SlideShare a Scribd company logo
1 of 20
Towards a global approach on
cybersecurity
Mario Maniewicz
Chief, Infrastructure, Enabling Environment & E-applications
Telecommunication Development Bureau
International Telecommunication Union
Commonwealth Cybersecurity Forum
Yaounde, Cameroon; 25-26 April 2013
Consumer Cybercrime
has an estimated cost
of US$ 110 Billion per year
• Every second, 18 adults become a victim of cybercrime,
resulting in more than 1.5 million cybercrime victims each day on a global
level.
• With losses totaling an average of US$197 per victim across the world in direct
financial costs, cybercrime costs consumers more than a week’s worth of
nutritious food necessities for a family of four.
• In the past 12 months, an estimated 556 million adults across the world
experienced cybercrime, more than the entire population of the European
Union.
• This figure represents 46 % of online adults who have been victims of
cybercrime in the past twelve months, compared with the findings from 2011
(45 percent).
Source: Symantec
More than 1.5 billion attacks
took place solely through the web in
2012
While launching 1.5 billion web attacks throughout 2012
Cybercriminals used 6.5 million of unique domains
(2.5 million more than in 2011)
Servers seeded with malicious code were detected in the
Internet zones of 202 countries around the world.
Source: Kaspersky Lab
Everyone is already affected
U.S. Department of Energy
During an attack on the agency's computers and servers, the personal data of employees and contractors
was stolen, but, reportedly, no classified data was leaked.
Twitter
250k were requested to reset their passwords
Japan (September 2012)
Japan faced an onslaught of cyber attacks targeting
government websites, universities, banks and hospitals
NASA
NASA’s Inspector General reported that 13 APT attacks
compromised NASA computers between 2011 and 2012
NY Times, Wall Street Journal and Washington Post
Sensitive information from journalists stolen during 2013
India
112 government websites of India had been compromised from
December 2011 to February 2012
ITU (December 2012)
Main website compromised during
WCIT-12, in the attempt of obstructing
a treaty-making conference
Almost all governments website of the UN Member States have been attacked between 2011 and 2012 at
various levels, from defacement to DDOS, from phishing to data theft
Between 2011 and 2012, some 20 intergovernmental organizations and UN bodies, including IAEA, IMF, UNDP,
UN, ITU, have been victims of cyberattacks of various nature
This global trend is expected
to increase
over the upcoming years
• Continued rise of targeted attacks and advanced persistent threat
• Attacks targeting cloud-based infrastructures will increase
• Mobile platforms continue to be the emerging market for cybercrime
• Member States are starting to move from defensive to offensive
Rise of cyber warfare
• United Nations System as one of the main targets identified for 2013
UN organizations and UN conferences will be affected
Trends for the near future
So many differences, so many
challenges, so many frameworks
October 2012
WE HAVE
PROBLEMS
Cross Border Crime Lack of Knowledge
Lack of Resources
No Direction
New Problems
Management Challenges
Delays in Response
No legal framework
Organisations working in silos
Crimes have become organised
Need proactive solutions
Capital intensive solutions
No emergency telephone
numbers
Lack of international collaboration
Need better early warning system Addressing different type of attacks
The suspect is in
another country. What
do I do?
I wish somebody had
foreseen that this was
coming
I wonder if it is possible to
have more Intel on this
situation
How can I notify about this
threat to others?
I need more data for my research! I
wonder if somebody else is working
on the same thing
• Lack of adequate and interoperable national or regional legal frameworks
