UK Cyber Security Caley Robertson

Slides:



Advertisements
Similar presentations
E-Strategies and ICT Infrastructure Policies and Regulations ITU-WTO Workshop Geneva Dec Mostafa Terrab, infoDev.
Advertisements

AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Cyber Security & Critical Controls Chris Few Industry Enabling Services CESG February 2011 © Crown Copyright. All rights reserved.
THE STRATEGIC COUNCIL LEADERSHIP TRUST AND ENGAGEMENT NEW FUNDING SOURCES AND NEW DELIVERY VEHICLES Appendix 1 NEW FUNDING SERVOURCES AND NEW DELIVERY.
Building a More Secure and Prosperous Texas through Expanded Cybersecurity Mary Dickerson Texas Cybersecurity, Education and Economic Development Council.
The UK Space Agency: Our plan for space Dr Alice Bunn, Director of Policy November 2014.
Establishing Cyber Security education, awareness, training and trust for SMEs Roger Dean, Executive Director
Centre for Design Innovation (Design &) Innovation Policy in Ireland.
Techuk.org | #techUK Local CIO Council – 5 December 2013.
The U.S. Coast Guard’s Role in Cybersecurity
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Recognising the Risks of Cyber Threats Across the Organisation John Thornton Secretary to the Digital Government Security Forum.
Techuk.org |#techuk Introducing techUK Volcrowe/ Nemode Workshop. 22/4/15.
Supply Chain Development A step-change in Supply Chain performance 08/08/2015 OFFICIAL 1 Supply Chain Focus Group – 17 th September 2014 Vic Carlill.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Meet the Management AIB Investor Day London, 8 th November 2006 Steve Meadows Group Director, Operations & Technology.
Industrial Strategy: government and industry in partnership West Midlands Councils 19 November 2012.
Department of Planning and Community Development Corporate Plan: Government priorities we contribute to Building friendly, confident and safe.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Sapient Global Markets – Commodities Team Analytics, Advisory and Project Management.
UK Space Agency Saleh Ahmed Assistant Director, UK Space Agency
FEHRL’s Vision and the Common Approach to Automotive and Infrastructure Research Steve Phillips, FEHRL.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Accompanying notes to presentation What you need to know This presentation is part of the Art of connecting. There are four themes in total, each with.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
The Canada Border Services Agency and Coordinated Border Management Regional Conference of Customs Directors General, April 22-25, 2012.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 17 - Securing Cyberspace: Strategic Responses for a Digital Age, Pg. 213.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.
CYBER RESILIENCE BEST PRACTICE. To Discuss Why cyber risk management is increasingly challenging How everyone has a role to play in your cyber risk management.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
TÜBİTAK – BİLGEM – SGE Cyber Security Institute
Sarah Bridges Director of Programme
Cyber Defense: The Industry point of view Asgeir Myhre Managing director Teleplan Globe AS (Norway)
Joint Radio Company: Making the spectrum and technology work for your business Adrian Grilli Managing Director, JRC Ltd, London Technical Adviser, European.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
NEW ZEALAND’S CYBER SECURITY STRATEGY Presentation by: MED, DIA & GCSB.
NERC Innovation Oil & Gas Challenging Environments Workshop 17 th October 2014.
CASE STUDY DPS NEWTOWN. Diversity of Operations.
The National Skills Academy for Rail (NSAR) Neil Robertson - CEO.
Louise Stewart Partnerships and Performance Director March 2012 Contribution of the visitor to economic growth.
UNCLASSIFIED Lift the living standards and wellbeing of all Victorians by sustainably growing Victoria’s economy and employment and by working with the.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Surveillance and Security Systems Cyber Security Integration.
Cyber in Financial Services
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
north Ayrshire Community planning partnership
ALEX RUNNER Jason Rosselot Sedar labarre Will Farrell Johnson Controls
Ken Watson 9 Sep 2003 Critical Infrastructure Assurance: Business Case for Public-Private Partnership Ken Watson 9 Sep 2003
INSTITUTE FOR RISK AND DISASTER REDUCTION
CYBER NB – A CALL TO ACTION
Strategic Roadmap School Sector.
European Cybercrime Centre - EC3
Report by: Katiuscia Zedda
KEYNOTE STAGE SPONSOR.
Proactive Cyber Security Ian Glover
National Cyber Security Programme Local : Building Resilience Together
8 Building Blocks of National Cyber Strategies
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
John M. Felker Director, NCCIC.
Forth International Forum
Refreshing New Zealand’s Cyber Security Strategy 2018
Steve Denniss Technical Director. Steve Denniss Technical Director.
Centre for Civil Society and Non-profit Management
Final Conference 18 Set 2018.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

UK Cyber Security Caley Robertson Assistant Director, Cyber Security Exports, Critical Infrastructure November 2014

The UK’s Cyber Security Strategy The National Cyber Security Programme (NCSP) will spend £860m over five years, across the full range of our objectives.

Delivering in partnership (and OGDs) Cyber Growth Partnership November 2014 – Caley Robertson – UK Cyber Security

Partnering industry, academia & society A basic cyber hygiene for organisations of all types. Part of CERT-UK. Enables members to share cyber threat vulnerability information and reduce vulnerabilities. Businesses can receive up to £5,000 to increase their cyber security. A public campaign to increase cyber confidence and improve online safety of consumers and SMEs. 11 Academic Centres of Excellence for Cyber Security Research at UK universities November 2014 – Caley Robertson – UK Cyber Security

Partnering to protect critical infrastructure Much of the UK’s CNI is owned and operated by the private sector Industrial control systems - centralised systems that monitors and controls the industrial process or series of processes - operate infrastructure in all major industrial sectors. Document title

Cyber risks to CNI Gas Pipeline Example Monitors pressure and temperature, maintains target conditions for example by activating local valves or air conditioning systems. A successful attack could tell the ICS system the pipeline is under-pressured… Integrity Availability Confidentiality November 2014 – Caley Robertson – UK Cyber Security

ICS can be difficult to protect Propriety technology in legacy systems Anomalies are more prevalent – so attacks can be difficult to diagnose Systems can’t be easily patched or upgraded No (or limited) access to test environments Massively dispersed assets with frequent need for remote access Additional threat vectors – e.g. commands that cannot be blocked due to safety issues (alarms, for example) CNI within the UK’s Cyber Security Strategy November 2014 – Caley Robertson – UK Cyber Security

The UK’s Cyber Security Capabilities The UK ranks No 1 in their Cyber Power Index by Booz Allen Hamilton and the Economist Intelligence Unit Political Leadership Innovation Security Heritage 22% growth in the UK cyber security industry in 2013 November 2014 – Caley Robertson – UK Cyber Security