MIC s Efforts on Cybersecurity Human Resource Development
|
|
- Sophie Glenn
- 8 years ago
- Views:
Transcription
1 ASEAN-Japan Cyber Security International Symposium MIC s Efforts on Cybersecurity Human Resource Development October 9 th 2014 Yuji NAKAMURA Director for the ICT Security Strategy, Ministry of Internal Affairs and Communications (MIC), Japan
2 Today s Agenda 2 Overview of MIC s Information Security Policy MIC s efforts for enhancing cybersecurity capacity CYDER Project Japan-ASEAN Information Security Workshop (for ISPs)
3 5 Concept of MIC s Information Security Policy 3 1.Establishment of secure network environment (1)Sharing information with network operators (2)Strengthening public-private partnership to counter cyber-attacks (3)Organizing Information Security Advisory Board meeting (since March 2013) (4)Organizing conferences for proper countermeasures against cyber-attacks by 2.Assistance for information security measures (1)Conducting ACTIVE from FY2013 to FY 2017 (2)Conducting CYDER from FY2013 to FY 2017 (3)Sharing Information through Information Security Website for General Users 3.Promotion of developing technology (1)Conducting PRACTICE from FY2011 to FY2015 (2)R&D for analysis and detection of cyber-attacks from FY2013 in 5 years 4.Promotion of international collaboration Promoting international collaboration by sharing measures for information security. e.g. the Japan- ASEAN Information security workshop 5.Using and distributing personal data properly Promoting proper usage/distribution of personal data (which means information of individuals) taking into account protection of privacy, etc.
4 MIC s Ongoing Projects 4 Malware infection of individual computers Among individual Internet users, fraud such as unjust remittance of funds has appeared by way of malware infections through websites. Advanced Persistent Threat Leaking of classified information caused by sophisticated cyberattacks such as Advanced Persistent Threat (APT). Malicious attacks (e.g. DDoS) caused by Malwares Malicious activities such as DDoS etc. which are caused by Malwares have been frequently observed and have affected Japanese business. ACTIVE (Advanced Cyber Threats response InitiatiVE) CYDER (CYber Defense Exercise with Recurrence) PRACTICE (Proactive Response Against Cyberattacks Through International Collaborative Exchange) Comprehensive countermeasures for malware infections such as prevention of access to malware propagation websites by collaborating with ISPs and so on. Started in November Understanding of current status by analyzing APT, considering defensive models for APT and capacity building through practical defensive exercises participated in by the public and private sectors. Started in September R&D and field trials for grasping symptoms of attacks and acting quick response to cyber-attacks by deep analysis and constructing networks through international collaboration to exchange cyber-security information. Started in August 2011.
5 CYDER(CYber Defense Exercise with Recurrence) 5 Strengthen ability of LAN administrators in government agencies, large enterprises to tackle Advanced Persistent Threat. Develop a defensive model through experiences obtained by conducting CYDER repeatedly. Features Large scale emulated network of a thousand staff level organizations. Practical cyber exercise based on real Advanced Persistent Threat. 293 people from 33 organizations such as national government agencies(e.g., MOD, NISC, MOFA, MOJ), incorporated administrative agencies and private businesses (critical infrastructure sectors), etc. participated in groups of three or four people through ten CYDER session. Staff room Large scale emulated LAN LAN Staff to imitate attacker supporting imitation attack Secret Staff supporting operation Firewal l DC File AP DB DMZ server DNS Web Exercise venue Staff to imitate business operator or chief of participant supporting exercise Participants Participants Instructor and assistant
6 ASEAN-Japan Information Security Workshop (for ISPs) 6 1 st Jan, 2011, Tokyo 2 nd Mar, 2012, Tokyo 3 rd Feb, 2013, Bangkok 4 th Aug, 2013, Tokyo 5 th Oct, 2014, Manila The workshop aims to construct and enhance collaboration among ISPs by sharing information on cybersecurity threats and their countermeasures etc. Participated ISPs and ISP associations Telkom Indonesia(Id), PT Telkom Indonesia(Id), Asosiasi Penyelenggara Jasa Internet Indonesia /APJII(Id), Sky Telecom(La), Telekom Malaysia(My), TM net(my), Myanma Posts and Telecommunications(Mm), GLOBE(Ph), PLDT Philippine Long Distance Telecom Co.(Ph), True Move Company Limited(Th), Thai Internet Service Provider Association(Th), Information & Public relations Centre - VNPT(Vn), FPT Telecom(Vn), DST group(br), NTT Communications Corporation(J), KDDI Corporation(J), IIJ(J)
7 Thank you for your attention. Ministry of Internal Affairs and Communications (MIC)
