Cybersecurity for ALL

Size: px
Start display at page:

Download "Cybersecurity for ALL"

Transcription

1 Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund ITU Telecommunication Development Bureau ICT Applications and Cybersecurity Division For more information on ITU s Cybersecurity Activities visit the website at: or contact International Telecommunication Union

2 Cybersecurity for ALL ITU s objective: To build trust, confidence and security in the use of ICTs Activities being undertaken: Global Cybersecurity Agenda (GCA) Implementation activities that relate to all five pillars of the GCA Coordination activities as part of ITU s responsibility as the facilitator for WSIS action line C5 Development of cybersecurity and cybercrime resources and material Anti-spam measures Critical Information Infrastructure Protection (CIIP) related initiatives Global standardization activities Child Online Protection (COP) initiative related activities Capacity building, training, direct assistance to countries, etc. Fostering enhanced sub-regional, regional and international cooperation on cybersecurity 2

3 Cybersecurity Issues and Challenges Constant evolution of the nature of cyber threats Vulnerabilities in software and hardware applications and services changing and increasing Countries are increasingly at risk and under attack Low entry barriers and increasing sophistication of the type of cybercrimes committed Loopholes in current legal frameworks Absence of appropriate national organizational structures to deal with the threats Inadequate cooperation amongst the various stakeholders and stakeholder groups The lack of cybersecurity is global problem that cannot be solved by any single entity (country or organization) alone! The world is faced with the challenging task of developing harmonized and comprehensive strategies at the global and international level and implementing these with the various relevant national, regional, and international stakeholders in the countries 3

4 Nature and Scope of Cybersecurity Around the World Countries and/or stakeholders see cybersecurity as: a technical, network or information technology issue, or a developmental issue because ICT services need secure and reliable networks, or an economic issue relating to maintaining business continuity or economic advantage, or a law and enforcement issue to deal with cybercrime and criminalizing the misuse of ICTs, or a national security issue relating to critical information infrastructure protection (CIIP). Any international road map for cybersecurity must address all these different national perspectives. All stakeholder groups have a role to play in promoting a global culture of cybersecurity. 4

5 Promoting a Culture of Cybersecurity Promoting a culture of cybersecurity consistent with UNGA Resolutions: Resolution 57/239, Creation of a global culture of cybersecurity Resolution 58/199, Creation of a global culture of cybersecurity and the protection of critical information infrastructures 5

6 UN Resolutions (57/239 & 58/199) Related to a Culture of Security UN Resolution 57/239 (2002) on the Creation of a global culture of cybersecurity Identifies nine elements for creating a global culture of cybersecurity: a) Awareness b) Responsibility c) Response d) Ethics e) Democracy f) Risk Assessment g) Security Design and Implementation h) Security Management i) Reassessment 6

7 UN Resolutions (57/239 & 58/199) Related to a Culture of Security UN Resolution 58/199 (2004) further emphasizes the promotion of a global culture of cybersecurity and protection of critical information infrastructures Recognizes the growing importance of information technologies for the promotion of socio-economic development and the provision of essential goods and services Notes the increasing links among most countries critical infrastructures and that these are exposed to a growing number and a wider variety of threats and vulnerabilities that raise new security concerns Recognizes that effective protection requires communication and cooperation nationally and internationally among all stakeholders and that national efforts should be supported by effective, substantive international and regional cooperation among stakeholders Encourages Member States and relevant regional and international organizations that have developed strategies to deal with cybersecurity and the protection of critical information infrastructures to share their best practices and measures that could assist other Member States in their efforts to facilitate the achievement of cybersecurity 7

8 WSIS and Promoting a Global Culture of Cybersecurity From WSIS Phase II: Tunis Agenda 39. We seek to build confidence and security in the use of ICTs by strengthening the trust framework. We reaffirm the necessity to further promote, develop and implement in cooperation with all stakeholders a global culture of cybersecurity, as outlined in UNGA Resolution 57/239 and other relevant regional frameworks. This culture requires national action and increased international cooperation to strengthen security while enhancing the protection of personal information, privacy and data. Continued development of the culture of cybersecurity should enhance access and trade and must take into account the level of social and economic development of each country and respect the development-oriented aspects of the Information Society. 8

