protecting critical infrastructure: a multi-layered approach
TRANSCRIPT
www.itu150.org
Protecting Critical Infrastructure A multi-layered approach
Tomas LamanauskasHead, Corporate Strategy Division
21 April 2015
Committed to Connecting the World
2
The importance of Cybersecurity• From industrial age to information societies
- Increasing dependence on the availability of ICTs- Number of Internet users growing constantly (now 40% of world’s population)
• Statistics and reports show that cyber-threats are on the rise- The likely annual cost to the global economy from
Cybercrime is estimated at more than $455 billion (Source: McAfee Report on Economic Impact of Cybercrime, 2013).
• Developing countries most at risk as they adopt broader use of ICTs
- E.g. Africa leading in Mobile-broadband penetration: almost 20% in 2014- up from less than 2% in 2010 (Source: ITU ICT Statistics)
• Need for building cybersecurity capacity- Protection is crucial for the socio-economic
wellbeing of a country in the adoption of new technologies
Source: Symantec 2014 Internet Security Threat Report
Committed to Connecting the World
3
Critical Infrastructure Protection and Cybersecurity
Committed to Connecting the World
4
Committed to Connecting the World
Coordinated ResponseNeed for a multi-level response to the cybersecurity challenges
International Cooperation frameworks and exchange of
information
Harmonization of legislation and best practices at regional level
National strategies and policiesNational response capabilities
Country level capacity building and training
International
Regional
National
5
6
Committed to Connecting the World
Committed to Connecting the World
7
Legal Measures
- Legal Measures Strategy
- Government Legal Authority
- Adequate Cybercrime legislation
Technical/Procedural Measures- National
Cybersecurity Goals and Framework
- Secure Government Infrastructure
- Global Technical Collaboration
Organizational Structures
- Government Coordination
- National Focal Point- National CIRT- Public-Private
Partnerships
Capacity Building
- Cybersecurity Skills and Training
- Culture of Cybersecurity
- Cybersecurity Innovation
International Cooperation
- Multi-/Bilateral collaboration
- Inter-Agency Collaboration
Holistic Approach- Five areas of action
Committed to Connecting the World
8
ITU Activities
Committed to Connecting the World
ITU and Cybersecurity2003 – 2005
WSIS entrusted ITU as sole facilitator for WSIS Action Line C5 “Building Confidence and Security in the use of ICTs”
2007ITU Secretary-General launched the Global Cybersecurity
Agenda (GCA). A framework for international cooperation in cybersecurity
2008 - 2010ITU Membership endorsed the GCA as the ITU-wide strategy on
international cooperation.In 2008 the Child Online Protection Initiative was launched, as an international and multistakeholder collaborative framework
fostering the protection of children online 9
Committed to Connecting the World
10
100 National CIRTs WorldwideNeed to fill the gaps
National CIRTs are in the first line of cyber-response
• Providing incident response support;• Dissemination of early warnings and
alerts• Facilitating communications and
information sharing among stakeholders• Developing mitigation and response
strategies and coordinating incident response
• Sharing data and information about the incident and corresponding responses
• Publicising best practices in incident response and prevention advice
• Coordinating international cooperation on cyber incidents
Committed to Connecting the World
11
National CIRT Programme
Assess existing capability of/need for national cybersecurity mechanisms
On-site assessment through meetings, training, interview sessions and site visits
Form recommendations for plan of action (institutional, organizational and technical requirements)
Implement based on the identified needs and organizational structures of the country
Assist with planning, implementation, and operation of the CIRT.
