Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics



Similar documents
Cyber ITU. By Tomas Lamanauskas, ITU

Making our Cyber Space Safe

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Priority III: A National Cyberspace Security Awareness and Training Program

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

National Cyber Security Strategy of Afghanistan (NCSA)

Cyber security Country Experience: Establishment of Information Security Projects.

NICE and Framework Overview

Cyber Security Strategy of Georgia

Global Cybersecurity Index Good Practices

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

Preventing and Defending Against Cyber Attacks November 2010

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

Cybersecurity in the States 2012: Priorities, Issues and Trends

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Lessons from Defending Cyberspace

How To Write An Article On The European Cyberspace Policy And Security Strategy

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

CYBERSECURITY INDEX OF INDICES

National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide

Actions and Recommendations (A/R) Summary

National Cyber Security Policy -2013

Toward Curricular Guidance in the Cyber Sciences

Cybersecurity Framework: Current Status and Next Steps

The global challenge

Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)

[STAFF WORKING DRAFT]

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Framework for Improving Critical Infrastructure Cybersecurity

Trends in Information Technology (IT) Auditing

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int.

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Cyber Security Strategy(Information Security Policy Council, June 10, 2013)

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority

Cyber Security Defense Services Portfolio Development Status. February 2016

Jyväskylä Cyber Security Ecosystem

How To Be A Successful Member Of The European Agency For Security And Safety

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

National Initiative for Cyber Security Education

Cybersecurity: Mission integration to protect your assets

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

How To Promote Nuclear Security Education

OUTCOME OF PROCEEDINGS

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

CONSULTING IMAGE PLACEHOLDER

National Cybersecurity & Communications Integration Center (NCCIC)

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Qatar Computer Emergency Team

Draft Strategic Plan for FY

Department of Homeland Security Federal Government Offerings, Products, and Services

Preventing and Defending Against Cyber Attacks June 2011

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Intelligence Driven Security

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Cyber security trends & strategy for business (digital?)

Delft Data Science Seminar January 26, 2015

Critical Infrastructure Security and Resilience

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Department of Defense DIRECTIVE

How To Understand And Understand The European Priorities In Information Security

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

An Overview of Large US Military Cybersecurity Organizations

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

TITLE HERE Subtitle here. Cloud Standards Customer Council Cloud Industry Symposium June 18, 2014 Boston, MA

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

Medical leadership for better patient care: Support for healthcare organisations 2015

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

(BDT) BDT/POL/CYB/Circular

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, June 2014

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Capacity Building to Strengthen Cybersecurity: Thailand Update

Protecting Malaysia in the Connected world

Overview of ITU Cybersecurity Activities

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team. National Cybersecurity and Communications Integration Center

IAEA Support for the Establishment of Nuclear Security Education

Infocomm Security Masterplan 2

Preventing and Defending Against Cyber Attacks October 2011

ITU National Cybersecurity/CIIP Self-Assessment Tool

How To Write A Cybersecurity Framework

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Romanian National Computer Security Incident Response Team CERT-RO.

Department of Homeland Security

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

CyberSecurity Solutions. Delivering

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

The Open Government Partnership. Announcing New Open Government Initiatives

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Cybersecurity in the Commonwealth: Setting the Stage

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

THE HUMAN COMPONENT OF CYBER SECURITY

2015 Councils & Committees

Transcription:

Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1

Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts To Enhance Cyber Security Capabilities Libya Cyber Security Initiative 4 Case Studies 5 Filling The Cyber Security Gap In The Region 2

Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts To Enhance Cyber Security Capabilities Libya Cyber Security Initiative 4 Case Studies 5 Filling The Cyber Security Gap In The Region 3

National Cyber Security Agenda Key Questions Who is steering the national cyber security strategy Framework, and programs? How are government networks and critical information assets and infrastructure protected? How are national cyber security capabilities being developed? How is national cyber security awareness fostered? How are national security/ military cyberspace operations and planned Conducted against cyber attacks? How are cyber law defined and enforced? How is Incident response coordinated among relevant stakeholder? How is national and international collaboration conducted? How are cybersecurity policies and regulations being developed? 4

