Towards closer EU-ASEAN collaboration in cybersecurity
|
|
- Jacob Nichols
- 8 years ago
- Views:
Transcription
1 Supporting European Union and Southeast Asia ICT strategic partnership and policy dialogue: Connecting ICT EU-SEA Research, Development and Innovation Knowledge Networks Towards closer EU-ASEAN collaboration in cybersecurity STI DAYS May 11th, 2016, Hanoi, Vietnam Aiviet Nguyen (ITI-VNU) and Sotiris Ionannidis (FORTH) This project has received funding from the European Union s Seventh Framework Programme for research, technological development and demonstration under grant agreement No
2 CONTENT 1. CYBER SECURITY 2. CYBER SECURITY IN ASEAN 3. CYBER SECURITY IN EU 4. IDENTIFY THE COOPERATION TOPIC 5. R&D AND POLICY DASHBOARDS 6. RECOMMENDATIONS 7. CONNECT2SEA S REPORT 11/05/2016 Hanoi, Vietnam
3 11/05/2016 Hanoi, Vietnam
4 CYBER SECURITY: A GLOBAL ISSUE CYBER WAR CYBER CRIME
5 OECD PRIORITIES IN THE ACTION PLANS FOR CYBER SECURITY Government security Awareness capacity, government network infrastructures and audits Protection of critical information infrastructures Fight against cyber-crime Awareness raising Measures Law enforcement capacity, legal framework improvement and international co-operation. Focus on children, SMEs and decision makers Education Stronger cyber-security workforce and skills Response Cyber-security Incident Response Teams (CSIRTs) R&D Better organisation in partnership with the private sector..
6 CYBER SECURITY AS A FOCUSED TARGET FOCUS POINT OF POLICY AND R&D ISSUES A REQUIREMENT FOR MOST R&D AND IMPLEMENTATION AREAS ATTENTION OF GOVERNMENTS, MEDIA AND SOCIETY CYBER SECURITY COOPERATION IS CRITICAL
7
8 STRENGTH AND WEAKNESS STRENGTH WEAKNESS An IT hub in central cooperative position with the US, EU, China, Japan Potentials for growth Networking activities Regional cohesiveness Experts and innovators Standardization and mutual approach Culture and language diversity and economic disparity
9 OPPORTUNITY AND CHALLENGE OPPORTUNITY CHALLENGE New interest of ASEAN (ICT Master Plan) ICT becomes a strong sector to promote connectivity Commitments of governments Digital divide Global cyber security challenges
10 ASEAN PRIORITIES IN ICT MASTER PLAN TO 2020 Cybersecurity Emergency Readiness: Cybersecurity Protection: Critical Infrastructure Protection Public Security and Safety 12/05/2016 Hanoi, Vietnam
11 ASEAN s Policy Measures toward Cyber-security Promote strategies to address threats, which are consistent with international law and its basic principles Promote dialogue on risk reduction measures, including exchange of views on the potential use of ICTs in conflict Encourage and enhance cooperation in bringing about culture of cyber-security Develop a work plan on security in the use of ICTs, focused on practical cooperation Review a possibility to elaborate common terms and definitions relevant to the sphere of the use of ICTs (code of conduct)
12
