CSE CST Anti-Terrorism and Privacy, One Year After Nancy Y. Cheng, FCA Associate Deputy Chief, IT Security Communications Security Establishment November.

Slides:



Advertisements
Similar presentations
NERC Critical Infrastructure Protection Advisory Group (CIP AG) Electric Industry Initiatives Reducing Vulnerability To Terrorism.
Advertisements

Paul Hubbard Portfolio Manager, Border and Transportation Security Information Sharing: Barriers and Solutions Sept 9 Workshop Summary Presented to Armed.
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
1 Evolving the Cyber Security Program Michael Watson Chief Information Security Officer ISACA 3/12/
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Challenges in Making E-Privacy Real Larry Korba Institute for Information Technology National Research Council of Canada Panel Presentation, 6 th Annual.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection.
© MIT 2002 Supply Chain Response to Global Terrorism: Synthesis of Feedback Potential MIT Roles December 6, 2002.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
(Geneva, Switzerland, September 2014)
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Creating a Security Architecture Kim Milford, J.D., CISSP Information Security Manager University of Wisconsin Copyright Kim.
Introduction to Network Defense
Conference – 7-8 August, 2013 Presented by David Melnick | pg 1 Employee Privacy and Organizational Security: August 8th, 2013 Addressing.
Open Data in the Province of Ontario, Canada
NETWORK WARS P resentation to the 11th CACR Information Security Workshop & 3rd Annual Privacy and Security Workshop Privacy and Security: Totally Committed.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
October 27, 2005 Contra Costa Operational Area Homeland Security Strategic and Tactical Planning and Hazardous Materials Response Assessment Project Overview.
BUSINESS B1 Information Security.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force 1 Lt Gen Bill Lord, SAF/CIO A6 Chief of Warfighting Integration and.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Wayne Dauphinee Executive Director Seventh Annual Pacific NorthWest Cross Border Workshop Seattle, WA May Forging Ahead.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Chisinau 2004NATO ANW1 Security Issues for e-Society Oliver B. Popov MSU, SU, SCMU NATO ANW The Third CEENet Workshop on Managerial Issues - MIXREN Chisinau,
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
ISPA Internet Week Regulatory Session The Regulation of Interception of Communications (RIC) Bill 12 September 2002 Tracy Cohen.
Session 71 Federal Involvement in Risk Assessment and Management is relatively recent.
ENISA efforts for securing European Internet Infrastructure
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Enterprise Cybersecurity Strategy
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
GSC9_011 Bill McCrum Executive Secretary TSACC Since GSC 8.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
IS3220 Information Technology Infrastructure Security
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
URBACT IMPLEMENTATION NETWORKS. URBACT in a nutshell  European Territorial Cooperation programme (ETC) co- financed by ERDF  All 28 Member States as.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
SEC 470 OUTLET The learning interface/sec470outletdotcom.
SEC 470 Entire Course (UOP) For more course tutorials visit  SEC 470 Week 1 US Patriot Act Paper  SEC 470 Week 2 Federal Agencies.
Prevent - Stopping People Becoming Terrorists or Supporting Terrorism Detective Chief Superintendent Alan Lyon National Coordinator Prevent
Securing Information Systems
Securing Information Systems
Information Security Program
Evolving the Cyber Security Program
Securing Information Systems
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Csilla Farkas Cybersecurity Csilla Farkas
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
John M. Felker Director, NCCIC.
Securing the Threats of Tomorrow, Today.
ITU-T Workshop on Security, Seoul (Korea), May 2002
Presentation transcript:

CSE CST Anti-Terrorism and Privacy, One Year After Nancy Y. Cheng, FCA Associate Deputy Chief, IT Security Communications Security Establishment November 7, 2002

CSE CST CACR Info Security and Privacy & Security Workshop University of Toronto, November 7, Presentation Outline n 9/11 and CSE n Impact on the Information Technology Security “business” n IT security and privacy, post 9/11

CSE CST CACR Info Security and Privacy & Security Workshop University of Toronto, November 7, /11 and CSE n What’s new since 9/11? n Legislative authorities Bill C-36, Anti-terrorism Act National Defence Act amended to clarify authorities for CSE to combat terrorism n Resources December 2001 budget provided funding for national security CSE received part of that funding

CSE CST CACR Info Security and Privacy & Security Workshop University of Toronto, November 7, Impact on IT Security “Business” n Pre 9/11 Primary focus was to be e-Government enabler Investments in information infrastructures n One year after 9/11 Dual drivers: enabler and protection As enabler, moving beyond infrastructures To protect, positioning to stay ahead of the curve

CSE CST CACR Info Security and Privacy & Security Workshop University of Toronto, November 7, IT Security and Privacy n What IT security is Supports electronic service delivery by helping to ensure privacy rights are properly respected Protects systems and data from cyber threats and malicious attacks by predicting, preventing, detecting and responding to them n What IT security is NOT Does not serve as a means to control all citizenry data

CSE CST CACR Info Security and Privacy & Security Workshop University of Toronto, November 7, IT Security and Privacy… n Checks and balance New authorities relate to “intercepting private communications” Use of these authorities requires ministerial authorization Restricted to “protecting computer systems or networks of the Government of Canada” Subject to review by CSE Commissioner Legislation to be reviewed within 3 years

CSE CST CACR Info Security and Privacy & Security Workshop University of Toronto, November 7, IT Security and Privacy… n Dealing with today’s issues n Examples: Addressing identification and authentication needs Assessing and providing security for wireless and mobile technologies Understanding new threats and mitigate associated risks n Anticipating and preparing for tomorrow’s challenges

CSE CST CACR Info Security and Privacy & Security Workshop University of Toronto, November 7, Phone: (613) FAX: (613)