SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
THE SECURITY OF CRITICAL
INFRASTRUCTURE AND PUBLIC SPACES IN
THE EUROPEAN UNION
European Parliament in Brussels, 12 July 2018
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
The prospective incidence of Terrorism on Cyber Security
Terrorism
Political violence in an asymmetrical conflict that is designed to induce terror and
psychic fear through the violent victimisation and destruction of noncombatant targets.
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Current Understanding of Internet Usage for Cyber
Terrorism (Based on Academia)
• Communication and Networking
• Asset Transfer
• Research about Targets // Espionage
• Recruit Supporters for the Groups Cause & Raise Funds
• Propaganda // PsyOps
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
What’s up with the Deep Web?
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Threat Vector Categories
• Cyber only Attacks
• Cyber-Physical Attacks
• NEW Kinetic Attacks with Cyber Consequences
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Academic Recommendations to mitigate the Risks
• Legislative Framework
• National & International (law enforcement) Partnerships
• Strategies
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
What really enables Cyber Terrorism?
• Reliance on the Internet for our society to function
• ISPs not regulated (Network Infrastructure not redundant, etc.)
• Software/OS Vendors releasing premature Products
• Gross negligence in deployment, and continuous update/upgrade of
critical infrastructure hard-/software
• Failure of the Legislative Branch since the 1980s
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Reality Check: 2-Phase Approach
• Phase 1: Immediately create Task Force to establish a qualified
Threat Landscape > hardening of Critical Infrastructure in the EU
• Phase 2: Creation of legislative Framework making liable those
elements identified as enablers for contributing factors (software/OS
Vendors, IoT device Manufacturers, CTOs, etc.)
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Questions? Reach out today!
WWW.LARSHILSE.COM/GO/CONTACT Phone +49 (0)4835 9513027 Email lars.hilse@gmail.com
PGP Fingerprint 44D5 68A1 32A1 AD87 3E29 2AA2 9B4A 1674 17FF C660
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Are we ready for Cyberwarfare
Are we ready for CyberwarfareAre we ready for Cyberwarfare
Are we ready for Cyberwarfare
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 
Oracle America, Inc. - GAO Protest - DOD JEDI - Network Segmentation - Cybers...
Oracle America, Inc. - GAO Protest - DOD JEDI - Network Segmentation - Cybers...Oracle America, Inc. - GAO Protest - DOD JEDI - Network Segmentation - Cybers...
Oracle America, Inc. - GAO Protest - DOD JEDI - Network Segmentation - Cybers...
 
Case study 13
Case study 13Case study 13
Case study 13
 
FED GOV CON - DOD & The Intel Community Event - Robert Elder Slides
FED GOV CON - DOD & The Intel Community Event - Robert Elder SlidesFED GOV CON - DOD & The Intel Community Event - Robert Elder Slides
FED GOV CON - DOD & The Intel Community Event - Robert Elder Slides
 
Leone ct#3 presentation 1
Leone ct#3 presentation 1Leone ct#3 presentation 1
Leone ct#3 presentation 1
 
Global inventory of all my Slideshare Uploads
Global inventory of all my Slideshare UploadsGlobal inventory of all my Slideshare Uploads
Global inventory of all my Slideshare Uploads
 
Case study 11
Case study 11Case study 11
Case study 11
 
Global inventory
Global inventoryGlobal inventory
Global inventory
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographic
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
SV CUE 2018
SV CUE 2018SV CUE 2018
SV CUE 2018
 
Protecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintProtecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital Footprint
 
To share or not to share? machine generated data for science
To share or not to share? machine generated data for science To share or not to share? machine generated data for science
To share or not to share? machine generated data for science
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Information Sharing and Protection
Information Sharing and ProtectionInformation Sharing and Protection
Information Sharing and Protection
 
Internet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User TrustInternet Society (ISOC Uk England) Webinar on User Trust
Internet Society (ISOC Uk England) Webinar on User Trust
 
Www.calguard.ca.gov Computer-Network-Defense
Www.calguard.ca.gov   Computer-Network-DefenseWww.calguard.ca.gov   Computer-Network-Defense
Www.calguard.ca.gov Computer-Network-Defense
 
Ip bill issues
Ip bill issuesIp bill issues
Ip bill issues
 

Similar a Cyberterrorism: The Security of Critical Infrastructure and Public Places in the European Union

Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
Dominic A Ienco
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
healdkathaleen
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
PECB
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
 

Similar a Cyberterrorism: The Security of Critical Infrastructure and Public Places in the European Union (20)

Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Forensics Expo, London 2015
Forensics Expo, London  2015Forensics Expo, London  2015
Forensics Expo, London 2015
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 

Último

Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
 
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Kiwale ( Pune ) Call ON 8005736733 Starting From 5K to 2...
 
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
 
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Baramati ( Pune ) Call ON 8005736733 Starting From 5K to...
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
 
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
 
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
 
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
 
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
 
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
 

Cyberterrorism: The Security of Critical Infrastructure and Public Places in the European Union

  • 1. THE SECURITY OF CRITICAL INFRASTRUCTURE AND PUBLIC SPACES IN THE EUROPEAN UNION European Parliament in Brussels, 12 July 2018 WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime The prospective incidence of Terrorism on Cyber Security
  • 2. Terrorism Political violence in an asymmetrical conflict that is designed to induce terror and psychic fear through the violent victimisation and destruction of noncombatant targets. WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 3. Current Understanding of Internet Usage for Cyber Terrorism (Based on Academia) • Communication and Networking • Asset Transfer • Research about Targets // Espionage • Recruit Supporters for the Groups Cause & Raise Funds • Propaganda // PsyOps WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 4. What’s up with the Deep Web? WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 5. Threat Vector Categories • Cyber only Attacks • Cyber-Physical Attacks • NEW Kinetic Attacks with Cyber Consequences WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 6. Academic Recommendations to mitigate the Risks • Legislative Framework • National & International (law enforcement) Partnerships • Strategies WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 7. What really enables Cyber Terrorism? • Reliance on the Internet for our society to function • ISPs not regulated (Network Infrastructure not redundant, etc.) • Software/OS Vendors releasing premature Products • Gross negligence in deployment, and continuous update/upgrade of critical infrastructure hard-/software • Failure of the Legislative Branch since the 1980s WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 8. Reality Check: 2-Phase Approach • Phase 1: Immediately create Task Force to establish a qualified Threat Landscape > hardening of Critical Infrastructure in the EU • Phase 2: Creation of legislative Framework making liable those elements identified as enablers for contributing factors (software/OS Vendors, IoT device Manufacturers, CTOs, etc.) WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 9. Questions? Reach out today! WWW.LARSHILSE.COM/GO/CONTACT Phone +49 (0)4835 9513027 Email lars.hilse@gmail.com PGP Fingerprint 44D5 68A1 32A1 AD87 3E29 2AA2 9B4A 1674 17FF C660 WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime