SlideShare a Scribd company logo
Enhancing cyber
defence of
cyber space systems
1
Dr. Nineta Polemi
Programme Manager- E.U. Policies
Directorate-General for Communications Networks,
Content and Technology
Cybersecurity and Digital Privacy Unit H.1
Topics
 Introduction
 Cyber-attacks in Space ecosystem
 Security Management –Cyber Defence
 Cybersecurity Package- Cyber Space Technologies
& Infrastructures
 Conclusions and the way forward
2
Introduction
3
 In our days, most business and military activities
depend upon space technologies & space
infrastructures.
 Space attracts new companies and the "New
Space" will enhance the DSM.
 Space and cyberspace share common critical
assets e.g. networks, software, ICT components,
protocols
 The Space Strategy for Europe (2016) recognizes
the importance of cyber security threats to critical
European space infrastructure
4
Security
Confidentiality
Making asset accessible only to
those authorized to use it
Integrity, Authenticity
Safeguarding accuracy,
identity, completeness of
asset + processing methods
Availability, Non-repudiation
Ensuring that asset is
available when required
and it is not denied
5
 Loss of Availability
DoS , wiretapping, key stealth, insertion, session hijacking,
network routing, hidden channel
 Loss of Integrity
Key guessing, cryptanalytic attacks
Loss of Authenticity
unauthorized access, site impersonation
client-system intrusion (viral infection, backdoor
installation, infor-mation stealing, forged/unvoluntary user
actions, command execution)
 Loss of Confidentiality
Espionage, data & information breach
 Loss of Non-repudiation
key guessing, cryptanalytic attacks
Cyber threats Cyber attacks
Cyber Threats in Space
7
""Protecting satellites from cyber-attacks
isn’t getting any easier"
SpaceNews— March 9, 2017
Cyber- Attacks on
Satellites
 Signals jamming, monitoring (between
satellites and receivers or between transmitting
ground stations and satellites)
• Spoofing manipulates the information and thus
reduces its integrity
• DoS by interrupting electrical power to the space
ground nodes
• .......
• Impacts of Attacks: take control of the satellite,
shut it down, alter its orbit 8
Cyber-attacks in space infrastructures
• Space Critical Information Infrastructures
(CII) can face physical and cyber-attacks at all
levels (networks, ICT systems/equipment,
services, processes)
• Impact of Attacks: destroy space control,
operations, missions, services
9
Cyber-attacks in space software
 Back doors for espionage or sabotage
 Unencrypted data
 Insecure protocols
 Exploitable software flaws
 …..
Space operations and services are global supply
chain services and the propagation rate of a cyber-
attack may catastrophically impact the whole
world!!!!
10
Cyber Risk Assessment -
Security Management
11
Risk Assessment
risk
Vulnera
bility
Threat
Impact
Controls/
countermeasures
risk
Risk Management
13
Security Management (SM)
Risk Management (RM)
Risk Assessment (RA)
Context
Establishment
General
considerations
Basic Criteria
Scope &
boundaries
Organization
for RM
Risk
Identification
Identification
of assets
Identification
of threats
Identification
of existing
controls
Identification
of
vulnerabilities
Identification
of impacts
Risk
Estimation
Selection of
risk
assessment
methodology
Assessment of
threat level
Assessment of
impact level
Risk level
estimation
Risk
Treatment
Categorize
risks
Select controls
Implement
controls
Evaluate-
controls
Security
Reporting
Monitor/Adjust
SLA security
management
Internal/External
Audit
Training
Recommendations
Cyber Defence
15
16
Cyber security directives
and standards
17
18
• CIIP Directive (2012) Critical information infrastructure
protection: towards global cyber-security
• The Cybersecurity Strategy for the European Union (2013)
and the European Agenda on Security (2015) provide the
overall strategic framework for the EU initiatives on
cybersecurity/cybercrime.
• eIDAS Regulation (2014) on electronic identification and
trust services for e-transactions in the internal market.
• cPPP Initiative 2015 ensures that Europe will have a
dynamic, efficient market in cybersecurity products /
services.
• Directive (EU) 2016/1148 (NIS) sets obligations: national
strategies, CSIRT, requirements for operators, national
competent authorities.
EU Cyber Security policies
Cyber security standards
 ISO/IEC 27001:2005 followed by draft ISO/IEC 27001:2013
(building a SM system)
 ISO/IEC 27005:2011 (provides guidelines for information
security risk management)
 ISO 31000:2009 - Principles and Guidelines on
Implementation
 ISO/IEC 31010:2009 - Risk Management - Risk Assessment
Techniques
 ISO/IEC 27002:2005 (best practice recommendations)
 AS/NZS 4360:2004 (Australian/New Zeland standard for RM)
• Supported by a variety of methodologies (see ENISA
repository) and guidelines (ENISA report 2017 "Technical Guidelines for
the implementation of minimum security measures for Digital Service
Providers").
19
1. ISO 28000:2007 on Specification for security management systems
for the SC;
2. ISO 28001:2007 on Security management systems for SC– Best
practices for implementing SC security);
3. ISO 28003:2007 on Security management systems for the SC-
Requirements for auditors of SC security management systems;
4. ISO 28004:2007 on Security management systems for the SC–
Guidelines for the implementation of ISO 28000.
ISO Supply Chain (SC) security
standards
Cybersecurity Package
21
Building EU Resilience to
cyber attacks
Reformed ENISA
EU cybersecurity Certification
Framework
NIS Directive Implementation