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency 1 Challenge for Cyber Security in Financial Sector (1) Necessity to Strengthen
More informationCyber Security in Japan (v.2)
Cyber Security in Japan (v.2) Ryusuke Masuoka (masuoka@cipps.org) and Tsutomu Ishino (ishino@cipps.org) Cyber Security Policy Research Team Center for International Public Policy Studies (CIPPS) December
More informationCyber Security Strategy(Information Security Policy Council, June 10, 2013)
Environmental Change Vision to aim as a Goal Basic Principles Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Areas of Efforts Increasing severity of the risk surrounding cyberspace
More informationCybersecurity Strategy in Japan
Cybersecurity Strategy in Japan Jan 21, 2015 Hiroshi Kawaguchi, CISSP Little earth Corporation Co., Ltd. Chief Evangelist hiroshi.kawaguchi @ lac.co.jp What is this? 2 Global Risks 2014 http://www3.weforum.org/docs/wef_globalrisks_report_2014.pdf
More informationViewpoint: Implementing Japan s New Cyber Security Strategy*
Presented by: The ACCJ s Internet Economy Task Force Valid Through November 2014 The 2013 Cyber Security Strategy, released in June 2013, and the International Strategy on Cybersecurity Cooperation, released
More informationHow To Protect Critical Infrastructure
Cybersecurity Strategy in Japan October 9th 2014 Yasu TANIWAKI Deputy Director-General National Information Security Center (NISC) Government of JAPAN Big Data Society and Cybersecurity Open data Digitally
More informationTrends in Security Incidents and Hitachi s Activities
Hitachi Review Vol. 63 (2014), No. 5 270 Featured Articles Trends in Security Incidents and Hitachi s Activities About HIRT Activities Masato Terada, Dr. Eng. Masashi Fujiwara Akiko Numata Toru Senoo Kazumi
More informationKorea s s Approach to Network Security
Korea s s Approach to Network Security 21 May 2002 Cha, Yang-Shin Ministry of Information and Communication 1 Contents Advancement in the Information Society and New Threats Information Infrastructure
More informationInitiative for Cyber Security Information sharing Partnership of Japan (J-CSIP) Annual Activity Report FY2012
Initiative for Cyber Security Information sharing Partnership of Japan (J-CSIP) Annual Activity Report FY2012 IT SECURITY CENTER (ISEC) INFORMATION-TECHNOLOGY PROMOTION AGENCY, JAPAN Initiative for Cyber
More informationCybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th
Cybersecurity: Thailand s and ASEAN s priorities Soranun Jiwasurat www.etda.or.th Cyber Threat Landscape Overview 2 Cyber threat a hostile act using computers, electronic information and/or digital networks
More informationCombating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
More informationThe Japanese Experience Countering Spam ITU TELECOM WORLD 2006
The Japanese Experience Countering Spam ITU TELECOM WORLD 2006 8th December 2006 Shuji Sakuraba Copyright 2006 Present condition of spam in Japan - I 2004 Media Sent to mobiles 66 % Sent to PCs 34 % 2005
More informationCombating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
More informationCyber Security ( Lao PDR )
ITU Cyber security Forum and Cyber Drill 9-11 December 2013,Lao Plaza Hotel, Vientiane, Lao PDR Country updates on Cyber Security ( Lao PDR ) By Khamla Sounnalat Deputy head of LaoCERT Ministry of Posts
More informationCybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
More informationCurrent counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol hcjung@kisa.or.kr April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
More informationDevelopment of Technology for Detecting Advanced Persistent Threat Activities
FOR IMMEDIATE RELEASE Development of Technology for Detecting Advanced Persistent Threat Activities Visualizing correlations among hosts having suspicious activities to detect attacks such as stealth malware
More informationKorea s experience of massive DDoS attacks from Botnet
Korea s experience of massive DDoS attacks from Botnet April 12, 2011 Heung Youl YOUM Ph.D. SoonChunHyang University, Korea President, KIISC, Korea Vice-chairman, ITU-T SG 17 1 Table of Contents Overview
More informationInformation Security 2012
Information Security 2012 July 4, 2012 Information Security Policy Council Contents I Preface... - 2 - II Changes in the Environment Surrounding Information Security. - 3 - III Basic Lines... - 9 - (1)
More informationThe trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation
The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation
More informationJapan s Countermeasures against Spam
Apr. 10, 2007 Japan s Countermeasures against Spam Hiroyo HIRAMATSU, Deputy Director, Telecommunications Consumer Policy Division, Telecommunications Bureau, Ministry of Internal Affairs and Communications,
More informationCyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in
Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.
More informationCAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For
More informationPOLICIES TO MITIGATE CYBER RISK
POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various
More informationNTT R&D s anti-malware technologies
NTT R&D s anti-malware technologies Jan. 21, 2015 NTT Secure Platform Laboratories Takeo HARIU Threats causes most of cyber attacks Major infection routes are web browsing, URL links in email messages,
More informationSecurity and Prosperity Steering Group Draft Report
2015/SOM2/TEL51/PLEN/023 Agenda Item: 7.3 Security and Prosperity Steering Group Draft Report Purpose: Consideration Submitted by: SPSG Convenor 51 st Telecommunications and Information Working Group Meeting
More informationAnalytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
18th Annual Space & Missile Defense Symposium IAMD Evolution and Integration/Key Topic: Predictive Cyber Threat Analysis Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
More informationInformation security education for students in Japan
Information security education for students in Japan Introduction This article aims to introduce the current situation of elementary and secondary school education on information security in Japan, as
More informationInternational Strategy on Cybersecurity Cooperation
資 料 9-2 International Strategy on Cybersecurity Cooperation - j-initiative for Cybersecurity - October 2, 2013 Information Security Policy Council Contents 1 Objectives 1 2 Basic Principles 2 2.1 Ensuring
More informationAction Plan and Milestone Toward IPv4 Address Exhaustion ver. 2010.06 June 4, 2010 Task Force on IPv4 Address Exhaustion, Japan
Action Plan and Milestone Toward IPv4 Address Exhaustion ver. 2010.06 June 4, 2010 Task Force on IPv4 Address Exhaustion, Japan Copyright (C) 2009, 2010 Task Force on IPv4 Address Exhaustion, Japan 1 Table
More informationCERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency
CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency I. Alarming call for cooperation with ISPs Slammer Worm Spread most of vulnerable SQL servers
More informationU. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
More informationJUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM
JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM May 2015 Nguyễn Tiến Đức ASEAN Security Specialist Agenda Modern Malware: State of the Industry Dynamic Threat Intelligence on the Firewall
More informationAs global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
More informationWhat legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn
More informationBrief self-introduction
Brief self-introduction Name: Yaokai Feng Affiliation Graduate School of Information Science and Electrical Engineering, Kyushu University, Japan Bachelor and Master degrees Tianjin University, China,
More informationSummary of the State of Security
Summary of the State of Security Tram Jewett, CISA CliftonLarsonAllen LLP Virginia GFOA Annual Spring Conference, 2016 1 1 Summary of the State of Security Tram Jewett, MS., CISA, 11 years IT audit and
More informationDevelopments in cybercrime and cybersecurity
Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity As customers and clients increasingly go online to do their banking with convenience, privacy and security their
More informationFuture cybersecurity threats and research needs.
www.thalesgroup.com Future cybersecurity threats and research needs. 3 rd Franco-American Workshop on Cybersecurity Lyon Kreshnik Musaraj kreshnik.musaraj@thalesgroup.com December 9. 2014 2 / Challenges
More informationREQUEST FOR INFORMATION
Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 3 September 2015 6506 Loisdale Rd, Ste 325
More informationNew challenges in Data privacy.
New challenges in Data privacy. Zdravko Stoychev, CISM CRISC Information Security Officer Alpha Bank Bulgaria branch South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11-13 Nov 2013
More informationFujitsu Group s Information Security
Fujitsu Group s Information Under the corporate governance system, the Fujitsu Group promotes appropriate information management and information usage according to Group rules, as part of risk management.