9 Foundation for Cybersecurity Action International and Regional Efforts include: United Nations General Assembly (UNGA) lead initiatives G8 activities Council of Europe (CoE) Convention on Cybercrime ENISA initiatives European Commission activities Regional Commonwealth in the field of Communications (RCC) activities Asia Pacific Economic Cooperation (APEC) Organization of American States (OAS) Arab League initiatives Gulf Cooperation Council (GCC) initiatives Organization for Economic Cooperation and Development (OECD) activities World Summit on the Information Society (WSIS) and its action line C5 dedicated to building confidence and security in the use of ICTs UN organizations dedicated activities ITU Global Cybersecurity Agenda (GCA) initiative Etc. 9

10 ITU and Cybersecurity ITU constitutes a unique global forum to discuss related to cybersecurity Based on the existing mandate and country requests, the ITU Secretary-General has set cybersecurity as a top priority ITU Membership has been calling for a greater role to be played by ITU in matters relating to cybersecurity through a number of Resolutions, Decisions, Programmes and Recommendations ITU provides a global perspective and expertise and is currently promoting cybersecurity through a range of activities related to standardization, radiocommunication and technical assistance to countries, tailored to their specific needs 10

11 Global Framework for Cybersecurity: ITU's Global Cybersecurity Agenda At the World Summit on the Information Society (WSIS) in 2005, ITU was entrusted by leaders of the international community to act as the facilitator for WSIS Action Line C5: Building confidence and security in the use of ICTs As a result, in 2007, ITU Secretary-General launched the Global Cybersecurity Agenda, an international framework for collaboration on cybersecurity matters that addresses 5 main areas: 1. Legal Measures 2. Technical and Procedural Measures 3. Organizational Structure 4. Capacity Building 5. International Cooperation 11

12 ITU-D s s Work in Cybersecurity Needs for global solutions and harmonized international frameworks ITU Global Cybersecurity Agenda (GCA) Integrated approach to cybersecurity undertaken within the WTDC Programme 3 managed by ITU-D s s ICT Applications and Cybersecurity Division Implementation at national, regional and international level Special focus on Developing Countries Multi-stakeholder approach ITU Study Groups work ITU Conferences outcomes Addressing the specific requirements of the countries, to provide strategies at national level 12

13 Legal Measures Summary of objective: Harmonization of legal frameworks and the elaboration of strategies for the development of cybercrime legislation that is globally applicable and interoperable with existing national/regional legislative measures. Related activities/initiatives: ITU Cybercrime Legislation Resources ITU Toolkit for Cybercrime Legislation ITU Publication on Understanding Cybercrime: A Guide for Developing Countries Capacity building and training (training for judges, etc.) Regional workshops and events 13

14 Examples of Recent Initiatives ITU Toolkit for Cybercrime Legislation aims to provide countries with sample legislative language and reference material that can assist in the establishment of harmonized cybercrime laws and procedural rules. ITU Publication on Understanding Cybercrime: A Guide for Developing Countries provides a comprehensive overview of the most relevant topics linked to the legal aspect of cybersecurity and cybercrime. 14

15 Technical and Procedural Measures Summary of objective: Development of strategies for the establishment of globally accepted security protocols, standards, minimum security criteria and accreditation schemes for hardware and software applications and systems Related activities/initiatives: ITU Standardization Work ITU-T Study Group 17 ICT Security Standards Roadmap promoting collaboration between regional/ international organizations and standards bodies ITU Radiocommunications security activities IMPACT collaboration services, etc. Country direct assistance activities, etc. 15

16 Cybersecurity Study Group Activities in ITU-T (Standardization) ITU standardization activities are organized under Study Groups that focus on different topic areas (e.g.,security, access and transport networks, multimedia, signalling, numbering, naming and addressing, tariffs, IP and NGN). These compose a unique forum for public-private partnerships Cooperation and collaborative activities exist with many organizations and forums, including regional telecom forums, IETF, ISO,IEC, ETSI, etc. Examples of specific ITU-T activities related to cybersecurity and Child Online Protection include: Study Group 17 Security has primary focus on communication security and is the Lead Study Group on security for ITU-T Study Group 2 Operational aspects of service provision and telecommunication management works on harmonizing numbering resources for child helplines, etc. 16

17 Specific Cybersecurity Study Group Activities in ITU-T (Standardization) Study Group 17 has primary focus on communication security and is the Lead Study Group on security for ITU-T Work under way under Study Group 17 Questions: Working Party 1: Network and information security Q 1 Telecommunications systems security project Q 2 Security architecture and framework Q 3 Telecommunications information security management Q 4 Cybersecurity Q 5 Countering spam by technical means Working Party 2: Application security Q 6 Security aspects of ubiquitous telecommunication services Q 7 Secure application services Q 8 Telebiometrics Q 9 Service oriented architecture security Working party 3: Identity management and languages Q 10 Identity management architecture and mechanisms Q 11 Directory services, Directory systems, and public-key/attribute certificates Q 12 Abstract Syntax Notation One (ASN.1), Object Identifiers (OIDs) and associated registration Q 13 Formal languages and telecommunication software Q 14 Testing languages, methodologies and framework Q 15 Open Systems Interconnection (OSI) 17

18 Other Cybersecurity Initiatives in ITU-T Correspondence group on exchange of network digital forensics: Trusted exchange of network forensics, including vulnerabilities, has become an increasingly important and rapidly evolving field of cybersecurity. This generally refers to the acquisition, preservation, and exchange of trusted information associated with an incident, event or discovered vulnerability of interest. Draft Recommendation on Traceback use cases and capabilities. These traceback capabilities should help to find ingress point, path, partial path or source of a network event. X.1240-series of Recommendations on technical means for countering spam. A series of published Recommendations and other draft in progress assist in preventing reception of un-solicited information Supplement 5 to ITU-T Recommendation E.164 Guidance with regards to the selection of numbers for helplines for children was approved in May New Draft Recommendation on Specification of an Intl Numbering Resource for use in the provisioning of International Help lines This calls for easy-to-remember numbers, accessible from all phones to be made available free of charge. Expecting its approval by the end of

19 Some Cybersecurity Initiatives in ITU-R (Radiocommunication) Radio spectrum global frequency management is increasingly important for building confidence and security and creating an enabling environment in the use of ICTs. ITU-R plays a central role in facilitating complex intergovernmental negotiations needed to develop legally binding agreements between sovereign states in an increasingly unwired world. Mobile handheld devices are widely used by children and young people and therefore merit extra attention when it comes to security. Some examples of ongoing activities include: Recommendation ITU-R M.1457 Security mechanism incorporated in IMT-2000 Recommendation ITU-R M.1645 Framework and overall objectives of the future development of IMT-2000 and systems beyond IMT-2000 Recommendation ITU-R M.1223 Evaluation of security mechanism for IMT-2000 Recommendation ITU-R M.1078 Security principles for IMT

20 Organizational Structures Summary of objective: Elaboration of global strategies for the creation of appropriate national and regional organizational structures and policies on cybercrime, watch, warning and incident response, generic and universal identity systems Related activities/initiatives: International Multilateral Partnership Against Cyber Threats (IMPACT) collaboration related services IMPACT Global Response Centre services, etc. Development of national computer incident response teams (CIRTs) and related training, etc. Capacity building and training Regional workshops and events Direct assistance to countries, etc. 20

21 Examples of Ongoing Initiatives for Developing Organizational Structures and Building Incident Management Capabilities Assistance to Developing Countries in the Establishment of Watch, Warning and Incident Response (WWIR) Capabilities Facilitate the deployment of IMPACT s Global Response Centre to Member States Information package sent to all ITU Member States in April 2009 Some 15+ countries confirmed Deployment has already started Developing National Computer Incident Response Teams (CIRTs) CIRT Toolkit being developed to assist in the development and implementation of national centers Direct assistance to countries Capacity building and training 21

22 Capacity Building Summary of objective: Development of global strategies to facilitate human and institutional capacity building across all relevant aspects of cybersecurity Related activities/initiatives: ITU National Cybersecurity/ CIIP Self-Assessment Tool ITU Toolkit for Promoting a Culture of Cybersecurity ITU Botnet Mitigation Toolkit and pilot projects IMPACT Training and Skills Development Centre IMPACT Research Division Capacity building and training for all pillars in the GCA Targeted workshops and events 22

23 Examples of Some Ongoing Initiatives ITU National Cybersecurity/CIIP Self Assessment Tool aims to assist governments in examining existing national policies, procedures, norms, institutions and other elements necessary for formulating cybersecurity strategies in an ever-changing ICT environment. ITU Study on the Financial Aspects of Network Security: Malware and Spam, 2008 is a survey of existing resources and data available when it comes to the economics and financial aspects of cybersecurity. The study develops a framework within which the financial impacts and implications can be assessed and brings together the many disparate sources of financial data on malware and spam. 23

24 Examples of Some Ongoing Initiatives ITU Regional Cybersecurity Forums 8 regional cybersecurity events held in 2007 and 2008 in all regions. Several more planned for ITU Regional Cybersecurity Forum for Europe and CIS held in Bulgaria, 7-9 October ITU Regional Cybersecurity Forum for Africa and Arab States held in Tunisia, ITU Regional Cybersecurity Forum for Asia Pacific to be held in India, September

25 Outcomes of Recent Event in Tunisia ITU Regional Cybersecurity Forum for Africa and Arab States in Tunis, Tunisia, 4-5 Country representatives identified requirements for specific cybersecurity capacity building and training needs that the countries in the regions have and ways in which to achieve these. Mechanisms to finance such activities were also discussed. Recommendations for concrete actions that need to be taken by countries: In the area of developing a legal framework and establishing effective enforcement, countries encouraged the involvement of governments in the region in international efforts and in coordination/cooperation with regional and international effort. They noted that more direct assistance to countries is needed and with the help of existing tools, such as the newly released ITU Toolkit for Cybercrime Legislation, and Understanding Cybercrime Guide Countries expressed their need for direct assistance in the development of watch, warning and incident management capabilities and for the establishment of the necessary organizational structures with national responsibility, including national computer incident response teams (CIRTs). Countries committed to concrete actions to be taken in developing a national cybersecurity strategy and ensuring harmonization within the key principles of international cooperation. 25

26 International Cooperation Summary of objective: Development of proposals to enhance international dialogue on issues that pertain to cybersecurity and enhance cooperation and coordination across all relevant activities Related activities/initiatives: ITU Secretary-General High Level Expert Group (HLEG) deliverables ITU-International Multilateral Partnership Against Cyber Threats (IMPACT) collaboration ITU Cybersecurity Gateway World Telecommunication and Policy Forum WTPF 2009 opinions (Opinion 1: Internet related public policy issues) Regional cybersecurity forums ITU s Child Online Protection (COP) initiative 26

27 Child Online Protection (COP) COP is a global initiative created by ITU, as part of the Global Cybersecurity Agenda, which aims to address cybersecurity holistically. COP Objectives: Identify risks and vulnerabilities to children in cyberspace; Create awareness; Develop practical tools to help minimize risk; Share knowledge and experience. 27

28 Child Online Protection (COP) Guidelines Draft Guidelines for Children Draft Guidelines for Parents, Guardians and Educators Draft Guidelines for Industry Draft Guidelines for Policy Makers The Draft Child Online Protection Guidelines can be found online at: The Draft Guidelines are currently open for comments (Deadline 30 ) 28

29 Working together ITU is working with the following organizations on COP and would like to thank them for their support Children's Charities' Coalition on Internet Safety Child Helpline International (CHI) Cyber Peace Initiative European Network and Information Security Agency (ENISA) European Broadcasting Union (EBU) European Commission - Safer Internet Programme European NGO Alliance for Child Safety Online (enasco) ewwg Family Online Safety Institute (FOSI) GSM Association International Criminal Police Organization (Interpol) International Centre for Missing & Exploited Children Microsoft Telecom Italia Telefónica Save the Children United Nations Children s Fund (UNICEF) United Nations Office on Drugs and Crime (UNODC) United Nations Interregional Crime and Justice Research Institute (UNICRI) United Nations Institute for Disarmament Research (UNIDIR) With YOUR support, we can make every child s online adventure a safe one! 29

30 Links to More Information An Overview of ITU Activities in Cybersecurity ITU Global Cybersecurity Agenda ITU-D ICT Applications and Cybersecurity Division ITU National Cybersecurity/CIIP Self-Assessment Toolkit ITU Cybercrime Legislation Resources ITU Botnet Project Website Regional Cybersecurity Forums and Conferences ITU Child Online Protection (COP) 30

31 Thank You! For more information on ITU s Cybersecurity Activities visit the website at: or contact or For more information on ITU s Cybersecurity Activities visit the website at: or contact International Telecommunication Union

Overview of ITU Cybersecurity Activities

Overview of ITU Cybersecurity Activities Overview of ITU Cybersecurity Activities Workshop on NGN Regulation & Migration Strategies 13 & 15 October 2010 New Delhi, India Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific

More information

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka Overview of ITU Cybersecurity Activities NGN Migration Strategies and Access Modernization 26 May 2011 Dhaka Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific 1 Agenda Why Cybersecurity?

More information

International Training Program 2011 ITU Global Cybersecurity Agenda

International Training Program 2011 ITU Global Cybersecurity Agenda International Training Program 2011 ITU Global Cybersecurity Agenda Sameer Sharma Key Cybersecurity Challenges Lack of adequate and interoperable national or regional legal frameworks Lack of secure software

More information

ALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union

ALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union ALL ALL Cybersec rsecurity for ITU s Work for a Safer World International Telecommunication Union ITU as a Forum for International Cooperation in Cybersecurity ITU Secretary-General has identified Cybersecurity

More information

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY

More information

ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009

ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009 ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009 ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector December

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

Cyber Security @ ITU. By Tomas Lamanauskas, ITU

Cyber Security @ ITU. By Tomas Lamanauskas, ITU Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and

More information

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria

More information

ITU Global Cybersecurity Agenda (GCA)

ITU Global Cybersecurity Agenda (GCA) International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,

More information

The Geneva Protocol on Cybersecurity and Cybercrime

The Geneva Protocol on Cybersecurity and Cybercrime The Geneva Protocol on Cybersecurity and Cybercrime Proposal for a Memorandum of Understanding (MoU) by Stein Schjolberg 1 Chief Judge I. Introduction Cyberspace is one of the great legal frontiers of

More information

Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)

Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI) Regional Seminar on Cyber Preparedness Organised by World Bank Group, Financial Sector Advisory Center (FINSec) ITU s work in Cybersecurity and Global Cybersecurity Index (GCI) Vijay Mauree Programme Coordinator,

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 4/17 Geneva, 11-20 February 2009 Ref. : TD 0244 Rev.2 Source:

More information

Council 2014 Geneva, 6-15 May 2014

Council 2014 Geneva, 6-15 May 2014 Council 2014 Geneva, 6-15 May 2014 Agenda item: PL 1.1 Document 10 February 2014 Original: English Report by the Secretary- General ITU ACTIVITIES ON STRENGTHENING THE ROLE OF ITU IN BUILDING CONFIDENCE

More information

Cybersecurity @ ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int. www.itu150.org

Cybersecurity @ ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int. www.itu150.org Cybersecurity @ ITU Carla Licciardello Policy Analyst Carla.licciardello@itu.int www.itu150.org Where are we coming from Specialized agency of the UN for telecommunications and ICTs Some more info about

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17

ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17 ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17 TSB Briefing to the Regional Offices, 28 Feb 2011 Martin Euchner Advisor of ITU-T Study Group 17 Martin.Euchner@itu.int

More information

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP

More information

RESOLUTION 102 (REV. BUSAN, 2014)

RESOLUTION 102 (REV. BUSAN, 2014) RESOLUTION 102 (REV. BUSAN, 2014) ITU's role with regard to international public policy issues pertaining to the Internet and the management of Internet resources, including domain names and addresses

More information

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015 Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cyber Security Challenges & Capacity Building By Marco Obiso International

More information

Cybersecurity: Taking Stock and Looking Ahead

Cybersecurity: Taking Stock and Looking Ahead Cybersecurity: Taking Stock and Looking Ahead 30 April 2014 Tomas Lamanauskas Head, Corporate Strategy Division International Telecommunication Union 1 Context 2 Different Perspectives of Cybersecurity

More information

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a

More information

ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia

ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia Common Market for Eastern and Southern Africa ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia Document RFL/2008/01-E Rev.1 29 August 2008 Original: English Meeting Report : ITU Regional Cybersecurity

More information

A Global Protocol on Cybersecurity and Cybercrime

A Global Protocol on Cybersecurity and Cybercrime Stein Schjølberg and Solange Ghernaouti-Hélie A Global Protocol on Cybersecurity and Cybercrime An initiative for peace and security in cyberspace Cybercrimedata Stein Schjolberg and Solange Ghernaouti-Hélie

More information

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,

More information

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by INTEL DISCLAIMER: The views presented

More information

Global Cybersecurity Agenda (GCA) A framework for international cooperation

Global Cybersecurity Agenda (GCA) A framework for international cooperation Open-ended Intergovernmental Expert Group on Cybercrime Vienna, 17-21 January 2011 Global Cybersecurity Agenda (GCA) A framework for international cooperation Alexander NTOKO Head, Corporate Strategy Division

More information

REPORT OF THE CHAIRMAN OF HLEG. To ITU Secretary-General, Dr. Hamadoun I. Touré. Chief Judge Stein Schjølberg,

