How To Protect Critical Infrastructure

Size: px
Start display at page:

Download "How To Protect Critical Infrastructure"

Transcription

1 Cybersecurity Strategy in Japan October 9th 2014 Yasu TANIWAKI Deputy Director-General National Information Security Center (NISC) Government of JAPAN

2 Big Data Society and Cybersecurity Open data Digitally stored knowledge M2M (streaming data) Personal data Collected and stored big data (static / dynamic) Increasing dependence of socioeconomic systems on IT More severe risks Dessemination of risks Globalization of risks Cyber Space 1

3 Sophisticated Attacks to Sensitive Information [Recent major cases] ~ [Mitsubishi Heavy Industries, Ltd. (MHI), House of Representative (HR) etc.] Found virus infection by targeted attacks [Japan Nuclear Energy Safety Organization (JNES)] Found possibility of information leakage over previous months [Ministry of Agriculture, Forestry and Fisheries of Japan (MAFF)] Announced attack case on TPP-related information leakage [Japan Aerospace Exploration Agency (JAXA)] Found unauthorized access to servers from outside 2013 autumn [Government agencies etc.] Found zero-day attack* causing particular entities to be infected by web browsing [Japan Atomic Energy Agency (JAEA)] Found possibility of information leakage by virus infection * Zero-day attack: Attack misuses unpatched or undisclosed security holes in software. [Threats to government s organizations] No. of threats detected through monitoring by sensors, etc.** No. of notices issued through monitoring by sensors, etc. FY 2011 FY 2012 FY 2013 Approx. 660,000 Approx. 1,080,000 Approx. 5,400, No. of warnings issued on suspicious s hrs & 365 days (10 times in a min.) ** No. of no normal accesses or communications among events detected by sensors installed in the ministries by the GSOC (abbreviation for Government Security Operation Coordination team) etc. 2

4 Attacks on Critical Infrastructures [No. of attacks on critical infrastructures] No. of info. Messages or reports* from critical infrastructures areas * Reports from the critical infrastructure operators to the NISC ** Reports concerning Cyber Attacks No. of received info. Messages*** about targeted attack , etc. FY 2012 FY 2013 Main Details 110 (76)** 153 (133) FY 2012 FY Unauthorized access,dos 121 Virus infection 7 Other intentional factors 5 *** Reports from the five industries (45 organizations), or critical infrastructure equipment manufacture, power, gas, chemistry and petroleum to Information-Technology Promotion Agency (IPA), Japan [Area of the Critical infrastructure] (1)Information and (6) Gas Communications (7) Gov t and (2) Finance Admin. Services (3) Aviation (4) Railways (5) Electricity (8) Medical Services (9) Water (10) Logistics (11) Chemistry (12) Credit Card (13) Petroleum **** These three sectors were added to the third action plan to security measures for critical infrastructures decided by the Information Security Policy Council (ISPC) on 19 th May

5 [Spread of smart phones etc.] Widespread Scope of Targets Household ownership rate increased five times rapidly* (End of 2010: approx. 10% -> End of 2012: approx. 50%) Illicit sites targeted at mobile devices increased twenty times rapidly (End of 2011: approx. 3 thousand -> End of 2013: approx. 57 thousand) * 2013 White Paper Information and Communications in Japan by the Ministry of Internal Affairs and Communications (MIC) Regarding the increase rate of illicit sites: Research by Trend Micro corp. ** Approaches for Vehicle Information Security (August 2013) by Information-technology Promotion Agency (IPA), Japan *** Handout at 14 th Study group for Smart Meter system, by the Ministry of Economy, Trade and Industry(METI) [Penetration throughout all of society in Japan] 4

6 Attacks from a Variety of Entities in the World [Attacks on Japan from Overseas] Geological location of IP addresses used by malware (2013)* Japan 3% 97% of malware tried to connect to oversea servers. Overseas 97% [Recent major cases] [Korea] DDoS attacks to 40 web servers of government agencies etc Attack commands issued using home PCs in Japan as bots (Reference) [Korea] Large-scale cyber attacks to critical infrastructures Same malicious program concurrently found in Japan [US] The US government points out the possibility of the involvement of foreign governments or militaries in targeted attacks made to steal national or corporate secrets** * Source: National Police Agency of Japan (Feb. 2014) ** Source: The Administrative Strategy on Mitigating the Theft of U.S. Trade Secrets (White House, February 2013) & the Annual Report to Congress (Department of Defense, May 2013) 5

