Japanese Government’s Efforts to Address Information Security Issues October, 2007 National Information Security Center (NISC)

Slides:



Advertisements
Similar presentations
New Direction of the Reform of the Statistical System in Japan Masahiro HORIE Professor, National Graduate Institute for Policy Studies Former Vice Minister,
Advertisements

MTEF BUDGET PROCESS – A TOOL FOR MAINSTREAMING MDGS
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Philippine Cybercrime Efforts
Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
Thailand National Focal Point for IFCS Chemical Safety Section Food and Drug Administration Ministry of Public Health July 2003.
Panel themes of the International Conference “Europe against Counterfeit Medicines” G.N. Gildeeva, Deputy head of the Department of Registration of Medicines.
Prospects for the Development Banking System—DBJ’s Case At ALIDE Annual Conference 2001 Kazuyuki Mori International Cooperation Department Development.
David A. Brown Chief Information Security Officer State of Ohio
National Infrastructure Protection Plan
Toward Drastic Reform of Institutional Framework of the National Statistical System in Japan Akihiro Kimoto Director International Statistical Affairs.
AGENCY FOR PREVENTION OF CORRUPTION AND COORDINATION OF FIGHT AGAINST CORRUPTION mr.sci. Vladica Babić - Assisstent.
DHS, National Cyber Security Division Overview
Speaker: Tamar Shapatava
Mobile Technology And Cyber Security K. N. ATUAHENE Director, Domestic Trade and Distribution Ministry of Trade and Industry.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Strategy and Policy Unit: Current Activities and Future Tasks
PART FOUR – COMMERCIAL LEGISLATION in the UAE Legislative Structures affecting business in the UAE: An Overview Ch 16.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Food and Agriculture Sector Coordinating Councils John L. Williams, DVM U.S. Department of Agriculture AFDO Annual Conference Kansas City, MO June 7, 2005.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Korea Environment Institute KEI Introduction Government-sponsored research institute, under the Prime Minster’s office involved in policy development.
BCP of Japanese Securities Industry July 5, 2007 Japan Securities Clearing Corporation.
NATIONAL SAICM IMPLEMENTATION: DEVELOPING A GOVERNANCE FRAMEWORK Gillian Guthrie Ministry of Local Government and Environment June 19, 2006 THE CASE OF.
Community Preparedness & Disaster Planning. Why Disasters occur ?
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Identify the institutions which have a stake in the
OPERATIONAL PROGRAMME Information Society 3rd Community Support Framework for Greece June 2001.
Project Implementation Plan and Principal Activities
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
ALL-UKRAINIAN PUBLIC ORGANIZATION “PUBLIC TRANSPORT SAFETY COMMITTEE”
The Global Centre for Information and Communication Technologies in Parliament 14 June 2006 V Legislative XML Workshop Towards European Standards for Legislative.
The Draft SADC Annex on Trade in Services UNCTAD Secretariat Sub-regional Conference on Improving Industrial Performance and Promoting Employment in SADC.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Information Sharing Challenges, Trends and Opportunities
A National approach to Cyber security/CIIP: Raising awareness.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
Critical Infrastructure Protection Critical Infrastructure Protection Private Sector Programs April 7, 2005 Rod Nydam, JD, GMU Law School Private Sector.
An Analysis of the Cyber Security Strategy (2008) of Estonia Based in part on ITU Q.22/1 Report On Best Practices For A National Approach To Cybersecurity:
REFORMS IN THE ROAD SECTOR IN KENYA Restructuring of Road Sub-Sector: Responding to Future Challenges Eng. Joseph N Nkadayo, MBS Director General, Kenya.
Ministerul Mediului si Gospodaririi Apelor Session 6 - Enhancing National GEF Coordination, Communication and Outreach Developing the National Capacity.
Cyber-security policy to encourage CSIRTs activities Yasuhiro KITAURA Ministry of Economy, Trade and Industry, JAPAN.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
DEVELOPMENT COOPERATION FRAMEWORK Presentation by Ministry of Finance 10 December 2013.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Kiyoshi Higuchi Executive Director Japan Aerospace Exploration Agency (JAXA) JAXA Space transportation systems.
All Rights Reserved by JIN 2015 Resilient Cities Connect Innovative Partnership to Strengthen Urban Resilience Akira Doi Board Member, Japan Bosai Platform.
Making the Vision of Digital Equality into Reality The Ministry of Gender Equality Republic of Korea.
Title of Presentation in Verdana Bold Managing the Government Agenda Priorities and Planning Presentation Canada School of Public Service August 1, 2007.
National Information Communication Technologies Strategy Vasif Khalafov “National strategy” working group - Web -
Summary of the Open Government Data Strategy The Open Government Data Strategy was adopted as a strategy for intensive implementation of measures to promote.
Public health, innovation and intellectual property 1 |1 | The Global Strategy on Public Health, Innovation and Intellectual Property Technical Briefing.
A Regulators Perspective on U.S. Trade Policy Coordination 1.
Assisting African countries to improve compilation of basic economic statistics: an outline of the UNSD strategy Vladimir Markhonko United Nations Statistics.
Cybersecurity Strategy in Japan May 2016 Yasu TANIWAKI Deputy Director-General National center of Incident readiness and Strategy for Cybersecurity (NISC)
Ministry of Security and Public Administration Disaster and Safety Management
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Real Time Gross Settlement and Regional Banking Integration Tim Masela, Assistant General Manager: National Payment System Department, South African Reserve.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 28 – Consumer and Health Protection.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
1 Financial Sector Development in Myanmar Presented by Mr. Nyo Aye Mr. Win Hteik Assistant Director Board Secretary Ministry of Finance Central Bank of.
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Quality of Education - Teachers' Professional Training and Development
PRESENTATION OF MONTENEGRO
Critical Infrastructure Protection Policy Priorities
8 Building Blocks of National Cyber Strategies
The European Union response to cyber threats
Presentation transcript:

