cyber threat intelligence: a key enabler for building ... · building strong eu cyber skills base,...

24
Cyber Threat Intelligence: a key enabler for building strong cybersecurity for the EU 5 November 2018 Brussels 1 Ioannis Askoxylakis Cybersecurity Policy Officer Unit H1: Cybersecurity Technology & Capacity Building Directorate H: Digital Society, Trust and Cybersecurity Directorate General for Communication Networks, Content & Technology DG CONNECT European Commission

Upload: others

Post on 27-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Cyber Threat Intelligence: a key enabler for building strong cybersecurity for

the EU

5 November 2018Brussels

1

Ioannis AskoxylakisCybersecurity Policy OfficerUnit H1: Cybersecurity Technology & Capacity Building Directorate H: Digital Society, Trust and CybersecurityDirectorate General for Communication Networks, Content & Technology DG CONNECTEuropean Commission

Page 2: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Open hyperconnected world IoT

Cloud computing

Social networking

Fast adoption of ICT by consumers

Adversaries are: taking advantage at Gaps in

Security

moving faster

better coordinated

easily penetrating traditional perimeter defenses

developing intelligence

Emerging threat landscape

Page 3: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

May be aware of

Cybersecurity landscapeValue

Assets

Wish to minimise

Risks

Impose CountermeasuresReduce

That may possess

Vulnerabilities

Owners

That may beReduced by

to

Threats to

That increase

Leading to

Wish to abuse and/or damage

Threat agents

use

Attack Vectors Based on

Thatimpose

Page 4: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Emerging threat landscape

Page 5: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Emerging threat landscape

© MWR - CERT-UK/CPNIhttps://www.ncsc.gov.uk/content/files/protected_files/guidance_files/MWR_Threat_Intelligence_whitepaper-2015.pdf

Page 6: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Cyber Threat intelligence at a glance

Developing real-time knowledge on threats and theorganization’s posture against those threats inorder to prevent, detect and/or predict attacks,make informed risk decisions, optimize defensivestrategies and enable action.

Page 7: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Obtain data

Roadmap to Cyber Threat Intelligence

START WITH THE BASICS1

MAKE THE CASE2

FIND THE RIGHT PEOPLE3

BUILD SOURCES4

DEFINE A PROCESS5

IMPLEMENT AUTOMATION6-

-

-

Filter data

Perform analysis

Communicate result

Make risk decisions

Take action

• Inventory of strategic assets• Incident response process• Risk assessment

• The value proposition• Key stakeholders• Opportunities for “quick wins”

• Evaluation• Cost• Relationships

• Consumption of threat feeds• Collections of employees observations• Log analysis and full packet capture• Fusion of data from multiple sources

• Train existing• Hire skilled

Page 8: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Resilience, Deterrence and Defence:

Building strong cybersecurity for the EU

8

Page 9: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Building strong cybersecurity for the EU: Resilience, Deterrence and Defence

From reactive to pro-active and cross-policy approach bringing various work streams together to build EU's strategic cybersecurity autonomy

Improving resilience and response by boosting capabilities (technology/skills), ensuring the right structures are in place and EU cybersecurity single market

functions well

Stepping up work to detect, trace and hold accountable those responsible for cyber attacks

Strengthening international cooperation as a platform for EU leadership on cybersecurity

Involving all key actors - the EU, Member States, industry and individuals to give cybersecurity priority it deserves

9

Page 10: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Building EU Resilience to cyber attacks

Reformed ENISA

EU cybersecurity Certification Framework

NIS Directive Implementation

Rapid emergency response –Blueprint & Cybersecurity Emergency Response Fund

Cybersecurity competence network with a European Cybersecurity

Research and Competence Centre

Building strong EU cyber skills base, improving cyber hygiene and

awareness

Creating effective EU cyber deterrence

Identifying malicious actors

Stepping up the law enforcement response

Stepping up public-private cooperation against cybercrime

Stepping up political response

Building cybersecurity deterrence through the Member States' defence

capability

Strengthening international cooperation

on cybersecurity

Promoting global cyber stability and contributing to Europe's strategic

autonomy in cyberspace

Strengthening cyber dialogues

Modernising export controls, including for critical cyber-surveillance technologies

Continue rights-based capacity building model

Deepen EU-NATO cooperation on cybersecurity, hybrid threats

and defence

10

Cybersecurity Act

Communication

Recommendation

Page 11: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying
Page 12: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Blueprint

Resilience through crisis management and rapid emergency response

Page 13: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Improving resilience through crisis management and rapid emergency response – with a focus on Response

Page 14: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Improving resilience through crisis management and rapid emergency response - 2 lines of actions

1. Blueprint - Recommendation on Coordinated Response to Large Scale Cybersecurity Incidents and Crises (COM(2017) 6100).

