Government and Enterprise Collaboration in Cybersecurity
1.
2. “Technological advances, combined with the
ubiquity of the Internet, have spawned a nearinfinite range of potentially grave security
threats to governments, commercial entities
and individuals.”
Paul Rosenzweig
4. WHAT ABOUT HONG KONG?
871
recorded botnet,
hacking and denial-ofservice attacks in first
10 months of 2013
40%
increase over
the same period
last year
Source: Hong Kong Computer Emergency
Response Team Coordination Center
7. HONG KONG NETWORK:
VULNERABLE?
Edward Snowden:
NSA targets included
CUHK, public officials,
businesses, students,
network backbones
Mandiant:
HKUST network
involved in
cyberattacks?
8. Complex, sophisticated attacks can
wreak havoc not only on enterprise
networks but critical infrastructure,
even media agencies are vulnerable.
9. ECONOMIC SECURITY AT RISK
Classified
information
Intellectual
property
Consumer data
Business
networks
10. CYBERSECURITY OF THE PRIVATE
SECTOR IS CRUCIAL
• Protect investment in innovation and crucial
functions – public utilities, finance and
telecommunications
• Government‟s daily function relies on assets
owned and operated by the private sector
11.
12. INTER-DEPARTMENTAL WORKING GROUP
ON COMPUTER RELATED CRIME
Major recommendations implemented
• „24-hour liaison system‟ and
„cooperation platforms‟ between Law
Enforcement Agencies, major ISPs
and other institutions
• Enhancing education and publicity
(Seminars)
• Internet Infrastructure Liaison Group
(IILG) - no regular meeting?
• Standard procedures and guidelines
13. CYBERSECURITY: HK GOVT‟S RESPONSE
OGCIO
HKCERT
• Infosec policies
and guidelines
• Awareness
building / public
education
• Monitoring and
response
• Threat detection
and assessment
• Alert, drills and
education
Police
• Combat of
technology
crimes at HQ,
Regions and
District levels;
• Cyber Security
Centre set up in
2012
14. LEGISLATION: COMPUTER AND
INTERNET-RELATED CRIMES
Telecommunications •Prohibits unauthorised access to
computer by telecommunications
Ordinance (Cap. 106)
Crimes Ordinance
(Cap. 200)
•Tackles access to computer with
criminal or dishonest intent.
Theft Ordinance (Cap. •Deals with offences of destroying,
defacing, concealing or falsifying
210)
records kept by computer
UEMO (Cap. 593)
•prohibits fraud activities related to the
sending of multiple commercial
electronic messages.
15. SOME QUESTIONS
• Are our laws robust and relevant to handle everevolving cyber-threats?
• Is there enough info sharing and support to the
private sector?
• How can private sector contribute?
16. MORE CAN BE DONE
• Conduct a comprehensive cyber security review and
audit?
• Review of computer related crime and cybersecurity
legislation?
• More, better communication channels between
private sector and government?
• Directly support enterprises and SMEs to take
precautions?
18. ISSUES TO IRON OUT…
• Government and enterprises using different sets of
technology and process?
• How much to share? Privacy and sensitive business
information
• What is the incentive or responsibility to report
breaches and attacks?
• Real-time notification requires significant resources
19. GOVTS ARE PUTTING IN MORE
EFFORT IN CYBER-SECURITY
USA: Cybersecurity Executive Order
emphasize the need for PPP, greater information sharing,
and the collaborative development of a cybersecurity
framework and program
UK: Cyber Security Strategy
Set up Cyber Security Information Partnership to share
information and intelligence in real time
Singapore: 5-Year National Cyber Security Masterplan 2018
Enhance security of infrastructure, promote infosec adoption
among end-users and businesses, grow pool of infosec experts
20. OUR ENTERPRISES HAS MUCH TO
OFFER
• Ample local experts and technology to detect and
mitigate cyber threats
• Strong expertise in infosec professional associations
• Extensive experience to contribute
Collaboration is the key
21. HONG KONG NEEDS TO STEP UP
• Mechanism for real-time detection and alert already
in place (Police and HKCERT)
• Comprehensive, up-to-date review of government and
enterprise infosec readiness
• Strengthen, organize and incentivize cyber security
info exchange
• Support end-users and business beyond publicity and
education