7 Global Risks in the World (Jan 2014, WEF) Most Potentially Impactful Risks Financial crises Critical information infrastructure breakdown Water crises Climate change Cyber attacks Unemployment and underemployment Extreme weather events Income disparity The deepening reliance on the Internet to carry out essential tasks and the massive expansion of devices that are connected to it, make the risk of systemic failure on a scale capable of breaking systems or even societies greater than ever in 2014, according to the report.. Most Likely Risks Notes: The above dot chart has been a result of surveys made by 700 or more experts around the world with respect to the perspective of 31 risks extracted from the viewpoint of significant impact on all the people and all the industries in the world in the coming ten years. The number 1 indicates the absence of possibility of risk occurrence or a low level of impact while the number 7 indicates a high possibility of risk occurrence or a high level of serious and disruptive impact. <Source: WEF s Global Risks 2014 (January 16, 2014)> 6

8 History of Cybersecurity Strategy FY Individual efforts by each agency Focused on responding to cyber incidents Construction of comprehensive infrastructure for counteracting cyber incidents Risk-based approach Active cyber security measures against cyber attacks Responding to new environmental changes IT Strategy e-japan Strategy e-japan Strategy II New IT Reform Strategy i-japan Strategy New Strategy on Information and Communications Technology Declaration to be the World s Most Advanced IT Nation (IT Strategic Headquarters, June 2013) Cyber Security Strategy Cybersecurity Strategy (ISPC, June 2013) Mid/longterm Plan Annual Plan First National Strategy on Information Security Realizing Secure Japan Information Security Strategy for Protecting the Nation ISPC, May Second National Strategy on Information Security Toward Strong Individual and Society in IT era Measures for the Government Guidelines for the Forrmulation of Information Security Policies Standards for Information Security Measures for the Central Government Computer System 1st~4th ed Management Standards for Information Security Measures for the Central Government Computer System , revised Common Standards (ISPC,May 2014) Critical Infrastructure Protection Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure Action Plan on Information Security Measures for Critical Infrastructure The Second Action Plan on Information Security Measures for Critical Infrastructures , revised The Third Action Plan (ISPC,May 2014) 7

9 Framework for Information Security Policies Strategic Headquarters for the Promotion of an advanced Information and Telecommunications Network Society (IT Strategic Headquarters) Director-General: Prime Minister Vice Director-Generals: Minister in charge of Information Technology (IT) Policy Chief Cabinet Secretary Minister of Internal Affairs and Communications Minister of Economy, Trade and Industry Members: All other Ministers of State Government Chief Information Officer (CIO) Experts (Secretariat) IT Policy Office, Cabinet Secretariat Office chief (Government CIO) Ministries responsible for critical infrastructure Financial Services Agency financial Organizations Ministry of Internal Affairs and Communications local governments, information and communication Ministry of Land, Infrastructure, Transport and Tourism railroads, aviation, distribution Critical infrastructure businesses, etc. (Established May 30, 2005 by a decision of the Director-General of IT Strategic Headquarters) Chair: Chief Cabinet Secretary Deputy Chair: Minister in charge of Information Technology (IT) Policy Members: Chairman of the National Public Safety Commission Minister of Internal Affairs and Communications Minister of Foreign Affairs Participation Minister of Economy, Trade and Industry by Cabinet Minister of Defense ministers Experts (7 people) Critical infrastructure special councils Human resources expert committee for dissemination and enlightenment Technological strategy special committee Information security measures promotion committee (Secretariat) National Information Security Center (NISC) Director-General (Assistant Deputy Chief Cabinet Secretary (Situations Response and crisis management)) Deputy Director-General Information security Assistant Government Security Operation Coordination team GSOC Cyber Incident Mobile Assistant Team (CYMAT) Government organizations (each government ministry) National Police Agency Ministry of Internal Affairs and Communications Cooperation Ministry of Health, Labour and Welfare medicine, water supply Ministry of Economy, Trade and Industry electricity, gas, chemistry, credit, petroleum Information Security Policy Council Ministry of Foreign Affairs Ministry of Economy, Trade and Industry Ministry of Defense Companies Individuals 8

