Securing the Nation: Creating cyber security, resilience and readiness
|
|
|
- Terence Jefferson
- 9 years ago
- Views:
Transcription
1 NZTech Developing a National Technology Strategy NZTech Developing a National Technology Strategy A Cyber-Secure New Zealand The Role of Government Procurement B R I E F I N G P A P E R Securing the Nation: Creating cyber security, resilience and readiness December 2015 This NZTech briefing paper provides insights from the recent NZTech Advance Security Summit in Wellington, including key observations from the Leaders Forum discussions involving senior executives and chief information security officers from a broad cross section of government agencies, large private corporations and the tech sector. EXECUTIVE SUMMARY The effective and safe use of information technology has the potential to deliver incredible benefits to the New Zealand economy by enabling greater efficiency and productivity. In addition, the local technology industry is fast becoming a significant source of export revenues for the country accounting for at least $6.5 billion in exports in For New Zealand to grow its economy through digital exports, it needs to have trusted, reliable and secure ICT environments. However, there is risk of a significant impact to the economy if individuals and organisations are reluctant to engage in the digital economy or avoid using technology to its full potential due to cyber security fears. SMEs, in particular, are seen as being most vulnerable to both actual threats and fears over perceived threats. The recent NZTech Leaders Forum at the Security Summit identified the following insights: Many New Zealand organisations do not yet prioritise cyber threats as a business risk, with few businesses adopting responsibility for cyber security at a board level. While there has been recent activity focused on keeping New Zealanders safe online and a great deal of individual effort by private organisations and public organisations, what appears to be lacking is a coordinated approach. Education is critical. Cyber security needs to become part of New Zealanders DNA, much as road or fire safety have become. This requires action to integrate cyber security learning into the school curriculum and ongoing awareness campaigns for businesses New Zealand Technology Industry Association 1
2 The need to work together to keep the New Zealand economy, organisations and critical infrastructure safe was identified. This raised a set of key questions such as: How should New Zealand respond in a coordinated manner to cyber security incidents? What are the roles and responsibilities of Government, the private sector and the tech industry in keeping the New Zealand economy and critical infrastructure safe for cybercrime? How do these parties work together to improve the country s cyber security resilience, preparedness, education and awareness of cyber threats? THE RISE OF CYBERCRIME The Summit heard how cyber risks were becoming more complex, growing in scale and reach and are now affecting a wider subset of the economy. The complexity of cyber security is increasing as the technology landscape becomes more advanced. With technologies such as the Internet of Things and machine-to-machine communications expected to further accelerate the challenges. Cybercrime has become industrialised and can be state sponsored with well-organised enterprises able to launch advanced persistent attacks aimed at government agencies and organisations with high-value intellectual property. Despite the rise of more sophisticated threats, the vast majority of attacks still exploit simple vulnerabilities. It is postulated that 80% of exploitable vulnerabilities could be protected with 20% more effort. However, with the rise of social engineering attacks, organisations need to step up their security awareness and policies and implement multi-layered cyber security plans to address vulnerabilities relating to people, processes and technology. THE COST OF CYBERCRIME The direct cost of cybercrime is difficult to calculate since the true cost is obscured by incomplete and inconsistent reporting. According to the Ponemon Institute, an international research house specialising in privacy and security, the cost of a cyber breach is increasing. It is estimated that the cost of the average security breach is now $3.8 million, representing a 20% increase over the previous year. Meanwhile the average cost of losing personal information records, such as credit card data, is now $154 per record. The indirect cost of cybercrime is even harder to quantify. The proportion of New Zealand firms confident in their ICT security has reduced significantly in the past year. Much of this decrease can be attributed to greater awareness about cyber security rather actual threats. But this sentiment reveals that as organisations become more aware of cyber security risks they also become more afraid of the threats. This concern could result in avoidance by organisations to use technology to its maximum potential or to engage in the digital economy, as they try to avoid cyber threats. This, in turn, can have a great impact on the New Zealand economy as organisations, especially SMEs, miss out on the efficiency and productivity gains ICT delivers New Zealand Technology Industry Association 2
