SlideShare une entreprise Scribd logo
1  sur  21
Cybersecurity Forum 2010 To ensure resilience and security in e-communication networks, a PPP  challenge Sweden - Lessons learned Anders Johanson 2009-02-26
Customer expectations ,[object Object],[object Object],[object Object],[object Object]
Societal expectations ,[object Object],[object Object]
The Swedish NRA - PTS ,[object Object],[object Object],[object Object]
Criteria to start PPP-projects  ,[object Object],[object Object],[object Object],[object Object]
Ex. 1 National Telecommunications Coordination Group (NTCG) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Ex. 2 MIMER –GIS Multipurpose Information Management and Exchange for Robustness ,[object Object],[object Object],[object Object],[object Object],[object Object]
” Where”  ” When” ” What, how and why” Which services etc 867513 Videotelefoni fungerar inte i området. Problem att ringa 3G-samtal och surfa med hög hastighet.  Beräknad klartid 081103 kl 14.00
Major SP:s inform publicly on disruptions in real- time  ,[object Object]
Option to show 10 at one time and/o, if more disturbances, to start paging function General information: Currently there are severe disturbances in broadband in X-county due to... … Id 1   Municipality  Limited or no conn-  20070831;08.15  2007-08-31; 10.00  GSM, 3G, GPRS... in x-county  ectivity in X due to… Id 2 Etc. Dist. ID  Location Descr. and Cause Occurred  Estimated end  Affected service  Customers affe. Cause is described with standard texts such as ”cable malfunction", ”equipment malfunction", ”maintenance work", ”or ”weather”  Numbers of affected customers are stated only re fixed networks Clickable link, when clicking zoom is activated (and centers) map to disturbance. Map shows the hold disturbance. From zoom situation 1:50000 will each disturbance in the map be identifiable with marking in the map (where disturbance ID is shown). Free text: Descriptive text; Optional information Descriptive text does not need to have interactive link to list or map (Presentation of Map / GIS ) (Presentation of descriptive text) (Presentation of List) List automatically generated on the basis of what is shown in the map. The list is populated at scale 1:3 000000 (corresponding to Norrbottens County), i.e. from this scale may the list ”be activated” by the member. The list contains all disturbances present in current map MIMER II, Common Situation Awarenes GUI example 1: 3 000 000
Ex 3 Major excercises ,[object Object],[object Object],[object Object],[object Object]
Ex. 4 National Portal for Cables and Pipes
Network-owners registers information about his network in a database – existing/non-existing in a km-grid throughout the nation Power Grids Data- filtering Telco-networks Local Utilities Local Broadband Local Authorities Federal Networks Network information i stored in database only as ”existing/non-existing in every km-grid
Databas Call center Power Grids Telco-networks Local Utilities Local Broadband Local Authorities Federal Networks Query In the portal, planned digging is outlined by contractor 1 Query is sent to database 2 Database confirms immediately that there are four network-owners in the area and that the contractor will receive information from relevant network-owners 3 Information is relayed to network-owners who have networks in relevant km-grid 4
Database Call centre Power Grids Telco-networks Local Utilities Local Broadband Local Authorities Federal Networks Each network-owner will answer the contractor relevant to the respective networks topology Answers from network-owners
Ex. 5 Strategy to Improve Internet Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of Measures in the Action Plan ,[object Object],[object Object],[object Object],[object Object],[object Object]
Ex. 6 Swedish national CERT - SITIC ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
Lessons learned ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010segughana
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victorsegughana
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Wardsegughana
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Martin Tom-Petersen
 
CTO Annual Report 2009-10
CTO Annual Report 2009-10CTO Annual Report 2009-10
CTO Annual Report 2009-10segughana
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...DATA SECURITY SOLUTIONS
 
Cyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transportCyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transportAndrey Apuhtin
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Benjamin Ang
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Benjamin Ang
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategiesBenjamin Ang
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Benjamin Ang
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondBenjamin Ang
 
IoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkIoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkGwanhoo Lee
 

Tendances (20)

CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016
 
CTO Annual Report 2009-10
CTO Annual Report 2009-10CTO Annual Report 2009-10
CTO Annual Report 2009-10
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 
Cyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transportCyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transport
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyond
 
IoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkIoT Policy and Regulatory Framework
IoT Policy and Regulatory Framework
 

Similaire à CTO-CyberSecurityForum-2010-Anders Johanson

2019 june tcca-public_safety_prioritisation
2019 june tcca-public_safety_prioritisation2019 june tcca-public_safety_prioritisation
2019 june tcca-public_safety_prioritisationalirezazavieh
 
Wireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayWireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayApril Dillard
 