10 Main Efforts based on the Cybersecurity Strategy (June 2013) Government Organizations, Independent Administrative Organizations, etc. Critical Infrastructure Industries Enterprises, Individuals Resilient Cyberspace (Strengthening protection) Review of the Common Standards for Information Security Measures for the Central Government Computer Systems and establishment of the methods of risk assessment in order to protect sensitive information Strengthening GSOC, accurate and quick response through cooperation with CYMAT and CSIRT Conducting incident response drills, specifying roles of related organizations such as the police and the Self Defense Forces Measures for new threats pursuant to new services, including SNS and group mail Review of the Action Plan including expanding the scope of critical infrastructure and review of the Safety Standards Strengthening information sharing with government organizations and system vendors, etc. Cross-sector exercises for ensuring business continuity Building a platform for evaluation and authentication of such systems as control systems used by critical infrastructure, in compliance with international standards Measures for malicious smartphone applications Information Security Awareness Month February, Founding a Cyber Security Day Revision of the Information Security Outreach and Awareness Program (Information Security Policy Council, 2011) Promotion of investment in security by small and medium-sized businesses, through incentives such as tax systems Measures by IT-related businesses including notifying malware infection to individuals by ISPs Ensuring the traceability of cyber crimes, such as by examining the way to store logs Vigorous Cyberspace (Fundamentals) Revision of the Information Security Human Resource Development Program (Information Security Policy Council, 2011) Review of the Information Security Research and Development Strategy (Information Security Policy Meeting, 2011) Worldleading Cyberspace (international strategy) Formulation of the International Strategy October 2013 Japan-US Japan-UK Japan-India Japan-EU Japan-ASEAN Conferences on International Rulemaking in Cyberspace IWWN (*1) MERIDIAN (*2)(2014 in Japan) *1 Promoting international measures related to vulnerabilities, threats, and attacks in cyberspace. Participation by government organizations and CSIRTs from countries such as the US, Germany, the UK, and Japan. *2 Sharing best practices for the protection of critical infrastructure, exchanging information on measures such as international cooperation. Participated by government officials in charge of protecting critical infrastructure from countries such as the US, the UK, Germany, and Japan Joint awareness raising activities October Organization al Reform Strengthening NISC functions (Reorganizing to Cybersecurity Center (tentative name): targeted for fiscal 2015) 9

11 Common Standards for Government Agencies Common Standards of Information Security Measures for Government Agencies (hereinafter the Common Standards ) is a common framework to ensure the level of information security for all the ministries. Each ministry develops its own security policy on the basis of the Common Standards and implement it through the master plan. Information Security Policy Council Decides and revises the Common Standards Directs the implementation by the ministries and advises to improve Committee of CISOs National Information Security Centre (NISC) Oversees objectively and uniformly the status of information security Develops/revises guidelines for the Common Standards Common Standards Direction Advices PDCA Status of implementation Incident information Oversees the status Helps incident handling Each ministry Plan Develops the security policy and the implementation plan PDCA Do Training Technical measures Other measures Check / Act Review/audit Improvement Evaluation/revise Re-allocation of resources Improvement of the information security of the ministries (Past) Level of information security (Now) Level of information security Required as a minimum Actual level A B C D E F Ministries Additional improvements A B C D E F Ministries Bottom up 10

12 Implementing a multi-layer protection scheme to counter targeted attacks Targeted attack The attack process 1 Initial infiltration A targeted e- mail sent Internet Attacker 3 秘 秘 Confidential 2 Expansion of invaded areas 3 Theft of information Countermeasures with the information system design Ministry A 1 Purpose To block an attack and prevent the expansion of invaded areas Policy A system design which is difficult for attackers to search and explore the system by hacking technologies A system design which is hard for attackers to takeover the devices Attacker 2 秘 秘 Confidential Monitor the sign of attacks, and identify and detect it at an early stage Record a trace of attacks, mainly that of unsuccessful ones Set up a trap to identify and detect the attacker s invasion Constantly monitor the above operations 11

13 The Third Edition of the Action Plan on Information Security Measures for Critical Infrastructures Critical Infrastructure (13 Sectors) Information and Communications Finance Aviation Railways Electricity Gas Government and Coordination and Administrative Services Cooperation Medical Services by NISC Water Logistics Chemistry Credit Card Added in May 2014 Petroleum Critical Infrastructure Sector-Specific Ministries FSA [Finance] MIC [Telecom and Local Gov.] MHLW [Medical Services and Water] METI [Electricity, Gas, Chemistry, Credit and Petroleum] MLIT [Aviation, Railway and Logistics] Related Organizations etc. Information Security Related Ministries Law Enforcement Ministries Disaster Management Ministries Other Related Organizations Cyberspace Related Operators (1) Maintaining security principles The Cybersecurity Strategy (The Third Action Plan for Information Security of Critical Infrastructure) (2) Enhancing information sharing systems (3) Incident response team (4) Risk management (5) International cooperation 12

14 Information Sharing among CIIP Players Capability for Engineering of Protection, Technical Operation, Analysis and Response. Functions which provide information sharing and analysis at CII operators, and organizations which serve as these functions. Council The council composed of representatives of each which carries out information sharing between s. An independent body, not positioned under other agencies, including government organizations. (telecom sector: telecommunication) (financial sector: Securities services) (electric power supply sector) (logistics sector) Council steering committee secretariat (NISC) WG WG WG (telecom sector: CATV) (financial sector: Life insurance) (gas supply sector) (chemical sector) (telecom sector: Broadcasting) (financial sector: General insurance) (administrative sector) (credit card sector) Image of corp.a corp.b corp.c (financial sector: Banking) (aviation sector) (water sector) (petroleum sector) org D org E org F CII operators Observer of Council (railway sector) (medical sector) Japan Business Federation / Keidanren Bank of Japan FISC Japan Post Bank NICT IPA JPCERT/CC FSA MIC MHLW METI MLIT 13

