LONDON 2012: CYBER SECURITY

Size: px
Start display at page:

Download "LONDON 2012: CYBER SECURITY"

Transcription

1 LONDON 2012: CYBER SECURITY SHARING OUR EXPERIENCES Oliver Hoare Former Head of Cyber Security Government Olympic Executive UNCLASSIFIED 1

2 GREAT BRITAIN CONGRATULATES TOKYO 2020 UNCLASSIFIED

3 THEMES Scale and scope Strategy and governance Assurance, testing and exercising Response Reflections and the future 3

4 UNCLASSIFIED 4

5 THE FIRST DIGITAL GAMES BBC Sport broke all previous records with 55m global browsers (35m in the UK) London 2012 website 4.73 billion web page views (109m unique users in Games time) BT and Cisco provided the largest high-density Wifi network in the World (around the Olympic Park) Online video 106m requests across all platforms (more than double of any previous event) Unprecedented use of Wifi, mobile, RF, IP and digital services UNCLASSIFIED

6 ROLE OF TECHNOLOGY Reputation Increased reliance Spectator experience High expectations Global audience Showcase for a nations capability What s new? (innovation) UNCLASSIFIED

7 THREAT AND RISK Reputational risk Scale / pressure to deliver Errors / things going wrong Hostile threats Cyber crime Cyber espionage (APT) Cyber terrorism Cyber activism / Hacktivism Strategic Risk Assessment 23 Strategic Cyber Risks identified Senior Risk Owners 7

8 STRATEGY OVERVIEW Integrated strategy and risk assessment 30 point Cyber-Security action plan Governance Ministerial / Senior Programme / Assurance / Technical Operational / Response (OCCT/CERT) Assurance strategy Critical systems Testing and exercising Police Activity Operation Podium Stakeholder engagement (Government, industry, sponsors, broadcasters, transport and utilities, public) UNCLASSIFIED

9 GOVERNANCE STRUCTURE British Olympic Association Greater London Authority (Mayor) International Olympic Committee London Organising Committee for Olympic and Paralympics Games (LOCOG) LOCOG Olympic Board Government / Olympic Security Directorate Olympic Delivery Authority INFRASTRUCTURE DESIGN & CONSTRUCTION TRANSPORT 9

10 GOVERNANCE AND STAKEHOLDERS Ministers (Olympic Ministers, Home Secretary, Prime Minister, Mayor) Government Olympic Executive Overall lead, assurance & finance Home Office Security lead Senior ICT Leaders Group (Director & CIO level) Information Assurance & Cyber Security Co-ordination Group Other key cyber stakeholders Technology supplies/ utilities/ transport MSP Forum (CPNI) Managed Service Provider Forum TISAC Telecommunication Industry Security Advisory Forum Broadcasters (national, international and Olympic) IBC/MBC Olympic sponsors Public / spectators / overseas visitors 10

11 London 2012 IA Strategy/Programme Command, Control and Comms (C3) architecture / testing & exercising London 2012 Information Assurance Organisations Operations Centres Venues Critical Supporting systems

12 COMMAND, CONTROL & COMMUNICATIONS (C3) Core Briefing Team Olympic Coord. Group S tariat Cabinet Office Briefing Rooms Sit. Cell News Coord. Centre MIG Main Operations Centre Venues Villages and Precincts Delivery Partners Func. Areas Force Control Rooms (Outside London) NOCC Partners OIC National Olympic Coordination Centre NOCC Comms Desk Force Control Room E.g. Lambeth SOR (GOLD) GLA Press Desk London Operations Centre GLA Group Services (eg Live Sites) Prot. Coord. Office NCCCT OCCT Modal Operators Transport Coordination Centre Snr. Officers Group LAOCC Mayor s Office Version 0.9.4

13 OLYMPIC CYBER CO-ORDINATION TEAM UK Joint team brought together establishing the first dedicated Olympic CERT 13

14 TECHNOLOGY OPERATIONS CENTRE 600 Staff 24/7 Operated by LOCOG Technology Team Jointly staffed by BT, Atos and CISCO (Omega other sponsors) Secure comms direct to Olympic CERT Back up (Hackney College) 14

