SlideShare una empresa de Scribd logo
1 de 115
Descargar para leer sin conexión
••
CyberSecurity StrategyCyberSecurity Strategy forfor
Critical National Infrastructure!Critical National Infrastructure!
1
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Critical National Infrastructure!Critical National Infrastructure!
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!
Стратегия КибербезопасностиСтратегия Кибербезопасности
********** длядля КритическойКритической **********
2
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
********** длядля КритическойКритической **********
Национальной ИнфраструктурыНациональной Инфраструктуры
Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!
www.Valentina.net/NICE2018/www.Valentina.net/NICE2018/
““CyberVisionsCyberVisions for Business & Governments!”for Business & Governments!”
Theme (1)Theme (1) -- CyberSecurity for Critical Infrastructure:CyberSecurity for Critical Infrastructure: Business & Governments!...Business & Governments!...
-- CyberSecurity for Critical National InfrastructureCyberSecurity for Critical National Infrastructure (CNI):(CNI):
-- Case Studies of National Government Cyber ProgrammesCase Studies of National Government Cyber Programmes
-- Operational Cyber Standards, Laws & RegulationsOperational Cyber Standards, Laws & Regulations
“Cyber Strategies for Critical Business”“Cyber Strategies for Critical Business” 66thth Nov:Nov: 9:459:45 –– 10:3010:30
ThemeTheme (2)(2) –– Intelligent Cyber Surveillance:Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!...AI Video Analytics & Biometrics!...
-- 2121ststCC Cyber Landscape for Business & Government SurveillanceCyber Landscape for Business & Government Surveillance
-- Advanced Surveillance Tools using AI Video Analytics & BiometricsAdvanced Surveillance Tools using AI Video Analytics & Biometrics
3
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
-- Advanced Surveillance Tools using AI Video Analytics & BiometricsAdvanced Surveillance Tools using AI Video Analytics & Biometrics
-- Case Studies of Sector Surveillance: Transport, Retail, Culture, Defence...Case Studies of Sector Surveillance: Transport, Retail, Culture, Defence...
“Cyber Surveillance”“Cyber Surveillance” 66thth Nov: 12:15Nov: 12:15 –– 13:0013:00
Theme (3)Theme (3) –– CyberVisionCyberVision 2020 to 20302020 to 2030:: YOURYOUR 2121stst CC CyberSecurity Toolkit!...CyberSecurity Toolkit!...
-- Understanding and Mapping the Worldwide Cyber ThreatsUnderstanding and Mapping the Worldwide Cyber Threats
-- Exploring New Cyber Tools using AI & Machine LearningExploring New Cyber Tools using AI & Machine Learning
-- Discussion of Cyber Scenarios forDiscussion of Cyber Scenarios for 20202020 –– 20252025 –– 20302030 & Beyond !...& Beyond !...
“Cyber“Cyber ToolKitToolKit”” 66thth NovNov: 16:15: 16:15 –– 17:0017:00
DownloadDownload:: www.valentina.net/www.valentina.net/NICE2018NICE2018//
11 –– GlobalGlobal CyberCyber Security LandscapeSecurity Landscape
“World in Transition”“World in Transition”
22 –– UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide
““CyberCyber Security Models”Security Models”
3 --National CyberSecurity StrategiesNational CyberSecurity Strategies
“Secure YOUR Nation”“Secure YOUR Nation”
CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure!
4
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“World in Transition”“World in Transition” ““CyberCyber Security Models”Security Models” “Secure YOUR Nation”“Secure YOUR Nation”
44 –– Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia
“Practical Cyber Projects”“Practical Cyber Projects”
55 –– TOP 10TOP 10 CriticalCritical National SectorsNational Sectors
“Secure YOUR Sector”“Secure YOUR Sector”
66 –– Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security
“Secure YOUR Systems”“Secure YOUR Systems”
77 -- Standards, Regulations & LawsStandards, Regulations & Laws
”Design to Standards””Design to Standards”
88–– Professional $kill$ DevelopmentProfessional $kill$ Development
“$ Training Investment $”“$ Training Investment $”
9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap!
“Multi“Multi--Year Cyber Plan”Year Cyber Plan”
11 –– GlobalGlobal CyberCyber Security LandscapeSecurity Landscape
“World in Transition”“World in Transition”
22 –– UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide
““CyberCyber Security Models”Security Models”
3 --National CyberSecurity StrategiesNational CyberSecurity Strategies
“Secure YOUR Nation”“Secure YOUR Nation”
CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure!
11 –– GlobalGlobal CyberCyber Security LandscapeSecurity Landscape
5
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“World in Transition”“World in Transition” ““CyberCyber Security Models”Security Models” “Secure YOUR Nation”“Secure YOUR Nation”
44 –– Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia
“Practical Cyber Projects”“Practical Cyber Projects”
55 –– TOP 10TOP 10 CriticalCritical National SectorsNational Sectors
“Secure YOUR Sector”“Secure YOUR Sector”
66 –– Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security
“Secure YOUR Systems”“Secure YOUR Systems”
77 -- Standards, Regulations & LawsStandards, Regulations & Laws
”Design to Standards””Design to Standards”
88–– Professional $kill$ DevelopmentProfessional $kill$ Development
“$ Training Investment $”“$ Training Investment $”
9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap!
“Multi“Multi--Year Cyber Plan”Year Cyber Plan”
11 –– GlobalGlobal CyberCyber Security LandscapeSecurity Landscape
“World in Transition”“World in Transition”
The Challenging Complexity ofThe Challenging Complexity of Securing IP CyberspaceSecuring IP Cyberspace
6
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex
Just 121 Nations (62%)Just 121 Nations (62%)
7
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Just 121 Nations (62%)Just 121 Nations (62%)
Publish Public DomainPublish Public Domain
CyberSecurity StrategiesCyberSecurity Strategies
Available on UN/ITUAvailable on UN/ITU
Website:Website: ww.itu.intww.itu.int
Densely Populated Regions of IPDensely Populated Regions of IP CyberspaceCyberspace
8
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Global IP Internet Registries:Global IP Internet Registries:
RIPE NCCRIPE NCC == RéseauxRéseaux IPIP EuropéensEuropéens National Control CentreNational Control Centre
9
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“Outer Galaxies of Cyberspace”“Outer Galaxies of Cyberspace” –– Other IP RegistriesOther IP Registries
10
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference 1
0
Smart 3D Network Cyber Simulation:Smart 3D Network Cyber Simulation: HyperglanceHyperglance
11
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
UN/ITU: HighUN/ITU: High--Level Expert GroupLevel Expert Group
–– Global Cybersecurity AgendaGlobal Cybersecurity Agenda --
12
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
TheThe UN/ITUUN/ITU Secretary General establishedSecretary General established ““CybersecurityCybersecurity”” as TOP priority!as TOP priority!
1- Global Cyber Security LandscapeGlobal Cyber Security Landscape
“World in Transition”“World in Transition”
22 ––UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide
““CyberCyber Security ModelsSecurity Models””
3 -National CyberSecurity StrategiesNational CyberSecurity Strategies
“Secure YOUR Nation”“Secure YOUR Nation”
CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure!
22 –– UN/ITUUN/ITU CyberCyber Strategy GuideStrategy Guide
““CyberCyber Security Models”Security Models”
13
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
4 –Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia
“Practical Cyber Projects”“Practical Cyber Projects”
5 –TOP 10TOP 10 CriticalCritical National SectorsNational Sectors
“Secure YOUR Sector”“Secure YOUR Sector”
6 –Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security
“Secure YOUR Systems”“Secure YOUR Systems”
7 – Standards, Regulations & LawsStandards, Regulations & Laws
“Design to Standards”“Design to Standards”
88–– Professional $kill$ DevelopmentProfessional $kill$ Development
“$ Training Investment $”“$ Training Investment $”
9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap!
“Multi“Multi--Year Cyber Plan”Year Cyber Plan”
““CyberCyber Security Models”Security Models”
UN/ITU GCAUN/ITU GCA -- GlobalGlobal
Cybersecurity Agenda:Cybersecurity Agenda:
----------------------------------------
11 –– Legal MeasuresLegal Measures
22 –– Technical MeasuresTechnical Measures
33 –– Organisational MeasuresOrganisational Measures
44 –– Capacity BuildingCapacity Building
UN/ITU:UN/ITU: Global Cybersecurity AgendaGlobal Cybersecurity Agenda
11stst EditionEdition: UN/ITU: UN/ITU Sept 2011Sept 2011
14
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
44 –– Capacity BuildingCapacity Building
55 –– International CooperationInternational Cooperation
----------------------------------------
...The...The ITUITU constitutes aconstitutes a uniqueunique
global forumglobal forum for partnership andfor partnership and
the discussion ofthe discussion of cybersecurity.cybersecurity.
--------------------------------------
www.itu.int/ITUwww.itu.int/ITU--D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdfD/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
UN/ITU Final ReportUN/ITU Final Report: Securing Info &: Securing Info &
Comms NetworksComms Networks –– Best Cyber Practice!Best Cyber Practice!
15
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Download:Download: www.itu.int/pub/Dwww.itu.int/pub/D--STGSTG--SG02.03.1SG02.03.1--20172017
16
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
UN/ITUUN/ITU Sept 2018Sept 2018
Download:Download: www.itu.int/dms_pub/ituwww.itu.int/dms_pub/itu--d/opb/str/Dd/opb/str/D--STRSTR--CYB_GUIDE.01CYB_GUIDE.01--20182018--PDFPDF--E.pdfE.pdf
Worldwide Security inWorldwide Security in CyberspaceCyberspace!!
17
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Worldwide Security inWorldwide Security in CyberspaceCyberspace!!
-- (1)(1) ––
LegalLegal MeasuresMeasures
-- (3)(3) ––
OrganisationalOrganisational
-- (4)(4) –– Capacity BuildingCapacity Building
-- (2)(2) ––
TechnicalTechnical
&&
18
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
LegalLegal MeasuresMeasures
OrganisationalOrganisational
StructuresStructures
-- (5)(5) –– Regional and International CollaborationRegional and International Collaboration
&&
ProceduralProcedural
MeasuresMeasures
UN/ITU: Global Cybersecurity AgendaUN/ITU: Global Cybersecurity Agenda –– OnOn--LineLine
19
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
UN/ITU : GCAUN/ITU : GCA –– The Seven Strategic GoalsThe Seven Strategic Goals
-- for National & International Cybersecurityfor National & International Cybersecurity --
20
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
These 7 goals can be achieved through YOURThese 7 goals can be achieved through YOUR National Cyber Strategy!National Cyber Strategy!
United Nations/ITUUnited Nations/ITU CybersecurityCybersecurity GuidesGuides
21
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
-- UN/ITUUN/ITU CyberSecurityCyberSecurity AgendaAgenda --
Best Practice for CyberSecurity CultureBest Practice for CyberSecurity Culture
22
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
LinkLink: www.itu.int/en/publications/
-- UN/ITUUN/ITU CyberSecurityCyberSecurity AgendaAgenda --
Understanding CyberCrime (Eng/Understanding CyberCrime (Eng/RusRus))
23
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
LinkLink: www.itu.int/en/publications/
UN/ITUUN/ITU National CyberSecurity StrategyNational CyberSecurity Strategy
Toolkit (Toolkit (NCSNCS)) –– Global Cyber PartnershipGlobal Cyber Partnership
24
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
12 International Partners12 International Partners :: CyberSecurity Toolkit to help Nations to Design &CyberSecurity Toolkit to help Nations to Design &
Implement Effective CyberSecurity Programmes based uponImplement Effective CyberSecurity Programmes based upon “Best Practice”...“Best Practice”...
Download Link:Download Link: www.itu.int/pub/Dwww.itu.int/pub/D--STRSTR--CYB_GUIDE.01CYB_GUIDE.01--20182018 -- Sept 2018Sept 2018
1- Global Cyber Security LandscapeGlobal Cyber Security Landscape
“World in Transition”“World in Transition”
22 ––UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide
““CyberCyber Security Models”Security Models”
33 ––NationalNational CyberCyberSecurity StrategiesSecurity Strategies
“Secure YOUR Nation”“Secure YOUR Nation”
44 ––Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia 55 ––TOP 10TOP 10 CriticalCritical National SectorsNational Sectors 6 -Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security
CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!...
33-- NationalNational CyberCyber Security StrategiesSecurity Strategies
“Secure“Secure YOURYOUR NationNation””
25
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
44 ––Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia
“Practical Cyber Projects”“Practical Cyber Projects”
55 ––TOP 10TOP 10 CriticalCritical National SectorsNational Sectors
“Secure YOUR Sector”“Secure YOUR Sector”
6 -Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security
“Secure YOUR Systems”“Secure YOUR Systems”
7 –Standards, Regulations & LawsStandards, Regulations & Laws
“Design to Standards”“Design to Standards”
88–– Professional $kill$ DevelopmentProfessional $kill$ Development
“$“$ Training Investment $Training Investment $””
9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap!
“Multi“Multi--Year Cyber Plan”Year Cyber Plan”
“Secure“Secure YOURYOUR NationNation””
UN/ITU:UN/ITU: National Cybersecurity StrategiesNational Cybersecurity Strategies
26
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
www.itu.int/en/ITUwww.itu.int/en/ITU--D/Cybersecurity/Pages/NationalD/Cybersecurity/Pages/National--StrategiesStrategies--repository.aspxrepository.aspx
UK CyberSecurity Strategy:UK CyberSecurity Strategy: 20162016 -- 20212021
DefendDefend –– DeterDeter -- DevelopDevelop
27
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
5 Year Programme5 Year Programme Launched by UK ChancellorLaunched by UK Chancellor
Philip Hammond:Philip Hammond: Tuesday 1Tuesday 1stst November 2016November 2016
DefendDefend –– DeterDeter -- DevelopDevelop
US Government :US Government : Office of CybersecurityOffice of Cybersecurity
• Following June 2009, US Government Policy Review, the Department of Homeland Security (DHS)
has responsibility for hosting the “Office of Cybersecurity and Communications” (CS&C)Office of Cybersecurity and Communications” (CS&C)..
Within this large organisation is the “National Cyber Security Division”National Cyber Security Division” (NCSD):(NCSD):
–– National Cyberspace Response SystemNational Cyberspace Response System
• National Cyber Alert System
• US-CERT Operations
• National Cyber Response Co-ordination Group
• Cyber Cop Portal (for investigation & prosecution of cyber attacks)
–– Federal Network SecurityFederal Network Security
28
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
–– Federal Network SecurityFederal Network Security
