Global Cybersecurity Agenda (GCA) A framework for international cooperation
|
|
|
- Kathleen Lester
- 10 years ago
- Views:
Transcription
1 Open-ended Intergovernmental Expert Group on Cybercrime Vienna, January 2011 Global Cybersecurity Agenda (GCA) A framework for international cooperation Alexander NTOKO Head, Corporate Strategy Division 1
2 Growing Cybersecurity Threats ICTs have become an integral part of information society. ICT networks are regarded as basic national infrastructure. ICTs are also exposing our societies to the threat of cyberwar/cyberattacks. Vulnerability of national infrastructures increases as the use of ICTs take root. Cyber attacks on ICTs are borderless and can be launched from virtually anywhere. As global reliance on ICTs grows, so does vulnerability to attacks on critical infrastructures through cyberspace. i.e., Attacks against computer systems in Georgia & Azerbaijan (2008), Brazil (2008), S.Korea and the US (2009), and Google/Twitter(2009) No geographical borders, no boundaries and tremendous destructive power 2
3 National Responses Developing National Computer Incident Response Teams (CIRTs) Enhancing public-private partnerships to enhance expertise, knowledge, skills, resources & experience Enhancing International Cooperation Also, many governments are preparing themselves for Cyber-defense as well as Cyber-offense : Cyberwarfare - Network-based attack and/or defense - Building cyber capabilities as a part of conventional warfare, including cyber military outfits - Cultivating cyber tactics as a national resource - Educating citizens and raising awareness of cybersecurity problems 3
4 Key Cybersecurity Challenges Lack of adequate and interoperable national or regional legal frameworks Lack of secure software and ICT-based applications Lack of appropriate national and global organizational structures to deal with cyber incidents Lack of information security professionals and skills within governments; lack of basic awareness among users Lack of international cooperation between industry experts, law enforcements, regulators, academia & international organizations to address a global challenge 4
5 Global Cybersecurity Cooperation The lack of cybersecurity is a global problem that cannot be solved by any single entity alone! The world is faced with the challenging task of developing harmonized and comprehensive strategies at the global level and implementing these with the various relevant national, regional, and international stakeholders in the countries 5
6 Introduction to ITU Leading UN specialized agency for information and communication technologies (ICTs). Founded in 1865, ITU is the oldest specialized agency in the UN system. Global focal point for governments and the private sector with 191 Member States, 900+ Sector Members and Associates. ITU Headquartered in Geneva, Switzerland; 11 regional/area offices and staff from nearly 100 countries. 6
7 ITU and Cybersecurity In 2003, world leaders at the World Summit on the Information Society (WSIS) entrusted ITU as sole facilitator for WSIS Action Line C5 - Building Confidence and Security in the use of ICTs Since the 2006 ITU Plenipotentiary Conference, ITU Secretary-General has set cybersecurity as one of his top three priorities On 17 May 2007, in response to the decision of the ITU Membership and in fulfillment of ITU s role as sole facilitator for WSIS Action Line C5, ITU Secretary-General launched the Global Cybersecurity Agenda (GCA) a framework for international cooperation in cybersecurity ITU World Conferences and the 2010 ITU Plenipotentiary Conference further strengthened the role of ITU in cyberseucirty and endorsed the GCA as the ITU-wide strategy on international cooperation 7
8 High-Level Expert Group (HLEG) The High-Level Expert Group (HLEG) on Cybersecurity was established in It is comprised of over 100 renowned experts from a broad range of backgrounds, sectors and geographical regions. These experts worked tirelessly to formulate proposals to the ITU Secretary-General on strategies to curb cyberthreats, combat cybercrime and promote cybersecurity. Its outputs include the Report of the Chairman of the HLEG, a set of strategic proposals, and the HLEG Global Strategic Report, which summarizes the HLEG s work in seeking to promote cybersecurity around the world. 8
9 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration with and between all relevant partners, and building on existing initiatives to avoid duplicating efforts. GCA builds upon five pillars: 1. Legal Measures 2. Technical and Procedural Measures 3. Organizational Structures 4. Capacity Building 5. International Cooperation Since its launch, GCA has attracted the support and recognition of leaders and cybersecurity experts around the world. H.E. Blaise Compaoré, President of Burkina Faso, and H.E. Dr Óscar Arias Sánchez, Former President of the Republic of Costa Rica and Nobel Peace Laureate, are both Patrons of the GCA. 9