Rapid emergency response –
Blueprint & Cybersecurity
Emergency Response Fund
Cybersecurity competence network
with a European Cybersecurity
Research and Competence Centre
Building strong EU cyber skills base,
improving cyber hygiene and
awareness
Creating effective
EU cyber deterrence
Identifying malicious actors
Stepping up the law
enforcement response
Stepping up public-private
cooperation against cybercrime
Stepping up political response
Building cybersecurity deterrence
through the Member States' defence
capability
Strengthening
international cooperation
on cybersecurity
Promoting global cyber stability and
contributing to Europe's strategic
autonomy in cyberspace
Strengthening cyber dialogues
Modernising export controls,
including for critical cyber-
surveillance technologies
Continue rights-based capacity
building model
Deepen EU-NATO cooperation on
cybersecurity, hybrid threats
and defence
22
Cybersecurity
Act
Communication
Recommendation
ENISA: towards a reformed EU
Cybersecurity Agency
23
Be an independent centre
of expertise
Promote cooperation
&coordination at Union level
Promote high level of
awareness of citizens
& businesses
Support
capacity building &
preparedness
Assist EU Institutions/
MSs in policy
development
& implementation
Increase
cybersecurity
capabilities at Union
level to complement
MSs action
Promote the use of certification &
contribute to the cybersecurity
certification framework
Contribute
to high
Cybersecurity
ICT cybersecurity certification
• The issue
• The digitalisation of our society generates greater need for cyber secure
products and services
• Cybersecurity certification plays an important role in increasing trust of
digital products and services
Current landscape
• emergence of separate national initiatives lacking mutual recognition
(e.g. France, UK, Germany, Netherlands, Italy)
• Current European mechanisms (SOG-IS MRA) have limited membership
(12 MSs), involve high costs and long duration
ENISA
Prepares
candidate
scheme
ECCG
Advises and
assists
preparation
ENISA
Consults Industry
& Standardization
Bodies
ENISA
Transmits
candidate
scheme to the
European
Commission
European
Commission
Adopts
Candidate
Scheme
A European
Cybersecurity
Certification
Scheme
European
Commission
Requests ENISA
to prepare a
Candidate
Scheme
European Cybersecurity
Certification Group (MSs)
Advices ENISA or may propose
the preparation of a scheme to
the Commission
How will the certification framework work in practice
In a nutshell: EC proposes & decides, Group advices (and may propose), ENISA prepares schemes
1. Blueprint - Recommendation on Coordinated Response to Large Scale
Cybersecurity Incidents and Crises (COM(2017) 6100).
2. ENISA (COM(4776/2)) - Tasks relating to operational cooperation at
Union level
• The Agency shall contribute to develop a cooperative response, at
Union and Member States level, to large-scale cross-border incidents
or crises related to cybersecurity
3. Cybersecurity Emergency Response Fund - Joint Communication
"Resilience, Deterrence and Defence: Building strong cybersecurity for the
EU", JOIN(2017) 450/1
3 lines of actions for improving resilience:
A cybersecurity competence
network with a European
Cybersecurity Research and
Competence Centre
• Reinforcing EU's cybersecurity technologic
capabilities and skills
28
European
Cybersecurity
Research and
Competence
network &
Centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
MS
cybersecurity
competence
centre
Idea in a nutshell
•Builds on the work of Member States and
the cPPP to:
•Stimulate development and deployment
of technology in cybersecurity
•Give impetus to innovation and
competitiveness of the EU industry on the
global scene in the development of next-
generation digital technologies (AI,
quantum computing, block chain, secure
digital identities)
•Support industry through testing and
simulation to underpin the cybersecurity
certification
•Complement skills development efforts at
EU and national level
•In the second phase - stimulate synergies
between civilian and defence markets
that share common challenges
Making the Most of NIs
• Core elements of the Communication
Presenting key conclusions of the analysis of the issues covered in the
Annex, which are seen as important points of reference and potential
inspiration from the point of view of the transposition into national law.
 Accompanied by an Annex with practical suggestions
• Based on good practices and recommendations issued by ENISA
• Examples from Member States
• Interpretation of Directive's provisions and of how they would work in
practice
Conclusions
• Space and cyber space ecosystems are merging
• Cyber secure space systems, technologies and
infrastructures can be regarded as a strategic
opportunity to:
 enhance the DSM in connection to "New Space",
 guarantee mission assurance for space assets ,
 enhance cyber defence operations.
• The cyber security community & the space
community need to collaborate and get prepared to
defend all space assets against the growing
sophisticated cyber-attacks.
Next Steps
• Build (national, EU, international) synergies
between space and cyber security stakeholders.
• Develop mutually agreed mitigation
frameworks for space-cyber risks, compliant
with:
 EU strategies/policies (e.g. Space Strategy for
Europe 2016/2325(INI), Common Security and
Defence Policy –CSDP-, Decision No
541/2014/EU),
 directives (e.g. NIS, GDPR); COM(2017)294;
COM(2017)477
 international standards (e.g. ISO27005).
31
• Thank you for your attention
• Nineta.POLEMI@ec.europa.eu
32

