Evolving enemies CYBER

Size: px
Start display at page:

Download "Evolving enemies CYBER"

Transcription

1 34 By Nick Watts, D Group Cyber Security Adviser The cyber threat to governments and key infrastructure is becoming greater, not only in terms of potency, but in the range of possible attacks. Nick Watts examines how Europe in particular is responding and what nations are leading the way in securing their assets and information. C yber security in Europe is a reflection of national priorities defence and security, critical national infrastructure (CNI) and the wider commercial world. It is also a reflection of how individual countries view their relationship with the two big blocs the EU and NATO. National authorities have to balance these priorities against the claims of their indigenous Governments have come to understand that they do not own their utilities or most of their CNI, such as railways or airports, while the cyber solutions being offered are often in the hands of foreign-owned companies. nn THE NEXT ARMS RACE? defence and IT contractors when negotiating cooperation arrangements and deciding on applicable standards. Achieving equilibrium is also a reflection of both European and national efforts at harnessing research and technology spending, as well as the allocation of capital expenditure in defence and security budgets and the private sector. It was necessary for nations to understand both the nature of the threat and the resources they already possess to counter it. Merely publishing a declaratory document as a cyber strategy would not suffice in a domain that was rapidly becoming the next arms race in the minds of politicians and business leaders, especially after the revelation of the Stuxnet attack in June Europe is playing catch-up to protect its critical infrastructure as most older networks are vulnerable to cyber attack. (All photos: NATO) Evolving enemies DB-04-15_p34-38_Euro_Cyber.indd 34 03/07/ :23:44

2 35 Ministries of defence and the commercial IT sector will have to learn how to cooperate better to produce a coherent cyber capability. Efforts to achieve adequate standards of information assurance within national defence and security agencies took priority, as governments realised that their legacy computer networks were vulnerable to hacking or signals interception. Progress in implementing cyber security strategies in individual countries has been patchy, due to financial constraints in both the state and private sectors. The terrorist threat has also created a new kind of danger, the self-starter disaffected individuals who are radicalised via social media and online forums. Budgets for expensive defence projects have come under increased scrutiny in an era where the threat is seen as an enemy within, as much as a state-versus-state confrontation. An era of ambiguous and hybrid warfare presents senior military and security officials with difficult decisions about the allocation of resources. EVOLVING LANDSCAPE Recent developments in the European cyber security market demonstrate approaches to this matter that reflect the varying interests of different countries. Estonia, which was subject to a cyber attack by Russian activists in 2007, has very quickly become the leading centre of expertise on cyber-resilience and detection. Britain, with its interests in the financial and services sector, has placed great emphasis on making business safe in cyberspace. Germany, following the revelations by Edward Snowden that the US National Security Agency (NSA) was listening to Chancellor Angela Merkel s phone, has been strong on surveillance safeguards. The defence and security aspects of cyber security began to emerge with the publication of national strategies across Europe. Those countries that have a well-developed IT sector and a national SIGINT capability have led the way. The UK initially produced such a strategy in 2009 and again in France and Luxembourg followed in 2011 and Germany in Industry was quick to offer cyber security remedies, and those defence contractors who did not possess cyber capability bought it in a series of acquisitions in the period following the Stuxnet attack. Most of the major defence contractors can now field a cyber offering. In an era of continuing austerity, governments are also trying to future-proof their IT projects to avoid embarrassment should they find themselves left behind in the race to achieve an acceptable level of security. The continuing challenge for agencies and MoDs used to dealing with a recognised group of defence and IT contractors is how best to accommodate the protean world of the IT sector, when they were used to ponderous procurement procedures which lasted years. This matter remains unresolved. Governments and other agencies might profess their admiration for the work done by the innovative technology sector, but are still wedded to lengthy procurement and demonstration processes. Defence contractors, for their part, are looking to earn back the money they had to pay to acquire their new cyber capability. COMMON STANDARDS The driver for much of the recent activity across Europe has been the need to achieve common standards within NATO and the EU. While the UK, with its Five Eyes arrangement with the US, is seen as being a leader in the defence and security domain, it has shown a fractured response to other threats such as intellectual property theft and commercial cyber crime. Despite the revulsion towards snooping by the US among civic society groups, many policy makers in Europe now understand the need for some measure of surveillance after the jihadist attacks in Paris and Copenhagen together with the Belgian police raid in Verviers in January 2015, which left a total of 17 people dead, plus scores wounded. The London jihadist-inspired killing in September 2013 claimed another life. These events demonstrate to policy makers the nature of the terrorist threat facing open societies from self-starter and lone wolf terrorists. The Intelligence and Security Committee of the UK Parliament noted that the Woolwich attack might have been prevented if communication service providers had shared information on their networks with government agencies. One of the attackers was in communication with a jihadist with links to al-qaeda in the Arabian Peninsula. The Russian incursion into the Crimea in February 2014 and the subsequent fighting in eastern Ukraine has alarmed European leaders about the risks posed by a revanchist Russia. Russian doctrine includes ambiguous warfare in its armoury, including cyber operations. Western leaders are divided about the best response to these developments, but it has added impetus to considerations about Europe s cyber security. NATO S RESPONSE As early as 2002, NATO began to address the cyber threat at its Prague Summit. The New Strategic Concept promulgated at the 2010 Lisbon Summit called for the alliance to be fully capable in the face of the cyber threat. Within NATO s structure, an Emerging Security Challenges (ESC) Division was created in 2010 following the summit headed by ambassador Sorin Ducaru. Volume 7 Number 4 July/August 2015 DIGITAL BATTLESPACE DB-04-15_p34-38_Euro_Cyber.indd 35 03/07/ :23:44

