Conference Report * National Cyber Security Framework Workshop supported by the NATO Science for Peace and Security Programme
|
|
- Alan French
- 8 years ago
- Views:
Transcription
1 Conference Report * National Cyber Security Framework Workshop supported by the NATO Science for Peace and Security Programme April 2012 Schloss Laudon, Vienna / Austria Philipp Mirtl * This Conference Report was prepared by the Austrian Institute for International Affairs (oiip) and approved by the Cooperative Cyber Defence Centre of Excellence (CCDCOE).
2 1. Agenda Thursday, 12 April :15 Transport leaving Hotel Boltzmann 09:45-10:00 Welcome Coffee & Opening Remarks Dr Helmut Schnitzer Austrian Federal Chancellery Dr Katharina Ziolkowski NATO Cooperative Cyber Defence Centre of Excellence, Legal & Policy Branch, Scientist / Senior Analyst Suleyman Anil NATO Headquarters, Emerging Security Challenges Division, Head, Cyber Defence Section Austrian Institute for International Affairs, Fellow / Senior Adviser 10:00-11:00 Host Introduction: Cyber Security Strategy(ies) in Austria Franz Vock Austrian Federal Chancellery Brigadier Helmut Habermayer Austrian Ministry of Defence and Sport Wolfgang Ebner Austrian Ministry of the Interior 11:00-12:30 Panel I Preliminary Considerations Special Focus: National Security in the Context of Cyber Security Dr Gustav Lindstrom Geneva Centre for Security Policy, Head of the Euro-Atlantic Security Programme Heli Tiirmaa-Klaar European Union, European External Action Service, Cyber Security Policy Advisor Dr Greg Rattray Cyber Conflict Studies Association / Delta Risk LLD, Partner Prof Dr Paul Cornish University of Bath, Department of Politics, Languages & International Studies, Professor of International Security Jason Healey Atlantic Council, Director of the Cyber Statecraft Initiative 2
3 12:30-13:45 Lunch 13:45-15:15 Panel II Operational Structures: What International Good Practices Are There? Special Focus: Organisational and Administrative Measures Yurie Ito JPCERT, Director of Technical Operation Suleyman Anil NATO Headquarters, Emerging Security Challenges Division, Head, Cyber Defence Section Jart Armin HostExploit / Cyber Security Foundation, Director Victoria Ekstedt Swedish Armed Forces, Legal Adviser 15:15-15:45 Break Austrian Institute for International Affairs, Fellow / Senior Adviser 15:45-17:15 Panel III Strategic Goals: Who Needs To Do What? Special Focus: Stakeholders of National Cyber Security Jason Healey Atlantic Council, Director of the Cyber Statecraft Initiative Dave Clemente The Royal Institute of International Affairs (Chatham House), International Security Programme, Research Assistant Eric Luiijf Netherlands Organisation for Applied Scientific Research TNO, Principal Consultant C(I)IP Maeve Dion Stockholm University, Faculty of Law, Lecturer Dr Gustav Lindstrom Geneva Centre for Security Policy, Head of the Euro-Atlantic Security Programme 3
4 Friday, 13 April :30 Transport leaving Hotel Boltzmann 10:00-10:30 Special Comment Jeff Moss ICANN, Chief Security Officer 10:30-12:00 Panel IV Political Aims: What Needs To Be Considered In A Strategy? Special Focus: Cyber Threats; What Composes Cyber Security? Austrian Institute of International Affairs, Fellow / Senior Adviser Melissa Hathaway Harvard University, John F. Kennedy School of Government, Belfer Center for Science and International Affairs, Senior Adviser Jeff Moss ICANN, Chief Security Officer John C. Mallery Massachusetts Institute of Technology, Computer Science & Artificial Intelligence Laboratory and Head of MINERVA Project Dr Katharina Ziolkowski NATO Cooperative Cyber Defence Centre of Excellence, Legal & Policy Branch, Scientist / Senior Analyst 12:00-12:30 Special Comment Melissa Hathaway Harvard University, John F. Kennedy School of Government, Belfer Center for Science and International Affairs, Senior Adviser 12:30 Closing Remarks Afternoon (authors only): National Cyber Security Framework Manual Author s Session (concluding ca. 16:00) Special Thanks To: 4
5 2. Summary The Vienna roundtable on National Cyber Security Frameworks was the first in a series of three workshops supported by the NATO Science for Peace and Security Programme. It will be followed by a second meeting in Stockholm (August 2012) and a final meeting in Geneva (November 2012). All three workshops aim to provide a setting conducive to fostering debate on technical and policy issues among a diverse group of experts ranging from academia, the private sector, military and governments ( geeks and wonks ). The series is considered a vital input to the overall deliverable of a National Cyber Security Framework Manual, which will support both member and non-member states in their approach to cybersecurity. The Vienna Roundtable was hosted in Schloss Laudon (Laudon Palace), the higher academic training institution of the federal Austrian civil service, located on the outskirts of Vienna. The event s venue was facilitated by the Federal Chancellery. Additional support was provided by the Ministry of Defense and Sport (BMLVS) and the Ministry of the Interior (BMI). Finally, the Austrian Institute of Technology (AIT) also provided financial support for the event (incl. for the hosted dinner). All the contributions were greatly appreciated. The host introduction was given by the Austrian Federal Chancellery, the BMLVS and the BMI. The presenters gave an overview of their coordinated strategies for a comprehensive protection of the Austrian cyberspace. The three ministries called particular attention to the ongoing Cyber Security Strategy Process in Austria, of which different mandates were overseen by different ministries: the BMI was emphasising cybercrime, the BMLVS military cyberdefense and crisis management support, and the Federal Chancellery particularly stressed crisis management and critical infrastructure protection (CIP). Each institution emphasized an (increasing) cooperation with one another and highlighted their involvement in national and international fora. Of particular interest to the participants was the existence of a mobilizeable ICT volunteer fire brigade concept. Panel I Following the logic of the roundtable (introduction, tactical, operational, strategic issues) the kick-off panel National Security in the Context of Cyber Security was dedicated to the examination of national cyber security objectively from the unbiased angle of overall national security concerns. The recent initiatives within the EU and the UK were just two examples of how cybersecurity had risen from a position of relative obscurity to newfound prominence within overall national security debates. Despite the increased prominence of cyber within national security the overall agreement was that there was, indeed, no hype if anything, the opposite was true: the top level decision makers still had considerable difficulties grasping the different aspects of national cybersecurity. This was also clearly reflected in the significant understandings of cyber within different European countries the disparity in capabilities (and understandings) is immense. There are additionally varied approaches clearly distinguishable, with some countries going for a (legal) top-down regulatory framework, while other countries are emphasising norms and standard setting as well as voluntary cooperation. There was significant discussion on the different foundation approaches to cybersecurity, including the origins of cyber as a military capability, a prolonged (and often inconclusive) discussion on critical infrastructure protection, a varied understanding of what precisely constituted cybercrime, as well as slowly changing attitude towards product (software) liability and other market instruments influencing national cybersecurity. Two specific trends were, however, dominant: the rising (or increasing awareness) of the importance of non-state actors (both as maintainers of 90% of CI as well as offensive and defensive actors), as well as the militarization (or spookification ) of cyberspace through an increase of intelligence-led activities. Panel II In the panel Operational Structures: What International Good Practices Are There? a key question was posed regarding characteristics of good national cybersecurity. Essentially, all three presenters (Anil Suleyman was taken ill and could not participate) concentrated on communication and information exchange as a key deliverable for all national cybersecurity-relevant efforts. However, the participant s examples suggested speed alone was not the only decisive factor. An international cybercrime gang was, for instance, tackled by an international consortia of experts, and, through facilitators (including Vienna), was able to confront the crisis in short period of time. However, legal concerns on international data 5
6 exchange put a hold on these efforts illustrating that international legal frameworks could prove to be speed bumps even for the informal information exchange often considered to be key. Within a formal information exchange environment, on the other hand, there were questions as to what escalation procedures would be truly helpful in a time of crisis. In essence, the question was posed if a Confidence and Security Building Measure (i.e. a hotline ) could be operated successfully if the escalation processes occurred only within the technical, and not the political, sphere. A specific in-depth examination of one particular data-sharing regime showed it was important to distinctly separate different types of activities and organisations, especially within the intelligence collecting world, in order to strive for international legal conformity (for instance on the issue of human rights). In essence, the particular example showed that a very wide-ranging informational monitoring scheme could only even be considered if the bodies concerned with the relevant tasks were under strictest legal framework i.e. that god was in the details, and even very intrusive surveillance measures could be undertaken if the data protection measures taken were sufficiently stringent. Panel III In the panel Strategic Goals: Who Needs To Do What? special attention was paid to the major players and their respective authorities. Much to the surprise of many technical experts at the operational level it was stressed that, in times of national crisis, the political level can respond very quickly by making relevant policy decisions. However, if there are no well-established channels of communication between the operational and the strategic level, it is not only difficult to communicate upstream, but also unlikely that state representatives will be capable of having reasonable