Center for Cyber and Information Security. a shared commitment to the nation s research and expertise development. Opening Conference August 15

Size: px
Start display at page:

Download "Center for Cyber and Information Security. a shared commitment to the nation s research and expertise development. Opening Conference August 15"

Transcription

1 Center for Cyber and Information Security a shared commitment to the nation s research and expertise development Opening Conference August 15 1

2 Welcome! We read daily about things that should worry us but we barely understand. Identity theft, industrial espionage, cybercrime, online extortion, cyberwar, cyberattack, data leak, international surveillance programs, and challenges to privacy. Our modern societies have become totally dependent on computer based information and communication technologies (ICT), and thus on their robustness and resilience against accidents and crimes. Today, computer systems control everything from traffic lights and surgical equipment in hospitals to telephone communications and electricity distribution. Further more, computer systems harbours information and knowledge that must be sheltered from unauthroized access; including engineering solutions, business secrets, information about your bank accounts, defense secrets, purchasing habits and s. This is about you, it is about what kind of society you want to live in, it is about your company s ability to survive, and it is about our government s ability to protect us, to protect our welfare and to protect our privacy. All countries today need to develop their eduction an research capacity to meet this future. As a significant national contribution, a number of organizations have partnered to create a center for research and education in information and cyber security in Norway. By the end of 2014, the center will have a core group of 25 scientists of a total of people, including non-permanent and adjunct positions as for instance Ph.D. students and postdocs. In addition, there will be bachelor and master students at the Centre. Today, August 15, 2014, we officially open the center. Not everything will be in place at the start, but we found it right and important to choose a date to mark the important contribution and to celebrate. We do this in the form of a conference we think you will find very interesting. With regards, The National Police Directorate, Eidsiva, the Norwegian National Seurity Authorities, the Norwegian Cyber Defence, the Police ICT Service, the National Criminal Investigation Service Kripos, the National Authority for Investigation and Prosecution of Economic and Environmental Crime Økokrim, the Police University College, the Norwegian Defence Cyber Academy, the Norwegian Defence Research Establishment FFI, Gjøvik University College, Telenor, Statkraft, Statnett, mnemonic, IBM, PwC, Oppland County, Lillehammer University College, the Norwegian Nasjonal Identity Center, Oslo Police District, the Police Security Service, NC-Spectrum, Oppland County, the Norwegian Centre for Information Security NorSIS. ccis.no 2

3 08:45 Registration and coffee 09:30 Session 1 1. Morten Irgens, Chair, the Interrim Board of Directors, CCIS. 2. Laila Bokhari, State Secretary, the Office of the Prime Minister. 3. Øystein Bø, State Secretary, the Ministry of Defence. 4. Odd-Reidar Humlegård, National Police Commisioner, Director, the Norwegian Police Directorate, 5. Odd Egil Pedersen, Major General and Chief, of the Norwegian Cyber Defence, 6. Kjetil Nilsen, Director General, the Norwegian National Security Authority 10:50 Break 11:10 Session 2 7. Arvid Hallén, CEO, the Norwegian Research Council, 8. Rainer Baumgart, CEO Secunet Security Networks AG, 9. Joe Cannataci, Professor, University of Groningen, 10. Håkon Skulstad, Rector, the Norwegian Police University College, 11. Ann-Kristin Aas, Rector of the Norwegian Defence Cyber Academy, 12. Bente Ohnstad, Rector, Lillehammer University College, 13. Jørn Wroldsen, Rector, Gjøvik University College, 12:20 Lunch 13:20 Session Tønnes Ingebrigtsen, CEO, mnemonic. 15. Troels Oerting Joergensen, Assistant Director of Europol, Head of the European Cybercrime Centre (EC3). 16. Berit Svendsen, CEO, Telenor Norway and Executive Vice President, Telenor. 17. William F. Pelgrin, CEO, Center for Internet Security 14:50 Break 15:10 Session Melissa Hathaway, President, Hathaway Global Strategies. 19. Bjørn Erik Thon, Director, the Norwegian Data Protection Authority 20. Kimmo Ulkuniemi, Assistant Director, Interpol Global Complex for Innovation. 16:30 Session 5 Reception. Building A. Host: Jørn Wroldsen 3

4 Laila Bokhari is State Secretary at the Office of the Prime Minister with with a special focus on safety and emergency preparation. Bokhari is a political scientist and terrorism researcher. She has studied political science, international law and international politics in the UK and the Netherlands, and Arabic and Middle Eastern politics in Jerusalem and the West Bank. She has worked at the Defense Research Institute, Norwegian Institute of International Affairs (NUPI), the UN Security Council s al-qaeda-taliban monitoring team (the 1267 Committee ), Temporary International Presence in Hebron (TIPH), PRIO, NATO and the OSCE, and worked as a diplomat at the Norwegian embassy in Islamabad. Bokhari has been a member of the Government Security Policy Board, the July 22 Commission, a number of NATO working groups and the Advisory Board of the Pakistan Institute of Peace Studies. William Pelgrin is the CEO of the Center for Internet Security (CIS), which is a not-for-profit organization with a mission to enhance the cyber security readiness and response of public and private sector entities. CIS has responsibility for provision of cyber security services for state, local, tribal and territorial governments; and the identification and development of talent for the cyber security workforce of the future. Mr. Pelgrin is serving his third term as Chair of the National Council of ISACs, which works to advance the physical and cyber security of critical infrastructure and includes representation from the major national industry sectors. Mr. Pelgrin served as a Commission Member of the Center for Strategic and International Studies (CSIS) Commission on Cyber Security to brief the President Obama on critical cyber security issues. The Commission s reports provided findings and recommendations to secure cyberspace in Obama s Presidency and to help guide policy-making to improve cyber security in critical infrastructure. Øystein Bø is State Secretary in the Ministry of Defence. Bø has an education in law (Cand. jur.) from the University of Oslo and Officer Candidate School from the Norwegian Defence. He has earlier held positions as Head of International Department and Permanent Secretary of the Standing Committee on Foreign Affairs and Defence of the Norwegian Parliament; Minister, Deputy Permanent Representative, Permanent Delegation of Norway to NATO; Chef de Cabinet of the Minister of Foreign Affairs; Deputy Director General, Head of OSCE/CFSP Section; Assistant Director General, European Policy Department, Head of Stability Pact / OSCE Coordination Unit; Assistant Director General, Department of Policy Planning and Evaluation, Head of Stability Pact / OSCE Coordination Unit; National Coordinator, Stability Pact for South Eastern Europe; Adviser, OSCE Coordination Unit. (Responsible for Kosovo/FRY throughout the Norwegian OSCE Chairmanship 1999); First secretary, Norwegian permanent delegation to NATO; and Legal adviser, Office of the High Representative, Sarajevo (Seconded by the Norwegian MFA). Kjetil Nilsen is the Director General of the Norwegian National Security Authority (NSM), Norway s central authority for cyber security/information assurance, personnel security and physical security. Prior to joining the Norwegian National Security Authority in 2009, Mr. Nilsen spent more than 25 years with the Norwegian National police force. From 1998 Mr. Nilsen served in different positions on senior management level, amongst others as Director of the Operational Department of the Norwegian National Police Security Service (PST). He has also a background from the Norwegian Armed Forces. In between his tenures in the police force, Mr. Nilsen has practiced law in a private law firm. Mr. Nilsen holds a law degree from the University of Oslo and a master degree from the Norwegian School of Management BI. Mr. Nilsen has completed the Senior Course at NATO Defence College in Rome, Italy. Mr. Nilsen is one of CCIS key initiators and serves as member of its interim Board of Directors. 4