10 GCA: From Strategy to Action 1. Legal Measures 1. Legal Measures ITU Toolkit for Cybercrime Legislation ITU Publication on Understanding Cybercrime: A Guide for Developing Countries 3. Organizational Structures 3. Organizational Structures National CIRT establishment 4. Capacity Building 4. Capacity Building ITU National Cybersecurity Strategy Guide ITU Botnet Mitigation Toolkit and pilot projects Regional Cybersecurity Seminars Cybersecurity Assessment and Self assessment Global Cybersecurity Agenda (GCA) Technical Technical and and Procedural Procedural Measures Measures ITU Standardization Work ICT Security Standards Roadmap ITU-R Security Activities ITU-T Study Group 17 ITU-T Study Group International International Cooperation Cooperation ITU High-Level Expert Group (HLEG) ITU-IMPACT Collaboration ITU Cybersecurity Gateway ITU s Child Online Protection (COP) Collaboration with UNICEF, UNODC, UNICRI, UNICITRAL and UNDIR 10
11 Collaboration towards A Global Strategy The world s foremost cybersecurity alliance! Within GCA, ITU and the International Multilateral Partnership Against Cyber Threats (IMPACT) are pioneering the deployment of solutions and services to address cyberthreats on a global scale. ITU-IMPACT s endeavor is the first truly global multi-stakeholder and public-private alliance against cyber threats, staging its state-of-the-art facilities in Cyberjaya, Malaysia. An operational home of ITU s Global Cyber Security Agenda (GCA), it supports 191 Member States and others with the expertise, facilities and resources to effectively enhance the global community s capability and capacity to prevent, defend against and respond to cyber threats. 11
12 GCA and ITU-T Activities ITU-T Study Group 17 Lead Study Group for Telecommunication Security Mandate for Question 4/17 (Q.4/17): Cybersecurity Provides ICT Security Standards Roadmap ITU-T Cybersecurity Information Exchange Framework (CYBEX): September 2009 ITU-T Security Manual "Security in telecommunications and information technology (4 th ed.): Scheduled for publication in 2010 Draft summaries of Study Group 17 recommendations Focus Group on Identity Management (IdM) Approved over 100 Recommendations on security for communication Facilitates collaboration among national Computer Incident Response Teams (CIRTs) WTSA Resolutions ITU WTSA Resolution 50: Cybersecurity (Rev. Johannesburg, 2008) ITU WTSA Resolution 52: Countering and combating spam (Rev. Johannesburg, 2008) ITU WTSA Resolution 58: Encourage the creation of national computer incident response teams, particularly for developing countries (Johannesburg, 2008) 12
13 GCA and ITU-D Activities Assisting developing countries in bridging the digital divide by advancing the use of ICT-based networks, services and applications, and promoting cybersecurity ITU National Cybersecurity/CIIP Self-Assessment Tool ITU Botnet Mitigation Toolkit ITU Cybercrime Legislation Resources ITU-D Study Group Q 22/1 : Securing information and communication networks: best practices for developing a culture of cybersecurity ITU Toolkit for Promoting a Culture of Cybersecurity Regional workshops and capacity building activities related to cybercrime legislation and enforcement A Background paper on Cybersecurity: The Role and Responsibilities of an Effective Regulator (Global Symposium for Regulators (GSR), November 2009) WTDC Resolutions ITU Hyderabad Declaration, Paragraph 13 & 14 (2010) 13. [ ] the challenge of building confidence and trust in the availability, reliability, security and use of telecommunications/icts [.] can be addressed by promoting international coordination and cooperation in cybersecurity, taking into account, inter alia, the ITU Global Cybersecurity Agenda (GCA), as well as the development of related public policies and elaboration of legal and regulatory measures, including building capacity, to ensure cybersecurity, including online protection of children and women. 13
14 GCA and ITU-R Activities Establish fundamental security principles for IMT-2000 (3G) networks Issue ITU-R Recommendation on security issues in network management architecture for digital satellite system and performance enhancements of transmission control protocol over satellite networks ITU-R Recommendations Recommendation ITU-R M.1078: Security principles for International Mobile Telecommunications-2000 (IMT-2000) Recommendation ITU-R M.1223: Evaluation of security mechanisms for IMT-2000 Recommendation ITU-R M.1457: Detailed specifications of the radio interfaces of International Mobile Telecommunications-2000 (IMT-2000) Recommendation ITU-R M.1645: Framework and overall objectives of the future development of IMT and systems beyond IMT-2000 Recommendation ITU-R S.1250: Network management architecture for digital satellite systems forming part of SDH transport networks in the fixed-satellite service Recommendation ITU-R S.1711: Performance enhancements of transmission control protocol over satellite networks 14
15 ITU s Child Online Protection Under the GCA umbrella, ITU initiated the Child Online Protection initiative (COP) in November COP has been established as an international collaborative network for promoting the online protection of children and young people worldwide by providing guidance on safe online behavior. Key Objectives of COP Identify risks and vulnerabilities to children in cyberspace Create awareness Develop practical tools to help minimize risk Share knowledge and experience 15
16 Launching COP Global Initiative In 2010 the President of Costa Rica, H.E. Laura Chinchilla, became the new patron of COP. Together with Costa Rica, the ITU Secretary- General launched the COP Global Initiative with high-level deliverables. Through this initiative, ITU is taking the next steps to develop a cybersecurity strategy for child online safety, delivering significant national benefits. 16
17 Collaboration towards A Global Strategy The world s foremost cybersecurity alliance! Within GCA, ITU and the International Multilateral Partnership Against Cyber Threats (IMPACT) are pioneering the deployment of solutions and services to address cyberthreats on a global scale. ITU-IMPACT s endeavor is the first truly global multi-stakeholder and public-private alliance against cyber threats, staging its state-of-the-art facilities in Cyberjaya, Malaysia. An operational home of ITU s Global Cyber Security Agenda (GCA), it supports 191 Member States and others with the expertise, facilities and resources to effectively enhance the global community s capability and capacity to prevent, defend against and respond to cyber threats. 17
18 ITU IMPACT Collaboration What is IMPACT? The International Multilateral Partnership Against Cyber Threats (IMPACT) is the first global public private partnership against cyberthreats. What is the ITU IMPACT Mandate? Under the GCA framework, ITU IMPACT alliance provides an open partnership platform for international cooperation between governments, industry leaders, academia and law enforcement agencies in order to facilitate the establishment of cybersecurity strategies and critical information infrastructure protection, to enhance coordination and cooperation in securing cyberspace. Why ITU IMPACT Collaboration? While it is important to have a national strategy in the government agenda, this is often not enough to secure cyberspace, which cannot be defined by geographic borders. Most developing countries do not have the proper expertise and know-how required for effectively planning and implementing these strategies and structures. 18
19 ITU IMPACT Collaboration Industry Experts Academia International Bodies Think Tank IMPACT s Global Alliances 19
20 ITU-IMPACT Key Partners ITU IMPACT has also developed a global partnership with major industries, academia, and international bodies more universities This partnership allows each country to strengthen its capability to protect the security of national ICT infrastructure. 20
21 ITU-IMPACT International Advisory Board Dr. Hamadoun Touré Secretary General of International Telecommunications Union (ITU) Eugene Kaspersky Founder and CEO of Kaspersky Lab Mikko Hypponen Chief Research Officer of F-Secure Steve Chang Founder and Chairman of Trend Micro Ayman Hariri Chairman of Oger Systems John W. Thompson Chairman of Symantec Corporation Prof. Fred Piper Cryptologist, Founder of the Information Security Group at Royal Holloway, University of London 21
22 ITU IMPACT Activities The ITU is facilitating the implementation process, managing communication and needs assessment with Member States and coordinating with IMPACT, to ensure effective delivery of the services provided. Global Response Centre Global Early Warning System, detecting and monitoring cyber-threats National CIRT Computer Incident Response Teams (CIRTs) and Incident Management capabilities at National level Capacity Building Capacity building and training, on-site, on-line, and training on the job Regional workshops and events, to ensure sustainability and operations of the solutions Direct assistance to countries, to map the deployment with the needs of the Administration 22
23 Global Response Centre Main Objectives: GRC acts as the foremost cyber threat resource centre for the global community. It provides emergency response to facilitate identification of cyber threats and sharing of resources to assist Member States Two Prime Highlights NEWS (Network Early Warning System) Information collaboration platform providing Real time threat monitoring and assessment Statistical cyber threat trend analysis Malware threat centre ESCAPE (Electronically Secure Collaboration Application Platform for Experts) A collaborative platform for authorized cyber experts to pool resources and remotely collaborate with each other in a secure and trusted environment A comprehensive and growing database of key resources around the world 23
