cyber

Cybersecurity in the Commonwealth: Building the Foundations of Effective National Responses in the Caribbean

Invitation Only Research Event

8 March 2019 - 9:00am to 5:30pm

Bridgetown, Barbados

Event participants

Joyce Hakmeh, Cyber Research Fellow, International Security Department, Chatham House

This workshop is the second in a series in the 'Implementing the Commonwealth Cybersecurity Agenda' project. The workshop aims to provide a multi-stakeholder pan-Commonwealth platform to discuss how to take the implementation of the 'Commonwealth Cyber Declaration' forward with a focus on the second pillar of the declaration – building the foundations of an effective national cybersecurity response with eight action points. 

As such, the workshop gathers different project implementers under the UK Foreign and Commonwealth Office’s Cyber Programme, in addition to other key relevant stakeholders from the global level, to explore ongoing initiatives which aim to deliver one or more of pillar two’s action points.

The workshop addresses issues from a global perspective and a Commonwealth perspective and will include presentations from selected partners from different Commonwealth countries.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




cyber

Cyber Insurance for Civil Nuclear Facilities: Risks and Opportunities

8 May 2019

This paper sets out a roadmap for how organizations in the civil nuclear sector can explore their options and review their cyber risk exposure.

Éireann Leverett

Senior Risk Researcher, University of Cambridge

GettyImages-667179424.jpg

The control room inside the Paks nuclear power plant in Hungary, 10 April 2017. Photo: Getty Images
  • Civil nuclear facilities and organizations hold sensitive information on security clearances, national security, health and safety, nuclear regulatory issues and international inspection obligations. The sensitivity and variety of such data mean that products tailored for insuring the civil nuclear industry have evolved independently and are likely to continue to do so.
  • ‘Air-gaps’ – measures designed to isolate computer systems from the internet – need to be continually maintained for industrial systems. Yet years of evidence indicate that proper maintenance of such protections is often lacking (mainly because very real economic drivers exist that push users towards keeping infrastructure connected). Indeed, even when air-gaps are maintained, security breaches can still occur.
  • Even if a particular organization has staff that are highly trained, ready and capable of handling a technological accident, hacking attack or incidence of insider sabotage, it still has to do business and/or communicate with other organizations that may not have the essentials of cybersecurity in place.
  • Regardless of whether the choice is made to buy external insurance or put aside revenues in preparation for costly incidents, the approach to cyber risk calculation should be the same. Prevention is one part of the equation, but an organization will also need to consider the resources and contingency measures available to it should prevention strategies fail. Can it balance the likelihood of a hacker’s success against the maximum cost to the organization, and put aside enough capital and manpower to get it through a crisis?
  • All civil nuclear facilities should consider the establishment of computer security incident response (CSIR) teams as a relevant concern, if such arrangements are not already in place. The existence of a CSIR team will be a prerequisite for any facility seeking to obtain civil nuclear cyber insurance.
  • Preventing attacks such as those involving phishing and ransomware requires good cyber hygiene practices throughout the workforce. Reducing an organization’s ‘time to recovery’ takes training and dedication. Practising the necessary tasks in crisis simulations greatly reduces the likelihood of friction and the potential for error in a crisis.




cyber

Understanding Cybercrime for Better Policing: Regional and Global Challenges

Research Event

18 June 2019 - 9:00am to 5:30pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

In recent years, cybercrime has evolved from a niche technological concern into a prominent global issue with substantial preventative and remedial costs for businesses and governments alike. Despite heavy investment in sophisticated cybersecurity measures and the adoption of several legal, organizational and capacity-building measures, cybercrime remains a major threat which is evolving on a daily basis. Today’s cybercrime is more aggressive, more complex, more organized and – importantly – more unpredictable than ever before.

The challenges posed by cybercrime are experienced acutely by countries undergoing digital transformations: as the level of connectivity rises, so too does the potential for online theft, fraud and abuse. Cybercrime is pervasive but governments can work to limit its impact by creating a resilient overall economy and robust institution, and appropriately equipping law enforcement and the justice system to navigate its novel challenges.

To advance the discourse surrounding these issues, this workshop will assess the current cyber threat landscape and how it is evolving. It will identify the main obstacles encountered by law enforcement, the judiciary and prosecutors in their fight against cybercrime. It will also compare national, regional and global approaches that countries can use to effectively curb cybercrime and tackle its emerging challenges.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




cyber

Cybersecurity of NATO’s Space-based Strategic Assets

1 July 2019

Almost all modern military engagements rely on space-based assets, but cyber vulnerabilities can undermine confidence in the performance of strategic systems. This paper will evaluate the threats, vulnerabilities and consequences of cyber risks to strategic systems.

Dr Beyza Unal

Senior Research Fellow, International Security Programme

2019-06-25-Space-Cybersecurity.jpg

The radar domes of RAF Menwith Hill, reported to be the biggest spy base in the world, dominate the skyline on 30 October 2007 in Harrogate, UK. Photo: Getty Images

Summary

  • All satellites depend on cyber technology including software, hardware and other digital components. Any threat to a satellite’s control system or available bandwidth poses a direct challenge to national critical assets.
  • NATO’s missions and operations are conducted in the air, land, cyber and maritime domains. Space-based architecture is fundamental to the provision of data and services in each of these contexts. The critical dependency on space has resulted in new cyber risks that disproportionately affect mission assurance. Investing in mitigation measures and in the resilience of space systems for the military is key to achieving protection in all domains.
  • Almost all modern military engagements rely on space-based assets. During the US-led invasion of Iraq in 2003, 68 per cent of US munitions were guided utilizing space-based means (including laser-, infrared- and satellite-guided munitions); up sharply from 10 per cent in 1990–91, during the first Gulf war. In 2001, 60 per cent of the weapons used by the US in Afghanistan were precision-guided munitions, many of which had the capability to use information provided by space-based assets to correct their own positioning to hit a target.
  • NATO does not own satellites. It owns and operates a few terrestrial elements, such as satellite communications anchor stations and terminals. It requests access to products and services – such as space weather reports and satellite overflight reports provided via satellite reconnaissance advance notice systems – but does not have direct access to satellites: it is up to individual NATO member states to determine whether they allow access.
  • Cyber vulnerabilities undermine confidence in the performance of strategic systems. As a result, rising uncertainty in information and analysis continues to impact the credibility of deterrence and strategic stability. Loss of trust in technology also has implications for determining the source of a malicious attack (attribution), strategic calculus in crisis decision-making and may increase the risk of misperception.




cyber

The Destabilizing Danger of Cyberattacks on Missile Systems

2 July 2019

Dr Patricia Lewis

Research Director, Conflict, Science & Transformation; Director, International Security Programme

Dr Beyza Unal

Senior Research Fellow, International Security Programme
‘Left-of-launch’ attacks that aim to disable enemy missile systems may increase the chance of them being used, not least because the systems are so vulnerable.

2019-07-02-NKMissile.jpg

This undated photo released by North Korea's news agency in March 2017 shows the launch of four ballistic missiles during a military drill at an undisclosed location in North Korea. Photo: STR/AFP/Getty Images.

After President Trump decided to halt a missile attack on Iran in response to the downing of a US drone, it was revealed that the US had conducted cyberattacks on Iranian weapons systems to prevent Iran launching missiles against US assets in the region.

This ‘left-of-launch’ strategy – the pre-emptive action to prevent an adversary launch missiles – has been part of the US missile defence strategy for some time now. President George W Bush asked the US military and intelligence community to infiltrate the supply chain of North Korean missiles. It was claimed that the US hacked the North Korean ballistic missile programme, causing a failed ballistic missile test, in 2012.

It was not clear then – or now – whether these ‘left-of-launch’ cyberattacks aimed at North Korea were successful as described or whether they were primarily a bluff. But that is somewhat irrelevant; the belief in the possibility and the understanding of the potential impact of such cyber capabilities undermines North Korean or Iranian confidence in their abilities to launch their missiles. In times of conflict, loss of confidence in weapons systems may lead to escalation.

In other words, the adversary may be left with no option but to take the chance to use these missiles or to lose them in a conflict setting. ‘Left of launch’ is a dangerous game. If it is based on a bluff, it could be called upon and lead to deterrence failure. If it is based on real action, then it could create an asymmetrical power struggle. If the attacker establishes false confidence in the power of a cyber weapon, then it might lead to false signalling and messaging.

This is the new normal. The cat-and-mouse game has to be taken seriously, not least because missile systems are so vulnerable.

There are several ways an offensive cyber operation against missile systems might work. These include exploiting missile designs, altering software or hardware, or creating clandestine pathways to the missile command and control systems.

They can also be attacked in space, targeting space assets and their link to strategic systems.

Most missile systems rely, at least in part, on digital information that comes from or via space-based or space-dependent assets such as: communication satellites; satellites that provide position, navigation and timing (PNT) information (for example GPS or Galileo); weather satellites to help predict flight paths, accurate targeting and launch conditions; and remote imagery satellites to assist with information and intelligence for the planning and targeting.

Missile launches themselves depend on 1) the command and control systems of the missiles, 2) the way in which information is transmitted to the missile launch facilities and 3) the way in which information is transmitted to the missiles themselves in flight. All these aspects rely on space technology.

In addition, the ground stations that transmit and receive data to and from satellites are also vulnerable to cyberattack – either through their known and unknown internet connectivity or through malicious use of flash drives that contain a deliberate cyber infection.

Non-space-based communications systems that use cable and ground-to-air-to-ground masts are likewise under threat from cyberattacks that find their way in via internet connectivity, proximity interference or memory sticks. Human error in introducing connectivity via phones, laptops and external drives, and in clicking on malicious links in sophisticated phishing lures, is common in facilitating inadvertent connectivity and malware infection.

All of these can create a military capacity able to interfere with missile launches. Malware might have been sitting on the missile command and control system for months or even years, remaining inactivated until a chosen time or by a trigger that sets in motion a disruption either to the launch or to the flight path of the missile. The country that launches the missile that either fails to launch or fails to reach the target may never know if this was the result of a design flaw, a common malfunction or a deliberate cyberattack.

States with these capabilities must exercise caution: cyber offence manoeuvres may prevent the launch of missile attacks against US assets in the Middle East or in the Pacific regions, but they may also interfere with US missile launches in the future. Even, as has recently been revealed, US cyber weapons targeting an adversary may blow back and inadvertently infect US systems. Nobody is invulnerable.




cyber

Cybersecurity by Design in Civil Nuclear Power Plants

24 July 2019

Cyberattacks are increasingly challenging critical national infrastructure. This paper considers the security by design approach for civil nuclear power plants and analyses areas of risk and opportunities for the nuclear industry.

Dr Beyza Unal

Senior Research Fellow, International Security Programme

Roger Brunt

Managing Director, Grosmont Howe Ltd

2019-07-24-NuclearPlant.jpg

An employee climbs into the cooling tower of the third and fourth unit at Mochovce nuclear power plant in Slovakia on 2 July 2019. Photo: Getty Images

Summary

  • The application of ‘security by design’ in nuclear new builds could provide operators with the opportunity to establish a robust and resilient security architecture at the beginning of a nuclear power plant’s life cycle. This will enhance the protection of the plant and reduce the need for costly security improvements during its operating life.
  • Security by design cannot fully protect a nuclear power plant from rapidly evolving cyberattacks, which expose previously unsuspected or unknown vulnerabilities.
  • Careful design of security systems and architecture can – and should – achieve levels of protection that exceed current norms and expectations. However, the sourcing of components from a global supply chain means that the integrity of even the most skilfully designed security regime cannot be guaranteed without exhaustive checks of its components.
  • Security by design may well include a requirement for a technical support organization to conduct quality assurance of cyber defences and practices, and this regime should be endorsed by a facility’s executive board and continued at regular intervals after the new build facility has been commissioned.
  • Given the years it takes to design, plan and build a new nuclear power plant, it is important to recognize that from the point of ‘design freeze’ onwards, the operator will be building in vulnerabilities, as technology continues to evolve rapidly while construction fails to keep pace with it. Security by design cannot be a panacea, but it is an important factor in the establishment of a robust nuclear security – and cybersecurity – culture.




cyber

Cyber Governance in the Commonwealth: Towards Stability and Responsible State Behaviour in Cyberspace

Invitation Only Research Event

7 October 2019 - 10:30am to 5:30pm

Addis Ababa, Ethiopia

This roundtable is part of a series under the project, 'Implementing the Commonwealth Cybersecurity Agenda', funded by the UK Foreign and Commonwealth Office (FCO). The roundtable aims to provide a multi-stakeholder, pan-Commonwealth platform to discuss how to implement the Commonwealth Cyber Declaration with a focus on its third pillar 'To promote stability in cyberspace through international cooperation'.

In particular, the roundtable focuses on points 3 and 4 of the third pillar which revolve around the commitment to promote frameworks for stability in cyberspace including the applicability of international law, agreed voluntary norms of responsible state behaviour and the development and implementation of confidence-building measures consistent with the 2015 report of the UNGGE. 

The workshop also focuses on the commitment to advance discussions on how existing international law, including the Charter of the United Nations and applicable international humanitarian law, applies in cyberspace.

The roundtable addresses the issue of global cyber governance from a Commonwealth perspective and will also include a discussion around the way forward, the needed capacity of the different Commonwealth countries and the cooperation between its members for better cyber governance.

Participants include UNGGE members from Commonwealth countries in addition to representatives to the UN Open-Ended Working Group from African countries as well as members from academia, civil society and industry.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




cyber

Examining Measures to Mitigate Cyber Vulnerabilities of Space-based Strategic Assets

Invitation Only Research Event

30 October 2019 - 9:30am to 4:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Beyza Unal, Senior Research Fellow, International Security Department, Chatham House
Patricia Lewis, Research Director, International Security Department, Chatham House

Strategic systems that depend on space-based assets, such as command, control and communication, early warning systems, weapons systems and weapons platforms, are essential for conducting successful NATO operations and missions. Given the increasing dependency on such systems, the alliance and key member states would therefore benefit from an in-depth analysis of possible mitigation and resilience measures.

This workshop is part of the International Security Department’s (ISD) project on space security and the vulnerability of strategic assets to cyberattacks, which includes a recently published report. This project aims to create resilience in NATO and key NATO member states, building the capacity of key policymakers and stakeholders to respond with effective policies and procedures. This workshop will focus on measures to mitigate the cyber vulnerabilities of NATO’s space-dependent strategic assets. Moreover, participants will discuss the type of resilience measures and mechanisms required.

Attendance at this event is by invitation only. 

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




cyber

The Commonwealth Cyber Declaration: Achievements and Way Forward

Invitation Only Research Event

4 February 2020 - 9:15am to 5:30pm

Chatham House, London

In April 2018, the Commonwealth Heads of Government Meeting (CHOGM), held in London, saw the creation and the adoption of the Commonwealth Cyber Declaration. The declaration outlines the framework for a concerted effort to advance cybersecurity practices to promote a safe and prosperous cyberspace for Commonwealth citizens, businesses and societies. 

The conference will aim to provide an overview on the progress made on cybersecurity in the Commonwealth since the declaration was announced in 2018. In addition, it will examine future challenges and potential solutions going forward.

This conference is part of the International Security Programme's project on Implementing the Commonwealth Cybersecurity Agenda and will convene a range of senior Commonwealth representatives as well as a selection of civil society and industry stakeholders. This project aims to develop a pan-Commonwealth platform to take the Commonwealth Cyber Declaration forward by means of a holistic, inclusive and representative approach.

Please see below meeting summaries from previous events on Cybersecurity in the Commonwealth:  

Attendance at this event is by invitation only. 

Esther Naylor

Research Assistant, International Security Programme
+44 (0)20 7314 3628




cyber

POSTPONED: Working Towards Cyber Resilience in the GCC: Opportunities and Challenges

Invitation Only Research Event

12 March 2020 - 9:00am to 5:00pm

Muscat, Oman

The GCC states have invested significantly in cybersecurity and have made large strides in protecting governments, businesses and individuals from cyber threats, with the aim of delivering on their ambitious national strategies and future visions. However, several challenges to cybersecurity and cyber resilience in the region persist, putting those ambitious plans at risk.

These challenges include the uneven nature of cybersecurity protections, the incomplete implementation of cybersecurity strategies and regulations, and the issues around international cooperation. Such challenges mean that GCC states need to focus on the more difficult task of cyber resilience, in addition to the simpler initial stages of cybersecurity capacity-building, to ensure they harness the true potential of digital technologies and mitigate associated threats.

Set against this background, this workshop will explore opportunities and challenges to cyber resilience in the GCC focusing on four main pillars:

1. Cyber resilience: in concept and in practice
2. Building an effective cybersecurity capacity
3. The potential of regional and international cooperation to cyber resilience
4. Deterrence and disruption: different approaches

This event will be held in collaboration with the Arab Regional Cybersecurity Centre (ARCC) and OMAN CERT.

PLEASE NOTE THIS EVENT IS POSTPONED UNTIL FURTHER NOTICE. 

Event attributes

Chatham House Rule

Esther Naylor

Research Assistant, International Security Programme
+44 (0)20 7314 3628




cyber

Cyber Security and Nuclear Weapons

This project aims to improve resilience in NATO’s nuclear weapons systems against cyber threats.

Cyber security is a vital part of the national and international strategic infrastructure and weapons systems. The increasing cyber capabilities of countries such as China, Russia and North Korea put the North Atlantic Treaty Organization’s (NATO’s) nuclear systems - capabilities that include nuclear command, control and communication, weapons systems and early warning systems - in danger.

There is an urgent need to study and address cyber challenges to nuclear assets within NATO and in key NATO countries. Greater awareness of the potential threats and vulnerabilities is key to improving preparedness and mitigating the risks of a cyber-attack on NATO nuclear weapons systems.

Chatham House produces research responding to the need for information on enhancing cybersecurity for command, control and communications. This project constitutes the beginning of the second phase of the Cyber Security of Nuclear Weapons Systems: Threats, Vulnerabilities and Consequences, a report published in January 2018 in partnership with the Stanley Foundation.

The project responds to the need both for more public information on cyber risks in NATO’s nuclear mission, and to provide policy-driven research to shape and inform nuclear policy within NATO member states and the Nuclear Planning Group.

This project is supported by the Ploughshares Fund and the Stanley Foundation.




cyber

Is the GCC Cyber Resilient?

9 March 2020

How would the states of the Gulf Cooperation Council (GCC) respond to a serious cyber incident? This could be a global ransomware event, a critical infrastructure incident targeted at the energy sector, or an attack on government departments. This paper examines cyber resilience in the states of the GCC. 

Joyce Hakmeh

Senior Research Fellow, International Security Programme; Co-Editor, Journal of Cyber Policy

James Shires

Assistant Professor at the Institute for Security and Global Affairs, University of Leiden

GettyImages-1052280468.jpg

Saudi nationals attend the Gitex 2018 exhibition at the Dubai World Trade Center in Dubai on 16 October 2018. Photo: Getty Images.

Summary

  • GCC states seek to be leaders in digital innovation, but this leaves them vulnerable to an increasing range of cyberthreats. Governments have invested significantly in cybersecurity but these measures have been unevenly implemented, makingit difficult for these states to be resilient against a large-scale cyber incident.
  • Strategies, structures and processes (‘approaches’) for achieving cyber resilience can be conceptualized along a scale from centralized to distributed: centralized approaches maintain decision-making power in a single body, while distributed ones disperse power over many sites.
  • Centralized approaches provide more resilience against unwanted influence, while distributed approaches provide more resilience against intrusions into infrastructure. The GCC states have so far prioritized centralized over distributed cyber resilience, seeking internet and social media control over sustainable network recovery.
  • GCC governments should make a sustainable commitment to cyber resilience that provides clear guidance to organizations and makes best use of emerging cybersecurity structures. This may involve further engagement with international initiatives and partners to increase cyber resilience.
  • Given limited resources, GCC governments should rebalance their efforts from centralized towards distributed approaches to resilience.
  • GCC governments should examine the impact of relevant new technologies, discussing openly the risks of these technologies and appropriate solutions.




cyber

Supporting NHS Cybersecurity During COVID-19 is Vital

2 April 2020

Joyce Hakmeh

Senior Research Fellow, International Security Programme; Co-Editor, Journal of Cyber Policy
The current crisis is an opportunity for the UK government to show agility in how it deals with cyber threats and how it cooperates with the private sector in creating cyber resilience.

2020-04-02-NHS-nurse-tech-cyber

Nurse uses a wireless electronic tablet to order medicines from the pharmacy at The Queen Elizabeth Hospital, Birmingham, England. Photo by Christopher Furlong/Getty Images.

The World Health Organization, US Department of Health and Human Services, and hospitals in Spain, France and the Czech Republic have all suffered cyberattacks during the ongoing COVID-19 crisis.

In the Czech Republic, a successful attack targeted a hospital with one of the country’s biggest COVID-19 testing laboratories, forcing its entire IT network to shut down, urgent surgical operations to be rescheduled, and patients to be moved to nearby hospitals. The attack also delayed dozens of COVID-19 test results and affected the hospital’s data transfer and storage, affecting the healthcare the hospital could provide.

In the UK, the National Health Service (NHS) is already in crisis mode, focused on providing beds and ventilators to respond to one of the largest peacetime threats ever faced. But supporting the health sector goes beyond increasing human resources and equipment capacity.

Health services ill-prepared

Cybersecurity support, both at organizational and individual level, is critical so health professionals can carry on saving lives, safely and securely. Yet this support is currently missing and the health services may be ill-prepared to deal with the aftermath of potential cyberattacks.

When the NHS was hit by the Wannacry ransomware attack in 2017 - one of the largest cyberattacks the UK has witnessed to date – it caused massive disruption, with at least 80 of the 236 trusts across England affected and thousands of appointments and operations cancelled. Fortunately, a ‘kill-switch’ activated by a cybersecurity researcher quickly brought it to a halt.

But the UK’s National Cyber Security Centre (NCSC), has been warning for some time against a cyber attack targeting national critical infrastructure sectors, including the health sector. A similar attack, known as category one (C1) attack, could cripple the UK with devastating consequences. It could happen and we should be prepared.

Although the NHS has taken measures since Wannacry to improve cybersecurity, its enormous IT networks, legacy equipment and the overlap between the operational and information technology (OT/IT) does mean mitigating current potential threats are beyond its ability.

And the threats have radically increased. More NHS staff with access to critical systems and patient health records are increasingly working remotely. The NHS has also extended its physical presence with new premises, such as the Nightingale hospital, potentially the largest temporary hospital in the world.

Radical change frequently means proper cybersecurity protocols are not put in place. Even existing cybersecurity processes had to be side-stepped because of the outbreak, such as the decision by NHS Digital to delay its annual cybersecurity audit until September. During this audit, health and care organizations submit data security and protection toolkits to regulators setting out their cybersecurity and cyber resilience levels.

The decision to delay was made to allow the NHS organizations to focus capacity on responding to COVID-19, but cybersecurity was highlighted as a high risk, and the importance of NHS and Social Care remaining resilient to cyberattacks was stressed.

The NHS is stretched to breaking point. Expecting it to be on top of its cybersecurity during these exceptionally challenging times is unrealistic, and could actually add to the existing risk.

Now is the time where new partnerships and support models should be emerging to support the NHS and help build its resilience. Now is the time where innovative public-private partnerships on cybersecurity should be formed.

Similar to the economic package from the UK chancellor and innovative thinking on ventilator production, the government should oversee a scheme calling on the large cybersecurity capacity within the private sector to step in and assist the NHS. This support can be delivered in many different ways, but it must be mobilized swiftly.

The NCSC for instance has led the formation of the Cyber Security Information Sharing Partnership (CiSP)— a joint industry and UK government initiative to exchange cyber threat information confidentially in real time with the aim of reducing the impact of cyberattacks on UK businesses.

CiSP comprises organizations vetted by NCSC which go through a membership process before being able to join. These members could conduct cybersecurity assessment and penetration testing for NHS organizations, retrospectively assisting in implementing key security controls which may have been overlooked.

They can also help by making sure NHS remote access systems are fully patched and advising on sensible security systems and approved solutions. They can identify critical OT and legacy systems and advise on their security.

The NCSC should continue working with the NHS to enhance provision of public comprehensive guidance on cyber defence and response to potential attack. This would show they are on top of the situation, projecting confidence and reassurance.

It is often said in every crisis lies an opportunity. This is an opportunity for the UK government to show agility in how it deals with cyber threats and how it cooperates with the private sector in creating cyber resilience.

It is an opportunity to lead a much-needed cultural change showing cybersecurity should never be an afterthought.




cyber

Is the GCC Cyber Resilient?

9 March 2020

How would the states of the Gulf Cooperation Council (GCC) respond to a serious cyber incident? This could be a global ransomware event, a critical infrastructure incident targeted at the energy sector, or an attack on government departments. This paper examines cyber resilience in the states of the GCC. 

Joyce Hakmeh

Senior Research Fellow, International Security Programme; Co-Editor, Journal of Cyber Policy

James Shires

Assistant Professor at the Institute for Security and Global Affairs, University of Leiden

GettyImages-1052280468.jpg

Saudi nationals attend the Gitex 2018 exhibition at the Dubai World Trade Center in Dubai on 16 October 2018. Photo: Getty Images.

Summary

  • GCC states seek to be leaders in digital innovation, but this leaves them vulnerable to an increasing range of cyberthreats. Governments have invested significantly in cybersecurity but these measures have been unevenly implemented, makingit difficult for these states to be resilient against a large-scale cyber incident.
  • Strategies, structures and processes (‘approaches’) for achieving cyber resilience can be conceptualized along a scale from centralized to distributed: centralized approaches maintain decision-making power in a single body, while distributed ones disperse power over many sites.
  • Centralized approaches provide more resilience against unwanted influence, while distributed approaches provide more resilience against intrusions into infrastructure. The GCC states have so far prioritized centralized over distributed cyber resilience, seeking internet and social media control over sustainable network recovery.
  • GCC governments should make a sustainable commitment to cyber resilience that provides clear guidance to organizations and makes best use of emerging cybersecurity structures. This may involve further engagement with international initiatives and partners to increase cyber resilience.
  • Given limited resources, GCC governments should rebalance their efforts from centralized towards distributed approaches to resilience.
  • GCC governments should examine the impact of relevant new technologies, discussing openly the risks of these technologies and appropriate solutions.




cyber

Cyber security expert issues dire warning over vulnerability of key infrastructure

Data theft and cybercrime is a major source of funding for Islamic State which is likely to have secretly planted insiders "around the world" in positions where critical data could be extracted and exploited, a leading cyber security expert has warned.




cyber

Cyber thieves target tax time

Tens of thousands of taxpayers forced to wait for refunds amid suspicion of identity theft.




cyber

Australia vulnerable to a cyber-attack disaster

Australian government agencies and organisations are increasingly vulnerable to a major cyber attack yet security has not evolved in more than 20 years, according to an international cybercrime expert.




cyber

New website allows youth to report cyber bullying at ACT libraries

A new pilot website will also make it easier for material to be taken off the internet.




cyber

Recruitment drive for cyber security specialists will bring challenges for government

Fear government's cyber security recruitment drive will lead to job cuts.




cyber

Government agencies name cybercrime as their top fraud risk: PwC

The 'typical' corrupt bureaucrat is a male, university-educated middle manager, aged 41 to 50.




cyber

Call for a cyber security reserve corps to help fight major attacks

Experienced volunteers would help fight major online threats to governments, private industry and civil institutions.




cyber

ATO fumes after cyber criminals attack myGov portal during last days of Tax Time 2016

Tensions emerge between Tax Office and Human Services after hackers take down myGov




cyber

How federal government departments are protecting Australians' data against cyber hack

Cyber Security Minister Dan Tehan says the government can't rule out vulnerabilities to cyber threats.




cyber

Australia's Cyber Security Strategy: weaknesses, yes, but we're improving

The online world changes so fast it was always going to be tough to design a four-year strategy.




cyber

Cyber security threat: Is Australia's power grid safe from hackers?

Cyber attacks have labelled the number one threat to power and utility companies worldwide, a new EY report has found.




cyber

Episode 39 - The Internet of Digital Condoms (IoDC) Microsoft Teams, cyber security & InsurTech

With regular host Matt Egan off ill, David Price steps in to discuss Microsoft Teams, the government's 'new' cyber security strategy and the collision of social media and insurance companies. First up, producer Chris is on to discuss Microsoft's recent Slack rival Microsoft Teams and wether it can win the market. Then Scott Carey, online editor at Computerworld UK, talks about the government's newest strategy for taking on cyber crime. Then Charlotte Jee, editor of Techworld, talks about UK insurer Admiral's misjudged attempt to use Facebook posts to offer discounts on insurance premiums.  


See acast.com/privacy for privacy and opt-out information.




cyber

Episode 74 - The Internet of KRACK (IoK) Wi-Fi flaws, Pixel 2 and Facebook vs cyberbullying

David Price is back to host this week, with Christina Mercer breaking down what all the fuss about KRACK is and why you should take precautions with your Wi-Fi. Henry Burrell reviewed the Google Pixel 2 this week so gives us his thoughts on the device. You might want to avoid the larger XL though. We then discuss Facebook's idea to counterattack cyberbullying. Charlotte Jee recently spoke with the company to see what they are doing, but will it work?  


See acast.com/privacy for privacy and opt-out information.




cyber

Supporting NHS Cybersecurity During COVID-19 is Vital

2 April 2020

Joyce Hakmeh

Senior Research Fellow, International Security Programme; Co-Editor, Journal of Cyber Policy
The current crisis is an opportunity for the UK government to show agility in how it deals with cyber threats and how it cooperates with the private sector in creating cyber resilience.

2020-04-02-NHS-nurse-tech-cyber

Nurse uses a wireless electronic tablet to order medicines from the pharmacy at The Queen Elizabeth Hospital, Birmingham, England. Photo by Christopher Furlong/Getty Images.

The World Health Organization, US Department of Health and Human Services, and hospitals in Spain, France and the Czech Republic have all suffered cyberattacks during the ongoing COVID-19 crisis.

In the Czech Republic, a successful attack targeted a hospital with one of the country’s biggest COVID-19 testing laboratories, forcing its entire IT network to shut down, urgent surgical operations to be rescheduled, and patients to be moved to nearby hospitals. The attack also delayed dozens of COVID-19 test results and affected the hospital’s data transfer and storage, affecting the healthcare the hospital could provide.

In the UK, the National Health Service (NHS) is already in crisis mode, focused on providing beds and ventilators to respond to one of the largest peacetime threats ever faced. But supporting the health sector goes beyond increasing human resources and equipment capacity.

Health services ill-prepared

Cybersecurity support, both at organizational and individual level, is critical so health professionals can carry on saving lives, safely and securely. Yet this support is currently missing and the health services may be ill-prepared to deal with the aftermath of potential cyberattacks.

When the NHS was hit by the Wannacry ransomware attack in 2017 - one of the largest cyberattacks the UK has witnessed to date – it caused massive disruption, with at least 80 of the 236 trusts across England affected and thousands of appointments and operations cancelled. Fortunately, a ‘kill-switch’ activated by a cybersecurity researcher quickly brought it to a halt.

But the UK’s National Cyber Security Centre (NCSC), has been warning for some time against a cyber attack targeting national critical infrastructure sectors, including the health sector. A similar attack, known as category one (C1) attack, could cripple the UK with devastating consequences. It could happen and we should be prepared.

Although the NHS has taken measures since Wannacry to improve cybersecurity, its enormous IT networks, legacy equipment and the overlap between the operational and information technology (OT/IT) does mean mitigating current potential threats are beyond its ability.

And the threats have radically increased. More NHS staff with access to critical systems and patient health records are increasingly working remotely. The NHS has also extended its physical presence with new premises, such as the Nightingale hospital, potentially the largest temporary hospital in the world.

Radical change frequently means proper cybersecurity protocols are not put in place. Even existing cybersecurity processes had to be side-stepped because of the outbreak, such as the decision by NHS Digital to delay its annual cybersecurity audit until September. During this audit, health and care organizations submit data security and protection toolkits to regulators setting out their cybersecurity and cyber resilience levels.

The decision to delay was made to allow the NHS organizations to focus capacity on responding to COVID-19, but cybersecurity was highlighted as a high risk, and the importance of NHS and Social Care remaining resilient to cyberattacks was stressed.

The NHS is stretched to breaking point. Expecting it to be on top of its cybersecurity during these exceptionally challenging times is unrealistic, and could actually add to the existing risk.

Now is the time where new partnerships and support models should be emerging to support the NHS and help build its resilience. Now is the time where innovative public-private partnerships on cybersecurity should be formed.

Similar to the economic package from the UK chancellor and innovative thinking on ventilator production, the government should oversee a scheme calling on the large cybersecurity capacity within the private sector to step in and assist the NHS. This support can be delivered in many different ways, but it must be mobilized swiftly.

The NCSC for instance has led the formation of the Cyber Security Information Sharing Partnership (CiSP)— a joint industry and UK government initiative to exchange cyber threat information confidentially in real time with the aim of reducing the impact of cyberattacks on UK businesses.

CiSP comprises organizations vetted by NCSC which go through a membership process before being able to join. These members could conduct cybersecurity assessment and penetration testing for NHS organizations, retrospectively assisting in implementing key security controls which may have been overlooked.

They can also help by making sure NHS remote access systems are fully patched and advising on sensible security systems and approved solutions. They can identify critical OT and legacy systems and advise on their security.

The NCSC should continue working with the NHS to enhance provision of public comprehensive guidance on cyber defence and response to potential attack. This would show they are on top of the situation, projecting confidence and reassurance.

It is often said in every crisis lies an opportunity. This is an opportunity for the UK government to show agility in how it deals with cyber threats and how it cooperates with the private sector in creating cyber resilience.

It is an opportunity to lead a much-needed cultural change showing cybersecurity should never be an afterthought.




cyber

Power and diplomacy in the post-liberal cyberspace

7 May 2020 , Volume 96, Number 3

André Barrinha and Thomas Renard

It is becoming widely accepted that we have transitioned, or are now transitioning, from an international liberal order to a different reality. Whether that reality is different solely in terms of power dynamics, or also in terms of values and institutions, is up for discussion. The growing body of literature on ‘post-liberalism’ is used as an entry-point for this article, which aims to explore how the post-liberal transition applies to cyberspace. We explore how power dynamics are evolving in cyberspace, as well as how established norms, values and institutions are contested. The article then looks at the emergence of cyber diplomacy as a consequence and response to the post-liberal transition. As it will be argued, if cyberspace was a creation of the liberal order, cyber-diplomacy is a post-liberal world practice. What role it plays in shaping a new order or building bridges between different political visions, and what it means for the future of cyberspace, will constitute key points of discussion.




cyber

Tackling Cyber Disinformation in Elections: Applying International Human Rights Law

Research Event

6 November 2019 - 5:30pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Susie Alegre, Barrister and Associate Tenant, Doughty Street Chambers
Evelyn Aswad, Professor of Law and the Herman G. Kaiser Chair in International Law, University of Oklahoma
Barbora Bukovská, Senior Director for Law and Policy, Article 19
Kate Jones, Director, Diplomatic Studies Programme, University of Oxford
Chair: Harriet Moynihan, Associate Fellow, International Law Programme, Chatham House

Cyber operations are increasingly used by political parties, their supporters and foreign states to influence electorates – from algorithms promoting specific messages to micro-targeting based on personal data and the creation of filter bubbles.
 
The risks of digital tools spreading disinformation and polarizing debate, as opposed to deepening democratic engagement, have been highlighted by concerns over cyber interference in the UK’s Brexit referendum, the 2016 US presidential elections and in Ukraine. 
 
While some governments are adopting legislation in an attempt to address some of these issues, for example Germany’s ‘NetzDG’ law and France’s ‘Law against the manipulation of information’, other countries have proposed an independent regulator as in the case of the UK’s Online Harms white paper. Meanwhile, the digital platforms, as the curators of content, are under increasing pressure to take their own measures to address data mining and manipulation in the context of elections. 

How do international human rights standards, for example on freedom of thought, expression and privacy, guide the use of digital technology in the electoral context? What practical steps can governments and technology actors take to ensure policies, laws and practices are in line with these fundamental standards? And with a general election looming in the UK, will these steps come soon enough?
 
This event brings together a wide range of stakeholders including civil society, the tech sector, legal experts and government, coincides with the publication of a Chatham House research paper on disinformation, elections and the human rights framework

Jacqueline Rowe

Programme Assistant, International Law Programme
020 7389 3287




cyber

Sovereignty and Non-Intervention: The Application of International Law to State Cyberattacks

Research Event

4 December 2019 - 5:30pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Douglas, Legal Director, GCHQ
Zhixiong Huang, Luojia Chair of International Law, Wuhan University
Nemanja Malisevic, Director of Digital Diplomacy, Microsoft
Harriet Moynihan, Associate Fellow, International Law Programme, Chatham House
Chair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House

International law applies to cyber operations – but views differ on exactly how. Does state-sponsored interference in another state's affairs using cyber means – for example,  disinformation campaigns in elections, disabling government websites, or disrupting transport systems – breach international law? If so, on what basis and how are the principles of sovereignty and non-intervention relevant? States are increasingly attributing cyber operations to other states and engaging in the debate on how international law applies, including circumstances that would justify countermeasures.

As states meet to debate these issues at the UN, the panel will explore how international law regulates cyberoperations by states, consider the prospects of progress at the UN, and assess the value of other initiatives.

This event coincides with the launch of a Chatham House research paper which analyses how the principles of sovereignty and intervention apply in the context of cyberoperations, and considers a way forward for agreeing a common understanding of cyber norms.

This event will bring together a broad group of actors, including policymakers, the private sector, legal experts and civil society, and will be followed by a drinks reception.

 

Jacqueline Rowe

Programme Assistant, International Law Programme
020 7389 3287




cyber

The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention

2 December 2019

Hostile cyber operations by one state against another state are increasingly common. This paper analyzes the application of the sovereignty and non-intervention principles in relation to states’ cyber operations in another state below the threshold of the use of force. 

Harriet Moynihan

Senior Research Fellow, International Law Programme

2019-11-29-Intl-Law-Cyberattacks.jpg

A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images.

Summary

  • The vast majority of state-to-state cyberattacks consist of persistent, low-level intrusions that take place below the threshold of use of force. International law, including the principle of non-intervention in another state’s internal affairs and the principle of sovereignty, applies to these cyber operations.
  • It is not clear whether any unauthorized cyber intrusion would violate the target state’s sovereignty, or whether there is a threshold in operation. While some would like to set limits by reference to effects of the cyber activity, at this time such limits are not reflected in customary international law. The assessment of whether sovereignty has been violated therefore has to be made on a case by case basis, if no other more specific rules of international law apply.
  • In due course, further state practice and opinio iuris may give rise to an emerging cyber-specific understanding of sovereignty, just as specific rules deriving from the sovereignty principle have crystallized in other areas of international law.
  • Before a principle of due diligence can be invoked in the cyber context, further work is needed by states to agree upon rules as to what might be expected of a state in this context.
  • The principle of non-intervention applies to a state’s cyber operations as it does to other state activities. It consists of coercive behaviour by one state that deprives the target state of its free will in relation to the exercise of its sovereign functions in order to compel an outcome in, or conduct with respect to, a matter reserved to the target state.
  • In practice, activities that contravene the non-intervention principle and activities that violates sovereignty will often overlap.
  • In order to reach agreement on how international law applies to states’ cyber operations below the level of use of force, states should put their views on record, where possible giving examples of when they consider that an obligation may be breached, as states such as the UK, Australia, France and the Netherlands have done.
  • Further discussion between states should focus on how the rules apply to practical examples of state-sponsored cyber operations. There is likely to be more commonality about specific applications of the law than there is about abstract principles.
  • The prospects of a general treaty in this area are still far off. In due course, there may be benefit in considering limited rules, for example on due diligence and a prohibition on attacking critical infrastructure, before tackling broad principles.




cyber

Power Politics Could Impede Progress on Responsible Regulation of Cyberspace

3 December 2019

Harriet Moynihan

Senior Research Fellow, International Law Programme
A new Chatham House paper examines the prospects of countries reaching agreement on issues of sovereignty and non-intervention in cyberspace in the face of persistent, low-level, state-to-state cyber attacks.

2019-11-29-Intl-Law-Cyberattacks.jpg

A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images.

In discussions to date about how international law applies in cyberspace, commentators have tended to focus their attention on how the rules on the use of force, or the law of armed conflict, apply to cyber activities conducted by states that give rise to physical damage, injury or death.

But in practice, the vast majority of state cyberattacks fall below this threshold. Far more common are persistent, low-level attacks that may leave no physical trace but that are capable of doing significant damage to a state’s ability to control its systems, often at serious economic cost.

Such cyber incursions might include network disruptions in the operation of another government’s websites; tampering with electoral infrastructure to change or undermine the result; or using cyber means to destabilize another state’s financial sector.

For these kinds of cyber operation, the principle of sovereignty, and the principle of non-intervention in another state’s internal affairs, are the starting point.

A UN Group of Government Experts (GGE) agreed in 2013 and 2015 that the principles in the UN Charter, including sovereignty and the prohibition on intervention in another state’s affairs, apply to states’ activities in cyberspace. The 2015 GGE also recommended eleven (non-binding) norms of responsible state behaviour in cyberspace.

However, states have not yet reached agreement on how to apply these principles. Until recently, there has also been very little knowledge of what states actually do in cyberspace, as they usually conduct cyber operations covertly and have been reluctant to put their views on record.

A new Chatham House research paper analyses the application of the principles of sovereignty and non-intervention to state cyberattacks that fall below the principle of use of force. As well as analysing the application of the law in this area, the paper also makes recommendations to governments on how they might best make progress in reaching agreement in this area.

Existing rules or new rules?

As the research paper makes clear, there is currently some debate, principally between countries in the West, about the extent to which sovereignty is a legally binding rule in the context of cyberspace and, if so, how it and the principle of non-intervention might apply in practice.

In the last few years, certain states have put on record how they consider international law to apply to states’ activities in cyberspace, namely the UK, Australia, France and the Netherlands. While there may be some differences in their approaches, which are discussed in the paper, there also remains important common ground: namely, that existing international law already provides a solid framework for regulating states’ cyber activities, as it regulates every other domain of state-to-state activity.

There is also an emerging trend for states to work together when attributing cyberattacks to hostile states, enabling them to call out malign cyber activity when it violates international law. (See, for example, the joint statements made in relation to the NotPetya cyber attack and malicious cyber activity attributed to the Russian government).

However, other countries have questioned whether existing international law as it stands is capable of regulating states’ cyber interactions and have called for ‘new legal instruments’ in this area.

This includes a proposal by the Shanghai Cooperation Organization (led by Russia and China) for an International Code of Conduct on Information Security, a draft of which was submitted to the UN in 2011 and 2015, without success. The UN has also formed a new Open-Ended Working Group (OEWG) under a resolution proposed by Russia to consider how international law applies to states’ activities in cyberspace.

The resolution establishing the OEWG, which began work earlier this year, includes the possibility of the group ‘introducing changes to the rules, norms and principles of responsible behaviour of States’ agreed in the 2013 and 2015 GGE reports. In the OEWG discussions at the UN in September, several countries claimed that a new legal instrument was needed to fill the ‘legal vacuum’ (Cuba) or ‘the gap of ungoverned areas’ (Indonesia).

It would be concerning if the hard-won consensus on the application of international law to cyberspace that has been reached at past GGEs started to unravel. In contrast to 2013 and 2015, the 2017 meeting failed to reach an agreement.

On 9 December, a renewed GGE will meet in New York, but the existence of the OEWG exploring the same issues in a separate process reflects the fact that cyber norms have become an area of geopolitical rivalry.

Aside from the application of international law, states are also adopting divergent approaches to the domestic regulation of cyberspace within their own territory. The emerging trend towards a ‘splinternet’ – i.e. between states that believe the internet should be global and open on the hand, and those that favour a ‘sovereignty and control’ model on the other  – is also likely to make discussions at the GGE more challenging.

Distinct from the international law concept of sovereignty is the notion of ‘cybersovereignty’, a term coined by China to describe the wide-ranging powers it assumes under domestic law to regulate its citizens’ access to the internet and personal data within its territory. This approach is catching on (as reflected in Russia’s recently enacted ‘Sovereign Internet Law’), with other authoritarian states likely to follow suit.

The importance of non-state actors

In parallel with regional and UN discussions on how international law applies, a number of initiatives by non-state actors have also sought to establish voluntary principles about responsible state behaviour in cyberspace.

The Global Commission on the Stability of Cyberspace, a multi-stakeholder body that has proposed principles, norms and recommendations to guide responsible behaviour by all parties in cyberspace, recently published its final report. The Cybersecurity Tech Accord  aims to promote collaboration between tech companies on stability and resilience in cyberspace. President Macron’s ‘Paris Call for Trust and Security in Cyberspace’ has to date received the backing of 67 states, 139 international and civil society organizations, and 358 private-sector organizations.

It remains to be seen in the long term whether the parallel processes at the UN will work constructively together or be competitive. But notwithstanding the challenging geopolitical backdrop, the UN GGE meeting next week at the least offers states the opportunity to consolidate and build on the results of past meetings; to increase knowledge and discussion about how international law might apply; and to encourage more states to put their own views of these issues on the record.




cyber

Homeland Security issues alert on cybercriminals increasingly exploiting COVID-19 pandemic

The U.S. Department of Homeland Security issued an alert April 8 warning that cybercriminals are increasingly exploiting the COVID-19 pandemic to target individuals, small and medium businesses and large organizations.




cyber

Staff Email Addresses Removed From District Websites to Improve Cybersecurity

Some district technology leaders say having staff email addresses publicly available opens the door for phishing scams and potential hacks.




cyber

Ohio Orders Cyber Charter to Return $60 Million

The Ohio board of education last week voted to order the state's largest full-time online charter school to repay $60 million in state aid.




cyber

Ohio Sues Cyber Charter Founder, Pursuing Millions in Disputed Funds

Ohio is seeking to recoup millions of dollars in funds from now-defunct online charter school, the Electronic Classroom of Tomorrow.




cyber

Ohio Sues Cyber Charter Founder, Seeking Millions in Disputed Funds

Ohio's attorney general last week filed suit against the founder of the Electronic Classroom of Tomorrow, aiming to recover millions of dollars in public funding that the state claims wrongfully went to the cyber charter school.




cyber

Arkansas Provides K-12 Districts With Volunteer IT Team to Fight Cyber Attacks

The Arkansas Department of Education will now provide on-site help for schools and districts in the state that are experiencing cybersecurity incidents.




cyber

K12 Inc., Ga. Cyber Academy Contract Battle Brews

Students locked out of their school's computer systems. Educators unable to get access to some students' records. Parents receiving emails asking that they return their children's laptops.




cyber

Q&A: How to Bolster Cybersecurity in Your Schools

Melissa Tebbenkamp, the director of instructional technology for the Raytown Quality Schools near Kansas City, says her district's biggest cybersecurity risk is "ourselves." She outlines what it takes to teach educators how to help protect schools and districts against cyberattacks.




cyber

Binary code fingerprinting for cybersecurity : application to malicious code fingerprinting

Alrabaee, Saed, authior
9783030342388 (electronic bk.)




cyber

These Nordstrom Cyber Monday Deals Are Giving Black Friday a Run for Its Money

This is not a drill: You can get up to 50% off at Nordstrom right now.




cyber

Macy’s Insane Cyber Monday Sale Ends in a Few Hours—Here Are the Best Deals

You've got exactly four hours left to take advantage of these heavily discounted prices.




cyber

Cyber Security Drill 2016

The Computer Emergency Response Team of Mauritius (CERT-MU) in collaboration with the International Telecommunication Union (ITU) organised the ITU ALERT Cyber Security Drill (Applied Learning for Emergency Response Teams), a five-day regional forum on cybersecurity for the Africa Region at Le Meridien Hotel from the 4th-8th April. It was the third time that this event was held in Africa and a first for Mauritius. The first day was dedicated to a series of workshops on current cybersecurity issues, followed by two days of cyber drill exercises structured around various scenarios involving the most common types of cyberattacks while the sharing sessions provided a platform for cooperation and discussions on cybersecurity and the last two days were dedicated to capacity building session. The cyberdrill exercises were centered on developing threat intelligence capability, malware reengineering and attack scenarios. On the first day there were around 120 participants ranging from IT professionals, system administrators, law enforcement officers, IT security professionals and international delegates. The cyberdrill and workshops were attended by around fifty delegates from all over Africa including Mauritius. The cyberdrill was officially opened by the Honourable Etienne Sinatambou, Minister of Technology, Communication and Innovation.




cyber

Cyber Defense Monitoring and Forensics Training

The Computer Emergency Response Team of Mauritius (CERT-MU) in collaboration with the Command and Control Centre of Kenya organised a 3-day training programme on Cyber Defense Monitoring and Forensics at Voilà Hotel, Bagatelle from the 27th February – 1st March 2018. The training course provided an introduction to Network Security Monitoring (NSM), Security Information and Events Management (SIEM), Malware Analysis and Digital Forensics. Major part of the course was hands-on case studies and analysis exercises using real world data. The main focus of the training programme was on intensive hands-on sessions on addressing key challenges faced by local organizations in all sectors/industries. A wide range of commercial and open source tools were used to equip cyber defenders with the necessary skills to anticipate, detect, respond and contain adversaries. The training programme was followed by 23 participants from the public and private sector. 




cyber

Launching of the Mauritian Cybercrime Online Reporting System (MAUCORS) and Cyber Drill for Top Management

The Computer Emergency Response Team of Mauritius (CERT-MU) organised the launching ceremony for the Mauritian Cybercrime Online Reporting System (MAUCORS) and a Cyber Drill for Top Management in collaboration with the International Telecommunication Union (ITU) at Le Meridien Hotel on Thursday 15th March 2018. The Mauritian Cybercrime Online Reporting System (MAUCORS) was officially launched by Honourable Yogida Sawmynaden, Minister of Technology, Communication & Innovation. This system will help to coordinate and resolve social media incidents efficiently. This system has been developed by the CERT-MU and is one of the key initiative under the newly drafted Cybercrime Strategy that sets out the Government’s approach to combat cybercrime in Mauritius. The cyber drill for top management was also officially opened by Honourable Yogida Sawmynaden, Minister of Technology, Communication & Innovation on the same day. Professor Dr. Marco Gercke conducted the cyber drill for top management of organisations. The objective of this drill was to demonstrate the top executives to assess organizations’ preparedness to resist cyber threats and enable timely detection, response, and mitigation and recovery actions in the event of cyber-attacks. The launching ceremony was attended by around 70 participants and the cyber drill was attended by 55 participants.




cyber

National Cyber Security Drill for Critical Information Infrastructures (CIIs)

Cyber risk is now one of the most commonly talked about topics as the impact of cybercrime reaches an all-time high. Heavily connected industries, such as financial services and critical national infrastructure (CNI) pose a systemic risk to the markets they serve. We are now seeing national cybersecurity incident simulation exercises being carried out by governments and/or industry associations. This helps to exercise the reaction to cybersecurity incidents, which impact various parts of the supply chain, from financial transactions to the operational technology that underpins our daily lives.
 In line with this, the Computer Emergency Response Team of Mauritius (CERT-MU), a division of the National Computer Board operating under the aegis of the Ministry of Technology, Communication & Innovation is organizing a National Cybersecurity Drill from the 25th – 28th June 2019 for the Financial Sector and the Civil Aviation Department. The main objective of the 4 days’ event is to assess the preparedness of these sectors to resist cyber threats and enable timely detection, response, and mitigation and recovery actions in the event of cyber-attacks.
The activities to be organized are as follows:
·         One-day workshop on Cyber Attack Preparedness & Response (25th June 2019)
·         Three-days Cyber Drill exercise (26th – 28th June 2019)




cyber

Cyber Criminals Use Fake Job Listings To Target Applicants' Personally Identifiable Information




cyber

Cyber Actors Take Advantage of COVID-19 Pandemic to Exploit Increased Use of Virtual Environments