i t security ec
play

I T Security @ EC Challenges & Experiences Francisco Garca Morn - PowerPoint PPT Presentation

I T Security @ EC Challenges & Experiences Francisco Garca Morn Director General DG I nform atics European Com m ission Context What we do Experiences Policies 1. Context Economical recovery The 2020 Challenges Jobs,


  1. I T Security @ EC Challenges & Experiences Francisco García Morán Director General DG I nform atics European Com m ission

  2. Context What we do Experiences Policies

  3. 1. Context

  4. Economical recovery The 2020 Challenges Jobs, …… Climate change The 2020 Challenges Energy consumption Security Ageing society Transport efficiency Empowering patients Inclusion

  5. EU Policies (Lisbon Treaty) SHARED SUPPORT EXCLUSIVE COMPETENCES ACTIONS COMPETENCES internal market energy Human Health Customs Union social freedom, security and Industry Competition justice cohesion Culture Monetary public health agriculture and fisheries Tourism Marine resources (except where exclusive) research and technological development environment Education, Commercial vocational training, policy space consumer protection youth and sport development cooperation International transport Civil protection agreements humanitarian aid trans-European (AETR) Administrative networks cooperation

  6. Europe 2 0 2 0 : Priorities Smart Sustainable Inclusive developing an promoting a more fostering a high- economy based on efficient, greener employment knowledge and and more economy delivering innovation competitive social and economy territorial cohesion

  7. Union for Innovati on EU Platform Youth on against the move poverty Europe 2020 New qualifica tions & jobs Efficient Industrial use of policy resources

  8. “Every European Digital ” Trust & Security Neelie Kroes Digital Single Interoperab. Trust & Very fast Research & Enhancing ICT for social Market & standards security Internet Innovation e-skills challenges

  9. 2. What we do

  10. Trust and Security Policies

  11. The 3 policy angles Hacking Prevent ID Theft Network & Info Security Intrusion Data retention Prosecute Protect Privacy & Cybercrime Data Protection & Terrorism

  12. Internet security: the EU Policy • Focus on prevention, resilience and preparedness (complementary to fighting cyber crime ) • Take into account the civilian & economic stakeholders ’ role and capability (role of private sector & the governance challenge ) • Make security and resilience the frontline of defence • Adopt an all-hazards approach • Develop a risk management culture in the EU • Focus on the role socio-economic incentives • Promote openness, diversity, interoperability, usability, competition as inherent security safeguards • Boost a global collaborative policy and operational cooperation across the EU, in particular on CIIP

  13. Cybersecurity Safety and privacy of Cybercrim e preparedness online content and KA 6 (28 ) services 31 – Create 4 0 – Harm ful European 1 32 – Cooperation on ENISA content hotlines Cybercrim e cybersecurity and awareness Regulation for mandate center cam paigns and duration 33 – EU cyber- 30 – EU 36 – Support security platform by ToolBox 2 for reporting preparedness 20 12 of illegal ENISA … … … … … … … … … … content EFMS … … … … … … … … … … . EP3R … … … … … … … … … … .. 39 – MS 37 – Dialogue Observer in Cyberstorm . Sim ulation and self- 4 1 – National exercises as of regulation EPCIIP … … … … … … … … … .. alert platform s 20 10 m inors by 20 12 CIIP Conference 35 – Im plem entation 3 EU institutions CERT 38 – Network of of privacy and KA 7 (29 )– CERTs by 20 12 personal data Measures on Expert Group protection cyberattacks 34 – Explore INFSO CdF extension of KA 6 (28 ) personal data HOME CdF NIS Policy DAE. Pillar 3 breach notification Others COM CdF Commission action Member States action

  14. • Critical Infrastructure Protection • International Cooperation

  15. Digital Agenda Key Action 6 “Present in 2010 measures aimed at a reinforced and high level Network and Information Security Policy, including … measures allowing faster reactions in the event of cyber-attacks, including a CERT for the EU institutions .” ••• 15

  16. Knowing better Knowing together Assist MS and EU Institutions in collecting, analysing and disseminating NIS data (regularly assess NIS in Europe) Cooperating better Working better Cooperating Working together together Provide assistance, support and expertise to the Member Facilitate cooperation, dialogue States and the European and exchange of good institutions and bodies practice among public (cross border issues, detection and private stakeholders and response capability, (risk management, awareness, Exercises, etc.) security of products, networks and services, etc)

  17. CIIP Communication. Actions “Achievements and next steps: towards global cyber-security”. COM(2011)163 Detect & Mitigate & Critical I nternational Prevention cooperation respond recovery I nfrastructure MS to develop national contingency plans European Criteria to Support Information identify European- cooperation Sharing and European  wide National Alert System critical exercises CERTs (citizens and infrastructure SMEs) s in ICT Reinforced cooperation between CERTs

  18. International Cooperation (IC) Internet resilience • European principles and guidelines for Internet resilience and stability developed within EFMS and stability Global cyber- • 7 EU MS took part in US exercise Cyber Storm III (EC and ENISA observers) incident exercises Internet resilience • Discuss and promote the principles at the international level – bilaterally and in multilateral fora (G8, OECD, NATO, OSCE, Meridian, and stability ASEAN,… ) Global cyber- • EC and US are developing, under EU-US WG on Cyber-security and Cyber-crime, a common programme and roadmap towards incident exercises joint/ synchronised trans-continental cyber exercises in 2012/ 2013

  19. Information security @ EC

  20. Visibility/ Important reputation political actor Relies heavily on IT Target for multiple threats

  21. Policy framework • Regulation (EC)45/2001 on the protection of individuals with regard to the processing of personal data • Commission provisions on security for classified information (2001/844/EC) to:  Define rules to follow (Legal requirements)  To exchange (classified) data between partners (Member states, Institutions, other governmental organizations), in confidence, since it is mandatory to share similar rules, mutually recognized • Commission Decision C(2006)3602 concerning the security of information systems used by the European Commission • EC internal security rules • Similar regulation exists in the other institutions with equivalent principles (ex: Council Decision 5775/01)

  22. 3. Experiences

  23. EU Emissions Trading Scheme

  24. 76,5 billion € (CO 2 EU market value)

  25. A rough ride? 19 January 30 January November - December Transactions Single EU registry April Incidents in 2 Member temporarily suspended activated for aircraft States in all ETS registries All registries back online operators 2010 2011 2012 14-17 January October New version Incidents in 3 additional New successful attack in Minimum security MS one MS requirements agreed - cooperation EC and Member States

  26. ETS. Response • Two-factor authentication • “Out of band” confirmation of transactions • Introduction of a trusted account list • Obligatory 4-eyes principle • Transfers initiated only at some time periods • Strengthening of know your customer checks for account holders and their representatives • New account categories • New hosting infrastructure and services • Monitoring services • Software security testing • Security incident management procedure

  27. EC as a target ….. a real case

  28. Government IT: How federal, state and local governments use technology Home > Government IT News European Commission hit by cyberattack By Jennifer Baker March 24, 2011 12:50 PM ET IDG News Service - The European Commission, including the body's diplomatic arm, has been hit by what officials said Thursday was a serious cyberattack. The attack was first detected on Tuesday and commission sources have said that it was sustained and targeted. External access to the commission's e-mail and intranet has been suspended and staff have been told to change their passwords in order to prevent the "disclosure of unauthorized information," according to an internal memo to staff. Staff at the commission, the European Union's executive and regulatory body, have also been told to send sensitive information via secure e-mail.

  29. A Real APT targeted at EC

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend