Home > Awareness, Cybercrime, Identity theft, Scams > “Cybersecurity in Europe” Workshop-Part 1

“Cybersecurity in Europe” Workshop-Part 1

On August 31, 2011 The European Parliament hosted the “Cybersecurity in Europe” Workshop, where E-Crime Expert was present.

Today, E-Crime Expert starts a series of posts that will summarize this event.

First presenter in this series was CERT (Computer Emergency Response Team) which is a small team formed by experts from different EU Institutions and Agencies. CERT is part of the EU Digital Agenda and provided computer security support to the EU Institutions, Agencies and Member States (some member States have individual CERT units).

The Digital Agenda aims the reinforcement of the Network and Information Security Policy and the Modernization of the European Network and Information Security Agency (ENISA) in order to allow faster reactions in the event of cyber attacks.

CERT provided the following figures in regards cybersecurity, after its one-year pilot activity:

-286.000.000 malware variants

-93% increase in web attack

-30% increase in vulnerabilities

-over 1 million existing bots

-30% of companies feel that they being specifically targeted by cyber-attacks

CERT’S initial Service offer was:

-to provide announcements: sharing of information to prevent problems

-provide alerts: informing on issues requiring immediate attention

-provide incident response coordination: support in ongoing incidents.

As part of it future services, CERTS’s pre-configuration team aims to offer the following services:

  1. Reactive Services (alert and warnings, Incident response coordination, etc)
  2. Proactive services (Announcements, Security Audits and Assessments, Tools)
  3. Artifact Handling (Artifact analysis, response, coordination)
  4. Security quality management (Risk analysis, Disaster recovery, Education/training)
  5. Present general tendencies in the development in hacking methods
  6. New vulnerabilities specific to products used by EU Institutions
  7. New protection measures/tools
  8. Sharing of experience: lessons learnt from previous incidents and best practices.
  9. CERT aims to serve as a server (central point of contact) between cybersecurity providers and EU Institutions, being able to filter and disseminate information better through its service rather than directly from the security provider to the EU Institution(s).
  10. CERT will inform on issue requiring immediate attention such as new critical threats derived from:

a)     Open sources

b)    monitoring network traffic

c)     incidents discovered in its constituency

d)    incidents discovered by CERT community

e)     the alerts will be communicated to constituency by secure methods such as (emails, sms, secure websites)

11. CERT will provide support in ongoing incidents:

a)     in response to major incidents in the constituency

b)    specialized technical support’

c)     facilitate contact with external expertise

d)    internal clearing house for information on incident

Current status:

-CERT needs a physical infrastructure

-staff

-inventory of constituency points of contact and expectations

-cooperation with EU Member States‘ CERTs

-preparation for the launch of the two first services

-design of the web portal

To find more information about CERT, click here.

Any questions can be submitted to:
dan@e-crimeexpert.com

Additional information can be found at: www.e-crimeexppert.com

How do you feel about cyber threats?  Have you ever heard/encountered a cyber threat? What do you think about CERT?

Hit the “subscribe” button in order to be notified when new videos and Articles are posted on this blog. The following posts will be part of the Cybersecurity in Europe Workshop series summarized by E-Crime Expert.

Advertisements
  1. No comments yet.
  1. September 5, 2011 at 10:41

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: