ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int.
|
|
- Annabella Gordon
- 8 years ago
- Views:
Transcription
1 ITU Carla Licciardello Policy Analyst Carla.licciardello@itu.int
2 Where are we coming from Specialized agency of the UN for telecommunications and ICTs
3 Some more info about ITU
4 What we are talking about?
5 Everyone if affected
6 The importance of Cybersecurity Security is about subjectively perceived threats/risks. From industrial age to information societies - Increasing dependence on the availability of ICTs - Number of Internet users growing constantly (now 40% of world s population) Statistics and reports show that cyber-threats are on the rise - The likely annual cost to the global economy from Cybercrime is estimated at more than $455 billion (Source: McAfee Report on Economic Impact of Cybercrime, 2013). Developing countries most at risk as they adopt broader use of ICTs - E.g. Africa leading in Mobile-broadband penetration: almost 20% in up from less than 2% in 2010 (Source: ITU ICT Statistics) Need for building cybersecurity capacity - Protection is crucial for the socio-economic wellbeing of a country in the adoption of new technologies Source: Symantec 2015 Internet Security Threat Report 6
7 Handling Cyber Security over the years Ministry of Finance Ministry of Foreign Affairs Ministry of Interior Ministry of Telecommunications/ ICTs Ministry of Telecommunic ations/icts Ministry of Education Ministry of Health Ministry of Defense 7
8 Multitude of Global processes/forums: Sample Snapshot ISO/IEC ITU Study Groups and forums OHCHR forums UN Governmental Group of Experts Global Forum On Cyber Expertise HRC forums The London process Internet Governance Forum OASIS Annual Garmish Forum UNODC forums UNGA Discussions in various committees UNESCO forums UNODC forums IAEA forums Wuzhen Summit UN Governmental Group of Experts East West Institute Annual Summits World Economic Forum processes 8
9 WSIS Action Line C5 : Building confidence and security in the use of ICTs WSIS entrusted ITU as sole facilitator for WSIS Action Line C ITU launched the Global Cybersecurity Agenda (GCA). A framework for international cooperation in cybersecurity 9
10 ITU s Role as a Technical Agency Building Trust in Networks Neutral Global Convener Technical Assistance / Capacity Building Developing Technical Standards Serving as a Global Knowledge Base 10
11 Holistic Approach- Five areas of action Legal Measures - Legal Measures Strategy - Adequate and harmonized legal frameworks Capacity Building Technical/Proce dural Measures Committed to Connecting the World - National Cybersecurity Goals and Framework - International Cybersecurity Standards - Secure Government Infrastructure - Global Technical Collaboration International Cooperation Organizational Structures - Government Coordination - National Focal Point - National CIRT - Public-Private Partnerships - Cybersecurity Skills and Training - Culture of Cybersecurity - Cybersecurity Innovation - Enhanced collaboration (multistakeholder, Bi/Multi lateral) - Inter-Agency Collaboration 11
12 12
13 ITU National CIRT Programme: National CIRTs - first line of cyber-response ITU is working with Member States to facilitate the deployment of capabilities to build capacity at national and regional level, in addition to establishing National Computer Incident Response Teams (CIRTs). CIRT assessments conducted by ITU in 65 countries CIRTs currently in operation and established with the support of ITU in 11 countries CIRT projects under execution with ITU in 4 countries 11 cyber drills conducted by ITU with participation of over 100 countries 92 Countries with no CIRTs 13
14 ITU Study Groups A platform for information exchange between ITU Member States and Sector Members (industry, academia etc.) ITU-T Study Group 17 : Security Standardization work on cybersecurity; Over 300 standards (ITU-T Recommendations) relevant to security ITU-T Study Groups 5 and 20 Smart Cities & IoTs and Security ITU-D Study Group 2 Question 3/2: Securing information and Communication networks: Best practices for developing a culture of Cybersecurity 14
