SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
WISER “WIDE-IMPACT CYBER SECURITY RISK FRAMEWORK”
www.cyberwiser.eu @cyberwiser
Co-funded by the European Commission
Horizon 2020 – Grant # 653321
WISER: the European innovative
framework on cybersecurity
March 2016
1
Summary
What is WISER?
WISER is a European collaborative Innovation Action that puts
cyber-risk management at the very heart of good business practice.
Started on June 1st 2015, by 2017 WISER will provide a cyber-risk
management framework able to assess, monitor and mitigate the
risks in real-time, in multiple industries.
Who stands to benefit?
SMEs
Financial insurance
Critical Infrastructure organisations or highly complex cyber systems
Cyber secure, innovative smart energy providers
Who is involved? Six European Partners collaborating
2WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
Cybersecurity: A raising concern
1,673 reported data breaches in 2015, which resulted in more
than 707.5 million records being compromised worldwide.
The British insurance company Lloyd’s estimates that cyber
attacks cost businesses as much as $400 billion a year
Malware attacks in 2015 nearly doubled to reach up to 8.19
billion, from 4.2 billion in 2014
41% of IT personnel admitted to not following the same
security protocols they are expected to enforce
1 in 8 legitimate websites have a critical vulnerability
Some figures on cybercrime
Despite the relevance of the threat, awareness on cybersecurity is still low.
Affordable solutions, especially for SMEs, are yet to be seen on the market.
3WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
The WISER perimeter & positioning
The goal of WISER is to deliver solutions that require less consultancy to perform
cybersecurity assessment & improvements, through innovative methodologies
WISER has a high level innovation potential and commits its resources also
to create awareness & a global cybersecurity culture
Combining risk
management (in real-time!)
with security techniques
Interesting services
Attention to SMEs
The online component
The RPS delivery model
Sustainability
4WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
Innovation elements brought in by WISER
It is not simply about monitoring cyber incidents, it is about
assessing the risks present within a company
The risk assessment considers the potential damage to the ICT
infrastructure and the damage to the business of the company,
including various aspects, such as reputational implications – a
multi-level assessment
This risk evaluation evolves with the rapid dynamics that are
inherent with the cyber “climate”
This evaluation is performed by means of a novel methodology, to
be elaborated in the project
Modelling cyber risk, using patterns
Definition of mitigation measures according to the threats and
attacks and ranking based on different criteria
Ultimate goal: Make cyber risk assessment affordable, especially to
SMEs
Going beyond the state of art
5WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
How does it work?
Cyber risk assessment
follow-up
Monitoring: events and
alarms detection and
follow-up
Testing: vulnerabilities
scanning and follow-up
Modelling
Decision Support
The WISER framework delivers capabilities that are unparalleled with
respect to current offering. SMEs are enticed by means of “freemium”
services (i.e. the “CyberWISER-Light”)
Innovative capabilities and features
Basic and detailed visualization of reports
Graphic dashboard with analytical features
Configurable alerts
Periodical execution of vulnerability scans
Basic and detailed information of
vulnerabilities found
Assistance to derive model rules from risk
models
Assistance to decide the most suitable risk
model according to the business and ICT
profile of the company
Cost-benefit analysis of mitigation measures
Quality Criteria Assessment of risks
6WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
WISER’s workplan
Main services that will be delivered
Milestone Description Date Beneficiaries
First concrete WISER
tool Includes user-
friendly approach to
increase awareness
through self assessment
Online from
March 2016
SMEs, General public
Pre-packaged solution
for real time risk
assessment
Delivered by
December 2016
SMEs and ICT systems in
general
On-demand services for
real time and cross-
system assessment of
vulnerabilities and
threats
Delivered by
December 2016
Critical infrastructure or
highly complex cyber
systems
7WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
WISER will come in a 3-level service range, to
impact on the broadest audience possible
 Registration and basic data
required to Clients
 WISER tests
vulnerabilities from
the outside
 Provides basic
benchmarking
 Detailed business and IT
infrastructure data required
 Model selection based on
WISER suggestion or tailored
 Sensors installation at the
network layer level
 Real time exposure
calculation
 Monitoring
 Mitigation options
considered
 WISER team limited support
 Detailed business and IT
infrastructure data required
 Possibility to implement Client’s
models
 Possibility to perform cost/benefit
analysis on the base of Client’s
indications
 Sensors installation at the
application layer level
Required
Interaction
 Real time exposure calculation
 Monitoring
 Mitigation cost benefit
calculations
 WISER team full involvement
Complexity of WISER
Operating Model
8WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
Cyberwiser-light: A self assessment tool for SMEs
It’s the first and most “democratic” tool produced by WISER
Goals:
Provide a very first approach to the cybersecurity problem to a large
variety of companies with no experience or awareness in the field
Provide a very crude, and yet relevant, picture of the company
situation with respect to cyber climate
Minimum time investment by the end-user
Report generated from two different domains:
Business and ICT profile of the company
Vulnerabilities detected
Algorithm producing reports reflecting
How the company profile influences its cyber risk situation
How the vulnerabilities detected impact the business of the company.
Online from March 2016, accessible for free on
www.cyberwiser.eu
9WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
WISER’s Early Assessment Pilots (EAPs)
Our “early customers” are from different backgrounds
SMEs IT Providers
Verticals
Public Authority
10WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
Design: WISER Framework schema
The WISER framework manages to combine risk assessment with
cybersecurity best practice techniques, and it does so in real-time
The logical blocks of the framework include a risk
assessment engine and a decision support system
11WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
Cyber risk assessment @ WISER & the
iterative process with the end-user
Cyber Risk
Assessment
ReportAlgorithm
Interpreter
(mapping)
Target
infrastructure
Vulnerabilities
(testing)
Events/Alarms
(monitoring)
Business and ICT
profile information
Inputs
Risk model
(model rules)
Model
(R1,R2,…,Rn)
RA 1, M1
RA 2, M2
RA n, Mn
Decision-
maker
assistant
Comparison and ranking of mitigation measures
12WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
Mitigation measures are provided to the end-user, who can repeat
the analysis to verify effectiveness of measures implemented.
Conclusions & next steps proposed for ENISA
WISER is building on some of the indications of NIS and is
already benefiting from having received clarifications from
ENISA in a first conference call
WISER would like to maintain a continuously “open line”
with ENISA, to benefit from ENISA’s strategic indications
along the lines of cybersecurity
WISER would like propose to schedule a conference call with
ENISA next May to comment on the early feedback from the
European end-users of the new online service proposed by
WISER to SMEs (“cyberwiser-light”)
13WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
www.cyberwiser.eu
@cyberwiser
Thank you for your attention! Questions?
Contact
Antonio Álvarez Romero
Technical Coordinator
Atos Spain SA
antonio.alvarez@atos.net
Contact
Stephanie Parker
Communication Manager
Trust-IT Services Ltd
s.parker@trust-itservices.com

Weitere ähnliche Inhalte

Was ist angesagt?

The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerRahul Neel Mani
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
 
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Cloud Security Alliance Lviv Chapter
 
Multi-Channel Media Intelligence | Michael Brito @Britopian
Multi-Channel Media Intelligence | Michael Brito @BritopianMulti-Channel Media Intelligence | Michael Brito @Britopian
Multi-Channel Media Intelligence | Michael Brito @BritopianMichael Brito | Zeno Group
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)TI Safe
 
Renewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorRenewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorCloudMask inc.
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewFemi Ashaye
 
The Ugly Cost of Cyber Crime
The Ugly Cost of Cyber CrimeThe Ugly Cost of Cyber Crime
The Ugly Cost of Cyber CrimeRahul Neel Mani
 
20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about securityArjan Cornelissen
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportStephanie Brannan
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Website security statistics of 2012
Website security statistics of 2012Website security statistics of 2012
Website security statistics of 2012Bee_Ware
 
kyoungju_kwak_the_new_wave_of_cyber_terror
kyoungju_kwak_the_new_wave_of_cyber_terrorkyoungju_kwak_the_new_wave_of_cyber_terror
kyoungju_kwak_the_new_wave_of_cyber_terrorPacSecJP
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Cristian Garcia G.
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceIBM Security
 

Was ist angesagt? (20)

The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
 
Multi-Channel Media Intelligence | Michael Brito @Britopian
Multi-Channel Media Intelligence | Michael Brito @BritopianMulti-Channel Media Intelligence | Michael Brito @Britopian
Multi-Channel Media Intelligence | Michael Brito @Britopian
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
 
Renewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorRenewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security Sector
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
 
The Ugly Cost of Cyber Crime
The Ugly Cost of Cyber CrimeThe Ugly Cost of Cyber Crime
The Ugly Cost of Cyber Crime
 
