SlideShare a Scribd company logo
1 of 35
www.itu150.org
Building Cybersecurity
Capacity
Tomas Lamanauskas
Head, Corporate Strategy Division
25 March 2015
Committed to Connecting the World
2
The importance of Cybersecurity
• From industrial age to information societies
- Increasing dependence on the availability of ICTs
- Number of Internet users growing constantly (now 40% of world’s population)
• Statistics and reports show that
cyber-threats are on the rise
- The likely annual cost to the global economy
from Cybercrime is estimated at more than
$455 billion (Source: McAfee Report on Economic
Impact of Cybercrime, 2013).
• Developing countries most at risk as
they adopt broader use of ICTs
- E.g. Africa leading in Mobile-broadband
penetration: almost 20% in 2014- up from
less than 2% in 2010 (Source: ITU ICT Statistics)
Committed to Connecting the World
3
Need for building cybersecurity capacity
Committed to Connecting the World
4
Committed to Connecting the World
Coordinated Response
Need for a multilevel response to the cybersecurity challenges
International Cooperation
frameworks and exchange
of information
Harmonization of legislation and best
practices at regional level
National strategies and policies
National response capabilities
Country level capacity building and training
International
Regional
National
5
Committed to Connecting the World
New
Generation
Cybersecuri-
ty Policy
National
Priority
A holistic
approach
Enhanced
Coordina-
tion
Public-
Private
Coopera-
tion
Internatio-
nal
Coopera-
tion
Funda-
mental
Values
Source: OECD
6
Committed to Connecting the World
Emerging
Policy
Trends
Multistake-
holder
Dialogue
Economic
Aspects
Flexible
Approach
Sovereignty
Considera-
tions
Source: OECD
7
Committed to Connecting the World
8
ITU and Cybersecurity
Committed to Connecting the World
9
150 years of experience in ICTs
• 150th Anniversary celebrated in May 2015
• ITU is based in Geneva, Switzerland
• 193 Member States and 700 Sector Members
(including Industry and Civil Society), Academia and
Associates
• Organized in three Sectors:
– Radiocommunication (ITU-R)
– Standardization (ITU-T)
– Development (ITU-D)
Committed to Connecting the World
ITU and Cybersecurity
2003 – 2005
WSIS entrusted ITU as sole facilitator for WSIS Action Line C5
“Building Confidence and Security in the use of ICTs”
2007
ITU Secretary-General launched the Global Cybersecurity
Agenda (GCA). A framework for international cooperation in
cybersecurity
2008 - 2010
ITU Membership endorsed the GCA as the ITU-wide strategy on
international cooperation.
In 2008 the Child Online Protection Initiative was launched, as
an international and multistakeholder collaborative framework
fostering the protection of children online 10
Committed to Connecting the World
National
Strategies
Multistakeholder
National
Collaboration
CIRTs
Information &
best practice
sharing
Public-Private
Partnerships
Measuring
capabilities
Elaborating
Standards
Protecting
vulnerable
groups
Regional &
International
Cooperation
11
Source: 10-Year WSIS Action Line C5 Report (2014)
Committed to Connecting the World
12
National Strategies
 Developing comprehensive and efficient
National Cybersecurity Strategies is
fundamental for building a secure ICT
ecosystem.
 ITU together with its partners helps countries
organize Child Online Protection Strategy
Framework workshops to assist national
stakeholders in planning and deploying an
effective and practical approach to COP at a
national level.
Committed to Connecting the World
13
Committed to Connecting the World
14
Cybersecurity Strategy Model
Committed to Connecting the World
15
101 National CIRTs Worldwide
National CIRTs for enhancing global resilience
Need to fill the gaps
Committed to Connecting the World
16
National CIRT Programme
 Assess existing capability
of/need for national
cybersecurity mechanisms
 On-site assessment through
meetings, training, interview
sessions and site visits
 Form recommendations for plan
of action (institutional,
organizational and technical
requirements)
 Implement based on the identified
needs and organizational structures
of the country
 Assist with planning,
implementation, and operation of
the CIRT.
 Continued collaboration with the
newly established CIRT for
additional support
 Capacity Building and trainings on
the operational and technical details
 Exercises organized at both
regional and international
levels
 Help enhance the
communication and
response capabilities of the
participating CIRTs
 Improve overall
cybersecurity readiness in
the region
 Provide opportunities for
public-private cooperation
Committed to Connecting the World
17
ITU’s National CIRT Programme
• Assessments conducted for 61 countries
• Implementation completed for 9 countries
Cyprus​, Burkina Faso, Côte d'Ivoire, Ghana, ​Kenya​, Montenegro, Tanzania, Uganda,
Zambia
• Implementation in progress for 6 countries
Barbados, ​Burundi, Gambia, Jamaica, Lebanon​, Trinidad and Tobago
