SlideShare a Scribd company logo
1 of 16
Download to read offline
Why the Private Sector is Key to
Cyber Defence
Gareth Niblett, Chairman, BCS ISSG

18th May 2010
About your Speaker


Overview
Chairman of the BCS ISSG, a security specialist group      Recent Collaborative Efforts:
with over 3,500 members from BCS, the Chartered            BCS Security Community of Expertise
Institute for IT, where he is involved in a number of      British Business Federation Authority
initiatives focused on improving security and safety.       (BBFA)
Currently working as a managing consultant providing       Centre for the Protection of National
business advisory services and solutions focussed on        Infrastructure (CPNI) sponsored UK
security, privacy and compliance, especially in relation    Network Security Information
to communications and online services.                      Exchange (NSIE)
                                                           Electronic Communications Resilience
Previously Chief Information Security Officer (CISO) of     & Response Group (EC-RRG)
a national communications and IT services company
                                                           EURIM e-Crime Working Group
where he had group wide responsibility for all aspects
of information security, participating in government and   Internet Watch Foundation (IWF)
                                                             Funding Council
industry forums focussed on infrastructure protection,
emergency services, resilience and response, internet      Network Interconnection Consultative
safety, next generation network assurance and secure        Committee (NICC) Security Group
network interoperability.                                  999/112 Liaison Committee


                                                                              Presentation to Cyber Defence 2010   2
01
Critical National Infrastructure (CNI)
What is critical and why
What is Critical National Infrastructure?


Critical National Infrastructure (CNI) is the   Overview of CNI Sectors
collective term for those services that are
                                                 Communications
essential to the economic, social and




                                                                                      Critical National Infrastructure
political wellbeing of a country.                Emergency Services

CNI can be categorised into 10 sectors:          Energy
communications, emergency services,              Finance
energy, finance, food, government and
                                                 Food
public services, health, public safety,
transport and water.                             Gov. & Public Services
                                                 Health
   Not everything is critical
                                                 Public Safety
   Each sector is different                     Transport
   Many sectors privately held                  Water

                                                              Presentation to Cyber Defence 2010                         4
Why are these Sector Critical?


Without Communications, your telephones (fixed and mobile) and
Internet access stops working properly; you become unable to call, fax,
text, e-mail, browse or otherwise transfer information.
Without Energy, your home goes dark, you can’t get online, although
your telephone may work (while the telcos’ batteries / generator hold out),
you can’t get fuel for your vehicle or home, business start shutting down.
Without Finance, your bank account and card stops working, so you
can’t withdraw cash, buy groceries, pay for fuel / travel, or pay bills.
Finance relies on Communications for transfers, online & phone banking.
And so on…
Critical National Infrastructure is a complex web of vital interdependent
services, which are all dependent on technology, creating new risks.


                                                              Presentation to Cyber Defence 2010   5
02
Why the Private Sector is Critical
Or, why governments can’t just do it themselves
Why rely on the Private Sector?


Governments no longer own and control significant portions of their
country’s critical national infrastructure. This varies by country but is a
growing trend, due to consolidation and globalisation. Also, critical
infrastructure now crosses borders and may be under foreign control.
Companies once government owned may have been privatised and are
now outside of direct government control; or companies that may never
have been under government control in the past, being independent
commercial venture, have become critical to a nation’s infrastructure.
As with every rule there are exceptions and complications. Even with
partial government control of a business, such as when there has been a
financial bailout or the sector is strictly regulated, governments may still
struggle to deal with CNI issues without clear rules and co-operation.



                                                                Presentation to Cyber Defence 2010   7
Private Sector is Key to Cyber Defence


If online government & banking services start collapsing under a deluge
of sustained access attempts coming from thousands of worldwide
sources, it would take international co-ordinated effort, between finance,
government and communications to identify and mitigate the threat.
If a leading global search engine and dozens of other leading businesses
are extensively compromised, possibly by a foreign intelligence service,
exposing sensitive company and customer information, including trade
secrets and source code, surely governments might be interested.
If a national power grid uses legacy SCADA systems, now connected
internally via IP, that may be susceptible to exploitation via the Internet by
foreign nationals then this exposure is of interest not only to government
but to all the other sectors of critical national infrastructure.
And so on…

                                                               Presentation to Cyber Defence 2010   8
03
Information Sharing
Government, industry and cross-sector collaboration
Why is Information Sharing Important?