• Ensuring maximum security of executive civilian offices & agencies
• National CDMCDM Cyber Program – Continuous Diagnostics & Mitigation
–– CyberCyber--Risk Management ProgrammesRisk Management Programmes
• Cyber Exercises: Cyber Storm
• National Outreach Awareness
• Software Assurance Program
….The US Government DHS also has a National Cyber Security Center (NCSC)….The US Government DHS also has a National Cyber Security Center (NCSC)
with the mission to protect the US Government’s Communications Networkswith the mission to protect the US Government’s Communications Networks
Canadian Government :Canadian Government : CCIRCCCIRC
•• The Canadian Cyber Incident Response Centre (CCIRC)The Canadian Cyber Incident Response Centre (CCIRC) monitors the cyber threat environment around the
clock and is responsible for coordinating the national response to any cyber security incident. Its focus is the protection
of national critical infrastructure against cyber incidents. The Centre is a part of the Government Operations Centre
and a key component of the government's all-hazards approach to national security and emergency preparedness.
29
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Critical Infrastructure Role:Critical Infrastructure Role: CCIRC works with national and international counterparts to collect, analyze and
disseminate data on cyber threats. The Centre provides analytical releases, as well as a variety of information products
and services specifically for IT professionals and managers of critical infrastructure and other related industries.
Australian Government :Australian Government : CSPCCSPC
•• TheThe Cyber Security Policy and Coordination (CSPC) CommitteeCyber Security Policy and Coordination (CSPC) Committee is the
Australian Government committee that coordinates the development of
cyber security policy for the Australian Government. The CSPC Committee:
– Provides whole of government strategic leadership on cyber security
– Determines priorities for the Australian Government
– Coordinates the response to cyber security events
– Coordinates Australian Government cyber security policy internationally.
30
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Malaysian Government:Malaysian Government: MOSTiMOSTi
31
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Singapore Government :Singapore Government : SITSASITSA
32
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
South Korea Government:South Korea Government: KISAKISA
KISA = “Korean Internet & Security AgencyKISA = “Korean Internet & Security Agency”
33
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Euro Network & Info SecurityEuro Network & Info Security AgencyAgency::enisaenisa
34
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
National Cybersecurity for Latin America & Caribbean:National Cybersecurity for Latin America & Caribbean:
-- CITEL/CICTE/OASCITEL/CICTE/OAS --
• Within Latin America & Caribbean, CITEL, CICTE and the OAS are working together on
Regional Cybersecurity Strategy, Plans & Programmes with UN/ITU support:
•• CITELCITEL = Inter-American Telecomms Commission
•• CICTECICTE = Inter-American Committee against Terrorism
•• OASOAS = Organisation of American States
35
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
NationalNational CybersecurityCybersecurity Agencies: Common RolesAgencies: Common Roles
Common roles and responsibilities for all these National Cyber Agencies:
Cyber Alerts:Cyber Alerts: Management of the National Response to Cyber Alerts, and Attacks
Education:Education: Co-ordination of the National Awareness and Skills Training Programmes
Laws:Laws: Leadership role in the development and approval of new cyber legislation
Cybercrime:Cybercrime: Facilitation for building a National Cybercrime of e-Crime Unit
Standards:Standards: Setting the national cybersecurity standards and auditing compliance
International:International: Leadership in the promotion of international partnerships
36
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
International:International: Leadership in the promotion of international partnerships
Research:Research: Support for research & development into cybersecurity technologies
CriticalCritical Sectors:Sectors: Co-ordination of National Programmes for Critical Infrastructure
IntegrationIntegration with National Physical Defence Resources – both Civilian and Military
....Next we..Next we consider a couple of Practical National CyberSecurityconsider a couple of Practical National CyberSecurity
Case Studies from the Countries ofCase Studies from the Countries of ArmeniaArmenia andand GeorgiaGeorgia!....!....
1- Global Cyber Security LandscapeGlobal Cyber Security Landscape
“World in Transition”“World in Transition”
22 ––UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide
““CyberCyber Security ModelsSecurity Models””
3 --National CyberSecurity StrategiesNational CyberSecurity Strategies
“Secure YOUR Nation”“Secure YOUR Nation”
44 –– Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia 5 –TOP 10TOP 10 CriticalCritical National SectorsNational Sectors 6 –Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security
CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure!
44 ––Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia
“Practical“Practical CyberCyber Projects”Projects”
37
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
44 –– Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia
“Practical“Practical CyberCyber ProjectsProjects””
5 –TOP 10TOP 10 CriticalCritical National SectorsNational Sectors
“Secure YOUR Sector”“Secure YOUR Sector”
6 –Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security
“Secure YOUR Systems”“Secure YOUR Systems”
7 – Standards, Regulations & LawsStandards, Regulations & Laws
“Design to Standards”“Design to Standards”
88–– Professional $kill$ DevelopmentProfessional $kill$ Development
“$ Training Investment $”“$ Training Investment $”
9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap!
“Multi“Multi--Year Cyber Plan”Year Cyber Plan”
“Practical“Practical CyberCyber Projects”Projects”
PersonalPersonal “Eastern Experiences”:“Eastern Experiences”: 19911991 -- 20142014
•• ArmeniaArmenia
•• BelarusBelarus
•• KazakhstanKazakhstan
•• PolandPoland
38
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• BulgariaBulgaria
•• Czech RepublicCzech Republic
•• GeorgiaGeorgia
•• HungaryHungary
•• PolandPoland
•• RomaniaRomania
•• RussiaRussia
•• SlovakiaSlovakia
•• UkraineUkraine
Projects includingProjects including Cybersecurity, eGovernance & Internet SolutionsCybersecurity, eGovernance & Internet Solutions
Cybersecurity for Armenia and GeorgiaCybersecurity for Armenia and Georgia
39
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Link: www.valentina.net/vaza/CyberDocs/
CybersecurityCybersecurity forfor thethe Georgian ParliamentGeorgian Parliament
40
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Critical Infrastructure Audit during UN Cybersecurity Mission: Georgian ParliamentCritical Infrastructure Audit during UN Cybersecurity Mission: Georgian Parliament
Timeline ofTimeline of “Cyber”“Cyber” Activities inActivities in GeorgiaGeorgia
•• 1994/19951994/1995 – Specification of 1st WebSite for the Georgian
Parliament with CIO – Nodar Mosashvili - (www.parliament.ge)
•• 20072007 – Full Security Audit for Georgian Parliament with new
CIO – Merab Gotsiridze (Classified EU Report for EU/TACIS)
•• 20082008 – Invited Presentation on “Real-Time Georgia” at the
1st GITI Conference (Georgian IT Innovations)
41
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
1 GITI Conference (Georgian IT Innovations)
• Link: www.valentina.net/vaza/GITI.pdf
•• 20092009 – Cybersecurity Audit of Georgian Government Ministries
& Critical Sectors (Classified Report for UN/ITU Programme)
•• 20102010 – Invited Presentation on Integrated National Security
(Cyber-Vardzia) at the 3rd Regional GITI Conference in Tbilisi
• Link: www.valentina.net/GITI2010/CyberVardzia-PaperV7.pdf
From 1From 1stst Parliament.GeParliament.Ge WebSiteWebSite inin 19941994 toto
National GeorgianNational Georgian CyberSecurityCyberSecurity inin 2008...2008...
Opening Discussions in Moscow – 1994199419941994 – to Build
1st Government Website for Georgian Parliament
42
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Dinner Reunion in Tbilisi – 2008200820082008
Case Study: White Paper: 21Case Study: White Paper: 21stst C GeorgiaC Georgia –– “Cyber“Cyber--Vardzia”Vardzia”
43
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Web LinkWeb Link :: www.Valentina.net/vardzia/Georgia2010.pdfwww.Valentina.net/vardzia/Georgia2010.pdfWeb LinkWeb Link :: www.Valentina.net/vardzia/Georgia2010.pdfwww.Valentina.net/vardzia/Georgia2010.pdf
GeorgianGeorgian IT ConferenceIT Conference –– TbilisiTbilisi -- 20082008
44
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
UN/ITUUN/ITU -- CybersecurityCybersecurity Mission to Georgia, CaucasusMission to Georgia, Caucasus
45
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Mt KazbekMt Kazbek (5033metres)(5033metres) -- CaucasusCaucasus
46
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
SunsetSunset across theacross the KakhetianKakhetian SteppesSteppes
47
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Timeline ofTimeline of “Cyber”“Cyber” Activities inActivities in ArmeniaArmenia
•• 20082008 – Discussions with Armenian Delegation at the First
Regional IT Innovation Conference (GITI - Tbilisi, Georgia)
•• 20092009 – Spring – Invited Keynote Presentation at National
IT Seminar, and meetings with Minister of Economy,
Central Bank of Armenia and CAPS/USAID Programme
48
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• 20092009 – Summer – National Programme & RoadMap on
eGovernance, eCommerce and Cybersecurity (USAID)
•• 20122012 – Summer – Invited CyberSecurity & eGovernance
MasterClasses @ UITE DigiTec Conference - Yerevan
49
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Final Report:Final Report: www.slideshare.net/DrDavidProbert/realtimearmeniawww.slideshare.net/DrDavidProbert/realtimearmenia
eGovernanceeGovernance RoadMap forRoadMap for ArmeniaArmenia:: 20092009 -- 20142014
50
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
eGovernanceeGovernance RoadMap forRoadMap for ArmeniaArmenia:: 20092009 -- 20142014
“Security“Security””-- DualDual Summits of MtSummits of Mt AraratArarat -- “Growth”“Growth”
51
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
USAIDUSAID eGovernance and Cybersecurity Mission:eGovernance and Cybersecurity Mission:
Mt AragatsMt Aragats –– South Summit (3879m)South Summit (3879m) –– ArmeniaArmenia
52
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Mt AraratMt Ararat from the Air (5137Metres)from the Air (5137Metres)
53
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Yerevan (Armenia)Yerevan (Armenia)Yerevan (Armenia)Yerevan (Armenia) totototo Tbilisi (Georgia)Tbilisi (Georgia)Tbilisi (Georgia)Tbilisi (Georgia): 108 miles – 20 mins
1- Global Cyber Security LandscapeGlobal Cyber Security Landscape
“World in Transition”“World in Transition”
22 –– UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide
““CyberCyber Security ModelsSecurity Models””
33––National CyberSecurity StrategiesNational CyberSecurity Strategies
“Secure YOUR Nation”“Secure YOUR Nation”
CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure!
55 –– TOP 10TOP 10 Critical National SectorsCritical National Sectors
54
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“World in Transition”“World in Transition” ““CyberCyber Security ModelsSecurity Models”” “Secure YOUR Nation”“Secure YOUR Nation”
4 –Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia
“Practical Cyber Projects”“Practical Cyber Projects”
55 ––TOP 10TOP 10 CriticalCritical National SectorsNational Sectors
“Secure“Secure YOURYOUR Sector”Sector”
6 –Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security
“Secure YOUR Systems”“Secure YOUR Systems”
7 – Standards, Regulations & LawsStandards, Regulations & Laws
“Design to Standards”“Design to Standards”
88–– Professional $kill$ DevelopmentProfessional $kill$ Development
“$ Training Investment $”“$ Training Investment $”
9 –YOUR Business Cyber RoadMapYOUR Business Cyber RoadMap!!
“Multi“Multi--Year Cyber Plan”Year Cyber Plan”
55 –– TOP 10TOP 10 Critical National SectorsCritical National Sectors
“Secure“Secure YOURYOUR Sector”Sector”
TOPTOP 1010 CriticalCritical National SectorsNational Sectors
1: Financial1: Financial
ServicesServices
2: Emergency2: Emergency
ServicesServices
3:3: TelecommsTelecomms &&
IT ServicesIT Services
4: Transport4: Transport,,
Ports & HubsPorts & Hubs
5:5: GovernmentGovernment
& Defence& Defence
6:6: HealthcareHealthcare
&& Food SectorFood Sector
55
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Ports & HubsPorts & Hubs & Defence& Defence && Food SectorFood Sector
7: Chemical &7: Chemical &
OilOil IndustryIndustry
8:8: Civil NuclearCivil Nuclear
& Space Sector& Space Sector
9:9: Energy &Energy &
Water UtilitiesWater Utilities
UK, USA & EuropeanUK, USA & European Governments all provide Models forGovernments all provide Models for Critical SectorsCritical Sectors!!
Our Table lists theOur Table lists the TOPTOP 1010 SectorsSectors that requirethat require Enhanced CyberSecurityEnhanced CyberSecurity!!
Cyber TerrorismCyber Terrorism against Critical Sectorsagainst Critical Sectors
•• Government/Defence:Government/Defence:
– Theft of secret intelligence, manipulation of documents, and illegal access to
confidential citizen databases & national records
•• Banking/FinanceBanking/Finance::
– Denial of Service attacks against clearing bank network, phishing attacks against
bank account & credit cards, money laundering
•• Telecommunications, Mobile & IT Services:Telecommunications, Mobile & IT Services:
– Interception of wired & wireless communications, and penetration of secure
government & military communications networks
56
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
government & military communications networks
•• Transportation, Ports, Hubs & Tourism:Transportation, Ports, Hubs & Tourism:
– Cyber Terrorism against airports, air-traffic control, coach/train transport hubs, &
malicious penetration of on-line travel networks
•• Energy & Water UtilitiesEnergy & Water Utilities
– Manipulation and disruption of the national energy grid & utilities through
interference of the process control network (SCADA)
......CybersecurityCybersecurity is ais a Critical National IssueCritical National Issue that requires athat requires a Global ResponseGlobal Response!!
Cybersecurity forCybersecurity for Banking & FinanceBanking & Finance
57
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Banking & Finance Sector:Banking & Finance Sector: Cybersecurity ThreatsCybersecurity Threats
•• Banks & Financial InstitutionsBanks & Financial Institutions are prime targets for Cybercriminals &
Cyberterrorists since they are at the heart of ALL National Economies!
•• AccessAccess to Accounts is usually indirect through phishing scams, infected
websites with malicious scripts, and personal ID Theft.
