Security and Prosperity Steering Group Draft Report

Size: px
Start display at page:

Download "Security and Prosperity Steering Group Draft Report"

Transcription

1 2015/SOM2/TEL51/PLEN/023 Agenda Item: 7.3 Security and Prosperity Steering Group Draft Report Purpose: Consideration Submitted by: SPSG Convenor 51 st Telecommunications and Information Working Group Meeting Boracay, Philippines May 2015

2 51 st APEC TEL WORKING GROUP MEETING SECURITY AND PROSPERITY STEERING GROUP MEETING 15th May 2015 Boracay, Philippines The Security and Prosperity Steering Group (SPSG) meeting was held on 15th May 2015 from 09:00 17:30 at the Mabuhay Convention Hall, Paradise Garden Hotel, Boracay, the Philippines. The meeting was convened by Convenor, Mr.Thongchai Sangsiri of Thailand with the assistance of Deputy Convenor, Dr. Pei-wen Liu of Chinese Taipei. 1. OPENING The SPSG Convenor welcomed all APEC member economies to the Security and Prosperity Steering Group (SPSG) meeting. He thanked the host country, the Philippines, for their hospitality and reminded the meeting that the steering group would meet for one day only and, therefore, needed to be efficient in order to complete the tabled agenda. There are noteworthy developments in a number of areas since the last SPSG meeting in Australia. These developments include the approval of the TEL Work Plan 2015 and the TEL Strategic Action Plan at the TELMIN 10 in Malaysia. The Convenor thanked Singapore for offering to brief the meeting of the current status of these developments. The meeting reviewed each agenda item and adopted the SPSG meeting agenda. 2. HOST ECONOMY BRIEFINGS ON CYBERSECURITY EFFORTS Mr. Nicholas D. Ojeda Jr., Deputy Executive Director, Information and Communications Technology Office, provided the host economy briefing on recent cybersecurity efforts in the Philippines. He explained that emphasis was placed on three essential components: people, process, and technology. Concerning the people, the government of the Philippines focuses on safe access to cyberspace and ensures that people accessing cyberspace do not harm other citizens. In addition, the right people must be able to access and provide the right information at the right time. Furthermore, the government also promotes cybersecurity capacity and competency development. As for process, prescribed policies, standards, operational procedures and guidelines have been established as well as the national computer emergency response team or CERT. There are currently two different categories: Government CERT, which is being operated by the police, and a national CERT, which is being created by a Presidential Order. In the area of technology, the government encourages the use of up-to-date and state-of-the art technology and ensures the use of licensed software. 3. OVERVIEW OF SPSG REPORT AT THE 50th APEC TEL WG The Convenor recapped the outcomes from the previous SPSG meeting at the 50th APEC TEL WG in Australia for the benefit of those who may not have been there. Australia provided the host economy briefing on current cybersecurity initiatives. Information about child safety initiatives was presented at the meeting. Emphasis was placed on providing children with positive examples of good online behavior. Australia also has continuing education programs for all citizens and businesses, such as the Stay Smart Online Alert Service ( It puts out notifications of various security threats and advice for businesses. Stay Smart Weeks and Anti-fraud Weeks have been regularly organized. The focus forward is to give businesses the tools to protect themselves from online threats. Two URLs were provided for further information.

3 The 2nd economy briefing was given by CERT Australia. This organization helps Australian business to prepare for, defend against and mitigate cyber security attacks. Its focus is on Australian systems of national interest, including critical infrastructure. In 2013, a cyber-crime and security survey was carried out and 135 CERT Australia partner organizations responded. Interesting statistics include: 61% had no cyber security provisions in business risk registers, 56% detected at least 1 incident in 2013, and 57% replied that they chose not to report detected incidents externally. The most surprising result was that IT security expenditure is decreasing. A full report is available for download from cert.gov.au website, At this TEL, SPSG organized one very successful workshop on awareness raising activities where experts were invited to give presentations. The workshop closed with a panel discussion comprised of four experts from 4 member economies. Two economies provided current project updates: Comparing Approaches to Combating Botnets (USA) and Security of Mobile Devices (Malaysia). Two concept notes were discussed and approved at the meeting. 1. Japan s Workshop on Development of a safe and secure ICT use environment as a self-funded project. It aims to invite expert policymakers and regulators as well as the business community to share challenges, case studies and the efforts of each economy to respond to issues related to new ICT services as a contribution to development of a safe and secure ICT use environment in the APEC region. Three topics will be covered: (1) development of youth Internet use environment, (2) appropriate handling of user information related to ICT services, and (3) countermeasures for spam. The project received co-sponsorship from four member economies, including Australia, Brunei, Singapore, and United States of America. Japan planned to hold a one-day workshop at the APEC TEL Thailand proposed a concept note on the APEC Cybersecurity Framework with the aim to develop a cybersecurity framework which will include a repository of cyber security resources for APEC economies. The contents will be drawn from existing sources. This project is self-funded. The meeting discussed possible activity themes for October 2015 and agreed on promoting cybersecurity top-tips. Member economies agreed to send their cybersecurity top-tips to the Convenor for circulation and also share them with the APEC secretariat. Toward the end of the meeting, three guests were invited to present: a. OECD-WPISP (Working Party on Information and Privacy) Mrs. Siegel gave a briefing of ongoing projects, which include improving international comparability of CSIRTs statistics and revising the 2002 Security Guidelines. b. ISOC Mrs. Chomprang gave an overview of ISOC s mission and objectives. She introduced ISOC s role in security, which includes the 2002 OECD Guidelines for the Security of Information Systems and Networks and the OECD Digital Economy Report Cybersecurity Policy Making at a Turning Point. She mentioned the Mutually Agreed Norms for Routing Security (MANRS), aka the Routing Resilience Manifesto project, which focuses on BGP filtering, anti-spoofing and coordination and collaboration. c. APCERT Australia CERT explained the structure and priorities of APCERT. Currently, JPCERT/CC is the Chair and KrCERT/CC is the Deputy Chair. There are 25 teams from 19 economies. There are a number of challenges, including finding an effective mechanism to share information among members and identifying economies in the region that are not yet represented in APCERT. APCERT collaborates with other Asia- Pacific entities and also national CERTs outside the region. 4. TEL WG WORK PLAN and TEL STRATEGIC ACTION PLAN 4.1. TEL Work Plan 2015

4 Singapore explained that Work Plan for 2015 was drafted and approved by the SOM at the 10th Telecommunications and Information Ministerial Meeting in Malaysia in March It subscribed to the APEC connectivity blueprint, carried forward tasks outlined in the APEC 2014 Tasking Statement, and continued to work toward the current TEL Strategic Action Plan The Work Plan for 2015 identified cross-cutting issues and explained how they will be coordinated across fora. The Deputy Convenor noted that the SPSG has already worked with APEC Emergency Preparedness Working Group (EPWG) during the workshop organized by the Philippines earlier this week. Furthermore, the SPSG could also approach the Small and Medium Enterprises Working Group (SMEWG) to promote a safe and secure environment that empowers the SMEs. The Convenor offered to clarify with the APEC Secretariat how to coordinate a cross-fora activity. The meeting discussed the list of expected outcomes/deliverables for 2015 for the SPSG. These include (1) a workshop on CSIRT indicators, (2) a Cyber Security Awareness Activity, (3) Development of a Safe and Secure ICT Use Environment, and (4) a workshop on ICT for Disaster Risk Reduction and Management. The US informed the meeting that they will not be able to host a workshop on CSIRT indicators in TEL Strategic Action Plan Singapore explained that the vision and objectives of the TEL Strategic Action Plan were to establish an ICT ecosystem, characterized by integrated, seamless, secure, trusted and innovative ICT infrastructure, services and applications, widespread use of ICT in all sectors, and improved ICT skills and digital literacy which will enable APEC to attain regional economic integration, economic transformation and growth, physical and institutional people-to-people connectivity, and other APEC goals. The scope of the TEL WG includes new components: the digital economy and the internet economy. Five priority areas were identified: (1) develop and support ICT innovation, (2) promote a secure, resilient and trusted ICT environment, (3) promote regional economic integration, (4) enhance the digital economy and the Internet economy, and (5) strengthen cooperation. Furthermore, objectives and actions were described to provide more details. During the HOD and ExComm meetings these objectives and actions were considered and marked for planning and prioritization. The SPSG was tasked with priority 2: promote a secure, resilient and trusted ICT environment. The meeting agreed that future SPSG activities will focus in this area. The Convenor encourages economies to plan ahead and utilize TEL Strategic Action Plan as a reference. 5. WORKSHOP OUTCOMES Three SPSG workshops were conducted between May Development of a Safe and Secure ICT Use Environment This workshop was a one-day workshop held by Japan. The moderator was Mr. Makoto Yokozawa from Nomura Research Institute, Ltd., Japan. About 50 people attended this workshop. This workshop had 3 sessions. The first session s theme was Countermeasures for Spam. Five speakers (from the Ministry of Internal Affairs and Communication, Japan, Softbank Mobile Corp, Internet Initiative Japan, Inc., Office of the Communications Authority, Hong Kong and the Australian Government Department of Communications) made presentations. In the wrap-up session, the role of the government sector and the private sector, effective measures on technology and regulations, future cooperation in the APEC region, etc. were discussed among participants.

