Cyber Security Strategies and Approaches

Sue Daley
Government Relations Manager UK & Ireland 

                                             1
Cyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
1        Given threat environment what response needed?   



           2        Outline of different approaches and strategies 



           3       Commonalities , best practices and lessons 




Presentation Identifier Goes Here                                       4
What is Symantec seeing?
– US and EU leading thought leadership


– Connected nations realizing need to work across 
  borders 


– Legislators, regulators seeing  IT security as 
  horizontal issue


– Increasing recognition target is not just system but 
  information  


– Understanding that response must  be operational, 
  reactive and dynamic
So what’s the result? 
• Various projects, initiatives, strategies, operational 
  structures
    •National

    •Regional, multi‐national

    •Public ‐ Private sector



• Symantec advised or involved at all levels
National Approach 



                     7
… in the nineteenth 
century we had to 
secure the seas…and in 
the twentieth century 
we had to secure the air, 
in the twenty first 
century we also have to 
secure our position in 
cyber space...
                        8
UK Approach 
•    Launched June 2009


    1. Reduce risks to UK use’s of internet

    2. Exploit opportunities – gather 
       intelligence and intervene

    3. Improve knowledge, capabilities and 
       decision making – policies, governance
• Strategic leadership across government – coordination
• 8 key work streams 
policy and regulatory issues     awareness and culture change
technical capabilities/R&D       international engagement




• GCHQ, Cheltenham
• Improve UK technical response to cyber incidents
• Disseminate information on risks, attacks and coordinate 
  action
Thank you!




Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in 
the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, 
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.




                                                                                                                                                                                         1
US 60 day Review…. 
•      May 2009 ‐ “Assuring a trusted and resilient information and 
       communications infrastructure”
•      Builds on 2008 Comprehensive National Cyber security 
       Initiative 

•      Since the review…
•      Enhanced 2009 Cyber security Enhancement Act
        •    Boost federal R&D, stimulate US workforce 
        •    Estimated to give $396 million 
•      Cyber Storm Exercise Feb 2010 ‐ Symantec key partner
•      Appointment Cyber Tsar

Presentation Identifier Goes Here                                      12
Cyber Security Tsar – Howard Schmidt 
• March 2010  key themes


           Partnerships
           Transparency

“ Transparency improves our 
  collective knowledge and 
  helps bind our partnerships 
  together to form the most 
  powerful cyber tools that we 
  have”
Estonia   
• September 2008 strategy 
    – graduated system of security measures 
    – Expertise development 
    – appropriate regulatory and legal framework 
    – international co‐operation  
    – Awareness raising
• November 2009 NATO‐accredited Cooperative Cyber Defence 
  Centre of Excellence (CCDCOE)
    – Symantec and NATO memorandum of understanding
    – Joint research project to promote cooperation on online threats
    – Explore modus operandi of attackers


Presentation Identifier Goes Here                                       14
Singapore 

• iN2015 Master Plan 2005  (3 years)
    – Intelligent and trusted infocomm infrastructure
• Led by Infocomm Development Authority (IDA)
    – Included National Infocomm Security committee 
    – formulates IT security policies 
• Result of 2005 plan
    – “enhanced overall security situational awareness”
• So 2nd Master plan launched 2008 
    “…first Master plan aimed largely at providing the public sector with 
      measures to counter infocomm security threats, the second Master
      plan will expand on that and engage both the public and private 
      sectors “
Presentation Identifier Goes Here                                        15
Emerging technologies          Users                       International Relations
                                                       R&D
                 Threats            Practioners      Industry           Standards

                    •Association of
                    Security                  Cyber Security       CERT-to-CERT
                                              Awareness Alliance
 Cyber Watch Centre Professionals                                                  Meridan process -
 (CWC)              (AiSP)
                                  National Infocomm                                CIIP trust building
                                  security Scholarship
 Creation of SISTA


Presentation Identifier Goes Here                                                                    16
Singapore next steps…

• Singapore Infocomm Technology Security Authority (SITSA) 
    – Created Oct 2009
    – Safeguard Singapore against IT Security Threats 
    – Develop, execute  contingency operations and plans


    • Core Activities: 
        • Partnership Development 
        • Critical Information Infrastructure Protection 
        • Technology Development 
        • Planning, preparedness  response 
        • cyber attack exercises 

