100 likes | 125 Views
ITU Workshop on “ICT Security Standardization for Developing Countries” (Geneva, Switzerland, 15-16 September 2014). ETSI TC Cyber. Charles Brookson Chairman ETSI TC Cyber Charles@Zeata.co.uk Zeata Security Ltd and Azenby Ltd. ETSI TC CYBER (Jan 2014): General Activities.
E N D
ITU Workshop on “ICT Security Standardizationfor Developing Countries” (Geneva, Switzerland, 15-16 September 2014) ETSI TC Cyber Charles Brookson Chairman ETSI TC Cyber Charles@Zeata.co.uk Zeata Security Ltd and Azenby Ltd
ETSI TC CYBER (Jan 2014): General Activities Cyber Security Standardization Security of infrastructures, devices, services and protocols Security advice, guidance and operational security requirements to users, manufacturers and network and infrastructure operators Security tools and techniques to ensure security
ETSI TC CYBER (Jan 2014): General Activities Creation of security specifications and alignment with work done in other TCs and ISGs Coordinate work with external groups such as the CSCG with CEN, CENELEC, the NIS Platform and ENISA Collaborate with other SDOs (ISO, ITU, NIST, ANSI...) Answer to policy requests on Cyber Security and ICT security in broad sense
TC CYBER 1st meeting • TC CYBER#1, 27-28 May 2014 • Over 50 participants at this first meeting • Work planned in several areas • Cybersecurity ecosystem • Personal data protection framework • Privacy • Critical Infrastructure Protection
CSCG Recommendations to EU • Cyber Security Coordination Group • Advisory Body of the three ESOs (CEN/CENELEC/ETSI) • Feb 2014 Recommendations for a Strategy on European Cyber Security Standardization • GOVERNANCE(coordination, scope, trust) • HARMONISATION (PKI/cryptography, requirements/evaluation, EU security label, interface with research) • GLOBALISATION (harmonisation with international key players, global promotion of EU Cyber Security standards)
ETSI Security activities GSM™, UMTS™ 3GPP, LTE™, IP Multimedia Subsystem (IMS) 3GPP* TETRA DECT™ Radio Frequency Identification (RFID) Reconfigurable Radio Systems Satellite Intelligent Transport Systems Machine to Machine Smart Lawful Interception and Data Retention Electronic Signatures ESI Cryptographic Algorithms SAGE
ETSI Security activities Quantum Key Distribution and Algorithms Identity and Access Management for Networks and Services Information Security Indicators Smart Cards Future Networks Emergency and Safety Telecommunications Aeronautics Maritime Broadcasting Media Content Delivery IPv6 ePassport Readers IPCablecom™
TC CYBER future meetings • TC CYBER#2, 15-16 Oct 2014 (at ETSI premises) • Work will start with adoption of several new documents - Areas decided during TC CYBER#1 plus any new agreed proposals • TC CYBER will have a first set of publish standards in 2015 • TC CYBER#3, 3-4 Feb 2015 • TC CYBER#4, 28-29 May 2015
Some useful links • TC CYBER on ETSI portal and ToR • https://portal.etsi.org/cyber • https://portal.etsi.org/cyber/Cyber_ToR.asp • ETSI Security Workshop • www.etsi.org/securityworkshop • 10th on 26-27 May 2015
Further information • ETSI Security White Paper • 6th Edition Published January 2014 • Achievements, ongoing work, list of publications • www.etsi.org/securitywhitepaper • Carmine (Lino) Rizzo – TC CYBER Technical Officer carmine.rizzo@etsi.org