Successfully reported this slideshow.

Government and Enterprise Collaboration in Cybersecurity


Published on

My presentation at Fortinet's Security 361° conference: "Government and Enterprise Collaboration in Cybersecurity"

Published in: Technology, Business
  • Be the first to comment

Government and Enterprise Collaboration in Cybersecurity

  1. 1. “Technological advances, combined with the ubiquity of the Internet, have spawned a nearinfinite range of potentially grave security threats to governments, commercial entities and individuals.” Paul Rosenzweig
  3. 3. WHAT ABOUT HONG KONG? 871 recorded botnet, hacking and denial-ofservice attacks in first 10 months of 2013 40% increase over the same period last year Source: Hong Kong Computer Emergency Response Team Coordination Center
  4. 4. APT ATTACKS stealthy, targeted, persistent
  6. 6. HONG KONG NETWORK: VULNERABLE? Edward Snowden: NSA targets included CUHK, public officials, businesses, students, network backbones Mandiant: HKUST network involved in cyberattacks?
  7. 7. Complex, sophisticated attacks can wreak havoc not only on enterprise networks but critical infrastructure, even media agencies are vulnerable.
  8. 8. ECONOMIC SECURITY AT RISK Classified information Intellectual property Consumer data Business networks
  9. 9. CYBERSECURITY OF THE PRIVATE SECTOR IS CRUCIAL • Protect investment in innovation and crucial functions – public utilities, finance and telecommunications • Government‟s daily function relies on assets owned and operated by the private sector
  10. 10. INTER-DEPARTMENTAL WORKING GROUP ON COMPUTER RELATED CRIME Major recommendations implemented • „24-hour liaison system‟ and „cooperation platforms‟ between Law Enforcement Agencies, major ISPs and other institutions • Enhancing education and publicity (Seminars) • Internet Infrastructure Liaison Group (IILG) - no regular meeting? • Standard procedures and guidelines
  11. 11. CYBERSECURITY: HK GOVT‟S RESPONSE OGCIO HKCERT • Infosec policies and guidelines • Awareness building / public education • Monitoring and response • Threat detection and assessment • Alert, drills and education Police • Combat of technology crimes at HQ, Regions and District levels; • Cyber Security Centre set up in 2012
  12. 12. LEGISLATION: COMPUTER AND INTERNET-RELATED CRIMES Telecommunications •Prohibits unauthorised access to computer by telecommunications Ordinance (Cap. 106) Crimes Ordinance (Cap. 200) •Tackles access to computer with criminal or dishonest intent. Theft Ordinance (Cap. •Deals with offences of destroying, defacing, concealing or falsifying 210) records kept by computer UEMO (Cap. 593) •prohibits fraud activities related to the sending of multiple commercial electronic messages.
  13. 13. SOME QUESTIONS • Are our laws robust and relevant to handle everevolving cyber-threats? • Is there enough info sharing and support to the private sector? • How can private sector contribute?
  14. 14. MORE CAN BE DONE • Conduct a comprehensive cyber security review and audit? • Review of computer related crime and cybersecurity legislation? • More, better communication channels between private sector and government? • Directly support enterprises and SMEs to take precautions?
  15. 15. CYBER SECURITY COLLABORATION: PUBLIC-PRIVATE PARTNERSHIP? Government From law enforcement to info sharing facilitator? Accelerate the flow of info and support sharing of threat data? Enterprise Improve overall cyber security infrastructure Share information without the risk of legal action?
  16. 16. ISSUES TO IRON OUT… • Government and enterprises using different sets of technology and process? • How much to share? Privacy and sensitive business information • What is the incentive or responsibility to report breaches and attacks? • Real-time notification requires significant resources
  17. 17. GOVTS ARE PUTTING IN MORE EFFORT IN CYBER-SECURITY USA: Cybersecurity Executive Order  emphasize the need for PPP, greater information sharing, and the collaborative development of a cybersecurity framework and program UK: Cyber Security Strategy  Set up Cyber Security Information Partnership to share information and intelligence in real time Singapore: 5-Year National Cyber Security Masterplan 2018  Enhance security of infrastructure, promote infosec adoption among end-users and businesses, grow pool of infosec experts
  18. 18. OUR ENTERPRISES HAS MUCH TO OFFER • Ample local experts and technology to detect and mitigate cyber threats • Strong expertise in infosec professional associations • Extensive experience to contribute Collaboration is the key
  19. 19. HONG KONG NEEDS TO STEP UP • Mechanism for real-time detection and alert already in place (Police and HKCERT) • Comprehensive, up-to-date review of government and enterprise infosec readiness • Strengthen, organize and incentivize cyber security info exchange • Support end-users and business beyond publicity and education
  20. 20. Charles Mok Legislative Councillor (Information Technology) Facebook: Charles Mok B Twitter: @charlesmok