cybersecurity capacity building · strategy for the fight against high-tech crime for the 2019-2023...

9

Upload: others

Post on 12-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cybersecurity Capacity Building · Strategy for the Fight against High-Tech Crime for the 2019-2023 period, with a follow-up action plan Strategy for the development of artificial
Page 2: Cybersecurity Capacity Building · Strategy for the Fight against High-Tech Crime for the 2019-2023 period, with a follow-up action plan Strategy for the development of artificial

Cybersecurity Capacity Building in Government Institutions

National CERTof the Republic of Serbia

Daniela Andrović | Senior Advisor for ICT Systems Security, [email protected]

Page 3: Cybersecurity Capacity Building · Strategy for the Fight against High-Tech Crime for the 2019-2023 period, with a follow-up action plan Strategy for the development of artificial

Priorities for GovernmentStrategy for development of information security of Serbia 2017-2020, with a follow-up action plan

Strategy for the Fight against High-Tech Crime for the 2019-2023 period, with a follow-up action plan

Strategy for the development of artificial intelligence in the Republic of Serbia for the period 2020-2025

Formal EducationUniversity of Belgrade

Master 4.0Cyber Crime

Informal EducationNational CERT

Seminars TrainingsCyber drills

Page 4: Cybersecurity Capacity Building · Strategy for the Fight against High-Tech Crime for the 2019-2023 period, with a follow-up action plan Strategy for the development of artificial

National CERT | Trainings

PUBLIC AUTHORITIES ENERGYPERSONAL DATA PROCESSING HEALTH SECTOR

DIGITAL INFRASTRUCTURE ELECTRONIC COMMUNICATIONINFORMATION SOCIETY SERVICESBANKING AND FINANCIAL MARKETS

PUBLIC GOOD OFFICIAL GAZETTE

MANAGEMENT OF NUCLEAR FACILITIES

PRODUCTION, TRADE AND TRANSPORT OF WEAPONS AND MILITARY

EQUIPMENT

UTILITY SERVICESWASTE MANAGEMENT

TRANSPORT

PRODUCTION AND SUPPLY OF CHEMICALS

Page 5: Cybersecurity Capacity Building · Strategy for the Fight against High-Tech Crime for the 2019-2023 period, with a follow-up action plan Strategy for the development of artificial

System for Cyber Attacks Simulation

Cybersecurity Act Law on

Information Security

Cyber Range

Cyber Tesla

2016-2019

Seminars | Technical Trainings

05

1015202530354045

Central andWesternRegion

Southern andEastern Region

NorthernRegion

BelgradeRegion

34 33

41

35

20

13

4

13

193 Participants, per Region

Seminar Training

74%

26%

Cybersecurity Act System for Cyber Attacks Simulation

Page 6: Cybersecurity Capacity Building · Strategy for the Fight against High-Tech Crime for the 2019-2023 period, with a follow-up action plan Strategy for the development of artificial

Cyber Range

BLUE TEAM

Defensive securityInfrastructure protectionThreat huntingIncident responseForesicLawyer

N CERT

Incident handlingIncident managementEarly warnings, alerts and announcementsRisk and incident analysesAwareness raisingLawyer

RED TEAM

Offensive securityEthical hackingExploiting vulnerabilitiesSocial engineeringPenetraton testsCompromise credentialsEscalate privilegesLateral movement

WHITE TEAM

ManagementControlMonitoring

GOLD TEAM

ExpertsPrivate SectorAcademic Sector

* Cyber drill „Cyber Tesla 2019“

Page 7: Cybersecurity Capacity Building · Strategy for the Fight against High-Tech Crime for the 2019-2023 period, with a follow-up action plan Strategy for the development of artificial

of enterprises say they cannot detect breach attempts today without the use of AI technologies

61%say their budgets for AI in cybersecurity will increase by an average of 29% in Fiscal Year 2020

48%

Future of Cybersecurity

* Reinventing Cybersecurity with Artificial Intelligence The new frontier in digital security, Capgemini Research Institute, 2019

Page 8: Cybersecurity Capacity Building · Strategy for the Fight against High-Tech Crime for the 2019-2023 period, with a follow-up action plan Strategy for the development of artificial

• Progress cannot be stopped• Behavioral analytics• Detection / Prevention• Deploying AI capabilities during the

reconnaissance, intrusion, privilege escalationand data exfiltration steps of the cyber kill chain

• Azure ATP (Advance Threat Protection)• ATA (Advance Threat Protection)• MongoDB – Big Data

Facing new challenges: AI

2017

CYBER SECURITY ACT MODEL

2019

SYSTEM FOR CYBER ATTACKS SIMULATION

2020

SYSTEM FOR CYBER ATTACKS SIMULATION & AI

Page 9: Cybersecurity Capacity Building · Strategy for the Fight against High-Tech Crime for the 2019-2023 period, with a follow-up action plan Strategy for the development of artificial

Thank you!