competences. The ever-changing threat

Size: px
Start display at page:

Download "competences. The ever-changing threat"

Transcription

1 This paper is part of the Transatlantic Policy Briefs series published by the Slovak Atlantic Commission (SAC) and its thinktank, the Central European Policy Institute (CEPI). The briefs bring together experts from Central Europe to propose solutions to the most pressing issues on the transatlantic security agenda. SAC and CEPI are grateful to NATO s Public Diplomacy Division for their financial support. The Central European Policy Institute is a new regional thinktank established in Bratislava in 2012 by the Slovak Atlantic Commission. It links the top research institutions and experts from across Central Europe. CEPI is devoted to improving the quality of the region s contributions to the EU and NATO debates on the main challenges of today. We believe that Central Europe should take on more responsibility in the EU and NATO for issues ranging from the economic crisis to energy and security. The alliance has agreed to strengthen its defences against cyber-attacks. Member-states are centralising control over the security of NATO s internet systems, and creating rapid response teams to help allies in case of future cyber-attacks. The steps have yet to be fully implemented but in theory they make good sense. The rapid response teams in particular could become very important; many of the smaller allies will welcome additional help against cyberthreats. To improve their defences further, NATO countries should agree under what circumstances, if any, they envision threatening or using conventional military force in response to cyber-attacks, and whether such strikes should trigger the alliance s Article V clause, which obligates all allies to respond to an attack on one. NATO had suffered its first publicised cyber-attacks in 1999, when hackers blocked access to the organisation s websites and e- mail servers to protest the air strikes against Serbia. The alliance vowed to be better prepared next time, yet in 2007 it failed to prevent attackers from shutting down virtually all of Estonia s internetbased services for several days. Even though the most powerful military organisation in the world had had eight years to prepare, it could do little to assist its memberstate. Worse, neither its security strategy nor its military doctrine had anticipated such an attack the alliance s very understanding of the gravity of the problem was out of date. In its 2010 Strategic Concept, NATO set out to make things right by expanding its capacity in cyber-security. In the most significant development since, the member-states agreed a revised policy on cyber-defence in July Although it is too early to assess if the policy works (it has not yet been completely implemented), the alliance seems to have at last made cybersecurity one of its core competences. The ever-changing threat An analysis of the effectiveness of NATO s cyber-defences must begin with a definition of the problem. Estonia-type cyberattacks the so-called distributed-denial-of-service attacks (DDoS), which shut down servers by overloading it with

2 requests for a service are actually just one out of many threats, and probably not the most serious one. Their real impact on Estonia was limited to preventing users from remotely accessing some services such as banking. This was unnerving, but the same services remained available locally (by going to bank branches, for example). Even more importantly, no unauthorised leaks of data occurred, no data was destroyed or modified, and no false data was injected into the systems. The attack did not undermine overall trust in the attacked systems banks, the government and other. Cyber-attacks of the future will be far more damaging. They will aim to compromise the data or system itself, and thus undermine the users faith not only in the reliability of internet access but also in the services provided via the internet. This could affect vital services such as banking or tax administration. The exact forms could vary from unauthorised destruction or modification of data and injection of false data to targeted modifications of software used to process and present data. These sorts of attacks, rather than DDoS, are the top cyber-security threat of today. A recent strike at US government and defence contractors provides a warning example. Unable to reach their target directly, the attackers have allegedly used a technique called watering hole : they broke into some legitimate websites, likely to be visited by users from the targeted agencies, and dropped pieces of malware there. If a predefined user, who the malware recognised as an official or contractor, visited the website, his or her machine was infected by yet another programme. This latter malware not only granted the attackers direct access to the users computers, but also compromised their trust in the service from which the infection had originated. Although the web site in question was safe for a number of regular users, it constituted a threat for a specified group of them. i Cyber-attacks aimed at public key infrastructure which creates and manages digital certificates would do yet more damage to public trust. Issued by special authorities, certificates are used to verify authenticity of the communicating partner for example authenticity of a website and thereby establish elementary confidence in the internet. There are hundreds of certificate authorities, trusted by default by web browsers and operating systems around the world. When one of them is successfully attacked, as was the case of the Dutch DigiNotar in July 2011, attackers can obtain hundreds of rogue digital certificates, and use them to impersonate high-profile domains. Since certificates are used worldwide by standardised software (such as internet browsers), the number of affected users could reach into hundreds of millions. A particular way of undermining trust in systems and their operators lies in disseminating sensitive or false information. A good illustration is the December 2011 attack on the servers of Stratfor, a corporate intelligence company. The attackers posted complete credit card records of its subscribers and over 28,000 addresses of its high-profile collaborators, dealing the credibility of the company a serious blow. ii Another form of information-manipulating attack makes use of social networks such as Facebook, LinkedIn or MySpace. In one such recent case, a fictional person, Robin Sage, created on popular portals, won the trust of many in the U.S. military, and various agencies in just a month. She was invited to conferences, asked to review sensitive documents and offered jobs. iii Increasingly, single cyber-attacks are only one element in a bigger plan, aiming for instance to gain access to highly classified data. A recent strike on RSA, a company selling cyber-security hardware to various US agencies, is a good example. Allegedly, the attackers who penetrated its systems were seeking sensitive information on some feature of RSA-made devices, which would have allowed them to gain unauthorised access to other systems protected by this particular hardware. One relatively limited cyber-attack would thus have opened floodgates to a much broader and dangerous one. Perhaps the most damaging form of informationdistorting attack is a potential Wikileaks-like massive release of sensitive data, intentionally mixed with false information. Carefully designed to affect credibility of selected political or military leaders, if could stir popular anger and undermine

