Thursday, 11 June 2015

Qatar’s National Cybersecurity Strategy

Khalid AI Hashmi, undersecretary of cybersecurity

Qatar’s economy is based on using information and communications technology as a platform for innovation and prosperity.

Khalid N AI Hashmi, undersecretary of cybersecurity at the ministry of communication and information technology, says resilience and security in cyberspace are vital to Qatar’s continued success and growth. Hence, a comprehensive national strategy is required to address the current and emerging threats.

To this effect, Qatar has established the National Cyber Security Committee as part of its Cyber Security Policy framed in May 2014.

Hashmi’s view is to balance the need to protect interconnected ICT products and services, with the need to provide opportunities that maximize benefits and efficiencies found in ICT advances.

“The key agenda is to establish and maintain a secure cyberspace to safeguard national interest and defend the nation’s critical infrastructure from large attacks,” he says.

In this interview with Information Security Media Group, AI Hashmi discusses the steps taken by the government to address cyber security concerns. He also elaborates on:

  • Qatar’s security challenges;
  • New cybersecurity initiatives;
  • Strategies to protect critical infrastructure.

Al-Hashmi has over 18 years of experience in the information technology field, with expertise in cybersecurity, information infrastructure and ICT systems planning. He leads a team that works closely with government agencies, financial institutions, the energy sector, businesses and citizens to address risks, protect sensitive information and ensure the safety of children on the internet.

Cybersecurity Challenges

GEETHA NANDIKOTKUR: Could you tell us about the cybersecurity challenges in Qatar?

AL HASHMI: Due to the adoption of new technologies (cloud computing and mobileapplication, smart-grid technology and the substantial increase in technology users,) there has been much opportunity for development and innovation. However, these exist in an increasingly fast-paced and evolving environment which continues to impact Qatar’s ability to innovate and compete in the global economy. The challenges here are :

  • Skill deficit: The number of workers possessing the skills to effectively understand ICT and address cyber security issues is low.
  • Global supply chain risks: The global cyber ecosystem consists of interconnected systems that often include multiple components from various sources around the world. This supply chain introduces weaknesses that malicious actors may exploit to launch attacks.
  • ICS connectivity: ICSs are increasingly connected to business networks and the Internet. While this provides efficiencies that enable the remote monitoring of the mechanical processes used for oil and natural gas production, electricity generation and water purification, it also increases the vulnerability of ICSs to cyber threats.
  • Information sharing constraints: Information owners or providers may be reluctant to share information about vulnerabilities, incidents and their best practices to avoid revealing weaknesses.
  • Changing Privacy Expectations: Due to the increased use of personal information within government organizations and throughout international businesses, countries continue to enact and update privacy laws to protect individuals and their data.

Security Initiatives

NANDIKOTKUR: Can you elaborate on the cybersecurity initiatives and your government’s new approach?

AI HASHMI: Qatar has established the National Cyber Security Committee. The objective is to ensure an effective legislative framework to address cyber-crimes and the security of its critical assets. With cyber-crime laws in place, the government is working on issuing a data privacy law and the critical information infrastructure protection law.

The National Information Assurance Policy is issued that enhances legislative framework and builds a robust foundation for cybersecurity, besides roping in ICS security standards to secure information assets and control systems.

View the original content and more from this author here: http://ift.tt/1QNMHu5



from cyber security caucus http://ift.tt/1S7EJhV
via IFTTT

No comments:

Post a Comment