Statement by. Didier Burkhalter Head of the Swiss Federal Department of Foreign Affairs. Global Conference on CyberSpace 2015.

Size: px
Start display at page:

Download "Statement by. Didier Burkhalter Head of the Swiss Federal Department of Foreign Affairs. Global Conference on CyberSpace 2015."

Transcription

1 Federal Department of Foreign Affairs FDFA Statement by Didier Burkhalter Head of the Swiss Federal Department of Foreign Affairs Global Conference on CyberSpace 2015 Opening Session Promoting trust and globally shared rules to ensure an open, free and secure cyberspace The Hague, April 2015 Please check against delivery

2 Minister Koenders, Excellencies, Ladies and Gentlemen, Let me first of all thank the Kingdom of the Netherlands for hosting this important conference. Switzerland is strongly committed to an open, free and secure cyberspace. The internet has created myriad opportunities for our economies and societies. It has empowered billions of individuals around the world. It has become a key driver for human rights as it gives people a voice, and unprecedented access to information. We all should enhance our efforts to further bridge the digital divide and enable ever more people to benefit from the opportunities of cyberspace. Switzerland supports a series of capacity-building initiatives in the cyber domain. We commend the Netherlands for launching the Global Forum on Cyber Expertise, which we will join as a founding partner. Let me also draw your attention to the Geneva Internet Platform that we launched last year to make the broad cyber expertise in Geneva one of the world capitals of digital policy more globally available and strengthen the participation of small and developing countries in the digital policy debates. 2/6

3 The internet s open and free nature has been at the heart of its success story. But it evidently also brings about challenges. Our job is to maximise the opportunities and define adequate responses to the challenges. One such challenge is to preserve the right to privacy in cyberspace. It is essential that the same rights that people have offline are also guaranteed online. Another major challenge are the security threats that occur as cyberspace is increasingly being exploited by actors pursuing criminal, espionage or military objectives. Maintaining the openness and freedom of cyberspace while protecting it against cyber threats is a strategic objective of Switzerland. This is why, in 2012, Switzerland adopted the National strategy for the protection of Switzerland against cyber risks. Its underlying theme is cooperation cooperation within the government, between the public and private sectors, and, not least, at the international level. There will be no secure cyberspace without effective international cooperation. For such international cooperation in the cyber domain to take hold, two things are required above all: a framework of rules; and trust. Switzerland is committed to advancing both. 3/6

4 Regarding the need to establish the rules of the road in cyberspace, Switzerland holds the view that any such framework must be based on the existing international legal order. We welcome the consensus reached in the UN Group of Governmental Experts (UNGGE) in 2013 that international law applies in cyberspace. This affirmation is a strong expression of the rule of law. Moving forward, we should now clarify how exactly the existing rules of international law are to be applied to cyberspace, given its particular characteristics. Switzerland contributes to this discussion, for example by supporting the United Nations Institute for Disarmament Research project on international law and cyberspace. We should also discuss how we can build on the consensus reached within the UNGGE while at the same time allowing for a broader participation of states representing all regions of the world. We consider such an inclusive process key to reaching a sustainable and globally-shared understanding on the applicable legal framework for cyberspace. 4/6

5 As for the need to increase the trust level between states in the cyber domain, Switzerland is engaged in efforts to apply the tool of Confidence Building Measures (CBMs) to cyberspace. Since the anonymous nature of cyberspace leaves much room for ambiguity, we are convinced that building confidence through transparency and cooperation is vital to reduce the danger of miscalculation, misperception and misunderstanding. Confidence Building Measures were invented by the OSCE in the context of the East-West conflict four decades ago. It is therefore no coincidence that the OSCE was the first regional security organisation to formally adopt CBMs in the realm of cybersecurity, too. During the Swiss Chairmanship of the OSCE last year, we organised an event on cyber CBMs. For the first time, the private sector and other non-state stakeholders were systematically included in confidence-building activities between states. Because cybersecurity depends upon trust and cooperation between all relevant actors, this multi-stakeholder collaboration needs to be developed further. The workshop also pointed to the need to go beyond regional boundaries, as cyberspace is global in nature. To this end, Switzerland convened a high-level workshop as part of the official preparatory process leading to this conference today. This workshop enabled cross-fertilisation between different regional confidence-building processes and thereby enhanced global understanding and coherence. 5/6

6 Ladies and gentlemen Switzerland will continue to promote cyber CBMs, both within the OSCE context and beyond. As a next step, we seek to deepen the exchange with the Asian Partners for Co-operation at the OSCE. At the OSCE Asian Conference, which will be coorganized by the Republic of Korea and Switzerland and will take place in Seoul this June, we will make the case for regular dialogue between the OSCE and Asian countries and organisations on cyber security issues. Just as in the pioneering days of the OSCE, we are again called today to jointly shape the new security space of cyber through common principles and cooperation. Just as four decades ago, this is a complex task that requires vision, stamina, and, above all, commitment commitment to security that is cooperative and for the benefit of all. 6/6

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

Examining Options to Enhance Common Understanding to Strengthen End Use/r Controls. A Menu of Options

Examining Options to Enhance Common Understanding to Strengthen End Use/r Controls. A Menu of Options Examining Options to Enhance Common Understanding to Strengthen End Use/r Controls A Menu of Options What this project seeks to achieve The harmonization of end use/r control systems to prevent arms diversion

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

Second Meeting of States on Strengthening Compliance with International Humanitarian Law, Geneva, 17-18 June 2013. Chairs' Conclusions

Second Meeting of States on Strengthening Compliance with International Humanitarian Law, Geneva, 17-18 June 2013. Chairs' Conclusions Second Meeting of States on Strengthening Compliance with International Humanitarian Law, Geneva, 17-18 June 2013 Context Chairs' Conclusions In its Resolution 1, the 31 st International Conference of

More information

FOSTERING DIALOGUE AND MUTUAL UNDERSTANDING

FOSTERING DIALOGUE AND MUTUAL UNDERSTANDING FOSTERING DIALOGUE AND MUTUAL UNDERSTANDING The crucial role of young women and men in advancing intercultural dialogue and understanding is increasingly recognized within the global development agenda.

More information

Trading Forum 2013 Geneva, 12 th March 2013 Financial market regulation and commodity markets

Trading Forum 2013 Geneva, 12 th March 2013 Financial market regulation and commodity markets Federal Department of Finance FDF State Secretariat for International Financial Matters SIF Multilateral Affairs Trading Forum 2013 Geneva, 12 th March 2013 Financial market regulation and commodity markets

More information

Ministerial Declaration of The Hague on Water Security in the 21st Century

Ministerial Declaration of The Hague on Water Security in the 21st Century Ministerial Declaration of The Hague on Water Security in the 21st Century 1. Water is vital for the life and health of people and ecosystems and a basic requirement for the development of countries, but

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique Second Cyber Security Summit, November 11, 2013 in Bonn Final communique On November 11, the Cyber Security Summit was held for the second time in Bonn at the invitation of the Munich Security Conference

More information

Before the. Committee on Energy and Commerce Subcommittee on Communications and Technology United States House of Representatives

Before the. Committee on Energy and Commerce Subcommittee on Communications and Technology United States House of Representatives Testimony of Fiona M. Alexander Associate Administrator, Office of International Affairs National Telecommunications and Information Administration United States Department of Commerce Before the Committee

More information

Organization for Security and Co-operation in Europe

Organization for Security and Co-operation in Europe Organization for Security and Co-operation in Europe The Review of the United Nations Global Counter-Terrorism Strategy 12-13 June 2014, New York Remarks by Mr. Thomas Wuchte, Head on Anti-terrorism Issues

More information

Baku, Azerbaijan, 14 May 2008

Baku, Azerbaijan, 14 May 2008 Address by Mr Koïchiro Matsuura, Director-General of UNESCO, on the occasion of UNESCO Regional Conference in Support of Global Literacy, Addressing Literacy Challenges in Europe with a sub-regional focus:

More information

Informal Council for Competitiveness 4th May 2009, Prague, Czech Republic.

