CYBER SECURITY IN VIETNAM MULTI-CHAMBER MEETING - 22 OCTOBER 2015



Similar documents
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Cyber Security Strategy

Cybercrime: risks, penalties and prevention

Review report of cybercrime-cybersecurity in Vietnam

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Gold Lock Desktop White Paper

Cyber Security, a theme for the boardroom

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

NEW ZEALAND S CYBER SECURITY STRATEGY

Cyber Risks and Insurance Solutions Malaysia, November 2013

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Developing a robust cyber security governance framework 16 April 2015

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Promoting a cyber security culture and demand compliance with minimum security standards;

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Managing Cyber Risk through Insurance

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

Getting real about cyber threats: where are you headed?

Bachelor of Information Technology (Network Security)

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Developing a National Strategy for Cybersecurity FOUNDATIONS FOR SECURITY, GROWTH, AND INNOVATION. Cristin Flynn Goodwin J.

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

Unit 3 Cyber security

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

Cyber Security Review

Research Note Engaging in Cyber Warfare

Hacking Risks for Satellites

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

OCIE Technology Controls Program


Information Security for the Rest of Us

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

State of Security Survey GLOBAL FINDINGS

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

UF Risk IT Assessment Guidelines

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Identifying Cyber Risks and How they Impact Your Business

NETWORK SECURITY ASPECTS & VULNERABILITIES

U. S. Attorney Office Northern District of Texas March 2013

WRITTEN TESTIMONY OF

Practical Steps To Securing Process Control Networks

Vulnerability Assessment & Compliance

Into the cybersecurity breach

Research Topics in the National Cyber Security Research Agenda

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Cyber security in an organization-transcending way

United States Cyber Security in the 21st Century

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

In an age where so many businesses and systems are reliant on computer systems,

7/23/2015. Tales of a Real-Life Hacker. Jon Miller. Vice President of Strategy Former ethical hacker of energy company operations.

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

Cybersecurity and internal audit. August 15, 2014

Bootstrapping Secure Channels of Communication Over Public Networks

Managing IT Security with Penetration Testing

Cyber Security for audit committees

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

ICASAS505A Review and update disaster recovery and contingency plans

Gregg Gerber. Strategic Engagement, Emerging Markets

Introduction to Cybersecurity Overview. October 2014

Women in an Age of Cyber Wars: Risks, Management and Opportunity

White Paper. Information Security -- Network Assessment

PENETRATION TESTING GUIDE. 1

Federal Bureau of Investigation

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Cybersecurity. Considerations for the audit committee

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

How do we Police Cyber Crime?

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Security & privacy in the cloud; an easy road?

Successfully Combating

Lesson 4: Introduction to network security

National Cyber Crime Unit

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Transcription:

SECURITY IN VIETNAM MULTI-CHAMBER MEETING - 22 OCTOBER 2015 10/22/2015 1

WHY SECURITY HYPER-CONNECTED WORLD? CREATED FOR INFORMATION SHARING ALWAYS CONNECTED: ANYTIME, ANYPLACE LARGELY ANONYMOUS MORE ENDPOINT DEVICES : MOBILE / INTERNET OF THING YOU MAY NOT KNOW YOU HAVE BEEN TARGETED 10/22/2015 2

SECURITY WHY IT s Matter? DEADLY COST $400Bn/YEAR GLOBALLY 1 EVERYBODY TARGETED NOT JUST CORPORATE, BUT IINDIVIDUAL AND GOVERNMENT TOO. SHARED RESPONSIBILITY WE ALL HAVE RESPOSIBILITY 10/22/2015 3

WHO are The Threat ACTORS *? HACKTIVISM HACKING INSPIRED BY IDEOLOGY 10/22/2015 4 MOTIVATION: SHIFTING ALLEGIANCES DYNAMIC, UNPREDICTABLE IMPACT TO BUSINESS: PUBLIC DISTRIBUTION, REPUTATION LOSS ORGANISED CRIME GLOBAL, DIFFICULT TO TRACE AND PROSECUTE MOTIVATION: FINANCIAL ADVANTAGE IMPACT TO BUSINESS: THEFT OF INFORMATION THE INSIDER INTENTIONAL OR UNINTENTIONAL? MOTIVATION: GRUDGE, FINANCIAL GAIN IMPACT TO BUSINESS: DISTRIBUTION OR DESTRUCTION, THEFT OF INFORMATION, REPUTATION LOSS STATE-SPONSORED ESPIONAGE AND SABOTAGE MOTIVATION: POLITICAL ADVANTAGE, ECONOMIC ADVANTAGE, MILITARY ADVANTAGE IMPACT TO BUSINESS: DISRUPTION OR DESTRUCTION, THEFT OF INFORMATION, REPUTATIONAL LOSS