3 BALANCING RISK AND OPPORTUNITY The government s new Cyber Security Strategy highlights both the opportunities for the New Zealand economy by enabling the unbridled use of technology and the risk cybercrime poses to this opportunity. At the Security Summit, the Honourable Amy Adams, Minister for Communications, highlighted that the tech sector is growing rapidly, accounting for a significant proportion of GDP, employing tens of thousands of people and has grown to be the country's thirdlargest exporter. She went on to note that the value of ICT stocks on the NZX is now worth over $7 billion representing 10% of the market. With 96% of businesses in New Zealand now having an internet connection, the tyranny of distance, which has challenged the country s participation in global markets, is steadily eroding. As the use of ICT increases, it is delivering greater productivity benefits and enabling greater innovation, borne from New Zealanders unique and creative mindset, and which can now easily be sold on the world stage. However, according to Minister Adams, New Zealand organisations are not yet truly maximising their use of technology, which could deliver even greater productivity benefits. If they were to use the internet to its full potential, research from the Innovation Partnership estimates it would deliver an additional $34 billion worth of productivity to the economy. It is suggested that one of the reasons New Zealander firms are not realising the true potential of the efficiency gains of digital technology is an element of fear about digital threats and cyber security. EDUCATION & AWARENESS The need for greater education and awareness of cyber security emerged as one of the key issues at the Summit. The government appears to have a keen long-term interest in raising awareness around cybercrime and educating the public on how to stay safe online. Education has been an essential element of initiatives such as Connect Smart targeting smaller organisations. Education initiatives also feature prominently in the new Cyber Security Strategy, particularly with the goal to ensure New Zealanders, businesses and government agencies understand cyber threats and have the capability to protect themselves online. However, experts at the Security Summit expressed the view that more needs to be done regarding both security and awareness raising. The discussion at the Summit highlighted some key areas of concern relating to education and awareness of cyber threats, including: SMEs a soft underbelly? Concerns were raised over the cyber security posture of the thousands of SMEs in New Zealand with these organisations described as the soft underbelly of New Zealand s national infrastructure. The general lack of security awareness among smaller businesses creates the possibility that SMEs could inadvertently become a threat to the larger organisations or Government agencies they work with. The need for ongoing education and learning While the general education philosophy in New Zealand recognises that learning is a lifelong process, involving a number of different agencies, it was felt a similar approach is needed for cyber security. Learning about cyber safety and online threats needs to 2015 New Zealand Technology Industry Association 3
4 start at a young age and needs to continue through school and on into the workforce. In countries like Israel, children are taught from a young age to be creative with and explore technology, and also to understand vulnerabilities and threats. Rewiring tech education Developing and nurturing a pool of deeply skilled cyber security professionals in New Zealand is critical to strengthening the country s resilience against cyber threats. Work is currently being done to include information technology teaching and computational thinking in the school curricula. Elements of this rewiring must include education in cybersecurity. Work needs to be done to attract more interest in security as a career and relevant tertiary options should be developed. Engaging industry Engaging the tech sector in education is seen as a key element in achieving greater cyber security training. The importance of having people with real-world security experience in the classroom to teach was also highlighted. The New Zealand tech sector is interested in finding ways to develop integrated teaching and internship pathways with the education sector. Reporting Reluctance from organisations and individuals who have been breached to report incidents, creates a false sense of security among others, thereby perpetuating the belief that it won t happen to them. However, on average there is a 22% likelihood of an organisation experiencing a breach in the next two years. More focus must be placed on reporting in order to better enable understanding and education. RESILIENCE & PREPAREDNESS The need for a coordinated approach to ensure New Zealand organisations, critical infrastructure and the economy as a whole are resilient against and prepared for major cyber-attack incidents was identified. It was generally agreed that several government agencies have responsibility for ensuring large, strategic organisations and infrastructure of national significance are well prepared for major cyber security incidents and are highly resilient to attacks. However, the issue was raised on how well prepared and resilient the rest of the economy is, and what threat this lack of cyber security readiness posed to the economy as a whole. In some ways, cyber risks could be compared to earthquake risk in that there is a high probability of a low-probability event occurring. Can we learn from our preparedness for earthquakes and develop similar systems to prepare for cyber-threats - from teaching children to duck and cover, to establishing a national insurance fund. RECOMMENDATIONS Addressing the cyber security issues highlighted above will require collaborative efforts between the Government, private sector and the tech sector. It is encouraging that several of the actions in the Government s new Cyber Security Strategy address many of the same issues highlighted at the Security Summit. However, there are specific areas where more work is required, particularly around education, reporting and preparedness. Below are our recommendation for addressing these, in conjunction with the actions outlined in the Cyber Security Strategy: 2015 New Zealand Technology Industry Association 4
