The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness
|
|
|
- Megan McCarthy
- 9 years ago
- Views:
Transcription
1 The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM Entitled by: Cristine Hoepers, Klaus Steding-Jessen, Henrique Faulhaber Region: Brazil Organization: Brazilian Internet Steering Committee - CGI.br Sector: Other Keywords: Multistakeholder, Internet Ecosystem, Cyber security, Internet Security, CERTs Most Internet security threats are increasingly complex, affecting multiple sectors at the same time, and requiring coordinated efforts to be detected and effectively mitigated. This is specially true to incidents involving botnets, spam, malware and DDoS.In the past 20 years several multistakeholder forums and initiatives that deal with Internet security threats were created - most of them have been very successful in bringing different sectors together to mitigate security incidents and counter cybercrime. All these efforts highlighted that the effectiveness depends on cooperation among different stakeholders, and that cybersecurity can't be achieved via a single organization or structure. Also, governments need to participate more in security forums and improve cooperation with other stakeholders.new forums and initiatives should not replace existing structures; they should aim at leveraging and improving the multistakeholder structures already in place today. Document The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness
2 1. Introduction Most Internet security threats are increasingly complex, affecting multiple stakeholders at the same time, and requiring coordinated efforts to be detected and mitigated. This is specially true to incidents involving botnets, spam, malware and DDoS (Distributed Denial of Service) attacks. The scenario gets more complicated when critical national infrastructures are connected to the Internet, becoming exposed to the same vulnerabilities as other systems, and can be attacked by the same tools or techniques used for attacks in other contexts. The protection of critical infrastructures and government networks connected to the Internet have both Internet security and defense aspects - the protection of these infrastructures is done most of the time by government organizations. What is worrisome is that we are increasingly seeing purely Internet security issues being perceived by governments as purely defense issues. This is leading to a scenario where, for example, the vital cooperation already existing among CERTs (Computer Emergency Response Teams) with National Responsibility being undermined by a tendency to move all existing Internet security capabilities into government or intelligence organizations. The Internet ecosystem's security, stability and resilience should remain multistakeholder. The cooperation among different sectors and stakeholders, already existing today, is key to mitigate most of the current threats. In the remainder of this proposal, we will briefly discuss several current multistakeholder forums and initiatives, pointing out their strengths, and bringing to attention issues that need to be considered when discussing a framework to improve the multistakeholder approach in order to achieve more effective cybersecurity. 2. Existing Multistakeholder Forums There are some international forums that already exist today and that congregate different stakeholders, cooperating to handle security incidents and mitigate specific threats. Most of these forums were created to mitigate specific categories of attacks or threats. As nowadays the threat landscape changed and there is a prevalence of what is technically referred to as combined threats, most of these organizations are dealing with similar security issues. What follows is a description of each one of these organizations.
3 2.1. FIRST - Forum of Incident Response and Security Teams FIRST is the Forum of Incident Response and Security Teams - A Computer Security and Incident Response Team (CSIRT), sometimes also referred as CERT, is a service organization that is responsible for receiving, reviewing, and responding to computer security incident reports and activity. Their services are usually performed for a defined constituency that could be a parent entity such as a corporate, governmental, or educational organization; a region or country; a research network; or a paid client (Source: The first CSIRT, the CERT Coordination Center, was created in November 1988, after the security incident known as "Internet worm" or "Morris worm" brought major portions of the Internet to its knees, and made clear the need to more coordinated efforts to respond to security incidents on the Internet. After this incident, several other teams were created. The FIRST was formed in 1990 in response to a second worm, the "Wank worm", and this incident highlighted the need for better communication and coordination among teams of different organizations. FIRST is an international confederation of trusted computer incident response teams who cooperatively handle computer security incidents and promote incident prevention programs. FIRST brings together a wide variety of CSIRTs from around the globe including educational, commercial, vendor, national, government and military. FIRST members develop and share technical information, tools, methodologies, processes and best practices, and use their combined knowledge, skills and experience to promote a safer and more secure Internet environment CSIRTs with National Responsibility and the NatCSIRT Annual Meeting Since 2006, the CERT(R) Coordination Center (CERT/CC) has been hosting an annual technical meeting for CSIRTs with national responsibility. This meeting provides an opportunity for the organizations responsible for protecting the security of nations, economies, and critical infrastructures to discuss the unique challenges they face while fulfilling this role. As a result of these meetings, an online Forum is maintained throughout the year, as well as a list of CSIRTs with National Responsibility: It is noteworthy that there are very different models of National CSIRTs, ranging from not for profit, to academic, to government teams. Also, several countries have more than one team, demonstrating the complexity of increasing cybersecurity and performing incident handling at a national level.