negotiations with their peers abroad. In this context it was mentioned that the creation of such channels of communication usually requires an investment of considerable financial resources. Due to poor measurements for success, however, these resources are only accessible after having spent a lot of time in their justification. In order not to make the public sector fall behind the private one, governments are increasingly cooperating with private entities to ensure nationwide cybersecurity. Most of the relevant ICT actors are concentrated within the private sector. The information exchange between state actors, telecom operators and Internet service providers is most commonly conducted through Public Private Partnerships (PPP) meeting on a regular basis. Despite of their different value systems in terms of freedom of information, the stakeholders involved must trust and respect one another s rights and obligations if they want their collaboration to be successful. The next critical step ahead is the creation of a legal framework with common principles and laws. It must confront questions about how different laws, expectations and stakeholders can be brought together into a general strategy. National cybersecurity strategies should serve as useful guidelines which are focused and clear about interests and directions so policy can be effective. This includes traditional security concerns, everyday crime and education. Concurrently, they should not be overly detailed in terms of concrete instructions. Panel IV The last panel on Political Aims: What Needs To Be Considered In A Strategy? emphasized the tension between national security and economic growth. Both the public and the private sectors are being targeted by the same threats. However, since private companies run most of the networks, these companies must be involved in any national cybersecurity strategy. One way for governments to encourage such involvement is through market incentives (e.g., through tax reduction). In this context, national cybersecurity has been defined as the focused application of specific regulatory frameworks and information assurance principles to public, private and relevant international ICT systems, and their associated content, where these systems directly pertain to national security. National cybersecurity can be approached differently: through cooperation (whole of nation), collaboration (whole of system) or through coordination (whole of government). The national cybersecuirity debate can be divided into five different mandates including cyberdiplomacy, national crisis management, espionage, CIP/IA, and cybercrime(terrorism). One of the most important things to find out in cyberdefence is the attacker. It must be clear who the threat actor is, and what his capabilities and resources are. The vulnerability of computer networks is not a problem until a threat actor exploits it. Thus, the challenge for cyberdefence is to gain mathematical leverage over the attacker. To do that you need a coordinated vision and a clear set of objectives. Therefore, cyber-security systems ultimately need complicated methods because they are complicated and extremely hard to manage (asymmetrical actors approach). 6
7 3. Pictures 7
Toward A Closer Digital Alliance
Toward A Closer Digital Alliance Presented at: GOVCERT.NL Symposium 2010 by: Melissa Hathaway HathawayGlobalStrategies@gmail.com 2020 Visions are Not Aligned NATO 2020: ASSURED SECURITY; DYNAMIC ENGAGEMENT
More informationGovernment Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
More informationSafety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
More informationCYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
More informationOn the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation
More information2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
More informationGermany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
More informationHow To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
More informationCyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
More informationC DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP
C DIG CSCSS / DEFENCE INTELLIGENCE GROUP COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE C DIG CSCSS / DEFENCE INTELLIGENCE GROUP
More informationHow To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
More informationCyber Security Strategy
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
More informationCyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationCyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual
More informationOUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
More informationEU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
More information(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationPublic Private Partnerships and National Input to International Cyber Security
Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationInternational Relations Networking of the Austrian Armed Forces
International Relations Networking of the Austrian Armed Forces Address given by General Roland ERTL Chief of General Staff, Austrian Armed Forces Ladies and Gentlemen, distinguished guests, The Austrian
More informationNational Cyber Security Strategy 2015-2017
National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.
More informationCyberspace Situational Awarness in National Security System
Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl
More informationThe internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
More informationThe European Response to the rising Cyber Threat
SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic
More informationEnhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
More informationCYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015
BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting
More informationNational Cyber Security Strategies
May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is
More informationCENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.
CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE The early 21st century has been defined by the Internet,
More informationGovernment Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
More informationTHE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY
THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY Juan Cayón Peña, PhD. & Luis Armando García Abstract: The implementation, maintenance, and improvement of a national Cyber defense strategy
More informationC ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
More informationReport of a Peer Learning Activity in Limassol, Cyprus 17 21 October 2010. School Leadership for learning
EUROPEAN COMMISSION Directorate-General for Education and Culture Life Long Learning: policy and programmes School Education; Comenius Education and Training 2020 programme Thematic Working Group 'Teacher
More informationCYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects
More informationCybersecurity and the Romanian business environment in the regional and European context
KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory
More informationSession 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: Introduction Political cyber attacks
1 Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: remarks prepared for the CCADD conference in Paris, September 2014 Introduction Cyberspace has become part of
More informationFive Principles for Shaping Cybersecurity Norms
TRANSPARENCY PROPORTIONALITY HARMONIZATION RISK REDUCTION COLLABORATION Five Principles for Shaping Cybersecurity Norms Contents Introduction 3 Cybersecurity Norms 5 The Role of the Public Sector 6 Cybersecurity
More informationPanel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
More informationOpen Source Intelligence Dissemination Conference, Rome, Wednesday 8 th July 2015
Open Source Intelligence Dissemination Conference, Rome, Wednesday 8 th July 2015 A welcome from the Ministry of the Interior - National Fire Corps: We would like to formally welcome you to the Open Source
More informationHelmut Wacket Head of Oversight Division. Cybersecurity: regulatory framework and central bank initiatives in the EU
Helmut Wacket Head of Oversight Division Cybersecurity: regulatory framework and central bank initiatives in the EU Cybersecurity in the EU Securing network and information systems in the EU is essential
More informationToday s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
More informationCYBER SECURITY. Marcin Olender Head of Unit Information Society Department
CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November
More informationHow To Create A National Cyber Security
Stren U Through 28 perconcordiam lessons from the Comprehensive approach for Whole of nation Cybersecurity Alexander Klimburg, Austrian Institute for International Affairs gth nity Boots, Suits, Sandals
More informationJ O I N T D E C L A R A T I O N
REPUBLIC OF BULGARIA MINISTRY OF INTERIOR SALZBURG FORUM MINISTERIAL MEETING 15 17 November 2011 RIU Pravets Resort, Bulgaria J O I N T D E C L A R A T I O N On the occasion of their ministerial meeting
More informationINTERNATIONAL ENGAGEMENT ON CYBER: DEVELOPING INTERNATIONAL NORMS FOR A SAFE, STABLE & PREDICTABLE CYBER ENVIRONMENT
Georgetown University Institute for Law, Science and Global Security INTERNATIONAL ENGAGEMENT ON CYBER: DEVELOPING INTERNATIONAL NORMS FOR A SAFE, STABLE & PREDICTABLE CYBER ENVIRONMENT Tuesday, March
More informationCybersecurity Strategy of the Republic of Cyprus
Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE
More informationGLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT
GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical
More informationEighth International Forum «State, Civil Society and Business Partnership on International Information Security» and
Draft: April, 14 A GENDA Eighth International Forum «State, Civil Society and Business Partnership on International Information Security» and Ninth Scientific Conference of the International Information
More informationCyber Security in the University of Oxford: Collaborating without Conforming?
Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity
More informationWorking Group Meeting of the
Working Group Meeting of the COMMUNITY OF PRACTICE ON HUMAN RESOURCE MANAGEMENT 28-29 May 2015 Zagreb (Croatia) Draft Discussion Paper and Agenda The role of competencies in professionalising civil services
More informationESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
More informationThe EU s approach to Cyber Security and Defence
Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence Woilfgang.Roehrig@eda.europa.eu +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific
More informationPolicy Paper. Women and Peace and Security Agenda Progress and remaining challenges after 20 years of implementation
SYMPOSIUM ENHANCING WOMEN S SHARE IN PEACE AND SECURITY Good practice, gaps and challenges in the implementation of the women, peace and security agenda emerging trends and priorities in 21st century security
More informationSummer School Women Peace and Security
Programme Summer School Women Peace and Security Challenges and Achievements Discover the world at Leiden University 8-19 June 2015 Partners This summer school is organized by the following partners with
More informationSECURING PAYMENTS IN THE CYBER WORLD
The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages
More informationCritical Information Infrastructures Protection approaches in EU
Critical Information Infrastructures Protection approaches in EU Executive Summary An increasing number of countries in the European Union have developed a National Cyber Security Strategy (NCSS) a key
More informationITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
More informationRUSSIA CHINA NEXUS IN CYBER SPACE
RUSSIA CHINA NEXUS IN CYBER SPACE E. Dilipraj Associate Fellow, CAPS On May 08, 2015 Russia and China inked an important agreement in the field of cyber security. This bilateral agreement is the latest
More informationIFE Strategic Plan 2014 2018
IFE Strategic Plan 2014 2018 The Institution of Fire Engineers IFE Strategic Plan 2014 2018 View online at www.ife.org.uk/ife-strategic-plan 1 The Institution of Fire Engineers A charity managed for fire
More informationGeorgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral
More informationEU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
More informationEUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development
Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING
More informationActive Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010
1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue
More informationHow To Help The War On Terror
NATO s Weapons of Mass Destruction Forensics Conference by Arne Thomas WgCdr Jonathan Archer Executive Summary NATO s Comprehensive Strategic Level Policy for Preventing the Proliferation of Weapons of
More informationThe global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
More informationNational Cyber Security Strategies. Practical Guide on Development and Execution
National Cyber Security Strategies December 2012 National Cyber Security Strategies National Cyber Security Strategies I About ENISA The European Network and Information Security Agency (ENISA) is a centre
More informationLegal Issues / Estonia Cyber Incident
Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia
More informationCyber-Intelligence and Cyber-Espionage
London First Cyber-Intelligence and Cyber-Espionage Roundtable 23 October 2013 Sponsored and Hosted by Avanta CONTENTS Executive Summary Introduction Cyber-Warfare: The Emerging Frontier I. CASCADING FAILURE
More informationCybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge
Cybercrime Bedrohung, Intervention, Abwehr BKA-Herbsttagung vom 12. - 13. November 2013 Cybersecurity strategic-political aspects of this global challenge Full version Michael Daniel Special Assistant
More informationJOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
More informationTowards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
More informationThe European Security Strategy Austrian Perspective
Erich Reiter and Johann Frank The European Security Strategy Austrian Perspective The following essay gives the Austrian view on the ESS from a security political perspective and analyses the needs and
More informationSUB Hamburg A/578680. Cyber Conflict. Competing National Perspectives. Edited by Daniel Ventre ) WILEY
SUB Hamburg A/578680 Cyber Conflict Competing National Perspectives Edited by Daniel Ventre ) WILEY Table of Contents Introduction xi Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a
More informationRecent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009
Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Two recent studies National Academies Study: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack
More informationEU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
More informationIntelligence, Statecraft and Multi-dimensional Security in the Caribbean
Module 5 Intelligence, Statecraft and Multi-dimensional Security in the Caribbean September 8 12, 2014 Trinidad & Tobago Website http://sta.uwi.edu/iir/academy.asp Telephone: (868) 662-2002 ext. 83237
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More information3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security
Communications Regulatory Authority of the Republic of Lithuania European Security Round Table Microsoft Venue: 3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Agenda
More informationNetwork security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece
Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU
More informationDeveloping and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
More informationResponsible Negotiation Workshop with Alain Lempereur
Responsible Negotiation Workshop with Alain Lempereur Alain Lempereur (SJD'95) joined the Program on Negotiation (PON) at Harvard Law School in 1993. He is currently a Member of the PON Executive Committee
More informationARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence
ARI ARI 26/2013 (Translated from Spanish) 17 September 2013 Cyber cells: a tool for national cyber security and cyber defence Thiber Theme 1 Cyber cells are effective tools that enable countries to operate,
More informationTrends Concerning Cyberspace
Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming
More informationNaif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research
Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 5-11 5 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa
More informationMichael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
More informationIcelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018
Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Summary in English of the Icelandic National Cyber Security Strategy approved by the Minister of the Interior in April 2015
More information- 'Improving Cyber Security in Europe, the way forward
Report Breakfast Briefing: 'Improving Cyber Security in Europe, the way forward 24 April 2013, European Parliament, Brussels Disclaimer: This report is prepared by the rapporteur, Dr. Alea Fairchild, for
More informationSpecific comments on Communication
Comments on Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions Cybersecurity Strategy of the European Union: An Open,
More information2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS
CYBER SECURITY WITHIN THE GLOBALIZATION PROCESS Milan PODHOREC University of Defence, Faculty of Economics and Management, Brno, Czech Republic The contribution focuses on the issue regarding security
More informationInsurance Distribution in a Changing World
Karel s club EXECUTIVE INSURANCE FORUM Insurance Distribution in a Changing World 22 23 May 2014 Frankfurt Germany prof. karel van hulle About Karel s Club Trilogue between insurance executives, regulators
More informationThe Danish Cyber and Information Security Strategy
February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives
More informationStakeholders meeting. Ethical protocols and standards for research in Social Sciences today
Stakeholders meeting organised by the Scientific Committee for the Social Sciences Ethical protocols and standards for research in Social Sciences today Date: Thursday 11 June 2015, from 10.00 to 17.00
More informationCYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading
CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical
More informationCEN and CENELEC response to the EC Consultation on Standards in the Digital Single Market: setting priorities and ensuring delivery January 2016
CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC response to the EC Consultation on Standards in the Digital
More informationCyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
More informationThe Challenges of Cyber Security a Government s Perspective
Gerhard Jandl The Challenges of Cyber Security a Government s Perspective BMeiA 2012 A Doctrinal Considerations In recent years, many countries and international organizations have updated and revised
More informationThank you for your very kind introduction.
AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.
More informationCybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.
Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information
More informationDay 3-24 April 2013. Day 2-23 April 2013
Day 1-22 April 2013 09.00 Joint International Telecommunications Union (ITU) & Commonwealth Telecommunications Organisation (CTO) project to implement Child Online Protection: Workshop for Cameroon Kim
More information