5 Improve technology education Cyber security needs to become part of New Zealanders DNA, much as road or fire safety have become. Teaching cyber security from a young age will better equip New Zealanders to be more innately aware of cyber threats. Integrate cyber security understanding into the school curriculum. Make computational thinking and computer studies a core subject from year one similar to the UK and other countries. Design cyber security courses for NCEA and tertiary education. Engage the technology industry into learning at both school and tertiary levels via internship programmes. Work together to increase cyber security awareness The Summit recognised the work the Government has done to date in raising awareness of cyber security among its agencies, crown entities, corporates and consumers. It is recommended the Government make more of its knowledge in this space available to the business sector, especially SMEs, in a more useable format. Provide an accessible and easy-to-understand framework of the key steps organisations and individuals need to follow to ensure their cyber security Embedding cyber security into programmes such as the Digital Journey, Support the deployment of the Digital Journey tool and encourage more uptake by small businesses. Increase cyber security resilience and preparedness Closely associated with the requirement for greater education and awareness, the need to improve New Zealand s resilience to and preparedness for cyber threats was identified. We note that one of the four goals of the Cyber Security Strategy is to ensure New Zealand s Cyber Resilience. The aim is to ensure New Zealand s most significant assets are protected, that agencies may use cyber tools to further New Zealand s national security interests, and to ensure preparedness for major cyber incidents. We also welcome the proposal of regular cyber security exercises involving the public, private and international partners to ensure preparedness for major cyber incidents, and to test the effectiveness of the National Cyber Security Emergency Response Plan. As per the Cyber Security Strategy, we agree that Government and industry should work together to create a cyber security preparedness model for New Zealand. Determine which parties are responsible for funding and implementing each element of the response plan. Improve reporting mechanisms In line with the actions outlined above to create a greater understanding of cyber security issues, sharing details on cyber threats was identified as a key strategy to help combat cybercrime. Detail gained from an incident against one organisation can provide invaluable intelligence to help protect other organisations, thereby improving New Zealand s overall cyber security resilience. However a weakness was identified in the lack of standardised national reporting of incidents since compulsory disclosure of breaches is not required in New Zealand. While the New Zealand CERT proposed in the Cyber Security Strategy would provide a single point for reporting cyber incidents, more detail is needed on how data collected through such reporting will be shared more widely. Enhance the role of a CERT to encourage or mandate reporting of incidents. We believe this will assist in both educating and alerting the wider community of emerging threats to help organisations better prepare against such threats New Zealand Technology Industry Association 5
6 Educate SMEs on highly effective controls The strategy proposes a cyber credentials scheme to complement Connect Smart s SME Cyber Security Toolkit. This scheme aims to promote to SMEs the core actions required to boost their cyber security significantly. We welcome this proposed scheme as it helps to establish crucial cyber security standards SMEs can aspire to, which, as discussions at the Summit highlighted, are sorely needed for this sector. However, we believe the scope of this scheme needs to be widened to include help and support for SMEs to train their technical staff to carry out ICT security, or to access such skills easily and affordably. We look forward to seeing more detail on how these credentials will be formulated and assessed. CONCLUSION We welcome the acknowledgement by Minister Adams at the Security Summit of the major part the technology industry can play in cyber security. We are also pleased to note this sentiment is reiterated in the Cyber Security Strategy with partnerships with industry among the four principles that underpin the strategy. Leaders at the NZTech Security Summit identified that partnerships between the public and private sectors, and the technology industry, are critical to achieving all the recommendations presented in this paper. The New Zealand technology industry looks forward to working with the Government to help improve New Zealand s cyber security awareness, skills, readiness and resilience. We believe only through collaborative efforts can we create a secure, resilient and cyber safe New Zealand. CONTACT For any queries, discussion or feedback regarding this paper, contact the author: Graeme Muller, CEO, NZTech [email protected] Phone DISCLAIMER The New Zealand Technology Industry Association (NZTech) is the national voice for the technology sector in New Zealand. NZTech is a not-for-profit association funded by members - the technology businesses in New Zealand and associated partners - from start-ups and local IT firms through to hi-tech manufacturers, major corporations and tertiary institutes. NZTech works to increase New Zealand's prosperity through better use of technology and strategically focuses on enhancing skills and talents, driving business growth & exports, and guiding & supporting government policy. By actively encouraging relevant initiatives and policies that stimulate and advance the use of technology, together we aim to increase New Zealand's productivity, innovation and economic growth. Any opinion and analysis presented in this Briefing Paper are the opinion of the author of the paper, not the opinion of the members of NZTech. Any NZTech information that is to be used in press releases or promotional materials requires prior written approval from NZTech. New Zealand Technology Industry Association L1 Building C, Triton Drive, Auckland 0632, New Zealand, ph , Copyright 2015 New Zealand Technology Industry Association. Reproduction is forbidden unless authorised 2015 New Zealand Technology Industry Association 6
techuk Cloud 2020 Vision Keeping the UK at the forefront of cloud adoption
techuk Cloud 2020 Vision Keeping the UK at the forefront of cloud adoption Introduction Cloud computing is fundamental to the UK s digital future. The next wave of the digital revolution is being powered
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
REPORT. Next steps in cyber security
REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15
Australian Government Cyber Security Review
Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Research and Innovation Strategy: delivering a flexible workforce receptive to research and innovation
Research and Innovation Strategy: delivering a flexible workforce receptive to research and innovation Contents List of Abbreviations 3 Executive Summary 4 Introduction 5 Aims of the Strategy 8 Objectives
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
MSc Cyber Security. identity. hacker. virus. network. information
identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through
Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud
Securing Internet Payments across Europe Guidelines for Detecting and Preventing Fraud Table of Contents Executive Summary Protecting Internet Payments: A Top Priority for All Stakeholders European Central
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
COMMUNICATION AND ENGAGEMENT STRATEGY 2013-2015
COMMUNICATION AND ENGAGEMENT STRATEGY 2013-2015 NWAS Communication and Engagement Strategy 2013-2015 Page: 1 Of 16 Recommended by Executive Management Team Communities Committee Approved by Board of Directors
From recommendations to actions: impact of the Strategic Policy Forum
Strategic Policy Forum on Digital Entrepreneurship From recommendations to actions: impact of the Strategic Policy Forum Executive summary: Key actions of the activities of the Strategic Policy Forum on
A Guide to the Cyber Essentials Scheme
A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: [email protected] Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane
THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY
THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY BY DR. BRIAN MCELYEA AND DR. EMILY DARRAJ Approved for Public Release: Case # 16-0276 NORTHROP GRUMMAN WHITE PAPER 2016 Northrop Grumman
AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK
1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association
THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world
THE NEW INTERNATIONALS Updating perceptions of SMEs in an increasingly globalised world Contents Introduction 5 Born Global 6 International Futures 7 Supporting UK SMEs 8 UK Regions 9 Conclusion 10 About
10Minutes. on the stark realities of cybersecurity. The Cyber Savvy CEO. A changed business environment demands a new approach:
10Minutes on the stark realities of cybersecurity The Cyber Savvy CEO Highlights Business leaders must recognise the exposure and business impact that comes from operating within an interconnected global
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
The Danish Cyber and Information Security Strategy
February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives
Launch of ECDL Syllabus 5.0 The Global Standard for Digital Literacy
Launch of ECDL Syllabus 5.0 The Global Standard for Digital Literacy Damien O Sullivan Ceo ECDL Foundation Introduction ECDL ICDL European Computer Driving Licence International Computer Driving Licence
The Scottish Wide Area Network Programme
The Scottish Wide Area Network Release: Issued Version: 1.0 Date: 16/03/2015 Author: Andy Williamson Manager Owner: Anne Moises SRO Client: Board Version: Issued 1.0 Page 1 of 8 16/04/2015 Document Location
Tourism New Zealand Commerce Committee Annual Review
Tourism New Zealand Commerce Committee Annual Review 2013/14 ADDITIONAL QUESTIONS (128-134) Tourism New Zealand Commerce Committee Annual Review - 2013/14 Additional Questions: 128-134 128. The Committee
Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
As of 2010, an estimated 61 million students of primary school age 9% of the world total - are out of school vi.