•• OnOn--Line bank transfersLine bank transfers are also commonly used for international money
laundering of funds secured from illegal activities
•• Instant Money Transfer ServicesInstant Money Transfer Services are preferred for crimes such as the
classic “Advanced Fee Scam” as well as Lottery and Auction Scams
An increasing problem is CyberCyber--ExtortionExtortion instigated through phishing
58
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
• An increasing problem is CyberCyber--ExtortionExtortion instigated through phishing
•• National & Commercial BanksNational & Commercial Banks have also been targets of DDOS cyber
attacks from politically motivated and terrorist organisations
•• Penetration Scans:Penetration Scans: Banks are pivotal to national economies and will
receive penetration scans and attempted hacks on a regular basis.
•• OnOn--Line BankingLine Banking networks including ATMs, Business and Personal
Banking are at the “sharp end” of financial security and require great
efforts towards end-user authentication & transaction network security
CybersecurityCybersecurity Threats & Risks forThreats & Risks for
the Banking & Finance Sectorthe Banking & Finance Sector
59
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
National Plans for CNIP/CIIPNational Plans for CNIP/CIIP -- Critical InformationCritical Information
Infrastructure Protection:Infrastructure Protection: USA and GermanyUSA and Germany
60
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
CybersecurityCybersecurity for Critical Informationfor Critical Information
Infrastructure of theInfrastructure of the Energy SectorEnergy Sector
61
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Cybersecurity for theCybersecurity for the Healthcare SectorHealthcare Sector
62
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Cybersecurity:Cybersecurity: International Airports:International Airports: LHRLHR--T5T5
63
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Cybersecurity Benefits:Cybersecurity Benefits: Critical Business SectorsCritical Business Sectors
• Improved cybersecurity provides significant benefits to the Government
& Critical National Sectors & Commercial Enterprises including:
–– eGovernment:eGovernment: Fully secure & cost effective delivery of on-line services
to both citizens and businesses, such as taxes & customs, social
welfare, civil & land registries, passports & driving licences
–– Defence:Defence: Early warning, alerts and defences against cyberattacks
through national CERT (Computer Emergency Response Centre)
–– Cybercrime:Cybercrime: Investigate, Digital Forensics and Prosecution of
64
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
–– Cybercrime:Cybercrime: Investigate, Digital Forensics and Prosecution of
cybercrimes such ID & Financial Theft, “Computer Misuse,
Laundering, On-Line Drug Trafficking & Pornographic Materials
–– Cyberterrorism:Cyberterrorism: Ability to assess, predict and prevent potential major
cyber terrorist attacks, and to minimise damage during events
–– Power & Water UtilitiesPower & Water Utilities: Prevent malicious damage to control systems
–– Telecommunications:Telecommunications: Top security of government communications
with alternative routings, encryption & protection against cyberattack
Cybersecurity:Cybersecurity: NATO Research AnalysisNATO Research Analysis
65
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Author: KennethAuthor: Kenneth GeersGeers -- www.ccdcoe.org/publications/books/Strategic_Cyber_Security_K_Geers.PDFwww.ccdcoe.org/publications/books/Strategic_Cyber_Security_K_Geers.PDF
1- Global Cyber Security LandscapeGlobal Cyber Security Landscape
“World in Transition”“World in Transition”
22 –– UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide
““CyberCyber Security ModelsSecurity Models””
3–National CyberSecurity StrategiesNational CyberSecurity Strategies
“Secure YOUR Nation”“Secure YOUR Nation”
CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure!
66 –– IndustrialIndustrial ICS & SCADAICS & SCADA SecuritySecurity
“Secure“Secure YOURYOUR Systems”Systems”
66
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
4 --Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia
“Practical Cyber Projects”“Practical Cyber Projects”
5 –TOP 10TOP 10 CriticalCritical National SectorsNational Sectors
“Secure YOUR Sector”“Secure YOUR Sector”
66 -- IndustrialIndustrial ICS & SCADAICS & SCADA SecuritySecurity
“Secure YOUR Systems”“Secure YOUR Systems”
7 – Standards, Regulations & LawsStandards, Regulations & Laws
“Design to Standards”“Design to Standards”
88–– Professional $kill$ DevelopmentProfessional $kill$ Development
“$ Training Investment $”“$ Training Investment $”
9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap!
“Multi“Multi--Year Cyber Plan”Year Cyber Plan”
“Secure“Secure YOURYOUR Systems”Systems”
Critical Energy Industry Sector :Critical Energy Industry Sector : “Cybersecurity for“Cybersecurity for
Automated Industrial Control & Safety Systems”Automated Industrial Control & Safety Systems”
67
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Protect againstProtect against “Stuxnet”“Stuxnet” type designer malware that attackstype designer malware that attacks ICS/ICS/SCADASCADA systemssystems
CybersecurityCybersecurity for Critical Sector Networks:for Critical Sector Networks: “Internet of Things”“Internet of Things”
Sensor Networks
68
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Vulnerable Legacy Devices:Vulnerable Legacy Devices: “IoT”“IoT”
69
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Control RoomControl Room -- Kola Nuclear Power StationKola Nuclear Power Station -- RussiaRussia
70
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Kola Nuclear Power Main Control
KolaNet Project forKolaNet Project for Nuclear Safety & SecurityNuclear Safety & Security ::1990s1990s
71
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
KarnasurtKarnasurt MineMine:: RevdaRevda –– Kola Peninsula, RussiaKola Peninsula, Russia -- 20002000
72
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Karnasurt Mine: Revda-Lovozero
“Data is the New Oil”“Data is the New Oil”
Mining Data will be as profitableMining Data will be as profitable
As Mining for Minerals in 20As Mining for Minerals in 20ththC!...C!...
CybersecurityCybersecurity using Malwareusing Malware Data MiningData Mining
based onbased on “AI/Machine Learning”:“AI/Machine Learning”: SophosSophos
73
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
INVINCEA Malware MiningINVINCEA Malware Mining
with MACHINE LEARNINGwith MACHINE LEARNING
CybersecurityCybersecurity using Malwareusing Malware Data MiningData Mining
based onbased on “AI/Machine Learning”:“AI/Machine Learning”: SophosSophos
74
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
INVINCEA Malware MiningINVINCEA Malware Mining
with MACHINE LEARNINGwith MACHINE LEARNING
SophosSophos Cybersecurity Tools using Machine/Deep Learning fromCybersecurity Tools using Machine/Deep Learning from InvinceaInvincea: 2017: 2017
CybersecurityCybersecurity using Malwareusing Malware Data MiningData Mining
based onbased on “AI/Machine Learning”:“AI/Machine Learning”: SophosSophos
75
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
INVINCEA Malware MiningINVINCEA Malware Mining
with MACHINE LEARNINGwith MACHINE LEARNING
SophosSophos Cybersecurity Tools using Machine/Deep Learning fromCybersecurity Tools using Machine/Deep Learning from InvinceaInvincea: 2017: 2017InvinceaInvincea Cyber Tools fully embedded inCyber Tools fully embedded in SophosSophos Intercept X Deep Learning: 2018Intercept X Deep Learning: 2018
IoT Cybersecurity:IoT Cybersecurity: 77--Level ArchitectureLevel Architecture
76
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
EU/IERCEU/IERC –– Research Cluster ReportsResearch Cluster Reports onon
““Smart Systems” & “Internet of Things”Smart Systems” & “Internet of Things”
77
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
IoTIoT -- UK GovernmentUK Government:: Code of PracticeCode of Practice
forfor ”Consumer IoT Security””Consumer IoT Security” –– Oct 2018Oct 2018
78
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
IoTIoT -- UK GovernmentUK Government:: Code of PracticeCode of Practice
forfor ”Consumer IoT Security””Consumer IoT Security” –– Oct 2018Oct 2018
79
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
SANS:SANS: Critical Security Controls (CSC)Critical Security Controls (CSC)
-- Top 20 CyberTop 20 Cyber DefenseDefense ActionsActions –– The SANS InstituteThe SANS Institute ––
1) Inventory of Authorised and Unauthorised Devices
2) Inventory of Authorised and Unauthorised Software
3) Secure Configurations for Hardware and Software
4) Continuous Vulnerability Protection & Remediation
5) Malware Defenses
6) Applications Software Security
7) Wireless Access Control
8) Data Recovery Capability
9) Security Skills Assessment and Training
10) Secure Configurations for Network Devices
11) Limitation of Network Ports, Protocols & Services
80
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
11) Limitation of Network Ports, Protocols & Services
12) Controlled Use of Administrative Privileges
13) Boundary Defence
14) Maintenance, Monitoring and Analysis of Audit Logs
15) Controlled Access Based on the Need to Know
16) Account Monitoring and Control
17) Data Protection
18) Incident Response and Management
19) Secure Network Engineering
20) Penetration Testing and Red Team Exercises
SANSSANS == SSysAdminysAdmin,, AAudit,udit, NNetworking andetworking and SSecurityecurity Link:Link: www.sans.org/criticalwww.sans.org/critical--securitysecurity--controls/controls/
Mapping theMapping the SANSSANS Critical Security Controls:Critical Security Controls:
US GovtUS Govt –– Dept of Homeland Security CDM ProgramDept of Homeland Security CDM Program
81
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
SANS Link:SANS Link: www.sans.org/criticalwww.sans.org/critical--securitysecurity--controls/controls/
NISTNIST CybersecurityCybersecurity FrameworkFramework
National Institute of Standards & TechnologyNational Institute of Standards & Technology
82
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Web:Web: www.nist.gov/cyberframework/www.nist.gov/cyberframework/
NATO Framework:NATO Framework: The Five Mandates andThe Five Mandates and
Six Elements of the Cybersecurity CycleSix Elements of the Cybersecurity Cycle
83
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
1- Global Cyber Security LandscapeGlobal Cyber Security Landscape
“World in Transition”“World in Transition”
22 –– UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide
““CyberCyber Security ModelsSecurity Models””
3–National CyberSecurity StrategiesNational CyberSecurity Strategies
“Secure YOUR Nation”“Secure YOUR Nation”
CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure!
77 –– StandardsStandards, Regulations & Laws, Regulations & Laws
“Design to“Design to StandardsStandards””
84
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
44 –– Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia
“Practical Cyber Projects”“Practical Cyber Projects”
5 -TOP 10TOP 10 CriticalCritical National SectorsNational Sectors
“Secure YOUR Sector”“Secure YOUR Sector”
6 – Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security
“Secure YOUR Systems”“Secure YOUR Systems”
77 –– Standards,Standards, Regulations & LawsRegulations & Laws
““Design toDesign to Standards”Standards”
88–– Professional $kill$ DevelopmentProfessional $kill$ Development
“$ Training Investment $”“$ Training Investment $”
9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap!
“Multi“Multi--Year Cyber Plan”Year Cyber Plan”
“Design to“Design to StandardsStandards””
Global Cybersecurity Standards:Global Cybersecurity Standards: PlayersPlayers
•• UN/ITU:UN/ITU: We shall be focusing in this short talk on the technical security
standards & recommendations published by the ITU as their X-Series
•• Partnerships:Partnerships: The ITU works closely in partnership with many agencies for
emerging Cybersecurity, ICT, Networking & Mobile Comms Standards
–– ENISAENISA – European Network and Information Security Agency
–– ISOISO – International Standards Organisation
85
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
–– ISOISO – International Standards Organisation
–– IETFIETF – Internet Engineering Task Force
–– ETSIETSI – European Telecommunications Standards Institute
–– IEEEIEEE – Institute of Electrical and Electronic Engineers
–– ATISATIS – Alliance for Telecommunications Industry Solutions
–– 3GPP3GPP – 3rd Generation Partnership Project
–– ANSIANSI – American National Standards Institute
–– NISTNIST – National Institute of Standards and Technology
UN/ITUUN/ITU –– X.805X.805 Cybersecurity ArchitectureCybersecurity Architecture
86
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Recommended BookRecommended Book: Security in a Web2.0 World: Security in a Web2.0 World ––
-- A Standards Based Approach(UN/ITUA Standards Based Approach(UN/ITU -- X.805)X.805) –– Author: C. SolariAuthor: C. Solari --
87
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Carlos Solari: Ex CIOCarlos Solari: Ex CIO
US GovernmentUS Government --
White HouseWhite House
Other Cyber & Physical Security Standards:Other Cyber & Physical Security Standards:
-- ISO/IECISO/IEC –– NISTNIST –– ENISAENISA-- ISFISF -- IEEEIEEE --
•• ISO/IEC:ISO/IEC: These are often adopted as “best practice” for operational aspects of
security including the ISO27001 – Information Security Management System, and
the ISO27002 – ISMS Code of Practice
•• NNIST:IST: The comprehensive publications of the “800 Series” from the Computer
Security Division are complementary to the ITU standards
•• ENISA:ENISA: The European Networks Security Agency publishes many detailed
88
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• ENISA:ENISA: The European Networks Security Agency publishes many detailed
security studies and recommendations, with some useful work and guidelines for
the establishment of national CERTs
•• ISFISF – Information Security Forum – Founded 1989 to provide research, analysis
and methodologies for Information Security and Risk Management
•• IEEEIEEE:: An important global player in ICT standards, and a key ITU partner in the
development of new standards for open network cybersecurity
“Information Security Management System”“Information Security Management System”
-- Implementation Process: ISO27001/2Implementation Process: ISO27001/2 --
89
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
FlowFlow--Chart: Route toChart: Route to ISO27001/2ISO27001/2 CertificationCertification
90
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
enisaenisa:: European Network &European Network &
Information Security AgencyInformation Security Agency
91
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
UK CYBERCRIME LEGISLATION
1. The Official Secrets Acts - 1911 to 1989
2. The Public Records Acts - 1958 to 1967
3. The Data Protection Act - 1998
4. The Freedom of Information Act - 2000
5. The Human Rights Act - 1998
6. The Computer Misuse Act 1990
