SlideShare a Scribd company logo
Cybersecurity:
Public Sector Threats and Responses


Kim Andreasson
Managing Director
DAKA advisory AB




Indonesia
Information Security Forum (IISF)

Hotel Hilton Bandung,
10 October 2012
Presentation overview

   An introduction to cyber security in the public sector

   Cyber threats

   Public sector responses

   Steps towards a more resilient organizational cyber
    security strategy

   Conclusion
Understanding cyber security in
the public sector
A convergence of three trends:

1. Globalization

2. Connectivity

3. E-government
1. Globalization
                    ICTs contribute strongly to
                     economic growth and
                     better social outcomes

                    Benchmarking the
                     information society is
                     important in order for
                     policy-makers to
                     understand the factors
                     behind it and how to
                     achieve improved
                     outcomes
                    Most benchmarks include
                     a component of
                     e-government
2. Connectivity

 The world will go                        120
                                                                                                                                                   114.2
  from 2bn Internet                        100
                                                           Mobil e s ubs cri pti ons :
                                                           Devel oped countri es
  users in 2010 to                                         Mobil e s ubs cri pti ons :

  5bn in 2015                               80
                                                           Devel opi ng countri es
                     Per 100 inhabitants




                                                                                                                                                   70.1

 An opportunity                            60


  to improve                                40

  service delivery
                                            20

 An opportunity                             0
  to leapfrog                                       2000     2001      2002       2003   2004      2005     2006     2007         2008   2009   2010


                                                 The developed/developing country classifications are based on the UN M49, see:
                                                 http://www.itu.int/ITU-D/ict/definitions/regions/index.html
                                                 Source: ITU World Telecommunication /ICT Indicators database
3. E-government

 Information and service
  delivery

 Transparency and
  accountability

 Link to broader
  development objectives

 Digital by default
3.1. Supply of e-government




 Benchmarking global e-government development since 2003 to
  “inform and improve the understanding of policy makers’
  choices to shape their e-government programs” (UN 2004)

 The survey measures “the willingness and capacity of countries
  to use online and mobile technology in the execution of
  government functions” (UN 2010)
3.2. E-government progress




                      http://www.archive.org
3.3. Demand for e-government

 In 1990, the American tax authority, the
  IRS, said 4m people used online tax filing
  (the first year such service was
  available)

 In 2000, the number filing their taxes
  online had risen to 35m

 In 2010, 100m Americans used e-file
Enter cyber security

 An increase in
  usage means an
  increase in
  dependency

 About 75% of
  organizations suffer
  from a cyber
  attack every year

 Attacks can
  compromise trust
  in e-government
Categorizing cyber threats

 Politically motivated threats:
  cyber warfare, cyber terrorism, espionage and hacktivism



 Non-politically motivated threats:
  typically financially motivated, such as cyber crime,
  intellectual property theft, and fraud, but also hacking for
  fun or retribution, for example, from a disgruntled employee
Understanding cyber threats

“When we first started this process… agencies didn’t know
 what they didn’t know.”

-Karen S. Evans
  Administrator for E-Government and Information Technology
  in testimony before the House Committee on Homeland
  Security, February 28, 2008

 What is the risk?

 Is there control?

 Can you live with the residual risk?

 What is your response plan when services become
  compromised?
Public sector responses

 The public sector is different as it must consider, for example:

 Tension between transparency and privacy

 Cost optimization; agencies often only seek to meet minimum
  standards

 Build closer relations with other stakeholders, including the
  private sector

 Key performance indicators (KPIs)

 But one thing remains the same: Cyber security is a global
  phenomenon and a challenge for every organization. It must
  be dealt with at all levels, from the international arena to the
  regional, national and local levels
Global cyber security agenda

1. Legal measures

2. Technical and
    procedural
    measures

3. Organizational
    structures

4. Capacity building

5. International
     cooperation
The problem for organizational
cyber security
 People!

 According to the Data Breach
  Investigations Report from Verizon, an
  American telecommunications firm,
  85% of confirmed cyber breaches were
  not considered very difficult and 96%
  were avoidable

