SPEECH. Visit for more news and information about MINDEF and the SAF

Size: px
Start display at page:

Download "SPEECH. Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF"

Transcription

1 SPEECH Visit for more news and information about MINDEF and the SAF SPEECH BY PERMANENT SECRETARY (DEFENCE) MR CHAN YENG KIT, AT THE CYBER DEFENDERS DISCOVERY CAMP AWARDS CEREMONY 2016, 6 JUN 2016, AT THE SINGAPORE UNIVERSITY OF TECHNOLOGY AND DESIGN Distinguished guests, School Representatives, Participants of the Cyber Defenders Discovery Camp 2016, Ladies and gentlemen, A very good afternoon to all of you. 1. I am delighted to be here. Looks like you had fun at the camp; I wish I was down there as well. I hope you had fun. This is the fourth edition of the camp and I am pleased to learn that it has attracted a record number of participants. 400 students from 25 schools, an increase of 20% from last year and a four-fold increase from the first camp we had four years ago. It reflects a growing interest in cyber defence, which has become an increasingly important pillar of Singapore s overall security. MINDEF Communications Organisation Public Communications Directorate MINDEF Building, 303 Gombak Drive, #01-26 Singapore Tel: Fax: MINDEF Website: MINDEF eservices Centre MINDEF Portal: Tel: 1800-eNSNSNS ( ) SMS: ensns (36767)

2 Cyberspace and cybersecurity will be integral to our lives 2. In this age of connectivity and rapidly expanding cyberspace, I think all of us recognise that there is no clear delineation between our lives in the virtual and the real world. The Internet is a place that we go to read, watch videos, play games, shop and, of course, connect through social platforms like Facebook, Instagram and Snapchat. Cyberspace for many of you has become an integral part of your lives. 3. The Internet has also evolved. It now has the ability to link data from our mobile phones, from televisions and homes, in a phenomenon known as the Internet of Things or IOT for short. IOT allows us to tap on intelligent and connected devices to enhance the quality of our lives and introduce smarter products and services. 4. In fact, IOT will be a key enabler of Singapore s Smart Nation vision and we will see the transformation of Singapore into a smart city. We want to use networks of sensors; we want to use smart devices and technologies, to help make our daily lives more convenient, more sustainable. The harnessing of technology and data is meant to improve and will improve services, create business opportunities and enrich the way we live, at work and play. But this increased connectivity will also come with new challenges, as we need to secure our networks and information from fast-growing cyber threats. 5. I am glad to learn that a new module on the compromise of IOT devices has been introduced to the camp this year and I think it is a reflection of the efforts to ensure that participants learn and take away the latest developments and techniques in the field of cybersecurity.

3 Cybersecurity in defence 6. I think many of the guys down here, in a couple of years time, you will be enlisted and you will join the SAF. Just as in the civilian world, modern militaries depend on advanced technology, the SAF is no exception. In fact we rely a lot on modern technology and securing the military cyberspace is critical. Some years ago, some of you may have read about this in the news; an unencrypted video broadcast of the US Predator drone was intercepted by insurgents in Iraq. It was reported that the insurgents used off-the-shelf software that cost just $30 to intercept the live video feeds from the drones. They accessed information and managed to disrupt, in fact I think in that case, brought down the American military drone that cost hundreds of millions of dollars. This demonstrates that cyber criminals can find simple ways to counteract sophisticated technology and that is why we must always come up with new measures and innovative cyber defence technologies to harden our systems. 7. Increasingly, we also see cyberattacks becoming a key feature in what we call hybrid warfare. The aggressor can launch an orchestrated campaign to weaken and fracture the solidarity of a target nation. With increased network connectivity, cyberspace gives an adversary the opportunity to use cyber as an additional, what we call non-kinetic, that means non-fiscal, means in hybrid war. Just last April, again some of you would have read in the news; unidentified hackers attacked France s TV5Monde television channel, they shut down transmissions and they placed jihadist propaganda messages on the station s website and on the Facebook and Twitter accounts of the station. You can imagine the kind of chaos and the kind of confusion it would cause, if our

