INTERNATIONAL TELECOMMUNICATION UNION
|
|
|
- August Alexander
- 10 years ago
- Views:
Transcription
1 INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD English only Original: English Question(s): 4/17 Geneva, February 2009 Ref. : TD 0244 Rev.2 Source: ITU-T SG 17 (Geneva, February 2009) Title: Collaboration in the work on global cybersecurity LIAISON STATEMENT For action to: ITU-T SG 13 Q.16/13; ITU-T SG 16 Q.17/16; ITU-T SG 2; OMA; WSIS; ETSI TC GRID; ETSI TC LI; ETSI TISPAN; ETSI ESI; ISO/IEC JTC 1/SC 27/WG 4; IEEE; IETF; ICANN; OASIS; 3GPP; 3GPP2; OECD; FIRST; CERT/CC; CSIRTs; ASCLAD; HTCIA; CAB Forum; Interpol; CNCERT/CC; Malaysia; Australia; International Organization on Computer Evidence (IOCE); US Dept of State; US GTISC; US Cylab/CERT; US MITRE; Public Safety Canada; ENISA; UK CPNI; UK CESG; France, Ministère de l'intérieur, SGDN; Kapersky Labs; idefense For comment to: For information to: Approval: Agreed to at SG 17 meeting Deadline: 1 June 2009 Contact: Contact Tony Rutkowski Rapporteur, Q.4/17 Arkadiy Kremer Chairman, SG 17 Tel: [email protected] Tel: [email protected] The Telecommunications Standardization Sector of the International Telecommunication Union (ITU-T) at its World Telecommunication Standardization Assembly (WTSA) in late 2008 designated cybersecurity and related infrastructure as a substantial challenge and priority for technical cooperative work for all its constituent nations and the telecommunication/ict industry. WTSA-08 created within Study Group 17 on security, a Question for Cybersecurity designated Q.4/17. At its first meeting since WTSA-08, the Cybersecurity Question adopted a focussed action plan that includes outreach and collaboration with a broad array of organizations that are significant venues in addressing cybersecurity and infrastructure protection. One of the most basic needs is simply identifying and effecting lines of communication among all these organizations. The needs are especially significant for countries that lack the resources to participate in the many forums, yet are part of the global network cybersecurity and vulnerability mosaic. Attention: Some or all of the material attached to this liaison statement may be subject to ITU copyright. In such a case this will be indicated in the individual document. Such a copyright does not prevent the use of the material for its intended purpose, but it prevents the reproduction of all or part of it in a publication without the authorization of ITU.
2 - 2 - Through this liaison communication, we are reaching out to you to be part of this global effort and share aspects about what is occurring in our respective organizations, and collaborating to the extent you have resources and interests in global cybersecurity. We are providing information from our initial action plan and will follow-up with further communications. Over the coming weeks, a reply to this communication is appreciated. Please send your replies to: Mr. Georges Sebek Counsellor for ITU-T SG 17 ITU/TSB Place des Nations CH-1211 Geneva 20 Switzerland Tel: Fax: [email protected] Attachment: 1 Adapted from Q.4/17 (Cybersecurity) action plan
3 - 3 - ATTACHMENT to COM 17-LS 0006 Adapted from Q.4/17 (Cybersecurity) action plan 1 Motivation The cybersecurity landscape is constantly changing. Currently there is a strong need for securing the cyber environment for protocols, infrastructures, applications such as those providing voice, multi-media, information assurance, identity and data services, for conducting business, providing emergency based services, social networking and as the medium for connecting people and services. Cybersecurity involves more than securing the critical infrastructure. It involves securing and protecting services and personally identifiable information, protecting privacy, and providing information assurance (IA) among interacting entities. Cyber attacks have become a widespread, global and borderless problem causing a complex range of problems to users, service providers, operators and networks. Tracing cyber attacks by technical means requires development of framework and requirements for detecting, protecting against, mitigating the effects of and recovering from cyber attacks, and covering important technical issues facing network operators, enterprises, and governments. ITU-T can help to make the cyber-world a safer place by investigating the technologies for tracing cyber attacks. In light of these rapidly emerging developments, it was also considered critical to the World Telecommunication Standardization Assembly held in Johannesburg (October 2008) that Cybersecurity, subject of WTSA-08 Resolution 50 be given high attention given the crucial importance of the information and communication technologies (ICT) infrastructure to practically all forms of social and economic