• 9 cyber drills conducted with participation of over 90
countries
Organized in Myanmar, Jordan, Bulgaria, Uruguay, Oman, Lao P.D.R., Turkey, Peru, Zambia
Committed to Connecting the World
Objective
The Global Cybersecurity Index (GCI)
measures and ranks each nation state’s
level of cybersecurity development in five
main areas:
• Legal Measures
• Technical Measures
• Organizational Measures
• Capacity Building
• National and International Cooperation
Goals
- Promote cyberesecurity strategies at a
national level
- Drive implementation efforts across
industries and sectors
- Integrate security into the core of
technological progress
- Foster a global culture of cybersecurity
18
Final Global and Regional Results 2014 are on ITU Website
Next iteration in progress
Committed to Connecting the World
19
Cyberwellness Country Profiles
Factual information on cybersecurity
achievements on each country based on the
GCA pillars
• 194 profiles to date
• Live documents
e.g.
Committed to Connecting the World
20
Enhancing Cybersecurity in Least Developed Countries project
Aims at supporting the 49 Least Developed Countries in strengthening their cybersecurity
capabilities.
How
• Assessment for selected key government ministries &
subsequent solutions provision
• Capacity building through training of trainers, workshops,..
• Customised guidelines on legislation, regulation and technologies
End Result
• protection of their national infrastructure, including the critical information
infrastructure, thereby making the Internet safer and protecting Internet users
• serve national priorities and maximize socio-economic benefits in line with the
objectives of the World Summit on the Information Society (WSIS) and the Millennium
Development Goals (MDGs).
We are only as secure as our weakest link
Implemented in 4 countries
Different stages of planning/implementation in 15 more
Committed to Connecting the World
Child Online Protection Initiative
Key Objectives:
 Identify risks and
vulnerabilities to children in
cyberspace
 Create awareness
 Develop practical tools to
help minimize risk
 Share knowledge and
experience
Partners:
- 10 international organizations
- 34 civil society organizations
- 13 private sector organizations 21
Committed to Connecting the World
22
Key COP Activities
 Elaboration of COP Guidelines for parents, children, policy makers and industry
 New! Updated version of the COP Guidelines for Industry with the contribution
of several partners (UNICEF, GSMA, Sony, Facebook, The Walt Disney Company
and EBU)
 COP National Strategy Framework
 ITU together with its partners helps countries organize Child Online Protection
Strategy Framework workshops to assist national stakeholders in planning and
deploying an effective and practical approach to COP at a national level.
 Child Online Protection Challenge
 Educating children by presenting an interactive platform where children, parents
and educators can engage in fun activities to learn more about the risks that the
children face on the Internet and how these risks can be averted.
 Council Working Group on Child Online Protection (CWG-COP)
 Multi-stakeholder open platform, where 193 Member States and other
stakeholders exchange views and promote work on the subject matter
Committed to Connecting the World
Economic Impact
of Standardization
Adds 0.3% - 1% to
the GDP
Source: European Commission
ITU-T Study Group 17 – Security
• Over 300 standards (ITU-T Recommendations)
relevant to security
• Key areas of current work:
• Cybersecurity
• Child Online Protection
• Security architectures and frameworks
• Countering spam
• Identity management
• Security of applications and services
for the Internet of Things, web
services, social networks, cloud
computing and Big Data
Standardization
23
Committed to Connecting the World
World Conference on International
Telecommunications (WCIT-12)
WCIT-12 set the ground for international
cooperation on certain cybersecurity-
related matters
 Article 6, ITRs: Security and
robustness of networks
 Article 7, ITRs: Unsolicited bulk
electronic communications
24
Committed to Connecting the World
25
New edition 2014: ITU Publication on UNDERSTANDING
CYBERCRIME: Phenomena, Challenges and Legal Response
The Guide serves to help developing countries better understand
the implications related to the growing cyber-threats and assist in
the assessment of the current legal framework and in the
establishment of a sound legal foundation.
Publications
COMBATTING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR
EMERGING ECONOMIES
Joint project among several partners under the coordination of the
World Bank to build capacity in developing countries in the policy,
legal and criminal justice aspects of the combat against “cybercrime”
Committed to Connecting the World
26
Capacity building initiatives, joint consultations and more.
Best practices in cybercrime legislations, joint technical assistance to member
states, information sharing