3 36 Following the Estonian and Georgian attacks of 2007 and 2008 respectively, the alliance established the Estonia-based Cooperative Cyber Defence Centre of Excellence (CCDOE) in Suleyman Anil, head of the cyber defence section in the ESC division at NATO, told Digital Battlespace: The CCDOE was established as a non-operational centre for research and the promulgation of best practice advice. At present, some 19 of the alliance s 28 members participate in its activities. Its terms of reference allow the CCDOE to develop work and promulgate studies which do not necessarily carry the imprimatur of the alliance as official cyber policy. Initial steps by NATO to address its vulnerability were taken in 2004 with the establishment of the NATO Computer Incident Response Capability (NCIRC). In 2012, the NCIRC was upgraded to 24/7 operations under a 50 million ($56.2 million) contract awarded jointly to Finmeccanica and Northrop Grumman, which was completed in May It was further agreed at the October 2013 ministerial meeting that the alliance would consider how best to support member states if they come under cyber attack. Jamie Shea, deputy assistant secretarygeneral of the ESC division told DB: NATO has over 100,000 computers and 30 significant networks. Ensuring the alliance can protect itself was its first priority. Institutional efforts by NATO to come to terms with the cyber threat have demonstrated a bureaucratic form of Moore s Law. Initially established as the NCIRC, the Cyber Defence Management Authority (CDMA) was created in In 2011, the CDMA was replaced by the CDMB the B standing for Board. On 1 July 2012, the NATO Communications and Information Agency (NCIA) was established. nn MULTINATIONAL CAPABILITY The NCIA is currently leading the Multinational Cyber Defence Capability Development programme (MN CD2). MN CD2 comprises five participating countries: Canada, Finland, the Netherlands, Norway and Romania. These nations fund the NCIA to undertake this work. The purpose of this initiative is to develop a cyber defence situation awareness capability, of which a current RfI sponsored by MN CD2 is in place for such a system. Responses were due as DB closed for press, and evaluations will be carried out in September. The alliance s vehicle for working with industry is normally managed by the NATO Industry Advisory Group (NIAG), which continues to undertake studies, including into evolving needs in the cyber domain. Member states of the alliance nominate participant companies and can suggest to NATO staff which companies are the leaders in a particular sector, to take the lead in particular studies, said Anil. However, he was keen to stress that there was no preferred list of participants. An NIAG study on Private Sector Support to NATO Cyber Defence was instrumental in helping to shape the alliance s early thinking about developments in the cyber domain. NATO is taking the lead in developing cyber capabilities and is likely to speed up development following the events in eastern Ukraine. DB-04-15_p34-38_Euro_Cyber.indd 36 03/07/ :23:45