Informal Council for Competitiveness 4th May 2009, Prague, Czech Republic. Informal Council for Competitiveness 4th May 2009, Prague, Czech Republic. Block I. Discussion on Connected and Functioning Knowledge Triangle a condition for the achievement of Vision 2020 Speech - Professor

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES. - Issue Paper -

THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES. - Issue Paper - THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES - Issue Paper - UNESCO, Bureau of Strategic Planning September 2003 1 I. The past and present scope of innovation During the last two decades,

More information

Address by Irina Bokova, Director-General of UNESCO on the occasion of the Learning and Technology Conference Effat University

Address by Irina Bokova, Director-General of UNESCO on the occasion of the Learning and Technology Conference Effat University Address by Irina Bokova, Director-General of UNESCO on the occasion of the Learning and Technology Conference Effat University Jeddah, 12 December 2011 Her Royal Highness Princess Lolowah Al Faisal, Dear

More information

How Effective are International Approaches for Global Cyber Security?

How Effective are International Approaches for Global Cyber Security? International Pugwash Workshop: Cyberwar & Cyberpeace How Effective are International Approaches for Global Cyber Security? Berlin, 23 October 2015 1 Numerous states are pursuing military cyber-capabilities.

More information

Cybersecurity: Taking Stock and Looking Ahead

Cybersecurity: Taking Stock and Looking Ahead Cybersecurity: Taking Stock and Looking Ahead 30 April 2014 Tomas Lamanauskas Head, Corporate Strategy Division International Telecommunication Union 1 Context 2 Different Perspectives of Cybersecurity

More information

Internet Technical Advisory Committee to the OECD - Charter -

Internet Technical Advisory Committee to the OECD - Charter - Internet Technical Advisory Committee to the OECD - Charter - I. Terms of reference The positive input of the technical community in the ICCP s work and the Ministerial was acknowledged by OECD ministers

More information

African Internet Governance Forum (AfIGF) Girma Dessalegn - AfIGF Secretariat

African Internet Governance Forum (AfIGF) Girma Dessalegn - AfIGF Secretariat African Internet Governance Forum (AfIGF) Girma Dessalegn - AfIGF Secretariat Outline About IGF IGF in Africa Launching of AfIGF AfIGF Secretariat AfIGF Bureau AfIGF Activities Upcoming AfIGF events About

More information

"The European Union's Security Architecture and its role to strengthen Peace and Security"

The European Union's Security Architecture and its role to strengthen Peace and Security Chairman EU Military Committee General Patrick de Rousiers at the 29 th Asia Pacific Round Table in Kuala Lumpur 02 June 2015 "The European Union's Security Architecture and its role to strengthen Peace

More information

UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction

UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE 16 April 2014 (Highlighted in yellow below) Introduction 1. The Global Multistakeholder Meeting on the Future of Internet

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

UN Human Rights Council UNITED KINGDOM 2014-2016 candidate

UN Human Rights Council UNITED KINGDOM 2014-2016 candidate UN Human Rights Council UNITED KINGDOM 2014-2016 candidate The UK is a passionate, committed and effective defender of human rights. We are seeking election to the UN Human Rights Council for the term

More information

Five Principles for Shaping Cybersecurity Norms

Five Principles for Shaping Cybersecurity Norms TRANSPARENCY PROPORTIONALITY HARMONIZATION RISK REDUCTION COLLABORATION Five Principles for Shaping Cybersecurity Norms Contents Introduction 3 Cybersecurity Norms 5 The Role of the Public Sector 6 Cybersecurity

More information

Mr Ren Xian Liang, Vice-Minister of Cyberspace Administration of China (CAC),

Mr Ren Xian Liang, Vice-Minister of Cyberspace Administration of China (CAC), Welcome remarks by Mr Chua Taik Him Acting Chief Executive Officer International Enterprise (IE) Singapore At the China-Singapore Digital Economy Forum (Tuesday), 0930Hrs Pan Pacific Hotel Mr S Iswaran,

More information

Thank you for your very kind introduction.

Thank you for your very kind introduction. AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Statement by Mr. Movses Abelian Director of the Security Council Affairs Division Department of Political Affairs

Statement by Mr. Movses Abelian Director of the Security Council Affairs Division Department of Political Affairs Statement by Mr. Movses Abelian Director of the Security Council Affairs Division Department of Political Affairs Closing Event of the High Level Review of UN Sanctions 31 October 2014 Excellencies, Ladies

More information

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues. Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

OECD Council Recommendation on Principles for Internet Policy Making. 13 December 2011

OECD Council Recommendation on Principles for Internet Policy Making. 13 December 2011 OECD Council Recommendation on Principles for Internet Policy Making 13 December 2011 ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where governments work together to

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

Identify appropriate resources for long term, effective communication

Identify appropriate resources for long term, effective communication GSM Communications Strategy Interim (3 month) CDO Report June 2014 Drawing up a communications strategy to enable our community development work is an art, not a science and there are lots of different

More information

Forum on Communication for Development & Community Media for Family Farming

Forum on Communication for Development & Community Media for Family Farming FOOD AND AGRICULTURE ORGANIZATION OF THE UNITED NATIONS (FAO) Office of Partnerships, Advocacy and Capacity Development (OPC) Forum on Communication for Development & Today, with more than 500 million

More information

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November

More information

48th Session of the International Conference of Education (ICE)

48th Session of the International Conference of Education (ICE) 48th Session of the International Conference of Education (ICE) Inclusive Education : The Way of the Future 25-28 November 2008 Geneva, Switzerland, UNESCO- IBE Organised by: With the participation of

More information

National Cyber Security Strategies: United States

National Cyber Security Strategies: United States National Cyber Security Strategies: United States Audrey L. Plonk Director, Cybersecurity and Internet Governance Intel Corporation 1 ICSS 2013 Trends: National Cybersecurity Strategies New strategies

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

Okinawa Charter on Global Information Society

Okinawa Charter on Global Information Society Okinawa Charter on Global Information Society 1. Information and Communications Technology (IT) is one of the most potent forces in shaping the twenty-first century. Its revolutionary impact affects the

More information

National Cyber Security Strategies

National Cyber Security Strategies May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is

More information

Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks

Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks Please cite this paper as: OECD (2012), Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks, OECD Digital Economy Papers, No. 210, OECD Publishing.

More information

advisory council INVESTMENT LEADERS SUPPORTING REGIONAL ECONOMIC INTEGRATION IN AFRICA An initiative supported by:

advisory council INVESTMENT LEADERS SUPPORTING REGIONAL ECONOMIC INTEGRATION IN AFRICA An initiative supported by: advisory council INVESTMENT LEADERS SUPPORTING REGIONAL ECONOMIC INTEGRATION IN AFRICA An initiative supported by: Executive Summary: Investment Leader s Supporting Regional Economic Integration in Africa

More information

I. CONTEXT II. POLITICAL PRIORITIES IDENTIFIED

I. CONTEXT II. POLITICAL PRIORITIES IDENTIFIED SHAPING THE FUTURE OF EQUALITY POLICIES IN THE EU JOINT HIGH LEVEL EVENT ON NON-DISCRIMINATION AND EQUALITY, ROME, 6-7 NOVEMBER 2014 SUMMARY AND MAIN CONCLUSIONS I. CONTEXT The Italian Presidency of the

More information

2011 UNDP Global Management Meeting 27 June 2011. Speech delivered at the Opening Plenary by

2011 UNDP Global Management Meeting 27 June 2011. Speech delivered at the Opening Plenary by 2011 UNDP Global Management Meeting 27 June 2011 Speech delivered at the Opening Plenary by H.E. Izabella Teixeira, Minister of the Environment of Brazil Your Excellency Mr Ban Ki-moon, the United Nations

More information

How To Understand And Understand The European Priorities In Information Security

How To Understand And Understand The European Priorities In Information Security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

OUR STRATEGIC PLANNING JOURNEY

OUR STRATEGIC PLANNING JOURNEY OUR STRATEGIC PLANNING JOURNEY The Department of Medicine Strategic Plan Our roadmap for the future It will shape and guide what the Department of Medicine does, why we do it, and our priorities, with

More information

Corporate Citizenship in The World Economy. Global. united nations. Compact

Corporate Citizenship in The World Economy. Global. united nations. Compact Corporate Citizenship in The World Economy united nations Global Compact What Is the UN Global Compact? Never before in history has there been a greater alignment between the objectives of the international

More information

The New Delhi Commitment: Delivering Inclusive, Relevant Quality Education for All. New Delhi, India 8th 10th November 2012