Sharing information about the risks facing critical national infrastructure is
beneficial to both government and industry. If each parties can privately
learn from the experiences, mistakes, and successes of each other, then
they can all improve their level of assurance.
No government, sector or company can operate in isolation in the
modern, interconnected and dependent world. Without information
sharing, it may not be possible to find out about risks whose impacts may
affect you; therefore you are unable to adequately protect or prepare.
Companies will be reticent in sharing commercially sensitive information
without a similar reciprocal arrangement. If government does not engage
in a positive two-way dialogue with the private sectors that form part of
CNI then they are likely to be unaware of all the risks facing the country.



                                                                Presentation to Cyber Defence 2010   10
How does Information Sharing occur?


Public Education – publication of information security standards, user
awareness, education campaigns, threat assessments (warning levels)
Private Advice – restricted information on physical, personnel and
electronic threats and vulnerabilities along with mitigation approaches
Information Exchanges – trusted government & sector representatives
sharing sensitive info on threats, vulnerabilities, incidents and intelligence
Standards Development – collaborative working to define standards for
information assurance, e.g. in Next Generation Networks (NGNs)
Policy Development – arrangements to help ensure security, such as
staff vetting and procurement rules for critical components and services
Planning Exercises – joint government / industry crisis workshop
looking at complex scenarios, e.g. loss of power and / or communications


                                                                Presentation to Cyber Defence 2010   11
04
Private Sector Support
How assistance is given to cyber defence & investigations
What Support does Private Sector give?


Example: in many countries the communications sector has been
privatised and opened up to competition, but it regulated and is generally
co-operative to lawful requests and supporting CNI. It is often best placed
to support efforts in cyber defence through a variety of routes, such as:
Lawful Interception – targeting content of voice & data communications
Data Retention & Disclosure – communications related data records
Filtering Illegal Content – blocking or removing child sexual abuse
images, terrorism material, defamatory or inciting statements etc.
Filtering Unwanted Content – spam, phishing, malware, DDoS etc.
Online Investigations – hacking, botnets, copyright infringement etc.
Infrastructure Protection – building and operating to secure standards
Resilience & Response – robust networks but responsive to incidents
                                                             Presentation to Cyber Defence 2010   13
05
Lessons Learned
What events have taught us about improving collaboration
How can we Improve Things?


Countries need to recognise that government does not own all of CNI
and that they cannot provide adequate cyber defence in isolation.
More effort required to establish effective Public-Private Partnerships,
both nationally and internationally – with a focus on consistency.
Information sharing must be two-way and include information that is
not, and should not be, in the public domain to be of significant benefit.
Joint exercises simulating response to realistic scenarios with a large
scale impact on CNI – business continuity plan testing at a national scale.
Planning will not highlight all the things that will occur in a real event, be it
a physical terrorist attack, or an online cyber attack – a flexible and agile
defence is needed. This can only be achieved through collaboration
between governments and the private sector that forms much of CNI.


                                                                  Presentation to Cyber Defence 2010   15
And Finally…



Questions welcome, either now or later.

More of me:
 Blog: http://www.infosecmaven.org/
 Twitter: http://twitter.com/INFOSEC_Maven
 LinkedIn: http://uk.linkedin.com/in/garethniblett

 If you want direct contact details, please ask…

                                           Presentation to Cyber Defence 2010   16

More Related Content

What's hot

News letter april 11
News letter april 11News letter april 11
News letter april 11captsbtyagi
 
CTO Annual Report 2009-10
CTO Annual Report 2009-10CTO Annual Report 2009-10
CTO Annual Report 2009-10segughana
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberIGF Indonesia
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioJLL
 
Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)JNicholson
 
John Nicholson Presentation
John Nicholson PresentationJohn Nicholson Presentation
John Nicholson PresentationMediabistro
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Mwando
 
Sector Focus; Information Technology; Issue 1 February 2010
Sector Focus; Information Technology; Issue 1   February 2010Sector Focus; Information Technology; Issue 1   February 2010
Sector Focus; Information Technology; Issue 1 February 2010kapil_arora
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation HubsMestizo Enterprises
 
PwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO ReprintPwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO ReprintKim Jensen
 
IDG Public Sector Brochure in 2013
IDG Public Sector Brochure in 2013IDG Public Sector Brochure in 2013
IDG Public Sector Brochure in 2013Annie Hoang
 
Cnil 35th activity report 2014
Cnil 35th activity report 2014Cnil 35th activity report 2014
Cnil 35th activity report 2014Market iT
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)ictseserv
 
Seserv concertation-01
Seserv concertation-01Seserv concertation-01
Seserv concertation-01ictseserv
 
Cyber Vardzia - An in-depth analysis of Integrated Physical and Cyber Securit...
Cyber Vardzia - An in-depth analysis of Integrated Physical and Cyber Securit...Cyber Vardzia - An in-depth analysis of Integrated Physical and Cyber Securit...
Cyber Vardzia - An in-depth analysis of Integrated Physical and Cyber Securit...Dr David Probert
 
Cyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transportCyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transportAndrey Apuhtin
 
ID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionIGF Indonesia
 

What's hot (20)

News letter april 11
News letter april 11News letter april 11
News letter april 11
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
CTO Annual Report 2009-10
CTO Annual Report 2009-10CTO Annual Report 2009-10
CTO Annual Report 2009-10
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolio
 
Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)Privacy And Security Laws For Sm And Lbs (110120)
Privacy And Security Laws For Sm And Lbs (110120)
 
John Nicholson Presentation
John Nicholson PresentationJohn Nicholson Presentation
John Nicholson Presentation
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
Sector Focus; Information Technology; Issue 1 February 2010
Sector Focus; Information Technology; Issue 1   February 2010Sector Focus; Information Technology; Issue 1   February 2010
Sector Focus; Information Technology; Issue 1 February 2010
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs
 
PwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO ReprintPwC Survey 2010 CIO Reprint
PwC Survey 2010 CIO Reprint
 
IDG Public Sector Brochure in 2013
IDG Public Sector Brochure in 2013IDG Public Sector Brochure in 2013
IDG Public Sector Brochure in 2013
 
Cnil 35th activity report 2014
Cnil 35th activity report 2014Cnil 35th activity report 2014
Cnil 35th activity report 2014
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
Seserv concertation-01
Seserv concertation-01Seserv concertation-01
Seserv concertation-01
 
Cyber Vardzia - An in-depth analysis of Integrated Physical and Cyber Securit...
Cyber Vardzia - An in-depth analysis of Integrated Physical and Cyber Securit...Cyber Vardzia - An in-depth analysis of Integrated Physical and Cyber Securit...
Cyber Vardzia - An in-depth analysis of Integrated Physical and Cyber Securit...
 
Cyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transportCyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transport
 
ID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship Transition
 

Similar to Why the Private Sector is Key to Cyber Defence

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkETDAofficialRegist
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomySettapong_CyberSecurity
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-statusRama Reddy
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityCharles Mok
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCandice Tang
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfVikashSinghBaghel1
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copysmita mitra
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexShivamSharma909
 

Similar to Why the Private Sector is Key to Cyber Defence (20)

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Io t whitepaper_5_15_17
Io t whitepaper_5_15_17Io t whitepaper_5_15_17
Io t whitepaper_5_15_17
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 

More from Gareth Niblett

Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)Gareth Niblett
 
BCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsBCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsGareth Niblett
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsGareth Niblett
 
BCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber ResponseBCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber ResponseGareth Niblett
 
BCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, SecureBCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, SecureGareth Niblett
 
BCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share SecurelyBCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share SecurelyGareth Niblett
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityGareth Niblett
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsGareth Niblett
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionGareth Niblett
 
BCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessBCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessGareth Niblett
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnGareth Niblett
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertGareth Niblett
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletGareth Niblett
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityGareth Niblett
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationGareth Niblett
 
RIPA: Perception and Practice
RIPA: Perception and PracticeRIPA: Perception and Practice
RIPA: Perception and PracticeGareth Niblett
 

More from Gareth Niblett (16)

Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)
 
BCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsBCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest Threats
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider Threats
 
BCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber ResponseBCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber Response
 
BCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, SecureBCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, Secure
 
BCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share SecurelyBCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share Securely
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic Security
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 Threats
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
 
BCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessBCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk Business
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going On
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay Alert
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver Bullet
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber Innovation
 
RIPA: Perception and Practice
RIPA: Perception and PracticeRIPA: Perception and Practice
RIPA: Perception and Practice
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Why the Private Sector is Key to Cyber Defence

  • 1. Why the Private Sector is Key to Cyber Defence Gareth Niblett, Chairman, BCS ISSG 18th May 2010
  • 2. About your Speaker Overview Chairman of the BCS ISSG, a security specialist group Recent Collaborative Efforts: with over 3,500 members from BCS, the Chartered BCS Security Community of Expertise Institute for IT, where he is involved in a number of British Business Federation Authority initiatives focused on improving security and safety. (BBFA) Currently working as a managing consultant providing Centre for the Protection of National business advisory services and solutions focussed on Infrastructure (CPNI) sponsored UK security, privacy and compliance, especially in relation Network Security Information to communications and online services. Exchange (NSIE) Electronic Communications Resilience Previously Chief Information Security Officer (CISO) of & Response Group (EC-RRG) a national communications and IT services company EURIM e-Crime Working Group where he had group wide responsibility for all aspects of information security, participating in government and Internet Watch Foundation (IWF) Funding Council industry forums focussed on infrastructure protection, emergency services, resilience and response, internet Network Interconnection Consultative safety, next generation network assurance and secure Committee (NICC) Security Group network interoperability. 999/112 Liaison Committee Presentation to Cyber Defence 2010 2
  • 3. 01 Critical National Infrastructure (CNI) What is critical and why
  • 4. What is Critical National Infrastructure? Critical National Infrastructure (CNI) is the Overview of CNI Sectors collective term for those services that are Communications essential to the economic, social and Critical National Infrastructure political wellbeing of a country. Emergency Services CNI can be categorised into 10 sectors: Energy communications, emergency services, Finance energy, finance, food, government and Food public services, health, public safety, transport and water. Gov. & Public Services Health  Not everything is critical Public Safety  Each sector is different Transport  Many sectors privately held Water Presentation to Cyber Defence 2010 4
  • 5. Why are these Sector Critical? Without Communications, your telephones (fixed and mobile) and Internet access stops working properly; you become unable to call, fax, text, e-mail, browse or otherwise transfer information. Without Energy, your home goes dark, you can’t get online, although your telephone may work (while the telcos’ batteries / generator hold out), you can’t get fuel for your vehicle or home, business start shutting down. Without Finance, your bank account and card stops working, so you can’t withdraw cash, buy groceries, pay for fuel / travel, or pay bills. Finance relies on Communications for transfers, online & phone banking. And so on… Critical National Infrastructure is a complex web of vital interdependent services, which are all dependent on technology, creating new risks. Presentation to Cyber Defence 2010 5
  • 6. 02 Why the Private Sector is Critical Or, why governments can’t just do it themselves