4 37 The communiqué issued after the NATO Summit in Wales in September 2014 incorporated cyber defence into the alliance s collective defence mechanism: Article 5 [of the Treaty of Washington of 1949] can be invoked in case of a cyber attack, with effects comparable to those of a conventional armed attack. SENDING A MESSAGE The intent of the NATO declaration is to send a message to Russia, particularly with the Ukraine situation in mind. The alliance is currently examining how best to link collective conventional defence to cyber defence. At present, Article 5 is considered on a case-by-case basis. Arising from the Wales Summit was an action plan relating to cyber defence, explained Anil. This has implications both for NATO s internal structures as well as members of the alliance. It is called the NATO Industry Cyber Partnership [NICP]. It is intended that the NICP will undertake a study on how best the alliance can work with industry and it reported to the NATO ministerial meeting in June. Anil told DB: The emphasis will be on harnessing the dynamism of small and medium enterprises [SMEs] who thrive on innovation. This will involve working together on collaborative platforms and opening up the alliance s innovation incubators to encourage development of solutions. This work began in September 2014 and a report on progress will be made in June and a web portal will then be launched to encourage participation. The technical action plan brings the alliance s cyber defence activities into two main work streams: those that apply internally securing NATO s own networks; and those that apply to members of the alliance. This latter part comprises capacity building and rapid reaction teams (RRTs). When Estonia was subjected to a cyber attack in 2007, it sought assistance from the alliance, which in the event was unable to help, Anil noted. The RRTs are designed to respond to similar events in future. The alliance is also undertaking a study to fully understand the nature of hybrid or ambiguous warfare given that cyber attacks are often a prelude to more kinetic activity by state of non-state actors. Capacity building amongst alliance members and partners is also built around a series of cyber war games: Locked Shield, which is run by the CCDOE; and Cyber Coalition run by NATO. INSTITUTIONAL STRUCTURE The EU s approach to cyber security reflects its institutional structure post the Lisbon Treaty. The inter-governmental European Council adopted the European Security Strategy in December 2003, following the terrorist attacks of September This was drafted by Javier Solana, former Secretary General of NATO. The Madrid bombings of March 2004 gave these efforts fresh impetus, and in July 2004 the European Defence Agency (EDA) was established to underpin political efforts to harmonise Europe s evolving efforts in the security area. The EU s approach to cyberspace is fragmented within its pillar structure: Cyber crime issues fall within the competence of the Directorate-General (DG) for Home Affairs and DG Justice, with support from the European Cyber Crime Centre within EUROPOL, established in Other elements are covered by the DG for Communications Networks, Content and Technology (DG Connect) supported by the European Network and Information Security Agency (ENISA) in Greece, the European External Action Service (EEAS) and the EDA. In February 2013, the European Commission (EC) published its Cyber Security Strategy. This was combined with a draft EU directive on cyber security. The strategy is intended to ensure a common level of network information security throughout the EU. The strategy also addresses such issues as: network resilience; awareness raising; encouraging R&D investment and the development of an internal market for cyber security products and services; and cyber defence in Common Security and Defence Policy (CSDP) missions and operations. IMPOSED OBLIGATIONS The EU draft cyber security directive sets out the obligations that member states will be expected to impose at industry level. It also addresses mechanisms for information sharing between the public and private sectors and sets out measures with which member states and those entities providing CNI services will be required to comply to ensure adequate cyber security. This directive has the twin objectives of unlocking the commercial and social benefits of the Internet and the requirements of cyber security and related cyber crime measures. Following the adoption of the Cyber Security Strategy and a tasking from the European Council on Defence Matters from December 2013, the European Council adopted a Cyber Defence Policy Framework in November It focuses on five areas: supporting the development of member states cyber defence capabilities related to CSDP; enhancing the protection of CSDP communication networks used by EU entities; promotion of civil-military cooperation and synergies with wider EU cyber policies, relevant EU institutions and agencies as well as with the private sector; improving training, education and exercises opportunities; and enhancing cooperation with relevant international partners. At the EDA, cyber security matters are the responsibility of the Capability, Armaments & Technology Directorate that is headed by Peter Round. Wolfgang Roehrig heads the cyber team and he emphasised to DB how small that team is two staff members. Roehrig said that a second colleague only joined him in May. He added: The other area which looks at defencerelated aspects of cyber in the EU are staff in the EEAS, which oversees the activities of Volume 7 Number 4 July/August 2015 DIGITAL BATTLESPACE DB-04-15_p34-38_Euro_Cyber.indd 37 03/07/ :23:45

