Global Cybersecurity Agenda (GCA) A framework for international cooperation
|
|
- Kathleen Lester
- 2 years ago
- Views:
Transcription
1 Open-ended Intergovernmental Expert Group on Cybercrime Vienna, January 2011 Global Cybersecurity Agenda (GCA) A framework for international cooperation Alexander NTOKO Head, Corporate Strategy Division 1
2 Growing Cybersecurity Threats ICTs have become an integral part of information society. ICT networks are regarded as basic national infrastructure. ICTs are also exposing our societies to the threat of cyberwar/cyberattacks. Vulnerability of national infrastructures increases as the use of ICTs take root. Cyber attacks on ICTs are borderless and can be launched from virtually anywhere. As global reliance on ICTs grows, so does vulnerability to attacks on critical infrastructures through cyberspace. i.e., Attacks against computer systems in Georgia & Azerbaijan (2008), Brazil (2008), S.Korea and the US (2009), and Google/Twitter(2009) No geographical borders, no boundaries and tremendous destructive power 2
3 National Responses Developing National Computer Incident Response Teams (CIRTs) Enhancing public-private partnerships to enhance expertise, knowledge, skills, resources & experience Enhancing International Cooperation Also, many governments are preparing themselves for Cyber-defense as well as Cyber-offense : Cyberwarfare - Network-based attack and/or defense - Building cyber capabilities as a part of conventional warfare, including cyber military outfits - Cultivating cyber tactics as a national resource - Educating citizens and raising awareness of cybersecurity problems 3
4 Key Cybersecurity Challenges Lack of adequate and interoperable national or regional legal frameworks Lack of secure software and ICT-based applications Lack of appropriate national and global organizational structures to deal with cyber incidents Lack of information security professionals and skills within governments; lack of basic awareness among users Lack of international cooperation between industry experts, law enforcements, regulators, academia & international organizations to address a global challenge 4
5 Global Cybersecurity Cooperation The lack of cybersecurity is a global problem that cannot be solved by any single entity alone! The world is faced with the challenging task of developing harmonized and comprehensive strategies at the global level and implementing these with the various relevant national, regional, and international stakeholders in the countries 5
6 Introduction to ITU Leading UN specialized agency for information and communication technologies (ICTs). Founded in 1865, ITU is the oldest specialized agency in the UN system. Global focal point for governments and the private sector with 191 Member States, 900+ Sector Members and Associates. ITU Headquartered in Geneva, Switzerland; 11 regional/area offices and staff from nearly 100 countries. 6
7 ITU and Cybersecurity In 2003, world leaders at the World Summit on the Information Society (WSIS) entrusted ITU as sole facilitator for WSIS Action Line C5 - Building Confidence and Security in the use of ICTs Since the 2006 ITU Plenipotentiary Conference, ITU Secretary-General has set cybersecurity as one of his top three priorities On 17 May 2007, in response to the decision of the ITU Membership and in fulfillment of ITU s role as sole facilitator for WSIS Action Line C5, ITU Secretary-General launched the Global Cybersecurity Agenda (GCA) a framework for international cooperation in cybersecurity ITU World Conferences and the 2010 ITU Plenipotentiary Conference further strengthened the role of ITU in cyberseucirty and endorsed the GCA as the ITU-wide strategy on international cooperation 7
8 High-Level Expert Group (HLEG) The High-Level Expert Group (HLEG) on Cybersecurity was established in It is comprised of over 100 renowned experts from a broad range of backgrounds, sectors and geographical regions. These experts worked tirelessly to formulate proposals to the ITU Secretary-General on strategies to curb cyberthreats, combat cybercrime and promote cybersecurity. Its outputs include the Report of the Chairman of the HLEG, a set of strategic proposals, and the HLEG Global Strategic Report, which summarizes the HLEG s work in seeking to promote cybersecurity around the world. 8
9 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration with and between all relevant partners, and building on existing initiatives to avoid duplicating efforts. GCA builds upon five pillars: 1. Legal Measures 2. Technical and Procedural Measures 3. Organizational Structures 4. Capacity Building 5. International Cooperation Since its launch, GCA has attracted the support and recognition of leaders and cybersecurity experts around the world. H.E. Blaise Compaoré, President of Burkina Faso, and H.E. Dr Óscar Arias Sánchez, Former President of the Republic of Costa Rica and Nobel Peace Laureate, are both Patrons of the GCA. 9