7. The Copyright Designs and Patents Act 1988
8. The Civil Evidence Act 1968
9. The Police and Criminal Evidence Act 1984
UKUK CybercrimeCybercrime LegislationLegislation
92
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
9. The Police and Criminal Evidence Act 1984
10. The Wireless Telegraphy Act 1949 - 2006
11. The Communications Act 2003
12. The Regulation of Investigatory Powers Act 2000 (RIPA)
13. The Telecommunications Regulations 2000 (Interception)
14. The Civil Contingencies Act 2004
15. The Anti-Terrorism, Crime and Security Act 2001
16. The Forgery and Counterfeiting Act 1981
17. The Fraud Act 2006
18. Police Justice Act 2006
19. The Theft Act - 1978 to 1996
20. The Cybersecurity Strategy - Cabinet Office - June 2009
1.1. UKUK Official Secrets ActsOfficial Secrets Acts 1911 to 19891911 to 1989
• Official Secrets Acts 1911 to 19891911 to 1989
–– Unauthorised Disclosure of Official InformatioUnauthorised Disclosure of Official Informationn
Under the Official Secrets Act 1989Official Secrets Act 1989, it is an offence for a Crown servant
or government contractor to disclose official information in any of the
protected categories if the disclosure is made without lawful authority
and is damaging to the national interest. It is also an offence if a member
93
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
protected categories if the disclosure is made without lawful authority
and is damaging to the national interest. It is also an offence if a member
of the public, or any other person who is not a Crown servant or
government contractor under the Act, has in his or her possession, official
information in one of the protected categories, and the information has
been disclosed without lawful authority, or entrusted by a Crown servant
or government contractor on terms requiring it to be held in confidence.
Cybersecurity Relevance:Cybersecurity Relevance: Covers all electronic communications,
documents and media whatever format.
NATONATO CybersecurityCybersecurity
Framework ManualFramework Manual
94
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
NATONATO Cooperative Cyber DefenceCooperative Cyber Defence
Centre of ExcellenceCentre of Excellence –– CCDCOECCDCOE -- EstoniaEstonia
95
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Recommended Cyber Reference Books: fromRecommended Cyber Reference Books: from NATONATO -- ccdcoe.org/tallinnccdcoe.org/tallinn--manual.htmlmanual.html
1- Global Cyber Security LandscapeGlobal Cyber Security Landscape
“World in Transition”“World in Transition”
22 ––UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide
““CyberCyber Security ModelsSecurity Models””
3–National CyberSecurity StrategiesNational CyberSecurity Strategies
“Secure YOUR Nation”“Secure YOUR Nation”
4 –Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia 5 –TOP 10TOP 10 CriticalCritical National SectorsNational Sectors 6 – Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security
CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure!
88 –– ProfessionalProfessional $kill$$kill$ DevelopmentDevelopment
““$$ Training InvestmentTraining Investment $$””
96
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
4 –Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia
“Practical Cyber Projects”“Practical Cyber Projects”
5 –TOP 10TOP 10 CriticalCritical National SectorsNational Sectors
“Secure YOUR“Secure YOUR SecorSecor””
6 – Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security
“Secure Your Systems”“Secure Your Systems”
7 – Standards, Regulations & LawsStandards, Regulations & Laws
“Design to Standards”“Design to Standards”
88–– ProfessionalProfessional $kill$$kill$ DevelopmentDevelopment
“$“$ Training InvestmentTraining Investment $”$”
9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap!
“Multi“Multi--Year Cyber Plan”Year Cyber Plan”
““$$ Training InvestmentTraining Investment $$””
CISSPCISSP CertificationCertification –– InternationalInternational CyberCyber QualificationQualification
• The CISSPCISSP –– Certified Information Systems Security Professional is one of the highest
international qualifications from the (ISC)² , and is based upon the core tenets of
Confidentiality, Integrity & AvailabilityConfidentiality, Integrity & Availability::
1) Access Control
2) Application Security
3) Business Continuity and Disaster Recovery
4) Cryptography
5) Information Security and Risk Management
97
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
5) Information Security and Risk Management
6) Legal, Regulations, Compliance and Investigations
7) Operations Security
8) Physical (Environmental) Security
9) Security Architecture and Design
10)Telecommunications and Network Security
•• An inAn in--depth study of all thesedepth study of all these Security topicsSecurity topics would fill an intensivewould fill an intensive 3 month training3 month training
schedule, but I hope that theseschedule, but I hope that these 3 Short Talks @ NICE3 Short Talks @ NICE have provided the foundations!have provided the foundations!
SecuringSecuring JamaicaJamaica inin CyberspaceCyberspace! :! : 20102010 -- 20182018
- (1) –
Legal Measures -(2) –
Technical&
Procedural
-(3) –
Organizational
-(4) –Capacity Building
98
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference 9
8
Procedural
Measures
Organizational
Structures
-(5) –InternationalCollaboration
ITU:ITU: CybersecurityCybersecurity TrainingTraining –– UTECH, Kingston,UTECH, Kingston, JAMAICAJAMAICA
-- Government, Central Bank, Energy, Telecoms SectorsGovernment, Central Bank, Energy, Telecoms Sectors --
99
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
IMPACTIMPACT : Worldwide: Worldwide CybersecurityCybersecurity AllianceAlliance
IMPACT International Partners: ITU, UN, INTERPOL and CTOIMPACT International Partners: ITU, UN, INTERPOL and CTO
100
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Industry Partners include: Symantec, Kaspersky Labs, Cisco, Microsoft,Industry Partners include: Symantec, Kaspersky Labs, Cisco, Microsoft, (ISC)²,(ISC)²,
FF--Secure, ECSecure, EC--Council, Iris, GuardTime, Trend Micro and the SANS InstituteCouncil, Iris, GuardTime, Trend Micro and the SANS Institute
MSc CyberSecurity CoursesMSc CyberSecurity Courses:: CertifiedCertified
by the UK Governmentby the UK Government –– GCHQ/CESGGCHQ/CESG
101
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
1- Global Cyber Security LandscapeGlobal Cyber Security Landscape
“World in Transition”“World in Transition”
22 –– UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide
““CyberCyber Security ModelsSecurity Models””
3–National CyberSecurity StrategiesNational CyberSecurity Strategies
“Secure YOUR Nation”“Secure YOUR Nation”
CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure!
99 –– YOUR BusinessYOUR Business CyberCyber RoadMapRoadMap
“Multi“Multi--YearYear CyberCyber Plan”Plan”
102
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
4 –Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia
“Practical Cyber Projects”“Practical Cyber Projects”
5 -TOP 10TOP 10 CriticalCritical National SectorsNational Sectors
”Secure YOUR Sector””Secure YOUR Sector”
6 – Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security
“Secure YOUR Systems”“Secure YOUR Systems”
7 –Standards, Regulations & LawsStandards, Regulations & Laws
“Design to Standards”“Design to Standards”
88–– Professional $kill$ DevelopmentProfessional $kill$ Development
“$ Training Investment $”“$ Training Investment $”
9 –YOUR BusinessYOUR Business CyberCyber RoadMap!RoadMap!
“Multi“Multi--YearYear CyberCyber PlanPlan””
“Multi“Multi--YearYear CyberCyber Plan”Plan”
National Cybersecurity Project RoadMapNational Cybersecurity Project RoadMap::
Spanning the UN/ITU Cybersecurity FrameworkSpanning the UN/ITU Cybersecurity Framework
1st Quarter
2nd Quarter
103
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
3rd Quarter
4th Quarter
National Cybersecurity StrategyNational Cybersecurity Strategy :: “The Shopping List”“The Shopping List”
Smart Security for Business & Government is a MultiSmart Security for Business & Government is a Multi--Year Programme!Year Programme!
1)1) National Cybersecurity AgencyNational Cybersecurity Agency:: Establishment of a CERT/CSIRT & National
Government Cybersecurity Agency within the Government Ministries
2)2) CNI:CNI: Long Term Critical National Information Infrastructure Protection (CNI)
3)3) System UpgradesSystem Upgrades:: Technical Infrastructure Upgrades including Hardware,
Software, Databases, Secure Network Links, Biometrics & RFID
4) BackBack--UpUp:: Disaster Recovery, Business Continuity and Back-Up Systems
5)5) Physical SecurityPhysical Security:: Physical Security Applications – CCTV, Alarms, Control Centre
104
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
5)5) Physical SecurityPhysical Security:: Physical Security Applications – CCTV, Alarms, Control Centre
6)6) Awareness CampaignAwareness Campaign:: Government Campaign for Cybersecurity awareness
7)7) TrainingTraining:: National Cybersecurity Skills & Professional Training Programme
8)8) EncryptionEncryption:: National User & Systems PKI Authentication Programme
9)9) Laws:Laws: Programme for Drafting and Enforcing Cyber Laws, Policies & Regulations
..….It is also important to develop an in..….It is also important to develop an in--depth economic “costdepth economic “cost--benefit” analysis andbenefit” analysis and
Business Case in order to evaluate the “Return on Investment” for Cyber SecurityBusiness Case in order to evaluate the “Return on Investment” for Cyber Security
Critical Economic Sectors:Critical Economic Sectors: Cyber RoadMapsCyber RoadMaps
Each Critical Service Sector such as Banking & Finance, Civil &Each Critical Service Sector such as Banking & Finance, Civil &
National Defence, Telecommunications and Energy will require itsNational Defence, Telecommunications and Energy will require its
own Cyber Strategy, Risk Assessment, Roadmap & Action Plan:own Cyber Strategy, Risk Assessment, Roadmap & Action Plan:
In this talk we’ve discussed some practical ways in
105
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
In this talk we’ve discussed some practical ways in
which you may develop Strategies, Actions and
Activities for CyberSecurity in each Critical Sector…
We’ve also reviewed the Operational Priorities &
Security Policies that are required to significantly
reduce Cybercrime & Cyber Terrorism Attacks!…......
YOUR CybersecurityYOUR Cybersecurity Action PlanAction Plan!...!...
•• Phase 1:Phase 1: Define your Cybersecurity STRATEGY and OBJECTIVES
•• Phase 2:Phase 2: Establish, Resource & Rrain your Cybersecurity ORGANISATION
•• Phase 3:Phase 3: Agree and Communicate Technical & Operational Standards
•• Phase 4:Phase 4: Review, Audit and Upgrade all ICT Systems during next year
106
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
•• Phase 4:Phase 4: Review, Audit and Upgrade all ICT Systems during next year
•• Phase 5:Phase 5: On-Going Operational Management by CSO/CISO, including regular
compliance audits and technical upgrades to new Cyber Threats
……In summary, the adoption of……In summary, the adoption of International StandardsInternational Standards for YOUR National &for YOUR National &
Enterprise ICT systems andEnterprise ICT systems and ISO Operational ProceduresISO Operational Procedures will have a Major Impactwill have a Major Impact
onon CybercrimeCybercrime, & reduce, & reduce Cyber AttacksCyber Attacks on YOURon YOUR Critical National InfrastructureCritical National Infrastructure
“Real“Real--Time Defence”Time Defence” fromfrom Cyber AttacksCyber Attacks””
.......Energising.......Energising YOURYOUR
Business & GovernmentBusiness & Government
with an Intelligentwith an Intelligent
Cyber$ecurityCyber$ecurity $$trategytrategy,,
Roadmap & Cyber ToolsRoadmap & Cyber Tools
107
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Roadmap & Cyber ToolsRoadmap & Cyber Tools
will increase yourwill increase your
Defence from “Cyber”Defence from “Cyber”
Threats and AttacksThreats and Attacks!!
“The Director’s Desk – Scientific Institute” - 2002
Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov
The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov
108
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!!
109
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
DownloadDownload CyberCyber Slides:Slides: www.valentina.net/NICE2018/www.valentina.net/NICE2018/
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!...
3838thth EastEast--West Security Conference:West Security Conference: Nice, UKNice, UK
110
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“NICE“NICE –– 1880”1880”
ThankThank--You!You!ThankThank--You!You!
CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!...
3838thth EastEast--West Security Conference:West Security Conference: Nice, UKNice, UK
111
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
“NICE“NICE –– 1880”1880”
ThankThank--You!You!ThankThank--You!You!
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/www.Valentina.net/NICE2018NICE2018//
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/www.Valentina.net/NICE2018NICE2018//
Download Presentation Slides:Download Presentation Slides:
www.Valentina.netwww.Valentina.net/NICE2018//NICE2018/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.netwww.Valentina.net/NICE2018//NICE2018/
112
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
AdditionalAdditional CybersecurityCybersecurity ResourcesResources
113
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert
Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with
telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing
Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the
“knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business
European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included
support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments.
Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998)
Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web-
Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record.
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
114
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
networking products with technology partners from both UK and Taiwan.
Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall
responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products.
Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT
security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries.
UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas
Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree
(Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) ,
and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2018 Editions2018 Editions.
CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure!
3838thth EastEast--West Security ConferenceWest Security Conference:: NICENICE
115
“Cybersecurity for Critical National
Infrastructure”- Strategy & RoadMap
Nice, France – 5th/6th Nov 2018
© Dr David E. Probert : www.VAZA.com ©
38th International East-West Security Conference