5 38 Cyber warfare spans both military and civilian domains the EDA will tender for a study into the European cyber market, and the EU needs to cooperate more closely with NATO. the EU Military Staff and the EU s CSDP activity. However, he pointed out that this still amounts to no more than ten people at present. IN CONTEXT As the EU is a not a military alliance like NATO, the cyber domain has to be considered in the context of the dual nature of policy areas adjacent to defence and security, such as transport and CNI. Studies are currently ongoing, where the EDA provides input into work undertaken by DG Connect the part of the European Commission that looks at the information society and how this can be safeguarded, Roehrig explained. In view of the dual policy areas, different cyber security-related projects of the EC s research programmes, such as the Framework Programme 7 and the recently started Horizon 2020 Programme, are under evaluation in order to identify solutions that can be adopted for further implementation in the military domain. This may help to save scarce military R&D funds. Concerning its current work stream, Roehrig said: At the end of 2014, the EDA completed the revision of its Capability Development Plan which put cyber security as a priority area, with a strong focus on the human aspects of cyber defence and the availability of state-ofthe-art technology. As regards industry, the EDA is in the same position as NATO it is in the process of tendering for a study to look at the EU cyber defence market. Roehrig expects this study to focus on the opportunities in what he calls a volatile domain, from engagement with SMEs. Like NATO, the EDA expects to find more innovative approaches from the smaller, more agile players in this market. We know the big elephants and their portfolios, by which he meant many of the prime contractors. But, he added: We expect more from the SMEs in this domain. The study will begin work in the summer and Roehrig expects results by the end of the year. COMMON THEMES Despite coming from different starting points, the EU and NATO have sought to cooperate as much as possible. This should ensure that there is a seamless web that links Europe s civil infrastructure with its defensive apparatus. It also provides a model for an open Internet which other international powers will be encouraged to emulate. Both NATO and the EU look to SMEs in the IT sector to drive innovation, although they see a mix of established prime contractors and SMEs providing solutions for future needs. Beyond the institutional boundaries, both the EU and NATO are mapping out standards of resilience and security with their respective member states. It is national government that will implement standards, and which will no doubt want to ensure its own contractors get a fair crack of the whip in winning future contracts. For its part, European states who are members of both the EU and NATO, as well as those which are non-aligned, will wish to see an open Internet as advocated by the Organisation for Economic Co-operation and Development and not a controlled Internet, as espoused by the Shanghai Cooperation Organisation whose principal members are China and Russia. The diplomatic bargaining will continue, while technology evolves and new threats and solutions emerge. REDUCED HYPE The hype surrounding an arms race in the cyber domain has subsided, but the threats posed to national security are no less real. Cyber crime helps to fuel both drug and people trafficking, which adds to instability and fuels terrorist activity. Industrial espionage conducted by state agencies or non-state actors threatens to erode both economic advantage and national security. Any future kinetic conflict is likely to be preceded by an upsurge in cyber activity, whether it be a denial-of-service attack, or an attack on the nervous system of a country s CNI. Industry and policy makers will await the outcome of NATO s NICP study in June and the EDA s cyber market study due by the end of the year. Both will help to shape the future landscape of Europe s cyber security. Neither of these pieces of work must disadvantage the continent s security, industrial competitiveness or ability to innovate by being too prescriptive. The worst that could happen is for Europe to believe that it has created a new Cyber Maginot Line. DB DB-04-15_p34-38_Euro_Cyber.indd 38 03/07/ :23:45

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

The EU s approach to Cyber Security and Defence

The EU s approach to Cyber Security and Defence Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence Woilfgang.Roehrig@eda.europa.eu +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Khoen Liem Policy and Research in security DG Enterprise and Industry Vienna, 18 Nov. 2013i 2013 1 Security research & the 7 th Framework Programme (FP7) FP7-Security (2007-2013):

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Hybrid Warfare & Cyber Defence

Hybrid Warfare & Cyber Defence Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

RUSSIA CHINA NEXUS IN CYBER SPACE

RUSSIA CHINA NEXUS IN CYBER SPACE RUSSIA CHINA NEXUS IN CYBER SPACE E. Dilipraj Associate Fellow, CAPS On May 08, 2015 Russia and China inked an important agreement in the field of cyber security. This bilateral agreement is the latest

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

Security Council. United Nations S/2008/434

Security Council. United Nations S/2008/434 United Nations S/2008/434 Security Council Distr.: General 3 July 2008 Original: English Special report of the Secretary-General pursuant to Security Council resolution 1806 (2008) on the United Nations

More information

Mainstreaming European Military Cyber Defence Training & Exercises

Mainstreaming European Military Cyber Defence Training & Exercises 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises, 23-24 Sep 2013, Mr. Wolfgang Roehrig, Project Officer Cyber Defence Mainstreaming European Military Cyber Defence Training

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Improving Cyber Security: NATO and the EU

Improving Cyber Security: NATO and the EU Analysis Improving Cyber Security: NATO and the EU Piret Pernik September 2014 Piret Pernik ISSN 2228-2076 International Centre for Defence Studies Toom-Rüütli 12-6, 10130 Tallinn, Estonia info@icds.ee,

More information

National Cyber Security Strategy 2015-2017

National Cyber Security Strategy 2015-2017 National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.

More information

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010 1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue

More information

THE NATO-EU STRATEGIC PARTNERSHIP

THE NATO-EU STRATEGIC PARTNERSHIP 8 THE NATO-EU STRATEGIC PARTNERSHIP THE NATO-EU STRATEGIC PARTNERSHIP 3 KEY INFORMATION NATO and the EU share common strategic interests. In a spirit of complementarity, both organisations consult and

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS Due to the authority vested in the European Centre for Information Policy and Security (ECIPS) Decree / Statute

More information

Final Resolution for the 6 th European Interparliamentary Space Conference (EISC), held on November 10 th and 11 th 2004

Final Resolution for the 6 th European Interparliamentary Space Conference (EISC), held on November 10 th and 11 th 2004 Final Resolution for the 6 th European Interparliamentary Space Conference (EISC), held on November 10 th and 11 th 2004 The 6 th European Interparliamentary Space Conference (EISC), held at the Congress

More information

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information

More information

Energy Security and CSDP: Energy Factor in the EU Military Missions and Operations

Energy Security and CSDP: Energy Factor in the EU Military Missions and Operations Energy Security and CSDP: Energy Factor in the EU Military Missions and Operations European Security and Defence College 8 TH High Level Course Alcide De Gasperi 14-19 April, 2013 Tartu, Estonia Energy

More information

Cybersecurity and the Romanian business environment in the regional and European context

Cybersecurity and the Romanian business environment in the regional and European context KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory

More information

Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: Introduction Political cyber attacks

Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: Introduction Political cyber attacks 1 Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: remarks prepared for the CCADD conference in Paris, September 2014 Introduction Cyberspace has become part of

More information

Cyber defence in the EU Preparing for cyber warfare?

Cyber defence in the EU Preparing for cyber warfare? Preparing for cyber warfare? SUMMARY In recent years, cyber attacks on a serious scale have become a matter of concern to states, due to the threat they can pose to national security, but also a potential

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

National Cyber Security Strategies

National Cyber Security Strategies May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is

More information

ARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence

ARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence ARI ARI 26/2013 (Translated from Spanish) 17 September 2013 Cyber cells: a tool for national cyber security and cyber defence Thiber Theme 1 Cyber cells are effective tools that enable countries to operate,

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

Active Engagement, Modern Defence

Active Engagement, Modern Defence Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation Adopted by Heads of State and Government in Lisbon Active Engagement, Modern Defence Preface We,

More information

Threat Intelligence. Benefits for the enterprise

Threat Intelligence. Benefits for the enterprise Benefits for the enterprise Contents Introduction Threat intelligence: a maturing defence differentiator Understanding the types of threat intelligence: from the generic to the specific Deriving value

More information

PA: a force for transformation in Defence

PA: a force for transformation in Defence PA: a force for transformation in Defence PA Consulting Group is a leading management, systems and technology consulting firm. Operating worldwide in more than 35 countries, PA draws on the knowledge and

More information

How To Understand And Understand The European Priorities In Information Security

How To Understand And Understand The European Priorities In Information Security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks

FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks F-43 FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks Possible Ouestion Why has the Government not confronted China about cyber attacks including on DFAT, such as those aired

More information

A EUROPEAN DRONE BY 2025?

