Towards closer EU-ASEAN collaboration in cybersecurity

Size: px
Start display at page:

Download "Towards closer EU-ASEAN collaboration in cybersecurity"

Transcription

1 Supporting European Union and Southeast Asia ICT strategic partnership and policy dialogue: Connecting ICT EU-SEA Research, Development and Innovation Knowledge Networks Towards closer EU-ASEAN collaboration in cybersecurity STI DAYS May 11th, 2016, Hanoi, Vietnam Aiviet Nguyen (ITI-VNU) and Sotiris Ionannidis (FORTH) This project has received funding from the European Union s Seventh Framework Programme for research, technological development and demonstration under grant agreement No

2 CONTENT 1. CYBER SECURITY 2. CYBER SECURITY IN ASEAN 3. CYBER SECURITY IN EU 4. IDENTIFY THE COOPERATION TOPIC 5. R&D AND POLICY DASHBOARDS 6. RECOMMENDATIONS 7. CONNECT2SEA S REPORT 11/05/2016 Hanoi, Vietnam

3 11/05/2016 Hanoi, Vietnam

4 CYBER SECURITY: A GLOBAL ISSUE CYBER WAR CYBER CRIME

5 OECD PRIORITIES IN THE ACTION PLANS FOR CYBER SECURITY Government security Awareness capacity, government network infrastructures and audits Protection of critical information infrastructures Fight against cyber-crime Awareness raising Measures Law enforcement capacity, legal framework improvement and international co-operation. Focus on children, SMEs and decision makers Education Stronger cyber-security workforce and skills Response Cyber-security Incident Response Teams (CSIRTs) R&D Better organisation in partnership with the private sector..

6 CYBER SECURITY AS A FOCUSED TARGET FOCUS POINT OF POLICY AND R&D ISSUES A REQUIREMENT FOR MOST R&D AND IMPLEMENTATION AREAS ATTENTION OF GOVERNMENTS, MEDIA AND SOCIETY CYBER SECURITY COOPERATION IS CRITICAL

7

8 STRENGTH AND WEAKNESS STRENGTH WEAKNESS An IT hub in central cooperative position with the US, EU, China, Japan Potentials for growth Networking activities Regional cohesiveness Experts and innovators Standardization and mutual approach Culture and language diversity and economic disparity

9 OPPORTUNITY AND CHALLENGE OPPORTUNITY CHALLENGE New interest of ASEAN (ICT Master Plan) ICT becomes a strong sector to promote connectivity Commitments of governments Digital divide Global cyber security challenges

10 ASEAN PRIORITIES IN ICT MASTER PLAN TO 2020 Cybersecurity Emergency Readiness: Cybersecurity Protection: Critical Infrastructure Protection Public Security and Safety 12/05/2016 Hanoi, Vietnam

11 ASEAN s Policy Measures toward Cyber-security Promote strategies to address threats, which are consistent with international law and its basic principles Promote dialogue on risk reduction measures, including exchange of views on the potential use of ICTs in conflict Encourage and enhance cooperation in bringing about culture of cyber-security Develop a work plan on security in the use of ICTs, focused on practical cooperation Review a possibility to elaborate common terms and definitions relevant to the sphere of the use of ICTs (code of conduct)

12

13 EU STRATEGY AND POLICY R&D Priorities in the Cyber-security Strategy o Identifying the NIS (Network and Information Security) vulnerabilities: o Promoting a single market for cyber-security products o Fostering R&D investments and innovation o Supporting the development of cryptography: o Provision of advanced solutions for end-to-end secure ICT systems: International Cooperation in the Cyber-security Strategy o Promote the international cooperation, develop industrial and technological resources to produce the ICT products: o Establish a coherent international cyberspace policy for the European Union and promote EU core values: o Promote cooperation on standardization in cyber-security, expanding usages of EU laws, norms and core values: o Mainstreaming cyberspace issues into EU external relations and Common Foreign and Security Policy:

14 ORGANIZATION OF TECHNOLOGY PLATFORMS AGAINST CYBER SECURITY ARTEMIS Industry Association ENIAC Joint Undertaking EPoSS: ETP on Smart Systems Integration ETP4HPC: ETP for High Performance Computing EU Robotics AISBL NEM: New European Media NESSI: The Networked European Software and Services Initiative Networld2020 ETP

15 HORIZONT2020 PRIORITIES R&D PRIORITIES TOWARD CYBER SECURITY: Secure societies (DSR), Digital Security (DS), Digital Security Policy NEW AREAS WHICH REQUIRE R&D IN CYBER SECURITY NEW AREAS WHICH PROVIDE NEW ENABLING TECHNOLOGIES FOR CYBER SECURITY

16

17 METHODOLOGY THE DIFFICULTY IN MATCHING ASEAN AND EU OBJECTIVES: DIFFERENT STAGE OF DEVELOPMENT. IMPLEMENTATION FOCUS VS R&D AND QUALITY FOCUS IMPLEMENTATION ACTIONS APPLICATIONS ENABLING TECHNOLOGY R&D IDENTIFY A LIST OF 144 R&D OBJECTIVES IN HORIZONT 2020, WHICH MAY HAVE RELATIONSHIP TO CYBER SECURITY USE MATRIX TO MAP THESE OBJECTIVES INTO ENABLING TECHNOLOGIES FOR THE APPLICATIONS, WHICH ARE RELEVANT IN ASEAN S PRIOTIZED ACTIONS GET THE CONSORTIUM MEMBERS, POLICY MAKERS FROM SCMIT, TELSOM, EXPERTS TO HAVE FEEDBACKS CHOOSE 28 TOP COOPERATION PRIORITIES

18 TOP 7 PRIORITIES: HORIZONTAL AND POLICY RELATED Establishing Centres of Excellence, Institutes or Organizations to gather and disseminate cyber-security resources Raising awareness and introducing new threats, vulnerabilities and risks Promoting Research and Development in Cyber-security as Joint Researches Developing Human Resources and solve training needs and skill shortage of academia and industry Formulating and improving policies and regulations on information security Protecting national critical infrastructure and network regarding cyber-security Providing assistance to ensure security for SMEs

19

20 ASEAN S R&D DASHBOARD STRUCTURE - 36 ISSUES IN 4 GROUPS OF: TRUSTWORTHY ICT, ENABLING AND DEMANDING TECHNOLOGIES, TOWARD SDN, OTHER NEW TRENDS - 6 GRADES: SUCCESS, PROGRESS, DIFFICULT, PLANNED, INTERESTED, NO INTEREST RESULTS: - WITH SCMIT MEMBERS FROM Thailand, Singapore, Indonesia, Malaysia, Laos, Myanmar and Vietnam - Overall conclusions: Most ASEAN countries are behind in R&D compared to Horizont2020 and lack advanced R&D. - List of top 12 R&D issues: Average 3.6 Most of countries are implementing and a significant number have difficulty.

21 LIST OF 12 TOP R&D ISSUES Secure Internet Use and Remote Access for Enterprise LAN and Private Cloud? 24 To identify new threats, vulnerabilities, risks and to implement the campaign to raise public awareness about cyber-security? 23 Cyber-security Architecture Framework, Standards and Guidelines for Enterprise and Government Office Cyber-security Policy 23 Disaster prevention and recovery after disaster 23 Development of new mechanisms, tools and techniques to increase trust, security and transparency of cloud infrastructures and services? 22 Provision of electronic signatures, e-seals, timestamps or certified electronic delivery in Trust eservices? 22 To find new enterprise solutions guaranteeing end-to-end security? 21 Proactive Security Systems able to counteract Denial of Service attacks in Critical Infrastructure? 21 Development of new software tools and methods for large, complex and data-intensive systems with high security? 20 Shared database of threat patterns and analytics of network logs to recognize the attack patterns 20 Cyber-security issues arisen in mobile e-government applications? The new Cyber threats in Internet of Things and Mobile devices? 20 20

22 ASEAN POLICY DASHBOARD STRUCTURE: OECD Dashboard with 25 issues RESULTS: - 8 countries: Malaysia, Thailand, Indonesia, Philippines, Cambodia, Laos, Myanmar and Vietnam - Malaysia has 23/25 the best score proving that OECD dashboard can be used for ASEAN - The results can help other countries to improve on certain points and to give an overview of cyber security policy maturity of SEAN - More details are available in the report - Used for recommendations

23

24 RECOMMENDATIONS Large visionary projects o Promote R&D on the enterprise infrastructure protection in the evolution toward SDN o EU-ASEAN Cyber Security Professional Training and Technology Transfer o ASEAN Technical support center for secure key enterprise applications and open sources Expand the Cyber-security Cooperation o Recommendations to EU and ASEAN bodies o Recommendations to ASEAN and/or EU Member states o Recommendations to the ASEAN RDI organizations Cyber-security Activities Promotion o Community of Practice o ASEAN Committee or Sub-Committee on Cyber-security o Pilot technical assistance and Cyber Security Architecture Framework