5 Odd Reidar Humlegård er Mr. Humlegård is a Norwegian lawyer, civil servant and Norway s National Police Commissioner, which make him the top chief of Norway s police force except the Police Security Services. He was appointed National Police Commisioner and put in charge of reforming the Police after the terrorist attack on July 22, 2011, and is well known for his ability to cut through bureaucracy and get things done. Mr. Humlegård is one of CCIS key initiators. Humlegård has his background both from the Norwegian Military and the Norwegian Police. He has previously served as head of the National Criminal Investigation Service, and head of the National Mobile Police Service. Executive Chairman of Telenor Research and Development. From 2005, Svendsen took up the position as Vice President and head of Telenor Nordic fixed operations with overall responsibility for the fixed operation in Norway and from 2008, she held the position of CEO of Conax. Berit Svendsen has held several directorships over the years, and is currently member of the boards of directors of DNB and of EMGS. From 2002 she was a member of the European Commission s advisory group on ICT issues. Svendsen has a master s degree in electrical engineering from NTNU (1988) and a master s degree in Technology Management from NTNU and the Massachusetts Institute of Technology, USA (1995). Odd Egil Pedersen is commanding general of the Norwegian Armed Forces Cyber Defence, charged with maintaining, developing and defending the Norwegian Armed Forces ICT and Command and Control systems. Major General Pedersen s background is from the Norwegian Army s Signal Corps, and served through his early years in positions through the Norwegian Army. The latter half of his career he has mainly served in positions tied to military intelligence, both in the Norwegian Intelligence Service and in positions in NATO. Major General Pedersen is a key supporter of CCIS and serves as member of its interim Board of Directors. Bjørn Erik Thon has been the director of the Norwegian Data Protection Authority since The Data Protection Authority facilitates protection of individuals from violation of their right to privacy through processing of their personal data. He came to the Data Protection Authority from the position as Consumer Ombudsman, which he held for ten years. Rainer Baumgart is the CEO of Secunet Security Networks AG, one of Germany s leading providers of IT security with focus on cryptography (SINA), e-government, biometrics, business security and automotive security. Baumgart has a special responsibility for the Public Sector division with the business units High Security and Government as well as for business development and communication. His career in IT security spans more than 20 years. Berit Svendsen is CEO of Telenor Norway and Executive Vice President of Telenor. Svendsen s career in Telenor startet in 1988 when she joined the corporation as a research scientist. From 2000, she held the position of Executive Vice President and Chief Technology Officer. In the same period, she also held the position of 5 Kimmo Ulkuniemi, INTERPOL Global Complex for Innovation Assistant Director for Strategy and Outreach has worked in the Finnish Police since Prior to his

6 appointment to INTERPOL he was Deputy Head of the Europol National Unit in Finland and was responsible for Europol coordination in Finnish law enforcement. Mr Ulkuniemi has more than 10 years experience in international police cooperation in INTERPOL, Europol and Schengen and he has experience on the investigation and international cooperation on cybercrimes. He has also worked in the Council of European Union and the United Nations. Mr Ulkuniemi and his unit are responsible for cyber security strategies, Public Private Partnerships, Internet governance, Outreach programs and National Cyber reviews in INTERPOL Tønnes Ingebrigtsen is the founder and CEO of the Norwegian company information security company mnemonic. memonic - and, yes, the company spells its name with lower case m - provides products and services in IT security and information security to large public and private sector companies in Scandinavia, including IT risk management, risk assessment and auditing, testing and securing applications and databases with regard to information security. Joeseph A. Cannataci co-founded and co-directs the Security, Technology & e-privacy Research Group (STeP) at the Faculty of Law at the University of Groningen where he holds the Chair of European Information Policy & Technology Law. He is Head of the Department of Information Policy & Governance at the Faculty of Media & Knowledge Sciences of the University of Malta and Adjunct Professor at the Security Research Institute and the School of Computer and Security Science at Edith Cowan University Australia. Furthermore, Cannataci is currently overall co-ordinator for the EU-supported SMART, RESPECT and MAPPING projects dealing with various forms of surveillance, privacy and Internet Governance. In 2002 he received the title Officier dans l ordre des palmes academiques by France, in part for his work on technology law and privacy law and his contribution to the development of European information policy. He has advised the Council of Europe (CoE) on data protection regulations and on cybercrime, and Directorate General of Human Rights and Rule of Law on police use of personal data. Morten Irgens is chairman of the interim board of CCIS, chairman of the board of the Norwegian Information Security Center NorSIS, Vice Rector of Research at Gjøvik University College, and Dean of the Faculty of Computer Science and Media Technology at Gjøvik University College, with responsibility for the Media Technology Laboratory and the Norwegian Information Security Laboratory. Dr. Irgens has founded and built a software company, and acted at the Board level for industry initiatives. He holds a PhD in Computer Science from Simon Fraser University and a Cand. Scient. in Informatics from the University of Oslo. Melissa Hathaway is President of Hathaway Global Strategies LLC and a Senior Advisor at Harvard Kennedy School s Belfer Center. She served in two Presidential administrations where she spearheaded the Cyberspace Policy Review for President Obama and led the Comprehensive National Cybersecurity Initiative for President George W. Bush. At the conclusion of her government service she received the National Intelligence Reform Medal and the National Intelligence Meritorious Unit Citation Medal in recognition of her achievements. Previously, Ms. Hathaway was a Principal with Booz Allen & Hamilton, Inc., where she led two primary business units: information operations and long range strategy and policy support, supporting key offices within the Department of Defense and Intelligence Community. Earlier in her career she worked with Evidence Based Research, Inc. and the American Foreign Service Association. Ms. Hathaway has a B.A. degree from The American University in Washington, D.C. She has completed graduate studies in international economics and technology transfer policy, and is a graduate of the US Armed Forces Staff College. 6

