Cyber Security in East Asia and Policy Cooperation
|
|
- Candice Brooks
- 8 years ago
- Views:
Transcription
1 Summary of USJI Seminar on Cyber Security in East Asia and Policy Cooperation between Japan and the United States September 8, 2010 On the Independence Day of the United States in 2009 cyber attacks in a massive scale against major web sites broke out without warning. Soon thereafter, similar attacks began in South Korea and they continued in a wavelike fashion. Experts found that these attacks were conducted by the same group, but could not find who they were. As Japan maintains close relationships with both the United States and South Korea, these attacks made the Japanese government realize seriousness of emerging threats in cyberspace. In this session, experts discussed possible defense methods against cyber attacks, which are expected to increase in number in the near future, and necessary policy cooperation and coordination between Japan and the United States. The four panelists presented on the September 8 th, 2010 seminar are Dr. Motohiro Tsuchiya, Associate Professor of Keio University, as the moderator, Mr. David Hoffman, Director of Security Policy and Global Privacy Officer, Intel Corporation, Dr. Lance J. Hoffman, Distinguished Research Professor, The George Washington University, Mr. Tomohiko Yamakawa, Producer of NTT Corporation, Cyber Security Project, with commentator Mr. Greg Nojeim, Senior Counsel and Director of the Project on Freedom, Security and Technology at the Center for Democracy and Technology. Professor Motohiro Tsuchiya, as a moderator, presented his topic Cyber Security in East Asia. He recalled major security threats happening in the past decade in the region. In 1998, North Korea carried its Taepodong Missile test over the Japanese main island into the Pacific Ocean; North Korean Spy Ship violated the Japanese waters, and was followed by Japanese coast guard, and later sunk by the North Koreans saw a Chinese submarine intruding into the Japanese territorial waters. Also in 2004, a Japanese consul in Shanghai committed suicide, after being blackmailed by secret Chinese agent. China also wanted to break the two island chains, from Japan, Taiwan, the Philippines, with Okinawa at the critical point, as China tried to expand into ocean from a continent. In 2009, massive scale of cyber attacks was recorded in the U.S. and South Korea, including the Department of Defense (DOD), the U.S. Congress, the Treasury, the Department of Homeland Page 1 of 9
2 Security (DHS), Federal Trade Commission (FTC), New York Stock Exchange (NYSE), Washington Post, among others. Servers were slowed down during the attacks. These attacks are known as BOTNET Attacks. Although Japanese networks were not attacked, eight Japanese servers were involved in the attacks. Owners of the servers had no idea that their servers were used to attack other computers. It is very hard to find the real attackers. In 2010 cyber attack broke out between South Korea and Japan over the ice skating title dispute when Japanese girl lost the game. South Korean net users attacked Japan, because Japanese young people were upset and commented on BBS about the ice skating judgment, which angered the South Korean net users. This case showed that non-state groups can start attacks online. Who cares about the cyber security in Japan? They are the National Police Agency, Ministry of Defense, Cabinet Intelligence Research Office (CIRO), and National Information Security Center (NISC). Following these incidents, Mr. Hirano, Chief-Secretary of the Cabinet, said, We cannot deny the possibilities that we could be attacked. Cyber security is an important national security and crisis management issue. Thus, the Japanese government strengthens the National Information Security Center (NISC), which was established in 2005, with officials on loan from several ministries, and thus marking the Japanese policy change. The Japanese government issued Information Security Strategy for Protecting the Nation on May 11, 2010, as it realized that the large-scale cyber attack in the United States and South Korea particularly alerted Japan, and could be a threat to national security. According to Professor Tsuchiya, cyber attacks pose the following threats: Physical Damage to Infrastructures, Utilities, and Premises Financial Damage or Theft Psychological Damage or Demonstration Virtual Damage (Not Recognized, but Serious) Most of the times, it is difficult to identify who the real attackers are, following a massive international cyber attacking event. The Keio University professor then talked about geeks, both in Japanese and the United States societies. Despite their cultural differences between countries and governments, geeks should be brought in to protect us. Page 2 of 9