Tap on expertise of globally recognized industry players and accelerate
info sharing with ITU member states
Building a global partnership
Collaboration with ABI Research – The Global Cybersecurity Index (GCI)
Collaboration with FIRST – To share best practices on computer incident response, engage
in joint events, facilitate affiliation of national CIRTS of member states
Collaboration with Member States – Regional Cybersecurity Centres
Committed to Connecting the World
27
Coordinated Action
Committed to Connecting the World
Budapest Convention (2001), 45 Countries ratified/acceded
24/7 Network – some 50 countries, since 1997
EU Cybersecurity Strategy (2013)
Produced set of confidence-building measures (CBMs) to reduce
the risks of conflict stemming from the use of ICTs
International and Regional Cooperation
Comparative Analyses on Cybersecurity Policies
Convention on Cybersecurity and Personal Data Protection (2014)
28
Committed to Connecting the World
UN Efforts
- Resolutions 69/166 and 68/167 of the UN General Assembly on “The Right to
privacy in the digital age” (2014-2013)
- Resolutions 69/28 and 68/243 of the UN General Assembly on “Developments in
the field of information and telecommunications in the context of international
security” (2014-2013)
- Report of the Group of Governmental Experts on Developments in the Field of
Information and Telecommunications in the Context of International Security
(2013)
- Resolution 20/8 of the Human Rights Council on “The promotion, protection and
enjoyment of human rights on the Internet” (2012)
- Resolution 64/211 of the UN General Assembly on “Creation of a global culture
of cybersecurity and taking stock of national efforts to protect critical
information infrastructures” (2010)
29
Committed to Connecting the World
UN-wide cooperation mechanisms
UN-wide Framework on Cybersecurity and Cybercrime (2013)
 Developed by ITU and UNODC along with 33 UN Agencies.
 Enables enhanced coordination among UN entities in their response to
concerns of Member States regarding cybercrime and cybersecurity
UN System Internal Coordination Plan on Cybersecurity and
Cybercrime (2014)
 Developed building on the UN-wide Framework on Cybersecurity and
Cybercrime upon request by the UN Secretary-General, Mr. Ban Ki-moon
 Designed as a guide to improve the internal coordination activities of the
UN system organizations on related matters
30
Committed to Connecting the World
31
• ITU Member States committed to work towards
the shared vision of:
– “An information society, empowered by
the interconnected world, where
telecommunication/ICTs enable and
accelerate social, economic and
environmentally sustainable growth
and development for everyone”
Connect 2020 Agenda for Global
Telecommunication/ICT Development
Committed to Connecting the World
32
Global Telecommunication/ICT Targets
4
by2020...
Goal 1 Growth – Enable and foster access to and increased use of telecommunications/ICTs
55%
of households should
have access to the
Internet
60%
of individuals should
be using the Internet
40%
Telecommunications/ICTs
should be 40% more
affordable
Goal 2 Inclusiveness – Bridge the digital divide and provide broadband for all
50%
of households should have
access to the Internet in
the developing world; 15%
in the least developed
countries
50%
of individuals should be
using the Internet in the
developing world; 20% in
the least developed
countries
40%
affordability gap
between developed
and developing
countries should be
reduced by 40%
5%
Broadband services
should cost no more
than 5% of average
monthly income in the
developing countries
90%
of the rural population should be
covered by broadband services
Gender equality
among Internet users
should be reached
Goal 4 Innovation and partnership – Lead, improve and adapt to the changing
telecommunication/ICT environment
Enabling environments ensuring accessible
ICTs for persons with disabilities should be
established in all countries
40%
improvement in
cybersecurity readiness
50%
reduction in volume of
redundant e-waste
30%
decrease in Green House Gas emissions per
device generated by the telecommunication/ICT
sector
Telecommunication/ICT environment
conducive to innovation
Effective partnerships of stakeholders in
telecommunication/ICT environment
Goal 3 Sustainability – Manage challenges resulting from the telecommunication/ICT development
Committed to Connecting the World
• Regional Cyber Security Summit
29-30 March 2015, Muscat, Oman
• WSIS Forum 2015
25-29 May 2015, Geneva, Switzerland
• Regional Cyber Drills planned for 2015
Cyberdrill for Africa, Kigali, Rwanda, 5-7 May 2015
Upcoming ones in Egypt, Sri Lanka, Montenegro and Colombia
Upcoming Related Events
33
Committed to Connecting the World
International
Organizations
Private Sector
Civil Society
& Academia
Governments
34
Only together we can achieve best results
35
Thank You
www.itu.int/cybersecurity www.itu150.org
tomas.lamanauskas@itu.int
itu150.org

