DIGITAL CZECH REPUBLIC Impact of Digital Revolution

Slides:



Advertisements
Similar presentations
Ministry of Labor and Social Policy SOCIAL POLICY COUNCILS Dragica Vlaović-VasiljevićSophia, 2-6th July 2007 Dragica Vlaović-VasiljevićSophia, 2-6th July.
Advertisements

Government of the Republic of Serbia Ministry of Labor and Social Policy GENERAL AND SPECIAL PROTOCOL ON CHILD PROTECTION FROM ABUSE AND NEGLECT.
Philippine Cybercrime Efforts
1 University of Economics of Prague Western Bohemian University, Pilsen Actual challenges of implementation of PPP projects in Czech republic Zuzana Khendriche.
Steps towards E-Government in Syria
The new Hungarian cybersecurity landscape Dr. Ferenc Suba Vice-Chair, European Network and Information Security Agency Chairman, National CERT Working.
Innovations in the Public Administration Reform: experience of Albania Eralda (Methasani) Çani, Prof.Asoc. Counsellor to the Prime Minister for Public.
Sector: IT, telecommunication Eastern Poland IT Companies Cluster groups persons and entities which contribute to the development of the Polish IT sector.
DHS, National Cyber Security Division Overview
Speaker: Tamar Shapatava
MINISTRY OF NATIONAL DEFENCE REPUBLIC OF POLAND CLASSIFIED INFORMATION PROTECTION DEPARTMENT COL. PIOTR GRZYBOWSKI, Director, Classified Information Protection.
1.Legal basis 2.Perception of cyber defence 3.Computer Incident Response System 4.Cyber Operations 5.Protection of information 6.Summary.
1 “Environmental Auditing in the Republic of Macedonia” “Environmental Auditing in the Republic of Macedonia” State Audit Office Nada Sekulovska Gorast.
NIS Directive and NIS Platform
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
THE ROLE OF GOVERNMENT IN DISASTER RISK MANAGEMENT Arandjelovac, 5 th June 2015.
Building the Foundations for Better Health Health Services Organization.
Enhancing Institutional and Administrative Capacity case: POLAND
Integration of Regulatory Impact Assessment into the decision making process in the Czech Republic Aleš Pecka Department of Regulatory Reform and Public.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
1 International Conference on Enhancing the Effectiveness of Deposit Insurance Operation, Hanoi March, 2007 ENHANCING THE LEGAL FOUNDATION FOR DEPOSIT.
Audits of pre-accession funds in the State Audit Office of the Republic of Latvia 2000/2001 Uldis Kremers Auditor of the Audit Department of the State.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
An Analysis of the Cyber Security Strategy (2008) of Estonia Based in part on ITU Q.22/1 Report On Best Practices For A National Approach To Cybersecurity:
Czech Development Aid Czech-Asian Forum Business, cultural and education exchange Prague / 2 nd March 2009 Eva Anderová International Relations Department.
The new cyber threats in 2013 – the hungarian approach Mr. Mihály Zala, Major-general President of National Security Authority of Hungary.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Budapest Danube Contact Point: an innovative tool to support the implementation of Danube Strategy Peter Kiss-Parciu Budapest Danube Contact Point EU Strategy.
National Information Communication Technologies Strategy Vasif Khalafov “National strategy” working group - Web -
Strategy for Sustainable Development of the Czech Republic - from individual to participatory approach Jiří HLAVÁČEK Director Department of Strategies.
THE POLICY OF THE BULGARIAN GOVERNMENT IN THE FIGHT AGAINST CORRUPTION Mr. Boyko Slavchev Head of Cabinet of the Minister of Interior Republic of Bulgaria.
1 EUROPEAN FUNDS IN HALF-TIME NEW CHALLENGES Jack Engwegen Head of the Czech Unit European Commission, Directorate General for Regional Policy Prague,
Chapter 8 Auditing in an E-commerce Environment
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Sofia, 09 June Sofia, 09 June 2010 MINISTRY OF TRANSPORT, INFORMATION TECHNOLOGY AND COMMUNICATIONS Executive Agency “Electronic Communication Networks.
The Power of Recommendations Dainius Jakimavičius National Audit Office of Lithuania Vilnius, April 23, 2013.
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Digital Enlightenment.
TÜBİTAK – BİLGEM – SGE Cyber Security Institute Asım Gençer Gökce TÜBİTAK BİLGEM Cyber Security Institute (SGE) Role: Cyber.
Belgrade, 14 th December Aid Coordination Meeting Gender Equality Synergy Group Belgrade, 14 th of March 2012.
New approach in EU Accession Negotiations: Rule of Law Brussels, May 2013 Sandra Pernar Government of the Republic of Croatia Office for Cooperation.
LOCAL GOVERNMENT IN TIMOR-LESTE Ministry for State Administration 6th Constitutional Government 1.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Mirjana Boshnjak Skopje, 20 to 22 September 2017
SUPREME AUDIT OFFICE OF POLAND
MINISTRY OF THE INTERIOR OF MONTENEGRO
Situation Review of the EaP region 2017
Critical Infrastructure in Varna
Paperless & Cashless Poland Program overview
and Security Management: ISO 28000
Strengthening the institutional capacity: the Greek case
California Cybersecurity Integration Center (Cal-CSIC)
About the NIS directive
Cybersecurity in Belarus a general overview of support areas
NSRF and National Development Planning in Greece
Cyber Security coordination in Europe CERT-EU’s perspective
8 Building Blocks of National Cyber Strategies
Trust and Security Unit
Public Administration in the Czech Republic
The European Union response to cyber threats
Finland’s Cyber Security Strategy
MARITIME POLICY OF POLAND UP TO 2020 (WITH A PERSPECTIVE UP TO 2030)
How to help all to participate in the benefits of the IS and the KE
Zsuzsa Sötét Monitoring and Evaluation Departement
Presentation transcript:

DIGITAL CZECH REPUBLIC Impact of Digital Revolution on the Czech Republic 16. 1. 2017 Prague 1

The Integrated Cybersecurity System – the Adequate Answer for Cyber Threats? Dr Andrzej Kozłowski University of Lodz Defence24.com The Casimir Pulaski Foundation The new Polish government has started very robust and dynamic reforms or Polish cybersecurity sector. They adopted the first real Polish cybersecurity strategy and are considering the adoption of Polish cybersecurity bill. 2

Poland’s cybersecurity system Lack of comprehensive approach Lack of real strategic document No clear competencies (Who is responsbile for cybersecurity) 2015 Report of Supreme Audit Office The Polish Cybersecurity system is a disaster Introduction of cyberspace definitione in legal system (Martial Law) 3

Reforms of new government: First Poland Cyberstrategy (February) Cybersecurity Bill (March-April) CERT Poland National Cybersecurity Center People, Technology and procedurs – three main pillars 4

The integrated cybersecurity system Cyberspace is borderless Internet is not- General Włodzimierz Nowak (the former main cybersecurity advisor); Three layers: The early emergence system Security clusters Systems of direct data protection One of the innovative ideas is an introduction of integrated cybersecurity system where the role of public and private sector is clearly defined as well as the citizens This comprehensive approach does not omit any single element of the system in reacting on the threats in cyberspace. The Early Emergence System: Internet Exchange Point, Collecting data from IXP and assesing risk; Security Clusters: (government administration and the local administration). Extra security measures and to country and fight with different threats. The special protection for governmental systems, which will be introduced so called Governmental Security Cluster Systems of direct Data Protection: the direct security protection depends on security policy and the tools used to data protection; The Security Architecture, which increase the security 5

The integrated cybersecurity system Strategic level : Ministry of Digital Affairs; Other ministeries involved in proces NC Cyber ( operational level) IXP Computer Security Incident Response Team (CSIRT) sectors: public administration, Energy, Transportation; Financial, Heath Care, Water Distribution, financial markets infrastructure and digital infrastructure; The administration offices and institutions covered by strategy Ministry of Digital Affairs: The preparation of legal bills, The coordination of the all activities of administration bodies regards public administration; Supervision over the National Cybersecurity Center NC Cyber – operational tasks, and representation of CSIRT Network, monitoring of incidents on the country level and sending warnings Internet Exchange Point, Collecting data from IXP and assesing risk In the administration offices : the systemy of security information management in cyberspace bases on te existing norma and pracitces 6

Conclusion First comprehensive conception of cybersecurity of Poland; Still in development phase, Delays, Political conflicts,