Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net



Similar documents
How To Write An Article On The European Cyberspace Policy And Security Strategy

The European Response to the rising Cyber Threat

Cyber-Security. FAS Annual Conference September 12, 2014

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification

Prof. Udo Helmbrecht

Cyber Security - What Would a Breach Really Mean for your Business?

The UK cyber security strategy: Landscape review. Cross-government

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

Mitigating and managing cyber risk: ten issues to consider

How To Understand And Understand The European Priorities In Information Security

How To Discuss Cybersecurity In European Parliament

Professor John McCanny CBE FRS FREng

Security in the Cloud an end to end Problem

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cybersecurity and the Romanian business environment in the regional and European context

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Cloud and Critical Information Infrastructures

CYBER-ATTACKS THE GLOBAL RESPONSE

Cyberspace Situational Awarness in National Security System

Information Sharing Use Cases

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

CYBER SECURITY Audit, Test & Compliance

Address C-level Cybersecurity issues to enable and secure Digital transformation

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cybercrime in the Automotive Industry How to improve your business cyber security

Horizon 2020 Secure Societies

U. S. Attorney Office Northern District of Texas March 2013

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA

Overall, which types of fraud has your organisation experienced in the past year?

OECD PROJECT ON CYBER RISK INSURANCE

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

The internet and digital technologies play an integral part

CYSPA - EC projects supporting NIS

Cyber security initiatives in European Union and Greece The role of the Regulators

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

National Cyber Security Policy -2013

THE WORLD IS MOVING FAST, SECURITY FASTER.

Digital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

CYBER SECURITY SERVICES PWNED

Identity & Privacy Protection

On the European experience in critical infrastructure protection

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Top Fraud Trends Facing Financial Institutions

OUTCOME OF PROCEEDINGS

Cybersecurity Strategy of the Republic of Cyprus

Future cybersecurity threats and research needs.

EU policy on Network and Information Security and Critical Information Infrastructure Protection

Protecting Malaysia in the Connected world

WHAT S ABOUT CYBERSECURITY, WP

Helping to protect your business and your customers in the event of a data breach

Into the cybersecurity breach

Cyber Security Related Excerpts from the Global Risk Forum Berlin September 25-26, 2013 Draft 10/24/13

Data Security on Every Network Layer. Internet Security Days 2015, Phantasialand Brühl ADVA Optical Networking SE

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

Bellevue University Cybersecurity Programs & Courses

Who s next after TalkTalk?

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Horizon 2020 Secure Societies

National Cyber Security Strategy

Achieving Global Cyber Security Through Collaboration

Cyber security in an organization-transcending way

Unit 3 Cyber security

The Cancer Running Through IT Cybercrime and Information Security

THE HUMAN COMPONENT OF CYBER SECURITY

Developments in cybercrime and cybersecurity

Cyber Security in EU: ENISA approach

Cybersecurity. Are you prepared?

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

A COMPLETE APPROACH TO SECURITY

Cyber Security in the University of Oxford: Collaborating without Conforming?

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Developing Secure Software in the Age of Advanced Persistent Threats

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together.

Cyber Security for Railway Signalling

Cyber Security and Cyber Warfare: The EU approach and experience Prof. Claudio CILLI CIA, CISA, CISSP, CISM, CSSLP, CRISC, CGEIT, M.Inst.

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

How To Protect Your Organisation From A Phishing Attack

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

ESKISP Conduct security testing, under supervision

Cybersecurity The role of Internal Audit

PCI DSS Payment Card Industry Data Security Standard. Merchant compliance guidelines for level 4 merchants

Honourable members of the National Parliaments of the EU member states and candidate countries,

Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues. Palace Hotel Saigon, HCMC, November 19 th 2014

The RFID agenda of the European Commission. Florent Frederix European Commission Directorate General Information Society and Media

Certified Cyber Security Analyst VS-1160

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

Transcription:

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 612345.

EU Project MAPPING 1. Mapping the Internet. 4 years. 13 partners 2. Focus on Internet Governance, privacy and trust 3. Legal and Technical groups 4. For more information: www.mappingtheinternet.eu 5. The goal of MAPPING (Managing Alternatives for Privacy, Property and Internet Governance) is to create an all-round and common understanding of the many and varied economic, social, legal and ethical aspects of the recent developments on the Internet, and their consequences for the individual and society at large. 6. Building on the results of several EU FP7 projects including CONSENT (covering on-line consent and privacy in social networks www.consent.law.muni.cz), SMART (www.smartsurveillance.eu) and RESPECT (http://respectproject.eu). 7. Investigate and debate the existing innovation policies, business models and legal framework related to the implementation of the Digital Agenda for Europe and the changes needed to set up an improved governance structure for the EU innovation ecosystem. 2

EU Cyber Security Strategy - 28 Feb 14 V-P Kroes Democracy must talk to technology. We are making a transition to a data driven world About simple things, people trusting that their personal data is protected, SMEs understanding cloud protection, citizen understanding eid. Without security there is no privacy. Cyber breaches happen for multiple reasons. Over 3/4 of SMEs and 93% businesses suffered at least one breach, each costing up to 50M euros. Merkel call for secure EU network. Central to our competitiveness, single digital market, strengthen security of services, no to data protectionism and yes to data protection. We want to use big data. Trust is key. Weak link is the whole network, weak directive will let us down. Cyber security strategy is providing the right building blocks. Strong cyber security domain is important to Europe. Without it, democracy would fail to manage technology. Make EU the safest place for digital. MACCSA proprietary - info@maccsa.net

Top Threat ID Fraud ID Fraud = a top EU crime enabler McAfee: $1 trillion/year cybercrime (rising $2 trl) UK fraud > 73bn EU fraud > 500bn If we are not winning, we must be losing MACCSA proprietary - info@maccsa.net 4

Increasing Attack Surface More users More devices internet of things Just Surface Web.add More mobile Deep web More cloud(s?) Dark Web More BYO Disaster More sensitivity my info, health More critical systems smart metering, big data Weak cyber borders >> internet governance under strain Increasing expectations and temptations unwise decisions UK 50M smart meters by 2020 in 30M buildings (HMG) 76% of financially active organisations in UK are not registered in UK or at all (& can t tell the difference). (HMG) 65% of IP theft is by insiders (SANS) Organised crime expanding online - UK Operation FALCON

Reactions More regulations and directives EU eid Authentication (digital) Signature (eidas) (now) EU Cybersecurity Framework <> NATO CDAP EU Network Information Security Directive (mid 2015) banks, energy, transport, health (telco) Information sharing, incident notification, collaborative risk EU Network Information Security Platform US Exec Order 13636 Cybersecurity Framework US Pres Policy Directive 21 Information Sharing UK Cyber Essentials mandated for HMG suppliers More surveillance concerns More privacy pressures More disruption cryptocurrencies, hawala More pressures on Internet governance More demand for collaborative trust between parties 6 MACCSA proprietary - info@maccsa.net

Collaborate to Compete Organisation A Organisation B Business World Competition Collaboration Process Information Application Data Infrastructure Process Information Application Data Infrastructure Cyber world collaborates to support normal Business use of cyberspace Cyber World Competition Collaboration Node A Process Information Application Data Node B Process Information Application Data Infrastructure 7 Infrastructure

Highlights - Big Picture Building the Wall Click Collaborative Crisis Management Collaborative Cyber SA Incident Counter-fraud EU NISD NIS Platform Incident Notification Risk Assessment Risk Treatment Risk Transfer Cyber insurance models Managed risk Risk Mitigation Assessment tools Approved assessors International Standards ISO, EU Cyber controls frameworks Assurance Schemes MACCSA is enabling in every area plus development of: New capabilities New data sources and registers Federated ID & Access Red team/ serious games

CCSA & Incident Click Management Collaborative Crisis Management Collaborative Cyber SA Hubs & Nodes Incident Counter-fraud 1. Identify 2. Protect 3. Detect 4. Respond 5. Recover Intel led Layered proactive defence Rumsfeld-based Federated ID & access Cyber controls frameworks Taxonomies & Automation Red team/ serious games ROLO OrgID registers PANCRAS Defeat fake docs and products Others Triage & Analysis Processes Priority Info Requirements