10 GCA: From Strategy to Action 1. Legal Measures 1. Legal Measures ITU Toolkit for Cybercrime Legislation ITU Publication on Understanding Cybercrime: A Guide for Developing Countries 3. Organizational Structures 3. Organizational Structures National CIRT establishment 4. Capacity Building 4. Capacity Building ITU National Cybersecurity Strategy Guide ITU Botnet Mitigation Toolkit and pilot projects Regional Cybersecurity Seminars Cybersecurity Assessment and Self assessment Global Cybersecurity Agenda (GCA) Technical Technical and and Procedural Procedural Measures Measures ITU Standardization Work ICT Security Standards Roadmap ITU-R Security Activities ITU-T Study Group 17 ITU-T Study Group International International Cooperation Cooperation ITU High-Level Expert Group (HLEG) ITU-IMPACT Collaboration ITU Cybersecurity Gateway ITU s Child Online Protection (COP) Collaboration with UNICEF, UNODC, UNICRI, UNICITRAL and UNDIR 10
11 Collaboration towards A Global Strategy The world s foremost cybersecurity alliance! Within GCA, ITU and the International Multilateral Partnership Against Cyber Threats (IMPACT) are pioneering the deployment of solutions and services to address cyberthreats on a global scale. ITU-IMPACT s endeavor is the first truly global multi-stakeholder and public-private alliance against cyber threats, staging its state-of-the-art facilities in Cyberjaya, Malaysia. An operational home of ITU s Global Cyber Security Agenda (GCA), it supports 191 Member States and others with the expertise, facilities and resources to effectively enhance the global community s capability and capacity to prevent, defend against and respond to cyber threats. 11
12 GCA and ITU-T Activities ITU-T Study Group 17 Lead Study Group for Telecommunication Security Mandate for Question 4/17 (Q.4/17): Cybersecurity Provides ICT Security Standards Roadmap ITU-T Cybersecurity Information Exchange Framework (CYBEX): September 2009 ITU-T Security Manual "Security in telecommunications and information technology (4 th ed.): Scheduled for publication in 2010 Draft summaries of Study Group 17 recommendations Focus Group on Identity Management (IdM) Approved over 100 Recommendations on security for communication Facilitates collaboration among national Computer Incident Response Teams (CIRTs) WTSA Resolutions ITU WTSA Resolution 50: Cybersecurity (Rev. Johannesburg, 2008) ITU WTSA Resolution 52: Countering and combating spam (Rev. Johannesburg, 2008) ITU WTSA Resolution 58: Encourage the creation of national computer incident response teams, particularly for developing countries (Johannesburg, 2008) 12
13 GCA and ITU-D Activities Assisting developing countries in bridging the digital divide by advancing the use of ICT-based networks, services and applications, and promoting cybersecurity ITU National Cybersecurity/CIIP Self-Assessment Tool ITU Botnet Mitigation Toolkit ITU Cybercrime Legislation Resources ITU-D Study Group Q 22/1 : Securing information and communication networks: best practices for developing a culture of cybersecurity ITU Toolkit for Promoting a Culture of Cybersecurity Regional workshops and capacity building activities related to cybercrime legislation and enforcement A Background paper on Cybersecurity: The Role and Responsibilities of an Effective Regulator (Global Symposium for Regulators (GSR), November 2009) WTDC Resolutions ITU Hyderabad Declaration, Paragraph 13 & 14 (2010) 13. [ ] the challenge of building confidence and trust in the availability, reliability, security and use of telecommunications/icts [.] can be addressed by promoting international coordination and cooperation in cybersecurity, taking into account, inter alia, the ITU Global Cybersecurity Agenda (GCA), as well as the development of related public policies and elaboration of legal and regulatory measures, including building capacity, to ensure cybersecurity, including online protection of children and women. 13
14 GCA and ITU-R Activities Establish fundamental security principles for IMT-2000 (3G) networks Issue ITU-R Recommendation on security issues in network management architecture for digital satellite system and performance enhancements of transmission control protocol over satellite networks ITU-R Recommendations Recommendation ITU-R M.1078: Security principles for International Mobile Telecommunications-2000 (IMT-2000) Recommendation ITU-R M.1223: Evaluation of security mechanisms for IMT-2000 Recommendation ITU-R M.1457: Detailed specifications of the radio interfaces of International Mobile Telecommunications-2000 (IMT-2000) Recommendation ITU-R M.1645: Framework and overall objectives of the future development of IMT and systems beyond IMT-2000 Recommendation ITU-R S.1250: Network management architecture for digital satellite systems forming part of SDH transport networks in the fixed-satellite service Recommendation ITU-R S.1711: Performance enhancements of transmission control protocol over satellite networks 14
15 ITU s Child Online Protection Under the GCA umbrella, ITU initiated the Child Online Protection initiative (COP) in November COP has been established as an international collaborative network for promoting the online protection of children and young people worldwide by providing guidance on safe online behavior. Key Objectives of COP Identify risks and vulnerabilities to children in cyberspace Create awareness Develop practical tools to help minimize risk Share knowledge and experience 15
16 Launching COP Global Initiative In 2010 the President of Costa Rica, H.E. Laura Chinchilla, became the new patron of COP. Together with Costa Rica, the ITU Secretary- General launched the COP Global Initiative with high-level deliverables. Through this initiative, ITU is taking the next steps to develop a cybersecurity strategy for child online safety, delivering significant national benefits. 16
17 Collaboration towards A Global Strategy The world s foremost cybersecurity alliance! Within GCA, ITU and the International Multilateral Partnership Against Cyber Threats (IMPACT) are pioneering the deployment of solutions and services to address cyberthreats on a global scale. ITU-IMPACT s endeavor is the first truly global multi-stakeholder and public-private alliance against cyber threats, staging its state-of-the-art facilities in Cyberjaya, Malaysia. An operational home of ITU s Global Cyber Security Agenda (GCA), it supports 191 Member States and others with the expertise, facilities and resources to effectively enhance the global community s capability and capacity to prevent, defend against and respond to cyber threats. 17
18 ITU IMPACT Collaboration What is IMPACT? The International Multilateral Partnership Against Cyber Threats (IMPACT) is the first global public private partnership against cyberthreats. What is the ITU IMPACT Mandate? Under the GCA framework, ITU IMPACT alliance provides an open partnership platform for international cooperation between governments, industry leaders, academia and law enforcement agencies in order to facilitate the establishment of cybersecurity strategies and critical information infrastructure protection, to enhance coordination and cooperation in securing cyberspace. Why ITU IMPACT Collaboration? While it is important to have a national strategy in the government agenda, this is often not enough to secure cyberspace, which cannot be defined by geographic borders. Most developing countries do not have the proper expertise and know-how required for effectively planning and implementing these strategies and structures. 18
19 ITU IMPACT Collaboration Industry Experts Academia International Bodies Think Tank IMPACT s Global Alliances 19
20 ITU-IMPACT Key Partners ITU IMPACT has also developed a global partnership with major industries, academia, and international bodies more universities This partnership allows each country to strengthen its capability to protect the security of national ICT infrastructure. 20
21 ITU-IMPACT International Advisory Board Dr. Hamadoun Touré Secretary General of International Telecommunications Union (ITU) Eugene Kaspersky Founder and CEO of Kaspersky Lab Mikko Hypponen Chief Research Officer of F-Secure Steve Chang Founder and Chairman of Trend Micro Ayman Hariri Chairman of Oger Systems John W. Thompson Chairman of Symantec Corporation Prof. Fred Piper Cryptologist, Founder of the Information Security Group at Royal Holloway, University of London 21
22 ITU IMPACT Activities The ITU is facilitating the implementation process, managing communication and needs assessment with Member States and coordinating with IMPACT, to ensure effective delivery of the services provided. Global Response Centre Global Early Warning System, detecting and monitoring cyber-threats National CIRT Computer Incident Response Teams (CIRTs) and Incident Management capabilities at National level Capacity Building Capacity building and training, on-site, on-line, and training on the job Regional workshops and events, to ensure sustainability and operations of the solutions Direct assistance to countries, to map the deployment with the needs of the Administration 22
23 Global Response Centre Main Objectives: GRC acts as the foremost cyber threat resource centre for the global community. It provides emergency response to facilitate identification of cyber threats and sharing of resources to assist Member States Two Prime Highlights NEWS (Network Early Warning System) Information collaboration platform providing Real time threat monitoring and assessment Statistical cyber threat trend analysis Malware threat centre ESCAPE (Electronically Secure Collaboration Application Platform for Experts) A collaborative platform for authorized cyber experts to pool resources and remotely collaborate with each other in a secure and trusted environment A comprehensive and growing database of key resources around the world 23
24 Current status of collaboration In just over one year, nearly 70 countries, out of a potential 191 countries, have confirmed their agreement to join ITU-IMPACT: 24
