GOVERNMENT OF THE REPUBLIC OF LITHUANIA
|
|
|
- Amber Hawkins
- 10 years ago
- Views:
Transcription
1 GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR Vilnius For the purpose of implementing Measure No 65 of table 3 of the Implementation Measures of the Programme of the Government of the Republic of Lithuania for , approved by Resolution No 189 of the Government of the Republic of Lithuania of 25 February 2009 (Valstybės žinios (Official Gazette) No , 2009, the Government of the Republic of Lithuania has r e s o l v e d: 1. To approve the Programme for the Development of Electronic Information Security (Cyber-Security) for (as appended). 2. To propose that the State Security Department of the Republic of Lithuania and the Regulatory Authority of the Republic of Lithuania participate in the Programme for the Development of Electronic Information Security (Cyber-Security) for Prime Minister Andrius Kubilius Minister of Justice acting as Minister of the Interior Remigijus Šimašius
2 APPROVED by Resolution No 796 of the Government of the Republic of Lithuania Of 29 June 2011 THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR I. GENERAL PROVISIONS 1. The Programme for the Development of Electronic Information Security (Cyber- Security) for has been developed considering the increasing significance of electronic information, processed and transmitted by means of information and communication technologies, and also considering the fact that the newly emerged possibilities of electronic information processing fostered the development of national and global information societies and facilitated further modernization of national economies as well as led to more efficient public administration, while at the same time, with more and more information being converted into electronic format and various public administration and economic processes being automated, the global cyberspace and the public services delivered online have become an attractive target for individuals, criminal groups, political forces and other subjects. 2. The purpose of the Programme is to determine the objectives and tasks for the development of electronic information in order to ensure the confidentiality, integrity and accessibility of electronic information and services provided in cyberspace, safeguarding of electronic communication networks, information systems and critical information infrastructure against incidents and cyber attacks, protection of personal data and privacy, as well as to set the tasks, implementation of which would allow total security of cyberspace and entities operating in this medium. 3. The strategic objective of the Programme is the development of the security of electronic information in Lithuania, ensuring cyber security in order to achieve, in the year 2019, a 98 per cent level of compliance of state-owned information resources with legislative requirements on electronic information security (cyber security), reduction to 0.5 hour of the average time of response to critical information infrastructure incidents and a 60 per cent level of the Lithuanian residents who feel secure in cyberspace. 4. The terms used in the Programme shall have the following meaning: Information resources shall mean an aggregate of information which is managed by members of the information society and processed by means of information technology as well as the information technology means used to process the said information. Incident shall mean an event, act or omission which gives rise or may give rise to an unauthorized access to an information system or electronic communications network, disruption or change of the operation (including takeover of control) of an information system
3 2 or electronic communications network, destruction, damage, deletion or the change of electronic information, removal or limiting of the possibility to use electronic information and, also, which gives rise or may give rise to the appropriation, publication, dissemination or any other use of non-public electronic information by persons unauthorized to do so. Critical information infrastructure shall mean an electronic communications network, information system or a group of information systems where an incident that occurs causes or may cause grave damage to national security, national economy or social wellbeing. 5. The Programme complies with the action steps presented in the Communication of the European Commission of 30 March 2009 Protecting Europe from large scale cyberattacks and disruptions: enhancing preparedness, security and resilience COM(2009)149. II. OBJECTIVES, TASKS, ASSESSMENT CRITERIA AND THEIR INDICATORS 6. For the purpose of Programme implementation the following objectives shall be established: 6.1. To ensure the security of state-owned information resources. This objective is being addressed, since no system for coordination of the management of electronic information security has yet been created, except in the public sector (i.e. in the institutions accountable to the Government of the Republic of Lithuania). The Ministry of the Interior has no power to exercise a proper control and coordination for ensuring the security of electronic information (cyber security), the governance and supervision structure at the level of state and public institutions is not hierarchical, the lack of cooperation among Lithuanian public and private sector entities prevents an efficient planning of the development of the sphere of electronic information security (cyber security), the existing and regularly detected vulnerabilities of information technologies, if not removed on time, give rise to the disruption of the operation of information resources as well as critical information infrastructures, while the efficiency of detection and removal of these vulnerabilities increases through the centralization of said activities. The compliance with the requirements on electronic information security (cyber security) ensures that information resources are managed in accordance with the requirements of international standards and examples of good practice, however, Lithuania has no efficient compliance management structure; the information maturity model of an organization allows for a better awareness among information resources managers of the need for information resources security and a more efficient management thereof. The dependence of different state and public activity areas on the use of information resources and services varies, therefore, in order to use funds efficiently, it is necessary to consolidate efforts and information resources in the areas where this dependence is stronger; the rate of criminal acts in cyberspace is rapidly increasing and large scale incidents in cyberspace can lead to a national crisis.
4 3 There is no law on electronic information security (cyber security) and the regulation thereof by legal acts of lower force is fragmentary and does not cover all members of the information society, at the same time, there is no legal basis to allow an efficient response to incidents in public electronic communications networks, the providers of electronic communications and Internet access services are not required to report the incidents to the National Electronic Network and Information Security Incidents Investigation Service CERT-LT (hereinafter referred to as CERT-LT). Consequently, the instructions of the national CERT-LT for services providers regarding the elimination of incidents are not mandatory either, there is no legal basis to regulate the use of identification measures directed at reducing the risk of identity falsification and theft in cyberspace. Often, the services delivered by providers of Internet and other information infrastructure services do not ensure their users security. During the period of economic hardship, electronic information security (cyber security) received neither sufficient attention nor information resources, however, the application of the principle of collective security would allow for a more efficient use of information resources; no backup information resources or backup infrastructure to sustain the emergency operation of critical infrastructures and information resources have yet been developed. Reliable identification reduces the risk of major threats related to cyberspace and increases users confidence in cyberspace. Secure cyberspace (i.e. assurance of electronic information security (cyberspace) security) is the concern of all entities whose activities are related to the provision of services in cyberspace (public institutions, private economic entities, academic society and others). Electronic information security (cyberspace security) projects implemented in cooperation enable the achievement of protection of all stakeholders interests. Cyberspace is a global space which has no national boundaries, hence, the rapid spread of threats across cyberspace. The European Union and NATO devote much attention to the security of electronic information and critical information infrastructure. It would be appropriate to apply the principle of collective security not only on a national, but also on international level. Cooperation among highly competent experts, exchange of available information and experience is a prerequisite for an efficient early warning and preventive action To ensure an efficient functioning of critical information infrastructure. The objective is being pursued, since, currently, the security of critical information infrastructure is ensured only on an institutional level, the coordination structure is not yet in place, no analysis of relationship between objects of this infrastructure or the national impact of its failure has been done, there is no planning of the continuity of activities. Penetration test is the most objective method to evaluate the proper functioning of a security system, however, neither a regulatory framework for its application nor a practice of such testing exist. An efficient monitoring system facilitates the prevention of incidents.
5 To seek to ensure the cyber security of the Lithuanian residents and persons staying in Lithuania. This objective is being pursued, since not all users of electronic information are concerned about electronic information security (cyber security), there is a shortage and it is likely to be felt even more in the future of qualified electronic information security experts. Basic knowledge and tools of electronic information security (cyber security) allow the users to avoid many threats facing them in cyberspace. To ensure cyberspace security it is necessary to establish a continuous and properly managed system covering all phases of incident management, such as early warning, prevention, detection, elimination and investigation. An effective way to fight against malware spreading via remote control computer networks or other malicious cyber activities is to block Internet access to persons and/or equipment engaged in malicious activates. The current social stereotype is that illegal activities conducted in cyberspace are not punishable, therefore, it is important that this stereotype be removed. Cyber attacks launched from an overseas source can and must be stopped across Lithuania s virtual cyber perimeter in order to avoid their impact on the national electronic communications network. The Lithuanian Internet Traffic Exchange (ITE) node, being a naturally emerged entity, serves as a convenient and efficient centre for hosting protection capabilities of Lithuania's cyberspace (as well as of its virtual perimeter). Given the implementation of a one-stop-shop principle, the prevailing trend in the area of electronic services is that of unification and centralization; it would be appropriate to exploit this trend also for ensuring the security of these services. The users confidence in cyberspace services is a major factor of the popularity and further development of these services. 7. In order to achieve the objective specified in paragraph 6.1 of the Programme, the following tasks shall be implemented: 7.1. to improve the coordination and supervision of electronic information security (cyber security); 7.2. to improve the regulatory framework of electronic information security (cyber security); 7.3. to expand and improve a secure national information infrastructure; 7.4. to promote the implementation of electronic information (security cyber security) projects; 7.5. to develop international cooperation in the area of electronic information security (cyber security). 8. In order to achieve the objective specified in paragraph 6.2 of the Programme, it is necessary to implement the task of ensuring the security of critical information infrastructure. 9. In order to achieve the objective specified in paragraph 6.3 of the Programme, the following tasks must be implemented:
6 to enhance the culture of protection of electronic information security (cyber security); 9.2. to strengthen Lithuania s cyber security; 9.3. to ensure the protection of Lithuania s virtual cyber perimeter from external cyber attacks; 9.4. to reinforce the security of services delivered in cyberspace. 10. The assessment criteria for Programme implementation and their indicators to be attained, 2015 and 2019 are specified in the Annex to the Programme. 11. Taking into account the fact that the Programme covers one area, the administration of which falls under the responsibility of the Minister of the Interior, no allocation of EU-financed Programme funding among Programme implementing institutions will be planned. III. IMPLEMENTATION OF THE PROGRAMME 12. Coordination of Programme implementation shall be carried out by the Ministry of the Interior (hereinafter referred to as Programme Coordinator). 13. Responsibility for the objectives and tasks of the Programme shall be with the institutions and bodies specified in the Annex to the Programme. 14. Institutions participating in the Programme shall: taking into account the tasks and targeted outcomes laid down in the Programme, plan the level of the outcome to be achieved within the planned period, select measures and plan funds and include them into strategic action plans and/or annual action plans and annually, by 1 August, submit this information to the Programme Coordinator; submit annually, by 1 February, to the Programme Coordinator information on implemented measures and achieved results. 15. The Programme Coordinator shall: supervise the strategic goal, objectives and tasks of the Programme, carry out an interim review of the tasks laid down in the Programme and changes in the levels of task assessment criteria and, if necessary, initiate an update of the Programme; present information on implementation and results of the Programme in an annual Programme Coordinator s Activity Report. 16. Preparation of additional legal acts other than referred to in paragraph 14.1 of the Programme will not be required.
7 Annex to the Programme for the Development of Electronic Information Security (Cyber Security) PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER SECURITY) FOR ASSESSMENT CRITERIA AND THEIR EXPECTED INDICATORS Objective Task Assessment To ensure the security of national information resources to improve the coordination and monitoring of electronic information security (cyber security); Level of compliance of national information resources with security requirements, (%) Level of resources (%), security of which is monitored by an institution designated by the law on the basic requirements related to ensuring electronic information security (cyber security) 3. Percentage of entities in defining and implementing national policy in the area of electronic information security (cyber security) that belong to the national system of coordination of electronic information security (cyber security), (%) Permanent collegial consultative council of electronic information security (cyber security) established 4. Number of evaluation studies of existing capabilities in the area of electronic information security (cyber security) and their potential All the institutions specified in items 3 to 29 of this All the institutions specified in items 3 to 10 of this 80 yes 100 yes Ministry of the Interior, Defence, Ministry of Transport and, State Data Protection Inspectorate 1 2 Ministry of the Interior
8 2 Objective Task Assessment 5. Methods for evaluation of threats and vulnerabilities approved Number of performed evaluations of threats and vulnerabilities Level of uncontrollable vulnerabilities, (%) 6. Percentage of information systems monitored by the system for monitoring compliance with the requirements of electronic information security (cyber security), (%) 7. Percentage of information systems managers who have enhanced their level of maturity in electronic information security management, (%) 8. Percentage of public institutions, economic entities that provide services to public institutions and of public services provided to society with an estimated level of reliance on cyberspace and the use of information and communication technologies, (%) 9. Percentage of completed pre-trial investigations into criminal offences in cyberspace, (%) 10. Participation in the investigation of cyber incidents that have caused or may have caused a crisis, (%) to improve the regulatory framework of electronic information security (cyber security) Percentage of adopted or amended legal acts among the legislation for which the need for adoption or amendment was identified (%) yes 4 yes 8 Ministry of the Interior, State Data Protection Inspectorate Ministry of the Interior Ministry of the Interior Ministry of the Interior, Ministry of Transport and Police Department under the Ministry of the Interior Office of the Prime Minister All the institutions specified in items 12 to 15 of this
9 3 Objective Task Assessment 12. Specific laws providing for the basic requirements related to ensuring electronic information security (cyber security) and regulating appropriate acts and legal relationships (including the Law of the Republic of Lithuania on Electronic Networks and Information Security) adopted 13. Percentage of adopted or amended legal acts among the legislation for which the need for adoption or amendment was identified, (%) 14. Requirements for the provision of services of a secure national (state) data communication network approved 15. Classification of identification measures (methods) and reliability of services (harmonized with that of other Member States of the European Union), technical and procedural requirements as well as the procedure for its accreditation and use approved to expand and improve a secure national information infrastructure Level of information resources using the secure infrastructure, (%) 17. Approval of service provision requirements for enhancing the responsibility of economic entities in the provision of information infrastructure services for the security of provided services yes yes Ministry of the Interior, Ministry of Transport and, Regulatory Authority Ministry of the Interior, State Data Protection Inspectorate yes yes Ministry of Transport and, Ministry of the Interior, Regulatory Authority yes yes Ministry of the Interior, Regulatory Authority (as far as it is related to its function as a supervisory authority for electronic signature) All the institutions specified in items 17 to 21 of this yes yes Ministry of Transport and
10 4 Objective Task Assessment 18. Proportion of the amount of funds planned for information systems security by information systems managers compared to the amount planned for the development and maintenance of information systems, (%) 19. Proportion of the backup capabilities of communications and information systems designed to ensure public administration needs compared to the active capabilities, (%) 20. Level of information systems using the collective defence system of e-government information resources against public network threats, (%) 1 st category information system 2 nd category information system 3 rd category information system 4 th category information system 21. System for ensuring a reliable identification of the users and information resources within the national information infrastructure and the critical information infrastructure as well as for providing electronic identification services is in place to encourage the implementation of electronic information security (cyber security) projects Proportion of projects implemented on the basis of cooperation between entities engaged in government activities compared to the total number of information infrastructure protection projects, (%) Ministry of the Interior, Ministry of Transport and Ministry of the Interior, Ministry of Transport and Ministry of the Interior yes yes Ministry of the Interior Ministry of the Interior, Defence, Lithuanian Research and Studies Computer Network LITNET Council (hereinafter referred to as LITNET)
11 5 Objective Task Assessment 23. Percentage of projects that received proposals from associations, (%) 24. Percentage of the initiatives of national economic entities and education institutions (research, projects, decisions and etc.) implemented jointly with public institutions, (%) to develop international cooperation in the area of electronic information security (cyber security) Number of areas (the pillars for addressing the challenges specified in the EC Communication COM (2009) 149 of 30 March 2009) of international cooperation 26. Participation, upon invitation, in the events on electronic information security (cyber security) organized by the NATO, European Union and the United Nations Organization, (%) 27. Number of representatives delegated to the NATO Cooperative Cyber Defence Centre of Excellence Participation, upon invitation, in events organized by to the NATO Cooperative Cyber Defence Centre of Excellence, (%) 28. Participation, upon invitation, in international cyber security exercises, (%) Ministry of the Interior, Regulatory Authority Ministry of Education and Science, Ministry of the Interior, LITNET Council 3 5 All the institutions specified in items 26 to 29 of this Defence, Ministry of the Interior, Ministry of Transport and Defence Defence, LITNET Council
12 6 Objective Task Assessment 29. Number of agreements signed with the CERT services of other states To ensure an efficient functioning of critical information infrastructure to ensure the security of critical information infrastructure Average time taken to respond to critical information infrastructure incidents, (hours) Percentage of critical information infrastructures that comply with the requirements on electronic information security (cyber security), (%) 32. Percentage of identified critical information infrastructures, (%) Percentage of critical information infrastructures subject to analysis of critical resources and services as well as risk assessment of the disruption of performance due to failure of their information infrastructure or their vital external infrastructures, (%) 33. Security requirements for critical information infrastructures approved 34. Percentage of critical information infrastructures subject to resilience assessment, (%) 3 6 Defence, Ministry of the Interior, LITNET Council 1 0,5 All the institutions specified in items 32 to 40 of this All the institutions specified in items 32 to 40 of this Ministry of the Interior, Defence, LITNET Council yes yes Ministry of the Interior, Defence, LITNET Council Ministry of the Interior
