Cybercrime: a complex problem requiring a mul4- faceted response. 26 March 2014

Similar documents
Towards a more secure Cyber Space for South Africa

Achieving Global Cyber Security Through Collaboration

ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt

ACEIE, CSP & NSTF workshop on digital wellness in SA. Jansie Niehaus Exec Director, NSTF 21 Aug 2015

Trustworthy ICT and Cyber Security Research Adding value from an African perspective

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber crime risk management protecting your business 4 November 2015

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

Promoting a cyber security culture and demand compliance with minimum security standards;

How To Understand And Understand The European Priorities In Information Security

CISSA Cybersecurity capacity building workshop. May 2015

Cyber Security Governance in Open Distance Learning

Seamus Reilly Director EY Information Security Cyber Security

Unifying Incident Response Teams Via Multi Lateral Cyber Exercise for Mitigating Cros Border Incidents: Malaysia CERT Case Study

Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology

The 2012/3 SA Cyber Threat Barometer. Craig Rosewarne

Cyber security Country Experience: Establishment of Information Security Projects.

Main Research Gaps in Cyber Security

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES

GLOBAL TO LOCAL / LOCAL TO GLOBAL PSS REGIONAL AND COUNTRY LEVEL: LESSONS FOR BROADER HEALTH PROMOTION

Women in an Age of Cyber Wars: Risks, Management and Opportunity

Landmark Company Overview

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

Technology Crime Services

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Internet Governance and Cybersecurity Patrick Curry MACCSA

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

The Triple- Helix as vehicle for Innova4on & Security Work in progress

Lessons from Defending Cyberspace

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

AGENDA Morning Session

Cybercrime in the Automotive Industry How to improve your business cyber security

Ima Okonny. Acting Director Data Management & Reporting Division Research and Evaluation Branch Citizenship and Immigration Canada

Session 4: Programmes: the Core of the 10YFP

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

ITU National Cybersecurity/CIIP Self-Assessment Tool

How To Write An Article On The European Cyberspace Policy And Security Strategy

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Introduction of the GCCD. (Global Cybersecurity Center for Development)

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

S. ll IN THE SENATE OF THE UNITED STATES

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

2 Gabi Siboni, 1 Senior Research Fellow and Director,

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

CONSULTING IMAGE PLACEHOLDER

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

Retaining and Preserving the Scholarly Record: An Update on the Eastern Academic Scholars Trust

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Cyber Security Strategy

SRO-EA s Cyber security Initiatives in Eastern Africa

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons

INFORMATION SECURITY AWARENESS & TRAINING PROGRAM

Capacity Building to Strengthen Cybersecurity: Thailand Update

The Cyber Security Challenge: What Can be Done?

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

Cyber Security for the Private Sector: What Companies and Their Lawyers Need to Know

Working Party on Information Security and Privacy

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

CYBERSECURITY INDEX OF INDICES

Towards closer EU-ASEAN collaboration in cybersecurity

National Cyber Security Policy (Draft) March 2015

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

Infocomm Security Masterplan 2

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

What legal aspects are needed to address specific ICT related issues?

Cyber ITU. By Tomas Lamanauskas, ITU

Information Security in the undergraduate curriculum

FULLY INTEGRATED GOVERNANCE, RISK MANAGEMENT, COMPLIANCE AND AUDIT SOFTWARE

THE WORLD IS MOVING FAST, SECURITY FASTER.

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

Middle Class Economics: Cybersecurity Updated August 7, 2015

Lara Bianchi. Mobile Phone Home Address Via Carneluc 9, 56124, Pisa, Italy

The internet and digital technologies play an integral part

Cyber Defense and Cyber Security Policies in the UK and Germany

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

CURRICULUM VITAE. Kodzo Gadzekpo ADOMEY

Making Finance Work For Africa Second Genera3on Development Finance Innova3ve Approaches to Closing Gaps in Financial Intermedia3on

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

Cyber Security Trends & Awareness. Christian Van Heurck Coordinator CERT.be

Multilateral Legal Responses to Cyber Security in Africa: Any Hope for Effective International Cooperation?

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES. second edition

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

Cluster on Data Protec/on, Security and Privacy in Cloud. Mee/ng of the 7th of Oct 2015 CloudForward 2015, Pisa. Erkuden Rios (TECNALIA)

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

Transcription:

Cybercrime: a complex problem requiring a mul4- faceted response 26 March 2014

Challenges and Prospects of Frameworks to combat Cybercrime a cri4cal perspec4ve Prof Basie Von Solms Director : Centre for Cyber Security Academy for Computer Science and Software Engineering University of Johannesburg basievs@uj.ac.za

Cyber crime is a na4onal crisis June 20, 2013 Na4onal crisis of cybercrime poses major threat to SA business Sep 18, 2013 Cybercrime 'na4onal crisis' cos4ng SA R1b a year Oct 23, 2013

What must we do to decrease Cyber Crime?

My hypothesis to decrease Cyber Crime we need to move towards a more secure Cyber Space we need a proper Architecture for a Secure Cyber Space

SA s Secure Cyber Space Components to secure SA s Cyber space Founda4ononn Architecture for a Secure Cyber Space

What is this Founda4on? What are these components? What is the gold standard to protect a country s Cyber Space?