15 Child Online Protection (COP) Initiative Children s use of the internet* More than one in three 3-4 year-olds use the internet 91% of children live in households with internet access A greater proportion of children aged own smartphones than adults Risks and evidence: Cyberbullying, Sexual images/sexting, Grooming and Harmful content and much more * OECD countries Small group of entities Building the partnership network Working together on project-basis Joining forces to develop and implement an action plan today Working together to maximize impact Setting the global vision for child online protection Enhancing synergies to achieve our goals The Child Online Protection (COP) Initiative Tools and Guidelines Capacity Building and Education Laws and Legislations Technology Solutions Awareness and Advocacy 34 Partners
16 Building a global multistakeholder partnership Founding Member and Co-initiator of CSIRT Maturity initiative Best practices in cybercrime legislations, joint technical assistance to Member States, information sharing Tap into expertise of globally recognized industry players and accelerate info sharing with ITU Member States Collaboration on Study Group 2 Question 3 and in Cyberdrills Collaboration with ABI Research The Global Cybersecurity Index (GCI) Capacity building initiatives, joint consultations and more. Collaboration with FIRST To share best practices on computer incident response, engage in joint events, facilitate affiliation of national CIRTS of Member States Collaboration with Member States Regional Cybersecurity Centres Joint activities to combat the proliferation of SPAM 8 JUNE 2015 : MoU to jointly enhance Cybersecurity capacity in the ECOWAS region 16
17 UN-wide cooperation mechanisms UN-wide Framework on Cybersecurity and Cybercrime (2013) Developed by ITU and UNODC together with 33 UN Agencies. Enables enhanced coordination among UN entities in their response to concerns of Member States regarding cybercrime and cybersecurity UN System Internal Coordination Plan on Cybersecurity and Cybercrime (2014) Developed through close coordination of different UN agencies/bodies building on the UN-wide Framework on Cybersecurity and Cybercrime upon request by the UN Secretary-General, Mr. Ban Ki-moon Designed as a guide to improve the internal coordination activities of the UN system organizations on related matters 17
18 Are we far from this?
19 Thank You itu150.org
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cyber Security Challenges & Capacity Building By Marco Obiso International
More informationCyber Security @ ITU. By Tomas Lamanauskas, ITU
Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and
More informationALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union
ALL ALL Cybersec rsecurity for ITU s Work for a Safer World International Telecommunication Union ITU as a Forum for International Cooperation in Cybersecurity ITU Secretary-General has identified Cybersecurity
More informationITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
More informationCybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
More informationRegional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)
Regional Seminar on Cyber Preparedness Organised by World Bank Group, Financial Sector Advisory Center (FINSec) ITU s work in Cybersecurity and Global Cybersecurity Index (GCI) Vijay Mauree Programme Coordinator,
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund
More informationITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union
ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY
More informationCybersecurity: Taking Stock and Looking Ahead
Cybersecurity: Taking Stock and Looking Ahead 30 April 2014 Tomas Lamanauskas Head, Corporate Strategy Division International Telecommunication Union 1 Context 2 Different Perspectives of Cybersecurity
More informationCouncil 2014 Geneva, 6-15 May 2014
Council 2014 Geneva, 6-15 May 2014 Agenda item: PL 1.1 Document 10 February 2014 Original: English Report by the Secretary- General ITU ACTIVITIES ON STRENGTHENING THE ROLE OF ITU IN BUILDING CONFIDENCE
More informationNGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka
Overview of ITU Cybersecurity Activities NGN Migration Strategies and Access Modernization 26 May 2011 Dhaka Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific 1 Agenda Why Cybersecurity?