A EUROPEAN DRONE BY 2025? A EUROPEAN DRONE BY 2025? The View from Spain on EUROMALE By Felix ARTEAGA / Senior Analyst, Real Instituto Elcano May 2016 Comment I n February 2015, after several years of overlapping initiatives and

More information

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members

More information

What is Cyber Security? Why work with us?

What is Cyber Security? Why work with us? & Cyber Security The threat: trojans, trap doors malware, packet sniffers, worms, viruses, hacking and denial of service. Physical security is insufficient protection against these new forms of threat.

More information

ESDC EUROPEAN ARMAMENT COOPERATION COURSE AWARENESS LEVEL COURSE (AWL) PROGRAMME (ALL SPEAKERS TO BE CONFIRMED) DRAFT AS OF 20 08 2013

ESDC EUROPEAN ARMAMENT COOPERATION COURSE AWARENESS LEVEL COURSE (AWL) PROGRAMME (ALL SPEAKERS TO BE CONFIRMED) DRAFT AS OF 20 08 2013 ESDC EUROPEAN ARMAMENT COOPERATION COURSE AWARENESS LEVEL COURSE (AWL) PROGRAMME (ALL SPEAKERS TO BE CONFIRMED) DRAFT AS OF 20 08 2013 BRUSSELS, 15 17 October 2013 1 TIME SUBJECT LECTURER METHO- DOLOGY

More information

The European Security Strategy Austrian Perspective

The European Security Strategy Austrian Perspective Erich Reiter and Johann Frank The European Security Strategy Austrian Perspective The following essay gives the Austrian view on the ESS from a security political perspective and analyses the needs and

More information

European Cyber Security Conference

European Cyber Security Conference European Security Round Table (ESRT) & Estonian Ministry of Defence co-organised European Cyber Security Conference Shared Threats Shared Solutions: Towards a European Cyber Security Policy Tuesday, 14

More information

AGENDA ITEM: B2. RSSB Board Meeting Final: 08 May 2014 Page 1 of 3. November 2011

AGENDA ITEM: B2. RSSB Board Meeting Final: 08 May 2014 Page 1 of 3. November 2011 MEETING: RSSB Board Meeting DATE: 08 May 2014 SUBJECT: Cyber security SPONSORS: Anson Jack and Gareth Llewellyn AUTHORS: Tom Lee and Peter Gibbons 1. Purpose 1.1 This paper has been prepared jointly by

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Problem analysis: why the EU Battlegroups have not been used so far. Four factors hampering the deployability of the Battlegroups can be identified:

Problem analysis: why the EU Battlegroups have not been used so far. Four factors hampering the deployability of the Battlegroups can be identified: DISCUSSION PAPER (16 JULY 2014) EU BATTLEGROUPS: USE THEM OR LOSE THEM SUBMITTED BY THE DELEGATION OF THE NETHERLANDS TO THE ITALIAN PRESIDENCY PARLIAMENT OF THE IPC CFSP/CSDP Introduction At the European

More information

Guidelines for Applicants: Advanced Training Course

Guidelines for Applicants: Advanced Training Course Emerging Security Challenges Division Guidelines for Applicants: Advanced Training Course Introduction The NATO (SPS) seeks to enhance cooperation and dialogue with all partners through civil science and

More information

Danish lessons learned: The comprehensive/integrated approach after Iraq and Afghanistan

Danish lessons learned: The comprehensive/integrated approach after Iraq and Afghanistan Military Studies Magazine Danish lessons learned: The comprehensive/integrated approach after Iraq and Afghanistan by Peter Viggo Jakobsen Photo: Forsvaret ISSUE 01, VOLUME 02, 2014 1 Subcribe at fak.dk/eng/magazine

More information

What is Cyber Security?

What is Cyber Security? & Cyber Security The threat: trojans, trap doors malware, packet sniffers, worms, viruses, hacking and denial of service. Physical security is insufficient protection against these new forms of threat.

More information

12 June 2015 Cyber Defense and Cyber Security Policies in the UK, Germany and France

12 June 2015 Cyber Defense and Cyber Security Policies in the UK, Germany and France 12 June 2015 Cyber Defense and Cyber Security Policies in the UK, Germany and France Marco Mayer, Sant Anna School of Advanced Studies We ll talk about: Cyber Security Cyber Defense Cyber Intelligence

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Communication Satellites for European Defence and Security: Challenges and Opportunities

Communication Satellites for European Defence and Security: Challenges and Opportunities Communication Satellites for European Defence and Security: Challenges and Opportunities Partnership Improving security for the people of Europe Magali Vaissiere Director of Telecommunications and Integrated

More information

QinetiQ has recently contributed to inquiries undertaken by Parliament s Joint Standing Committee

QinetiQ has recently contributed to inquiries undertaken by Parliament s Joint Standing Committee QinetiQ SUBMISSION TO THE FIRST PRINCIPLES REVIEW OF DEFENCE QinetiQ is one of Australia s largest independent providers of specialist technical advisory services to Defence. We are a trusted partner to

More information

Cyber Security Strategy for Defence

Cyber Security Strategy for Defence DEFENCE ACST Strategy-CyberSecurity-001 Page 1 / 18 Strategy Department Cyber Security Strategy for Defence Tel Edited by ACOS STRAT 9-2400-6455 Approved by CHOD Published by ACOS STRAT 9-2400-6455 Page

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

Draft guidelines and measures to improve ICT procurement. Survey results

Draft guidelines and measures to improve ICT procurement. Survey results Draft guidelines and measures to improve ICT procurement Survey results Europe Economics Chancery House 53-64 Chancery Lane London WC2A 1QU Tel: (+44) (0) 20 7831 4717 Fax: (+44) (0) 20 7831 4515 www.europe-economics.com

More information

A Cyber Security Integrator s perspective and approach

A Cyber Security Integrator s perspective and approach A Cyber Security Integrator s perspective and approach Presentation to Saudi Arabian Monetary Agency March 2014 What is a Cyber Integrator? Security system requirements - Finance Building a specific response

More information

Pan European Fire Strategy 2020 A safer Europe for all

Pan European Fire Strategy 2020 A safer Europe for all Federation of European Union (FEU) Fire Officer Associations www.f-e-u.org Pan A safer Europe for all Contents Context...3 Introduction...5 Who we are...6 Aims...6 Mission...6 Values...6 Vision...7 Objectives...7

More information

Funding Security Research: a European Issue. ESRAB & ESRP initiatives

Funding Security Research: a European Issue. ESRAB & ESRP initiatives Funding Security Research: a European Issue. ESRAB & ESRP initiatives Alessandro ZANASI ESRAB Member Scientific Director of INTELLIGENCE & SECURITY STUDY CENTER Thanks to our network of professionals,

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security

More information

Fact Sheet Intellectual Property rules within the Fusion for Energy contractual framework

Fact Sheet Intellectual Property rules within the Fusion for Energy contractual framework European IPR Helpdesk Fact Sheet Intellectual Property rules within the Fusion for Energy contractual framework November 2011 Introduction... 1 1. Grants & Procurement granted by F4E... 4 2. Background

More information

Transatlantic. The only winning move is to play with others

Transatlantic. The only winning move is to play with others Transatlantic 119 cybersecurity The only winning move is to play with others Charly Salonius-Pasternak & Jarno Limnéll FIIA BRIEFING PAPER 119 December 2012 U2FsdGVkX19597Gtuu65sO0pV4Cp+y2QLCyDHWfK1WKmKUfWDzV/hq0Z/h8282prAEFWIcUmNbVYGUPvuClRNIalPKuaAQYvgJSGqypyBFwQIiRJdS2a5evHn/yRYMyReVJLQC

More information

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016

Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016 NATO is anything but obsolete. It is needed more now than at any point since the end

More information

The Cancer Running Through IT Cybercrime and Information Security

The Cancer Running Through IT Cybercrime and Information Security WHITE PAPER The Cancer Running Through IT Prepared by: Richard Brown, Senior Service Management Consultant Steve Ingall, Head of Consultancy 60 Lombard Street London EC3V 9EA T: +44 (0)207 464 8883 E:

More information

HOMELAND SECURITY INTERNET SOURCES

HOMELAND SECURITY INTERNET SOURCES I&S Internet Sources I&S HOMELAND SECURITY INTERNET SOURCES USEFUL SITES, PORTALS AND FORUMS Homeland Security Home Page http://www.whitehouse.gov/homeland/ A federal agency whose primary mission is to

More information

NOTE NATO Missile defence

NOTE NATO Missile defence NOTE NATO Missile defence Missiles pose an increasing threat to Allied populations, territory and deployed forces. Over 30 countries have or are acquiring missiles that could be used to carry not just

