overview
play

Overview Introduction Legal framework Dynamics of the threat - PDF document

BISC : Cyber Security What can the VSSE contribute? 1 BISC - 19/11/12 Overview Introduction Legal framework Dynamics of the threat Nature of cyber attacks Targeting Paradigm shifts Whos targeting what? Tools


  1. BISC : Cyber Security What can the VSSE contribute? 1 BISC - 19/11/12 Overview � Introduction � Legal framework � Dynamics of the threat � Nature of cyber attacks � Targeting � Paradigm shifts � Who’s targeting what? � Tools used – modus operandi � VSSE at a glance � VSSE understanding of Belgian Cyber Security policy 2 BISC - 19/11/12

  2. I. Legal Framework � Law 30th November 1998 � Duty to gather & analyse data related to 7 threats including espionage. � Law 4th February 2010 – “BIM law” � Communications interception, IP identification. � MoU with military intelligence 3 BISC - 19/11/12 II. Dynamics of the cyber threat � Intensified � sustained efforts must be dedicated to cyber- enabled espionage. � Focused � victims of cyber espionage were carefully and repeatedly targeted. � Is it cyber-enabled espionage only or the new dominant form of espionage on its own? 4 BISC - 19/11/12

  3. III. Nature of the threat � Strong influence of three trends: � Rise of Big data � APTs � Web black market � Who is attacking Belgium? � Nation states � Organized crime � Hacktivists � Terrorists 5 BISC - 19/11/12 IV. Tools used & Modus Operandi: striking features � Vast array of possible configurations � Democratization of tools & services � Stuxnet, Duqu, Flame and the like in Belgium? � Traces might be found but real issue is when such capacities will become available for others? 6 BISC - 19/11/12

  4. V. VSSE at a glance � Modest technical and analysis capacity � Cannot stand the comparison with foreign intelligence services � National cyber security policy and associated processes still in their infancy 7 BISC - 19/11/12 VI. VSSE & the new Belgian Cyber Security Strategy � Acknowledgement of the threat � Need for maximum cooperation � Center for cyber security � Duty to report 8 BISC - 19/11/12

  5. Thank you for your attention! 9 BISC - 19/11/12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend