SlideShare a Scribd company logo
1 of 24
New 
Zealand 
Internet 
Task 
Force 
Improving 
the 
cyber 
security 
posture 
of 
New 
Zealand 
Barry 
Brailey 
NZITF 
Chair
Programme 
• Introduc7on 
• Background 
• The 
Birth 
of 
a 
Trust 
Group 
• Ongoing 
work 
• Q&A
Who 
Am 
I? 
• Manager, 
Security 
Policy 
-­‐ 
.nz 
DNC 
• Chair 
– 
NZITF
What 
is 
the 
NZITF? 
The 
New 
Zealand 
Internet 
Task 
Force 
is 
a 
non-­‐ 
profit 
with 
the 
mission 
of 
improving 
the 
cyber 
security 
posture 
of 
New 
Zealand 
It 
is 
a 
collabora@ve 
effort 
based 
on 
mutual 
trust 
of 
it’s 
members
New 
Zealand 
(Middle 
Earth)
NZ 
is 
excellent 
for 
many 
reasons!
NZ 
Gov’t 
Cyber 
Security…… 
• 2002 
-­‐ 
Centre 
for 
Cri7cal 
Infrastructure 
Protec7on 
• 2011 
– 
Cyber 
Security 
Strategy 
(fairly 
brief) 
• 2012 
– 
Na7onal 
Cyber 
Security 
Centre
The 
Security 
Landscape 
• The 
rise 
of 
‘Worms 
and 
Trojans’ 
(Blaster, 
Welchia 
etc) 
• NASA 
& 
other 
‘hacks’ 
• Estonia 
A^acks 
• Georgia 
A^acks 
• Ghostnet 
(Cyber 
espionage) 
• Conficker 
• Rise 
of 
the 
‘Botnets’ 
• Stuxnet
The 
Birth 
of 
a 
Trust 
Group 
• Following 
BTF7, 
Conficker 
Working 
Group 
and 
Cyber 
Storm 
II 
in 
2008 
the 
NZ 
Botnet 
Task 
Force 
was 
formed 
• Renamed 
NZITF 
early 
2009 
as 
the 
focus 
evolved 
and 
membership 
expanded
Growing 
Up 
• Formally 
Incorporated 
in 
2011 
• Membership 
fee 
structure 
introduced 
• First 
adver7sed 
public 
event
NZITF 
Board 
• .nz 
DNC, 
Barry 
Brailey 
(Chair) 
• Security 
Consultant, 
Laura 
Bell 
(Vice-­‐Chair) 
• Bank 
of 
New 
Zealand, 
Chester 
Holmes 
(Secretary) 
• Independent 
Consultant, 
Dean 
Pemberton 
(Treasurer) 
• Dept. 
Internal 
Affairs, 
Toni 
Demetriou 
• NCSC, 
Mike 
Seddon 
• PwC, 
Adrian 
van 
Hest
The 
Way 
We 
Work 
• Members 
are 
nominated 
and 
vouched 
on 
• Traffic 
Light 
Protocol 
• Mee7ngs 
& 
Training 
• Working 
Groups 
• Mail 
list, 
Portal 
and 
Wiki 
• Fortnightly 
“Ops 
Call”
What 
has 
the 
NZITF 
done? 
• Coordina7ng 
technical 
training 
• Targeted 
Threat 
Workshop 
• Security 
Architecture 
training 
• Wireless 
Security 
Training 
course 
• Team 
Cymru 
Botnet 
Forensics 
• Honeynet 
Project 
and 
Shadowsever 
Botnet 
Defense/Offence 
courses 
• CSIRT 
introduc7on 
• Open 
Source 
Intelligence 
• Windows 
Reverse 
Engineering
NZITF 
Ini@a@ves 
• Some 
NZITF 
working 
groups: 
• CREST 
NZ 
• Cyber 
Exercising 
Framework 
• Botnet/Malware 
Data 
• Coordinated 
Disclosure 
Guidelines
Vulnerability 
Disclosure 
Example 
• Researcher finds potential flaw on MoJ 
website" 
• Researcher informs opposition MP" 
• Opposition give about 24hours notice and 
go to media" 
• Justice Minister responds:" 
“The ministry and I do not deal with hackers 
and we do not deal with burglars.”! 
Hon JUDITH COLLINS" 
"
Highlighted 
an 
issue 
in 
NZ 
• Report a security vulnerability to a New 
Zealand website - probably have a 50% 
chance of being reported to the Police" 
• The other 50% - spend a large amount 
of time trying to explain why it’s an issue" 
• Hence, while vulnerabilities are being 
found every day - they are never being 
reported or fixed
We 
had 
to 
do 
be^er! 
• NZITF 
WG 
draled 
‘Coordinated 
Disclosure 
Guidelines’ 
• Released 
for 
public 
consulta7on 
last 
year 
• Consulted 
at 
OWASP 
and 
Kiwicon 
in 
NZ 
• Final 
version 
will 
be 
released 
shortly 
• Hope 
that 
it 
will 
help 
improve 
‘maturity’ 
amongst 
website 
owners 
and 
businesses 
• NZRS 
has 
already 
adopted 
a 
great 
example
Recent 
‘Opera7onal’ 
Changes 
• Heartbleed 
Response 
• Lack 
of 
Gov’t 
or 
defini7ve 
advice 
• Used 
our 
members 
and 
their 
media 
people 
• Fortnightly 
‘OpsCalls’ 
– 
encouraging 
greater 
info 
sharing 
• Timely 
co-­‐ord 
and 
response 
to 
emerging 
threats 
• Prep 
work 
– 
group 
of 
volunteer 
“Coordinated 
Disclosure 
Handlers”
DNS 
Amplifica7on 
-­‐ 
Open 
Resolvers 
• Spark 
(NZ’s 
Largest 
ISP) 
affected 
across 
whole 
customer 
network 
• NZITF 
Follow 
up 
on 
‘Open 
Resolvers 
in 
NZ’ 
ongoing 
-­‐ 
Shadowserver 
repor7ng 
very 
useful
Q&A 
info@nzio.org.nz 
barry@dnc.org.nz
Improving 
the 
cyber 
security 
posture 
of 
New 
Zealand
CREST 
NZ 
• The 
NZITF 
set 
up 
working 
group 
to 
establish 
CREST 
NZ 
Council 
of 
Registered 
Ethical 
Security 
Testers 
• No 
professional 
voice 
or 
representa7on 
for 
the 
penetra7on 
tes7ng 
industry 
• Lack 
of 
educa7on 
and 
training 
courses 
• Skill 
set 
shortage 
in 
New 
Zealand 
• Growing 
interna7onal 
cer7fica7on 
• CREST 
Australia 
is 
now 
up 
and 
running
Cyber 
Exercising 
Framework 
• Exercising 
tests 
and 
improves 
the 
levels 
of 
preparedness 
for 
a 
significant 
cyber 
incident 
• Develop 
a 
framework 
and 
schedule 
for 
conduc7ng 
cyber 
exercises: 
• Communica7ons 
Checks 
• Scenario 
Discussions 
• Table 
Top 
Exercises 
(TTX) 
• Na7onal 
and 
Interna7onal 
Full 
Play 
Exercises
Botnet/Malware 
Data 
• Assess 
current 
NZ 
infec7on 
rates 
• Iden7fy 
data 
sources 
of 
botnet 
infec7ons 
& 
compromised 
New 
Zealand 
websites 
• Recommend 
poten7al 
mi7ga7ons 
that 
could 
be 
effec7ve 
in 
New 
Zealand 
and 
the 
stakeholders 
for 
each 
• Iden7fy 
possible 
technical 
and 
policy 
based 
mi7ga7ons