7 Arvid Hallén is the Director-General of the Research Council of Norway, a position he has held since since 2004). Previously, he has served as Director of the Norwegian Institute for Urban and Regional Research and Director for Humanities and Social Sciences in the Research Council. He holds a mag.art. (PhD) degree in sociology from the University of Oslo and is a member the Norwegian Academy of Technological Sciences. Håkon Skulstad is a trained police officer and lawyer and the Rector of the Norwegian Police University College. He has previously held positions as chief of police in Østfinnmark Police District, Head of the Police Department at the Ministry of Justice, Deputy Director of the National Criminal Investigation Service (KRIPOS), acting Attorney General and Public Prosecutor at the Norwegian National Authority for Investigation and Prosecution of Economic and Environmental Crime. Cybercrime Centre (EC3) is an organization of the European Union attached to Europol in The Hague. It was officially opened on 11 January The purpose of the centre is to coordinate cross-border law enforcement activities against cybercrime and act as a centre of technological expertise. It is tasked with assisting member states in their efforts to dismantle and disrupt cyber crime networks and will also develop tools and provide training. Ann Kristin Aas is Rector of the Norwegian Defence Cyber Academy. She has a master in electronics and telecommunications from NTNU. Her military career began in 1991 when she was studying fire control engineering at what was then called the Army Technical School in Lillehammer. She has been an instructor at the college and head of corporate governance at FK KKIS. Jørn Wroldsen is professor in physics and rector at Gjøvik University College. He has led GUC through a growth that has seen close to a doubling of its number of students and the establishing of solid research activities. Troels Oerting is Assistant Director of Europol, Head of the European Cybercrime Centre (EC3), and Head of Counter Terrorist and Financial Intelligence Centre (CTFC). Previously, he has served as Director of the Danish NCIS, Director of National Crime Squad and later as Director of the Danish Serious Organized Crime Agency (SOCA). He held positions as Head of NCB Copenhagen, Chair of the Head of Europol National Unit group (HENU), member of DK Europol Management Board delegation and Head of DK Schengen / Sirene. Later he became Director of Operations in the Danish Security Intelligence Service before he was promoted to Assistant Director in Europol in The European 7 Bente Ohnstad is is a lawyer, associate professor and Rector of Lillehammer University College (LUC), as well as an adjunct associate professor at the University of Stavanger. She was previously Dean of the Faculty of Health and Social Care at Lillehammer University studying Health and Social Affairs, and senior executive, manager, assistant director, director, and planner respectively of Social Affairs, Health Directorate, Health and Social Affairs.

8 8

9 OUR INCREASED VULNERABILITY Our increased reliance on Information and Communication Technologies (ICT) will create in the years ahead new, large, and increasingly complex security challenges; confronting these challenges will require an increased focus on higher education, more efficiency in resource development, improved research capacity, and broad crosssector collaboration among industry, infrastructure providers, the police and other government security agencies, and academia. In the last few years we have seen a number of examples of how everything from pacemakers and cars to electricity generators, public transportation, or intellectual property may be exposed to criminal activity and destroyed from a distance -even from the other side of the globe. Thousands of events have brought up information security and cyber security to the public debate, including security breaches in government computer systems, lack of protection of personal information, loss of credit card information, and espionage at high level. The virus that put 35,000 computers out of work in Saudi Aramco, the world s largest oil company; the cyber attack on Georgia, ahead of Russia s invading the country; industrial espionage against the Scandinavian telecom operator Telenor; the Americans access to communication information in other countries; the cyber attacks on the Nobel Institute and the International Monetary Fund (IMF), the nuclear enriching programmes of Iran and Estonia; a strong increase in identity theft and relentless attacks on our financial institutions; and the Swedish monitoring law (FRA) that provides the Swedish intelligence service full access to the content of communications of their neighbour countries that is transmitted across Swedish soil. It is said that what can go wrong will go wrong. ICT has opened up a whole new dimension of how things can go wrong -be it by themselves or due to malicious acts. We must be prepared. 9

10 1 6 EXAMPLES FROM AROUND THE WORLD While 20,000 Norwegians are exposed to pickpocketing every year, 60,000 are victim of identity thefts that result in financial loss In March 2013 the telecom operator Telenor announced that several of its senior management team had been subjected to extensive and organised cyber espionage. In the U.S. a cyber attack happens every three minutes on average. In December 2012, more than 55,000 computers at Saudi Aramco, the world s largest oil company, were incapacitated by a virus attack. 450,000 names and passwords were stolen from Yahoo in May After The New York Times investigated allegations of economic nepotism among the Chinese prime minister s family members, the newspaper s servers and a number of laptops were tapped over several months. The Washington Post, The Wall Street Journal and several other newspapers and news media have experienced similar espionage. Denial of Service attacks can be purchased online. The websites of the Nobel Committee were attacked when it awarded the Peace Price to a Chinese dissident in 2010, and later a number of organizations in Norway, including Norwegian security agencies, political parties, and businesses, experienced similar attacks. Iran s nuclear program was delayed due to a targeted attack using the Stuxnet computer worm. When Norway joined military operations in Libya in 2011, the Norwegian Armed Forces were victim of a sophisticated attack. 10

