SlideShare a Scribd company logo
National Cybersecurity_Presentation DepEd DSC.ppt
Where are we
now?
 Tools based
 Reactive / Manual
How do we get
there?
 Crafting of the National CyberSecurity
Strategy, Policies, Plans and Programs
 Establishment of NCERT and Implementation
of other Programs defined in the National
Cybersecurity Plan
What do we want to
achieve?
Cyber Resilient
Philippines
Making
Critical
Infostructure
(CII) Trusted
and Secure
Making
Government
Information
Environment
Secure
Making
Businesses
and Supply
Chains
more
Secure
Making
Individual
s Aware
and
Secure
#CyberResilientPH
#CyberToughPH
#CyberAssurancePH
#CyberSafePH
National Targets:
To
systematically
harden CII for
Resiliency
To prepare and secure
government ICT
Infostructure
(Public
and Military)
To raise awareness of cyber risk
and use of security measures
among businesses to prevent and
protect, respond and recover from attacks
To raise awareness on
cyber
risks among users as
they are
the weakest links, they
need to
adopt the right norms in
CyberSecurity
Key Strategic Imperatives
Protection
of Critical
Infostructur
e (CII)
Protection
of
Governme
nt
Networks
(Public and
Military)
Protection
of
Businesses
and Supply
Chains
Protection
of
Individuals
Public Networks thru
establishment of CERTs
Military Networks thru
establishment of Cyber Defense
Centers (DND, NSC, AFP)
CyberSecurity
Assessment and
Compliance
Programs
National Common
Criteria Evaluation
and Certification
Program
Cybersecurity
Education
Campaign Program
#CyberSafePH | #PRInT
Protection of Individuals
CyberSecurity Education Campaign
Program
**Educate, Empower and Encourage (3Es)**
Training of Trainers Project (ToT)
Cybersecurity Outreach Project (#PRInT)
• Use of Paper, Radio, Internet and Television (PRInT)
National Cybersecurity Awareness Month
Integration of Cybersecurity in the education sector
Establishment of Cyber Training facilities
and Certification Programs
Promote National Cybersecurity R&D
Program to attract and cultivate
Cyber Experts
Trainings to Develop Cybersecurity
Specialist
Promote Communities of Practice (COP)
Increase
the Pool of
Cybersecurity
Experts
Integrating Cybersecurity Curriculum in
the Philippine Education System
Table of Contents
Theme 1: Cyberspace and the Fundamentals of
Cybersecurity
Organizations, Policies and Standards
Theme 2: Risk Vectors
Theme 3: International Cybersecurity
Theme 4: Cybersecurity Management In The National
Context
Block T1 – B1
Cybersecurity and Cyberspace – An
Introduction
Block T1 – B2 Information Security and Risk
Block T1 – B3
The Structures of Cyberspace:
The Internet Backbone and National
Infrastructures
Block T1 – B4 Protocols and Platforms
Block T1 – B5
Security Architecture and Security
Management
THEME 1
Cyberspace and the
Fundamentals of
Cybersecurity
The object of this theme is to lay the knowledge foundations for all of
the instruction that follows by identifying the structural components of
cyberspace.
 describe what is meant by cyberspace and cybersecurity;
 outline some basic vulnerabilities of developed states to cyber
threats;
 describe the basic topology of cyberspace, including its
physical structures and how it is governed by protocols and
procedures; and
 outline the basic considerations for appropriate security
architecture.
GOAL
LEARNING OUTCOMES
”
Cyberspace and the
Fundamentals
of Cybersecurity
THEME
1:
Block T2 – B1 Supply Chains/Vendors
Block T2 – B2
Remote-and-Proximity-access
Attacks
Block T2 – B3
Insider Access (Local-access
Attacks)
Block T2 – B4
Mobility Risks, BYOD and
Emerging Trends
THEME 2
Risk
Vectors
This theme offers an introductory survey of the vulnerabilities
inherent to cyberspace and the ways and means to exploit those
vulnerabilities through various attack chains or vectors.
 understand the significance and possible impact of
exploited supply chain, remote, proximity and insider
access to target cyberspace vulnerabilities and those
associated with facilitating enhanced mobility; and
 identify the types of security trade-offs associated with
enhanced mobility and the other risk vectors identified in
this theme area.
GOAL
LEARNING OUTCOMES
”
Risk
Vectors
THEME
2:
Block T3 – B1
International Cybersecurity
Organizations
Block T3 – B2
International Standards and
Requirements – A Survey of
Bodies and Practices
Block T3 – B3
National Cybersecurity
Frameworks
Block T3 – B4
Cybersecurity in National and
International Law
THEME 3
International
Cybersecurity
Organizations,
Policies and
Standards
The broad objective if this theme is to expose students to international
standards and organizationsand the ways in which these relate to
national contexts.
GOAL
”
International
Cybersecurity
Organizations, Policies
THEME
3:
Block T4 – B1
National Practices, Policies
and Organizations for Cyber
Resilience
Block T4 – B2
National Cybersecurity
Frameworks
Block T4 – B3 Cyber Forensics
Block T4 – B4
National-level Security Audit
and Assessment
THEME 4
Cybersecurity
Management in
the National
Context
The broad objective of this theme is to explore the practice of
managing cybersecurity in the national context.
 understand the systems approach to planning for resilience to threats,
attacks and similar events;
 be able to situate the practice of employing resilient systems within the
national context;
 be able to analyze the utility of frameworks and matrices for planning
and delegation; and
GOAL
LEARNING OUTCOMES
”
Cybersecurity
Management in the
National Context
THEME
4:
END OF PRESENTATION

More Related Content

PPTX
Cyber Security G4.pptx it gives ; little
PPTX
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
PPTX
PDF
Asymmetric threat 5_paper
PPTX
chapter1 Introduction to Software Security.pptx
PPTX
Cyber Landscape in the Philippines.pptx
PPTX
National cyber security policy final
PDF
IRJET- Cybersecurity: The Agenda for the Decade
Cyber Security G4.pptx it gives ; little
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
Asymmetric threat 5_paper
chapter1 Introduction to Software Security.pptx
Cyber Landscape in the Philippines.pptx
National cyber security policy final
IRJET- Cybersecurity: The Agenda for the Decade

Similar to National Cybersecurity_Presentation DepEd DSC.ppt (20)

PDF
American Bar Association guidelines on Cyber Security standards
PPTX
Lecture 2 Threats and Strategy.pptx
PDF
CII Whitepaper India Cyber Risk & Resilience Review 2018
PPTX
About Cyber.pptx
PDF
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
PDF
Implementation of Cyber Security in Corporate Sector of Pakistan
PPTX
Cybersecurity note for students reference
PDF
Cyber Security Intelligence
PDF
COMMON GOOD DIGITAL FRAMEWORK
PDF
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
PDF
Overview of National Cybersecurity Strategy 2023.pdf
PPTX
cyber security presentation.pptx
PDF
Internet safety and security strategies for building an internet safety wall
PDF
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
PPTX
Cyber war a threat to indias homeland security 2015
PPTX
CYBERSPACE & CRIMINAL BEHAVIOR
PDF
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
PDF
Singapore. industry 4.0 and cybersecurity
PDF
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
PDF
CyberSecurity.pdf
American Bar Association guidelines on Cyber Security standards
Lecture 2 Threats and Strategy.pptx
CII Whitepaper India Cyber Risk & Resilience Review 2018
About Cyber.pptx
_Cyberspace_ Security and Future Challenges in the Digital World.pdf
Implementation of Cyber Security in Corporate Sector of Pakistan
Cybersecurity note for students reference
Cyber Security Intelligence
COMMON GOOD DIGITAL FRAMEWORK
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
Overview of National Cybersecurity Strategy 2023.pdf
cyber security presentation.pptx
Internet safety and security strategies for building an internet safety wall
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Cyber war a threat to indias homeland security 2015
CYBERSPACE & CRIMINAL BEHAVIOR
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Singapore. industry 4.0 and cybersecurity
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
CyberSecurity.pdf
Ad

Recently uploaded (20)

PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Yogi Goddess Pres Conference Studio Updates
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Trump Administration's workforce development strategy
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
A systematic review of self-coping strategies used by university students to ...
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Cell Types and Its function , kingdom of life
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
History, Philosophy and sociology of education (1).pptx
Chinmaya Tiranga quiz Grand Finale.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Yogi Goddess Pres Conference Studio Updates
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Microbial diseases, their pathogenesis and prophylaxis
Microbial disease of the cardiovascular and lymphatic systems
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Trump Administration's workforce development strategy
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Module 4: Burden of Disease Tutorial Slides S2 2025
A systematic review of self-coping strategies used by university students to ...
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Anesthesia in Laparoscopic Surgery in India
Cell Types and Its function , kingdom of life
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
History, Philosophy and sociology of education (1).pptx
Ad

National Cybersecurity_Presentation DepEd DSC.ppt

  • 2. Where are we now?  Tools based  Reactive / Manual How do we get there?  Crafting of the National CyberSecurity Strategy, Policies, Plans and Programs  Establishment of NCERT and Implementation of other Programs defined in the National Cybersecurity Plan What do we want to achieve? Cyber Resilient Philippines
  • 3. Making Critical Infostructure (CII) Trusted and Secure Making Government Information Environment Secure Making Businesses and Supply Chains more Secure Making Individual s Aware and Secure #CyberResilientPH #CyberToughPH #CyberAssurancePH #CyberSafePH National Targets:
  • 4. To systematically harden CII for Resiliency To prepare and secure government ICT Infostructure (Public and Military) To raise awareness of cyber risk and use of security measures among businesses to prevent and protect, respond and recover from attacks To raise awareness on cyber risks among users as they are the weakest links, they need to adopt the right norms in CyberSecurity
  • 5. Key Strategic Imperatives Protection of Critical Infostructur e (CII) Protection of Governme nt Networks (Public and Military) Protection of Businesses and Supply Chains Protection of Individuals Public Networks thru establishment of CERTs Military Networks thru establishment of Cyber Defense Centers (DND, NSC, AFP) CyberSecurity Assessment and Compliance Programs National Common Criteria Evaluation and Certification Program Cybersecurity Education Campaign Program
  • 6. #CyberSafePH | #PRInT Protection of Individuals CyberSecurity Education Campaign Program **Educate, Empower and Encourage (3Es)** Training of Trainers Project (ToT) Cybersecurity Outreach Project (#PRInT) • Use of Paper, Radio, Internet and Television (PRInT) National Cybersecurity Awareness Month Integration of Cybersecurity in the education sector
  • 7. Establishment of Cyber Training facilities and Certification Programs Promote National Cybersecurity R&D Program to attract and cultivate Cyber Experts Trainings to Develop Cybersecurity Specialist Promote Communities of Practice (COP) Increase the Pool of Cybersecurity Experts
  • 8. Integrating Cybersecurity Curriculum in the Philippine Education System
  • 9. Table of Contents Theme 1: Cyberspace and the Fundamentals of Cybersecurity Organizations, Policies and Standards Theme 2: Risk Vectors Theme 3: International Cybersecurity Theme 4: Cybersecurity Management In The National Context
  • 10. Block T1 – B1 Cybersecurity and Cyberspace – An Introduction Block T1 – B2 Information Security and Risk Block T1 – B3 The Structures of Cyberspace: The Internet Backbone and National Infrastructures Block T1 – B4 Protocols and Platforms Block T1 – B5 Security Architecture and Security Management THEME 1 Cyberspace and the Fundamentals of Cybersecurity
  • 11. The object of this theme is to lay the knowledge foundations for all of the instruction that follows by identifying the structural components of cyberspace.  describe what is meant by cyberspace and cybersecurity;  outline some basic vulnerabilities of developed states to cyber threats;  describe the basic topology of cyberspace, including its physical structures and how it is governed by protocols and procedures; and  outline the basic considerations for appropriate security architecture. GOAL LEARNING OUTCOMES ” Cyberspace and the Fundamentals of Cybersecurity THEME 1:
  • 12. Block T2 – B1 Supply Chains/Vendors Block T2 – B2 Remote-and-Proximity-access Attacks Block T2 – B3 Insider Access (Local-access Attacks) Block T2 – B4 Mobility Risks, BYOD and Emerging Trends THEME 2 Risk Vectors
  • 13. This theme offers an introductory survey of the vulnerabilities inherent to cyberspace and the ways and means to exploit those vulnerabilities through various attack chains or vectors.  understand the significance and possible impact of exploited supply chain, remote, proximity and insider access to target cyberspace vulnerabilities and those associated with facilitating enhanced mobility; and  identify the types of security trade-offs associated with enhanced mobility and the other risk vectors identified in this theme area. GOAL LEARNING OUTCOMES ” Risk Vectors THEME 2:
  • 14. Block T3 – B1 International Cybersecurity Organizations Block T3 – B2 International Standards and Requirements – A Survey of Bodies and Practices Block T3 – B3 National Cybersecurity Frameworks Block T3 – B4 Cybersecurity in National and International Law THEME 3 International Cybersecurity Organizations, Policies and Standards
  • 15. The broad objective if this theme is to expose students to international standards and organizationsand the ways in which these relate to national contexts. GOAL ” International Cybersecurity Organizations, Policies THEME 3:
  • 16. Block T4 – B1 National Practices, Policies and Organizations for Cyber Resilience Block T4 – B2 National Cybersecurity Frameworks Block T4 – B3 Cyber Forensics Block T4 – B4 National-level Security Audit and Assessment THEME 4 Cybersecurity Management in the National Context
  • 17. The broad objective of this theme is to explore the practice of managing cybersecurity in the national context.  understand the systems approach to planning for resilience to threats, attacks and similar events;  be able to situate the practice of employing resilient systems within the national context;  be able to analyze the utility of frameworks and matrices for planning and delegation; and GOAL LEARNING OUTCOMES ” Cybersecurity Management in the National Context THEME 4: