SlideShare una empresa de Scribd logo
1 de 21
Cybersecurity:
Public Sector Threats and Responses


Kim Andreasson
Managing Director
DAKA advisory AB




Indonesia
Information Security Forum (IISF)

Hotel Hilton Bandung,
10 October 2012
Presentation overview

   An introduction to cyber security in the public sector

   Cyber threats

   Public sector responses

   Steps towards a more resilient organizational cyber
    security strategy

   Conclusion
Understanding cyber security in
the public sector
A convergence of three trends:

1. Globalization

2. Connectivity

3. E-government
1. Globalization
                    ICTs contribute strongly to
                     economic growth and
                     better social outcomes

                    Benchmarking the
                     information society is
                     important in order for
                     policy-makers to
                     understand the factors
                     behind it and how to
                     achieve improved
                     outcomes
                    Most benchmarks include
                     a component of
                     e-government
2. Connectivity

 The world will go                        120
                                                                                                                                                   114.2
  from 2bn Internet                        100
                                                           Mobil e s ubs cri pti ons :
                                                           Devel oped countri es
  users in 2010 to                                         Mobil e s ubs cri pti ons :

  5bn in 2015                               80
                                                           Devel opi ng countri es
                     Per 100 inhabitants




                                                                                                                                                   70.1

 An opportunity                            60


  to improve                                40

  service delivery
                                            20

 An opportunity                             0
  to leapfrog                                       2000     2001      2002       2003   2004      2005     2006     2007         2008   2009   2010


                                                 The developed/developing country classifications are based on the UN M49, see:
                                                 http://www.itu.int/ITU-D/ict/definitions/regions/index.html
                                                 Source: ITU World Telecommunication /ICT Indicators database
3. E-government

 Information and service
  delivery

 Transparency and
  accountability

 Link to broader
  development objectives

 Digital by default
3.1. Supply of e-government




 Benchmarking global e-government development since 2003 to
  “inform and improve the understanding of policy makers’
  choices to shape their e-government programs” (UN 2004)

 The survey measures “the willingness and capacity of countries
  to use online and mobile technology in the execution of
  government functions” (UN 2010)
3.2. E-government progress




                      http://www.archive.org
3.3. Demand for e-government

 In 1990, the American tax authority, the
  IRS, said 4m people used online tax filing
  (the first year such service was
  available)

 In 2000, the number filing their taxes
  online had risen to 35m

 In 2010, 100m Americans used e-file
Enter cyber security

 An increase in
  usage means an
  increase in
  dependency

 About 75% of
  organizations suffer
  from a cyber
  attack every year

 Attacks can
  compromise trust
  in e-government
Categorizing cyber threats

 Politically motivated threats:
  cyber warfare, cyber terrorism, espionage and hacktivism



 Non-politically motivated threats:
  typically financially motivated, such as cyber crime,
  intellectual property theft, and fraud, but also hacking for
  fun or retribution, for example, from a disgruntled employee
Understanding cyber threats

“When we first started this process… agencies didn’t know
 what they didn’t know.”

-Karen S. Evans
  Administrator for E-Government and Information Technology
  in testimony before the House Committee on Homeland
  Security, February 28, 2008

 What is the risk?

 Is there control?

 Can you live with the residual risk?

 What is your response plan when services become
  compromised?
Public sector responses

 The public sector is different as it must consider, for example:

 Tension between transparency and privacy

 Cost optimization; agencies often only seek to meet minimum
  standards

 Build closer relations with other stakeholders, including the
  private sector

 Key performance indicators (KPIs)

 But one thing remains the same: Cyber security is a global
  phenomenon and a challenge for every organization. It must
  be dealt with at all levels, from the international arena to the
  regional, national and local levels
Global cyber security agenda

1. Legal measures

2. Technical and
    procedural
    measures

3. Organizational
    structures

4. Capacity building

5. International
     cooperation
The problem for organizational
cyber security
 People!

 According to the Data Breach
  Investigations Report from Verizon, an
  American telecommunications firm,
  85% of confirmed cyber breaches were
  not considered very difficult and 96%
  were avoidable