15 CRITICAL SYSTEMS Surveyed approx 450 Olympic specific and supporting systems Identified 40 critical systems Criteria: risk to public safety impact on sporting event quality and ability to broadcast impact on spectator experience damage to reputation of UK Multi layered assurance (questionnaires, visits, inspections, games readiness statements) Non-critical systems! 15

16 TESTING AND EXERCISING FLAMING TORCH - programme of table top exercises BENDING METAL - specific cyber / CERT testing Command Post Exercises fully integrated testing LIVE EX (exercise) Torch relay Technical rehearsals test events 16

17 WHAT WE SAW London 2.35 billion security system messages logged (Beijing reportedly 12 billion security events) Blocked 200 million malicious connection requests, 11,000 per second in one Distributed Denial-of- Service attack. Olympic Website 493,000 peak concurrent users OCCT & TOC 50 tickets raised each Virus during construction (Conflicker) DOS & DDOS (Olympic Website, government sites, other sites) Theft of cable and high value components Spoof websites/ scams (tickets, accommodation and merchandise) 200 arrests under PODIUM (approx 100 related to online crime) Laptop thefts Evacuation of TOC Flooding - evacuation of Police control centre Two national level cyber response incidents - Opening ceremony national level response (COBR) 17

18 LESSONS FROM LONDON 2012 What we got right Testing & exercising C3 / Olympic CERT Blend between government and industry Spectrum allocation Right technology partners (BT, Atos, Cisco etc) Broadcasting (digital) is a critical Utilities generally a low level threat, but potentially very high impact manual resilience / C3 What we learned ICT is very expensive, particularly to retrofit (get it right first time) Build Cyber-Security from very beginning, preferably into contracts Build relationships with commercial providers and Government early Co-ordination across many different systems and sectors is hard but crucial (Information Assurance and Cyber Security Coordination Group / Senior ICT Group / Olympic Cyber Coordination Team) 18

19 COULD WE HAVE DONE IT BETTER? Started earlier Built information assurance into contracts at an earlier stage Establish senior governance and leadership in place earlier Better/earlier engagement with Ministers on cyber issues Appointed an independent overarching partner to assure cyber security Heavily reliant on technology sponsors (inevitable) If a national CERT in place, would not needed to create one Considered cyber issues in terms of insurance (e.g. lost of broadcast, or other major services) Online ticketing some issues with website (almost inevitable) Delivered the most connected Games ever 19

20 WHAT S COMING DOWN THE TRACK FOR TOKYO 2020? Lessons from Sochi and Rio? Technology the internet of things HD, 3D & Super High Vision broadcasting (limited use during London - outdoor broadcasts live sites) 4G/LTE and very high volume of mobile smartphone/tablets Interactive technologies Cyber threat for Tokyo? Global political situation in summer expect protest and hacktivism Espionage does it matter? Cyber crime - it will happen! Cyber terrorism? 20

21 EXPERIENCE AND EXPERTISE WE CAN SHARE UNCLASSIFIED

22 UK CYBER SECURITY EXPERTISE Advise develop security policy, programme strategy, risk management & audit methodology Assure Validate, verify and accredit capability (Confidentiality, Integrity & Availability) Educate & train build knowledge, skills and know-how Services run solutions on behalf of customers Integration holistic and integrated programme delivery (design specification programme operations) Architecture & Design design secure, robust and resilient systems and services Security Management integrate effective and agile security management across an organisations Surveillance & reconnaissance observe behaviours and identities of users and platforms Incident Management Effective co-ordination and crisis management, to ensure systems recovery and data cleansing Venue Security Operations - Acquire, store, analyses and visualise very large and complex datasets Social Media Analysis Capture and analyse of social network activity Forensics Extract, secure and analyse data to evidential standards Transactional Protection End to end security for information transactions, across variable trust environments Trusted platforms Ensure integrity of hardware systems Identify & Authenticate Capture, store and manage identity data, authentication Infrastructure creating secure storage, processing and communications capacity with resilient supporting infrastructure UNCLASSIFIED 22

23 GREAT BRITAIN CAN HELP SECURE YOUR MAJOR EVENTS AND PROGRAMMES UNCLASSIFIED 23

Preventing & Mitigating Potential Threats at Large-Scale Events: A look at past & future plans involving the Olympics & Super Bowl

Preventing & Mitigating Potential Threats at Large-Scale Events: A look at past & future plans involving the Olympics & Super Bowl Preventing & Mitigating Potential Threats at Large-Scale Events: A look at past & future plans involving the Olympics & Super Bowl 13:30-14:30, Wednesday, 16 September 2015 The World Bank D.C. Headquarters,

More information

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments London 2012 Olympic Safety and Security Strategic Risk Assessment (OSSSRA) and Risk Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments Introduction London 2012

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Protecting critical infrastructure from Cyber-attack

Protecting critical infrastructure from Cyber-attack Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale

More information

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Cyber Security. A professional qualification awarded in association with University of Manchester Business School ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security

More information

Working Towards the 2020 Tokyo Olympics

Working Towards the 2020 Tokyo Olympics Working Towards the 2020 Tokyo Olympics - The Current Situation in 2015 Mariko Miya Cyber Defense Institute, Inc. [email protected] Agenda 1. Introduction 2. The current situation in Japan 2015 Analytics

More information

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For

More information

Section A: Introduction, Definitions and Principles of Infrastructure Resilience

Section A: Introduction, Definitions and Principles of Infrastructure Resilience Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

Working together to protect the Integrity of Sport. The role of the Joint Assessment Unit at the London 2012 Olympic Games

Working together to protect the Integrity of Sport. The role of the Joint Assessment Unit at the London 2012 Olympic Games Working together to protect the Integrity of Sport The role of the Joint Assessment Unit at the London 2012 Olympic Games March 2013 1 Contents 1 Background 3 2 Overview of Operational Activity 3 3 Overview

More information

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 UK Networks & Security An Overview Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 Objectives The structure of your public communication networks The threat landscape these networks face

More information

Committees Date: Subject: Public Report of: For Information Summary

Committees Date: Subject: Public Report of: For Information Summary Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security

More information

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme [email protected] Official Problem or opportunity Office for National Statistics In

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Departmental Business Continuity Framework. Part 1 Policy and Standards

Departmental Business Continuity Framework. Part 1 Policy and Standards Department for Work and Pensions Departmental Business Continuity Framework Part 1 Policy and Standards Page 1 of 34 CONTENTS Foreword... 3 Introduction... 4 British Standard BS25999... 4 Section 1 Policy...

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

MAJOR EVENTS COORDINATION UNIT

MAJOR EVENTS COORDINATION UNIT 1 UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY MAJOR EVENTS COORDINATION UNIT 2 1 THE BUREAU OF DIPLOMATIC SECURITY (DS) IS THE SECURITY AND LAW ENFORCEMENT ARM OF THE U.S. DEPARTMENT

More information

Identifying Cyber Risks and How they Impact Your Business

Identifying Cyber Risks and How they Impact Your Business 10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates

More information

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry Templar Executives NIAS 2007 DHR 2008 IAMM 2008 1 st CSS 2009 2 nd CSS 2011 Advising Government & Industry

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

Business Continuity Management Policy

Business Continuity Management Policy Business Continuity Management Policy Policy Holder: Authoriser: Caroline Gover, Head of Business Continuity Caroline Thomson, Chief Operating Officer Reviewed on: Feb 08 Reviewed on: Feb 08 Next Review

More information

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote

More information

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

How To Manage A Business Continuity Strategy

How To Manage A Business Continuity Strategy Business continuity strategy 2009 2012 Table of contents 1 Why this strategy is needed 3 2 Aim of the strategy 4 3 Our approach to business continuity 4 PROCESS 4 STRUCTURE 5 DOCUMENTATION 6 DISRUPTION

More information

Central Sponsor for Information Assurance. A National Information Assurance Strategy

Central Sponsor for Information Assurance. A National Information Assurance Strategy Central Sponsor for Information Assurance A National Information Assurance Strategy A NATIONAL INFORMATION ASSURANCE STRATEGY i Foreword Information and communications technology is changing the way that

More information

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked

More information

Communication on Spectrum Management for Rio 2016 Functional Areas. Spectrum Newsletter - 02/2014. Version 1.2 October 2014

Communication on Spectrum Management for Rio 2016 Functional Areas. Spectrum Newsletter - 02/2014. Version 1.2 October 2014 Spectrum Newsletter - 02/2014 Communication on Spectrum Management for Rio 2016 Functional Areas Version 1.2 October 2014 Spectrum Management AF Telecom SUMMARY 1 INTRODUCTION... 3 2 FUNCTIONAL AREAS...

More information

Information Security Management at the Olympics: Finding the Needle in the Haystack

Information Security Management at the Olympics: Finding the Needle in the Haystack Information Security Management at the Olympics: Finding the Needle in the Haystack Markus J. Krauss VP Cloud Computing and Service Provider [email protected] Chris Van Den Abbeele Solution Manager ISRM [email protected]

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security 1 NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations Ian J West Chief, Cyber Security [email protected] 2 NATO UNCLASSIFIED Cyber Security Service Line Ian West

More information

ACE European Risk Briefing 2012

ACE European Risk Briefing 2012 #5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs

More information

Appendix 6c. Final Internal Audit Report Disaster Recovery Planning. June 2007. Report 6c Page 1 of 15

Appendix 6c. Final Internal Audit Report Disaster Recovery Planning. June 2007. Report 6c Page 1 of 15 Appendix 6c Final Internal Audit Report Disaster Recovery Planning June 2007 Report 6c Page 1 of 15 Contents Page Executive Summary 3 Observations and Recommendations 8 Appendix 1 - Audit Framework 13

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

Physical Security Services

Physical Security Services Physical Security Services The ANVIL Group Physical Security Services The ANVIL Group is an internationally renowned and accredited security company specialising in Crisis Avoidance. Established in 1988,

More information

developing your potential Cyber Security Training

developing your potential Cyber Security Training developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Version 11.0 October 2013 Contents Introduction... 4 Government Security Responsibilities... 4 Role of the Centre... 5 Policy Context... 7 Critical National Infrastructure

More information

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected]

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected] Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.

More information

Cybercrime Security Risks and Challenges Facing Business

Cybercrime Security Risks and Challenges Facing Business Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning

More information

1.0 Policy Statement / Intentions (FOIA - Open)

1.0 Policy Statement / Intentions (FOIA - Open) Force Policy & Procedure Reference Number Business Continuity Management D269 Policy Version Date 23 July 2015 Review Date 23 July 2016 Policy Ownership Portfolio Holder Links or overlaps with other policies

More information

How do we Police Cyber Crime?

How do we Police Cyber Crime? How do we Police Cyber Crime? Thursday 4 th June 2015 Craig Jones, SEROCU Presentation Content UK policing cyber crime programme Cyber threat landscape and impact Cyber business resilience Future Challenges

More information

NEW ZEALAND S CYBER SECURITY STRATEGY

NEW ZEALAND S CYBER SECURITY STRATEGY Appendix 1 NEW ZEALAND S CYBER SECURITY STRATEGY June 2011 New Zealand Government 7 June 2011 ISBN: 978-0-478-38200-6 www.med.govt.nz/cyberstrategy MED11 Foreword from the Minister The Internet and digital

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency 1 Challenge for Cyber Security in Financial Sector (1) Necessity to Strengthen

More information

BT Conferencing Business Continuity Management. Planning to stay in business

BT Conferencing Business Continuity Management. Planning to stay in business BT Conferencing Business Continuity Management Planning to stay in business Planning for the unexpected In today s connected world, businesses are increasingly dependent on their communications and networked