Determining the gold standard : Founda4on : (Government s) primary role is to define the na4onal strategy and provide the policy framework. The policy framework describes the architecture by which the na4onal efforts are built and operated. Best Prac6ces for Na6onal CyberSecurity: Building a Na6onal Computer Security Incident Management Capability, Version 2.0, 2011 Each Member State, shall put in place a na4onal cyber security policy DraG African Union Conven6on on the Confidence and Security in Cyberspace

SA s Secure Cyber Space Components to secure SA s Cyber space Architecture for a Secure Cyber Space

Determining the gold standard : Components Let s inves4gate some other exis4ng Na4onal Strategies to determine some common components are

Component 1 A Na4onal program for Cyber Security skills/capacity building India s Na4onal Cyber Security Policy Dra` African Union Conven4on on the Confidence and Security in Cyberspace Each Member State have to undertake measures to develop capacity building measures

SA s Secure Cyber Space A Na6onal program for Cyber Security skills/ capacity building ) Architecture for a Secure Cyber Space

Shortage of skills in SA UJ effort Cer6ficate in Cyber Security Cer6ficate in Digital Forensics

Component 2 A Culture of Cyber Security India s Na4onal Cyber Security Policy AU s Dra` Conven4on Each Member State have to undertake measures to take the lead in the development of a cyber security culture within its borders and to this end enhance awareness- building

SA s Secure Cyber Space A Na6onal program for Cyber Security skills/ capacity building A Na6onal Cyber Security Awarenes s Program (Cyber Security Cuilture) Architecture for a Secure Cyber Space

Isolated ini4a4ves SACSAA UJ, NMMU, UNISA CSIR Integrated na4onal ini4a4ve needed

Component 3 A Na4onal Cri4cal Informa4on Infrastructure Protec4on Centre India s Na4onal Cyber Security Policy AU s Dra` Conven4on Member States have to undertake necessary measures to encourage the establishment of ins6tu6ons such as Computer Emergency Response Team (CERT) or Computer Security Incident Response Team (CSIRTs).

SA s Secure Cyber Space A Na6onal program for Cyber Security skills/ capacity building A Na6onal Cyber Security Awarenes s Program (Cyber Security Cuilture) A Na6onal Cri6cal Informa6o n Infrastruct ure Protec6on Centre Architecture for a Secure Cyber Space

Component 3 A Na4onal Cri4cal Informa4on Infrastructure Protec4on Centre Na4onal CSIRT Cyber Threat Intelligence Cyber Counterintelligence Centre for Cyber Security at UJ

Component 4 Public- Private Partnerships in the Cyber Space India s Na4onal Cyber Security Policy AU s Dra` Conven4on Each Member State have to undertake measures to adopt public- private partnership as a model to engage industry, civil society and the academia..

SA s Secure Cyber Space A Na6onal program for Cyber Security skills/ capacity building A Na6onal Cyber Security Awarenes s Program (Cyber Security Cuilture) A Na6onal Cri6cal Informa6o n Infrastruct ure Protec6on Centre Public- Private Partner Ships Architecture for a Secure Cyber Space

Most Cri4cal Infrastructures are in private hands Government needs the private sector in this mader

Component 5 Gov support for cyber security in SMMEs India s Na4onal Cyber Security Policy

SA s Secure Cyber Space A Na6onal program for Cyber Security skills/ capacity building A Na6onal Cyber Security Awarenes s Program (Cyber Security Cuilture) A Na6onal Cri6cal Informa6o n Infrastruct ure Protec6on Centre Public- Private Partner Ships Gov support for cyber sec rity in SMMEs Architecture for a Secure Cyber Space

SMMEs as growing targets of Cybercrime 150 000 SMMEs in SA are dependent on their cyber presence > 1,5 million jobs (in SMMEs) exist because of this cyber presence SMMEs are a growing target for cyber criminals POPI

SMMEs as growing targets of Cybercrime USA With small businesses prime targets for cyber attacks, the US Government announced (2011) that it designed a free online resource (tool) to help companies improve their online security http://www.secure128.com/u-s--government-helping-small-businesses-combat-cyberattacks.aspx

The UK government's Technology Strategy Board has extended its Innova6on Vouchers scheme to allow small and medium enterprises (SMEs) to bid for up to 5,000 from a 500,000 pot to improve their cyber security by bringing in outside exper6se. h`p://news.techworld.com/security/3443429/uk- government- offers- smes- 5000- to- improve- their- cyber- security/

SA s Secure Cyber Space A Na6onal program for Cyber Security skills/ capacity building A Na6onal Cyber Security Awarenes s Program (Cyber Security Cuilture) A Na6onal Cri6cal Informa6o n Infrastruct. ure Protec6on Centre Public- Private Partner Ships Gov support for cyber sec rity in SMMEs. More Architecture for a Secure Cyber Space

More components Interna4onal coopera4on Legal infrastructure

My hypothesis to decrease Cyber Crime we need to move towards a more secure Cyber Space we need a proper Architecture for a Secure Cyber Space

Conclusion as maders stand at the moment Therefore we will not decrease Cyber Crime Therefore we are not moving to a more secure Cyber Space We do not have a proper Architecture for a Secure SA Cyber Space

1. Norton Report 2012/3 South Africa have the 3 rd highest number of cybercrime vic6ms in the world 2. FBI : South Africa is a cyber crime hot spot The FBI listed South Africa as the sixth most ac6ve country where cyber crime took place h`p://businesstech.co.za/news/interna6onal/48142/south- africa- is- a- cyber- crime- hot- spot- gi/22

Conclusion Therefore we will not decrease Cyber Crime Therefore we are not moving to a more secure Cyber Space We do not have a proper Architecture for a Secure Cyber Space A proper integrated Architecture for a Secure Cyber Space for SA is the star4ng point to start decreasing Cyber Crime and is URGENTLY needed!!!

Conclusion Therefore we will not decrease Cyber Crime There fore we are not moving to a more secure Cyber Space We do not have a proper Architecture for a Secure Cyber Space SA will NOT reduce Cybercrime before we have a proper Architecture for a Secure Cyber Space This message MUST be conveyed to the highest levels in SA

Thanks basievs@uj.ac.za

Subscribe to ISS email newsletters www.issafrica.org