4 critical infrastructure and systems were to fall into the wrong hands, and spoof messages, spoof transmissions were sent out. 8. The SAF recognises the threat of cyberattacks to its networks and systems and this was one of the key reasons why we established the Cyber Defence Operations Hub in 2013 to step up our cyber defence capabilities. In the recent budget debates, Defence Minister Dr Ng Eng Hen also announced that in enhancing cyber defence, the SAF will employ more artificial intelligence and big data analytics to detect and respond to cyber threats. We will also build greater security into software design and network infrastructure to make them more resilient and resistant to cyberattacks. 9. At DSTA and DSO, we have cyber engineers and we have researchers working on advanced cyber defence solutions for the Ministry of Defence and the SAF. They work hard to secure our networks, to respond to cyberattacks and to safeguard our classified information and systems. They also leverage on artificial intelligence and big data to detect cyber threats, design security in our software and shore up defences. I hope the camp has allowed you to gain some insights into the interesting work of cyber security. Cultivating Singapore s cybersecurity workforce 10. The demand for cybersecurity expertise will continue to increase. Programmes and initiatives are set up to attract more talents for the cybersecurity workforce. NUS and SIT are starting undergraduate degree programmes in Information Security. There are cyber specialisation courses and modules in NTU and SMU. SUTD, where we are now, has plans for a Masters

5 degree in cybersecurity in future. It is encouraging to see many opportunities available to students who wish to pursue their interest in cybersecurity. 11. This camp, the Cyber Defenders Discovery Camp inaugurated in 2012, has the aim to reach out to young talents and enthusiasts in this field. Hopefully, the camp has provided first-hand insights into what cybersecurity entails and given you the unique opportunity to have intensive hands-on lab work right from the first day, followed by a competition, where participants pit their skills against each other. I hope all of you have learned some new skills and knowledge, and had fun in the process. 12. I would like to conclude my talk by congratulating all participants who have completed the Cyber Defenders Discovery Camp and the winning teams. It is a job well done! I hope that the camp has sparked your interest in cybersecurity and I hope it has fuelled your passion for this rising field. I hope that the experience you have gained has helped to debunk the misconceptions that engineering work, IT and cyber, are mundane. I look forward to seeing some of you as Singapore s cyber engineers and cyber warriors in the near future. Thank you. ###

How To Make A Speech At The Cyber Defenders Discovery Camp

How To Make A Speech At The Cyber Defenders Discovery Camp SPEECH Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF SPEECH BY MINISTER OF STATE FOR DEFENCE DR MOHAMAD MALIKI BIN OSMAN, AT THE CYBER DEFENDERS DISCOVERY CAMP AWARDS

More information

IHLs-Industry partnerships play important role in training cyber security professionals and supporting growing cyber security industry

IHLs-Industry partnerships play important role in training cyber security professionals and supporting growing cyber security industry OPENING REMARKS BY DR YAACOB IBRAHIM, MINISTER FOR COMMUNICATIONS AND INFORMATION AND MINISTER IN CHARGE OF CYBER SECURITY AT THE OPENING CEREMONY OF TEMASEK POLYTECHNIC S IT SECURITY AND FORENSICS HUB,

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call

NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call PRESS RELEASE NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call Singapore, 15 October 2014 (Wednesday) The National Research Foundation (NRF), Prime Minister s Office,

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

It is my pleasure to join you here today at the Youth. Infocomm Day. I am heartened to see such enthusiasm and

It is my pleasure to join you here today at the Youth. Infocomm Day. I am heartened to see such enthusiasm and SPEECH BY MS SIM ANN, SENIOR PARLIAMENTARY SECRETARY FOR COMMUNICATIONS AND INFORMATION & EDUCATION AT THE YOUTH INFOCOMM DAY ON WEDNESDAY, 7 NOVEMBER 2012, 12.30 PM, AT F1 PIT BUILDING Parents, Teachers

More information

Careers@Singapore: Cyber Security & Data Analytics October - November 2015

Careers@Singapore: Cyber Security & Data Analytics October - November 2015 Careers@Singapore: Cyber Security & Data Analytics October - November 2015 HOT JOBS Scroll down to see the highlights of all the Career Opportunities. Or visit our job portal at contactsingapore.sg/jobs

More information

GfK 2016 Tech Trends 2016

GfK 2016 Tech Trends 2016 1 Contents 1 2 3 Evolving behavior today s connected consumers Driving you forward 10 tech trends for 2016 Growth from knowledge turning research into smart business decisions 2 Evolving behavior today

More information

DELIVERING COMPETITIVE ADVANTAGE

DELIVERING COMPETITIVE ADVANTAGE DELIVERING COMPETITIVE ADVANTAGE Talent and the Networked Economy This booklet outlines ManpowerGroup s #RelationshipsMatter programme. Collaboratively delivered through social, mobile and digital, #RelationshipsMatter

More information

Research Note Engaging in Cyber Warfare

Research Note Engaging in Cyber Warfare Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines

More information

Cybersecurity Delivering Confidence in the Cyber Domain

Cybersecurity Delivering Confidence in the Cyber Domain Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY Juan Cayón Peña, PhD. & Luis Armando García Abstract: The implementation, maintenance, and improvement of a national Cyber defense strategy

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Infocomm Security Masterplan 2

Infocomm Security Masterplan 2 INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm

More information

THE CYBER SECURITY CHALLENGE Identifying, inspiring and enabling new cyber security talent

THE CYBER SECURITY CHALLENGE Identifying, inspiring and enabling new cyber security talent THE CYBER SECURITY CHALLENGE Identifying, inspiring and enabling new cyber security talent Dr Robert L Nowill The Cyber Security Challenge UK ( https://cybersecuritychallenge.org.uk/ ) runs a series of

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education

American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education Dr. Clay Wilson, CISSP Program Director, Cybersecurity Studies American Public University System Overview About

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Cybersecurity on a Global Scale

Cybersecurity on a Global Scale Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared

More information

Industrial Internet of Things - Transformation of Products to Services and new Business Models. Frank Schinzel Managing Director Accenture Digital

Industrial Internet of Things - Transformation of Products to Services and new Business Models. Frank Schinzel Managing Director Accenture Digital Industrial Internet of Things - Transformation of Products to Services and new Business Models Frank Schinzel Managing Director Accenture Digital Everyday physical objects are becoming uniquely identifiable

More information

Social Media Strategy:

Social Media Strategy: Social Media Strategy: The Beginners Guide to Strategy Success in 7 Steps A Simple Guide In association with: Chapter Title Contents Page Page 2 What is Social Media...3 What is a Social Media Strategy

More information

REPORT. Next steps in cyber security

REPORT. Next steps in cyber security REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

SECRETÁRIA DE ESTADO ADJUNTA E DA DEFESA NACIONAL

SECRETÁRIA DE ESTADO ADJUNTA E DA DEFESA NACIONAL INTERVENÇÃO DA SECRETÁRIA DE ESTADO ADJUNTA E DA DEFESA NACIONAL BERTA DE MELO CABRAL Cerimónia de Encerramento do Strategic Decision Making Course and Exercise on Cyber Crisis Management Lisboa, Instituto

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

WEBSENSE TRITON SOLUTIONS

WEBSENSE TRITON SOLUTIONS WEBSENSE TRITON SOLUTIONS INNOVATIVE SECURITY FOR WEB, EMAIL, DATA AND MOBILE TRITON STOPS MORE THREATS. WE CAN PROVE IT. PROTECTION AS ADVANCED AND DYNAMIC AS THE THREATS THEMSELVES The security threats