25 RECOMMENDATIONS FOR EU AND ASEAN BODIES 1. Create ASEAN Cyber Security Technical Committee, linking together legislative and policy issues in cybersecurity (TELSOM), and R&D issues (COST) Consist of academic researchers, independent professionals, vendors and policy makers in cyber security. Discuss R&D, implementation, standardization initiatives and cooperation Discuss the legal issues and give recommendations for the policy makers 2. Encourage and initiate ASEAN Joint projects on Cyber Security Standardization and Architecture Framework Cyber Security Code of Conduct Sharing the attack patterns 3. Assessment of the maturity of activities in Cyber Security in AEAN By one or more professional organizations or projects. The results are useful as a reference for achieving consensus, cooperation and project ideas. 4. Development of Human Resources and Social Awareness 5. Propose a special EU-SEA cooperation program with the focus on Cyber Security and Efficient Local Government Architecture and Reference Models.

26

27 WHO SHOULD READ POLICY MAKERS WHO WANT TO HAVE AN OVERVIEW ON CYBER SECURITY SITUATION IN ASEAN AND COOPERATION OPPORTUNITIES WITH EU. RESEARCHERS WHO ARE SEEKING FOR POSSIBLE COOPERATION TOPICS THOSE WHO WANT TO PROMOTE EU-SEA COOPERATION IN CYBER SECURITY THOSE WHO WANT TO FIND ANALYSIS RESULTS ABOUT STRENGTHS, OPPORTUNITIES OF ASEAN IN CYBER SECURITY

28 THE CURRENT STATUS Delivered as a report to EU as part of CONNECT2SEA The public version will be available by the end of May, 2016 One more chapter is going to be added with Cyber Security Blue Print (Guidelines) for developing countries with the case study of Laos.

29

ASEAN s Cooperation on Cybersecurity and against Cybercrime

ASEAN s Cooperation on Cybersecurity and against Cybercrime ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY

More information

Cybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices

Cybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices Cybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM

More information

JOINT MEDIA STATEMENT

JOINT MEDIA STATEMENT The 15 th ASEAN Telecommunications and Information Technology Ministers Meeting and Related Meetings Da Nang, Viet Nam, 27 November 2015 JOINT MEDIA STATEMENT 1. The 15 th ASEAN Telecommunications and

More information

THE DECLARATION ON THE ELIMINATION OF VIOLENCE AGAINST WOMEN AND ELIMINATION OF VIOLENCE AGAINST CHILDREN IN ASEAN

THE DECLARATION ON THE ELIMINATION OF VIOLENCE AGAINST WOMEN AND ELIMINATION OF VIOLENCE AGAINST CHILDREN IN ASEAN THE DECLARATION ON THE ELIMINATION OF VIOLENCE AGAINST WOMEN AND ELIMINATION OF VIOLENCE AGAINST CHILDREN IN ASEAN WE, the Heads of State/Government of the Member States of the Association of Southeast

More information

INVESTMENT PROMOTION, STRATEGIES, POLICIES AND PRACTICES MALAYSIA S EXPERIENCE

INVESTMENT PROMOTION, STRATEGIES, POLICIES AND PRACTICES MALAYSIA S EXPERIENCE INVESTMENT PROMOTION, STRATEGIES, POLICIES AND PRACTICES MALAYSIA S EXPERIENCE OECD China Conference on Foreign Investment 11 12 September 2000 Xiamen, People s Republic of China By Kaziah Abdul Kadir

More information

Capabilities for Cybersecurity Resilience

Capabilities for Cybersecurity Resilience Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances

More information

Expert Consultation on the Asian Information Superhighway and Regional Connectivity

Expert Consultation on the Asian Information Superhighway and Regional Connectivity Expert Consultation on the Asian Information Superhighway and Regional Connectivity Conclusions: Conclusions and Recommendations 24-25 September 2013 Manila, Philippines 1. The experts highlighted that

More information

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the

More information

How To Understand And Understand The European Priorities In Information Security

How To Understand And Understand The European Priorities In Information Security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