More Related Content

What's hot

Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
Cathy Dwyer
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Ontario Cloud SIG
 

What's hot (20)

ION Hangzhou - Keynote: Collaborative Security and an Open Internet
ION Hangzhou - Keynote: Collaborative Security and an Open InternetION Hangzhou - Keynote: Collaborative Security and an Open Internet
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
 
ION Malta - MANRS Introduction
ION Malta - MANRS IntroductionION Malta - MANRS Introduction
ION Malta - MANRS Introduction
 
ION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: FinlandION Malta - IPv6 Case Study: Finland
ION Malta - IPv6 Case Study: Finland
 
ION Malta - IETF Update
ION Malta - IETF UpdateION Malta - IETF Update
ION Malta - IETF Update
 
ION Malta - Opening Slides
ION Malta - Opening SlidesION Malta - Opening Slides
ION Malta - Opening Slides
 
PRFP-10: Cyber threats and security in the Pacific
PRFP-10: Cyber threats and security in the PacificPRFP-10: Cyber threats and security in the Pacific
PRFP-10: Cyber threats and security in the Pacific
 
ION Cape Town - Opening Remarks
ION Cape Town - Opening RemarksION Cape Town - Opening Remarks
ION Cape Town - Opening Remarks
 
Janet network DDoS experiences - Networkshop44
Janet network DDoS experiences - Networkshop44Janet network DDoS experiences - Networkshop44
Janet network DDoS experiences - Networkshop44
 
ION Hangzhou - Closing Remarks
ION Hangzhou - Closing RemarksION Hangzhou - Closing Remarks
ION Hangzhou - Closing Remarks
 
Campus Consortium EdTalks - Changing Trends in Higher-Ed With Stronger Cyber-...
Campus Consortium EdTalks - Changing Trends in Higher-Ed With Stronger Cyber-...Campus Consortium EdTalks - Changing Trends in Higher-Ed With Stronger Cyber-...
Campus Consortium EdTalks - Changing Trends in Higher-Ed With Stronger Cyber-...
 
DHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
DHPA Techday 2015 - Marc Gauw - Trusted Networks InitiativeDHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
DHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
 
ION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRSION Cape Town - Collective Responsibility for Routing Security and MANRS
ION Cape Town - Collective Responsibility for Routing Security and MANRS
 
ION Bangladesh - IETF Update
ION Bangladesh - IETF UpdateION Bangladesh - IETF Update
ION Bangladesh - IETF Update
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
ION Durban - MANRS Introduction
ION Durban - MANRS IntroductionION Durban - MANRS Introduction
ION Durban - MANRS Introduction
 
Internet of Things - how secure is it?
Internet of Things - how secure is it?Internet of Things - how secure is it?
Internet of Things - how secure is it?
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
 
Nvis, inc. 01 01-2021
Nvis, inc. 01 01-2021Nvis, inc. 01 01-2021
Nvis, inc. 01 01-2021
 

Viewers also liked (8)

El signo linguistico
El signo linguisticoEl signo linguistico
El signo linguistico
 
Bullying
BullyingBullying
Bullying
 
Internet - para comprender las TICs
Internet - para comprender las TICsInternet - para comprender las TICs
Internet - para comprender las TICs
 
P Integrador Mercabaratillo Envigado
P Integrador  Mercabaratillo EnvigadoP Integrador  Mercabaratillo Envigado
P Integrador Mercabaratillo Envigado
 
Haz Que Cuente
Haz Que CuenteHaz Que Cuente
Haz Que Cuente
 
Semiotica parte 1
Semiotica parte 1Semiotica parte 1
Semiotica parte 1
 
Fuentes 2010 e
Fuentes 2010 eFuentes 2010 e
Fuentes 2010 e
 
A arte
A arteA arte
A arte
 

Similar to The NZITF, a 'trust group’ of volunteers in a country with no National C, by Barry Brailey [APNIC 38 / Network Abuse BoF]

Guy Alfassi - CSA Conference Highlights
Guy Alfassi -  CSA Conference HighlightsGuy Alfassi -  CSA Conference Highlights
Guy Alfassi - CSA Conference Highlights
CSAIsrael
 
Phil Richards, Jisc the co-design approach and furture developments
Phil Richards, Jisc   the co-design approach and furture developmentsPhil Richards, Jisc   the co-design approach and furture developments
Phil Richards, Jisc the co-design approach and furture developments
JISC Regional Support Centre
 
01 internet peering-workshop-agenda
01 internet peering-workshop-agenda01 internet peering-workshop-agenda
01 internet peering-workshop-agenda
William Norton
 

Similar to The NZITF, a 'trust group’ of volunteers in a country with no National C, by Barry Brailey [APNIC 38 / Network Abuse BoF] (20)