Pp ts the smart grid impact on the danish dsos’ business model
Pp ts the smart grid impact on the danish dsos’ business modelPp ts the smart grid impact on the danish dsos’ business model
Pp ts the smart grid impact on the danish dsos’ business modelZheng Ma
 
handling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augusthandling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augustDaniel Mateos P
 
Telecommunications Policies Standards and Regulations Notes
Telecommunications Policies Standards and Regulations NotesTelecommunications Policies Standards and Regulations Notes
Telecommunications Policies Standards and Regulations NotesHaris Hassan
 
Open Access Network (OAN) & Fixed Mobile Convergence (FMC): Foundation for a ...
Open Access Network (OAN) & Fixed Mobile Convergence (FMC): Foundation for a ...Open Access Network (OAN) & Fixed Mobile Convergence (FMC): Foundation for a ...
Open Access Network (OAN) & Fixed Mobile Convergence (FMC): Foundation for a ...Hedi Hmida (PhD)
 
Ministry of Communication and Technology
Ministry of Communication and TechnologyMinistry of Communication and Technology
Ministry of Communication and TechnologyTransformNG
 
#MP2013 Presentation by the Minister of Communication Technology
#MP2013 Presentation by the Minister of Communication Technology#MP2013 Presentation by the Minister of Communication Technology
#MP2013 Presentation by the Minister of Communication TechnologyFMINigeria
 
Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Swapnali Pawar
 
Session 5 Gabrielle Gauthey Communications Regulation Time To Start Over
Session 5 Gabrielle Gauthey Communications Regulation Time To Start OverSession 5 Gabrielle Gauthey Communications Regulation Time To Start Over
Session 5 Gabrielle Gauthey Communications Regulation Time To Start Overguest6559451
 
Module 10 - Section 2: ICTs, the environment and climate change & Section 3: ...
Module 10 - Section 2: ICTs, the environment and climate change & Section 3: ...Module 10 - Section 2: ICTs, the environment and climate change & Section 3: ...
Module 10 - Section 2: ICTs, the environment and climate change & Section 3: ...Richard Labelle
 
IRJET- Digital Revolution using Novel Wireless Statement Design with Cognitiv...
IRJET- Digital Revolution using Novel Wireless Statement Design with Cognitiv...IRJET- Digital Revolution using Novel Wireless Statement Design with Cognitiv...
IRJET- Digital Revolution using Novel Wireless Statement Design with Cognitiv...IRJET Journal
 

Similaire à CTO-CyberSecurityForum-2010-Anders Johanson (20)

2019 june tcca-public_safety_prioritisation
2019 june tcca-public_safety_prioritisation2019 june tcca-public_safety_prioritisation
2019 june tcca-public_safety_prioritisation
 
Wireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayWireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly Essay
 
Network sharing
Network sharingNetwork sharing
Network sharing
 
Orange vision on rural areas coverage in African countries
Orange vision on rural areas coverage in African countriesOrange vision on rural areas coverage in African countries
Orange vision on rural areas coverage in African countries
 
Pp ts the smart grid impact on the danish dsos’ business model
Pp ts the smart grid impact on the danish dsos’ business modelPp ts the smart grid impact on the danish dsos’ business model
Pp ts the smart grid impact on the danish dsos’ business model
 
Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93
Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93
Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93
 
handling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augusthandling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-august
 
Telecommunications Policies Standards and Regulations Notes
Telecommunications Policies Standards and Regulations NotesTelecommunications Policies Standards and Regulations Notes
Telecommunications Policies Standards and Regulations Notes
 
WBB_MasterPlan_VietNam
WBB_MasterPlan_VietNamWBB_MasterPlan_VietNam
WBB_MasterPlan_VietNam
 
Municipal Open Access Networks
Municipal Open Access NetworksMunicipal Open Access Networks
Municipal Open Access Networks
 
Open Access Network (OAN) & Fixed Mobile Convergence (FMC): Foundation for a ...
Open Access Network (OAN) & Fixed Mobile Convergence (FMC): Foundation for a ...Open Access Network (OAN) & Fixed Mobile Convergence (FMC): Foundation for a ...
Open Access Network (OAN) & Fixed Mobile Convergence (FMC): Foundation for a ...
 
Ministry of Communication and Technology
Ministry of Communication and TechnologyMinistry of Communication and Technology
Ministry of Communication and Technology
 
#MP2013 Presentation by the Minister of Communication Technology
#MP2013 Presentation by the Minister of Communication Technology#MP2013 Presentation by the Minister of Communication Technology
#MP2013 Presentation by the Minister of Communication Technology
 
Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514
 
Noticias TIC marzo 2013
Noticias TIC marzo  2013Noticias TIC marzo  2013
Noticias TIC marzo 2013
 
Communications Regulation in the US and Europe
Communications Regulation in the US and EuropeCommunications Regulation in the US and Europe
Communications Regulation in the US and Europe
 
Session 5 Gabrielle Gauthey Communications Regulation Time To Start Over
Session 5 Gabrielle Gauthey Communications Regulation Time To Start OverSession 5 Gabrielle Gauthey Communications Regulation Time To Start Over
Session 5 Gabrielle Gauthey Communications Regulation Time To Start Over
 
Module 10 - Section 2: ICTs, the environment and climate change & Section 3: ...
Module 10 - Section 2: ICTs, the environment and climate change & Section 3: ...Module 10 - Section 2: ICTs, the environment and climate change & Section 3: ...
Module 10 - Section 2: ICTs, the environment and climate change & Section 3: ...
 
Essay On ENCE
Essay On ENCEEssay On ENCE
Essay On ENCE
 
IRJET- Digital Revolution using Novel Wireless Statement Design with Cognitiv...
IRJET- Digital Revolution using Novel Wireless Statement Design with Cognitiv...IRJET- Digital Revolution using Novel Wireless Statement Design with Cognitiv...
IRJET- Digital Revolution using Novel Wireless Statement Design with Cognitiv...
 

Plus de segughana

CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattanisegughana
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Reportsegughana
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Borensegughana
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwesegughana
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Glorisosegughana
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carrsegughana
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crainsegughana
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundusegughana
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torressegughana
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will GardnerCTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardnersegughana
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oramsegughana
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamssegughana
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonoghsegughana
 
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-DdosCTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddossegughana
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buettisegughana
 
CTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKayCTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKaysegughana
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Ministersegughana
 

Plus de segughana (18)

CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattani
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Report
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crain
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torres
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will GardnerCTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardner
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oram
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
 
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-DdosCTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buetti
 
CTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKayCTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKay
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Minister
 

Dernier

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

CTO-CyberSecurityForum-2010-Anders Johanson

  • 1. Cybersecurity Forum 2010 To ensure resilience and security in e-communication networks, a PPP challenge Sweden - Lessons learned Anders Johanson 2009-02-26
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. ” Where” ” When” ” What, how and why” Which services etc 867513 Videotelefoni fungerar inte i området. Problem att ringa 3G-samtal och surfa med hög hastighet. Beräknad klartid 081103 kl 14.00
  • 9.
  • 10. Option to show 10 at one time and/o, if more disturbances, to start paging function General information: Currently there are severe disturbances in broadband in X-county due to... … Id 1 Municipality Limited or no conn- 20070831;08.15 2007-08-31; 10.00 GSM, 3G, GPRS... in x-county ectivity in X due to… Id 2 Etc. Dist. ID Location Descr. and Cause Occurred Estimated end Affected service Customers affe. Cause is described with standard texts such as ”cable malfunction", ”equipment malfunction", ”maintenance work", ”or ”weather” Numbers of affected customers are stated only re fixed networks Clickable link, when clicking zoom is activated (and centers) map to disturbance. Map shows the hold disturbance. From zoom situation 1:50000 will each disturbance in the map be identifiable with marking in the map (where disturbance ID is shown). Free text: Descriptive text; Optional information Descriptive text does not need to have interactive link to list or map (Presentation of Map / GIS ) (Presentation of descriptive text) (Presentation of List) List automatically generated on the basis of what is shown in the map. The list is populated at scale 1:3 000000 (corresponding to Norrbottens County), i.e. from this scale may the list ”be activated” by the member. The list contains all disturbances present in current map MIMER II, Common Situation Awarenes GUI example 1: 3 000 000
  • 11.
  • 12. Ex. 4 National Portal for Cables and Pipes
  • 13. Network-owners registers information about his network in a database – existing/non-existing in a km-grid throughout the nation Power Grids Data- filtering Telco-networks Local Utilities Local Broadband Local Authorities Federal Networks Network information i stored in database only as ”existing/non-existing in every km-grid
  • 14. Databas Call center Power Grids Telco-networks Local Utilities Local Broadband Local Authorities Federal Networks Query In the portal, planned digging is outlined by contractor 1 Query is sent to database 2 Database confirms immediately that there are four network-owners in the area and that the contractor will receive information from relevant network-owners 3 Information is relayed to network-owners who have networks in relevant km-grid 4
  • 15. Database Call centre Power Grids Telco-networks Local Utilities Local Broadband Local Authorities Federal Networks Each network-owner will answer the contractor relevant to the respective networks topology Answers from network-owners
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.

Notes de l'éditeur

  1. When working with measures to improve redundancy and flexibility of networks for electronic communications, the following four circumstances must be considered: Places that are highly likely to be affected by disruptions. It is reasonable that work is done where disruptions in extraordinary situations will have the greatest probability of occurring. Certain parts of Sweden are for example more vulnerable to extreme weather, certain places may be more interesting as targets of sabotage and terrorism. Vulnerable functions. Certain functions of electronic communications systems are more central for the function of the systems. Needs for functions vital to society. The presence of functions vital to society can justify special work with redundancy. This may involve operations that are important at a local, regional or national level. Number of subscribers affected. In order to limit strain on society it is important that as few people as possible are affected in the event of disruptions and interruptions.
  2. Och så här ser det ut när man zoomar in sig i kartan (3 och Telia kommer att dema senare under dagen) Vår lösning har klarat tre stora stormar med bravur, det som är svårast är faktiskt att sätta prognosen på när felen ska vara åtgärdade. Vi hade ett stort fel i våras då nästan 40 000 kunder försökte gå in på sidan samtidigt…det klarade den inte…nu är lösningen uppgraderad. Vår Again this year we have had to deal with three winter storms, one of them was really big and… I´m proud to tell you that now a big storm is not a big deal for us to handle at the NMC. In November 2007, TeliaSonera was the first operator in Sweden and in the world, to launch an interactive web application for Public Operational Information based on mobile coverage outage. The solution was developed by Cell Vision. And as I said in the beginning we are joint finalist in the Excellence Awards 2008 with this solution. As we are very satisfied with earlier solutions from cell Visian and also very satisfied with our cooperation with them, we have been partners since 2003… It was naturally for us to chose Cellvision also when developing this solution This is the startside on the web. Here the customer sees a map of sweden showing telias normal coverage in green. The white areas are not covered yet… You can zoom by clicking the map or by chose for a city or adress In zoomed map the user can view: KLICL… The solution also displays disturbances due to planned work. These planned disturbances are displayed 4 days in advance. As I said, we have used it in three storms this year with very good results…..and for normal daily disturbances we have only good experiences so far and a high customer satisfaction. Approx. 10,000 visits/week on the website (hit rate, not clicks nor unique visitors) With self care solutions like this one, our customers can: … .have an instant overview of disturbances in their region caused by faults or by planned work: … . emergency services will know where the public can dial 112 ( they use this service daily to see where Telia’s disturbances are) Result: fewer errands for the Operational Centre to handle for emergency services … during bad weather electricity companies use this service to see where they can send their crew without risk of losing communication Result: Telia get a better service from electricity companies when they can plan their work in a better way
  3. Säkra upp tid
  4. In 2006, the Government assigned PTS to submit proposals on a strategy to improve Internet Security in Sweden. The aim of the strategy is to facilitate and clarify future work to secure the infrastructure of the Internet in Sweden, and is directed at those parts of the infrastructure that are unique to the Internet. The strategy does not address content on the Internet. The goal of the strategy is to secure critical functions in the Internet infrastructure that, if not maintained, would cause substantial disruption or interruption and in this way impede or prevent the use of the Internet for large groups of individual users or for vital public businesses, authorities or organisations. PTS proposed a strategy, an action plan, a designation of responsibility, and a management plan for the strategy. Eight strategic positions were adopted in the strategy. These positions are what PTS considers that Sweden should work with in the long-term, in order to secure the infrastructure of the Internet. Twenty-three actions were proposed in the action plan. These are a number of actions within the framework of the strategic positions adopted, showing the allocation of responsibility, level of importance, timeframe, and estimated cost for the respective measure. The management plan lays down the administrative rules concerning how the strategic positions adopted, and the action plan, should be attended to. PTS delivered the proposal in July 2006, and the strategy was confirmed by the Government in December 2006 as a National Strategy. PTS has just recently written a report to the Government on the progress of the action plan The strategy and the progress report are available in the English language.
  5. The Swedish IT Incident Centre, SITIC, is a national function charged with supporting society in the areas of incident response and proactive measures. SITIC is the National Computer Emergency Response Team (National CERT) The main task for SITIC is to rapidly respond to incidents by advising and participating in the coordination of actions that are needed to remedy and mitigate incidents. Another assignment is to advise and support government agencies, regions, municipalities and the private sector, regarding proactive measures in the area of network security. SITIC is the national point of contact for international incident response cooperation and has an extensive international cooperation. It is an active member of the European Government CSIRT Group (EGC), which gathers the national and governmental Computer Security Incident Response Teams in Europe. SITIC is a member of FIRST, the Forum of Incident Response and Security Teams, and a member of the International Watch & Warning Network, IWWN. SITIC has developed network monitoring systems for collection and analysis of traffic data and malicious code, and has a 24/7 watch, warning, and response capability. SITIC was established in 2003 and its existence is e nacted as a law, with inclusion in the formal government instruction of the PTS.