25 Establishing National CIRTs Main objectives: To provide Incident Management, Advisories and Mailing List services, integrated with the Global Response Centre Incident Response and Handling Incident Response and Handling Vulnerability Analysis and Handling Vulnerability Analysis and Handling Alerts and Warnings Alerts and Warnings Technology Watch Technology Watch Training and Awareness Training and Awareness ITU supports countries in the implementation of the National CIRT through the establishment of the overarching policy framework to support this technical solution and related watch, warning and incident response capabilities as part of a national strategy. 25
26 Objectives: ITU IMPACT CIRT activities - To assist partner countries assessment of its readiness to implement a National CIRT. - IMPACT reports on key issues and analysis, recommending a phased implementation plan for National CIRT. - Training courses for capacity building also provided. - In later stages the national CIRT will also be provided with enabling tools. Following the assessment exercises, ITU is now moving to the implementation phase, according to requests for assistance from Member States 26
27 ITU IMPACT Cybersecurity Assessments ITU-IMPACT Cybersecurity workshop in Kabul, Afghanistan (October, 2009) ITU-IMPACT Cybersecurity workshop for East Africa: Kenya, Tanzania, Uganda and Zambia (26 29 April, 2010) ITU-IMPACT Cybersecurity workshop for West Africa: Burkina Faso, Côte d'ivoire, Ghana, Nigeria, Mali and Senegal (17 21 May, 2010) ITU-IMPACT Cybersecurity workshop for Bhutan & Bangladesh (1 11 June, 2010) ITU-IMPACT Cybersecurity workshop for Nepal & Maldives (14 25 June, 2010) 27
28 ITU IMPACT Training and Skills Development IMPACT-Microsoft Network Forensics & Investigation Course: 6 9 April 2010 (Brunei) Closed session for law enforcement agencies 4 countries participated IMPACT Network Forensics Course: 3rd 7th May 2010 (IMPACT Global HQ) Class conducted for 22 participants from 5 countries IMPACT-SANS IPv6 Training: 26th May 2010 (IMPACT Global HQ) Training conducted by Dr Ullrich (SANS Internet Storm Center) 72 participants 28
29 ITU IMPACT Partner Engagement IMPACT-Microsoft Critical Information Infrastructure Protection Seminar December Session conducted by Angela McKay Microsoft Corporation, US IMPACT-Trend Micro seminar on The Botnet Storm: Challenges & Global Cooperation 14th April Session conducted by Raimund Genes, CTO of Trend Micro IMPACT-Kaspersky Seminar on Formulating Effective Global Counter-Phishing Efforts, 3rd March Session conducted by Michael Molsner, Malware Analyst, Kaspersky Lab, Japan 29
30 IMPACT-SANS Community Night Offensive Countermeasures & 20 Critical Security Controls Perspective 1st July Session conducted by Dr Eric Cole, SANS Faculty Fellow & CTO of McAfee together with John Strand, SANS Certified Instructor IMPACT-GuardTime Seminar on The Estonian Attack What Really Happened 19th July Session conducted by Dr. Jaan Priisalu, Co-Founder of CyberDefense League, Estonia & Mike Gault, CEO, GuardTime, Estonia IMPACT-Kaspersky Media Roundtable. IMPACT Chairman, Datuk Mohd Noor Amin & Kaspersky Founder, Eugene Kaspersky - Session held at St Regis Hotel, Singapore, October 2009 IMPACT-Symantec Media Roundtable. IMPACT Chairman, Datuk Mohd Noor Amin & Symantec CTO, Mark Bergman - Session held at JW Marriot, Kuala Lumpur, December
31 Cybersecurity Service Deployed 31
32 Training and Skills Development 32
33 ITU IMPACT s 4 Work Areas 1. IMPACT s Centre for Global Response (GRC) Global platform for alerts, early warning and cooperation; emergency response to facilitate identification of cyberthreats and share information and resources to assist Member States in taking appropriate action. - Network Early Warning System (NEWS) Collaboration with global industry partners - Electronically Secure Collaborative Application Platform for Experts (ESCAPE) - Key experts and personnel from partner countries (law enforcement, regulators, country focal, cybersecurity experts, etc) 33
34 2. IMPACT s Centre for Training and Skills Development Scholarships for developing countries and organization of specific training workshops to facilitate knowledge sharing among cybersecurity community. - Specialized training programs - Specialized seminars & workshops - Trainings via ITU s Centre of Excellence (CoE) - Scholarship programs partnership with global certification bodies SANS (US$1 mil grant) EC-Council (US$1 mil grant) Global certification courses (ISC)2 34
35 3. IMPACT s Centre for Security Assurance and Research Establishment of CIRT, charged with the responsibility of serving as a trusted, central coordination cybersecurity point of contact within a country, aimed at identifying, defending, responding to and managing cyberthreats. - Security Assurance IMPACT Government Security Scorecard (IGSS), CIRT-Lite (Computer Incident Response Team), Professional services (vulnerability assessment, security audits, etc.) - Research Facilitation & coordination of cybersecurity research through IMPACT Research Online Network (IRON) 35
