FOURTH PARLIAMENTARY FORUM ON SHAPING THE INFORMATION SOCIETY THE TRIPLE CHALLENGE OF CYBER-SECURITY: INFORMATION, CITIZENS AND INFRASTRUCTURE
|
|
- Olivia Leonard
- 8 years ago
- Views:
Transcription
1 FOURTH PARLIAMENTARY FORUM ON SHAPING THE INFORMATION SOCIETY THE TRIPLE CHALLENGE OF CYBER-SECURITY: INFORMATION, CITIZENS AND INFRASTRUCTURE THE ZAMBIAN PARLIAMENT EXPERIENCE May 2011,Room II ILO Conference Center International Labour Organization, Geneva, Switzerland MICHAEL MUKUKA PRINCIPAL CLERK ICT ZAMBIAN PARLIAMENT
2 BACKGROUND Parliamentary Reforms and use of ICTs in meeting the reforms agenda posses a new challenge of security of information, people and infrastructure Parliamentary engagement in the new information age. The need to appreciate the new operating environment and speeding up our response to the challenge The challenge of MPs capacity to adequately deal with the Cyber security issues The wait-and and-see approach in dealing with challenges such as Cyber-Security
3 THE ZAMBIAN RESPONSE TO CYBER- SECURITY AN OVERVIEW Evolvement of Legislation dealing with Cyber-Security issues: The Telecommunications Act 1994 Radio Communication Act Computer Misuse and Crimes Act Electronic Communications and Transactions Act Establishment of statutory bodies: The Zambia Police Service Cyber Crimes Bureau The Zambia Information and Communications Technology Authority (ZICTA) 2009 Act National Work Group on Cyber-Security (NWGC)
4 ZICTA AND THE NWGC INIATIVE NWGC was conceived after the international conference organised by ITU, COMESA and CAZ in 2008 Multi-sectoral approach involving government agencies, non-governmental organisations and private sector Interim structure to provide a national strategic approach towards Cyber-Security Development of the National Cyber-Security Draft being considered by the Ministry of Communications and Transport
5 PARLIAMENTARY ENGAGEMENT THE COMPUTER MISUSE AND CRIMES ACT Very basic law with a lot gaps No mention of Cyber Crime Protection of personal information was non existent Slow adoption of e-commerce e in the country Could not easily be used to deal with a number of emerging challenges the Information Society is currently facing A handful of stakeholders participated
6 PARLIAMENTARY ENGAGEMENT THE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS ACT Brings out a number of pertinent issues not covered in the Computer Misuse and Crimes Act of 2004 Legal requirement for data messages Communications of data messages. Spam is a crime. Consumer protection and protection of personal information Domain name regulations Cyber Crime and Cyber Inspection Encrypting Communications Comprehensive consultations with stakeholders and Interest Groups
7 PARLIAMENTARY ENGAGEMENT THE PARLIAMENTARY INFORMATION SYSTEMS OPERATIONS POLICY (PISOP) Parliaments need to show the way by taking the lead. Putting our House in order! Ensuring secure ICT infrastructure Ensuring the Integrity, Authenticity and reliability of information and data so as to protect the image of Parliament Ensuring that Members and Staff of Parliament are protected from being victims of Cyber Crime and are discouraged from being lured into using parliamentary infrastructure to undertake undesirable activities To ensure that Member Constituent engagement is done orderly and in a secure environment
8 PARLIAMENTARY ENGAGEMENT - CHALLENGES Oversight Limited or inadequate knowledge by Parliamentarians Lack of appropriate structure with focused approach Representative and Advocacy Inability to follow-up issues on cyber security due to inadequate knowledge and appropriate structure. MPs can play a critical role of advocacy and sensitisation in dealing with Cyber security Parliamentarians as change agents Legislative Inadequate laws are made which leave gaps and hence not very helpful in protecting the information asset, the public and the infrastructure this is common in most developing countries
9 STRENGTHENING AND SPEEDING UP PARLIAMENTARY RESPONSE Inter-parliamentary cooperation and collaboration Regional and Global groupings Use of existing initiatives Organisational (Committee systems) National (Regulators) Regional (SADC PF) Global Initiatives (Global Centre)
10 CONCLUSION The need for pro-active parliamentary involvement in the area of Cyber-Security cannot be underscored. Institutions of Parliaments need to realise the importance of focused approach by forming structures and building the capacity of its members to better deal with Cyber-Security Security.
11 THANK YOU!!!
CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE
CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,
More informationFourth Parliamentary Forum on Shaping the Information Society The Triple Challenge of Cyber-Security: Information, Citizens and Infrastructure
United Nations Inter-Parliamentary Union International Telecommunication Union Fourth Parliamentary Forum on Shaping the Information Society The Triple Challenge of Cyber-Security: Information, Citizens
More informationHarmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,
More informationESKISP6054.01 Conduct security testing, under supervision
Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
More informationTO BE PRESENTED BY CHAMA M MFULA AND LOVENESS M MAYAKA
PARLIAMENTARY INFORMATION SERVICES: THE ROLE OF THE LIBRARY AND RESAERCH DEPARTMENTS IN THE ZAMBIAN PARLIAMENT IN HELPING MEMBERS OF PARLIAMENT MAKE BETTER LAWS TO BE PRESENTED BY CHAMA M MFULA AND LOVENESS
More informationThird Parliamentary Forum on Shaping the Information Society
Third Parliamentary Forum on Shaping the Information Society ICT and the Global Economic Crisis: Current Situation and Future Perspectives 3-5 May 2010 Room B ITU Tower International Telecommunication
More informationWorld e-parliament Conference 2016
World e-parliament Conference 2016 28-30 June 2016 Co-organized by the Inter-Parliamentary Union and the Chamber of Deputies of Chile #eparliament NOTE FOR SPEAKERS AND MODERATORS 16 June 2016 Thank you
More informationOptional Protocol on the sale of children, child prostitution and child pornography
United Nations Convention on the Rights of the Child CRC/C/OPSC/VEN/CO/1 Distr.: General 19 September 2014 Original: English ADVANCE UNEDITED VERSION Committee on the Rights of the Child Optional Protocol
More informationAgenda 1. Introduction and Background:
National ICT Policy & Licensing Public Consultations NIUE Agenda 1. Introduction and Background: for the Pacific and for Niue 2. What has been completed for Niue? Draft National ICT Policy Draft Report
More informationMemorandum of Understanding on Labour Cooperation
Memorandum of Understanding on Labour Cooperation The Department of Labour of New Zealand, in the name of New Zealand and the Ministry of Human Resources and Social Security of the People s Republic of
More informationCybersecurity in the Commonwealth: Setting the Stage
Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if
More informationCYBER SECURITY. Marcin Olender Head of Unit Information Society Department
CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November
More informationITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
More informationCybersecurity Governance
AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional
More informationHarmonising Cyber Security Across the Caribbean: CTU Initiatives & Activities
Harmonising Cyber Security Across the Caribbean: CTU Initiatives & Activities Caribbean Telecommunications Union Presented by Nigel Cassimire Telecommunications Specialist ICT in the Caribbean 1. Caribbean
More informationITU Global Cybersecurity Agenda (GCA)
International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,
More informationOverview TECHIS60441. Carry out security testing activities
Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being
More informationThe global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
More informationCyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.
Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating
More informationITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests
ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund
More informationA COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 4/17 Geneva, 11-20 February 2009 Ref. : TD 0244 Rev.2 Source:
More informationWritten Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 to the Public Consultation of the European Commission on Standards in the Digital : setting priorities
More informationSave the Children. Protecting Children in Zambia from Violence, Abuse, Neglect and Exploitation
Protecting Children in Zambia from Violence, Abuse, Neglect and Exploitation Baseline 2010: National Child Protection System in Zambia What is a National Child Protection System and why do we need it?