More informationOverview of ITU Cybersecurity Activities
Overview of ITU Cybersecurity Activities Workshop on NGN Regulation & Migration Strategies 13 & 15 October 2010 New Delhi, India Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific
More informationInternational Training Program 2011 ITU Global Cybersecurity Agenda
International Training Program 2011 ITU Global Cybersecurity Agenda Sameer Sharma Key Cybersecurity Challenges Lack of adequate and interoperable national or regional legal frameworks Lack of secure software
More informationGlobal Cybersecurity Agenda (GCA) A framework for international cooperation
Open-ended Intergovernmental Expert Group on Cybercrime Vienna, 17-21 January 2011 Global Cybersecurity Agenda (GCA) A framework for international cooperation Alexander NTOKO Head, Corporate Strategy Division
More informationThe Geneva Protocol on Cybersecurity and Cybercrime
The Geneva Protocol on Cybersecurity and Cybercrime Proposal for a Memorandum of Understanding (MoU) by Stein Schjolberg 1 Chief Judge I. Introduction Cyberspace is one of the great legal frontiers of
More informationThe global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
More informationAs global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
More informationITU Global Cybersecurity Agenda (GCA)
International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 4/17 Geneva, 11-20 February 2009 Ref. : TD 0244 Rev.2 Source:
More informationUNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by INTEL DISCLAIMER: The views presented
More informationCyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority
More informationITU NATIONAL CYBERSECURITY STRATEGY GUIDE
ITU NATIONAL CYBERSECURITY STRATEGY GUIDE September 2011 THE ITU NATIONAL CYBERSECURITY STRATEGY GUIDE Dr. Frederick Wamala (Ph.D.), CISSP I. EXECUTIVE SUMMARY 4 1 EXECUTIVE SUMMARY 1.1 OVERVIEW We use
More informationPROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
More informationCybersecurity Initiatives
Port Vila, 20 November 2014 The Government of The Republic of Vanuatu Cybersecurity Initiatives Telecommunications & Radiocommunications Regulator By Louise Nasak, Technical and Internet Governance Manager,
More informationITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests
ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP
More informationREPORT OF THE CHAIRMAN OF HLEG. To ITU Secretary-General, Dr. Hamadoun I. Touré. Chief Judge Stein Schjølberg,
ITU Global Cybersecurity Agenda (GCA) High-Level Experts Group (HLEG) REPORT OF THE CHAIRMAN OF HLEG To ITU Secretary-General, Dr. Hamadoun I. Touré by Chief Judge Stein Schjølberg, Judge at the Moss Tingrett
More informationITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009
ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009 ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector December
More informationHarmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,
More informationCYBERSECURITY INDEX OF INDICES
Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration
More informationCyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
More informationDIGITAL AGENDA FOR LATIN AMERICA AND THE CARIBBEAN (elac2018)
7 August 2015 ENGLISH ORIGINAL: SPANISH Fifth Ministerial Conference on the Information Society in Latin America and the Caribbean Mexico City, 5-7 August 2015 DIGITAL AGENDA FOR LATIN AMERICA AND THE
More informationUnited Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes
United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes Zero Draft Preamble 1. Recalling the request in paragraph 111 of the Tunis Agenda for the Information Society to
More informationCyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.
Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating
More information(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
More informationE Distr. LIMITED E/ESCWA/2015/EC.2/4(Part IV) 17 November 2015 ORIGINAL: ENGLISH
UNITED NATIONS ECONOMIC AND SOCIAL COUNCIL E Distr. LIMITED E/ESCWA/2015/EC.2/4(Part IV) 17 November 2015 ORIGINAL: ENGLISH Economic and Social Commission for Western Asia (ESCWA) Executive Committee Second
More informationCyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
More informationDeveloping and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
More informationInformation Security Awareness Videos
Information Security Awareness Videos Marcelo H. P. C. Chaves mhp@cert.br CERT.br Computer Emergency Response Team Brazil NIC.br - Network Information Center Brazil CGI.br - Brazilian Internet Steering
More informationSRO-EA s Cyber security Initiatives in Eastern Africa
UNECA Sub Regional Office For Esatern Africa SRO-EA 2010 EAIGF 11-13 August 2010, Kampala, Uganda SRO-EA s Cyber security Initiatives in Eastern Africa Mr Mactar SECK United Nations ECA SRO- EA Key Categories
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationA Business Perspective on Promoting Cybersecurity. Art Reilly Cisco Systems For the ICC
A Business Perspective on Promoting Cybersecurity Art Reilly Cisco Systems For the ICC Topics Culture of Cybersecurity Role of Business Cooperation with the Stakeholders ICC Companion documents to the
More informationTowards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
More informationLegal Measures Technical Measures Organizational Measures Capacity Building Cooperation.