ION Durban - Opening Slides
ION Durban - Opening SlidesION Durban - Opening Slides
ION Durban - Opening Slides
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
NZITF & The first 48hours of Heartbleed, by Barry Brailey [APNIC 38]
NZITF & The first 48hours of Heartbleed, by Barry Brailey [APNIC 38]NZITF & The first 48hours of Heartbleed, by Barry Brailey [APNIC 38]
NZITF & The first 48hours of Heartbleed, by Barry Brailey [APNIC 38]
 
ION Costa Rica Opening Slides
ION Costa Rica Opening SlidesION Costa Rica Opening Slides
ION Costa Rica Opening Slides
 
Guy Alfassi - CSA Conference Highlights
Guy Alfassi -  CSA Conference HighlightsGuy Alfassi -  CSA Conference Highlights
Guy Alfassi - CSA Conference Highlights
 
ION Trinidad and Tobago - Opening Slides
ION Trinidad and Tobago - Opening SlidesION Trinidad and Tobago - Opening Slides
ION Trinidad and Tobago - Opening Slides
 
The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016
 
South West Cyber Security Cluster Introduction
South West Cyber Security Cluster IntroductionSouth West Cyber Security Cluster Introduction
South West Cyber Security Cluster Introduction
 
Insider threat event presentation
Insider threat event presentationInsider threat event presentation
Insider threat event presentation
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloud
 
ION Sri Lanka - Opening Slides
ION Sri Lanka - Opening SlidesION Sri Lanka - Opening Slides
ION Sri Lanka - Opening Slides
 
ION Tokyo: Opening Slides, Chris Grundemann
ION Tokyo: Opening Slides, Chris GrundemannION Tokyo: Opening Slides, Chris Grundemann
ION Tokyo: Opening Slides, Chris Grundemann
 
ICANN 50: ICANN Security Stability and Resiliency Outreach
ICANN 50: ICANN Security Stability and Resiliency OutreachICANN 50: ICANN Security Stability and Resiliency Outreach
ICANN 50: ICANN Security Stability and Resiliency Outreach
 
Phil Richards, Jisc the co-design approach and furture developments
Phil Richards, Jisc   the co-design approach and furture developmentsPhil Richards, Jisc   the co-design approach and furture developments
Phil Richards, Jisc the co-design approach and furture developments
 
Building the things network in norfolk and suffolk
Building the things network in norfolk and suffolkBuilding the things network in norfolk and suffolk
Building the things network in norfolk and suffolk
 
Rachel Resume
Rachel ResumeRachel Resume
Rachel Resume
 
ION Santiago: Opening Slides
ION Santiago: Opening SlidesION Santiago: Opening Slides
ION Santiago: Opening Slides
 
01 internet peering-workshop-agenda
01 internet peering-workshop-agenda01 internet peering-workshop-agenda
01 internet peering-workshop-agenda
 
APAN 44: Security outreach at APNIC
APAN 44: Security outreach at APNICAPAN 44: Security outreach at APNIC
APAN 44: Security outreach at APNIC
 

More from APNIC

More from APNIC (20)

APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 

Recently uploaded

Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 

Recently uploaded (20)

Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 

The NZITF, a 'trust group’ of volunteers in a country with no National C, by Barry Brailey [APNIC 38 / Network Abuse BoF]

  • 1. New Zealand Internet Task Force Improving the cyber security posture of New Zealand Barry Brailey NZITF Chair
  • 2. Programme • Introduc7on • Background • The Birth of a Trust Group • Ongoing work • Q&A
  • 3. Who Am I? • Manager, Security Policy -­‐ .nz DNC • Chair – NZITF
  • 4. What is the NZITF? The New Zealand Internet Task Force is a non-­‐ profit with the mission of improving the cyber security posture of New Zealand It is a collabora@ve effort based on mutual trust of it’s members
  • 6. NZ is excellent for many reasons!
  • 7. NZ Gov’t Cyber Security…… • 2002 -­‐ Centre for Cri7cal Infrastructure Protec7on • 2011 – Cyber Security Strategy (fairly brief) • 2012 – Na7onal Cyber Security Centre
  • 8. The Security Landscape • The rise of ‘Worms and Trojans’ (Blaster, Welchia etc) • NASA & other ‘hacks’ • Estonia A^acks • Georgia A^acks • Ghostnet (Cyber espionage) • Conficker • Rise of the ‘Botnets’ • Stuxnet
  • 9. The Birth of a Trust Group • Following BTF7, Conficker Working Group and Cyber Storm II in 2008 the NZ Botnet Task Force was formed • Renamed NZITF early 2009 as the focus evolved and membership expanded
  • 10. Growing Up • Formally Incorporated in 2011 • Membership fee structure introduced • First adver7sed public event
  • 11. NZITF Board • .nz DNC, Barry Brailey (Chair) • Security Consultant, Laura Bell (Vice-­‐Chair) • Bank of New Zealand, Chester Holmes (Secretary) • Independent Consultant, Dean Pemberton (Treasurer) • Dept. Internal Affairs, Toni Demetriou • NCSC, Mike Seddon • PwC, Adrian van Hest
  • 12. The Way We Work • Members are nominated and vouched on • Traffic Light Protocol • Mee7ngs & Training • Working Groups • Mail list, Portal and Wiki • Fortnightly “Ops Call”
  • 13. What has the NZITF done? • Coordina7ng technical training • Targeted Threat Workshop • Security Architecture training • Wireless Security Training course • Team Cymru Botnet Forensics • Honeynet Project and Shadowsever Botnet Defense/Offence courses • CSIRT introduc7on • Open Source Intelligence • Windows Reverse Engineering
  • 14. NZITF Ini@a@ves • Some NZITF working groups: • CREST NZ • Cyber Exercising Framework • Botnet/Malware Data • Coordinated Disclosure Guidelines
  • 15. Vulnerability Disclosure Example • Researcher finds potential flaw on MoJ website" • Researcher informs opposition MP" • Opposition give about 24hours notice and go to media" • Justice Minister responds:" “The ministry and I do not deal with hackers and we do not deal with burglars.”! Hon JUDITH COLLINS" "
  • 16. Highlighted an issue in NZ • Report a security vulnerability to a New Zealand website - probably have a 50% chance of being reported to the Police" • The other 50% - spend a large amount of time trying to explain why it’s an issue" • Hence, while vulnerabilities are being found every day - they are never being reported or fixed
  • 17. We had to do be^er! • NZITF WG draled ‘Coordinated Disclosure Guidelines’ • Released for public consulta7on last year • Consulted at OWASP and Kiwicon in NZ • Final version will be released shortly • Hope that it will help improve ‘maturity’ amongst website owners and businesses • NZRS has already adopted a great example
  • 18. Recent ‘Opera7onal’ Changes • Heartbleed Response • Lack of Gov’t or defini7ve advice • Used our members and their media people • Fortnightly ‘OpsCalls’ – encouraging greater info sharing • Timely co-­‐ord and response to emerging threats • Prep work – group of volunteer “Coordinated Disclosure Handlers”
  • 19. DNS Amplifica7on -­‐ Open Resolvers • Spark (NZ’s Largest ISP) affected across whole customer network • NZITF Follow up on ‘Open Resolvers in NZ’ ongoing -­‐ Shadowserver repor7ng very useful
  • 21. Improving the cyber security posture of New Zealand
  • 22. CREST NZ • The NZITF set up working group to establish CREST NZ Council of Registered Ethical Security Testers • No professional voice or representa7on for the penetra7on tes7ng industry • Lack of educa7on and training courses • Skill set shortage in New Zealand • Growing interna7onal cer7fica7on • CREST Australia is now up and running
  • 23. Cyber Exercising Framework • Exercising tests and improves the levels of preparedness for a significant cyber incident • Develop a framework and schedule for conduc7ng cyber exercises: • Communica7ons Checks • Scenario Discussions • Table Top Exercises (TTX) • Na7onal and Interna7onal Full Play Exercises
  • 24. Botnet/Malware Data • Assess current NZ infec7on rates • Iden7fy data sources of botnet infec7ons & compromised New Zealand websites • Recommend poten7al mi7ga7ons that could be effec7ve in New Zealand and the stakeholders for each • Iden7fy possible technical and policy based mi7ga7ons