itu regional workshop...many threats cyber criminals, hacktivists,terrorists, state-sponsored,...

23
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT)“ Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan

Upload: others

Post on 13-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

Itu regional workshop "KeyAspectsofCybersecurityintheContextofInternetofThings(IoT)“

NataliaSPINU

18September,2017 Tashkent,Uzbekistan

Page 2: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

1. INTRODUCTION

2. Moldovan public policy on cybersecurity

3. RECOMMENDATIONS

AGENDA

Page 3: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

Introduction

Page 4: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

WHYTHISMATTERSTOYOU

Growing space with rapid expansion

§ Acrossallsectors:individuals,commerce,governments

§ Growingpervasivenessineverythingwedo

Many threats § Cybercriminals,hacktivists, terrorists,state-sponsored,hackers,amateurs,insiders,trustedpartnersandmanyother

Cyber Security is an unclear concept

§ Considerableuncertainty,broadscope,andever-changingdimensions

§ Cybersecuritydefinitionsvarywidelyandlacktrueconformity

Cyber is a chaotic and ungoverned environment

§ Increasingtensionbetweengovernments,individuals,privateenterprises,commence.

§ Whatiscyberdefense?

Early stages of cyber expansion

§ Technologicaladvancement

§ Fastandintensecompetition

§ Anuncertainfutureofthecyberdomain,theinternetandmore

Government roles increasing in number and importance

Page 5: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

THECYBERSECURITYCHALLENGE…When…

In the Cyber world, security was an

afterthought

Innovation is constant, and highly

unpredictable

The Cyber world lacks a single central cyber

architect

The Cyber world is not static but constantly

evolving

The Cyber world is a system of insecure

systems

Page 6: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

WHY?3)ComplexTrustrelationshipsbetweencyberdomains

Cyber security affects every person who

§ Whoisnotconnectedinsomeway?

§ Usesasmartphone,computer,automatedbanking,GPS,andmodernmedicine

§ Rapidexpansion.TheInternetofThings….

§ Machinetomachineinteraction

Trust is foundational

Howdoorganizationsfindtherightbalanceoftrust,transparency,andprivacy?

Page 7: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

HOWEVER,WHATDOWEKNOWABOUTCYBERSPACE?

Globally connected Contested environment

Mostly in private hands

Great deal of anonymity

Changing environment

New form of warfare?

“FifthDomain”

Page 8: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

Moldovan public policy on cybersecurity

Page 9: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

DIGITALCONTEXT

ICTcontributes~10%ofGDP:§ 153ITcompanies;§ 7majorISPs;§ 3mobileoperators;

Internetpenetration:§ Overall- 50%;§ Broadband– 11%;§ Since2010someISPs

offer100/100Mbitfor250MDL(~13USD);

Mobilepenetration–110%:§ Highspeed3Ginternet

accesssince2008,3.5Gsince2010,4Gsince2012;

DIGITAL

CONTEXT

GuvernamentalServices§ 522available§ 125areelectronic

Infrastructure:§ Fiberlinkto99%oflocalities,lastmileisEthernet;

§ Separate100Mbpsdarkfibernetworkservingcentralpublicadministration

Page 10: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

EVOLUTIONofMoldovanPublicPolicyonCybersecurity

2007:§LawNo.241of15.11.2007“onelectroniccommunications”

2009:§ LawNo.20of

03.02.2009“onpreventingandcombatingcybercrime”

2010:§ Government

DecisionNo.746of2010"OntheapprovaloftheupdatedIndividualPartnershipActionPlantheRepublicofMoldova- NATO"

2013:§GovernmentdecisionNo.857of31.10.2013“NationalStrategyforinformationsocietydevelopment'DigitalMoldova2020'”

2015:§ Government

Decision№811of29.10.2015“NationalProgrammeonCyberSecurity”

1 2 3 4 5

Page 11: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

DUALISMOF DEVELOPMENTVECTORSofMoldovanPublicPolicyonCybersecurity

Accessandinfrastructure

Digitalcontentandelectronicservices

Capacitiesandutilization

Internationalcooperation

Education,and

continuousawareness

Strengtheningcyberdefensecapacities

Preventingand

combatingcybercrime

Creationofcybersecurity

incidentresponseteamat

nationallevel

Securityandintegrityofelectronic

communicationsnetworksandservices

Safedataprocessing,storageandaccess,

21 “Digital Moldova 2020”NATIONAL PROGRAM

ON CYBER SECURITY 2016 – 2020

OVERALLOBJECTIVE:Tocreatesecureenvironmentfor

developmentofinformationsociety

GOAL:Tocreateandimplementnationalcybersecuritymanagement

system

Page 12: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

KEYASPECTSofMoldovanPublicPolicyonCybersecurity

INTERNATIONAL

COOPERATION

CYBER

SECURITY

Page 13: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

INTERNATIONALCOOPERATIONMostactivecooperationpartnersofMoldovaoncybersecurity

International organizationsInternationalTelecommunicationUnionOrganizationforSecurityandCo-operationinEuropeNorthAtlanticTreatyOrganizationUnitedStatesAgencyforInternationalDevelopmentCouncilofEuropeRegionalCommonwealth inthefieldofCommunications

States and unionsEuropeanUnion

UnitedStatesSouthKorea

Estonia International CYBERSEC

URITYCOOPERAT

IONCybersecurity

CommunityCSIRTsandCSIRT

communitiesSpecializedorganizations

PrivatecompaniesIndependentexperts

Page 14: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

Insufficiency of international cooperation in identifying risks, vulnerabilities, other events occurring in the world cyberspace, and preventing cross-border cyber threats and attacks.

NationalProgramme onCyberSecurityGovernmentDecision№ 811of29.10.2015

MAINCHALLENGE

Page 15: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

INTERNATIONALCOOPERATIONApprovedcourseofactions

Strengthening cooperation with international CSIRTs

Signingcooperationagreements withUS-CERT,NCERTandother CSIRTS

Creationofplatformforinternationalconsultationandcoordinationoncyberthreats

Development of capacities for technical interaction

Establishingofcontactpoints,organisation ofregularmeetings

Development of Public-Private Cooperation

PromotionofnationalinterestsatinternationalarenaPromotion of national

interests at international arena

Development ofcooperation with(ISC)2,ISACA,SANSandother institutions

Strengthening cooperation between national universities

and leadingEDUCATIONAL companies

Page 16: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

(1)Citizenarenotconsciousthattheirelectronicdevicesmightbealreadyhacked§ “Inspiteofabignumberofcybersecurity victims,onlyafewcitizenareconsciousthattheirelectronicdevices(mobilephones,tablets,notebooks,computers,etc.)mightbecompromisedbycyberattacksthroughtheInternet.Thatfactsignificantlycontributestothegrowofcybercrimesexploitingthevulnerabilityofhumancharacter.”(NationalProgramonCybersecurity)

(2)Lackofcontinuouseducationandawarenessincybersecurityarea

EDUCATIONANDCONTINUOUSAWARENESSCoreproblems

Page 17: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

EDUCATIONANDCONTINUOUSAWARENESS

Awareness campaigns

Educational curriculum

Awareness portal

Competence requirements

Cybersecurity trainings

Cybersecurity laboratory

Developmentofawarenessintheregardofexistingrisksofcyberspace

Augmentationofcybersecurityeducationalcurriculum

Creationofawarenessportalforinformingaboutcurrentcyberthreats

AdoptionoftherequirementstothecompetenceofemployeesincybersecuritydomainbothinprivateandpublicsectorsOrganizationandimplementationoftrainingsandworkshopsoncybersecurityforpublicandprivatepersonnel,holdersofcriticalinfrastructure

Creationofcybersecuritylaboratory

Policyplan

Page 18: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

EDUCATIONANDCONTINUOUSAWARENESSPolicyimplementationachievements.Cybersecuritytrainings

JointeducationalactivitiessupportedbyEU

Page 19: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

POLICYIMPLEMENTATIONACHIEVEMENTS

State-OF-art

Technology

Advanced Cyber

training capacities

Through red/blue

team exercises

Located at Technical University of moldova

Operational since 6th

oct 2016

Supported by Nato

Page 20: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

RECOMMENDATIONS

Page 21: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

RECOMMENDATIONSTipsforImplementingaCybersecurityProgram

FOCUSONCRITICALINFORMATION Whateffectdoesanattackonyourbusinesshaveandwhatcanbedoneaboutit?

EVALUATEACYBERINCIDENTRESPONSEPLAN

Whatvulnerabilitieshavebeenidentifiedandhowhavetheybeenresolved?

LOOKOVERTHEBUDGET Isthecybersecuritybudgetbeingusedappropriately?

BEINFORMEDABOUTKEYRISKINDICATORS

Doyouknowenoughaboutdefence,monitoring,riskanddataprotection?

WORKWITHINTERNALANDEXTERNALSPECIALISTS

Areyouconstantlybeingbriefedonnewdevelopmentsintechnologyandcybersecurity?

FOLLOWTHESAFTEYRULESOFEXTERNALPROVIDERS

Whataretheprivacyandsecuritypoliciesofexternalproviders?Dotheymeetyourrequirements?

COMPLYWITHLAWS/REGULATIONSFORCYBERSECURITY

Areyoukeepingup-to-datewiththelatestcyberthreatsandnewlaws?

Page 22: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

RECOMMENDATIONSTipsfordealingwithchallenges

Changethemassculture

Keepthecyberstrategyinmind

Allocateresourcesandbudgets

Understandtheinfluenceofnewlyemergedcyber

threats

Ensureeffectivenationalandinternationalcollaboration

CHALLENGES

Page 23: Itu regional workshop...Many threats Cyber criminals, hacktivists,terrorists, state-sponsored, hackers, amateurs, insiders, trusted partners and many other Cyber Security is an unclear

THANKYOU!

NataliaSPINU

[email protected]

[email protected]