15 Establishment of CSSC (Control System Security Center) In March 2012, CSSC was established as a Research Association, which headquarters is located in Tagajo City of Miyagi Prefecture. 25 members (eg. Mitsubishi Heavy Industries, Ltd., NEC, or Informationtechnology Promotion Agency (IPA), National Institute of Advanced Industrial Science and Technology (AIST). CSSC s testbed is composed of 9-types of simulated plants and it is capable to organize cybersecurity hands-on exercises which simulate cyber attacks. CSSC has started its operation since April CSSC promotes R&D, International Standardization, making evaluation/certification platform (by utilizing IEC62443), capacity building (cyber exercises) and awareness raising. It also collaborates with distinguished organizations such as Tohoku-University and DHS. In April 2014, CSSC became a certification body of security certification called EDSA following the US (first in Asia). As confirmed by the MRA, certification in Japan becomes automatically certified in US. 14

16 Importance of Global Partnership in Cyber Space Cyberspace is recognized as global commons. International Laws are applicable to cyber space. International law, and in particular the Charter of the United Nations, is applicable and is essential to maintaining peace and stability and promoting an open, secure, peaceful and accessible ICT environment. (Source) UN General Assembly, Group of Governmental Experts on Development in the Field of Information and Telecommunications in the Context of International Security (June 2013) Cybersecurity is one pillar of national security strategy. Internet freedom --- Free flow of information should be ensured. --- Excessive intervention by the government to cyber space should be avoided. 15

17 Households with Internet Access in the World (Source) ITU Measuring the Information Society (October 2013) 16

18 International Strategy on Cybersecurity Cooperation (October 2013) 1. Implementation of dynamic responses to cyber incidents 1) Enhancing multi-layered mechanism for information sharing 2) Appropriate response to cybercrime [Priority Areas] Building a mechanism for international cooperation and partnership for global response to expanding cyberspace 3) Establishing framework of cooperation for international security in cyberspace 2. Building up fundamentals for dynamic response Raising the cybersecurity standard of basic capability and response mechanisms at the global level 1) Support for building a global framework for cyber hygiene 2) Promotion of awareness-raising activities 3) Enhanced research and development through international cooperation 3. International rulemaking for cybersecurity Promoting international rulemaking for ensuring stable use of cyberspace 1) Formulation of international standards of technology 2) International rulemaking 17

19 1. Asia Pacific International Strategy on Cybersecurity Cooperation (October 2013) Close cooperation with the Asia Pacific region is crucial due to geographical proximity and close economic ties Continuing to strengthen the relationship with the ASEAN through: Policy dialogues such as ASEAN-Japan Ministerial Meeting on Cybersecurity Cooperation, ASEAN- Japan Information Security Policy Meeting, and ASEAN-Japan Ministerial Meeting on Transnational Crime Promoting initiatives such as capacity building for human resources development Promoting joint projects such as JASPER and TSUBAME Promoting Japan-India Cyber Dialogue 2. U.S. and Europe [Regional Initiatives] Deepening partnership with the U.S. centered on the Japan-U.S. Security Arrangements Strengthening cooperation with European countries 3. Other regions Extending cooperation to countries in regions such as South America and Africa where the use of cyberspace has rapidly progressed. 4. Multilateral frameworks Actively contributing to international rulemaking of cybersecurity 18

20 Cybersecurity Basic Act (draft) Cabinet Submission of Cybersecurity Strategy to a Cabinet meeting for approval The Prime Minister Formulates a draft CSS Offers opinions on direction and supervision of ministries IT Strategic HQs 1 Formulates the priority plan for establishing an Advanced Information and Telecommunications Network Society (AITNS) and its implementation. 2 In addition, deliberates to plan important policies for establishing AITNS and its implementation Some of these responsibilities will be entrusted to the Government CIO. Legislation required to enable the Cabinet Secretariat to appropriately address these functions. Views on CSS Cybersecurity Strategic Headquarters 1 Formulate the Cybersecurity Strategy (CSS) And its implementation 2 Formulate common standards for information security measures for national administrative organs and incorporated administrative agencies. Evaluate(including audit) and promote the implementation of such measures 3 Evaluate the measures taken by national administrative organs in the event of significant cybersecurity incidents (including examinations for cause). 4 In addition, perform the following functions: a. Research and deliberate on the planning of major cybersecurity policies; b. Formulate: inter-governmental implementation plan for such major policies; the national administrative organs expense budgeting plan for cybersecurity; guidelines on the implementation of such policies. Promote and evaluate these policies. c. Lead comprehensive coordination of cybersecurity policies. Recommendations Obligated to submit materials, etc. Report collection about measures based on the recommendation National Administrative Organizations, etc. Views on CSS Makes an effort to satisfy the request National Security Council Flexible and substantial discussions on foreign and defense policies related to national security. Discussion on important issues regarding national defense: e.g. measures against an armed attack situation. Responsive discussions on important issues regarding measures against critical incidents; provide advice about what measures the Gov. should take. Local governments, Independent Administrative Agencies, National Universities, Corporations with special semigovernmental status, Relevant organizations, etc. May request HQs cooperation (e.g. provision of information, etc.) Local governments 19

21 Recent Efforts on Cybersecurity Strategy (Summary) Cybersecurity Strategy (June 2013) Resilient Cyberspace - Strengthening protection - Revision of the Standards for Information Security Measures for the Central Government Computer Systems (May 2014) Issuing the Third Edition of the Action Plan on Information Security Measures for Critical Infrastructures (May 2014) Vigorous Cyberspace - Building fundamentals - Revision of the Information Security Human Resource Development Program (May 2014) Revision of the Information Security Research and Development Strategy (July 2014) World-leading Cyberspace - International Strategy - Issued International Strategy on Cybersecurity Cooperation j-initiative for Cybersecurity (October 2013) ASEAN-Japan Commemorative Summit Meeting (held in December 2013) Organizational Reform Issuing Annual Report on Cybersecurity (July 2014) Strengthening the function of NISC (scheduled in FY2015) 20

22 Policy Agenda on Cybersecurity towards 2020 The Defence in Depth system needs to be established to counter targeted attacks. Necessary measures have been promoted by the government agencies. Information sharing framework among critical infrastructure operators needs to be enhanced. International collaboration and human resources development aiming to strengthen information security of the Control System is necessary. Promoting utilization and application of the ICT in various fields, and strengthening its security are the two wheels of a cart. In particular the security standards in a cloud computing environment should be urgently clarified. Measures to ensure security across various fields in an IoT environment need to be considered. Security enhancement through global collaboration, such as strengthening the multinational frameworks including the UN and OECD, and bilateral policy discussions, is required. Preparation for the Tokyo Olympic Games in 2020 as a milestone for cybersecurity enhancement. 21

23 Towards Confidence Building in the World Voluntary confidence-building measures can promote trust and assurance and help reduce the risk of conflict by increasing predictability and reducing misperception. They can make an important contribution to addressing the concerns of States over the use of ICTs by States and could be a significant step towards greater international security. States should consider the development of practical confidence-building measures to help increase transparency, predictability and cooperation. (Source) UN General Assembly, Group of Governmental Experts on Development in the Field of Information and Telecommunications in the Context of International Security (June 2013) 22

24 Thank you! 23

Cybersecurity Strategy in Japan

Cybersecurity Strategy in Japan Cybersecurity Strategy in Japan Jan 21, 2015 Hiroshi Kawaguchi, CISSP Little earth Corporation Co., Ltd. Chief Evangelist hiroshi.kawaguchi @ lac.co.jp What is this? 2 Global Risks 2014 http://www3.weforum.org/docs/wef_globalrisks_report_2014.pdf

More information

Cyber Security in Japan (v.2)

Cyber Security in Japan (v.2) Cyber Security in Japan (v.2) Ryusuke Masuoka (masuoka@cipps.org) and Tsutomu Ishino (ishino@cipps.org) Cyber Security Policy Research Team Center for International Public Policy Studies (CIPPS) December

More information

International Strategy on Cybersecurity Cooperation

International Strategy on Cybersecurity Cooperation 資 料 9-2 International Strategy on Cybersecurity Cooperation - j-initiative for Cybersecurity - October 2, 2013 Information Security Policy Council Contents 1 Objectives 1 2 Basic Principles 2 2.1 Ensuring

More information

Cyber Security Strategy(Information Security Policy Council, June 10, 2013)

Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Environmental Change Vision to aim as a Goal Basic Principles Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Areas of Efforts Increasing severity of the risk surrounding cyberspace

More information

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency 1 Challenge for Cyber Security in Financial Sector (1) Necessity to Strengthen

More information

Information Security 2012

Information Security 2012 Information Security 2012 July 4, 2012 Information Security Policy Council Contents I Preface... - 2 - II Changes in the Environment Surrounding Information Security. - 3 - III Basic Lines... - 9 - (1)

More information

Preventing & Mitigating Potential Threats at Large-Scale Events: A look at past & future plans involving the Olympics & Super Bowl

Preventing & Mitigating Potential Threats at Large-Scale Events: A look at past & future plans involving the Olympics & Super Bowl Preventing & Mitigating Potential Threats at Large-Scale Events: A look at past & future plans involving the Olympics & Super Bowl 13:30-14:30, Wednesday, 16 September 2015 The World Bank D.C. Headquarters,

More information

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

Provisional Translation

Provisional Translation Provisional Translation 1 2 It has been 8 years since the National Information Security Center (NISC) was established in the Cabinet Secretariat in April of 2005 and the Information Security Policy Council

