State of RP Cyber Security

Size: px
Start display at page:

Download "State of RP Cyber Security"

Transcription

1 Office of the President of the Philippines Malacanang State of RP Cyber Security 4 th ARF Seminar on Cyber Terrorism Busan, South Korea October

2 Backgrounder DEMOGRAPHIC INFORMATION Size: 300,000 sq km land: 298,170 sq km water: 1,830 sq km 7,100 islands 82 million population 13 international gateways (airports) 30 major seaports Democratic Form of Government 16 Regions 110 provinces 60 cities REPUBLIC OF THE PHILIPPINES 2

3 State of RP Cyber Security Republic of the Philippines: An Overview Status of the RP Internet and Cyber Incidents Internet Threat Reports on RP Assessment of RP Cyber Defense The Role of Cyber Security Coordinator Cyber Security Roadmap 3

4 Legend Microwave Fiber Optic TELOF PLDT Bayantel Globe PT&T Digitel Sinat Mt. Caniaw Mt. Pila Don Mariano San Fernando Mt. Sto Thomas Binalona n Cuyapo Cabanatuan Mt. Makurukuru Mamburao o Leme r Tuban Sapat Paoa San Bontoc Sagada Mateo Mt. Data Santiag Mt. Kawal o Buaya Bayongbon g Dalton Pass R.S Kita -Kita Balagta s Backgrounder Calapan Alagao Mt. Sair Pata Sanches Mira Ballester os Apar ri Mt. Banoy Riz al Mayabobo L.Naujan Panamalaya n San Jose LE Panulian Nasiping Tuguegara o Roma Laga n Ibajay LE San Miguel Sta. Maria Iloilo Toll Cntr. Jordan L.E. Bagakay Kalibo LE Supo Caniapasan Villazar Naga City Bariw PHILIPPINE BACKBONE NETWORK Mt. Canlandog Balisong San Juan Gubat Lipata Catarman Palason L.E. Macagtas Adga Calbayog Tulibao Cebu Toll Ctr. Ormoc Toll Ctr Catbalogan Maasin Tacloba n San Roque Buscayan Borongan L.E. BoronganPassive Canceledes Naparaan Manufacturing 26% Insurance 3% Real Estate 0% RP Dependency on ICT Philippine IT Infrastructure per Sector 2005 Computer World Survey Transportation and Storage 2% Wholesale and Retail Trade 6% Agriculture, Fishery and Forestry 2% Banking 46% Camanggay Surigao LE Surigao Hill Salvacion Santiago Tibon-tibon Sipaca Butuan SugbongkogonPt. Mt. LE Mambayan Medina Gingoog Mayapay LE New Leyte Jimenez Manticao CagayanDe Oro Guihian San Andres Ozamis Ilagan Mapayapang LE Marawi Musuan San Vicente Maramag LE Peak Palpalan Asuncion Tubura Pinisikan LE LE n Nabunturan Pikit Carmen Tagum LE Cotobato LE Kabakalan MatinaLE LE DatuPian LE Davao City Isulan Tacurong LE LE LE Digos Koronada Hill l Malabakid Polonoling General Santos Pamolok LE LE Financial Intermediaries 2% Electricity, Gas, and Water 7% Construction 0% Community, Personal and Social Services 4% Communications 2% 4

5 Status of the Internet Number of ISPs are continuously increasing. Status of Internet Service Providers (ISPs) and Internet Exchanges (IXs( IXs) ) in 2004 # of ISPs 177 Status NTC-Registered ISPs Major ISPs Infocom Technologies (PLDT) MosCom CBCPNet Gnet (Globe Telecom) Pacific Internet Major IXs Philippine Internet Exchange (PHIX) Common Routing Exchange (CORE) Manila Internet Exchange (MIX) Globe Internet Exchange (GIX) <Source: Paul Budde, 2006> Source: National Telecommunications Commission 5

6 Status of the Internet The number of Internet users and subscribers increases continuously Average increment of 200,000~300,000 subscribers per year Users Subscribers <Source: Paul Budde, 2006> 6

7 Status of the Internet The number of host PCs increases The number of cyber incidents is proportional to the number of Internet subscribers, users, and host PCs Number of Host PCs <Source: Paul Budde, 2006> 7