13 EU STRATEGY AND POLICY R&D Priorities in the Cyber-security Strategy o Identifying the NIS (Network and Information Security) vulnerabilities: o Promoting a single market for cyber-security products o Fostering R&D investments and innovation o Supporting the development of cryptography: o Provision of advanced solutions for end-to-end secure ICT systems: International Cooperation in the Cyber-security Strategy o Promote the international cooperation, develop industrial and technological resources to produce the ICT products: o Establish a coherent international cyberspace policy for the European Union and promote EU core values: o Promote cooperation on standardization in cyber-security, expanding usages of EU laws, norms and core values: o Mainstreaming cyberspace issues into EU external relations and Common Foreign and Security Policy:
14 ORGANIZATION OF TECHNOLOGY PLATFORMS AGAINST CYBER SECURITY ARTEMIS Industry Association ENIAC Joint Undertaking EPoSS: ETP on Smart Systems Integration ETP4HPC: ETP for High Performance Computing EU Robotics AISBL NEM: New European Media NESSI: The Networked European Software and Services Initiative Networld2020 ETP
15 HORIZONT2020 PRIORITIES R&D PRIORITIES TOWARD CYBER SECURITY: Secure societies (DSR), Digital Security (DS), Digital Security Policy NEW AREAS WHICH REQUIRE R&D IN CYBER SECURITY NEW AREAS WHICH PROVIDE NEW ENABLING TECHNOLOGIES FOR CYBER SECURITY
16
17 METHODOLOGY THE DIFFICULTY IN MATCHING ASEAN AND EU OBJECTIVES: DIFFERENT STAGE OF DEVELOPMENT. IMPLEMENTATION FOCUS VS R&D AND QUALITY FOCUS IMPLEMENTATION ACTIONS APPLICATIONS ENABLING TECHNOLOGY R&D IDENTIFY A LIST OF 144 R&D OBJECTIVES IN HORIZONT 2020, WHICH MAY HAVE RELATIONSHIP TO CYBER SECURITY USE MATRIX TO MAP THESE OBJECTIVES INTO ENABLING TECHNOLOGIES FOR THE APPLICATIONS, WHICH ARE RELEVANT IN ASEAN S PRIOTIZED ACTIONS GET THE CONSORTIUM MEMBERS, POLICY MAKERS FROM SCMIT, TELSOM, EXPERTS TO HAVE FEEDBACKS CHOOSE 28 TOP COOPERATION PRIORITIES
18 TOP 7 PRIORITIES: HORIZONTAL AND POLICY RELATED Establishing Centres of Excellence, Institutes or Organizations to gather and disseminate cyber-security resources Raising awareness and introducing new threats, vulnerabilities and risks Promoting Research and Development in Cyber-security as Joint Researches Developing Human Resources and solve training needs and skill shortage of academia and industry Formulating and improving policies and regulations on information security Protecting national critical infrastructure and network regarding cyber-security Providing assistance to ensure security for SMEs
19
20 ASEAN S R&D DASHBOARD STRUCTURE - 36 ISSUES IN 4 GROUPS OF: TRUSTWORTHY ICT, ENABLING AND DEMANDING TECHNOLOGIES, TOWARD SDN, OTHER NEW TRENDS - 6 GRADES: SUCCESS, PROGRESS, DIFFICULT, PLANNED, INTERESTED, NO INTEREST RESULTS: - WITH SCMIT MEMBERS FROM Thailand, Singapore, Indonesia, Malaysia, Laos, Myanmar and Vietnam - Overall conclusions: Most ASEAN countries are behind in R&D compared to Horizont2020 and lack advanced R&D. - List of top 12 R&D issues: Average 3.6 Most of countries are implementing and a significant number have difficulty.
21 LIST OF 12 TOP R&D ISSUES Secure Internet Use and Remote Access for Enterprise LAN and Private Cloud? 24 To identify new threats, vulnerabilities, risks and to implement the campaign to raise public awareness about cyber-security? 23 Cyber-security Architecture Framework, Standards and Guidelines for Enterprise and Government Office Cyber-security Policy 23 Disaster prevention and recovery after disaster 23 Development of new mechanisms, tools and techniques to increase trust, security and transparency of cloud infrastructures and services? 22 Provision of electronic signatures, e-seals, timestamps or certified electronic delivery in Trust eservices? 22 To find new enterprise solutions guaranteeing end-to-end security? 21 Proactive Security Systems able to counteract Denial of Service attacks in Critical Infrastructure? 21 Development of new software tools and methods for large, complex and data-intensive systems with high security? 20 Shared database of threat patterns and analytics of network logs to recognize the attack patterns 20 Cyber-security issues arisen in mobile e-government applications? The new Cyber threats in Internet of Things and Mobile devices? 20 20
22 ASEAN POLICY DASHBOARD STRUCTURE: OECD Dashboard with 25 issues RESULTS: - 8 countries: Malaysia, Thailand, Indonesia, Philippines, Cambodia, Laos, Myanmar and Vietnam - Malaysia has 23/25 the best score proving that OECD dashboard can be used for ASEAN - The results can help other countries to improve on certain points and to give an overview of cyber security policy maturity of SEAN - More details are available in the report - Used for recommendations
23
24 RECOMMENDATIONS Large visionary projects o Promote R&D on the enterprise infrastructure protection in the evolution toward SDN o EU-ASEAN Cyber Security Professional Training and Technology Transfer o ASEAN Technical support center for secure key enterprise applications and open sources Expand the Cyber-security Cooperation o Recommendations to EU and ASEAN bodies o Recommendations to ASEAN and/or EU Member states o Recommendations to the ASEAN RDI organizations Cyber-security Activities Promotion o Community of Practice o ASEAN Committee or Sub-Committee on Cyber-security o Pilot technical assistance and Cyber Security Architecture Framework
25 RECOMMENDATIONS FOR EU AND ASEAN BODIES 1. Create ASEAN Cyber Security Technical Committee, linking together legislative and policy issues in cybersecurity (TELSOM), and R&D issues (COST) Consist of academic researchers, independent professionals, vendors and policy makers in cyber security. Discuss R&D, implementation, standardization initiatives and cooperation Discuss the legal issues and give recommendations for the policy makers 2. Encourage and initiate ASEAN Joint projects on Cyber Security Standardization and Architecture Framework Cyber Security Code of Conduct Sharing the attack patterns 3. Assessment of the maturity of activities in Cyber Security in AEAN By one or more professional organizations or projects. The results are useful as a reference for achieving consensus, cooperation and project ideas. 4. Development of Human Resources and Social Awareness 5. Propose a special EU-SEA cooperation program with the focus on Cyber Security and Efficient Local Government Architecture and Reference Models.
26
27 WHO SHOULD READ POLICY MAKERS WHO WANT TO HAVE AN OVERVIEW ON CYBER SECURITY SITUATION IN ASEAN AND COOPERATION OPPORTUNITIES WITH EU. RESEARCHERS WHO ARE SEEKING FOR POSSIBLE COOPERATION TOPICS THOSE WHO WANT TO PROMOTE EU-SEA COOPERATION IN CYBER SECURITY THOSE WHO WANT TO FIND ANALYSIS RESULTS ABOUT STRENGTHS, OPPORTUNITIES OF ASEAN IN CYBER SECURITY
28 THE CURRENT STATUS Delivered as a report to EU as part of CONNECT2SEA The public version will be available by the end of May, 2016 One more chapter is going to be added with Cyber Security Blue Print (Guidelines) for developing countries with the case study of Laos.