5 The second session s theme was Development of Safe and Secure Internet Environment for Youth. Five speakers from KDDI R&D Labs., Inc., Yahoo Japan Corporation, Information and Communication Security Technology Center, Chinese Taipei, the Malaysian Communications and Multimedia Commission and Information and the Communication Technology Office, Philippines, made presentations. In the wrap-up session, hot issues, effective measures, etc. were discussed among participants. The third session s theme was Appropriate handling of user information related to ICT services. Four speakers from the Korea Communications Commission, the Ministry of Internal Affairs and Communications, Japan, AT&T Inc., and the Ministry of Industry and Information Technology of China made presentations. In the wrap-up session, law, police, and regulations concerning personal data were discussed among participants. Finally, the moderator concluded with the points below: Citizens, youth and users have to have awareness and proper knowledge Participants expect Governments/Providers/NGOs/Communities to establish and ensure an appropriate environment Asia and Pacific Regions are the CENTER of ICT. The Asia-Pacific style of Safety and Security is expected from all regions in the world. 5.2 ICT for Disaster Risk Reduction and Management (Philippines) The Philippines organized a half-day workshop on ICT for disaster risk reduction and management on the afternoon of 14 May The workshop was divided into two sessions: (1) disaster mitigation and preparedness and (2) disaster response and recovery. The primary goal for the first session, disaster mitigation and preparedness, was to prepare to alleviate disaster situations when they occur. There are three ICT projects related to disaster preparedness and mitigation: project (1) NOAH, (2) Project DINA (Disaster Information for Nationwide Awareness), and (3) Weather Forecasting system. This workshop emphasized the NOAH project, which is related to the APEC TEL action plan to enhance the effectiveness of disaster response by strengthening disaster management networks. At the moment, the Philippines is testing two systems used for managing disasters: the Cloudbased Disaster Management System and the Emergency Warning Broadcasting System (EWBS). There is a future plan to establish Cloud-based Disaster Management at the Intelligent Operation Center (IOC) of the Office of Civil Defense. During the second session, disaster response and recovery, the Philippines showed that they are responding to and recovering from the impacts of disasters by strengthening ICT. They are also providing ICT resource support to improve response and coordination among rescue organizations. Moreover, the Philippines introduced the Intelligent Operation Center (IOC), which was established to consolidate databases related to health, weather and analysis of weather reports. It also provides information to other government agencies to share impact analyses and hourly updates during extreme weather disturbances. Apart from that, the Philippines has established the Emergency Telecom Cluster (ETC), which will be activated and operationalized in times of disaster. There are also other applications which will contribute to the process of disaster response and recovery, such as Project DINA and the Batingaw application. 5.3 Cybersecurity Framework (Thailand) Thailand organized a half-day Cybersecurity Framework workshop on the afternoon of 12 May A total of 31 economy representatives attended the workshop. Thailand provided a number of basic concepts based on research and suggestions from relevant stakeholders from a seminar organized in Thailand. The objective of the workshop was to share those basic concepts and seek member economies' input and suggestions to build a solid fundamental cybersecurity framework. Thailand introduced three areas of