Más contenido relacionado

La actualidad más candente

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatMotorola Solutions
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapDavid Sweigert
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageErik Van Buggenhout
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesIvanti
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptxSandeepK707540
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsIain Dickson
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 

La actualidad más candente (20)

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model Roadmap
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 

Similar a Cybersecurity for Critical National Infrastructure

Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Dr David Probert
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!Dr David Probert
 
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!Dr David Probert
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & BlockchainDr David Probert
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsDr David Probert
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!Dr David Probert
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceDr David Probert
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Dr David Probert
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Dr David Probert
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityDr David Probert
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessDr David Probert
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... Dr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Dr David Probert
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!Dr David Probert
 

Similar a Cybersecurity for Critical National Infrastructure (20)

Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
 
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 

Más de Dr David Probert

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!Dr David Probert
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsDr David Probert
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)Dr David Probert
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC DonetskDr David Probert
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsDr David Probert
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!Dr David Probert
 
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!Dr David Probert
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
 
Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Dr David Probert
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentDr David Probert
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseDr David Probert
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic BusinessDr David Probert
 

Más de Dr David Probert (14)

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
 

Último

Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Último (20)

Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

Cybersecurity for Critical National Infrastructure

  • 1. •• CyberSecurity StrategyCyberSecurity Strategy forfor Critical National Infrastructure!Critical National Infrastructure! 1 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Critical National Infrastructure!Critical National Infrastructure! Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!
  • 2. Стратегия КибербезопасностиСтратегия Кибербезопасности ********** длядля КритическойКритической ********** 2 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference ********** длядля КритическойКритической ********** Национальной ИнфраструктурыНациональной Инфраструктуры Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana!Dedicated to Ethan, Alice, Hugh, Matthew, Abigail, Micah, Roscoe & Tatiana! www.Valentina.net/NICE2018/www.Valentina.net/NICE2018/
  • 3. ““CyberVisionsCyberVisions for Business & Governments!”for Business & Governments!” Theme (1)Theme (1) -- CyberSecurity for Critical Infrastructure:CyberSecurity for Critical Infrastructure: Business & Governments!...Business & Governments!... -- CyberSecurity for Critical National InfrastructureCyberSecurity for Critical National Infrastructure (CNI):(CNI): -- Case Studies of National Government Cyber ProgrammesCase Studies of National Government Cyber Programmes -- Operational Cyber Standards, Laws & RegulationsOperational Cyber Standards, Laws & Regulations “Cyber Strategies for Critical Business”“Cyber Strategies for Critical Business” 66thth Nov:Nov: 9:459:45 –– 10:3010:30 ThemeTheme (2)(2) –– Intelligent Cyber Surveillance:Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!...AI Video Analytics & Biometrics!... -- 2121ststCC Cyber Landscape for Business & Government SurveillanceCyber Landscape for Business & Government Surveillance -- Advanced Surveillance Tools using AI Video Analytics & BiometricsAdvanced Surveillance Tools using AI Video Analytics & Biometrics 3 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference -- Advanced Surveillance Tools using AI Video Analytics & BiometricsAdvanced Surveillance Tools using AI Video Analytics & Biometrics -- Case Studies of Sector Surveillance: Transport, Retail, Culture, Defence...Case Studies of Sector Surveillance: Transport, Retail, Culture, Defence... “Cyber Surveillance”“Cyber Surveillance” 66thth Nov: 12:15Nov: 12:15 –– 13:0013:00 Theme (3)Theme (3) –– CyberVisionCyberVision 2020 to 20302020 to 2030:: YOURYOUR 2121stst CC CyberSecurity Toolkit!...CyberSecurity Toolkit!... -- Understanding and Mapping the Worldwide Cyber ThreatsUnderstanding and Mapping the Worldwide Cyber Threats -- Exploring New Cyber Tools using AI & Machine LearningExploring New Cyber Tools using AI & Machine Learning -- Discussion of Cyber Scenarios forDiscussion of Cyber Scenarios for 20202020 –– 20252025 –– 20302030 & Beyond !...& Beyond !... “Cyber“Cyber ToolKitToolKit”” 66thth NovNov: 16:15: 16:15 –– 17:0017:00 DownloadDownload:: www.valentina.net/www.valentina.net/NICE2018NICE2018//
  • 4. 11 –– GlobalGlobal CyberCyber Security LandscapeSecurity Landscape “World in Transition”“World in Transition” 22 –– UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide ““CyberCyber Security Models”Security Models” 3 --National CyberSecurity StrategiesNational CyberSecurity Strategies “Secure YOUR Nation”“Secure YOUR Nation” CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure! 4 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “World in Transition”“World in Transition” ““CyberCyber Security Models”Security Models” “Secure YOUR Nation”“Secure YOUR Nation” 44 –– Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia “Practical Cyber Projects”“Practical Cyber Projects” 55 –– TOP 10TOP 10 CriticalCritical National SectorsNational Sectors “Secure YOUR Sector”“Secure YOUR Sector” 66 –– Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security “Secure YOUR Systems”“Secure YOUR Systems” 77 -- Standards, Regulations & LawsStandards, Regulations & Laws ”Design to Standards””Design to Standards” 88–– Professional $kill$ DevelopmentProfessional $kill$ Development “$ Training Investment $”“$ Training Investment $” 9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap! “Multi“Multi--Year Cyber Plan”Year Cyber Plan”
  • 5. 11 –– GlobalGlobal CyberCyber Security LandscapeSecurity Landscape “World in Transition”“World in Transition” 22 –– UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide ““CyberCyber Security Models”Security Models” 3 --National CyberSecurity StrategiesNational CyberSecurity Strategies “Secure YOUR Nation”“Secure YOUR Nation” CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure! 11 –– GlobalGlobal CyberCyber Security LandscapeSecurity Landscape 5 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “World in Transition”“World in Transition” ““CyberCyber Security Models”Security Models” “Secure YOUR Nation”“Secure YOUR Nation” 44 –– Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia “Practical Cyber Projects”“Practical Cyber Projects” 55 –– TOP 10TOP 10 CriticalCritical National SectorsNational Sectors “Secure YOUR Sector”“Secure YOUR Sector” 66 –– Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security “Secure YOUR Systems”“Secure YOUR Systems” 77 -- Standards, Regulations & LawsStandards, Regulations & Laws ”Design to Standards””Design to Standards” 88–– Professional $kill$ DevelopmentProfessional $kill$ Development “$ Training Investment $”“$ Training Investment $” 9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap! “Multi“Multi--Year Cyber Plan”Year Cyber Plan” 11 –– GlobalGlobal CyberCyber Security LandscapeSecurity Landscape “World in Transition”“World in Transition”
  • 6. The Challenging Complexity ofThe Challenging Complexity of Securing IP CyberspaceSecuring IP Cyberspace 6 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 7. UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex Just 121 Nations (62%)Just 121 Nations (62%) 7 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Just 121 Nations (62%)Just 121 Nations (62%) Publish Public DomainPublish Public Domain CyberSecurity StrategiesCyberSecurity Strategies Available on UN/ITUAvailable on UN/ITU Website:Website: ww.itu.intww.itu.int
  • 8. Densely Populated Regions of IPDensely Populated Regions of IP CyberspaceCyberspace 8 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 9. Global IP Internet Registries:Global IP Internet Registries: RIPE NCCRIPE NCC == RéseauxRéseaux IPIP EuropéensEuropéens National Control CentreNational Control Centre 9 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 10. “Outer Galaxies of Cyberspace”“Outer Galaxies of Cyberspace” –– Other IP RegistriesOther IP Registries 10 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 1 0
  • 11. Smart 3D Network Cyber Simulation:Smart 3D Network Cyber Simulation: HyperglanceHyperglance 11 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 12. UN/ITU: HighUN/ITU: High--Level Expert GroupLevel Expert Group –– Global Cybersecurity AgendaGlobal Cybersecurity Agenda -- 12 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference TheThe UN/ITUUN/ITU Secretary General establishedSecretary General established ““CybersecurityCybersecurity”” as TOP priority!as TOP priority!
  • 13. 1- Global Cyber Security LandscapeGlobal Cyber Security Landscape “World in Transition”“World in Transition” 22 ––UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide ““CyberCyber Security ModelsSecurity Models”” 3 -National CyberSecurity StrategiesNational CyberSecurity Strategies “Secure YOUR Nation”“Secure YOUR Nation” CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure! 22 –– UN/ITUUN/ITU CyberCyber Strategy GuideStrategy Guide ““CyberCyber Security Models”Security Models” 13 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 4 –Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia “Practical Cyber Projects”“Practical Cyber Projects” 5 –TOP 10TOP 10 CriticalCritical National SectorsNational Sectors “Secure YOUR Sector”“Secure YOUR Sector” 6 –Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security “Secure YOUR Systems”“Secure YOUR Systems” 7 – Standards, Regulations & LawsStandards, Regulations & Laws “Design to Standards”“Design to Standards” 88–– Professional $kill$ DevelopmentProfessional $kill$ Development “$ Training Investment $”“$ Training Investment $” 9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap! “Multi“Multi--Year Cyber Plan”Year Cyber Plan” ““CyberCyber Security Models”Security Models”
  • 14. UN/ITU GCAUN/ITU GCA -- GlobalGlobal Cybersecurity Agenda:Cybersecurity Agenda: ---------------------------------------- 11 –– Legal MeasuresLegal Measures 22 –– Technical MeasuresTechnical Measures 33 –– Organisational MeasuresOrganisational Measures 44 –– Capacity BuildingCapacity Building UN/ITU:UN/ITU: Global Cybersecurity AgendaGlobal Cybersecurity Agenda 11stst EditionEdition: UN/ITU: UN/ITU Sept 2011Sept 2011 14 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 44 –– Capacity BuildingCapacity Building 55 –– International CooperationInternational Cooperation ---------------------------------------- ...The...The ITUITU constitutes aconstitutes a uniqueunique global forumglobal forum for partnership andfor partnership and the discussion ofthe discussion of cybersecurity.cybersecurity. -------------------------------------- www.itu.int/ITUwww.itu.int/ITU--D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdfD/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
  • 15. UN/ITU Final ReportUN/ITU Final Report: Securing Info &: Securing Info & Comms NetworksComms Networks –– Best Cyber Practice!Best Cyber Practice! 15 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Download:Download: www.itu.int/pub/Dwww.itu.int/pub/D--STGSTG--SG02.03.1SG02.03.1--20172017
  • 16. 16 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference UN/ITUUN/ITU Sept 2018Sept 2018 Download:Download: www.itu.int/dms_pub/ituwww.itu.int/dms_pub/itu--d/opb/str/Dd/opb/str/D--STRSTR--CYB_GUIDE.01CYB_GUIDE.01--20182018--PDFPDF--E.pdfE.pdf
  • 17. Worldwide Security inWorldwide Security in CyberspaceCyberspace!! 17 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 18. Worldwide Security inWorldwide Security in CyberspaceCyberspace!! -- (1)(1) –– LegalLegal MeasuresMeasures -- (3)(3) –– OrganisationalOrganisational -- (4)(4) –– Capacity BuildingCapacity Building -- (2)(2) –– TechnicalTechnical && 18 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference LegalLegal MeasuresMeasures OrganisationalOrganisational StructuresStructures -- (5)(5) –– Regional and International CollaborationRegional and International Collaboration && ProceduralProcedural MeasuresMeasures
  • 19. UN/ITU: Global Cybersecurity AgendaUN/ITU: Global Cybersecurity Agenda –– OnOn--LineLine 19 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 20. UN/ITU : GCAUN/ITU : GCA –– The Seven Strategic GoalsThe Seven Strategic Goals -- for National & International Cybersecurityfor National & International Cybersecurity -- 20 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference These 7 goals can be achieved through YOURThese 7 goals can be achieved through YOUR National Cyber Strategy!National Cyber Strategy!
  • 21. United Nations/ITUUnited Nations/ITU CybersecurityCybersecurity GuidesGuides 21 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 22. -- UN/ITUUN/ITU CyberSecurityCyberSecurity AgendaAgenda -- Best Practice for CyberSecurity CultureBest Practice for CyberSecurity Culture 22 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference LinkLink: www.itu.int/en/publications/
  • 23. -- UN/ITUUN/ITU CyberSecurityCyberSecurity AgendaAgenda -- Understanding CyberCrime (Eng/Understanding CyberCrime (Eng/RusRus)) 23 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference LinkLink: www.itu.int/en/publications/
  • 24. UN/ITUUN/ITU National CyberSecurity StrategyNational CyberSecurity Strategy Toolkit (Toolkit (NCSNCS)) –– Global Cyber PartnershipGlobal Cyber Partnership 24 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 12 International Partners12 International Partners :: CyberSecurity Toolkit to help Nations to Design &CyberSecurity Toolkit to help Nations to Design & Implement Effective CyberSecurity Programmes based uponImplement Effective CyberSecurity Programmes based upon “Best Practice”...“Best Practice”... Download Link:Download Link: www.itu.int/pub/Dwww.itu.int/pub/D--STRSTR--CYB_GUIDE.01CYB_GUIDE.01--20182018 -- Sept 2018Sept 2018
