SlideShare uma empresa Scribd logo
1 de 29
Baixar para ler offline
Cyber Security Strategies and Approaches

Sue Daley
Government Relations Manager UK & Ireland 

                                             1
1        Given threat environment what response needed?   



           2        Outline of different approaches and strategies 



           3       Commonalities , best practices and lessons 




Presentation Identifier Goes Here                                       4
What is Symantec seeing?
– US and EU leading thought leadership


– Connected nations realizing need to work across 
  borders 


– Legislators, regulators seeing  IT security as 
  horizontal issue


– Increasing recognition target is not just system but 
  information  


– Understanding that response must  be operational, 
  reactive and dynamic
So what’s the result? 
• Various projects, initiatives, strategies, operational 
  structures
    •National

    •Regional, multi‐national

    •Public ‐ Private sector



• Symantec advised or involved at all levels
National Approach 



                     7
… in the nineteenth 
century we had to 
secure the seas…and in 
the twentieth century 
we had to secure the air, 
in the twenty first 
century we also have to 
secure our position in 
cyber space...
                        8
UK Approach 
•    Launched June 2009


    1. Reduce risks to UK use’s of internet

    2. Exploit opportunities – gather 
       intelligence and intervene

    3. Improve knowledge, capabilities and 
       decision making – policies, governance
• Strategic leadership across government – coordination
• 8 key work streams 
policy and regulatory issues     awareness and culture change
technical capabilities/R&D       international engagement




• GCHQ, Cheltenham
• Improve UK technical response to cyber incidents
• Disseminate information on risks, attacks and coordinate 
  action
Thank you!




Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in 
the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, 
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.




                                                                                                                                                                                         1
US 60 day Review…. 
•      May 2009 ‐ “Assuring a trusted and resilient information and 
       communications infrastructure”
•      Builds on 2008 Comprehensive National Cyber security 
       Initiative 

•      Since the review…
•      Enhanced 2009 Cyber security Enhancement Act
        •    Boost federal R&D, stimulate US workforce 
        •    Estimated to give $396 million 
•      Cyber Storm Exercise Feb 2010 ‐ Symantec key partner
•      Appointment Cyber Tsar

Presentation Identifier Goes Here                                      12
Cyber Security Tsar – Howard Schmidt 
• March 2010  key themes


           Partnerships
           Transparency

“ Transparency improves our 
  collective knowledge and 
  helps bind our partnerships 
  together to form the most 
  powerful cyber tools that we 
  have”
Estonia   
• September 2008 strategy 
    – graduated system of security measures 
    – Expertise development 
    – appropriate regulatory and legal framework 
    – international co‐operation  
    – Awareness raising
• November 2009 NATO‐accredited Cooperative Cyber Defence 
  Centre of Excellence (CCDCOE)
    – Symantec and NATO memorandum of understanding
    – Joint research project to promote cooperation on online threats
    – Explore modus operandi of attackers


Presentation Identifier Goes Here                                       14
Singapore 

• iN2015 Master Plan 2005  (3 years)
    – Intelligent and trusted infocomm infrastructure
• Led by Infocomm Development Authority (IDA)
    – Included National Infocomm Security committee 
    – formulates IT security policies 
• Result of 2005 plan
    – “enhanced overall security situational awareness”
• So 2nd Master plan launched 2008 
    “…first Master plan aimed largely at providing the public sector with 
      measures to counter infocomm security threats, the second Master
      plan will expand on that and engage both the public and private 
      sectors “
Presentation Identifier Goes Here                                        15
Emerging technologies          Users                       International Relations
                                                       R&D
                 Threats            Practioners      Industry           Standards

                    •Association of
                    Security                  Cyber Security       CERT-to-CERT
                                              Awareness Alliance
 Cyber Watch Centre Professionals                                                  Meridan process -
 (CWC)              (AiSP)
                                  National Infocomm                                CIIP trust building
                                  security Scholarship
 Creation of SISTA


Presentation Identifier Goes Here                                                                    16
Singapore next steps…

• Singapore Infocomm Technology Security Authority (SITSA) 
    – Created Oct 2009
    – Safeguard Singapore against IT Security Threats 
    – Develop, execute  contingency operations and plans


    • Core Activities: 
        • Partnership Development 
        • Critical Information Infrastructure Protection 
        • Technology Development 
        • Planning, preparedness  response 
        • cyber attack exercises 

Presentation Identifier Goes Here                             17
EU Approach 



Presentation Identifier Goes Here   18
EU Approach 
• Interdependence of European Member State
• Common shared approach to security needed

• Regulation and legislation role
  – European Cyber crime Convention ‐2001 
  – Framework Decision on attacks against information 
    systems – 2005
  – Commission Communication ‐ "Protecting Europe from 
    large scale cyber‐attacks and disruptions” ‐ 2009
     1.Preparedness and prevention
     2.Detection and response
     3.Mitigation and recovery
     4.International and EU wide cooperation

  But its not just legislation only…

                                                          19
EU Working together 

 • Research and development
    —EU FP7 funding 
    –WOMBAT ‐ Worldwide Observatory of Malicious 
     Behaviours and Attack Threats
    –LOBSTER ‐ European broadband security 
    Thank you!
 • Co‐operation, Collaboration, Partnership 
    —ENISA – European Network Information Security 
     Agency
    —Critical Infrastructure Warning Information Network 
     (CIWIN) project
    —European Information Sharing and Alert System (EISAS)
    —CERTS
    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in 
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, 
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.




                                                                                                                                                                                             20
CERTS across Europe




    Thank you!




    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in 
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, 
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Public – Private Sector Collaboration 



Presentation Identifier Goes Here            22
Collaboration is key 

• Up to 90% of critical infrastructure private sector operated
    – Industry, government and law enforcers coming together
    – Developing public, private partnerships and approaches


• Symantec’s involvement
    – Joint deployment of security intelligence technologies
    – Joint exercises – US Cyber storm, UK CWID, US IT‐ Information 
      Sharing and Analysis Centre (ISAC) 
    – Joint research projects– EU FP7 , Wombat, Lobster, NATO Estonia 
      centre
    – Participation in expert groups, committees  ‐ ENISA, UK IACG, UK 
      Council for Child Safety, UK e‐Crime Reduction Partnership, 
    – Sponsoring events and conferences – UK IA09, 
Presentation Identifier Goes Here                                         23
Public Awareness and Culture Change 
• Online security key to trust, take up and buy‐in of citizens 
• Industry can help by reaching public




Presentation Identifier Goes Here                                 24
Commonalities
    Best practices
    Lessons  




Presentation Identifier Goes Here   25
Recognition of interconnected nature of IT systems

        Move from attack detection to prevention measures

                             Role of regulation and legislation 

                   Need  for joint approach to protect society

                    Need to work with private sector partners

                      Importance of international engagement

       Information sharing and trusted networks are needed

    Raising awareness and addressing culture change is key
Presentation Identifier Goes Here                                  26
Lessons learnt ‐ Symantec’s top 5 to leave behind…

1. A holistic approach to security policy is required
    • Move away from closed, nationally protected computer 
      networks
    • Understand moving threat environment
2. Real time awareness of threat landscape vital 
    • 24 – 7 
    • Information and intelligence is power
3. Both proactive and reactive capabilities needed
    • Operational and technical 
    • Threat awareness and analysis based   
    • Technical expertise and skills needed
Presentation Identifier Goes Here                             27
Lessons learnt ‐ what is important
4. Collaboration and co‐operation at different levels is key
    • Trusted environment, network, systems
    • Secure information sharing structures
    • Relationship, partner building  


5. Technology is one part of the solution 
        • People, process, technology
        • Culture change 
        • Awareness raising


Presentation Identifier Goes Here                              28
Thank you!
    Susan_daley@symantec.com
    +44 7809 492 490




    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in 
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, 
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Presentation Identifier Goes Here                                                                                                                                                            29

Mais conteúdo relacionado

Mais procurados

Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightDeep Shankar Yadav
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Lessons Learned in Automated Decision Making / How to Delay Building Skynet
Lessons Learned in Automated Decision Making / How to Delay Building SkynetLessons Learned in Automated Decision Making / How to Delay Building Skynet
Lessons Learned in Automated Decision Making / How to Delay Building SkynetSounil Yu
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Trends in IIoT and OT Security
Trends in IIoT and OT SecurityTrends in IIoT and OT Security
Trends in IIoT and OT SecurityOliver Pfaff
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud ComputingKeet Sugathadasa
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONSylvain Martinez
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 

Mais procurados (20)

Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Lessons Learned in Automated Decision Making / How to Delay Building Skynet
Lessons Learned in Automated Decision Making / How to Delay Building SkynetLessons Learned in Automated Decision Making / How to Delay Building Skynet
Lessons Learned in Automated Decision Making / How to Delay Building Skynet
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Trends in IIoT and OT Security
Trends in IIoT and OT SecurityTrends in IIoT and OT Security
Trends in IIoT and OT Security
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Cyber security
Cyber securityCyber security
Cyber security
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 

Destaque

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationSymantec
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansMaurice Dawson
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDr David Probert
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security DemistyifiedMicrosoft UK
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refinedWan Solo
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic ViewCisco Canada
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyFiroze Hussain
 
Steganography document
Steganography documentSteganography document
Steganography documentBSheghembe
 
Funny miss la sen hand sketching
Funny miss la sen hand sketchingFunny miss la sen hand sketching
Funny miss la sen hand sketchingMiss La Sen house
 
Digital strategy - security
Digital strategy - securityDigital strategy - security
Digital strategy - securityNansje
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC Advisory Group
 

Destaque (20)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security Demistyified
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
NESA on Steroids
NESA on SteroidsNESA on Steroids
NESA on Steroids
 
How to beat ransomware
How to beat ransomwareHow to beat ransomware
How to beat ransomware
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
 
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government ContractorsKey Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Funny miss la sen hand sketching
Funny miss la sen hand sketchingFunny miss la sen hand sketching
Funny miss la sen hand sketching
 
Digital strategy - security
Digital strategy - securityDigital strategy - security
Digital strategy - security
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
 

Semelhante a Cyber Security Strategies and Approaches

APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT UpdatesAPNIC
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasEmyana Ruth
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...DATA SECURITY SOLUTIONS
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016Dale Butler
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsBigData_Europe
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaEUBrasilCloudFORUM .
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillaydotZADNA
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015Dale Butler
 

Semelhante a Cyber Security Strategies and Approaches (20)

APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNas
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015
 

Mais de vngundi

Anatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, SymantecAnatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, Symantecvngundi
 
Dealing With Security Threats
Dealing With Security ThreatsDealing With Security Threats
Dealing With Security Threatsvngundi
 
Day 2 Dns Cert 4 Scenarios
Day 2   Dns Cert 4 ScenariosDay 2   Dns Cert 4 Scenarios
Day 2 Dns Cert 4 Scenariosvngundi
 
Day 2 Dns Cert 4c Malicious Use
Day 2   Dns Cert 4c Malicious UseDay 2   Dns Cert 4c Malicious Use
Day 2 Dns Cert 4c Malicious Usevngundi
 
Day 2 Dns Cert 4b Name Server Redirection
Day 2   Dns Cert 4b Name Server RedirectionDay 2   Dns Cert 4b Name Server Redirection
Day 2 Dns Cert 4b Name Server Redirectionvngundi
 
Day 2 Dns Cert 4a Cache Poisoning
Day 2   Dns Cert 4a Cache PoisoningDay 2   Dns Cert 4a Cache Poisoning
Day 2 Dns Cert 4a Cache Poisoningvngundi
 
Day 2 Dns Cert 3 Dns Organizations
Day 2   Dns Cert 3 Dns OrganizationsDay 2   Dns Cert 3 Dns Organizations
Day 2 Dns Cert 3 Dns Organizationsvngundi
 
Day 1 Large Scale Attacks
Day 1   Large Scale AttacksDay 1   Large Scale Attacks
Day 1 Large Scale Attacksvngundi
 
Day 1 From CERT To NCSC
Day 1   From CERT To NCSCDay 1   From CERT To NCSC
Day 1 From CERT To NCSCvngundi
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirtvngundi
 
Day 1 Coop Banks
Day 1   Coop BanksDay 1   Coop Banks
Day 1 Coop Banksvngundi
 

Mais de vngundi (11)

Anatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, SymantecAnatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, Symantec
 
Dealing With Security Threats
Dealing With Security ThreatsDealing With Security Threats
Dealing With Security Threats
 
Day 2 Dns Cert 4 Scenarios
Day 2   Dns Cert 4 ScenariosDay 2   Dns Cert 4 Scenarios
Day 2 Dns Cert 4 Scenarios
 
Day 2 Dns Cert 4c Malicious Use
Day 2   Dns Cert 4c Malicious UseDay 2   Dns Cert 4c Malicious Use
Day 2 Dns Cert 4c Malicious Use
 
Day 2 Dns Cert 4b Name Server Redirection
Day 2   Dns Cert 4b Name Server RedirectionDay 2   Dns Cert 4b Name Server Redirection
Day 2 Dns Cert 4b Name Server Redirection
 
Day 2 Dns Cert 4a Cache Poisoning
Day 2   Dns Cert 4a Cache PoisoningDay 2   Dns Cert 4a Cache Poisoning
Day 2 Dns Cert 4a Cache Poisoning
 
Day 2 Dns Cert 3 Dns Organizations
Day 2   Dns Cert 3 Dns OrganizationsDay 2   Dns Cert 3 Dns Organizations
Day 2 Dns Cert 3 Dns Organizations
 
Day 1 Large Scale Attacks
Day 1   Large Scale AttacksDay 1   Large Scale Attacks
Day 1 Large Scale Attacks
 
Day 1 From CERT To NCSC
Day 1   From CERT To NCSCDay 1   From CERT To NCSC
Day 1 From CERT To NCSC
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirt
 
