Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.

Slides:



Advertisements
Similar presentations
What are key underlying principles and accepted strategic approaches for addressing monitoring discrimination? Partnership Participation Child rights approach.
Advertisements

Philippine Cybercrime Efforts
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
INTERNATIONAL CONFERENCE ON GENDER EQUITY IN SPORTS FOR SOCIAL CHANGE
Khammar Mrabit Director Office of Nuclear Security
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
Council of Europe Eastern Partnership Facility 16 May 2013, Brussels.
Consultative Meeting on Strengthening Partnerships with National Rapporteurs on Trafficking in Persons and Equivalent Mechanisms May 2013.
Federal IT Steering Unit (FITSU) Federal Intelligence Service (FIS) Reporting and Analysis Centre for Information Assurance (IA) MELANI National Strategy.
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
Cyberterrorism. Critical Infrastructure Vulnerability.
Speaker: Tamar Shapatava
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Strategy and Policy Unit: Current Activities and Future Tasks
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
6 August 2015 Rule of law: implementing a comprehensive and integrated approach in prevention and fight against corruption in the Danube region,
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Workshop 24 Input by ILGA-Europe (policy and coalition opportunities) Joël Le Déroff – Senior Policy & Programmes Officer – 19 October.
Rule of Law: Implementing a comprehensive and integrated approach in prevention and fight against corruption in the Danube region”, November 2013.
International Peace and Security Vladimir Radunović Director, Cybersecurity and E-diplomacy 20 March 2015 WEBINAR.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
1 Photo PAMECA IV TEAM Design of PAMECA IV PAMECA IV started in July 2013 and is scheduled to run until October Its overall objective.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Cybersecurity Governance in Ethiopia
Information Sharing Challenges, Trends and Opportunities
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
A National approach to Cyber security/CIIP: Raising awareness.
An Analysis of the Cyber Security Strategy (2008) of Estonia Based in part on ITU Q.22/1 Report On Best Practices For A National Approach To Cybersecurity:
The new cyber threats in 2013 – the hungarian approach Mr. Mihály Zala, Major-general President of National Security Authority of Hungary.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Children's Rights Protection System in Russia 19 federal and many regional agencies are responsible for the safety and protection of children’s rights.
Fight against terrorism. EU institutional/legal framework A bit of history 1957: European Communities are born.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
EUSBSR Priority Area Secure Steering Group meeting Swedish Civil Contingencies Agency / MSB CBSS Secretariat 2 June 2015, Tallinn.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Norad's work on anti-corruption Fredrik Eriksson Norad Oslo, 28 Oktober, 2009.
Batumi General Content Development of migration management (state commission on migration issues) Forming and documenting of migration policy Visa.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
Tonya Ayow Asst. Director, Support Services CARICOM IMPACS 19 November 2015 SECURING CARICOM THROUGH REGIONAL AND INTERNATIONAL COOPERATION INITIATIVES.
Cybersecurity Strategy in Japan May 2016 Yasu TANIWAKI Deputy Director-General National center of Incident readiness and Strategy for Cybersecurity (NISC)
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Cyber Security and Georgia. New Challenges
Johannesburg, South Africa
Cybersecurity in the ECOWAS region
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
Critical Infrastructure in Varna
Critical Infrastructure Protection Policy Priorities
Cybersecurity in Belarus a general overview of support areas
8 Building Blocks of National Cyber Strategies
The MITRE Corporation Team
Forth International Forum
PGE Chris Nolke, Director of Cybersecurity
Promoting Global Cybersecurity
1. Introduction to the Convention 2
Cyber Security Ecosystem of Georgia. Experience and Challenges
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
Institution and Capacity- Building
Fostering Cooperation between National Rapporteurs and Equivalent Mechanisms and Cooperation with International and Regional Organizations Consultative.
Role of the Council of Europe - International Partner Organisation Justice Programme Prague, 20 March 2019 Criminal Law Cooperation Unit Action against.
Role of the Council of Europe - International Partner Organisation Justice Programme Prague, 20 March 2019 Criminal Law Cooperation Unit Action against.
THE LABOUR ADMINISTRATION AND INSPECTION PROGRAMME LAB/ADMIN
Presentation transcript:

Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015

Current Threat Landscape Cyberwar – 2008 August Experience; Attacks Directed Against Critical Information Infrastructure; Cyber Espionage and Theft of Other Sensitive Information – Georbot Case Most Serious Cybercrimes and Cyber-Enabled Offences; Lack of Enough Human and Technical Recourses. 1

Threat Actors Primary Adversary of Georgia in Cyber Domain is the Russian Federation; The RF Carries Out Well-Organized Campaigns against Georgia in Cyber Space; Cyber Criminals Committing Serious Cyber Crimes or Related Offences – Threat Level is Relatively Law. 2

Strategic Policy Framework National Security Concept of Georgia; Threat Assessment Document of Georgia; Cybersecurity Strategy and AP; Strategy on Combatting Organized Crime- 3 rd Chapter. 3

Principles of Georgian Cybersecurity Policy Cybersecurity as an Integral Part of National Security; Whole of Government Approach; Cybersecurity Awareness; Public-Private Cooperation; Cybersecurity Capacity Building. 4

Institutional Organization 5 MoJ Data Exchange Agency MoI 24/7 Cyber Crime Unit MoD Cybersecurity Bureau State Security and Crisis Management Council State Security Service of Georgia

State Security and Crisis Management Council Elaboration of National Cyber Security Policy Framework; Coordination of Relevant Agencies in the Process of Identifying Threats and Risks Directed against Cyber Security, as well as Assurance of Necessary Measures for Their Elimination; Elaboration of Special Recommendations related to Strengthening Cyber Security for the GoG; Cybersecurity Incident Related Crisis Management. 6

Actions Implemented by SSCMC Institutionalization of National Security Review Process – Cyber Security as an Integral Part; Revision of Threat Assessment Document; Engagement in International Forums: - DHS Cyber Awareness Coalition - CoE Cybercrime Convention Committee 7

Future Threats Intensification of Russian Sponsored Attacks and Campaigns in Cyberspace; Significant Increase of Cybercrimes and Other Cyber-enabled Offences Obstacles to Investigation - Encryption and other Anonymizers; 8

Actions to be Implemented By SSCMC Updating Cyber Security Strategy; Establishment of Permanent PPP Forum; Launching Cyber Awareness Campaigns; Elaboration Cyber Related Crisis Management SOPs; Enhancement of Capacity Building of the Authorities Responsible for Strengthening Cyber Security. 9

Thank You For Your Attention! 10