Cyber security Indian perspective & Collaboration With EU



Similar documents
National Cyber Security Policy -2013

Cyber Security and Critical Information Infrastructure

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Current Threat Scenario and Recent Attack Trends

Global Cybersecurity Index Good Practices

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

INCO for Cyber Security. PTCIF: 21st Feb 2014

Practical Steps To Securing Process Control Networks

What legal aspects are needed to address specific ICT related issues?

INFORMATION SECURITY GOVERNANCE READINESS IN GOVERNMENT INSTITUTION

How To Understand And Understand The European Priorities In Information Security

Research Topics in the National Cyber Security Research Agenda

DATA PROTECTION LAWS OF THE WORLD. India

September 20, 2013 Senior IT Examiner Gene Lilienthal

How To Write An Article On The European Cyberspace Policy And Security Strategy

Cyber Security ( Lao PDR )

Policies and Practices on Network Security of MIIT

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Making our Cyber Space Safe

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Certified Cyber Security Analyst VS-1160

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Master of Science in Cyber Security and Management

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

New-Age Undergraduate Programme

Infocomm Security Masterplan 2

Cybersecurity. Are you prepared?

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Certified Cyber Security Analyst VS-1160

Executive Director Centre for Cyber Victim Counselling /

Microsoft s cybersecurity commitment

NEW ZEALAND S CYBER SECURITY STRATEGY

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

ESKISP Conduct security testing, under supervision

Cybercrime Security Risks and Challenges Facing Business

The Education Fellowship Finance Centralisation IT Security Strategy

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

Committees Date: Subject: Public Report of: For Information Summary

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Cyber security Country Experience: Establishment of Information Security Projects.

Lessons from Defending Cyberspace

Information Security Seminar 2013

REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY

How To Ensure Cyber Security In The Czech Republic

CYBER SECURITY STRATEGY AN OVERVIEW

The FBI and the Internet

Workshop on Building international cooperation WG2 : Network Information Security / cyber security

ICT Usage & Cyber Security Issues in Myanmar

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Security Analytics for Smart Grid

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES

RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY

Cyber security in an organization-transcending way

Who s Doing the Hacking?

CESG Certification of Cyber Security Training Courses

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

Cyber Security. John Leek Chief Strategist

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee , Geneva

CYBER SECURITY Audit, Test & Compliance

Vulnerability Assessment & Compliance

CERT-GOV-GE Activities & International Partnerships

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity and Incident Response Initiatives: Brazil and Americas

(BDT) BDT/POL/CYB/Circular

Egyptian Best Practices Securing E-Services

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

Cybersecurity and Privacy Hot Topics 2015

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Charter of Consumer Rights in the Digital World

Defending Against Data Beaches: Internal Controls for Cybersecurity

Syed Khalid Gardezi Joint Secretary Ministry of Information Technology Government of Pakistan (Dushanbe 17 th June, 2015)

3 day Workshop on Cyber Security & Ethical Hacking

Promoting a cyber security culture and demand compliance with minimum security standards;

Identifying Cyber Risks and How they Impact Your Business

Unit 3 Cyber security

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

NASSCOM Cyber Security Task Force Working Group Discussion Slides. June 10, 2015

DBC 999 Incident Reporting Procedure

Transcription:

Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of India 1

Indian ICT sector IT market US $ 110 billion Exports of Software US $ 69 billion Exports of Hardware US $ 8.9 billion Internet users Mobile connections 122 million 941 million 2

INDIA Internet Infrastructure:2012 Internet 6 15 Mil. All Domains (2.5 Mil..in ) STPI Bharti NIC 260+ IDCs Reliance 134 Major ISPs ERNET Mail Servers TATA Communications BSNL 11.47 Mil. High speed Internet MTNL DNS 122 Mil. Internet Users Govt. IT / ITES BPO Home Academia Enterprise Overall Tele-density - 67.67 Targeted Broadband connections= 22 Mil. (by 2014) VOIP, IPTV 3

Threat landscape Malware, Botnets Identity Theft and Phishing DDoS attacks Anonymisers, VPNs, TOR Web site intrusions Spam Cyber espionage Attacks on small office/home systems Misuse of social media 4

Key Elements of Cyber Security Strategy Security R&D Legal Framework Security Incident - Early Warning & Response National Cyber Alert System CERT-In and Sectoral CERTs Information Exchange with international CERTs Security Policy, Compliance and Assurance Security Assurance Framework Cyber security drills Trusted Company Certification IT/ITES/BPO Companies Security Training Skill & Competence development Domain Specific training Cyber Forensics, Network & System Security Administration International Cooperation 5

National Cyber Security Policy Salient Features: Caters to whole spectrum of ICT users and Providers including home users; small, medium & large organisations, Government and Academia Strategies: Creating a secure cyber ecosystem Creating an assurance framework Encouraging Open Standards Strengthening the Regulatory framework Creating mechanisms for security threat early warning, vulnerability management and response to security threats 6

National Cyber Security Policy Strategies (Contd..): Securing E-Governance services Protection and resilience of Critical Information Infrastructure Promotion of Research & Development in cyber security Reducing supply chain risks Human Resource Development Creating Cyber Security Awareness Developing effective Public Private Partnerships Information sharing and cooperation The Policy is operationalised by way of detailed guidelines and plans at various levels such as National, Sectoral, State, Ministry and Enterprise. 7

Legal Framework Information Technology Act, 2000 IT (Amendment) Act, 2008 Data Protection & Computer crimes Best Practices and Security Assurance ISO 27001 Security Standard - Mandated for Public Companies and critical sectors 8 8

Cyber Security R&D Focus Cyber Security R&D is one of the major initiatives identified for securing Cyber space Aimed at promotion of development & technology, demonstration, proof of concept and R&D test bed projects for enhancing indigenous skills and capabilities in the cyber security 9

Cyber Security R&D Promotion Scheme Academic Insitutions & R&D Labs across the country are funded to carry out R&D projects to nurture R&D and capacity development A Working Group, of experts in the area, at the Department examines and recommends R&D proposals in thrust areas Evaluation of project proposals and recommendation by the Working Group 10

Cyber Security - Collaboration Cyber Space is Virtual, Borderless, Anonymous Security in Cyber Space is no longer isolated to one nation Cooperation is needed with joint programmes To effectively mitigate threats Capacity Development Exchange of Infortaion International Cooperation Cyber security drills at international level with Asia-Pacific CERTs Specific cyber security cooperation with Japan and South Korea Participating in the UN Committee of Group of Experts as well as in the Council of Security Cooperation in Asia-Pacific (CSCAP) for enhancing cooperation in the area of Cyber Security India is Signatory to Trusted Computing Group to participate in 11 development of standards and promotion of Trusted systems

How India and EU can collaborate in R&D Identification of specific areas & Institutions for Joint R&D programmes/projects Indicative list of R&D Areas for joint R&D Solutions for ensuring trust of electronic transactions Analysis and certification of commercial IT Systems Software assurance, code testing and analysis Threat Management systems Network penetration and vulnerability assessment tools Development of compliance and self-assessment tools, validation and implementation. Cloud Security Tools 12

Thank you 13