National Cybersecurity Management System - PowerPoint PPT Presentation

About This Presentation
Title:

National Cybersecurity Management System

Description:

National Cybersecurity Management System Framework Maturity Model RACI Chart Impementation Guide Taieb DEBBAGH * Addressing security challenges on a global ... – PowerPoint PPT presentation

Number of Views:143
Avg rating:3.0/5.0
Slides: 17
Provided by: seb65
Category:

less

Transcript and Presenter's Notes

Title: National Cybersecurity Management System


1
(No Transcript)
2
National CybersecurityManagement System
  • Framework Maturity Model
  • RACI Chart Impementation Guide
  • Taieb DEBBAGH

3
Agenda
  • 1 - Introduction
  • 2 - National Cybersecurity Management System
  • 3 - NCSec Framework 5 Domains
  • 4 NCSec Framework 34 processes
  • 5 - Maturity Model
  • 6 NCSec Assessment
  • 7 - Roles Responsibilities (RACI Chart)
  • 8 - Implementation Guide

4
1 - Introduction (1/2)
  • Increasing computer security challenges in the
    world
  • No appropriate organizational and institutional
    structures to deal with these issues
  • Which entity(s) should be given the
    responsibility for computer security?
  • Despite there are best practices that
    organizations can refer to evaluate their
    security status
  • But, there is lack of international standards
    (clear guidance) with which a State or region can
    measure its current security status.

5
1 - Introduction (2/2)
  • The main objective of this presentation is to
    propose a Model of National Cybersecurity
    Management System (NCSecMS), which is a global
    framework that best responds to the needs
    expressed by the ITU Global Cybersecurity Agenda
    (GCA).
  • This global framework consists of 4 main
    components
  • NCSec Framework
  • Maturity Model
  • Roles and Responsibilities chart
  • Implementation Guide.

6
2 NCSec Management System
7
3 - NCSec Framework 5 Domains
8
4 - NCSec Framework (5 Domains and 34 Processes)
1 - SP Strategy and Policies 1 - SP Strategy and Policies 3 - AC Awareness and Communication 3 - AC Awareness and Communication
SP1 NCSec Strategy Promulgate endorse a National Cybersecurity Strategy AC1 Leaders in the Government Persuade national leaders in the government of the need for national action to address threats to and vulnerabilities of the NCSec through policy-level discussions
SP2 Lead Institutions Identify a lead institutions for developing a national strategy, and 1 lead institution per stakeholder category AC2 National Cybersecurity and Capacity Manage National Cybersecurity and capacity at the national level
SP3 NCSec Policies Identify or define policies of the NCSec strategy AC3 Continuous Service Ensure continuous service within each stakeholder and among stakeholders
SP4 Critical Information Infrastructures Protection Establish integrate risk management for identifying prioritizing protective efforts regarding CII AC4 National Awareness Promote a comprehensive national awareness program so that all participantsbusinesses, the general workforce, and the general populationsecure their own parts of cyberspace
SP5 Stakeholders Identify the degree of readiness of each stakeholder regarding to the implementation of NCSec strategy how stakeholders pursue the NCSec strategy policies AC5 Awareness Programs Implement security awareness programs and initiatives for users of systems and networks
2 - IO Implementation and Organisation 2 - IO Implementation and Organisation AC6 Citizens and Child Protection Support outreach to civil society with special attention to the needs of children and individual users
IO1 NCSec Council Define National Cybersecurity Council for coordination between all stakeholders, to approve the NCSec strategy AC7 Research and Development Enhance Research and Development (RD) activities (through the identification of opportunities and allocation of funds)
IO2 NCSec Authority Define Specific high level Authority for coordination among cybersecurity stakeholders AC8 CSec Culture for Business Encourage the development of a culture of security in business enterprises
IO3 National CERT Identify or establish a national CERT to prepare for, detect, respond to, and recover from national cyber incidents AC9 Available Solutions Develop awareness of cyber risks and available solutions
IO4 Privacy and Personnal Data Protection Review existing privacy regime and update it to the on-line environment AC10 NCSec Communication  Ensure National Cybersecurity Communication
IO5 Laws Ensure that a lawful framework is settled and regularly levelled 4 - CC Compliance and Communication 4 - CC Compliance and Communication
IO6 Institutions Identify institutions with cybersecurity responsibilities, and procure resources that enable NCSec implementation CC1 International Compliance Cooperation Ensure regulatory compliance with regional and international recommendations, standards
IO7 National Experts and Policymakers Identify the appropriate experts and policymakers within government, private sector and university CC2 National Cooperation Identify and establish mechanisms and arrangements for cooperation among government, private sector entities, university and ONGs at the national level
IO8 Training Identify training requirements and how to achieve them CC3 Private sector Cooperation Encourage cooperation among groups from interdependent industries (through the identification of common threats) .
IO9 Government Implement a cybersecurity plan for government-operated systems, that takes into account changes management CC4 Incidents Handling Manage incidents through national CERT to detect, respond to, and recover from national cyber incidents, through cooperative arrangement (especially between government and private sector)
IO10 International Expertise Identify international expert counterparts and foster international efforts to address cybersecurity issues, including information sharing and assistance efforts CC5 Points of Contact Establish points of contact (or CSIRT) within government, industry and university to facilitate consultation, cooperation and information exchange with national CERT, in order to monitor and evaluate NCSec performance in each sector
5 - EM Evaluation and Monitoring 5 - EM Evaluation and Monitoring 5 - EM Evaluation and Monitoring 5 - EM Evaluation and Monitoring
EM1 NCSec Observatory Set up the NCSec observatory EM3 NCSec Assessment Assess and periodically reassess the current state of cybersecurity efforts and develop program priorities
EM2 Mechanisms for Evaluation Define mechanisms that can be used to coordinate the activities of the lead institution, the government, the private sector and civil society, in order to monitor and evaluate the global NCSec performance EM4 NCSec Governance Provide National Cybersecurity Governance
9
ACM Publication December 2008
10
5 - NCSec Maturity Model
PS Mor Process Description Level 1 Level 2 Level 3 Level 4 Level 5
SP1 3 Promulgate endorse a National Cybersecurity Strategy Recognition of the need for a National strategy NCSec is announced planned. NCSec is operational for all key activities NCSec is under regular review NCSec is under continuous improvement
SP2 1 Identify a lead institution for developing a national strategy, and 1 lead institution per stakeholder category Some institutions have an individual cyber- security strategy Lead institutions are announced for all key activities Lead institutions are operational for all key activities Lead institutions are under regular review Lead institutions are under continuous improvement
SP3 2 Identify or define policies of the NCSec strategy Ad-hoc Isolated approaches to policies practices Similar common processes announced planned Policies and procedures are defined, documented, operational National best practices are applied repeatable Integrated policies procedures Transnational best practice
SP4 1 Establish integrate Risk management process for Identifying prioritizing protective efforts regarding NCSec (CIIP) Recognition of the need for risk management process in CIIP CIIP are identified planned. Risk management process is announced Risk management process is approved operational for all CIIP CIIP risk management process is complete, repeatable, and lead to CI best practices CIIP risk management process evolves to automated workflow integrated to enable improvement
11
Example SP1 Maturity Model
  • the first process SP1 consists in Promulgating
    and endorsing a National Cybersecurity Strategy.
  •  
  • Process SP1 is in conformance with level 5 if the
    following conditions are respected
  • Recognition of the need for National
    Cybersecurity Strategy
  • the NCSec strategy is announced and planned
  • the NCSec strategy is operational
  • the NCSec strategy is under a regular review
  • the NCSec strategy is under continuous
    improvement

12
6 - NCSec Assessment
ce
Legend SP1 National Cybersecurity Strategy
SP4 CIIP IO2 National Cybersecurity Authority
IO3 National-CERT IO5 Cyber Law AC5
Awareness Programme CC1 International
Cooperation CC2 National Coordination EM4
Cybersecurity Governance
13
7 - RACI Chart / Stakeholders
SP1 NCSec Strategy Promulgate endorse a National Cybersecurity Strategy I A C C R C C C I I R I I I
SP2 Lead Institutions Identify a lead institutions for developing a national strategy, and 1 lead institution per stakeholder category I I A C R C C I I R C C C C
SP3 NCSec Policies Identify or define policies of the NCSec strategy A C R C I C I R I I
SP4 Critical Infrastructures Establish integrate risk management for identifying prioritizing protective efforts regarding NCSec (CIIP) A R R C I R C R I
R Responsible, A Accountable, C Consulted,
I Informed
14
8 - Implementation Guide
15
ITU-D / SG1 / Question 22-1/1Securing
information and communication networks, best
practices for developing a culture of
cybersecurity
  • Report of the meeting of the Rapporteur Group on
    Question 22-1/1 (Geneva, Wednesday, 22 September
    2010
  • Document 1/23 was presented by Morocco. It
    provides a model for administrations to use in
    managing their cybersecurity programme based on
    ISO 27000 family and COBIT. It was suggested that
    it could be a framework to be used by developing
    countries in assessing their cybersecurity
    strategy. The Rapporteur asked the BDT to put the
    entire document on the web site of Study Group 1
    and invited comments for the next meeting.

16
Thank you for your attentionEmail
t.debbagh_at_technologies.gov.maor
tdebbagh_at_gmail.com
Write a Comment
User Comments (0)
About PowerShow.com