20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense Report
 
Ijnsa
IjnsaIjnsa
Ijnsa
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Website security statistics of 2012
Website security statistics of 2012Website security statistics of 2012
Website security statistics of 2012
 
kyoungju_kwak_the_new_wave_of_cyber_terror
kyoungju_kwak_the_new_wave_of_cyber_terrorkyoungju_kwak_the_new_wave_of_cyber_terror
kyoungju_kwak_the_new_wave_of_cyber_terror
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
Ijnsa
IjnsaIjnsa
Ijnsa
 
Ijnsa
IjnsaIjnsa
Ijnsa
 
Ijnsa
IjnsaIjnsa
Ijnsa
 
Ijnsa
IjnsaIjnsa
Ijnsa
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
 

Andere mochten auch

Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsCYBERWISER .eu
 
Pie los equipos de trabajo en los talleres del ies la rosaleda
Pie los equipos de trabajo en los talleres del ies la rosaledaPie los equipos de trabajo en los talleres del ies la rosaleda
Pie los equipos de trabajo en los talleres del ies la rosaledaMª Isabel Pérez Ortega
 
American revolution
American revolutionAmerican revolution
American revolutionleed60218
 
Creando un Laboratorio para Evaluar UX - SG Next 2016
Creando un Laboratorio para Evaluar UX - SG Next 2016Creando un Laboratorio para Evaluar UX - SG Next 2016
Creando un Laboratorio para Evaluar UX - SG Next 2016Victor M. Gonzalez
 
Alubox CATALOG GENERAL 2013 CUTII POSTALE IMPORT
Alubox CATALOG GENERAL 2013 CUTII  POSTALE IMPORT Alubox CATALOG GENERAL 2013 CUTII  POSTALE IMPORT
Alubox CATALOG GENERAL 2013 CUTII POSTALE IMPORT Mail Box Production
 
Spanish technical report cmmi v 1 3
Spanish technical report cmmi v 1 3Spanish technical report cmmi v 1 3
Spanish technical report cmmi v 1 3rjsernaque
 
Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...
Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...
Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...FIA2010
 
MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)
MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)
MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)CulturAmbiente AC
 
Beneficios del aula invertida
Beneficios del aula invertidaBeneficios del aula invertida
Beneficios del aula invertidaReduca
 
Migracion demografica
Migracion demograficaMigracion demografica
Migracion demograficaLc Danny
 
Aerogenerador
AerogeneradorAerogenerador
AerogeneradorWeDgUnI
 
Construcción reloj 24 horas en baquelita
Construcción reloj 24 horas en baquelitaConstrucción reloj 24 horas en baquelita
Construcción reloj 24 horas en baquelitaronnyranv
 
Information Security Management. Security solutions copy
Information Security Management. Security solutions copyInformation Security Management. Security solutions copy
Information Security Management. Security solutions copyyuliana_mar
 
Distribucion De Poison
Distribucion De PoisonDistribucion De Poison
Distribucion De PoisonJessyMTT
 
CA ARCserve Solution Overview
CA ARCserve Solution OverviewCA ARCserve Solution Overview
CA ARCserve Solution OverviewMotty Ben Atia
 
Hudson Energy- CPS
Hudson Energy- CPSHudson Energy- CPS
Hudson Energy- CPSbostonmc
 

Andere mochten auch (20)

Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
 
Brasil oportunidades
Brasil oportunidadesBrasil oportunidades
Brasil oportunidades
 
Evaluación Conferencia 2013 JPH.
Evaluación Conferencia 2013 JPH.Evaluación Conferencia 2013 JPH.
Evaluación Conferencia 2013 JPH.
 
Pie los equipos de trabajo en los talleres del ies la rosaleda
Pie los equipos de trabajo en los talleres del ies la rosaledaPie los equipos de trabajo en los talleres del ies la rosaleda
Pie los equipos de trabajo en los talleres del ies la rosaleda
 
American revolution
American revolutionAmerican revolution
American revolution
 
Creando un Laboratorio para Evaluar UX - SG Next 2016
Creando un Laboratorio para Evaluar UX - SG Next 2016Creando un Laboratorio para Evaluar UX - SG Next 2016
Creando un Laboratorio para Evaluar UX - SG Next 2016
 
Alubox CATALOG GENERAL 2013 CUTII POSTALE IMPORT
Alubox CATALOG GENERAL 2013 CUTII  POSTALE IMPORT Alubox CATALOG GENERAL 2013 CUTII  POSTALE IMPORT
Alubox CATALOG GENERAL 2013 CUTII POSTALE IMPORT
 
Spanish technical report cmmi v 1 3
Spanish technical report cmmi v 1 3Spanish technical report cmmi v 1 3
Spanish technical report cmmi v 1 3
 
Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...
Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...
Isidro Laso Ballesteros (DG Information Society and Media) Internet Architect...
 
MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)
MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)
MultitudInvisible. Seminario Cultura y Medio Ambiente (Nicaragua)
 
Beneficios del aula invertida
Beneficios del aula invertidaBeneficios del aula invertida
Beneficios del aula invertida
 
Migracion demografica
Migracion demograficaMigracion demografica
Migracion demografica
 
Aerogenerador
AerogeneradorAerogenerador
Aerogenerador
 
Recetas del mundo
Recetas del  mundoRecetas del  mundo
Recetas del mundo
 
Construcción reloj 24 horas en baquelita
Construcción reloj 24 horas en baquelitaConstrucción reloj 24 horas en baquelita
Construcción reloj 24 horas en baquelita
 
Information Security Management. Security solutions copy
Information Security Management. Security solutions copyInformation Security Management. Security solutions copy
Information Security Management. Security solutions copy
 
Distribucion De Poison
Distribucion De PoisonDistribucion De Poison
Distribucion De Poison
 
¿Que es Multimedia?
¿Que es Multimedia?¿Que es Multimedia?
¿Que es Multimedia?
 
CA ARCserve Solution Overview
CA ARCserve Solution OverviewCA ARCserve Solution Overview
CA ARCserve Solution Overview
 
Hudson Energy- CPS
Hudson Energy- CPSHudson Energy- CPS
Hudson Energy- CPS
 

Ähnlich wie WISER: the European innovative framework on cybersecurity

The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glanceCYBERWISER .eu
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureDave James
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityOnline Business
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...Cohesive Networks
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023The Digital Insurer
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesNowSecure
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copperscoopnewsgroup
 
Midyear security-report-2016
Midyear security-report-2016Midyear security-report-2016
Midyear security-report-2016Andrey Apuhtin
 
Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016Maticmind
 

Ähnlich wie WISER: the European innovative framework on cybersecurity (20)

The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glance
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
Midyear security-report-2016
Midyear security-report-2016Midyear security-report-2016
Midyear security-report-2016
 
Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 

Kürzlich hochgeladen

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 

Kürzlich hochgeladen (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 

WISER: the European innovative framework on cybersecurity

  • 1. WISER “WIDE-IMPACT CYBER SECURITY RISK FRAMEWORK” www.cyberwiser.eu @cyberwiser Co-funded by the European Commission Horizon 2020 – Grant # 653321 WISER: the European innovative framework on cybersecurity March 2016 1
  • 2. Summary What is WISER? WISER is a European collaborative Innovation Action that puts cyber-risk management at the very heart of good business practice. Started on June 1st 2015, by 2017 WISER will provide a cyber-risk management framework able to assess, monitor and mitigate the risks in real-time, in multiple industries. Who stands to benefit? SMEs Financial insurance Critical Infrastructure organisations or highly complex cyber systems Cyber secure, innovative smart energy providers Who is involved? Six European Partners collaborating 2WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 3. Cybersecurity: A raising concern 1,673 reported data breaches in 2015, which resulted in more than 707.5 million records being compromised worldwide. The British insurance company Lloyd’s estimates that cyber attacks cost businesses as much as $400 billion a year Malware attacks in 2015 nearly doubled to reach up to 8.19 billion, from 4.2 billion in 2014 41% of IT personnel admitted to not following the same security protocols they are expected to enforce 1 in 8 legitimate websites have a critical vulnerability Some figures on cybercrime Despite the relevance of the threat, awareness on cybersecurity is still low. Affordable solutions, especially for SMEs, are yet to be seen on the market. 3WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 4. The WISER perimeter & positioning The goal of WISER is to deliver solutions that require less consultancy to perform cybersecurity assessment & improvements, through innovative methodologies WISER has a high level innovation potential and commits its resources also to create awareness & a global cybersecurity culture Combining risk management (in real-time!) with security techniques Interesting services Attention to SMEs The online component The RPS delivery model Sustainability 4WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 5. Innovation elements brought in by WISER It is not simply about monitoring cyber incidents, it is about assessing the risks present within a company The risk assessment considers the potential damage to the ICT infrastructure and the damage to the business of the company, including various aspects, such as reputational implications – a multi-level assessment This risk evaluation evolves with the rapid dynamics that are inherent with the cyber “climate” This evaluation is performed by means of a novel methodology, to be elaborated in the project Modelling cyber risk, using patterns Definition of mitigation measures according to the threats and attacks and ranking based on different criteria Ultimate goal: Make cyber risk assessment affordable, especially to SMEs Going beyond the state of art 5WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 6. How does it work? Cyber risk assessment follow-up Monitoring: events and alarms detection and follow-up Testing: vulnerabilities scanning and follow-up Modelling Decision Support The WISER framework delivers capabilities that are unparalleled with respect to current offering. SMEs are enticed by means of “freemium” services (i.e. the “CyberWISER-Light”) Innovative capabilities and features Basic and detailed visualization of reports Graphic dashboard with analytical features Configurable alerts Periodical execution of vulnerability scans Basic and detailed information of vulnerabilities found Assistance to derive model rules from risk models Assistance to decide the most suitable risk model according to the business and ICT profile of the company Cost-benefit analysis of mitigation measures Quality Criteria Assessment of risks 6WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 7. WISER’s workplan Main services that will be delivered Milestone Description Date Beneficiaries First concrete WISER tool Includes user- friendly approach to increase awareness through self assessment Online from March 2016 SMEs, General public Pre-packaged solution for real time risk assessment Delivered by December 2016 SMEs and ICT systems in general On-demand services for real time and cross- system assessment of vulnerabilities and threats Delivered by December 2016 Critical infrastructure or highly complex cyber systems 7WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 8. WISER will come in a 3-level service range, to impact on the broadest audience possible  Registration and basic data required to Clients  WISER tests vulnerabilities from the outside  Provides basic benchmarking  Detailed business and IT infrastructure data required  Model selection based on WISER suggestion or tailored  Sensors installation at the network layer level  Real time exposure calculation  Monitoring  Mitigation options considered  WISER team limited support  Detailed business and IT infrastructure data required  Possibility to implement Client’s models  Possibility to perform cost/benefit analysis on the base of Client’s indications  Sensors installation at the application layer level Required Interaction  Real time exposure calculation  Monitoring  Mitigation cost benefit calculations  WISER team full involvement Complexity of WISER Operating Model 8WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 9. Cyberwiser-light: A self assessment tool for SMEs It’s the first and most “democratic” tool produced by WISER Goals: Provide a very first approach to the cybersecurity problem to a large variety of companies with no experience or awareness in the field Provide a very crude, and yet relevant, picture of the company situation with respect to cyber climate Minimum time investment by the end-user Report generated from two different domains: Business and ICT profile of the company Vulnerabilities detected Algorithm producing reports reflecting How the company profile influences its cyber risk situation How the vulnerabilities detected impact the business of the company. Online from March 2016, accessible for free on www.cyberwiser.eu 9WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 10. WISER’s Early Assessment Pilots (EAPs) Our “early customers” are from different backgrounds SMEs IT Providers Verticals Public Authority 10WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 11. Design: WISER Framework schema The WISER framework manages to combine risk assessment with cybersecurity best practice techniques, and it does so in real-time The logical blocks of the framework include a risk assessment engine and a decision support system 11WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 12. Cyber risk assessment @ WISER & the iterative process with the end-user Cyber Risk Assessment ReportAlgorithm Interpreter (mapping) Target infrastructure Vulnerabilities (testing) Events/Alarms (monitoring) Business and ICT profile information Inputs Risk model (model rules) Model (R1,R2,…,Rn) RA 1, M1 RA 2, M2 RA n, Mn Decision- maker assistant Comparison and ranking of mitigation measures 12WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser Mitigation measures are provided to the end-user, who can repeat the analysis to verify effectiveness of measures implemented.
  • 13. Conclusions & next steps proposed for ENISA WISER is building on some of the indications of NIS and is already benefiting from having received clarifications from ENISA in a first conference call WISER would like to maintain a continuously “open line” with ENISA, to benefit from ENISA’s strategic indications along the lines of cybersecurity WISER would like propose to schedule a conference call with ENISA next May to comment on the early feedback from the European end-users of the new online service proposed by WISER to SMEs (“cyberwiser-light”) 13WISER presentation to ENISA, March 2016 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 14. www.cyberwiser.eu @cyberwiser Thank you for your attention! Questions? Contact Antonio Álvarez Romero Technical Coordinator Atos Spain SA antonio.alvarez@atos.net Contact Stephanie Parker Communication Manager Trust-IT Services Ltd s.parker@trust-itservices.com