36 4. IMPACT s Centre for Policy and International Cooperation With the support of ITU, the Centre fosters international cooperation through specific programmes such as coordinated cyberdrill exercises between countries. - Policy: Harmonization of policies, policy advisory & best practices World Cyber Security Summit Panel of Policy Expert Advisors - International cooperation: Partner country coordination, partnership and collaboration with industry, academia & international organizations 36
37 IMPACT Awards IMPACT received double honours at (ISC)2 s annual Asia Pacific Information Security Leadership Achievements (ISLA) Program 2010 (Singapore, July 2010) - Senior Information Security Practitioner Award Honouree: Philip Victor Director of Training, Skills Development & Outreach - Information Security Practitioner Award Honouree: Sivanathan Manager, GRC Professional Services 37
38 UN Delivering-As-One The United Nations Chief Executive Board (CEB) the highest level coordination mechanism within UN, has given high priority to Cybersecurity, following a proposal from the ITU Secretary General, on a UN-wide strategy The CEB welcomed the GCA as a framework to be applied also within the UN, in order to deliver security services to UN agencies (for instance through the ITU IMPACT, and as a mechanism for Inter agency coordination ITU and UN ODC have been identified as lead UN bodies in cybersecurity and cybercrime The ITU Secretary General and UN ODC Executive Director agreed to establish formal collaboration, in accordance with the mandates ITU and UNODC for a harmonized UN-wide strategy for Cybersecurity and Cybercrime 38
39 Conclusions Cybersecurity is a global issue and it requires a global response. ITU, as the sole Facilitator of WSIS Action Line C5, is in a unique position to promote international cooperation through its Global Cybersecurity Agenda (GCA) and the ITU-IMPACT s endeavor which is the first truly global multi-stakeholder and public-private alliance against cyber threats Cooperation and coordination between Member States, through United Nations is indispensable to reach consensus on global strategies and involve all relevant bodies and stakeholdesrs Only by joining forces and bringing together our strategic capabilities will we be able to address current and emerging cyberthreats! 39
40 THANK YOU For further information
International Training Program 2011 ITU Global Cybersecurity Agenda
International Training Program 2011 ITU Global Cybersecurity Agenda Sameer Sharma Key Cybersecurity Challenges Lack of adequate and interoperable national or regional legal frameworks Lack of secure software
NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka
Overview of ITU Cybersecurity Activities NGN Migration Strategies and Access Modernization 26 May 2011 Dhaka Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific 1 Agenda Why Cybersecurity?
ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union
ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY
Overview of ITU Cybersecurity Activities
Overview of ITU Cybersecurity Activities Workshop on NGN Regulation & Migration Strategies 13 & 15 October 2010 New Delhi, India Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific
Cyber Security @ ITU. By Tomas Lamanauskas, ITU
Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and
Cybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund
Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
Council 2014 Geneva, 6-15 May 2014
Council 2014 Geneva, 6-15 May 2014 Agenda item: PL 1.1 Document 10 February 2014 Original: English Report by the Secretary- General ITU ACTIVITIES ON STRENGTHENING THE ROLE OF ITU IN BUILDING CONFIDENCE
Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)
Regional Seminar on Cyber Preparedness Organised by World Bank Group, Financial Sector Advisory Center (FINSec) ITU s work in Cybersecurity and Global Cybersecurity Index (GCI) Vijay Mauree Programme Coordinator,
ALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union
ALL ALL Cybersec rsecurity for ITU s Work for a Safer World International Telecommunication Union ITU as a Forum for International Cooperation in Cybersecurity ITU Secretary-General has identified Cybersecurity
(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
Cybersecurity @ ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int. www.itu150.org
Cybersecurity @ ITU Carla Licciardello Policy Analyst Carla.licciardello@itu.int www.itu150.org Where are we coming from Specialized agency of the UN for telecommunications and ICTs Some more info about
ITU Global Cybersecurity Agenda (GCA)
International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,
The global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
INCO for Cyber Security. PTCIF: 21st Feb 2014
INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.
ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009
ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009 ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector December
INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 4/17 Geneva, 11-20 February 2009 Ref. : TD 0244 Rev.2 Source:
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cyber Security Challenges & Capacity Building By Marco Obiso International
ITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
Computer Incident Response Team
Computer Incident Response Team Role in Combating Cybercrime Mohamad Sazly B Musa IMPACT 22 nd September 2011 Agenda 1. Overview of Cyber Crime 2. Statistics 3. Fighting Cyber Crime 4. The Role of CIRT
RESOLUTION 102 (REV. BUSAN, 2014)
RESOLUTION 102 (REV. BUSAN, 2014) ITU's role with regard to international public policy issues pertaining to the Internet and the management of Internet resources, including domain names and addresses
The Geneva Protocol on Cybersecurity and Cybercrime
The Geneva Protocol on Cybersecurity and Cybercrime Proposal for a Memorandum of Understanding (MoU) by Stein Schjolberg 1 Chief Judge I. Introduction Cyberspace is one of the great legal frontiers of
Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
Kenya s Experience in CERT Implementation
Kenya s Experience in CERT Implementation Commonwealth Cybersecurity Forum 2015 22-24 th April 2015, London, UK Outline Cybersecurity Agenda in Kenya Cybersecurity Governance Framework in Kenya ITU Technical
Annex 2 to Resolution 71 Working Document of PROPOSED DRAFT STRATEGIC PLAN FOR THE UNION FOR 2016-2019
INTERNATIONAL TELECOMMUNICATION UNION COUNCIL WORKING GROUP FOR THE ELABORATION OF THE DRAFT STRATEGIC PLAN AND THE DRAFT FINANCIAL PLAN 2016-2019 4th meeting, Geneva May 2014 Document: CWG SP-FP/4/5 Date:
ITU Initiatives on Child Online Protection (COP)
ITU Initiatives on Child Online Protection (COP) Odessa, Ukraine, 15-17 June 2016 Sameer Sharma Senior Advisor, ITU Regional Office, Bangkok Online Threats to Children Pornography Cybergrooming Child abuse
A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
Cybersecurity: Taking Stock and Looking Ahead
Cybersecurity: Taking Stock and Looking Ahead 30 April 2014 Tomas Lamanauskas Head, Corporate Strategy Division International Telecommunication Union 1 Context 2 Different Perspectives of Cybersecurity
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:
3 rd EAIGF (2010 EAIGF) rd EAIGF 11 TH 13 TH AUGUST 2010, KAMPALA, UGANDA SECURITY MANAGEMENT IN EAST AFRICA: The East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
2 The changing telecommunication/ict environment and its implications for the Union
1 Introduction 1.1 Now, more than ever, the telecommunication/information and communication technology (ICT) industry is undergoing a profound transformation with far-reaching consequences. The development
ITU NATIONAL CYBERSECURITY STRATEGY GUIDE
ITU NATIONAL CYBERSECURITY STRATEGY GUIDE September 2011 THE ITU NATIONAL CYBERSECURITY STRATEGY GUIDE Dr. Frederick Wamala (Ph.D.), CISSP I. EXECUTIVE SUMMARY 4 1 EXECUTIVE SUMMARY 1.1 OVERVIEW We use
Nuclear Security Plan 2014 2017
Atoms for Peace Board of Governors General Conference GOV/2013/42-GC(57)/19 Date: 2 August 2013 For official use only Item 4(b) of the Board s provisional agenda (GOV/2013/37) Item 16 of the Conference's
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
Kenya country experience: A Safer Cyber Space for Children
Kenya country experience: A Safer Cyber Space for Children Africa Child Online Protection (ACOP) Summit 15th-16th December, 2014, Kampala, Uganda Mercy Wanjau Patricia Muchiri. Vincent Ngundi. Geoffrey
CYBERSECURITY INDEX OF INDICES
Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration
REPORT OF THE CHAIRMAN OF HLEG. To ITU Secretary-General, Dr. Hamadoun I. Touré. Chief Judge Stein Schjølberg,
ITU Global Cybersecurity Agenda (GCA) High-Level Experts Group (HLEG) REPORT OF THE CHAIRMAN OF HLEG To ITU Secretary-General, Dr. Hamadoun I. Touré by Chief Judge Stein Schjølberg, Judge at the Moss Tingrett
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority
AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION)
AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION) AG/RES. 2004 (XXXIV-O/04) ADOPTION OF A COMPREHENSIVE INTER-AMERICAN STRATEGY TO COMBAT THREATS TO CYBERSECURITY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
Infocomm Security Masterplan 2
INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm
TELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA
TELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA (TESPOK) BACKGROUND TESPOK is a professional, non-profit organization representing the interests of telecommunication service providers in Kenya.
ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia
Common Market for Eastern and Southern Africa ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia Document RFL/2008/01-E Rev.1 29 August 2008 Original: English Meeting Report : ITU Regional Cybersecurity
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Cybersecurity Initiatives
Port Vila, 20 November 2014 The Government of The Republic of Vanuatu Cybersecurity Initiatives Telecommunications & Radiocommunications Regulator By Louise Nasak, Technical and Internet Governance Manager,
Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.
Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating
DIRECTION TO SUCCESS. PUBLIC AND PRIVATE SECTORS PARTNERSHIP
DIRECTION TO SUCCESS. PUBLIC AND PRIVATE SECTORS PARTNERSHIP WSIS Action Line Facilitation Meeting: Building confidence and security in the use of ICTs (C5) Partnerships for Global Cybersecurity ITU Geneva,
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
OAS CYBER SECURITY INITIATIVE. Global Forum on Cyber Expertise (GFCE)
OAS CYBER SECURITY INITIATIVE Global Forum on Cyber Expertise (GFCE) CONTENTS 2 3 9 12 OAS Regional Cyber Security Framework What we offer to our Member States How we do our work ANNEX -A- OAS CYBER SECURITY
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
ASEAN s Cooperation on Cybersecurity and against Cybercrime
ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms
2013 ITU survey on measures taken to raise awareness on cybersecurity
2013 ITU survey on measures taken to raise awareness on cybersecurity Securing information and communication networks: best practices for developing a culture of cybersecurity SURVEY BACKGROUND Raising
INTERNATIONAL TELECOMMUNICATION UNION. WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Dubai, 20-29 November 2012
INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Dubai, 20-29 November 2012 Resolution 76 Studies related to
UN Emergency Summit on Cyber Security Topic Abstract
UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international
Day 3-24 April 2013. Day 2-23 April 2013
Day 1-22 April 2013 09.00 Joint International Telecommunications Union (ITU) & Commonwealth Telecommunications Organisation (CTO) project to implement Child Online Protection: Workshop for Cameroon Kim
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by INTEL DISCLAIMER: The views presented
CYBERSECURITY STRATEGY. The Government of Japan
CYBERSECURITY STRATEGY The Government of Japan September 2015 OVERVIEW 1 Understanding on Cyberspace Cyberspace is an artificial domain as a "frontier generating infinite values" and an essential foundation
The Hague uclear Security Summit Communiqué
COUCIL OF TH UROPA UIO N The Hague, 25 March 2014 8193/14 (OR. en) PRSS 187 The Hague uclear Security Summit Communiqué We, the leaders, met in The Hague on 24 and 25 March 2014 to strengthen nuclear security,
Preventing and Defending Against Cyber Attacks October 2011
Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17 TSB Briefing to the Regional Offices, 28 Feb 2011 Martin Euchner Advisor of ITU-T Study Group 17 Martin.Euchner@itu.int
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
National Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests
ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP
Opportunities for strengthening international cooperation for the protection of children from sexual violence including on-line
Opportunities for strengthening international cooperation for the protection of children from sexual violence including on-line Exploring the role and potential of existing platforms to promote a safe,
iwr vw bs ww G-1 AwZwi³ msl v KZ cÿ KZ K cökvwkz g½jevi, gvp 11, 2014
iwr vw bs ww G-1 evsjv `k M RU AwZwi³ msl v KZ cÿ KZ K cökvwkz g½jevi, gvp 11, 2014 MYcÖRvZš x evsjv `k mikvi WvK, Uwj hvmv hvm I Z_ cöhyw³ gš Yvjq Z_ I hvmv hvm cöhyw³ wefvm (AvBwmwU-1 kvlv) cöávcb ZvwiL,
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration
PROGRAMME 14 April 2015 13.00 14.00 Lunch / Delegates Registration 14.00 14.10 Opening and Keynote by Panel Chair Getting Ahead of the Threat: Building Cybersecurity Dr Madan Oberoi Director, Cyber Innovation
Submissions from entities in the United Nations system and elsewhere on their efforts in 2013 to implement the outcome of the WSIS.
COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Seventeenth Session Geneva, 12 to 16 May 2014 Submissions from entities in the United Nations system and elsewhere on their efforts in 2013 to
DHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
SRO-EA s Cyber security Initiatives in Eastern Africa
UNECA Sub Regional Office For Esatern Africa SRO-EA 2010 EAIGF 11-13 August 2010, Kampala, Uganda SRO-EA s Cyber security Initiatives in Eastern Africa Mr Mactar SECK United Nations ECA SRO- EA Key Categories
GOVERNMENT OF THE REPUBLIC OF LITHUANIA
GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For
ITU -D. on Current and Future Needs and Priorities in a Converged, Competitive Telecommunication/ ICT Environment
International Telecommunication Union HRD/HRM Survey on Current and Future Needs and Priorities in a Converged, Competitive Telecommunication/ ICT Environment ITU -D Executive summary and recommendations
A Global Protocol on Cybersecurity and Cybercrime
Stein Schjølberg and Solange Ghernaouti-Hélie A Global Protocol on Cybersecurity and Cybercrime An initiative for peace and security in cyberspace Cybercrimedata Stein Schjolberg and Solange Ghernaouti-Hélie
Cyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS
Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS UbuntuNet Connect 2015 F.F. Tusubira & A. Ndiwalana Knowledge Consulting Ltd Outline Background Current reality
International Telecommunication Union (ITU) (May 2013 until April 2014)
International Telecommunication Union (ITU) (May 2013 until April 2014) ITU s support to the New Partnership for Africa s Development (NEPAD) Planning and Coordinating Agency Overview The International
ITU-IMPACT Training and Skills Development Course Catalogue
ITU-IMPACT Training and Skills Development Course Catalogue Management Track Technical Track Course Area Management Incident Response Digital Forensics Network Application Law Enforcement Foundation Management
Network Security Policy: The U.S. Experience. The U.S. Experience. Patricia Cooper International Bureau U.S. Federal Communications Commission
Network Security Policy: The U.S. Experience Patricia Cooper International Bureau U.S. Federal Communications Commission Network Security: The U.S. Experience Network Security: How we define it U.S. Approach:
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
COMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011
COMMISSION DE L UNION AFRICAINE REPUBLIQUE DU SENEGAL ---------------- MINISTERE DE LA COMMUNICATION, DES TELECOMMUNICATIONS ET DES TECHNOLOGIES DE L INFORMATION ET DE LA COMMUNICATION AFRICAN ICT MINISTERIAL
Cyber security Indian perspective & Collaboration With EU
Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
ITU REGIONAL DEVELOPMENT FORUM for AFRICA
ITU REGIONAL DEVELOPMENT FORUM for AFRICA 9-10 SEPTEMBER 2015 The Regional Development Forum for Africa was successfully held from 9 th to 10 th September 2015 at Hotel Radisson Blu in Dakar, Senegal with
Combating Spam: Policy, Technical and Industry Approaches
Combating Spam: Policy, Technical and Industry Approaches INTRODUCTION Spam continues to be a significant problem for Internet users and operators, even as email filtering and blocking efforts by network
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
HCB Human Capacity Building
Human Capacity Building Initiatives Using the Blended Learning Approach 2nd Facilitation Meeting on Action Line C7: e-learning Geneva, Switzerland From 15.00 to 18.00 hours at ITU Headquarters, Rooms K1
ISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
UNDERSTANDING THE CONCEPT OF CYBER SECURITY
UNDERSTANDING THE CONCEPT OF CYBER SECURITY Policy Competition & Economic Analysis Department TABLE OF CONTENTS Table of Contents.....2 Executive Summary..4 1.0 INTRODUCTION...5 1.1 Key Concepts in Cyber
Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010
1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue
United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes
United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes Zero Draft Preamble 1. Recalling the request in paragraph 111 of the Tunis Agenda for the Information Society to