NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security



Similar documents
Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber Security Information Exchange

OUTCOME OF PROCEEDINGS

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

A Cyber Security Integrator s perspective and approach

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

Internet Safety and Security: Strategies for Building an Internet Safety Wall

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

Hybrid Warfare & Cyber Defence

Information security controls. Briefing for clients on Experian information security controls

Thales Service Definition for PSN Secure Gateway Service for Cloud Services

How To Understand And Understand The European Priorities In Information Security

Cyber Security solutions

2 Gabi Siboni, 1 Senior Research Fellow and Director,

The EU s approach to Cyber Security and Defence

Code of Practice for Cyber Security in the Built Environment

CYBER SECURITY Audit, Test & Compliance

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

How to Make RAM Part of the Business Process

JOB DESCRIPTION CONTRACTUAL POSITION

Career proposition for software developers and web operations engineers

Cyber security Building confidence in your digital future

RUAG Cyber Security. More security for your data

The Next Generation of Security Leaders

Managing Cyber Risk through Insurance

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

Information Technology Strategic Plan

National Cyber Security Policy -2013

(BDT) BDT/POL/CYB/Circular

CyberSecurity Solutions. Delivering

HMG Security Policy Framework

The Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

How To Write An Article On The European Cyberspace Policy And Security Strategy

Committees Date: Subject: Public Report of: For Information Summary

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public

How To Manage Risk On A Scada System

Address C-level Cybersecurity issues to enable and secure Digital transformation

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

Department of Management Services. Request for Information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI

NICE and Framework Overview

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

ISO27032 Guidelines for Cyber Security

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

CBEST FAQ February 2015

Nine Steps to Smart Security for Small Businesses

Executive Management of Information Security

Technology and Cyber Resilience Benchmarking Report December 2013

Agency for State Technology

JOB PROFILE. For more detailed information about Internal Affairs, go to our website:

Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB enquiries@bluefire-uk.com

Technology Strategy April 2014

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

Executive Cyber Security Training. One Day Training Course

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Scope The data management framework must support industry best practice processes and provide as a minimum the following functional capability:

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Italy. EY s Global Information Security Survey 2013

CYBER SECURITY TRAINING SAFE AND SECURE

Cyber Security Competency Center

University of Sunderland Business Assurance Information Security Policy

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

Growth Through Excellence

External Supplier Control Requirements

MANAGED SECURITY SERVICES (MSS)

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Procuring Penetration Testing Services

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.

ICA60211 Advanced Diploma of Network Security

Cyberspace Strategic Impact Social Risk Management. Cyber Security and Cyber Defence. Cyber Defense: NATO Vision

Master of Science in Cyber Security and Management

Roles & Grades Rate Cards and Applicable SFIA Skills

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Transcription:

1

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations Ian J West Chief, Cyber Security Ian.west@ncia.nato.int 2 NATO UNCLASSIFIED

Cyber Security Service Line Ian West Chief, Cyber Security Cyber Security Service Line Dag Wilhelmsen Director, Infrastructure Services Director of Transition CS Coherence CS Capability Development CS Operations CS Compliance and Audit CS Service Line Management Accreditation Support Capability Design Security Incident Management COMPUSEC Compliance Policy Support Engineering and Transition CS Operations COMSEC Compliance CS Project Management Office CS Technical Services Design Transition Operate

Cyber Security Service Line - Advantages of Consolidation - Horizontal and vertical integration: of Cyber Security, embedded into all Agency Service Lines and structure Lifecycle approach: Less duplication and efficient use of deep, specialised expertise throughout requirement analysis, development, operational use and decommission phases Promotes security by design One-stop-shop for stakeholders Synergies of operators and developer alignment Operator requirements are understood by developers Development potential is understood by operators NATO UNCLASSIFIED

Cyber Threats Global: Viruses and Malware Specific: Targeted Attacks against NATO Organised Crime Cyber Espionage Hacktivism Website defacements User violations 5 NATO UNCLASSIFIED

Multinational Cyber Defence Capability Development (MN CD2) Programme 5 participating Nations (CAN, DNK, NLD, NOR and ROU) supported by the NCI Agency WP1 Technical Information Sharing: Aims at delivering a platform facilitating the exchange of information related to cyber incidents between national Computer Security Incident Response Teams (CSIRT). WP2 Situational Awareness: Aims at delivering a cyber visualization system for cyber networks operators. WP3 Distributed Multi-sensor Collection and Correlation Infrastructure: Aims at delivering architectures and solutions to counter the threat of advanced malware. Business Opportunities: consultancy support, software development, solution integration Key Project Data Project Name: MN CD2 Funding Range: 1-2 M Timeline: 2014-2016 POC: Mr Frederic Jordan Phone: +31 70 374 3486 Email: Frederic.Jordan@ncia.nato.int 6 NATO UNCLASSIFIED

Cyber Security Data Exchange and Collaboration Infrastructure (CDXI) CDXI concept developed under NATO s Transformation Programme of Work CDXI has 3 objectives: Facilitate information sharing Enable automation Facilitate the generation, refinement and vetting of cyber security data through burdensharing collaboration and outsourcing Prime candidate for the next Cyber Defence Capability Package Business Opportunities: software development, solution integration, level 1 and 2 maintenance support, development of training package Key Project Data Project Name: CDXI Funding Range: 6-8 M Timeline: 2016-2018 POC: Mr Frederic Jordan Phone: +31 70 374 3486 Email: Frederic.Jordan@ncia.nato.int 7 NATO UNCLASSIFIED

Support to Cyber Security R&D activities Support various activities conducted under NATO s Transformation Programme of Work in the area of: Cyber Defence resilience Malware analysis on the Wire Insider threat risk mitigation Cyber Defence Education and Training Mobile Device Security Cloud based security protection Cyber Decision Decision Support System Business Opportunities: consultancy support, technology assessment, support to concept development and validation Key Project Data Project Name: ACT POW Funding Range: 2-3M Timeline: 2014-2017 POC: Mr Frederic Jordan Phone: +31 70 374 3486 Email: Frederic.Jordan@ncia.nato.int 8 NATO UNCLASSIFIED

NATO PKI (NPKI) Enterprise Architecture approach validated by the NATO Resource Community Will provide key enabling security technology in support of: Identity Federation, Community of Interest Separation, Non-Repudiation, Integrity services. Strong dependencies with all major infrastructure programmes (e.g. ITM, NNHQ). Business Opportunities: PKI architecture design and implementation, level 1 and 2 maintenance support, development of training package Key Project Data Project Name: NATO Public Key Infrastructure Funding Range: 12M Timeline: IFB Release Q4 2014 POC: Mr Frederic Jordan Phone: +31 70 374 3486 Email: Frederic.Jordan@ncia.nato.int 9 NATO UNCLASSIFIED

Are we there yet? NCIRC FOC is not the end - it s a journey: evolving threats changing technology 10 NATO UNCLASSIFIED

What s next for Cyber Security? Develop second phase of the NCIRC FOC project: Alternate Capability Complete the CD Decision and Support System NCI Agency working with partners to develop a continuous cyber resilience programme to: Anticipate threats Prevent attacks Detect incidents, internal and external Recover from successful attacks Investigate incidents Extend NCIRC coverage to unprotected and deployed sites Improved cyber resilience and recovery capacity Improve business continuity planning 11 NATO UNCLASSIFIED

Securing the NATO Enterprise 2020 - Collective Defence in Cyberspace - 16-18 September 2014, Mons EXPO The symposium of choice for 1000+ Cyber Security professionals: High-level strategic briefings from senior NATO and Industry cyber experts Deeper-diving specialist tracks covering all cyber security issues Valuable and intimate networking opportunities with Industry, Civil and Military ICT, Cyber Security and Network professionals www.nias2014.com www.nias2014.com www.nias2014.com www.nias2014.com 12 1000+ delegates 80+ vendors

ian.west@ncia.nato.int NATO UNCLASSIFIED 13