Continued collaboration with the newly established CIRT for additional support
Capacity Building and trainings on the operational and technical details
Exercises organized at both regional and international levels
Help enhance the communication and response capabilities of the participating CIRTs
Improve overall cybersecurity readiness in the region
Provide opportunities for public-private cooperation
Committed to Connecting the World
12
ITU’s National CIRT Programme
• Assessments conducted for 64 countries• Implementation completed for 9 countries Burkina Faso, Côte d'Ivoire, Cyp rus, Ghana, Kenya , Montenegro, Tanzania, Uganda, Zambia
• Implementation in progress for 6 countries Barbados, Burundi, Gambia, Jamaica, Lebanon , Trinidad and Tobago
• 9 cyber drills conducted with participation of over 100 countries
Organized in Myanmar, Jordan, Bulgaria, Uruguay, Oman, Lao P.D.R., Turkey, Peru, Zambia
Committed to Connecting the World
ObjectiveThe Global Cybersecurity Index (GCI) measures and ranks each nation state’s level of cybersecurity development in five main areas: • Legal Measures• Technical Measures• Organizational Measures• Capacity Building• National and International Cooperation
Goals- Promote cyberesecurity strategies at a national level- Drive implementation efforts across industries and sectors- Integrate security into the core of technological progress - Foster a global culture of cybersecurity
13
Final Global and Regional Results 2014 are on ITU WebsiteNext iteration in progress
Committed to Connecting the World
14
Enhancing Cybersecurity in Least Developed Countries project
Aims at supporting the 49 Least Developed Countries in strengthening their cybersecurity capabilities.How • Assessment for selected key government ministries & subsequent solutions provision• Capacity building through training of trainers, workshops,..• Customised guidelines on legislation, regulation and technologiesEnd Result• protection of their national infrastructure, including the critical information
infrastructure, thereby making the Internet safer and protecting Internet users• serve national priorities and maximize socio-economic benefits in line with the
objectives of the World Summit on the Information Society (WSIS) and the Millennium Development Goals (MDGs).
We are only as secure as our weakest link
Implemented in 4 countriesDifferent stages of planning/implementation in 15 more
Committed to Connecting the World
Economic Impact of Standardization
Adds 0.3% - 1% to the GDP
Source: European Commission
ITU-T Study Group 17 – Security
• Over 300 standards (ITU-T Recommendations) relevant to security
• Key areas of current work:• Cybersecurity• Child Online Protection• Security architectures and frameworks• Countering spam• Identity management• Security of applications and services
for the Internet of Things, web services, social networks, cloud computing and Big Data
Standardization
15
Committed to Connecting the World
16
Capacity building initiatives, joint consultations and more.
Best practices in cybercrime legislations, joint technical assistance to member states, information sharing
Tap on expertise of globally recognized industry players and accelerate info sharing with ITU member states
Building a global partnership
Collaboration with ABI Research – The Global Cybersecurity Index (GCI)
Collaboration with FIRST – To share best practices on computer incident response, engage in joint events, facilitate affiliation of national CIRTS of member states
Collaboration with Member States – Regional Cybersecurity Centres
Committed to Connecting the World
UN-wide cooperation mechanisms
UN-wide Framework on Cybersecurity and Cybercrime (2013)
Developed by ITU and UNODC along with 33 UN Agencies. Enables enhanced coordination among UN entities in their response to
concerns of Member States regarding cybercrime and cybersecurity
UN System Internal Coordination Plan on Cybersecurity and Cybercrime (2014)
Developed building on the UN-wide Framework on Cybersecurity and Cybercrime upon request by the UN Secretary-General, Mr. Ban Ki-moon
Designed as a guide to improve the internal coordination activities of the UN system organizations on related matters
17
Committed to Connecting the World
• Cyberdrill for African Region 5-7 May 2015, Kigali, Rwanda • Cyberdrill for Arab Region 17-19 May 2015, Hurghada, Egypt
• Capacity Building Programme on Critical National Infrastructure Protection 20-21 May 2015, Hurghada, Egypt
• International Conference on Computer Security in a Nuclear World: Expert Discussion and Exchange
1-5 June 2015, Vienna, Austria. Organized by IAEA in cooperation with INTERPOL, ITU, UNICRI and IEC
18
Upcoming Relevant Events