 More work is needed to create and
  maintain comprehensive yet clearly
  communicated cyber security policies
  that are enforced
Steps towards a more resilient
organizational cyber security
strategy

1. Close the gap between IT and management

2. Improve awareness and education

3. Capture technology trends, including the
   move from e-government to m-government
Step #1: Close the gap
between IT and management
 Assess underlying factor(s), e.g. user
  awareness based on an internal
  survey

 Translate results into KPIs, e.g.
  average user awareness

 Communicate key message to
  management, e.g. the meaning of
  score(s) and their importance
  related to other issue(s)
Step #2: Improve awareness
and education
 ICT skills divide

 Governments cannot go it
  alone; a role for the private
  sector and NGOs

Make people SMART:
 Specific
 Measurable
 Attainable
 Relevant
 Time-bound
Step #3: Track trends, such as
mobility
 New threats: from spam to spim
  and mobile malware

 New challenges: insecure wireless
  connections, missing (stolen)
  devices, data loss, “always on”
  connections

 Same answers: comprehensive
  and clearly communicated
  policies that are measurable
Conclusion:
measure cyber security at all levels
 Compared with just a decade ago, governments have made
  significant progress in expanding ICT access

 But just as crime have always been part of history, cyber
  security is likely to continue well into the future, especially since
  the two are increasingly intertwined

 There is a demand for measurement at all levels in order to give
  policy-makers and public sector managers data, tools and
  benchmarks to better understand cyber security from a policy
  perspective and to communicate that message

 Every case is different, yet fundamentally the same
Thank you



www.DAKAADVISORY.com

Más contenido relacionado

La actualidad más candente

National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic conceptsKhoa Nguyen
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber CrimeDr Raghu Khimani
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 

La actualidad más candente (20)

Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 

Destacado

Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru publicSistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru publicCharles Lim
 

Destacado (20)

Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan UdaraSosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
 
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Turning an idea into impact
Turning an idea into impactTurning an idea into impact
Turning an idea into impact
 
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru publicSistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
 
Borobudur 11
Borobudur 11Borobudur 11
Borobudur 11
 
Developing a Legal Framework for Privacy
Developing a Legal Framework for PrivacyDeveloping a Legal Framework for Privacy
Developing a Legal Framework for Privacy
 
Telkom sigma keminfo materi
Telkom sigma keminfo materiTelkom sigma keminfo materi
Telkom sigma keminfo materi
 
Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Sovereignty in Cyberspace
 
Personal security
Personal securityPersonal security
Personal security
 
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDFRusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
 
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk IndonesiaDR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
 
Global informationsecurityissue_ZainalHasibuan
Global informationsecurityissue_ZainalHasibuanGlobal informationsecurityissue_ZainalHasibuan
Global informationsecurityissue_ZainalHasibuan
 
02. R U Sure U R Secure
02. R U Sure U R Secure02. R U Sure U R Secure
02. R U Sure U R Secure
 
Protecting Data Privacy
Protecting Data PrivacyProtecting Data Privacy
Protecting Data Privacy
 
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi NasionalSkema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
 
Summary report cc brti
Summary report cc brtiSummary report cc brti
Summary report cc brti
 
04. SAKTTI Introduction
04. SAKTTI Introduction04. SAKTTI Introduction
04. SAKTTI Introduction
 

Similar a Cybersecurity: Public Sector Threats and Responses

WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
IT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological SingularityIT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological SingularityMiraworks.io
 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsSteve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsIBM India Smarter Computing
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosFrancesca Valente
 
IMPACT OF ICT ON FINANCIAL SERVICE SECTOR
IMPACT OF ICT ON FINANCIAL SERVICE SECTORIMPACT OF ICT ON FINANCIAL SERVICE SECTOR
IMPACT OF ICT ON FINANCIAL SERVICE SECTORfemymoni
 
042012 m2 m webinar slides for april 4
042012   m2 m webinar slides for april 4042012   m2 m webinar slides for april 4
042012 m2 m webinar slides for april 4Mahbubul Alam
 
John Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public SectorJohn Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public Sectoritnewsafrica
 
