CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

Size: px
Start display at page:

Download "CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE."

Transcription

1 CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

2 CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE The early 21st century has been defined by the Internet, information and our information infrastructure. Protecting information and its associated infrastructure has become as important as protecting any of our national secrets. In our digital age cyberspace and the information within it is key. In today s hyper-connected world it plays a critical role in how we live, work, and drives our businesses. The information we create increases exponentially as does our reliance upon it. Securing and managing our information and the availability to access information securely, becomes even more important and challenging. The Centre for Strategic Cyberspace + Security Science / CSCSS as a leader in cyberspace engages with a broad variety of national-international government agencies, public-private industry, and academic institutions to counter the extensive range of threats faced in cyberspace, and to ensure information assurance, protection, and freedom. We converge and leverage unique and highly complementary skills sets along with our broad-based operational and focused architecture. This is required to take on an ever-increasing complex and dynamically changing range of issues that encompass extremely technical international, cultural, socio-economic, and cyber intelligence facets. We must think globally and cooperatively to respond to these challenges and CSCSS is the entity that will be the service model leading the field into the 21st century.

3 AT A GLANCE ncreated in 2010 nnot for Profit Entity (United Kingdom) ndirected: Global CSCSS Board of Directors nmanagement: Corporate Officers/Senior Staff Members ninternational Advisory Board nglobal Presence & Footprint nglobal Headquarters: London, United Kingdom n75+ Global Trans-Industry Advisory nkey Focus Areas: n Cutting-Edge Leadership n Technologies n Research and Development n Intelligence Services n International Cyber Law nindustries + Sectors We Serve: n Banking/Financial n Science/Research n Healthcare and Medical Sciences n Manufacturing n Telecommunications n Payment Card Industry and Processing n Public Sector Utilities n Government/Critical Infrastructures n Intelligence Community CSCSS / International Leadership The Centre for Strategic Cyberspace + Security Science / CSCSS delivers leadership in international cyber security and cyberspace affairs, and represents emerging standards. We promote what is best about cyber-centric leadership and the capability of bringing together diverse and converging view points, leadership in cyberspace, and the central strategic issues and opportunities on the international stage. International Priorities The International Strategy for Cyberspace, promoted by CSCSS is an open invitation to for the global community to unite in a vision of prosperity, security, and openness through a digitally interconnected world; to coordinate their roles in international cyberspace policy, law and to define and execute a specific way forward on the international cyber-stage in accordance with the CSCSS vision. About The Centre for Strategic Cyberspace + Security Science The Centre for Strategic Cyberspace + Security Science / CSCSS is a multilateral, international not-for-profit organization that conducts independent cyber-centric research, development, analysis, and training in the areas of cyberspace, defence intelligence, cyber security, cybercrime, and science while addressing the threats, trends, and opportunities shaping international security policies and national and international cyberspace cybersecurity initiatives. CSCSS, as a strategic leader in cyberspace, works jointly with key partners to address, develop, and define cyber technologies, cyber defence force capabilities, information dominance, and concept operations. We deliver practical recommendations and innovative solutions and strategies to advance a secure cyberspace domain. nlegislation and Policy NIST, BIS, NATO, United Nations

4 VISION Our vision is to ensure that cyberspace remains open to innovation and the free flow of ideas, information, and expression. MISSION Our mission is to conduct high-quality, credible, independent research, and provide innovative, focused, realistic recommendations and initiatives. GOALS CSCSS is determined to tackle threats on a global level with our focus on the international aspects of cyberspace and security. CSCSS - Leadership / Research / Defence The Centres efforts are focused around three broad categories: Leadership / Research / Defence. We are committed to an open and stable cyberspace and deliver our mission and vision to senior international government officials, industry and military heads, and international experts look to CSCSS as a trusted partner to discuss cyber policy. CSCSS is committed to: n Strengthening cyberspace at an organizational, national, and international level. n Protecting key elements of the information and critical infrastructure which are crucial to the continued and uninterrupted delivery of essential services and national security services. n Preventing loss, through espionage, or other rogue techniques, of intellectual property and/or of sensitive information that could damage national and economic security and well-being. n Reducing the vulnerability of national critical infrastructure through cyber warfare, cyber-terrorism, and other threats (Protect and defend). Location / Regions The Centre for Strategic Cyberspace + Security Science operates internationally and is headquartered in London, United Kingdom, with regional offices located in a variety of locations. This provides CSCSS with a strong global footprint and effective reach into potential strategic partnerships. n Americas n Europe n Russia/Eurasia n Middle East n Asia Pacific n East Asia n Africa The CSCSS Deliverable As an independent organization, CSCSS delivers a uniquely positioned and unbiased third party, globally focused, well-defined, strategic objective. We present clear cyber and cyberspacebased security goals for government and the public-private sector, leveraging on best practices, and lessons learned, and not affected by any particular point-of-view. In the global forum, we are the only independent, multilateral, not for profit, cyberspace and security science group in operation, working to generate international strategies and scientific research that clearly articulates strategic priorities, goals, and objectives, providing unbiased intelligence reports for better decision making.

