SlideShare a Scribd company logo
From CERT-Hungary
to National Cybersecurity Centre


                Ferenc Suba LLM, MA
                Chairman of the Board
                PTA CERT-Hungary
                Vice-chair of the MB
                ENISA
CERT-Hungary
- Started as a project by the Ministry of IT and
Communications, now under Prime Minister’s Office
- Partnership Agreements with: National Communications
Authority, Financial Regulatory Authority, Prime Minister’s
Office, National Bureau of Investigation
- Accredited member of FIRST, TI, EGC
- Operator of the National Alert Service of Communications as
contractor
- Responsible for information security of the e-gov backbone
network
- Trusted partner of the banking and energy sector (WGs) in
CIIP, regular exercises
-- International co-operations: FI-ISAC, Meridian, IWWN

-- CERT capacity building: Bulgaria, South Africa
Government Foundation

- Theodore Puskás Government Foundation
- Founded in 1993 by the Government of Hungary, academia,
business companies
- Governed by the Civil Code, Act on Public Benefit
Organisations
- Part of the yearly state budget
- Supervised by the Prime Minister’s Office
- Engaged in technology transfer, information security
- Entitled to have business activities (max. 20% of the yearly
income)
- Flexible organisation, staff motivation, survives government
changes
- Think tank, preparation of regulation, project management,
technical service
e-Commerce Act
- Only tool to motivate the ISPs
- Liability clauses: indirect liability for ISPs = ISP is liable for
any wrongdoing committed through its system if ISP does not
co-operate to make the wrongdoing impossible
- Reason: criminals are anonymous + attacks come through
the ISPs + only ISPs can effectively take measures against
them
- Liability forms vary according to the function: content
provider, storage provider, access provider, cache provider,
information location tool provider
- Principle: ISPs liability stands as of an e-mail about the
wrongdoing committed through its system has been received
Ministerial Decree on National Alert Service
                      for Communications

- Regulates CIIP in communications sector
- Defines critical infrastructures legally
- Defines incidents flexbily (list updated by the National
Communications Authority)
- Designates 8 communications providers (biggest ones)
- Reporting obligation of the designated providers
- Reports on incidents affecting at least 1000 users
- Reports received and distributed by the Alert Service Centre
- Distribution list: Ministries, Centre for Crisis Management,
Services
- Alert Service Centre outsourced to CERT-Hungary, under the
supervision of the National Communications Authority
Government Decree No 223/2009.
         on the security of public electronic services



- Sections 8-10: National Cybersecurity Centre
- Tasks: crisis management, central governmental system,
National Alert Service for Communications, awareness
raising, preparation of policy, CIIP collaboration, international
representation
- Control: Prime Minister’s Office, IT Security Supervisor
- Framework: Theodore Puskás Government Foundation, by a
public service agreement
- Basic services free for the government, value-added services
for payment
The Hungarian model
- Bottom-up approach, 5 years of evolution
- Establish a flexible organisation
- Be close to central government
-- Use ENISA and partner MSs as leverage

-- Have very strong international background

-- Build up PPPs with interested private sectors

-- Be not only technical (crisis management,

awareness raising, policy making, national and
international collaboration)
-- Distribute your financial resources (state

budget, state project contracts, service
contracts, EU and national research projects)
Thank you for your attention and patience!

         PTA CERT-Hungary
         www.cert-hungary.hu
         Puskás Tivadar Közalapítvány
         www.neti.hu
         ENISA
         www.enisa.europa.eu

More Related Content

What's hot

Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
Caribbean Open Data Conference & Code Sprint
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
blogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
blogzilla
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
Adriana Dvorsak
 
PL&B _UK_80
PL&B _UK_80PL&B _UK_80
PL&B _UK_80
Lyndsey Shaw
 
Cross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesCross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property Issues
Karl Larson
 
New Law on Access to Public Information:
New Law on Access to Public Information:New Law on Access to Public Information:
New Law on Access to Public Information:
FUSADES
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information Policy
Niamh Headon
 
GDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORIGDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORI
Karel Holst
 
2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORI2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORI
Karel Holst
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
blogzilla
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
Endcode_org
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
Endcode_org
 
North Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoodsNorth Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoods
localinsight
 
