IT security and privacy Ferenc Suba LLM, MA Chairman of the Board, CERT-Hungary Vice-Chair of the Management Board, European Network and Information Security.

Slides:



Advertisements
Similar presentations
Session 3: Safer Services in a Digital Society Security with RFID Gérald Santucci European Commission Head of Unit DG INFSO/D4.
Advertisements

The Benefits and Challenges of Implementation of Basel II in Europe José María Roldán | 27 Sept 2005.
NATO Civil Communications Planning Committee (ccpc)
Gender Perspectives in Introduction to Regulation Gender Module #1 ITU Workshops on Sustainability in Telecommunication Through Gender & Social Equality.
Benefits of Public Services for the Employment in Flexicurity* implementation: To help in transitions during the Crisis Conference : « Flexicurity in times.
Strategic case for information & IT Acknowledgements to Euan Wilson (Staffordshire University)
Vehicle-infrastructure integration: creating co-operative mobility systems and services Hearing EU Parliament, 22 January 2009 Hermann Meyer, CEO.
1 L’Internet au service des PME Paris (France), 8-9 février 1999 Workshop 1 How to stimulate demand for Internet services among SME’s? Workshop results.
United Nations Economic Commission for Europe Role of Regulatory and Institutional Reforms in Meeting the Challenges of Globalization Paolo Garonna Officer-in-Charge.
The new Hungarian cybersecurity landscape Dr. Ferenc Suba Vice-Chair, European Network and Information Security Agency Chairman, National CERT Working.
Green Procurement and Eco-Innovation Rod Gilchrist Opportunity Peterborough.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Budapest May, 2001 Anne Lehouck European Commission, DG ENTERPRISE 1 ELECTRONIC SIGNATURE LEGAL FRAMEWORK & STANDARDISATION.
Chapter 12 Strategies for Managing the Technology Infrastructure.
Community Anchors Fit for Purpose?. OUR PURPOSE is to be champions of social change, tackling the causes and consequences of social exclusion by developing.
Business Plan Template CARMa Venture Services (P) Ltd.
Skills for Employment CIDA Policy context and Programming guidelines ACCC Forum–Edmonton, June c.
Activating civil society and promoting human and social rights David N Jones IFSW President ICSW World Conference Tours 2008.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
IT security seminar Copenhagen, April 4th 2002 M. Jean-Michel HUBERT Chairman of the French Regulation Authority IRG Chairman.
Foster social acceptance of RES by stakeholder engagement Contract N°: IEE/11/930/SI Project duration: 31/03/2012 – 30/03/ /04/2012.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
InWEnt | Qualified to shape the future Reducing the Risk of Chemical Clusters by Formation of Chemical Parks Christian Jochum, Prof. Dr. InWEnt Senior.
Ferenc Suba LLM, MA Chairman of the Board, CERT-Hungary, Theodore Puskás Foundation Vice-Chair of the Management Board, European Network and Information.
Emerging technology: How it Will Affect the Way We Work Dr Ted Dunstone, Biometix CPSISC Skills Conference April 2006.
1 The Role of Psychology in Management Education Richard Klimoski Dean, School of Management George Mason University September 9 th, 2007.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Framework for development of national ICT R&D sector Milan Zdravković Innovation Center for Information Technologies Milan Zdravković Innovation Center.
Renaissance Risk Changing the odds in your favour Future implications of treating the effect, rather than the cause.
Problems and Possibilities of Telework Gintautas Babravičius Deputy Chairman Information Society Development Committee of the Seimas “Teleworking for Business,
Thoughts on the National Research and Development Center for Cyber Defense Ferenc FRIEDLER University of Pannonia Veszprém, Hungary 3rd Information Security.
The Fully Networked Car Geneva, 4-5 March Ubiquitous connectivity to improve urban mobility Hermann Meyer ERTICO.
1 The Benefits of an SOA in the Contact Center Brian Garr Program Director, IBM Speech Solutions.
Social and Professional Issues in IT Roshan Chitrakar.
Kapil Garg 17 October 2008 Leveraging quality faculty and cultivating trainers Click to add sub header.
Promoting Partnerships between Public and Private EPEC PRIVATE SECTOR FORUM Jean-Claude Banon Chairman of BUSINESSEUROPE’s Services of General Economic.
Name ICT based answers for life events in older age Future scenario’s for Independent Living Services in the EU.
Doctoral Training at EIT Digital
State Aid Rules Ole Damsgaard. What is state aid? “Any aid granted by a Member State…which distorts competition by favouring certain undertakings or the.
European Union Agency For Network And Information Security Security and resilience for eHealth Infrastructures and Service – ENISA study Dimitra Liveri.
WSGA ‘Plan to Grow’ Conference 18 th November 2015 ‘WATERR’ Project Findings and Support Opportunities and Challenges for the Irrigation Sector in South.
Outsourcing. What is Outsourcing? Outsourcing - – “the strategic use of outside resources to perform activities traditionally handled by internal staff.
A Presentation to the: Portfolio Committee on Minerals and Energy (30 August 2001) Given by: Barry Bredenkamp Bonesa Electricity (Pty) Ltd Efficient Lighting.
MTT Agrifood Research Finland - strategy Target for 2015 and operating model set for achieving it.
7 TH SACCO OPERATIONAL FORUM Johannesburg, South Africa Birchwood Hotel “EMERGING TRENDS IN FINANCIAL SERVICES INDUSTRY” BY: SOLOMON ANGUTSA ATSIAYA –
THE SOCIAL CARE WORKFORCE RESEARCH IN PRACTICE FOR ADULTS DIRECTORS’ POLICY FORUM 2009 Jennifer Bernard June 2009.
April 19, IT Outsourcing overview and training cases.
1 Meeting the Challenges of Today’s Dynamic Business Environment Chapter 1.
IASA CIO Roundtable 30 Years in the Insurance Industry William C. Stone, Founder & CEO SS&C Technologies.
Overall Exploitation & Sustainability Strategy 4th Steering Committee meeting Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism.
Chemistry careers in SMEs The interface between science and business – Introduction Christopher Hone University of Leeds.
Nuclear Power Economics and Project Structuring 2017 Edition
Insurance Technology Forums: ‘IT Matters’ Forum
Critical Infrastructure Protection Policy Priorities
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
Data Fusion Market
Understanding the Managed Services Model
UAV’s integration into Civilian Controlled Airspace
Intelligent Transport Systems
Presentation for information days Units involved:
Outsourcing.
Road Infrastructure for Road Vehicles Automation
International Management Chapter 1: Assessing the Environment: Political, Economic, Legal and Technological Lesson1: The Global Business Environment, the.
SOUTH AFRICAN INSURANCE ASSOCIATION
Pam Matthews, FHIMSS Director of Business Information Systems Business Information Systems is focused around administrative and financial information.
How can we make our practice more efficient?
Agenda Initial situation The association Fields of action.
6th Framework Programme on Research
Highlights from PPD7 on Climate Risk Insurance in Mongolia
Presentation transcript:

IT security and privacy Ferenc Suba LLM, MA Chairman of the Board, CERT-Hungary Vice-Chair of the Management Board, European Network and Information Security Agency

IT security and privacy Challenge and opportunity for: - Business - Government - Endusers Future: CIIP - Critical - Information Infrastructure - Protection

BUSINESS Challenge: - How to convince users? (incident driven thinking) - How to estimate costs and benefits? (competing risk analysis methods) - How to avoid over-regulation? („autopoesis” of bueurocracy) Opportunity: - Demand growing parallel to IT penetration and emerging incidents - Never ending story (new applications, new fields) - New security economics (every loss that you avoid is a profit + insurance)

GOVERNMENT Challenge: - How to react globally? (global problem) - How to react efficiently? (official channels too slow) - How to keep your manpower? (turnover of qualified staff) - How to react to monoculture? (of course ) Opportunity: - International co-operation (ICAAN, IWWN) - New, flexible, structures + outsourcing (govCERTs) - De minimis regulation (liability of ISPs) - Create checks and balances

END USERS Challenge: - How to protect? (weakest link) - How to educate? (unwilling students) - How to make them liable? (e.g. internetbanking) Opportunity: - IT security as part of national curriculum - End user empowerment (deployment of technology) - Awareness raising (user friendliness) - Balance between outside protection and self responsibility

CIIP Future for IT security, because: - Vital - Ubiquitous (everywhere, affects everyone) - Easy to understand Keyword: co-operation - Between different sectors (not only IT) - Between different players (business, government, academia, endusers) - Between nations (global challenge)

Contacts European Network and Information Security Agency ( Theodore Puskas Foundation ( CERT-Hungary (