11 ... an inadequate national focus on areas such as cyber security poses potential real threats to Norway s security. We must confront new dangers, like cyber attacks, that threaten our nation s infrastructure, businesses and people, President Barack Obama wrote in his introduction message to the 2014 budget. Our new, large and increasingly complex security challenges require efficiency in the development of resources, training and research, sophisticated and dynamically evolving study programmes and applied research, and well developed relations among stakeholders and good collaboration across sectors. However, the dramatic increase in cyber security challenges has demanded a focus on achieving operational capacity, creating a critical undercapacity in research and education. The funding for developing relevant skills and carrying out research is still limited, and collaborative relations between stakeholders and academia are poorly developed. All this is putting security stakeholders under pressure. Some countries have responded to these challenges. For instance, the U.S. state budget for 2014 allocates $500 million to the Department of Homeland Security for cyber security research. In the Nordic countries the response has been slower. For instance, an independent international committee evaluating ICT research in Norway concluded that Norway s inadequate national research strategy on cyber security poses potential real threats to security in Norway. To this concern, the Center for Cyber and Information Security (CCIS) is an answer. 11

12 In Norway, key national cyber security stakeholders have initiated a partnership to establish the Center for Cyber- and Information Security (CCIS), a national centre for research, training, and education in cyber- and information security. Statkraft is Europe s largest generator of renewable energy and is the leading power company in Norway. The company owns, produces and develops hydropower, wind power, gas power and district heating. Statkraft is a major player in European power trading and has 3500 employees in more than 20 countries. Statkraft works actively with cyber security issues across all business areas and geographies. Statnett is the Norwegian TSO and is responsible for Norway s national electricity grid, an infrastructure that is increasingly becoming dependent on ICT for its operations. Statnett is constantly working to maintain a long-term information security strategy, and to strengthen the ability to deal with information security threats and incidents. Eidsiva Energy is a regional power producer and supplier and the largest in the eastern part of Norway. Eidsiva has undertaken a particularly supportive role for developing competence in the Innland region. CCIS objectives and role are in line with Eidsiva s efforts to strengthen its own security strategy. The Norwegian National Security Authority (NSM) is a cross-sectoral professional and supervisory authority within the protective security services in Norway. The authority is responsible for the national cyber security, and operates the national Computer Emergency Response Team (NorCERT). NSM delivers threat analyses on a national level, working with experts on cyber security and cryptology. The Norwegian Cyber Defence (CY- FOR) is the branch of the Norwegian Armed Forces responsible for protecting and defending military CIS in Norway. The Department for the Protection of Critical Infrastructure (BKI) is a division of the Norwegian Cyber Defence with duties that include the Computer Network Defence for the Defence Information Infrastructure of the Norwegian military. This involves the detection of computer network attacks and intelligence threats against ICT infrastructure, and the analysis and comparison of indicators of network attacks. The Norwegian Defence Research Establishment (FFI) is Norway s prime institution responsible for defense-related research and development. A prioritized task is to study challenges and opportunities related to informa- 12

13 Center for Cyber and Information Security will become one of the largest academic environments in cyberand information security in Europa and will position itself as a national resource and the contact point for international partners. tion assurance and cyber systems. The Ministry of Justice and Public Security (JD) is responsible for societal security and preparedness, crime prevention and correctional services, immigration, courts and the legislative work for law enforcement. The National Police Directorate (POD) is responsible for Norway s police districts and special police agencies, with the exception of the Police Security Service (PST). PDO has undertaken responsibility for establishing closer contact between the police and the applied research sector in Norway. The Police ICT Service was spun off from the Police Data and Material Services (PDMT) in the fall of 2013 and is responsible for developing and facilitating the police ICT infrastructure and applications. The National Criminal Investigation Service (Kripos) is a special agency within the Norwegian Police Service with responsibility for investigating organized crime and major crime. It is Norway s contact point for Interpol and Europol and their respective competence centres for fighting cyber crime. The National Authority for Investigation and Prosecution of Economic and Environmental Crime (ØKOKRIM) is the national authority for investigation and prosecution of economic and environmental crime. Digital evidence is essential in its nvestigations, but the volume is strongly increasing. Økokrim will together with CCIS develop more advanced methodologies for information analyses to support the fight against crime. The Police Security Service (PST) is the police agency for home security in Norway. PST will contribute its insight and expertise to CCIS in order to increase national security, enhance the ability to ward off, understand and investigate incidents, and provide the Norwegian government with the best possible threat assessment and advice. Oslo Police District is that the capital police the nation s largest with nearly 2,600 employees. The Police Authority has a number of national tasks.the Police Authority has focused on using technology effectively in the solution of 13

14 police work, and have built up a solid unit - Digital Forensics Unit - which primary role to utilize the potential of the technology track. The Unit will collaborate closely with CCIS on developing new methods in forensics. The Norwegian ID Centre (NID) has a national responsibility for identity and document expertise. Norwegian ID Centre is a key partner to the Norwegian Biometrics Laboratory at CCIS. Norwegian ID Centre has a national responsibility for identity and document expertise. Norwegian ID Centre is a key partner to the Norwegian Biometrics Laboratory at CCIS. Telenor Group is one of the leading mobile operators in the world, with 172 million mobile subscriptions. Telenor has mobile operations in 13 markets, as well as an interest of 33 % in VimpelCom Ltd., operating in 17 markets. Telenor contributes into CCIS with its expertise in cyber security of electronic communications. mnemonic is one of the largest specialists in information security within the Nordic region. We supply products and services to some of the leading private and public sector enterprises. Our services cover all areas of information security from risk management and application security to detecting, preventing and respond to security incidents via our service Argus Managed Defence. NC Spectrum delivers consultancy services in engineering, project development, and operation of infrastructure in the public and private sectors. NC-Spectrum works closely with its customers to develop cyber security for communication networks and critical infrastructure. PriceWaterhouse Coopers (PwC) is a multinational professional services firm. It provides a range of integrated cyber security services. The International Business Machines Corporation (IBM) IBM is an American multinational technology and consulting corporation. The company has several centres of expertise in cyber security. The Oppland County (OFK) has been an early supporter of CCIS, a financing agent and a strong and enthusiastic promoter of CCIS. The 14