Japanese Government’s Efforts to Address Information Security Issues October, 2007 National Information Security Center (NISC)

Copyright (c) 2007 National Information Security Center (NISC). All Rights Reserved. 1 The issue of Cyber attack  Cyber attack is “electric attack to Critical Infrastructures using information communications networks and information system”  “Inter-ministry coordination” and “Government Private Partnership” are needed to improve preparedness, and response and recovery capability for large cyber attack

Copyright (c) 2007 National Information Security Center (NISC). All Rights Reserved. 2 Brief history of Information security policy framework Developing Policy Framework Restructuring Organizations Defacing Web site of Government 911 Blaster Worm 1 Implementation 1 st Phase Restructuring Phase Implementation 2 nd Phase Information Security Policy Guidelines Special Action Plan on Countermeasures to cyber-terrorism for Critical Infrastructures Cabinet Secretariat IT Security Office 1. National Information Security Center 2. Information Security Policy Council Standards for Information Security Measures for the Central Government Computer Systems Action Plan on Information Security Measures for Critical Infrastructures The First National Strategy on Information Security on Information Security Organization Major policies

Copyright (c) 2007 National Information Security Center (NISC). All Rights Reserved. 3 Establishment of the ‘Information Security Policy Council (ISPC)’ and the ‘National Information Security Center (NISC)’  The National Information Security Center (NISC) was established on April 25, 2005 based on the decision under the IT Strategic Headquarters on December 7, 2004  Information Security Policy Council (ISPC) was set up in IT Strategic Headquarters on May 30, 2005  NISC serves as a coordinator of cross-departmental information security issues  NISC consists of both government officials from related ministries and agencies, and experts from the private sector Est. Feb 2000 July 2004 Apr Aug persons  Organizational Transition of staff in Cabinet Secretariat NISC set up in April 2005 Set up ‘IT Security Office’ in Cabinet Secretariat

