International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Philippine Cybercrime Efforts
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
UNODC & the Global Response to Cybercrime
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
(Geneva, Switzerland, September 2014)
NIS Directive and NIS Platform
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
National Cybersecurity Management System
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
Combating cyber-crime: the context Justice Canada March 2005.
12/12/2013 Cluster Workshop on Cybersecurity 1 Michele Bezzi (SAP) Kazim Hussain (ATOS) SecCord & CYSPA Projects.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
11 Cybersecurity & Cybersecurity & Child Online Protection (COP) February 2012 Colombo, Sri Lanka Eun-Ju Kim, Ph.D. Regional Director ITU Regional.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
Caribbean Telecommunications Union. 6th Caribbean Internet Forum (CIF), Port of Spain, October Caribbean Telecommunications Union The Internet: Governance.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
The National Cyber Security Strategy and Action Plan A presentation by Ms. Antoinette Lucas-Andrews Director, International Affairs Ministry.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
Cybersecurity Governance in Ethiopia
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
A National approach to Cyber security/CIIP: Raising awareness.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Durban, South Africa, 8 July 2013 Outcome of WTSA-12 on spam Xiaoya Yang, Head, WTSA Programmes Division ITU-TSB ITU Workshop on “Countering.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
International Telecommunication Union ITU-T Cybersecurity Symposium - Florianópolis, Brazil, 4 October 2004 Infrastructure Security: The impact on Telecommunications.
Geneva, Switzerland, September 2014 Towards a partnership-based framework for secure ICT Infrastructure in developing countries Bill McCrum Senior.
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Digital Enlightenment.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
ITU Perspective: The ITU Development Sector and the Information Society Désiré Karyabwite IP Coordinator / E-STrategies International Telecommunication.
Securing Information Systems
Johannesburg, South Africa
Cybersecurity in the ECOWAS region
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
Public-private cooperation
Securing Information Systems
8 Building Blocks of National Cyber Strategies
National Cyber Strategy Preparedness: 8 Preparatory Questions
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
E-Commerce for Developing Countries (EC-DC)
John Carlson Senior Director, BITS
Combating Cybercrime: Tools and Capacity Building for Emerging Economies WSIS 2015, Geneva Jinyong Chung May 25, 2015.
Promoting Global Cybersecurity
Challenges and Successes in the Zambian ICT Security Sector
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
SECURITY IN THE DIGITAL AGE
ECONOMIC SECURITY COMPONENT OF CIP: Roles of Industry and Government U
Presentation transcript:

International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department of State ITU-T Workshop on “New challenges for Telecommunication Security Standardizations" Geneva, 9(pm)-10 February 2009

International Telecommunication Union Geneva, 9(pm)-10 February ITU-D Q22/1: History Created by World Telecommunication Development Conference (WTDC) in 2006 (Doha) Five meetings: September 2006, May 2007, September 2007, April 2008, September 2008 Next meeting: April 6-7, 2009

International Telecommunication Union Geneva, 9(pm)-10 February ITU-D Q22/1: Mandate(1) Survey, catalogue, describe, and raise awareness of: Principal issues facing national policy- makers in building a culture of cybersecurity Principal sources of cybersecurity information and assistance Successful best practices employed by national policy-makers to organize for cybersecurity Unique challenges faced by developing countries

International Telecommunication Union Geneva, 9(pm)-10 February ITU-D Q22/1: Mandate (2) Examine best practices for watch, warning, & incident response & recovery

International Telecommunication Union Geneva, 9(pm)-10 February What Does Cybersecurity Apply to? Applies to cyberspace: electronic information & communication systems & the information they contain

International Telecommunication Union Geneva, 9(pm)-10 February What is Cybersecurity Supposed to Do? Prevent damage from: denial of service attacks malware (viruses, worms, trojan horses) Prevent exploitation from: Spyware, fraud (phishing, identity theft) Restore systems after attacks

International Telecommunication Union Geneva, 9(pm)-10 February Why is Cybersecurity Important? Today, all critical sectors of economy rely on IP networks for transacting business, government services, etc. IP networks, not designed to be secure, face increasing numbers of cyber attacks of increasing sophistication. To maximize the value IP networks can add to a national economy, they must be reliable, secure, & trusted.

International Telecommunication Union Geneva, 9(pm)-10 February Five Keys to a Good National Cybersecurity Program A national strategy Government & industry collaboration Sound legal foundation to fight cybercrime National incident management capability National awareness of the importance of cybersecurity

International Telecommunication Union Geneva, 9(pm)-10 February A National Strategy (1) Government needs to understand importance of cybersecurity for national economy Economic impact of cybersecurity attacks is severe: 2003 estimates USD13B (worms & viruses), USD226B (all forms of overt attack) Does not include macro-economic costs

International Telecommunication Union Geneva, 9(pm)-10 February A National Strategy (2) National strategy should have an international component Cyberattacks are borderless National cybersecurity achieved only when international cybersecurity is achieved Countries have a mutual economic interest in working together to achieve global cybersecurity

International Telecommunication Union Geneva, 9(pm)-10 February Collaboration between Government and Industry Government – industry collaboration on cybersecurity important: Industry owns most of the IP network infrastructure Industry has expertise to find solutions to cyber incidents Industry usually first to know Industry knows what can & cannot be done

International Telecommunication Union Geneva, 9(pm)-10 February A Sound Legal Foundation to Fight Cyber Abuses Enact & enforce comprehensive set of laws on cybersecurity & crime WSIS (Tunis agenda): “…develop necessary legislation for the investigation and prosecution of cybercrime, noting existing frameworks; for example, UNGA Res 55/63, 56/121, & regional initiatives such as the Council of Europe Convention on Cybercrime.”

International Telecommunication Union Geneva, 9(pm)-10 February National Incident Management: Watch, Warning, Response & Recovery Governments need to develop government-wide system to counter cyber-attacks National Computer Security Incident Response Team, N-CSIRT N-CSIRT roles Information sharing Development of procedures, controls, tools to protect government systems

International Telecommunication Union Geneva, 9(pm)-10 February National Awareness of Importance of Cybersecurity Many vulnerabilities result from users’ poor cybersecurity awareness Government & the culture of cybersecurity E-government Education & training Financial assistance and incentives Research & development Guidance on privacy issues Role of international/regional forums

International Telecommunication Union Geneva, 9(pm)-10 February Q22/1 Draft Report Two Annexes to the draft report provide introductions to concepts of SPAM and Identity Management Annex A: SPAM & Associated Threats Annex B: Identity Management A third Annex contains extensive references to materials on each of the five keys to a successful national cybersecurity program.

International Telecommunication Union Geneva, 9(pm)-10 February Question 22 Status Draft report (revision 2) at /en (TIES required) We invite you to participate in the April 2009 meeting of Q22 & to contribute to the development of the report to improve its usefulness for national administrations