More information

------------------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------------------ WRITTEN MINISTERIAL STATEMENT CABINET OFFICE 3 RD DECEMBER 2012 Minister for the Cabinet Office and Paymaster General: Progress on the UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Kingdom Big Data & Analytics Summit 28 FEB 1 March 2016 Agenda MASTERCLASS A 28 Feb 2016

Kingdom Big Data & Analytics Summit 28 FEB 1 March 2016 Agenda MASTERCLASS A 28 Feb 2016 Kingdom Big Data & Analytics Summit 28 FEB 1 March 2016 Agenda MASTERCLASS A 28 Feb 2016 9.00am To 12.00pm Big Data Technology and Analytics Workshop MASTERCLASS LEADERS Venkata P. Alla A highly respected

More information

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION S e c u r i t y & D e f e n c e Bringing The Digital Edge To Your Operations ITY & CYBERSPACE SITUATIONAL AWARENESS CRITICAL COM S CRITICAL COMMUNICATIONS TECHNOLOGY IN POLICING SE ITUATIONAL AWARENESS

More information

Digital Impact Awards Africa Nominations

Digital Impact Awards Africa Nominations Press Release Nominees for Digital Impact Awards Africa Maximising the Digital Dividend Kamplala, July 7, 2014: Digital Impact Awards Africa, #DIAA, has today announced the nominations for its inaugural

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

Working With government Agencies calls for Well-DevelopeD it

Working With government Agencies calls for Well-DevelopeD it Working With government Agencies calls for Well-DevelopeD it In government, as in any industry of such scale, there is constantly new work to be done. Projects must be initiated, developed and maintained,

More information

Secure by design: taking a strategic approach to cybersecurity

Secure by design: taking a strategic approach to cybersecurity Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Cyber Learning Solutions

Cyber Learning Solutions Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Introduction to Cybersecurity Overview. October 2014

Introduction to Cybersecurity Overview. October 2014 Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,

More information

OVERVIEW OPTUS CONTACT CENTRE AS A SERVICE (CCaaS) CUSTOMER SERVICE, DELIVERED. With Optus Contact Centre As a Service (CCaaS)

OVERVIEW OPTUS CONTACT CENTRE AS A SERVICE (CCaaS) CUSTOMER SERVICE, DELIVERED. With Optus Contact Centre As a Service (CCaaS) OVERVIEW OPTUS CONTACT CENTRE AS A SERVICE (CCaaS) CUSTOMER SERVICE, DELIVERED With Optus Contact Centre As a Service (CCaaS) CONTENTS ARE YOU READY FOR YOUR CUSTOMERS? 02 THERE S A BETTER WAY 02 HOW CCaaS

More information

NTU and AIA establish EDGE LAB to develop innovative healthcare and insurance solutions

NTU and AIA establish EDGE LAB to develop innovative healthcare and insurance solutions JOINT NEWS RELEASE 12 NOVEMBER 2015 NTU and AIA establish EDGE LAB to develop innovative healthcare and insurance solutions EDGE LAB brings together start-ups, Government agencies, university experts and

More information

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th Cybersecurity: Thailand s and ASEAN s priorities Soranun Jiwasurat www.etda.or.th Cyber Threat Landscape Overview 2 Cyber threat a hostile act using computers, electronic information and/or digital networks

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For

More information

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar April 25, 2013 Welcome to the NICCS Webinar! Thank you for joining us today. During this presentation, you will: Learn about the

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Remarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014

Remarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before a Meeting of CES Government Washington, DC April 16, 2014 Good afternoon. It s a pleasure to finally be here with you. I had very much hoped

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure

More information

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information www.wipro.com RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information Saritha Auti Practice Head - Enterprise Security Solutions, Wipro Table of Contents 03... Abstract 03... Why