29
ASEAN s Cooperation on Cybersecurity and against Cybercrime
ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationTowards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
More informationITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
More informationASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
More informationITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union
ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY
More informationCybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices
Cybersecurity-related international institutions: An assessment and a framework for nations strategic policy choices Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM
More informationJOINT MEDIA STATEMENT
The 15 th ASEAN Telecommunications and Information Technology Ministers Meeting and Related Meetings Da Nang, Viet Nam, 27 November 2015 JOINT MEDIA STATEMENT 1. The 15 th ASEAN Telecommunications and
More informationTHE DECLARATION ON THE ELIMINATION OF VIOLENCE AGAINST WOMEN AND ELIMINATION OF VIOLENCE AGAINST CHILDREN IN ASEAN
THE DECLARATION ON THE ELIMINATION OF VIOLENCE AGAINST WOMEN AND ELIMINATION OF VIOLENCE AGAINST CHILDREN IN ASEAN WE, the Heads of State/Government of the Member States of the Association of Southeast
More informationINVESTMENT PROMOTION, STRATEGIES, POLICIES AND PRACTICES MALAYSIA S EXPERIENCE
INVESTMENT PROMOTION, STRATEGIES, POLICIES AND PRACTICES MALAYSIA S EXPERIENCE OECD China Conference on Foreign Investment 11 12 September 2000 Xiamen, People s Republic of China By Kaziah Abdul Kadir
More informationCapabilities for Cybersecurity Resilience
Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances
More informationExpert Consultation on the Asian Information Superhighway and Regional Connectivity
Expert Consultation on the Asian Information Superhighway and Regional Connectivity Conclusions: Conclusions and Recommendations 24-25 September 2013 Manila, Philippines 1. The experts highlighted that
More informationEUROPEAN CYBERSECURITY FLAGSHIP SUMMARY
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the
More informationHow To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
More informationThailand and ASEAN. 1. ASEAN: Forty Five Years of Achievements
Thailand and ASEAN 1. ASEAN: Forty Five Years of Achievements Since its inception in 1967, the Association of Southeast Asian Nations (ASEAN) has made a number of achievements towards regional peace, stability,
More informationThe Next Decade for Asian Higher Education and Research and its Impact on the Bologna Process and European Universities
The Next Decade for Asian Higher Education and Research and its Impact on the Bologna Process and European Universities Tan Kay Chuan Office of Quality Management National University of Singapore OUTLINE
More informationINTRODUCTION TO THE EUROPEAN PARLIAMENT DELEGATION FOR RELATIONS WITH THE COUNTRIES OF SOUTHEAST ASIA AND THE ASSOCIATION OF SOUTHEAST NATIONS
INTRODUCTION TO THE EUROPEAN PARLIAMENT DELEGATION FOR RELATIONS WITH THE COUNTRIES OF SOUTHEAST ASIA AND THE ASSOCIATION OF SOUTHEAST NATIONS (ASEAN) 1 General introduction This delegation s remit covers
More informationWorking Party on Information Security and Privacy
Unclassified DSTI/ICCP/REG(2003)5/REV1 DSTI/ICCP/REG(2003)5/REV1 Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 02-Jul-2003
More informationCyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
More informationGlobal Cybersecurity Index Good Practices
AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation
More informationHorizon 2020 Information and Communication Technologies in Work Programme 2016-17
Horizon 2020 Information and Communication Technologies in Work Programme 2016-17 Morten Møller DG CONNECT European Commission A few reminders on Horizon 2020 Biggest EU R&I programme ever 77 billion of
More informationNational Cyber Security Strategy 2015-2017
National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.
More informationCybersecurity: Taking Stock and Looking Ahead
Cybersecurity: Taking Stock and Looking Ahead 30 April 2014 Tomas Lamanauskas Head, Corporate Strategy Division International Telecommunication Union 1 Context 2 Different Perspectives of Cybersecurity
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationCyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority
More informationTERMS OF REFERENCE OF THE ASEAN CHILDREN S FORUM (ACF)
TERMS OF REFERENCE OF THE ASEAN CHILDREN S FORUM (ACF) One Vision One Identity One Community TERMS OF REFERENCE OF THE ASEAN CHILDREN S FORUM (ACF) The Association of Southeast Asian Nations (ASEAN) was
More informationCybersecurity MORE THAN A GOOD HEADLINE. Protect more
Cybersecurity MORE THAN A GOOD HEADLINE Protect more Contents 2 Introduction 3 What is Cybersecurity? 4 Thought model 5 Social, Economic, Political, and IT Alignment 8 ICT Infrastructure 10 National Projects
More informationCyberspace Situational Awarness in National Security System
Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl
More informationThe internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
More informationActions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
More informationInternational Strategy on Cybersecurity Cooperation
資 料 9-2 International Strategy on Cybersecurity Cooperation - j-initiative for Cybersecurity - October 2, 2013 Information Security Policy Council Contents 1 Objectives 1 2 Basic Principles 2 2.1 Ensuring
More informationCYBER SECURITY. Marcin Olender Head of Unit Information Society Department
CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November
More information12 th -16 th May 2013 ---------------------------------------------------------------------------------------------------- Country Progress Report
ASEAN INTER-PARLIAMENTARY ASSEMBLY The Tenth Meeting of the AIPA Fact-Finding Committee (AIFOCOM) to Combat the Drug Menace Bandar Seri Begawan, Brunei Darussalam 12 th -16 th May 2013 ----------------------------------------------------------------------------------------------------
More informationTitle Analysis of Presentation
Southeast Asia in FP7 EU-ASEAN S&T cooperation to jointly tackle societal challenges Title Analysis of Presentation of ecorda data Subtitle/other information September 2014 DLR/ZSI 1 Main features of Southeast
More informationInternet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net
Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development
More informationENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was
More informationOverview of e-asean Initiative
Overview of e-asean Initiative Pichet Durongkaveroj Chairman e-asean Working Group ITU Workshop on Creating Trust in Critical Network Infrastructures 20-22 May 2002 Seoul 1 Coverage Background Implementing
More informationGLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT
GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical
More informationEFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
More informationENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency
ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The
More informationBuilding Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch
Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
More informationCSCAP MEMORANDUM NO. 24 Safety and Security of Vital Undersea Communications Infrastructure
CSCAP MEMORANDUM NO. 24 Safety and Security of Vital Undersea Communications Infrastructure A Memorandum from the Council for Security Cooperation in the Asia Pacific (CSCAP) May 2014 Council for Security
More informationIntroduction of the GCCD. (Global Cybersecurity Center for Development)
Introduction of the GCCD (Global Cybersecurity Center for Development) Contents Ⅰ Ⅱ Ⅲ Ⅳ Ⅴ Ⅵ Ⅶ Background Vision Roles and Responsibilities Organizational Structure and Facilities Partnership Plan GCCD
More informationCybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th
Cybersecurity: Thailand s and ASEAN s priorities Soranun Jiwasurat www.etda.or.th Cyber Threat Landscape Overview 2 Cyber threat a hostile act using computers, electronic information and/or digital networks
More informationLegislative Council Panel on Information Technology and Broadcasting. Information Security
For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest
More informationHarmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,
More informationKey Findings (preliminary): Asia Pacific Visitor Forecasts 2014-2018 Report
Key Findings (preliminary): Asia Pacific Visitor Forecasts 2014-2018 Report Please Note The findings presented here are preliminary and as delivered at the ASEAN Tourism Forum, January 2014. Final checks
More informationNational Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
More informationAs global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
More informationCyber Security and Digital Forensics Training Platform
Cyber Security and Digital Forensics Training Platform Adrian Smales and Prof Bill Buchanan DFET Project Outline: DFET creates new training methods/techniques to support judicial authorities, law enforcement
More informationTechnology and Cyber Resilience Benchmarking Report 2012. December 2013
Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities
More informationGrahame Mansell-Grace Business Development Manager. KEY ISSUES FOR COMMERCIALISING MEDTECH IDEAS 28 November 2013
Grahame Mansell-Grace Business Development Manager KEY ISSUES FOR COMMERCIALISING MEDTECH IDEAS 28 November 2013 70 BILLION + * Horizon 2020 is now expected to receive 78.6bn in current prices over the
More informationASEAN economic community Opportunities and challenges for insurers. John Goulios, Partner/Co-Head Insurance Sector Leader Asia Pacific, DLA Piper
ASEAN economic community Opportunities and challenges for insurers John Goulios, Partner/Co-Head Insurance Sector Leader Asia Pacific, DLA Piper What is the Asean Economic Community (AEC)? 10 member states:
More informationMike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
More informationCyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual
More informationAsia-Pacific Application Performance Management Market CY 2013 Rapidly Changing Application Architecture and Business Environment Drives the Market
Asia-Pacific Application Performance Management Market CY 2013 Rapidly Changing Application Architecture and Business Environment Drives the Market October 2014 Contents Section Slide Number Executive
More informationFramework for ASEAN 2015: A Roadmap for Schools. John Addy S. Garcia, PhD De La Salle University
Framework for ASEAN 2015: A Roadmap for Schools John Addy S. Garcia, PhD De La Salle University ASEAN ECONOMIC COMMUNITY 2015 ASEAN Economic Community 10 countries, single regional economic market by 2015
More informationEU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
More informationThe trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation
The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation
More informationFY2015 Survey on the International Operations of Japanese Firms JETRO Overseas Business Survey
Japan External Trade Organization FY2015 Survey on the International Operations of Japanese Firms JETRO Overseas Business Survey March 3, 2016 Japan External Trade Organization (JETRO) Table of contents
More informationPresidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY
Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND
More informationOECD PROJECT ON CYBER RISK INSURANCE
OECD PROJECT ON CYBER RISK INSURANCE Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent years.
More informationWaiting for the Organiser The webinar will begin shortly
Waiting for the Organiser The webinar will begin shortly 1 Successful Technology Transfer to Southeast Asia ASEAN IPR SME Helpdesk 2 Welcome to the Webinar ASEAN IPR SME Helpdesk Project Executive 3 Webinar
More informationITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests
ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP
More informationMainstreaming Disaster Risk Reduction into National and Sectoral Development Process
Mainstreaming Disaster Risk Reduction into National and Sectoral Development Process Safer Training Health Course Facilities Regional Consultative Committee on Disaster Management (RCC) Training Course
More informationCyber Security Strategy(Information Security Policy Council, June 10, 2013)
Environmental Change Vision to aim as a Goal Basic Principles Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Areas of Efforts Increasing severity of the risk surrounding cyberspace
More informationIntroduction to ARTEMIS Strategic Reseach Agenda. June 24, 2015
Introduction to ARTEMIS Strategic Reseach Agenda Road2CPS workshop, Paris June 24, 2015 Ad ten Berg Embedded & Cyber- Physical Systems Sidestick LCD-Displays Autopilot, Auto-Throttle, Envelope Protection
More informationOngoing N/A TBC. Baseline
Position Title: Executive General Manager, Core Services Systems Operations Classification: SES Band 2 Position Number: 1018 Position Status (ongoing/nonongoing): Ongoing Division: Core Services Systems
More informationAgenda. The Digital Agenda for Europe Instruments to implement the vision EC actions to promote ehealth interoperability
IHE epsos Connectahon Pisa, 12 April 2011 The European Commission s s vision for ehealth interoperability Benoit Abeloos Research Program Officer, Interoperability - Standardization European Commission
More informationOpen Source Incident Management Tool for CSIRTs
An Agency Under MOSTI Open Source Incident Management Tool for CSIRTs Adli Wahid Head, Malaysia CERT (MyCERT) CyberSecurity Malaysia Copyright 2008 CyberSecurity Malaysia Agenda About MyCERT Where do incidents
More informationState Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
More informationFuture job market prospects and requirements for skilled human resources in the context of ASEAN integration
Future job market prospects and requirements for skilled human resources in the context of ASEAN integration Tokyo, Japan 13 December 214 Yoshiteru Uramoto Regional Director and Assistant Director-General
More informationHow To Improve The Shared Services Partnership Business Continuity Plan
Audit and Governance Committee 24 September 2015 Business Continuity Plan For Information Portfolio Holder(s) Environmental Protection & Assets Senior Leadership Team Contact: Strategic Director 1. Purpose
More informationCyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
More informationEnterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
More informationCybersecurity Governance
AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional
More informationINCO for Cyber Security. PTCIF: 21st Feb 2014
INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.
More informationPICASSO Project. Towards new avenues in EU-US ICT collaboration
PICASSO Project Towards new avenues in EU-US ICT collaboration EU-US Expert Group Meeting - Big Data Expert Group Hosted by NIST at the Department of Commerce 20 May 2016 Nikos Sarris, ATC ICT Policy,
More information(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationGovernment Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
More informationAISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK
1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association
More informationAn Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
More informationHow small and medium-sized enterprises can formulate an information security management system
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
More informationInternational ICT Volunteers. Empowering Youth in ICT for Development
International ICT Volunteers Empowering Youth in ICT for Development IIVs Introduction & Background Interview Seoul, South Korea International ICT Volunteers Introduction NIA/ITU International ICT Volunteers
More informationSocial Protection in ASEAN Policy gaps and common challenges. Cheng Boon Ong 17 November 2014, Bangkok
Social Protection in ASEAN Policy gaps and common challenges Cheng Boon Ong 17 November 2014, Bangkok Methodology ABND for 7 Member States: Vietnam 2010-2011 Cambodia 2011-2012 Indonesia 2011-2012 Thailand
More informationChildren s participation: Mekong Youth Forum and COMMIT
Children s participation: Mekong Youth Forum and COMMIT Briefing paper Introduction Human trafficking is one of the most serious problems affecting children and young people in the Greater Mekong Sub-region
More informationREQUEST FOR QUOTATION (RFQ) Translation Services
REQUEST FOR QUOTATION (RFQ) Translation Services Dear Sir / Madam: 18 December 2014 RFQ-ROAP-2014-013 We are seeking the translation service provider to translate documents from local languages to English
More informationInformation Security Seminar 2013
Information Security Seminar 2013 Mr. Victor Lam, JP Deputy Government Chief Information Officer Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative
More informationEXECUTIVE S INTERNATIONAL RELATIONS STRATEGY
EXECUTIVE S INTERNATIONAL RELATIONS STRATEGY February 2014 Revised 26/02/14 THE EXECUTIVE S INTERNATIONAL RELATIONS STRATEGY 1. INTRODUCTION. 1.1 Key objectives of the Executive s Programme for Government
More informationA global infrastructure to safeguard your business_
Global Security Services A global infrastructure to safeguard your business_ Global Solutions More than just peace of mind: increase confidence and reduce risk across your entire organisation_ How do you
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationCybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and
More informationEU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
More informationIntroducing the ASEAN IPR SME Helpdesk: Free Support for EU SMEs in ASEAN
Introducing the ASEAN IPR SME Helpdesk: Free Support for EU SMEs in ASEAN Practical, first-line intellectual property advice for EU SMEs in ASEAN Jakub Ramocki STI Days, Bangkok, 22. January 2014 A project
More informationFUJIFILM Holdings Corporation Document Solutions
FUJIFILM Holdings Corporation Document Solutions May 17, 2016 Fuji Xerox Co., Ltd. FORWARD-LOOKING STATEMENTS Forward-looking statements, such as those relating to earnings forecasts and other projections
More informationCyber Security for Railway Signalling
Cyber Security for Railway Signalling Dr. Cédric LÉVY-BENCHETON Network and Information Security Expert European Union Agency for Network and Information Security How to protect signalling system against
More informationA COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
More informationInfocomm Security Masterplan 2
INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm
More informationASEAN Cooperation Initiative in Quality Assurance Assoc. Prof. Dr. Nantana Gajaseni Deputy Executive Director, ASEAN University Network
ASEAN Cooperation Initiative in Quality Assurance Assoc. Prof. Dr. Nantana Gajaseni Deputy Executive Director, ASEAN University Network At the Workshop on Enhancing Quality Across Borders Regional Cooperation
More information