SlideShare uma empresa Scribd logo
1 de 21
1
unclassified
Dr Paulo Empadinhas
Head of Administration & Stakeholders Relations
European Union Agency for
Network & Information Security
4th November 2016
www.CyberRescue.co.uk
ENISA – lessons for CEOs
on how to respond to attack
European Union Agency for Network and Information Security
ENISA - Lessons for CEOs on how to
respond to a cyber attack
Dr Paulo Empadinhas | Head of Administration & Stakeholders Relations
CEOS& CYBER RECOVERY | Athens | 04 November 2016
3
• “Strategies for Incident Response and Cyber
Crisis Cooperation”
- Link to the document:
https://www.enisa.europa.eu/publications/strateg
ies-for-incident-response-and-cyber-crisis-
cooperation
• Prepared by ENISA as input for discussion for
the Network and Information Security (NIS)
Platform
- Link to the platform:
https://resilience.enisa.europa.eu/nis-platform
• Core material developed based on previous
ENISA work in the field of
- CSIRTs
- Critical Information Infrastructure Protection (CIIP)
• Version 1.1 of August 2016 contains some
updates in the light of the NIS Directive
Background information
Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
4
Basics definitions and
overview of incident
response capabilities
Main topics
Incident response
mechanismsChallenges in incident
response
Ways of enhancing
incident handling
cooperation
Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
Incident response in
cyber security strategies
5
• Basics definitions, such as:
- Cyber/information security incident
- Computer Security Incident Response Team (CSIRT), including CSIRT
communities (e.g. TF-CSIRT, TI, FIRST, CSIRT network
- Constituency
• Overview of incident response capabilities
- Formal capability (mandate)
- Operational-technical capability
• external services
• internal services
- Operational-organisational capability (e.g. human and technical,
resources, infrastructure)
- Co-operational capability (e.g. cooperation with other stakeholders, also
at international level)
Definitions and incidents response
capabilities
Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
6
• Human resources at CSIRTs
- Skilled IT security personnel are hard to find
• Processes and procedures
- Need for clear, concise, well-documented incident response plan
• Political and legal framework
- Importance of an adequate political and legal framework that helps to
define roles and responsibilities and enhance the overall cooperation
• Technology: tools and data
- Important decision between self-developed tools or services procured
from vendors
Challenges in incident response
Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
7Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
Incident response mechanisms
Typical incident response process retrieved from Good Practice Guide for Incident Management, ENISA, 2010, p. 37 -
https://www.enisa.europa.eu/publications/good-practice-guide-for-incident-management
8
• National cyber security strategy: high-level strategic framework for a nation’s
approach to cyber security
- Key objectives of cyber security strategies (e.g. of Cybersecurity Strategy of the
European Union)
• to develop cyber defence policies and capabilities
• to achieve cyber resilience
• to reduce cyber-crime
• to support industry on cyber security
• to secure critical information infrastructures
- Key components
• setting the vision, scope, objectives and priorities
• identifying and engaging stakeholders
• establishing trusted information-sharing mechanisms
• developing national cyber contingency plans
• organising cyber security exercises
• establishing baseline security requirements
• establishing incident reporting mechanisms
• engaging in international cooperation
- Important role of national cyber security agency/centre but also of national and
governmental CSIRT
Incident response in cyber security strategies
Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
9
• Cyber crisis cooperation and management
- 3 levels of cyber crisis management
• Strategic
• Operational
• Technical
• Mutual Aid to boost preparedness
- Both the public and private sectors to be involved in the mutual aid
agreements
• Exercises to enhance incident handling cooperation
• CSIRT training to enhance capabilities, such as:
- TRANSIT training
- ENISA training material for CSIRT community
• Link to the ENISA’s Cyber Security Training material:
https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists
Ways of enhancing incident handling
cooperation
Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
Cyber Europe 2016
Cyber Exercises
Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
11
2010
2012
20152014
2016
2013
2011
12
 Cyber exercise planning training courses
 Support in exercise planning
 European Commission, EEAS, Eurocontrol,
EU Agencies, ..
 Cyber Exercise Platform available for the
organisation of EU Institutions, incl.
Agencies, and Member States exercises
 Technical Playground
Cyber Europe 2016
Overview and status update
14
Simulation of large-scale cybersecurity incidents and EU-wide
cyber crises
Business continuity and crisis management situations
Advanced technical cybersecurity incidents
Exciting scenarios, inspired by real-life events
National and international cooperation
Flexible learning experience
15
CE2016 high-level goals:
1. Test EU-level cooperation processes
2. Provide opportunities to test local-level
cooperation processes
3. Train EU- and national-level capabilities
16
Phase 1:
Apr-Oct 2016: focus on technical
knowledge enhancement
Technical ‘challenge of the month’ released
on a regular basis
Build up the crisis, keep participants
interested, train participants
Phase 2:
17
 A united EU cooperated, with the assistance of
ENISA, to mitigate the largest and most sophisticated
attack against Europe
 Companies from the ICT Industry, Financial
Institutions, Hospitals and even the Energy sector
were under threat
 Companies dealt with ransom-ware, cloud service
attacks, DDoS, war-dialing, as well as reputation
attacks
 Response to new attack vectors such as drones, IoT
infections and even attacks on core signaling
systems such as the telecom signaling system SS7
 The cyber security community in EU managed to
solve difficult puzzles, and proved that cyber crisis
18
It is a great opportunity to test internal business continuity and
IT security policies
IT security teams will have hands-on incident handling
opportunities
Can develop working relationships with competent national
authorities and private stakeholders
Find out the actors at national and European level when it comes
to cyber crises
19
PO Box 1309, 710 01 Heraklion, Greece
Tel: +30 28 14 40 9710
info@enisa.europa.eu
www.enisa.europa.eu
Thank you
21
unclassified
www.slideshare.net/kevduffey/presentations
Follow us -
www.linkedin.com/company/cyber-rescue-alliance
For other presentations
Practice your Response
in Executive Simulations
Bespoke Commercial
Response Plan
Commercial Coach for
Cyber Attack Response

