SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
From CERT-Hungary
to National Cybersecurity Centre


                Ferenc Suba LLM, MA
                Chairman of the Board
                PTA CERT-Hungary
                Vice-chair of the MB
                ENISA
CERT-Hungary
- Started as a project by the Ministry of IT and
Communications, now under Prime Minister’s Office
- Partnership Agreements with: National Communications
Authority, Financial Regulatory Authority, Prime Minister’s
Office, National Bureau of Investigation
- Accredited member of FIRST, TI, EGC
- Operator of the National Alert Service of Communications as
contractor
- Responsible for information security of the e-gov backbone
network
- Trusted partner of the banking and energy sector (WGs) in
CIIP, regular exercises
-- International co-operations: FI-ISAC, Meridian, IWWN

-- CERT capacity building: Bulgaria, South Africa
Government Foundation

- Theodore Puskás Government Foundation
- Founded in 1993 by the Government of Hungary, academia,
business companies
- Governed by the Civil Code, Act on Public Benefit
Organisations
- Part of the yearly state budget
- Supervised by the Prime Minister’s Office
- Engaged in technology transfer, information security
- Entitled to have business activities (max. 20% of the yearly
income)
- Flexible organisation, staff motivation, survives government
changes
- Think tank, preparation of regulation, project management,
technical service
e-Commerce Act
- Only tool to motivate the ISPs
- Liability clauses: indirect liability for ISPs = ISP is liable for
any wrongdoing committed through its system if ISP does not
co-operate to make the wrongdoing impossible
- Reason: criminals are anonymous + attacks come through
the ISPs + only ISPs can effectively take measures against
them
- Liability forms vary according to the function: content
provider, storage provider, access provider, cache provider,
information location tool provider
- Principle: ISPs liability stands as of an e-mail about the
wrongdoing committed through its system has been received
Ministerial Decree on National Alert Service
                      for Communications

- Regulates CIIP in communications sector
- Defines critical infrastructures legally
- Defines incidents flexbily (list updated by the National
Communications Authority)
- Designates 8 communications providers (biggest ones)
- Reporting obligation of the designated providers
- Reports on incidents affecting at least 1000 users
- Reports received and distributed by the Alert Service Centre
- Distribution list: Ministries, Centre for Crisis Management,
Services
- Alert Service Centre outsourced to CERT-Hungary, under the
supervision of the National Communications Authority
Government Decree No 223/2009.
         on the security of public electronic services



- Sections 8-10: National Cybersecurity Centre
- Tasks: crisis management, central governmental system,
National Alert Service for Communications, awareness
raising, preparation of policy, CIIP collaboration, international
representation
- Control: Prime Minister’s Office, IT Security Supervisor
- Framework: Theodore Puskás Government Foundation, by a
public service agreement
- Basic services free for the government, value-added services
for payment
The Hungarian model
- Bottom-up approach, 5 years of evolution
- Establish a flexible organisation
- Be close to central government
-- Use ENISA and partner MSs as leverage

-- Have very strong international background

-- Build up PPPs with interested private sectors

-- Be not only technical (crisis management,

awareness raising, policy making, national and
international collaboration)
-- Distribute your financial resources (state

budget, state project contracts, service
contracts, EU and national research projects)
Thank you for your attention and patience!

         PTA CERT-Hungary
         www.cert-hungary.hu
         Puskás Tivadar Közalapítvány
         www.neti.hu
         ENISA
         www.enisa.europa.eu

Contenu connexe

Tendances

The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsblogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Adriana Dvorsak
 
Cross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesCross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesKarl Larson
 
New Law on Access to Public Information:
New Law on Access to Public Information:New Law on Access to Public Information:
New Law on Access to Public Information:FUSADES
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information PolicyNiamh Headon
 
GDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORIGDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORIKarel Holst
 
2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORI2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORIKarel Holst
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
North Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoodsNorth Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoodslocalinsight
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRIT Governance Ltd
 
The combined effect of the collective effort
The combined effect of the collective effortThe combined effect of the collective effort
The combined effect of the collective effortCSSaunders
 

Tendances (19)

Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
 
PL&B _UK_80
PL&B _UK_80PL&B _UK_80
PL&B _UK_80
 
Cross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesCross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property Issues
 
New Law on Access to Public Information:
New Law on Access to Public Information:New Law on Access to Public Information:
New Law on Access to Public Information:
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information Policy
 
GDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORIGDPR presentation BE-Com - IFORI
GDPR presentation BE-Com - IFORI
 
2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORI2017 09 13_VOKA The Big Refresh - GDPR - IFORI
2017 09 13_VOKA The Big Refresh - GDPR - IFORI
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
North Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoodsNorth Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoods
 
Protecting Europe's Network Infrastructure
 Protecting Europe's Network Infrastructure Protecting Europe's Network Infrastructure
Protecting Europe's Network Infrastructure
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
 
The combined effect of the collective effort
The combined effect of the collective effortThe combined effect of the collective effort
The combined effect of the collective effort
 
Online crime
Online crimeOnline crime
Online crime
 

Similaire à Day 1 From CERT To NCSC

Day 1 Coop Banks
Day 1   Coop BanksDay 1   Coop Banks
Day 1 Coop Banksvngundi
 
Information security (management) at stake in belgium 2017 v1.2
Information security (management) at stake in belgium 2017 v1.2Information security (management) at stake in belgium 2017 v1.2
Information security (management) at stake in belgium 2017 v1.2Dominique Volon
 
SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecurityBigData_Europe
 
Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...
Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...
Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...Metamorphosis
 
Quick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart MeteringQuick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart Meteringnuances
 
Information Security (Management) at Stake In Belgium
Information Security (Management) at Stake In BelgiumInformation Security (Management) at Stake In Belgium
Information Security (Management) at Stake In BelgiumDominique Volon
 
Day 1 Large Scale Attacks
Day 1   Large Scale AttacksDay 1   Large Scale Attacks
Day 1 Large Scale Attacksvngundi
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapterisc2-hellenic
 
CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)Gry Helene Stavseng
 
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...Metamorphosis
 
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...Metamorphosis
 
eGovernment and Interoperability in Italy
eGovernment and Interoperability in ItalyeGovernment and Interoperability in Italy
eGovernment and Interoperability in ItalyGianmarco Piva
 
Information Society, Estonia
Information Society, EstoniaInformation Society, Estonia
Information Society, EstoniaAlianta INFONET
 
E invoicing, the role of the pueb-inlviocic administration in the promotion o...
E invoicing, the role of the pueb-inlviocic administration in the promotion o...E invoicing, the role of the pueb-inlviocic administration in the promotion o...
E invoicing, the role of the pueb-inlviocic administration in the promotion o...Friso de Jong
 
Digital Wallonia. Digital Strategy for Wallonia.
Digital Wallonia. Digital Strategy for Wallonia.Digital Wallonia. Digital Strategy for Wallonia.
Digital Wallonia. Digital Strategy for Wallonia.Agence du Numérique (AdN)
 
Trends and Prospects in the Information Society: Hungary and the New Member S...
Trends and Prospects in the Information Society:Hungary and the New Member S...Trends and Prospects in the Information Society:Hungary and the New Member S...
Trends and Prospects in the Information Society: Hungary and the New Member S...Filipe Mello
 

Similaire à Day 1 From CERT To NCSC (20)

Day 1 Coop Banks
Day 1   Coop BanksDay 1   Coop Banks
Day 1 Coop Banks
 
Cybersecurity nl
Cybersecurity nlCybersecurity nl
Cybersecurity nl
 
Information security (management) at stake in belgium 2017 v1.2
Information security (management) at stake in belgium 2017 v1.2Information security (management) at stake in belgium 2017 v1.2
Information security (management) at stake in belgium 2017 v1.2
 
SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in Cybersecurity
 
Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...
Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...
Estonian experience in inclusive e-government by Mr. Arvo Ott, e-Governance A...
 
Quick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart MeteringQuick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart Metering
 
Information Security (Management) at Stake In Belgium
Information Security (Management) at Stake In BelgiumInformation Security (Management) at Stake In Belgium
Information Security (Management) at Stake In Belgium
 
Day 1 Large Scale Attacks
Day 1   Large Scale AttacksDay 1   Large Scale Attacks
Day 1 Large Scale Attacks
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
 
Natasha - WorldBank
Natasha - WorldBankNatasha - WorldBank
Natasha - WorldBank
 
CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)
 
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
 
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
Austrian experiences in e-gov by Mr. Peter Sonntagbauer, Federal Computing Ce...
 
eGovernment and Interoperability in Italy
eGovernment and Interoperability in ItalyeGovernment and Interoperability in Italy
eGovernment and Interoperability in Italy
 
Information Society, Estonia
Information Society, EstoniaInformation Society, Estonia
Information Society, Estonia
 
European priorities in information security
European priorities in information securityEuropean priorities in information security
European priorities in information security
 
E invoicing, the role of the pueb-inlviocic administration in the promotion o...
E invoicing, the role of the pueb-inlviocic administration in the promotion o...E invoicing, the role of the pueb-inlviocic administration in the promotion o...
E invoicing, the role of the pueb-inlviocic administration in the promotion o...
 
Digital Wallonia. Digital Strategy for Wallonia.
Digital Wallonia. Digital Strategy for Wallonia.Digital Wallonia. Digital Strategy for Wallonia.
Digital Wallonia. Digital Strategy for Wallonia.
 
Andrus Aaslaid - E-government v Estónsku
Andrus Aaslaid - E-government v Estónsku Andrus Aaslaid - E-government v Estónsku
Andrus Aaslaid - E-government v Estónsku
 
Trends and Prospects in the Information Society: Hungary and the New Member S...
Trends and Prospects in the Information Society:Hungary and the New Member S...Trends and Prospects in the Information Society:Hungary and the New Member S...
Trends and Prospects in the Information Society: Hungary and the New Member S...
 

Plus de vngundi

Anatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, SymantecAnatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, Symantecvngundi
 
Dealing With Security Threats
Dealing With Security ThreatsDealing With Security Threats
Dealing With Security Threatsvngundi
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Day 2 Dns Cert 4 Scenarios
Day 2   Dns Cert 4 ScenariosDay 2   Dns Cert 4 Scenarios
Day 2 Dns Cert 4 Scenariosvngundi
 
Day 2 Dns Cert 4c Malicious Use
Day 2   Dns Cert 4c Malicious UseDay 2   Dns Cert 4c Malicious Use
Day 2 Dns Cert 4c Malicious Usevngundi
 
Day 2 Dns Cert 4b Name Server Redirection
Day 2   Dns Cert 4b Name Server RedirectionDay 2   Dns Cert 4b Name Server Redirection
Day 2 Dns Cert 4b Name Server Redirectionvngundi
 
Day 2 Dns Cert 4a Cache Poisoning
Day 2   Dns Cert 4a Cache PoisoningDay 2   Dns Cert 4a Cache Poisoning
Day 2 Dns Cert 4a Cache Poisoningvngundi
 
Day 2 Dns Cert 3 Dns Organizations
Day 2   Dns Cert 3 Dns OrganizationsDay 2   Dns Cert 3 Dns Organizations
Day 2 Dns Cert 3 Dns Organizationsvngundi
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirtvngundi
 

Plus de vngundi (9)

Anatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, SymantecAnatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, Symantec
 
Dealing With Security Threats
Dealing With Security ThreatsDealing With Security Threats
Dealing With Security Threats
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Day 2 Dns Cert 4 Scenarios
Day 2   Dns Cert 4 ScenariosDay 2   Dns Cert 4 Scenarios
Day 2 Dns Cert 4 Scenarios
 
Day 2 Dns Cert 4c Malicious Use
Day 2   Dns Cert 4c Malicious UseDay 2   Dns Cert 4c Malicious Use
Day 2 Dns Cert 4c Malicious Use
 
Day 2 Dns Cert 4b Name Server Redirection
Day 2   Dns Cert 4b Name Server RedirectionDay 2   Dns Cert 4b Name Server Redirection
Day 2 Dns Cert 4b Name Server Redirection
 
Day 2 Dns Cert 4a Cache Poisoning
Day 2   Dns Cert 4a Cache PoisoningDay 2   Dns Cert 4a Cache Poisoning
Day 2 Dns Cert 4a Cache Poisoning
 
Day 2 Dns Cert 3 Dns Organizations
Day 2   Dns Cert 3 Dns OrganizationsDay 2   Dns Cert 3 Dns Organizations
Day 2 Dns Cert 3 Dns Organizations
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirt
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Day 1 From CERT To NCSC

  • 1. From CERT-Hungary to National Cybersecurity Centre Ferenc Suba LLM, MA Chairman of the Board PTA CERT-Hungary Vice-chair of the MB ENISA
  • 2.
  • 3. CERT-Hungary - Started as a project by the Ministry of IT and Communications, now under Prime Minister’s Office - Partnership Agreements with: National Communications Authority, Financial Regulatory Authority, Prime Minister’s Office, National Bureau of Investigation - Accredited member of FIRST, TI, EGC - Operator of the National Alert Service of Communications as contractor - Responsible for information security of the e-gov backbone network - Trusted partner of the banking and energy sector (WGs) in CIIP, regular exercises -- International co-operations: FI-ISAC, Meridian, IWWN -- CERT capacity building: Bulgaria, South Africa
  • 4. Government Foundation - Theodore Puskás Government Foundation - Founded in 1993 by the Government of Hungary, academia, business companies - Governed by the Civil Code, Act on Public Benefit Organisations - Part of the yearly state budget - Supervised by the Prime Minister’s Office - Engaged in technology transfer, information security - Entitled to have business activities (max. 20% of the yearly income) - Flexible organisation, staff motivation, survives government changes - Think tank, preparation of regulation, project management, technical service
  • 5. e-Commerce Act - Only tool to motivate the ISPs - Liability clauses: indirect liability for ISPs = ISP is liable for any wrongdoing committed through its system if ISP does not co-operate to make the wrongdoing impossible - Reason: criminals are anonymous + attacks come through the ISPs + only ISPs can effectively take measures against them - Liability forms vary according to the function: content provider, storage provider, access provider, cache provider, information location tool provider - Principle: ISPs liability stands as of an e-mail about the wrongdoing committed through its system has been received
  • 6. Ministerial Decree on National Alert Service for Communications - Regulates CIIP in communications sector - Defines critical infrastructures legally - Defines incidents flexbily (list updated by the National Communications Authority) - Designates 8 communications providers (biggest ones) - Reporting obligation of the designated providers - Reports on incidents affecting at least 1000 users - Reports received and distributed by the Alert Service Centre - Distribution list: Ministries, Centre for Crisis Management, Services - Alert Service Centre outsourced to CERT-Hungary, under the supervision of the National Communications Authority
  • 7. Government Decree No 223/2009. on the security of public electronic services - Sections 8-10: National Cybersecurity Centre - Tasks: crisis management, central governmental system, National Alert Service for Communications, awareness raising, preparation of policy, CIIP collaboration, international representation - Control: Prime Minister’s Office, IT Security Supervisor - Framework: Theodore Puskás Government Foundation, by a public service agreement - Basic services free for the government, value-added services for payment
  • 8. The Hungarian model - Bottom-up approach, 5 years of evolution - Establish a flexible organisation - Be close to central government -- Use ENISA and partner MSs as leverage -- Have very strong international background -- Build up PPPs with interested private sectors -- Be not only technical (crisis management, awareness raising, policy making, national and international collaboration) -- Distribute your financial resources (state budget, state project contracts, service contracts, EU and national research projects)
  • 9. Thank you for your attention and patience! PTA CERT-Hungary www.cert-hungary.hu Puskás Tivadar Közalapítvány www.neti.hu ENISA www.enisa.europa.eu