SlideShare a Scribd company logo
1 of 19
Cyber Security in the
    Federal Republic of Germany:
  Cooperation with the Private Sector


                   Dr. Uwe Jendricke


     German Federal Office for Information Security
Bundesamt für Sicherheit in der Informationstechnik (BSI)



                       11.04.2013
Our Mission
                    Information Security for our Society

                                      Prevention
                                      Prevention
                                      Prevention
Positioning to Customers
  Operational: Public Sector
                                                               Founded in 1991
                                                               Staff ~ 570 employees
  Cooperative: Industry, Science, Media
                                                               Budget: 69 mio. € (2011)
  Informative: Citizens
                                     Cyber Security
                                     Cyber Security
                                     Crypto Innovation
                                     Crypto Innovation
                                        CI Security
                                        CI Security
                                    Secure eIdentities
                                    Secure eIdentities
                                       Certification
                                       Certification
                                    Awareness Raising
                                    Awareness Raising
                           Consultancy & Support for Federal Gov.
                           Consultancy & Support for Federal Gov.

    Reaction
    Reaction                                                        Sustainability
                                                                    Sustainability
                                                                                   2
Agenda

   Cyber security overview
   Activities of the German government




                                          3
Increasing Cyber Attacks

 Spamhaus DDoS
 American Express




          http://www.bankinfosecurity.com/american-express-a-5645
                                                                    4
The Dark Side...




            Nations
                              Script
                              Kiddies


Terrorism

                                   Hacker/Cracker

    Organised
      Crime
                      Hacktivism

                                                    5
Timeline of Cyber Attacks

   Non-profit attacks (since 1999)


   Professional cyber attacks (since 2005)


   Cyber espionage and -sabotage (since 2007)



     Cyber attacks on security infrastructure of the Internet (since 2010)
     RSA token, SSL-CA (DigiNotar),Code-Signing CA



     Cyber attacks on critical infrastructures (since 2011)
     Energy (Saudi Aramco), Finance (US banks), Stuxnet




                                                                        6
Evolution of Attacks

                                          Pinpointing attack

                                            Manipulation and
                      Targeted attack        sabotage with high
                                             impact
                                            Complex and long
                                             preparation
Untargeted attack  Espionage,
                         sabotage,
                         identity theft      Advanced
   Availability,
                        Selected targets     Persistent
    sabotage, fraud
                        Germany 2011:        Threat (APT)
   Unspecific target
    group                Server of Bayer AG  Stuxnet
                         compromised         Duqu
   2009: Conficker in
    hospitals
   2012: Dorifel in
    hospitals
                                                                  7
Agenda

   Cyber security overview
   Activities of the German government




                                          8
The German Cyber Strategy


                              2005
                       The National Plan
                            for CIIP

                2007: CIP
                 2007: CIP        2007: Fed. Admin.
                                  2007: Fed. Admin.
             implementation
              implementation       implementation
                                    implementation
             plan (UP KRITIS)
             plan (UP KRITIS)      plan (UP BUND)
                                   plan (UP BUND)




                       2011
             The Cyber Security Strategy
 National
 National   National
            National       „Alliance”
                           „Alliance”      UP KRITIS
                                           UP KRITIS    Other
                                                         Other
  Cyber
  Cyber      Cyber
             Cyber            for
                               for          updated
                                            updated    measures
                                                       measures
Response
Response    Security
            Security         Cyber
                             Cyber                      being
                                                         being
  Centre
  Centre    Council
            Council         Security
                            Security                   deployed
                                                       deployed



                                                                  9
Governmental Activities


Providing                                               Information
information about                                   exchange and
prevention for                                crisis management
the industry         Alliance                             for critical
                                  UP KRITIS         infrastructures
                    for Cyber       (CIIP)
                     Security

                                BSI

                     National
                      Cyber
Information                           IPPP            Cyber crime
exchange
                    Response                           Information
for governmental      Centre                             exchange
agencies                                       for finance sector



                                                                         10
CIP Implementation Plan (UP KRITS)

 Target:
  Protection of the German critical IT-Infrastructures
 Public Private Partnership
 Developed in cooperation with the private sector
 Operating since 2007