YOUTH AND EDUCATION HIGHLIGHTS 10.6% of the world s youth (15-24 years old) are non-literate i. Data from 2011 indicates that in developing countries, the percentage of non-literate youth is 12.1%, with
Inspection judgements Key to judgements: Grade 1 is outstanding; grade 2 is good; grade 3 is requires improvement; grade 4 is inadequate
Teesside University Initial Teacher Education (ITE) inspection report 28-31 January 2013 This inspection was carried out by three of Her Majesty s Inspectors and one additional inspector in accordance
SMALL BUSINESS REPUTATION & THE CYBER RISK
SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to
TRANSFORM CSCU 2020 PREAMBLE
TRANSFORM CSCU 2020 PREAMBLE A post-secondary education is not only critical for Connecticut residents to achieve personal success but also plays a key role in statewide economic expansion and stability.
Generic grade descriptors and supplementary subjectspecific guidance for inspectors on making judgements during visits to schools
Religious education Generic grade descriptors and supplementary subjectspecific guidance for inspectors on making judgements during visits to schools Inspectors visit 150 schools each year to inform Ofsted
Wales Procurement Policy Statement
Wales Procurement Policy Statement In December 2012 I launched the Wales Procurement Policy Statement (WPPS) setting out the principles by which I expect public sector procurement to be delivered in Wales.
HE learning and teaching: vision
HE learning and teaching: vision Student progression Students have a wider range of options for customising their course: the content; how, when and where they study; how they are assessed and which activities
Horizon Scanning and Scenario Building: Scenarios for Skills 2020
Horizon Scanning and Scenario Building: Scenarios for Skills 2020 A report for the National Strategic Skills Audit for England 2010 Executive Summary 17 March 2010 Analysis Understanding Insight Expert
Numeracy across learning Principles and practice
Numeracy across learning Principles and practice All teachers have responsibility for promoting the development of numeracy. With an increased emphasis upon numeracy for all young people, teachers will
Cyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
Government Communication Professional Competency Framework
Government Communication Professional Competency Framework April 2013 Introduction Every day, government communicators deliver great work which supports communities and helps citizens understand their
A strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
7 great reasons to choose ABE. ABE progression route. What happens to our alumni? Our qualifications. Business Management. Where can you study?
02 Contents Contents 02 04 05 06 07 08 12 16 18 20 22 23 Welcome 7 great reasons to choose ABE ABE progression route What happens to our alumni? Our qualifications Business Management Where can you study?
UK TESTING ECOSYSTEM FOR CONNECTED AND AUTONOMOUS VEHICLES. A call for evidence MAY 2016
UK TESTING ECOSYSTEM FOR CONNECTED AND AUTONOMOUS VEHICLES A call for evidence MAY 2016 Contents UK testing ecosystem for connected and autonomous vehicles... 3 1. Foreword... 4 2. Executive summary...
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
Wanganui Digital Strategy 2010
Wanganui Digital Strategy 2010 Digital Vision Wanganui is a leader in the digital world. We are a well connected, socially inclusive, prosperous and sustainable community. Foreword The digital revolution
Odgers Berndtson Board Survey. Among CEOs in Denmark s largest corporations
Boards and CEOs preparing for growth Almost half of the CEOs in Denmark s largest corporations consider the financial crisis to be over and expect positive growth in the near future. This calls for preparation
Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks
Please cite this paper as: OECD (2012), Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks, OECD Digital Economy Papers, No. 210, OECD Publishing.
Roadmap for new Cyber security education in ME
Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the
c o n t e m p o r a r y
c o n t e m p o r a r y MCEETYA A u s t r a l i a - N e w Z e a l a n d 21 st century education integrates technologies, engaging students in ways not previously possible, creating new learning and teaching
Introduction. Page 2 of 11
Page 1 of 11 Introduction It has been a year since The Walton Centre brought its recruitment function in-house and it was critical that the organisation took this step. This is a specialist organisation
UK Government Information Economy Strategy
Industrial Strategy: government and industry in partnership UK Government Information Economy Strategy A Call for Views and Evidence February 2013 Contents Overview of Industrial Strategy... 3 How to respond...