The New Delhi Commitment: Delivering Inclusive, Relevant Quality Education for All. New Delhi, India 8th 10th November 2012 ED/EFA/2012/ME/1 Original : English The New Delhi Commitment: Delivering Inclusive, Relevant Quality Education for All New Delhi, India 8th 10th November 2012 Ninth E-9 Ministerial Review Meeting: Inclusive,

More information

Ninth session. Intergovernmental Council for the Information for All Programme

Ninth session. Intergovernmental Council for the Information for All Programme IFAP-2016/COUNCIL.IX/Inf 7 Paris, 4 April 2016 Original : English Distribution limited Ninth session Intergovernmental Council for the Information for All Programme 30-31 May 2016 UNESCO House, Paris (Fontenoy

More information

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Two recent studies National Academies Study: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack

More information

Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)

Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) Final Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) Opening Speech to the Second International Forum Partnership Among State, Business

More information

Energy Security: Role of Regional Cooperation

Energy Security: Role of Regional Cooperation Energy Security: Role of Regional Cooperation Traian Chebeleu Today s Conference is dedicated to a topic that has deeply preoccupied the governments and the business communities in the Emerging Europe,

More information

Regional Agenda. World Economic Forum Strategic Dialogue on the Future of the South Caucasus and Central Asia Meeting Overview

Regional Agenda. World Economic Forum Strategic Dialogue on the Future of the South Caucasus and Central Asia Meeting Overview Regional Agenda World Economic Forum Strategic Dialogue on the Future of the South Meeting Overview Baku, Azerbaijan 7-8 April 2013 The South region has witnessed significant economic growth and development

More information

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by INTEL DISCLAIMER: The views presented

More information

RUSSIA CHINA NEXUS IN CYBER SPACE

RUSSIA CHINA NEXUS IN CYBER SPACE RUSSIA CHINA NEXUS IN CYBER SPACE E. Dilipraj Associate Fellow, CAPS On May 08, 2015 Russia and China inked an important agreement in the field of cyber security. This bilateral agreement is the latest

More information

ETI PERSPECTIVE 2020: A FIVE YEAR STRATEGY

ETI PERSPECTIVE 2020: A FIVE YEAR STRATEGY ETI PERSPECTIVE 2020: A FIVE YEAR STRATEGY Introduction This document is the final and Board approved version of ETI s strategic directions based on the ETI Board meeting discussion of 12 th March 2015.

More information

Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy

Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy We thank the administration for this valuable opportunity to engage in a national

More information

United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes

United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes Zero Draft Preamble 1. Recalling the request in paragraph 111 of the Tunis Agenda for the Information Society to

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Environmental governance

Environmental governance Environmental governance United Nations Environment Programme An overview Governing our planet s rich and diverse natural resources is an increasingly complex challenge. In our globalised world of interconnected

More information

The OSCE Efforts in the Field of Cyber Security and Protecting Critical Energy Infrastructure from Terrorist Attacks

The OSCE Efforts in the Field of Cyber Security and Protecting Critical Energy Infrastructure from Terrorist Attacks Critical National Infrastructure Conference London, 21-22 April 2015 The OSCE Efforts in the Field of Cyber Security and Protecting Critical Energy Infrastructure from Terrorist Attacks Address by Mr.

More information

ACCESSIBLE INFORMATION PROVISION FOR LIFELONG LEARNING KEY POLICY MESSAGES

ACCESSIBLE INFORMATION PROVISION FOR LIFELONG LEARNING KEY POLICY MESSAGES ACCESSIBLE INFORMATION PROVISION FOR LIFELONG LEARNING KEY POLICY MESSAGES Introduction The purpose of this paper is to give an overview of the conclusions and recommendations of the European Agency for

More information

22 ND ANNUAL MEETING OF THE ASIA-PACIFIC PARLIAMENTARY FORUM RESOLUTION APPF22/RES 01

22 ND ANNUAL MEETING OF THE ASIA-PACIFIC PARLIAMENTARY FORUM RESOLUTION APPF22/RES 01 22 ND ANNUAL MEETING OF THE ASIA-PACIFIC PARLIAMENTARY FORUM RESOLUTION APPF22/RES 01 POLITICAL AND SECURITY MATTERS IN ASIA PACIFIC (Sponsored by Australia, Indonesia, the Republic of Korea and the Russian

More information

SUMMARY. This item has been included in the provisional agenda of the 196th session of the Executive Board at the request of Austria and Italy.

