As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Similar documents
Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cyber ITU. By Tomas Lamanauskas, ITU

What legal aspects are needed to address specific ICT related issues?

The global challenge

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

ITU Global Cybersecurity Agenda (GCA)

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

INCO for Cyber Security. PTCIF: 21st Feb 2014

Executive Director Centre for Cyber Victim Counselling /

Cybersecurity for ALL

Michael Yakushev PIR-Center, Moscow (Russia)

Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)

2012 NORTON CYBERCRIME REPORT

ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int.

How To Protect Yourself From Cyber Crime

Pacific Islands Telecommunications Association

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

A Global Protocol on Cybersecurity and Cybercrime

ITU National Cybersecurity/CIIP Self-Assessment Tool

Global IT Security Risks

Security Intelligence Services.

Report on Cyber Security Alerts Processed by CERT-RO in 2014

Cyber Diplomacy A New Component of Foreign Policy 6


Global Corporate IT Security Risks: 2013

Honourable members of the National Parliaments of the EU member states and candidate countries,

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

Overview of ITU Cybersecurity Activities

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Microsoft s cybersecurity commitment

Certified Cyber Security Analyst VS-1160

Cybersecurity. Are you prepared?

G7 Opportunities for Collaboration

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

Cyber security Indian perspective & Collaboration With EU

Promoting a cyber security culture and demand compliance with minimum security standards;

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

Cybercrime: risks, penalties and prevention

NEW ZEALAND S CYBER SECURITY STRATEGY

Speech on Cyber Risks & Security Seminar, The EU Digital Agenda and the Cyber-security proposed Directive: A legal and a contextual approach,

Cyber security trends & strategy for business (digital?)

Cyber Security Strategy for Germany

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

I N T E L L I G E N C E A S S E S S M E N T

September 20, 2013 Senior IT Examiner Gene Lilienthal

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

CYBERSECURITY INDEX OF INDICES

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Top Ten Cyber Threats

CYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES. Strengthening Your Community at the Organizational Level

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

NATIONAL CYBER SECURITY AWARENESS MONTH

(BDT) BDT/POL/CYB/Circular

Cyber Security Trends Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in :

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, June 2006)

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

State of Security Survey GLOBAL FINDINGS

CYSPA - EC projects supporting NIS

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

A New Approach to Assessing Advanced Threat Solutions

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

CYBERSECURITY. PROGRAMME 14 April Lunch / Delegates Registration

Vulnerability Assessment & Compliance

Defense Security Service

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015

KASPERSKY LAB TECHNOLOGY LEADERSHIP

Transcription:

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Global Cybercrime has an estimated cost of US$ 110 Billion per year

Every second, 18 adults become a victim of cybercrime, resulting in more than 1.5 million cybercrime victims each day on a global level. With losses totaling an average of US$197 per victim across the world in direct financial costs, cybercrime costs consumers more than a week s worth of nutritious food necessities for a family of four. In the past 12 months, an estimated 556 million adults across the world experienced cybercrime, more than the entire population of the European Union. This figure represents 46 % of online adults who have been victims of cybercrime in the past twelve months, compared with the findings from 2011 (45 percent). Source: Symantec

More than 1.5 billion web based cyberattacks took place in 2012

While launching 1.5 billion web attacks throughout 2012 Cybercriminals used 6.5 million unique domains (2.5 million more than in 2011) Servers seeded with malicious code were detected in the Internet zones of 202 countries around the world. Source: Kaspersky Lab

U.S. Department of Energy During an attack on the agency's computers and servers, the personal data of employees and contractors was stolen, but, reportedly, no classified data was leaked. Twitter 250k were requested to reset their passwords NY Times, Wall Street Journal and Washington Post Sensitive information from journalists stolen during 2013 ITU (December 2012) Main website compromised during WCIT 12, in the attempt of obstructing a treaty making conference NASA NASA s Inspector General reported that 13 APT attacks compromised NASA computers between 2011 and 2012 India 112 government websites of India had been compromised from December 2011 to February 2012 Japan (September 2012) Japan faced an onslaught of cyber attacks targeting government websites, universities, banks and hospitals Almost all governments website of the UN Member States have been attacked between 2011 and 2012 at various levels, from defacement to DDoS, from phishing to data theft Between 2011 and 2012, some 20 intergovernmental organizations and UN bodies, including IAEA, IMF, UNDP, UN, ITU, have been victims of cyberattacks of various nature

So many differences, so many challenges, so many frameworks

Budapest Convention Since 2001, some 37 Countries ratified, out of 193 UN Member States 24/7 Network some 50 countries, since 2001 EU built a cybercrime center, within the EUROPOL structure Delivery date: 2014 INTERPOL will build a Cybercrime Complex Delivery date: 2014 Shanghai Cooperation Organization EU US cooperation Commonwealth Cybercrime Initiative, 54 States EU Directives African Convention on Cybersecurity, 52 States FIRST, OIC CERT, GCC CERT, APC CERT and other incident response organizations Arab Convention on Combating Information Technology Offences

Zero Day Vulnerability and Action A zero day vulnerability refers to an unknown malfunction in IT system; Zero day attacks include malware, spyware, unwanted access to information. This security hole is then exploited by hackers before the vendor is aware this kind of attack is known as a zero day attack. Zero day vulnerabilities are increasingly exploited by cyber criminals and terrorists that use mobile technology October 2012

43 Million $ 5 bank accounts 20 Countries 2,904 ATMs 2 Attacks 36 hours 1 Mobile Internet October 2012

Key Challenges Lack of adequate and interoperable national or regional legal frameworks Lack of secure software and ICT based applications Lack of appropriate national and global organizational structures to deal with cyber incidents Lack of information security professionals and skills within governments; lack of basic awareness among users Lack of international cooperation between industry experts, law enforcements, regulators, academia & international organizations, etc. to address a global challenge Cybersecurity not seen yet as a cross-sector, multi-dimensional concern. Still seen as a technical/technology problem.

Benefits of more harmonization and streamlining Increased efficiency and effectiveness in the detection and analysis of cyber threats Greater awareness of risks and adoption of protective behavioral patterns by general public and private sector Efficient and effective long term whole of government response to cyberthreats and cybercrime, including national coordinating mechanisms, data collection systems, and effective legal framework Strengthened communication between government agencies in cybersecurity matters, between the concerned national stakeholders, including but not limited to ICT policy makers and regulators, judiciary systems, law enforcement, private sector organizations, as well as on international cooperation

ITU the UN Agency for ICTs and its work 2003 2005 WSIS entrusted ITU as sole facilitator for WSIS Action Line C5 Building Confidence and Security in the use of ICTs 2007 ITU Cybersecurity Agenda (GCA) was elaborated and endorsed by ITU Member States GCA is a framework for international cooperation in cybersecurity 2008 Now ITU Membership endorsed the GCA as the ITU wide strategy on international cooperation.