More Related Content

What's hot

SC7 Workshop 2: Workshop Presentation
SC7 Workshop 2: Workshop PresentationSC7 Workshop 2: Workshop Presentation
SC7 Workshop 2: Workshop Presentation
BigData_Europe
 
SC7 Workshop 2: Big Data pilots for Secure Societies
SC7 Workshop 2: Big Data pilots for Secure SocietiesSC7 Workshop 2: Big Data pilots for Secure Societies
SC7 Workshop 2: Big Data pilots for Secure Societies
BigData_Europe
 
SC7 Workshop 2: Big Data Challenges in building GEOSS
SC7 Workshop 2: Big Data Challenges in building GEOSSSC7 Workshop 2: Big Data Challenges in building GEOSS
SC7 Workshop 2: Big Data Challenges in building GEOSS
BigData_Europe
 
SC7 Workshop 2: Industry view of Big Data Challenges for Secure Societies
SC7 Workshop 2: Industry view of Big Data Challenges for Secure SocietiesSC7 Workshop 2: Industry view of Big Data Challenges for Secure Societies
SC7 Workshop 2: Industry view of Big Data Challenges for Secure Societies
BigData_Europe
 
SC7 Workshop 2: Space Data for Secure Societies
SC7 Workshop 2: Space Data for Secure SocietiesSC7 Workshop 2: Space Data for Secure Societies
SC7 Workshop 2: Space Data for Secure Societies
BigData_Europe
 
SC7 Workshop 2: Big Data and Secure Societies
SC7 Workshop 2: Big Data and Secure SocietiesSC7 Workshop 2: Big Data and Secure Societies
SC7 Workshop 2: Big Data and Secure Societies
BigData_Europe
 
SC7 Workshop 2: Space-based applications and Big Data
SC7 Workshop 2: Space-based applications and Big DataSC7 Workshop 2: Space-based applications and Big Data
SC7 Workshop 2: Space-based applications and Big Data
BigData_Europe
 
SC7 Workshop 2: The BigDataEurope project
SC7 Workshop 2: The BigDataEurope projectSC7 Workshop 2: The BigDataEurope project
SC7 Workshop 2: The BigDataEurope project
BigData_Europe
 
Big Data Europe at eHealth Week 2017: Linking Big Data in Health
Big Data Europe at eHealth Week 2017: Linking Big Data in HealthBig Data Europe at eHealth Week 2017: Linking Big Data in Health
Big Data Europe at eHealth Week 2017: Linking Big Data in Health
BigData_Europe
 
SC7 Workshop 2: Big Data Technologies and Scenarios
SC7 Workshop 2: Big Data Technologies and ScenariosSC7 Workshop 2: Big Data Technologies and Scenarios
SC7 Workshop 2: Big Data Technologies and Scenarios
BigData_Europe
 
European Spatial Data Infrastructure - INSPIRE and beyond
European Spatial Data Infrastructure - INSPIRE and beyond European Spatial Data Infrastructure - INSPIRE and beyond
European Spatial Data Infrastructure - INSPIRE and beyond
inspireeu
 
6. EOSC Secretariat and Landscaping
6. EOSC Secretariat and Landscaping6. EOSC Secretariat and Landscaping
6. EOSC Secretariat and Landscaping
EOSC-Pillar European Project
 
BDE Webinar: SC6 - EUROPE IN A CHANGING WORLD -INCLUSIVE, INNOVATIVE AND REFL...
BDE Webinar: SC6 - EUROPE IN A CHANGING WORLD -INCLUSIVE, INNOVATIVE AND REFL...BDE Webinar: SC6 - EUROPE IN A CHANGING WORLD -INCLUSIVE, INNOVATIVE AND REFL...
BDE Webinar: SC6 - EUROPE IN A CHANGING WORLD -INCLUSIVE, INNOVATIVE AND REFL...
BigData_Europe
 
4th RDA Europe Science Workshop - The e-ROSA project
4th RDA Europe Science Workshop - The e-ROSA project4th RDA Europe Science Workshop - The e-ROSA project
4th RDA Europe Science Workshop - The e-ROSA project
e-ROSA
 
INSPIRE in action
INSPIRE  in actionINSPIRE  in action
INSPIRE in actioninspireeu
 
Sshoc kick off meeting - 1.2.3 EOSC board - Social Sciences and Humanities Op...
Sshoc kick off meeting - 1.2.3 EOSC board - Social Sciences and Humanities Op...Sshoc kick off meeting - 1.2.3 EOSC board - Social Sciences and Humanities Op...
Sshoc kick off meeting - 1.2.3 EOSC board - Social Sciences and Humanities Op...
SSHOC
 
BDE SC4 Hangout - Simon Scerri, Introduction
BDE SC4 Hangout - Simon Scerri, IntroductionBDE SC4 Hangout - Simon Scerri, Introduction
BDE SC4 Hangout - Simon Scerri, Introduction
BigData_Europe
 
4. EOSC Sinergy Objectives, Workplan, Potential Impact
4. EOSC Sinergy Objectives, Workplan, Potential Impact 4. EOSC Sinergy Objectives, Workplan, Potential Impact
4. EOSC Sinergy Objectives, Workplan, Potential Impact
EOSC-Pillar European Project
 
BDE Technical Webinar 1 : Pilot Instantiation
BDE Technical Webinar 1 :  Pilot InstantiationBDE Technical Webinar 1 :  Pilot Instantiation
BDE Technical Webinar 1 : Pilot Instantiation
BigData_Europe
 
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
Data Driven Innovation
 

What's hot (20)

SC7 Workshop 2: Workshop Presentation
SC7 Workshop 2: Workshop PresentationSC7 Workshop 2: Workshop Presentation
SC7 Workshop 2: Workshop Presentation
 
SC7 Workshop 2: Big Data pilots for Secure Societies
SC7 Workshop 2: Big Data pilots for Secure SocietiesSC7 Workshop 2: Big Data pilots for Secure Societies
SC7 Workshop 2: Big Data pilots for Secure Societies
 
SC7 Workshop 2: Big Data Challenges in building GEOSS
SC7 Workshop 2: Big Data Challenges in building GEOSSSC7 Workshop 2: Big Data Challenges in building GEOSS
SC7 Workshop 2: Big Data Challenges in building GEOSS
 
SC7 Workshop 2: Industry view of Big Data Challenges for Secure Societies
SC7 Workshop 2: Industry view of Big Data Challenges for Secure SocietiesSC7 Workshop 2: Industry view of Big Data Challenges for Secure Societies
SC7 Workshop 2: Industry view of Big Data Challenges for Secure Societies
 