4 2.3. APWG APWG ( was founded in 2003 as the Anti-Phishing Working Group, at which time its mission was to counter phishing attacks. But, as the technology evolved, APWG is not focused only on phishing anymore, but on mitigating other attacks that are used to perpetrate cybercrime. APWG has more than 2000 members and research partners worldwide, from financial institutions, retailers, solutions providers, ISPs, telcos, CSIRTs, universities, defense contractors, law enforcement agencies, trade groups, treaty organizations and government agencies MAAWG - The Messaging, Malware and Mobile Anti-Abuse Working Group MAAWG is The Messaging, Malware and Mobile Anti-Abuse Working Group ( and brings the messaging industry together to work collaboratively and to successfully address the various forms of messaging abuse, such as spam, viruses, denial-of-service attacks and other messaging exploitations. To accomplish this, MAAWG develops initiatives in the three areas necessary to resolve the messaging abuse problem: industry collaboration, technology, and public policy ISOC - The Internet Society ISOC - The Internet Society ( - is an organization dedicated to ensuring that the Internet stays open and transparent. It has initiatives in Internet policy, technology standards, and future development. ISOC has a special project called "Combating Spam Project", in partnership with MAAWG, dedicated to demonstrating to policy makers, clearly and effectively, the tools and industry partnerships that are available to tackle spam. 3. Examples of Successful Multistakeholder International and National Initiatives In the past few years, CSIRTs, Network Operators and members of the aforementioned forums became involved in some specific projects and working groups aimed at mitigating specific big threats, implementing best practices or better understanding the Internet threat environment. In this section we are going to describe some of these successful multistakeholder initiatives The Conficker Working Group Starting in late 2008, and continuing through June of 2010, a coalition of security researchers worked to resist an Internet borne attack carried out by malicious software
5 known as Conficker. This coalition became known as "The Conficker Working Group", and seemed to be successful in a number of ways, not the least of which was unprecedented cooperation between organizations and individuals around the world, in both the public and private sectors (Source: The work of this group involved members of Internet Governance Bodies, Software and Hardware Vendors, Content providers, Universities and Research Centers, and was vital to mitigate the worm's malicious payloads and to help clean systems throughout the Internet. A Lessons Learned document can be find in the previously listed homepage DNS-changer Working Group The DNS Changer Working Group (DCWG - was an ad hoc group of subject matter experts, and included members from organizations such as Georgia Tech, Internet Systems Consortium, Mandiant, National Cyber-Forensics and Training Alliance, Neustar, Spamhaus, Team Cymru, Trend Micro, and the University of Alabama at Birmingham. The work of the DCWG was coordinated with FBI investigations, and received help from several National CERTs and ISPs. This working group was created to help remediate Rove Digital's malicious DNS servers. The botnet operated by Rove Digital altered user DNS settings, pointing victims to malicious DNS in data centers in Estonia, New York, and Chicago. The malicious DNS servers would give fake, malicious answers, altering user searches, and promoting fake and dangerous products. Because every web search starts with DNS, the malware showed users an altered version of the Internet. The cooperation among all these stakeholders made it possible to gradually alert and help disinfect the end users' devices, without disrupting their access to the Internet Multistakeholder initiatives at a National level There are several multistakeholder initiatives at a National level. In this section we will briefly describe some of these initiatives The Dutch Cyber Security Council The Dutch Cyber Security Council has 15 members from government, industry, and the scientific community, for a total of three scientists, six public sector and six private sector representatives. The Council is supported by an independent secretariat. The Council oversees the Dutch National Cyber Security Strategy and offers both solicited and unsolicited advice to the Dutch government and society. The role that the Council played during the DigiNotar incident, for example, demonstrated the effectiveness of this kind of public-private partnership in the digital domain. In July 2013, the Council issued an advice on the new National Cyber Security Strategy,
6 published in October The advice specifically focused on the need for close cooperation and coordination in the field of incident detection and response. Only through active information sharing, timely response and seamless collaboration can a secure digital environment be established. Source: The Japanese Cyber Clean Center The Cyber Clean Center (CCC) is a core organization taking a role to promote bot cleaning and prevention of re-infection of users' computers, which were once infected by bots, based on cooperation among government, software vendors and ISPs. The Cyber Clean Center has a Steering Committee and three working groups in the layer below: the bot countermeasure system operation group; the bot program analysis group; and the bot infection prevention promotion group. Source: CGI.br Port 25 Management Initiative For a long time, Brazil was present on most spam rankings as a top spam relaying country. Determined to reverse this situation, the Brazilian Internet Steering Committee (CGI.br) has conducted, since 2005, a number of activities, such as academic studies and technical analyses, which lead to the adoption of Port 25 management as the most effective measure to be taken to prevent spammers from abusing the Brazilian broadband infrastructure. This initiative was lead by CGI.br's Anti-Spam Working Group (CT-Spam), which provided a forum where different stakeholders were able to meet. For almost 20 years, Brazil has developed a model of multistakeholder Internet governance. Therefore, a measure of such importance as the blocking of outgoing port 25 traffic in residential networks could not be adopted without all sectors affected being asked to contribute to this decision-making process. Bringing together the experience of more than a dozen telecom companies, thousands of Internet service providers, representatives of civil society and the academic community, as well as the technical staff of CGI.br, the process of adopting Port 25 management was broadly discussed. This was specially important because the implementation required a concerted effort, with service providers making sure they offered Message Submission via a different port (587), and migrated at least 90% of their users' base
7 before broadboand providers could block outbound port 25 traffic. It is also important to highlight that both the National Telecommunications Agency (Anatel) and the Ministry of Justice have played a key role in providing support for the telecom companies and the consumer protection entities respectively. Anatel signed a Cooperation Agreement with CGI.br, which gave the telecom companies legal grounds to proceed with the adoption. The Ministry of Justice, on the other hand, published a Technical Note explaining the benefits of such measures for consumers. As a result of this initiative, Brazil is no longer listed as one of the top spam relaying countries in the world, according to several public rankings. Source: CERT.br - Computer Emergency Response Team Brazil CERT.br is the Computer Emergency Response Team Brazil, maintained by NIC.br, a not for profit organization created to implement the decisions and projects designed by the Brazilian Internet Steering Committee - CGI.br. All CERT.br activities take into account the need to involve all stakeholders to successfully increase the level of security and incident handling capacity of the networks connected to the Internet in Brazil. Besides doing Incident Handling activities, CERT.br also works to increase security awareness in the Brazilian community, maintaining an early warning project with the goal of identifying new trends and correlating security events, as well as alerting Brazilian networks involved in malicious activities. CERT.br also helps new Computer Security Incident Response Teams (CSIRTs) to establish their activities in the country. A clear example of the success of this approach is the Brazilian Distributed Honeypots Project, which, through a network of distributed honeypots in the Brazilian Internet space, increases the capacity of incident detection, event correlation and trend analysis in the country. These honeypots are passive sensors that provide valuable situational awareness, without collecting production traffic neither performing any type of surveillance. This project has sensors in more than 40 Brazilian partner organizations, ranging from government and energy sectors, to academia, ISPs and Telecommunication Providers. Source:
8 The need for improvement of the multistakeholder collaboration in cybersecurity Achieving a satisfactory level of Internet Security is not an easy task, but the experience accumulated by several successful initiatives demonstrates that, in order to be effective, any cybersecurity initiative needs to involve several stakeholders. More than that, the reality is that more often than not, the security measures need to be taken by systems administrators, network operators or security professionals in their own networks. However, cooperation with others is key to be able to understand the threats and better evaluate the effectiveness of their actions. In the document "Conficker Working Group: Lessons Learned" ( published in January 2011, although the word "multistakeholder" is not used, some of the success factors listed point to the importance of cooperation and the involvement of different stakeholders. Here are some examples: Utilize a trust model; the scope of the working group needs to be a manageable size to be effective and include those directly affected, and yet large enough to include a broader universe of those impacted. Incorporate a consensus model without hierarchy to allow the group to adapt and respond to fast changing conditions. Gain the participation and support of key governing and regulatory bodies. Formalize communications with stakeholder groups vs. relying on social networks. These four points bring to light issues like the rapid change of the threat landscape, the need for rapid communication, the involvement and support of governments and the fact that several stakeholders need to cooperate. Although the Conficker Working Group was very successful, as well as other initiatives listed in the previous section, there are still some stakeholders that could improve their cooperation. For example: Network Operator Groups (NOGs) and Regional Internet Registries (RIRs)
9 should be more involved with security issues. There are some areas like routing security (and newly proposed protocols like RPKI or SBGP) or DNSSEC that need worldwide adoption to be effective. RIRs could also work more closely with the CSIRT community to improve the WHOIS system to help the incident handling process. Software vendors need to become involved and be more pro-active; after all, most of the security problems we face today are software-related problems. The real challenge is to improve software security and get the software industry to a more mature level. The governments, including military and intelligence sectors, in addition to traditional security and defense strategies, need to improve their awareness of the multistakeholder nature of the Internet and the vital importance of the cooperation to address security threats. They need to participate more in the national and international security forums and improve cooperation with other stakeholders. Considering government cyber security strategies, it is noteworthy that about 130 parties, including public and private parties, knowledge institutions and social organisations, were involved in the drafting of the Dutch "National Cyber Security Strategy 2 - From awareness to capability" (NCSS2) ( The strategy starts with the following statement: "We are moving from structures to coalitions in which all parties -- national and international -- are represented in order to achieve supported standards." And adds that "The correlation between security, freedom and social-economic benefits proposed in the NCSS2 is a dynamic balance that is intended to be realised in a constantly open and pragmatic dialogue between all stakeholders, both national and international. (...) In order to bring the dialogue about cyber security between the various stakeholders to a new level of maturity, the following three management areas are of the utmost importance: (self) regulation, transparency and knowledge development." This is a good example of the recognition of the importance of a multistakeholder approach to the Internet ecosystem's security, stability and resilience.
10 5. Recommendations As stated before, achieving a satisfactory level of Internet Security is not an easy task, and the multistakeholder initiatives previously discussed are good examples of frameworks that can effectively deal with cybersecurity current and emerging issues. Therefore, it is recommended that all national and international organizations involved with Internet Governance, for instance, Local Governments, RIRs, United Nations, European Union, ISOC Chapters, among others, should take the following into consideration: 1. The experience accumulated by the several successful initiatives described in this contribution demonstrates that, in order to be effective, any cybersecurity initiative depends on cooperation among different stakeholders, and it can't be achieved via a single organization or structure. 2. There are stakeholders that still need to become more involved, like network operators and software developers. 3. Governments, including military and intelligence sectors, in addition to traditional security and defense strategies, need to improve their awareness of the multistakeholder nature of the Internet and the vital importance of cooperation to address security threats. They need to participate more in the national and international security forums and improve cooperation with other stakeholders. 4. There is room and a need for new forums and initiatives, but they should not replace existing structures. Any new initiative should aim at leveraging and improving the multistakeholder structures already in place today.
Cybersecurity and Incident Response Initiatives: Brazil and Americas
Cybersecurity and Incident Response Initiatives: Brazil and Americas Cristine Hoepers [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee
honeytarg Chapter Activities
honeytarg Chapter Activities Marcelo Chaves [email protected]! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian Internet Steering Committee - CGI.br Agenda
Development of an IPv6 Honeypot
Development of an IPv6 Honeypot Klaus Steding-Jessen [email protected] CERT.br Computer Emergency Response Team Brazil NIC.br Network Information Center Brazil CGI.br Brazilian Internet Steering Committee
Internet Security and Resiliency: A Collaborative Effort
Internet Security and Resiliency: A Collaborative Effort Baher Esmat Manager, Regional Relations Middle East MENOG 4 Manama, 9 April 2009 1 WHAT IS THIS PRESENTATION ABOUT? ICANN s effort in enhancing
LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016
LACNIC 25 CSIRTs Meeting Havana, Cuba May 4 th, 2016 DDoS Atacks: Detection, Analysis and Mitigation Lucimara Desiderá [email protected] Klaus Steding-Jessen [email protected] Internet Governance in Brazil:
CERT.br: Mission and Services
CERT.br: Mission and Services Marcelo H. P. C. Chaves [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/ Conferencia
DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques
DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques Klaus Steding-Jessen [email protected]! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
SpamPots Project: Using Honeypots to Measure the Abuse of End-User Machines to Send Spam
SpamPots Project: Using Honeypots to Measure the Abuse of End-User Machines to Send Spam Marcelo H. P. C. Chaves [email protected] CERT.br Computer Emergency Response Team Brazil NIC.br Network Information Center
Preventing your Network from Being Abused by Spammers
Preventing your Network from Being Abused by Spammers Marcelo H. P. C. Chaves [email protected] CERT.br Computer Emergency Response Team Brazil NIC.br - Network Information Center Brazil CGI.br - Brazilian Internet
Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected]
Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected] Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.
Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)
Final Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) Opening Speech to the Second International Forum Partnership Among State, Business
Phishing and Banking Trojan Cases Affecting Brazil
Phishing and Banking Trojan Cases Affecting Brazil Cristine Hoepers [email protected]! Centro de Estudos, Resposta e Tratamento de Incidentes de Segurança no Brasil Núcleo de Informação e Coordenação do
Establishing and supporting CERTs for Internet security
Report on the Activities of the IGF Best Practice Forum (BPF) for: Establishing and supporting CERTs for Internet security Cristine Hoepers, CERT.br/NIC.br Maarten Van Horenbeeck, FIRST Adli Wahid, FIRST
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
Incident Response and Early Warning Initiatives in Brazil
Incident Response and Early Warning Initiatives in Brazil Marcelo H. P. C. Chaves [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority
the Council of Councils initiative
Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global
ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency
ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The
The Brazilian Internet Steering Committee CGI.br Internet Governance Model in Brazil
ian Internet Steering Committee CGI.br Internet Governance Model in rev. July 2014 CGI.br - ian Internet Steering Committee NIC.br ian Network Information Center CETIC.br Center of Studies on Information
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009
ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009 ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector December
Policies and Practices on Network Security of MIIT
2011/TEL43/SPSG/WKSP/004 Policies and Practices on Network Security of MIIT Submitted by: China Workshop on Cybersecurity Policy Development in the APEC Region Hangzhou, China 27 March 2011 Policies and
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Addressing Big Data Security Challenges: The Right Tools for Smart Protection
Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
CERT.AZ description as per RfC 2350
CERT.AZ description as per RfC 2350 Contact Cyber Security Center (CSC) Computer Emergency Response Team (CERT) Address Block 702, Drogal lane Baku, Azerbaijan Telephone: +99412 4932056 +99412 4932057