3 governments; such false information could be a powerful weapon against both states and individuals. Growing complexity and cost of such attacks suggest that the actors responsible for them are states rather than individuals or groups of criminals. The key indication here is costeffectiveness: complex attacks require not only technical expertise but also money, time and organisational skills. They do not bring quick results, and therefore hold less appeal for individual hackers or criminal groups (who can organise a lucrative online fraud for less money and in less time). However, for states, and particularly for special services, prolonged and complex actions are the usual way of gaining information advantage over their foes. The most visible example of such complicated, costly attack is the infamous Stuxnet worm, which appears to have caused many Iranian centrifuges used to enrich uranium to spin out of control and destroy themselves. Stuxnet was expensive to assemble, required considerable inside information to be deployed successfully, and yielded no monetary benefit, which strongly suggests government involvement (the New Yorker magazine has linked it to US and Israeli intelligence agencies). iv By all appearances, governments are quickly displacing individual hackers and criminal groups as the possessors of the most superior cyber-attacking capability, even if they often act through proxies to avoid identification. Is NATO ready for this new, rough cyberworld? The alliance s new cyber-defence policy envisions a two-pronged approach for NATO: first, to protect its own assets in cyber-space, and second, to assist member-states in responding to cyber-attacks and improving resilience of their national networks, both civilian and military. With regard to the first task, the key element of the updated policy is centralisation. Until recently, responsibility for the protection of NATO s electronic systems was fragmented. No single body oversaw the safety of the various civilian and military systems of the many NATO agencies and its missions abroad. No unified security standard existed, nor the capacity to monitor the standard s observance or to gather data about incidents and specific threats. This is changing with the creation of a single body co-ordinating cyber-defence: NATO Cyber Defence Management Board (CDMB), comprising of those representatives of different NATO structures, who are responsible for cyber security. Further, NATO established a Computer Incident Response Capability (NCIRC) to act as an in-house emergency response team. It has been tasked with evaluating security of NATO s networks and disseminating information on incidents and threats to individual systems administrators. Most importantly, it will provide expertise and technical services in case of attacks against NATO s networks. NCIRC experts are meant to help system administrators to block attacks, limit the damage and repair software errors (so-called vulnerabilities), which make attacks possible. Centralisation of responsibility for protecting NATO s own networks is a step in the right direction. The alternative that each NATO agency, command or division polices its own networks and sets its own standards for safety is far inferior. Overtime, the NCIRC could become the central depository of NATO s knowledge in cyber security. It will be the only body with the overall sense of the level and types of threats to NATO networks. And if it does its job well, it will have acquired technical expertise in cyberdefence and cyber-threats unrivalled within NATO, as well as a network of contacts with the allies Computer Emergency Response Teams (CERTs, which the countries have established to act in cases of attack on national networks). With regard to NATO s second key task assistance to allies the alliance aims to do three things: create and enforce a security standard for those national cyber-systems, which are vital for the effective functioning of the whole alliance; create a mechanism to exchange information about incidents and newly identified threats; and, finally, establish Rapid Reaction Teams (RRTs) to be dispatched to a member-state asking for assistance in case of cyber-attacks. v The RRTs will presumably reinforce national CERTs of the NATO member-states and of other institutions tasked to