Day 1 Coop Banks
Day 1   Coop BanksDay 1   Coop Banks
Day 1 Coop Banks
 

Cyber Security Strategies and Approaches

  • 2.
  • 3.
  • 4. 1 Given threat environment what response needed?    2 Outline of different approaches and strategies  3 Commonalities , best practices and lessons  Presentation Identifier Goes Here 4
  • 5. What is Symantec seeing? – US and EU leading thought leadership – Connected nations realizing need to work across  borders  – Legislators, regulators seeing  IT security as  horizontal issue – Increasing recognition target is not just system but  information   – Understanding that response must  be operational,  reactive and dynamic
  • 6. So what’s the result?  • Various projects, initiatives, strategies, operational  structures •National •Regional, multi‐national •Public ‐ Private sector • Symantec advised or involved at all levels
  • 9. UK Approach  • Launched June 2009 1. Reduce risks to UK use’s of internet 2. Exploit opportunities – gather  intelligence and intervene 3. Improve knowledge, capabilities and  decision making – policies, governance
  • 10. • Strategic leadership across government – coordination • 8 key work streams  policy and regulatory issues awareness and culture change technical capabilities/R&D  international engagement • GCHQ, Cheltenham • Improve UK technical response to cyber incidents • Disseminate information on risks, attacks and coordinate  action
  • 11. Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in  the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,  are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 1
  • 12. US 60 day Review….  • May 2009 ‐ “Assuring a trusted and resilient information and  communications infrastructure” • Builds on 2008 Comprehensive National Cyber security  Initiative  • Since the review… • Enhanced 2009 Cyber security Enhancement Act • Boost federal R&D, stimulate US workforce  • Estimated to give $396 million  • Cyber Storm Exercise Feb 2010 ‐ Symantec key partner • Appointment Cyber Tsar Presentation Identifier Goes Here 12
  • 13. Cyber Security Tsar – Howard Schmidt  • March 2010  key themes Partnerships Transparency “ Transparency improves our  collective knowledge and  helps bind our partnerships  together to form the most  powerful cyber tools that we  have”
  • 14. Estonia    • September 2008 strategy  – graduated system of security measures  – Expertise development  – appropriate regulatory and legal framework  – international co‐operation   – Awareness raising • November 2009 NATO‐accredited Cooperative Cyber Defence  Centre of Excellence (CCDCOE) – Symantec and NATO memorandum of understanding – Joint research project to promote cooperation on online threats – Explore modus operandi of attackers Presentation Identifier Goes Here 14
  • 15. Singapore  • iN2015 Master Plan 2005  (3 years) – Intelligent and trusted infocomm infrastructure • Led by Infocomm Development Authority (IDA) – Included National Infocomm Security committee  – formulates IT security policies  • Result of 2005 plan – “enhanced overall security situational awareness” • So 2nd Master plan launched 2008  “…first Master plan aimed largely at providing the public sector with  measures to counter infocomm security threats, the second Master plan will expand on that and engage both the public and private  sectors “ Presentation Identifier Goes Here 15
  • 16. Emerging technologies Users International Relations R&D Threats Practioners Industry Standards •Association of Security Cyber Security CERT-to-CERT Awareness Alliance Cyber Watch Centre Professionals Meridan process - (CWC) (AiSP) National Infocomm CIIP trust building security Scholarship Creation of SISTA Presentation Identifier Goes Here 16
  • 17. Singapore next steps… • Singapore Infocomm Technology Security Authority (SITSA)  – Created Oct 2009 – Safeguard Singapore against IT Security Threats  – Develop, execute  contingency operations and plans • Core Activities:  • Partnership Development  • Critical Information Infrastructure Protection  • Technology Development  • Planning, preparedness  response  • cyber attack exercises  Presentation Identifier Goes Here 17
  • 19. EU Approach  • Interdependence of European Member State • Common shared approach to security needed • Regulation and legislation role – European Cyber crime Convention ‐2001  – Framework Decision on attacks against information  systems – 2005 – Commission Communication ‐ "Protecting Europe from  large scale cyber‐attacks and disruptions” ‐ 2009 1.Preparedness and prevention 2.Detection and response 3.Mitigation and recovery 4.International and EU wide cooperation But its not just legislation only… 19
  • 20. EU Working together  • Research and development —EU FP7 funding  –WOMBAT ‐ Worldwide Observatory of Malicious  Behaviours and Attack Threats –LOBSTER ‐ European broadband security  Thank you! • Co‐operation, Collaboration, Partnership  —ENISA – European Network Information Security  Agency —Critical Infrastructure Warning Information Network  (CIWIN) project —European Information Sharing and Alert System (EISAS) —CERTS Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in  the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,  are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 20
  • 21. CERTS across Europe Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in  the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,  are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
  • 23. Collaboration is key  • Up to 90% of critical infrastructure private sector operated – Industry, government and law enforcers coming together – Developing public, private partnerships and approaches • Symantec’s involvement – Joint deployment of security intelligence technologies – Joint exercises – US Cyber storm, UK CWID, US IT‐ Information  Sharing and Analysis Centre (ISAC)  – Joint research projects– EU FP7 , Wombat, Lobster, NATO Estonia  centre – Participation in expert groups, committees  ‐ ENISA, UK IACG, UK  Council for Child Safety, UK e‐Crime Reduction Partnership,  – Sponsoring events and conferences – UK IA09,  Presentation Identifier Goes Here 23
  • 25. Commonalities Best practices Lessons   Presentation Identifier Goes Here 25
  • 26. Recognition of interconnected nature of IT systems Move from attack detection to prevention measures Role of regulation and legislation  Need  for joint approach to protect society Need to work with private sector partners Importance of international engagement Information sharing and trusted networks are needed Raising awareness and addressing culture change is key Presentation Identifier Goes Here 26
  • 27. Lessons learnt ‐ Symantec’s top 5 to leave behind… 1. A holistic approach to security policy is required • Move away from closed, nationally protected computer  networks • Understand moving threat environment 2. Real time awareness of threat landscape vital  • 24 – 7  • Information and intelligence is power 3. Both proactive and reactive capabilities needed • Operational and technical  • Threat awareness and analysis based    • Technical expertise and skills needed Presentation Identifier Goes Here 27
  • 28. Lessons learnt ‐ what is important 4. Collaboration and co‐operation at different levels is key • Trusted environment, network, systems • Secure information sharing structures • Relationship, partner building   5. Technology is one part of the solution  • People, process, technology • Culture change  • Awareness raising Presentation Identifier Goes Here 28
  • 29. Thank you! Susan_daley@symantec.com +44 7809 492 490 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in  the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,  are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Presentation Identifier Goes Here 29