Yet another story on information sharing...
|
|
|
- Harvey Sparks
- 10 years ago
- Views:
Transcription
1
2 Yet another story on information sharing... NATO Malware Information Sharing Platform Panel discussion Threat information sharing: Strategies and threat Scenario s George Mason University Barriers and pathways to improving effectiveness of cybersecurity Information Sharing Among Public and Private Sectors [email protected] :15
3 Case study on improving shared situational awareness by focusing on community building Situational Awareness as is Why we saw cause for action The NDN initiative Steps in community building :15
4 NFI Regulators ISP s AIVD Academia Police Expertise & Advice Monitoring & Response Defense Insight Perspective for Action NCC Enhancing Crisis management ISAC s National partners Vendors Critical Infrastructure
5 NCSC-NL situational awareness Tactical Operational News analysis Tactical analysis Daily weather Monthly monitor report Guidelines Factsheets White papers Media analysis Policy briefings Advisories Malware analysis End of week Ad hoc Observables and context Daily One conference Trend report End of year One conference Yearly
6 2012 Dorifel August 8th We receive first calls Requests for advice Municipality of Weert Malware sample Indicators sharing Actionability
7 2012 Dorifel August 9th New reported infections Notice and Takedowns Release me of a botnet August 10th Total of 30 public and private organizations Scaled down Clean up still ongoing
8
9 2012 Dorifel Evaluation Shortcomings No early warning No access to the networks No use of standards No feedback on indicators No community driven approach And thus...no actual shared situational awareness
10 2015: National Detection Network
11 NDN offers 1. An IDS for government organisations 2. Threat intel data not (yet) widely available 3. Targeted at NL, high impact, high likelihood 4. Platform for private sectors in critical infrastructure 5. Use of standards and open source 6. Based on voluntary sharing with NCSC-NL 7. Available to all of our constituency
12
13 Topics dealt with Community Program management
14 10 Steps in community building PRIOR START OBSTACLE LOOP 10. Evaluate and adjust 8. Results 9. Information Process 6. Business Case 7. Controls 5. Decision making 4. Start the collaboration 3. Communication 2. Explore the territory 1. Legal and policy assurances
15 Steps in community building PRIOR START OBSTACLE LOOP 10. Evaluate and adjust 8. Results 9. Information Process 6. Business Case 7. Controls 5. Decision making 4. Start the collaboration 3. Communication 2. Explore the territory 1. Legal and policy assurances
16 Step 1. Policy and legal 1. Embed activities in NCSS 2. Create political commitment 3. Organise broad support 4. Inform employee council 5. New policies will be developped 6. Check your legal base
17 Step 2. Exploring the teritory Information Trust level Volume Sharing molde Benefit Authority Exchange base Size Lenght Connectednes Diversity...
18 Step 2. Exploring the teritory information trust level open not present closed informal formal volume low medium high sharing model benefit authority exchange base hub-spoke low public voluntary peer-peer medium private mandatory hybrid high supervisory size lenght connectedness diversity limited ad hoc weak low medium long term strong medium large bridging high
19 NDN - NCSC Step 3. Communications Belanghebbenden Overheid Internationaal Medeoverheden Vitale Sectoren NCTV Water ISAC Nucleair ISAC Multinationals ISAC Haven ISAC Energie ISAC Fin. ISAC Telecom ISAC Transport ISAC Zorg ISAC MSP ISAC Insurance ISAC Infra MKB- Nederland CVI TNO Nox Consider Computale RIJKS ISAC VNO/NCW Privacy related Liaisons EU-Fin. ISAC Rijksoverheid Cyber Security Raad Thuiswinkel.org doelgroep omgeving ICT-office Deskundigen McAfee Hewly- Daggard UvE NU.nl Security.nl Tweakers WebWereld PvIB Rijks SOC DGOB R ICCIO Sb.comm. IB National Police SSC-ICT Shadow server DHS EGC ENISA EU DG Europol Interpol Logius Banken VNG DNB Equens Betaalverenig. NVB Koplopers CSIRT s SOC s MS ISP CIBO CIP Waterschaphs. IPOprovincien KING- IBD Taskf. BID Uni van Watersch. IWWN ACM (OPTA) MOD BuZa CIBG Def. CERT Event I&M IVD NBV EZ NFI OM Taskf. Cyber VWS EC3
20 Steps in community building PRIOR START OBSTACLE LOOP 10. Evaluate and adjust 8. Results 9. Information Process 6. Business Case 7. Controls 5. Decision making 4. Start the collaboration 3. Communication 2. Explore the territory 1. Legal and policy assurances
21 Step 4. Collaboration process Invite First insight Share and reflect Negotiate Scoping Execute Evaluate Individual interests and ambitions Understand consequences Pace and direction Master plan Results, products Exits, new entries Leren samenwerken tussen organisaties, alianties netwerken ketens partnerships, Kaats, Pheij, 2013
22 Stages Period Activities 1 Invite May-Nov 13 - Representative organizations - Delegates 2 First insight Dec 13 - Round table sessions - Introductions - Proposition: benefits, challenges 3 Share and reflect Feb 14 - Interests made explicit - Implicit a group was made 4 Negotiate Mar, Jun 14 - Agenda - Roles, responsibilities 5 Scoping Jun-Nov 14 - Process, organization, information, infrastructure, legal, policy, communication 6 Execute Dec 14 - Start pilot: infrastructure, sharing 7 Evaluate Jun-Sep 15 - Roadmap, growth scenario, sharing proces
23 Step 5. Decision making Stakeholders 150 corporate organizations 20 public organizations 3 founding partners? Managed service providers Structure 1 steering group, 2-monthly Senior management Sounding board Round table Topics Project and pilots Policy, legal and politics Finance and resources Communication Results Consensus Political support Stakeholder collaboration Autonomy untouched Missing: MSSP, researchers, interest groups,...