What are the targets? VALUABLE INFORMATION INTELLECTUAL PROPERTY CUSTOMER AND PERSONAL DATA BUSINESS PROCESSES? BUSINESS CRITICAL INFORMATION PLANS, STRATEGIES AND TRANSACTIONS FINANCIAL INFORMATION PRODUCT S DESIGNS REPUTATION GOVERNMENT, BUSINESS, PERSONAL GOVERNMENT CONFIDENTIAL POLITICAL, ECONOMIC AND MILITARY 10/22/2015 5

Security in Vietnam 10/22/2015 6

Security in Vietnam 2014-2015 6,000 VIETNAMESE WEBSITES HACKED IN 2014 Incl. 246.GOV.VN 2 1,039 VIETNAMESE WEBSITES HACKED BY CHINESE HACKERS DURING AUG-2014 DISRUPTION 3MOST COMMON ATTACK TYPES DENIED OF SERVICES MALWARES <5% 45% OF 475 BUSINESS INVEST LESS THAN 5% OF THEIR BUDGET INTO IT ISSUES 3 HACKING / PENETRATION 10/22/2015 7

Security in Vietnam LAWS & REGULARTIONS - LAW 51/2005/QH11 ON ELECTRONIC TRANSECTIONS - LAW 67/2006/QH11 ON INFORMATION TECHNOLOGY - LAW 21/2008/QH12 ON HIGH TECHNOLOGY - LAW 41/2009/QH12 ON TELECOMMUNICATIONS - LAW ON INTERNET SECURITY (Draft Jun 2015) - DECREE 72/2013/ND-CP ON MANAGEMENT, PROVISION AND USE OF INTERNET SERVICES AND ONLINE INFORMATION - DECREE 25/2014/ND-CP ON PREVENTION AND COMBAT OF CRIMES AND OTHER LAW VIOLATIONS INVOLVING HIGH TECHNOLOGY EDUCATION & TRAINING 99/QD-TTg : PROPOSAL ON TRAINING AND DEVELOPMENT OF INFORMATION SECURITY RESOURCES TO 2020 8 UNIVERSITIES & INSTITUTES 2,000 BSc/MSc in 2020 GOVERNMENT AGENCIES - AUTHORITY of INFORMATION SECURITY (AIS) - NATIONAL ELECTRONIC AUTHENTICATION CENTER (NEAC) - INFORMATION SECURITY AGENCY (A68) - VIETNAM GOVERNMENT CERTIFICATION AUTHORITY (VGCA) - VIETNAM COMPUTER EMERGENCY RESPONSE TEAM (VNCERT) - CIVIL CRYPTOGRAPHY ADMINISTRATION AGENCY - ICT AND SECURITY MONITORING CENTER - GOVERNMENT CIPHER COMMITTEE 10/22/2015 8

Security IN VIETNAM MANAGEMENT INVOLVEMENT WEAKNESSES SECURITY FRAMEWORK SECURITY PERSONNEL SECURITY MINDSET CONTINOUSLY IMPROVEMENT 10/22/2015 9

Security IMPROVEMENT ASPECTS Leadership & Governance Information Risk Management Business Continuity SECURITY Operation & Technology Human factors Legal & Compliance 10/22/2015 10

Thank you! 10/22/2015 11

References * Taken from 2014 VNISA-KMPG security seminar materials (1) Net Losses: Estimating the Global Cost of Cybercrime Economic impact of cybercrime (http://csis.org/files/attachments/140609_mcafee_pdf.pdf) (2) Ministry of Public Security / Vietnamnet News (http://m.english.vietnamnet.vn/fms/science-it/126897/growing-cyber-threats.html) (3) VNISA survey, 2014 / Thanhniennews (http://www.talkvietnam.com/2014/12/vietnam-vulnerable-to-cyber-attacks-but-agencies-poorly-equipped/ ) 10/22/2015 12