1 / 10

ETSI TC Cyber

ITU Workshop on “ICT Security Standardization for Developing Countries” (Geneva, Switzerland, 15-16 September 2014). ETSI TC Cyber. Charles Brookson Chairman ETSI TC Cyber Charles@Zeata.co.uk Zeata Security Ltd and Azenby Ltd. ETSI TC CYBER (Jan 2014): General Activities.

shaynem
Download Presentation

ETSI TC Cyber

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ITU Workshop on “ICT Security Standardizationfor Developing Countries” (Geneva, Switzerland, 15-16 September 2014) ETSI TC Cyber Charles Brookson Chairman ETSI TC Cyber Charles@Zeata.co.uk Zeata Security Ltd and Azenby Ltd

  2. ETSI TC CYBER (Jan 2014): General Activities Cyber Security Standardization Security of infrastructures, devices, services and protocols Security advice, guidance and operational security requirements to users, manufacturers and network and infrastructure operators Security tools and techniques to ensure security

  3. ETSI TC CYBER (Jan 2014): General Activities Creation of security specifications and alignment with work done in other TCs and ISGs Coordinate work with external groups such as the CSCG with CEN, CENELEC, the NIS Platform and ENISA Collaborate with other SDOs (ISO, ITU, NIST, ANSI...) Answer to policy requests on Cyber Security and ICT security in broad sense

  4. TC CYBER 1st meeting • TC CYBER#1, 27-28 May 2014 • Over 50 participants at this first meeting • Work planned in several areas • Cybersecurity ecosystem • Personal data protection framework • Privacy • Critical Infrastructure Protection

  5. CSCG Recommendations to EU • Cyber Security Coordination Group • Advisory Body of the three ESOs (CEN/CENELEC/ETSI) • Feb 2014 Recommendations for a Strategy on European Cyber Security Standardization • GOVERNANCE(coordination, scope, trust) • HARMONISATION (PKI/cryptography, requirements/evaluation, EU security label, interface with research) • GLOBALISATION (harmonisation with international key players, global promotion of EU Cyber Security standards)

  6. ETSI Security activities GSM™, UMTS™ 3GPP, LTE™, IP Multimedia Subsystem (IMS) 3GPP* TETRA DECT™ Radio Frequency Identification (RFID) Reconfigurable Radio Systems Satellite Intelligent Transport Systems Machine to Machine Smart Lawful Interception and Data Retention Electronic Signatures ESI Cryptographic Algorithms SAGE

  7. ETSI Security activities Quantum Key Distribution and Algorithms Identity and Access Management for Networks and Services Information Security Indicators Smart Cards Future Networks Emergency and Safety Telecommunications Aeronautics Maritime Broadcasting Media Content Delivery IPv6 ePassport Readers IPCablecom™

  8. TC CYBER future meetings • TC CYBER#2, 15-16 Oct 2014 (at ETSI premises) • Work will start with adoption of several new documents - Areas decided during TC CYBER#1 plus any new agreed proposals • TC CYBER will have a first set of publish standards in 2015 • TC CYBER#3, 3-4 Feb 2015 • TC CYBER#4, 28-29 May 2015

  9. Some useful links • TC CYBER on ETSI portal and ToR • https://portal.etsi.org/cyber • https://portal.etsi.org/cyber/Cyber_ToR.asp • ETSI Security Workshop • www.etsi.org/securityworkshop • 10th on 26-27 May 2015

  10. Further information • ETSI Security White Paper • 6th Edition Published January 2014 • Achievements, ongoing work, list of publications • www.etsi.org/securitywhitepaper • Carmine (Lino) Rizzo – TC CYBER Technical Officer carmine.rizzo@etsi.org

More Related