3 Tsuchiya said that geek is a peculiar or otherwise odd person, but our societies are increasingly dependent on computer geeks. He listed some of the most famous geeks, including Apple s CEO Steve Jobs, Microsoft founder Bill Gates, Google s founders Larry Page and Sergey Brin. Professor Motohiro Tsuchiya reminded the audience that technology affects national security, and our society is dependent on computer networks, and called for cooperation between Japan and the US, and the world on this issue. Professor Lance J. Hoffman, from Cyber Security Policy and Research Institute at the George Washington University in Washington D.C. presented his topic Cyber Security in the U.S.. After a brief introduction of threats and attacks in the telecommunication sector in the past century, Professor Hoffman pointed out that communication security has always been an issue, and in today s Internet Age, national security is a big concern, and therefore, for the first time, the United States issued a presidential statement on cyber-security on May 29, 2009 when President Obama said: We count on computer networks to deliver our oil and gas, our power and our water. We rely on them for public transportation and air traffic control. Yet we know that cyber intruders have probed our electrical grid and that in other countries cyber attacks have plunged entire cities into darkness. In short, America's economic prosperity in the 21st century will depend on cybersecurity. Cyber-security is now prominent on the policy radar screen. Professor Hoffman described the Comprehensive National Cybersecurity Initiative, outlining three Major Goals: (1) To establish a front line of defense against today s immediate threats; (2) To defend against the full spectrum of threats; (3) To strengthen the future cybersecurity environment. Despite increasing studies and research, and accelerated legislation on the matter, there are many issues that need more attention and further actions. Professor Hoffman cited material developed by his colleague Prof. Eva Vincze, that stated: 1. Cyberspace is a complex problem for the following reasons: (1) Cyber security is a collective concern that is comprehensive in scope the Internet has no national boundaries. (2) Security is typically regulated at the government level; (3) Cyber security is at once national, international, public and private in character; (4) It touches many domains business, finance, control systems for power, gas, drinking water and other utilities; airport and air traffic control systems, logistical systems, health care, government services, etc. Page 3 of 9
4 2. Technology alone is insufficient because (1) an interdisciplinary discussion with international stakeholders is necessary; (2) human factors must be considered; (3) laws, mores, and practices vary from country to country. It is imperative that countries develop improved lines of communication based on trust to discuss cyber security both within and among themselves. Professor Hoffman particularly discussed cyber crime, noting that according to the FBI estimates, the average loss for a technology-oriented crime is nearly $500,000, and, further, the added cost to the consumer is $100 to $150 per computer sale. Other estimates indicate that losses related to high-tech crimes in the United States are $10 billion to $15 billion per year. Major organized crime groups are known to be operating in over 30 countries spread across 6 continents. He analyzed the increasing cyber crimes citing the volatile combination of: Technically empowered segments of population With the capacity to conduct sophisticated criminal operation Limited economic opportunities to make an honest living Few policies/laws/investigative/prosecutorial focus on cybercrime. The George Washington professor cited that in the U.S. over 500,000 websites were successfully compromised in 2008; malicious intrusions were up 40%; services like Google Earth were reported to be used for several terrorist attacks; and in the developing world, foreign direct investment as a whole may eventually be affected by the safety and integrity of data networks available to investors in host countries. Professor Hoffman called for countries facing the dual challenge in integrating cyber-security, policy and law to maintain an environment that promotes efficiency, innovation, economic prosperity, and free trade, while also promoting safety, security, civil liberties, and privacy rights. Yet, the world community cannot avoid the dilemmas, because discussion has just begun, with difficulty in defining cyberspace is it a unique domain or part of a whole? Obviously, practice is out-distancing policy. Cyberspace developments happen rapidly and policy/law lag a lot behind. Responsibilities for cyber-security are distributed across a wide array of federal departments and agencies, many with overlapping authorities, none with sufficient decision authority to direct Page 4 of 9
5 actions that deal with often conflicting issues in a consistent way. Total 80% of information infrastructure is owned or managed by the private sector. Secrecy is costly, until fairly recently there has been lack of awareness of the gravity of the problem, and thus only recently has there been sufficient pressure on government to change. Transparency involves intangible costs and information sharing. We know there is a problem, and think it will get worse over time. But we don t know if proposed solutions will be effective. He cautioned the audience that new devices may be more easily hacked if security and privacy not sufficiently considered in their design. Professor Hoffman pointed out the dilemma for governments that wish to carry out surveillance of citizens, residents, and everyone, while maintaining privacy, free speech, and freedom and noted that there are no easy options for governments. He noted Internet monitoring in China, with more than 298M users. He also cited the recent Green Dam fiasco, where China originally proposed that all PCs sold in China would be required to install government-proved monitoring software. It s recently backed off to some extent on this, after widespread protests from many, including manufacturers. The George Washington professor also discussed unresolved legal Issues in cybersecurity that have privacy implications, like, when government is permitted to protect privately owned critical infrastructure; the use of automated attack detection and warning sensors; data sharing with third parties within the Federal government, among others. Mr. Tomohiko Yamakawa, Producer of NTT Corporation, Cyber Security Project, Research and Development Planning Department, delivered a speech titled "Industry Side Views of Cyber Security in Japan". He discussed the following ideas: (1) cyber security as a cost; (2) cyber security as a challenge, along with Computer Security Incident Response Team (CSIRT) activity (NTT-CERT) in Japan. He also discussed his observations on identifying "cyber attack", and called for global collaboration in cyber security. Regarding cyber security as a cost, Mr. Yamakawa said it is a cost for most business enterprises to implement governmental regulatory compliance. As a provider of IT Service and Information Systems, NTT provides service for government, critical Infrastructure (Telco, Finance, Electric Power supply, Gas, etc.), and business enterprises. Page 5 of 9
6 NTT is committed to ensure the secrecy of communication, information assurance, and personal DATA protection, as Japanese constitution guarantees it as basic human rights. The NTT cyber expert also see cyber security/threat as a threat or opportunity based on his observations, as the United States, under Obama administration, has initiated a leadership strategy in cyber security issues. As for Japan, he discussed CSIRT, which means Computer Security Incident Response Team, in response to and cope with vulnerabilities such as incident management, incident response, vulnerability management, and gradually, the idea of Cyber Defense emerged to protect customers from cyber attack, as NTT-CERT, as an incident coordination center for NTT group companies. Mr. Yamakawa said it is difficult to define Cyber attack clearly, as it may come in many different forms at the same time, such as Jack s PC is infected, Betty cannot access this website, Taro s website is not accessible, etc. Furthermore the intention of attacker is not clear whether he/she really intended to have unauthorized attack. The NTT expert reminded people of what happened in cyber attacks, or not, over the last few years, as Estonia in 2007, Georgia in 2008, Korea in 2009, and Google case in Therefore, global collaboration in cyber security is an urgent agenda on many aspects. Most executives, both in government and industry, recognize cyber security as most significant for management, and should be ready paying some money for cyber security, though what cyber security issues they may have are not clear yet; or they should invest in firewalls, virus identifier, certification for their own networks. On the operation level, Mr. Yamakawa called for your best doctor for cyber security at your hand to help identify the disease, give best medicine, and give best support, citing CSIRT as an example. Though policy framework of cyber security may differ in each country, there must be a common culture of cyber security in the world, sharing knowhow and expertise. In his speech, Mr. David Hoffman of Intel Corporation presented his talk titled: The Future of Computing which direction would computing evolution go at Intel. Among all computers in office, at home, or at coffee shop, and on a plane, we now see a great diversity, an ongoing evolution that people may have a device in their car, or in the air, with all data and applications to share information, with security and privacy being protected. Page 6 of 9