24 Steps in community building PRIOR START OBSTACLE LOOP 10. Evaluate and adjust 8. Results 9. Information Process 6. Business Case 7. Controls 5. Decision making 4. Start the collaboration 3. Communication 2. Explore the territory 1. Legal and policy assurances
25 Step 6. Costs and benefits Benefits Short term Long term Costs
26 Step 6. Costs and benefits Benefits - Reputation through Corporate Soc Resp - Higher security level - Compliancy - Efficient processes - Collaboration - NL digitally (more) safe Short term Long term Costs
27 Step 6. Costs and benefits Benefits - Reputation through Corporate Soc Resp - Higher security level - Compliancy - Efficient processes - Collaboration - NL digitally (more) safe Short term Long term - Labour (legal, policy, techs,..) - Infrastructure / maturity. - Tooling (IDS, MISP, SIEM) - IDS appliance - Service management - Commercial feeds Costs
28 Step 7. Information controls Privacy controls (public IDS) Raw data only locally No IoC s on personal identifable information IP addresses hashed and salted Retention time <30 days Hits after 30 minute delay White box solution No remote management
29 Step 7. Information controls Privacy controls in process and organization Describe the working process Protocols in place that describe how to handle Perform a privacy impact assessment Processes are externaly audited Keep checking on compliancy with legislation and policies Only screened personnel handle data
30 Step 7. Information controls Sharing controls (private sector) Public access and access from supervising authorities to government information Describe the working process Retention times on IoC s, sightings,... Policy statement, law amendment TLP Amber, confidential or secret MSSP s, international branches Research e.g. Blooming filter Transparency in processing, (NDA s)
31 Step 8. Results Span, location, availability Bandwidth, performance Skill level Contextual information (Too) high expectations Remote access New friends MISP Forum MISP community driven MISP STIX MISP groups Government syndrom Data retention New friends various pics via
32 Step 9. Collect & share Collect Report Analyse Enrich Share
33 Step 9. Collect & share Collect Report Analyse Enrich Share - Levels of sharing - IoC s received -Follow up
34 Step 9. Collect & share Collect Report Analyse -Sightings - Statistics -Comments Enrich Share - Levels of sharing - IoC s received -Follow up
35 Step 9. Collect & share Collect - Anonimization - Few results Report Analyse -Sightings - Statistics -Comments Enrich Share - Levels of sharing - IoC s received -Follow up
36 Step 9. Collect & share Collect -Volume - Contextual information - Workprocess - Anonimization - Few results Report Analyse -Sightings - Statistics -Comments Enrich Share - Levels of sharing - IoC s received -Follow up
37 Step 9. Collect & share Collect -Volume - Contextual inf. - Workprocess - Anonimization - Few results Report Analyse - Too strict -Active collaboration - Repository missing -Sightings - Statistics -Comments Enrich Share - Levels of sharing - IoC s received -Follow up
38 Steps in community building PRIOR START OBSTACLE LOOP 10. Evaluate and adjust 8. Start a pilot 9. Information Process 6. Business Case 7. Controls 5. Decision making 4. Start the collaboration 3. Communication 2. Explore the territory 1. Legal and policy assurances
39 10. Continuous improvement M.C. Escher
40 To conclude Preparations Results Involvement Collaboration Takes endurance Very intensive Trust issues reduced
41 To conclude Obstacles Controls: transparency sources/ncsc/private Process: make a good inventory ROI: first insights, hard to put $/ / / to it Results: start small, make it work Improvement Other practices, tooling, disciplines, industries
42 maps.google.com
43 This presentation is based on our own experiences as well as others: Electrotechnik und informationstechnik, Cyber security information exchange to gain insight into the effects, NCSC, Ahead of the threat, enhancing cyber intelligence communities, Microsoft, a framework for cyber security information sharing and risk reduction, Nist, Guide to Cyber Threat Information Sharing, EP, Mass surveillance, part 2, % _REV1_EN.pdf EP, Network and Information Security (NIS) Directive, MISP, main developers Belgian Defence and Nato
OUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 [email protected] 1 Who we are ENISA was
Cyber intelligence exchange in business environment : a battle for trust and data
Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building
Cyber Security in EU: ENISA approach
Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency Norwegian Energy Days 2015, Oslo European Union Agency for Network and
Cyber Security in EU: ENISA approach
Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency in Electricity Distribution Grids, Brussels European Union Agency for
Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva
Finnish Cyber Security Strategy Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva 1 Changing threat landscape 2 Annual losses caused by cybercrime over $400 billion
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation
EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
MEMORANDUM Date Our reference Page Measures based on the action plan for improved Internet security
MEMORANDUM Date Our reference Page 13 Feb. 2008 File ref: 08-630 1(12) Network Security Department Björn Scharin +46(0)8-678 55 98 [email protected] Ministry of Enterprise, Energy and Communications
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
The National Cyber Security Strategy (NCSS) Success through cooperation
The National Cyber Security Strategy (NCSS) Success through cooperation 1. Introduction The Netherlands stands for safe and reliable ICT 1 and the protection of the openness and freedom of the Internet.
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM Entitled by: Cristine Hoepers, Klaus Steding-Jessen,
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Eight Essential Elements for Effective Threat Intelligence Management May 2015
INTRODUCTION The most disruptive change to the IT security industry was ignited February 18, 2013 when a breach response company published the first research that pinned responsibility for Advanced Persistent
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era
The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era Ted Gruenloh Director of Operations Sentinel IPS * Agenda! Review of the current Network Security
Prof. Udo Helmbrecht
Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for
The EU approach to Cybersecurity and Cybercrime
The EU approach to Cybersecurity and Cybercrime Ralf Bendrath Policy advisor to Jan Philipp Albrecht MEP, Greens/EFA ISODARCO.it, 12 January 2012 Outline 1. Information & Coordination 2. Internal Security
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
EU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
GOVERNMENT OF THE REPUBLIC OF LITHUANIA
GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For
A Cyber Security Integrator s perspective and approach
A Cyber Security Integrator s perspective and approach Presentation to Saudi Arabian Monetary Agency March 2014 What is a Cyber Integrator? Security system requirements - Finance Building a specific response
Cyber Security in Europe
Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community
CYSPA - EC projects supporting NIS
CYSPA - EC projects supporting NIS Nina Olesen, EOS March 2014 Athens, Greece www.cyspa.eu CYSPA the European project The European Cyber Security Protection Alliance, or CYSPA, is an initiative by 17 organisationsfrom
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 [email protected] Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 [email protected]
CYSPA launch event - Turkey
CYSPA launch event - Turkey Rome, 09 June 2014 Ankara 17th February, 2015 Luigi REBUFFI CEO EOS CYSPA Coordination www.cyspa.eu CYSPA launch events 6 June 2014 - UK: London 9 June 2014 IT: Rome 30 June
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Trust and Security Unit DG Communica5ons Networks, Content and Technology
On and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
Romanian National Computer Security Incident Response Team CERT-RO. [email protected] http://www.cert-ro.eu
Romanian National Computer Security Incident Response Team CERT-RO [email protected] http://www.cert-ro.eu About A Digital Agenda for Europe, Pillar : Trust and Security, Action 38 Member States to
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
US-CERT Year in Review. United States Computer Emergency Readiness Team
US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 What s Inside Welcome 1 Vison, Mission, Goals
Report on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
NIST Cybersecurity Framework What It Means for Energy Companies
Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber
National Cyber Security Strategy 2015-2017
National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
GRC & Cyber Security Conference - Bringing the Silos Together ISACA Ireland 3 Oct 2014 Fahad Ehsan
Fahad Ehsan Cyber Security Researcher Where it all started. ------------------------------------------------------------------------------------------ Welcome to the Dungeon (c) 1986 Basit & Amjad (pvt)
European Distribution System Operators for Smart Grids
European Distribution System Operators for Smart Grids Network and information security (NIS): Recommendations for information sharing and risk management September 2014 Executive summary Our modern society
Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations
Submitted via [email protected] and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Detecting Unknown Malware: Security Analytics & Memory Forensics. Fahad Ehsan. Cyber Security Researcher @memfors4all #RSAC
SESSION ID: ANF-T09 Detecting Unknown Malware: Security Analytics & Memory Forensics Fahad Ehsan Cyber Security Researcher @memfors4all Where it all Started ------------------------------------------------------------------------------------------
Memory Forensics & Security Analytics: Detecting Unknown Malware
Memory Forensics & Security Analytics: Detecting Unknown Malware SESSION ID: SEC-T09 Fahad Ehsan Associate Director Security Research and Analytics UBS AG Where it all started. ------------------------------------------------------------------------------------------
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
The EU s approach to Cyber Security and Defence
Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence [email protected] +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific
Network Security Deployment Obligation and Expenditure Report
Network Security Deployment Obligation and Expenditure Report First and Second Quarters, Fiscal Year 2015 June 16, 2015 Fiscal Year 2015 Report to Congress National Protection and Programs Directorate
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
ANNEX ENLETS. Work programme 2014-2020. European Network of Law Enforcement Technology Services 2013-11-10. 17365/13 EB/hm 2 ANNEX DG D 2C LIMITE EN
Delegations will find attached the work programme of the European Network of Law Enforcement Technology Services (ENLETS) 2014-2020. COSI is invited to endorse this work programme. 17365/13 EB/hm DG D
Mainstreaming European Military Cyber Defence Training & Exercises
2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises, 23-24 Sep 2013, Mr. Wolfgang Roehrig, Project Officer Cyber Defence Mainstreaming European Military Cyber Defence Training
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
Ed McMurray, CISA, CISSP, CTGA CoNetrix
Ed McMurray, CISA, CISSP, CTGA CoNetrix AGENDA Introduction Cybersecurity Recent News Regulatory Statements NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Questions Information Security Stats
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency 1 Challenge for Cyber Security in Financial Sector (1) Necessity to Strengthen
ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency
ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
Separating Signal from Noise: Taking Threat Intelligence to the Next Level
SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective
Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Reaching the Cloud era in the EU Riga 16 June 2015 Jonathan Sage Government and Regulatory Affairs Cyber Security
Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, [email protected]. 2014 Utilities Telecom Council
Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, [email protected] 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations
What are you trying to secure against Cyber Attack?
Cybersecurity Legal Landscape Bonnie Harrington Executive Counsel EHS and Product Safety & Cybersecurity GE Energy Management Imagination at work. What are you trying to secure against Cyber Attack? Personally
Achieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
Building Blocks of a Cyber Resilience Program. Monika Josi [email protected]
Building Blocks of a Cyber Resilience Program Monika Josi [email protected] About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
The Third Rail: New Stakeholders Tackle Security Threats and Solutions
SESSION ID: CXO-R03 The Third Rail: New Stakeholders Tackle Security Threats and Solutions Ted Ross Director, Threat Intelligence HP Security Research @tedross Agenda My brief background An example of
NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA
NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA ViS!T - Verwaltung integriert sichere Informationstechnologie, Wien, 29.10.2014 European Union Agency
Security Operation Centre 5th generation
Security Operation Centre 5th generation transition Cezary Prokopowicz Regional Manager SEE HP Enterprise Security Products 2 3 4 5 Challenges you are facing 1 Nature and motivation of attacks (Fame to
Cybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards
Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015
Multi-Jurisdictional Study: Cloud Computing Legal Requirements Julien Debussche Associate January 2015 Content 1. General Legal Framework 2. Data Protection Legal Framework 3. Security Requirements 4.
Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel
Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel @Ben_Smith Ben Smith, CISSP Field CTO (US East), Security Portfolio A Security Maturity Path CONTROLS COMPLIANCE IT RISK BUSINESS
ISE Northeast Executive Forum and Awards
ISE Northeast Executive Forum and Awards October 3, 2013 Company Name: Project Name: Presenter: Presenter Title: University of Massachusetts Embracing a Security First Approach Larry Wilson Chief Information
National Cybersecurity & Communications Integration Center (NCCIC)
National Cybersecurity & Communications Integration Center (NCCIC) FOR OFFICIAL USE ONLY NCCIC Overview NCCIC Overview The National Cybersecurity and Communications Integration Center (NCCIC), a division
Cyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
CSM-ACE 2014 Cyber Threat Intelligence Driven Environments
CSM-ACE 2014 Cyber Threat Intelligence Driven Environments Presented by James Calder Client Services Manager, Singapore 1 CONTENTS Digital criminality Intelligence-led security Shylock case study Making
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
Coordinating Attack Response at Internet Scale (CARIS)
Coordinating Attack Response at Internet Scale (CARIS) Overview and Summary Report July 2015 Kathleen Moriarty Security Area Director, IETF [email protected] Agenda Coordinating Attack Response
A Primer on Cyber Threat Intelligence
A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly
DS-05-2015: Trust eservices. The policy context: eidas Regulation
DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
