SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
CENTRE FOR STRATEGIC
CYBERSPACE + SECURITY SCIENCECSCSS
CSCSS / CYBERSECURITY
CYBERCRIME CYBER INTELLIGENCE
GROUP
C C3i
DISCOVER. DEFEND. ENSURE.
The C3i Group facilitates open dialog, communication, and information
sharing among key public-private entities enabling them to DISCOVER
what is at cyber-counterintelligence risk, how to DEFEND against it, and
how to ENSURE cyber-secure competitiveness in the digital global economy.
As the threats to national-international security and economic growth
increase and become more complex and global, members of intelligence
communities, government agencies, and industry are working more
closely together than ever before. We engage with a broad variety of
national-international government agencies, public-private industry, and
academic institutions to counter the extensive range of threats faced in
cyberspace, and to ensure information assurance, protection, and freedom.
The C3i Group brings together and leverages unique, highly complementary
skills sets to take on an ever-increasing range of issues that encompass
extremely technical international, cultural, socio-economic, and human
intelligence facets.
THE C3I GROUP is a national-international outreach
venture providing strategic leadership in
Cybersecurity, Cybercrime, and Cyber Intelligence.
C C3i
Who We Work With
The C3i Group works in collaboration with public-private
industry, government, and academia, leveraging strategic
interagency and international cyber-counterintelligence
community partnerships to safeguard intellectual property (IP)
and technologies which, if compromised, would dramatically
impact innovation, competitive intelligence, and economic-
national security.
The C3i Group focuses on all aspects of computer crime
and incident response including the provision of
leadership pertaining to intrusion investigations,
cybercrime law, digital forensics, and information
assurance, as well as the research, development, testing,
and evaluation of digital forensic tools.
Through education, information, and collaboration, the C3i
Group enables its partners to identify cyber-counterintelligence
vulner-abilities within their organizations and increase their
awareness of threats to organizational, economic, and national
security.
C3i Group - Targeting Campuses of Higher Education:
Sensitive, Proprietary, and Classified Information and
Intellectual Property
Foreign and domestic businesses compete internationally and
often leverage their intelligence assets to spy on other
businesses or academic institutions in an effort to gain
advantage in a fiercely competitive economic environment. Due
to the open nature of academic institutions, and their
involvement in cutting-edge research and development, they are
often leading targets.
To accomplish their goals, duplicitous or opportunistic actors or
organizations may use a variety of methods such as:
n Hacking/computer intrusions
n Collection of sensitive research and development
n Utilizing/recruiting students or visiting professors to collect
information
n Sending spies for language and cultural exchanges, training,
or to establish credentials
n Funding or establishing university research and development
programs
Some foreign governments provide information and resources,
including competitive intelligence gathering and corporate
espionage on behalf of their indigenous companies, as a way to
promote the overall economic well-being of their country.
Foreign intelligence services pursue restricted information and
seek out people who have, or will eventually have, access to
restricted information. Individual entrepreneurs may capitalize
on opportunities to bring new technology or services to their
country in order to fill a niche currently supplied by non-native
companies.
The open environment of campuses of higher education may
be leveraged in order to:
n Steal technical information or products
n Bypass expensive research and development
n Recruit individuals for espionage
n Exploit the student visa program for improper purposes
n Spread false information for political or other reasons
In support of global academic initiatives, the C3i Group
promotes communication and information sharing among key
public-private entities, and generates positive continuous
dialogue between security organizations, the cyber-
counterintelligence community, national security partners, and
the academic community regarding security issues and
concerns.
Our Roles and Responsibilities
The C3i Group works with interagency partners and the security
industry, collecting information intelligence related to risks
emanating from cyberspace. We provide direction and
leadership to industry, focusing on the intrinsic risks and threats
posed by: potential shortcomings in the cyber information
security infrastructure; actions of non-state actors, cyber-
terrorists, and criminals; foreign business competitors and
governments intent on illegitimately acquiring proprietary
information and trade secrets.
Ultimately, to protect and secure intellectual property (IP), C3i
supports the prevention and detection of serious crime through:
n Identifying threats and security opportunities early
n Shaping security research and development to prevent threats
from emerging
n Development of significant intelligence relationships with the
'Five Eyes' (US, UK, Canada, Australia, and New Zealand)
n Investing in security and business intelligence partners to
develop practical programs, security capacity, and skills training
All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved
How We Operate
We work closely with a range of other agencies and
organizations seeking to counter threats that can impact
national and economic security.
The C3i Group provides security guidance to a range
of organizations focusing on:
n Protecting key elements of the information infrastructure
which are crucial to the continued delivery of essential
services and national security
n Preventing the loss, through espionage, of intellectual
property and/or of sensitive information that could damage
national and economic security and well-being
n Advising companies and organizations possessing sought-
after information, technologies, equipment, and/or
intellectual property (IP) on how to protect their assets
n Reducing the vulnerability of national critical infrastructure
to cyber-terrorism and other threats
n Cooperative efforts to utilize new and emerging technologies
for securing private, governmental, and national critical
infrastructure from a global perspective
n Improving warning, defense, and response to the security
challenges of tomorrow's cyber-environments
The C3i Group provides key focus briefings pertaining to:
n Cybercrime/Organized Crime/Cyber-Cartels
n Intrusion Investigations and Legal Requirements
n Cybercrime Law/Law Enforcement/Criminal Investigation
n Digital Forensics/Forensics Examinations
n Information Assurance
n Cyber Research and Development
n Sensitive, Proprietary, and Classified Information
on Campuses of Higher Education
n Cyber Skills Training
n Domestic-Foreign, Economic-Commercial Rivals
n Economic Espionage
n Foreign-National Intelligence Entities-Officers (Spies)
n Theft of Trade Secrets, Intellectual Property/Intellectual
Property Rights
n Insider Attacks - Disgruntled Employees
C3i Group Objectives
n Educate business and industry to help define their critical role
in protecting programs of vital interest to national security
n Promote competitive intelligence/counterintelligence
information sharing between the security industry,
government agencies, the public-private sectors, and
academia
n Encourage C3i Group interaction (related to competitive
intelligence and counterintelligence issues) through trusted
on-going relationships with CSCSS/C3i Group members
n Advise C3i Working Group members on how to assess
vulnerabilities that can lead to information leakage or
exploitation
n Provide leadership to industry on how to adapt their internal/
external behaviors to eliminate or mitigate vulnerabilities
n Understand global developments in cybersecurity, cyber-fraud,
counterintelligence, and cyber-warfare
C3i Group Deliverables
n Latest methods for network security, analysis, and intruder
identification
n Actionable threat intelligence to anticipate and prevent
future attacks
n Pragmatic management of cyber-operations across the
government and private-public sectors
n Greater legal clarity for cyber-operations, and rules for
cybersecurity and conflicts
n Effective international cyber-crisis response capabilities
n Strategies to promote a shift in cyber-defense doctrine
from reactive to proactive
n Effective and secure recruitment and training of the next
generation of cybersecurity analysts, operators, and warriors
Counter-intelligence or Counterintelligence (CI):
Refers to efforts made by intelligence groups or
organizations to prevent the successful gathering
and collecting of intelligence against them.
All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved
About CSCSS
The Centre for Strategic Cyberspace + Security Science / CSCSS
is a multilateral, international not-for-profit organization that
conducts independent cyber-centric research, development,
analysis, and training in the areas of cyberspace, defence
intelligence, cyber security, and science while addressing the
threats, trends, and opportunities shaping international security
policies and national cyberspace cyber security initiatives.
CSCSS, as a strategic leader in cyberspace, works jointly with
key partners to address, develop, and define cyber technologies,
cyber defence force capabilities, information dominance, and
concept operations. We deliver practical recommendations and
innovative solutions and strategies to advance a secure
cyberspace domain.
Internationally, CSCSS operates in the United Kingdom, Europe,
United States, South America, Australia, and Canada.
CSCSS Collaborative Partners
The Centre for Strategic Cyberspace + Security Science operates
in a collaborative partnership with agencies and organizations
that share our commitment to the advancement of Cybersecurity,
National + International Security, Cyber Education and
Awareness, and Cybersecurity Research and Initiatives.
Contact Us
For more information on the C3i Group, the Centre for Strategic
Cyberspace + Security Science, its programmes or to find out
how we can help you please contact us.
CSCSS / Centre for Strategic Cyberspace + Security
Washington D.C + 571.451.0312
London, United Kingdom +44 2035141784
North America +877.436.6746
Middle East +855.237.8767
Australia +61 2.8003.7553
Email c3i@cscss.org
CENTRE FOR STRATEGIC
CYBERSPACE + SECURITY SCIENCECSCSS
This arm of the C3i Group provides strategic focus for senior executives working within industry, government,
and academia, enhancing their understanding of the cyber-threats posed by foreign intelligence services and
national-foreign competitors. The C3i Working Group also provides a forum for the discussion of national
security issues of common concern.
Through our programs, the C3i Group aims to reduce the vulnerability of national infrastructure to e-terrorism
and other cyber-threats. National infrastructure consists of key assets and faces a number of threats, from
international and domestic terrorism to espionage
and other hostile foreign activity.
To counter these threats, the C3i Group delivers expert advice and leadership to businesses and organizations
across the national information infrastructure covering physical, personal, and information security; all
informed by access to intelligence and information about current cyber-threats and emerging trends.
Members of the C3i Working Group will be able to participate in discussions and debates on frameworks for
collaborative efforts with representatives from the administration, military services, intelligence/
government agencies, industry, and academia within the scope of the C3i Group’s mandate: Cybersecurity,
Cybercrime, and Cyber Intelligence.
CSCSS.org
C C3i
WORKING GROUP
All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved

Contenu connexe

Tendances

Cyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by ImprevaCyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by ImprevaGhader Ahmadi
 
Think Cyber Think Resilience | William Barker | March 2016
Think Cyber Think Resilience | William Barker  | March 2016Think Cyber Think Resilience | William Barker  | March 2016
Think Cyber Think Resilience | William Barker | March 2016Anna Fenston
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYAndrew Bichlmeier
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Chris Hails
 
CCIS short presentation - English version
CCIS short presentation -  English versionCCIS short presentation -  English version
CCIS short presentation - English versionGry Helene Stavseng
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Chris Hails
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT UpdatesAPNIC
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Benjamin Ang
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)Gry Helene Stavseng
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaDale Butler
 
Introduction to STIX 101
Introduction to STIX 101Introduction to STIX 101
Introduction to STIX 101stixproject
 
Summary-ECSM_4edition
Summary-ECSM_4editionSummary-ECSM_4edition
Summary-ECSM_4editionRalf Braga
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 

Tendances (20)

Cyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by ImprevaCyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by Impreva
 
Think Cyber Think Resilience | William Barker | March 2016
Think Cyber Think Resilience | William Barker  | March 2016Think Cyber Think Resilience | William Barker  | March 2016
Think Cyber Think Resilience | William Barker | March 2016
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITY
 
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHSInsight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
 
CCIS short presentation - English version
CCIS short presentation -  English versionCCIS short presentation -  English version
CCIS short presentation - English version
 
CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North America
 
Introduction to STIX 101
Introduction to STIX 101Introduction to STIX 101
Introduction to STIX 101
 
Summary-ECSM_4edition
Summary-ECSM_4editionSummary-ECSM_4edition
Summary-ECSM_4edition
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 

Similaire à CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP

The Significance of Counterintelligence in National Security.docx
The Significance of Counterintelligence in National Security.docxThe Significance of Counterintelligence in National Security.docx
The Significance of Counterintelligence in National Security.docxNoraRoberts5
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Invest Northern Ireland
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfjasonuchiha2
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Mark Skilton
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
Introduction-to-the-Security-Industry-in-the-Philippines.pptx
Introduction-to-the-Security-Industry-in-the-Philippines.pptxIntroduction-to-the-Security-Industry-in-the-Philippines.pptx
Introduction-to-the-Security-Industry-in-the-Philippines.pptxcodedante06
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscapecyberprosocial
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Trilateral Research
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeErnst & Young
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeNishantSisodiya
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscapegreendigital
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 

Similaire à CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP (20)

The Significance of Counterintelligence in National Security.docx
The Significance of Counterintelligence in National Security.docxThe Significance of Counterintelligence in National Security.docx
The Significance of Counterintelligence in National Security.docx
 
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
CSCSS ISC (INTERNATIONAL STRATEGY FOR CYBERSPACE)
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Cybercrime Surveillance.docx
Cybercrime Surveillance.docxCybercrime Surveillance.docx
Cybercrime Surveillance.docx
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Introduction-to-the-Security-Industry-in-the-Philippines.pptx
Introduction-to-the-Security-Industry-in-the-Philippines.pptxIntroduction-to-the-Security-Industry-in-the-Philippines.pptx
Introduction-to-the-Security-Industry-in-the-Philippines.pptx
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
 
Understanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in AsiaUnderstanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in Asia
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 

Dernier

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Dernier (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP

  • 1. CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCECSCSS CSCSS / CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP C C3i DISCOVER. DEFEND. ENSURE.
  • 2. The C3i Group facilitates open dialog, communication, and information sharing among key public-private entities enabling them to DISCOVER what is at cyber-counterintelligence risk, how to DEFEND against it, and how to ENSURE cyber-secure competitiveness in the digital global economy. As the threats to national-international security and economic growth increase and become more complex and global, members of intelligence communities, government agencies, and industry are working more closely together than ever before. We engage with a broad variety of national-international government agencies, public-private industry, and academic institutions to counter the extensive range of threats faced in cyberspace, and to ensure information assurance, protection, and freedom. The C3i Group brings together and leverages unique, highly complementary skills sets to take on an ever-increasing range of issues that encompass extremely technical international, cultural, socio-economic, and human intelligence facets. THE C3I GROUP is a national-international outreach venture providing strategic leadership in Cybersecurity, Cybercrime, and Cyber Intelligence. C C3i
  • 3. Who We Work With The C3i Group works in collaboration with public-private industry, government, and academia, leveraging strategic interagency and international cyber-counterintelligence community partnerships to safeguard intellectual property (IP) and technologies which, if compromised, would dramatically impact innovation, competitive intelligence, and economic- national security. The C3i Group focuses on all aspects of computer crime and incident response including the provision of leadership pertaining to intrusion investigations, cybercrime law, digital forensics, and information assurance, as well as the research, development, testing, and evaluation of digital forensic tools. Through education, information, and collaboration, the C3i Group enables its partners to identify cyber-counterintelligence vulner-abilities within their organizations and increase their awareness of threats to organizational, economic, and national security. C3i Group - Targeting Campuses of Higher Education: Sensitive, Proprietary, and Classified Information and Intellectual Property Foreign and domestic businesses compete internationally and often leverage their intelligence assets to spy on other businesses or academic institutions in an effort to gain advantage in a fiercely competitive economic environment. Due to the open nature of academic institutions, and their involvement in cutting-edge research and development, they are often leading targets. To accomplish their goals, duplicitous or opportunistic actors or organizations may use a variety of methods such as: n Hacking/computer intrusions n Collection of sensitive research and development n Utilizing/recruiting students or visiting professors to collect information n Sending spies for language and cultural exchanges, training, or to establish credentials n Funding or establishing university research and development programs Some foreign governments provide information and resources, including competitive intelligence gathering and corporate espionage on behalf of their indigenous companies, as a way to promote the overall economic well-being of their country. Foreign intelligence services pursue restricted information and seek out people who have, or will eventually have, access to restricted information. Individual entrepreneurs may capitalize on opportunities to bring new technology or services to their country in order to fill a niche currently supplied by non-native companies. The open environment of campuses of higher education may be leveraged in order to: n Steal technical information or products n Bypass expensive research and development n Recruit individuals for espionage n Exploit the student visa program for improper purposes n Spread false information for political or other reasons In support of global academic initiatives, the C3i Group promotes communication and information sharing among key public-private entities, and generates positive continuous dialogue between security organizations, the cyber- counterintelligence community, national security partners, and the academic community regarding security issues and concerns. Our Roles and Responsibilities The C3i Group works with interagency partners and the security industry, collecting information intelligence related to risks emanating from cyberspace. We provide direction and leadership to industry, focusing on the intrinsic risks and threats posed by: potential shortcomings in the cyber information security infrastructure; actions of non-state actors, cyber- terrorists, and criminals; foreign business competitors and governments intent on illegitimately acquiring proprietary information and trade secrets. Ultimately, to protect and secure intellectual property (IP), C3i supports the prevention and detection of serious crime through: n Identifying threats and security opportunities early n Shaping security research and development to prevent threats from emerging n Development of significant intelligence relationships with the 'Five Eyes' (US, UK, Canada, Australia, and New Zealand) n Investing in security and business intelligence partners to develop practical programs, security capacity, and skills training All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved
  • 4. How We Operate We work closely with a range of other agencies and organizations seeking to counter threats that can impact national and economic security. The C3i Group provides security guidance to a range of organizations focusing on: n Protecting key elements of the information infrastructure which are crucial to the continued delivery of essential services and national security n Preventing the loss, through espionage, of intellectual property and/or of sensitive information that could damage national and economic security and well-being n Advising companies and organizations possessing sought- after information, technologies, equipment, and/or intellectual property (IP) on how to protect their assets n Reducing the vulnerability of national critical infrastructure to cyber-terrorism and other threats n Cooperative efforts to utilize new and emerging technologies for securing private, governmental, and national critical infrastructure from a global perspective n Improving warning, defense, and response to the security challenges of tomorrow's cyber-environments The C3i Group provides key focus briefings pertaining to: n Cybercrime/Organized Crime/Cyber-Cartels n Intrusion Investigations and Legal Requirements n Cybercrime Law/Law Enforcement/Criminal Investigation n Digital Forensics/Forensics Examinations n Information Assurance n Cyber Research and Development n Sensitive, Proprietary, and Classified Information on Campuses of Higher Education n Cyber Skills Training n Domestic-Foreign, Economic-Commercial Rivals n Economic Espionage n Foreign-National Intelligence Entities-Officers (Spies) n Theft of Trade Secrets, Intellectual Property/Intellectual Property Rights n Insider Attacks - Disgruntled Employees C3i Group Objectives n Educate business and industry to help define their critical role in protecting programs of vital interest to national security n Promote competitive intelligence/counterintelligence information sharing between the security industry, government agencies, the public-private sectors, and academia n Encourage C3i Group interaction (related to competitive intelligence and counterintelligence issues) through trusted on-going relationships with CSCSS/C3i Group members n Advise C3i Working Group members on how to assess vulnerabilities that can lead to information leakage or exploitation n Provide leadership to industry on how to adapt their internal/ external behaviors to eliminate or mitigate vulnerabilities n Understand global developments in cybersecurity, cyber-fraud, counterintelligence, and cyber-warfare C3i Group Deliverables n Latest methods for network security, analysis, and intruder identification n Actionable threat intelligence to anticipate and prevent future attacks n Pragmatic management of cyber-operations across the government and private-public sectors n Greater legal clarity for cyber-operations, and rules for cybersecurity and conflicts n Effective international cyber-crisis response capabilities n Strategies to promote a shift in cyber-defense doctrine from reactive to proactive n Effective and secure recruitment and training of the next generation of cybersecurity analysts, operators, and warriors Counter-intelligence or Counterintelligence (CI): Refers to efforts made by intelligence groups or organizations to prevent the successful gathering and collecting of intelligence against them. All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved
  • 5. About CSCSS The Centre for Strategic Cyberspace + Security Science / CSCSS is a multilateral, international not-for-profit organization that conducts independent cyber-centric research, development, analysis, and training in the areas of cyberspace, defence intelligence, cyber security, and science while addressing the threats, trends, and opportunities shaping international security policies and national cyberspace cyber security initiatives. CSCSS, as a strategic leader in cyberspace, works jointly with key partners to address, develop, and define cyber technologies, cyber defence force capabilities, information dominance, and concept operations. We deliver practical recommendations and innovative solutions and strategies to advance a secure cyberspace domain. Internationally, CSCSS operates in the United Kingdom, Europe, United States, South America, Australia, and Canada. CSCSS Collaborative Partners The Centre for Strategic Cyberspace + Security Science operates in a collaborative partnership with agencies and organizations that share our commitment to the advancement of Cybersecurity, National + International Security, Cyber Education and Awareness, and Cybersecurity Research and Initiatives. Contact Us For more information on the C3i Group, the Centre for Strategic Cyberspace + Security Science, its programmes or to find out how we can help you please contact us. CSCSS / Centre for Strategic Cyberspace + Security Washington D.C + 571.451.0312 London, United Kingdom +44 2035141784 North America +877.436.6746 Middle East +855.237.8767 Australia +61 2.8003.7553 Email c3i@cscss.org CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCECSCSS This arm of the C3i Group provides strategic focus for senior executives working within industry, government, and academia, enhancing their understanding of the cyber-threats posed by foreign intelligence services and national-foreign competitors. The C3i Working Group also provides a forum for the discussion of national security issues of common concern. Through our programs, the C3i Group aims to reduce the vulnerability of national infrastructure to e-terrorism and other cyber-threats. National infrastructure consists of key assets and faces a number of threats, from international and domestic terrorism to espionage and other hostile foreign activity. To counter these threats, the C3i Group delivers expert advice and leadership to businesses and organizations across the national information infrastructure covering physical, personal, and information security; all informed by access to intelligence and information about current cyber-threats and emerging trends. Members of the C3i Working Group will be able to participate in discussions and debates on frameworks for collaborative efforts with representatives from the administration, military services, intelligence/ government agencies, industry, and academia within the scope of the C3i Group’s mandate: Cybersecurity, Cybercrime, and Cyber Intelligence. CSCSS.org C C3i WORKING GROUP All trademarks or registered trademarks are properties of their respective owners. Copyright © 2013 The Centre for Strategic Cyberspace + Security Science. All rights reserved