More Related Content

What's hot

Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDIDavid Sweigert
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1DallasHaselhorst
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Network Effects
Network EffectsNetwork Effects
Network Effectsa16z
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...DATAVERSITY
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
P&C Insurance as a Digital Business
P&C Insurance as a Digital BusinessP&C Insurance as a Digital Business
P&C Insurance as a Digital BusinessSrinivas Koushik
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Data breach
Data breachData breach
Data breach
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
 
Cyber security
Cyber securityCyber security
Cyber security
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Takeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber AttackTakeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber Attack
 
Network Effects
Network EffectsNetwork Effects
Network Effects
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
P&C Insurance as a Digital Business
P&C Insurance as a Digital BusinessP&C Insurance as a Digital Business
P&C Insurance as a Digital Business
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 

Viewers also liked

3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert TrendSC Leung
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011Samvel Gevorgyan
 
Margaux_Cara_DIY_Presentation_2011
Margaux_Cara_DIY_Presentation_2011Margaux_Cara_DIY_Presentation_2011
Margaux_Cara_DIY_Presentation_2011cara_margaux
 
Rest Security with JAX-RS
Rest Security with JAX-RSRest Security with JAX-RS
Rest Security with JAX-RSFrank Kim
 

Viewers also liked (7)

Csrf
CsrfCsrf
Csrf
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert Trend
 
Moayad cirt app
Moayad cirt appMoayad cirt app
Moayad cirt app
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
 
Margaux_Cara_DIY_Presentation_2011
Margaux_Cara_DIY_Presentation_2011Margaux_Cara_DIY_Presentation_2011
Margaux_Cara_DIY_Presentation_2011
 
Rest Security with JAX-RS
Rest Security with JAX-RSRest Security with JAX-RS
Rest Security with JAX-RS
 
Why Web Security Matters!
Why Web Security Matters!Why Web Security Matters!
Why Web Security Matters!
 