Thailand and ASEAN. 1. ASEAN: Forty Five Years of Achievements

Thailand and ASEAN. 1. ASEAN: Forty Five Years of Achievements Thailand and ASEAN 1. ASEAN: Forty Five Years of Achievements Since its inception in 1967, the Association of Southeast Asian Nations (ASEAN) has made a number of achievements towards regional peace, stability,

More information

The Next Decade for Asian Higher Education and Research and its Impact on the Bologna Process and European Universities

The Next Decade for Asian Higher Education and Research and its Impact on the Bologna Process and European Universities The Next Decade for Asian Higher Education and Research and its Impact on the Bologna Process and European Universities Tan Kay Chuan Office of Quality Management National University of Singapore OUTLINE

More information

INTRODUCTION TO THE EUROPEAN PARLIAMENT DELEGATION FOR RELATIONS WITH THE COUNTRIES OF SOUTHEAST ASIA AND THE ASSOCIATION OF SOUTHEAST NATIONS

INTRODUCTION TO THE EUROPEAN PARLIAMENT DELEGATION FOR RELATIONS WITH THE COUNTRIES OF SOUTHEAST ASIA AND THE ASSOCIATION OF SOUTHEAST NATIONS INTRODUCTION TO THE EUROPEAN PARLIAMENT DELEGATION FOR RELATIONS WITH THE COUNTRIES OF SOUTHEAST ASIA AND THE ASSOCIATION OF SOUTHEAST NATIONS (ASEAN) 1 General introduction This delegation s remit covers

More information

Working Party on Information Security and Privacy

Working Party on Information Security and Privacy Unclassified DSTI/ICCP/REG(2003)5/REV1 DSTI/ICCP/REG(2003)5/REV1 Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 02-Jul-2003

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Global Cybersecurity Index Good Practices

Global Cybersecurity Index Good Practices AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation

More information

Horizon 2020 Information and Communication Technologies in Work Programme 2016-17

Horizon 2020 Information and Communication Technologies in Work Programme 2016-17 Horizon 2020 Information and Communication Technologies in Work Programme 2016-17 Morten Møller DG CONNECT European Commission A few reminders on Horizon 2020 Biggest EU R&I programme ever 77 billion of

More information

National Cyber Security Strategy 2015-2017

National Cyber Security Strategy 2015-2017 National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.

More information

Cybersecurity: Taking Stock and Looking Ahead

Cybersecurity: Taking Stock and Looking Ahead Cybersecurity: Taking Stock and Looking Ahead 30 April 2014 Tomas Lamanauskas Head, Corporate Strategy Division International Telecommunication Union 1 Context 2 Different Perspectives of Cybersecurity

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

TERMS OF REFERENCE OF THE ASEAN CHILDREN S FORUM (ACF)

TERMS OF REFERENCE OF THE ASEAN CHILDREN S FORUM (ACF) TERMS OF REFERENCE OF THE ASEAN CHILDREN S FORUM (ACF) One Vision One Identity One Community TERMS OF REFERENCE OF THE ASEAN CHILDREN S FORUM (ACF) The Association of Southeast Asian Nations (ASEAN) was

More information

Cybersecurity MORE THAN A GOOD HEADLINE. Protect more

Cybersecurity MORE THAN A GOOD HEADLINE. Protect more Cybersecurity MORE THAN A GOOD HEADLINE Protect more Contents 2 Introduction 3 What is Cybersecurity? 4 Thought model 5 Social, Economic, Political, and IT Alignment 8 ICT Infrastructure 10 National Projects

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

International Strategy on Cybersecurity Cooperation

International Strategy on Cybersecurity Cooperation 資 料 9-2 International Strategy on Cybersecurity Cooperation - j-initiative for Cybersecurity - October 2, 2013 Information Security Policy Council Contents 1 Objectives 1 2 Basic Principles 2 2.1 Ensuring

More information

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November

More information

12 th -16 th May 2013 ---------------------------------------------------------------------------------------------------- Country Progress Report

12 th -16 th May 2013 ---------------------------------------------------------------------------------------------------- Country Progress Report ASEAN INTER-PARLIAMENTARY ASSEMBLY The Tenth Meeting of the AIPA Fact-Finding Committee (AIFOCOM) to Combat the Drug Menace Bandar Seri Begawan, Brunei Darussalam 12 th -16 th May 2013 ----------------------------------------------------------------------------------------------------

More information

Title Analysis of Presentation

Title Analysis of Presentation Southeast Asia in FP7 EU-ASEAN S&T cooperation to jointly tackle societal challenges Title Analysis of Presentation of ecorda data Subtitle/other information September 2014 DLR/ZSI 1 Main features of Southeast

More information

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012 ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was

More information

Overview of e-asean Initiative

Overview of e-asean Initiative Overview of e-asean Initiative Pichet Durongkaveroj Chairman e-asean Working Group ITU Workshop on Creating Trust in Critical Network Infrastructures 20-22 May 2002 Seoul 1 Coverage Background Implementing

More information

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical

More information

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU

More information

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The

More information

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until

More information

CSCAP MEMORANDUM NO. 24 Safety and Security of Vital Undersea Communications Infrastructure

CSCAP MEMORANDUM NO. 24 Safety and Security of Vital Undersea Communications Infrastructure CSCAP MEMORANDUM NO. 24 Safety and Security of Vital Undersea Communications Infrastructure A Memorandum from the Council for Security Cooperation in the Asia Pacific (CSCAP) May 2014 Council for Security

More information

Introduction of the GCCD. (Global Cybersecurity Center for Development)

Introduction of the GCCD. (Global Cybersecurity Center for Development) Introduction of the GCCD (Global Cybersecurity Center for Development) Contents Ⅰ Ⅱ Ⅲ Ⅳ Ⅴ Ⅵ Ⅶ Background Vision Roles and Responsibilities Organizational Structure and Facilities Partnership Plan GCCD

More information

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th Cybersecurity: Thailand s and ASEAN s priorities Soranun Jiwasurat www.etda.or.th Cyber Threat Landscape Overview 2 Cyber threat a hostile act using computers, electronic information and/or digital networks

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,

More information

Key Findings (preliminary): Asia Pacific Visitor Forecasts 2014-2018 Report

Key Findings (preliminary): Asia Pacific Visitor Forecasts 2014-2018 Report Key Findings (preliminary): Asia Pacific Visitor Forecasts 2014-2018 Report Please Note The findings presented here are preliminary and as delivered at the ASEAN Tourism Forum, January 2014. Final checks

More information

National Cyber Security Strategy of Afghanistan (NCSA)

National Cyber Security Strategy of Afghanistan (NCSA) Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA

More information

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a

More information

Cyber Security and Digital Forensics Training Platform

Cyber Security and Digital Forensics Training Platform Cyber Security and Digital Forensics Training Platform Adrian Smales and Prof Bill Buchanan DFET Project Outline: DFET creates new training methods/techniques to support judicial authorities, law enforcement

More information

Technology and Cyber Resilience Benchmarking Report 2012. December 2013

Technology and Cyber Resilience Benchmarking Report 2012. December 2013 Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities

More information

Grahame Mansell-Grace Business Development Manager. KEY ISSUES FOR COMMERCIALISING MEDTECH IDEAS 28 November 2013

Grahame Mansell-Grace Business Development Manager. KEY ISSUES FOR COMMERCIALISING MEDTECH IDEAS 28 November 2013 Grahame Mansell-Grace Business Development Manager KEY ISSUES FOR COMMERCIALISING MEDTECH IDEAS 28 November 2013 70 BILLION + * Horizon 2020 is now expected to receive 78.6bn in current prices over the

More information

ASEAN economic community Opportunities and challenges for insurers. John Goulios, Partner/Co-Head Insurance Sector Leader Asia Pacific, DLA Piper

ASEAN economic community Opportunities and challenges for insurers. John Goulios, Partner/Co-Head Insurance Sector Leader Asia Pacific, DLA Piper ASEAN economic community Opportunities and challenges for insurers John Goulios, Partner/Co-Head Insurance Sector Leader Asia Pacific, DLA Piper What is the Asean Economic Community (AEC)? 10 member states:

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

Asia-Pacific Application Performance Management Market CY 2013 Rapidly Changing Application Architecture and Business Environment Drives the Market

Asia-Pacific Application Performance Management Market CY 2013 Rapidly Changing Application Architecture and Business Environment Drives the Market Asia-Pacific Application Performance Management Market CY 2013 Rapidly Changing Application Architecture and Business Environment Drives the Market October 2014 Contents Section Slide Number Executive

More information

Framework for ASEAN 2015: A Roadmap for Schools. John Addy S. Garcia, PhD De La Salle University

