Day 3-24 April 2013. Day 2-23 April 2013



Similar documents
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum April 2013 Yaoundé, Cameroon

2. Cyber legislation harmonization process in Central Africa

Cybersecurity in the Commonwealth: Setting the Stage

Cyber ITU. By Tomas Lamanauskas, ITU

CURRICULUM VITAE. Kodzo Gadzekpo ADOMEY

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

COMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011

3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security

Mobile Money Services: legal and regulatory challenges The experience of the East African Community

Cybersecurity Governance

Enhancing Professionalization of Human Resource Management in the Public Service in Africa

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda

ICT Regulation: Understanding the Big Picture of ICTs for Development October 2015: CTO Headquarters, London, United Kingdom

INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries

Harmonising Cyber Security Across the Caribbean: CTU Initiatives & Activities

Cybersecurity for ALL

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int.

Michael Yakushev PIR-Center, Moscow (Russia)

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

RUSI Cyber Security Conference 2011 Cyber Challenges for National Security

What legal aspects are needed to address specific ICT related issues?

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

It s all about Europe s future with Cloud. EUROCLOUD FORUM th EuroCloud Congress Barcelona, October 7 9

Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review

Honourable members of the National Parliaments of the EU member states and candidate countries,

National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide

PROGRAMME WEBSITE PROGRAMME ONLINE COURSE DEVELOPMENT CONCLUSION PROGRAMME OVERVIEW. Slide 1

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

Innovating for quality

Cybercrime & Cybersecurity

SECURING PAYMENTS IN THE CYBER WORLD

Opportunities and Challenges in the Next Generation Internet - IPv6, Security and Privacy, Multilingualism and SEO

National Cyber Security Strategy of Afghanistan (NCSA)

Cyber security Country Experience: Establishment of Information Security Projects.

KIGALI DECLARATION ON THE DEVELOPMENT OF AN EQUITABLE INFORMATION SOCIETY IN AFRICA

3 rd GERMAN-AFRICAN INFRASTRUCTURE FORUM NOVEMBER 3 rd 4 th, 2015

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, June 2014

How To Understand And Understand The European Priorities In Information Security

Prof. Udo Helmbrecht

Cyber Security Strategy of Georgia

communications area Communications Area AfriNIC and the Community AfriNIC Public Policy Meetings

ITU National Cybersecurity/CIIP Self-Assessment Tool

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

UNITED NATIONS CONFERENCE ON TRADE AND DEVELOPMENT. Review of e-commerce legislation harmonization in the Economic Community Of West African States

How To Write An Article On The European Cyberspace Policy And Security Strategy

GSR 13. 4th Generation regulation: driving digital communications ahead

UACES 35th Annual Conference and 10th Research Conference The European Union: Past and Future Enlargements. Zagreb, Croatia, 5-7 September 2005

Conference SPONSORSHIP PROPOSAL

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

INVITATION. Smart Grid & Cyber Security Conference

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit

Promoting Cyber security in Africa.

The Ohada and Ecowas Treaties as Tools for Regional Integration and Regulatory Reforms

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation

RWANDA CONTRIBUTION TO CWG-INTERNATIONAL INTERNET RELATED PUBLIC POLICY ISSUES.

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Regional Development Forum for Africa /5/2009 Lusaka (Zambia) Broadband Wireless Infrastructure & IPv6 Issues.

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}

Protection Policy Statement

E-commerce and Development Key Trends and Issues

National Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA

EDUCATION AND SCHOOLS

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

Conference Programme

THE 5 TH MEETING OF THE WORKING GROUP 3 ON ICTs SERVICE TRANSACTIONS AND E-APPLICATIONS, HELD FROM 7 TH - 11 TH SEPTEMBER 2015, ARUSHA TANZANIA

MINISTRY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Internet Society (ISOC)

Overview of ITU Cybersecurity Activities

Global Cybersecurity Index Good Practices

African Development Bank

Programme of the FIDE XXVIIth Congress Budapest, May 2016

CYBERSECURITY IN ROMANIA - DRAFT PROGRAMME -

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA

A Summary of the National NGO Policy July 2012

Establishing and supporting CERTs for Internet security

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

The Brazilian Internet Steering Committee CGI.br Internet Governance Model in Brazil

Transcription:

Day 1-22 April 2013 09.00 Joint International Telecommunications Union (ITU) & Commonwealth Telecommunications Organisation (CTO) project to implement Child Online Protection: Workshop for Cameroon Kim SANCHEZ, Director of Online Security, Microsoft 12.30 Networking Lunch 14.00 Joint ITU & CTO project to implement Child Online Protection: Workshop for Nigeria 17.30 Closing for the day Day 2-23 April 2013 09.00 Joint ITU & CTO project to implement Child Online Protection: Workshop for Ghana 12.30 Networking Lunch 14.00 Joint ITU & CTO project to implement Child Online Protection: Workshop for Mauritius 17.30 Closing for the day Day 3-24 April 2013 Parallel Sessions 09.00 Joint ITU & CTO project to implement Child Online Protection: Workshop for Gambia Special briefing session for Commonwealth Parliamentarians on electronic commerce cyberlaws A joint workshop by the CTO, Commonwealth Parliamentary Association and United Nations Conference on Trade and Development (UNCTAD) (continues after lunch) 12.30 Networking Lunch 14.00 Joint ITU & CTO project to implement Child Online Protection: Workshop for Sierra Leone Workshop Continues 17.30 Closing for the day 19.00 Cocktail Reception at Mont Febe Hotel 1