activity. Another WTSA-08 Resolution included facilitation to the newly emerging national Computer Incident Response Teams (CIRTs) recognizing the increasing attacks and threat on ICT networks through computers. These actions also complemented cybersecurity related initiatives undertaken by other ITU organs in the development (ITU-D) and radio (ITU-R) sectors, as well as the General Secretariat. For example, the global nature of the challenges faced in making the information society safer and more secure resulted in discussions and agreements during the World Summit on the Information Society (WSIS) which looked to the ITU to facilitate the coordination of a global response to building confidence and security in the use of ICTs. In response to this role, ITU Secretary-General launched the Global Cybersecurity Agenda (GCA) as a framework for international cooperation with the objectives of leveraging existing initiatives and forging the necessary partnerships and alliances for a coordinated harmonized and global response. Resource constraints Cybersecurity is a broad problem domain, encompassing variety of threats and problem-solving techniques. Ideally, it is hoped to achieve maximum coverage in this domain by delivering a set of standards that cover every kind of threat and problem-solving techniques. It is not realistic however, due to resource constraints in participating organizations. Typical strategy under the resource constraints would be to cover most of threats efficiently by finding a small number of cross-cutting concerns, or attributes. In the past, similar effort in standardization bodies resulted in well-known attributes of confidentiality, integrity, availability and authenticity. Among the proposed new work items, traceability and forensic capability might be new attributes that can be brought into future ICT infrastructure. Threat-based modeling, such as spam, botnet detection and traffic anomaly detection, should also attempt to 1) find cross-cutting concerns among several threats, and 2) reuse the deliverables of
4 - 4 - attribute-based work items; we should avoid duplication of efforts among threat-based work items. For example, some operational aspects of spam and botnet mitigation activities can be addressed by a security information sharing framework, which is a cross-cutting concern. Standardization based on experiences Good international standardization is supported by experiments and operational experiences within one or more member countries. This is particularly important, since there are a large diversity of established practices among countries. According to a variety of global statistics, some countries are ahead of others in overall cybersecurity today. Gap analysis and resource assignment Q.4/17, as part of all its work, should conduct a gap analysis of existing practices and its own agenda. It should be possible to identify a set of cybersecurity practices that significantly improve the measurable state of cybersecurity. The gap analysis will help prioritize a set of work items not only for Q.4/17 work, but also, where applicable, help guide resource assignment within each country. 2 Objectives Serve as the lead Rapporteur group for treating the following questions: a) How should telecommunication network providers secure and protect their infrastructure, maintain secure operations and use security assurance mechanisms in telecommunication networks? b) What are the security requirements that software, telecommunication protocols, communication systems designers and manufacturers need to consider in the design, development and sharing of best practices in the cyber environment? c) How should vulnerabilities information be shared efficiently to aid in vulnerability life-cycle processes? d) What requirements and solutions are needed for telecommunications/ict digital forensics, trace-back, and abnormal traffic detection? e) What framework for security information and security policy sharing is needed? f) What are the necessary guidelines and best practices that should be considered by telecommunication/ict service providers? g) Assist in the elaboration of global standards and procedures for the establishment and coordination of national CIRTs in application of WTSA-08 Resolution 58, Encourage the creation of national computer incident response teams, particularly for developing countries. h) How can networks be used to provide critical services in a secure fashion during national emergency? i) What enhancements to existing Recommendations under review or new Recommendations under development should be adopted to reduce impact on climate changes (e.g., energy savings, reduction of green house gas emissions, implementation of monitoring systems, etc.) either directly or indirectly in telecommunication/ict or in other industries?
