Legal Department.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
© Grant Thornton. All rights reserved. What transparency initiative is or would be the most beneficial for your country? 1.Aid transparency 2.Budget execution.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
NETWORKS OF EXCELLENCE KEY ISSUES David Fuegi
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Cyber Security and Georgia. New Challenges
Maritime Security as an Integral Part of an
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
National Workshop on Cyber Crimes and Cyber Laws
Cyber Security in the Mortgage Industry
ACM/IEEE-CS Computer Science Curriculum
Grade 6 Rotation #6-10 Goals/Objectives
The influence of Blockchain in different Industries Blockchain Technology.
Perspectives on Defense Cyber Issues
Grade 6 Rotation #6-10 Goals/Objectives
Cyber Security Ecosystem of Georgia. Experience and Challenges
Laur Mägi Department of Information Systems and Document Management
The European Union response to cyber threats
”From Policy to Practice”
Risk management and elections: the Estonian experience
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
LO1 - Know about aspects of cyber security
Presentation transcript:

Lessons learned and not learned Enn Tyugu Leading research scientist NATO Cooperative Cyber Defense Center of Excellence

Who am I? Educator and researcher at a technical university. Adviser at a center of excellence for cyber security. Citizen of a very small country.

Who are we? Estonia is a small East European country highly dependent on IT: 85% of income tax declarations are submitted via Internet 98% of all banking operations are performed electronically (very few bank offices for public use) E-Government provides services for citizens over Internet Close to a big country that wishes to keep us in its “sphere of influence”.

How are we? Cyber attcks on Estonia in spring 2007 demonstrated real threats in the cyber space. A survey of the country’s CII disclosed that the most important weakness is lack of competent IA personal: Shortage of personal x x x x x x x x x x x x x Human factorx x x x x Insufficient IDS x x x x x Legal aspectsx x x Insufficient resourcesx x x Physical dangersx x x Bosses don’t carex x Security problemsx

Who should educate? Insufficient competence in the universities Insufficient teaching skills in the business and industry. It is not the responsibility of military. Only coordinated effort of the universities, military and industry can do it well.

What to teach? A CD master studies core competence: Organizational aspects, incl. risk analysis Legal aspects Cryptography Network security Malware Attacks and defense IDS and log analysis Simulation and practical work