Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015

Similar documents
Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)

ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int.

Cyber ITU. By Tomas Lamanauskas, ITU

Council 2014 Geneva, 6-15 May 2014

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

Cybersecurity for ALL

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

CYBERSECURITY INDEX OF INDICES

Cyber security Country Experience: Establishment of Information Security Projects.

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

ITU National Cybersecurity/CIIP Self-Assessment Tool

Overview of ITU Cybersecurity Activities

The global challenge

Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

ALL ALL. rsecurity. Cybersec. for ITU s Work for a Safer World. International Telecommunication Union

Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth

(BDT) BDT/POL/CYB/Circular

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Day 3-24 April Day 2-23 April 2013

SAC075: SSAC Comments to ITU-D on Establishing New Certification Authorities

How To Write An Article On The European Cyberspace Policy And Security Strategy

Cybersecurity: Taking Stock and Looking Ahead

ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia

Cybersecurity Governance

RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES

ITU Global Cybersecurity Agenda (GCA)

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

INCO for Cyber Security. PTCIF: 21st Feb 2014

Cybersecurity Initiatives

National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide

Mobile Money Services: legal and regulatory challenges The experience of the East African Community

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

iwr vw bs ww G-1 AwZwi³ msl v KZ cÿ KZ K cökvwkz g½jevi, gvp 11, 2014

HCB Human Capacity Building

INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries

Policy Brief. Can e-commerce facilitate the growth of small and medium-sized enterprises in Africa? 1. Introduction

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

2. Cyber legislation harmonization process in Central Africa

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

The Geneva Protocol on Cybersecurity and Cybercrime

2015/16 Reference Model

Cybersecurity. Franck Greverie. Analyst Day Paris, 28 May 2015

Partnership for Cyber Resilience

Cyber Europe Key Findings and Recommendations

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum April 2013 Yaoundé, Cameroon

INTERNATIONAL TELECOMMUNICATION UNION

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

Bradford J. Willke, CISSP

Romanian National Computer Security Incident Response Team CERT-RO.

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

Cyberspace Situational Awarness in National Security System

International Training Program 2011 ITU Global Cybersecurity Agenda

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director

Global Cybersecurity Agenda (GCA) A framework for international cooperation

CYBERSECURITY. PROGRAMME 14 April Lunch / Delegates Registration

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

Department of Homeland Security Federal Government Offerings, Products, and Services

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

PwC Cybersecurity Briefing

Opportunities for strengthening international cooperation for the protection of children from sexual violence including on-line

Policies and Practices on Network Security of MIIT

Promoting a cyber security culture and demand compliance with minimum security standards;

Microsoft s cybersecurity commitment

Introduction to Cybersecurity Overview. October 2014

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

FOURTH PARLIAMENTARY FORUM ON SHAPING THE INFORMATION SOCIETY THE TRIPLE CHALLENGE OF CYBER-SECURITY: INFORMATION, CITIZENS AND INFRASTRUCTURE

Capacity Building to Strengthen Cybersecurity: Thailand Update

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning

Cybersecurity Strategy of the Republic of Cyprus

Policy Brief. Tackling the challenges of cybersecurity in Africa. 1. Introduction

Capabilities for Cybersecurity Resilience

Research Topics in the National Cyber Security Research Agenda

ITU Cybersecurity Work Programme to Assist Developing Countries

Executive Director Centre for Cyber Victim Counselling /

How To Defend Your Information Security From Hackers In Honduras

EU Cybersecurity: Ensuring Trust in the European Digital Economy

ITU NATIONAL CYBERSECURITY STRATEGY GUIDE

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

G7 Opportunities for Collaboration

Security Intelligence

SRO-EA s Cyber security Initiatives in Eastern Africa

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Cybersecurity Risk Management in the Telecom Sector. MUSTAPHA HUNEYD Corporate Information Security

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, June 2014

Jyväskylä Cyber Security Ecosystem

The internet and digital technologies play an integral part

Qatar Computer Emergency Team

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency

The Cybersecurity Research Alliance

JOINT MEDIA STATEMENT

Establishing and supporting CERTs for Internet security

Transcription:

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cyber Security Challenges & Capacity Building By Marco Obiso International Telecommunication Union The views reflected are those of the author and do not necessarily reflect the views of UNCTAD

Cybersecurity Challenges & Capacity Building March 2015

Cybersecurity Challenges 2

Challenge 1: International Cooperation 3

Challenge 2: Critical Information Infrastructure Protection (CIIP) 4

Challenge 3: Attacks are evolving and Malware is becoming increasingly complex Source: Trend Micro 5

Challenge 4: M2M technology, IoT and Cloud computing

Challenge 5: Secure digital identification

Challenge 6: Development of common standards

Challenge 7: Child Online Protection (COP)

Challenge 8: Increasing awareness Committed to Connecting the World

Recommendations

Strengthen Cooperation Information and best practice sharing Public-Private Partnerships Develop National Capabilities Measuring Cybersecurity Elaboration of Standards Protection of vulnerable groups

101 National CIRTs Worldwide 13

ITU s National CIRT Programme Assessments conducted for 61 countries 25 of them in Africa. In progress in Ethiopia and Republic of Congo Implementation completed for 9 countries 7 of them in Africa Implementation in progress for 6 countries Burundi and Gambia among others 9 cyber drills conducted with participation of over 90 countries Last Cyberdrill was for Africa in September 2014, in Livingstone, Zambia 14

ITU s National CIRT Programme Assess existing capability of/need for national cybersecurity mechanisms On-site assessment through meetings, training, interview sessions and site visits Form recommendations for plan of action (institutional, organizational and technical requirements) Implement based on the identified needs and organizational structures of the country Assist with planning, implementation, and operation of the CIRT. Continued collaboration with the newly established CIRT for additional support Capacity Building and trainings on the operational and technical details Exercises organized at both regional and international levels Help enhance the communication and response capabilities of the participating CIRTs Improve overall cybersecurity readiness in the region Provide opportunities for public-private cooperation 15

National CIRTs - Critical Success Factors Government Commitment Identify the right constituencies Engage the key players Be visible and collaborate within the country, regionally and internationally Have a strong technical team with right expertise 16

Objective The Global Cybersecurity Index (GCI) aims to measure the level of commitment of each nation in cybersecurity in five main areas: Legal Measures Technical Measures Organizational Measures Capacity Building National and International Cooperation Goals - Promote cybersecurity strategies at a national level - Drive implementation efforts across industries and sectors - Integrate security into the core of technological progress - Foster a global culture of cybersecurity 104 countries have responded Final Global and Regional Results 2014 are on ITU Website http://www.itu.int/en/itu-d/cybersecurity/pages/gci.aspx Next iteration in progress 17

18

Cyberwellness Country Profiles Factual information on cybersecurity achievements on each country based on the GCA pillars Over 190 profiles to date Live documents Invite countries to assist us in maintaining updated information cybersecurity@itu.int EXAMPLE 19

Building a global partnership Capacity building initiatives, joint consultations and more. Best practices in cybercrime legislations, joint technical assistance to member states, information sharing Tap on expertise of globally recognized industry players and accelerate info sharing with ITU member states Collaboration with ABI Research The Global Cybersecurity Index (GCI) Collaboration with FIRST To share best practices on computer incident response, engage in joint events, facilitate affiliation of national CIRTS of member states Collaboration with Member States Regional Cybersecurity Centres 20

Thank You http://www.itu.int/cybersecurity cybersecurity@itu.int 21