Mais conteúdo relacionado

Mais procurados

Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 

Mais procurados (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Information security
Information securityInformation security
Information security
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 

Semelhante a ENISA - EU strategies for cyber incident response

Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eu
manelmedina
 
Dsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhofer
Dsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhoferDsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhofer
Dsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhofer
Deltares
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
pteromys_volans
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
segughana
 
Secure Use of Cloud Computing in the Finance Sector
Secure Use of Cloud Computing in the Finance SectorSecure Use of Cloud Computing in the Finance Sector
Secure Use of Cloud Computing in the Finance Sector
Eftychia Chalvatzi
 

Semelhante a ENISA - EU strategies for cyber incident response (20)

Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eu
 
Dsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhofer
Dsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhoferDsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhofer
Dsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhofer
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
 
IDRC14-ppp-template-vollmer_140825
IDRC14-ppp-template-vollmer_140825IDRC14-ppp-template-vollmer_140825
IDRC14-ppp-template-vollmer_140825
 
2.2 Episecc project Overview
2.2   Episecc project Overview2.2   Episecc project Overview
2.2 Episecc project Overview
 
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014 Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
Secure Societies & Space in HORIZON 2020 - Khoen Liem - Israel 3.2.2014
 
Session 2.1 Martin Mühleck
Session 2.1 Martin MühleckSession 2.1 Martin Mühleck
Session 2.1 Martin Mühleck
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
 
IDRC14-Bouchon-Matrics
IDRC14-Bouchon-MatricsIDRC14-Bouchon-Matrics
IDRC14-Bouchon-Matrics
 
Phaedra II Technology foresight, 17 Nov 2016
Phaedra II Technology foresight, 17 Nov 2016Phaedra II Technology foresight, 17 Nov 2016
Phaedra II Technology foresight, 17 Nov 2016
 
Secure Use of Cloud Computing in the Finance Sector
Secure Use of Cloud Computing in the Finance SectorSecure Use of Cloud Computing in the Finance Sector
Secure Use of Cloud Computing in the Finance Sector
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Syssec
SyssecSyssec
Syssec
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 

Mais de Kevin Duffey

Mais de Kevin Duffey (20)

Cyber Insights from 100 surveys
Cyber Insights from 100 surveysCyber Insights from 100 surveys
Cyber Insights from 100 surveys
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
 
Ensuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance SectorEnsuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance Sector
 
Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022
 
Best Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveysBest Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveys
 
Breaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so LowBreaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so Low
 
Cyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptxCyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptx
 
Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022
 
Breaches Anticipated - because firms have weak cyber security visible to hac...
Breaches Anticipated  - because firms have weak cyber security visible to hac...Breaches Anticipated  - because firms have weak cyber security visible to hac...
Breaches Anticipated - because firms have weak cyber security visible to hac...
 
Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022
 
Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesCyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial Services
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
 
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
 
Cyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and SuppliersCyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and Suppliers
 
London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018
 
Cyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesCyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 Executives
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
 

Último

Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
DUBAI (+971)581248768 BUY ABORTION PILLS IN ABU dhabi...Qatar
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
instagramfab782445
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 

Último (20)

Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 

ENISA - EU strategies for cyber incident response

  • 1. 1 unclassified Dr Paulo Empadinhas Head of Administration & Stakeholders Relations European Union Agency for Network & Information Security 4th November 2016 www.CyberRescue.co.uk ENISA – lessons for CEOs on how to respond to attack
  • 2. European Union Agency for Network and Information Security ENISA - Lessons for CEOs on how to respond to a cyber attack Dr Paulo Empadinhas | Head of Administration & Stakeholders Relations CEOS& CYBER RECOVERY | Athens | 04 November 2016
  • 3. 3 • “Strategies for Incident Response and Cyber Crisis Cooperation” - Link to the document: https://www.enisa.europa.eu/publications/strateg ies-for-incident-response-and-cyber-crisis- cooperation • Prepared by ENISA as input for discussion for the Network and Information Security (NIS) Platform - Link to the platform: https://resilience.enisa.europa.eu/nis-platform • Core material developed based on previous ENISA work in the field of - CSIRTs - Critical Information Infrastructure Protection (CIIP) • Version 1.1 of August 2016 contains some updates in the light of the NIS Directive Background information Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
  • 4. 4 Basics definitions and overview of incident response capabilities Main topics Incident response mechanismsChallenges in incident response Ways of enhancing incident handling cooperation Presentation Title | Speaker Name ( To edit click Insert/ Header & footer) Incident response in cyber security strategies
  • 5. 5 • Basics definitions, such as: - Cyber/information security incident - Computer Security Incident Response Team (CSIRT), including CSIRT communities (e.g. TF-CSIRT, TI, FIRST, CSIRT network - Constituency • Overview of incident response capabilities - Formal capability (mandate) - Operational-technical capability • external services • internal services - Operational-organisational capability (e.g. human and technical, resources, infrastructure) - Co-operational capability (e.g. cooperation with other stakeholders, also at international level) Definitions and incidents response capabilities Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
  • 6. 6 • Human resources at CSIRTs - Skilled IT security personnel are hard to find • Processes and procedures - Need for clear, concise, well-documented incident response plan • Political and legal framework - Importance of an adequate political and legal framework that helps to define roles and responsibilities and enhance the overall cooperation • Technology: tools and data - Important decision between self-developed tools or services procured from vendors Challenges in incident response Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
  • 7. 7Presentation Title | Speaker Name ( To edit click Insert/ Header & footer) Incident response mechanisms Typical incident response process retrieved from Good Practice Guide for Incident Management, ENISA, 2010, p. 37 - https://www.enisa.europa.eu/publications/good-practice-guide-for-incident-management
  • 8. 8 • National cyber security strategy: high-level strategic framework for a nation’s approach to cyber security - Key objectives of cyber security strategies (e.g. of Cybersecurity Strategy of the European Union) • to develop cyber defence policies and capabilities • to achieve cyber resilience • to reduce cyber-crime • to support industry on cyber security • to secure critical information infrastructures - Key components • setting the vision, scope, objectives and priorities • identifying and engaging stakeholders • establishing trusted information-sharing mechanisms • developing national cyber contingency plans • organising cyber security exercises • establishing baseline security requirements • establishing incident reporting mechanisms • engaging in international cooperation - Important role of national cyber security agency/centre but also of national and governmental CSIRT Incident response in cyber security strategies Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
  • 9. 9 • Cyber crisis cooperation and management - 3 levels of cyber crisis management • Strategic • Operational • Technical • Mutual Aid to boost preparedness - Both the public and private sectors to be involved in the mutual aid agreements • Exercises to enhance incident handling cooperation • CSIRT training to enhance capabilities, such as: - TRANSIT training - ENISA training material for CSIRT community • Link to the ENISA’s Cyber Security Training material: https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists Ways of enhancing incident handling cooperation Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
  • 10. Cyber Europe 2016 Cyber Exercises Presentation Title | Speaker Name ( To edit click Insert/ Header & footer)
  • 12. 12  Cyber exercise planning training courses  Support in exercise planning  European Commission, EEAS, Eurocontrol, EU Agencies, ..  Cyber Exercise Platform available for the organisation of EU Institutions, incl. Agencies, and Member States exercises  Technical Playground
  • 13. Cyber Europe 2016 Overview and status update
  • 14. 14 Simulation of large-scale cybersecurity incidents and EU-wide cyber crises Business continuity and crisis management situations Advanced technical cybersecurity incidents Exciting scenarios, inspired by real-life events National and international cooperation Flexible learning experience
  • 15. 15 CE2016 high-level goals: 1. Test EU-level cooperation processes 2. Provide opportunities to test local-level cooperation processes 3. Train EU- and national-level capabilities
  • 16. 16 Phase 1: Apr-Oct 2016: focus on technical knowledge enhancement Technical ‘challenge of the month’ released on a regular basis Build up the crisis, keep participants interested, train participants Phase 2:
  • 17. 17  A united EU cooperated, with the assistance of ENISA, to mitigate the largest and most sophisticated attack against Europe  Companies from the ICT Industry, Financial Institutions, Hospitals and even the Energy sector were under threat  Companies dealt with ransom-ware, cloud service attacks, DDoS, war-dialing, as well as reputation attacks  Response to new attack vectors such as drones, IoT infections and even attacks on core signaling systems such as the telecom signaling system SS7  The cyber security community in EU managed to solve difficult puzzles, and proved that cyber crisis
  • 18. 18 It is a great opportunity to test internal business continuity and IT security policies IT security teams will have hands-on incident handling opportunities Can develop working relationships with competent national authorities and private stakeholders Find out the actors at national and European level when it comes to cyber crises
  • 19. 19
  • 20. PO Box 1309, 710 01 Heraklion, Greece Tel: +30 28 14 40 9710 info@enisa.europa.eu www.enisa.europa.eu Thank you
  • 21. 21 unclassified www.slideshare.net/kevduffey/presentations Follow us - www.linkedin.com/company/cyber-rescue-alliance For other presentations Practice your Response in Executive Simulations Bespoke Commercial Response Plan Commercial Coach for Cyber Attack Response