13 7 Objective Task Assessment 35. Number of Lithuania s critical electronic communications and Internet network infrastructures that are under regular monitoring and the number of elements of Lithuania s cyber perimeter compared to the total, (%) 36. Number of institutions taking part in the activities of the European Union s Critical Infrastructure Warning Information Network (CIWIN) 37. continuity of the performance of critical infrastructures during failures designated 38. Cyber Defence Plan for protecting critical information infrastructures by institutions for national defence approved National Cyber Defence Plan for protecting critical information infrastructures and national information resources approved 39. The plan for preparation and management, during a crisis, of backup infrastructure required for ensuring the viability of critical information infrastructures approved 95 99,5 LITNET Council 7 12 Office of the Prime Minister yes yes Office of the Prime Minister yes yes yes Defence, State Security Department, Ministry of the Interior, Ministry of Transport and, Ministry of Economy, Ministry of Energy, Ministry of Finance yes yes Ministry of the Interior, Defence
14 8 Objective Task Assessment 40. Percentage of critical information infrastructures, excluding the electronic communications networks designed to secure national defence and/or required to ensure defence capabilities in fulfilment of the commitments to the NATO or the European Union, that have been connected to a secure inter-institutional data transmission network, the services of which are provided by the provider/providers of the Secure State Data Communication Network appointed by the Government of the Republic of Lithuania, (%) To ensure the cyber security of the Lithuanian residents and persons staying in Lithuania to enhance the culture of protection of electronic information security (cyber security); Percentage of the Lithuanian population who feel secure in cyberspace, (%) Percentage of the Lithuanian population who are aware of cyber security principles, (%) 43. Number of programmes drafted for the training and professional development of specialists in electronic information security (cyber security) Number of specialists that have completed the programmes 44. Number of specialists who have been trained in information law Research in the area of information law carried out Ministry of the Interior All the institutions specified in items 43 to 59 of this All the institutions specified in items 43 to 48 of this 1 2 Ministry of Education and Science, Ministry of the Interior, LITNET Council Ministry of Education and Science LITNET Council
15 9 Objective Task Assessment 45. Number of operational cyber security selfeducation websites Percentage of visitors who gave a positive assessment of a website s usefulness, (%) 46. Number of organized events to increase awareness on the importance of electronic information security (cyber security) 47. Average number of electronic information security measures used by a user, (measures) 48. Number of press releases on electronic information security initiatives to strengthen Lithuania s cyber security Average time of response to cyber incidents, (hours) 50. Number of operational and cooperating CERT teams engaged in computer emergency response activities Ministry of the Interior, State Data Protection Inspectorate 4 8 Ministry of the Interior, Ministry of Education and Science, State Data Protection Inspectorate 2 4 Ministry of the Interior, Ministry of Transport and, Regulatory Authority 8 16 Ministry of the Interior, Ministry of Education and Science 1 0,5 All the institutions specified in items 50 to 52 of this 5 8 Defence, LITNET Council
16 10 Objective Task Assessment 51. National early warning system to alert of network and information security vulnerabilities and threats established 52. Number of digital evidence investigation laboratories for identifying illegal activities in cyberspace to ensure the protection of Lithuania s computer network (virtual cyber perimeter) from external cyber attacks Level of network connections compliance with the requirements of electronic information security, (%) 54. Legal framework established and the requirements for setting up international network connections and their further management defining the monitoring and alerting responsibilities of operators of such network connections, as well as the coordination of operators activities in the case of an external cyber attack approved 55. the supervision of the operators for managing the network connections across Lithuania s virtual cyber perimeter designated yes yes Ministry of the Interior, State Data Protection Inspectorate, LITNET Council 0 1 Ministry of the Interior, Police Department under the Ministry of the Interior, LITNET Council All the institutions specified in items 54 to 56 of this yes yes Ministry of Transport and, Regulatory Authority yes yes Ministry of Transport and, Regulatory Authority
17 11 Objective Task Assessment 56. Provisions on the Lithuanian Internet Traffic Exchange (ITE) approved to reinforce the security of services delivered in cyberspace Percentage of cyber services that comply with the requirements of electronic information security (cyber security), (%) 58. Percentage of services protected and controlled by the system for implementation and control of collective security of services provided in cyberspace, (%) 59. Proportion of the Lithuanian population who trust in the services provided in cyberspace, (%) yes yes Ministry of the Interior, Ministry of Transport and, State Data Protection Inspectorate All the institutions specified in items 58 to 59 of this Ministry of Transport and, Ministry of the Interior Ministry of the Interior, public administration institutions providing services in cyberspace
ORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA
ORDER OF THE DIRECTOR OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA ON THE AMENDMENT OF THE ORDER NO. 1V-1013 ON THE APPROVAL OF THE RULES ON THE ENSURANCE OF SECURITY AND INTEGRITY
Council of the European Union Brussels, 5 March 2015 (OR. en)
Council of the European Union Brussels, 5 March 2015 (OR. en) Interinstitutional File: 2013/0027 (COD) 6788/15 LIMITE TELECOM 59 DATAPROTECT 23 CYBER 13 MI 139 CSC 55 CODEC 279 NOTE From: Presidency To:
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
EU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
ACTION PLAN FOR LITHUANIAN PARTICIPATION IN THE INTERNATIONAL INITIATIVE OPEN GOVERNMENT PARTNERSHIP
OFFICE OF THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA ACTION PLAN FOR LITHUANIAN PARTICIPATION IN THE INTERNATIONAL INITIATIVE OPEN GOVERNMENT PARTNERSHIP April 2014 Vilnius 1 INTRODUCTION Significance
Cybersecurity Strategy of the Republic of Cyprus
Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE
REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT
REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT Riga 2013 Introduction In accordance with the National Security Concept, information technology threats or
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012
SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
REPUBLIC OF POLAND Ministry of Administration and Digitisation, Internal Security Agency CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND
REPUBLIC OF POLAND Ministry of Administration and Digitisation, Internal Security Agency CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND REPUBLIC OF POLAND Ministry of Administration and Digitisation,
National Cyber Security Strategies
May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is
Cyber Security Strategy
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
On the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV [email protected] @ratchevv DCAF/CSDM 1 This presentation
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
National Cyber Security Strategy 2015-2017
National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.
Lith Networking and Network Marketing Safety
DIRECTION TO SUCCESS. PUBLIC AND PRIVATE SECTORS PARTNERSHIP WSIS Action Line Facilitation Meeting: Building confidence and security in the use of ICTs (C5) Partnerships for Global Cybersecurity ITU Geneva,
National Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
PROJECT FICHE 3.2.1.2
PROJECT FICHE 3.2.1.2 TO ACTION PROGRAMME 2005 FOR THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA Title Combating money laundering (phase II) Total cost EC contribution: 1.5 million (approx) Aid Method Project
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
archiving documents in electronic format
LAW No. 135 of May 15 th 2007 on archiving documents in electronic format ISSUER: THE PARLIAMENT OF ROMANIA PUBLISHED WITH: THE OFFICIAL GAZETTE NO. 345 of May 22 nd 2007 The Parliament of Romania passes
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
National Plan for Information Infrastructure Protection
National Plan for Information Infrastructure Protection www.bmi.bund.de Contents 1 Introduction 2 1.1 Germany s information infrastructures 2 1.2 Threats and risks to our information infrastructures 3
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
Committees Date: Subject: Public Report of: For Information Summary
Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security
5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN
COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
Honourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018
Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Summary in English of the Icelandic National Cyber Security Strategy approved by the Minister of the Interior in April 2015
ESKISP6054.01 Conduct security testing, under supervision
Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Brussels, XXX [ ](2012) XXX draft Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high common level of network and information
ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT
2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
Act on Background Checks
NB: Unofficial translation Ministry of Justice, Finland Act on Background Checks (177/2002) Chapter 1 General provisions Section 1 Scope of application (1) This Act applies to background checks, which
OUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
COMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, [ ] COM(2006) 251 COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE
Cybersecurity and the Romanian business environment in the regional and European context
KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
ITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Cyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
Industry. Cyber Security. Information Sharing at the Technical Level. Guidelines
NATO Communications and Information Agency (NCI Agency) - Industry Cyber Security Information Sharing at the Technical Level Guidelines Effective date: 28 March 2014 Revision No: Rev 1 Change History Revision
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
MULTI ANNUAL WORK PLAN 2013 2015
MULTI ANNUAL WORK PLAN 2013 2015 Translation into English: Elena Arrebola 1. CONTEXT a) Mandate The Council promotes the principle of equal treatment and non-discrimination of persons on racial or ethnic
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.
Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks July 2014 Cyber Threat Intelligence and Incident Coordination Center: Protecting
REPUBLIC OF TURKEY. Ministry of Transport, Maritime Affairs and Communications. National Cyber Security Strategy and 2013-2014 Action Plan
REPUBLIC OF TURKEY Ministry of Transport, Maritime Affairs and Communications National Cyber Security Strategy and 2013-2014 Action Plan [The page intentionally left blank.] National Cyber Security Strategy
ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE
Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION
POLICIES TO MITIGATE CYBER RISK
POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime
COU CIL OF THE EUROPEA U IO EN Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime 2987th JUSTICE and HOME AFFAIRS Council meeting Brussels, 27-28 ovember 2008 The
The National Cyber Security Strategy (NCSS) Success through cooperation
The National Cyber Security Strategy (NCSS) Success through cooperation 1. Introduction The Netherlands stands for safe and reliable ICT 1 and the protection of the openness and freedom of the Internet.
Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY
Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND
(DRAFT)( 2 ) MOTION FOR A RESOLUTION
05 Motions for resolutions, and other B8 documents 05_09. Motions to wind up debate on statements by other institutions: Rule 123(2) Cover page EUROPEAN PARLIAMENT 2014 2019 Plenary sitting [.2014] B[8-/2014](
EU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Legislative Council Panel on Information Technology and Broadcasting. Information Security
LC Paper No. CB(1)2407/10-11(05) For Information on 13 June 2011 Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper informs Members about the progress
REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY
REPUBLIC OF MAURITIUS 5555555555555555555555555555555555555555555555555555555555 5555555555555555555555555555555555555555555555555555555555 NATIONAL CYBER SECURITY STRATEGY 2014-2019 The time has come
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION)
AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION) AG/RES. 2004 (XXXIV-O/04) ADOPTION OF A COMPREHENSIVE INTER-AMERICAN STRATEGY TO COMBAT THREATS TO CYBERSECURITY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY
PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence
EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32 A call for views and evidence 22 nd May 2013 Contents Contents... 2 Overview: The EU Directive on Network and Information Security...
Romanian National Computer Security Incident Response Team CERT-RO. [email protected] http://www.cert-ro.eu
Romanian National Computer Security Incident Response Team CERT-RO [email protected] http://www.cert-ro.eu About A Digital Agenda for Europe, Pillar : Trust and Security, Action 38 Member States to
2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS
CYBER SECURITY WITHIN THE GLOBALIZATION PROCESS Milan PODHOREC University of Defence, Faculty of Economics and Management, Brno, Czech Republic The contribution focuses on the issue regarding security
Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16
Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16 Summary The Northern Ireland Human Rights Commission (the Commission):
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Brussels, 7.2.2013 COM(2013) 48 final 2013/0027 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high common level of network
CRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC
124 CRIMINAL INVESTIGATION IN THE SLOVAK REPUBLIC Vladimíra Trnkócyová 56 General background Historical overview and future vision of investigation in the Slovak Republic The 2001 Accession Partnership
Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
Qatar Computer Emergency Team
Cyber Security Division Qatar Computer Emergency Team An initiative Introduction Qatar aims to fully exploit information and communications technology to become one of the most successful knowledge-based
Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
Making our Cyber Space Safe
Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework
Business Case. for an. Information Security Awareness Program
Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security