National Cyber Security Strategic Domains 1 2 3 4 5 6 7 8 Cyber security Governance Critical information infrastructure Protection Cyber Security Operations Cyber Skills & Capability Development National Cybersecurity awareness Cyber law / law enforcement National & International Collaboration Cyber Security Policies & Standards Who is steering the national cybersecurity strategy framework And programs. Accountability for all cybersecurity strategy Programs for identification and protection of critical information and infrastructure Systematic response to the incidents Continue to improving CERT capability General and advanced programs to build specialized workforce Capacity Planning & Management General public and sector-specific programs and activities to foster awareness Formalizing of illegality of cyber crime activities in legal framework Sustaining needed skills to identify and enforce regulations (e.g. forensic cap) Research and information sharing with local and foreign entities Alignment with International Standards. Policy & Standards Development. 5

Cyber Security Strategy Key Lessons Learned Cyber security Governance Critical information infrastructure Protection Lead Agency should be found at the highest government level to steward cybersecurity nation-wide Organization should designed based on a comprehensive operating model, roles and automated assessment tools Detailed and resilient architecture with testing and configurations guides for all controls and assets government and critical infrastructure entities need to build up their information assurance capabilities Cyber Security Operations Cyber Skills & Capability Development Cybersecurity awareness 24/7 SOC monitoring of all systems with dedicated CERT response team with expert level training and state of the art tools, National incident response frameworks should integrate into national/sector/entity level context Innovation of security expertise with research and development capabilities. Cyber security awareness is critical to fostering the knowledge Critical information infrastructure Protection Partnerships are formed to promote mainly info. Sharing and incident response coordination Dynamic real-time communications and information sharing 6 Cyber Security Policies & Standards Dynamic policy are regularly reviewed on a periodic basis and have automation of policy dissemination through out the environment

Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts To Enhance Cyber Security Capabilities Libya Cyber Security Initiative 4 Case Studies 5 Filling The Cyber Security Gap In The Region 7

Efforts To Enhance Cyber Security Capabilities ITU Membership endorsed the GCA as the ITU-wide strategy on international cooperation. IMPACT is a capacity building initiatives, joint consultations and more NATO Cooperative Cyber Defense Centre of Excellence is a research and training facility which tries to take a broad look on cyber defense, mixing and matching different areas of research under the cyber umbrella. Results of their work are in a form of research papers, training events and consultations FIRST is a premier organization and recognized global leader in incident response. Membership in FIRST enables incident response teams to more effectively respond to security incidents by providing access to best practices, tools, and trusted communication with member teams. Strengthen the regional cybersecurity posture and increase the number of cybersecurity initiatives and projects. Localize ITU-IMPACT s cybersecurity services to better fit the regional needs and requirements as well as language and cultural requirements. Build and strengthen regional collaboration in cybersecurity issues as well as increase regional information sharing 8

Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts To Enhance Cyber Security Capabilities Libya Cyber Security Initiative 4 Case Studies 5 Filling The Cyber Security Gap In The Region 9

Libya Cyber Security Strategy 2020 NISSA Strategy and Plan 2020 Stage 1 (2013-2014) Stage 2 (2015-2017) Stage 3 (2018-2020) Establish and activate NISSA Create National Cyber security Strategy Preparing Cyber security Regulations and Legislations Create and Establish LY-CERT Bullied NISSA SOC Establish National PKI System Provide Cyber security Awareness program Building capability in cyber security Develop and participate in policy enforcement program Start To Establish Cyber security Training Center to provide training and advisory and Research service in the national Level Provide more Cyber security Awareness program More participating in cyber security in international level Provide more Service in cyber security Help to Develop and Enhance Education program to consider Cyber Security hosted International and Region cyber security conferences and work shop Enhance NISSA cyber security Center to provide service in the Region Establishment Phase Development and Enhancement phase Excellence phase 10

Libya Cyber Security Initiative Program Developing Cyber Security Laws & Legislation National Cybersecurity awareness National Cybersecurity awareness Activity Preperaing the draft of Cyber Law Work shop to discuss the Draft First cyber security conference Libyan Cybersecurity Days Child online Protection Study Status The draft has been completed Completed Completed Cyber Security Operations Building Libya-CERT. Project in progress Cyber Security Strategy Cyber Security Skills & Capability Development SANS Training National & International Collaboration Participate in regional conferences and activities COP Arab group, regional cyber security summit, cyber security Mission to USA 11

Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts To Enhance Cyber Security Capabilities Libya Cyber Security Initiative 4 Case Studies 5 Filling The Cyber Security Gap In The Region 12

Case Studies Government Capability Building Programs Research and Innovation Programs Higher Education Programs USA Multi-level training programs targeting IT roles and responsibilities Expand cyber education Cyber Security Challenge and competition programs Coordinate and redirect research and development (R&D) efforts. Cybersecurity and Communication Integration Center (NCCIC) Technical Trainings / Certifications ISACA, ISO/IEC, SANS, ECH. certifications Australia Government IT support staff training Functional training for IT security Cyber Security Challenge program Research Support for National Security Program Undergraduate Degree BSc in Information Security and Assurance Malaysia Provides competency and professional Training programs Develops curriculum in cyber security for colleges, polytechnics and universities in 2020 Target number of 17,026 professionals Collaboration between Cybersecurity Malaysia and Institute of Higher Learning (IHL) in various comprehensive cyber security modules Graduate Degree MSc in Information security UK Trainings covering incidental security aspects; security as primary responsibility Guidance for education programs UK Cyber Security Challenge program Network Security Innovation Platform The Global Cyber Security Capacity Centre Undergraduate Degree Cyber security policy; digital forensics; HW security, asymmetric security, internet and cloud security, etc. 13

Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts To Enhance Cyber Security Capabilities Libya Cyber Security Initiative 4 Case Studies 5 Filling The Cyber Security Gap In The Region 14

Where Do We Stand Cyber security capability is a key factor to enhancing GCI Legal Measures Cooperation Technical Measures Capacity Building Organizational Measures 15

Filling The Gap-Building The Competence Develops curriculum in cyber security for colleges and universities to build expertise Developing cyber security curriculum with Arabic content for students in primary and secondary school Provides competency and professional Training programs Developing and encouraging of E-learning, free online training or with affordable price Organize regular Regional cyber security conferences aiming to raise awareness and improve cyber security state 16

Online Academies And Universities is a joint venture by MIT and Harvard to offer their courses online to a worldwide audience, for free. The courses are not for credit, but the plan is to eventually award certificates of completion to students. The site launched in the fall of 2012. is a free online education platform that features over 200 courses from 33 universities worldwide The site was launched in April 2012 by Andrew Ng and Daphne Koller, who were Stanford University computer science professors. is an online learning platform where experts teach courses on a variety of subjects. Some courses are free, while others are feebased, with prices ranging from $5 to $250.. provides free online education with a wide range of courses. Launched in 2006 by the educator, Salman Khan, the site now contains over 3,400 lectures is a leading online learning company that helps anyone learn business, software, technology and creative skills to achieve personal and professional goals. A free online site offering lessons on how to code. Is a SecurityTube.net initiative aims at revolutionizing the InfoSec training space. People can access to a huge library of InfoSec training 17

Filling The Gap-Enhancing The Practice Expansion of national certifications in cyber security Regulatory and policy maker should emphasizing the cyber security standard Improve and increase the number of awareness programs Increase the number of National and Regional Cyber Security Exercises Attracting talented people through running cyber security competition programs national and regional Establish partnerships with the local and international academia to advance cyber security Establish partnerships with the private sector, involving it in building the nation-wide cyber security capability Cover the cyber security needs of the various industries (i.e. financial services, energy, utilities, healthcare, transport, aviation, etc.) 18