More information

Cyber security. Ideal logo position here

Cyber security. Ideal logo position here Cyber security Ideal logo position here Cyber security Cundall IT and audio visual Setting the scene UK construction industry Computer networks Ethical hacker Case studies Summary Final thoughts IT and

More information

ISO27032 Guidelines for Cyber Security

ISO27032 Guidelines for Cyber Security ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

National Approach to Information Assurance 2014-2017

National Approach to Information Assurance 2014-2017 Document Name File Name National Approach to Information Assurance 2014-2017 National Approach to Information Assurance v1.doc Author David Critchley, Dave Jamieson Authorisation PIAB and IMBA Signed version

More information

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Big Data and Society: The Use of Big Data in the ATHENA project

Big Data and Society: The Use of Big Data in the ATHENA project Big Data and Society: The Use of Big Data in the ATHENA project Professor David Waddington CENTRIC Lead on Ethics, Media and Public Disorder [email protected] Helen Gibson CENTRIC Researcher [email protected]

More information

Playing Our Part in Responding to National Threats

Playing Our Part in Responding to National Threats Agenda Item 7 Report of: The Secretary of the Police and Crime Panel Date: 1 February 2016 1. Purpose of Report Playing Our Part in Responding to National Threats 1.1 This report provides Members with

More information

BT Assure Rethink the Risk

BT Assure Rethink the Risk BT Assure Rethink the Risk Analyst and Consultant Update May 2012 BT Assure. Security that matters Today's agenda Introductions Neil Sutton Vice President, Global Portfolio 3 Minutes BT Assure Overview

More information

Greater Manchester Police. Police service becomes more agile

Greater Manchester Police. Police service becomes more agile Greater Manchester Police Police service becomes more agile the customer overview Customer Greater Manchester Police Website Greater Manchester Police Number of employees Approx 170 Country or region Manchester,

More information

When Risk become Reality: a Practical Application of Event Risk Management The Baku 2015 1 st European Games

When Risk become Reality: a Practical Application of Event Risk Management The Baku 2015 1 st European Games When Risk become Reality: a Practical Application of Event Risk Management The Baku 2015 1 st European Games Peter Ashwin Director of Security Baku 2015 1 st European Games (October 2013 June 2015) Overview

More information

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Firstly, an apology + + = What shall we discuss What is Cyber Crime? What are the current threats? What is the capability of local and

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008 U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October

More information

Understanding Cyber Defense A Systems Architecture Approach

Understanding Cyber Defense A Systems Architecture Approach NDIA 12th Annual Systems Engineering Conference, San Diego, CA, 26-29 Oct 2009 Understanding Cyber Defense A Systems Architecture Approach Tom McDermott Director of Research Georgia Tech Research Institute

More information

Introduction to Cyber Security

Introduction to Cyber Security Introduction to Cyber Security Hossein Sarrafzadeh HoD Computing Director Cyber Security Centre CS4HS Workshop You are sitting in New Zealand s first joint research centre for cyber security Centre of

More information

Cyber Security Metrics Dashboards & Analytics

Cyber Security Metrics Dashboards & Analytics Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics

More information

Business Continuity Management. Policy Statement and Strategy

Business Continuity Management. Policy Statement and Strategy Business Continuity Management Policy Statement and Strategy November 2011 Title Business Continuity Management Policy & Strategy Date of Publication: Cabinet Council Published by Borough Council of King

More information

State and Regional Emergency Management Committees Part 5: Emergency Management Manual Victoria

State and Regional Emergency Management Committees Part 5: Emergency Management Manual Victoria State and Regional Emergency Management Committees Part 5: Emergency Management Manual Victoria Contents 5.1 Introduction...5 1 5.2 Committees in Emergency Management...5 1 5.3 State Crisis and Resilience

More information

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document

More information

Capabilities for Cybersecurity Resilience

Capabilities for Cybersecurity Resilience Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information