More informationRE: Comments on Vietnam s Draft Law on Information Security, version 2.22
July 10, 2013 Ministry of Information and Communications 18 Nguyen Du Hanoi, Vietnam RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 Dear Sir/Madam: The Information Technology
More informationCan Public Accounts Committees add value a case study approach
1 Can Public Accounts Committees add value a case study approach Marco Bini, Director Policy and Coordination Victorian Auditor-General s Office Graduate Management Centre, Deakin University Thursday 9
More informationExpert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cyber Security Challenges & Capacity Building By Marco Obiso International
More informationAID FOR TRADE CASE STORY: ZIMBABWE
AID FOR TRADE: CASE STORY ZIMBABWE Date of submission : 31 January 2011 Region : Southern Africa Country : Zimbabwe Type : Project Author : Ministry of Industry and Commerce CHIRUNDU ONE STOP BORDER POST:
More informationALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union
ALL ALL Cybersec rsecurity for ITU s Work for a Safer World International Telecommunication Union ITU as a Forum for International Cooperation in Cybersecurity ITU Secretary-General has identified Cybersecurity
More informationCRC/C/OPAC/NLD/CO/1. Convention on the Rights of the Child. United Nations
United Nations Convention on the Rights of the Child CRC/C/OPAC/NLD/CO/1 Distr.: General 5 June 2015 ADVANCE UNEDITED VERSION Original: English Committee on the Rights of the Child Concluding observations
More informationDeclaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:
3 rd EAIGF (2010 EAIGF) rd EAIGF 11 TH 13 TH AUGUST 2010, KAMPALA, UGANDA SECURITY MANAGEMENT IN EAST AFRICA: The East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant
More information2. Cyber legislation harmonization process in Central Africa
Introduction 1. What is cyber legislation? 2. Cyber legislation harmonization process in Central Africa The sub-region concerned; Partner international organizations in the harmonization of cyber legislation
More informationFURTHER DEVOLUTION TO GREATER MANCHESTER COMBINED AUTHORITY
FURTHER DEVOLUTION TO GREATER MANCHESTER COMBINED AUTHORITY 1. This document marks the fourth devolution deal agreed between Greater Manchester Combined Authority and government, along with the Memorandum
More informationEARLY VERSIONS OF THE COURSE
1 Parliamentary Strengthening Programs: Improving Access, Availability and Governance Through a Self-Paced Learning Program Rick Stapenhurst, The World Bank Institute, fstapenhurst@worldbank.org Brooke
More informationMichael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
More informationInternational Workshop e Parliament: Managing Innovation and World e Parliament Conference 2007 Challenges and benefits of ICTs in Parliament
Application of Open Source in the Legislation processes International Workshop e Parliament: Managing Innovation and World e Parliament Conference 2007 Challenges and benefits of ICTs in Parliament Presented
More informationBusiness Plan 2012/13
Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,
More informationKIGALI DECLARATION ON THE DEVELOPMENT OF AN EQUITABLE INFORMATION SOCIETY IN AFRICA
KIGALI DECLARATION ON THE DEVELOPMENT OF AN EQUITABLE INFORMATION SOCIETY IN AFRICA We, the Representatives of the African Parliaments to the Kigali International Conference Recalling the commitment of
More informationAlternative report from UNICEF Sweden re. the UPR process re. Sweden
To The Human rights council Geneva Stockholm 13 June 2014 Alternative report from UNICEF Sweden re. the UPR process re. Sweden Introduction This is a comment to the coming Universal Periodic Review (UPR)
More informationMinistry of Science and Technology Strategy and Research Division
Job Title: Director, Strategy and Research The Job: A three (3) year contract position. Job Summary: The incumbent is responsible, at an Executive level, for the technical, operational and administrative
More informationHow To Run The National Ict4D Network In Zambia
Learning Brief National ICT4D Network Zambia May 2010 e-brain hosts an ICT4D Radio Programme that is broadcasted three times a week on the Zambian radio station Hone FM. e-brain Forum of Zambia The National
More informationGermany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
More informationThe Independent Police Complaints Commission (IPCC) Consultation on HMIC s Proposed 2014/15 Inspection Programme
CONSULTATION RESPONSE TO HMIC FROM The Independent Police Complaints Commission (IPCC) REGARDING Consultation on HMIC s Proposed 2014/15 Inspection Programme The IPCC and its remit The IPCC s primary statutory
More informationRECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY
RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY NATIONAL SECURITY COUNCIL SECRETARIAT Salient Features of the JWG Report on Engagement with Private Sector on
More informationReport on Canadian Interest in Internet Governance November 2010
Report on Canadiann Interest in Internet Governance November 20100 Report Title: Report on Canadian Interest in Internet Governance Date Published: November 2010 The Canadian Internet Registration Authority
More informationEN 31IC/11/R7 Original: English Adopted
EN 31IC/11/R7 Original: English Adopted 31st INTERNATIONAL CONFERENCE OF THE RED CROSS AND RED CRESCENT Geneva, Switzerland 28 November 1 December 2011 Strengthening normative frameworks and addressing
More informationStatement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy
Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy We thank the administration for this valuable opportunity to engage in a national
More informationFörsäkringskassan. (Swedish Social Security Agency) Computer Analyses to Identify Frauds 2013 Page 1
Försäkringskassan (Swedish Social Security Agency) Computer Analyses to Identify Frauds 2013 Page 1 Håkan Hagberg Internal investigations Computer analyses Identify frauds against Försäkringskassan Computer
More information48th Session of the International Conference of Education (ICE)
48th Session of the International Conference of Education (ICE) Inclusive Education : The Way of the Future 25-28 November 2008 Geneva, Switzerland, UNESCO- IBE Organised by: With the participation of
More informationESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
More informationINFORMATION SECURITY AWARENESS & TRAINING PROGRAM
INFORMATION SECURITY AWARENESS & TRAINING PROGRAM By Serah Francis MSc Student, Gjøvik University, Norway ISES Member IFIP TC3 ISES Project INTRODUCTION Africa has 167 million Internet Users and is estimated
More informationPayment Systems Regulator
BRIEFING PAPER Number 06866, 25 February 2016 Payment Systems Regulator By Timothy Edmonds Inside: 1. Payment services in the UK 2. Establishing the Regulator 3. Regulatory activity www.parliament.uk/commons-library
More informationMultisectoral collaboration
Unit 6. MULTISECTORAL COLLABORATION 89 UNIT 6 Multisectoral collaboration Overview Objectives Why collaborate? What kind of collaboration can be developed? Activity International collaboration National
More informationNational Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA
FEATURE ADDRESS BY THE HON. KHEMRAJ RAMJATTAN, M.P., VICE-PRESIDENT AND MINISTER OF PUBLIC SECURITY AT THE OPENING OF A National Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA August 12 13,
More informationFOR DEBATE AND GUIDANCE
INTERNATIONAL LABOUR OFFICE GB.304/MNE/1 304th Session Governing Body Geneva, March 2009 Subcommittee on Multinational Enterprises MNE FOR DEBATE AND GUIDANCE FIRST ITEM ON THE AGENDA Update on strategic
More informationITU Regional Cybersecurity Forum 2008 Lusaka, Zambia
Common Market for Eastern and Southern Africa ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia Document RFL/2008/01-E Rev.1 29 August 2008 Original: English Meeting Report : ITU Regional Cybersecurity
More informationVacancy Announcement
Vacancy Announcement Job Title: Legal Advisor Number of vacancies: 1 vacancy Nationality: Somali Employer: National Independent Electoral Commission References Required 3 references Deadline for applications
More informationHelmut Wacket Head of Oversight Division. Cybersecurity: regulatory framework and central bank initiatives in the EU
Helmut Wacket Head of Oversight Division Cybersecurity: regulatory framework and central bank initiatives in the EU Cybersecurity in the EU Securing network and information systems in the EU is essential
More informationInformation Communication Technology
Information Communication Technology Strategic Plan 2011 15 BTS11/00102 Commonwealth of Australia 2011 This work is copyright. You may download, display, print and reproduce this material in unaltered
More informationUNIT 6. Government Accountability and Parliamentary Committees
UNIT 6. Government Accountability and Parliamentary Committees Learning Objectives What role do parliamentary committees play in assuring government accountability? After studying this unit you should
More informationObjectives, Achievements, Challenges and Opportunities