24 Current status of collaboration In just over one year, nearly 70 countries, out of a potential 191 countries, have confirmed their agreement to join ITU-IMPACT: 24
25 Establishing National CIRTs Main objectives: To provide Incident Management, Advisories and Mailing List services, integrated with the Global Response Centre Incident Response and Handling Incident Response and Handling Vulnerability Analysis and Handling Vulnerability Analysis and Handling Alerts and Warnings Alerts and Warnings Technology Watch Technology Watch Training and Awareness Training and Awareness ITU supports countries in the implementation of the National CIRT through the establishment of the overarching policy framework to support this technical solution and related watch, warning and incident response capabilities as part of a national strategy. 25
26 Objectives: ITU IMPACT CIRT activities - To assist partner countries assessment of its readiness to implement a National CIRT. - IMPACT reports on key issues and analysis, recommending a phased implementation plan for National CIRT. - Training courses for capacity building also provided. - In later stages the national CIRT will also be provided with enabling tools. Following the assessment exercises, ITU is now moving to the implementation phase, according to requests for assistance from Member States 26
27 ITU IMPACT Cybersecurity Assessments ITU-IMPACT Cybersecurity workshop in Kabul, Afghanistan (October, 2009) ITU-IMPACT Cybersecurity workshop for East Africa: Kenya, Tanzania, Uganda and Zambia (26 29 April, 2010) ITU-IMPACT Cybersecurity workshop for West Africa: Burkina Faso, Côte d'ivoire, Ghana, Nigeria, Mali and Senegal (17 21 May, 2010) ITU-IMPACT Cybersecurity workshop for Bhutan & Bangladesh (1 11 June, 2010) ITU-IMPACT Cybersecurity workshop for Nepal & Maldives (14 25 June, 2010) 27
28 ITU IMPACT Training and Skills Development IMPACT-Microsoft Network Forensics & Investigation Course: 6 9 April 2010 (Brunei) Closed session for law enforcement agencies 4 countries participated IMPACT Network Forensics Course: 3rd 7th May 2010 (IMPACT Global HQ) Class conducted for 22 participants from 5 countries IMPACT-SANS IPv6 Training: 26th May 2010 (IMPACT Global HQ) Training conducted by Dr Ullrich (SANS Internet Storm Center) 72 participants 28
29 ITU IMPACT Partner Engagement IMPACT-Microsoft Critical Information Infrastructure Protection Seminar December Session conducted by Angela McKay Microsoft Corporation, US IMPACT-Trend Micro seminar on The Botnet Storm: Challenges & Global Cooperation 14th April Session conducted by Raimund Genes, CTO of Trend Micro IMPACT-Kaspersky Seminar on Formulating Effective Global Counter-Phishing Efforts, 3rd March Session conducted by Michael Molsner, Malware Analyst, Kaspersky Lab, Japan 29
30 IMPACT-SANS Community Night Offensive Countermeasures & 20 Critical Security Controls Perspective 1st July Session conducted by Dr Eric Cole, SANS Faculty Fellow & CTO of McAfee together with John Strand, SANS Certified Instructor IMPACT-GuardTime Seminar on The Estonian Attack What Really Happened 19th July Session conducted by Dr. Jaan Priisalu, Co-Founder of CyberDefense League, Estonia & Mike Gault, CEO, GuardTime, Estonia IMPACT-Kaspersky Media Roundtable. IMPACT Chairman, Datuk Mohd Noor Amin & Kaspersky Founder, Eugene Kaspersky - Session held at St Regis Hotel, Singapore, October 2009 IMPACT-Symantec Media Roundtable. IMPACT Chairman, Datuk Mohd Noor Amin & Symantec CTO, Mark Bergman - Session held at JW Marriot, Kuala Lumpur, December
31 Cybersecurity Service Deployed 31
32 Training and Skills Development 32
33 ITU IMPACT s 4 Work Areas 1. IMPACT s Centre for Global Response (GRC) Global platform for alerts, early warning and cooperation; emergency response to facilitate identification of cyberthreats and share information and resources to assist Member States in taking appropriate action. - Network Early Warning System (NEWS) Collaboration with global industry partners - Electronically Secure Collaborative Application Platform for Experts (ESCAPE) - Key experts and personnel from partner countries (law enforcement, regulators, country focal, cybersecurity experts, etc) 33
34 2. IMPACT s Centre for Training and Skills Development Scholarships for developing countries and organization of specific training workshops to facilitate knowledge sharing among cybersecurity community. - Specialized training programs - Specialized seminars & workshops - Trainings via ITU s Centre of Excellence (CoE) - Scholarship programs partnership with global certification bodies SANS (US$1 mil grant) EC-Council (US$1 mil grant) Global certification courses (ISC)2 34
