PEG Towards a Secure e-Business Environment for Indonesia: id-FIRST Role in Industry Cooperation for Reporting Crimes and Sharing Threat Information By.

Slides:



Advertisements
Similar presentations
Establishing a National Working Group on Trade Facilitation Challenges and Lessons Learned Presented by Elizabeth Tamale Ministry of Tourism, Trade and.
Advertisements

STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Philippine Cybercrime Efforts
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
1 African ICT Roadmap to Achieve NEPAD Objectives Arusha, Tanzania, 1-3 April 2003 Roles of Government and ATU in the Implementation of NEPAD ICT objectives.
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
Towards a framework for integrated cross-border law enforcement initiatives Based on the Consultation Paper circulated to CACOLE in July 2008 by Public.
DHS, National Cyber Security Division Overview
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
GHS Conference for ASEAN Implementation Towards 2008 and Beyond 9-11 May 2007,Yakarta, Indonesia By: Lao Delegates Vientiane Capital City, Lao PDR.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Strategy and Policy Unit: Current Activities and Future Tasks
NIS Directive and NIS Platform
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Network security policy: best practices
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Dr. Dong Ju Choi Executive Director Asia Pacific Women’s Information Network Center (APWINC) Sookmyung Women’s University, Korea ITU Asia-Pacific Regional.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
October 2004 From Principles to Prosperity How we Integrate Corporate Governance into our Investment Process Guy Jubb Head of Corporate Governance.
Pradeep S. Mehta Secretary General CUTS International Jaipur, India CONSUMER REDRESSAL IN THE TELECOM AND CABLE SECTORS.
Ng Regenie Fräser Secretary General October 29, 2008 Connecting the Caribbean & Caribbean Internet Forum.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Toolkit for Mainstreaming HIV and AIDS in the Education Sector Guidelines for Development Cooperation Agencies.
Cybersecurity Governance in Ethiopia
1 OECD anti-spam initiatives Anti-SPAM Strategies – The Way Forward for the ASEAN Telecommunications Regulators’ Council (ATRC) 3-4 May 2005, Cyberjaya,
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
1 Asian Regional Workshop on “Capacity Development for the Clean Development Mechanism” October 2005 AIT, Bangkok, Thailand Institutional Building:
A National approach to Cyber security/CIIP: Raising awareness.
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
© Malaysian Communications and Multimedia Commission 1 Malaysia’s Approach to Network Security Bistamam Siru Abdul Rahman, General Manager,
Information & Communication Technologies (ICT) in the Implementation of the Kitakyushu Initiative for a Clean Environment Christine PEARSON Mushtaq Ahmed.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Research and Education Networking Information Sharing and Analysis Center REN-ISAC John Hicks TransPAC2/Indiana University
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Cyber-security policy to encourage CSIRTs activities Yasuhiro KITAURA Ministry of Economy, Trade and Industry, JAPAN.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 CAI-Asia China Project CAI-Asia China Project Inception Workshop October, 2005 Beijing PRC.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
REGULATORY PRACTICES WORKSHOP Module 1 Slide 1 NATIONAL COMMUNICATIONS COMMISSION MODULE: 1 Introduction.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
1 International Electricity Infrastructure Assurance (IEIA) Forum A Collaboration of Australia/Canada/New Zealand/United Kingdom/United States North American.
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Digital Enlightenment.
“DEVELOPMENT OF A NATIONAL ICT POLICY ICT Policy in the ECTEL Member States Mr. Donnie Defreitas MSc, (Hav.), ECTEL Caribbean Internet Forum Bay Gardens.
Resources for Meeting Internet Safety Requirements Cheryl Elliott James Madison University Bill Johnsen Virginia Beach City Public Schools Educational.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Engaging the Private Sector through Transparency, Public Consultations, and Advisory Committees 1 Bryan O’Byrne August 2014.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Strengthening Dialogue and Building Trust April 2017
Cyber Security and Georgia. New Challenges
Cybersecurity, competence and preparedness
Public-private cooperation
8 Building Blocks of National Cyber Strategies
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Trust and Security Unit
Promoting Global Cybersecurity
Cyber Security Ecosystem of Georgia. Experience and Challenges
Presentation transcript:

PEG Towards a Secure e-Business Environment for Indonesia: id-FIRST Role in Industry Cooperation for Reporting Crimes and Sharing Threat Information By Idris F Sulaiman PhD USAID ICT Advisor /Economist State Ministry of Communications and Information and Partnership for Economic Development (USAID-Government of Indonesia) Project Debriefing Seminar of Bangkok Conference on “Cybercrime Legislation and Enforcement Capacity Building” July 30, 2003, Jakarta The views expressed in this presentation are those of the authors and not necessarily those of USAID, the U.S. Government or the Government of Indonesia.

PEG Topics 1) Introduction: –APEC Cybersecurity Strategy 2) Some lessons learnt from Bangkok Conference: –A Key Building Block of Cybersecurity: Private Sector Participation Information sharing & Trusted networks Standards setting & C ode of C onduct 3) Concluding comments 1) Introduction: –APEC Cybersecurity Strategy 2) Some lessons learnt from Bangkok Conference: –A Key Building Block of Cybersecurity: Private Sector Participation Information sharing & Trusted networks Standards setting & C ode of C onduct 3) Concluding comments

PEG APEC Cyber Security Strategy Comprehensive approach: 5 initiatives, with action items - basis of the country ’ s efforts on cybercrime and critical infrastructure protection (managed by eSecurity Task Group (e-STG part of Business Facilitation Steering Group, APECTel 26, Moscow, Aug 19-23, 2002) nLegal developments nInformation sharing and cooperation nSecurity and technical guidelines nPublic awareness and education nWireless security Head of States of APEC has approved the strategy in October 2003 with commitments to some deadlines

PEG Implementing The Cyberstrategy LEGAL DEV ’ T: (1) Enactment of E-Transaction Law (RUU-ITE) (2) Enforcement Capacity Building: IT / Cybercrime Unit, National Police (POLRI-BARESKRIM) and Jakarta Metro Police ’ s Cybercrime Unit are building their forensic capabilities and training investigator specialists (3) Need for Awareness Building: Law that is not known is not enforced …. Law that is not enforced is not a (real) law... INFO SHARING AND COOPERATION: Partnership for Critical Infrastructure Protection (US) or Trusted Information Sharing Network (Australia), to share: –Business continuity plans –Consequence management –Information system attacks and vulnerabilities –Cybercrime information sharing –Protection of key sites from attack or sabotage TRUST-IS- #1-ISSUE

PEG Implementing “ Info ” Sharing In Australia

PEG Implementing the Cyberstrategy: What are the responsibilities of CERTs? provide advice to on information systems' security matters –To its stakeholder (eg. ISP-CERT) –To the public establish an incident reporting scheme and liaise with the Police regarding incidents on an “exception” reporting basis –FIRST: Forum of Incidence Response and Security Teams - the global organization to which most major CERTs subscribe (www. first.org)

PEG Implementing Security Standards: Anti-cybercrime Code Of Conduct Australian example on: Consultations with industry, law enforcement and Privacy Commissioner Scheduled for release August 2003 Cooperative liaison between ISPs and Law Enforcement Agencies

PEG Implementing Security Standards: Code Of Conduct Objectives Establish a cooperative working environment between ISPs and LEAs Provide clear guidelines to the satisfaction of both industry and LEAs Provide a transparent mechanism for the handling of LEA’s investigations for the Internet industry Promote positive relations between the LEAs and the Internet industry.

PEG Implementing Security Standards: Code Of Conduct Principles The Code should be technology neutral Requirements should be fair to all concerned Requirements should not adversely affect economic viability The privacy of customers’ details will be respected

PEG Implementing Security Standards: Code Of Conduct Issues Records retention –Balances industry cost and privacy with law enforcement requirements –Who bears of the burden to comply Access to calling line identity data –benefits law enforcement and ISPs Protocols and proformas for access requests –simplifies existing legal obligations

PEG IT Reporting Security Initiatives SURVIVAL OF THE FASTEST … The name of the game is “ speed ” reporting: –Cyber-speed is required to solve cybercrime (Vivienne Tan, Bangkok Aug,2003) InfraGuard (Est. 1996, US): creating Trust Networks between Industry & Gov ’ t UK ’ s “ Neighbourhood Watch ” - Warning, Advice and Reporting Points (WARPs) –Provides warning, advice and reporting services on Internet security-related matters –Similar to a CERT but without a capability for responding to incidents (other than providing advice) Information Sharing & Analysis Center (ISAC): –Conceived in US under PDD63 (1998) for coordination between organizations in each CNI sector (Energy, Banking/Finance, Telecommunications, Transport and others) –Examples in: IT, Banking & Telecom –Predictive ISACs do not normally share reports outside their own (paying) membership

PEG id-FIRST Background Forum for Awareness Raising F orum for I CT-incident R esponse and S ecurity T eams (id-FIRST) –Secure-Indonesia-FIRST.or.id –Forum of ICT-incident Reporting for Industry Associations (1st FTII: APJII, ASPILUKI, APKOMINDO, ANIMA, INDO-WLI other IAs to follow?) - possible WARPs/InfraGuards model –Links with Response Security Teams (ID-CERT & ID-ISP-CERT) Teams and others in each industry Current & Future services: –Mailing list - statistics collection, new start! –Clearing house for information on Security Code of Conduct, Awareness Raising, Links with similar Forums abroad –Make “ business case ” for ICT “ insurance ” - Research on incidence of cybercrime and quantify the damage New PS Forum

PEG Concluding comments Some late-comer advantages for Indonesia and other developing countries on policy preparations work, examples: –Malaysia & Philippines (Cyberlaw “ gestation ” & evolution and the need for Business involvement in securing e-Business Env ’ t) –Hong Kong & Canada (Law Enforcement Equipment and Training to meet the needs for 24 hour by 7 days Network) –Australia, United States & UK (private-public sector cooperation) Cybersecurity is ‘ pro-active ’ and ‘ pre- emptive ’ - higher return than mere focus on ‘ reactive ’ but need “ business case ” Formulate an implementable cybersecurity strategy, “ step-by- step ” in each to realize an effective “ Roadmap ” need business involvement and “ real ” participation: nLegal developments nInformation sharing and cooperation nSecurity and technical guidelines nPublic awareness and education So What?

PEG URL references APEC Telecommunications and Information Working Group - APECTEL ( see ) US National Strategy to Secure Cyberspace ( see ) Partnership for Critical Infrastructure Protection - this is a US public/private initiative in cybersecurity ( see ) IT SECURITY TRAINING: developed in conjunction with TEL HumanResources Development Steering Group -Eight modules - Available free of charge for non-commercial purposes, Hosted by Idaho State University at eSTG Website: APEC Cybersecurity Strategy: TELMIN Statement on the Security of Information and Communication Networks APEC Leaders Statement: Dept of Commerce Critical Infrastructure Assurance Office (CIAO ) –Initiated a series of public cybersecurity meetings in several US cities ( see )

PEG Terima Kasih - Thank You - Kop Kun Krap/Kah Please provide feedback to : Idris F. Sulaiman Tel: Fax: provide feedback to : Idris F. Sulaiman Tel: Fax: Please download more information from: ( “ id-FIRST ” )Please download more information from: ( “ id-FIRST ” ) Related USAID ICT Projects/Activities:Related USAID ICT Projects/Activities: Partnership for Economic Growth (PEG) Project: for Economic Growth (PEG) Project: Economic, Law, Institutional & Professional Strengthening (ELIPS) Project : Law, Institutional & Professional Strengthening (ELIPS) Project : The Asia Foundation, Indonesia: Asia Foundation, Indonesia: USAID Indonesia : Indonesia :