8 Status of the Internet Number of Internet subscribers is much larger than number of broadband subscribers PCs for public use are prevalent, while the portion of individual l PCs is relatively small Public PCs are used as attack source, since it is hard to track and guarantees anonymity <Source: Paul Budde, 2006> 8

9 Status of the Internet Status of Philippine online game market (USD) Continuous expansion of online game market Possibility of cyber incidents (Online game cheating, identity theft, t item trading, etc.) is increasing Market size Growth rate <Source: Korea Game Development Promotion and Institute, 2005> 9

10 Status of Cyber Incidents US FBI recently estimated that the LOVEBUG,, made by a Philippine student in 2000, has caused a worldwide damage of approximately US$ 12Billion. NBI handled 30 various cyber crime cases as of 2005 TYPE OF CASE NBI CYBERCRIMES STATISTICS JAN - DEC Computer Fraud 8 2. Internet Pornography 3 3. Hacking 5 4. Computer s Violation of the E-Commerce Law 4 6. Verification 0 NO. OF CASES TOTAL 30 10

11 Status of Cyber Incidents In 2006, PNP monitored 446 defaced government websites mostly owned by local governments Defaced Government Websites, Source: 2007 PNP-CIDG Report * January to June data only Local Gov't National Govt * National Govt Local Gov't

12 Status of Cyber Incidents Data from Philippine Honeynet ( US and China are the major attack sources. More than 700 events occur by day when cyber attacks are fierce. 12

13 Status of Cyber Incidents Threats to nation s critical infrastructures 13

14 Status of Cyber Incidents Tarlac 1 cell site Bataan 1 cell site Oriental Mindoro 2 cell sites Nueva Ecija - 2 cell sites Bulacan 1 cell site Camarines Sur 3 cell sites Sorsogon 3 cell sites Masbate 1 cell site Palawan 1 cell site Bohol 1 cell site Compostela Valley 1 cell site Davao Oriental 1 cell site Davao del Norte 1 cell site 14

15 Status of Cyber Incidents Camarines Sur 3 cell sites Sorsogon 1 cell site Masbate 2 cell sites Surigao del Sur 1 cell site Bukidnon 1 cell site Basilan 1 cell site 15

16 Status of Cyber Incidents Case Study: Oplan Bojinka Oplan Bojinka was a 1995 plan by Al-Qaeda to simultaneously destroy 11 passenger aircraft over the Pacific Ocean. Reports indicate that Oplan Bojinka is the earlier version of 9/11 plot. If the operation had been successful, Al-Qaeda would have murdered thousands of airline passengers. 16

17 Status of Cyber Incidents Case Study: Oplan Bojinka The plot was discovered after a fire broke out in the Philippines apartment of Ramzi Yousef,, a Kuwaiti of Pakistani extraction and member of Al-Qaeda. Yousef was involved in the first World Trade Center bombing in

18 Status of Cyber Incidents Case Study: Oplan Bojinka Philippines police found bomb making material and a laptop computer in his apartment. The laptop computer contained encrypted messages that could not be read by the police or intelligence officials. 18

19 Status of Cyber Incidents Case Study: Oplan Bojinka Extensive analysis of the computer by law enforcement and intelligence officials eventually broke the encryption on the messages. The unencrypted messages detailed Yousef s plans to destroy the airliners and messages to his fellow co-conspirators. conspirators. Ramzi Yousef was sentenced to 240 years in prison in the United States. 19

20 Status of Cyber Incidents Case Study: Oplan Bojinka Plotters of the Oplan Bojinka used the Philippines as a launching pad for terrorist acts by providing training bomb making and logistical support the violent local terrorist group, Abu Sayyaf (ASO). In April 2000, the ASO demanded the release of Yousef from jail in the United States. 20

21 Lessons Learned Status of Cyber Incidents Case Study: Oplan Bojinka Computer forensics was critical to this investigation. The computer investigation allowed Philippine officials to analyze and decrypt the messages on the laptop. The information acquired was important in thwarting a deadly terrorist attack. 21

22 Status of Cyber Incidents Case Study: Oplan Bojinka Conclusion The use of the Internet by terrorist organizations will increase as these groups acquire the skills to conduct offensive operations. The interdependence of the critical infrastructure used by nation-states will allow terrorist groups these facilities with deadly results. 22