35 3. IMPACT s Centre for Security Assurance and Research Establishment of CIRT, charged with the responsibility of serving as a trusted, central coordination cybersecurity point of contact within a country, aimed at identifying, defending, responding to and managing cyberthreats. - Security Assurance IMPACT Government Security Scorecard (IGSS), CIRT-Lite (Computer Incident Response Team), Professional services (vulnerability assessment, security audits, etc.) - Research Facilitation & coordination of cybersecurity research through IMPACT Research Online Network (IRON) 35
36 4. IMPACT s Centre for Policy and International Cooperation With the support of ITU, the Centre fosters international cooperation through specific programmes such as coordinated cyberdrill exercises between countries. - Policy: Harmonization of policies, policy advisory & best practices World Cyber Security Summit Panel of Policy Expert Advisors - International cooperation: Partner country coordination, partnership and collaboration with industry, academia & international organizations 36
37 IMPACT Awards IMPACT received double honours at (ISC)2 s annual Asia Pacific Information Security Leadership Achievements (ISLA) Program 2010 (Singapore, July 2010) - Senior Information Security Practitioner Award Honouree: Philip Victor Director of Training, Skills Development & Outreach - Information Security Practitioner Award Honouree: Sivanathan Manager, GRC Professional Services 37
38 UN Delivering-As-One The United Nations Chief Executive Board (CEB) the highest level coordination mechanism within UN, has given high priority to Cybersecurity, following a proposal from the ITU Secretary General, on a UN-wide strategy The CEB welcomed the GCA as a framework to be applied also within the UN, in order to deliver security services to UN agencies (for instance through the ITU IMPACT, and as a mechanism for Inter agency coordination ITU and UN ODC have been identified as lead UN bodies in cybersecurity and cybercrime The ITU Secretary General and UN ODC Executive Director agreed to establish formal collaboration, in accordance with the mandates ITU and UNODC for a harmonized UN-wide strategy for Cybersecurity and Cybercrime 38
39 Conclusions Cybersecurity is a global issue and it requires a global response. ITU, as the sole Facilitator of WSIS Action Line C5, is in a unique position to promote international cooperation through its Global Cybersecurity Agenda (GCA) and the ITU-IMPACT s endeavor which is the first truly global multi-stakeholder and public-private alliance against cyber threats Cooperation and coordination between Member States, through United Nations is indispensable to reach consensus on global strategies and involve all relevant bodies and stakeholdesrs Only by joining forces and bringing together our strategic capabilities will we be able to address current and emerging cyberthreats! 39
40 THANK YOU For further information
ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union
ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY
Overview of ITU Cybersecurity Activities
Overview of ITU Cybersecurity Activities Workshop on NGN Regulation & Migration Strategies 13 & 15 October 2010 New Delhi, India Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific
Cyber Security @ ITU. By Tomas Lamanauskas, ITU
Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and
Cybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund
Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)
Regional Seminar on Cyber Preparedness Organised by World Bank Group, Financial Sector Advisory Center (FINSec) ITU s work in Cybersecurity and Global Cybersecurity Index (GCI) Vijay Mauree Programme Coordinator,
Cybersecurity @ ITU. Carla Licciardello Policy Analyst [email protected]. www.itu150.org
Cybersecurity @ ITU Carla Licciardello Policy Analyst [email protected] www.itu150.org Where are we coming from Specialized agency of the UN for telecommunications and ICTs Some more info about
(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
ITU Global Cybersecurity Agenda (GCA)
International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,
The global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009
ITU Cybersecurity Work Programme to Assist Developing Countries 2007-2009 ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector December
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cyber Security Challenges & Capacity Building By Marco Obiso International
INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 4/17 Geneva, 11-20 February 2009 Ref. : TD 0244 Rev.2 Source:
INCO for Cyber Security. PTCIF: 21st Feb 2014
INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.
ITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
RESOLUTION 102 (REV. BUSAN, 2014)
RESOLUTION 102 (REV. BUSAN, 2014) ITU's role with regard to international public policy issues pertaining to the Internet and the management of Internet resources, including domain names and addresses
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority
Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:
3 rd EAIGF (2010 EAIGF) rd EAIGF 11 TH 13 TH AUGUST 2010, KAMPALA, UGANDA SECURITY MANAGEMENT IN EAST AFRICA: The East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant
ITU NATIONAL CYBERSECURITY STRATEGY GUIDE
ITU NATIONAL CYBERSECURITY STRATEGY GUIDE September 2011 THE ITU NATIONAL CYBERSECURITY STRATEGY GUIDE Dr. Frederick Wamala (Ph.D.), CISSP I. EXECUTIVE SUMMARY 4 1 EXECUTIVE SUMMARY 1.1 OVERVIEW We use
Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.
Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating
ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia
Common Market for Eastern and Southern Africa ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia Document RFL/2008/01-E Rev.1 29 August 2008 Original: English Meeting Report : ITU Regional Cybersecurity
CYBERSECURITY INDEX OF INDICES
Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
2013 ITU survey on measures taken to raise awareness on cybersecurity
2013 ITU survey on measures taken to raise awareness on cybersecurity Securing information and communication networks: best practices for developing a culture of cybersecurity SURVEY BACKGROUND Raising
Nuclear Security Plan 2014 2017
Atoms for Peace Board of Governors General Conference GOV/2013/42-GC(57)/19 Date: 2 August 2013 For official use only Item 4(b) of the Board s provisional agenda (GOV/2013/37) Item 16 of the Conference's
Day 3-24 April 2013. Day 2-23 April 2013
Day 1-22 April 2013 09.00 Joint International Telecommunications Union (ITU) & Commonwealth Telecommunications Organisation (CTO) project to implement Child Online Protection: Workshop for Cameroon Kim
AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION)
AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION) AG/RES. 2004 (XXXIV-O/04) ADOPTION OF A COMPREHENSIVE INTER-AMERICAN STRATEGY TO COMBAT THREATS TO CYBERSECURITY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY
A Global Protocol on Cybersecurity and Cybercrime
Stein Schjølberg and Solange Ghernaouti-Hélie A Global Protocol on Cybersecurity and Cybercrime An initiative for peace and security in cyberspace Cybercrimedata Stein Schjolberg and Solange Ghernaouti-Hélie
Infocomm Security Masterplan 2
INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm
ASEAN s Cooperation on Cybersecurity and against Cybercrime
ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms
ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests
ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP
Lith Networking and Network Marketing Safety
DIRECTION TO SUCCESS. PUBLIC AND PRIVATE SECTORS PARTNERSHIP WSIS Action Line Facilitation Meeting: Building confidence and security in the use of ICTs (C5) Partnerships for Global Cybersecurity ITU Geneva,
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,
Opportunities for strengthening international cooperation for the protection of children from sexual violence including on-line
Opportunities for strengthening international cooperation for the protection of children from sexual violence including on-line Exploring the role and potential of existing platforms to promote a safe,
CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration
PROGRAMME 14 April 2015 13.00 14.00 Lunch / Delegates Registration 14.00 14.10 Opening and Keynote by Panel Chair Getting Ahead of the Threat: Building Cybersecurity Dr Madan Oberoi Director, Cyber Innovation
TELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA
TELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA (TESPOK) BACKGROUND TESPOK is a professional, non-profit organization representing the interests of telecommunication service providers in Kenya.