  • 25. 1- Global Cyber Security LandscapeGlobal Cyber Security Landscape “World in Transition”“World in Transition” 22 ––UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide ““CyberCyber Security Models”Security Models” 33 ––NationalNational CyberCyberSecurity StrategiesSecurity Strategies “Secure YOUR Nation”“Secure YOUR Nation” 44 ––Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia 55 ––TOP 10TOP 10 CriticalCritical National SectorsNational Sectors 6 -Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security CyberCyberSecuritySecurity 20182018--20252025 && BeyondBeyond!...!... 33-- NationalNational CyberCyber Security StrategiesSecurity Strategies “Secure“Secure YOURYOUR NationNation”” 25 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 44 ––Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia “Practical Cyber Projects”“Practical Cyber Projects” 55 ––TOP 10TOP 10 CriticalCritical National SectorsNational Sectors “Secure YOUR Sector”“Secure YOUR Sector” 6 -Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security “Secure YOUR Systems”“Secure YOUR Systems” 7 –Standards, Regulations & LawsStandards, Regulations & Laws “Design to Standards”“Design to Standards” 88–– Professional $kill$ DevelopmentProfessional $kill$ Development “$“$ Training Investment $Training Investment $”” 9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap! “Multi“Multi--Year Cyber Plan”Year Cyber Plan” “Secure“Secure YOURYOUR NationNation””
  • 26. UN/ITU:UN/ITU: National Cybersecurity StrategiesNational Cybersecurity Strategies 26 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference www.itu.int/en/ITUwww.itu.int/en/ITU--D/Cybersecurity/Pages/NationalD/Cybersecurity/Pages/National--StrategiesStrategies--repository.aspxrepository.aspx
  • 27. UK CyberSecurity Strategy:UK CyberSecurity Strategy: 20162016 -- 20212021 DefendDefend –– DeterDeter -- DevelopDevelop 27 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 5 Year Programme5 Year Programme Launched by UK ChancellorLaunched by UK Chancellor Philip Hammond:Philip Hammond: Tuesday 1Tuesday 1stst November 2016November 2016 DefendDefend –– DeterDeter -- DevelopDevelop
  • 28. US Government :US Government : Office of CybersecurityOffice of Cybersecurity • Following June 2009, US Government Policy Review, the Department of Homeland Security (DHS) has responsibility for hosting the “Office of Cybersecurity and Communications” (CS&C)Office of Cybersecurity and Communications” (CS&C).. Within this large organisation is the “National Cyber Security Division”National Cyber Security Division” (NCSD):(NCSD): –– National Cyberspace Response SystemNational Cyberspace Response System • National Cyber Alert System • US-CERT Operations • National Cyber Response Co-ordination Group • Cyber Cop Portal (for investigation & prosecution of cyber attacks) –– Federal Network SecurityFederal Network Security 28 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference –– Federal Network SecurityFederal Network Security • Ensuring maximum security of executive civilian offices & agencies • National CDMCDM Cyber Program – Continuous Diagnostics & Mitigation –– CyberCyber--Risk Management ProgrammesRisk Management Programmes • Cyber Exercises: Cyber Storm • National Outreach Awareness • Software Assurance Program ….The US Government DHS also has a National Cyber Security Center (NCSC)….The US Government DHS also has a National Cyber Security Center (NCSC) with the mission to protect the US Government’s Communications Networkswith the mission to protect the US Government’s Communications Networks
  • 29. Canadian Government :Canadian Government : CCIRCCCIRC •• The Canadian Cyber Incident Response Centre (CCIRC)The Canadian Cyber Incident Response Centre (CCIRC) monitors the cyber threat environment around the clock and is responsible for coordinating the national response to any cyber security incident. Its focus is the protection of national critical infrastructure against cyber incidents. The Centre is a part of the Government Operations Centre and a key component of the government's all-hazards approach to national security and emergency preparedness. 29 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Critical Infrastructure Role:Critical Infrastructure Role: CCIRC works with national and international counterparts to collect, analyze and disseminate data on cyber threats. The Centre provides analytical releases, as well as a variety of information products and services specifically for IT professionals and managers of critical infrastructure and other related industries.
  • 30. Australian Government :Australian Government : CSPCCSPC •• TheThe Cyber Security Policy and Coordination (CSPC) CommitteeCyber Security Policy and Coordination (CSPC) Committee is the Australian Government committee that coordinates the development of cyber security policy for the Australian Government. The CSPC Committee: – Provides whole of government strategic leadership on cyber security – Determines priorities for the Australian Government – Coordinates the response to cyber security events – Coordinates Australian Government cyber security policy internationally. 30 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 31. Malaysian Government:Malaysian Government: MOSTiMOSTi 31 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 32. Singapore Government :Singapore Government : SITSASITSA 32 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 33. South Korea Government:South Korea Government: KISAKISA KISA = “Korean Internet & Security AgencyKISA = “Korean Internet & Security Agency” 33 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 34. Euro Network & Info SecurityEuro Network & Info Security AgencyAgency::enisaenisa 34 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 35. National Cybersecurity for Latin America & Caribbean:National Cybersecurity for Latin America & Caribbean: -- CITEL/CICTE/OASCITEL/CICTE/OAS -- • Within Latin America & Caribbean, CITEL, CICTE and the OAS are working together on Regional Cybersecurity Strategy, Plans & Programmes with UN/ITU support: •• CITELCITEL = Inter-American Telecomms Commission •• CICTECICTE = Inter-American Committee against Terrorism •• OASOAS = Organisation of American States 35 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 36. NationalNational CybersecurityCybersecurity Agencies: Common RolesAgencies: Common Roles Common roles and responsibilities for all these National Cyber Agencies: Cyber Alerts:Cyber Alerts: Management of the National Response to Cyber Alerts, and Attacks Education:Education: Co-ordination of the National Awareness and Skills Training Programmes Laws:Laws: Leadership role in the development and approval of new cyber legislation Cybercrime:Cybercrime: Facilitation for building a National Cybercrime of e-Crime Unit Standards:Standards: Setting the national cybersecurity standards and auditing compliance International:International: Leadership in the promotion of international partnerships 36 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference International:International: Leadership in the promotion of international partnerships Research:Research: Support for research & development into cybersecurity technologies CriticalCritical Sectors:Sectors: Co-ordination of National Programmes for Critical Infrastructure IntegrationIntegration with National Physical Defence Resources – both Civilian and Military ....Next we..Next we consider a couple of Practical National CyberSecurityconsider a couple of Practical National CyberSecurity Case Studies from the Countries ofCase Studies from the Countries of ArmeniaArmenia andand GeorgiaGeorgia!....!....
  • 37. 1- Global Cyber Security LandscapeGlobal Cyber Security Landscape “World in Transition”“World in Transition” 22 ––UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide ““CyberCyber Security ModelsSecurity Models”” 3 --National CyberSecurity StrategiesNational CyberSecurity Strategies “Secure YOUR Nation”“Secure YOUR Nation” 44 –– Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia 5 –TOP 10TOP 10 CriticalCritical National SectorsNational Sectors 6 –Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure! 44 ––Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia “Practical“Practical CyberCyber Projects”Projects” 37 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 44 –– Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia “Practical“Practical CyberCyber ProjectsProjects”” 5 –TOP 10TOP 10 CriticalCritical National SectorsNational Sectors “Secure YOUR Sector”“Secure YOUR Sector” 6 –Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security “Secure YOUR Systems”“Secure YOUR Systems” 7 – Standards, Regulations & LawsStandards, Regulations & Laws “Design to Standards”“Design to Standards” 88–– Professional $kill$ DevelopmentProfessional $kill$ Development “$ Training Investment $”“$ Training Investment $” 9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap! “Multi“Multi--Year Cyber Plan”Year Cyber Plan” “Practical“Practical CyberCyber Projects”Projects”
  • 38. PersonalPersonal “Eastern Experiences”:“Eastern Experiences”: 19911991 -- 20142014 •• ArmeniaArmenia •• BelarusBelarus •• KazakhstanKazakhstan •• PolandPoland 38 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• BulgariaBulgaria •• Czech RepublicCzech Republic •• GeorgiaGeorgia •• HungaryHungary •• PolandPoland •• RomaniaRomania •• RussiaRussia •• SlovakiaSlovakia •• UkraineUkraine Projects includingProjects including Cybersecurity, eGovernance & Internet SolutionsCybersecurity, eGovernance & Internet Solutions
  • 39. Cybersecurity for Armenia and GeorgiaCybersecurity for Armenia and Georgia 39 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Link: www.valentina.net/vaza/CyberDocs/
  • 40. CybersecurityCybersecurity forfor thethe Georgian ParliamentGeorgian Parliament 40 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Critical Infrastructure Audit during UN Cybersecurity Mission: Georgian ParliamentCritical Infrastructure Audit during UN Cybersecurity Mission: Georgian Parliament
  • 41. Timeline ofTimeline of “Cyber”“Cyber” Activities inActivities in GeorgiaGeorgia •• 1994/19951994/1995 – Specification of 1st WebSite for the Georgian Parliament with CIO – Nodar Mosashvili - (www.parliament.ge) •• 20072007 – Full Security Audit for Georgian Parliament with new CIO – Merab Gotsiridze (Classified EU Report for EU/TACIS) •• 20082008 – Invited Presentation on “Real-Time Georgia” at the 1st GITI Conference (Georgian IT Innovations) 41 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 1 GITI Conference (Georgian IT Innovations) • Link: www.valentina.net/vaza/GITI.pdf •• 20092009 – Cybersecurity Audit of Georgian Government Ministries & Critical Sectors (Classified Report for UN/ITU Programme) •• 20102010 – Invited Presentation on Integrated National Security (Cyber-Vardzia) at the 3rd Regional GITI Conference in Tbilisi • Link: www.valentina.net/GITI2010/CyberVardzia-PaperV7.pdf
  • 42. From 1From 1stst Parliament.GeParliament.Ge WebSiteWebSite inin 19941994 toto National GeorgianNational Georgian CyberSecurityCyberSecurity inin 2008...2008... Opening Discussions in Moscow – 1994199419941994 – to Build 1st Government Website for Georgian Parliament 42 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Dinner Reunion in Tbilisi – 2008200820082008
  • 43. Case Study: White Paper: 21Case Study: White Paper: 21stst C GeorgiaC Georgia –– “Cyber“Cyber--Vardzia”Vardzia” 43 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Web LinkWeb Link :: www.Valentina.net/vardzia/Georgia2010.pdfwww.Valentina.net/vardzia/Georgia2010.pdfWeb LinkWeb Link :: www.Valentina.net/vardzia/Georgia2010.pdfwww.Valentina.net/vardzia/Georgia2010.pdf
  • 44. GeorgianGeorgian IT ConferenceIT Conference –– TbilisiTbilisi -- 20082008 44 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 45. UN/ITUUN/ITU -- CybersecurityCybersecurity Mission to Georgia, CaucasusMission to Georgia, Caucasus 45 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 46. Mt KazbekMt Kazbek (5033metres)(5033metres) -- CaucasusCaucasus 46 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 47. SunsetSunset across theacross the KakhetianKakhetian SteppesSteppes 47 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 48. Timeline ofTimeline of “Cyber”“Cyber” Activities inActivities in ArmeniaArmenia •• 20082008 – Discussions with Armenian Delegation at the First Regional IT Innovation Conference (GITI - Tbilisi, Georgia) •• 20092009 – Spring – Invited Keynote Presentation at National IT Seminar, and meetings with Minister of Economy, Central Bank of Armenia and CAPS/USAID Programme 48 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• 20092009 – Summer – National Programme & RoadMap on eGovernance, eCommerce and Cybersecurity (USAID) •• 20122012 – Summer – Invited CyberSecurity & eGovernance MasterClasses @ UITE DigiTec Conference - Yerevan
  • 49. 49 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Final Report:Final Report: www.slideshare.net/DrDavidProbert/realtimearmeniawww.slideshare.net/DrDavidProbert/realtimearmenia
  • 50. eGovernanceeGovernance RoadMap forRoadMap for ArmeniaArmenia:: 20092009 -- 20142014 50 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 51. eGovernanceeGovernance RoadMap forRoadMap for ArmeniaArmenia:: 20092009 -- 20142014 “Security“Security””-- DualDual Summits of MtSummits of Mt AraratArarat -- “Growth”“Growth” 51 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 52. USAIDUSAID eGovernance and Cybersecurity Mission:eGovernance and Cybersecurity Mission: Mt AragatsMt Aragats –– South Summit (3879m)South Summit (3879m) –– ArmeniaArmenia 52 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 53. Mt AraratMt Ararat from the Air (5137Metres)from the Air (5137Metres) 53 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Yerevan (Armenia)Yerevan (Armenia)Yerevan (Armenia)Yerevan (Armenia) totototo Tbilisi (Georgia)Tbilisi (Georgia)Tbilisi (Georgia)Tbilisi (Georgia): 108 miles – 20 mins
  • 54. 1- Global Cyber Security LandscapeGlobal Cyber Security Landscape “World in Transition”“World in Transition” 22 –– UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide ““CyberCyber Security ModelsSecurity Models”” 33––National CyberSecurity StrategiesNational CyberSecurity Strategies “Secure YOUR Nation”“Secure YOUR Nation” CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure! 55 –– TOP 10TOP 10 Critical National SectorsCritical National Sectors 54 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “World in Transition”“World in Transition” ““CyberCyber Security ModelsSecurity Models”” “Secure YOUR Nation”“Secure YOUR Nation” 4 –Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia “Practical Cyber Projects”“Practical Cyber Projects” 55 ––TOP 10TOP 10 CriticalCritical National SectorsNational Sectors “Secure“Secure YOURYOUR Sector”Sector” 6 –Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security “Secure YOUR Systems”“Secure YOUR Systems” 7 – Standards, Regulations & LawsStandards, Regulations & Laws “Design to Standards”“Design to Standards” 88–– Professional $kill$ DevelopmentProfessional $kill$ Development “$ Training Investment $”“$ Training Investment $” 9 –YOUR Business Cyber RoadMapYOUR Business Cyber RoadMap!! “Multi“Multi--Year Cyber Plan”Year Cyber Plan” 55 –– TOP 10TOP 10 Critical National SectorsCritical National Sectors “Secure“Secure YOURYOUR Sector”Sector”
  • 55. TOPTOP 1010 CriticalCritical National SectorsNational Sectors 1: Financial1: Financial ServicesServices 2: Emergency2: Emergency ServicesServices 3:3: TelecommsTelecomms && IT ServicesIT Services 4: Transport4: Transport,, Ports & HubsPorts & Hubs 5:5: GovernmentGovernment & Defence& Defence 6:6: HealthcareHealthcare && Food SectorFood Sector 55 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Ports & HubsPorts & Hubs & Defence& Defence && Food SectorFood Sector 7: Chemical &7: Chemical & OilOil IndustryIndustry 8:8: Civil NuclearCivil Nuclear & Space Sector& Space Sector 9:9: Energy &Energy & Water UtilitiesWater Utilities UK, USA & EuropeanUK, USA & European Governments all provide Models forGovernments all provide Models for Critical SectorsCritical Sectors!! Our Table lists theOur Table lists the TOPTOP 1010 SectorsSectors that requirethat require Enhanced CyberSecurityEnhanced CyberSecurity!!
  • 56. Cyber TerrorismCyber Terrorism against Critical Sectorsagainst Critical Sectors •• Government/Defence:Government/Defence: – Theft of secret intelligence, manipulation of documents, and illegal access to confidential citizen databases & national records •• Banking/FinanceBanking/Finance:: – Denial of Service attacks against clearing bank network, phishing attacks against bank account & credit cards, money laundering •• Telecommunications, Mobile & IT Services:Telecommunications, Mobile & IT Services: – Interception of wired & wireless communications, and penetration of secure government & military communications networks 56 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference government & military communications networks •• Transportation, Ports, Hubs & Tourism:Transportation, Ports, Hubs & Tourism: – Cyber Terrorism against airports, air-traffic control, coach/train transport hubs, & malicious penetration of on-line travel networks •• Energy & Water UtilitiesEnergy & Water Utilities – Manipulation and disruption of the national energy grid & utilities through interference of the process control network (SCADA) ......CybersecurityCybersecurity is ais a Critical National IssueCritical National Issue that requires athat requires a Global ResponseGlobal Response!!
  • 57. Cybersecurity forCybersecurity for Banking & FinanceBanking & Finance 57 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 58. Banking & Finance Sector:Banking & Finance Sector: Cybersecurity ThreatsCybersecurity Threats •• Banks & Financial InstitutionsBanks & Financial Institutions are prime targets for Cybercriminals & Cyberterrorists since they are at the heart of ALL National Economies! •• AccessAccess to Accounts is usually indirect through phishing scams, infected websites with malicious scripts, and personal ID Theft. •• OnOn--Line bank transfersLine bank transfers are also commonly used for international money laundering of funds secured from illegal activities •• Instant Money Transfer ServicesInstant Money Transfer Services are preferred for crimes such as the classic “Advanced Fee Scam” as well as Lottery and Auction Scams An increasing problem is CyberCyber--ExtortionExtortion instigated through phishing 58 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference • An increasing problem is CyberCyber--ExtortionExtortion instigated through phishing •• National & Commercial BanksNational & Commercial Banks have also been targets of DDOS cyber attacks from politically motivated and terrorist organisations •• Penetration Scans:Penetration Scans: Banks are pivotal to national economies and will receive penetration scans and attempted hacks on a regular basis. •• OnOn--Line BankingLine Banking networks including ATMs, Business and Personal Banking are at the “sharp end” of financial security and require great efforts towards end-user authentication & transaction network security
  • 59. CybersecurityCybersecurity Threats & Risks forThreats & Risks for the Banking & Finance Sectorthe Banking & Finance Sector 59 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 60. National Plans for CNIP/CIIPNational Plans for CNIP/CIIP -- Critical InformationCritical Information Infrastructure Protection:Infrastructure Protection: USA and GermanyUSA and Germany 60 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 61. CybersecurityCybersecurity for Critical Informationfor Critical Information Infrastructure of theInfrastructure of the Energy SectorEnergy Sector 61 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 62. Cybersecurity for theCybersecurity for the Healthcare SectorHealthcare Sector 62 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 63. Cybersecurity:Cybersecurity: International Airports:International Airports: LHRLHR--T5T5 63 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 64. Cybersecurity Benefits:Cybersecurity Benefits: Critical Business SectorsCritical Business Sectors • Improved cybersecurity provides significant benefits to the Government & Critical National Sectors & Commercial Enterprises including: –– eGovernment:eGovernment: Fully secure & cost effective delivery of on-line services to both citizens and businesses, such as taxes & customs, social welfare, civil & land registries, passports & driving licences –– Defence:Defence: Early warning, alerts and defences against cyberattacks through national CERT (Computer Emergency Response Centre) –– Cybercrime:Cybercrime: Investigate, Digital Forensics and Prosecution of 64 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference –– Cybercrime:Cybercrime: Investigate, Digital Forensics and Prosecution of cybercrimes such ID & Financial Theft, “Computer Misuse, Laundering, On-Line Drug Trafficking & Pornographic Materials –– Cyberterrorism:Cyberterrorism: Ability to assess, predict and prevent potential major cyber terrorist attacks, and to minimise damage during events –– Power & Water UtilitiesPower & Water Utilities: Prevent malicious damage to control systems –– Telecommunications:Telecommunications: Top security of government communications with alternative routings, encryption & protection against cyberattack
  • 65. Cybersecurity:Cybersecurity: NATO Research AnalysisNATO Research Analysis 65 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Author: KennethAuthor: Kenneth GeersGeers -- www.ccdcoe.org/publications/books/Strategic_Cyber_Security_K_Geers.PDFwww.ccdcoe.org/publications/books/Strategic_Cyber_Security_K_Geers.PDF
  • 66. 1- Global Cyber Security LandscapeGlobal Cyber Security Landscape “World in Transition”“World in Transition” 22 –– UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide ““CyberCyber Security ModelsSecurity Models”” 3–National CyberSecurity StrategiesNational CyberSecurity Strategies “Secure YOUR Nation”“Secure YOUR Nation” CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure! 66 –– IndustrialIndustrial ICS & SCADAICS & SCADA SecuritySecurity “Secure“Secure YOURYOUR Systems”Systems” 66 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 4 --Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia “Practical Cyber Projects”“Practical Cyber Projects” 5 –TOP 10TOP 10 CriticalCritical National SectorsNational Sectors “Secure YOUR Sector”“Secure YOUR Sector” 66 -- IndustrialIndustrial ICS & SCADAICS & SCADA SecuritySecurity “Secure YOUR Systems”“Secure YOUR Systems” 7 – Standards, Regulations & LawsStandards, Regulations & Laws “Design to Standards”“Design to Standards” 88–– Professional $kill$ DevelopmentProfessional $kill$ Development “$ Training Investment $”“$ Training Investment $” 9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap! “Multi“Multi--Year Cyber Plan”Year Cyber Plan” “Secure“Secure YOURYOUR Systems”Systems”
  • 67. Critical Energy Industry Sector :Critical Energy Industry Sector : “Cybersecurity for“Cybersecurity for Automated Industrial Control & Safety Systems”Automated Industrial Control & Safety Systems” 67 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Protect againstProtect against “Stuxnet”“Stuxnet” type designer malware that attackstype designer malware that attacks ICS/ICS/SCADASCADA systemssystems
  • 68. CybersecurityCybersecurity for Critical Sector Networks:for Critical Sector Networks: “Internet of Things”“Internet of Things” Sensor Networks 68 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 69. Vulnerable Legacy Devices:Vulnerable Legacy Devices: “IoT”“IoT” 69 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 70. Control RoomControl Room -- Kola Nuclear Power StationKola Nuclear Power Station -- RussiaRussia 70 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Kola Nuclear Power Main Control
  • 71. KolaNet Project forKolaNet Project for Nuclear Safety & SecurityNuclear Safety & Security ::1990s1990s 71 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 72. KarnasurtKarnasurt MineMine:: RevdaRevda –– Kola Peninsula, RussiaKola Peninsula, Russia -- 20002000 72 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Karnasurt Mine: Revda-Lovozero “Data is the New Oil”“Data is the New Oil” Mining Data will be as profitableMining Data will be as profitable As Mining for Minerals in 20As Mining for Minerals in 20ththC!...C!...
  • 73. CybersecurityCybersecurity using Malwareusing Malware Data MiningData Mining based onbased on “AI/Machine Learning”:“AI/Machine Learning”: SophosSophos 73 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference INVINCEA Malware MiningINVINCEA Malware Mining with MACHINE LEARNINGwith MACHINE LEARNING
  • 74. CybersecurityCybersecurity using Malwareusing Malware Data MiningData Mining based onbased on “AI/Machine Learning”:“AI/Machine Learning”: SophosSophos 74 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference INVINCEA Malware MiningINVINCEA Malware Mining with MACHINE LEARNINGwith MACHINE LEARNING SophosSophos Cybersecurity Tools using Machine/Deep Learning fromCybersecurity Tools using Machine/Deep Learning from InvinceaInvincea: 2017: 2017
  • 75. CybersecurityCybersecurity using Malwareusing Malware Data MiningData Mining based onbased on “AI/Machine Learning”:“AI/Machine Learning”: SophosSophos 75 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference INVINCEA Malware MiningINVINCEA Malware Mining with MACHINE LEARNINGwith MACHINE LEARNING SophosSophos Cybersecurity Tools using Machine/Deep Learning fromCybersecurity Tools using Machine/Deep Learning from InvinceaInvincea: 2017: 2017InvinceaInvincea Cyber Tools fully embedded inCyber Tools fully embedded in SophosSophos Intercept X Deep Learning: 2018Intercept X Deep Learning: 2018
  • 76. IoT Cybersecurity:IoT Cybersecurity: 77--Level ArchitectureLevel Architecture 76 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 77. EU/IERCEU/IERC –– Research Cluster ReportsResearch Cluster Reports onon ““Smart Systems” & “Internet of Things”Smart Systems” & “Internet of Things” 77 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 78. IoTIoT -- UK GovernmentUK Government:: Code of PracticeCode of Practice forfor ”Consumer IoT Security””Consumer IoT Security” –– Oct 2018Oct 2018 78 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 79. IoTIoT -- UK GovernmentUK Government:: Code of PracticeCode of Practice forfor ”Consumer IoT Security””Consumer IoT Security” –– Oct 2018Oct 2018 79 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 80. SANS:SANS: Critical Security Controls (CSC)Critical Security Controls (CSC) -- Top 20 CyberTop 20 Cyber DefenseDefense ActionsActions –– The SANS InstituteThe SANS Institute –– 1) Inventory of Authorised and Unauthorised Devices 2) Inventory of Authorised and Unauthorised Software 3) Secure Configurations for Hardware and Software 4) Continuous Vulnerability Protection & Remediation 5) Malware Defenses 6) Applications Software Security 7) Wireless Access Control 8) Data Recovery Capability 9) Security Skills Assessment and Training 10) Secure Configurations for Network Devices 11) Limitation of Network Ports, Protocols & Services 80 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 11) Limitation of Network Ports, Protocols & Services 12) Controlled Use of Administrative Privileges 13) Boundary Defence 14) Maintenance, Monitoring and Analysis of Audit Logs 15) Controlled Access Based on the Need to Know 16) Account Monitoring and Control 17) Data Protection 18) Incident Response and Management 19) Secure Network Engineering 20) Penetration Testing and Red Team Exercises SANSSANS == SSysAdminysAdmin,, AAudit,udit, NNetworking andetworking and SSecurityecurity Link:Link: www.sans.org/criticalwww.sans.org/critical--securitysecurity--controls/controls/
  • 81. Mapping theMapping the SANSSANS Critical Security Controls:Critical Security Controls: US GovtUS Govt –– Dept of Homeland Security CDM ProgramDept of Homeland Security CDM Program 81 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference SANS Link:SANS Link: www.sans.org/criticalwww.sans.org/critical--securitysecurity--controls/controls/
  • 82. NISTNIST CybersecurityCybersecurity FrameworkFramework National Institute of Standards & TechnologyNational Institute of Standards & Technology 82 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Web:Web: www.nist.gov/cyberframework/www.nist.gov/cyberframework/
  • 83. NATO Framework:NATO Framework: The Five Mandates andThe Five Mandates and Six Elements of the Cybersecurity CycleSix Elements of the Cybersecurity Cycle 83 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 84. 1- Global Cyber Security LandscapeGlobal Cyber Security Landscape “World in Transition”“World in Transition” 22 –– UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide ““CyberCyber Security ModelsSecurity Models”” 3–National CyberSecurity StrategiesNational CyberSecurity Strategies “Secure YOUR Nation”“Secure YOUR Nation” CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure! 77 –– StandardsStandards, Regulations & Laws, Regulations & Laws “Design to“Design to StandardsStandards”” 84 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 44 –– Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia “Practical Cyber Projects”“Practical Cyber Projects” 5 -TOP 10TOP 10 CriticalCritical National SectorsNational Sectors “Secure YOUR Sector”“Secure YOUR Sector” 6 – Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security “Secure YOUR Systems”“Secure YOUR Systems” 77 –– Standards,Standards, Regulations & LawsRegulations & Laws ““Design toDesign to Standards”Standards” 88–– Professional $kill$ DevelopmentProfessional $kill$ Development “$ Training Investment $”“$ Training Investment $” 9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap! “Multi“Multi--Year Cyber Plan”Year Cyber Plan” “Design to“Design to StandardsStandards””
  • 85. Global Cybersecurity Standards:Global Cybersecurity Standards: PlayersPlayers •• UN/ITU:UN/ITU: We shall be focusing in this short talk on the technical security standards & recommendations published by the ITU as their X-Series •• Partnerships:Partnerships: The ITU works closely in partnership with many agencies for emerging Cybersecurity, ICT, Networking & Mobile Comms Standards –– ENISAENISA – European Network and Information Security Agency –– ISOISO – International Standards Organisation 85 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference –– ISOISO – International Standards Organisation –– IETFIETF – Internet Engineering Task Force –– ETSIETSI – European Telecommunications Standards Institute –– IEEEIEEE – Institute of Electrical and Electronic Engineers –– ATISATIS – Alliance for Telecommunications Industry Solutions –– 3GPP3GPP – 3rd Generation Partnership Project –– ANSIANSI – American National Standards Institute –– NISTNIST – National Institute of Standards and Technology
  • 86. UN/ITUUN/ITU –– X.805X.805 Cybersecurity ArchitectureCybersecurity Architecture 86 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 87. Recommended BookRecommended Book: Security in a Web2.0 World: Security in a Web2.0 World –– -- A Standards Based Approach(UN/ITUA Standards Based Approach(UN/ITU -- X.805)X.805) –– Author: C. SolariAuthor: C. Solari -- 87 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Carlos Solari: Ex CIOCarlos Solari: Ex CIO US GovernmentUS Government -- White HouseWhite House
  • 88. Other Cyber & Physical Security Standards:Other Cyber & Physical Security Standards: -- ISO/IECISO/IEC –– NISTNIST –– ENISAENISA-- ISFISF -- IEEEIEEE -- •• ISO/IEC:ISO/IEC: These are often adopted as “best practice” for operational aspects of security including the ISO27001 – Information Security Management System, and the ISO27002 – ISMS Code of Practice •• NNIST:IST: The comprehensive publications of the “800 Series” from the Computer Security Division are complementary to the ITU standards •• ENISA:ENISA: The European Networks Security Agency publishes many detailed 88 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• ENISA:ENISA: The European Networks Security Agency publishes many detailed security studies and recommendations, with some useful work and guidelines for the establishment of national CERTs •• ISFISF – Information Security Forum – Founded 1989 to provide research, analysis and methodologies for Information Security and Risk Management •• IEEEIEEE:: An important global player in ICT standards, and a key ITU partner in the development of new standards for open network cybersecurity