2. ENISA (COM(4776/2)) - Tasks relating to operational cooperation at Union level

• The Agency shall contribute to develop a cooperative response, at Union and Member States level, to large-scale cross-border incidents or crises related to cybersecurity

Page 15: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Blueprint – Core objectives

Page 16: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Blueprint – Cooperation at all levels

Technical

Incident handling during a cybersecurity crisis.

Monitoring and surveillance of incident including continuous analysis of threats and risk.

Operational

Preparing decision-making at the political level.

Coordinate the management of the cybersecurity crisis (as appropriate).

Assess the consequences and impact at EU level and propose possible mitigating actions.

Political / Strategic

Strategic and political management of both cyber and non-cyber aspects of the crisis including measures under the Framework for a Joint EU Diplomatic Response to Malicious Cyber Activities

Page 17: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Blueprint – key mechanisms

Page 18: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Blueprint – cybersecurity integration in IPCR arrangements

1. Regular Monitoring

2. Analysis and Advice

3. Assessment4. Presidency RoundtablePreparation

6-7.Presidency RoundTable

IPCR Activation?(Presidency)

Yes

No

8. Council / Coreper Meeting

Coordination at EU Political

Level

Crisis On-going?

NO10. Phasing Out

Technical Situation Report

Operat. SituationReport

ENISAEx-postEnquiry

EU Cybersecurity Incident SituationReport

Cybersecurity Emergency

Response Fund

Cyber Diplomacy

Toolbox

9. ImpactMonitoring

CoordinatedTechnical Response,

Public Communications

5. ISAAPreparation

YES

Incident

Page 19: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Blueprint – The way forward

Establish an EU Cybersecurity Crisis Response Framework

standard operating procedures

information sharing and cooperation protocols

Ensure that National Crisis Management mechanisms adequately address cybersecurity incident response as well as provide necessary procedures for cooperation at EU level within the context of the EU Framework.

Develop and adopt a common taxonomy and template for situational reports describing the technical causes and impacts of cybersecurity incidents.

Test in the context of the E-Pace exercise.

Page 20: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

ICT cybersecurity certification

Towards a true cybersecurity single market in the EU

Page 21: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

ENISA

Prepares candidate scheme

ENISA

Consults Industry, Standardisation

Bodies, other stakeholders

ENISA

Transmits candidate scheme to the European

Commission

European Commission

Adopts Candidate Scheme

European Cybersecurity Certification

Scheme

European Commission

Requests ENISA to prepare Candidate

Scheme

Establishment of an EU Cybersecurity Certification Scheme (COMM proposal)

European Cybersecurity Certification Group (MSs)

Advises ENISA and may propose the preparation of a scheme to the Commission

Page 22: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Priority areas identified in the Communication

Internet of Things

Use of "security by design" methods in low-cost, digital,

interconnected mass consumer

Security in critical or high-risk applications

From our cars to the machinery in factories, from the largest of systems such as airplanes or power plants to the smallest

such as medical devices

Widely-deployed digital products, networks,

systems and services

Used by private and public sector alike to defend against

attacks– such as email encryption, firewalls and Virtual

Private Networks

22

Page 23: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Horizon Scanning Capability

• ET² (Emerging Technologies-Emerging Threats)

• Sectoral approach & analysis (thematic ETLs)

• Post-incident analysis (NIS) for CTI

• Scenario building for complex intersectoralemerging threats

• Exercises

23

Page 24: Cyber Threat Intelligence: a key enabler for building ... · Building strong EU cyber skills base, improving cyber hygiene and awareness Creating effective EU cyber deterrence Identifying

Thank you for your attention!