Presentation Identifier Goes Here                             17
EU Approach 



Presentation Identifier Goes Here   18
EU Approach 
• Interdependence of European Member State
• Common shared approach to security needed

• Regulation and legislation role
  – European Cyber crime Convention ‐2001 
  – Framework Decision on attacks against information 
    systems – 2005
  – Commission Communication ‐ "Protecting Europe from 
    large scale cyber‐attacks and disruptions” ‐ 2009
     1.Preparedness and prevention
     2.Detection and response
     3.Mitigation and recovery
     4.International and EU wide cooperation

  But its not just legislation only…

                                                          19
EU Working together 

 • Research and development
    —EU FP7 funding 
    –WOMBAT ‐ Worldwide Observatory of Malicious 
     Behaviours and Attack Threats
    –LOBSTER ‐ European broadband security 
    Thank you!
 • Co‐operation, Collaboration, Partnership 
    —ENISA – European Network Information Security 
     Agency
    —Critical Infrastructure Warning Information Network 
     (CIWIN) project
    —European Information Sharing and Alert System (EISAS)
    —CERTS
    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in 
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, 
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.




                                                                                                                                                                                             20
CERTS across Europe




    Thank you!




    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in 
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, 
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Public – Private Sector Collaboration 



Presentation Identifier Goes Here            22
Collaboration is key 

• Up to 90% of critical infrastructure private sector operated
    – Industry, government and law enforcers coming together
    – Developing public, private partnerships and approaches


• Symantec’s involvement
    – Joint deployment of security intelligence technologies
    – Joint exercises – US Cyber storm, UK CWID, US IT‐ Information 
      Sharing and Analysis Centre (ISAC) 
    – Joint research projects– EU FP7 , Wombat, Lobster, NATO Estonia 
      centre
    – Participation in expert groups, committees  ‐ ENISA, UK IACG, UK 
      Council for Child Safety, UK e‐Crime Reduction Partnership, 
    – Sponsoring events and conferences – UK IA09, 
Presentation Identifier Goes Here                                         23
Public Awareness and Culture Change 
• Online security key to trust, take up and buy‐in of citizens 
• Industry can help by reaching public




Presentation Identifier Goes Here                                 24
Commonalities
    Best practices
    Lessons  




Presentation Identifier Goes Here   25
Recognition of interconnected nature of IT systems

        Move from attack detection to prevention measures

                             Role of regulation and legislation 

                   Need  for joint approach to protect society

                    Need to work with private sector partners

                      Importance of international engagement

       Information sharing and trusted networks are needed

    Raising awareness and addressing culture change is key
Presentation Identifier Goes Here                                  26
Lessons learnt ‐ Symantec’s top 5 to leave behind…

1. A holistic approach to security policy is required
    • Move away from closed, nationally protected computer 
      networks
    • Understand moving threat environment
2. Real time awareness of threat landscape vital 
    • 24 – 7 
    • Information and intelligence is power
3. Both proactive and reactive capabilities needed
    • Operational and technical 
    • Threat awareness and analysis based   
    • Technical expertise and skills needed
Presentation Identifier Goes Here                             27
Lessons learnt ‐ what is important
4. Collaboration and co‐operation at different levels is key
    • Trusted environment, network, systems
    • Secure information sharing structures
    • Relationship, partner building  


5. Technology is one part of the solution 
        • People, process, technology
        • Culture change 
        • Awareness raising


Presentation Identifier Goes Here                              28
Thank you!
    Susan_daley@symantec.com
    +44 7809 492 490




    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in 
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, 
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Presentation Identifier Goes Here                                                                                                                                                            29

More Related Content

PDF
Dealing with Information Security, Risk Management & Cyber Resilience
PDF
Insights into cyber security and risk
 
PDF
Information Security Risk Management
PPTX
Information System Security
PPTX
A military perspective on cyber security
PPTX
QRadar, ArcSight and Splunk
PDF
NIST cybersecurity framework
Dealing with Information Security, Risk Management & Cyber Resilience
Insights into cyber security and risk
 
Information Security Risk Management
Information System Security
A military perspective on cyber security
QRadar, ArcSight and Splunk
NIST cybersecurity framework

What's hot (20)

PPTX
Security in IoT
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
Cyber security from military point of view
PDF
Threat Intelligence
PPT
Network Security Threats and Solutions
PPTX
Data security
PPTX
NIST CyberSecurity Framework: An Overview
PDF
NIST Cybersecurity Framework 101
PPT
IT Security management and risk assessment
 
PPT
chapter 1. Introduction to Information Security
PPTX
Join the hunt: Threat hunting for proactive cyber defense.pptx
PDF
Security architecture - Perform a gap analysis
PDF
Cybersecurity for Critical National Infrastructure
PDF
Network Security Research Paper
PPTX
Cyber attacks and IT security management in 2025
PDF
The role of big data, artificial intelligence and machine learning in cyber i...
PDF
Cyber Threat Intelligence
PDF
The Current ICS Threat Landscape
PPTX
Cyber Warfare 4TH edition
PPTX
Cyberwar threat to national security
Security in IoT
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cyber security from military point of view
Threat Intelligence
Network Security Threats and Solutions
Data security
NIST CyberSecurity Framework: An Overview
NIST Cybersecurity Framework 101
IT Security management and risk assessment
 
chapter 1. Introduction to Information Security
Join the hunt: Threat hunting for proactive cyber defense.pptx
Security architecture - Perform a gap analysis
Cybersecurity for Critical National Infrastructure
Network Security Research Paper
Cyber attacks and IT security management in 2025
The role of big data, artificial intelligence and machine learning in cyber i...
Cyber Threat Intelligence
The Current ICS Threat Landscape
Cyber Warfare 4TH edition
Cyberwar threat to national security
Ad

Viewers also liked (20)

PPTX
Cyber crime and security ppt
PDF
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PDF
IBM Security Services Overview
PPTX
Cybercrime.ppt
PPTX
Cyber security
PDF
NACCTFO Cyber Security Presentation 2014 New Orleans
PDF
Development of National Cybersecurity Strategy and Organisation
PPT
Introduction to Cyber Security
PPTX
Cyber security presentation
PDF
Building an effective Information Security Roadmap
PPTX
Cyber Security Demistyified
PPT
Cyber security and emails presentation refined
PDF
Cyber Security: The Strategic View
PPTX
NESA on Steroids
PPTX
How to beat ransomware
PPT
Cyber Security Isaca Bglr Presentation 24th July
PPTX
Key Cyber Security Issues for Government Contractors
PDF
Steganography document
DOCX
Funny miss la sen hand sketching
PPTX
Digital strategy - security
Cyber crime and security ppt
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
IBM Security Services Overview
Cybercrime.ppt
Cyber security
NACCTFO Cyber Security Presentation 2014 New Orleans
Development of National Cybersecurity Strategy and Organisation
Introduction to Cyber Security
Cyber security presentation
Building an effective Information Security Roadmap
Cyber Security Demistyified
Cyber security and emails presentation refined
Cyber Security: The Strategic View
NESA on Steroids
How to beat ransomware
Cyber Security Isaca Bglr Presentation 24th July
Key Cyber Security Issues for Government Contractors
Steganography document
Funny miss la sen hand sketching
Digital strategy - security
Ad

Similar to Cyber Security Strategies and Approaches (20)

PDF
APCERT Updates
PDF
National Strategies against Cyber Attacks - Philip Victor
PPTX
CTO-CybersecurityForum-2010-Daisy francis
PPTX
Achieving Caribbean Cybersecuirty
PPTX
NGN integrated information security v3 DetikNas
PPTX
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
PDF
PDF
Cyber security general perspective a
PDF
North European Cybersecurity Cluster - an example of the regional trust platf...
PPT
Indian perspective of cyber security
PDF
SMi Group's 6th annual European Smart Grid Cyber Security 2016
PDF
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
PPTX
Protecting Critical Infrastructure: a multi-layered approach
 
