national cybersecurity policy - global tradeprevent, manageand respond to information security...
TRANSCRIPT
![Page 1: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/1.jpg)
NationalCybersecurity
Policy
![Page 2: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/2.jpg)
Cybersecurity Policy:State compromise
Free
Open
Secure
Resilient
![Page 3: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/3.jpg)
A
B
C
D
E
Robust and ResilientInfrastructure
Safeguard the Rights of People in Cyberspace
Awareness: education, good practices and responsibility
Cooperation and participation in International
Cybersecurity Forums
Industry Development in Cybersecurity
Key Issues
![Page 4: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/4.jpg)
A
B
C
D
E
Cybersecurity Law
Update Decree 83
Cybersecurity in public tender
CII Standards
Software Standards
Cyber Incident Platform
SER Cyber request
CII minial risk
Incident Report Matrix
Cyber on Emergency Systes
Exhange info standards
Resilient telecom
Dcto 5996 and DS 1299 (+C)
Key IssuesRobust and ResilientInfrastructure
![Page 5: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/5.jpg)
A
B
C
D
E
Safeguard the Rights of People in Cyberspace
Cybercrime Law
Cybercrime ReportMatrix
Strengthen ForensicAnalysis
Personal Data Law (+ A)
Join the Europe CybercrimeConvention (+ D)
Key Issues
![Page 6: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/6.jpg)
A
B
C
D
E
Information Dissemination Point on Citizen Cybersecurity
Cybersecurity Month
Awareness campaign
Good Practice Guides
Intersectoral TableCybersecurity Training
Senior Citizens Campaign
Awarnesess Campaign withEducation Ministry
Multisectoral Collaboration(NGO, Emp., Uni.) (+ A and B)
Cybersecurity Drills (+ A)
National Surveys (+ B)
Training Public Officials
Key Issues
Awareness: education, good practices and responsibility
![Page 7: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/7.jpg)
A
B
C
D
E
Cooperation and participation in International
Cybersecurity Forums
Support multilateral and regional consultations
Bilateral mechanisms, agendas and consultations
International Cyberspace and Security Policy
Interagency Working Group cyberspace issues
Exchange experiences to implement and evaluate strategies and policies
Key Issues
![Page 8: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/8.jpg)
A
B
C
D
E
Analyze public sector procurement regime
Cybersecurity IndustryCharacterization Study
Study Tax Incentives Adoption Standards
Incorporate Standards in Suppliers (+ A)
State sponsorship of projects (+C)
Promote Human Capital Development (+ C)
Export Cyber Products and Services (+ D)
Key Issues
Industry Development in Cybersecurity
![Page 9: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/9.jpg)
2018 Lazarus Group, sponsored by North Korea, attacks the chilean bank system. That encourages the creation of the CSIRT.
2019 (March) A major Emotet attack was the first threat successfully coordinated by CSIRT together with the economic sector
2019 (October) After the social outbreak, hacktivist actions against the Government are incited
2020, Challenges in times of pandemic and elections
Milestones
![Page 10: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/10.jpg)
State Groups Malware
Cybercriminals Phishing Malware Ransomware
Hacktivists DDoS Defacement Data Leak
Vulnerabilities
Home network Security Use of personal
computers Connection hikes
Threats and Risks
![Page 11: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/11.jpg)
*Estadística en base a los tickets del CSIRT, excluyendo aquellos generados en gestión interna de CSIRT
29%
25%
14%
13%
12%
CVE
Information gathering
Malicious code
Fraud
Content security information
7%Others
Main threats
![Page 12: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/12.jpg)
Monitoring 24x7
1
Support tools and strategies2
Share and publish IoC3
Apply standards, implement plans 4
Educate and raise awareness
5
Strategy
![Page 13: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/13.jpg)
Prevent, manage and respond to information security incidents
Provide information and assistance to State Institutions
Advice on risk analysis
VulnerabilityManagement
Coordinate and support responses to events or
incidents.
Provide information and assistance to the RCE
and government cyberspace.
Promote good practices within the State
administration
Execute Presidential Instruction No. 8 to
improve internal standards.
Objectives of the CSIRT of Chile
![Page 14: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/14.jpg)
Legal Frame
Personal Data Law
NationalCybersecurity Policy
Digital transformation
CybercrimeLaw
Sector Decrees
National Policy onArtificial
Intelligence
CybersecurityLaw
![Page 15: National Cybersecurity Policy - Global tradePrevent, manageand respond to information security incidents Provide informationand assistance to State Institutions Advice on risk analysis](https://reader035.vdocuments.mx/reader035/viewer/2022071518/613c1b504c23507cb6352b7b/html5/thumbnails/15.jpg)
¡Thanks!