15 County Council cooperates actively in the effort to improve information security in the county s municipalities and businesses. The Norwegian Police University College (PHS) The Norwegian Police University College (PHS) offers education a three-year bachelor program in police studies, in-service training and post-graduate studies, including a master program in police science. PHS conducts research and development work in its areas. of focus. PHS has a central role in CCIS and contribute to the centre with expertise, research capacity and study programs in various aspects of cyber crime. Gjøvik University College (GUC) established its research group in information security 11 years ago and built it up to become one of Europe s largest open academic research groups in the field. Today GUC leads the National Research School in Information Security (COINS) and is offering dedicated undergraduate programmes in information security at bachelor, master and PhD level, in addition to its undergraduate programs at these three levels in Computer Science. GUC is host institution for CCIS, and provides CCIS with offices, ICT services and administrative support The Norwegian Defence Cyber Adademy (FIH) FIH s study program awards bachelor degrees in military education and develops research capacity in cyber defence. FIH cooperates closely with GUC. Lillehammer University College (LUC) established its bachelor program in law six years ago. LUC will be a cornerstone in CCIS work on developing a research group in privacy, cyber law and the connection information security and law. The Norwegian Centre for Information Security (NorSIS) NorSIS has a national mandate to increase the information security expertise of individuals and businesses through raising awareness about threats and vulnerabilities, disseminating specific measures through the news, providing advice and guidance, and trying to influence positive attitudes in information security. NorSIS participation in CCIS will enhance the centre s ability to deliver a broad dissemination of knowledge and practices on information security and to this purpose it will collaborate with the local authorities and SMEs. 15

16 Useful information This page should provide you with a few of the extra things you should know while at the conference. Access to the wireless internet: Connect to HiG-W. The username is wireless, and the password August2014. Please note: we will endeavor to provide access to everyone however, at times, access may be limited. An Information Desk is situated at the Eureka Auditorium (see map below). You can also contact contact: Florissa Abreu Rachael McCallum External contacts: Taxi Emergency Fire. 110 Police 112 Ambulance Doctor (hospital) Kråkereiret meeting room (top floor.) parallell meetings Eureka auditorium Conference Center Entrances tp Eureka G302 Meeting room (top floor.) parallell meetings Atrium Reception 16

17 The Center for Cyber- and Information Security will strengthen our expertise and skills to prevent, detect, respond to, and investigate undesirable and criminal computer based activities. The centre will undertake actions towards: Building research capacity and research groups at top level internationally in disciplines that are relevant for our partners and for Norway. Providing training and study programs of high quality and with great societal relevance. Contributing to Norway s international collaboration where partners can participate and apply their knowledge and expertise. Helping to increase the recruitment of students and researchers for the Norwegian education and training in security and for research environments. Contributing to the long term competence development strategy and research and education strategy. Cooperating with and contributing to organizations whose mission is to inform and raise awareness about security. Strengthening cooperation, exchanging knowledge, and sharing of skills among sectors, among application/innovation environments, among academic institutions, and among national and international projects, centres and organizations. Becoming a knowledge and expertise node in Europe s ability to compete for international research funding. 17

18 BROAD POLITICAL SUPPORT The 22 July Committee presents its report to the media CCIS has received strong interdisciplinary political support, including the direct and explicit support of several parliamentary committees and parliament s documents. The White Paper 207 S, ( ), from the Special Committee report to the Minister of Justice and Minister of Defence from the Parliament s meeting held on 10 November 2011, concerning the attacks 22 July, explicitly and unanimously recommends that the Centre receives support. (Chapter15, page15): The Committee welcomes the establishment of the centre and believes that the government should assess how the centre can be supported to develop its work. The White Paper 29 ( ) on societal security has a separate section on the centre s initiative and describes a comprehensive task force that has been set up to consider further actions (Chapter 9, page 107). The Justice Committee decided to emphasise this in its report. Recommendation of the Justice Committee on terror preparedness (NOU 2012:14 Follow up Report of 22 July Commission) emphasises the importance of establishing Norwegian expertise in information security: Especially the work carried out at GUC is of interest, points out the Committee in White Paper 207 S. The Government supports the centre with 5 million NOK in 2014, from the Ministry of Justice and Public Security and the Ministry of Local Governments and Modernisation. 18

19 6 REASONS WHY THE CENTER IS IMPORTANT The centre is important because an increasing amount of criminal activities are dependent on information and communication technologies (ICT). Crime, whether it takes place in cyberspace alone or not, most likely leave digital traces. At the same time it is a challenge to find, understand, assemble and secure such evidence in a way that it safeguard individual rights and forensic correctness. The centre is important because the threat landscape changes. The increased mobility and open borders, climate change, increased unemployment and social pressures in Europe, resource scarcity, terrorism, pandemics and resistant infections, and Norway s participation in international military operations all help to increase the possibility of criminal acts, attacks and terrorism against Norwegians, Norwegian infrastructure and interests. The centre is important because orivacy and security, two central citizen rights, are under pressure and need good technological, legal and societal understanding and research 4 5 The centre is important because education, skills and research in cyber- and information security will help to combat increasing threats, vulnerabilities and offence in the cyberspace. The centre is important because there is a need for extensive international cooperation and long-term research to prepare for tomorrow s challenges. 6 The centre is important because there is a need to educate and train new experts and to develop skills within the Norwegian central institutions, at the bachelor, master and PhD levels. 19

20 Legal aspects of information security Wireless Security Security by Design Financial Crime Investigation Data Hiding Computational Forensics Image and Video Analysis Risk Management Security Administration Authentication Cryptology Web Security Privacy-Enhancing Technologies Digital Forensics Information Warfare Protection of Critical Infrastructure Big Data Forensics yber Defense Ethical Hacking Cloud Security Biometrics Mobile Security Network Security Information Management Media Security Socio-technical Systems Security Incidence Management Malware and Botnet Detection Intrusion detection Malware and Botnet Detection and prevention Usability for Security Information Warfare Every aspect of the challenge Cyber- and Information Security is a discipline that must be understood in its full dimension, technological, psychological, social, economic, and organizational aspects interact and influence the outcome. Therefore, the centre promotes an exchange of knowledge and competence not only among academia and the applications areas, sectors, agencies and Institutions, but also among the different fields in cyber- and information security. Thus, CCIS academic degrees at bachelor, master and PhD level are specifically dedicated to information and cyber security. This is in contrast with how informations ecurity is taught most other universities, as some courses in a computer science degree. 20