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

The Global Cyber Security Market 2015-2025

The Global Cyber Security Market 2015-2025 Brochure More information from http://www.researchandmarkets.com/reports/3502775/ The Global Cyber Security Market 2015-2025 Description: Summary During the forecast period the demand for cyber security

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

TOPICS FOR DISSERTATIONS 2011 2012

TOPICS FOR DISSERTATIONS 2011 2012 MEPP Master of European Politics and Policies Member of European Master in Public Administration network Parkstraat 45 Box 3609 3000 Belgium KATHOLIEKE UNIVERSITEIT LEUVEN TOPICS FOR DISSERTATIONS 2011

More information

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security 1 NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations Ian J West Chief, Cyber Security Ian.west@ncia.nato.int 2 NATO UNCLASSIFIED Cyber Security Service Line Ian West

More information

Joint Declaration. On the Establishment of the Regional Co-operation Council (RCC)

Joint Declaration. On the Establishment of the Regional Co-operation Council (RCC) Joint Declaration On the Establishment of the Regional Co-operation Council (RCC) Representatives of the Participating States of the South East European Co-operation Process (SEECP), the United Nations

More information

Public Private Partnerships and National Input to International Cyber Security

Public Private Partnerships and National Input to International Cyber Security Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,

More information

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria

More information

BSC. Planning for the Berlin Security Conference 2016 Review 2015. Europe at risk what are our answers to common threats? Berlin Security Conference

BSC. Planning for the Berlin Security Conference 2016 Review 2015. Europe at risk what are our answers to common threats? Berlin Security Conference BSC Berlin Security Conference 1 5 t h C o n g r e s s o n E u r o p e a n S e c u r i t y a n d Defenc e e Europe at risk what are our answers to common threats? Planning for the Berlin Security Conference

More information

MILITARY SPENDING IN EUROPE IN THE WAKE OF THE UKRAINE CRISIS

MILITARY SPENDING IN EUROPE IN THE WAKE OF THE UKRAINE CRISIS MEDIA BACKGROUNDER MILITARY SPENDING IN EUROPE IN THE WAKE OF THE UKRAINE CRISIS The political and military crisis in Ukraine has led to a major reassessment of threat perceptions and military strategies

More information

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS CYBER SECURITY WITHIN THE GLOBALIZATION PROCESS Milan PODHOREC University of Defence, Faculty of Economics and Management, Brno, Czech Republic The contribution focuses on the issue regarding security

More information

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information

More information

Ministry of Defence Bosnia and Herzegovina

Ministry of Defence Bosnia and Herzegovina Centre for Security Cooperation Military Academy "General Mihailo Apostolski"-Skopje Ministry of Defence Bosnia and Herzegovina Ministry of Foreign Affairs Bosnia and Herzegovina Ministry of Security Bosnia

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

000717/EU XXV. GP. Eingelangt am 05/11/13. Brussels, 5 November 2013 (OR. en) COUNCIL OF THE EUROPEAN UNION 15317/13

000717/EU XXV. GP. Eingelangt am 05/11/13. Brussels, 5 November 2013 (OR. en) COUNCIL OF THE EUROPEAN UNION 15317/13 000717/EU XXV. GP Eingelangt am 05/11/13 COUNCIL OF THE EUROPEAN UNION Brussels, 5 November 2013 (OR. en) 15317/13 POLGEN 198 JAI 935 COPS 458 COSI 120 TELECOM 272 PROCIV 126 CSC 132 CIS 18 RELEX 958 JAIEX

More information

UN Emergency Summit on Cyber Security Topic Abstract

UN Emergency Summit on Cyber Security Topic Abstract UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international

More information

European Organization for Security (EOS) - Description and Envisaged Activities for 2012

European Organization for Security (EOS) - Description and Envisaged Activities for 2012 European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation

More information

NATO & Cyber Conflict: Background & Challenges

NATO & Cyber Conflict: Background & Challenges NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented

More information

1 FOCUS Foresight Security Scenarios

1 FOCUS Foresight Security Scenarios New Security Studies Rachel Suissa (Ph.D) University of Haifa, Israel In today s globalised setting, the challenge of maintaining security is no longer limited to the traditional foreign-policy and military

More information