SUMMARY. This item has been included in the provisional agenda of the 196th session of the Executive Board at the request of Austria and Italy. Executive Board Hundred and ninety-sixth session 196 EX/32 PARIS, 19 March 2015 Original: English Item 32 of the provisional agenda UNESCO S ROLE AND RESPONSIBILITIES IN IMPLEMENTING GLOBAL CITIZENSHIP

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

Viewpoint: Implementing Japan s New Cyber Security Strategy*

Viewpoint: Implementing Japan s New Cyber Security Strategy* Presented by: The ACCJ s Internet Economy Task Force Valid Through November 2014 The 2013 Cyber Security Strategy, released in June 2013, and the International Strategy on Cybersecurity Cooperation, released

More information

National Cyber Security Strategy 2

National Cyber Security Strategy 2 National Cyber Security Strategy 2 From awareness to capability Ministerie van Volksgezondheid, Welzijn en Sport Titel brochure hier invullen 1 2 National Cyber Security Strategy (NCSS) 2 From awareness

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

Who are the Stakeholders in Internet Governance?

Who are the Stakeholders in Internet Governance? MEAC SIG 2015 Tunis, Tunisia Who are the Stakeholders in Internet Governance? Houda BELKASSEM Morocco Internet governance is now an active topic of international discussion. Interest has been fueled by

More information

Iceland s Role in the Arctic The Future of Arctic Cooperation. Arctic Circle Assembly. 14 October 2013

Iceland s Role in the Arctic The Future of Arctic Cooperation. Arctic Circle Assembly. 14 October 2013 Iceland s Role in the Arctic The Future of Arctic Cooperation Mr. Gunnar Bragi Sveinsson, Minister for Foreign Affairs Arctic Circle Assembly 14 October 2013 Mr. President, Ólafur Ragnar Grímsson, ladies

More information

Cybersecurity in the Commonwealth: Setting the Stage

Cybersecurity in the Commonwealth: Setting the Stage Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if

More information

Halmstad University Heading towards 2020. Vision Research and education strategy

Halmstad University Heading towards 2020. Vision Research and education strategy Halmstad University Heading towards 2020 Vision Research and education strategy Contents Introduction 3 The University s vision 4 Research and Education Strategy 6 1. Universities challenges and tasks

More information

ASEAN COMMUNITY VISION 2025

ASEAN COMMUNITY VISION 2025 ASEAN COMMUNITY VISION 2025 ASEAN Community Vision 2025 ASEAN COMMUNITY VISION 2025 1. We, the Heads of State/Government representing the peoples of the Member States of the Association of Southeast Asian

More information

Memorandum of Understanding on Labour Cooperation

Memorandum of Understanding on Labour Cooperation Memorandum of Understanding on Labour Cooperation The Department of Labour of New Zealand, in the name of New Zealand and the Ministry of Human Resources and Social Security of the People s Republic of

More information

COMMUNICATION STRATEGY FOR THE UNIVERSITY OF GOTHENBURG

COMMUNICATION STRATEGY FOR THE UNIVERSITY OF GOTHENBURG STYRDOKUMENT Dnr F V 2014/71 COMMUNICATION STRATEGY FOR THE UNIVERSITY OF GOTHENBURG Published Decision-maker Responsible body medarbetarportalen.gu.se/styrdokument Vice-Chancellor Kommunikationsenheten

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

PROMOTING ACCESS AND MEDICAL INNOVATION: INTERSECTIONS BETWEEN PUBLIC HEALTH, INTELLECTUAL PROPERTY AND TRADE

PROMOTING ACCESS AND MEDICAL INNOVATION: INTERSECTIONS BETWEEN PUBLIC HEALTH, INTELLECTUAL PROPERTY AND TRADE PROMOTING ACCESS AND MEDICAL INNOVATION: INTERSECTIONS BETWEEN PUBLIC HEALTH, INTELLECTUAL PROPERTY AND TRADE Joint study by the WHO, WIPO and WTO Secretariats Outline and overview The WHO, WIPO and the