PPTX
Aalto cyber-10.4.18
PPTX
Lecture 3 Country Specific Strategy.pptx
PPTX
The European cyber security cPPP strategic research & innovation agenda
PPTX
Cybersecurity Hub & Operations - Dr. Kiru Pillay
PDF
Cybersecurity and continuous intelligence
PPT
CCNA Security 02- fundamentals of network security
PDF
SMi Group's 5th annual Oil & Gas Cyber Security 2015
APCERT Updates
National Strategies against Cyber Attacks - Philip Victor
CTO-CybersecurityForum-2010-Daisy francis
Achieving Caribbean Cybersecuirty
NGN integrated information security v3 DetikNas
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
Cyber security general perspective a
North European Cybersecurity Cluster - an example of the regional trust platf...
Indian perspective of cyber security
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
Protecting Critical Infrastructure: a multi-layered approach
 
Aalto cyber-10.4.18
Lecture 3 Country Specific Strategy.pptx
The European cyber security cPPP strategic research & innovation agenda
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity and continuous intelligence
CCNA Security 02- fundamentals of network security
SMi Group's 5th annual Oil & Gas Cyber Security 2015

More from vngundi (11)

PDF
Anatomy of a CERT - Gordon Love, Symantec
PDF
Dealing With Security Threats
PDF
Day 2 Dns Cert 4 Scenarios
PDF
Day 2 Dns Cert 4c Malicious Use
PDF
Day 2 Dns Cert 4b Name Server Redirection
PDF
Day 2 Dns Cert 4a Cache Poisoning
PDF
Day 2 Dns Cert 3 Dns Organizations
PDF
Day 1 Large Scale Attacks
PDF
Day 1 From CERT To NCSC
PDF
Day 1 Enisa Setting Up A Csirt
PDF
Day 1 Coop Banks
Anatomy of a CERT - Gordon Love, Symantec
Dealing With Security Threats
Day 2 Dns Cert 4 Scenarios
Day 2 Dns Cert 4c Malicious Use
Day 2 Dns Cert 4b Name Server Redirection
Day 2 Dns Cert 4a Cache Poisoning
Day 2 Dns Cert 3 Dns Organizations
Day 1 Large Scale Attacks
Day 1 From CERT To NCSC
Day 1 Enisa Setting Up A Csirt
Day 1 Coop Banks