6 interest, including: (1) NIST Cybersecurity Framework 1.0, (2) Multi-stakeholder model, and (3) other concepts and technologies. The workshop has produced useful and constructive suggestions which Thailand will use to further research from information sources before starting the drafting process. Thailand planned to inform the Plenary that it would not be able to complete the project at TEL WG 52 as planned. Furthermore, Thailand planned to request one full-day workshop at the TEL WG CURRENT PROJECT UPDATES 6.1. Comparing Approaches to Combating Botnets (USA) The US reported that they had distributed a questionnaire set about botnets to member economies last year, but received a very low response rate and therefore did not have enough information to make a proper assessment. The meeting discussed ways to improve the result and recommended a re-distribution through the HODs and s from the SPSG sign-in sheet that was being circulated in the meeting. 6.2 CSIRT Indicators (USA) The US provided a brief explanation of its CSIRT Indicators project which was launched in 2012 as a joint APEC-OECD initiative. The project aims to improve the status quo of CSIRT statistics. The US informed the meeting that it was unable to organize a CSIRT Indicators workshop at the current APEC TEL meeting as planned nor did it schedule one for the next APEC TEL. However, the US still intends to organize such workshop in the future. 7. DISCUSSION AND APPROVAL OF NEW PROJECT PROPOSALS No new projects were proposed by SPSG member economies 8. ECONOMY REPORTS 8.1 Japan Japan gave a briefing on the Japan Cybersecurity Basic Act which includes a cybersecurity strategy and a cybersecurity strategy headquarters which is under cabinet and has the NISC (National Center of Incident Readiness and Strategy for Cybersecurity) as its secretariat. The Representative also explained Japan s CIIP (Critical Information Infrastructure Protection) to ensure business continuity for critical infrastructure and prevent ICT outages in cased of a cyber-attack or natural disaster. The Representative then provided a briefing concerning several security projects run by the Japanese government, such as PRACTICE, ACTIVE and CYDER, projects which simulate real attacks to improve the skills of IT administrators in government agencies. 8.2 Thailand Thailand provided a brief introduction of ThaiCERT (Thailand Computer Emergency Response Team) and then provided information regarding their cybersecurity activities, such as organizing a local certification program called isec with TISA, GCIH training with SANS, mobile forensics training, incident drills for the financial sector and ISPs, a Malware analysis competition in 2014 with JPCERT and organizing various seminars. ThaiCERT also published alerts and organized a press conference to warn of heartbleed vulnerability.

