Establishing and supporting CERTs for Internet security
|
|
|
- Alyson Woods
- 10 years ago
- Views:
Transcription
1 Report on the Activities of the IGF Best Practice Forum (BPF) for: Establishing and supporting CERTs for Internet security Cristine Hoepers, CERT.br/NIC.br Maarten Van Horenbeeck, FIRST Adli Wahid, FIRST
2 Background: Internet Governance Internet Governance Forum (IGF) established by the World Summit on the Information Society in 2006, intended to be the leading global multi stakeholder forum on public policy issues related to Internet Governance. NETmundial Global Multistakeholder Meeting on the Future of Internet Governance a one-time event, convened in São Paulo, Brazil, to discuss the future of Internet Governance, ICANN and IGF
3 What are the IGF BPFs The NETmundial statement called for a strengthened IGF Improvements should include inter-alia: Improved outcomes: Improvements can be implemented including creative ways of providing outcomes/recommendations and the analysis of policy options; As a result the IGF created 5 BPFs to provide outcome documents related to: 1. Developing meaningful multistakeholder participation mechanisms 2. Regulation and mitigation of unwanted communications (e.g. "spam") 3. Establishing and supporting Computer Emergency Response Teams (CERTs) for Internet security 4. Creating an enabling environment for the development of local content 5. Best practices for online child protection
4 Background: NETmundial Security Statements Security, stability and resilience of the Internet should be a key objective of all stakeholders in Internet governance. As a universal global resource, the Internet should be a secure, stable, resilient, reliable and trustworthy network. Effectiveness in addressing risks and threats to security and stability of the Internet depends on strong cooperation among different stakeholders. Initiatives to improve cybersecurity and address digital security threats should involve appropriate collaboration among governments, private sector, civil society, academia and technical community. There is room for new forums and initiatives. However, they should not duplicate, but add to current structures. All stakeholders should aim to leverage from and improve these already existing cybersecurity organizations. The experience accumulated by several of them demonstrates that, in order to be effective, any cybersecurity initiative depends on cooperation among different stakeholders, and it cannot be achieved via a single organization or structure.
5 BPF on the establishment of CERT teams for Internet Security Experts invited to participate in a multi-stakeholder discussion, leading to the development of best practices discussion via an open mailing list online virtual meetings 90 minute session at the IGF 2014 Lead Experts: Cristine Hoepers, CERT.br/NIC.br Maarten Van Horenbeeck, FIRST Adli Wahid, FIRST UN Consultant: Wout De Natris Online documents, resources and mailing list:
6 Template for the BPF Report 1. Definition of the issue 2. Regional specificities observed 3. Existing policy measures and private sector initiatives, impediments 4. What worked well, identifying common effective practices 5. Unintended consequences of policy interventions, good and bad 6. Unresolved issues where further multistakeholder cooperation is needed 7. Insights gained as a result of the experience 8. Proposed steps for further multistakeholder dialogue
7 Summary of the BPF Work as Presented at the IGF Main Session
8 What is a CERT/CSIRT? A Computer Security Incident Response Team (CSIRT) is a service organization that is responsible for receiving, reviewing, and responding to computer security incident reports and activity. Their services are usually performed for a defined constituency that could be a parent entity such as a corporate, governmental, or educational organization; a region or country; a research network; or a paid client. An Incident is any real or suspected adverse event in relation to the security of computer systems or computer networks. Source: CERT/CC CSIRT FAQ
9 1) Insights gained (part 1/2) Preference of term CSIRT over CERT - incident response, as captured in CSIRT, Computer Security Incident Response Team, better captures what CSIRTs do - emergency may lead to misunderstandings and misconceptions about the work on hand There are different types of CSIRTs. Their constituencies and services may differ, but they are connected by their goals of mitigating incidents on behalf of a constituency. CSIRTs have been working together and sharing information for many years. Much of this is due to that most CSIRTs need to respond to similar threats. Success of a CSIRT is tied to correctly determining deliverables, and their perception with other stakeholders. Many best practices exist and are freely shared, resulting out of trusted relationships and existing collaboration.
10 2) Insights gained (part 2/2) The role of the government is very delicate. Top-down approaches from governments on creating CSIRTs do not always work well. A bottom up approach was preferred over top down development. Everything has to do with Trust. Cooperation is rooted in trust. Legislation does not provide trust, it is built up over time, by delivering what is needed. There is a need for CSIRT of last resort for a country - a team which can take at least some level of ownership if no other parties exist.
11 3) Unresolved issues Further discussion is warranted on the National CSIRT definition, and the definition of a CSIRT of last resort Need to open the document up to other communities to find better ways of collaboration Cost of participation of developing countries in the CSIRT community and its international processes is interesting for future debate. What priorities can be set, and how can this type of work be funded? Is there a role for CSIRT teams in addressing the root causes of incidents, such as prevention of cybercrime. This is an area ripe for multi-stakeholder discussion, e.g. with law enforcement
12 4) Proposed steps for multi-stakeholder dialogue We need to find mechanisms to raise challenges the CSIRT community faces to the relevant stakeholder groups. We can do so by inviting other stakeholders to international CSIRT meetings, or share knowledge at stakeholder events. Inputs are needed to reflect multi-stakeholder requirements for establishing and ensuring success of CSIRTs
13 Some Highlights from the IGF Session Discussing the Best Practices Document
14 CSIRT History and Cooperation CERT/CC was the first CSIRT, created in 1988 in response to the Morris worm incident CSIRTs form a cooperation network there is no hierarchy the cooperation is based on trust it helps organizations to improve their own security and simultaneously this improves the whole Internet ecosystem security
15 Existing CSIRT Forums APCERT, Asia Pacific AfricaCERT, Africa LAC-CSIRTs, Latin America and Caribbean OIC-CERT, Organisation of The Islamic Cooperation TF-CSIRT and EGC-CERT, Europe FIRST, Global
16 Definition of the issue
17 b.1) What is a CSIRT? there are CSIRTs in many and very different organisations that can have different objectives different naming there are CSIRTs within government organisations, academia, private organisations and CSIRTs with a national task there are organizations that only work for its own constituency and organisations that assist their customers or provide CSIRT services to other organisations there is a consensus that a CSIRT is a team of experts that responds to computer incidents, coordinates on the resolution, notifies its constituents and assist the mitigation of the incident. CSIRTs are involved in technical mitigation of computer incidents relating to internet health and risk reduction
18 Regional Specificities observed
19 Cyber Security incidents can not be mitigated by a single country or entity, collaboration is required This leads to some expectations on common capabilities, process or tools among the CSIRTs. While there are information sharing platform the challenges include taking this globally and establishing trust Inputs from Discussants Asia Perspective South America Perspective European Perspective African Perspective
20 a. Policy Discussion ITU, EU, African Union & APECTEL have all called on member countries to establish cyber security strategies and incident response capabilities Questions: Is the level of ambition roughly in balance between regions? Are activities noticeable in all regions/continents at the same pace? Do best practices and guidelines reach each region in the same way? Can representatives from regions (financially afford to) participate in the same meetings?
21 b. Services & Regional collaboration provided by CERTs/CSIRTs A number of global, regional and national incident response forums exist and organize activities & information sharing Physical meeting is important to get acquainted and establish trust for future cooperation c. The cost of a CSIRT Cost will vary regionally and between organisations depending on constituency and services provided Some common cost items include salary, equipment and tools, travelling to conferences or meetings. d. Legal Systems Although legal systems vary from around there world, this has not stopped CSIRTs from collaborating and supporting one another. There is consensus that cooperation beyond jurisdiction is to be encouraged in other regions of the world
22 IGF BPFs Next Steps The Best Practices Forums will remain active until the 10th IGF Meeting scheduled to take place in João Pessoa, Brazil, on November 2015 The first outcome document will be finalized in October/2014 The discussions will continue based on the first outcome document We are looking for more stakeholders to join the discussion feedback on the unresolved issues, specially regional specificities A new outcome document, as a result of the next year s debate, will be presented at the 10th IGF
23 Thank You! Cristine Hoepers, CERT.br/NIC.br Maarten Van Horenbeeck, FIRST Adli Wahid, FIRST
UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction
UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE 16 April 2014 (Highlighted in yellow below) Introduction 1. The Global Multistakeholder Meeting on the Future of Internet
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
DNS Security Survey for National Computer Security Incident Response Teams December 2010
DNS Security Survey for National Computer Security Incident Response Teams December 2010 Summary As referenced during the ICANN meeting in Brussels, Belgium in June 2010, ICANN developed a survey on DNS
Cybersecurity and Incident Response Initiatives: Brazil and Americas
Cybersecurity and Incident Response Initiatives: Brazil and Americas Cristine Hoepers [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM Entitled by: Cristine Hoepers, Klaus Steding-Jessen,
DATE: 1 APRIL 2014. Introduction
INTERNET SOCIETY SUBMISSION TO THE OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS IN RESPONSE TO THE CONSULTATION ON THE RIGHT TO PRIVACY IN THE CONTEXT OF THE UN GENERAL ASSEMBLY RESOLUTION 68/167 DATE:
ITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union
ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 [email protected] 1 Who we are ENISA was
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009
ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009 ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector December
COMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011
COMMISSION DE L UNION AFRICAINE REPUBLIQUE DU SENEGAL ---------------- MINISTERE DE LA COMMUNICATION, DES TELECOMMUNICATIONS ET DES TECHNOLOGIES DE L INFORMATION ET DE LA COMMUNICATION AFRICAN ICT MINISTERIAL
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority
Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)
Regional Seminar on Cyber Preparedness Organised by World Bank Group, Financial Sector Advisory Center (FINSec) ITU s work in Cybersecurity and Global Cybersecurity Index (GCI) Vijay Mauree Programme Coordinator,
2012 CyberSecurity Watch Survey
2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Trust and Security Unit DG Communica5ons Networks, Content and Technology
Global Cybersecurity Index Good Practices
AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation
Criteria, structure and steps to develop and operationalize them
Guidance document on programme development and implementation for the Ten Year Framework of Programmes on Sustainable Consumption and Production (10YFP): Criteria, structure and steps to develop and operationalize
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
Building Blocks of a Cyber Resilience Program. Monika Josi [email protected]
Building Blocks of a Cyber Resilience Program Monika Josi [email protected] About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
BIG DATA AND CYBERSECURITY:
BIG DATA AND CYBERSECURITY: Multi Stakeholder Threats and Opportunities A US Speakers Program Embassy of the United States, Serbia September 20-25, 2015 Anne C. Bader Founder The International Cybersecurity
CYBERSECURITY INDEX OF INDICES
Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration
Internet Technical Governance: Orange s view
Internet Technical Governance: Orange s view 1 Internet Technical Governance: Orange s view With the increasing use of IP technologies in the electronic communication networks and services, Internet Technical
Cybersecurity @ ITU. Carla Licciardello Policy Analyst [email protected]. www.itu150.org
Cybersecurity @ ITU Carla Licciardello Policy Analyst [email protected] www.itu150.org Where are we coming from Specialized agency of the UN for telecommunications and ICTs Some more info about
Breakout Session B: Cyber Security and Cybercrime Trends in Africa
Breakout Session B: Cyber Security and Cybercrime Trends in Africa Global Forum for Cyber Expertise Awareness Initiative The African Union, Symantec, and the U.S. Department of State committed to develop
GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT
GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical
IGF Policy Options for Connecting the Next Billion
Introduction IGF Policy Options for Connecting the Next Billion - A Synthesis - More than three billion people will be connected to the Internet by the end of 2015. This is by all standards a great achievement,
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by INTEL DISCLAIMER: The views presented
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
Cybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund
Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review
Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review About auda.au Domain Administration Ltd (auda) is the industry self regulatory, not for profit
INCO for Cyber Security. PTCIF: 21st Feb 2014
INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.
National Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
Need to institutionalize and strengthen multi-stakeholder model Establish goals for IG Role for gov t, private sector Self regulatory instead of
INTERNET GOVERNANCE Do we need to re-define IG? Define ICANNs role in IG? IG = for whom? By whom? Perhaps look at this as internet coordination rather than internet governance Defining governance model
Michael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
Evaluation Results from National Consultation Organizers
Evaluation Results from National Consultation Organizers September 2010 Responses Received from National Consultation Organizers (24): Region Countries responded Africa (3) Uganda, Cameroon, Ghana Asia/
Cyber Security: Policy of the Internet Infrastructure
Cyber Security: Policy of the Internet Infrastructure Dr. Basuki Yusuf Iskandar Acting Director General of Post and Telecommunications/ Secretary General of MCIT Republic of Indonesia 2009 ITU Regional
WORK PROGRAMME 2013 27 NOVEMBER 2012
WORK PROGRAMME 2013 27 NOVEMBER 2012 2 Contents 1 EXECUTIVE SUMMARY...7 1.1 Introduction... 7 1.2 Structure... 7 1.2.1 Core operational activities... 7 1.2.2 Operational Horizontal activities... 7 1.2.3
Mandate of the Working Group on the issue of human rights and transnational corporations and other business enterprises
HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND www.ohchr.org TEL: +41 22 928 9355 FAX: +41 22 928 9014 E-MAIL: [email protected]
DOMAIN NAME DAY. + Helsinki; 14 th February; 2014. + Nigel Hickson, ICANN
DOMAIN NAME DAY + Helsinki; 14 th February; 2014 + Nigel Hickson, ICANN 1 AGENDA + gtlds and all that + The European and global debate on Internet Governance 2 Internet Corporation for Assigned Names
DIGITAL AGENDA FOR LATIN AMERICA AND THE CARIBBEAN (elac2018)
7 August 2015 ENGLISH ORIGINAL: SPANISH Fifth Ministerial Conference on the Information Society in Latin America and the Caribbean Mexico City, 5-7 August 2015 DIGITAL AGENDA FOR LATIN AMERICA AND THE
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
OAS CYBER SECURITY INITIATIVE. Global Forum on Cyber Expertise (GFCE)
OAS CYBER SECURITY INITIATIVE Global Forum on Cyber Expertise (GFCE) CONTENTS 2 3 9 12 OAS Regional Cyber Security Framework What we offer to our Member States How we do our work ANNEX -A- OAS CYBER SECURITY
International Strategy on Cybersecurity Cooperation
資 料 9-2 International Strategy on Cybersecurity Cooperation - j-initiative for Cybersecurity - October 2, 2013 Information Security Policy Council Contents 1 Objectives 1 2 Basic Principles 2 2.1 Ensuring
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
Observations on international efforts to develop frameworks to enhance privacy while realising big data s benefits
Big Data, Key Challenges: Privacy Protection & Cooperation Observations on international efforts to develop frameworks to enhance privacy while realising big data s benefits Seminar arranged by the Office
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,
Cybersecurity Strategy of the Republic of Cyprus
Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE
Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)
Final Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) Opening Speech to the Second International Forum Partnership Among State, Business
The 10th Internet Governance Forum (IGF) Chair s Summary 1
The 10th Internet Governance Forum (IGF) Chair s Summary 1 10-13 November 2015, João Pessoa, Brazil 1 All interested stakeholders are encouraged to visit the IGF website for full transcripts of all the
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
A/70/63 E/2015/10. General Assembly. Economic and Social Council. United Nations
United Nations General Assembly Economic and Social Council Distr.: General 23 February 2015 Original: English A/70/63 E/2015/10 General Assembly Seventieth session Item 17 of the preliminary list Information
Who are the Stakeholders in Internet Governance?
MEAC SIG 2015 Tunis, Tunisia Who are the Stakeholders in Internet Governance? Houda BELKASSEM Morocco Internet governance is now an active topic of international discussion. Interest has been fueled by
How To Discuss Cybersecurity In European Parliament
! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact
Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Brussels, 7.2.2013 COM(2013) 48 final 2013/0027 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high common level of network
Cyber Security in EU: ENISA approach
Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency in Electricity Distribution Grids, Brussels European Union Agency for
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
These guidelines can help you in taking the first step and adopt a sustainability policy as well as plan your further sustainability communication.
SUSTAINABILITY POLICY AND COMMUNICATION GUIDELINES Why communicate about sustainability? IFU encourages all our investments to be transparent and informative about business and sustainability performance
Capacity Building to Strengthen Cybersecurity: Thailand Update
Capacity Building to Strengthen Cybersecurity: Thailand Update ASEAN Regional Forum Workshop on Measures to Enhance Cyber Security Legal and Cultural Aspects September 11-12, 2013 1 1 Chain is only as
ASEAN s Cooperation on Cybersecurity and against Cybercrime
ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms
Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.
Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating
DG Trade September 2013
DG Trade September 2013 Trade negotiations step by step Content: 1. Who negotiates? 2. Who do we negotiate with? 3. How do we prepare for negotiations? 4. What happens in negotiations? 5. Conclusion of
ASSESSING NATIONAL INTERNET GOVERNANCE ARRANGEMENTS A framework for comparative assessment. David Souter for the Internet Society.
ASSESSING NATIONAL INTERNET GOVERNANCE ARRANGEMENTS A framework for comparative assessment David Souter for the Internet Society April 2012 1 INTRODUCTION This report is the first of two pieces of work
Honourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
EXECUTIVE SUMMARY. EU Multi Stakeholder Forum on Corporate Social Responsibility 3-4 February, 2015 Brussels, Belgium
EXECUTIVE SUMMARY EU Multi Stakeholder Forum on Corporate Social Responsibility 3-4 February, 2015 Brussels, Belgium The Multi Stakeholder Forum on Corporate Social Responsibility (CSR) was held in Brussels
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
OUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT Chairman s draft recommendations on the basis of the consolidated version of the rolling document A. Shaping the outcomes of IGF meetings
Working together to enhance chemical safety and security. Ukraine Chemical Security Forum
Working together to enhance chemical safety and security Ukraine Chemical Security Forum A special event of the Global Chemical Safety and Security Summit and Fair (www.chemss2016.org) Executive summary
THE WORLD IS MOVING FAST, SECURITY FASTER.
THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS
5581/16 AD/NC/ra DGE 2
Council of the European Union Brussels, 21 April 2016 (OR. en) Interinstitutional File: 2013/0027 (COD) 5581/16 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: TELECOM 7 DATAPROTECT 6 CYBER 4 MI 37 CSC 15
How To Write A Letter To The World'S Leaders On The Ovemll Review
THE PRESIDENT OF THE GENERAL AS SEMBLY 12 August 2015 Excellency, I have the pleasure to transmit herewith a SmrunillY of the key messages and proposals fi'om the Informal Intemctive Stakeholders Consultation
