Download presentation
Presentation is loading. Please wait.
Published byPeter Evans Modified over 9 years ago
2
Session 4.2 Creation of national ICT security infrastructure for developing countries Industry-wide approach: Raising awareness for ICT security infrastructure Miho Naganuma Little eArth Corporation Rapporteur Q3/17 Information Security Operators Group Japan (ISOG-J) 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010
3
Issues in Cybersecurity Together with rapid growth of economies, multi- rateral business relations are expanding and connected. Meanwhile, it also raises issues for the necessity of secure network infrastructures with sophisticated cybersecurity services. 3 Geneva, 6-7 December 2010Addressing security challenges on a global scale We are facing an urgent crisis in a continuing effort to raise awareness of cybersecurity incident response planning against DDoS attacks, targeted attacks including Advanced Persistent Threat (APT) attacks with practice-based information fast development of technologies for countermeasures
4
Issues in Cybersecurity (cont.) Key issue : Information exchange Cybersecurity information exchange and technical collaboration Wide range of collaboration – International, regional, national level and industry level 4 Geneva, 6-7 December 2010Addressing security challenges on a global scale Developing international recommendation/ standards in Cybersecurity and information exchange industry-wide/unique collaboration by Managed Security Service Providers
5
Information Security Operators Group Japan 5 Geneva, 6-7 December 2010Addressing security challenges on a global scale 1. Support for industry a.Providing guideline for service users b.Research for related legal, regulatory requirements 2 . Communications a.Technical exchange and update b.workshop and seminar Building trust in the community and enhance active collaboration http://www.jnsa.org/isog-j/e/
6
Organisation 6 Geneva, 6-7 December 2010Addressing security challenges on a global scale Active involvement of related parties Government support New WG: Security Operation Information sharing and collaboration
7
Members organisations
8
Security Operation information sharing and collaboration WG Seeking “effective” information sharing and collaboration by Providing information and analysis methodologies Review actions with management view Support actions with research view Involving SOC Operators/Analyst, specialist for process management etc. Information transmission enjoying the nature of neutrality Consideration on the requirements for cybersecurity operation collaboration Obstacles toward the collaboration Criteria of collaborating operations / sharing information Actions to conquer the obstacles 8 Geneva, 6-7 December 2010Addressing security challenges on a global scale
9
Obstacles for information sharing Differences between free-of-charge information and charged one Differences between contracted users and non- contracted ones Disadvantageous to offer information first? Difficulties to provide information even if the information is wanted Difficulties to acquire information due to separation of operational unit 9 Geneva, 6-7 December 2010Addressing security challenges on a global scale
10
Case 1 Failed to re-utilise the collected information Failed to find the reason to share the information Lack of sense of purpose to continue the sharing Trap of money as a purpose the information sharing will be terminated when the monetary relationship terminated Failed to invoke any meaningful actions after gaining some information from the logs of the other companies Value of Information possess 10 Geneva, 6-7 December 2010Addressing security challenges on a global scale
11
Case 2 Collaboration based on personal relationship disappears when the person moves to the other place The information sharing is difficult if the boss/supervisor is not supportive to the activities It is difficult to advance the collaboration actively if we cannot get any useful feedback for our customers When the person in charge move to different department, the hand-over procedure is not good enough If sharing information itself becomes the objective, the motivation of the operators at field will drop 11 Geneva, 6-7 December 2010Addressing security challenges on a global scale
12
Other obstacles Different view of Technologies, and operations among organizations best to start from information sharing collaboration will be next step Internal relations vs External relations Reluctant feeling to share information in Security-industry Question what kind of information we want to share Support from management level and department heads. How does the information sharing and collaboration lead to the profit of the company? Merit for each organization need to be considered 12 Geneva, 6-7 December 2010Addressing security challenges on a global scale
13
Advantage of information sharing in ISOG-J Members can issue incident information with the name of ISOG-J use both individual company name and ISOG-J name when disclosing information depending on the situation share the practices of certain incidents among members share some trend information or some notes on that instead of cybersecurity information itself By disclosing information periodically from ISOG-J such information becomes a reference source From the viewpoint of education, it is beneficial to analyze detection information over certain network collaboratively is a good first step 13 Geneva, 6-7 December 2010Addressing security challenges on a global scale
14
Candidate solutions 1.Issuing threat analysis document for management figures Information on what kind of threats against IT system we have, and what kind of business continuity risk they pose 2.Starting with sharing statistical information on logs of IDS/IPS, NW appliances, servers etc. Objective of sharing information and collaboration Policy of the data handling Manipulate the log so that sensitive information can be hidden (such as user name) Log information sharing scheme Standard log format With considering how we can take best advantage of the log data of each company 14 Geneva, 6-7 December 2010Addressing security challenges on a global scale
15
Candidate solutions 3.Quantative information of incidents that are detected Gather incident information collected by SOCs Member organisations get access to the information 4.Sharing Meta information instead of raw data Sensitive information including threads information that is difficult to be disclosed can be shared General information can be shared to customers 15 Geneva, 6-7 December 2010Addressing security challenges on a global scale
16
Highlights for raising awareness Industry–wide approach Involving related parties for ICT infrastructure security (Gov, Gov. agencies, CIRT, ISP, MSSP, Security Vendors etc.) “Neutral” organisation/association Communication in industries Encourage bottom-up approach Analyse obstacles and make feasible scenarios and candidate solutions Communication as education 16 Geneva, 6-7 December 2010Addressing security challenges on a global scale
17
Contact: miho.naganuma@lac.co.jp 17 Addressing security challenges on a global scaleGeneva, 6-7 December 2010 Thank you www.jnsa.org/isog-j/en
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.