23 PH-CERT Assessment: Organization for RP Cyber Defense The first CERT in the Philippines Localized assistance Funding from membership fees and sponsorships No permanent staff purely voluntary Provides and phone based technical assistance (No on-site services) Coordination with law enforcement agencies Technical training However, the operation of PH-CERT encountered difficulty due to lack of financial support and human resources 23

24 Assessment: Organization for RP Cyber Defense National Bureau of Investigation - Anti Fraud and Cyber Crime Division Feb 1997: NBI-AFCCD created, through an Administrative Order, in order to address all computer related crimes and other offenses using technology Supported by the US-FBI to set up it Forensic Laboratory The NBI-AFCCD needs legislation in order to empower it, organizationally and financially, and make it effective in responding to cyber crime incidents 24

25 Assessment: Organization for RP Cyber Defense NBI Anti-Fraud and Computer Crimes Division 25

26 PNP - CIDG Assessment: Organization for RP Cyber Defense (Government Computer Security Incident Response Team) GCSIRT was created through TFSCI To suppress, detect and investigate computer network intrusions and other related internet or computer crimes Projected capability: digital analysis, log file analysis, forensic media analysis, etc. Issues: lack of specific legislation, overlapping roles of IT government bodies, lack of proper training of law enforcers, public awareness, etc. 26

27 Assessment: Organization for RP Cyber Defense The Philippine Honeynet Project It is a non-profit, all volunteer group dedicated to honeynet and security research. It is a part of a larger global security initiative called the Honeynet Research Alliance. 27

28 Assessment: Organization for RP Cyber Defense Honeynet s Infrastructure Study hackers tools and techniques to be able to use it against them by: Capturing new and existing attacks for research and analysis Profiling hackers / attacker behavior Analyzing attack trends and statistics Analyzing malware and hacker tools Publishing security research papers Coordinating with other security research organizations Sending out security advisories Sharing lessons learned to the community 28

29 Assessment: Organization for RP Cyber Defense 29

30 Assessment: Organization for RP Cyber Defense Other Organizations ISSSP (Information Systems Security Specialists of the Philippines) involved in the effort of creating awareness and raising the level el of information security practice security management in the Philippines PH-CISSP (Philippine Certified Information Systems Security Professionals) CISSP certified Filipinos with security professional work experience ence ISACA (Information Systems and Audit and Control) Manila Chapter sponsors local educational seminars and workshops, engages in IT research projects, conducts regular chapter meetings, and helps to further promote and elevate the visibility of the IS audit, control and security professional. 30

31 Assessment: Organization for RP Cyber Defense Status of CERTs in the Philippines Lack of human resource and systems to address cyber emergencies. Korea: More than 80 major CERTs CONCERT: Consortium of CERTs in Korea ( concert.or.kr) Requires national management to encourage development of CERTs and production of critical mass of cyber security professionals. 31

32 Assessment: Enabling Laws and Regulations e-commerce law RA 8792 Philippine E-Commerce E Law - not particular about emergency readiness but it does set the legal framework for recognition of electronic documents and transactions. Hacking and cracking Piracy or the unauthorized copying Violations of the Consumer Act or Republic Act (No. 7394) Bangko Sentral ng Pilipinas,, BSP (Central Bank of the Philippines) Circulars that apply to banks and financial institutions that dictate: Financial systems stability and service levels Connectivity security and redundancy requirements Presence of disaster recovery site and systems 32

33 Assessment: Enabling Laws and Regulations Pending laws including provisions for cyber security and ICT readiness HB 1246 Anti-Cyber Crime Act of 2001 HB 2251 Convergence Policy Act of the Philippines of 2004 SB 428 The Anti-Telecommunications Fraud Act of 2004 SB 2073 Data Protection Act of 2005 HB 3777 Cybercrime Prevention Act of 2005 A new Cyber-Crime Crime Prevention bill is being prepared by an Inter-Agency Cyber Law group for submission to the 14 th Congress 33

34 Role of the Cyber Security Coordinator q Learning from the 2 nd ARF Seminar on Cyber Terrorism: Our country needs a Focal Point to comprehensively address the task of coordinating domestic and foreign cyberterrorism countermeasures to spearhead publicprivate sector partnership in protecting our critical cyber infrastructures Note * As reported to Her Excellency the President 34

