The role of CyberSecurity Malaysia towards cyber security industry development in Malaysia
|
|
|
- Irma Miles
- 10 years ago
- Views:
Transcription
1 The role of CyberSecurity Malaysia towards cyber security industry development in Malaysia Presentation by Dr. Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia NATIONAL CYBERSECURITY TECHNICAL SPECIALIST AGENCY 9 th June
2 OUTLINE Global & Malaysia Cyber Security Landscape Driving Nation s Sovereignty & Economy Through Cyber Security National Cyber Security Policy (NCSP) Cybersecurity Malaysia (CSM) Our Initiatives To Spur Cyber Security Industry In Malaysia Way Forward 2
3 The World Today is HIGHLY CONNECTED 2,749 million * Digital citizens worldwide (ITU 2013) 5 billion in 2015 (Nokia Siemen) 46% 19.2 mil Digital citizens in Malaysia (Malaysia Communication and Multimedia Commission 2013) 1,269 million * Digital citizens in Asia & Pacific (ITU 2013) 3
4 The World Today is HIGHLY CONNECTED 2,405,518,376 Digital citizens worldwide (as of June 2012) Digital citizens in Malaysia Source: The Star Newspaper 17 November % 17,723,000 1,076,681,059 Digital citizens in Asia 4
5 Trends of Computing Technology Is Double-Edged Weapon Mobile Devices Big Data Internet of Things 5
6 TREND OF MALAYSIA CYBER SECURITY THREATS IN 2015 CYBER SPACE 4,581 Reported Case on General Incident Classification CYBER HARASSMENT 889,469 Reported Case of Malware & Botnet Drones Infection Info: 156,357 Reported Spam s FRAUD! 6
7 Cyber Security Incidents ( ) Managed more than 66,000 incidents 16,000 14,000 12,000 10,000 8,000 6,000 Type of incidents: 1. Intrusion 2. Intrusion Attempt 3. Denial of Service Attack (DOS) 4. Fraud 5. Cyber Harassment 6. Spam 7. Content Related 8. Vulnerabilities Report 9. Malicious Codes 8,090 15,218 9,986 As of 31 st May ,000 2, , Number of cyber security incidents referred to CyberSecurity Malaysia (excluding spams) 1,038 2,123 3,566 7
8 ISSUES & CHALLENGES - Malaysia Ranked 9th In Malware Attacks Top 15 countries with highest numbers of users attacked between April 2013 and July Malaysia: 1.97% out of 3,408,112 malware attacks Source: Mobile Cyber Threats. Kaspersky Lab & INTERPOL Joint Report, October
9 ISSUES & CHALLENGES - Online Banking Malware Attacks Source: TREND MICRO TrendLabs 2Q 2014 Security Roundup 9
10 OUTLINE Global & Malaysia Cyber Security Landscape Driving Nation s Sovereignty & Economy Through Cyber Security National Cyber Security Policy (NCSP) Cybersecurity Malaysia (CSM) Our Initiatives To Spur Cyber Security Industry In Malaysia Way Forward 10
11 Cyber security drives the security and economy of a nation America's economic prosperity in the 21st century will depend on cybersecurity Cyberspace, and the technologies that enable it, allow people of every nationality, race, faith, and point of view to communicate, cooperate, and prosper like never before. President Obama, May
12 Our aspiration to enhance the nation s standard compliance to improve cyber security, privacy and spur the growth of the industry VISION2020 High Inco me NCSP (National Cyber Security Policy) Preservation and Enhancement of Unity in Diversity 1Malaysia People First, Performance Now Towards Digital Economy Effective Delivery of Government services Government Transformation Programme (GTP) 6 National Key Result Areas (NKRAs) Cyber Security & Economic Innovation are mutually reinforcing Inclusiven ess Rakyat Quality of Life Sustainabi lity New Economic Model: A high Income, inclusive and sustainable nation Economic Transformation Programme (ETP) A High Income, Inclusive and Sustainable Nation Cyber Space as Key Enabler Smooth Implementation of government development programme 10 th & 11 TH Malaysia Plan Macroeconomic growth targets & expenditure allocation Cyber Security as a New Source of Growth NCSP is a Government policy To Protect the Critical National Information Infrastructure (CNII) Strengthens CNII resiliency & enable GTP to run smoothly Revolution of IT & threats created cyber security as New Source of Growth Contributing approximately RM8.8 Billion revenue and highest export amongst IT sector mounting to high income jobs