7 8.3 The US The US representative, Ben Goldsmith, provided a briefing on cybersecurity activities in the US including new legislation, such as the Cybersecurity Enhancement Act of 2014, the National Cybersecurity Protection Act of 2014, the Cybersecurity Workforce Assessment Act of 2014, and the Federal Information Security Modernization Act (FISMA) of Several executive orders were issued, such as Promoting Private Sector Cybersecurity Information Sharing, Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities and establishing the Cyber Threat Intelligence Integration Center (CTIIC) to warn relevant departments and agencies of the threats as close to real time as possible. He also explained about US cybersecurity awareness month to raise awareness and educate Americans about cybersecurity. 8.4 Chinese Taipei The Chinese Taipei representative gave an update on activities including "Cyber Development Trend Workshop" to train ministers and high officials. There were activities such as a prime ministerial meeting, broadcasted via Youtube, and broadcasting a meeting to solicit civil opinions via internet so that internet users can express their opinions in real-time. He also explained draft strategies of cybersecurity and privacy which consist of 6 concepts: (1) Build a Sound Basis for Cyber Security Legal Standards, (2) Strengthen Cyber Crimes Enforcement, (3) Implement Cross-discipline Practitioner Training Programs, (4) Elevate Trust and Security of Smart Commerce and Business, (5) Expand Scope of Public-Private Partnership, (6) Improve Allocation of Government Resources, (7) Build a Security Living Lab for Next Generation ICT and 8. Connect Domestic Best Practices with international standards. 9. CYBERSECURITY AWARENESS RAISING ACTIVITIES USA briefed the meeting on past activities related to cybersecurity awareness raising and noted the continual collaboration among the APEC member economies. Last year s activity involved the creation and distribution of safety tip for mobile devices. USA then propose four options to choose from for this s awareness raising activities. They are (1) Develop and distribute tip-sheet on a new topic, (2) Coordinated social media campaign such as Twitter chat, and (3) invite economies to join Cybersecurity Awareness Coalition. The meeting discussed and agreed that the Convenor should coordinate and distribute cybersecurity awareness raising activity via for all organization to review. 10. WORK COLLABORATION 10.1 Cyber Green by APCERT The APCERT representative explained the structure and priorities of APCERT. There are 27 teams from 20 economies. A few challenges include finding an effective mechanism to share information among members and identifying economies in the region that are not yet represented in APCERT. APCERT collaborates with other Asia-pacific entities and also national CERTs outside the region. Cyber green is about finding way to clean up the Asia-pacific region including malware eradication (not just combating). APCERT also participated in various forms of training: online and face-to-face. The focus is on CERT/CSIRT training, but is open to collaboration with non-cert partners such as APNIC and APTLDs.

8 10.2 OECD-Working Party on Security and Privacy in the Digital Economy (SPDE) USA gave a briefing of ongoing projects at OECD, which include improving international comparability of CSIRTs statistics and revising the 2002 Security Guidelines. He then mentioned CSIRTs statistics project, which was launched in 2012, as a joint APEC-OECD initiative. The project aims to improve the status quo of CSIRT statistics. Draft Preliminary Guidance will be circulated soon for comments and feedback ISOC The Representative from the Internet Society gave a presentation on "Collaborative Security" that explained the organization's objective to promote the open development, evolution, and use of the Internet with 190 chapters around the world. Then she explained 5 elements that should be included in a cybersecurity framework: (1) fostering confidence and protecting opportunities, (2) collective responsibility, (3) fundamental properties and values, (4) evolution and consensus, and (5) think globally, act locally. Finally, she expressed the opinion that there's no absolute security. It's about reducing risk APNIC The APNIC Representative explained its vision. Currently, APNIC is promoting 4 best practices in security: 1. Resource Public Key Infrastructure (RPKI), 2. DNSSEC, Source Address Validation (SAVE) 3. Everywhere, and 4. Updating IRT References in the APNIC Whois Database. The Representative explained more details on RPKI 101 via ROA (Route Object Authorisations) Campaign which helped to address issues such as route hijacking and mis-origination and encouraged APNIC members to create Route Origin Authorizations for their network prefixes. APNIC also collaborates with various stakeholders and supports training such as internet investigation training. APNIC will continue to support APEC and APEC TEL to achieve Strategic Action Plans. 11. OTHER BUSINESS The Convenor asked the meeting if any economy plans to request a time slot at the next APEC TEL meeting. Only Thailand requested to have a one full day workshop at APEC TEL CLOSING The Convenor thanked all member economies for a successful SPSG meeting and closed the meeting

Infocomm Security Masterplan 2

Infocomm Security Masterplan 2 INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

APEC Telecommunications and Information Working Group Strategic Action Plan 2016-2020 PREAMBLE

APEC Telecommunications and Information Working Group Strategic Action Plan 2016-2020 PREAMBLE PREAMBLE We stand at a unique point in history, when Information and Communications Technologies (ICTs) are transforming our economies, our societies, and our lives. These new technologies have connected

More information

Global Cybersecurity Index Good Practices

Global Cybersecurity Index Good Practices AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation

More information

ASEAN s Cooperation on Cybersecurity and against Cybercrime

ASEAN s Cooperation on Cybersecurity and against Cybercrime ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