SC7 Workshop 2: Space Data for Secure Societies
SC7 Workshop 2: Space Data for Secure SocietiesSC7 Workshop 2: Space Data for Secure Societies
SC7 Workshop 2: Space Data for Secure Societies
 
SC7 Workshop 2: Big Data and Secure Societies
SC7 Workshop 2: Big Data and Secure SocietiesSC7 Workshop 2: Big Data and Secure Societies
SC7 Workshop 2: Big Data and Secure Societies
 
SC7 Workshop 2: Space-based applications and Big Data
SC7 Workshop 2: Space-based applications and Big DataSC7 Workshop 2: Space-based applications and Big Data
SC7 Workshop 2: Space-based applications and Big Data
 
SC7 Workshop 2: The BigDataEurope project
SC7 Workshop 2: The BigDataEurope projectSC7 Workshop 2: The BigDataEurope project
SC7 Workshop 2: The BigDataEurope project
 
Big Data Europe at eHealth Week 2017: Linking Big Data in Health
Big Data Europe at eHealth Week 2017: Linking Big Data in HealthBig Data Europe at eHealth Week 2017: Linking Big Data in Health
Big Data Europe at eHealth Week 2017: Linking Big Data in Health
 
SC7 Workshop 2: Big Data Technologies and Scenarios
SC7 Workshop 2: Big Data Technologies and ScenariosSC7 Workshop 2: Big Data Technologies and Scenarios
SC7 Workshop 2: Big Data Technologies and Scenarios
 
European Spatial Data Infrastructure - INSPIRE and beyond
European Spatial Data Infrastructure - INSPIRE and beyond European Spatial Data Infrastructure - INSPIRE and beyond
European Spatial Data Infrastructure - INSPIRE and beyond
 
6. EOSC Secretariat and Landscaping
6. EOSC Secretariat and Landscaping6. EOSC Secretariat and Landscaping
6. EOSC Secretariat and Landscaping
 
BDE Webinar: SC6 - EUROPE IN A CHANGING WORLD -INCLUSIVE, INNOVATIVE AND REFL...
BDE Webinar: SC6 - EUROPE IN A CHANGING WORLD -INCLUSIVE, INNOVATIVE AND REFL...BDE Webinar: SC6 - EUROPE IN A CHANGING WORLD -INCLUSIVE, INNOVATIVE AND REFL...
BDE Webinar: SC6 - EUROPE IN A CHANGING WORLD -INCLUSIVE, INNOVATIVE AND REFL...
 
4th RDA Europe Science Workshop - The e-ROSA project
4th RDA Europe Science Workshop - The e-ROSA project4th RDA Europe Science Workshop - The e-ROSA project
4th RDA Europe Science Workshop - The e-ROSA project
 
INSPIRE in action
INSPIRE  in actionINSPIRE  in action
INSPIRE in action
 
Sshoc kick off meeting - 1.2.3 EOSC board - Social Sciences and Humanities Op...
Sshoc kick off meeting - 1.2.3 EOSC board - Social Sciences and Humanities Op...Sshoc kick off meeting - 1.2.3 EOSC board - Social Sciences and Humanities Op...
Sshoc kick off meeting - 1.2.3 EOSC board - Social Sciences and Humanities Op...
 
BDE SC4 Hangout - Simon Scerri, Introduction
BDE SC4 Hangout - Simon Scerri, IntroductionBDE SC4 Hangout - Simon Scerri, Introduction
BDE SC4 Hangout - Simon Scerri, Introduction
 
4. EOSC Sinergy Objectives, Workplan, Potential Impact
4. EOSC Sinergy Objectives, Workplan, Potential Impact 4. EOSC Sinergy Objectives, Workplan, Potential Impact
4. EOSC Sinergy Objectives, Workplan, Potential Impact
 
BDE Technical Webinar 1 : Pilot Instantiation
BDE Technical Webinar 1 :  Pilot InstantiationBDE Technical Webinar 1 :  Pilot Instantiation
BDE Technical Webinar 1 : Pilot Instantiation
 
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
Progetto EOSC-Pillar (Fulvio Galeazzi, GARR)
 

Similar to SC7 Workshop 3: Enhancing cyber defence of cyber space systems

Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
Antoine Vigneron
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
EUBrasilCloudFORUM .
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
Kevin Duffey
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
GoogleNewsSubmit
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eumanelmedina
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
Aparajita Banerjee
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
Abbie Barbir
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Glorisosegughana
 
Security5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxSecurity5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docx
bagotjesusa
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Shakeel Ali
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Ferenc Fresz
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
ClubHack
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
Indian Air Force
 
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
APNIC
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
European Services Institute
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
robbiesamuel
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Leonardo ENERGY
 

Similar to SC7 Workshop 3: Enhancing cyber defence of cyber space systems (20)

Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
The European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eu
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
Security5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxSecurity5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docx
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
 
European Cybersecurity Skills Framework Role Profiles.pdf
European Cybersecurity Skills Framework Role Profiles.pdfEuropean Cybersecurity Skills Framework Role Profiles.pdf
European Cybersecurity Skills Framework Role Profiles.pdf
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Session 2.1 Martin Mühleck
Session 2.1 Martin MühleckSession 2.1 Martin Mühleck
Session 2.1 Martin Mühleck
 
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
 

More from BigData_Europe

Luigi Selmi - The Big Data Integrator Platform
Luigi Selmi - The Big Data Integrator PlatformLuigi Selmi - The Big Data Integrator Platform
Luigi Selmi - The Big Data Integrator Platform
BigData_Europe
 
Josep Maria Salanova - Introduction to BDE+SC4
Josep Maria Salanova - Introduction to BDE+SC4Josep Maria Salanova - Introduction to BDE+SC4
Josep Maria Salanova - Introduction to BDE+SC4
BigData_Europe
 
Rajendra Akerkar - LeMO Project
Rajendra Akerkar - LeMO ProjectRajendra Akerkar - LeMO Project
Rajendra Akerkar - LeMO Project
BigData_Europe
 
Big Data Europe SC6 WS #3: PILOT SC6: CITIZEN BUDGET ON MUNICIPAL LEVEL, Mart...
Big Data Europe SC6 WS #3: PILOT SC6: CITIZEN BUDGET ON MUNICIPAL LEVEL, Mart...Big Data Europe SC6 WS #3: PILOT SC6: CITIZEN BUDGET ON MUNICIPAL LEVEL, Mart...
Big Data Europe SC6 WS #3: PILOT SC6: CITIZEN BUDGET ON MUNICIPAL LEVEL, Mart...
BigData_Europe
 
Big Data Europe SC6 WS #3: Big Data Europe Platform: Apps, challenges, goals ...
Big Data Europe SC6 WS #3: Big Data Europe Platform: Apps, challenges, goals ...Big Data Europe SC6 WS #3: Big Data Europe Platform: Apps, challenges, goals ...
Big Data Europe SC6 WS #3: Big Data Europe Platform: Apps, challenges, goals ...
BigData_Europe
 
Big Data Europe SC6 WS 3: Where we are and are going for Big Data in OpenScie...
Big Data Europe SC6 WS 3: Where we are and are going for Big Data in OpenScie...Big Data Europe SC6 WS 3: Where we are and are going for Big Data in OpenScie...
Big Data Europe SC6 WS 3: Where we are and are going for Big Data in OpenScie...
BigData_Europe
 
Big Data Europe SC6 WS 3: Ron Dekker, Director CESSDA European Open Science A...
Big Data Europe SC6 WS 3: Ron Dekker, Director CESSDA European Open Science A...Big Data Europe SC6 WS 3: Ron Dekker, Director CESSDA European Open Science A...
Big Data Europe SC6 WS 3: Ron Dekker, Director CESSDA European Open Science A...
BigData_Europe
 
Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...
Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...
Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...
BigData_Europe
 
BDE SC3.3 Workshop - BDE review: Scope and Opportunities
 BDE SC3.3 Workshop -  BDE review: Scope and Opportunities BDE SC3.3 Workshop -  BDE review: Scope and Opportunities
BDE SC3.3 Workshop - BDE review: Scope and Opportunities
BigData_Europe
 
BDE SC3.3 Workshop - Agenda
 BDE SC3.3 Workshop - Agenda BDE SC3.3 Workshop - Agenda
BDE SC3.3 Workshop - Agenda
BigData_Europe
 
BDE SC3.3 Workshop - BDE Pilot case for Wind Turbine condition monitoring re...
 BDE SC3.3 Workshop - BDE Pilot case for Wind Turbine condition monitoring re... BDE SC3.3 Workshop - BDE Pilot case for Wind Turbine condition monitoring re...
BDE SC3.3 Workshop - BDE Pilot case for Wind Turbine condition monitoring re...
BigData_Europe
 
BDE SC3.3 Workshop - Data management in WT testing and monitoring
 BDE SC3.3 Workshop - Data management in WT testing and monitoring  BDE SC3.3 Workshop - Data management in WT testing and monitoring
BDE SC3.3 Workshop - Data management in WT testing and monitoring
BigData_Europe
 
BDE SC3.3 Workshop - Big Data in Wind Turbine Condition Monitoring
 BDE SC3.3 Workshop -  Big Data in Wind Turbine Condition Monitoring BDE SC3.3 Workshop -  Big Data in Wind Turbine Condition Monitoring
BDE SC3.3 Workshop - Big Data in Wind Turbine Condition Monitoring
BigData_Europe
 
BDE SC3.3 Workshop - BDE Platform: Technical overview
 BDE SC3.3 Workshop -  BDE Platform: Technical overview BDE SC3.3 Workshop -  BDE Platform: Technical overview
BDE SC3.3 Workshop - BDE Platform: Technical overview
BigData_Europe
 
BDE SC3.3 Workshop - Options for Wind Farm performance assessment and Power f...
BDE SC3.3 Workshop - Options for Wind Farm performance assessment and Power f...BDE SC3.3 Workshop - Options for Wind Farm performance assessment and Power f...
BDE SC3.3 Workshop - Options for Wind Farm performance assessment and Power f...
BigData_Europe
 
BDE SC3.3 Workshop - Wind Farm Monitoring and advanced analytics
 BDE SC3.3 Workshop - Wind Farm Monitoring and advanced analytics  BDE SC3.3 Workshop - Wind Farm Monitoring and advanced analytics
BDE SC3.3 Workshop - Wind Farm Monitoring and advanced analytics
BigData_Europe
 
Big Data Europe: Workshop 3 SC6 Social Science: THE IMPORTANCE OF METADATA & ...
Big Data Europe: Workshop 3 SC6 Social Science: THE IMPORTANCE OF METADATA & ...Big Data Europe: Workshop 3 SC6 Social Science: THE IMPORTANCE OF METADATA & ...
Big Data Europe: Workshop 3 SC6 Social Science: THE IMPORTANCE OF METADATA & ...
BigData_Europe
 
BDE SC1 Workshop 3 - BigMedilytics Overview (Supriyo Chatterjea)
BDE SC1 Workshop 3 - BigMedilytics Overview (Supriyo Chatterjea)BDE SC1 Workshop 3 - BigMedilytics Overview (Supriyo Chatterjea)
BDE SC1 Workshop 3 - BigMedilytics Overview (Supriyo Chatterjea)
BigData_Europe
 
BDE SC1 Workshop 3 - iASiS (Guillermo Palma)
BDE SC1 Workshop 3 - iASiS (Guillermo Palma)BDE SC1 Workshop 3 - iASiS (Guillermo Palma)
BDE SC1 Workshop 3 - iASiS (Guillermo Palma)
BigData_Europe
 
BDE SC1 Workshop 3 - MIDAS (Michaela Black)
BDE SC1 Workshop 3 - MIDAS (Michaela Black)BDE SC1 Workshop 3 - MIDAS (Michaela Black)
BDE SC1 Workshop 3 - MIDAS (Michaela Black)
BigData_Europe
 

More from BigData_Europe (20)

Luigi Selmi - The Big Data Integrator Platform
Luigi Selmi - The Big Data Integrator PlatformLuigi Selmi - The Big Data Integrator Platform
Luigi Selmi - The Big Data Integrator Platform
 
Josep Maria Salanova - Introduction to BDE+SC4
Josep Maria Salanova - Introduction to BDE+SC4Josep Maria Salanova - Introduction to BDE+SC4
Josep Maria Salanova - Introduction to BDE+SC4
 
Rajendra Akerkar - LeMO Project
Rajendra Akerkar - LeMO ProjectRajendra Akerkar - LeMO Project
Rajendra Akerkar - LeMO Project
 
Big Data Europe SC6 WS #3: PILOT SC6: CITIZEN BUDGET ON MUNICIPAL LEVEL, Mart...
Big Data Europe SC6 WS #3: PILOT SC6: CITIZEN BUDGET ON MUNICIPAL LEVEL, Mart...Big Data Europe SC6 WS #3: PILOT SC6: CITIZEN BUDGET ON MUNICIPAL LEVEL, Mart...
Big Data Europe SC6 WS #3: PILOT SC6: CITIZEN BUDGET ON MUNICIPAL LEVEL, Mart...
 
Big Data Europe SC6 WS #3: Big Data Europe Platform: Apps, challenges, goals ...
Big Data Europe SC6 WS #3: Big Data Europe Platform: Apps, challenges, goals ...Big Data Europe SC6 WS #3: Big Data Europe Platform: Apps, challenges, goals ...
Big Data Europe SC6 WS #3: Big Data Europe Platform: Apps, challenges, goals ...
 
Big Data Europe SC6 WS 3: Where we are and are going for Big Data in OpenScie...
Big Data Europe SC6 WS 3: Where we are and are going for Big Data in OpenScie...Big Data Europe SC6 WS 3: Where we are and are going for Big Data in OpenScie...
Big Data Europe SC6 WS 3: Where we are and are going for Big Data in OpenScie...
 
Big Data Europe SC6 WS 3: Ron Dekker, Director CESSDA European Open Science A...
Big Data Europe SC6 WS 3: Ron Dekker, Director CESSDA European Open Science A...Big Data Europe SC6 WS 3: Ron Dekker, Director CESSDA European Open Science A...
Big Data Europe SC6 WS 3: Ron Dekker, Director CESSDA European Open Science A...
 
Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...
Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...
Big Data Europe: SC6 Workshop 3: The European Research Data Landscape: Opport...
 
BDE SC3.3 Workshop - BDE review: Scope and Opportunities
 BDE SC3.3 Workshop -  BDE review: Scope and Opportunities BDE SC3.3 Workshop -  BDE review: Scope and Opportunities
BDE SC3.3 Workshop - BDE review: Scope and Opportunities
 
BDE SC3.3 Workshop - Agenda
 BDE SC3.3 Workshop - Agenda BDE SC3.3 Workshop - Agenda
BDE SC3.3 Workshop - Agenda
 
BDE SC3.3 Workshop - BDE Pilot case for Wind Turbine condition monitoring re...
 BDE SC3.3 Workshop - BDE Pilot case for Wind Turbine condition monitoring re... BDE SC3.3 Workshop - BDE Pilot case for Wind Turbine condition monitoring re...
BDE SC3.3 Workshop - BDE Pilot case for Wind Turbine condition monitoring re...
 
BDE SC3.3 Workshop - Data management in WT testing and monitoring
 BDE SC3.3 Workshop - Data management in WT testing and monitoring  BDE SC3.3 Workshop - Data management in WT testing and monitoring
BDE SC3.3 Workshop - Data management in WT testing and monitoring
 
BDE SC3.3 Workshop - Big Data in Wind Turbine Condition Monitoring
 BDE SC3.3 Workshop -  Big Data in Wind Turbine Condition Monitoring BDE SC3.3 Workshop -  Big Data in Wind Turbine Condition Monitoring
BDE SC3.3 Workshop - Big Data in Wind Turbine Condition Monitoring
 
BDE SC3.3 Workshop - BDE Platform: Technical overview
 BDE SC3.3 Workshop -  BDE Platform: Technical overview BDE SC3.3 Workshop -  BDE Platform: Technical overview
BDE SC3.3 Workshop - BDE Platform: Technical overview
 
BDE SC3.3 Workshop - Options for Wind Farm performance assessment and Power f...
BDE SC3.3 Workshop - Options for Wind Farm performance assessment and Power f...BDE SC3.3 Workshop - Options for Wind Farm performance assessment and Power f...
BDE SC3.3 Workshop - Options for Wind Farm performance assessment and Power f...
 
BDE SC3.3 Workshop - Wind Farm Monitoring and advanced analytics
 BDE SC3.3 Workshop - Wind Farm Monitoring and advanced analytics  BDE SC3.3 Workshop - Wind Farm Monitoring and advanced analytics
BDE SC3.3 Workshop - Wind Farm Monitoring and advanced analytics
 
Big Data Europe: Workshop 3 SC6 Social Science: THE IMPORTANCE OF METADATA & ...
Big Data Europe: Workshop 3 SC6 Social Science: THE IMPORTANCE OF METADATA & ...Big Data Europe: Workshop 3 SC6 Social Science: THE IMPORTANCE OF METADATA & ...
Big Data Europe: Workshop 3 SC6 Social Science: THE IMPORTANCE OF METADATA & ...
 