More information

Thailand and ASEAN. 1. ASEAN: Forty Five Years of Achievements

Thailand and ASEAN. 1. ASEAN: Forty Five Years of Achievements Thailand and ASEAN 1. ASEAN: Forty Five Years of Achievements Since its inception in 1967, the Association of Southeast Asian Nations (ASEAN) has made a number of achievements towards regional peace, stability,

More information

Second Political Declaration of the Pentalateral Energy Forum of 8 June 2015

Second Political Declaration of the Pentalateral Energy Forum of 8 June 2015 PENTALATERAL ENERGY FORUM Second Political Declaration of the Pentalateral Energy Forum of 8 June 2015 The Ministers of the Pentalateral Energy Forum, consisting of Austria, Belgium, France, Germany, Luxembourg,

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Council of the European Union Brussels, 14 November 2014 (OR. en) Ensuring respect for the rule of law in the European Union

Council of the European Union Brussels, 14 November 2014 (OR. en) Ensuring respect for the rule of law in the European Union Council of the European Union Brussels, 14 November 2014 (OR. en) 15206/14 FREMP 198 JAI 846 COHOM 152 POLG 156 NOTE From: To: Subject: Presidency Council Ensuring respect for the rule of law in the European

More information

How To Write A Letter To The World'S Leaders On The Ovemll Review

How To Write A Letter To The World'S Leaders On The Ovemll Review THE PRESIDENT OF THE GENERAL AS SEMBLY 12 August 2015 Excellency, I have the pleasure to transmit herewith a SmrunillY of the key messages and proposals fi'om the Informal Intemctive Stakeholders Consultation

More information

Corporate Sustainability in The World Economy. Global. united nations. Compact

Corporate Sustainability in The World Economy. Global. united nations. Compact Corporate Sustainability in The World Economy united nations Global Compact What Is the UN Global Compact? Never before has there been a greater alignment between the objectives of the international community

More information

Solving for the Future: Addressing Major Societal Challenges Through Innovative Technology and Cloud Computing

Solving for the Future: Addressing Major Societal Challenges Through Innovative Technology and Cloud Computing Solving for the Future: Addressing Major Societal Challenges Through Innovative Technology and Cloud Computing As economic challenges persist in communities, nations, and regions around the world, the

More information

Fraunhofer-Gesellschaft Declaration to third parties relating to project business

Fraunhofer-Gesellschaft Declaration to third parties relating to project business Fraunhofer-Gesellschaft Declaration to third parties relating to project business Ladies and gentlemen, We are delighted at your interest in working together with the Fraunhofer-Gesellschaft. The values

More information

IFE Strategic Plan 2014 2018

IFE Strategic Plan 2014 2018 IFE Strategic Plan 2014 2018 The Institution of Fire Engineers IFE Strategic Plan 2014 2018 View online at www.ife.org.uk/ife-strategic-plan 1 The Institution of Fire Engineers A charity managed for fire

More information

A Summary of the National NGO Policy July 2012

A Summary of the National NGO Policy July 2012 A 9 Point Guide to Understanding the National NGO Policy and Supporting its Implementation A Summary of the National NGO Policy July 2012 1 The National Non Governmental Organisations POLICY PREFACE AND

More information

Cybersecurity MORE THAN A GOOD HEADLINE. Protect more

Cybersecurity MORE THAN A GOOD HEADLINE. Protect more Cybersecurity MORE THAN A GOOD HEADLINE Protect more Contents 2 Introduction 3 What is Cybersecurity? 4 Thought model 5 Social, Economic, Political, and IT Alignment 8 ICT Infrastructure 10 National Projects

More information

The EU s approach to Cyber Security and Defence

The EU s approach to Cyber Security and Defence Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence Woilfgang.Roehrig@eda.europa.eu +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific

More information

Jyväskylä Cyber Security Ecosystem

Jyväskylä Cyber Security Ecosystem Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto 30.9.2015 High Level Cyber Security Comment 4.2.2014 President Sauli Niinistö highlighted cyber security.

More information

Joint Declaration. On the Establishment of the Regional Co-operation Council (RCC)

Joint Declaration. On the Establishment of the Regional Co-operation Council (RCC) Joint Declaration On the Establishment of the Regional Co-operation Council (RCC) Representatives of the Participating States of the South East European Co-operation Process (SEECP), the United Nations

More information