OPPORTUNITIES AND CHALLENGES IN CYBERSECURITY

OPPORTUNITIES AND CHALLENGES IN CYBERSECURITY ASIA-PACIFIC TELECOMMUNITY 5th APT CYBERSECURITY FORUM (CSF-5) 26-28 May 2014, Ulaanbaatar, Mongolia Document CSF-5/INP-13 19 May 2014 Mr. Adli Wahid, APNIC OPPORTUNITIES AND CHALLENGES IN CYBERSECURITY

More information

SMEWG Strategic Plan 2013-2016

SMEWG Strategic Plan 2013-2016 /SMEWG35/035 SMEWG Strategic Plan 2013-2016 Purpose: Information Submitted by: Chair 35 th Small and Medium Enterprises Working Group Meeting St. Petersburg, Russia 1-2 August Strategic Plan 2013-2016

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov

More information

International Strategy on Cybersecurity Cooperation

International Strategy on Cybersecurity Cooperation 資 料 9-2 International Strategy on Cybersecurity Cooperation - j-initiative for Cybersecurity - October 2, 2013 Information Security Policy Council Contents 1 Objectives 1 2 Basic Principles 2 2.1 Ensuring

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Capacity Building to Strengthen Cybersecurity: Thailand Update

Capacity Building to Strengthen Cybersecurity: Thailand Update Capacity Building to Strengthen Cybersecurity: Thailand Update ASEAN Regional Forum Workshop on Measures to Enhance Cyber Security Legal and Cultural Aspects September 11-12, 2013 1 1 Chain is only as

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka Overview of ITU Cybersecurity Activities NGN Migration Strategies and Access Modernization 26 May 2011 Dhaka Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific 1 Agenda Why Cybersecurity?

More information

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National

More information

Emerging risks for internet users

Emerging risks for internet users Sabeena Oberoi Assistant Secretary, Cyber Security and Asia Pacific Branch Department of Broadband, Communications and the Digital Economy Government s role - DBCDE The new Australian Government Cyber

More information

The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness

The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM Entitled by: Cristine Hoepers, Klaus Steding-Jessen,

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY

More information

National Cyber Security Strategy of Afghanistan (NCSA)

National Cyber Security Strategy of Afghanistan (NCSA) Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA

More information

Cyber Security Strategy(Information Security Policy Council, June 10, 2013)

Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Environmental Change Vision to aim as a Goal Basic Principles Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Areas of Efforts Increasing severity of the risk surrounding cyberspace

More information

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie Developments in Security Regulation Agenda Introduction PM & C Cybersecurity Review Mandatory Data Retention Legislation Overview

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Cyber Security in Japan (v.2)

Cyber Security in Japan (v.2) Cyber Security in Japan (v.2) Ryusuke Masuoka (masuoka@cipps.org) and Tsutomu Ishino (ishino@cipps.org) Cyber Security Policy Research Team Center for International Public Policy Studies (CIPPS) December

More information

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency 1 Challenge for Cyber Security in Financial Sector (1) Necessity to Strengthen

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy 2015 Action Plan A LIVING ACTION PLAN WITH ANNUAL REVIEWS New Zealand s Cyber Security Strategy provides a single cohesive framework to ensure that New Zealand is secure, resilient

More information

Internet of Things Development for the Promotion of Information Economy

Internet of Things Development for the Promotion of Information Economy 2015/SOM2/TEL51/DSG/009 Agenda Item: 4.2 Internet of Things Development for the Promotion of Information Economy Purpose: Information Submitted by: China ICT Development Steering Group Meeting Boracay,

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

2009 APEC Research and Development (R&D) Management Training (ART) Program

2009 APEC Research and Development (R&D) Management Training (ART) Program 2008/ISTWG35/026 Agenda Item: SM4.7 2009 APEC Research and Development (R&D) Management Training (ART) Program Purpose: Information Submitted by: Korea 35 th Industrial Science and Technology Working Group

More information

Cyber Security ( Lao PDR )

Cyber Security ( Lao PDR ) ITU Cyber security Forum and Cyber Drill 9-11 December 2013,Lao Plaza Hotel, Vientiane, Lao PDR Country updates on Cyber Security ( Lao PDR ) By Khamla Sounnalat Deputy head of LaoCERT Ministry of Posts