  • 7. Why rely on the Private Sector? Governments no longer own and control significant portions of their country’s critical national infrastructure. This varies by country but is a growing trend, due to consolidation and globalisation. Also, critical infrastructure now crosses borders and may be under foreign control. Companies once government owned may have been privatised and are now outside of direct government control; or companies that may never have been under government control in the past, being independent commercial venture, have become critical to a nation’s infrastructure. As with every rule there are exceptions and complications. Even with partial government control of a business, such as when there has been a financial bailout or the sector is strictly regulated, governments may still struggle to deal with CNI issues without clear rules and co-operation. Presentation to Cyber Defence 2010 7
  • 8. Private Sector is Key to Cyber Defence If online government & banking services start collapsing under a deluge of sustained access attempts coming from thousands of worldwide sources, it would take international co-ordinated effort, between finance, government and communications to identify and mitigate the threat. If a leading global search engine and dozens of other leading businesses are extensively compromised, possibly by a foreign intelligence service, exposing sensitive company and customer information, including trade secrets and source code, surely governments might be interested. If a national power grid uses legacy SCADA systems, now connected internally via IP, that may be susceptible to exploitation via the Internet by foreign nationals then this exposure is of interest not only to government but to all the other sectors of critical national infrastructure. And so on… Presentation to Cyber Defence 2010 8
  • 9. 03 Information Sharing Government, industry and cross-sector collaboration
  • 10. Why is Information Sharing Important? Sharing information about the risks facing critical national infrastructure is beneficial to both government and industry. If each parties can privately learn from the experiences, mistakes, and successes of each other, then they can all improve their level of assurance. No government, sector or company can operate in isolation in the modern, interconnected and dependent world. Without information sharing, it may not be possible to find out about risks whose impacts may affect you; therefore you are unable to adequately protect or prepare. Companies will be reticent in sharing commercially sensitive information without a similar reciprocal arrangement. If government does not engage in a positive two-way dialogue with the private sectors that form part of CNI then they are likely to be unaware of all the risks facing the country. Presentation to Cyber Defence 2010 10
  • 11. How does Information Sharing occur? Public Education – publication of information security standards, user awareness, education campaigns, threat assessments (warning levels) Private Advice – restricted information on physical, personnel and electronic threats and vulnerabilities along with mitigation approaches Information Exchanges – trusted government & sector representatives sharing sensitive info on threats, vulnerabilities, incidents and intelligence Standards Development – collaborative working to define standards for information assurance, e.g. in Next Generation Networks (NGNs) Policy Development – arrangements to help ensure security, such as staff vetting and procurement rules for critical components and services Planning Exercises – joint government / industry crisis workshop looking at complex scenarios, e.g. loss of power and / or communications Presentation to Cyber Defence 2010 11
  • 12. 04 Private Sector Support How assistance is given to cyber defence & investigations
  • 13. What Support does Private Sector give? Example: in many countries the communications sector has been privatised and opened up to competition, but it regulated and is generally co-operative to lawful requests and supporting CNI. It is often best placed to support efforts in cyber defence through a variety of routes, such as: Lawful Interception – targeting content of voice & data communications Data Retention & Disclosure – communications related data records Filtering Illegal Content – blocking or removing child sexual abuse images, terrorism material, defamatory or inciting statements etc. Filtering Unwanted Content – spam, phishing, malware, DDoS etc. Online Investigations – hacking, botnets, copyright infringement etc. Infrastructure Protection – building and operating to secure standards Resilience & Response – robust networks but responsive to incidents Presentation to Cyber Defence 2010 13
  • 14. 05 Lessons Learned What events have taught us about improving collaboration
  • 15. How can we Improve Things? Countries need to recognise that government does not own all of CNI and that they cannot provide adequate cyber defence in isolation. More effort required to establish effective Public-Private Partnerships, both nationally and internationally – with a focus on consistency. Information sharing must be two-way and include information that is not, and should not be, in the public domain to be of significant benefit. Joint exercises simulating response to realistic scenarios with a large scale impact on CNI – business continuity plan testing at a national scale. Planning will not highlight all the things that will occur in a real event, be it a physical terrorist attack, or an online cyber attack – a flexible and agile defence is needed. This can only be achieved through collaboration between governments and the private sector that forms much of CNI. Presentation to Cyber Defence 2010 15
  • 16. And Finally… Questions welcome, either now or later. More of me: Blog: http://www.infosecmaven.org/ Twitter: http://twitter.com/INFOSEC_Maven LinkedIn: http://uk.linkedin.com/in/garethniblett If you want direct contact details, please ask… Presentation to Cyber Defence 2010 16