Prime Minister's Office ISRAEL NATIONAL SECURITY COUNCIL Counter Terrorism Bureau Cyber Terrorism and its Impact on the Civilian Sector Brig. Gen. (Res.)

Slides:



Advertisements
Similar presentations
National Presentation Republic of Serbia SEMINAR: Insurance as a method for Disaster Risk Reduction in SEE April 2013 Berovo, Macedonia.
Advertisements

Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
Strategic Centre for Organised Crime Partnerships and engagement with communities.
MINISTRY FOR INFORMATION SOCIETY AND TELECOMMINUCATIONS CIRT - Computer Incident Response Team GOVERNMENT OF MONTENEGRO MINISTRY FOR INFORMATION SOCIETY.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
National Infrastructure Protection Plan
Security, Privacy, and the Protection of Personally Identifiable Information Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
Cyberterrorism. Critical Infrastructure Vulnerability.
UN Reform Jan-Jilles van der Hoeven - November 2005.
Global Markets Iraq: Conflict Zone Insurance for Personnel, Assets and Contracts w The reconstruction of Iraq will be a demanding and challenging task.
Greg Shaw How do we turn private sector preparedness into an investment rather than a cost of doing.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
CICT Policy Conference Implications of Private Equity Ownership of Information Infrastructure: The case of TDC Grit Munk, Danish Consumer Council.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Michigan’s Digital Strategy Michigan Information Systems Association Passport to Smarter Government September 18, 2014 Presented by: David Behen DTMB Director.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Lachlan MacKinnon, Liz Bacon, Diane Gan, Georgios Loukas, David Chadwick, Dimitrios Frangiskatos Chapter 20.
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
August 2011Beyond the Border1 Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness CSG-ERC Canada-U.S. Relations Committee.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
February 2009Prof. Rafi Melnick The Herzliya Conference The Economic Dimension 2009 Prof. Rafi Melnick Provost, Interdisciplinary Center (IDC) Herzliya.
A project implemented by the HTSPE consortium This project is funded by the European Union GLOBAL EUROPE INSTRUMENT FOR STABILITY
Maintaining Essential Business and Community Services During a Pandemic Paul R. Patrick, Director Bureau of Emergency Medical Services Utah Department.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
1 Korea’s Approach to Network Security 21 May 2002 Cha, Yang-Shin Ministry of Information and Communication.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Recent Cyber Attacks and Countermeasures September 2006.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
PROTECTING AMERICA THROUGH PUBLIC ALERT & WARNING NATIONAL HURRICANE CONFERENCE APRIL 6, 2004 Kenneth B. Allen Executive Director Partnership for Public.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Prime Minister’s Office Government’s Responsibility for Jewish-Arab Integration and Equality in the State of Israel Prime Minister’s Office 8th Herzliya.
Understanding the Threats of and Defenses Against Cyber Warfare.
Hurdles in implementation of cyber security in India.
International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson THE LINK BETWEEN.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
Security Debate Why cracking should be criminalized.
CSE CST Anti-Terrorism and Privacy, One Year After Nancy Y. Cheng, FCA Associate Deputy Chief, IT Security Communications Security Establishment November.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
Tom Lenart & John Field CT DEMHS Region 2.  Department of Emergency Services and Public Protection (DESPP)  Commission on Fire Prevention and Control.
European Commission Enterprise and Industry Marco Malacarne | European Parliament 12 May 2010 | ‹#› European Commission Enterprise and Industry Marco Malacarne.
FOR OFFICIAL USE ONLY 1 National Critical Infrastructure Prioritization Program Tier 1 and Tier 2 Program Overview Office of Infrastructure Protection.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Reports Sources & Documents in CYSM Digital Library Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
University of Colorado – Denver
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Cybersecurity as a Business Differentiator
Disaster and Emergency Management
WHAT is Project Matrix? An effort designed to:
Davos & The World Bank.
California Cybersecurity Integration Center (Cal-CSIC)
DIGITAL CZECH REPUBLIC Impact of Digital Revolution
Critical Infrastructure Protection Policy Priorities
Protection of Critical Infrastructure
Forth International Forum
NERC Cyber Security Standard
Preventing Information Technology Crimes
Moderator Mohamed M. K. Elhaj
European Programme for Critical Infrastructure Protection (EPCIP)
Role of US Security and Intelligence Agencies
Deborah Housen-Couriel, ADV.
Presentation transcript:

Prime Minister's Office ISRAEL NATIONAL SECURITY COUNCIL Counter Terrorism Bureau Cyber Terrorism and its Impact on the Civilian Sector Brig. Gen. (Res.) Nitzan Nuriel Director, Counter Terrorism Bureau Herzliya conference, february

Prime Minister's Office ISRAEL NATIONAL SECURITY COUNCIL Counter Terrorism Bureau Nature of the Threat in the Civilian Aspect The cyber dimension is perceived as one which can operate without “ fingerprints ” - secret/elusive. The cyber dimension is perceived as one which can operate without “ fingerprints ” - secret/elusive. Not only in times of war / conflict. Not only in times of war / conflict. May be used for deterrence, punishment and revenge. May be used for deterrence, punishment and revenge.

Prime Minister's Office ISRAEL NATIONAL SECURITY COUNCIL Counter Terrorism Bureau Examples in the Civilian Sector regarding Non-Critical Infrastructures Working Assumption – Critical infrastructures are entitled to national response. Working Assumption – Critical infrastructures are entitled to national response. Disruption of the dairy production system. Disruption of the dairy production system. Disruption of medical data. Disruption of medical data. Disabling the local authorities systems (collection). Disabling the local authorities systems (collection). Damage Characteristics Disruptive of day to day life. Disruptive of day to day life. Financial damage. Financial damage. Undermines personal security (can ’ t rely on anyone). Undermines personal security (can ’ t rely on anyone).

Prime Minister's Office ISRAEL NATIONAL SECURITY COUNCIL Counter Terrorism Bureau The Dilemmas How much should a country invest in the protection of their “ state infrastructures ” and private sector computing? How much should a country invest in the protection of their “ state infrastructures ” and private sector computing? Should a country compensate for the damages? Should a country compensate for the damages? What is the critical message when the private/local problem turns into a national one? What is the critical message when the private/local problem turns into a national one?