Similar to ITU Cybersecurity Capabilities

Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
3.4 itu cop shah
3.4 itu cop shah3.4 itu cop shah
3.4 itu cop shahMr Nyak
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillaydotZADNA
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategiesBenjamin Ang
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buettisegughana
 
3. Research contexts: priorities, training and impact – Preetam Maloor
3. Research contexts: priorities, training and impact – Preetam Maloor3. Research contexts: priorities, training and impact – Preetam Maloor
3. Research contexts: priorities, training and impact – Preetam MaloorUNICEF Office of Research - Innocenti
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategyBright Boateng
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyGenève Lab
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19consultancyss
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 

Similar to ITU Cybersecurity Capabilities (20)

Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
3.4 itu cop shah
3.4 itu cop shah3.4 itu cop shah
3.4 itu cop shah
 
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landjiCTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buetti
 
3. Research contexts: priorities, training and impact – Preetam Maloor
3. Research contexts: priorities, training and impact – Preetam Maloor3. Research contexts: priorities, training and impact – Preetam Maloor
3. Research contexts: priorities, training and impact – Preetam Maloor
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public Policy
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
GROUP-1 (1).pdf
GROUP-1 (1).pdfGROUP-1 (1).pdf
GROUP-1 (1).pdf
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 

More from ITU

Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? ITU
 
Global Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersGlobal Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersITU
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsITU
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...ITU
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GITU
 
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...ITU
 
Connected Cars & 5G
Connected Cars & 5GConnected Cars & 5G
Connected Cars & 5GITU
 
5G for Connected and Automated Driving
5G for Connected and Automated Driving5G for Connected and Automated Driving
5G for Connected and Automated DrivingITU
 
Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of AutomotiveITU
 
The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. ITU
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesITU
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learningITU
 
Machine learning for 5G and beyond
Machine learning for 5G and beyondMachine learning for 5G and beyond
Machine learning for 5G and beyondITU
 
Efficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsEfficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsITU
 
AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportITU
 
Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15ITU
 
One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim ITU
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsITU
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...ITU
 
Enhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesEnhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesITU
 

More from ITU (20)

Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected?
 
Global Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersGlobal Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturers
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT Ecosystems
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5G
 
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
 
Connected Cars & 5G
Connected Cars & 5GConnected Cars & 5G
Connected Cars & 5G
 
5G for Connected and Automated Driving
5G for Connected and Automated Driving5G for Connected and Automated Driving
5G for Connected and Automated Driving
 
Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of Automotive
 
The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities.
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devices
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learning
 
Machine learning for 5G and beyond
Machine learning for 5G and beyondMachine learning for 5G and beyond
Machine learning for 5G and beyond
 
Efficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsEfficient Deep Learning in Communications
Efficient Deep Learning in Communications
 
AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 Report
 
Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15
 
One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGs
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
 
Enhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesEnhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable cities
 

Recently uploaded

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 

Recently uploaded (20)

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 

ITU Cybersecurity Capabilities

  • 2. Committed to Connecting the World 2 The importance of Cybersecurity • From industrial age to information societies - Increasing dependence on the availability of ICTs - Number of Internet users growing constantly (now 40% of world’s population) • Statistics and reports show that cyber-threats are on the rise - The likely annual cost to the global economy from Cybercrime is estimated at more than $455 billion (Source: McAfee Report on Economic Impact of Cybercrime, 2013). • Developing countries most at risk as they adopt broader use of ICTs - E.g. Africa leading in Mobile-broadband penetration: almost 20% in 2014- up from less than 2% in 2010 (Source: ITU ICT Statistics)
  • 3. Committed to Connecting the World 3 Need for building cybersecurity capacity
  • 5. Committed to Connecting the World Coordinated Response Need for a multilevel response to the cybersecurity challenges International Cooperation frameworks and exchange of information Harmonization of legislation and best practices at regional level National strategies and policies National response capabilities Country level capacity building and training International Regional National 5
  • 6. Committed to Connecting the World New Generation Cybersecuri- ty Policy National Priority A holistic approach Enhanced Coordina- tion Public- Private Coopera- tion Internatio- nal Coopera- tion Funda- mental Values Source: OECD 6
  • 7. Committed to Connecting the World Emerging Policy Trends Multistake- holder Dialogue Economic Aspects Flexible Approach Sovereignty Considera- tions Source: OECD 7
  • 8. Committed to Connecting the World 8 ITU and Cybersecurity
  • 9. Committed to Connecting the World 9 150 years of experience in ICTs • 150th Anniversary celebrated in May 2015 • ITU is based in Geneva, Switzerland • 193 Member States and 700 Sector Members (including Industry and Civil Society), Academia and Associates • Organized in three Sectors: – Radiocommunication (ITU-R) – Standardization (ITU-T) – Development (ITU-D)
  • 10. Committed to Connecting the World ITU and Cybersecurity 2003 – 2005 WSIS entrusted ITU as sole facilitator for WSIS Action Line C5 “Building Confidence and Security in the use of ICTs” 2007 ITU Secretary-General launched the Global Cybersecurity Agenda (GCA). A framework for international cooperation in cybersecurity 2008 - 2010 ITU Membership endorsed the GCA as the ITU-wide strategy on international cooperation. In 2008 the Child Online Protection Initiative was launched, as an international and multistakeholder collaborative framework fostering the protection of children online 10
  • 11. Committed to Connecting the World National Strategies Multistakeholder National Collaboration CIRTs Information & best practice sharing Public-Private Partnerships Measuring capabilities Elaborating Standards Protecting vulnerable groups Regional & International Cooperation 11 Source: 10-Year WSIS Action Line C5 Report (2014)
  • 12. Committed to Connecting the World 12 National Strategies  Developing comprehensive and efficient National Cybersecurity Strategies is fundamental for building a secure ICT ecosystem.  ITU together with its partners helps countries organize Child Online Protection Strategy Framework workshops to assist national stakeholders in planning and deploying an effective and practical approach to COP at a national level.
  • 13. Committed to Connecting the World 13
  • 14. Committed to Connecting the World 14 Cybersecurity Strategy Model
  • 15. Committed to Connecting the World 15 101 National CIRTs Worldwide National CIRTs for enhancing global resilience Need to fill the gaps
  • 16. Committed to Connecting the World 16 National CIRT Programme  Assess existing capability of/need for national cybersecurity mechanisms  On-site assessment through meetings, training, interview sessions and site visits  Form recommendations for plan of action (institutional, organizational and technical requirements)  Implement based on the identified needs and organizational structures of the country  Assist with planning, implementation, and operation of the CIRT.  Continued collaboration with the newly established CIRT for additional support  Capacity Building and trainings on the operational and technical details  Exercises organized at both regional and international levels  Help enhance the communication and response capabilities of the participating CIRTs  Improve overall cybersecurity readiness in the region  Provide opportunities for public-private cooperation
  • 17. Committed to Connecting the World 17 ITU’s National CIRT Programme • Assessments conducted for 61 countries • Implementation completed for 9 countries Cyprus​, Burkina Faso, Côte d'Ivoire, Ghana, ​Kenya​, Montenegro, Tanzania, Uganda, Zambia • Implementation in progress for 6 countries Barbados, ​Burundi, Gambia, Jamaica, Lebanon​, Trinidad and Tobago • 9 cyber drills conducted with participation of over 90 countries Organized in Myanmar, Jordan, Bulgaria, Uruguay, Oman, Lao P.D.R., Turkey, Peru, Zambia
