SlideShare ist ein Scribd-Unternehmen logo
1 von 19
www.itu150.org
Protecting Critical Infrastructure
A multi-layered approach
Tomas Lamanauskas
Head, Corporate Strategy Division
21 April 2015
Committed to Connecting the World
2
The importance of Cybersecurity
• From industrial age to information societies
- Increasing dependence on the availability of ICTs
- Number of Internet users growing constantly (now 40% of world’s population)
• Statistics and reports show that cyber-
threats are on the rise
- The likely annual cost to the global economy from
Cybercrime is estimated at more than $455 billion
(Source: McAfee Report on Economic Impact of Cybercrime, 2013).
• Developing countries most at risk as they
adopt broader use of ICTs
- E.g. Africa leading in Mobile-broadband
penetration: almost 20% in 2014- up from less
than 2% in 2010 (Source: ITU ICT Statistics)
• Need for building cybersecurity capacity
- Protection is crucial for the socio-economic
wellbeing of a country in the adoption of new
technologies
Source: Symantec 2014 Internet Security Threat Report
Committed to Connecting the World
3
Critical Infrastructure Protection and Cybersecurity
Committed to Connecting the World
4
Committed to Connecting the World
Coordinated Response
Need for a multi-level response to the cybersecurity challenges
International Cooperation
frameworks and exchange of
information
Harmonization of legislation and best
practices at regional level
National strategies and policies
National response capabilities
Country level capacity building and training
International
Regional
National
5
Committed to Connecting the World
6
Committed to Connecting the World
7
Legal Measures
- Legal Measures
Strategy
- Government Legal
Authority
- Adequate
Cybercrime legislation
Technical/Proce
dural Measures
- National
Cybersecurity Goals
and Framework
- Secure Government
Infrastructure
- Global Technical
Collaboration
Organizational
Structures
- Government
Coordination
- National Focal Point
- National CIRT
- Public-Private
Partnerships
Capacity Building
- Cybersecurity Skills
and Training
- Culture of
Cybersecurity
- Cybersecurity
Innovation
International
Cooperation
- Multi-/Bilateral
collaboration
- Inter-Agency
Collaboration
Holistic Approach- Five areas of action
Committed to Connecting the World
8
ITU Activities
Committed to Connecting the World
ITU and Cybersecurity
2003 – 2005
WSIS entrusted ITU as sole facilitator for WSIS Action Line C5
“Building Confidence and Security in the use of ICTs”
2007
ITU Secretary-General launched the Global Cybersecurity
Agenda (GCA). A framework for international cooperation in
cybersecurity
2008 - 2010
ITU Membership endorsed the GCA as the ITU-wide strategy on
international cooperation.
In 2008 the Child Online Protection Initiative was launched, as
an international and multistakeholder collaborative framework
fostering the protection of children online 9
Committed to Connecting the World
10
100 National CIRTs Worldwide
Need to fill the gaps
National CIRTs are in the first line of cyber-response
• Providing incident response support;
• Dissemination of early warnings and
alerts
• Facilitating communications and
information sharing among stakeholders
• Developing mitigation and response
strategies and coordinating incident
response
• Sharing data and information about the
incident and corresponding responses
• Publicising best practices in incident
response and prevention advice
• Coordinating international cooperation on
cyber incidents
Committed to Connecting the World
11
National CIRT Programme
 Assess existing capability
of/need for national
cybersecurity mechanisms
 On-site assessment through
meetings, training, interview
sessions and site visits
 Form recommendations for plan
of action (institutional,
organizational and technical
requirements)
 Implement based on the identified
needs and organizational structures
of the country
 Assist with planning,
implementation, and operation of
the CIRT.
 Continued collaboration with the
newly established CIRT for
additional support
 Capacity Building and trainings on
the operational and technical details
 Exercises organized at both
regional and international
levels
 Help enhance the
communication and
response capabilities of the
participating CIRTs
 Improve overall
cybersecurity readiness in
the region
 Provide opportunities for
public-private cooperation
Committed to Connecting the World
12
ITU’s National CIRT Programme
• Assessments conducted for 64 countries
• Implementation completed for 9 countries
​Burkina Faso, Côte d'Ivoire, Cyprus, Ghana, Kenya​, Montenegro, Tanzania, Uganda, Zambia
• Implementation in progress for 6 countries
Barbados, ​Burundi, Gambia, Jamaica, Lebanon​, Trinidad and Tobago
• 9 cyber drills conducted with participation of over 100
countries
Organized in Myanmar, Jordan, Bulgaria, Uruguay, Oman, Lao P.D.R., Turkey, Peru, Zambia
Committed to Connecting the World
Objective
The Global Cybersecurity Index (GCI)