13 Malaysia: Cybersecurity as new source of economic growth 13
14 Cybersecurity Industry in Malaysia has potential to grow to RM 8.8 bil by 2020 The cyber security market is estimated to grow from $95.60 billion in 2014 to $ billion by 2019, at a Compound Annual Growth Rate (CAGR) of 10.3% from 2014 to Embracing and implementing cybersecurity standards and best practices will catalyst further adoption of IT technology to enable Malaysia to be a high technology nation. Malaysia already has a good international cybersecurity credibility, but have yet to fully capitalize on business opportunities. Strengthening the capability and innovation in cybersecurity industry has the potential to spill over to other ICT areas e.g. software, networking, service industry, e-commerce. The report Cyber Security Market (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SVM/SIEM, Disaster Recovery, DDoS Mitigation, Web Filtering, Security Services) - Global Advancements, Forecasts & Analysis ( ), defines and segments the global cyber security market into various sub-segments with in-depth analysis and forecast of revenues. It also identifies drivers and restraints for this market with insights into trends, opportunities, and challenges. 14
15 What steps have been taken by the Malaysian Government to keep cyber threats under control? One of the most important step is creating : National Cyber Security Policy (NCSP) Establishing CyberSecurity Malaysia to implement NCSP
16 OUTLINE Global & Malaysia Cyber Security Landscape Driving Nation s Sovereignty & Economy Through Cyber Security National Cyber Security Policy (NCSP) Cybersecurity Malaysia (CSM) Our Initiatives To Spur Cyber Security Industry In Malaysia Way Forward 16
17 THE NATIONAL CYBER SECURITY POLICY (NCSP) - Objective 2007 NCSP Objectives 2005 National Cyber Security Policy formulated by MOSTI 2006 NCSP Adoption and Implementation CyberSecurity Malaysia launched by Prime Minister of Malaysia on 20 Aug 2007 Malaysia s Ministry of Science, Technology & Innovation (MOSTI) carried out the study on the National Cyber Security Policy (NCSP) in 2005 National IT Council (NITC) Meeting on 7 Apr 2006 agreed to implement NCSP and establishment of the Malaysia Cyber Security Centre to administer NCSP. NCSP was endorsed by the Cabinet in May CyberSecurity Malaysia launched by Prime Minister of Malaysia on 20 Aug 2007 The policy recognises the critical and highly interdependent nature of the CNII and aims to develop and establish a comprehensive programme and a series of frameworks that will ensure the effectiveness of cyber security controls over vital assets Address The Risks To The Critical National Information Infrastructure Ensure That Critical Infrastructure Are Protected To A Level That Is Commensurate With The Risks Develop And Establish A Comprehensive Program And A Series Of Frameworks 17
18 NATIONAL CYBER SECURITY POLICY VISION Malaysia's Critical National Information Infrastructure shall be secure, resilient and self reliant. Infused with a culture of security, it will promote stability, social well being and wealth creation. T1 NSC Effective Governance Establishment of a national info security coordination centre, effective institutional arrangements & Public Private Cooperation T5 MOSTI R & D Towards Self Reliance Acceptance & utilization of locally developed info security products NCSP THRUST AGC Legislation & Regulatory Framework Reduction of cybercrime & increased success in the prosecution in cyber crime T3 MOSTI Cyber Security Technology Framework Expansion of national certification scheme for InfoSec management & assurance T2 MICC Compliance & Enforcement Strengthen or include infosec enforcement role in all CNII regulators T7 T6 NSC Cyber Security Emergency Readiness CNII resilience against cyber crime, terrorism, info warfare MOSTI Culture Of Security & Capacity Building Reduced no. of InfoSec incidents through improved awareness & skill level T4 MICC International Cooperation International cooperation & branding on CNII protection with improved awareness & skill level T8 CNII Assets (real & virtual), systems and functions that are vital to the nation that their incapacity or destruction would have a devastating impact on: National Defense & Security National Economic Strength National Image Government capability to function Public Health & Safety CNII SECTOR Defence & Security Transportation Banking & Finance Government Information & Communications Energy Emergency Services Water Food & Agriculture Health Services
19 OUTLINE Global & Malaysia Cyber Security Landscape Driving Nation s Sovereignty & Economy Through Cyber Security National Cyber Security Policy (NCSP) Cybersecurity Malaysia (CSM) Our Initiatives To Spur Cyber Security Industry In Malaysia Way Forward 19
20 CyberSecurity Malaysia HISTORY 20 Aug 2007 Officially launched by Prime Minister of Malaysia 2007 Official Registration CyberSecurity Malaysia 2006 Transition phase: NISER CyberSecurity Malaysia 2001 NISER (National ICT Security & Emergency Response Centre) 1997 MyCERT (Malaysian Computer Emergency Response Team) Core functions 1997 MyCERT 2001 NISER 2007 CyberSecurity Malaysia 1. National Cyber Security Policy Implementer 2.National Technical Coordination Centre 3.Cyber Threat Research & Risk Centre 4.Security Quality Management Services Provider 5.Information Security Professional Devt & Outreach 6.Cyber Emergency Services Provider 7.Malaysia s Computer Emergency Response Team 20
21 CyberSecurity Malaysia OBJECTIVES & MANDATE A NATIONAL CYBER SECURITY SPECIALIST AGENCY UNDER THE MINISTRY OF SCIENCE, TECHNOLOGY AND INNOVATION Vision To be a globally recognized National Cyber Security Reference and Specialist Centre by 2020 Mission Creating and Sustaining a Safer Cyberspace to Promote National Sustainability, Social Well-Being and Wealth Creation MANDATE Cabinet Notes 2005 Ministry of Finance and Ministry of Science, Technology & Innovation CyberSecurity Malaysia as a National Body to monitor aspects of the National e- Security Ministerial Function Act1969, Amendment 2013 Provides specialised ICT security services and continuously identifies possible areas that may be detrimental to national security Arahan No. 24 Dasar dan Mekanisme Pengurusan Krisis Siber Negara Majlis Keselamatan Negara 2011 Peranan agensi pakar klausa 16 mukasurat CyberSecurity Malaysia sebagai agensi pakar hendaklah memberi sokongan dan bantuan teknikal serta menyediakan perkhidmatan latihan dalam pengurusan krisis siber negara 21
22 Strategy Roadmap MISSION To create and sustain a safer cyberspace to promote National Sustainability, Social Well-Being and Wealth Creation VISION To be a globally recognised National Cyber Security Reference and Specialist Centre by 2020 Preliminary Phase [RMK 8] Phase I [RMK 9] Phase II [RMK 10] Phase III [RMK 11] Development of nation s cybersecurity foundation Addressing Immediate Concerns & Building Infrastructure Capability & Capacity Spearheading National Info Security Resiliency & Self Reliance Globally Recognized, National Cyber Security Reference & Specialist Centre 22
23 CyberSecurity Malaysia CORE SERVICES CYBER SECURITY STRATEGIC ENGAGEMENT & RESEARCH Strategic Engagement Research CYBER SECURITY EMERGENCY SERVICES Security Incident Handling Digital Forensics INFO SECURITY PROFESSIONAL DEVELOPMENT & OUTREACH Info Security Professional Development Outreach SECURITY QUALITY MANAGEMENT SERVICES & INDUSTRY DEVELOPMENT Security Assurance (MyVAC & MySEF) Information Security Certification MyCyberClinic & EDP CSM-ACE 23
24 OUTLINE Global & Malaysia Cyber Security Landscape Driving Nation s Sovereignty & Economy Through Cyber Security National Cyber Security Policy (NCSP) Cybersecurity Malaysia (CSM) Our Initiatives To Spur Cyber Security Industry In Malaysia Way Forward 24
25 Info Security Professional Development CAPACITY BUILDING Man behind the machine is THE critical factor Develops curriculum in cyber security for colleges, polytechnics and universities to build expertise in cyber security with MOE Provides competency and professional training programmes Collaboration between CyberSecurity Malaysia and Institute of Higher Learning (IHL) in various comprehensive cyber security modules Information Security Professionals Help nurture the information security workforce with the required knowledge and skills by providing information security competency and capability courses and certifications. Strategic collaborations with reputable organizations in Malaysia and international accreditation institutions 25
26 Security Quality Management Services SECURITY ASSURANCE ASSESSMENT & EVALUATION ICT Product Security Assessment (IPSA) Services Vulnerability Assessment Services Common Criteria (CC) Evaluation Services for ICT Products and Protection Profiles Vulnerability Assessment Services Conduct the following services for Critical National Information Infrastructure (CNIIs) : Vulnerability Assessment & Penetration Testing (VAPT) for Vulnerability Assessment for Control Systems (SCADA/DCS) to CNII Inspectorate reporting services * Trustmark Technical Security Assessment services Common Criteria Protection Profile evaluation services provides customers with validated security requirements to support selection and procurement of ICT products. MySEF lab is MS ISO/IEC accredited. 26
27 Cyber Security Certification CYBER SECURITY CERTIFICATION Security Product Certification E-Business Validation Information Security Management System Certification 41 products certified 28 websites certified 21 organizations certified Evaluate and certify the security functions of ICT products based on ISO/IEC international standard also known as Common Criteria. Using the guidelines from the World Trustmark Alliance (WTA) to validate the e-business website security, legality and good e-business behaviour under the Malaysia Trustmark for Private Sector (MTPS) programme. Certify organization s Information Security Management System scope based on the MS ISO/IEC
28 Entrepreneurship Development Program Cyber CSI ICT Services Training & Awareness DATA RECOVERY DATA SANITIZATION DIGITAL FORENSIC SERVICES PC DIAGNOSTIC SOFTWARE & HARDWARE CONSULTANCIES PROFESSIONAL CERTIFICATION & OUTREACH PROGRAMS O BJ C E T I V E S Provide an avenue for people to obtain assistance and to resolve issues from a trusted service provider at competitive cost Provide an avenue for building up entrepreneurs & creation of jobs through partnership with the industry in running the clinics 28
29 CyberSecurity Malaysia Awards, Conference & Exhibition 2015 CSM-ACE
30 INTERNATIONALIZATION OF CYBER SECURITY SERVICES in Malaysia s relevant cyber interests at opportunities at security meetings international cyber international cyber and events to security platforms security platforms promote Malaysia s and act on where Malaysia can ENGAGEParticipate positions and elements where vie for positions to interests in the said Malaysia can get play a leadership meetings and PRIORITIZEEvaluate tangible benefits role to project events LEADERSHIPExplore Malaysia s image and voice on third world interests and promote Malaysia s interests APCERT 30
31 OUTLINE Global & Malaysia Cyber Security Landscape Driving Nation s Sovereignty & Economy Through Cyber Security National Cyber Security Policy (NCSP) Cybersecurity Malaysia (CSM) Our Initiatives To Spur Cyber Security Industry In Malaysia Way Forward 31
32 1. ISMS Certification to preserve confidentiality, integrity and availability of information assets 2. Malaysia Trustmark for secure e-business websites 3. ICT products evaluation and certification under the Common Criteria ISO/IEC
33 AND to minimise risks 1. Rethink approach to IT security Proactive senior management involvement IT security = business enabler, not infrastructure cost Align IT security strategy to corporate risk management objectives 2. Update security policies Organisations need to handle new trends like BYOD and cloud etc 3. Adopt intelligent multi-layer defence Application security is important in a Web-centric world 4. Maintain up-to-date systems (e.g. patches) 5. Educate users on security best practices 33
34 34
Cyber security trends & strategy for business (digital?)