More information

S I N G A P O R E C U S T O M S

S I N G A P O R E C U S T O M S EMBARGOED UNTIL DELIVERY PLEASE CHECK AGAINST DELIVERY S I N G A P O R E C U S T O M S SPEECH BY MRS LIM HWEE HUA, MINISTER OF STATE FOR FINANCE AND TRANSPORT, AT THE LAUNCH OF SECURE TRADE PARTNERSHIP

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

sd street toolz digital centre

sd street toolz digital centre Professional Diploma in Digital Marketing sd street toolz digital centre Contents Professional Diploma Courses in Digital Marketing Short Courses 1. Welcome 2. Course overview 3. Course content 4. How

More information

FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks

FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks F-43 FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks Possible Ouestion Why has the Government not confronted China about cyber attacks including on DFAT, such as those aired

More information

Critical Infrastructure in a CyberPhysicalHuman World

Critical Infrastructure in a CyberPhysicalHuman World Critical Infrastructure in a CyberPhysicalHuman World December 2015 Approved for Public Release; Distribution Unlimited. 15-3575 2015 The MITRE Corporation. All rights reserved. Chris Folk, MBA, Director,

More information

Government + Enterprise + Innovation + Strategy

Government + Enterprise + Innovation + Strategy Government + Enterprise + Innovation + Strategy Australia as Lead Regional Player in Cyber War Greg Rudd CEO Crest Australia Digital Disruption What does this mean for cyber security? Digital Changes Everything

More information

Peace and Justice in Cyberspace

Peace and Justice in Cyberspace Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime

More information

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity

More information

ISO27032 Guidelines for Cyber Security

ISO27032 Guidelines for Cyber Security ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance

More information

Executive Vice President Business Support and Human Resources Organisation

Executive Vice President Business Support and Human Resources Organisation EFQM Good Practice Competition 2014 Creative Customer Solutions Registration form Contact person Dr. Yousef Ibrahim Al Akraf Job Title Executive Vice President Business Support and Human Resources Organisation

More information

World-class Remote Services

World-class Remote Services World-class Remote Services Manging Remote Services in the IoT A Service Innovation Project 3 November 5 December, 2014 Düsseldorf, Germany Manufacturing companies are missing major opportunities in remote

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

idata Improving Defences Against Targeted Attack

idata Improving Defences Against Targeted Attack idata Improving Defences Against Targeted Attack Summary JULY 2014 Disclaimer: Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does

More information

CyberSkills Management Support Initiative

CyberSkills Management Support Initiative CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced

More information

The Path Ahead for Security Leaders

The Path Ahead for Security Leaders The Path Ahead for Security Leaders Executive Summary What You Will Learn If you asked security leaders five years ago what their primary focus was, you would likely get a resounding: securing our operations.

More information

立 法 會 Legislative Council

立 法 會 Legislative Council 立 法 會 Legislative Council LC Paper No. CB(4)1212/14-15(04) Ref. : CB4/PL/ITB Panel on Information Technology and Broadcasting Meeting on 17 July 2015 Updated background brief on information security Purpose

More information

Crystal Maleski ClearPathSocial.com. #2015BizConnect @BGLCC1 @ClearPathSocial

Crystal Maleski ClearPathSocial.com. #2015BizConnect @BGLCC1 @ClearPathSocial Crystal Maleski ClearPathSocial.com #2015BizConnect @BGLCC1 @ClearPathSocial Social Media Is A Lot More Than A One Way Conversation @2015BizConnect 2 Keep Informed of Industry News Research Product Development

More information

The Autonomous Customer 2015: On-hold for Intelligent Customer Service - Global

The Autonomous Customer 2015: On-hold for Intelligent Customer Service - Global The Autonomous Customer 2015: On-hold for Intelligent Customer Service - Global 1 Contents Autonomous Customer 2015 Global - Introducing the Autonomous Customer & Methodology 3 - Summary Global and Country