35 Role of the Cyber Security Coordinator q Task of the National Cybersecurity Coordinator: Deal with all domestic and transnational programs Oversee and provide direction to government countermeasures Coordinate operational responsibilities Note * As reported to Her Excellency the President 35

36 Role of the Cyber Security Coordinator q Task of the National Cybersecurity Coordinator: Integrate public and private efforts Organize and provide leadership to various CERTs Enhance national cybersecurity capability Spearhead collaboration with international organizations AUDIT REPORT PERIODIC RISK AND VULNERABILITY REPORTS 3RD PARTY ASSES SO AUDIT JOB Risk Assessment INVENTORY OF ASSETS Cyberspace Security Coordination Process RISK AND VULNERABILITY REPORTS INCIDENT REPORTS National Coordinator for Cyber Security Incident Response INCIDENT INCIDENT REPORTS INCIDENT REPORTS TRAINING COUES CONSEQUENCE MANAGEMENT ASSISTANCE POLICIES Laws & Policy INCIDENT REPORTS INCIDENT REPORTS TRAINING COUES POLICIES POLICIES LIST OF TRAINING COUES POLICIES Technical Training TRAINING COUES TRAINING COUES PRIVATE/PUBLIC CRITICAL INFORMATION INFRASTRUCTURE OPERATING UNITS REPORT ON TRIP PROGRAMS Awareness/ Advocacy TRIP CAMPAIGN AND ADVOCACY PROGRAMS Note * As reported to Her Excellency the President 36

37 RP Cyber Security Roadmap First step Second Step Make a complete goal for N-CERT Make a TFT (Task Force Team) for establishment of N-CERT Set-up the related Law and system Establish official N-CERT organization -Establish organization and it s function -Define the role of existing organizations -Define the coverage of N- CERT Make a National Cyber Security Framework Increase ability of Analyzing and responding to computer emergencies Technical Support Domestic and International Cooperation -gathering information on current Computer threats and vulnerabilities -Analysis and response to security incidents -supporting and consulting for Security technology (receive /cope with security incidents) Third step Build -up Computer emergency Response system Manage Information Security Education program Identify vulnerabilitiesand monitor responses to computer incidents -Collect information by using Honeynet -Collect information bye the local/domestic sensor -Detect infection of Malicious Code -Detect a hacked homepage -Fundamental course for information security administrator -Advanced course for information security administrator -Course for Establishment of CERT and Operation -As a Nation POC for computer incidents responses -Establish cooperation system with related organizations -Establish cooperation system with private CERTs 37

38 RP Cyber Security Roadmap IMPLEMENTING AGENCIES Military 38

39 Role of the Cyber Security Coordinator Office of the National Cyber Security Coordinator is the point of contact (PoC)) in nation and provides support to decrease occurrence of incidents in local systems National Coordinator Internal CERT Point of contact in nation The point of contact in the organization Technical support to cyber incident in nation The incident response in internal system and network Publication of information about prevention, detection, and recovery of vulnerabilities Detecting and patching Vulnerabilities Construction of system to analyze and respond the cyber incidents Analysis of internal cyber incidents and operation of the response system Training of security specialists and distribution of security guidelines Service protection according to the policy of the organization 39

40 Thank you UNDEECRETARY VIRTUS V. GIL National Coordinator for Cyber Security Office of the President, Republic of the Philippines Telephone numbers: /72/78 Facsimile number:

PASEGURUHAN NG MGA NAGLILINGKOD SA PAMAHALAAN (GOVERNMENT SERVICE INSURANCE SYSTEM) Financial Center, Pasay City, Metro Manila 1308

PASEGURUHAN NG MGA NAGLILINGKOD SA PAMAHALAAN (GOVERNMENT SERVICE INSURANCE SYSTEM) Financial Center, Pasay City, Metro Manila 1308 PASEGURUHAN NG MGA NAGLILINGKOD SA PAMAHALAAN (GOVERNMENT SERVICE INSURANCE SYSTEM) Financial Center, Pasay City, Metro Manila 1308 GSIS BIDS AND AWARDS COMMITTEE FOR INFRASTRUCTURE AND INFORMATION TECHNOLOGY

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]

More information

Capacity Building in Cyberspace Security

Capacity Building in Cyberspace Security Capacity Building in Cyberspace Security Muhammad Amir Malik Member (IT), Government of Pakistan [email protected] Sequence of Presentation Country Profile of Pakistan ICT Profile of Pakistan Cyberspace

More information

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation

More information

COUNTRY REPORT ON CYBERCRIME: THE PHILIPPINES

COUNTRY REPORT ON CYBERCRIME: THE PHILIPPINES 139TH INTERNATIONAL TRAINING COURSE RESOURCE VISITING MATERIAL EXPERTS SERIES PAPERS No.79 COUNTRY REPORT ON CYBERCRIME: THE PHILIPPINES Gilbert C. Sosa* I. INTRODUCTION Cybercrime goes beyond the technical,

More information

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior

More information

Trends and Tactics in Cyber- Terrorism

Trends and Tactics in Cyber- Terrorism Trends and Tactics in Cyber- Terrorism Presented by Li Jingjing Information Security Supervision Bureau (ISSB) Ministry of Public Security (MPS) China Outline What s Cyber-Terrorism? Crime Types and Trends

More information

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

MARCH 2016 MECHANICAL ENGINEER LICENSURE EXAMINATION PERFORMANCE OF SCHOOLS IN ALPHABETICAL ORDER

MARCH 2016 MECHANICAL ENGINEER LICENSURE EXAMINATION PERFORMANCE OF SCHOOLS IN ALPHABETICAL ORDER The performance of schools in the March 2016 Mechanical Engineer Licensure Examination in alphabetical order as per R.A. 8981 otherwise known as PRC Modernization Act of 2000 Section 7(m) "To monitor the

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

ASEAN s Cooperation on Cybersecurity and against Cybercrime

ASEAN s Cooperation on Cybersecurity and against Cybercrime ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended

More information

Protecting critical infrastructure from Cyber-attack

Protecting critical infrastructure from Cyber-attack Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

Report on CAP Cybersecurity November 5, 2015

Report on CAP Cybersecurity November 5, 2015 Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets

More information

Pacific Islands Telecommunications Association

Pacific Islands Telecommunications Association Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: [email protected] www.pita.org.fj INVITATION

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected] Framework

More information

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected]

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected] Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.

More information

Privacy and Security in Healthcare

Privacy and Security in Healthcare 5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

National Cybersecurity & Communications Integration Center (NCCIC)

National Cybersecurity & Communications Integration Center (NCCIC) National Cybersecurity & Communications Integration Center (NCCIC) FOR OFFICIAL USE ONLY NCCIC Overview NCCIC Overview The National Cybersecurity and Communications Integration Center (NCCIC), a division

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

Cybercrime Security Risks and Challenges Facing Business

Cybercrime Security Risks and Challenges Facing Business Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact

More information

Common Threats and Vulnerabilities of Critical Infrastructures

Common Threats and Vulnerabilities of Critical Infrastructures International Journal of Control and Automation 17 Common Threats and Vulnerabilities of Critical Infrastructures Rosslin John Robles 1, Min-kyu Choi 1, Eun-suk Cho 1, Seok-soo Kim 1, Gil-cheol Park 1,

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Legal Issues / Estonia Cyber Incident

Legal Issues / Estonia Cyber Incident Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia

More information

Computer Crime & Security Survey

Computer Crime & Security Survey 3 rd Japan & US Computer Crime & Security Survey Katsuya Uchida Associate Professor Institute of Information Security [email protected] Graduate School of Information Security Intentionally blank Respondents

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Cyber Security Strategy(Information Security Policy Council, June 10, 2013)

Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Environmental Change Vision to aim as a Goal Basic Principles Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Areas of Efforts Increasing severity of the risk surrounding cyberspace

More information

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100 SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define

More information

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November

More information

CHED LIST OF MARITIME HIGHER EDUCATION INSTITUTIONS (MHEIs) offering BSMT and BSMarE programs as of March 2013

CHED LIST OF MARITIME HIGHER EDUCATION INSTITUTIONS (MHEIs) offering BSMT and BSMarE programs as of March 2013 CHED LIST OF MARITIME HIGHER EDUCATION INSTITUTIONS (MHEIs) offering BSMT and BSMarE programs as of March 2013 PRIVATE MARITIME HIGHER EDUCATION INSTITUTIONS (PHEIs) 1 I Northern Philippine College For

More information

INFORMATION SECURITY FOR YOUR AGENCY

INFORMATION SECURITY FOR YOUR AGENCY INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection

More information

The Battlefield. critical infrastructure:

The Battlefield. critical infrastructure: CIP A Business View Rolf Schulz CEO Definition critical infrastructure: 1. Elements of a system that are so vital that disabling any of them would incapacitate the entire system. 2. [In security,] those

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

More information

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security

More information

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure. MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency I. Alarming call for cooperation with ISPs Slammer Worm Spread most of vulnerable SQL servers

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For

More information

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August

More information

Cyber Security a Global Challenge; What and how Thailand is doing

Cyber Security a Global Challenge; What and how Thailand is doing Cyber Security a Global Challenge; What and how Thailand is doing Pansak SIRIRUCHATAPONG Executive Director National Electronics and Computer Technology Center February 19, 2009 1 Global IT Security Market

More information

Network/Cyber Security

Network/Cyber Security Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces Training

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

INDEPENDENT BUSINESS CENTER

INDEPENDENT BUSINESS CENTER INDEPENDENT BUSINESS CENTER National Capital Region (NCR) 1. A. BONIFACIO AVE., QUEZON CITY MS. JANELLE KHO 926 Kho Building, A. Bonifacio Avenue Balintawak, Quezon City Landline: 5772526 Mobile No.: 09178980189

More information

Qatar Computer Emergency Team

Qatar Computer Emergency Team Cyber Security Division Qatar Computer Emergency Team An initiative Introduction Qatar aims to fully exploit information and communications technology to become one of the most successful knowledge-based

More information

Gregg Gerber. Strategic Engagement, Emerging Markets

Gregg Gerber. Strategic Engagement, Emerging Markets Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005

More information

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015 Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

Security & privacy in the cloud; an easy road?

Security & privacy in the cloud; an easy road? Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands [email protected] THE SHIFT O L D W O R L D

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

INFRAGARD.ORG. Portland FBI. Unclassified 1

INFRAGARD.ORG. Portland FBI. Unclassified 1 INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence

More information

International Journal of Enterprise Computing and Business Systems

International Journal of Enterprise Computing and Business Systems PREVENTING CYBER CRIME: A STUDY REGARDING AWARENESS OF CYBER CRIME IN TRICITY Ms.Arpana(PhD in Progress) Lecturer GJIMT, Ph-II,Mohali,India Dr.Meenal Chauhan Assistant Professor GJIMT,Ph-II, Mohali, India

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and

More information

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police Cybercrime : Malaysia By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police ICT Development The ICT development within this region has been rapid since more than 3 decades ago. With the launching of the

More information

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004 A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:

More information

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7 1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network

More information

Strategies for Countering Cyber Threats

Strategies for Countering Cyber Threats UNDERWRITTEN BY Strategies for Countering Cyber Threats By Aliya Sternstein The federal government is out to stop cybercrooks by reaching potential victims before they do. Public outreach is one of the

More information

Philippine Postal Corporation 2013 ANNUAL PROCUREMENT PLAN

Philippine Postal Corporation 2013 ANNUAL PROCUREMENT PLAN Philippine Postal Corporation 2013 ANNUAL PROCUREMENT PLAN PARTICULARS A. OPERATIONAL & ADMINISTRATIVE SUPPLIES & MATERIALS B. ACCOUNTABLE FORMS C. REPAIRS AND MAINTENANCE 1. Buildings and Structures 2.

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Who s Doing the Hacking?

Who s Doing the Hacking? Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

OCIE CYBERSECURITY INITIATIVE

OCIE CYBERSECURITY INITIATIVE Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

US-CERT Overview & Cyber Threats

US-CERT Overview & Cyber Threats US-CERT Overview & Cyber Threats National Cyber Security Division United States Computer Emergency Readiness Team June 2006 Agenda Introduction to US-CERT Overview of why we depend on a secure cyberspace

More information