 Crisis Management
 Exercises
 Resilience
 Information Exchange




                                                         11
CIP Implementation Plan -
                     Working groups



  Working group 1
                                  Working group 2
Crisis- and emergency
                            Crisis reaction and mitigation
        exercises




  Working group 3                Working group 4
 Continuity of critical      National and international
Infrastructure services             cooperation
National
                    Cyber Response Centre
                                         Federal Armed
                                         Forces
                                                                    Federal
                                                                    Police

      Federal Intelligence
            Service
 Federal Office for the
       Protection
  of the Constitution
 Federal Office of Civil
      Protection
and Disaster Assistance
           Federal Criminal Police
           Office                                           Customs
                          Authorities resp. Critical
                                                       Criminological Office
                          Infrastructure Operators



                                                                               13
Alliance for Cyber Security




                    Situational
                    Awareness      Solutions



                      Cyber
                     Security     Exchange of
                     measures     experiences




                                           14
National
                    IT Crisis Reaction Centre

   Ensure rapid response to serious incidents
   Enable timely countermeasures
   Avoid more widespread damage
   Standard Operating Procedures (SOPs)
   24x7 availability
   Exercises (also internationally)




                                                 15
Information Exchange with Private Sector

            Alerting in case of crisis, warning
   Background information, IT situation reports

                       Single Points              IT situation centre
Companies               of Contact                       at BSI
Company 1
                           SPOC
                          of sector
Company 2
    ...




Company n


                Reporting incidents


                     Open Sources
                                                                  Governmental
                                                                     CERT



                                                                          16
Example: American Express DDoS

            Alerting in case of crisis, warning
   Background information, IT situation reports

                       Single Points                  IT situation centre
Companies               of Contact                           at BSI
Company 14)  Feedback       SPOC     3) Feedback
          with companies   of sector with sector              Generating
Company 2
                                                              Reports
    ...




Company n                                                     Analysis

                Reporting incidents

                           1) First Information    2) Feedback with authorities
                     Open Sources
                                                                         Governmental
                                                                            CERT



                                                                                  17
Governmental Cyber Security Initiatives

   Non-profit attacks (since 1999)


   Professional cyber attacks (since 2005)

                          UP BUND             UP KRITIS
   Cyber espionage and -sabotage (since 2007)



                     Protecting          Protecting
      Cyber attacks on security infrastructure of the Internet (since 2010)
                   Governmental             Critical
     RSA token, SSL-CA (DigiNotar),Code-Signing CA
                    Infrastructure      Infrastructure
                                                             Alliance for
                                             2013          Cyber Security
     Cyber attacks on critical infrastructures (since 2011)
                                           Update:
     Energy (Saudi Aramco), Finance (US banks), Stuxnet
                                         extending to     Focussing cyber
                                          smaller CI       threats, Private
                                                                Sector



                                                                         18
Contact

                                   German Federal Office for Information
                                   Security
                                   Bundesamt für Sicherheit in der
                                   Informationstechnik (BSI)

                                   Dr. Uwe Jendricke
                                   Godesberger Allee 185-189
                                   D-53175 Bonn
                                   Germany

                                   +49-22899-9582-5507
                                   uwe.jendricke@bsi.bund.de
                                   http://www.bsi.bund.de


https://www.bsi.bund.de/EN/Topics/Criticalinfrastructures/criticalinfrastructures_node.html
                                                                                         19

More Related Content

What's hot

A model for reducing information security risks due to human error
A model for reducing information security risks due to human errorA model for reducing information security risks due to human error
A model for reducing information security risks due to human errorAnup Narayanan
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2fphart
 
E commerce economic essay assignment - www.topgradepapers.com
E commerce economic essay assignment - www.topgradepapers.comE commerce economic essay assignment - www.topgradepapers.com
E commerce economic essay assignment - www.topgradepapers.comTop Grade Papers
 
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...Anup Narayanan
 
Return on Security Investment
Return on Security InvestmentReturn on Security Investment
Return on Security InvestmentConferencias FIST
 
Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Dale Butler
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud DeploymentOpen Data Center Alliance
 
How to Avoid Anxiety During Emergency Incidents
How to Avoid Anxiety During Emergency IncidentsHow to Avoid Anxiety During Emergency Incidents
How to Avoid Anxiety During Emergency IncidentsEverbridge, Inc.
 
