Cybersecurity in the Commonwealth: Setting the Stage



Similar documents
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum April 2013 Yaoundé, Cameroon

2. Cyber legislation harmonization process in Central Africa

Promoting a cyber security culture and demand compliance with minimum security standards;

Michael Yakushev PIR-Center, Moscow (Russia)

Day 3-24 April Day 2-23 April 2013

Cybersecurity for ALL

Working Party on Information Security and Privacy

Cyber ITU. By Tomas Lamanauskas, ITU

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

CPA Roadshows Speaking Notes

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

The European Response to the rising Cyber Threat

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

National Cyber Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy

The UK cyber security strategy: Landscape review. Cross-government

Cyber Security Strategy

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

Cyber security Country Experience: Establishment of Information Security Projects.

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

Cybersecurity in Nepal

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)

ITU Global Cybersecurity Agenda (GCA)

S. ll IN THE SENATE OF THE UNITED STATES

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation

National Cyber Security Strategy of Afghanistan (NCSA)

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Honourable members of the National Parliaments of the EU member states and candidate countries,

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

The global challenge

Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review

How To Discuss Cybersecurity In European Parliament

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, June 2014

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

How To Understand And Understand The European Priorities In Information Security

Peace and Justice in Cyberspace

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

THE STRATEGIC POLICING REQUIREMENT. July 2012

Executive Director Centre for Cyber Victim Counselling /

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents

In an age where so many businesses and systems are reliant on computer systems,

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015

Cybersecurity and the Romanian business environment in the regional and European context

National Plan to Address Cybercrime

ITU National Cybersecurity/CIIP Self-Assessment Tool

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

Harmonising Cyber Security Across the Caribbean: CTU Initiatives & Activities

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes

DISPUTE RESOLUTION TERMS

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA

Pacific Islands Telecommunications Association

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

Cyber Security - What Would a Breach Really Mean for your Business?

Cybersecurity Strategy of the Republic of Cyprus

The internet and digital technologies play an integral part

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

(BDT) BDT/POL/CYB/Circular

Cybercrime: risks, penalties and prevention

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

Cyber Diplomacy A New Component of Foreign Policy 6

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

CYBERCRIME AND THE LAW

CYBER SECURITY STRATEGY AN OVERVIEW

Cyber Insurance Research Paper

Transcription:

Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013

For governments Imagine if your critical infrastructure went down and your electricity grid ceased to function

For governments: Jonathan O Dea MP, ACPAC and NSW PAC Chair Australia The Internet is increasingly important in financial management, and recent attacks on government networks demonstrate that electronic security is vital. The Council recognises the important role of parliaments and Public Accounts Committees in ensuring that cyberspace is safe, secure and resilient

For companies Is it worth taking the risk that all of your IPR is being looked at by your competitors, or that noone can access your sites because of a Distributed Denial of Service attack?

Who is this? LulzSec gained international attention when they hacked the Sony website in 2011, taking down the company's PlayStation network for weeks and accessing millions of users' accounts. It was estimated to have cost the company over $100 million ( 65m) and was part of a 50-day rampage which targeted organisations ranging from the FBI to Britain's Serious Organised Crime Agency. http://www.bbc.co.uk/news/world-asia-22275445

For individuals How secure is your mobile digital device? What could someone learn about you if they borrowed it? http://www.dialaphone.co.uk/blog/2011/01/20/new-smartphone-security-threat-baseband-hacking/

Phone security Who uses a passcode on their mobile phone? Who uses one of these PIN numbers? 15% of people use one of 10 numbers Who uses additional antivirus software on their phones? Mobile devices are sophisticated computers With large amounts of data Is it worth the risk?

Cybersecurity matters To states To companies To individuals Across the Commonwealth 2.1 billion people in 54 countries

Only as strong as weakest link Cyberspace knows no boundaries Cybercrime will move to the countries that are most connected and least secure

The Commonwealth: implications for cybersecurity 54 countries Diversity of economic indicators Diversity of size Across all continents Mainly common law tradition Very significant implications English language enhances communication Many small island states With particular challenges

Commonwealth cybersecurity context 2002 Model Law on Computer and Computer Related Crime Building on Council of Europe Draft Convention on Cyber Crime Harare Scheme for Mutual Assistance in Criminal Matters Amendments 1990, 2002, 2005 Provides framework for collaboration 2009 Affirmation of Commonwealth Values and Principles Peace and Security, Democracy, Human Rights, Freedom of Expression, Good Governance Commonwealth Cybercrime Initiative mandate 2011 2013 Queen signs Commonwealth Charter

The CTO and Cybersecurity One of the CTO s six niche areas of focus Capacity development Research and consultancy Workshops and Forums A platform for Commonwealth countries to share expertise and approaches to international agreements Working closely with International Organisations that focus on cybersecurity Especially ITU o IMPACT o Child Online Protection

CTO practical actions A Forum for sharing views and good practices Raising the importance of cybersecurity issues across the Commonwealth What kind of international agreements do we want? Strong member and partner interest in cybersecurity Advisory Board to steer our activities Quick access to key references and links http://www.cto.int/focus-themes/cybersecurity Capacity development and training Supporting country policy implementation Child Online Protection in Africa

Challenges in legal contexts Technological innovation is faster than ability of legal systems to respond Police usually only catching up with cybercrime ICTs and globalisation lead to need for international agreements that are tough to agree on All too often resorting to Human Rights agendas Need also to consider responsibilities Challenges over usage and legality of ICTS If some use of ICTs has not yet been defined as illegal, citizens are allowed to act with impunity Yet states often have to seek authorisation from the courts to be able to implement new ICT based initiatives, as with cybersecurity

Ways forward Collaboration across organisations Sharing good practices It s easy to sign up to agreements Much more difficult to put them into practice Very significant ethical issues Citizens and states Privacy o As a good weighed up against others, or o A means through which we have power over our lives Importance of capacity development Amongst all stakeholders

Need for us all to work together more closely to keep our cyber systems resilient walk with us on the journey