Conceptual Framework Information and communication technologies (ICT) are the driving force behind the evolution of modern societies. They underpin the social, economic and political growth of individuals,
More informationPromoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
More informationG7 Opportunities for Collaboration
ANNEX G7 Opportunities for Collaboration To strengthen international cooperation and collaboration and to achieve the actions in the G7 ICT Ministers Joint Declaration, G7 members seek to share information
More informationThe Danish Cyber and Information Security Strategy
February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives
More informationMichael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
More informationStandardization: Plans and Progress Franz ZICHY Vice-Chairman Working Party 3 of ITU-T Study Group 5
Standardization: Plans and Progress Franz ZICHY Vice-Chairman Working Party 3 of ITU-T Study Group 5 ITU: unique public/private partnership UN agency for ICTs Members: 193 Member States (Governments and
More informationINCO for Cyber Security. PTCIF: 21st Feb 2014
INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.
More informationRWANDA CONTRIBUTION TO CWG-INTERNATIONAL INTERNET RELATED PUBLIC POLICY ISSUES.
RWANDA CONTRIBUTION TO CWG-INTERNATIONAL INTERNET RELATED PUBLIC POLICY ISSUES. (Ref: CL-13/168 of 22 November 2013) 1.0. Introduction Since 2000, the Government of Rwanda (GoR) embarked on a 20 year journey
More informationEstablishing and supporting CERTs for Internet security
Report on the Activities of the IGF Best Practice Forum (BPF) for: Establishing and supporting CERTs for Internet security Cristine Hoepers, CERT.br/NIC.br Maarten Van Horenbeeck, FIRST Adli Wahid, FIRST
More informationNational Cybersecurity Management System: Framework, Maturity Model and Implementation Guide
National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide Taieb DEBBAGH, PhD, CISA Secretary General Ministry of Industry, Trade and New Technologies, Morocco ITU Regional
More informationITU Regional Cybersecurity Forum 2008 Lusaka, Zambia
Common Market for Eastern and Southern Africa ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia Document RFL/2008/01-E Rev.1 29 August 2008 Original: English Meeting Report : ITU Regional Cybersecurity
More informationDeclaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:
3 rd EAIGF (2010 EAIGF) rd EAIGF 11 TH 13 TH AUGUST 2010, KAMPALA, UGANDA SECURITY MANAGEMENT IN EAST AFRICA: The East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant
More information2. Cyber legislation harmonization process in Central Africa
Introduction 1. What is cyber legislation? 2. Cyber legislation harmonization process in Central Africa The sub-region concerned; Partner international organizations in the harmonization of cyber legislation
More informationA/70/63 E/2015/10. General Assembly. Economic and Social Council. United Nations
United Nations General Assembly Economic and Social Council Distr.: General 23 February 2015 Original: English A/70/63 E/2015/10 General Assembly Seventieth session Item 17 of the preliminary list Information
More informationThird Parliamentary Forum on Shaping the Information Society
Third Parliamentary Forum on Shaping the Information Society ICT and the Global Economic Crisis: Current Situation and Future Perspectives 3-5 May 2010 Room B ITU Tower International Telecommunication
More informationiwr vw bs ww G-1 AwZwi³ msl v KZ cÿ KZ K cökvwkz g½jevi, gvp 11, 2014
iwr vw bs ww G-1 evsjv `k M RU AwZwi³ msl v KZ cÿ KZ K cökvwkz g½jevi, gvp 11, 2014 MYcÖRvZš x evsjv `k mikvi WvK, Uwj hvmv hvm I Z_ cöhyw³ gš Yvjq Z_ I hvmv hvm cöhyw³ wefvm (AvBwmwU-1 kvlv) cöávcb ZvwiL,
More informationA COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
More informationOpportunities for strengthening international cooperation for the protection of children from sexual violence including on-line
Opportunities for strengthening international cooperation for the protection of children from sexual violence including on-line Exploring the role and potential of existing platforms to promote a safe,
More informationKenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014
Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014 1 July 2014 RESTRICTED 1 ICT as a Modern Solution Security Threats, Early Detection and Prevention
More informationCorporate Citizenship in The World Economy. Global. united nations. Compact
Corporate Citizenship in The World Economy united nations Global Compact What Is the UN Global Compact? Never before in history has there been a greater alignment between the objectives of the international
More informationNational Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
More informationCyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
More informationASEAN s Cooperation on Cybersecurity and against Cybercrime
ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms
More informationDay 3-24 April 2013. Day 2-23 April 2013
Day 1-22 April 2013 09.00 Joint International Telecommunications Union (ITU) & Commonwealth Telecommunications Organisation (CTO) project to implement Child Online Protection: Workshop for Cameroon Kim
More informationGLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT
GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical
More informationaecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National
More informationITU -D. on Current and Future Needs and Priorities in a Converged, Competitive Telecommunication/ ICT Environment
International Telecommunication Union HRD/HRM Survey on Current and Future Needs and Priorities in a Converged, Competitive Telecommunication/ ICT Environment ITU -D Executive summary and recommendations
More informationFINANCIAL INCLUSION OF YOUTH
FINANCIAL INCLUSION OF YOUTH HIGHLIGHTS 2.5 billion - more than half of the world s working adults- are excluded from financial services. This is most acute among low-income populations in emerging and
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More informationBuilding National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS
Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS UbuntuNet Connect 2015 F.F. Tusubira & A. Ndiwalana Knowledge Consulting Ltd Outline Background Current reality
More informationA Global Protocol on Cybersecurity and Cybercrime
Stein Schjølberg and Solange Ghernaouti-Hélie A Global Protocol on Cybersecurity and Cybercrime An initiative for peace and security in cyberspace Cybercrimedata Stein Schjolberg and Solange Ghernaouti-Hélie
More informationSummary of UNICEF Private Fundraising and Partnerships Plan 2014-2017
Summary of UNICEF Private Fundraising and Partnerships Plan 2014-2017 1. Introduction The Private Fundraising and Partnerships Plan supports the UNICEF Strategic Plan 2014 2017 and other organizational
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More information2015/16 Reference Model
Telecommunication Development Sector CYBERSECURITY INTERNATIONAL TELECOMMUNICATION UNION 2015/16 The Global Cyber Security Index measures the cybersecurity commitment of Member States. The second iteration
More informationGlobal Cybersecurity Index Good Practices
AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation
More informationCyber Security Strategy
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
More informationCorporate Sustainability in The World Economy. Global. united nations. Compact
Corporate Sustainability in The World Economy united nations Global Compact What Is the UN Global Compact? Never before has there been a greater alignment between the objectives of the international community
More informationCybersecurity Governance
AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional
More informationCanada 2017! A Digital Nation Focus on ICT
Canada 2017! A Digital Nation Focus on ICT Growing Canada s Prosperity Used for Ministerial Briefing www.itac.ca Page 1 Introduction ICT & Canada s prosperity Importance of ICT to Canada s prosperity:
More informationAnnex 2 to Resolution 71 Working Document of PROPOSED DRAFT STRATEGIC PLAN FOR THE UNION FOR 2016-2019
INTERNATIONAL TELECOMMUNICATION UNION COUNCIL WORKING GROUP FOR THE ELABORATION OF THE DRAFT STRATEGIC PLAN AND THE DRAFT FINANCIAL PLAN 2016-2019 4th meeting, Geneva May 2014 Document: CWG SP-FP/4/5 Date:
More informationCritical Internet Resources Emerging Issues Open Forum