Smarter Safety: Flere data, færre kriminelle handlinger, Mauritz Gilberg & St...
Smarter Safety: Flere data, færre kriminelle handlinger, Mauritz Gilberg & St...Smarter Safety: Flere data, færre kriminelle handlinger, Mauritz Gilberg & St...
Smarter Safety: Flere data, færre kriminelle handlinger, Mauritz Gilberg & St...IBM Danmark
 
Mir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE PresentationMir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE PresentationSinglewire Software
 
Research Agenda in Security Research
Research Agenda in Security ResearchResearch Agenda in Security Research
Research Agenda in Security Researchsiswarren
 
Cloud computing security john abrena - chicago tour
Cloud computing security    john abrena - chicago tourCloud computing security    john abrena - chicago tour
Cloud computing security john abrena - chicago tourRamon Ray
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management ServicesMarlabs
 
Preparing for the Unexpected with The Town of East Haddam, CT
Preparing for the Unexpected with The Town of East Haddam, CTPreparing for the Unexpected with The Town of East Haddam, CT
Preparing for the Unexpected with The Town of East Haddam, CTEverbridge, Inc.
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeKrisValerio
 
Fortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxAFortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxAGTEC CxA
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksIBM
 

What's hot (20)

A model for reducing information security risks due to human error
A model for reducing information security risks due to human errorA model for reducing information security risks due to human error
A model for reducing information security risks due to human error
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2
 
E commerce economic essay assignment - www.topgradepapers.com
E commerce economic essay assignment - www.topgradepapers.comE commerce economic essay assignment - www.topgradepapers.com
E commerce economic essay assignment - www.topgradepapers.com
 
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
 
Return on Security Investment
Return on Security InvestmentReturn on Security Investment
Return on Security Investment
 
Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment
 
How to Avoid Anxiety During Emergency Incidents
How to Avoid Anxiety During Emergency IncidentsHow to Avoid Anxiety During Emergency Incidents
How to Avoid Anxiety During Emergency Incidents
 
Smarter Safety: Flere data, færre kriminelle handlinger, Mauritz Gilberg & St...
Smarter Safety: Flere data, færre kriminelle handlinger, Mauritz Gilberg & St...Smarter Safety: Flere data, færre kriminelle handlinger, Mauritz Gilberg & St...
Smarter Safety: Flere data, færre kriminelle handlinger, Mauritz Gilberg & St...
 
Mir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE PresentationMir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE Presentation
 
Research Agenda in Security Research
Research Agenda in Security ResearchResearch Agenda in Security Research
Research Agenda in Security Research
 
Key considerations
Key considerationsKey considerations
Key considerations
 
Cloud computing security john abrena - chicago tour
Cloud computing security    john abrena - chicago tourCloud computing security    john abrena - chicago tour
Cloud computing security john abrena - chicago tour
 
Bridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasmBridging the Marketing-Sales chasm
Bridging the Marketing-Sales chasm
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Preparing for the Unexpected with The Town of East Haddam, CT
Preparing for the Unexpected with The Town of East Haddam, CTPreparing for the Unexpected with The Town of East Haddam, CT
Preparing for the Unexpected with The Town of East Haddam, CT
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff Crume
 
Fortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxAFortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxA
 
Digital Rights And Digital Television
Digital Rights And Digital TelevisionDigital Rights And Digital Television
Digital Rights And Digital Television
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
 

Similar to Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje (VFR): bendradarbiavimas su privačiu sektoriumi

Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensenjaredcarst
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligenceguest08b1e6
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011EASTWEST Public Relations
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS UK
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6David Spinks
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 servicesCade Zvavanjanja
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
Global Cyber Security Industry
Global Cyber Security IndustryGlobal Cyber Security Industry
Global Cyber Security IndustryReportLinker.com
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Improve Public Safety
Improve Public SafetyImprove Public Safety
Improve Public Safetyestotts75
 
pentesting-and-buzzwords
pentesting-and-buzzwordspentesting-and-buzzwords
pentesting-and-buzzwordsClint Bodungen
 
Can Information Security Survive
Can Information Security SurviveCan Information Security Survive
Can Information Security SurviveIT@Intel
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 

Similar to Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje (VFR): bendradarbiavimas su privačiu sektoriumi (20)

Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 services
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
Global Cyber Security Industry
Global Cyber Security IndustryGlobal Cyber Security Industry
Global Cyber Security Industry
 
presCyberNISC2015
presCyberNISC2015presCyberNISC2015
presCyberNISC2015
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Improve Public Safety
Improve Public SafetyImprove Public Safety
Improve Public Safety
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
pentesting-and-buzzwords
pentesting-and-buzzwordspentesting-and-buzzwords
pentesting-and-buzzwords
 
20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 
Can Information Security Survive
Can Information Security SurviveCan Information Security Survive
Can Information Security Survive
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 

More from TEO LT, AB

K. Šliužas at "CEO meets investors" 2014
K. Šliužas at "CEO meets investors" 2014K. Šliužas at "CEO meets investors" 2014
K. Šliužas at "CEO meets investors" 2014TEO LT, AB
 
Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...
Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...
Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...TEO LT, AB
 
TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...
TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...
TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...TEO LT, AB
 
TEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptį
TEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptįTEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptį
TEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptįTEO LT, AB
 
Televizijos ateitis. Šiandien
Televizijos ateitis. ŠiandienTelevizijos ateitis. Šiandien
Televizijos ateitis. ŠiandienTEO LT, AB
 
TEO Wi-Fi strategy including offering Wi-Fi for schools
TEO Wi-Fi strategy including offering Wi-Fi for schoolsTEO Wi-Fi strategy including offering Wi-Fi for schools
TEO Wi-Fi strategy including offering Wi-Fi for schoolsTEO LT, AB
 
Saugi ir išmani mokykla
Saugi ir išmani mokyklaSaugi ir išmani mokykla
Saugi ir išmani mokyklaTEO LT, AB
 
Wi-Fi Lietuvos mokyklose
Wi-Fi Lietuvos mokykloseWi-Fi Lietuvos mokyklose
Wi-Fi Lietuvos mokykloseTEO LT, AB
 
How telecommunications are changing the world and themselves
How telecommunications are changing the world and themselvesHow telecommunications are changing the world and themselves
How telecommunications are changing the world and themselvesTEO LT, AB
 
Kompiuterių istorija vaikams
Kompiuterių istorija vaikamsKompiuterių istorija vaikams
Kompiuterių istorija vaikamsTEO LT, AB
 
Provisioning business services on IMS
Provisioning business services on IMSProvisioning business services on IMS
Provisioning business services on IMSTEO LT, AB
 
Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?
Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?
Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?TEO LT, AB
 
Lietuvos įmonių IT saugumo tyrimas. 2013 04 11
Lietuvos įmonių IT saugumo tyrimas. 2013 04 11Lietuvos įmonių IT saugumo tyrimas. 2013 04 11
Lietuvos įmonių IT saugumo tyrimas. 2013 04 11TEO LT, AB
 
Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...
Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...
Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...TEO LT, AB
 
Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?
Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?
Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?TEO LT, AB
 
Aleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektai
Aleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektaiAleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektai
Aleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektaiTEO LT, AB
 
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmėsRainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmėsTEO LT, AB
 
Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...
Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...
Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...TEO LT, AB
 
Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...
Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...
Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...TEO LT, AB
 
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizėGuillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizėTEO LT, AB
 

More from TEO LT, AB (20)

K. Šliužas at "CEO meets investors" 2014
K. Šliužas at "CEO meets investors" 2014K. Šliužas at "CEO meets investors" 2014
K. Šliužas at "CEO meets investors" 2014
 
Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...
Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...
Kibernetinis saugumas: iššūkiai, atakų tipai bei telekomunikacijų operatoriau...
 
TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...
TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...
TEO atsinaujina: Televizijos GALA ir interneto ZEBRA paslaugos bus teikiamos ...
 
TEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptį
TEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptįTEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptį
TEO generalinis direktorius Kęstutis Šliužas apie naują TEO veiklos kryptį
 
Televizijos ateitis. Šiandien
Televizijos ateitis. ŠiandienTelevizijos ateitis. Šiandien
Televizijos ateitis. Šiandien
 
TEO Wi-Fi strategy including offering Wi-Fi for schools
TEO Wi-Fi strategy including offering Wi-Fi for schoolsTEO Wi-Fi strategy including offering Wi-Fi for schools
TEO Wi-Fi strategy including offering Wi-Fi for schools
 
Saugi ir išmani mokykla
Saugi ir išmani mokyklaSaugi ir išmani mokykla
Saugi ir išmani mokykla
 
Wi-Fi Lietuvos mokyklose
Wi-Fi Lietuvos mokykloseWi-Fi Lietuvos mokyklose
Wi-Fi Lietuvos mokyklose
 
How telecommunications are changing the world and themselves
How telecommunications are changing the world and themselvesHow telecommunications are changing the world and themselves
How telecommunications are changing the world and themselves
 
Kompiuterių istorija vaikams
Kompiuterių istorija vaikamsKompiuterių istorija vaikams
Kompiuterių istorija vaikams
 
Provisioning business services on IMS
Provisioning business services on IMSProvisioning business services on IMS
Provisioning business services on IMS
 
Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?
Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?
Nerijus Ivanauskas. Ką ir kaip žiūrėsime rytoj?
 
Lietuvos įmonių IT saugumo tyrimas. 2013 04 11
Lietuvos įmonių IT saugumo tyrimas. 2013 04 11Lietuvos įmonių IT saugumo tyrimas. 2013 04 11
Lietuvos įmonių IT saugumo tyrimas. 2013 04 11
 
Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...
Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...
Vytautas Bučinskas. Šalies kibernetinis saugumas – didžiausio Lietuvos teleko...
 
Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?
Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?
Mehis Hakkaja. Kaip gali būti įsilaužta į Jūsų kompiuterį?
 
Aleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektai
Aleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektaiAleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektai
Aleksandras Samuchovas. Praktiniai veiklos tęstinumo valdymo aspektai
 
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmėsRainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmės
 
Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...
Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...
Dr. Rytis Rainys. Interneto saugumo valdymas Lietuvoje tinklų infrastruktūros...
 
Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...
Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...
Gintaras Čiurlionis. Kibernetinės erdvės iššūkiai Lietuvoje – teisiniai, inst...
 
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizėGuillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
 

Recently uploaded

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje (VFR): bendradarbiavimas su privačiu sektoriumi