Protecting Europe's Network Infrastructure
 Protecting Europe's Network Infrastructure Protecting Europe's Network Infrastructure
Protecting Europe's Network Infrastructure
European Union Agency for Network and Information Security (ENISA)
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
IT Governance Ltd
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
IT Governance Ltd
 
The combined effect of the collective effort
The combined effect of the collective effortThe combined effect of the collective effort
The combined effect of the collective effort
CSSaunders
 
Online crime
Online crimeOnline crime
Online crime
Victim Support Europe
 

What's hot (19)

Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
 
PL&B _UK_80
PL&B _UK_80PL&B _UK_80
PL&B _UK_80
 
Cross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesCross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property Issues
 
New Law on Access to Public Information:
New Law on Access to Public Information:New Law on Access to Public Information:
New Law on Access to Public Information:
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information Policy
 
GDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORIGDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORI
 
2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORI2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORI
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
North Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoodsNorth Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoods
 
Protecting Europe's Network Infrastructure
 Protecting Europe's Network Infrastructure Protecting Europe's Network Infrastructure
Protecting Europe's Network Infrastructure
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
 
The combined effect of the collective effort
The combined effect of the collective effortThe combined effect of the collective effort
The combined effect of the collective effort
 
Online crime
Online crimeOnline crime
Online crime
 

Similar to Day 1 From CERT To NCSC

Day 1 Coop Banks
Day 1   Coop BanksDay 1   Coop Banks
Day 1 Coop Banks
vngundi
 
Cybersecurity nl
Cybersecurity nlCybersecurity nl
Cybersecurity nl
Mark Johnson
 
Information security (management) at stake in belgium 2017 v1.2
Information security (management) at stake in belgium 2017 v1.2Information security (management) at stake in belgium 2017 v1.2
Information security (management) at stake in belgium 2017 v1.2
Dominique Volon
 
SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in Cybersecurity
BigData_Europe
 
Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...
Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...
Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...
Metamorphosis
 
Quick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart MeteringQuick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart Metering
nuances
 
Information Security (Management) at Stake In Belgium
Information Security (Management) at Stake In BelgiumInformation Security (Management) at Stake In Belgium
Information Security (Management) at Stake In Belgium
Dominique Volon
 
Day 1 Large Scale Attacks
Day 1   Large Scale AttacksDay 1   Large Scale Attacks
Day 1 Large Scale Attacks
vngundi
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
isc2-hellenic
 
Natasha - WorldBank
Natasha - WorldBankNatasha - WorldBank
Natasha - WorldBank
DEWAN TIK NASIONAL
 
CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)
Gry Helene Stavseng
 
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Metamorphosis
 
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Metamorphosis
 
eGovernment and Interoperability in Italy
eGovernment and Interoperability in ItalyeGovernment and Interoperability in Italy
eGovernment and Interoperability in Italy
Gianmarco Piva
 
Information Society, Estonia
Information Society, EstoniaInformation Society, Estonia
Information Society, Estonia
Alianta INFONET
 
European priorities in information security
European priorities in information securityEuropean priorities in information security
European priorities in information security
European Union Agency for Network and Information Security (ENISA)
 
E invoicing, the role of the pueb-inlviocic administration in the promotion o...
E invoicing, the role of the pueb-inlviocic administration in the promotion o...E invoicing, the role of the pueb-inlviocic administration in the promotion o...
E invoicing, the role of the pueb-inlviocic administration in the promotion o...
Friso de Jong
 
Digital Wallonia. Digital Strategy for Wallonia.
Digital Wallonia. Digital Strategy for Wallonia.Digital Wallonia. Digital Strategy for Wallonia.
Digital Wallonia. Digital Strategy for Wallonia.
Agence du Numérique (AdN)
 
Andrus Aaslaid - E-government v Estónsku
Andrus Aaslaid - E-government v Estónsku Andrus Aaslaid - E-government v Estónsku
Andrus Aaslaid - E-government v Estónsku
Slovak Governance Institute
 
Trends and Prospects in the Information Society: Hungary and the New Member S...
Trends and Prospects in the Information Society:Hungary and the New Member S...Trends and Prospects in the Information Society:Hungary and the New Member S...
Trends and Prospects in the Information Society: Hungary and the New Member S...
Filipe Mello
 

Similar to Day 1 From CERT To NCSC (20)

Day 1 Coop Banks
Day 1   Coop BanksDay 1   Coop Banks
Day 1 Coop Banks
 
Cybersecurity nl
Cybersecurity nlCybersecurity nl
Cybersecurity nl
 
Information security (management) at stake in belgium 2017 v1.2
Information security (management) at stake in belgium 2017 v1.2Information security (management) at stake in belgium 2017 v1.2
Information security (management) at stake in belgium 2017 v1.2
 
SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in Cybersecurity
 
Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...
Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...
Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...
 
Quick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart MeteringQuick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart Metering
 
Information Security (Management) at Stake In Belgium
Information Security (Management) at Stake In BelgiumInformation Security (Management) at Stake In Belgium
Information Security (Management) at Stake In Belgium
 
Day 1 Large Scale Attacks
Day 1   Large Scale AttacksDay 1   Large Scale Attacks
Day 1 Large Scale Attacks
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
 
Natasha - WorldBank
Natasha - WorldBankNatasha - WorldBank
Natasha - WorldBank
 
CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)
 
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
 
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
 
eGovernment and Interoperability in Italy
eGovernment and Interoperability in ItalyeGovernment and Interoperability in Italy
eGovernment and Interoperability in Italy
 
Information Society, Estonia
Information Society, EstoniaInformation Society, Estonia
Information Society, Estonia
 
European priorities in information security
European priorities in information securityEuropean priorities in information security
European priorities in information security
 
E invoicing, the role of the pueb-inlviocic administration in the promotion o...
E invoicing, the role of the pueb-inlviocic administration in the promotion o...E invoicing, the role of the pueb-inlviocic administration in the promotion o...
E invoicing, the role of the pueb-inlviocic administration in the promotion o...
 
Digital Wallonia. Digital Strategy for Wallonia.
Digital Wallonia. Digital Strategy for Wallonia.Digital Wallonia. Digital Strategy for Wallonia.
Digital Wallonia. Digital Strategy for Wallonia.
 
Andrus Aaslaid - E-government v Estónsku
Andrus Aaslaid - E-government v Estónsku Andrus Aaslaid - E-government v Estónsku
Andrus Aaslaid - E-government v Estónsku
 
Trends and Prospects in the Information Society: Hungary and the New Member S...
Trends and Prospects in the Information Society:Hungary and the New Member S...Trends and Prospects in the Information Society:Hungary and the New Member S...
Trends and Prospects in the Information Society: Hungary and the New Member S...
 

More from vngundi

Anatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, SymantecAnatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, Symantec
vngundi
 
Dealing With Security Threats
Dealing With Security ThreatsDealing With Security Threats
Dealing With Security Threats
vngundi
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 
Day 2 Dns Cert 4 Scenarios
Day 2   Dns Cert 4 ScenariosDay 2   Dns Cert 4 Scenarios
Day 2 Dns Cert 4 Scenarios
vngundi
 
Day 2 Dns Cert 4c Malicious Use
Day 2   Dns Cert 4c Malicious UseDay 2   Dns Cert 4c Malicious Use
Day 2 Dns Cert 4c Malicious Use
vngundi
 
Day 2 Dns Cert 4b Name Server Redirection
Day 2   Dns Cert 4b Name Server RedirectionDay 2   Dns Cert 4b Name Server Redirection
Day 2 Dns Cert 4b Name Server Redirection
vngundi
 
Day 2 Dns Cert 4a Cache Poisoning
Day 2   Dns Cert 4a Cache PoisoningDay 2   Dns Cert 4a Cache Poisoning
Day 2 Dns Cert 4a Cache Poisoning
vngundi
 
Day 2 Dns Cert 3 Dns Organizations
Day 2   Dns Cert 3 Dns OrganizationsDay 2   Dns Cert 3 Dns Organizations
Day 2 Dns Cert 3 Dns Organizations
vngundi
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirt
vngundi
 

More from vngundi (9)

Anatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, SymantecAnatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, Symantec
 
Dealing With Security Threats
Dealing With Security ThreatsDealing With Security Threats
Dealing With Security Threats
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Day 2 Dns Cert 4 Scenarios
Day 2   Dns Cert 4 ScenariosDay 2   Dns Cert 4 Scenarios
Day 2 Dns Cert 4 Scenarios
 
Day 2 Dns Cert 4c Malicious Use
Day 2   Dns Cert 4c Malicious UseDay 2   Dns Cert 4c Malicious Use
Day 2 Dns Cert 4c Malicious Use
 
Day 2 Dns Cert 4b Name Server Redirection
Day 2   Dns Cert 4b Name Server RedirectionDay 2   Dns Cert 4b Name Server Redirection
Day 2 Dns Cert 4b Name Server Redirection
 
Day 2 Dns Cert 4a Cache Poisoning
Day 2   Dns Cert 4a Cache PoisoningDay 2   Dns Cert 4a Cache Poisoning
Day 2 Dns Cert 4a Cache Poisoning
 
Day 2 Dns Cert 3 Dns Organizations
Day 2   Dns Cert 3 Dns OrganizationsDay 2   Dns Cert 3 Dns Organizations
Day 2 Dns Cert 3 Dns Organizations
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirt
 

Recently uploaded

Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 

Recently uploaded (20)

Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 

Day 1 From CERT To NCSC

  • 1. From CERT-Hungary to National Cybersecurity Centre Ferenc Suba LLM, MA Chairman of the Board PTA CERT-Hungary Vice-chair of the MB ENISA
  • 2.
  • 3. CERT-Hungary - Started as a project by the Ministry of IT and Communications, now under Prime Minister’s Office - Partnership Agreements with: National Communications Authority, Financial Regulatory Authority, Prime Minister’s Office, National Bureau of Investigation - Accredited member of FIRST, TI, EGC - Operator of the National Alert Service of Communications as contractor - Responsible for information security of the e-gov backbone network - Trusted partner of the banking and energy sector (WGs) in CIIP, regular exercises -- International co-operations: FI-ISAC, Meridian, IWWN -- CERT capacity building: Bulgaria, South Africa
  • 4. Government Foundation - Theodore Puskás Government Foundation - Founded in 1993 by the Government of Hungary, academia, business companies - Governed by the Civil Code, Act on Public Benefit Organisations - Part of the yearly state budget - Supervised by the Prime Minister’s Office - Engaged in technology transfer, information security - Entitled to have business activities (max. 20% of the yearly income) - Flexible organisation, staff motivation, survives government changes - Think tank, preparation of regulation, project management, technical service
  • 5. e-Commerce Act - Only tool to motivate the ISPs - Liability clauses: indirect liability for ISPs = ISP is liable for any wrongdoing committed through its system if ISP does not co-operate to make the wrongdoing impossible - Reason: criminals are anonymous + attacks come through the ISPs + only ISPs can effectively take measures against them - Liability forms vary according to the function: content provider, storage provider, access provider, cache provider, information location tool provider - Principle: ISPs liability stands as of an e-mail about the wrongdoing committed through its system has been received
  • 6. Ministerial Decree on National Alert Service for Communications - Regulates CIIP in communications sector - Defines critical infrastructures legally - Defines incidents flexbily (list updated by the National Communications Authority) - Designates 8 communications providers (biggest ones) - Reporting obligation of the designated providers - Reports on incidents affecting at least 1000 users - Reports received and distributed by the Alert Service Centre - Distribution list: Ministries, Centre for Crisis Management, Services - Alert Service Centre outsourced to CERT-Hungary, under the supervision of the National Communications Authority
  • 7. Government Decree No 223/2009. on the security of public electronic services - Sections 8-10: National Cybersecurity Centre - Tasks: crisis management, central governmental system, National Alert Service for Communications, awareness raising, preparation of policy, CIIP collaboration, international representation - Control: Prime Minister’s Office, IT Security Supervisor - Framework: Theodore Puskás Government Foundation, by a public service agreement - Basic services free for the government, value-added services for payment
  • 8. The Hungarian model - Bottom-up approach, 5 years of evolution - Establish a flexible organisation - Be close to central government -- Use ENISA and partner MSs as leverage -- Have very strong international background -- Build up PPPs with interested private sectors -- Be not only technical (crisis management, awareness raising, policy making, national and international collaboration) -- Distribute your financial resources (state budget, state project contracts, service contracts, EU and national research projects)
  • 9. Thank you for your attention and patience! PTA CERT-Hungary www.cert-hungary.hu Puskás Tivadar Közalapítvány www.neti.hu ENISA www.enisa.europa.eu