Sub Themes Inclusiveness and Diversity Internet Economy Openness Enhancing Multistakeholder Cooperation Cybersecurity and Trust Internet and Human Rights Critical Internet Resources Emerging Issues Open
More informationEU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Trust and Security Unit DG Communica5ons Networks, Content and Technology
More informationGovernmental Oversight and Accountability Committee
The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) Prepared By: The Professional Staff
More informationDECLARATION ON STRENGTHENING GOOD GOVERNANCE AND COMBATING CORRUPTION, MONEY-LAUNDERING AND THE FINANCING OF TERRORISM
MC.DOC/2/12 Organization for Security and Co-operation in Europe Ministerial Council Dublin 2012 Original: ENGLISH Second day of the Nineteenth Meeting MC(19) Journal No. 2, Agenda item 7 DECLARATION ON
More informationThe trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation
The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation
More informationNuclear Security School An IAEA, ICTP and Italian MoFA Initiative
Nuclear Security School An IAEA, ICTP and Italian MoFA Initiative Global Partnership WG on Centers of Excellence Miami, 17-18 April 2012 Alicia Mignone Italian Ministry of Foreign Affairs Directorate for
More informationSPECIAL EVENT ON. Implementing the Post-2015 Development Agenda: Enhancing access to and security of ICTs
SPECIAL EVENT ON Background Implementing the Post-2015 Development Agenda: Enhancing access to and security of ICTs Tuesday, 18 November 2014 3:00 pm - 6:00 pm ECOSOC Chamber, UNHQ The global Internet
More informationState Security Agency/ Staatsveiligheidsagentskap STATE SECURITY AGENCY NO. 609 04 DECEMBER 2015 THE NATIONAL CYBERSECURITY POLICY FRAMEWORK (NCPF)
State Security Agency/ Staatsveiligheidsagentskap 609 State Security Agency: National Cybersecurity Policy Framework (NCPF): For public information 39475 66 No. 39475 GOVERNMENT GAZETTE, 4 DECEMBER 2015
More informationCYBER SECURITY. Marcin Olender Head of Unit Information Society Department
CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November
More informationUnited Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework.
United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework 28 September 2012 Chair s Summary The United Nations High-Level Meeting on Countering
More information192 EX/6. Executive Board Hundred and ninety-second session
Executive Board Hundred and ninety-second session 192 EX/6 PARIS, 31 July 2013 Original: English Item 6 of the provisional agenda PROPOSAL FOR A GLOBAL ACTION PROGRAMME ON EDUCATION FOR SUSTAINABLE DEVELOPMENT
More informationTELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA
TELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA (TESPOK) BACKGROUND TESPOK is a professional, non-profit organization representing the interests of telecommunication service providers in Kenya.
More informationFact Sheet: Information and Communication Technology
Fact Sheet: Information and Communication Technology Approximately one billion youth live in the world today. This means that approximately one person in five is between the age of 15 to 24 years; The
More informationRESOLUTION 102 (REV. BUSAN, 2014)
RESOLUTION 102 (REV. BUSAN, 2014) ITU's role with regard to international public policy issues pertaining to the Internet and the management of Internet resources, including domain names and addresses
More informationPresidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,
More informationCYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE
CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,
More informationOngoing ITU research suggests that at present, around 43% of national strategies reference youth.
YOUTH AND ICT HIGHLIGHTS Almost half the world's population is under the age of 25 and nearly a quarter are aged 12 to 24. Of those aged 12-24, nearly 40% live on less than two dollars a day. Youth employment
More informationSAC075: SSAC Comments to ITU-D on Establishing New Certification Authorities
03 December 2015 Subject: SAC075: SSAC Comments to ITU-D on Establishing New Certification Authorities The Internet Corporation for Assigned Names and Numbers (ICANN) Security and Stability Advisory Committee
More information