Copyright (c) 2007 National Information Security Center (NISC). All Rights Reserved. 4 Information Security Policy Council (ISPC) & National Information Security Center (NISC) Governmental Agencies Critical Infrastructures Individuals (2) Promote comprehensive measures taken by central governments (3) Help central each government agency deal with individual incidents (4) Information security measures for critical infrastructures - Centralize of information exchange and cooperate with foreign countries - Make International confidence-building - Based on “Review of the Role and Functions of the Government in terms of Measures to Address Information Security Issues (decided by the IT Strategic Headquarters on December 7, 2004),” the government is developing essential functions and frameworks toward strengthening its core functions to address information security issues. Central government agencies concerning information security Ministry of Internal Affairs and Communications National Police Agency Ministry of Economy, Trade and Industry Ministry of Defense Decision on fundamental matters such as basic strategy for information security Agencies overseeing critical infrastructure Ministry of Land, Infrastructure and Transport Financial Services Agency Ministry of Economy, Trade and Industry Ministry of Internal Affairs and Communications Ministry of Health, Labour and Welfare National Information Security Center (NISC)Information Security Policy Council (ISPC) IT Strategic Headquarters Gather experts from the public and private sectors * NISC is in Cabinet Secretariat Cabinet Secretariat (1) Formulate basic strategies for information security measures Businesses

Copyright (c) 2007 National Information Security Center (NISC). All Rights Reserved. 5 Structure and Functions of NISC Director of NISC (Assistant Chief Cabinet Secretary) Deputy Director of NISC Development of Fundamental Strategy Development of Fundamental Strategy Comprehensive measures for governmental agencies Comprehensive measures for governmental agencies Development of Response Capability Development of Response Capability Critical Information Infrastructure Protection Critical Information Infrastructure Protection Advisor on Information Security Advisor on Information Security Critical Infrastructures Governmental Agencies BusinessesIndividuals International Strategy Deputy Director of NISC Foreign Organizations

Copyright (c) 2007 National Information Security Center (NISC). All Rights Reserved. 6 Overall Picture of “The First National Strategy on Information Security” Basic principles 1 Information security for providing the introduction of Japan as an economic state 2 Information security for more safe, secure, and better lives for the people 3 Information security from a new perspective of ensuring national security  A quarter of Japan’s economic base and commercial transactions depends on IT.  Japan is the world’s largest broadband communication power with 80 million Internet users.  There is a growing need for safety and security measures including disaster control manners.  It is necessary to recognize both new threats to national security regarding IT and strength of Japan. To make Japan an “information security advanced nation” Goals Establish a “new public-private partnership model” in which both public and private play their roles appropriately Primary goal to be achieved in the next three years

Copyright (c) 2007 National Information Security Center (NISC). All Rights Reserved. 7 “The First National Strategy on Information Security” Central and local governments Critical infrastructures Businesses Individuals Standards for Measures Critical Infrastructures Action Plan Promoting information security technology strategy Developing human resources Promoting international cooperation and collaboration Crime control and protection/remedial measures for rights and interests Giving “Best Practice” for information security measures Ensuring stable supply of their services as the basis of people’s social lives and economic activities Implementing information security measures so as to be highly regarded by the market Raising awareness as main players of IT society Measures promoted by Ministries and Agencies Measures promoted by Ministries and Agencies [Sectoral Plan] Role Priority policies for (2) (cross-sectoral issues)

Copyright (c) 2007 National Information Security Center (NISC). All Rights Reserved. 8 Overall Picture of Milestones in the FY Take measures for government agencies Take measures for critical infrastructures Formulate cross-sectoral information security infrastructure for businesses and individuals Achieve continuous improvement according to the overall plan overall process schedule” (National Strategy) and the “sectoral plandevelop Japan into an “information security advanced nation - Through combination of the “overall process schedule” (National Strategy) and the “sectoral plan,” the government aims to develop Japan into an “information security advanced nation,” with clearly identified milestones to be achieved in each fiscal year. FY2006FY2007 FY2008 [Businesses] All public companies should take appropriate measures depending on risk. [Individual] The number of “individuals who feel insecure about IT use” as close as possible to zero. [Central Government] All government agencies should take measures according to the “Standards for Measures [Critical Infrastructure] The number of IT-malfunctions should be reduced as close as possible to zero.