21 The Center for Cyber- and Information Security (CCIS) is not only a research centre. It establishes competence transfer across agencies, companies and sectors. It facilitates research projects that connects industry and government agencies with international research networks. It connects research with study programmes and students to research, linking operational environments to academic study programmes and research. CCIS connects research, applications and study programmes with communication and dissemination capabilities. APPLICATIONS EDUCATION Center for Cyber and Information Security CCIS TRAINING RESEARCH DISSEMINATION 21

22 CCIS delivers, through its core partners, a number of Bachelor programs in information security, network management and computer science, as well as a BSc in Telematics at the Norwegian Defence Cyber Academy (FIH), also known as the education of the military s cyber warriors. PhD in Information Security PhD in Computer Science Master in Information Security CCIS also delivers a MSc program in information security with three study tracks, information security management, forensics, and security technologies. The centre is also delivering a flexible, experience-based master with a a study track in the investigation of digital evidence and cyber crime, a collaboration between the CCIS paetners the Police University College (PHS) and GUC. CCIS dedicated information security programs cover the full scope of cyber and information security. In addition, the centre has a number of associated computer science programs at all levels with security-oriented activities, including security applications of image and video processing, games and mobile computing technologies. The Centre s PhD program in cyber- and information security will have 15 PhD students at start up in 2014 and 25 students two years later. In addition, the centre will have a number of associated PhD students in computer security research. Master in Cyber Crime Investigation Master in Applied Computer Science Bachelor in Network Management Bachelor in Information Security Bachelor in Telematics Bachelor in Software Development Bachelor in Computer Engineering One year program in Information Security One year program in Software Development The centre provides flexible courses, training packages, corporate courses, and lectures. collaboration with the Norwegian Centre for Information Security (NorSIS). 22 Courses & training packages Conferences, workshops, seminars

23 PhD i informatikk 12 Study programmes 7 Study programmes dedicated to information security, cyber security, cyber defence and cybercrime, with: 20 PhD students 80 Master students 240 Bachelor students Center for Cyber- and Information Security CCIS Gjøvik University College Police University College Norwegian Defence Cyber Academy NorSIS 23

24 National Academic Network Core research partners in CCIS includes Gjøvik University College, the Police University College, the Norwegian Defence Cyber Academy, and the Norwegian Defence Research Establishment. CCIS is developing substantial collaboration between these, on research, degree programmes, research network development, and international training programs. Each academic partner has quite different international networks, giving a strog potential for innovative international collaborations and research projects.. CCIS leads the Norwegian Research School of Computer and Information Security (COINS). COINS integrates Norwegian research groups in Information Security to a larger entity by integrating the course portfolio for research school members, builds stronger relationships between doctoral students in the network, establishes more incentives to excel and increases student mobility through access to a larger network. COINS also increases Norway s international student mobility, hosts internationally recognised researchers, and offers free flow of goods and services in Information Security Research in Norway. At any time, 40 PhD students are members of COINS. COINS provides a significant added value to PhD students at CCIS, while CCIS provides COINS with a strong national and international network, including businesses, end users, and security agencies. 24

25 PhD i informatikk Norwegian University of Science and Technology - NTNU University of Agder University of Stavanger University of Tromsø University of Bergen COINS: National Research School of Computer and Information Security University of Oslo Gjøvik University College Police University College Norwegian Defence Cyber Academy CCIS: Center for Cyber- and Information Security Lillehammer University College 25

26 Research Groups The centre covers all major areas of information and cyber security. Multidisciplinary expertise is assembled in research groups and labs to address specific application areas. Testimon Forensics Research Group Mot crime today leaves digital evidence. The Testimon group develops new insight into digital evidence, computational forensics and various aspects of cyber crime. The group draws its core members from NISlab and the Electronics group at Gjøvik University College (GUC), the Police University College (PHS), the National Criminal Investigation Unti (Kripos), the National Economic Crime Unit (Økokrim), the ICT Crime Unit at the Oslo Police Department. and the National Securitya Authorities (NSM) The research group operates the forensics track of GUC s MSc in Information Security and the computer crime track of the experience-based MSc which is a collaboration between PHS and GUC. The Norwegian Biometrics Laboratory The Lab s research in physiological and behavioral biometrics includes 2D- and 3D-face recognition, fingerprint recognition, fingervein recognition, dental biometrics, ear recognition, signature recognition, gait recognition, keystroke recognition, gesture recognition and mouse dynamics. The lab also develops privacy enhancing technologies such as biometric template protection and integration in physical and logical access control. The lab has extensive biometric databases iand s an independent testing institution for biometric performance evaluations. The Biometrics lab is an active member in the European Association for Biometrics and co-organizer of the international conference BIOSIG as well as the Biometric Session of IEEE IIH-MSP. Its core members come from GUC and from the National ID Centre. The laboratory has partner organisations in nine different countries. The Information Security Management Group In a deeply digitized connected world, cyber- and information security threats cannot be seen from a technical point of view only. The Information Security Management Group develops cyber security models from socio-technical positions, which include social, legal, cultural, financial, political, and ethical aspects of security. The group has a special responsibility for the informations ecurity mangement track at the MSc in Information Security. Critical Information Infrastructure Protection Group The group is concerned with long-term research into the cyber security of industrial control systems / SCADA systems, distribution systems, monitoring systems, and real-time protocols. The group is also concerned with cyber security of the Internet of Things, which also includes cyber security of internet connected consumer objects. The core members come from GUC, Statkraft, Statnett, the National Security Authority (NSM) and Eidsiva. Norwegian Cyber Defence Research Group The research group specializes in various aspects of national cyber. It draws its members from the Norwegian Cyber Defence, GUC, the Norwegian Defence Research Establishment (FFI) and the Norwegian Defence Cyber Academy (FIH). The group contributes to the BSc, MSc and PhD programs in information security at GUC and FIH s BSc in telematics, known as the cyber warrior education. Other research groups will be established, including information security in the health sector, product and software security and cyber security Innovation. 26

27 Critical Information Infrastructure Protection Group The Norwegian Biometrics Laboratory Senter for cyber- og informasjonssikkerhet CCIS Information Security Management Group Norwegian Cyber Defence Research Group Testimon Forensics Resrearch Group 27