REPORT OF THE CHAIRMAN OF HLEG. To ITU Secretary-General, Dr. Hamadoun I. Touré. Chief Judge Stein Schjølberg, ITU Global Cybersecurity Agenda (GCA) High-Level Experts Group (HLEG) REPORT OF THE CHAIRMAN OF HLEG To ITU Secretary-General, Dr. Hamadoun I. Touré by Chief Judge Stein Schjølberg, Judge at the Moss Tingrett

More information

CYBERSECURITY INDEX OF INDICES

CYBERSECURITY INDEX OF INDICES Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov

More information

EU Cybersecurity Policy & Legislation ENISA s Contribution

EU Cybersecurity Policy & Legislation ENISA s Contribution EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

Cybersecurity Initiatives

Cybersecurity Initiatives Port Vila, 20 November 2014 The Government of The Republic of Vanuatu Cybersecurity Initiatives Telecommunications & Radiocommunications Regulator By Louise Nasak, Technical and Internet Governance Manager,

More information

SRO-EA s Cyber security Initiatives in Eastern Africa

SRO-EA s Cyber security Initiatives in Eastern Africa UNECA Sub Regional Office For Esatern Africa SRO-EA 2010 EAIGF 11-13 August 2010, Kampala, Uganda SRO-EA s Cyber security Initiatives in Eastern Africa Mr Mactar SECK United Nations ECA SRO- EA Key Categories

More information

INTERNET GOVERNANCE: STRENGTHS AND WEAKNESSES FROM A BUSINESS PERSPECTIVE

INTERNET GOVERNANCE: STRENGTHS AND WEAKNESSES FROM A BUSINESS PERSPECTIVE INTERNET GOVERNANCE: STRENGTHS AND WEAKNESSES FROM A BUSINESS PERSPECTIVE Ayesha Hassan This chapter provides an overview of the strengths and weaknesses of the current Internet governance landscape from

More information

Cybersecurity in the Commonwealth: Setting the Stage

Cybersecurity in the Commonwealth: Setting the Stage Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if

More information

Combating Spam: Policy, Technical and Industry Approaches

Combating Spam: Policy, Technical and Industry Approaches Combating Spam: Policy, Technical and Industry Approaches INTRODUCTION Spam continues to be a significant problem for Internet users and operators, even as email filtering and blocking efforts by network

More information

ITU Initiatives on Child Online Protection (COP)

ITU Initiatives on Child Online Protection (COP) ITU Initiatives on Child Online Protection (COP) Odessa, Ukraine, 15-17 June 2016 Sameer Sharma Senior Advisor, ITU Regional Office, Bangkok Online Threats to Children Pornography Cybergrooming Child abuse

More information

INCO for Cyber Security. PTCIF: 21st Feb 2014

INCO for Cyber Security. PTCIF: 21st Feb 2014 INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.

More information

Working Party on Information Security and Privacy

Working Party on Information Security and Privacy Unclassified DSTI/ICCP/REG(2003)5/REV1 DSTI/ICCP/REG(2003)5/REV1 Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 02-Jul-2003

More information

ITU NATIONAL CYBERSECURITY STRATEGY GUIDE

ITU NATIONAL CYBERSECURITY STRATEGY GUIDE ITU NATIONAL CYBERSECURITY STRATEGY GUIDE September 2011 THE ITU NATIONAL CYBERSECURITY STRATEGY GUIDE Dr. Frederick Wamala (Ph.D.), CISSP I. EXECUTIVE SUMMARY 4 1 EXECUTIVE SUMMARY 1.1 OVERVIEW We use

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director

Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director 2 Thanks To the ITU for sponsoring the initiative ictqatar has worked closely with the ITU-D since the project s inception,

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

INTERNATIONAL TELECOMMUNICATION UNION. WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Dubai, 20-29 November 2012

INTERNATIONAL TELECOMMUNICATION UNION. WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Dubai, 20-29 November 2012 INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Dubai, 20-29 November 2012 Resolution 76 Studies related to

More information

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that: 3 rd EAIGF (2010 EAIGF) rd EAIGF 11 TH 13 TH AUGUST 2010, KAMPALA, UGANDA SECURITY MANAGEMENT IN EAST AFRICA: The East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues. Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating

More information

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.

More information

Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS

Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS UbuntuNet Connect 2015 F.F. Tusubira & A. Ndiwalana Knowledge Consulting Ltd Outline Background Current reality

More information

DATE: 1 APRIL 2014. Introduction

DATE: 1 APRIL 2014. Introduction INTERNET SOCIETY SUBMISSION TO THE OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS IN RESPONSE TO THE CONSULTATION ON THE RIGHT TO PRIVACY IN THE CONTEXT OF THE UN GENERAL ASSEMBLY RESOLUTION 68/167 DATE:

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

Superseded by a more recent version INTERNATIONAL TELECOMMUNICATION UNION DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS

Superseded by a more recent version INTERNATIONAL TELECOMMUNICATION UNION DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS INTERNATIONAL TELECOMMUNICATION UNION ITU-T Amendment 1 TELECOMMUNICATION X.701 STANDARDIZATION SECTOR OF ITU (04/95) DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI MANAGEMENT INFORMATION TECHNOLOGY

More information

Kenya country experience: A Safer Cyber Space for Children

Kenya country experience: A Safer Cyber Space for Children Kenya country experience: A Safer Cyber Space for Children Africa Child Online Protection (ACOP) Summit 15th-16th December, 2014, Kampala, Uganda Mercy Wanjau Patricia Muchiri. Vincent Ngundi. Geoffrey

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Brazil CONTRIBUTION TO THE SIXTH MEETING OF CWG-INTERNET

Brazil CONTRIBUTION TO THE SIXTH MEETING OF CWG-INTERNET COUNCIL WORKING GROUP ON INTERNATIONAL INTERNET-RELATED PUBLIC POLICY ISSUES (RES. 1336) 6 th meeting, Geneva, 2-3 February 2015 INTERNATIONAL TELECOMMUNICATION UNION Document CWG-Internet 6/4-E 15 September

More information

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National

More information

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA Public-Private Partnerships against cybercrime Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA The need for Public Private Partnerships to fight cybercrime Evidence needed by police to

More information

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical

More information

UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction

UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE 16 April 2014 (Highlighted in yellow below) Introduction 1. The Global Multistakeholder Meeting on the Future of Internet

More information

Harmful Interference into Satellite Telecommunications by Cyber Attack

Harmful Interference into Satellite Telecommunications by Cyber Attack Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,

More information

AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION)

AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION) AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION) AG/RES. 2004 (XXXIV-O/04) ADOPTION OF A COMPREHENSIVE INTER-AMERICAN STRATEGY TO COMBAT THREATS TO CYBERSECURITY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY

More information

BSA GLOBAL CYBERSECURITY FRAMEWORK

BSA GLOBAL CYBERSECURITY FRAMEWORK 2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access

More information

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and

More information

COMMISSION OF THE EUROPEAN COMMUNITIES

COMMISSION OF THE EUROPEAN COMMUNITIES EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, [ ] COM(2006) 251 COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE

More information

European priorities in information security

European priorities in information security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

ITU WORK ON INTERNET OF THINGS

ITU WORK ON INTERNET OF THINGS ITU WORK ON INTERNET OF THINGS Presentation at ICTP workshop 26 March 2015 Cosmas Zavazava Chief, Projects and Knowledge Management Department International Telecommunication Union ITU HEADQUARTERS, GENEVA

More information

Maintaining Herd Communication - Standards Used In IT And Cyber Security. Laura Kuiper

Maintaining Herd Communication - Standards Used In IT And Cyber Security. Laura Kuiper Maintaining Herd Communication - Standards Used In IT And Cyber Security Laura Kuiper So what is Cyber Security? According to ITU-T X.1205 Cybersecurity is the collection of tools, policies, security concepts,

More information

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...

More information

IGF Policy Options for Connecting the Next Billion

IGF Policy Options for Connecting the Next Billion Introduction IGF Policy Options for Connecting the Next Billion - A Synthesis - More than three billion people will be connected to the Internet by the end of 2015. This is by all standards a great achievement,

More information

Annex 2 to Resolution 71 Working Document of PROPOSED DRAFT STRATEGIC PLAN FOR THE UNION FOR 2016-2019

Annex 2 to Resolution 71 Working Document of PROPOSED DRAFT STRATEGIC PLAN FOR THE UNION FOR 2016-2019 INTERNATIONAL TELECOMMUNICATION UNION COUNCIL WORKING GROUP FOR THE ELABORATION OF THE DRAFT STRATEGIC PLAN AND THE DRAFT FINANCIAL PLAN 2016-2019 4th meeting, Geneva May 2014 Document: CWG SP-FP/4/5 Date:

More information

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Internet Safety and Security: Strategies for Building an Internet Safety Wall Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet

More information

Calling for an open and international dialogue

Calling for an open and international dialogue Calling for an open and international dialogue The Internet Society s statement on the text for the proposed Anti- Counterfeiting Trade Agreement (ACTA) Introduction The Internet Society would like to

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

Policies and Practices on Network Security of MIIT

Policies and Practices on Network Security of MIIT 2011/TEL43/SPSG/WKSP/004 Policies and Practices on Network Security of MIIT Submitted by: China Workshop on Cybersecurity Policy Development in the APEC Region Hangzhou, China 27 March 2011 Policies and

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes

United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes Zero Draft Preamble 1. Recalling the request in paragraph 111 of the Tunis Agenda for the Information Society to

More information

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,

More information

TUNIS COMMITMENT. Document WSIS-05/TUNIS/DOC/7 -E 18 November 2005 Original: English

TUNIS COMMITMENT. Document WSIS-05/TUNIS/DOC/7 -E 18 November 2005 Original: English Document WSIS-05/TUNIS/DOC/7 -E 18 November 2005 Original: English TUNIS COMMITMENT 1. We, the representatives of the peoples of the world, have gathered in Tunis from 16-18 November 2005 for this second

More information

iwr vw bs ww G-1 AwZwi³ msl v KZ cÿ KZ K cökvwkz g½jevi, gvp 11, 2014

iwr vw bs ww G-1 AwZwi³ msl v KZ cÿ KZ K cökvwkz g½jevi, gvp 11, 2014 iwr vw bs ww G-1 evsjv `k M RU AwZwi³ msl v KZ cÿ KZ K cökvwkz g½jevi, gvp 11, 2014 MYcÖRvZš x evsjv `k mikvi WvK, Uwj hvmv hvm I Z_ cöhyw³ gš Yvjq Z_ I hvmv hvm cöhyw³ wefvm (AvBwmwU-1 kvlv) cöávcb ZvwiL,

More information

ITU -D. on Current and Future Needs and Priorities in a Converged, Competitive Telecommunication/ ICT Environment

ITU -D. on Current and Future Needs and Priorities in a Converged, Competitive Telecommunication/ ICT Environment International Telecommunication Union HRD/HRM Survey on Current and Future Needs and Priorities in a Converged, Competitive Telecommunication/ ICT Environment ITU -D Executive summary and recommendations

More information

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

Breakout Session B: Cyber Security and Cybercrime Trends in Africa Breakout Session B: Cyber Security and Cybercrime Trends in Africa Global Forum for Cyber Expertise Awareness Initiative The African Union, Symantec, and the U.S. Department of State committed to develop

More information

National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide

National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide Taieb DEBBAGH, PhD, CISA Secretary General Ministry of Industry, Trade and New Technologies, Morocco ITU Regional

More information

~~~1t.. ~. THE PRESIDENT OF THE GENERAL AS SEMBLY. 12 August 2015. Excellency,

~~~1t.. ~. THE PRESIDENT OF THE GENERAL AS SEMBLY. 12 August 2015. Excellency, THE PRESIDENT OF THE GENERAL AS SEMBLY 12 August 2015 Excellency, I have the pleasure to transmit herewith a SmrunillY of the key messages and proposals fi'om the Informal Intemctive Stakeholders Consultation

More information

Guiding principles for security in a networked society

Guiding principles for security in a networked society ericsson White paper Uen 307 23-3230 February 2014 Guiding principles for security in a networked society The technological evolution that makes the Networked Society possible brings positive change in

More information

IoT Prospects of Worldwide Development and Current Global Circumstances

IoT Prospects of Worldwide Development and Current Global Circumstances IoT Prospects of Worldwide Development and Current Global Circumstances Dr. Bilel Jamoussi Chief Study Groups Department Telecommunication Standardization Bureau, ITU www.itu.int/itu-t/go/iot 1 IoT in

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

Working together to enhance chemical safety and security. Ukraine Chemical Security Forum

Working together to enhance chemical safety and security. Ukraine Chemical Security Forum Working together to enhance chemical safety and security Ukraine Chemical Security Forum A special event of the Global Chemical Safety and Security Summit and Fair (www.chemss2016.org) Executive summary

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

Draft WGIG Issues Paper on E-Commerce

Draft WGIG Issues Paper on E-Commerce Draft WGIG Issues Paper on E-Commerce This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members, but it does not

More information

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Cloud Security Standards Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Introduction Sign Off December 2012 Information Technology Authority

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information