Copyright (c) 2007 National Information Security Center (NISC). All Rights Reserved. 9 Central government agencies Standards for Information Security Measures for the Central Government Computer Systems ○ To achieve sectoral plan for raising the information security level of the whole government, the government formulates the “Standards for Information Security Measures for the Central Government Computer Systems” ○ Each government agency implements measures according to the Standards for Measures, and the National Information Security Center (NISC) inspects and evaluates the implementation status at the central offices. The Information Security Policy Council (ISPC) makes recommendations for improvement based on the inspection/evaluation results. Information Security Policy Council (ISPC) National Information Security Center (NISC) Make recommendations ・ Review standards of government agency according to the Standards for Measures Inspect and evaluate the implementation status Plan Do Act Check Standards for Measures Recommendations for improvement Plan Do Act Check

Copyright (c) 2007 National Information Security Center (NISC). All Rights Reserved. 10 Framework of Information Security Measures of the Government Implementation framework Standards for Measures Set of individual manuals (Provided by the NISC) Policies of central government Guidelines for Formulation and Implementation of Standards for Measures Policy for Enhancement of Information Security Measures for the Central Government Computer Systems Formulating the “standards of the government agency” completed by all government agencies in April, Each Government agency To be established by around the end of the first quarter of FY2006 so that self-inspection can get started from the second quarter. Basic policies of the government agency Standards for measures implemented by the government agency Operation procedures by the government agency Policies of the government agency

Copyright (c) 2007 National Information Security Center (NISC). All Rights Reserved. 11 Critical Infrastructures Action Plan protect critical infrastructures IT-malfunctions - The Action Plan aims to protect critical infrastructures from (1) cyber attacks but also from (2) suspended services and reduced function caused by dysfunction of IT arising from unintentional factors and (3) those arising from disasters (IT-malfunctions). CEPTOAR-Council CEPTOAR New framework to be built under the Action Plan (supported by the four policies) 分野 B Govern- ment Flow of information Reflecting the analysis results Improving IT-malfunctions response capabilities Sector A Strengthening measures at ordinary times Comprehensive inspections and improvements 4. Cross-sectoral exercises 3. Analyses of interdependency 1. Safety Standards, Guidelines, etc. 2. Information sharing frameworks Sector B Sector C Sector D ・・・・・ ・ 10 Sectors 10 SectorsTelecommunications Finance Civil aviation Railways Electricity Gas Administrative services Medical services Water works Logistics

Copyright (c) 2007 National Information Security Center (NISC). All Rights Reserved. 12 Cyber attacks IT-malfunctions (unintentional factors) IT- malfunctions (disasters) Realization of more solid and truly dependable IT infrastructures in critical infrastructures through the organic coordination of four measures Action Plan on Information Security Measures for Critical Infrastructures (Adopted by the ISPC on Dec. 13, 2005) 1. “Safety Standards, Guidelines, etc.” 2. Information sharing framework 3. Analysis of interdependence 4. Cross-sector exercises [Four policies] [Objectives] The central government will make efforts aiming to reduce the number of occurrence of IT-malfunctions in critical infrastructures as close as possible to zero by the beginning of FY2009 Framework of Critical Infrastructure Measures ~ Promotion through Organic Coordination of Four Measures ~ Plan Do Act Check Yearly improvement in a spiral manner

Copyright (c) 2007 National Information Security Center (NISC). All Rights Reserved. 13 Thank you !  Contact Information National Information Security Center (NISC) Cabinet Secretariat, Government of Japan URL: Contact Person: Masayuki OGATA, Mr.