7 As commercial aviation became global in the 1940s, and since 1977s and 1980s, cost of commercial aviation has come down, and more people rely more on commercial aviation, but threats could distract aviation, like volcano in Iceland recently, which became a global issue. Similarly, people rely more on remote device for their daily life, in terms of managing their data, therefore providing a challenge and opportunities for Intel and others to protect the security in cyberspace. There are four different kinds of things to our attention: malware, hardware, operational system and application wares. David Hoffman said that last year (2009) over 6 million young participants competed at Intel Science and Education Fair competition. Over 6,000 finalists from 59 countries displayed their products in California to compete for the prize money of four million dollars, and so many of them have products all based on the Internet application and global structure. There was a time at Intel when we had design center in California, Europe, and Japan. Now design centers from around globe to collaborate on new products. The components we design, in decentralized environment, as Prof Hoffman mentioned, affect global supply chains, create global strategy, from India to China. Japanese government is in collaboration with the U.S. and EU for a coordinated policy in this regard. Commentator, Greg Nojeim from Center for Technology and Democracy, invited the panelists to address the three following questions. On the question of good geeks and bad geeks, how do we ensure that we have the best good geeks so they can prevent the bad geeks from harming us? The second question is who is the best doctor for cybersecurity the government or the private sector? It seems that there are three key cybersecurity players: the government, the private sector and consumers. Each plays a different role when it comes to healing a cybersecurity problem. What about the role government and consumers play to secure our cyber networks? Also, as we know the Internet has no national boundaries, all domains depend on the Internet. Securing everyone will be expensive. What kinds of costs should we prepare to bear? Hoffman at GW University: I like the idea of bad vs. good geeks. The Federal government is sponsoring scholars to engage in cyber security studies, and the sponsored scholars are to work for Page 7 of 9
8 the government for a number of years after completion of their studies. Industry needs their own people now and would benefit from a similar program. Yamakawa: It is sometimes difficult to tell good geeks from bad geeks in cyber space in Japan. Hoffman at Intel: Investment in cyber security is critical, as international collaboration is required, though some of the scholarships are not open to non-us citizens. Israeli government is doing a great job in this regard by sponsoring and recruiting experts in cyber security. Nojeim: Regarding the secrecy of communication, it is a Constitutional right in Japan, while in the U.S., 4 th Amendment also provides similar protection. But in other countries, like India, governments demand free access communications information from private business. For example, India recently demanded that RIM (Research In Motion) locate a server in India so the government there would be better able to gain access to private communications. How do we reconcile privacy issues and government actions in global context? Yamakawa: Different countries have different practice, while Japan, the U.S. and the EU have laws to protect privacy of communication, but in other countries, like in India, governments tend to try to have surveillance on mobile communication, like BlackBerry. Hoffman at Intel: To answer a question from audience regarding security from abroad into the U.S., it is different for the U.S. government toward U.S. citizen vs. non-us citizen, global context is difficult. Nojeim: The US Foreign Intelligence Surveillance Act permits the U.S. government to eavesdrop more readily on the communications of people who are not U.S. citizens or U.S. green card holders. The criminal law, which also permits some eavesdropping, does not draw a distinction between citizens and non-citizens. An international investor on the floor: I want to ask Mr. Yamakawa on privacy issues. Law enforcement uses GPS. For example, police tracks suspects who use an iphone. How is people s privacy protected? Another question for Intel. As chip creator, what is your responsibility and policies to protect your end users, when law enforcement agencies come in for information about the customers, with or without warrant? Yamakawa: Large corporations are likely to cooperate with law enforcement agencies, or jointly work with them on global issues. Hoffman at Intel: Large corporations, like Intel, depend on trust of customers to use our services, as we have a robust policy to guarantee safety of customer information; sometimes there are situations that we want law enforcement agency to help find out the problems facing us. Page 8 of 9
9 Question: In terms of the Internet cyber security, do you think China s firewall is making the security work easier or harder? Hoffman at GWU: It s tough enough at this moment, but will be harder to get all countries to agree to the same rule when it comes to punishment. This is why we need technical management, public policy experts, etc. He cited the George Washington University cyber security scholarship program where percent of the students are from non-technical studies in these areas (but do not graduate until they get enough technical expertise as well). Page 9 of 9
Cyber Security in the U.S.
Cyber Security in the U.S. Prof. Lance J. Hoffman Cyber Security Policy and Research Institute The George Washington University Washington DC 20052 lanceh@gwu.edu (1) 202 994-4955 Panel on Cyber Security
More information"Industry Side Views of cyber security in Japan"
"Industry Side Views of cyber security in Japan" Event 2: Cyber Security in East Asia and Policy Cooperation between Japan and the United States USJI-Week, September 7-10, 2010 US-Japan Research Institute
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationTUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
More informationS. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationNational Cyber Threat Information Sharing. System Strengthening Study
Contemporary Engineering Sciences, Vol. 7, 2014, no. 32, 1755-1761 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.411235 National Cyber Threat Information Sharing System Strengthening
More informationThank you for your very kind introduction.
AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.
More informationThe Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
More informationThe Department of Homeland Security The Department of Justice
The Department of Homeland Security The Department of Justice to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More informationPresidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,
More informationAN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH
AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view
More informationTestimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
More informationMicrosoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
More informationCybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge
Cybercrime Bedrohung, Intervention, Abwehr BKA-Herbsttagung vom 12. - 13. November 2013 Cybersecurity strategic-political aspects of this global challenge Full version Michael Daniel Special Assistant
More informationMyths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
More informationJOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
More informationConfrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
More informationViewpoint: Implementing Japan s New Cyber Security Strategy*
Presented by: The ACCJ s Internet Economy Task Force Valid Through November 2014 The 2013 Cyber Security Strategy, released in June 2013, and the International Strategy on Cybersecurity Cooperation, released
More informationExecutive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
More informationTestimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security
Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United
More informationCyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity
More informationthe Council of Councils initiative
Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global
More informationAnthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown
Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked
More informationKeynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
More informationTYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated
More informationREMARKS BY US PRESIDENT BARACK OBAMA ON SECURING THE NATION'S CYBER INFRASTRUCTURE
REMARKS BY US PRESIDENT BARACK OBAMA ON SECURING THE NATION'S CYBER INFRASTRUCTURE 29 May 2009 THE PRESIDENT: Everybody, please be seated. We meet today at a transformational moment -- a moment in history
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationThe European Response to the rising Cyber Threat
SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic
More informationBusiness-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY
B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov
More informationThe trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation
The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation
More informationPreventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
More informationFor Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
More informationS. 21 IN THE SENATE OF THE UNITED STATES
II 11TH CONGRESS 1ST SESSION S. 1 To secure the United States against cyber attack, to enhance American competitiveness and create jobs in the information technology industry, and to protect the identities
More informationCyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World
Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Moderator: Panelists: Honorable Preet Bharara, United States Attorney, Southern
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President
More informationNSA Surveillance, National Security and Privacy
NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM
More informationCyber Security Strategy(Information Security Policy Council, June 10, 2013)
Environmental Change Vision to aim as a Goal Basic Principles Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Areas of Efforts Increasing severity of the risk surrounding cyberspace
More informationPreventing and Defending Against Cyber Attacks October 2011
Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their
More informationKshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17
Japan's Changing Cybersecurity Landscape By: Nir Kshetri Kshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17 Made available courtesy of Institute
More informationIn an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
More informationworking group on foreign policy and grand strategy
A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established
More informationCyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
More informationI N T E L L I G E N C E A S S E S S M E N T
I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document
More informationKeynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
More informationInformation Security. CS526 Topic 1
Information Security CS 526 Topic 1 Overview of the Course 1 Today s Security News Today: 220 million records stolen, 16 arrested in massive South Korean data breach A number of online gaming & movie ticket
More informationEl Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
More informationHome Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
More informationCyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in
Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.
More informationAppendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
More informationHow To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
More informationLiability Management Evolving Cyber and Physical Security Standards and the SAFETY Act
Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act JULY 17, 2014 2013 Venable LLP 1 Agenda 1. Security Risks affecting the Maritime Transportation System (MTS) 2. The
More informationCybersecurity and United States Policy Issues
Global Security Studies, Summer 2014, Volume 5, Issue 3 Cybersecurity and United States Policy Issues Cristina Berriz Peace, War and Defense Program University of North Carolina at Chapel Hill Chapel Hill,
More informationWho s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
More informationThe main object of my research is :
The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is
More informationThe FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
More informationCyber Incident Annex. Cooperating Agencies: Coordinating Agencies:
Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice
More informationCorporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Perspectives On Cybersecurity: A Survey
More informationCLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for
More informationHealthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationResearch Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
More informationManaging the Unpredictable Human Element of Cybersecurity
CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151
More informationSecurity Basics: A Whitepaper
Security Basics: A Whitepaper Todd Feinman, David Goldman, Ricky Wong and Neil Cooper PricewaterhouseCoopers LLP Resource Protection Services Introduction This paper will provide the reader with an overview
More informationCyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
More informationIntegrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
More informationCybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
More informationPresenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations
TeleContinuity The Survivable Cyber Solution Presentation For Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations 2007 TeleContinuity, Inc.. All Rights
More informationSensitive Incident Investigations. Digital Risk Management. Forensics Testing.
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private
More informationHow To Protect Yourself From Cyber Crime
Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 c11173008 Cybersecurity: Authoritative
More informationCybersecurity in the Commonwealth: Setting the Stage
Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if
More informationNew York State Department of Financial Services. Report on Cyber Security in the Insurance Sector
New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial
More informationCYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR
CYBER-SURVEILLANCE BILL SET TO MOVE TO SENATE FLOOR July 28, 2015 The Senate is expected to consider the Cybersecurity Information Sharing Act (CISA, S. 754 1 ) on the Senate floor soon. The bill was marked
More informationCybersecurity Primer
Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers
More informationLessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
More informationGAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.
GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected
More informationCyber Security Where Do I Begin?
ISPE Automation Forum Cyber Security Where Do I Begin? Don Dickinson Project Engineer Phoenix Contact ..50% more infected Web pages Click in the on one last and three you months won t of notice 2008 than
More informationHow To Protect Your Computer From Attack
FREQUENTLY ASKED QUESTIONS on C Y B E R S E C U R I T Y By IEEE USA s Committee on Communications Policy December 2011 This Frequently Asked Questions (FAQs) was prepared by IEEE-USA s Committee on Communications
More informationTrends and Tactics in Cyber- Terrorism
Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends
More informationActions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
More informationTrends Concerning Cyberspace
Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming
More informationWRITTEN TESTIMONY BEFORE THE HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM
WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON COMMERCE, SCIENCE, & TRANSPORTATION HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM TESTIMONY
More informationJOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
More informationSharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Bruce Heiman K&L Gates September 10, 2015 Bruce.Heiman@klgates.com (202) 661-3935 Why share information? Prevention
More informationTHE WHITE HOUSE Office of the Press Secretary
FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly
More informationThe virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
More informationCyber Security Research and Development: A Homeland Security Perspective
Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders
More informationDriving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
More informationComparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills
April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote
More informationInto the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
More informationGood morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.
Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND
More informationIntegrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
More informationLegislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
More informationCyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
More informationGAO s High-Risk Program
GAO s High-Risk Program Mountains and Plains Intergovernmental Audit Forum September 1, 2015 William Reinsberg U.S. Government Accountability Office Outline Why was the High-Risk Program needed and what
More informationTestimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies
Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan
More information2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS
CYBER SECURITY WITHIN THE GLOBALIZATION PROCESS Milan PODHOREC University of Defence, Faculty of Economics and Management, Brno, Czech Republic The contribution focuses on the issue regarding security
More information