  • 1. Cyber Security in the Federal Republic of Germany: Cooperation with the Private Sector Dr. Uwe Jendricke German Federal Office for Information Security Bundesamt für Sicherheit in der Informationstechnik (BSI) 11.04.2013
  • 2. Our Mission Information Security for our Society Prevention Prevention Prevention Positioning to Customers Operational: Public Sector  Founded in 1991  Staff ~ 570 employees Cooperative: Industry, Science, Media  Budget: 69 mio. € (2011) Informative: Citizens Cyber Security Cyber Security Crypto Innovation Crypto Innovation CI Security CI Security Secure eIdentities Secure eIdentities Certification Certification Awareness Raising Awareness Raising Consultancy & Support for Federal Gov. Consultancy & Support for Federal Gov. Reaction Reaction Sustainability Sustainability 2
  • 3. Agenda  Cyber security overview  Activities of the German government 3
  • 4. Increasing Cyber Attacks  Spamhaus DDoS  American Express http://www.bankinfosecurity.com/american-express-a-5645 4
  • 5. The Dark Side... Nations Script Kiddies Terrorism Hacker/Cracker Organised Crime Hacktivism 5
  • 6. Timeline of Cyber Attacks  Non-profit attacks (since 1999)  Professional cyber attacks (since 2005)  Cyber espionage and -sabotage (since 2007)  Cyber attacks on security infrastructure of the Internet (since 2010)  RSA token, SSL-CA (DigiNotar),Code-Signing CA  Cyber attacks on critical infrastructures (since 2011)  Energy (Saudi Aramco), Finance (US banks), Stuxnet 6
  • 7. Evolution of Attacks Pinpointing attack  Manipulation and Targeted attack sabotage with high impact  Complex and long preparation Untargeted attack  Espionage, sabotage, identity theft  Advanced  Availability,  Selected targets Persistent sabotage, fraud  Germany 2011: Threat (APT)  Unspecific target group Server of Bayer AG  Stuxnet compromised  Duqu  2009: Conficker in hospitals  2012: Dorifel in hospitals 7
  • 8. Agenda  Cyber security overview  Activities of the German government 8
  • 9. The German Cyber Strategy 2005 The National Plan for CIIP 2007: CIP 2007: CIP 2007: Fed. Admin. 2007: Fed. Admin. implementation implementation implementation implementation plan (UP KRITIS) plan (UP KRITIS) plan (UP BUND) plan (UP BUND) 2011 The Cyber Security Strategy National National National National „Alliance” „Alliance” UP KRITIS UP KRITIS Other Other Cyber Cyber Cyber Cyber for for updated updated measures measures Response Response Security Security Cyber Cyber being being Centre Centre Council Council Security Security deployed deployed 9
  • 10. Governmental Activities Providing Information information about exchange and prevention for crisis management the industry Alliance for critical UP KRITIS infrastructures for Cyber (CIIP) Security BSI National Cyber Information IPPP Cyber crime exchange Response Information for governmental Centre exchange agencies for finance sector 10
  • 11. CIP Implementation Plan (UP KRITS)  Target: Protection of the German critical IT-Infrastructures  Public Private Partnership  Developed in cooperation with the private sector  Operating since 2007  Crisis Management  Exercises  Resilience  Information Exchange 11
  • 12. CIP Implementation Plan - Working groups Working group 1 Working group 2 Crisis- and emergency Crisis reaction and mitigation exercises Working group 3 Working group 4 Continuity of critical National and international Infrastructure services cooperation
  • 13. National Cyber Response Centre Federal Armed Forces Federal Police Federal Intelligence Service Federal Office for the Protection of the Constitution Federal Office of Civil Protection and Disaster Assistance Federal Criminal Police Office Customs Authorities resp. Critical Criminological Office Infrastructure Operators 13
  • 14. Alliance for Cyber Security Situational Awareness Solutions Cyber Security Exchange of measures experiences 14
  • 15. National IT Crisis Reaction Centre  Ensure rapid response to serious incidents  Enable timely countermeasures  Avoid more widespread damage  Standard Operating Procedures (SOPs)  24x7 availability  Exercises (also internationally) 15
  • 16. Information Exchange with Private Sector Alerting in case of crisis, warning Background information, IT situation reports Single Points IT situation centre Companies of Contact at BSI Company 1 SPOC of sector Company 2 ... Company n Reporting incidents Open Sources Governmental CERT 16
  • 17. Example: American Express DDoS Alerting in case of crisis, warning Background information, IT situation reports Single Points IT situation centre Companies of Contact at BSI Company 14) Feedback SPOC 3) Feedback with companies of sector with sector Generating Company 2 Reports ... Company n Analysis Reporting incidents 1) First Information 2) Feedback with authorities Open Sources Governmental CERT 17
  • 18. Governmental Cyber Security Initiatives  Non-profit attacks (since 1999)  Professional cyber attacks (since 2005) UP BUND UP KRITIS  Cyber espionage and -sabotage (since 2007)  Protecting Protecting Cyber attacks on security infrastructure of the Internet (since 2010) Governmental Critical  RSA token, SSL-CA (DigiNotar),Code-Signing CA Infrastructure Infrastructure Alliance for 2013 Cyber Security  Cyber attacks on critical infrastructures (since 2011) Update:  Energy (Saudi Aramco), Finance (US banks), Stuxnet extending to Focussing cyber smaller CI threats, Private Sector 18
  • 19. Contact German Federal Office for Information Security Bundesamt für Sicherheit in der Informationstechnik (BSI) Dr. Uwe Jendricke Godesberger Allee 185-189 D-53175 Bonn Germany +49-22899-9582-5507 uwe.jendricke@bsi.bund.de http://www.bsi.bund.de https://www.bsi.bund.de/EN/Topics/Criticalinfrastructures/criticalinfrastructures_node.html 19

Editor's Notes

  1. Anmerkungen -Innen und Außentäter - APTs nicht erwähnt → Trend-Folie von Harald mit rein, KRITIS-Folie raus
  2. [ Mögliche Überleitung:] As has been shown, Information Security became more and more important for all parts of the society; Germany already established in 1991 a Federal Authority dedicated to IT security issues: Independent and neutral (as working principles) unique as a public agency in comparison Right from the start BSI has been the NCSA (National Communication Security Authority) – later given the function of the NCDA In the meantime we have about 500 employees and a budget of 64 M. Our mission = Information Security for our Society ...which i s reflected in our positioning towards our costumers: → operational // cooperative // informative Our strategy is based on the three core principles Prevention, Reaction, Sustainability [ Possibly mention the the NPSI as overall IT-security strategy]. Following this strategy we offer.... IT security expertise and competence in general, comprehensive IT-security concepts (IT Grundschutz) as well as consultancy, information, and awareness raising for all target groups IT Security Certification (and Product Assessment) for the industry We are responsible for Safeguarding the Federal Networks and hosting a CERT (+ Situation Fullfilling the function of NCSA and the NCDA → Hence BSI is nationally and internationally (!) networked through its successful cooperations with various Stakeholders of all sectors (public / private / science / media)
  3. Bild: http://www.mansgreatestmistake.com/?s=reclaim+the+streets
  4. Grafiken: Weltkugel, Joystick, Pistole von Open Office Hackerculture: http://commons.wikimedia.org/wiki/File:Hacker_culture.jpg Hacktivism: http://commons.wikimedia.org/wiki/File:Ajax-hacker.full.png Terrorismus: http://commons.wikimedia.org/wiki/File:Bomby.png
  5. Die Bundesregierung hat heute die von Bundesinnenminister Dr. Thomas de Maizière vorgelegte Cyber-Sicherheitsstrategie für Deutschland beschlossen. Kernelemente der Strategie sind der Schutz der IT-Systeme in Deutschland, insbesondere im Bereich kritischer Infrastrukturen, die Sensibilisierung der Bürgerinnen und Bürger zum Thema IT-Sicherheit, der Aufbau eines Nationalen Cyber-Abwehrzentrums sowie die Einrichtung eines Nationalen Cyber-Sicherheitsrates. Hierzu erklärte Bundesinnenminister Dr. Thomas de Maizière: ""Die Gewährleistung von Sicherheit im Cyber-Raum und der Schutz der kritischen Informationsinfrastrukturen sind existenzielle Fragen des 21. Jahrhunderts und erfordern ein hohes Engagement des Staates. Dabei wollen wir die Cyber-Sicherheit auf einem hohen Niveau gewährleisten, ohne die Chancen und den Nutzen des Cyber-Raums zu beeinträchtigen.""
  6. Ein wichtiges Element der Cyber-Sicherheitsstrategie ist die Einrichtung eines Nationalen Cyber-Abwehrzentrums. Neu auftretende IT-Sicherheitslücken werden heute rasend schnell ausgenutzt. Mit dem Nationalen Cyber-Abwehrzentrum richtet die Bundesregierung eine Informationsplattform ein, die es künftig ermöglicht, bei IT-Vorfällen, insbesondere Cyber-Angriffen, schnell und abgestimmt Informationen zusammen zu tragen, zu analysieren und zwischen den Sicherheitsbehörden abgestimmte Empfehlungen zum Schutz der IT-Systeme zur Verfügung zu stellen. Das Nationale Cyber-Abwehrzentrum wird ab dem 1. April 2011 unter der Federführung des BSI und unter direkter Beteiligung des Bundesamtes für Verfassungsschutz sowie des Bundesamtes für Bevölkerungsschutz und Katastrophenhilfe aufgebaut. Hierzu erklärte BSI-Präsident Michael Hange: "Neue Angriffsmechanismen, wie sie bei Stuxnet zu beobachten waren, orientieren sich nicht an der klassischen Aufgabenteilung deutscher Behörden. Sie erfordern neue Formen der Zusammenarbeit und fest etablierte Kommunikationsstrukturen. Das Nationale Cyber-Abwehrzentrum ist in diesem Zusammenhang eine kontinuierliche Weiterentwicklung der bisherigen IT-Sicherheitsaktivitäten.
  7. Zur Erreichbarkeit der SPOCs: soll mittel- bis langfristig auch Notfallkontakte sowie Angaben zur krisensicheren Erreichbarkeit enthalten, wenn entsprechende Verfahren vereinbart und eingeführt sind.
  8. Zur Erreichbarkeit der SPOCs: soll mittel- bis langfristig auch Notfallkontakte sowie Angaben zur krisensicheren Erreichbarkeit enthalten, wenn entsprechende Verfahren vereinbart und eingeführt sind.