1 / 17

National Security Strategy of The Netherlands and ICT disturbance

National Security Strategy of The Netherlands and ICT disturbance. Hans Oude Alink Ministry of Economic Affairs The Netherlands. Short background Netherlands’ Safety and Security Strategy. National Strategy published May 2007 There is a need for a more coordinated

rasmus
Download Presentation

National Security Strategy of The Netherlands and ICT disturbance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. National Security Strategy of The Netherlands • and ICT disturbance Hans Oude Alink Ministry of Economic Affairs The Netherlands

  2. Short background Netherlands’ Safety and Security Strategy National Strategy published May 2007 There is a need for a more coordinated and integrated approach on National Security More complex society Increaseddependence on complex systems Diffuse and changing threats Interdependence dimension of threats International dimension of threats Focus: all-hazard approach

  3. What is National Safety & Security? • Focus on 5 vital interests: • - Territorial security • - Physical security • - Economical security • Ecological security • Social & political stability • Scope: • (Potential) disruption of society • throughout the entire security chain

  4. National SecurityStrategy Which threats do we face? And what is the impact? What do we need to do? What do we need to have? Threat/risk analysis Risk Assessment Tasks Capabilities (planning assumptions) Policy arrangements Horizon scanning National threatprogress report (short & long term horizon scanning) National risk assessment Advice national capabilities

  5. National Security at present … Climate change

  6. Energy supply

  7. Pandemic flu

  8. Polarisation and radicalisation

  9. Overall analysis high impact risks: • High impact criteria: • costs • disruption common life • psychological/social impact • Shortage vital products and services • Management of vital products and services • In critical phase: government cannot do it alone • Self help of citizens

  10. In 2008 ICT-disturbance has been analyzed

  11. IT-security: • Is the situation really that bad?? • BBC news : Cyber risk 'equals 9/11 impact' • 8 april 2008 • US Homeland Security chief Michael Chertoff invoked the • attacks of 9/11 as he sought to galvanise IT professionals and • security experts at the RSA conference. • NATO opens centre of excellence on cyber defence • 14 may 2008 • Seven NATO nations and the Allied Command Transformation • signed the documents for the formal establishment of a Cooperative • Cyber Defence (CCD) Centre of Excellence (COE) in Tallinn, • Estonia.

  12. National politicians are worried Dutch representative Socialist Party The Netherlands are vulnerable to a digital terroristic attack Dutch representative Socialist Democrats Cabinet should enforce the duty of informing the public whenever a company that has a vital function for society is attacked by hackers Dutch representative Christian Democrats Cabinet should perform exercises in the Netherlands similar to Cyber Storm II

  13. Project ICT-disturbance Threat- analysis 1 Risk assessment 2 Inventory of present vigilance 3 Threat overview (scenario’s) a b Risk overview (probability and impact) Overview of present capacities c d Strategic agenda 5 Planning, implementation evaluation Identify possible New measures 4

  14. Results so far • Developing scenario’s • Deliberate IP-outage • Hacking of vital sector • Capacity analysis

  15. Actions that will be proposed • National response capability • Dependencies • International cooperation • Challenges • Trust versus awareness • Different players

More Related