2. Basic concept of cybersecurity
Agenda Rapid change of cyber threat
Case studies of Cybersecurity strategy
The concept
"How to develop the cybersecurity framework"
21. Levels of Cybersecurity, 2014 Global Cybersecurity Index
Case studies of Cybersecurity strategy
Source: ITU
22. Geography of web-based attacks in 2015
(percentage of attacked corporate users in each country)
Case studies of Cybersecurity strategy
Source: AO Kaspersky Lab
29. The concept
"How to develop the cybersecurity framework"
The Framework was
developedconsistentwith
professionalguidelinesand
bestpractices.Using a
comprehensivejob analytic
approach, data was
collectedfrom across the
government, and additional
information was gathered
from academia and the
publicand private sectors.
The Framework was
developedaccording to the
followingsteps:
How was the Framework Developed?
30. Understand
Threats &
Vulnerabilities
Develop
Cybersecurity
Strategy
Link Roles &
Controls
Define
Workforce
Requirements
Outline
Sourcing
Plan
Deploy the
Workforce
Maintain
Governance
Policy
People
Technology
Best Practice
ITU National Cybersecurity Strategy Guide
The concept
"How to develop the cybersecurity framework"
31. The concept
"How to develop the cybersecurity framework"
ITU National Cybersecurity Strategy Guide
32. The concept
"How to develop the cybersecurity framework"
Critical Infrastructure Sector
33. The concept
"How to develop the cybersecurity framework"
Cybersecurity Strategy Model
34. The concept
"How to develop the cybersecurity framework"
PDCA Model applied to National Cybersecurity Framework
Relevant
Stakeholders
Cybersecurity
Requirements and
expectations
Relevant
Stakeholders
Preventive
Measures and
Effective
Responses to
cyber threats
Establish
National
Cybersecurity
Framework
Implement
and Operate
National
Cybersecurity
Framework
Monitor and
Review
National
Cybersecurity
Framework
Maintain and
Improve
National
Cybersecurity
Framework
Plan
Do
Check
Act
35. National
Security
Strategy
Quadrennial
Homeland
Security
Review
Security
Resilience
Customs &
Exchange
Screening
Securing
Law Enforcement
Domain Awareness
Benefits Administration
Incident Management
Enterprise Business Services
Enterprise IT Services
Enterprise Mission Services
- Information Sharing - Intelligence
- Integrated Operations - Research & Development
Preventing
Terrorism &
Enhancing Security
Securing &
Managing
Our Borders
Enforcing &
Administering Our
Immigration Laws
Safeguarding
& Securing
Cyberspace
Ensuring Resilience
to Disasters
Providing Essential
Support to National
& Economic Security
Mature &
Strengthen DHS
Mission
Execution
Strategic
Guidance Key Concepts
(Source: QHSR)
Missions &
Activities
Functions
(Capability Portfolios)
(Source: Homeland Security
Enterprise Architecture)
Strategic
Outcomes
Strategic
Approach
Missions &
Activities Needs
• Goals & Objectives
• Strategic Concepts
Functional Requirements
• Cross-Departmental Effectiveness Targets
• Interoperability Standards
Strategy-Based
Demand
Budget, Resources,
Plans & Operations
Federal Emergency
Management
Agency
[NPPD Operational
Component]
Transportation
Security
Administration
U.S. Citizenship &
Immigration
Services
U.S. Coast Guard
U.S. Customs &
Border Protection
U.S. Immigration &
Customs
Enforcement
U.S. Secret Service
Broad to Specific Responsibilities / Requirements
The concept
"How to develop the cybersecurity framework"
DHS Integrated Strategic Framework
36. "A Guidelineto Develop NationalCybersecurityFramework and Strategy"willbe published on
Journal of Advances in ComputerNetworks (JACN)soon.
A Guideline to Develop National Cybersecurity Framework and Strategy
Dr.Settapong Malisuwan
37. Line of
business
Fraud
management
Criminal
investigations
Risk
management
Cybersecurity
Business
continuity
Media
relations
Critical
suppliers
vendors, and
outsourcers
Understand cyber
organizational
boundary
Identify critical
business processes
and assets
Determine cyber
threats
Identify, assess, and
manage cyber risks
Plan and respond
to cyber events
Business
Partners
Customers
Revenue-
driving
processes
Supply-chain
processes
Critical IT
systems
Critical
applications
Cyber threat
identification
Cyber threat
analysis
Cyber threat
monitoring
Cyber threat
reporting
Cyber risk
scenarios
Cyber risk
controls
Cyber risk
assessments
Cyber risk
monitoring
Cyber risk
reporting
Cyber risk
tolerance
definitions
Cyber
resiliency
plans
Cyber
response
playbooks
Cyber risk
operations
team
Organizational
alignmentCyber risk management programCyber risk
governance
Executivemanagementteam
Cyberriskoperationsteam
Cyberriskgovernance
committee
Cyberriskoversize
committee
Operationalriskmanagement
Enterpriseriskmanagement
Roadmap for Cyber Resilient
The concept
"How to develop the cybersecurity framework"