CYBER SECURITY in UKRAINE NATO LIAISON OFFICE, KYIV

Slides:



Advertisements
Similar presentations
Secretariat for Multidimensional Security
Advertisements

Philippine Cybercrime Efforts
Tenace FRAMEWORK and NIST Cybersecurity Framework Block IDENTIFY.
Domestication and Implementation Package B The duty to prevent torture and other ill treatment © The Article 5 Initiative, 2013.
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Panel themes of the International Conference “Europe against Counterfeit Medicines” G.N. Gildeeva, Deputy head of the Department of Registration of Medicines.
Speaker: Tamar Shapatava
Protection of Classified Information & Cyber Security
1.Legal basis 2.Perception of cyber defence 3.Computer Incident Response System 4.Cyber Operations 5.Protection of information 6.Summary.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
NIS Directive and NIS Platform
First Practice - Information Security Management System Implementation and ISO Certification.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
1 ENISA’s contribution to the development of Network and Information Security within the Community By Andrea PIROTTI Executive Director ENISA Cyprus, 28.
7 March 2013 Counter-terrorism Committee Executive Directorate Facilitating the Provision of Technical Assistance to Member States.
International Telecommunication Union CHALLENGING POLICY STEPS TOWARDS IMPLEMENTING COMMON ALERTING PLATFORMS Orhan Osmani Emergency Telecommunications.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Romanian Court of Accounts years of existence.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Cybersecurity Governance in Ethiopia
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
Federal Acquisition Service U.S. General Services Administration June 3, 2013 Joint Working Group on Improving Cybersecurity and Resilience through Acquisition.
2 ictQATAR “ Information and Communication Technology (ICT) improves how we live and work in countless ways.”  The Ministry of Information Communication.
An Analysis of the Cyber Security Strategy (2008) of Estonia Based in part on ITU Q.22/1 Report On Best Practices For A National Approach To Cybersecurity:
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Environmental Management System Definitions
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
The new cyber threats in 2013 – the hungarian approach Mr. Mihály Zala, Major-general President of National Security Authority of Hungary.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
PROTECTING AMERICA THROUGH PUBLIC ALERT & WARNING NATIONAL HURRICANE CONFERENCE APRIL 6, 2004 Kenneth B. Allen Executive Director Partnership for Public.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
Of XX Government Contracts Statutes, Regulations, Executive Orders & Policies Stu Nibley, Partner, K&L Gates LLP ©2015 PubKLearning. All rights reserved.1.
Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.
PUBLIC PROCUREMENT REFORMS IN ALBANIA 10 th PUBLIC PROCUREMENT EXCHANGE PLATFORM May, 27-30, 2014 Istanbul, Turkey 1.
Advisory Forum, July 2005 Outcome of the first retreat of ECDC Management Team (EXC) 4-5 July 2005 Krägga Herrgård Zsuzsanna Jakab Director ECDC.
6Standards for the planning, design and construction of ports and terminals OBJECTIVE: To ensure that Ports and Terminals are planned, designed and constructed.
ISACA Ireland Cyber Security Policy 9 February 2016.
Information Security tools for records managers Frank Rankin.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Finnish Cyber Security Strategy and its implementation 14 th October 2014, Београд Secretary General, Information Security Adviser Aku Hilve.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Program Performance Criteria.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
Module 3: Civic Initiatives for Judicial Reform and Countering Corruption September 16, 2005.
University of Piraeus Research Centre (UPRC) Assistant Professor Nineta Polemi “PREVENTION, PREPAREDENESS AND CONSEQUENCE MANAGEMENT OF.
MIT University Skopje Ass. Prof. Oliver Andonov, PhD
Cyber Security and Georgia. New Challenges
Cybersecurity, competence and preparedness
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
About the NIS directive
European Cybercrime Centre - EC3
Security challenges in the Balkans
I have many checklists: how do I get started with cyber security?
8 Building Blocks of National Cyber Strategies
The European Anti-Corruption Report
Computer Emergency Response Team
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
Institution and Capacity- Building
THE ROLE OF CYBERSECURITY IN THE ROMANIAN DEFENCE EDUCATIONAL SYSTEM
Presentation transcript:

CYBER SECURITY in UKRAINE NATO LIAISON OFFICE, KYIV WELCOME MUSTAFA AYDINLI NATO LIAISON OFFICE, KYIV

AGENDA What to protect? Cybersecurity governance/framework Standards Public-private sector cooperation Risk based management Cybersecurity dictionary InfoSec problems Awareness rising Trust Fund How NATO can support?

What to protect State assets or Individual’s Rights

Cyber Security Governance/Framework Central authority to overarch Strategy, policy and action plans Framework Cybersecurity strategy Legislative regulations Well defined roles and responsiblities

Standards Effective cooperation in cross-border and cross-community. Different standards are being used Competing Contradictory Excessively restrictive Not interoperable Who will decide on the standards? NATO standards for security and defence sector

Public-Private Sector Cooperation Critical infrastructures operated by private sector Private sector has huge technical and personel capacity Lack of cooperation and collaboration Requires legislative regulations Estonia

Risk Based Management Risk assessment is curicial Define risk management procedures Evaluate risks Report risks and possible solutions Prioritize risks and evaluate acceptance Risk should be shared between public and private sector Accurate and timely information sharing

Cybersecurity Dictionary Wide range of interest IT system administrators, Forensic experts, Prosecuters, Judges, Law enforcment bodies ....... Need for a common understanding of cybersecurity Easily updatable

InfoSec Problems Usage of old Soviet GOST standards Some standards 40 years old Very strict rules prevents develeopment of new systems over Internet Usage of foreign crypto systems is forbiden Imlementing NATO compatible projects requires exceptions

Awareness Rising

Cyber Defence Trust Fund Established and Romania is entrusted as Lead Nation. Aim Develop defensive CERT type capabilities Provide training and advisory support Projects derived from the requirements of Ukrainian institutions. SBU is the executive agent for Ukrainian side.

How NATO can Support? Help legislation process. Provide unclassified standards. Classified standards. Workshops/conferences under the SPS programs. Trust Funds. Assessing as a policy goal in ANP.

Thank you Any question? İstanbul Bosphorus National Museum of the History of the Great Patriotic War