More information

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012 Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives Initiation date: January 2012 Completion date: June 2012 Nomination submitted by: Samuel A. Nixon

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Cyber Security a Global Challenge; What and how Thailand is doing

Cyber Security a Global Challenge; What and how Thailand is doing Cyber Security a Global Challenge; What and how Thailand is doing Pansak SIRIRUCHATAPONG Executive Director National Electronics and Computer Technology Center February 19, 2009 1 Global IT Security Market

More information

DHS, National Cyber Security Division Overview

DHS, National Cyber Security Division Overview DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined

More information

Department of Homeland Security Federal Government Offerings, Products, and Services

Department of Homeland Security Federal Government Offerings, Products, and Services Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity

More information

Fostering Information Security Awareness Among Responding Countries

Fostering Information Security Awareness Among Responding Countries Unclassified DSTI/ICCP/REG(2005)1/FINAL DSTI/ICCP/REG(2005)1/FINAL Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 16-Dec-2005

More information

Pacific Islands Telecommunications Association

Pacific Islands Telecommunications Association Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: pita@connect.com.fj www.pita.org.fj INVITATION

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

Cybersecurity Strategy in Japan

Cybersecurity Strategy in Japan Cybersecurity Strategy in Japan Jan 21, 2015 Hiroshi Kawaguchi, CISSP Little earth Corporation Co., Ltd. Chief Evangelist hiroshi.kawaguchi @ lac.co.jp What is this? 2 Global Risks 2014 http://www3.weforum.org/docs/wef_globalrisks_report_2014.pdf

More information

Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review

Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review About auda.au Domain Administration Ltd (auda) is the industry self regulatory, not for profit

More information

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For

More information

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

Trade Policy Dialogue on Submarine Cable Protection, San Francisco, 18 September 2011 - Summary of Outcome

Trade Policy Dialogue on Submarine Cable Protection, San Francisco, 18 September 2011 - Summary of Outcome 2011/SOM3/CTI/048 Agenda Item: 5.3 Trade Policy Dialogue on Submarine Cable Protection, San Francisco, 18 September 2011 - Summary of Outcome Purpose: Information Submitted by: Australia Third Committee

More information

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For

More information

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th Cybersecurity: Thailand s and ASEAN s priorities Soranun Jiwasurat www.etda.or.th Cyber Threat Landscape Overview 2 Cyber threat a hostile act using computers, electronic information and/or digital networks

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Cyber Security Threats and Countermeasures

Cyber Security Threats and Countermeasures GBDe 2006 Issue Group Cyber Security Threats and Countermeasures Issue Chair: Buheita Fujiwara, Chairman, Information-technology Promotion Agency (IPA), Japan 1. Overview Cyber security is expanding its

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 4/17 Geneva, 11-20 February 2009 Ref. : TD 0244 Rev.2 Source:

More information

How To Write A Cybersecurity Framework

How To Write A Cybersecurity Framework NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com jrobles@coqui.net 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Information security education for students in Japan

Information security education for students in Japan Information security education for students in Japan Introduction This article aims to introduce the current situation of elementary and secondary school education on information security in Japan, as

More information

Cyber Security @ ITU. By Tomas Lamanauskas, ITU

Cyber Security @ ITU. By Tomas Lamanauskas, ITU Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and

More information

Information Security Seminar 2013

Information Security Seminar 2013 Information Security Seminar 2013 Mr. Victor Lam, JP Deputy Government Chief Information Officer Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative

More information

Promoting Human Capacity Building in an Era of Knowledge-based Economy through Tripartite Cooperation

Promoting Human Capacity Building in an Era of Knowledge-based Economy through Tripartite Cooperation Session VI: Extending Benefits of the Knowledge-based Economy Promoting Human Capacity Building in an Era of Knowledge-based Economy through Tripartite Cooperation By Gong Zhankui & Liu Chenyang APEC Study

More information

APEC SMALL AND MEDIUM ENTERPRISE WORKING GROUP (SMEWG) STRATEGIC PLAN 2009-2012

APEC SMALL AND MEDIUM ENTERPRISE WORKING GROUP (SMEWG) STRATEGIC PLAN 2009-2012 1 APEC SMALL AND MEDIUM ENTERPRISE WORKING GROUP (SMEWG) STRATEGIC PLAN 2009-2012 I. Introduction The SMEWG Strategic Plan has been developed to provide focus for the work of the SMEWG from 2009 until

More information

Making our Cyber Space Safe

Making our Cyber Space Safe Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity

More information

THE WHITE HOUSE Office of the Press Secretary. FACT SHEET: Administration Cybersecurity Efforts 2015

THE WHITE HOUSE Office of the Press Secretary. FACT SHEET: Administration Cybersecurity Efforts 2015 FOR IMMEDIATE RELEASE July 9, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: Administration Cybersecurity Efforts 2015 From the beginning of his Administration, the President has made it

More information

National Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA

National Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA National Information Technology Center (NITC) National Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA Ahmed Otoom, Ph.D. Disclaimer This presentation does

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

Korea s s Approach to Network Security

Korea s s Approach to Network Security Korea s s Approach to Network Security 21 May 2002 Cha, Yang-Shin Ministry of Information and Communication 1 Contents Advancement in the Information Society and New Threats Information Infrastructure

More information

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues. Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating

More information

Network and Incident monitoring

Network and Incident monitoring August, 2013 Network and Incident monitoring Koichiro (Sparky) Komiyama Sam Sasaki JPCERT Coordination Center, Japan Agenda 1. Introduction of TSUBAME 2. Recent Observation cases 2 1. INTRODUCTION OF TSUBAME

More information

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

Towards closer EU-ASEAN collaboration in cybersecurity

Towards closer EU-ASEAN collaboration in cybersecurity Supporting European Union and Southeast Asia ICT strategic partnership and policy dialogue: Connecting ICT EU-SEA Research, Development and Innovation Knowledge Networks Towards closer EU-ASEAN collaboration

More information

National Cyber Security Strategies

National Cyber Security Strategies May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is

More information

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

Overview of ITU Cybersecurity Activities

Overview of ITU Cybersecurity Activities Overview of ITU Cybersecurity Activities Workshop on NGN Regulation & Migration Strategies 13 & 15 October 2010 New Delhi, India Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific

More information

REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY

REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY REPUBLIC OF MAURITIUS 5555555555555555555555555555555555555555555555555555555555 5555555555555555555555555555555555555555555555555555555555 NATIONAL CYBER SECURITY STRATEGY 2014-2019 The time has come

More information

Qatar Computer Emergency Team

Qatar Computer Emergency Team Cyber Security Division Qatar Computer Emergency Team An initiative Introduction Qatar aims to fully exploit information and communications technology to become one of the most successful knowledge-based

More information

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security

More information

Assuring Telecom (Infrastructure and Services) An Operations Perspective

Assuring Telecom (Infrastructure and Services) An Operations Perspective Industry Canada Assuring Telecom (Infrastructure and Services) An Operations Perspective IC Security Roles and Activities Assure Telecom Infrastructure and Services Enhance Telecom Security Expertise and

More information

MIC s Efforts on Cybersecurity Human Resource Development

MIC s Efforts on Cybersecurity Human Resource Development ASEAN-Japan Cyber Security International Symposium MIC s Efforts on Cybersecurity Human Resource Development October 9 th 2014 Yuji NAKAMURA Director for the ICT Security Strategy, Ministry of Internal

More information

CYBER SECURITY STRATEGY AN OVERVIEW

CYBER SECURITY STRATEGY AN OVERVIEW CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without

More information

How To Prevent Cyber Crime

How To Prevent Cyber Crime , pp.13-20 http://dx.doi.org/10.14257/ijsia.2015.9.2.02 An International Comparative Study on Cyber Security Strategy Kyoung-Sik Min, Seung-Woan Chai and Mijeong Han Korea Internet & Security Agency kyoungsik@kisa.or.kr,

More information