More informationCyber attack and incident response
Cyber attack and incident response Private sector s perspective for public/private information sharing 6 June 2012 Octopus Conference at Strasbourg Tomohiko Yamakawa 0 Copyright 2012 NTT All rights reserved.
More information2011 Cyber Security and the Advanced Persistent Threat A Holistic View
2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem
More informationCybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
More informationWRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
More informationInter cloud computing: Use cases and requirements lessons learned 3.11
Inter cloud computing: Use cases and requirements lessons learned 3.11 Oct 12, 2011 Global Inter Cloud Technology Forum (GICTF) Institute of Information Security (IISEC) Atsuhiro Goto goto@iisec.ac.jp
More informationLessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
More information2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
More informationThe Importance of a Multistakeholder Approach to Cybersecurity Effectiveness
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM Entitled by: Cristine Hoepers, Klaus Steding-Jessen,
More informationPolicies and Practices on Network Security of MIIT
2011/TEL43/SPSG/WKSP/004 Policies and Practices on Network Security of MIIT Submitted by: China Workshop on Cybersecurity Policy Development in the APEC Region Hangzhou, China 27 March 2011 Policies and
More informationCYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
More informationCapacity Building to Strengthen Cybersecurity: Thailand Update
Capacity Building to Strengthen Cybersecurity: Thailand Update ASEAN Regional Forum Workshop on Measures to Enhance Cyber Security Legal and Cultural Aspects September 11-12, 2013 1 1 Chain is only as
More informationDNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012
DNS Firewalls with BIND: ISC RPZ and the IID Approach Tuesday, 26 June 2012 1 About the Presenters»»» Paul Vixie Chairman and Founder Internet Systems Consortium Rod Rasmussen President and CTO IID (Internet
More informationSymantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
More informationDefending Against Cyber Security Threats to the Payment and Banking Systems
NYU Leonard N. Stern School of Business Master of Science Risk Management RISK MANAGEMENT SYMPOSIUM 2015 Defending Against Cyber Security Threats to the Payment and Banking Systems Andrew Koh Class of
More informationProtecting critical infrastructure from Cyber-attack
Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale
More informationEC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
More informationNIST Cybersecurity Framework What It Means for Energy Companies
Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber
More informationAuditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
More informationWritten Testimony of. Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the
Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Subcommittee on Research and Technology Committee on Science, Space, and Technology U.S.
More informationKEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
More informationWednesday 1 st Venue: Keio University, Mita Campus, G- Sec Lab
Wednesday 1 st Venue: Keio University, Mita Campus, G- Sec Lab 08:30 Opening of Registration 09:00 09:15 Welcome Address Jun Murai, Keio University Claude Kirchner, Inria Koji Nakao, NICT Session 1 Cryptography
More informationFirst Step Guide for Building Cyber Threat Intelligence Team. Hitoshi ENDOH (NTT-CERT) Natsuko INUI (CDI-CIRT)
First Step Guide for Building Cyber Threat Intelligence Team Hitoshi ENDOH (NTT-CERT) Natsuko INUI (CDI-CIRT) Agenda About Us CDI-CIRT NTT-CERT Part 1 Cyber Threat Intelligence Team Building Basics Part
More informationKshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17
Japan's Changing Cybersecurity Landscape By: Nir Kshetri Kshetri, N. (2014). Japan s changing cyber security landscape, Computer, 47(1), 83 86. doi: 10.1109/MC.2014.17 Made available courtesy of Institute
More informationHow To Prepare A Cyber Security Workshop In Asean
CHAIRMAN S REPORT OF THE TRACK II NETWORK OF ASEAN DEFENCE AND SECURITY INSTITUTIONS (NADI) WORKSHOP ON CYBER SECURITY: EMERGING CHALLENGES AND RESPONSES 20-22 NOVEMBER 2013 TRADERS HOTEL, SINGAPORE 1.