ICT Vision and Technologies Adoption across Thailand
ICT Vision and Technologies Adoption across ThailandICT Vision and Technologies Adoption across Thailand
ICT Vision and Technologies Adoption across ThailandSoftware Park Thailand
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsKey Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsRaúl Castañón Martínez
 

Similar a Cybersecurity: Public Sector Threats and Responses (20)

WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
IT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological SingularityIT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological Singularity
 
188
188188
188
 
Varun IOTs PPT
Varun  IOTs PPTVarun  IOTs PPT
Varun IOTs PPT
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsSteve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
 
IMPACT OF ICT ON FINANCIAL SERVICE SECTOR
IMPACT OF ICT ON FINANCIAL SERVICE SECTORIMPACT OF ICT ON FINANCIAL SERVICE SECTOR
IMPACT OF ICT ON FINANCIAL SERVICE SECTOR
 
042012 m2 m webinar slides for april 4
042012   m2 m webinar slides for april 4042012   m2 m webinar slides for april 4
042012 m2 m webinar slides for april 4
 
Resilience in the Cyber Era
Resilience in the Cyber EraResilience in the Cyber Era
Resilience in the Cyber Era
 
John Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public SectorJohn Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public Sector
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
ICT Vision and Technologies Adoption across Thailand
ICT Vision and Technologies Adoption across ThailandICT Vision and Technologies Adoption across Thailand
ICT Vision and Technologies Adoption across Thailand
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
iX_POV_FinalDraft
iX_POV_FinalDraftiX_POV_FinalDraft
iX_POV_FinalDraft
 
iX_POV_FinalDraft
iX_POV_FinalDraftiX_POV_FinalDraft
iX_POV_FinalDraft
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsKey Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise Communications
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Vive Digital - OECD Keynote
Vive Digital - OECD KeynoteVive Digital - OECD Keynote
Vive Digital - OECD Keynote
 

Más de Directorate of Information Security | Ditjen Aptika

Más de Directorate of Information Security | Ditjen Aptika (20)

Sosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor KesehatanSosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor Kesehatan
 
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan TelekomunikasiSosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
 
Sosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor TranportasiSosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor Tranportasi
 
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan BatubaraSosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
 
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang KetenagalistrikanSosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
 
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
 
Fetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelolaFetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelola
 
Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118
 
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasiStandar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made WiryawanDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior LazuardiDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim GautamaDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
 
Teguh arifiyadi ls skse
Teguh arifiyadi ls skseTeguh arifiyadi ls skse
Teguh arifiyadi ls skse
 
Konny sagala skema kelaikan se
Konny sagala skema kelaikan seKonny sagala skema kelaikan se
Konny sagala skema kelaikan se
 
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronikIntan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
 
Uji Publik RPM SMPI Fetri Miftah
Uji Publik RPM SMPI  Fetri MiftahUji Publik RPM SMPI  Fetri Miftah
Uji Publik RPM SMPI Fetri Miftah
 
RPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim GautamaRPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim Gautama
 
SNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar SiregarSNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar Siregar
 
RPM SMPI
RPM SMPIRPM SMPI
RPM SMPI
 
Pengamanan Jaringan dengan Honeynet-Charles Lim
Pengamanan Jaringan dengan Honeynet-Charles LimPengamanan Jaringan dengan Honeynet-Charles Lim
Pengamanan Jaringan dengan Honeynet-Charles Lim
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Cybersecurity: Public Sector Threats and Responses

  • 1. Cybersecurity: Public Sector Threats and Responses Kim Andreasson Managing Director DAKA advisory AB Indonesia Information Security Forum (IISF) Hotel Hilton Bandung, 10 October 2012
  • 2. Presentation overview  An introduction to cyber security in the public sector  Cyber threats  Public sector responses  Steps towards a more resilient organizational cyber security strategy  Conclusion
  • 3. Understanding cyber security in the public sector A convergence of three trends: 1. Globalization 2. Connectivity 3. E-government
  • 4. 1. Globalization  ICTs contribute strongly to economic growth and better social outcomes  Benchmarking the information society is important in order for policy-makers to understand the factors behind it and how to achieve improved outcomes  Most benchmarks include a component of e-government
  • 5. 2. Connectivity  The world will go 120 114.2 from 2bn Internet 100 Mobil e s ubs cri pti ons : Devel oped countri es users in 2010 to Mobil e s ubs cri pti ons : 5bn in 2015 80 Devel opi ng countri es Per 100 inhabitants 70.1  An opportunity 60 to improve 40 service delivery 20  An opportunity 0 to leapfrog 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 The developed/developing country classifications are based on the UN M49, see: http://www.itu.int/ITU-D/ict/definitions/regions/index.html Source: ITU World Telecommunication /ICT Indicators database
  • 6. 3. E-government  Information and service delivery  Transparency and accountability  Link to broader development objectives  Digital by default
  • 7. 3.1. Supply of e-government  Benchmarking global e-government development since 2003 to “inform and improve the understanding of policy makers’ choices to shape their e-government programs” (UN 2004)  The survey measures “the willingness and capacity of countries to use online and mobile technology in the execution of government functions” (UN 2010)
  • 8. 3.2. E-government progress http://www.archive.org
  • 9. 3.3. Demand for e-government  In 1990, the American tax authority, the IRS, said 4m people used online tax filing (the first year such service was available)  In 2000, the number filing their taxes online had risen to 35m  In 2010, 100m Americans used e-file
  • 10. Enter cyber security  An increase in usage means an increase in dependency  About 75% of organizations suffer from a cyber attack every year  Attacks can compromise trust in e-government
  • 11. Categorizing cyber threats  Politically motivated threats: cyber warfare, cyber terrorism, espionage and hacktivism  Non-politically motivated threats: typically financially motivated, such as cyber crime, intellectual property theft, and fraud, but also hacking for fun or retribution, for example, from a disgruntled employee
  • 12. Understanding cyber threats “When we first started this process… agencies didn’t know what they didn’t know.” -Karen S. Evans Administrator for E-Government and Information Technology in testimony before the House Committee on Homeland Security, February 28, 2008  What is the risk?  Is there control?  Can you live with the residual risk?  What is your response plan when services become compromised?
  • 13. Public sector responses  The public sector is different as it must consider, for example:  Tension between transparency and privacy  Cost optimization; agencies often only seek to meet minimum standards  Build closer relations with other stakeholders, including the private sector  Key performance indicators (KPIs)  But one thing remains the same: Cyber security is a global phenomenon and a challenge for every organization. It must be dealt with at all levels, from the international arena to the regional, national and local levels
  • 14. Global cyber security agenda 1. Legal measures 2. Technical and procedural measures 3. Organizational structures 4. Capacity building 5. International cooperation
  • 15. The problem for organizational cyber security  People!  According to the Data Breach Investigations Report from Verizon, an American telecommunications firm, 85% of confirmed cyber breaches were not considered very difficult and 96% were avoidable  More work is needed to create and maintain comprehensive yet clearly communicated cyber security policies that are enforced
  • 16. Steps towards a more resilient organizational cyber security strategy 1. Close the gap between IT and management 2. Improve awareness and education 3. Capture technology trends, including the move from e-government to m-government
  • 17. Step #1: Close the gap between IT and management  Assess underlying factor(s), e.g. user awareness based on an internal survey  Translate results into KPIs, e.g. average user awareness  Communicate key message to management, e.g. the meaning of score(s) and their importance related to other issue(s)
  • 18. Step #2: Improve awareness and education  ICT skills divide  Governments cannot go it alone; a role for the private sector and NGOs Make people SMART:  Specific  Measurable  Attainable  Relevant  Time-bound
  • 19. Step #3: Track trends, such as mobility  New threats: from spam to spim and mobile malware  New challenges: insecure wireless connections, missing (stolen) devices, data loss, “always on” connections  Same answers: comprehensive and clearly communicated policies that are measurable
  • 20. Conclusion: measure cyber security at all levels  Compared with just a decade ago, governments have made significant progress in expanding ICT access  But just as crime have always been part of history, cyber security is likely to continue well into the future, especially since the two are increasingly intertwined  There is a demand for measurement at all levels in order to give policy-makers and public sector managers data, tools and benchmarks to better understand cyber security from a policy perspective and to communicate that message  Every case is different, yet fundamentally the same