• Lack of secure software and ICT-based applications
• Lack of appropriate national and global organizational structures to deal with
cyber incidents
• Lack of information security professionals and skills within governments; lack of
basic awareness among users
• Lack of international cooperation between industry experts, law enforcements,
regulators, academia & international organizations, etc. to address a global
challenge
Key Challenges
Cybersecurity not seen yet as a cross-sector, multi-dimensional concern.
Still seen as a technical/technology problem.
Budapest Convention - Since 2001, some 37 Countries ratified, out of 193 UN
Member States
24/7 Network – some 50 countries, since 2001
EU built a cybercrime center, within the EUROPOL structure – Delivery date: 2014
INTERPOL will build a Cybercrime Complex - Delivery date: 2014
EU-US cooperation
Commonwealth Cybercrime Initiative, 54 States
African Convention on Cybersecurity, 52 States
FIRST, OIC CERT, GCC CERT, APC CERT and other incident
response organizations
Arab Convention on Combating Information Technology
Offences
EU Directives
Shanghai Cooperation Organization
Is the UN positioned
to address this challenge?
A UN common position on cybersecurity and cybercrime
In a landscape where cyberspace is becoming a ground for international diplomacy and
politics, and a risk to global stability, the UN System must react vigorously:
• To protect itself from the risks posed by cyber threats;
• To help Member States and the international community in facilitating the dialogue
aimed at better defend countries against cyber threats and cybercrime, thus
contributing to international security and stability
Toward a global framework
• Agreement at the international level on international norms and principles able to
regulate cyberspace and acceptable state behavior and codes of conduct within
cyberspace
• The establishment of a global platform, where all relevant stakeholders coordinate,
cooperate and proactively intervene to resolve cyber incidents and prevent possible
escalations
• Equip countries with capabilities and know-how
- Cybercrime legislation
- Organizational Structures (e.g. CIRTs)
- Education and training
• Work at the regional level
- Pan-regional agreements
while (in parallel)
Benefits of more harmonization and streamlining
• Increased efficiency and effectiveness in the detection and analysis of cyber threats
• Greater awareness of risks and adoption of protective behavioral patterns by general
public and private sector
• Efficient and effective long-term whole-of-government response to cyberthreats and
cybercrime, including national coordinating mechanisms, data collection systems, and
effective legal framework
• Strengthened communication between government agencies in cybersecurity matters,
between the concerned national stakeholders, including but not limited to ICT policy
makers and regulators, judiciary systems, law enforcement, private sector
organizations, as well as on international cooperation
• Leading UN specialized agency for information and
communication technologies (ICTs).
• Founded in 1865, ITU is the oldest
specialized agency in the UN system.
• Global focal point for governments and the private
sector with 192 Member States, 532 Sector
Members, 148 Associates, and 5 Academia.
• ITU Headquarters in Geneva, Switzerland;
11 regional/area offices; 700 staff of 80
nationalities.
What is ITU
How it is helping the international community
2003 – 2005
• WSIS entrusted ITU as sole facilitator for WSIS
Action Line C5 - “Building Confidence and Security
in the use of ICTs”
2007
ITU Cybersecurity Agenda (GCA) was elaborated and
endorsed by ITU Member States
GCA is a framework for international cooperation in
cybersecurity
2008 - Now
ITU Membership endorsed the GCA as
the ITU-wide strategy on international
cooperation.
Thank you for your attention!
mario.maniewicz [at] itu.int