More information

The Second Action Plan on. Information Security Measures for. Critical Infrastructures. Safety as a matter of course for our daily lives

The Second Action Plan on. Information Security Measures for. Critical Infrastructures. Safety as a matter of course for our daily lives The Second Action Plan on Information Security Measures for Critical Infrastructures Safety as a matter of course for our daily lives - Safe and secure social infrastructure for everybody - February 3,

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Viewpoint: Implementing Japan s New Cyber Security Strategy*

Viewpoint: Implementing Japan s New Cyber Security Strategy* Presented by: The ACCJ s Internet Economy Task Force Valid Through November 2014 The 2013 Cyber Security Strategy, released in June 2013, and the International Strategy on Cybersecurity Cooperation, released

More information

Development of Technology for Detecting Advanced Persistent Threat Activities

Development of Technology for Detecting Advanced Persistent Threat Activities FOR IMMEDIATE RELEASE Development of Technology for Detecting Advanced Persistent Threat Activities Visualizing correlations among hosts having suspicious activities to detect attacks such as stealth malware

More information

CSMS. Cyber Security Management System. Conformity Assessment Scheme

CSMS. Cyber Security Management System. Conformity Assessment Scheme CSMS Cyber Security Management System Conformity Assessment Scheme for the CSMS Certification Criteria IEC 62443-2-1:2010 Cyber Security Management Syste 1 Purpose of the CSMS Conformity Assessment Scheme

More information

Information Security Outreach and Awareness Program. July 8, 2011 Established by the Information Security Policy Council

Information Security Outreach and Awareness Program. July 8, 2011 Established by the Information Security Policy Council Information Security Outreach and Awareness Program July 8, 2011 Established by the Information Security Policy Council Table of contents 1. Preface... 3 2. People and enterprise awareness of information

More information

Cloud Services in Japan

Cloud Services in Japan Cloud Services in Japan November 2011 Kazutaka NAKAMIZO ICT Strategy Policy Division Global ICT Strategy Bureau Ministry of Internal Affairs and Communications(MIC), JAPAN Size of cloud services 1 - In

More information

MIC s Efforts on Cybersecurity Human Resource Development

MIC s Efforts on Cybersecurity Human Resource Development ASEAN-Japan Cyber Security International Symposium MIC s Efforts on Cybersecurity Human Resource Development October 9 th 2014 Yuji NAKAMURA Director for the ICT Security Strategy, Ministry of Internal

More information

Global Cybersecurity Index Good Practices

Global Cybersecurity Index Good Practices AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

Trends Concerning Cyberspace

Trends Concerning Cyberspace Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming

More information

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

Initiative for Cyber Security Information sharing Partnership of Japan (J-CSIP) Annual Activity Report FY2012

Initiative for Cyber Security Information sharing Partnership of Japan (J-CSIP) Annual Activity Report FY2012 Initiative for Cyber Security Information sharing Partnership of Japan (J-CSIP) Annual Activity Report FY2012 IT SECURITY CENTER (ISEC) INFORMATION-TECHNOLOGY PROMOTION AGENCY, JAPAN Initiative for Cyber

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Working Towards the 2020 Tokyo Olympics

Working Towards the 2020 Tokyo Olympics Working Towards the 2020 Tokyo Olympics - The Current Situation in 2015 Mariko Miya Cyber Defense Institute, Inc. miya@cyberdefense.jp Agenda 1. Introduction 2. The current situation in Japan 2015 Analytics

More information

Korea s s Approach to Network Security

Korea s s Approach to Network Security Korea s s Approach to Network Security 21 May 2002 Cha, Yang-Shin Ministry of Information and Communication 1 Contents Advancement in the Information Society and New Threats Information Infrastructure

More information

The Challenge of Raising Business Value through Objective Evaluation of IT Security, & Japan s IT Security Policy

The Challenge of Raising Business Value through Objective Evaluation of IT Security, & Japan s IT Security Policy Ministry of Economy, Trade and Industry The Challenge of Raising Business Value through Objective Evaluation of IT Security, & Japan s IT Security Policy September 28, 2005 TANABE, Takefumi Deputy Director,

More information

Introduction of the GCCD. (Global Cybersecurity Center for Development)

Introduction of the GCCD. (Global Cybersecurity Center for Development) Introduction of the GCCD (Global Cybersecurity Center for Development) Contents Ⅰ Ⅱ Ⅲ Ⅳ Ⅴ Ⅵ Ⅶ Background Vision Roles and Responsibilities Organizational Structure and Facilities Partnership Plan GCCD

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Information security education for students in Japan

Information security education for students in Japan Information security education for students in Japan Introduction This article aims to introduce the current situation of elementary and secondary school education on information security in Japan, as

More information

INCO for Cyber Security. PTCIF: 21st Feb 2014

INCO for Cyber Security. PTCIF: 21st Feb 2014 INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.

More information

Information Security Human Resource Development Program

Information Security Human Resource Development Program Information Security Human Resource Development Program July 8, 2011 Information Security Policy Council 0 Table of contents 1. Preface... 3 2. Current status and issues concerning information security

More information

How To Prevent Cyber Crime

How To Prevent Cyber Crime , pp.13-20 http://dx.doi.org/10.14257/ijsia.2015.9.2.02 An International Comparative Study on Cyber Security Strategy Kyoung-Sik Min, Seung-Woan Chai and Mijeong Han Korea Internet & Security Agency kyoungsik@kisa.or.kr,

More information

20, 1994. Service on Feb. 20, 1994.

20, 1994. Service on Feb. 20, 1994. DEPARTMENT OF AGRICULTURE Agricultural Cooperative Service Agricultural Marketing Service Agricultural Research Service Agricultural Stabilization & Conservation Service Animal & Plant Health Inspection

More information

Basic Law on Intellectual Property (Law No.122 of 2002) (Provisional Translation)

Basic Law on Intellectual Property (Law No.122 of 2002) (Provisional Translation) Basic Law on Intellectual Property (Law No.122 of 2002) (Provisional Translation) Table of Contents Chapter I General Provisions (Articles 1 to 11) Chapter II Basic Measures (Articles 12 to 22) Chapter

More information

National Cyber Security Strategy of Afghanistan (NCSA)

National Cyber Security Strategy of Afghanistan (NCSA) Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA

More information

ASEAN s Cooperation on Cybersecurity and against Cybercrime

ASEAN s Cooperation on Cybersecurity and against Cybercrime ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms

More information

Nuclear Safety Regulation Reform in Japan

Nuclear Safety Regulation Reform in Japan Nuclear Safety Regulation Reform in Japan 18th January 2012 Shuichi KANEKO Cabinet Secretariat Government of JAPAN 1 Contents Background of the Reform Process of the Reform Basic System for Nuclear Safety

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

Emerging risks for internet users

Emerging risks for internet users Sabeena Oberoi Assistant Secretary, Cyber Security and Asia Pacific Branch Department of Broadband, Communications and the Digital Economy Government s role - DBCDE The new Australian Government Cyber

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

Infocomm Security Masterplan 2

Infocomm Security Masterplan 2 INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm

More information

Policies and Practices on Network Security of MIIT

Policies and Practices on Network Security of MIIT 2011/TEL43/SPSG/WKSP/004 Policies and Practices on Network Security of MIIT Submitted by: China Workshop on Cybersecurity Policy Development in the APEC Region Hangzhou, China 27 March 2011 Policies and

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

Harmful Interference into Satellite Telecommunications by Cyber Attack

Harmful Interference into Satellite Telecommunications by Cyber Attack Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl

More information

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia helmi.rais@ansi.tn helmi.rais@gmail.com Framework

More information

Romanian National Computer Security Incident Response Team CERT-RO. dan.tofan@cert-ro.eu http://www.cert-ro.eu

Romanian National Computer Security Incident Response Team CERT-RO. dan.tofan@cert-ro.eu http://www.cert-ro.eu Romanian National Computer Security Incident Response Team CERT-RO dan.tofan@cert-ro.eu http://www.cert-ro.eu About A Digital Agenda for Europe, Pillar : Trust and Security, Action 38 Member States to

More information

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Fujitsu Group s Information Security

Fujitsu Group s Information Security Fujitsu Group s Information Under the corporate governance system, the Fujitsu Group promotes appropriate information management and information usage according to Group rules, as part of risk management.

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

PACB One-Day Cybersecurity Workshop

PACB One-Day Cybersecurity Workshop PACB One-Day Cybersecurity Workshop WHAT IS CYBERSECURITY? PRESENTED BY: JON WALDMAN, SBS CISA, CRISC 1 Contact Information Jon Waldman Partner, Senior IS Consultant CISA, CRISC Masters of Info Assurance

More information

Verification Report. (Summary)

Verification Report. (Summary) Yoshiharu Ueki, Representative Director & President, Japan Airlines Co., Ltd., Verification Report (Summary) January 14, 2015 of Independent Executives Concerning the Theft of Customer Information 1 Chapter

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK

More information

Cybersecurity: Taking Stock and Looking Ahead

Cybersecurity: Taking Stock and Looking Ahead Cybersecurity: Taking Stock and Looking Ahead 30 April 2014 Tomas Lamanauskas Head, Corporate Strategy Division International Telecommunication Union 1 Context 2 Different Perspectives of Cybersecurity

More information

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For

More information

Action Plan for Promoting Trilateral Cooperation among the People's Republic of China, Japan and the Republic of Korea

Action Plan for Promoting Trilateral Cooperation among the People's Republic of China, Japan and the Republic of Korea Japan-China-ROK Trilateral Summit Action Plan for Promoting Trilateral Cooperation among the People's Republic of China, Japan and the Republic of Korea December 13, 2008 Since the 1st Trilateral Summit

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

ITU Global Cybersecurity Agenda (GCA)

ITU Global Cybersecurity Agenda (GCA) International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,

More information

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND

More information

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka Overview of ITU Cybersecurity Activities NGN Migration Strategies and Access Modernization 26 May 2011 Dhaka Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific 1 Agenda Why Cybersecurity?

More information

Cyber Security Threats and Countermeasures

Cyber Security Threats and Countermeasures GBDe 2006 Issue Group Cyber Security Threats and Countermeasures Issue Chair: Buheita Fujiwara, Chairman, Information-technology Promotion Agency (IPA), Japan 1. Overview Cyber security is expanding its

More information

Making our Cyber Space Safe

Making our Cyber Space Safe Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework

More information

US-CERT Overview & Cyber Threats

US-CERT Overview & Cyber Threats US-CERT Overview & Cyber Threats National Cyber Security Division United States Computer Emergency Readiness Team June 2006 Agenda Introduction to US-CERT Overview of why we depend on a secure cyberspace

More information

EU policy on Network and Information Security and Critical Information Infrastructure Protection

EU policy on Network and Information Security and Critical Information Infrastructure Protection EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3

More information

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

Cybersecurity @ ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int. www.itu150.org

Cybersecurity @ ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int. www.itu150.org Cybersecurity @ ITU Carla Licciardello Policy Analyst Carla.licciardello@itu.int www.itu150.org Where are we coming from Specialized agency of the UN for telecommunications and ICTs Some more info about

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Australian Government Cyber Security Review

Australian Government Cyber Security Review Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and

More information

G7 Opportunities for Collaboration

G7 Opportunities for Collaboration ANNEX G7 Opportunities for Collaboration To strengthen international cooperation and collaboration and to achieve the actions in the G7 ICT Ministers Joint Declaration, G7 members seek to share information

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY

REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY REPUBLIC OF MAURITIUS 5555555555555555555555555555555555555555555555555555555555 5555555555555555555555555555555555555555555555555555555555 NATIONAL CYBER SECURITY STRATEGY 2014-2019 The time has come

More information

REPUBLIC OF POLAND Ministry of Administration and Digitisation, Internal Security Agency CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND

REPUBLIC OF POLAND Ministry of Administration and Digitisation, Internal Security Agency CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND REPUBLIC OF POLAND Ministry of Administration and Digitisation, Internal Security Agency CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND REPUBLIC OF POLAND Ministry of Administration and Digitisation,

More information

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions

More information

Human Resources Development in the Field of Cyber Security

Human Resources Development in the Field of Cyber Security Human Resources Development in the Field of Cyber Security October 2014 Masayuki KOIKE Director, Local Informatization and Human Resource Development Office, Information Service Industry Division, Commerce

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In

More information

CSCAP MEMORANDUM NO. 24 Safety and Security of Vital Undersea Communications Infrastructure

CSCAP MEMORANDUM NO. 24 Safety and Security of Vital Undersea Communications Infrastructure CSCAP MEMORANDUM NO. 24 Safety and Security of Vital Undersea Communications Infrastructure A Memorandum from the Council for Security Cooperation in the Asia Pacific (CSCAP) May 2014 Council for Security

More information

Statement for the Record. Dr. Andy Ozment Assistant Secretary, Cybersecurity and Communications U.S. Department of Homeland Security

Statement for the Record. Dr. Andy Ozment Assistant Secretary, Cybersecurity and Communications U.S. Department of Homeland Security Statement for the Record Dr. Andy Ozment Assistant Secretary, Cybersecurity and Communications U.S. Department of Homeland Security Before the United States House of Representatives Committee on Homeland

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

Contact Points on Government Procurement as of January 1, 2005

Contact Points on Government Procurement as of January 1, 2005 Contact Points on Government Procurement as of January 1, 2005 A. Entities Covered by the Agreement on Government Procurement House of Representatives Accounts Div., General Affairs 03(3581)5111 2323 House

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Financial Sector Cybersecurity: who s in charge? Aquiles A. Almansi Lead Financial Sector Specialist WBG-Finance & Markets

Financial Sector Cybersecurity: who s in charge? Aquiles A. Almansi Lead Financial Sector Specialist WBG-Finance & Markets Financial Sector Cybersecurity: who s in charge? Aquiles A. Almansi Lead Financial Sector Specialist WBG-Finance & Markets Issues in the Governance of Central Banks (BIS 2009) Financial Sector Cybersecurity:

More information

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

NEC Cyber Security Solutions

NEC Cyber Security Solutions Futureproof NEC Cyber Solutions help achieve the total security of clients cyberspace, and create a brighter and safer future for all society. For further information, please contact: NEC Cyber Strategy

More information