5 In accordance with ISO a 9001:2013, ANSI, IEEE, BIS, NIST, and ACM standard. CSCSS provides, delivers and promotes forward thinking cyber centric solutions and programmes, built to a resilient multidimensional paradigm. The Benefits CSCSS provides world-class research, strategic focus, advice, and leadership on cyberspace cybersecurity. Cybersecurity is intrinsically multifaceted and complex involving national security, economic security, commercial interests, and privacy concerns, threats, trends and challenges. We work within a framework of convergence and collaboration with numerous CSCSS stakeholders, strategic alliances, interagency partners, academia, industry experts, and international organizations. All of which aim to advance and converge the understanding and importance of cyberspace and cybersecurity at a global level. CSCSS Expertise CSCSS experts are all rooted in open solution inquiry, transparency of process, and represent diverse points of view focused on cyberspace and its associated fields and issues. We provide leadership on international cyberspace to address latest strategic security issues, threats, and responses to international cyber relations, cyber law, treaties, conflict, and conventions in relation to continually evolving cyberspace challenges. CSCSS Staff have been cleared to NATO SECRET, US DoD TS, UK, 5i and NATO and U.N. security requirements. Our standard is a comprehensive, highly trained, highly skilled and agile team composed of former military intelligence officers, law enforcement and leading cyber professionals. This enables CSCSS to provide a resilient response to the evolving trends and challenges faced by industry. Cyber Support for Government The Centre for Strategic Cyberspace + Security Science has prioritized providing cyberspace support and programs for members of the UK Parliament and the United States executive, military and intelligence branch agencies along with Congressional support for policy and legislative development. This includes, but is not limited to, cybersecurity support, studies, events, forums, education, and leadership from the world s top experts in cybersecurity, cyber warfare, cyber offence/defence, security policy, and global cyber challenges. CSCSS Provides an independent, third party, multilateral body with which members of Parliament and Congress can engage on cyberspace issues. CSCSS Programmes Forums + Events CSCSS's leadership forums, programmes, global conferences, summits, workshops, events and initiatives endeavour to bring forward, deliver, and develop strategic cyber-centric concepts, insights, convergence and solutions to cyber problems that can be grouped by broad research areas of and study topics or regions. Goals are established in accordance with requirements for commensurate protection of critical infrastructure, focusing on infusing knowledge into the appropriate educational level and curriculum. CSCSS Global Presence CSCSS delivers full spectrum leadership, deep knowledge and skills and resources through an expert staff of professionals and an extensive partner network. We help industry and NGO s address their specific challenges in information security, cyberspace and those challenges within cyberspace cybersecurity, cyber law, cyber-defence and international and domestic cybercentric policies. CSCSS DIVISIONS + CENTRES Cyberspace Division + Key Domains of Focus CSCSS core division s focus on cyberspace, cyberwarfare and conflict, cybercrime, cyber science and technology, and cyber security-based research and development, studies, and initiatives, working to find strategic insights and solutions. CSCSS focuses on research and development in cyberspace, cyber-science, and cyber-security to find strategic insights and solutions. Our core domains of operations are: CSCSS / CYBERCRIME C CIS INTELLIGENCE SERVICE CSCSS / DEFENCE C DIG INTELLIGENCE GROUP CSCSS / ENTERPRISE C ETS TECHNOLOGY + SECURITY CSCSS / RESEARCH C RDG + DEVELOPMENT GROUP CSCSS / CYBER CONFLICT C CCC CENTER

6 Custom Services + Products CSCSS provides insights on key issues, relating to DI as well as advisory services to government, military, industry and agencies. We strive to enhance the understanding of the defence and intelligence related to cyber threats posed by foreign intelligence services and transnational competitors to bring attention to national security issues of common concern. We offer a broad range of services to secure and better protect commercial activities, economic programs, and intellectual property in hostile environments, which, if lost, could dramatically impact national and economic security. The Industries We Serve In a digital world our future is tied to information its manipulation, delivery, integrity and security. CSCSS protects national security by delivering protective security programmes and services. CSCSS works within critical infrastructures to assist industry, governments, and agencies to drive forward cyber security programmes to counter cyber based threats. SECTORS WE SERVE Publicly and privately held companies across a wide range of industries in the following sectors: Banking and Financial Science / Research Healthcare / Medical Health Sciences We deliver a range of services and programmes including: n CyberGenysis Workshops and Cybersecurity Training (Classified/Non Classified) n Cyber-Centric Research, Programmes, and Development n Cybercrime Investigation, Fraud Prevention and Investigation n Cyber Terrorism, Espionage, Cyber warfare, Weapons, Trends + Threat Assessment n Cyber Attack Profiling + Attack Mitigation n Cyber Intelligence / Detailed Aggressor Briefings n Cyber-Attack (Trends and Potential Types of Cyber-Attacks) n Cyber Diplomacy, Cyber Law and Policy n Cyber-Defence Strategy + Policy Development and Implementation n Defence Intelligence / Cyber Intelligence / Counter Intelligence Services n Enterprise Technology + Security Services National Cyberspace Cyber Security Initiatives / NCCSI CSCSS advocates that national cyber security initiatives must focus their influence internationally on the collective and multinational aspects of cyberspace, cybersecurity, and national level cybersecurity. Through NCCSI we will coordinate collaborative and convergent international partnerships with government, academia, and the public-private sector, as well as multinational-interagency (5i) cooperation. International Cybercrime and Law CSSCSS will continue to build its presence, provide and promote leadership on issues relating to privacy and the free flow of information in a secure and reliable manner. Our focus is on International cyber policies, conventions, cyber law and its relationship to cyberspace; cybercrime, cyber-terrorism, or e-terrorism, present global challenges in the present and for the future. Manufacturing Telecommunications Payment Card Industry + Processing Globally, CSCSS will work to address the complexities of the ever-changing problems relating to cybercrime, cyber law, and will assist organizations to address a wide range of people, process, and technology issues. CSCSS, through its Cybercrime Intelligence Services, will deliver immediate and long-term leadership, policy and security recommendations for the financial services infrastructure. Public Sector Utilities and Government Intelligence

7 Research + Development The primary goal of the CSCSS Cyberspace Science Research + Development is to provide forward-looking, cutting-edge research and development, categorization of issues (distinguishing yet blending technology research and strategic studies), and unique laboratory facilities that allow our faculty of researchers to support our cyberspace and security research initiatives. Cyberspace Science Cyberspace science leverages the convergence of technology and natural and social sciences, furthering their shared understanding of the nature of cyberspace, both real and virtual. Applying science and cybersecurity to secure cyberspace ultimately satisfy the requirement for security design in this new environment. CSCSS, in conjunction and cooperation with world bodies is championing the blended education approach, which should begin as early as possible and aligned with STEM having a full lifecycle, and treated as a science. Research and Development Coordination To promote and measure our Research and Development endeavors, CSCSS manages our R&D areas of focus and influence through: n CSCSS Cyber Science & Technology Directorate / CSTD The Cyber Science & Technology Directorate mission is to strengthen support CSCSS, cyberspace security and cyber resiliency by promoting and coordinating funded cyberspace research and development, knowledge, innovation across CSCSS through creativity, vision and the delivery of advanced cyber technology solutions for cyberspace. n CSCSS Office of National Laboratories / CONL National Laboratories & Research Centers CSCSS Office of National Laboratories (CONL) sustains a coordinated network of national laboratories and research universities to help deliver critical cyber research capabilities. The CONL coordinates and aligns with the CSCSS Science and Technology Directorate and CSCSS divisions to manage and synchronize activities throughout the research and development community. It coordinates the expertise of research colleges and universities to address CSCSS R&D Requirements. A Comprehensive Cyberspace Research Agenda CSCSS will further the field of diversified cyberspace / cyber conflict research by taking a comprehensive, Interdisciplinary approach to core issues surrounding the sophisticated, multifaceted threats in cyberspace. Rogue independent, as well as, national/state actors, hacktivists, criminals, terrorist organizations pose these threats, and corporate entities attempting to leverage economic gain and benefits. CSCSS divides the potential research vectors for cyber conflict studies into (but not limited to) the following core categories: n International/National Security n Cyber Warfare + Conflict n Strategic Level Cyber Issues n Operational-Military Issues n Cyber Warfare : Role of Non-State Actors n Cyber Trends and Threats Report n Counter-Intelligence n Global Cyber Arms Control Agreements n International Cyber Law n Cyber Terrorism n Global Cyberspace Security Survey / GCSS CSCSS delivers regular forums, consortiums, web-conferences, (live and archived), on the key areas of a strong uninterrupted strategic cyberspace. CSCSS will continue to provide leading insights into cyber security acting as a forum to debate cyberspace and cyber policy. CSCSS Collaborative Partnerships The Centre for Strategic Cyberspace + Security Science operates in a collaborative partnership with agencies, groups, and organizations that share our commitment to the advancement of cybersecurity, national security, cyber education, innovation and Awareness, and Cybersecurity Research and Initiatives.

8 LEADERSHIP. RESEARCH. DEFENCE. As the cybersphere becomes more evolutionary and expanding, organizations must be prepared for the challenges of providing tangible evidence of their commitment to ethical conduct in cyberspace. For CSCSS, ethical conduct and organizational responsibility are key in our strategic objectives which need to be instilled in the educational arena for the next generation of cyber-leadership. We believe in building collaborative bridges leading to long-term relationships and a level of trust that benefit all of our stakeholders, partners, the cybersphere environment, community and society. CSCSS has demonstrated endeavors to provide opportunities for government leadership to interact with the cyberspace and cybersecurity community on issues affecting national security. We believe that the key to the future of cyberspace lies in a global approach, cross-domain convergence, and shared values. We owe it to our future to ensure that freedom and liberty endure through a free and open cyberspace. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE Contact Us For more information on the Centre for Strategic Cyberspace + Security Science, its programmes or to find out how we can help you please contact us. CSCSS / Centre for Strategic Cyberspace + Security Washington D.C London, United Kingdom North America Middle East Australia information@cscss.org CSCSS.org

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP C DIG CSCSS / DEFENCE INTELLIGENCE GROUP COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE C DIG CSCSS / DEFENCE INTELLIGENCE GROUP

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010 1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Five Principles for Shaping Cybersecurity Norms

Five Principles for Shaping Cybersecurity Norms TRANSPARENCY PROPORTIONALITY HARMONIZATION RISK REDUCTION COLLABORATION Five Principles for Shaping Cybersecurity Norms Contents Introduction 3 Cybersecurity Norms 5 The Role of the Public Sector 6 Cybersecurity

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

HOMELAND SECURITY INTERNET SOURCES

HOMELAND SECURITY INTERNET SOURCES I&S Internet Sources I&S HOMELAND SECURITY INTERNET SOURCES USEFUL SITES, PORTALS AND FORUMS Homeland Security Home Page http://www.whitehouse.gov/homeland/ A federal agency whose primary mission is to

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

Cybercrime in the Automotive Industry How to improve your business cyber security

Cybercrime in the Automotive Industry How to improve your business cyber security Cybercrime in the Automotive Industry How to improve your business cyber security Robert Morbin, Project Co-ordinator, SMMT Simon Kendall, Cyber Security, Department for Business, Innovation and Skills

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

A Detailed Strategy for Managing Corporation Cyber War Security

A Detailed Strategy for Managing Corporation Cyber War Security A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait alahmed.w@gust.edu.kw ABSTRACT Modern corporations

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

The EU s approach to Cyber Security and Defence

The EU s approach to Cyber Security and Defence Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence Woilfgang.Roehrig@eda.europa.eu +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST

More information

How To Write A Cybersecurity Framework

How To Write A Cybersecurity Framework NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

THE WHITE HOUSE Office of the Press Secretary

THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly

More information

The main object of my research is :

The main object of my research is : The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is

More information

The Danish Cyber and Information Security Strategy

The Danish Cyber and Information Security Strategy February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

The Dow Chemical Company. statement for the record. David E. Kepler. before

The Dow Chemical Company. statement for the record. David E. Kepler. before The Dow Chemical Company statement for the record of David E. Kepler Chief Sustainability Officer, Chief Information Officer, Business Services and Executive Vice President before The Senate Committee

More information

Cybersecurity on a Global Scale

Cybersecurity on a Global Scale Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared

More information

How To Protect Yourself From Cyber Crime

How To Protect Yourself From Cyber Crime Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 c11173008 Cybersecurity: Authoritative

More information

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

Cybersecurity and the Romanian business environment in the regional and European context

Cybersecurity and the Romanian business environment in the regional and European context KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 18, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research

More information

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for

More information

Active Engagement, Modern Defence

Active Engagement, Modern Defence Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation Adopted by Heads of State and Government in Lisbon Active Engagement, Modern Defence Preface We,

More information

Department of Homeland Security Information Sharing Strategy

Department of Homeland Security Information Sharing Strategy Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

Action Plan 2010-2015 for Canada s Cyber Security Strategy

Action Plan 2010-2015 for Canada s Cyber Security Strategy Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

ITI Cybersecurity Principles for Industry and Government

ITI Cybersecurity Principles for Industry and Government ITI Cybersecurity Principles for Industry and Government Danielle Kriz Director, Global Cybersecurity Policy Information Technology Industry Council IEEE CQR Meeting, Naples, FL May 12, 2011 About ITI

More information

Business Continuity for Cyber Threat

Business Continuity for Cyber Threat Business Continuity for Cyber Threat April 1, 2014 Workshop Session #3 3:00 5:30 PM Susan Rogers, MBCP, MBCI Cyberwise CP S2 What happens when a computer program can activate physical machinery? Between

More information

Michael Yakushev PIR-Center, Moscow (Russia)

Michael Yakushev PIR-Center, Moscow (Russia) Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:

More information

DoD Strategy for Defending Networks, Systems, and Data

DoD Strategy for Defending Networks, Systems, and Data DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July

More information

Legal Issues / Estonia Cyber Incident

Legal Issues / Estonia Cyber Incident Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia

More information

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:

More information

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012 (U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)

More information

National Cyber Security Strategies: United States

National Cyber Security Strategies: United States National Cyber Security Strategies: United States Audrey L. Plonk Director, Cybersecurity and Internet Governance Intel Corporation 1 ICSS 2013 Trends: National Cybersecurity Strategies New strategies

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

2015 CYBERSECURITY CAMPAIGN. Improving Today. Protecting Tomorrow. Page 1

2015 CYBERSECURITY CAMPAIGN. Improving Today. Protecting Tomorrow. Page 1 2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow Page 1 2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow JOIN THE CYBERSECURITY EDUCATION AND FRAMEWORK AWARENESS CAMPAIGN

More information

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

Best of Breed Opinion

Best of Breed Opinion Best of Breed Opinion Basic requirements for a best in class Global Security Operation Center. CONSULTING AND INVESTIGATIONS DIVISION The Consulting and Investigations (C&I) Division is part of one of

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund

More information

Public Sector Executive Education

Public Sector Executive Education Public Sector Executive Education Programs Distinguished National Policy Curriculum for Public Sector Professionals and Executives Persistence Diversity Motivation erspectiveenergy SuccessCollaboration

More information

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com jrobles@coqui.net 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

Privacy and Security in Healthcare

Privacy and Security in Healthcare 5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical

More information

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

The development of Shinawatra University s international graduate program in joint public and business administration (PBA)

The development of Shinawatra University s international graduate program in joint public and business administration (PBA) The development of Shinawatra University s international graduate program in joint public and business administration (PBA) Introduction: Given the fact that management challenges in terms of political-economic-societaltechnological

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

National Cyber Security Strategy 2015-2017

National Cyber Security Strategy 2015-2017 National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.

More information

Survey of Cyber Security Frameworks

Survey of Cyber Security Frameworks Survey of Cyber Security Frameworks Alice Nambiro Wechuli (Department of Computer Science, Masinde Muliro University of Science and Technology, Kenya alicenambiro@yahoo.com) Geoffrey Muchiri Muketha (Department

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

Public Private Partnerships and National Input to International Cyber Security

Public Private Partnerships and National Input to International Cyber Security Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,

More information

CYBER RISK INTERNATIONAL COMPANY PROFILE

CYBER RISK INTERNATIONAL COMPANY PROFILE CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.

More information

Jyväskylä Cyber Security Ecosystem

Jyväskylä Cyber Security Ecosystem Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto 30.9.2015 High Level Cyber Security Comment 4.2.2014 President Sauli Niinistö highlighted cyber security.

More information

How To Help The War On Terror

How To Help The War On Terror NATO s Weapons of Mass Destruction Forensics Conference by Arne Thomas WgCdr Jonathan Archer Executive Summary NATO s Comprehensive Strategic Level Policy for Preventing the Proliferation of Weapons of

More information

FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks

FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks F-43 FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks Possible Ouestion Why has the Government not confronted China about cyber attacks including on DFAT, such as those aired

More information

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state

More information

International Strategy on Cybersecurity Cooperation

International Strategy on Cybersecurity Cooperation 資 料 9-2 International Strategy on Cybersecurity Cooperation - j-initiative for Cybersecurity - October 2, 2013 Information Security Policy Council Contents 1 Objectives 1 2 Basic Principles 2 2.1 Ensuring

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy 2015 Action Plan A LIVING ACTION PLAN WITH ANNUAL REVIEWS New Zealand s Cyber Security Strategy provides a single cohesive framework to ensure that New Zealand is secure, resilient

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information