1 / 24

TechNet International 2009- Keynote Speech Session I – International Threats – Regional Solutions Presented by Lieutenan

TechNet International 2009- Keynote Speech Session I – International Threats – Regional Solutions Presented by Lieutenant General Kurt Herrmann, Director NCSA. PROVISION OF CIS-SERVICES IN A DYNAMICALLY EVOLVING CYBER WORLD. 29 October 2009. Brussels, Belgium. Outline. Understanding NCSA

benjamin
Download Presentation

TechNet International 2009- Keynote Speech Session I – International Threats – Regional Solutions Presented by Lieutenan

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TechNet International 2009- Keynote SpeechSession I – International Threats – Regional SolutionsPresented byLieutenant General Kurt Herrmann, Director NCSA PROVISION OF CIS-SERVICES IN A DYNAMICALLY EVOLVING CYBER WORLD 29 October 2009 Brussels, Belgium

  2. Outline • Understanding NCSA • Free Flow of Information and Knowledge • Security in the Cyber World • NATO’s Response to Cyber Risks

  3. NCSA Mission To ensure the provision of secure end-to-end information exchange services and information processing services required for NATO Consultation, Command and Control, using fielded Communications and Information Systems in the most cost effective manner.

  4. NCSA Organisation CIS Operations Systems Management Static CIS Support Service Delivery NATO INFOSEC Signal Battalions

  5. NCSA’s Position NAC Military Committee NATO C3 Board SACEUR Policydirection OPCON(for Operations) NCSA “as a whole” (indivisible mission / organisation) SLAs OpPlans/OpOrders CIS support to Static HQ structures CIS support to NATO Operations  Reach back  • NCSA DCIS elements • DCMs • CIS Logistic Depot • Supporting NATO elements • NC3A • NAMSA • Contractors Supporting National CIS elements • Consul-tation • NATO HQ Brussels • C2 for NFS • Nations’ customers • C2 for NCS • ACT • +Sub-structure • C2 for NCS • ACO • +Sub-structure

  6. Yeovilton Stavanger Finderup Norfolk Bydgoszcz Northwood Udem Brunssum Mons Ramstein Heidelberg IRAQ La Spezia Poggio Renatico Lisbon Naples Madrid Izmir Larissa ISAF EUFOR KFOR Future Area of Responsibility NL. Sector Norfolk Sector Mons Sector Brunssum Sector Naples Sector Lisbon JALLCMonsanto GR NCSA Squadron NCSA Detachment NCSA Support Element

  7. NHQS KFOR ACTIVE ENDEAVOUR NTM-I ISAF Darfur NCSA Connecting NATO …

  8. Federated & Integrated Architecture for ISAF ISAF General-Purpose Communication System SIPRNeT (US) NATO Secret Shared ISAF Information Domain 41 TCN ISAF Secret (FOC+, MP4, IOC, Overtask) CENTRIXS ISAF NATO HQ Mission Secret CENTRIXS GCTF 80 nations NATO HQ Mission Secret National Mission Secret National Mission Secret National Mission Secret

  9. FREE FLOW INFORMATION AND KNOWLEDGE:Network price performance(doubling every 12 months) Source:

  10. Globally AppliedIP Networking 14 Billion 14 billion devices will be connected to the Internet by 2010 300 Million 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 Source: / Forrester Research, February 2005

  11. The World Is Changing FastInformation flows freely Content/Applications Experience Devices Source:

  12. Cloud Computing 12

  13. Security Concerns 13

  14. Instant Messaging Social Networking Global Collaboration Security in the Cyber World: The Social Revolution of the Internet Generation Social Networks Growth

  15. Active Threats • Spam • Malware(viruses, worms, trojans..) • Web defacements • Denial of Service

  16. Active Threats (2) • Classified Information Leakage • Vulnerabilities exposed by poor maintenance • User indiscretions

  17. The Attackers.... • Script Kiddie • Recreational Hacker • Cyber Activist • Organized Crime • Terrorist Organization • Nation-state • Insider Threat

  18. Cyber Defencein NATO • Commitment by Nations • Effective Cyber Defence Policies • NATO Cyber Defence Management Authority (CDMA) • NATO Computer Incident Response Capability

  19. PROTECT / PREVENT FEEDBACK DETECT RECOVER RESPOND Security Activities

  20. NATO CYBER DEFENCE:Functional View • NATO wide CD Mgmt Body • Policy • Strategic Direction Authorise – Inform – Advise - Report • Response Teams • Intrusion Detection • Security Mgmt 20

  21. System Hardening measures NATO-wide anti-malware support Specialist advice to projects Vulnerability Assessments (VA) and Penetration Testing NATO-wide Vulnerability Notification Training and Awareness Cyber DefenceSecurity Services

  22. Cyber DefenceSecurity Services (2) • Intrusion Detection System • Mail Content Checking • Website Monitoring • 24/7 Incident Response Capability • On and Off-line Computer Forensic Services

  23. NATOCore Network Voice Data VTC NATO’s CIS Network Nations Land, Air & Maritime Forces ISAF Service Interface Balkans NTMI Exercises

  24. NCSA: NATO’s Driving Force for Efficient CIS Services Questions? NATO CIS Services Agency 24

More Related