More Related Content

What's hot

2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
 
Un security-resolution 57 239
Un security-resolution 57 239 Un security-resolution 57 239
Un security-resolution 57 239 Genti79
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
The cyber terrain
The cyber terrainThe cyber terrain
The cyber terrainblogzilla
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. ReefBGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. ReefBoston Global Forum
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentationsvito
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of warMark Johnson
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017NgocHaBui1
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityGlenn McKnight
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...APNIC
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due DiligenceShiva Bissessar
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peacePaul van Heel
 

What's hot (20)

2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Un security-resolution 57 239
Un security-resolution 57 239 Un security-resolution 57 239
Un security-resolution 57 239
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
The cyber terrain
The cyber terrainThe cyber terrain
The cyber terrain
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Internet governance
Internet governanceInternet governance
Internet governance
 
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. ReefBGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of war
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 

Viewers also liked

Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebDarius Whelan
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropePositive Hack Days
 

Viewers also liked (6)

Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
Russia and cybercrime
Russia and cybercrimeRussia and cybercrime
Russia and cybercrime
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
 
eu convention_on_cybercrime
eu convention_on_cybercrimeeu convention_on_cybercrime
eu convention_on_cybercrime
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on CybercrimeCTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
CTO Cybersecurity Forum 2013 Alexander Seger Budapest Convention on Cybercrime
 

Similar to CTO Cybersecurity Forum 2013 Mario Maniewicz

National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber DiplomacyPetar Radanliev
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Mwando
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfVincent Mwando
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
CYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docxCYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docxalanrgibson41217
 
State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...Igor Britchenko
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxgertrudebellgrove
 

Similar to CTO Cybersecurity Forum 2013 Mario Maniewicz (20)

National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber Diplomacy
 
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
 
Cyber Diplomacy
Cyber DiplomacyCyber Diplomacy
Cyber Diplomacy
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
CYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docxCYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docx
 
State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 

More from Commonwealth Telecommunications Organisation

More from Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

CTO Cybersecurity Forum 2013 Mario Maniewicz

  • 1. Towards a global approach on cybersecurity Mario Maniewicz Chief, Infrastructure, Enabling Environment & E-applications Telecommunication Development Bureau International Telecommunication Union Commonwealth Cybersecurity Forum Yaounde, Cameroon; 25-26 April 2013
  • 2. Consumer Cybercrime has an estimated cost of US$ 110 Billion per year
  • 3. • Every second, 18 adults become a victim of cybercrime, resulting in more than 1.5 million cybercrime victims each day on a global level. • With losses totaling an average of US$197 per victim across the world in direct financial costs, cybercrime costs consumers more than a week’s worth of nutritious food necessities for a family of four. • In the past 12 months, an estimated 556 million adults across the world experienced cybercrime, more than the entire population of the European Union. • This figure represents 46 % of online adults who have been victims of cybercrime in the past twelve months, compared with the findings from 2011 (45 percent). Source: Symantec
  • 4. More than 1.5 billion attacks took place solely through the web in 2012
  • 5. While launching 1.5 billion web attacks throughout 2012 Cybercriminals used 6.5 million of unique domains (2.5 million more than in 2011) Servers seeded with malicious code were detected in the Internet zones of 202 countries around the world. Source: Kaspersky Lab
  • 7. U.S. Department of Energy During an attack on the agency's computers and servers, the personal data of employees and contractors was stolen, but, reportedly, no classified data was leaked. Twitter 250k were requested to reset their passwords Japan (September 2012) Japan faced an onslaught of cyber attacks targeting government websites, universities, banks and hospitals NASA NASA’s Inspector General reported that 13 APT attacks compromised NASA computers between 2011 and 2012 NY Times, Wall Street Journal and Washington Post Sensitive information from journalists stolen during 2013 India 112 government websites of India had been compromised from December 2011 to February 2012 ITU (December 2012) Main website compromised during WCIT-12, in the attempt of obstructing a treaty-making conference Almost all governments website of the UN Member States have been attacked between 2011 and 2012 at various levels, from defacement to DDOS, from phishing to data theft Between 2011 and 2012, some 20 intergovernmental organizations and UN bodies, including IAEA, IMF, UNDP, UN, ITU, have been victims of cyberattacks of various nature
  • 8. This global trend is expected to increase over the upcoming years
  • 9. • Continued rise of targeted attacks and advanced persistent threat • Attacks targeting cloud-based infrastructures will increase • Mobile platforms continue to be the emerging market for cybercrime • Member States are starting to move from defensive to offensive Rise of cyber warfare • United Nations System as one of the main targets identified for 2013 UN organizations and UN conferences will be affected Trends for the near future
  • 10. So many differences, so many challenges, so many frameworks
  • 11. October 2012 WE HAVE PROBLEMS Cross Border Crime Lack of Knowledge Lack of Resources No Direction New Problems Management Challenges Delays in Response No legal framework Organisations working in silos Crimes have become organised Need proactive solutions Capital intensive solutions No emergency telephone numbers Lack of international collaboration Need better early warning system Addressing different type of attacks The suspect is in another country. What do I do? I wish somebody had foreseen that this was coming I wonder if it is possible to have more Intel on this situation How can I notify about this threat to others? I need more data for my research! I wonder if somebody else is working on the same thing
  • 12. • Lack of adequate and interoperable national or regional legal frameworks • Lack of secure software and ICT-based applications • Lack of appropriate national and global organizational structures to deal with cyber incidents • Lack of information security professionals and skills within governments; lack of basic awareness among users • Lack of international cooperation between industry experts, law enforcements, regulators, academia & international organizations, etc. to address a global challenge Key Challenges Cybersecurity not seen yet as a cross-sector, multi-dimensional concern. Still seen as a technical/technology problem.
  • 13. Budapest Convention - Since 2001, some 37 Countries ratified, out of 193 UN Member States 24/7 Network – some 50 countries, since 2001 EU built a cybercrime center, within the EUROPOL structure – Delivery date: 2014 INTERPOL will build a Cybercrime Complex - Delivery date: 2014 EU-US cooperation Commonwealth Cybercrime Initiative, 54 States African Convention on Cybersecurity, 52 States FIRST, OIC CERT, GCC CERT, APC CERT and other incident response organizations Arab Convention on Combating Information Technology Offences EU Directives Shanghai Cooperation Organization
  • 14. Is the UN positioned to address this challenge?
  • 15. A UN common position on cybersecurity and cybercrime In a landscape where cyberspace is becoming a ground for international diplomacy and politics, and a risk to global stability, the UN System must react vigorously: • To protect itself from the risks posed by cyber threats; • To help Member States and the international community in facilitating the dialogue aimed at better defend countries against cyber threats and cybercrime, thus contributing to international security and stability
  • 16. Toward a global framework • Agreement at the international level on international norms and principles able to regulate cyberspace and acceptable state behavior and codes of conduct within cyberspace • The establishment of a global platform, where all relevant stakeholders coordinate, cooperate and proactively intervene to resolve cyber incidents and prevent possible escalations • Equip countries with capabilities and know-how - Cybercrime legislation - Organizational Structures (e.g. CIRTs) - Education and training • Work at the regional level - Pan-regional agreements while (in parallel)
  • 17. Benefits of more harmonization and streamlining • Increased efficiency and effectiveness in the detection and analysis of cyber threats • Greater awareness of risks and adoption of protective behavioral patterns by general public and private sector • Efficient and effective long-term whole-of-government response to cyberthreats and cybercrime, including national coordinating mechanisms, data collection systems, and effective legal framework • Strengthened communication between government agencies in cybersecurity matters, between the concerned national stakeholders, including but not limited to ICT policy makers and regulators, judiciary systems, law enforcement, private sector organizations, as well as on international cooperation
  • 18. • Leading UN specialized agency for information and communication technologies (ICTs). • Founded in 1865, ITU is the oldest specialized agency in the UN system. • Global focal point for governments and the private sector with 192 Member States, 532 Sector Members, 148 Associates, and 5 Academia. • ITU Headquarters in Geneva, Switzerland; 11 regional/area offices; 700 staff of 80 nationalities. What is ITU
  • 19. How it is helping the international community 2003 – 2005 • WSIS entrusted ITU as sole facilitator for WSIS Action Line C5 - “Building Confidence and Security in the use of ICTs” 2007 ITU Cybersecurity Agenda (GCA) was elaborated and endorsed by ITU Member States GCA is a framework for international cooperation in cybersecurity 2008 - Now ITU Membership endorsed the GCA as the ITU-wide strategy on international cooperation.
  • 20. Thank you for your attention! mario.maniewicz [at] itu.int