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by INTEL DISCLAIMER: The views presented
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
INTERNATIONAL TELECOMMUNICATION UNION. WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Dubai, 20-29 November 2012
INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Dubai, 20-29 November 2012 Resolution 76 Studies related to
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
ITU-IMPACT Training and Skills Development Course Catalogue
ITU-IMPACT Training and Skills Development Course Catalogue Management Track Technical Track Course Area Management Incident Response Digital Forensics Network Application Law Enforcement Foundation Management
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
National Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
UN Emergency Summit on Cyber Security Topic Abstract
UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international
Michael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
Cyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
Survey of Cyber Security Frameworks
Survey of Cyber Security Frameworks Alice Nambiro Wechuli (Department of Computer Science, Masinde Muliro University of Science and Technology, Kenya [email protected]) Geoffrey Muchiri Muketha (Department
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
Harmful Interference into Satellite Telecommunications by Cyber Attack
Kobe and QM Symposium on International Law "Diversity of Transnational Criminal Justice" Harmful Interference into Satellite Telecommunications by Cyber Attack 10 April 2015 Yuri Takaya Research Fellow/Lecturer,
UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction
UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE 16 April 2014 (Highlighted in yellow below) Introduction 1. The Global Multistakeholder Meeting on the Future of Internet
OAS CYBER SECURITY INITIATIVE. Global Forum on Cyber Expertise (GFCE)
OAS CYBER SECURITY INITIATIVE Global Forum on Cyber Expertise (GFCE) CONTENTS 2 3 9 12 OAS Regional Cyber Security Framework What we offer to our Member States How we do our work ANNEX -A- OAS CYBER SECURITY
TUNIS COMMITMENT. Document WSIS-05/TUNIS/DOC/7 -E 18 November 2005 Original: English
Document WSIS-05/TUNIS/DOC/7 -E 18 November 2005 Original: English TUNIS COMMITMENT 1. We, the representatives of the peoples of the world, have gathered in Tunis from 16-18 November 2005 for this second
QUESTION 22-1/1 S ECURING INFORMATION AND COMMUNICATION NETWORKS: BEST PRACTICES FOR DEVELOPING A CULTURE OF CYBERSECURITY
FINAL REPORT ITU-D STUDY GROUP 1 QUESTION 22-1/1 S ECURING INFORMATION AND COMMUNICATION NETWORKS: BEST PRACTICES FOR DEVELOPING A CULTURE OF CYBERSECURITY 5 T H S T U D Y P E R I O D 2 0 1 0-2 0 1 4 T
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17 TSB Briefing to the Regional Offices, 28 Feb 2011 Martin Euchner Advisor of ITU-T Study Group 17 [email protected]
How To Strengthen Nuclear Security
COUCIL OF TH UROPA UIO N The Hague, 25 March 2014 8193/14 (OR. en) PRSS 187 The Hague uclear Security Summit Communiqué We, the leaders, met in The Hague on 24 and 25 March 2014 to strengthen nuclear security,
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes
United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes Zero Draft Preamble 1. Recalling the request in paragraph 111 of the Tunis Agenda for the Information Society to
GOVERNMENT OF THE REPUBLIC OF LITHUANIA
GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For
ISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014
Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014 1 July 2014 RESTRICTED 1 ICT as a Modern Solution Security Threats, Early Detection and Prevention
How To Protect The Internet From Natural Disasters
Network Security Policy: The U.S. Experience Patricia Cooper International Bureau U.S. Federal Communications Commission Network Security: The U.S. Experience Network Security: How we define it U.S. Approach:
2. Cyber legislation harmonization process in Central Africa
Introduction 1. What is cyber legislation? 2. Cyber legislation harmonization process in Central Africa The sub-region concerned; Partner international organizations in the harmonization of cyber legislation
HCB Human Capacity Building
Human Capacity Building Initiatives Using the Blended Learning Approach 2nd Facilitation Meeting on Action Line C7: e-learning Geneva, Switzerland From 15.00 to 18.00 hours at ITU Headquarters, Rooms K1
Seoul Communiqué 2012 Seoul Nuclear Security Summit
Seoul Communiqué 2012 Seoul Nuclear Security Summit We, the leaders, gathered in Seoul on March 26-27, 2012, renew the political commitments generated from the 2010 Washington Nuclear Security Summit to
CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.
CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE The early 21st century has been defined by the Internet,
SPECIAL EVENT ON CYBERSECURITY AND DEVELOPMENT
SPECIAL EVENT ON CYBERSECURITY AND DEVELOPMENT 9 December 2011, 10:00 a.m. to 1.00 p.m. ECOSOC Chamber, United Nations, New York BIOGRAPHIES Opening session H.E. Mr. Lazarous Kapambwe was elected sixty-seventh
UNDERSTANDING THE CONCEPT OF CYBER SECURITY
UNDERSTANDING THE CONCEPT OF CYBER SECURITY Policy Competition & Economic Analysis Department TABLE OF CONTENTS Table of Contents.....2 Executive Summary..4 1.0 INTRODUCTION...5 1.1 Key Concepts in Cyber
COMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011
COMMISSION DE L UNION AFRICAINE REPUBLIQUE DU SENEGAL ---------------- MINISTERE DE LA COMMUNICATION, DES TELECOMMUNICATIONS ET DES TECHNOLOGIES DE L INFORMATION ET DE LA COMMUNICATION AFRICAN ICT MINISTERIAL