4 protect cyber-space, such as police or special services. This approach is in keeping with the alliance s overall defence philosophy: while the member-states are required to operate capabilities sufficient for their strategic needs, the alliance guarantees that their national forces will be reinforced in times of a conflict. NATO does not assume responsibility for protecting national networks, neither civilian nor military (an option suggested by some after Estonia case), but it acts as a provider of expertise and technical assistance. The member-assistance element of the alliance s cyber-defence policy is likely to become the most visible part of its effort in cyber-security. The smaller countries in particular will be keen to make use of it; they tend to have a harder time building national CERTs manned with a sufficient number of highly qualified and skilled professionals (though, as Estonia s case proves, even smaller NATO countries can become a powerhouse in cyber-security, providing they concentrate enough resources on the task). For those countries the alliance s reinforcements may play a crucial role in containing cyber-attacks, particularly a large-scale action against a number of networks. But countries that have large cyber-security programmes are likely to benefit too, because NCIRC could become a source of additional expertise and data to them. Finally, the RRTs will have important symbolic value: their deployment in times of crises will send a signal of allied solidarity with the afflicted state. As such, the RRTs may come to play a role similar to some traditional high-demand military assets such as the Dutch or German Patriot missile defence batteries, which are deployed from time to time to countries that worry about missile threats to their territories. In another sign of how central cyber-defences have become to warfighting, the allies have tasked the North Atlantic Council, NATO s highest decision-making body, with responsibility for overseeing the overall NATO cyber-defense policy. Just as importantly, NATO s defence planners will now include cyber-capabilities in the process of reviewing, planning and developing NATO s overall force structure, along with traditional military assets. This means that allies will be expected to produce a certain minimum level of national cyber-defence capability, with defence planners from NATO headquarters monitoring whether countries are fulfilling their commitments. As their next step, the allies should agree whether and which kinds of cyber-incidents count as Article V events, meaning that they ought to trigger an automatic collective response from NATO. Cyber-attacks have become so sophisticated and potentially devastating that allies now think of them as an existential threat. And if NATO were to limit itself to disseminating information, exchanging best practices, raising threat awareness or creating cyber-security standards, it would fail at its primary mission: to reassure the allies that they will not be abandoned both politically and operationally in case of some of the most dangerous attacks imaginable. Clearly, not every cyber-attack will qualify as Article V. But those that deliberately cause accidents in large industrial facilities (such as nuclear power plants, or chemical factories) or severely damage the country s banking system may need to be given consideration, along with other cyber-threats with comparable impact. Instead of conclusions At least three more cyber-tasks lie ahead of the allies. On the more technical end of the scale, NATO should develop a coherent terminology for defining cyber-concepts. The alliance has no agreed definition of cyber-security, and over the last few years, its documents have used terms such as cyber-security, cyber-terrorism, cyberwarfare, cyber-defence, cyber-crime, cyberattacks, cyber-threats nearly interchangeably. The confusion of terms makes it difficult to build a solid policy against cyber-threats. NATO ought to use its dedicated Co-operative Cyber Defence Centre of Excellence in Tallinn to clarify the terminology, thus making it easier for allies to understand each other and co-operate. The second task is more political. The allies ought to explore whether NATO should resort to traditional diplomacy and military force in response to cyber-attacks. NATO s present strategy is, essentially, deterrence by denial : it assumes that potential attackers will not care to