More informationOver 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
More informationPartnership for Cyber Resilience
Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage
More informationPromoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
More informationSecurity Challenges for the Future Internet. Evangelos Markatos Distr. Computing Systems Laboratory FORTH ICS
Security Challenges for the Future Internet Evangelos arkatos Distr. Computing Systems Laboratory FORT ICS 11 Roadap of the talk Security Challenges: What is the problem? ackers are getting more sophisticated
More informationNetwork and Incident monitoring
August, 2013 Network and Incident monitoring Koichiro (Sparky) Komiyama Sam Sasaki JPCERT Coordination Center, Japan Agenda 1. Introduction of TSUBAME 2. Recent Observation cases 2 1. INTRODUCTION OF TSUBAME
More informationJPCERT/CC Internet Threat Monitoring Report [January 1, 2015 - March 31, 2015]
JPCERT-IA-2015-02 Issued: 2015-04-27 JPCERT/CC Internet Threat Monitoring Report [January 1, 2015 - March 31, 2015] 1 Overview JPCERT/CC has placed multiple sensors across the Internet for monitoring to
More informationCyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
More informationInternet Security and Resiliency: A Collaborative Effort
Internet Security and Resiliency: A Collaborative Effort Baher Esmat Manager, Regional Relations Middle East MENOG 4 Manama, 9 April 2009 1 WHAT IS THIS PRESENTATION ABOUT? ICANN s effort in enhancing
More informationSeptember 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
More informationCybersecurity Awareness. Part 1
Part 1 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
More informationNext Generation Security Strategies. Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com
Next Generation Security Strategies Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
More informationSCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
More informationAPT Detection using Splunk
APT Detection using Splunk Wir starten mit Schütteln Swiss Cyber Storm -> 22. Oktober 2014, KKL Luzern Former US Secret Service Agent, Robert Rodriguez Microsoft Research, Elia Florio www.swisscyberstorm.com
More informationTestimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:
Testimony of Doug Johnson On behalf of the New York Bankers Association before the New York State Senate Joint Public Hearing: Cybersecurity: Defending New York from Cyber Attacks November 18, 2013 Testimony
More informationNEC Cyber Security Solutions
Futureproof NEC Cyber Solutions help achieve the total security of clients cyberspace, and create a brighter and safer future for all society. For further information, please contact: NEC Cyber Strategy
More informationNuclear Security and Incident Response
Hitachi Review Vol. 62 (2013), No. 3 168 Nuclear Security and Incident Response Kazuhiko Tanimura Hisayuki Ito Hiroyuki Kimura OVERVIEW: Since the Great East Japan Earthquake, there has been a requirement
More informationInformation and Communication Security Policy and Industrial Development Status of Main Countries. Dr. YAU JR LIU
Information and Communication Security Policy and Industrial Development Status of Main Countries Dr. YAU JR LIU 1 Outline Structure of the information security industry of main countries. Information
More informationCYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
More informationMustafa AYDINLI NLO CYBER SECURITY ADVISOR
Mustafa AYDINLI NLO CYBER SECURITY ADVISOR AGENDA Introduction to Cyber Security Establishment & History of TR-CERT Responsibilities of TR-CERT Competencies of TR-CERT CYBER SECURITY Cyber security is
More informationHow we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond
More informationICT Usage & Cyber Security Issues in Myanmar
ICT Usage & Cyber Security Issues in Myanmar AESEN-Japan International Symposium on Cyber Security Khin Swe Htay Deputy Chief Engineer Myanma Posts and Telecommunications Tokyo, Japan October 25, 2013
More informationSecurity A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
More informationWho Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
More informationRLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright
More informationDNS Security, Stability and Resiliency
DNS Security, Stability and Resiliency John Crain Chief Technical Officer April 21st 2009 Garmisch 1 Agenda The Global DNS SSR Symposium Problems and Opportunities Questions? 2 The Organization Sponsors:
More informationRelease of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
More informationEd McMurray, CISA, CISSP, CTGA CoNetrix
Ed McMurray, CISA, CISSP, CTGA CoNetrix AGENDA Introduction Cybersecurity Recent News Regulatory Statements NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Questions Information Security Stats
More informationCybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
More informationNational Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
More informationUS companies experience and attitudes towards security threats
US companies experience and attitudes towards security threats Q u a n t i t a t i v e s u r v e y w i t h i n L a r g e a n d M e d i u m c o m p a n i e s i n t h e U S A R e l e a s e d : A p r i l,
More informationDesign Your Security
Design Your Security We build tailored, converged security for you. converged Technology. Strategy. People. The synergetic collaboration. agile Hackers sleep - we don t. We re ready whenever, wherever.
More informationCountry Case Study on Incident Management Capabilities CERT-TCC, Tunisia
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia helmi.rais@ansi.tn helmi.rais@gmail.com Framework
More information