More information

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,

More information

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term

More information

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP C DIG CSCSS / DEFENCE INTELLIGENCE GROUP COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE C DIG CSCSS / DEFENCE INTELLIGENCE GROUP

More information

A Detailed Strategy for Managing Corporation Cyber War Security

A Detailed Strategy for Managing Corporation Cyber War Security A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait alahmed.w@gust.edu.kw ABSTRACT Modern corporations

More information

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity. Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

ISACA S CYBERSECURITY NEXUS (CSX) October 2015 ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration

More information

A Modern Framework for Network Security in the Federal Government

A Modern Framework for Network Security in the Federal Government A Modern Framework for Network Security in the Federal Government 1 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Trends in Federal Requirements for Network Security In recent years,

More information

Thank you for your very kind introduction.

Thank you for your very kind introduction. AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.

More information

SPEECH BY YB. DATUK HAJI FADILLAH BIN HAJI YUSOF MINISTER OF WORKS. In Conjunction of

SPEECH BY YB. DATUK HAJI FADILLAH BIN HAJI YUSOF MINISTER OF WORKS. In Conjunction of SPEECH BY YB. DATUK HAJI FADILLAH BIN HAJI YUSOF MINISTER OF WORKS In Conjunction of THE LAUNCHING OF E-TRAINING AND KNOWLEDGE SOLUTION TOWARDS COMPETENCY CERTIFICATION A Collaboration Between CIDB MALAYSIA

More information

DoD Strategy for Defending Networks, Systems, and Data

DoD Strategy for Defending Networks, Systems, and Data DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July

More information

Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)

Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) Final Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) Opening Speech to the Second International Forum Partnership Among State, Business

More information

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015 UTCS CyberSecurity Educating Cyber Professionals Dr. Bill Young Department of Computer Sciences University of Texas at Austin Spring Semester, 2015 Slideset 1: 1 From the Headlines U.S. Not Ready for Cyberwar

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

How To Prepare A Cyber Security Workshop In Asean

How To Prepare A Cyber Security Workshop In Asean CHAIRMAN S REPORT OF THE TRACK II NETWORK OF ASEAN DEFENCE AND SECURITY INSTITUTIONS (NADI) WORKSHOP ON CYBER SECURITY: EMERGING CHALLENGES AND RESPONSES 20-22 NOVEMBER 2013 TRADERS HOTEL, SINGAPORE 1.

More information

DAY 1 MONDAY, SEPT 28 2015

DAY 1 MONDAY, SEPT 28 2015 MaRS Discovery District TORONTO, ON Sep 28 29, 2015 8:45 AM 9:15 AM 9:15 AM 10:00 AM 10:00 AM 11:00 AM DAY 1 MONDAY, SEPT 28 2015 OPENING KEYNOTE SPEAKER A Connected World with Intelligence 1-YEAR-LATER

More information

Professional Diploma. in Digital Marketing. www.ucenfotec.ac.cr. www.digitalmarketinginstitute.com

Professional Diploma. in Digital Marketing. www.ucenfotec.ac.cr. www.digitalmarketinginstitute.com 2014 Professional Diploma in Digital Marketing www.ucenfotec.ac.cr www.digitalmarketinginstitute.com Contents 2014 Professional Diploma in Digital Marketing 1. Welcome 2. Overview 3. Course Format 4. Course

More information

IE Singapore initiates training programme with WDA to reskill mid-career professionals for the international trading sector

IE Singapore initiates training programme with WDA to reskill mid-career professionals for the international trading sector J OINT MEDIA R E L E A S E IE Singapore initiates training programme with WDA to reskill mid-career professionals for the international trading sector 15,000 projected new jobs in this sector till 2020,

More information

Careers in Cyber Operations. Defence Signals Directorate

Careers in Cyber Operations. Defence Signals Directorate Careers in Cyber Operations Defence Signals Directorate 1 In a game where our adversaries operate with no rules and unknown boundary lines, you will be exploring the possibilities and inventing the seemingly

More information

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private

More information