Overview TECHIS60441. Carry out security testing activities
Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being
Key skills for developing employability
Key skills for developing employability First published 2001 6.00 Qualifications and Curriculum Authority 2001 ISBN 1 85838 481 8 Reproduction, storage, adaption or translation, in any form or by any means,
Creative England Business Loan Fund. Application Guidelines
Creative England Business Loan Fund Application Guidelines August 2014 1 Business Loan Fund background information Overview, aims and objectives Creative England operates with the core purpose of supporting
Success through partnership
Success through partnership Achieving a national vision for ICT in schools Strategic Plan to guide the implementation of the Digital Education Revolution initiative and related initiatives 5 August 2008
IN PARTNERSHIP WITH PLYMOUTH UNIVERSITY. Highlands. Opportunities Achievement Success. Information Technology for Business Degrees
Highlands Opportunities Achievement Success IN Information Technology for Business Degrees Introduction Plymouth University in partnership with Highlands College offers unrivalled expertise and experience
The Requirements for Community Learning and Development (Scotland) Regulations 2013: Guidance for Local Authorities
The Requirements for Community Learning and Development (Scotland) Regulations 2013: Guidance for Local Authorities The Requirements for Community Learning and Development (Scotland) Regulations 2013:
COUNCIL OF THE EUROPEAN UNION. Brussels, 8 May 2008 9207/08 EDUC 144 SOC 276 CULT 67 COMPET 178 RECH 173. NOTE from: Presidency
COUNCIL OF THE EUROPEAN UNION Brussels, 8 May 2008 9207/08 EDUC 144 SOC 276 CULT 67 COMPET 178 RECH 173 NOTE from: Presidency to: Council No prev. doc. 8752/08 EDUC 119 SOC 243 CULT 59 COMPET 152 RECH
Salzburg ii recommendations. EuroPEan universities achievements SincE 2005 in implementing the Salzburg PrinciPlES
Salzburg ii recommendations EuroPEan universities achievements SincE 2005 in implementing the Salzburg PrinciPlES Copyright 2010 by the European University Association All rights reserved. This information
DELIVERING OUR STRATEGY
www.lawsociety.org.uk DELIVERING OUR STRATEGY Our three year plan 2015 2018 >2 > Delivering our strategy Catherine Dixon Chief executive Foreword Welcome to our three year business plan which sets out
STRATEGIC SCIENCE AND RESEARCH PRIORITIES
STRATEGIC SCIENCE AND RESEARCH PRIORITIES At the inaugural meeting of the Commonwealth Science Council, members strongly supported the need and value of establishing science and research priorities, at
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?
Enhanced resilience for major emergencies Proven capability solutions to deliver the resilience you need
Enhanced resilience for major emergencies Proven capability solutions to deliver the resilience you need 1 The Alliance Value Proposition Alliance Value Proposition The threat posed today Terrorist threats
G20 LABOUR AND EMPLOYMENT MINISTERIAL DECLARATION MELBOURNE, 10-11 SEPTEMBER 2014
Introduction G20 LABOUR AND EMPLOYMENT MINISTERIAL DECLARATION MELBOURNE, 10-11 SEPTEMBER 2014 Preventing structural unemployment, creating better jobs and boosting participation 1. We, the Ministers of
OUR FUTURE TOGETHER. New Zealand Settlement Strategy
OUR FUTURE TOGETHER New Zealand Settlement Strategy Foreword Over the last 20 years, the world has changed there is more competition for skills, more risks at the border and people are more mobile. These
Making Foreign Languages compulsory at Key Stage 2 Consultation Report: Overview
Making Foreign Languages compulsory at Key Stage 2 Consultation Report: Overview Introduction This report summarises the responses to the consultation on the Government s proposal to introduce foreign
ROLES AND RESPONSIBILITIES The roles and responsibilities expected of teachers at each classification level are specified in the Victorian Government
ROLES AND RESPONSIBILITIES The roles and responsibilities expected of teachers at each classification level are specified in the Victorian Government Schools Agreement 2004: Leading teacher Leading teachers
4. Economic policies to best achieve our full employment goal
4. Economic policies to best achieve our full employment goal Economic policies to best achieve our full employment goal 1 Breakout Session 4 Economic policies to best achieve our full employment goal
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
DOCTORAL EDUCATION TAKING SALZBURG FORWARD
EUROPEAN UNIVERSITY ASSOCIATION DOCTORAL EDUCATION TAKING SALZBURG FORWARD IMPLEMENTATION AND NEW CHALLENGES -CDE EUA Council for Doctoral Education Copyright by the European University Association 2016.
Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
SEYMOUR SLOAN IDEAS THAT MATTER MOVING BEYOND CUSTOMER EXPERIENCE TOWARDS CUSTOMER ENGAGEMENT - A WINNING APPROACH
SEYMOUR SLOAN IDEAS THAT MATTER MOVING BEYOND CUSTOMER EXPERIENCE TOWARDS CUSTOMER - A WINNING APPROACH INTRODUCTION The traditional discussion within organisations has always focused around the customer
Developing the Young Workforce. Career Education Standard (3-18)
Developing the Young Workforce Career Education Standard (3-18) September 2015 The standard recognises the journeys children and young people make as they learn about the world of work from the early years
FOCUS MONASH. Strategic Plan 2015 2020
F CUS FOCUS MONASH Strategic Plan 2015 2020 2 Vice-Chancellor s Introduction 4 Over the last half century, Monash University has forged a path that reflects the ambitions of its beginnings and signals
University Strategy. 2015/16 to 2020/21
University Strategy 2015/16 to 2020/21 OUR VISION We will deliver transformational education, research and innovation by... Recognising and sustaining our strengths in undergraduate education and growing
Business Plan 2012/13
Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,
ROADMAP. Proposal on a European Strategy for Internet Security
TITLE OF THE INITIATIVE ROADMAP Proposal on a European Strategy for Internet Security TYPE OF INITIATIVE xcwp Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT INFSO A3 EXPECTED DATE OF ADOPTION
OECD PROJECT ON CYBER RISK INSURANCE
OECD PROJECT ON CYBER RISK INSURANCE Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent years.
STRATEGIC POLICY FORUM ON DIGITAL ENTREPRENEURSHIP. Fuelling Digital Entrepreneurship in Europe. Background paper
EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Service Industries Key Enabling Technologies and Digital Economy Introduction STRATEGIC POLICY FORUM ON DIGITAL ENTREPRENEURSHIP Fuelling
2015 UCISA Award for Excellence Entry
Institution Name: University of Leeds Originating Department: IT Contact Name (and email address): John Grannan [email protected], Sally Bogg, [email protected] Project Title: IT Help Desk Continual
Kingdom Big Data & Analytics Summit 28 FEB 1 March 2016 Agenda MASTERCLASS A 28 Feb 2016
Kingdom Big Data & Analytics Summit 28 FEB 1 March 2016 Agenda MASTERCLASS A 28 Feb 2016 9.00am To 12.00pm Big Data Technology and Analytics Workshop MASTERCLASS LEADERS Venkata P. Alla A highly respected
THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES. - Issue Paper -
THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES - Issue Paper - UNESCO, Bureau of Strategic Planning September 2003 1 I. The past and present scope of innovation During the last two decades,
Managing Supply Chain Impacts
Managing Supply Chain Impacts Increasing shareholder, public and media scrutiny means that any irregular or irresponsible practices within an organisation's supply chain can permanently damage an organisation's
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Solihull Clinical Commissioning Group
Solihull Clinical Commissioning Group Business Continuity Policy Version v1 Ratified by SMT Date ratified 24 February 2014 Name of originator / author CSU Corporate Services Review date Annual Target audience
Making Sense of Cyber Insurance: A Guide for SMEs
Making Sense of Cyber Insurance: A Guide for SMEs abi.org.uk @BritishInsurers 2 abi.org.uk Contents Introduction 4 Six Key Areas to Look Out For in Cyber Insurance Policies 5 Potential Exclusions to Look