 More work is needed to create and
  maintain comprehensive yet clearly
  communicated cyber security policies
  that are enforced
Steps towards a more resilient
organizational cyber security
strategy

1. Close the gap between IT and management

2. Improve awareness and education

3. Capture technology trends, including the
   move from e-government to m-government
Step #1: Close the gap
between IT and management
 Assess underlying factor(s), e.g. user
  awareness based on an internal
  survey

 Translate results into KPIs, e.g.
  average user awareness

 Communicate key message to
  management, e.g. the meaning of
  score(s) and their importance
  related to other issue(s)
Step #2: Improve awareness
and education
 ICT skills divide

 Governments cannot go it
  alone; a role for the private
  sector and NGOs

Make people SMART:
 Specific
 Measurable
 Attainable
 Relevant
 Time-bound
Step #3: Track trends, such as
mobility
 New threats: from spam to spim
  and mobile malware

 New challenges: insecure wireless
  connections, missing (stolen)
  devices, data loss, “always on”
  connections

 Same answers: comprehensive
  and clearly communicated
  policies that are measurable
Conclusion:
measure cyber security at all levels
 Compared with just a decade ago, governments have made
  significant progress in expanding ICT access

 But just as crime have always been part of history, cyber
  security is likely to continue well into the future, especially since
  the two are increasingly intertwined

 There is a demand for measurement at all levels in order to give
  policy-makers and public sector managers data, tools and
  benchmarks to better understand cyber security from a policy
  perspective and to communicate that message

 Every case is different, yet fundamentally the same
Thank you



www.DAKAADVISORY.com

More Related Content

PPTX
Cybercrime and Security
PPTX
Cyber crime and security
PPTX
Cyber Security in Society
PPTX
cyber security
PPTX
Cybercrime investigation
DOCX
Final report ethical hacking
PDF
Basics of Cyber Security
PPT
Cyber security standards
Cybercrime and Security
Cyber crime and security
Cyber Security in Society
cyber security
Cybercrime investigation
Final report ethical hacking
Basics of Cyber Security
Cyber security standards

What's hot (20)

PPTX
Cyber Terrorism
PPTX
Cyber crime
PDF
CS6004 Cyber Forensics
PPTX
Computer forensics powerpoint presentation
PPT
Cyber-Security-.ppt
PDF
Network Security Presentation
PPTX
Introduction to cybercrime
PPTX
Digital forensics
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Cyber security
PPTX
Chapter1 Cyber security Law & policy.pptx
PDF
Email Forensics
PPTX
PPTX
E mail forensics
PPTX
Cyber security
PPTX
Data security
PPTX
Cybercrime: A Seminar Report
PPTX
Denial of service attack
PPT
Introduction to Cyber Security
Cyber Terrorism
Cyber crime
CS6004 Cyber Forensics
Computer forensics powerpoint presentation
Cyber-Security-.ppt
Network Security Presentation
Introduction to cybercrime
Digital forensics
Cybersecurity 1. intro to cybersecurity
Cyber security
Chapter1 Cyber security Law & policy.pptx
Email Forensics
E mail forensics
Cyber security
Data security
Cybercrime: A Seminar Report
Denial of service attack
Introduction to Cyber Security
Ad

Viewers also liked (20)

PDF
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
PDF
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
PDF
Malaysia's National Cyber Security Policy
PPTX
Turning an idea into impact
PDF
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
PPTX
Borobudur 11
PPT
Developing a Legal Framework for Privacy
ODP
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
ODP
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
PDF
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
PDF
Global informationsecurityissue_ZainalHasibuan
PPT
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Malaysia's National Cyber Security Policy
Turning an idea into impact
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
Borobudur 11
Developing a Legal Framework for Privacy
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
Global informationsecurityissue_ZainalHasibuan
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Ad

Similar to Cybersecurity: Public Sector Threats and Responses (20)