Trends in Security Incidents and Hitachi s Activities
Hitachi Review Vol. 63 (2014), No. 5 270 Featured Articles Trends in Security Incidents and Hitachi s Activities About HIRT Activities Masato Terada, Dr. Eng. Masashi Fujiwara Akiko Numata Toru Senoo Kazumi
Lith Networking and Network Marketing Safety
DIRECTION TO SUCCESS. PUBLIC AND PRIVATE SECTORS PARTNERSHIP WSIS Action Line Facilitation Meeting: Building confidence and security in the use of ICTs (C5) Partnerships for Global Cybersecurity ITU Geneva,
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
About Botnet, and the influence that Botnet gives to broadband ISP
About net, and the influence that net gives to broadband ISP Masaru AKAI BB Technology / SBB-SIRT Agenda Who are we? What is net? About Telecom-ISAC-Japan Analyzing code How does net work? BB Technology
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected] Framework
Coordinating Attack Response at Internet Scale (CARIS)
Coordinating Attack Response at Internet Scale (CARIS) Overview and Summary Report July 2015 Kathleen Moriarty Security Area Director, IETF [email protected] Agenda Coordinating Attack Response
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency 1 Challenge for Cyber Security in Financial Sector (1) Necessity to Strengthen
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National
I N T E L L I G E N C E A S S E S S M E N T
I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document
Security and Prosperity Steering Group Draft Report
2015/SOM2/TEL51/PLEN/023 Agenda Item: 7.3 Security and Prosperity Steering Group Draft Report Purpose: Consideration Submitted by: SPSG Convenor 51 st Telecommunications and Information Working Group Meeting
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
Cyber Security Threats and Countermeasures
GBDe 2006 Issue Group Cyber Security Threats and Countermeasures Issue Chair: Buheita Fujiwara, Chairman, Information-technology Promotion Agency (IPA), Japan 1. Overview Cyber security is expanding its
CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency
CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency I. Alarming call for cooperation with ISPs Slammer Worm Spread most of vulnerable SQL servers
Cyber security Indian perspective & Collaboration With EU
Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of
The Information Security Problem
Chapter 10 Objectives Describe the major concepts and terminology of EC security. Understand phishing and its relationship to financial crimes. Describe the information assurance security principles. Identify
CERT-GOV-GE Activities & International Partnerships
CERT-GOV-GE Activities & International Partnerships Zurich, Switzerland 2014 CERT-GOV-GE Manager David Kvatadze www.dea.gov.ge CERT-GOV-GE - Structural unit was formed within the Information Security and
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation
The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation
DNS Security Survey for National Computer Security Incident Response Teams December 2010
DNS Security Survey for National Computer Security Incident Response Teams December 2010 Summary As referenced during the ICANN meeting in Brussels, Belgium in June 2010, ICANN developed a survey on DNS
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
Symantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015
Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
The National Cyber Security Strategy (NCSS) Success through cooperation
The National Cyber Security Strategy (NCSS) Success through cooperation 1. Introduction The Netherlands stands for safe and reliable ICT 1 and the protection of the openness and freedom of the Internet.
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
PLAN FOR ENHANCING INTERNET SECURITY, STABILITY, AND RESILIENCY
PLAN FOR ENHANCING INTERNET SECURITY, STABILITY, AND RESILIENCY June 2009 Table of Contents Executive Summary... 1 ICANN s Role... 2 ICANN Security, Stability and Resiliency Programs... 3 Plans to Enhance
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
ICANN STRATEGIC PLAN JULY 2012 JUNE 2015
ICANN STRATEGIC PLAN JULY 2012 JUNE 2015 One World. One Internet. One World. One Internet. ICANN is the global organization that coordinates the Internet s unique identifier systems for worldwide public
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
Glasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