BDE SC1 Workshop 3 - BigMedilytics Overview (Supriyo Chatterjea)
BDE SC1 Workshop 3 - BigMedilytics Overview (Supriyo Chatterjea)BDE SC1 Workshop 3 - BigMedilytics Overview (Supriyo Chatterjea)
BDE SC1 Workshop 3 - BigMedilytics Overview (Supriyo Chatterjea)
 
BDE SC1 Workshop 3 - iASiS (Guillermo Palma)
BDE SC1 Workshop 3 - iASiS (Guillermo Palma)BDE SC1 Workshop 3 - iASiS (Guillermo Palma)
BDE SC1 Workshop 3 - iASiS (Guillermo Palma)
 
BDE SC1 Workshop 3 - MIDAS (Michaela Black)
BDE SC1 Workshop 3 - MIDAS (Michaela Black)BDE SC1 Workshop 3 - MIDAS (Michaela Black)
BDE SC1 Workshop 3 - MIDAS (Michaela Black)
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

SC7 Workshop 3: Enhancing cyber defence of cyber space systems

  • 1. Enhancing cyber defence of cyber space systems 1 Dr. Nineta Polemi Programme Manager- E.U. Policies Directorate-General for Communications Networks, Content and Technology Cybersecurity and Digital Privacy Unit H.1
  • 2. Topics  Introduction  Cyber-attacks in Space ecosystem  Security Management –Cyber Defence  Cybersecurity Package- Cyber Space Technologies & Infrastructures  Conclusions and the way forward 2
  • 4.  In our days, most business and military activities depend upon space technologies & space infrastructures.  Space attracts new companies and the "New Space" will enhance the DSM.  Space and cyberspace share common critical assets e.g. networks, software, ICT components, protocols  The Space Strategy for Europe (2016) recognizes the importance of cyber security threats to critical European space infrastructure 4
  • 5. Security Confidentiality Making asset accessible only to those authorized to use it Integrity, Authenticity Safeguarding accuracy, identity, completeness of asset + processing methods Availability, Non-repudiation Ensuring that asset is available when required and it is not denied 5
  • 6.  Loss of Availability DoS , wiretapping, key stealth, insertion, session hijacking, network routing, hidden channel  Loss of Integrity Key guessing, cryptanalytic attacks Loss of Authenticity unauthorized access, site impersonation client-system intrusion (viral infection, backdoor installation, infor-mation stealing, forged/unvoluntary user actions, command execution)  Loss of Confidentiality Espionage, data & information breach  Loss of Non-repudiation key guessing, cryptanalytic attacks Cyber threats Cyber attacks
  • 7. Cyber Threats in Space 7 ""Protecting satellites from cyber-attacks isn’t getting any easier" SpaceNews— March 9, 2017
  • 8. Cyber- Attacks on Satellites  Signals jamming, monitoring (between satellites and receivers or between transmitting ground stations and satellites) • Spoofing manipulates the information and thus reduces its integrity • DoS by interrupting electrical power to the space ground nodes • ....... • Impacts of Attacks: take control of the satellite, shut it down, alter its orbit 8
  • 9. Cyber-attacks in space infrastructures • Space Critical Information Infrastructures (CII) can face physical and cyber-attacks at all levels (networks, ICT systems/equipment, services, processes) • Impact of Attacks: destroy space control, operations, missions, services 9
  • 10. Cyber-attacks in space software  Back doors for espionage or sabotage  Unencrypted data  Insecure protocols  Exploitable software flaws  ….. Space operations and services are global supply chain services and the propagation rate of a cyber- attack may catastrophically impact the whole world!!!! 10
  • 11. Cyber Risk Assessment - Security Management 11
  • 13. 13
  • 14. Security Management (SM) Risk Management (RM) Risk Assessment (RA) Context Establishment General considerations Basic Criteria Scope & boundaries Organization for RM Risk Identification Identification of assets Identification of threats Identification of existing controls Identification of vulnerabilities Identification of impacts Risk Estimation Selection of risk assessment methodology Assessment of threat level Assessment of impact level Risk level estimation Risk Treatment Categorize risks Select controls Implement controls Evaluate- controls Security Reporting Monitor/Adjust SLA security management Internal/External Audit Training Recommendations
  • 16. 16
  • 18. 18 • CIIP Directive (2012) Critical information infrastructure protection: towards global cyber-security • The Cybersecurity Strategy for the European Union (2013) and the European Agenda on Security (2015) provide the overall strategic framework for the EU initiatives on cybersecurity/cybercrime. • eIDAS Regulation (2014) on electronic identification and trust services for e-transactions in the internal market. • cPPP Initiative 2015 ensures that Europe will have a dynamic, efficient market in cybersecurity products / services. • Directive (EU) 2016/1148 (NIS) sets obligations: national strategies, CSIRT, requirements for operators, national competent authorities. EU Cyber Security policies
  • 19. Cyber security standards  ISO/IEC 27001:2005 followed by draft ISO/IEC 27001:2013 (building a SM system)  ISO/IEC 27005:2011 (provides guidelines for information security risk management)  ISO 31000:2009 - Principles and Guidelines on Implementation  ISO/IEC 31010:2009 - Risk Management - Risk Assessment Techniques  ISO/IEC 27002:2005 (best practice recommendations)  AS/NZS 4360:2004 (Australian/New Zeland standard for RM) • Supported by a variety of methodologies (see ENISA repository) and guidelines (ENISA report 2017 "Technical Guidelines for the implementation of minimum security measures for Digital Service Providers"). 19
  • 20. 1. ISO 28000:2007 on Specification for security management systems for the SC; 2. ISO 28001:2007 on Security management systems for SC– Best practices for implementing SC security); 3. ISO 28003:2007 on Security management systems for the SC- Requirements for auditors of SC security management systems; 4. ISO 28004:2007 on Security management systems for the SC– Guidelines for the implementation of ISO 28000. ISO Supply Chain (SC) security standards