28 Associated Groups and Organizations The Media Technology Laboratory (MTL) CCIS shares offices with the Media Technology Lab. MTL delivers research and study programs (on BSc, MSc and PhD level) in various areas of computer science. Of particular interest to CCIS is its research in mobile security, biometric methods, user design for security and safety applications of augmented reality, mobile phones, tablets, game consoles, digital interfaces and visors (e.g. Google glasses). MTL s Colour and Vision Research Laboratory works in security with applications such as video analysis of gait recognition and the design of counterfeit-resistant bank notes. NorSIS CCIS will share offices with the Norwegian Centre for Information Security (NorSIS). NorSIS is part of the Norwegian Government s overall commitment to information security and reports to the Ministry of Justice and Public Security. NorSIS works to ensure that information security becomes a natural part of every day s life of citizens and businesses through raising awareness about threats and vulnerabilities and informing on security measures, NorSIS operates the online service slettmeg.no and the national identity theft project. With NorSIS, CCIS gets a partner highly experienced in communication, with an excellent network of SMEs, Norwegian municipalities and governmental agencies. NorSIS and CCIS will collaborate on media management, marketing resources, research dissemination, conferences and workshops. CCIS and NorSIS will in collaboration continue to deliver the Top Level Security Meeting which brings together security chief executives for discussions under Chatham House Rule. Electro Section CCIS shares campus with the Section of Electronics at GUC. In particular, the Electro Section supports CCIS in a number of security areas, including investigations of electronic equipment in criminal cases, electronic implementations of biometrics methods, combination of biometrics, Near Field Communication and mobile phones, and random number generation in programmable logic. The Electro Section has several associate professors wit PhD degrees in information security. Health Care and Nursing CCIS shares campus location at GUC with the Faculty of Health Care and Nursing, which develops expertise in patient safety and security, including information security in the health sector. FRISC CCIS works in close collaboration with the Forum for Research and Innovation in Security and Communications (FRISC), a value network supported by the Norwegian Research Council. The mission of FRISC is to create meeting places for research and innovation in information security where information sharing and the value-added utilization of results can happen with an international perspective. 28

29 Electro Section Critical Information Infrastructure Protection Group The Norwegian Biometrics Laboratory NorSIS Norwegian Centre for Information Security Senter for cyber- og informasjonssikkerhet CCIS Information Security Management Group Health Care Media Technology Laboratory Norwegian Cyber Defence Research Group COINS Research School Testimon Forensics Resrearch Group FRISC Forum for Research & Innovation in Security and Communications 29

30 CCIS Scientists who 50% presence at CCIS Developing cross-sectoral projects Developing curricula Identifying student resources Developing research networks Attracting team members Partner-funded researchers develop the collaboration between CCIS, its partners and networks and the funding partner organisation. Partner researchers have the responsibility to help recruiting talented students for partner institutions, influence the development of degree programs in a direction that best supports the partner institution s needs, and connect partner organization to the Centre s other partners and to international networks. 30

31 build bridges THE PARTNER INSTITUTION 50% presence at the partner institution Identifying skills and competence needs Identifying potential projects Mobilizing the partner s professional network Attracting team participants Partner researchers will support the partner institutions in their long term strategic development, and are responsible for identifying their needs for competence development and research. Partner researchers recruit resources and networks to CCIS projects. 31

32 A partner researcher shall draw on resources at the partner insitituion and CCIS to develop a team that will contribute to activities and projects that will further the objectives of the partner and CCIS in the particular focus areas of the partner. Team members comes from the partner institution, as well as doctoral candidates, researchers, PhD students, master students, bachelor students and experts, at CCIS and among CCIS partners and their networks. The partner researcher is expected to spend some time doing fundraising and write proposals to finance the team. Researchers wh PhD-student Guest researcher Associate professor Professor Post-Doc candidate 32

33 o build teams CCIS emphasizes good collaboration in an excellent research environment, where social challenges, professional dialogue, and cooperation are central. CCIS focus on eminent research and professional development that connect partner organizations, engineers, security experts, leading expertise and top scholars. It also closely connects applied research, teaching and real world informations security experience and needs. This calls for a good organization that include research groups, focus laboratories, professional groups, and a good cooperation rhytm. PhD-student Master student Domain Expert from partner organization Technician 33

34 MORE REASONS WHY CCIS IS IMPORTANT CCIS is important because society as a whole and its critical infrastructure have become completely dependent on ICT, and therefore dependent on ICT security - from command and control systems, financial structures, food production, food distribution, banking, payroll and electricity distribution to hospital management, and transportation. CCIS is important because the consequences of security breaches have become very high. CCIS is important because inadequate information security costs society large amounts of financial resources. The global cost of cyber crime is estimated to be between 0.4% and 1.4% of global GDP. CCIS is important because an arena for knowledge exchange across information security actors, including defence, law enforcement, police, administration, finance, and business, is necessary for developing effective security capacity. CCIS is important because effective information security measures rely on understanding the security interdepence of technological, economical, legal and political measures. CCIS is important because information security actors, including security agencies and businesses, have much to gain from collaborating with long-term research, while research has much to gain from learning from the so-called real world. CCIS is important because security has become a necessary part of products and services. Insufficient security can drive products and firms off the market. High cyber security gives manufacturing companies higher uptimes, shorter delivery times and improved margins. CCIS is important because information security in itself is a large global market, both for products and services. CCIS is important because it will give its participants, who have significant national importance, increased cyber- and information security competence. CCIS is important because it will increase the number of students in information security at all levels. 34

35 The Center for Cyber- and Information Security (CCIS) works continually to obtain additional financing for projects and research groups and laboratories. Delivery 2 years CCIS will have -established a research group on cyber crime -established a research group on cyber defence -established a research group on cyber security of critical infrastructure -strengthened and integrated degree programs in information seurity -started an experiencebased master s program on cyber crime investigation -established the presence of 25 PhD students at the centre and 64 associated via COINS, two post-doctoral candidates, 40 master students and 240 undergraduates 4 years CCIS will have -become a strong support for the Norwegian authorities in their national and international work on cyber security -established a research group in privacy and cyber aspects of rule of law - establsihed anordic Centre of Expertise in Cyber Crime Prevention and Investigation -recruited 30 PhD students at the Centre and with 90 associated via COINS, and 10 postdoctoral candidates -recuited 25 partners 8 years CCIS will have -been on track to eliminate society s critical shortage of experts -led the Norwegian research in cyber security from being fragmented into being a national consolidation of meeting space for the dissemination of research and innovation -established a centre for cyber security innovation to help industry partners turn the results from CCIS into commercially successful products and services 35