5 hit NATO, because they know that the alliance will be well defended, and that their actions will have limited effect. While this approach may work against individual hackers or even groups, it is less likely to deter state-sponsored attackers, who tend to be far more technically savvy, and thus readier to overwhelm NATO s cyber-defences. If technicians fail to contain cyber-attacks, it will be a responsibility of politicians or even militaries to make opponents stop. In many cases, NATO will not know who is responsible: on the internet, attackers can obscure their identity far more effectively than in the real world. But if the offending party is proven to be a foreign government, and should military force be the only remaining tool of stopping it, NATO countries should not be improvising; they ought to think through the scenarios and their likely responses before they become a reality. Cyber-defence and cyber-warfare should become part of NATO military doctrine. This, as noted earlier, requires that allies also clarify what kinds of cyber-attacks qualify as Article V incidents. However, NATO s emphasis should be on yet another, third task: making success of its new cyber-policy. The overall approach is sound but it needs to be implemented well, and adapt to changing needs. For example, attacks on mobile devices formerly a minor nuisance are becoming a primary way of stealing sensitive corporate (and governmental) data. NATO needs to produce a set of benchmarks to gauge whether its policy keeps pace with changing threats. The alliance has at last recognised that the attacks on Estonia or the 1999 cyber-strikes on its networks were not isolated incidents but signs of things to come. It now needs to demonstrate that it is not only aware of the gravity of the threat but also ready to defend against it. i For more see Espionage Hackers Target Watering Hole Sites, September 25th 2012, ii R. Stiennon, Fallout from the Christmas Hack of Stratfor, December 28th 2011, iii D. Batty, US security chiefs tricked in social networking experiment, July 24th 2010, guardian.co.uk iv For more see Bruce Schneier, Stuxnet, October 7th 2010, v J. Healey, L. van Bochoven, NATO s Cyber Capabilities: Yesterday, Today, and Tomorrow, Atlantic Council Issue Brief, February 27th Marcin Terlikowski is analyst at the Polish Institute of International Affairs. Jozef Vyskoč is associate fellow at the Central European Policy Institute, information security specialist and auditor of VaF consulting company. Disclaimer: The views and opinions expressed herein are those of the authors and do not necessarily reflect those of their employers or of the publisher. Slovak Atlantic Commission, 2013 This publication has been co-financed by the NATO Public Diplomacy Division.

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

A Cyber Security Integrator s perspective and approach

A Cyber Security Integrator s perspective and approach A Cyber Security Integrator s perspective and approach Presentation to Saudi Arabian Monetary Agency March 2014 What is a Cyber Integrator? Security system requirements - Finance Building a specific response

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

Cyber defence in the EU Preparing for cyber warfare?

Cyber defence in the EU Preparing for cyber warfare? Preparing for cyber warfare? SUMMARY In recent years, cyber attacks on a serious scale have become a matter of concern to states, due to the threat they can pose to national security, but also a potential

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Hybrid Warfare & Cyber Defence

Hybrid Warfare & Cyber Defence Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

NATO & Cyber Conflict: Background & Challenges

NATO & Cyber Conflict: Background & Challenges NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What

More information

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information

More information

TLP WHITE. Denial of service attacks: what you need to know

TLP WHITE. Denial of service attacks: what you need to know Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...

More information

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS CYBER SECURITY WITHIN THE GLOBALIZATION PROCESS Milan PODHOREC University of Defence, Faculty of Economics and Management, Brno, Czech Republic The contribution focuses on the issue regarding security

More information

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP C DIG CSCSS / DEFENCE INTELLIGENCE GROUP COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE C DIG CSCSS / DEFENCE INTELLIGENCE GROUP

More information

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments CSM-ACE 2014 Cyber Threat Intelligence Driven Environments Presented by James Calder Client Services Manager, Singapore 1 CONTENTS Digital criminality Intelligence-led security Shylock case study Making

More information

The EU s approach to Cyber Security and Defence

The EU s approach to Cyber Security and Defence Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence Woilfgang.Roehrig@eda.europa.eu +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific

More information

Active Engagement, Modern Defence

Active Engagement, Modern Defence Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation Adopted by Heads of State and Government in Lisbon Active Engagement, Modern Defence Preface We,

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: Introduction Political cyber attacks

Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: Introduction Political cyber attacks 1 Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: remarks prepared for the CCADD conference in Paris, September 2014 Introduction Cyberspace has become part of

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013 Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,

More information

Cybersecurity. Canisius College

Cybersecurity. Canisius College Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never

More information

The Danish Cyber and Information Security Strategy

The Danish Cyber and Information Security Strategy February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Room for improvement. Building confidence in data security. March 2015

Room for improvement. Building confidence in data security. March 2015 Building confidence in data security March 2015 Businesses have no choice but to engage online with users from external organisations and mobile workers; that is the way the world now operates. Transacting

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

the Council of Councils initiative

the Council of Councils initiative Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security

More information

Cyber Europe 2012. Key Findings and Recommendations

Cyber Europe 2012. Key Findings and Recommendations Cyber Europe 2012 December 2012 On National and International Cyber Exercises S I Acknowledgements ENISA wishes to thank all persons and organisations which have contributed to this exercise. In particular,

More information

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC : INCIDENT RESPONSE THREAT INTELLIGENCE 1 THREAT INTELLIGENCE How it applies to our clients, and discuss some of the key components and benefits of a comprehensive threat intelligence strategy. Threat

More information

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through

More information

How To Protect Your Computer From Attack

How To Protect Your Computer From Attack FREQUENTLY ASKED QUESTIONS on C Y B E R S E C U R I T Y By IEEE USA s Committee on Communications Policy December 2011 This Frequently Asked Questions (FAQs) was prepared by IEEE-USA s Committee on Communications

More information

Estonia 2007 Cyberattakcs

Estonia 2007 Cyberattakcs Estonia 2007 Cyberattakcs 2010 Agenda Background April 2007 What is cyberattack Estonia as an information society Cyberattacks Protection measures used Lessons learned What are we doing - measures Background

More information

Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018

Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Summary in English of the Icelandic National Cyber Security Strategy approved by the Minister of the Interior in April 2015

More information

Secure by design: taking a strategic approach to cybersecurity

Secure by design: taking a strategic approach to cybersecurity Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk

More information

NOTE NATO Missile defence

NOTE NATO Missile defence NOTE NATO Missile defence Missiles pose an increasing threat to Allied populations, territory and deployed forces. Over 30 countries have or are acquiring missiles that could be used to carry not just

More information

Cybersecurity and the Romanian business environment in the regional and European context

Cybersecurity and the Romanian business environment in the regional and European context KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory

More information

Cyber-Intelligence and Cyber-Espionage

Cyber-Intelligence and Cyber-Espionage London First Cyber-Intelligence and Cyber-Espionage Roundtable 23 October 2013 Sponsored and Hosted by Avanta CONTENTS Executive Summary Introduction Cyber-Warfare: The Emerging Frontier I. CASCADING FAILURE

More information

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Cyber-security: legal implications for financial institutions. IAPP Europe Data Protection Intensive 2013

Cyber-security: legal implications for financial institutions. IAPP Europe Data Protection Intensive 2013 Cyber-security: legal implications for financial institutions IAPP Europe Data Protection Intensive 2013 Vivienne Artz Managing Director and General Counsel, Citi Cyber threat landscape Kris McConkey Director,

More information

The main object of my research is :

The main object of my research is : The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is

More information

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010 1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue

More information

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Information Security. CS526 Topic 1

Information Security. CS526 Topic 1 Information Security CS 526 Topic 1 Overview of the Course 1 Today s Security News Today: 220 million records stolen, 16 arrested in massive South Korean data breach A number of online gaming & movie ticket

More information

Contribution to the National Risk Assessment on the topic of Cybersecurity

Contribution to the National Risk Assessment on the topic of Cybersecurity Contribution to the National Risk Assessment on the topic of Cybersecurity 30 June 2014 presented to the Department of the Taoiseach by Contact Jason Ward EMC Director for Ireland, Scotland and UK North

More information

European Commission Per email: CNECT-H4@ec.europa.eu

European Commission Per email: CNECT-H4@ec.europa.eu Post Bits of Freedom Bank 55 47 06 512 M +31(0)646282693 Postbus 10746 KvK 34 12 12 86 E simone.halink@bof.nl 1001 ES Amsterdam W https://www.bof.nl European Commission Per email: CNECT-H4@ec.europa.eu

More information

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting

More information

September 20, 2013 Senior IT Examiner Gene Lilienthal

September 20, 2013 Senior IT Examiner Gene Lilienthal Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

ORGANISING NATIONAL CYBERSECURITY CENTRES

ORGANISING NATIONAL CYBERSECURITY CENTRES Information & Security: An International Journal Sarah Backman, vol.32, 2015 http://dx.doi.org/10.11610/isij.3206 ORGANISING NATIONAL CYBERSECURITY CENTRES Sarah BACKMAN Abstract: The emerging trend in

More information

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one

More information

I N T E L L I G E N C E A S S E S S M E N T

I N T E L L I G E N C E A S S E S S M E N T I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document

More information

Business Continuity for Cyber Threat

Business Continuity for Cyber Threat Business Continuity for Cyber Threat April 1, 2014 Workshop Session #3 3:00 5:30 PM Susan Rogers, MBCP, MBCI Cyberwise CP S2 What happens when a computer program can activate physical machinery? Between

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

Harmful Interference into Satellite Telecommunications by Cyber Attack

Harmful Interference into Satellite Telecommunications by Cyber Attack Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

Offensive capabilities

Offensive capabilities Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and

More information

Cyber Security Risk Management

Cyber Security Risk Management Our Ref.: B1/15C B9/29C 15 September 2015 The Chief Executive All Authorized Institutions Dear Sir/Madam, Cyber Security Risk Management I am writing to draw your attention to the growing importance of

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER

GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER Molex Premise Networks EXECUTIVE SUMMARY This article discusses IT security, which is a well documented and widely discussed issue. However, despite the

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows 24 February 2015 Callum Sinclair Faith Jayne Agenda Top 10 legal need-to-knows, including: What is cyber

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS)

Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS) Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS) PSCR Public Safety Broadband Stakeholder Conference June 4 th, 2014 Alex Kreilein Technology Policy Strategist Office

More information

UN Emergency Summit on Cyber Security Topic Abstract

UN Emergency Summit on Cyber Security Topic Abstract UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international

More information

Trends Concerning Cyberspace

Trends Concerning Cyberspace Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming

More information

How To Cover A Data Breach In The European Market

How To Cover A Data Breach In The European Market SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to

More information

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a

More information

Andrzej Kozłowski Research Fellow Casimir pulaski Foundation. The cyber strikes back the retaliation against the cyberattack

Andrzej Kozłowski Research Fellow Casimir pulaski Foundation. The cyber strikes back the retaliation against the cyberattack Andrzej Kozłowski Research Fellow Casimir pulaski Foundation The cyber strikes back the retaliation against the cyberattack Road to WARSAW SECURITY FORUM 2015 The growing threat The constant grow of threats

More information

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa SECURING THE DIGITAL DIVIDE: COMBATING CYBERCRIME Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa INTRODUCTION q Given modern

More information

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005 AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT

More information

National Cyber Security Strategies

National Cyber Security Strategies May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is

More information

Does NATO s Article V Genuinely Protect Its Members?

Does NATO s Article V Genuinely Protect Its Members? Does NATO s Article V Genuinely Protect Its Members? NATO has been the most successful alliance of history. We repeat this truth quite frequently, especially now that we celebrate 60 years of its successful

More information

Appendix 2 Deterrence as a security concept against cyber threats

Appendix 2 Deterrence as a security concept against cyber threats Appendix 2 Deterrence as a security concept against cyber threats Sico van der Meer Current situation Cyber threats, also referred to as digital threats, are among the greatest threats currently facing

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise

Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise White Paper Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical

More information