Cyber security trends & strategy for business (digital?) Presentation by Anwer Yusoff Head, Industry & Business Development C y b e r S e c u r i t y M a l a y s i a NATIONAL CYBERSECURITY TECHNICAL SPECIALIST
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For
Making our Cyber Space Safe
Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
MASLINA DAUD CISSP, ISMS Lead Auditor SPACE & CYBER SECURITY NATIONAL SECURITY COUNCIL FOR SEMINAR KESELAMATAN ICT KKM 24 MARCH 2011 PUTRAJAYA
INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS) : MS ISO/IEC 27001:2007 MASLINA DAUD CISSP, ISMS Lead Auditor SPACE & CYBER SECURITY NATIONAL SECURITY COUNCIL FOR SEMINAR KESELAMATAN ICT KKM 24 MARCH 2011
Phone: +44 20 8123 2220 Fax: +44 207 900 3970 [email protected] https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa
Global Cybersecurity Index Good Practices
AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
Cyber security Indian perspective & Collaboration With EU
Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of
Cyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing
Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection. kpmg.com/my
Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection kpmg.com/my 1 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection Contents
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Security Risk Management Strategy in a Mobile and Consumerised World
Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
National Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
CONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
Australian Government Cyber Security Review
Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING
MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING PRESENTER: ROHAIZAD YAAKOB SENIOR ASSISTANT DIRECTOR INTERNATIONAL STUDIES CENTRE MALAYSIA ANTI-CORRUPTION
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
Qatar Computer Emergency Team
Cyber Security Division Qatar Computer Emergency Team An initiative Introduction Qatar aims to fully exploit information and communications technology to become one of the most successful knowledge-based
Cybersecurity Strategy of the Republic of Cyprus
Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
developing your potential Cyber Security Training
developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by
MyCC Scheme Overview SECURITY ASSURANCE. Creating Trust & Confidence. Norhazimah Abdul Malek MyCC Scheme Manager zie@cybersecurity.
An Agency Under MOSTI MyCC Scheme Overview SECURITY ASSURANCE Creating Trust & Confidence Norhazimah Abdul Malek MyCC Scheme Manager [email protected] Copyright 2007 CyberSecurity Malaysia Slide no:
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
An enterprise grade information security & forensic technical team
An enterprise grade information security & forensic technical team 1-647-892-3363 About Us Pyramid Cyber Security & Forensic (P) Limited is an ISO 9001-2008 and ISO 27001-2005 certified boutique Digital
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY
REPUBLIC OF MAURITIUS 5555555555555555555555555555555555555555555555555555555555 5555555555555555555555555555555555555555555555555555555555 NATIONAL CYBER SECURITY STRATEGY 2014-2019 The time has come
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
GOVERNMENT OF THE REPUBLIC OF LITHUANIA
GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For
Infocomm Security Masterplan 2
INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION
1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Physical Security Services
Physical Security Services The ANVIL Group Physical Security Services The ANVIL Group is an internationally renowned and accredited security company specialising in Crisis Avoidance. Established in 1988,
OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME
OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME We believe that everyone from home computer users and small companies, to large corporations and governments has the right to be free from cybersecurity
Report on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
Open Source Incident Management Tool for CSIRTs
An Agency Under MOSTI Open Source Incident Management Tool for CSIRTs Adli Wahid Head, Malaysia CERT (MyCERT) CyberSecurity Malaysia Copyright 2008 CyberSecurity Malaysia Agenda About MyCERT Where do incidents
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
Capabilities for Cybersecurity Resilience
Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority
Cyber Security solutions
Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside
Cyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
PUBLIC DATA AT RISK: CYBER THREATS TO THE NETWORKED GOVERNMENT
PUBLIC DATA AT RISK: CYBER THREATS TO THE NETWORKED GOVERNMENT Ms LIM May-Ann, Managing Director, TRPC Pte Ltd, & Executive Director, Asia Cloud Computing Association (ACCA) [email protected] @eilonwy @accacloud
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation
The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates. Copyright 2010 CyberSecurity Malaysia
Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates Copyright 2010 CyberSecurity Malaysia Agenda 1. Understand Why we need product evaluation and certification ICT
CYBER SECURITY Audit, Test & Compliance
www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit
