Cyber security implementation within an organization Ltn Andri Rebane Estonian MoD CIO.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
1/18 Armed Forces in Cyber Era Namık KAPLAN, Commander Plans Projects Coordination Branch Head, Turkish Armed Forces Cyber Defence Command.
CPT Aneta COUFALÍKOVÁ, Ph.D. CIRC Centre, 34.zKIS, Czech Army CIRC.
DHS, National Cyber Security Division Overview
Speaker: Tamar Shapatava
MINISTRY OF NATIONAL DEFENCE REPUBLIC OF POLAND CLASSIFIED INFORMATION PROTECTION DEPARTMENT COL. PIOTR GRZYBOWSKI, Director, Classified Information Protection.
1.Legal basis 2.Perception of cyber defence 3.Computer Incident Response System 4.Cyber Operations 5.Protection of information 6.Summary.
Stabilization and Reconstruction Capabilities Regional security dynamics in the Western Balkans Skopje, November 2011 Ljupco Stalevski MOI-
CYBER AS A NEW WAR DOMAIN Cengiz ÖZTEKE Colonel Commander, TAF Cyber Defence Command.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
(Geneva, Switzerland, September 2014)
Strategy and Policy Unit: Current Activities and Future Tasks
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
REPUBLIC of MOLDOVA The MILITARY REFORM. The necessity of military reform is determined by: imperfection of presentimperfection of present state security.
GENERAL STAFF OF THE BULGARIAN ARMED FORCES unclassified WOMEN IN BULGARIAN ARMED FORCES Lt. Col. AF NEVIANA MITEVA.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
“We work to prevent and are prepared to respond to threats to our health and safety through coordinated efforts across the country and around the world.”
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
INFORMATION SECURITY GOVERNANCE READINESS IN GOVERNMENT INSTITUTION
Air Force Doctrine Document 2-5.4: Public Affairs Operations.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
DJ-7 Unclassified Col Nopparat Mission and Organization of the Royal Thai Armed Forces.
The new cyber threats in 2013 – the hungarian approach Mr. Mihály Zala, Major-general President of National Security Authority of Hungary.
Defence Standardization, Codification and Government Quality Assurance Authority Defence Standardization Department Introduction into defence standardization.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
National Information Communication Technologies Strategy Vasif Khalafov “National strategy” working group - Web -
DEFENCE POLICY AND PLANNING DIVISION
Microsoft in Defence Michel van der Bel Vice President Microsoft International.
Ms Inese Kaive, Deputy Head Military Education and Science Section Personnel Development Department Ministry of Defence, Latvia Ms Ginta Lauva-Treide,
Information and Cyber Security
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Advisory Forum, July 2005 Outcome of the first retreat of ECDC Management Team (EXC) 4-5 July 2005 Krägga Herrgård Zsuzsanna Jakab Director ECDC.
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
Estonian Action and Response Plan: Russian Interference European Security Consulting Group Taylor Brown, Viola Meyerweissflog, Marc Barnett and Benedikt.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
1 Lessons from Government 3.0 Innovation of Korea Kim, Sung-lyul Assistant Minister of Ministry of Security and Public Administration.
POLISH DEFENCE INDUSTRY 2014 Polish Chamber of National Defence Manufacturers.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
Best practices in the EU member states : the example of Spain Spanish State approach to addressing Intimate Partner Violence TAIEX P2P studytours Defending.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
GENERAL STAFF OF THE BULGARIAN ARMED FORCES unclassified WOMEN IN BULGARIAN ARMED FORCES Lt. Col. AF NEVIANA MITEVA.
International Law in Military Operations: a NATO practitioner’s views Mr. Vincent Roobaert Senior Legal Advisor NATO Communications and Information Agency.
Version 1.0 Raul Rikk National Cyber Security Index Raul Rikk Markko Künnapu Agu Kivimägi Mari Pedak Triin Rast Priit Roosimägi NCSI Core Team.
Unclassified MG. L. HOXHA Skopje, 21 st of June 2005 REPUBLIC OF ALBANIA MINISTRY OF DEFENCE GENERAL STAFF OF THE ARMED FORCES.
University of Piraeus Research Centre (UPRC) Assistant Professor Nineta Polemi “PREVENTION, PREPAREDENESS AND CONSEQUENCE MANAGEMENT OF.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31: Foreign, security and defence.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
1- Introduction ii-. Part ONE : foreign and security policy.
Cybersecurity - What’s Next? June 2017
Disaster and Emergency Planning
Capabilities Matrix Access and Authentication
Who makes and carries out foreign policy?
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Cybersecurity in Belarus a general overview of support areas
Security challenges in the Balkans
8 Building Blocks of National Cyber Strategies
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Implementing UN Security Council Resolution 1325 (women, peace and security) in the Finnish Defence Forces.
Security week 1 Introductions Class website Syllabus review
Role of US Security and Intelligence Agencies
Presentation transcript:

Cyber security implementation within an organization Ltn Andri Rebane Estonian MoD CIO

Estonian Ministry of Defence Ministry of Defence –Defence Forces CCDCOE CIRC Cyber Lab –Defence League Cyber Unit –Defence Resources Agency –Information’s Agency –Estonian War Museum –Seli Health Center

Basis documents for MoD National Defence Strategy National Military Defence Development Plan National Security Policy National Cyber Security Strategy NATO Policy on Cyber Defence NATO directives

MoD Cyber Space Strategy Defines cyber space as independent domain Covers following areas of Cyber Space: –Leadership of MoD through information technology –Cyber Defence of MoD –Cyber Operations of MoD Other important issues: –Cooperation –Personnel –Technology

Cyber defence Cyber hygene Inside threats Outside threats Monitoring Prevention, detection, response, recovery Forensic etc

Cyber operations Legal and law enforcement Public relations Gathering and analyzing electronic information Using “red” teams in exercises etc

Subordinate documents Documents in subordinate establishments –ICT Development Plan (for leadership in an establishment) –Cyber Defence Development Plan –Cyber Operations Development Plan –etc

Cyber space implementation

Organization ICT consolidation to Defence Forces Cyber Defence –Defence Forces (CIRC) –Defence League (Cyber Unit) Cyber Operations –MoD –Defence Forces –Defence League –Information’s Agency

Defence League Cyber Unit Voluntary ogranization Mission is to protect Estonia’s high-tech way of life, including protection of information infrastructure and supporting broader objectives of national defence development of cooperation among qualified volunteer IT specialists education and training in information security participation in international cyber security training events

Personnel Mixed environment of civilians and military personnel Different nations in CCDCOE Recruits with ICT education serve in Signal Battalion

Infrastructure Inside communication through MoD owned infrastructure Defence Forces is a Provider Independent ISP Basic capability to maintain own infrastructure Cyber Lab (exercise environment)

Technological areas Intrusion detection/prevention systems Antivirus Data loss prevention Removable media encryption Web filtering Mobile device security Log collection and correlation

Resource allocation ICT Development Council –Large investments –Projects that influence entire MoD governance area Resources for cyber defence and cyber operations mainly in Defence Forces and Defence League Resource sharing between establishments R&D with universities

Domestic cooperation Government coordination Estonian Information System’s Agency –CERT-EE Universities –“Cyber Security” masters programe –Coming soon: “e-Governance Innovation” and “Cyber Forensic” (not yet confirmed)

Foreign cooperation Mainly NATO and NATO members –NCIA –NCIRC Nordic countries –Finland –Sweden

Thank you