SlideShare a Scribd company logo
1 of 13
CYBER DEFENCE UNIT OF
THE NATIONAL GUARD OF LATVIA
Cyber realm of Latvia
Trained cyber reserve
Who maintains snowplows for a blizzard of a Century?
National Guard of Latvia is integral part of the
National Armed Forces with aim to involve
citizens of the Republic of Latvia in the
protection of the state territory and interests of
the society.
National Guard participate in the state defense
planning and execution according to the tasks
set out by the law.
Why National Guard of Latvia?
Basic principles of National Guard
•
Patriotism
•
Voluntarism
•
Participation during free time (from everyday work)
•
State compensates participation up to 30 days per year
•
Participation in the international missions – voluntary
•
Possibilities to build synergies among various different
professions using their knowledge and experience
Cyber Defense Unit – the Task
To provide support for CERT.LV and National
Armed Forces in responding to the IT security
incidents and mitigation of the consequences.
Timeline
•
January 2012 – Situation analysis, concept development (CCD
CoE involved)
•
February 2013 – Ministry of Defense decision to create the
unit, looking for key people
•
July 2013 – Paperwork, Unit included in the NAF structure
•
February 2014 – Unit established, personnel and equipment
tables approved
•
January 2015 – Cyber security centre established
Personnel
• The Cyber Defence Unit has 98 personnel positions
•
Full-time – 4
•
Part-time (volunteers) – 94
•
Currently manned approx. 55%
Requirements
• IT education (can be a student) or practical knowledge of
IT
• Basic requirements for entering National Guard have to be
met (citizenship, no criminal record, age, health, etc.)
• Security clearance
• Willingness and ability to acquire new knowledge and to
devote time to the Cyber Defense Unit
• Monthly 1-3 days involvement required
Needed IT Security skills of the Unit
• Networks
• Applications, software
• Policies and users
• Technical solutions
• History
• Legal issues
• Teamwork
• Philosophy and methods of «internet users»
Participation in International Exercises
• ENISA «CYBER EUROPE» - April, September 2014
• NATO CCDCoE «LOCKED SHIELDS» – May 2014
• NATO «CYBER ENDEAVOUR» - August 2014
• NATO «CYBER COALITION» – November 2014
• MIARNG «STAMPEDE» – November 2014
• NATO CCDCoE «LOCKED SHIELDS» – April 2015
Goals
• Strengthening Defence of the State and society
• Cyber Defence Unit joint exercises and operations with
CERT.LV, MILCERT, other State institutions and immediate
involvement when needed
• Co-organisation of national cyber exercises
• Bringing knowledge back to the civilian institutions where
the cyber guards work – enhancing security level for all
kibersargs@mil.lv

More Related Content

Viewers also liked

Osmデータ品質チェック方法
Osmデータ品質チェック方法Osmデータ品質チェック方法
Osmデータ品質チェック方法真遊子 松岡
 
Barcelona wore race
Barcelona wore raceBarcelona wore race
Barcelona wore raceDARIO999
 
CONFidence 2015: APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wy...
CONFidence 2015: APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wy...CONFidence 2015: APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wy...
CONFidence 2015: APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wy...PROIDEA
 
Current and future mass surveillance threats
Current and future mass surveillance threatsCurrent and future mass surveillance threats
Current and future mass surveillance threatsPoint_conference
 
Top 8 library officer resume samples
Top 8 library officer resume samplesTop 8 library officer resume samples
Top 8 library officer resume samplesrodriguezjacob622
 
DDMA 8 okt 2014 Hogeschool Rotterdam masterclass data driven marketing in b2b
DDMA 8 okt 2014 Hogeschool Rotterdam masterclass data driven marketing in b2bDDMA 8 okt 2014 Hogeschool Rotterdam masterclass data driven marketing in b2b
DDMA 8 okt 2014 Hogeschool Rotterdam masterclass data driven marketing in b2bdutchmarq
 

Viewers also liked (9)

Osmデータ品質チェック方法
Osmデータ品質チェック方法Osmデータ品質チェック方法
Osmデータ品質チェック方法
 
Barcelona wore race
Barcelona wore raceBarcelona wore race
Barcelona wore race
 
Centar 72
Centar 72Centar 72
Centar 72
 
CONFidence 2015: APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wy...
CONFidence 2015: APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wy...CONFidence 2015: APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wy...
CONFidence 2015: APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wy...
 
Current and future mass surveillance threats
Current and future mass surveillance threatsCurrent and future mass surveillance threats
Current and future mass surveillance threats
 
Bab i
Bab iBab i
Bab i
 
Top 8 library officer resume samples
Top 8 library officer resume samplesTop 8 library officer resume samples
Top 8 library officer resume samples
 
DDMA 8 okt 2014 Hogeschool Rotterdam masterclass data driven marketing in b2b
DDMA 8 okt 2014 Hogeschool Rotterdam masterclass data driven marketing in b2bDDMA 8 okt 2014 Hogeschool Rotterdam masterclass data driven marketing in b2b
DDMA 8 okt 2014 Hogeschool Rotterdam masterclass data driven marketing in b2b
 
Epithelium
EpitheliumEpithelium
Epithelium
 

Similar to CONFidence 2015: National Guard of Latvia, Cyber Defence Unit - Gatis GRAUDIŅŠ

DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LVDSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LVAndris Soroka
 
APNIC Outreach Activities in Cyber Security
APNIC Outreach Activities in Cyber Security APNIC Outreach Activities in Cyber Security
APNIC Outreach Activities in Cyber Security APNIC
 
Cyber Security Regional Forum: APNIC's cybersecurity work in the Pacific
Cyber Security Regional Forum: APNIC's cybersecurity work in the PacificCyber Security Regional Forum: APNIC's cybersecurity work in the Pacific
Cyber Security Regional Forum: APNIC's cybersecurity work in the PacificAPNIC
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategyBright Boateng
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasEmyana Ruth
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingAPNIC
 
CNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia PacificCNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia PacificAPNIC
 
Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up NIKOLAOS KOUTRAS
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesStephen Cobb
 
Cybersecurity response in the Pacific
Cybersecurity response in the PacificCybersecurity response in the Pacific
Cybersecurity response in the PacificAPNIC
 
Copyright and related rights balance between ip and public policy swaziland
Copyright and related rights balance between ip and public policy swazilandCopyright and related rights balance between ip and public policy swaziland
Copyright and related rights balance between ip and public policy swazilandSusan Isiko
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillaydotZADNA
 
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...APNIC
 
National policy of ICT in School Education
National policy of ICT in School EducationNational policy of ICT in School Education
National policy of ICT in School EducationVanita Anand
 
Selematsela icadla presentation
Selematsela icadla presentationSelematsela icadla presentation
Selematsela icadla presentationJohannes Phaladi
 
9 September 2014: automating cyber defence responses CDE themed competition
9 September 2014: automating cyber defence responses CDE themed competition9 September 2014: automating cyber defence responses CDE themed competition
9 September 2014: automating cyber defence responses CDE themed competitionDefence and Security Accelerator
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 

Similar to CONFidence 2015: National Guard of Latvia, Cyber Defence Unit - Gatis GRAUDIŅŠ (20)

DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LVDSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
 
APNIC Outreach Activities in Cyber Security
APNIC Outreach Activities in Cyber Security APNIC Outreach Activities in Cyber Security
APNIC Outreach Activities in Cyber Security
 
Cyber Security Regional Forum: APNIC's cybersecurity work in the Pacific
Cyber Security Regional Forum: APNIC's cybersecurity work in the PacificCyber Security Regional Forum: APNIC's cybersecurity work in the Pacific
Cyber Security Regional Forum: APNIC's cybersecurity work in the Pacific
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNas
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
 
CNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia PacificCNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia Pacific
 
cyber policy in Latvia
cyber policy in Latviacyber policy in Latvia
cyber policy in Latvia
 
Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up Aditess ltd a Cyprus start up
Aditess ltd a Cyprus start up
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
Cybersecurity response in the Pacific
Cybersecurity response in the PacificCybersecurity response in the Pacific
Cybersecurity response in the Pacific
 
Copyright and related rights balance between ip and public policy swaziland
Copyright and related rights balance between ip and public policy swazilandCopyright and related rights balance between ip and public policy swaziland
Copyright and related rights balance between ip and public policy swaziland
 
GROUP-1 (1).pdf
GROUP-1 (1).pdfGROUP-1 (1).pdf
GROUP-1 (1).pdf
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
 
National policy of ICT in School Education
National policy of ICT in School EducationNational policy of ICT in School Education
National policy of ICT in School Education
 
Selematsela icadla presentation
Selematsela icadla presentationSelematsela icadla presentation
Selematsela icadla presentation
 
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landjiCTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
 
9 September 2014: automating cyber defence responses CDE themed competition
9 September 2014: automating cyber defence responses CDE themed competition9 September 2014: automating cyber defence responses CDE themed competition
9 September 2014: automating cyber defence responses CDE themed competition
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 

Recently uploaded

Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 

Recently uploaded (20)

Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 

CONFidence 2015: National Guard of Latvia, Cyber Defence Unit - Gatis GRAUDIŅŠ

  • 1. CYBER DEFENCE UNIT OF THE NATIONAL GUARD OF LATVIA
  • 2. Cyber realm of Latvia
  • 3. Trained cyber reserve Who maintains snowplows for a blizzard of a Century?
  • 4. National Guard of Latvia is integral part of the National Armed Forces with aim to involve citizens of the Republic of Latvia in the protection of the state territory and interests of the society. National Guard participate in the state defense planning and execution according to the tasks set out by the law. Why National Guard of Latvia?
  • 5. Basic principles of National Guard • Patriotism • Voluntarism • Participation during free time (from everyday work) • State compensates participation up to 30 days per year • Participation in the international missions – voluntary • Possibilities to build synergies among various different professions using their knowledge and experience
  • 6. Cyber Defense Unit – the Task To provide support for CERT.LV and National Armed Forces in responding to the IT security incidents and mitigation of the consequences.
  • 7. Timeline • January 2012 – Situation analysis, concept development (CCD CoE involved) • February 2013 – Ministry of Defense decision to create the unit, looking for key people • July 2013 – Paperwork, Unit included in the NAF structure • February 2014 – Unit established, personnel and equipment tables approved • January 2015 – Cyber security centre established
  • 8. Personnel • The Cyber Defence Unit has 98 personnel positions • Full-time – 4 • Part-time (volunteers) – 94 • Currently manned approx. 55%
  • 9. Requirements • IT education (can be a student) or practical knowledge of IT • Basic requirements for entering National Guard have to be met (citizenship, no criminal record, age, health, etc.) • Security clearance • Willingness and ability to acquire new knowledge and to devote time to the Cyber Defense Unit • Monthly 1-3 days involvement required
  • 10. Needed IT Security skills of the Unit • Networks • Applications, software • Policies and users • Technical solutions • History • Legal issues • Teamwork • Philosophy and methods of «internet users»
  • 11. Participation in International Exercises • ENISA «CYBER EUROPE» - April, September 2014 • NATO CCDCoE «LOCKED SHIELDS» – May 2014 • NATO «CYBER ENDEAVOUR» - August 2014 • NATO «CYBER COALITION» – November 2014 • MIARNG «STAMPEDE» – November 2014 • NATO CCDCoE «LOCKED SHIELDS» – April 2015
  • 12. Goals • Strengthening Defence of the State and society • Cyber Defence Unit joint exercises and operations with CERT.LV, MILCERT, other State institutions and immediate involvement when needed • Co-organisation of national cyber exercises • Bringing knowledge back to the civilian institutions where the cyber guards work – enhancing security level for all