Association of Regulators of Information and Communications for Eastern and Southern Africa (ARICEA) Objectives, Achievements, Challenges and Opportunities A Presentation to the Informal Meeting of Associations
More informationNOTIFICATION FOR THE VACANCY OF THE POST OF SECRETARY GENERAL OF CPA - INTERNATIONAL JOB DESCRIPTION
NOTIFICATION FOR THE VACANCY OF THE POST OF SECRETARY GENERAL OF CPA - INTERNATIONAL JOB DESCRIPTION Job title: Reporting to: Secretary-General/Chief Executive Officer (CEO) General Assembly/Executive
More informationTentative Action Plan
Republic of Serbia Ministry of Science and Environmental Protection Serbia and Montenegro Tentative Action Plan Draft 1 Belgrade, September 2005 Tentative Action Plan - Draft 1 Section 1 and 2 Information
More informationInformation Security Seminar 2013
Information Security Seminar 2013 Mr. Victor Lam, JP Deputy Government Chief Information Officer Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative
More informationEmpowerment and Leadership Skills Development Programme for Girls
Empowerment and Leadership Skills Development Programme for Girls Situation Analysis The number of women elected as Members of Parliament is a practical proxy measure of the state of gender equality in
More informationCERT.AZ description as per RfC 2350
CERT.AZ description as per RfC 2350 Contact Cyber Security Center (CSC) Computer Emergency Response Team (CERT) Address Block 702, Drogal lane Baku, Azerbaijan Telephone: +99412 4932056 +99412 4932057
More informationJOB DESCRIPTION. Post Title: PRINCIPAL S PA. Post Holder: [ADD POST HOLDER NAME]
JOB DESCRIPTION Post Title: PRINCIPAL S PA Post Holder: [ADD POST HOLDER NAME] The description of the duties, responsibilities and accountabilities for the post of Principal s PA within the Trust have
More informationPRINCIPLES AND GOOD PRACTICES
ISSAI 21 The International Standards of Supreme Audit Institutions, ISSAI, are issued by the International Organization of Supreme Audit Institutions, INTOSAI. For more information visit www.issai.org
More informationHPF Tool. Template for the Performance and Accountability Statement Second round reviews. Amended December 2012
HPF Tool Template for the Performance and Accountability Statement Second round reviews Amended December 2012 The High Performance Framework was developed by the Public Sector Performance Commission. This
More informationCapacity Building in Cyberspace Security
Capacity Building in Cyberspace Security Muhammad Amir Malik Member (IT), Government of Pakistan amir@moitt.gov.pk Sequence of Presentation Country Profile of Pakistan ICT Profile of Pakistan Cyberspace
More informationITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union
ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY
More informationBUILDING A CROWN CORPORATION DIRECTOR PROFILE
BUILDING A CROWN CORPORATION DIRECTOR PROFILE Prepared by: Management Priorities and Senior Personnel Secretariat Privy Council Office In collaboration with: Renaud Foster Management Consultants June 2001
More informationRegional Road Safety Capacity Building Workshop BW Hotel M (Belgrade), October 15-16, 2014. Eric Howard, Whiting Moyne Consulting
UN I T E D NA T I O N S EC O N O M I C CO M M I S S I O N F O R EU R O P E Republic of Serbia Ministry of Construction, Transport and Infrastructure Regional Road Safety Capacity Building Workshop BW Hotel
More informationPPIAF Assistance in Afghanistan
August 2012 PPIAF Assistance in Afghanistan Emerging from a decade of war, massive support from various development partners has been pouring in over the last few years to help rebuild Afghanistan. PPIAF
More information2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
More informationENQA Review 2011: Empfehlungen und deren Umsetzung durch das OAQ / 1. Implementation of the ENQA recommendations on ESG Part 2
ENQA Review 2011: Empfehlungen und deren Umsetzung durch das OAQ / 1 Implementation of the ENQA recommendations on ESG Part 2 ESG 2.1 Use of internal quality assurance procedures (ENQA Criterion 1) External
More informationCybersecurity Initiatives
Port Vila, 20 November 2014 The Government of The Republic of Vanuatu Cybersecurity Initiatives Telecommunications & Radiocommunications Regulator By Louise Nasak, Technical and Internet Governance Manager,
More informationESKITP714401 Implement procedures and standards relating to metrics for IT service delivery
Overview This sub-discipline covers the competencies required to perform performance metrics. Monitoring service level performance is a complex task requiring collection of data, detailed analysis, and
More informationEU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
More informationDIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
More informationNewsletter. Opening letter from Chair, Jeremy Newman
Newsletter Opening letter from Chair, Jeremy Newman Dear Stakeholders Happy New Year to you all. 2015 is shaping up to be a very exciting and challenging year for the SSRO. Hopefully you will be aware
More informationCYSPA - EC projects supporting NIS
CYSPA - EC projects supporting NIS Nina Olesen, EOS March 2014 Athens, Greece www.cyspa.eu CYSPA the European project The European Cyber Security Protection Alliance, or CYSPA, is an initiative by 17 organisationsfrom
More informationOpportunities for strengthening international cooperation for the protection of children from sexual violence including on-line
Opportunities for strengthening international cooperation for the protection of children from sexual violence including on-line Exploring the role and potential of existing platforms to promote a safe,
More informationThe Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices
The Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices Hans Born, Senior Fellow, DCAF Geneva Brussels, 29 April 2004 Presentation given at the Book
More informationCybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
More informationCyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority
More informationNATIONAL TREASURY STRATEGIC PLAN 2011/14
NATIONAL TREASURY STRATEGIC PLAN 2011/14 PRESENTATION TO PARLIAMENTARY FINANCE COMMITTEES Presenter: Lungisa Fuzile Director General, National Treasury 31 May 2011 TREASURY AIMS AND OBJECTIVES Chapter
More informationUniversal Periodic Review
Universal Periodic Review Civil society Follow-up Kit 2014 Nomenclature CAT CRPD ECOSOC HRC ICC ICESCR MIA NGO NHRI OHCHR SuR UPR Convention against Torture Convention on the Rights of Persons with Disabilities
More informationDay 3-24 April 2013. Day 2-23 April 2013
Day 1-22 April 2013 09.00 Joint International Telecommunications Union (ITU) & Commonwealth Telecommunications Organisation (CTO) project to implement Child Online Protection: Workshop for Cameroon Kim
More informationGovernment of Antigua and Barbuda Public and Social Sector Transformation Project Project Preparation Advance (P4650-001)
Government of Antigua and Barbuda Public and Social Sector Transformation Project Project Preparation Advance (P4650-001) Terms of Reference Communications Specialist for Public and Social Sector Transformation
More informationThe Relationships between the Public Accounts Committee and the Auditor General Office
The Relationships between the Public Accounts Committee and the Auditor General Office Professor Zahirul Hoque Executive Director, Centre for Public Sector Governance, Accountability and Performance, La
More informationExpert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cyberlaws and Regulations for enhancing e-commerce including Case Studies
More informationPROPOSED MANDATE FOR THE GLOBAL PARTNERSHIP FOR EFFECTIVE DEVELOPMENT CO-OPERATION
PROPOSED MANDATE FOR THE GLOBAL PARTNERSHIP FOR EFFECTIVE DEVELOPMENT CO-OPERATION This document sets out the proposed mandate of the Global Partnership for Effective Development Co-operation. It was discussed
More informationEvaluation of the status of the e-government in Comoros
Evaluation of the status of the e-government in Karim Attoumani Mohamed, Abstract E-government consists of the use of information and communication technologies (ICTs) by a government to transform itself
More informationFinnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva
Finnish Cyber Security Strategy Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva 1 Changing threat landscape 2 Annual losses caused by cybercrime over $400 billion
More informationOverview TECHIS60241. Carry out risk assessment and management activities
Overview Information in all its forms is a vital component of the digital environment in which we live and work. The protection of information in its physical form is well understood but the protection
More informationESKISP6046.02 Direct security architecture development
Overview This standard covers the competencies concerned with directing security architecture activities. It includes setting the strategy and policies for security architecture, and being fully accountable
More informationCyber Security: Policy of the Internet Infrastructure
Cyber Security: Policy of the Internet Infrastructure Dr. Basuki Yusuf Iskandar Acting Director General of Post and Telecommunications/ Secretary General of MCIT Republic of Indonesia 2009 ITU Regional
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More information