PDF
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
PDF
IT Infrastructure on the Verge of Technological Singularity
PDF
PPT
Varun IOTs PPT
PPT
Federal IT Initiatives - BDPA Conference Executive Panel
PDF
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
PPTX
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
PPTX
IMPACT OF ICT ON FINANCIAL SERVICE SECTOR
PDF
042012 m2 m webinar slides for april 4
PDF
Resilience in the Cyber Era
PPTX
John Bosco Arends- Emerging Threats Against Public Sector
PDF
The Secret to Surviving the Network Deluge
PDF
ICT Vision and Technologies Adoption across Thailand
PDF
Cybersecurity in the Age of Mobility
PDF
iX_POV_FinalDraft
PDF
iX_POV_FinalDraft
PDF
IRJET- Cybersecurity: The Agenda for the Decade
PPTX
Key Trends and Opportunities in Business Mobility and Enterprise Communications
PDF
Delusions of-safety-cyber-savvy-ceo
PDF
Vive Digital - OECD Keynote
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
IT Infrastructure on the Verge of Technological Singularity
Varun IOTs PPT
Federal IT Initiatives - BDPA Conference Executive Panel
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
IMPACT OF ICT ON FINANCIAL SERVICE SECTOR
042012 m2 m webinar slides for april 4
Resilience in the Cyber Era
John Bosco Arends- Emerging Threats Against Public Sector
The Secret to Surviving the Network Deluge
ICT Vision and Technologies Adoption across Thailand
Cybersecurity in the Age of Mobility
iX_POV_FinalDraft
iX_POV_FinalDraft
IRJET- Cybersecurity: The Agenda for the Decade
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Delusions of-safety-cyber-savvy-ceo
Vive Digital - OECD Keynote

More from Directorate of Information Security | Ditjen Aptika (20)

PDF
Sosialisasi Keamanan Informasi_Sektor Kesehatan
PDF
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
PDF
Sosialisasi Keamanan Informasi_Sektor Tranportasi
PDF
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
PDF
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
PDF
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
PPTX
Fetri Miftach_Uji publik rpm tata kelola
PPTX
Hasyim Gautama_Tata kelola tik 20151118
PDF
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
PDF
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
PPTX
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
PPTX
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
PDF
PDF
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
PPTX
Uji Publik RPM SMPI Fetri Miftah
PPTX
PDF
Pengamanan Jaringan dengan Honeynet-Charles Lim
Sosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Fetri Miftach_Uji publik rpm tata kelola
Hasyim Gautama_Tata kelola tik 20151118
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
Uji Publik RPM SMPI Fetri Miftah
Pengamanan Jaringan dengan Honeynet-Charles Lim

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Cloud computing and distributed systems.
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
Spectroscopy.pptx food analysis technology
Cloud computing and distributed systems.
sap open course for s4hana steps from ECC to s4
Unlocking AI with Model Context Protocol (MCP)
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”
Chapter 3 Spatial Domain Image Processing.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
Dropbox Q2 2025 Financial Results & Investor Presentation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Reach Out and Touch Someone: Haptics and Empathic Computing
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KodekX | Application Modernization Development
NewMind AI Weekly Chronicles - August'25 Week I
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Cybersecurity: Public Sector Threats and Responses