Cyber Security Strategies and Approaches

  • 4. 1 Given threat environment what response needed?    2 Outline of different approaches and strategies  3 Commonalities , best practices and lessons  Presentation Identifier Goes Here 4
  • 5. What is Symantec seeing? – US and EU leading thought leadership – Connected nations realizing need to work across  borders  – Legislators, regulators seeing  IT security as  horizontal issue – Increasing recognition target is not just system but  information   – Understanding that response must  be operational,  reactive and dynamic
  • 6. So what’s the result?  • Various projects, initiatives, strategies, operational  structures •National •Regional, multi‐national •Public ‐ Private sector • Symantec advised or involved at all levels
  • 9. UK Approach  • Launched June 2009 1. Reduce risks to UK use’s of internet 2. Exploit opportunities – gather  intelligence and intervene 3. Improve knowledge, capabilities and  decision making – policies, governance
  • 10. • Strategic leadership across government – coordination • 8 key work streams  policy and regulatory issues awareness and culture change technical capabilities/R&D  international engagement • GCHQ, Cheltenham • Improve UK technical response to cyber incidents • Disseminate information on risks, attacks and coordinate  action
  • 11. Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in  the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,  are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 1
  • 12. US 60 day Review….  • May 2009 ‐ “Assuring a trusted and resilient information and  communications infrastructure” • Builds on 2008 Comprehensive National Cyber security  Initiative  • Since the review… • Enhanced 2009 Cyber security Enhancement Act • Boost federal R&D, stimulate US workforce  • Estimated to give $396 million  • Cyber Storm Exercise Feb 2010 ‐ Symantec key partner • Appointment Cyber Tsar Presentation Identifier Goes Here 12
  • 13. Cyber Security Tsar – Howard Schmidt  • March 2010  key themes Partnerships Transparency “ Transparency improves our  collective knowledge and  helps bind our partnerships  together to form the most  powerful cyber tools that we  have”
  • 14. Estonia    • September 2008 strategy  – graduated system of security measures  – Expertise development  – appropriate regulatory and legal framework  – international co‐operation   – Awareness raising • November 2009 NATO‐accredited Cooperative Cyber Defence  Centre of Excellence (CCDCOE) – Symantec and NATO memorandum of understanding – Joint research project to promote cooperation on online threats – Explore modus operandi of attackers Presentation Identifier Goes Here 14
  • 15. Singapore  • iN2015 Master Plan 2005  (3 years) – Intelligent and trusted infocomm infrastructure • Led by Infocomm Development Authority (IDA) – Included National Infocomm Security committee  – formulates IT security policies  • Result of 2005 plan – “enhanced overall security situational awareness” • So 2nd Master plan launched 2008  “…first Master plan aimed largely at providing the public sector with  measures to counter infocomm security threats, the second Master plan will expand on that and engage both the public and private  sectors “ Presentation Identifier Goes Here 15
  • 16. Emerging technologies Users International Relations R&D Threats Practioners Industry Standards •Association of Security Cyber Security CERT-to-CERT Awareness Alliance Cyber Watch Centre Professionals Meridan process - (CWC) (AiSP) National Infocomm CIIP trust building security Scholarship Creation of SISTA Presentation Identifier Goes Here 16
  • 17. Singapore next steps… • Singapore Infocomm Technology Security Authority (SITSA)  – Created Oct 2009 – Safeguard Singapore against IT Security Threats  – Develop, execute  contingency operations and plans • Core Activities:  • Partnership Development  • Critical Information Infrastructure Protection  • Technology Development  • Planning, preparedness  response  • cyber attack exercises  Presentation Identifier Goes Here 17
  • 19. EU Approach  • Interdependence of European Member State • Common shared approach to security needed • Regulation and legislation role – European Cyber crime Convention ‐2001  – Framework Decision on attacks against information  systems – 2005 – Commission Communication ‐ "Protecting Europe from  large scale cyber‐attacks and disruptions” ‐ 2009 1.Preparedness and prevention 2.Detection and response 3.Mitigation and recovery 4.International and EU wide cooperation But its not just legislation only… 19
  • 20. EU Working together  • Research and development —EU FP7 funding  –WOMBAT ‐ Worldwide Observatory of Malicious  Behaviours and Attack Threats –LOBSTER ‐ European broadband security  Thank you! • Co‐operation, Collaboration, Partnership  —ENISA – European Network Information Security  Agency —Critical Infrastructure Warning Information Network  (CIWIN) project —European Information Sharing and Alert System (EISAS) —CERTS Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in  the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,  are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 20
  • 21. CERTS across Europe Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in  the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,  are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
  • 23. Collaboration is key  • Up to 90% of critical infrastructure private sector operated – Industry, government and law enforcers coming together – Developing public, private partnerships and approaches • Symantec’s involvement – Joint deployment of security intelligence technologies – Joint exercises – US Cyber storm, UK CWID, US IT‐ Information  Sharing and Analysis Centre (ISAC)  – Joint research projects– EU FP7 , Wombat, Lobster, NATO Estonia  centre – Participation in expert groups, committees  ‐ ENISA, UK IACG, UK  Council for Child Safety, UK e‐Crime Reduction Partnership,  – Sponsoring events and conferences – UK IA09,  Presentation Identifier Goes Here 23
  • 25. Commonalities Best practices Lessons   Presentation Identifier Goes Here 25
  • 26. Recognition of interconnected nature of IT systems Move from attack detection to prevention measures Role of regulation and legislation  Need  for joint approach to protect society Need to work with private sector partners Importance of international engagement Information sharing and trusted networks are needed Raising awareness and addressing culture change is key Presentation Identifier Goes Here 26
  • 27. Lessons learnt ‐ Symantec’s top 5 to leave behind… 1. A holistic approach to security policy is required • Move away from closed, nationally protected computer  networks • Understand moving threat environment 2. Real time awareness of threat landscape vital  • 24 – 7  • Information and intelligence is power 3. Both proactive and reactive capabilities needed • Operational and technical  • Threat awareness and analysis based    • Technical expertise and skills needed Presentation Identifier Goes Here 27
  • 28. Lessons learnt ‐ what is important 4. Collaboration and co‐operation at different levels is key • Trusted environment, network, systems • Secure information sharing structures • Relationship, partner building   5. Technology is one part of the solution  • People, process, technology • Culture change  • Awareness raising Presentation Identifier Goes Here 28
  • 29. Thank you! [email protected] +44 7809 492 490 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in  the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,  are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Presentation Identifier Goes Here 29