  • 22. Building EU Resilience to cyber attacks Reformed ENISA EU cybersecurity Certification Framework NIS Directive Implementation Rapid emergency response – Blueprint & Cybersecurity Emergency Response Fund Cybersecurity competence network with a European Cybersecurity Research and Competence Centre Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying malicious actors Stepping up the law enforcement response Stepping up public-private cooperation against cybercrime Stepping up political response Building cybersecurity deterrence through the Member States' defence capability Strengthening international cooperation on cybersecurity Promoting global cyber stability and contributing to Europe's strategic autonomy in cyberspace Strengthening cyber dialogues Modernising export controls, including for critical cyber- surveillance technologies Continue rights-based capacity building model Deepen EU-NATO cooperation on cybersecurity, hybrid threats and defence 22 Cybersecurity Act Communication Recommendation
  • 23. ENISA: towards a reformed EU Cybersecurity Agency 23 Be an independent centre of expertise Promote cooperation &coordination at Union level Promote high level of awareness of citizens & businesses Support capacity building & preparedness Assist EU Institutions/ MSs in policy development & implementation Increase cybersecurity capabilities at Union level to complement MSs action Promote the use of certification & contribute to the cybersecurity certification framework Contribute to high Cybersecurity
  • 24. ICT cybersecurity certification • The issue • The digitalisation of our society generates greater need for cyber secure products and services • Cybersecurity certification plays an important role in increasing trust of digital products and services Current landscape • emergence of separate national initiatives lacking mutual recognition (e.g. France, UK, Germany, Netherlands, Italy) • Current European mechanisms (SOG-IS MRA) have limited membership (12 MSs), involve high costs and long duration
  • 25. ENISA Prepares candidate scheme ECCG Advises and assists preparation ENISA Consults Industry & Standardization Bodies ENISA Transmits candidate scheme to the European Commission European Commission Adopts Candidate Scheme A European Cybersecurity Certification Scheme European Commission Requests ENISA to prepare a Candidate Scheme European Cybersecurity Certification Group (MSs) Advices ENISA or may propose the preparation of a scheme to the Commission How will the certification framework work in practice In a nutshell: EC proposes & decides, Group advices (and may propose), ENISA prepares schemes
  • 26. 1. Blueprint - Recommendation on Coordinated Response to Large Scale Cybersecurity Incidents and Crises (COM(2017) 6100). 2. ENISA (COM(4776/2)) - Tasks relating to operational cooperation at Union level • The Agency shall contribute to develop a cooperative response, at Union and Member States level, to large-scale cross-border incidents or crises related to cybersecurity 3. Cybersecurity Emergency Response Fund - Joint Communication "Resilience, Deterrence and Defence: Building strong cybersecurity for the EU", JOIN(2017) 450/1 3 lines of actions for improving resilience:
  • 27. A cybersecurity competence network with a European Cybersecurity Research and Competence Centre • Reinforcing EU's cybersecurity technologic capabilities and skills
  • 28. 28 European Cybersecurity Research and Competence network & Centre MS cybersecurity competence centre MS cybersecurity competence centre MS cybersecurity competence centre MS cybersecurity competence centre MS cybersecurity competence centre MS cybersecurity competence centre MS cybersecurity competence centre MS cybersecurity competence centre MS cybersecurity competence centre MS cybersecurity competence centre MS cybersecurity competence centre MS cybersecurity competence centre MS cybersecurity competence centre MS cybersecurity competence centre MS cybersecurity competence centre Idea in a nutshell •Builds on the work of Member States and the cPPP to: •Stimulate development and deployment of technology in cybersecurity •Give impetus to innovation and competitiveness of the EU industry on the global scene in the development of next- generation digital technologies (AI, quantum computing, block chain, secure digital identities) •Support industry through testing and simulation to underpin the cybersecurity certification •Complement skills development efforts at EU and national level •In the second phase - stimulate synergies between civilian and defence markets that share common challenges
  • 29. Making the Most of NIs • Core elements of the Communication Presenting key conclusions of the analysis of the issues covered in the Annex, which are seen as important points of reference and potential inspiration from the point of view of the transposition into national law.  Accompanied by an Annex with practical suggestions • Based on good practices and recommendations issued by ENISA • Examples from Member States • Interpretation of Directive's provisions and of how they would work in practice
  • 30. Conclusions • Space and cyber space ecosystems are merging • Cyber secure space systems, technologies and infrastructures can be regarded as a strategic opportunity to:  enhance the DSM in connection to "New Space",  guarantee mission assurance for space assets ,  enhance cyber defence operations. • The cyber security community & the space community need to collaborate and get prepared to defend all space assets against the growing sophisticated cyber-attacks.
  • 31. Next Steps • Build (national, EU, international) synergies between space and cyber security stakeholders. • Develop mutually agreed mitigation frameworks for space-cyber risks, compliant with:  EU strategies/policies (e.g. Space Strategy for Europe 2016/2325(INI), Common Security and Defence Policy –CSDP-, Decision No 541/2014/EU),  directives (e.g. NIS, GDPR); COM(2017)294; COM(2017)477  international standards (e.g. ISO27005). 31
  • 32. • Thank you for your attention • Nineta.POLEMI@ec.europa.eu 32