5 - 5 - Fig. 1 Global Cybersecurity Ontology 3 Tasks Tasks include, but are not limited to: a) Continue to develop a shared global cybersecurity ontology, building on and evolving Figure 1, above, and evolving related Recommendations, especially ITU-T X This will include a cybersecurity terminology reference recommendation. b) Collaborate with a broad array of identifiable standardization bodies and forums on cybersecurity, including CERTs/CIRTS, using all available technologies, including liaisons, outreach activities, a cybersecurity developments exchange list, a website/wiki for organizations and activities, and a global cybersecurity calendar. c) Assisting in the development of the ITU-D Framework for Organizing a National Approach to Cybersecurity and its five key elements of a national effort, including: 1) Developing a national cybersecurity strategy; 2) Establishing national government-industry collaboration; 3) Creating a national incident management capability; 4) Deterring cybercrime; and 5) Promoting a national culture of cybersecurity. d) Collaborate with Next Generation Networks activities in ITU-T in the areas of Cybersecurity. e) Identify and develop standards required for addressing the challenges in Cybersecurity, within the scope of Q.4/17. f) Work on frameworks for secure network operations to address how telecommunication/ict network providers protect their infrastructure and maintain secure operations. g) Produce a set of Recommendations for providing security solutions for telecommunication/ict forensics and their trusted sharing globally. h) Work on security assurance mechanisms and associated risk assessment and management in telecommunication/ict networks. i) Work on means for the exchange of information in networks in a secure fashion. This includes collaborating with Q.10/17 (Identity management architecture and mechanisms) in their study of authentication assurance, level of trust in the exchanged information, level of trust in authenticated devices and authenticated users. j) Study and specify the techniques and capabilities for network and service providers to coordinate and exchange information regarding network forensics and cyber attacks.
6 - 6 - k) Develop best practices and guidelines for the sharing of vulnerabilities information and updates and patches to aid in the vulnerability life-cycle processes. l) Study and consider how to best use trace-back mechanisms in the telecommunication/ict networks. m) Study and develop the requirements for safe software programs that can effectively deal with rogue programs like spam, virus etc. n) Provision, availability and use of critical services in a secure fashion during national emergencies, especially as it relates to ITU-T X.1303 (CAP). o) Maintain awareness of the implications of regulatory requirements for telecommunications from a cybersecurity perspective, especially those relating to ITU treaty instruments. p) Develop guidelines and techniques for the implementation of trusted provider identities for cybersecurity purposes. q) Protection of personally identifiable information (PII). r) Provide assistance and outreach to other ITU-T study groups and, as appropriate, the cybersecurity community in applying relevant cybersecurity solutions especially in developing countries. s) Review project-oriented security solutions for consistency. 4. Work programme a) Recommendations approved: - ITU-T X.1205, Overview of cybersecurity - ITU-T X.1206, A vendor-neutral framework for automatic notification of security related information and dissemination of updates - ITU-T X.1207, Guidelines for telecommunication service providers for addressing the risk of spyware and potentially unwanted software - ITU-T X.1303, Common alerting protocol (CAP 1.1) b) Recommendations under development: - Draft ITU-T X.abnot, Abnormal traffic detection and control guideline for telecommunication network - Draft ITU-T X.bots, Frameworks for botnet detection and response - Draft ITU-T X.dexf, Digital evidence exchange file format - Draft ITU-T X.gopw, Guideline on preventing malicious code spreading in a data communication network - Draft ITU-T X.gpn, Mechanism and procedure for distributing policies for network security - Draft ITU-T X.sips, Framework for countering cyber attacks in SIP-based services - Draft ITU-T X.sisfreq, Requirements for security information sharing framework - Draft ITU-T X.tb-ucc, Traceback use case and capabilities
Cybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund
Overview of ITU Cybersecurity Activities
Overview of ITU Cybersecurity Activities Workshop on NGN Regulation & Migration Strategies 13 & 15 October 2010 New Delhi, India Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific
PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17 TSB Briefing to the Regional Offices, 28 Feb 2011 Martin Euchner Advisor of ITU-T Study Group 17 [email protected]
ITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
The identity management (IdM) ecosystem: minding the gaps
The identity management (IdM) ecosystem: minding the gaps Tony Rutkowski [email protected] Georges Sebek [email protected] Telecommunication Standardization Sector (ITU-T) International Telecommunication
ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009
ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009 ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector December
Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)
Regional Seminar on Cyber Preparedness Organised by World Bank Group, Financial Sector Advisory Center (FINSec) ITU s work in Cybersecurity and Global Cybersecurity Index (GCI) Vijay Mauree Programme Coordinator,
ITU Global Cybersecurity Agenda (GCA)
International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,
ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests
ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP
Cybersecurity @ ITU. Carla Licciardello Policy Analyst [email protected]. www.itu150.org
Cybersecurity @ ITU Carla Licciardello Policy Analyst [email protected] www.itu150.org Where are we coming from Specialized agency of the UN for telecommunications and ICTs Some more info about
ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union
ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY
ITU-T Security Standard Activities
ITU-T Security Standard Activities Koji NAKAO Information Security Fellow, KDDI Corporation Rapporteur, Security Management, Q7/SG 17, ITU-T Chair of ISO/IEC JTC 1/SC 27/WG 4, Japan, & Co-Chair of RAISS
The global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
Standardization: Plans and Progress Franz ZICHY Vice-Chairman Working Party 3 of ITU-T Study Group 5
Standardization: Plans and Progress Franz ZICHY Vice-Chairman Working Party 3 of ITU-T Study Group 5 ITU: unique public/private partnership UN agency for ICTs Members: 193 Member States (Governments and
A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
Cyber Security @ ITU. By Tomas Lamanauskas, ITU
Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and
ITU WORK ON INTERNET OF THINGS
ITU WORK ON INTERNET OF THINGS Presentation at ICTP workshop 26 March 2015 Cosmas Zavazava Chief, Projects and Knowledge Management Department International Telecommunication Union ITU HEADQUARTERS, GENEVA
RESOLUTION 102 (REV. BUSAN, 2014)
RESOLUTION 102 (REV. BUSAN, 2014) ITU's role with regard to international public policy issues pertaining to the Internet and the management of Internet resources, including domain names and addresses
Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director
Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director 2 Thanks To the ITU for sponsoring the initiative ictqatar has worked closely with the ITU-D since the project s inception,
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
Implementation of Universal Global Trusted Service Provider Identity (Trusted SPID)
V1.0 Implementation of Universal Global Trusted Service Provider Identity (Trusted SPID) Tony Rutkowski mailto:[email protected] Co-editor, ITU-T Rec X.idmreq ITU HLEG member International Telecommunication
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION)
AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION) AG/RES. 2004 (XXXIV-O/04) ADOPTION OF A COMPREHENSIVE INTER-AMERICAN STRATEGY TO COMBAT THREATS TO CYBERSECURITY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Terms of Reference. ITU-T Focus Group on Smart Cable Television (FG SmartCable)
Terms of Reference ITU-T Focus Group on Smart Cable Television (FG SmartCable) 1. Scope The Focus Group (FG), established in accordance with Recommendation ITU-T A.7 and under the auspices and charter
COMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, [ ] COM(2006) 251 COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE
Lith Networking and Network Marketing Safety
DIRECTION TO SUCCESS. PUBLIC AND PRIVATE SECTORS PARTNERSHIP WSIS Action Line Facilitation Meeting: Building confidence and security in the use of ICTs (C5) Partnerships for Global Cybersecurity ITU Geneva,
Combining Security Risk Assessment and Security Testing based on Standards
Jürgen Großmann (FhG Fokus) Fredrik Seehusen (SINTEF ICT) Combining Security Risk Assessment and Security Testing based on Standards 3 rd RISK Workshop at OMG TC in Berlin, 2015-06-16 3 rd RISK Workshop
Global Cybersecurity Agenda (GCA) A framework for international cooperation
Open-ended Intergovernmental Expert Group on Cybercrime Vienna, 17-21 January 2011 Global Cybersecurity Agenda (GCA) A framework for international cooperation Alexander NTOKO Head, Corporate Strategy Division
(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
IoT Prospects of Worldwide Development and Current Global Circumstances
IoT Prospects of Worldwide Development and Current Global Circumstances Dr. Bilel Jamoussi Chief Study Groups Department Telecommunication Standardization Bureau, ITU www.itu.int/itu-t/go/iot 1 IoT in
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
INTERNATIONAL TELECOMMUNICATION UNION. WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Dubai, 20-29 November 2012
INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Dubai, 20-29 November 2012 Resolution 76 Studies related to
COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'
EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying
INCO for Cyber Security. PTCIF: 21st Feb 2014
INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.
NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA
NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA ViS!T - Verwaltung integriert sichere Informationstechnologie, Wien, 29.10.2014 European Union Agency
ETSI ETR 278 TECHNICAL March 1996 REPORT
ETSI ETR 278 TECHNICAL March 1996 REPORT Source: ETSI TC-SAGE Reference: DTR/SAGE-00014 ICS: 33.020 Key words: GSM, cipher algorithm Security Algorithms Group of Experts (SAGE); Report on the specification
Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union
Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET
UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008
UK Networks & Security An Overview Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 Objectives The structure of your public communication networks The threat landscape these networks face
Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
Standards for Cyber Security
Best Practices in Computer Network Defense: Incident Detection and Response M.E. Hathaway (Ed.) IOS Press, 2014 2014 The authors and IOS Press. All rights reserved. doi:10.3233/978-1-61499-372-8-97 97
Standard Big Data Architecture and Infrastructure
Standard Big Data Architecture and Infrastructure Wo Chang Digital Data Advisor Information Technology Laboratory (ITL) National Institute of Standards and Technology (NIST) [email protected] May 20, 2016
CERT.AZ description as per RfC 2350
CERT.AZ description as per RfC 2350 Contact Cyber Security Center (CSC) Computer Emergency Response Team (CERT) Address Block 702, Drogal lane Baku, Azerbaijan Telephone: +99412 4932056 +99412 4932057
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
COMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34 COMMITTEE)
EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Regulatory Policy Standardisation Brussels, 9 th November 2005 Doc.: 34/2005 Rev. 1 EN COMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cyber Security Challenges & Capacity Building By Marco Obiso International
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
Latest in Cloud Computing Standards. Eric A. Hibbard, CISSP, ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems
Latest in Cloud Computing Standards Eric A. Hibbard, CISSP, ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems 1 Short Introduction CTO Security & Privacy, Hitachi Data Systems Involved
EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
ITU -D. on Current and Future Needs and Priorities in a Converged, Competitive Telecommunication/ ICT Environment
International Telecommunication Union HRD/HRM Survey on Current and Future Needs and Priorities in a Converged, Competitive Telecommunication/ ICT Environment ITU -D Executive summary and recommendations
EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development
Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING
International Telecommunication Union. ITU Internet Report 2006 SUMMARY
International Telecommunication Union digital.lifelife ITU Internet Report 2006 SUMMARY This ITU Internet Report, the eighth in the series, has been produced by a team from the ITU Strategy and Policy
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
ISO27032 Guidelines for Cyber Security
ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance
EU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
ISO/IEC Information & ICT Security and Governance Standards in practice. Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT
ISO/IEC Information & ICT Security and Governance Standards in practice Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT June 4, 2009 ISO and IEC ISO (the International Organization for Standardization)
M2M & Cybersecurity Workshop TIA 2013 M2M Standards and Security. Mihai Voicu CIO/CSO ILS Technology LLC
M2M & Cybersecurity Workshop TIA 2013 M2M Standards and Security Mihai Voicu CIO/CSO ILS Technology LLC Topics 1 What is the role of standardization in security for M2M solutions? 2 How are TIA and other
Cloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
ITU- T Focus Group Cloud Compu2ng
ITU- T Focus Group Cloud Compu2ng International Telecommunication Union 1 ITU-T FG Cloud Management & Structure Management team: Chairman: Victor Kutukov (Russia) Vice-Chairman: Jamil Chawki (France Telecom
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Guiding principles for security in a networked society
ericsson White paper Uen 307 23-3230 February 2014 Guiding principles for security in a networked society The technological evolution that makes the Networked Society possible brings positive change in
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National