  • 1. Cybersecurity: Public Sector Threats and Responses Kim Andreasson Managing Director DAKA advisory AB Indonesia Information Security Forum (IISF) Hotel Hilton Bandung, 10 October 2012
  • 2. Presentation overview  An introduction to cyber security in the public sector  Cyber threats  Public sector responses  Steps towards a more resilient organizational cyber security strategy  Conclusion
  • 3. Understanding cyber security in the public sector A convergence of three trends: 1. Globalization 2. Connectivity 3. E-government
  • 4. 1. Globalization  ICTs contribute strongly to economic growth and better social outcomes  Benchmarking the information society is important in order for policy-makers to understand the factors behind it and how to achieve improved outcomes  Most benchmarks include a component of e-government
  • 5. 2. Connectivity  The world will go 120 114.2 from 2bn Internet 100 Mobil e s ubs cri pti ons : Devel oped countri es users in 2010 to Mobil e s ubs cri pti ons : 5bn in 2015 80 Devel opi ng countri es Per 100 inhabitants 70.1  An opportunity 60 to improve 40 service delivery 20  An opportunity 0 to leapfrog 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 The developed/developing country classifications are based on the UN M49, see: http://www.itu.int/ITU-D/ict/definitions/regions/index.html Source: ITU World Telecommunication /ICT Indicators database
  • 6. 3. E-government  Information and service delivery  Transparency and accountability  Link to broader development objectives  Digital by default
  • 7. 3.1. Supply of e-government  Benchmarking global e-government development since 2003 to “inform and improve the understanding of policy makers’ choices to shape their e-government programs” (UN 2004)  The survey measures “the willingness and capacity of countries to use online and mobile technology in the execution of government functions” (UN 2010)
  • 8. 3.2. E-government progress http://www.archive.org
  • 9. 3.3. Demand for e-government  In 1990, the American tax authority, the IRS, said 4m people used online tax filing (the first year such service was available)  In 2000, the number filing their taxes online had risen to 35m  In 2010, 100m Americans used e-file
  • 10. Enter cyber security  An increase in usage means an increase in dependency  About 75% of organizations suffer from a cyber attack every year  Attacks can compromise trust in e-government
  • 11. Categorizing cyber threats  Politically motivated threats: cyber warfare, cyber terrorism, espionage and hacktivism  Non-politically motivated threats: typically financially motivated, such as cyber crime, intellectual property theft, and fraud, but also hacking for fun or retribution, for example, from a disgruntled employee
  • 12. Understanding cyber threats “When we first started this process… agencies didn’t know what they didn’t know.” -Karen S. Evans Administrator for E-Government and Information Technology in testimony before the House Committee on Homeland Security, February 28, 2008  What is the risk?  Is there control?  Can you live with the residual risk?  What is your response plan when services become compromised?
  • 13. Public sector responses  The public sector is different as it must consider, for example:  Tension between transparency and privacy  Cost optimization; agencies often only seek to meet minimum standards  Build closer relations with other stakeholders, including the private sector  Key performance indicators (KPIs)  But one thing remains the same: Cyber security is a global phenomenon and a challenge for every organization. It must be dealt with at all levels, from the international arena to the regional, national and local levels
  • 14. Global cyber security agenda 1. Legal measures 2. Technical and procedural measures 3. Organizational structures 4. Capacity building 5. International cooperation
  • 15. The problem for organizational cyber security  People!  According to the Data Breach Investigations Report from Verizon, an American telecommunications firm, 85% of confirmed cyber breaches were not considered very difficult and 96% were avoidable  More work is needed to create and maintain comprehensive yet clearly communicated cyber security policies that are enforced
  • 16. Steps towards a more resilient organizational cyber security strategy 1. Close the gap between IT and management 2. Improve awareness and education 3. Capture technology trends, including the move from e-government to m-government
  • 17. Step #1: Close the gap between IT and management  Assess underlying factor(s), e.g. user awareness based on an internal survey  Translate results into KPIs, e.g. average user awareness  Communicate key message to management, e.g. the meaning of score(s) and their importance related to other issue(s)
  • 18. Step #2: Improve awareness and education  ICT skills divide  Governments cannot go it alone; a role for the private sector and NGOs Make people SMART:  Specific  Measurable  Attainable  Relevant  Time-bound
  • 19. Step #3: Track trends, such as mobility  New threats: from spam to spim and mobile malware  New challenges: insecure wireless connections, missing (stolen) devices, data loss, “always on” connections  Same answers: comprehensive and clearly communicated policies that are measurable
  • 20. Conclusion: measure cyber security at all levels  Compared with just a decade ago, governments have made significant progress in expanding ICT access  But just as crime have always been part of history, cyber security is likely to continue well into the future, especially since the two are increasingly intertwined  There is a demand for measurement at all levels in order to give policy-makers and public sector managers data, tools and benchmarks to better understand cyber security from a policy perspective and to communicate that message  Every case is different, yet fundamentally the same