36 2014 Center for Cyber and Information Security Contact information: Morten Irgens, Chair of the interim board Nils Kalstad Svendsen, the Norwegian Information Security Laboratory (NISlab), Thank you for your interest. CCIS is a resource for its partners and collaborators. Your comments and ideas on how CCIS can be made even better will be most appreciated. CCIS invites your organisation to participate as partner. 36

Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL http://www.ansatt.hig.no/s uley/

Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL http://www.ansatt.hig.no/s uley/ Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL http://www.ansatt.hig.no/s uley/ COST Action: IC1206 Tecnocampus Mataro Maresme, Mataro, Spain 25-11-2013 to 26-11-2013 Gjøvik University College

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Thank you for your very kind introduction.

Thank you for your very kind introduction. AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research

Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 5-11 5 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

The Danish Cyber and Information Security Strategy

The Danish Cyber and Information Security Strategy February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

2. Cyber security research in the Netherlands

2. Cyber security research in the Netherlands 2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed

More information

Cybersecurity. Canisius College

Cybersecurity. Canisius College Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018

Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Summary in English of the Icelandic National Cyber Security Strategy approved by the Minister of the Interior in April 2015

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV [email protected] @ratchevv DCAF/CSDM 1 This presentation

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For

More information

Ministry of Defence Bosnia and Herzegovina

Ministry of Defence Bosnia and Herzegovina Centre for Security Cooperation Military Academy "General Mihailo Apostolski"-Skopje Ministry of Defence Bosnia and Herzegovina Ministry of Foreign Affairs Bosnia and Herzegovina Ministry of Security Bosnia

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Police Academy in Szczytno

Police Academy in Szczytno Police Academy in Szczytno Szczytno is situated in Warmia and Mazury Province, 50 km away from Olsztyn, which is the capital of the region. The town and its surroundings are famous for the characteristic

More information

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration

CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration PROGRAMME 14 April 2015 13.00 14.00 Lunch / Delegates Registration 14.00 14.10 Opening and Keynote by Panel Chair Getting Ahead of the Threat: Building Cybersecurity Dr Madan Oberoi Director, Cyber Innovation

More information

Cyber security trends & strategy for business (digital?)

Cyber security trends & strategy for business (digital?) Cyber security trends & strategy for business (digital?) Presentation by Anwer Yusoff Head, Industry & Business Development C y b e r S e c u r i t y M a l a y s i a NATIONAL CYBERSECURITY TECHNICAL SPECIALIST

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

the Council of Councils initiative

the Council of Councils initiative Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global

More information

How To Get A Security Degree In Australia

How To Get A Security Degree In Australia Security and intelligence postgraduate 2015 INNOVATIVE AND CUTTING-EDGE PROFESSIONAL DEGREES THAT COMBINE THEORY WITH POLICY AND PRACTICE IN COUNTER TERRORISM, INTELLIGENCE, SECURITY AND STRATEGIC POLICING.

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

Action Plan 2010-2015 for Canada s Cyber Security Strategy

Action Plan 2010-2015 for Canada s Cyber Security Strategy Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents CRS Reports & Analysis Print Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist ([email protected], 7-6739) View Key CRS Policy Staff May

More information

Australian Government Cyber Security Review

Australian Government Cyber Security Review Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

Douglas M. DePeppe Cyberlaw Attorney

Douglas M. DePeppe Cyberlaw Attorney Douglas M. DePeppe Cyberlaw Attorney [email protected] Cyber Risk Services Cyber Space Cyber Law International Cyber Frameworks IP Litigation George Washington University Law School, LL.M. The Judge Advocate

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

FINAL // FOR OFFICIAL USE ONLY. William Noonan

FINAL // FOR OFFICIAL USE ONLY. William Noonan FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States

More information

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY Juan Cayón Peña, PhD. & Luis Armando García Abstract: The implementation, maintenance, and improvement of a national Cyber defense strategy

More information

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS Due to the authority vested in the European Centre for Information Policy and Security (ECIPS) Decree / Statute

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative [email protected] (302) 831 1580

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative [email protected] (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

Forensics in Nuclear Security. by the Netherlands Forensic Institute

Forensics in Nuclear Security. by the Netherlands Forensic Institute Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism In an age when the threat of terrorist violence appears more immediate and more extreme than

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK 1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

Peace and Justice in Cyberspace

Peace and Justice in Cyberspace Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime

More information

Minister Shatter presents Presidency priorities in the JHA area to European Parliament

Minister Shatter presents Presidency priorities in the JHA area to European Parliament Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

The Netherlands Forensic Institute. Strengthening the rule of law together

The Netherlands Forensic Institute. Strengthening the rule of law together The Netherlands Forensic Institute Strengthening the rule of law together The Netherlands Forensic Institute The Netherlands Forensic Institute (NFI) is one of the world s leading forensic laboratories.

More information

DHS. CMSI Webinar Series

DHS. CMSI Webinar Series DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and

More information

NEW ZEALAND S CYBER SECURITY STRATEGY

NEW ZEALAND S CYBER SECURITY STRATEGY Appendix 1 NEW ZEALAND S CYBER SECURITY STRATEGY June 2011 New Zealand Government 7 June 2011 ISBN: 978-0-478-38200-6 www.med.govt.nz/cyberstrategy MED11 Foreword from the Minister The Internet and digital

More information

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the

More information

While interagency education and training have long been staples of the intelligence and

While interagency education and training have long been staples of the intelligence and Navigating Interagency Education and Training Courses by John Dyson While interagency education and training have long been staples of the intelligence and law enforcement communities, such efforts are

More information

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute NFI Academy Welcome to the NFI Academy Key to the expertise of The Netherlands Forensic Institute In the context

More information

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,

More information

Public Private Partnerships and National Input to International Cyber Security

Public Private Partnerships and National Input to International Cyber Security Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,

More information