  • 18. Committed to Connecting the World Objective The Global Cybersecurity Index (GCI) measures and ranks each nation state’s level of cybersecurity development in five main areas: • Legal Measures • Technical Measures • Organizational Measures • Capacity Building • National and International Cooperation Goals - Promote cyberesecurity strategies at a national level - Drive implementation efforts across industries and sectors - Integrate security into the core of technological progress - Foster a global culture of cybersecurity 18 Final Global and Regional Results 2014 are on ITU Website Next iteration in progress
  • 19. Committed to Connecting the World 19 Cyberwellness Country Profiles Factual information on cybersecurity achievements on each country based on the GCA pillars • 194 profiles to date • Live documents e.g.
  • 20. Committed to Connecting the World 20 Enhancing Cybersecurity in Least Developed Countries project Aims at supporting the 49 Least Developed Countries in strengthening their cybersecurity capabilities. How • Assessment for selected key government ministries & subsequent solutions provision • Capacity building through training of trainers, workshops,.. • Customised guidelines on legislation, regulation and technologies End Result • protection of their national infrastructure, including the critical information infrastructure, thereby making the Internet safer and protecting Internet users • serve national priorities and maximize socio-economic benefits in line with the objectives of the World Summit on the Information Society (WSIS) and the Millennium Development Goals (MDGs). We are only as secure as our weakest link Implemented in 4 countries Different stages of planning/implementation in 15 more
  • 21. Committed to Connecting the World Child Online Protection Initiative Key Objectives:  Identify risks and vulnerabilities to children in cyberspace  Create awareness  Develop practical tools to help minimize risk  Share knowledge and experience Partners: - 10 international organizations - 34 civil society organizations - 13 private sector organizations 21
  • 22. Committed to Connecting the World 22 Key COP Activities  Elaboration of COP Guidelines for parents, children, policy makers and industry  New! Updated version of the COP Guidelines for Industry with the contribution of several partners (UNICEF, GSMA, Sony, Facebook, The Walt Disney Company and EBU)  COP National Strategy Framework  ITU together with its partners helps countries organize Child Online Protection Strategy Framework workshops to assist national stakeholders in planning and deploying an effective and practical approach to COP at a national level.  Child Online Protection Challenge  Educating children by presenting an interactive platform where children, parents and educators can engage in fun activities to learn more about the risks that the children face on the Internet and how these risks can be averted.  Council Working Group on Child Online Protection (CWG-COP)  Multi-stakeholder open platform, where 193 Member States and other stakeholders exchange views and promote work on the subject matter
  • 23. Committed to Connecting the World Economic Impact of Standardization Adds 0.3% - 1% to the GDP Source: European Commission ITU-T Study Group 17 – Security • Over 300 standards (ITU-T Recommendations) relevant to security • Key areas of current work: • Cybersecurity • Child Online Protection • Security architectures and frameworks • Countering spam • Identity management • Security of applications and services for the Internet of Things, web services, social networks, cloud computing and Big Data Standardization 23
  • 24. Committed to Connecting the World World Conference on International Telecommunications (WCIT-12) WCIT-12 set the ground for international cooperation on certain cybersecurity- related matters  Article 6, ITRs: Security and robustness of networks  Article 7, ITRs: Unsolicited bulk electronic communications 24
  • 25. Committed to Connecting the World 25 New edition 2014: ITU Publication on UNDERSTANDING CYBERCRIME: Phenomena, Challenges and Legal Response The Guide serves to help developing countries better understand the implications related to the growing cyber-threats and assist in the assessment of the current legal framework and in the establishment of a sound legal foundation. Publications COMBATTING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Joint project among several partners under the coordination of the World Bank to build capacity in developing countries in the policy, legal and criminal justice aspects of the combat against “cybercrime”
  • 26. Committed to Connecting the World 26 Capacity building initiatives, joint consultations and more. Best practices in cybercrime legislations, joint technical assistance to member states, information sharing Tap on expertise of globally recognized industry players and accelerate info sharing with ITU member states Building a global partnership Collaboration with ABI Research – The Global Cybersecurity Index (GCI) Collaboration with FIRST – To share best practices on computer incident response, engage in joint events, facilitate affiliation of national CIRTS of member states Collaboration with Member States – Regional Cybersecurity Centres
  • 27. Committed to Connecting the World 27 Coordinated Action
  • 28. Committed to Connecting the World Budapest Convention (2001), 45 Countries ratified/acceded 24/7 Network – some 50 countries, since 1997 EU Cybersecurity Strategy (2013) Produced set of confidence-building measures (CBMs) to reduce the risks of conflict stemming from the use of ICTs International and Regional Cooperation Comparative Analyses on Cybersecurity Policies Convention on Cybersecurity and Personal Data Protection (2014) 28
  • 29. Committed to Connecting the World UN Efforts - Resolutions 69/166 and 68/167 of the UN General Assembly on “The Right to privacy in the digital age” (2014-2013) - Resolutions 69/28 and 68/243 of the UN General Assembly on “Developments in the field of information and telecommunications in the context of international security” (2014-2013) - Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (2013) - Resolution 20/8 of the Human Rights Council on “The promotion, protection and enjoyment of human rights on the Internet” (2012) - Resolution 64/211 of the UN General Assembly on “Creation of a global culture of cybersecurity and taking stock of national efforts to protect critical information infrastructures” (2010) 29
  • 30. Committed to Connecting the World UN-wide cooperation mechanisms UN-wide Framework on Cybersecurity and Cybercrime (2013)  Developed by ITU and UNODC along with 33 UN Agencies.  Enables enhanced coordination among UN entities in their response to concerns of Member States regarding cybercrime and cybersecurity UN System Internal Coordination Plan on Cybersecurity and Cybercrime (2014)  Developed building on the UN-wide Framework on Cybersecurity and Cybercrime upon request by the UN Secretary-General, Mr. Ban Ki-moon  Designed as a guide to improve the internal coordination activities of the UN system organizations on related matters 30
  • 31. Committed to Connecting the World 31 • ITU Member States committed to work towards the shared vision of: – “An information society, empowered by the interconnected world, where telecommunication/ICTs enable and accelerate social, economic and environmentally sustainable growth and development for everyone” Connect 2020 Agenda for Global Telecommunication/ICT Development
  • 32. Committed to Connecting the World 32 Global Telecommunication/ICT Targets 4 by2020... Goal 1 Growth – Enable and foster access to and increased use of telecommunications/ICTs 55% of households should have access to the Internet 60% of individuals should be using the Internet 40% Telecommunications/ICTs should be 40% more affordable Goal 2 Inclusiveness – Bridge the digital divide and provide broadband for all 50% of households should have access to the Internet in the developing world; 15% in the least developed countries 50% of individuals should be using the Internet in the developing world; 20% in the least developed countries 40% affordability gap between developed and developing countries should be reduced by 40% 5% Broadband services should cost no more than 5% of average monthly income in the developing countries 90% of the rural population should be covered by broadband services Gender equality among Internet users should be reached Goal 4 Innovation and partnership – Lead, improve and adapt to the changing telecommunication/ICT environment Enabling environments ensuring accessible ICTs for persons with disabilities should be established in all countries 40% improvement in cybersecurity readiness 50% reduction in volume of redundant e-waste 30% decrease in Green House Gas emissions per device generated by the telecommunication/ICT sector Telecommunication/ICT environment conducive to innovation Effective partnerships of stakeholders in telecommunication/ICT environment Goal 3 Sustainability – Manage challenges resulting from the telecommunication/ICT development
  • 33. Committed to Connecting the World • Regional Cyber Security Summit 29-30 March 2015, Muscat, Oman • WSIS Forum 2015 25-29 May 2015, Geneva, Switzerland • Regional Cyber Drills planned for 2015 Cyberdrill for Africa, Kigali, Rwanda, 5-7 May 2015 Upcoming ones in Egypt, Sri Lanka, Montenegro and Colombia Upcoming Related Events 33
  • 34. Committed to Connecting the World International Organizations Private Sector Civil Society & Academia Governments 34 Only together we can achieve best results