  • 89. “Information Security Management System”“Information Security Management System” -- Implementation Process: ISO27001/2Implementation Process: ISO27001/2 -- 89 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 90. FlowFlow--Chart: Route toChart: Route to ISO27001/2ISO27001/2 CertificationCertification 90 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 91. enisaenisa:: European Network &European Network & Information Security AgencyInformation Security Agency 91 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 92. UK CYBERCRIME LEGISLATION 1. The Official Secrets Acts - 1911 to 1989 2. The Public Records Acts - 1958 to 1967 3. The Data Protection Act - 1998 4. The Freedom of Information Act - 2000 5. The Human Rights Act - 1998 6. The Computer Misuse Act 1990 7. The Copyright Designs and Patents Act 1988 8. The Civil Evidence Act 1968 9. The Police and Criminal Evidence Act 1984 UKUK CybercrimeCybercrime LegislationLegislation 92 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 9. The Police and Criminal Evidence Act 1984 10. The Wireless Telegraphy Act 1949 - 2006 11. The Communications Act 2003 12. The Regulation of Investigatory Powers Act 2000 (RIPA) 13. The Telecommunications Regulations 2000 (Interception) 14. The Civil Contingencies Act 2004 15. The Anti-Terrorism, Crime and Security Act 2001 16. The Forgery and Counterfeiting Act 1981 17. The Fraud Act 2006 18. Police Justice Act 2006 19. The Theft Act - 1978 to 1996 20. The Cybersecurity Strategy - Cabinet Office - June 2009
  • 93. 1.1. UKUK Official Secrets ActsOfficial Secrets Acts 1911 to 19891911 to 1989 • Official Secrets Acts 1911 to 19891911 to 1989 –– Unauthorised Disclosure of Official InformatioUnauthorised Disclosure of Official Informationn Under the Official Secrets Act 1989Official Secrets Act 1989, it is an offence for a Crown servant or government contractor to disclose official information in any of the protected categories if the disclosure is made without lawful authority and is damaging to the national interest. It is also an offence if a member 93 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference protected categories if the disclosure is made without lawful authority and is damaging to the national interest. It is also an offence if a member of the public, or any other person who is not a Crown servant or government contractor under the Act, has in his or her possession, official information in one of the protected categories, and the information has been disclosed without lawful authority, or entrusted by a Crown servant or government contractor on terms requiring it to be held in confidence. Cybersecurity Relevance:Cybersecurity Relevance: Covers all electronic communications, documents and media whatever format.
  • 94. NATONATO CybersecurityCybersecurity Framework ManualFramework Manual 94 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 95. NATONATO Cooperative Cyber DefenceCooperative Cyber Defence Centre of ExcellenceCentre of Excellence –– CCDCOECCDCOE -- EstoniaEstonia 95 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Recommended Cyber Reference Books: fromRecommended Cyber Reference Books: from NATONATO -- ccdcoe.org/tallinnccdcoe.org/tallinn--manual.htmlmanual.html
  • 96. 1- Global Cyber Security LandscapeGlobal Cyber Security Landscape “World in Transition”“World in Transition” 22 ––UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide ““CyberCyber Security ModelsSecurity Models”” 3–National CyberSecurity StrategiesNational CyberSecurity Strategies “Secure YOUR Nation”“Secure YOUR Nation” 4 –Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia 5 –TOP 10TOP 10 CriticalCritical National SectorsNational Sectors 6 – Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure! 88 –– ProfessionalProfessional $kill$$kill$ DevelopmentDevelopment ““$$ Training InvestmentTraining Investment $$”” 96 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 4 –Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia “Practical Cyber Projects”“Practical Cyber Projects” 5 –TOP 10TOP 10 CriticalCritical National SectorsNational Sectors “Secure YOUR“Secure YOUR SecorSecor”” 6 – Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security “Secure Your Systems”“Secure Your Systems” 7 – Standards, Regulations & LawsStandards, Regulations & Laws “Design to Standards”“Design to Standards” 88–– ProfessionalProfessional $kill$$kill$ DevelopmentDevelopment “$“$ Training InvestmentTraining Investment $”$” 9 –YOUR Business Cyber RoadMap!YOUR Business Cyber RoadMap! “Multi“Multi--Year Cyber Plan”Year Cyber Plan” ““$$ Training InvestmentTraining Investment $$””
  • 97. CISSPCISSP CertificationCertification –– InternationalInternational CyberCyber QualificationQualification • The CISSPCISSP –– Certified Information Systems Security Professional is one of the highest international qualifications from the (ISC)² , and is based upon the core tenets of Confidentiality, Integrity & AvailabilityConfidentiality, Integrity & Availability:: 1) Access Control 2) Application Security 3) Business Continuity and Disaster Recovery 4) Cryptography 5) Information Security and Risk Management 97 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 5) Information Security and Risk Management 6) Legal, Regulations, Compliance and Investigations 7) Operations Security 8) Physical (Environmental) Security 9) Security Architecture and Design 10)Telecommunications and Network Security •• An inAn in--depth study of all thesedepth study of all these Security topicsSecurity topics would fill an intensivewould fill an intensive 3 month training3 month training schedule, but I hope that theseschedule, but I hope that these 3 Short Talks @ NICE3 Short Talks @ NICE have provided the foundations!have provided the foundations!
  • 98. SecuringSecuring JamaicaJamaica inin CyberspaceCyberspace! :! : 20102010 -- 20182018 - (1) – Legal Measures -(2) – Technical& Procedural -(3) – Organizational -(4) –Capacity Building 98 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 9 8 Procedural Measures Organizational Structures -(5) –InternationalCollaboration
  • 99. ITU:ITU: CybersecurityCybersecurity TrainingTraining –– UTECH, Kingston,UTECH, Kingston, JAMAICAJAMAICA -- Government, Central Bank, Energy, Telecoms SectorsGovernment, Central Bank, Energy, Telecoms Sectors -- 99 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 100. IMPACTIMPACT : Worldwide: Worldwide CybersecurityCybersecurity AllianceAlliance IMPACT International Partners: ITU, UN, INTERPOL and CTOIMPACT International Partners: ITU, UN, INTERPOL and CTO 100 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Industry Partners include: Symantec, Kaspersky Labs, Cisco, Microsoft,Industry Partners include: Symantec, Kaspersky Labs, Cisco, Microsoft, (ISC)²,(ISC)², FF--Secure, ECSecure, EC--Council, Iris, GuardTime, Trend Micro and the SANS InstituteCouncil, Iris, GuardTime, Trend Micro and the SANS Institute
  • 101. MSc CyberSecurity CoursesMSc CyberSecurity Courses:: CertifiedCertified by the UK Governmentby the UK Government –– GCHQ/CESGGCHQ/CESG 101 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference
  • 102. 1- Global Cyber Security LandscapeGlobal Cyber Security Landscape “World in Transition”“World in Transition” 22 –– UN/ITU Cyber Strategy GuideUN/ITU Cyber Strategy Guide ““CyberCyber Security ModelsSecurity Models”” 3–National CyberSecurity StrategiesNational CyberSecurity Strategies “Secure YOUR Nation”“Secure YOUR Nation” CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure! 99 –– YOUR BusinessYOUR Business CyberCyber RoadMapRoadMap “Multi“Multi--YearYear CyberCyber Plan”Plan” 102 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 4 –Case Studies: Georgia & ArmeniaCase Studies: Georgia & Armenia “Practical Cyber Projects”“Practical Cyber Projects” 5 -TOP 10TOP 10 CriticalCritical National SectorsNational Sectors ”Secure YOUR Sector””Secure YOUR Sector” 6 – Industrial ICS & SCADA SecurityIndustrial ICS & SCADA Security “Secure YOUR Systems”“Secure YOUR Systems” 7 –Standards, Regulations & LawsStandards, Regulations & Laws “Design to Standards”“Design to Standards” 88–– Professional $kill$ DevelopmentProfessional $kill$ Development “$ Training Investment $”“$ Training Investment $” 9 –YOUR BusinessYOUR Business CyberCyber RoadMap!RoadMap! “Multi“Multi--YearYear CyberCyber PlanPlan”” “Multi“Multi--YearYear CyberCyber Plan”Plan”
  • 103. National Cybersecurity Project RoadMapNational Cybersecurity Project RoadMap:: Spanning the UN/ITU Cybersecurity FrameworkSpanning the UN/ITU Cybersecurity Framework 1st Quarter 2nd Quarter 103 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 3rd Quarter 4th Quarter
  • 104. National Cybersecurity StrategyNational Cybersecurity Strategy :: “The Shopping List”“The Shopping List” Smart Security for Business & Government is a MultiSmart Security for Business & Government is a Multi--Year Programme!Year Programme! 1)1) National Cybersecurity AgencyNational Cybersecurity Agency:: Establishment of a CERT/CSIRT & National Government Cybersecurity Agency within the Government Ministries 2)2) CNI:CNI: Long Term Critical National Information Infrastructure Protection (CNI) 3)3) System UpgradesSystem Upgrades:: Technical Infrastructure Upgrades including Hardware, Software, Databases, Secure Network Links, Biometrics & RFID 4) BackBack--UpUp:: Disaster Recovery, Business Continuity and Back-Up Systems 5)5) Physical SecurityPhysical Security:: Physical Security Applications – CCTV, Alarms, Control Centre 104 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference 5)5) Physical SecurityPhysical Security:: Physical Security Applications – CCTV, Alarms, Control Centre 6)6) Awareness CampaignAwareness Campaign:: Government Campaign for Cybersecurity awareness 7)7) TrainingTraining:: National Cybersecurity Skills & Professional Training Programme 8)8) EncryptionEncryption:: National User & Systems PKI Authentication Programme 9)9) Laws:Laws: Programme for Drafting and Enforcing Cyber Laws, Policies & Regulations ..….It is also important to develop an in..….It is also important to develop an in--depth economic “costdepth economic “cost--benefit” analysis andbenefit” analysis and Business Case in order to evaluate the “Return on Investment” for Cyber SecurityBusiness Case in order to evaluate the “Return on Investment” for Cyber Security
  • 105. Critical Economic Sectors:Critical Economic Sectors: Cyber RoadMapsCyber RoadMaps Each Critical Service Sector such as Banking & Finance, Civil &Each Critical Service Sector such as Banking & Finance, Civil & National Defence, Telecommunications and Energy will require itsNational Defence, Telecommunications and Energy will require its own Cyber Strategy, Risk Assessment, Roadmap & Action Plan:own Cyber Strategy, Risk Assessment, Roadmap & Action Plan: In this talk we’ve discussed some practical ways in 105 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference In this talk we’ve discussed some practical ways in which you may develop Strategies, Actions and Activities for CyberSecurity in each Critical Sector… We’ve also reviewed the Operational Priorities & Security Policies that are required to significantly reduce Cybercrime & Cyber Terrorism Attacks!…......
  • 106. YOUR CybersecurityYOUR Cybersecurity Action PlanAction Plan!...!... •• Phase 1:Phase 1: Define your Cybersecurity STRATEGY and OBJECTIVES •• Phase 2:Phase 2: Establish, Resource & Rrain your Cybersecurity ORGANISATION •• Phase 3:Phase 3: Agree and Communicate Technical & Operational Standards •• Phase 4:Phase 4: Review, Audit and Upgrade all ICT Systems during next year 106 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference •• Phase 4:Phase 4: Review, Audit and Upgrade all ICT Systems during next year •• Phase 5:Phase 5: On-Going Operational Management by CSO/CISO, including regular compliance audits and technical upgrades to new Cyber Threats ……In summary, the adoption of……In summary, the adoption of International StandardsInternational Standards for YOUR National &for YOUR National & Enterprise ICT systems andEnterprise ICT systems and ISO Operational ProceduresISO Operational Procedures will have a Major Impactwill have a Major Impact onon CybercrimeCybercrime, & reduce, & reduce Cyber AttacksCyber Attacks on YOURon YOUR Critical National InfrastructureCritical National Infrastructure
  • 107. “Real“Real--Time Defence”Time Defence” fromfrom Cyber AttacksCyber Attacks”” .......Energising.......Energising YOURYOUR Business & GovernmentBusiness & Government with an Intelligentwith an Intelligent Cyber$ecurityCyber$ecurity $$trategytrategy,, Roadmap & Cyber ToolsRoadmap & Cyber Tools 107 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Roadmap & Cyber ToolsRoadmap & Cyber Tools will increase yourwill increase your Defence from “Cyber”Defence from “Cyber” Threats and AttacksThreats and Attacks!! “The Director’s Desk – Scientific Institute” - 2002 Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov
  • 108. The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov 108 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
  • 109. CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!! 109 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference DownloadDownload CyberCyber Slides:Slides: www.valentina.net/NICE2018/www.valentina.net/NICE2018/
  • 110. CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!... 3838thth EastEast--West Security Conference:West Security Conference: Nice, UKNice, UK 110 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “NICE“NICE –– 1880”1880”
  • 111. ThankThank--You!You!ThankThank--You!You! CyberCyberVisionVision 20202020--20302030 && BeyondBeyond!...!... 3838thth EastEast--West Security Conference:West Security Conference: Nice, UKNice, UK 111 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference “NICE“NICE –– 1880”1880” ThankThank--You!You!ThankThank--You!You! Download Presentation Slides:Download Presentation Slides: www.Valentina.net/www.Valentina.net/NICE2018NICE2018// Download Presentation Slides:Download Presentation Slides: www.Valentina.net/www.Valentina.net/NICE2018NICE2018//
  • 112. Download Presentation Slides:Download Presentation Slides: www.Valentina.netwww.Valentina.net/NICE2018//NICE2018/ Download Presentation Slides:Download Presentation Slides: www.Valentina.netwww.Valentina.net/NICE2018//NICE2018/ 112 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
  • 113. AdditionalAdditional CybersecurityCybersecurity ResourcesResources 113 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
  • 114. Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the “knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments. Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998) Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web- Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record. Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 114 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 networking products with technology partners from both UK and Taiwan. Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products. Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries. UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree (Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) , and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2018 Editions2018 Editions.
  • 115. CyberCyber SecuritySecurity forfor CriticalCritical Infrastructure!Infrastructure! 3838thth EastEast--West Security ConferenceWest Security Conference:: NICENICE 115 “Cybersecurity for Critical National Infrastructure”- Strategy & RoadMap Nice, France – 5th/6th Nov 2018 © Dr David E. Probert : www.VAZA.com © 38th International East-West Security Conference