Day 4 - Thursday 25 April 2013 09.00 Opening Ceremony Jean Louis BEH MENGUE, Director General, Telecommunications Regulatory Board, Cameroon Prof Tim UNWIN, Secretary General, Commonwealth Telecommunications Organisation (CTO) Hon Jean-Pierre Biyiti Bi ESSAM, Minister of Posts and Telecommunications, Republic of Cameroon Chief Guest, Hon Philémon YANG, Prime Minister, Republic of Cameroon 10.30 Coffee, Networking Break & Group Photograph 11.00 Plenary Key Note Addresses Cybersecurity in the Commonwealth: Setting the stage Prof Tim UNWIN, Secretary General, Commonwealth Telecommunications Organisation Cybergovernance and Growth Jamie SAUNDERS, Director- Cyber Policy, Foreign and Commonwealth Office, UK Critical Information Infrastructure Protection: Implications for developing countries David POLLINGTON, Director, International Security Relations, Microsoft Future of Internet Governance in Africa Nigel HICKSON, VP, Europe and Pierre DANDJINOU VP, Africa, Internet Corporation for Assigned Names and numbers (ICANN) Cybercrime: The Cost of Crime The Benefits of Cooperation Alexander SEGER, Secretary of Cybercrime Convention Committee and Head of Data Protection and Cybercrime Division, Council of Europe Cyber-governance: Towards a Global Approach on Cybersecurity Mario MANIEWICZ, Chief, Department of Infrastructure, Enabling Environment and E-Applications, Telecommunication Development Bureau, International Telecommunication Union (ITU) 12.30 Networking Lunch 2

Parallel Streams 14.00 Smart Devices: Customer Safety, Security and Privacy Dr. David TURAHI, Director Information Technology, Ministry of Information and Communications Technology, Uganda Welcome and Introduction : Microsoft & Forum of Incident Response and Security Teams (FIRST) Workshop: A practical approach to Critical Information Infrastructure Protection Facilitated by David POLLINGTON, Director of International Security Relations, Microsoft Stephen ADEGBITE, Director, Forum of Incident Response and Security Teams (FIRST) 14.30 MTN Presentation TBA Senior Representative, MTN 14.15 CIIP Overview and Risk Management Approach: Microsoft 15.00 Presentation TBA 14.45 Building the Case for Response Capacity Building: FIRST 15.30 Building National Capacity for Cybersecurity Assurance Components of national cyber risk management Cybersecurity as a business continuity strategy Current capacity building programmes for Cybersecurity Marcel Belingue, Senior Manager Programmes, Commonwealth Telecommunications Organisation 16.00 Coffee and Networking Break 16.30 Multilateral Legislative Frameworks: An Analysis of Budapest Convention Council of Europe Response Training: FIRST 3

16.45 Multilateral Legislative Frameworks: An Analysis of Industry CIIP Activities: Microsoft Budapest Convention (Continued) 17.15 Q&A and Discussion: Microsoft and FIRST 17.30 Close for the Day 18.00 Reception by Council of Europe followed by Gala Dinner 18.30 Gala Dinner at Hilton (Dress Smart) End Of Day 4 4

Day 5-26 April 2013 09.00 CERTs & Cybersecurity in Africa: coordination and security at all levels Status of setting up CERTs Impact and operational needs Jean Robert HOUNTOMEY, AFRICACERT Ms Carla LICCIARDELLO, Child Online Protection (COP) Policy Analyst Thomas Marcellin MANYANYE, Sub director, IT Unit, Telecommunications Regulatory Board, Cameroon 10.30 Coffee & Networking Break 11.00 Assessing the safety of women in Cyberspace Dr Margaret Niger-THOMAS, Director, Economic Empowerment of the Woman and the Family, MINPROFF and Lecturer, Women and Gender Studies, University of Buea, CAMEROON Dr Asheri KILO, TECHNICAL ADVISOR, MINISTRY OF ARTS AND CULTURE, CAMEROON Dr Eni MUNA Mbuagbaw, CITE VERTE DISTRICT HOSPITAL, YAOUNDE Ms Augusta Epuli ANJOH, Reference Multipurpose Center for the Promotion of Youths Susie HARGREAVES, CEO, Internet Watch Foundation 12.30 Lunch Break 14.00 International cooperation for security and resilience in Cyberspace ITU update on International cooperation Jean-Jacques MASSIMA-LANDJI, Head- ITU Area Office, Yaoundé, Cameroon Harmonizing Cyberlaws and regulations: the experience of the East African Community Ms Cécile Barayre-EL SHAMI, Programme Manager, E-commerce and Law Reform, ICT Analysis Section, Science, Technology and ICT Branch, Division on Technology and Logistics, UNCTAD 5

15.00 Internet resources and Cybersafety New Generic Top Level Domains Transition from IPV4 to IPV6 in Africa Deployment of DNS Security (DNSESC) Cybersecurity Strategies and Cybercrime Future of Internet Assigned Numbers Authority (IANA) Nigel HICKSON, Vice President, Europe, Internet Corporation for Assigned Names and Numbers (ICANN) Pierre DANDJINOU, Vice President, Africa, Internet Corporation for Assigned Names and Number( ICANN) Ms. Mary Nma UDUMA, President, Nigeria Internet Registration Association (the managers of.ng cctld) and Member of the Executive Committee of AfTLD Dr. Janvier NGOULAYE, Board Member, AFRINIC Victor NDONNANG, Internet Governance Specialist, ISOC Chapter, Cameroon 16.00 Coffee & Networking Break 16.30 Privacy vs. Security Managing conflicting interests Impact on governance and transparency Presentations: Privacy vs. Rights Ms Susie HARGREAVES, Chief Executive Officer, Internet Watch Foundation Privacy vs Security: You can t have both Ashley JELLEYMAN, General Manager - Information Assurance and Risk Assessment, BT Security 17.30 Close of Cybersecurity Forum 6