Framework for ASEAN 2015: A Roadmap for Schools. John Addy S. Garcia, PhD De La Salle University Framework for ASEAN 2015: A Roadmap for Schools John Addy S. Garcia, PhD De La Salle University ASEAN ECONOMIC COMMUNITY 2015 ASEAN Economic Community 10 countries, single regional economic market by 2015

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation

More information

FY2015 Survey on the International Operations of Japanese Firms JETRO Overseas Business Survey

FY2015 Survey on the International Operations of Japanese Firms JETRO Overseas Business Survey Japan External Trade Organization FY2015 Survey on the International Operations of Japanese Firms JETRO Overseas Business Survey March 3, 2016 Japan External Trade Organization (JETRO) Table of contents

More information

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND

More information

OECD PROJECT ON CYBER RISK INSURANCE

OECD PROJECT ON CYBER RISK INSURANCE OECD PROJECT ON CYBER RISK INSURANCE Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent years.

More information

Waiting for the Organiser The webinar will begin shortly

Waiting for the Organiser The webinar will begin shortly Waiting for the Organiser The webinar will begin shortly 1 Successful Technology Transfer to Southeast Asia ASEAN IPR SME Helpdesk 2 Welcome to the Webinar ASEAN IPR SME Helpdesk Project Executive 3 Webinar

More information

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP

More information

Mainstreaming Disaster Risk Reduction into National and Sectoral Development Process

Mainstreaming Disaster Risk Reduction into National and Sectoral Development Process Mainstreaming Disaster Risk Reduction into National and Sectoral Development Process Safer Training Health Course Facilities Regional Consultative Committee on Disaster Management (RCC) Training Course

More information

Cyber Security Strategy(Information Security Policy Council, June 10, 2013)

Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Environmental Change Vision to aim as a Goal Basic Principles Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Areas of Efforts Increasing severity of the risk surrounding cyberspace

More information

Introduction to ARTEMIS Strategic Reseach Agenda. June 24, 2015

Introduction to ARTEMIS Strategic Reseach Agenda. June 24, 2015 Introduction to ARTEMIS Strategic Reseach Agenda Road2CPS workshop, Paris June 24, 2015 Ad ten Berg Embedded & Cyber- Physical Systems Sidestick LCD-Displays Autopilot, Auto-Throttle, Envelope Protection

More information

Ongoing N/A TBC. Baseline

Ongoing N/A TBC. Baseline Position Title: Executive General Manager, Core Services Systems Operations Classification: SES Band 2 Position Number: 1018 Position Status (ongoing/nonongoing): Ongoing Division: Core Services Systems

More information

Agenda. The Digital Agenda for Europe Instruments to implement the vision EC actions to promote ehealth interoperability

Agenda. The Digital Agenda for Europe Instruments to implement the vision EC actions to promote ehealth interoperability IHE epsos Connectahon Pisa, 12 April 2011 The European Commission s s vision for ehealth interoperability Benoit Abeloos Research Program Officer, Interoperability - Standardization European Commission

More information

Open Source Incident Management Tool for CSIRTs

Open Source Incident Management Tool for CSIRTs An Agency Under MOSTI Open Source Incident Management Tool for CSIRTs Adli Wahid Head, Malaysia CERT (MyCERT) CyberSecurity Malaysia Copyright 2008 CyberSecurity Malaysia Agenda About MyCERT Where do incidents

More information

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4 State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes

More information

Future job market prospects and requirements for skilled human resources in the context of ASEAN integration

Future job market prospects and requirements for skilled human resources in the context of ASEAN integration Future job market prospects and requirements for skilled human resources in the context of ASEAN integration Tokyo, Japan 13 December 214 Yoshiteru Uramoto Regional Director and Assistant Director-General

More information

How To Improve The Shared Services Partnership Business Continuity Plan

How To Improve The Shared Services Partnership Business Continuity Plan Audit and Governance Committee 24 September 2015 Business Continuity Plan For Information Portfolio Holder(s) Environmental Protection & Assets Senior Leadership Team Contact: Strategic Director 1. Purpose

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

Cybersecurity Governance

Cybersecurity Governance AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional

More information

INCO for Cyber Security. PTCIF: 21st Feb 2014

INCO for Cyber Security. PTCIF: 21st Feb 2014 INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.

More information

PICASSO Project. Towards new avenues in EU-US ICT collaboration

PICASSO Project. Towards new avenues in EU-US ICT collaboration PICASSO Project Towards new avenues in EU-US ICT collaboration EU-US Expert Group Meeting - Big Data Expert Group Hosted by NIST at the Department of Commerce 20 May 2016 Nikos Sarris, ATC ICT Policy,

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK 1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

How small and medium-sized enterprises can formulate an information security management system

How small and medium-sized enterprises can formulate an information security management system How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and

More information

International ICT Volunteers. Empowering Youth in ICT for Development

International ICT Volunteers. Empowering Youth in ICT for Development International ICT Volunteers Empowering Youth in ICT for Development IIVs Introduction & Background Interview Seoul, South Korea International ICT Volunteers Introduction NIA/ITU International ICT Volunteers

More information

Social Protection in ASEAN Policy gaps and common challenges. Cheng Boon Ong 17 November 2014, Bangkok

Social Protection in ASEAN Policy gaps and common challenges. Cheng Boon Ong 17 November 2014, Bangkok Social Protection in ASEAN Policy gaps and common challenges Cheng Boon Ong 17 November 2014, Bangkok Methodology ABND for 7 Member States: Vietnam 2010-2011 Cambodia 2011-2012 Indonesia 2011-2012 Thailand

More information

Children s participation: Mekong Youth Forum and COMMIT

Children s participation: Mekong Youth Forum and COMMIT Children s participation: Mekong Youth Forum and COMMIT Briefing paper Introduction Human trafficking is one of the most serious problems affecting children and young people in the Greater Mekong Sub-region

More information

REQUEST FOR QUOTATION (RFQ) Translation Services

REQUEST FOR QUOTATION (RFQ) Translation Services REQUEST FOR QUOTATION (RFQ) Translation Services Dear Sir / Madam: 18 December 2014 RFQ-ROAP-2014-013 We are seeking the translation service provider to translate documents from local languages to English

More information

Information Security Seminar 2013

Information Security Seminar 2013 Information Security Seminar 2013 Mr. Victor Lam, JP Deputy Government Chief Information Officer Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative

More information

EXECUTIVE S INTERNATIONAL RELATIONS STRATEGY

EXECUTIVE S INTERNATIONAL RELATIONS STRATEGY EXECUTIVE S INTERNATIONAL RELATIONS STRATEGY February 2014 Revised 26/02/14 THE EXECUTIVE S INTERNATIONAL RELATIONS STRATEGY 1. INTRODUCTION. 1.1 Key objectives of the Executive s Programme for Government

More information

A global infrastructure to safeguard your business_

A global infrastructure to safeguard your business_ Global Security Services A global infrastructure to safeguard your business_ Global Solutions More than just peace of mind: increase confidence and reduce risk across your entire organisation_ How do you

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

Introducing the ASEAN IPR SME Helpdesk: Free Support for EU SMEs in ASEAN

Introducing the ASEAN IPR SME Helpdesk: Free Support for EU SMEs in ASEAN Introducing the ASEAN IPR SME Helpdesk: Free Support for EU SMEs in ASEAN Practical, first-line intellectual property advice for EU SMEs in ASEAN Jakub Ramocki STI Days, Bangkok, 22. January 2014 A project

More information

FUJIFILM Holdings Corporation Document Solutions

FUJIFILM Holdings Corporation Document Solutions FUJIFILM Holdings Corporation Document Solutions May 17, 2016 Fuji Xerox Co., Ltd. FORWARD-LOOKING STATEMENTS Forward-looking statements, such as those relating to earnings forecasts and other projections

More information

Cyber Security for Railway Signalling

Cyber Security for Railway Signalling Cyber Security for Railway Signalling Dr. Cédric LÉVY-BENCHETON Network and Information Security Expert European Union Agency for Network and Information Security How to protect signalling system against

More information

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks

More information

Infocomm Security Masterplan 2

Infocomm Security Masterplan 2 INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm

More information

ASEAN Cooperation Initiative in Quality Assurance Assoc. Prof. Dr. Nantana Gajaseni Deputy Executive Director, ASEAN University Network

ASEAN Cooperation Initiative in Quality Assurance Assoc. Prof. Dr. Nantana Gajaseni Deputy Executive Director, ASEAN University Network ASEAN Cooperation Initiative in Quality Assurance Assoc. Prof. Dr. Nantana Gajaseni Deputy Executive Director, ASEAN University Network At the Workshop on Enhancing Quality Across Borders Regional Cooperation

More information