measures and ranks each nation state’s
level of cybersecurity development in five
main areas:
• Legal Measures
• Technical Measures
• Organizational Measures
• Capacity Building
• National and International Cooperation
Goals
- Promote cyberesecurity strategies at a
national level
- Drive implementation efforts across
industries and sectors
- Integrate security into the core of
technological progress
- Foster a global culture of cybersecurity
13
Final Global and Regional Results 2014 are on ITU Website
Next iteration in progress
Committed to Connecting the World
14
Enhancing Cybersecurity in Least Developed Countries project
Aims at supporting the 49 Least Developed Countries in strengthening their cybersecurity
capabilities.
How
• Assessment for selected key government ministries &
subsequent solutions provision
• Capacity building through training of trainers, workshops,..
• Customised guidelines on legislation, regulation and technologies
End Result
• protection of their national infrastructure, including the critical information
infrastructure, thereby making the Internet safer and protecting Internet users
• serve national priorities and maximize socio-economic benefits in line with the
objectives of the World Summit on the Information Society (WSIS) and the Millennium
Development Goals (MDGs).
We are only as secure as our weakest link
Implemented in 4 countries
Different stages of planning/implementation in 15 more
Committed to Connecting the World
Economic Impact
of Standardization
Adds 0.3% - 1% to
the GDP
Source: European Commission
ITU-T Study Group 17 – Security
• Over 300 standards (ITU-T Recommendations)
relevant to security
• Key areas of current work:
• Cybersecurity
• Child Online Protection
• Security architectures and frameworks
• Countering spam
• Identity management
• Security of applications and services
for the Internet of Things, web
services, social networks, cloud
computing and Big Data
Standardization
15
Committed to Connecting the World
16
Capacity building initiatives, joint consultations and more.
Best practices in cybercrime legislations, joint technical assistance to member
states, information sharing
Tap on expertise of globally recognized industry players and accelerate
info sharing with ITU member states
Building a global partnership
Collaboration with ABI Research – The Global Cybersecurity Index (GCI)
Collaboration with FIRST – To share best practices on computer incident response, engage
in joint events, facilitate affiliation of national CIRTS of member states
Collaboration with Member States – Regional Cybersecurity Centres
Committed to Connecting the World
UN-wide cooperation mechanisms
UN-wide Framework on Cybersecurity and Cybercrime (2013)
 Developed by ITU and UNODC along with 33 UN Agencies.
 Enables enhanced coordination among UN entities in their response to
concerns of Member States regarding cybercrime and cybersecurity
UN System Internal Coordination Plan on Cybersecurity and
Cybercrime (2014)
 Developed building on the UN-wide Framework on Cybersecurity and
Cybercrime upon request by the UN Secretary-General, Mr. Ban Ki-moon
 Designed as a guide to improve the internal coordination activities of the
UN system organizations on related matters
17
Committed to Connecting the World
• Cyberdrill for African Region
5-7 May 2015, Kigali, Rwanda
• Cyberdrill for Arab Region
17-19 May 2015, Hurghada, Egypt
• Capacity Building Programme on Critical National Infrastructure Protection
20-21 May 2015, Hurghada, Egypt
• International Conference on Computer Security in a Nuclear World: Expert
Discussion and Exchange
1-5 June 2015, Vienna, Austria. Organized by IAEA in cooperation with
INTERPOL, ITU, UNICRI and IEC
18
Upcoming Relevant Events
19
Thank You
www.itu.int/cybersecurity www.itu150.org
tomas.lamanauskas@itu.int
itu150.org

Weitere ähnliche Inhalte

Was ist angesagt?

Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructureNeha Agarwal
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Benjamin Ang
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Benjamin Ang
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
 
Un security-resolution 57 239
Un security-resolution 57 239 Un security-resolution 57 239
Un security-resolution 57 239 Genti79
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategiesBenjamin Ang
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19consultancyss
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Benjamin Ang
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportBenjamin Ang
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 

Was ist angesagt? (20)

Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
Un security-resolution 57 239
Un security-resolution 57 239 Un security-resolution 57 239
Un security-resolution 57 239
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI Report
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 

Andere mochten auch

Nelson Mandela Tribute
Nelson Mandela TributeNelson Mandela Tribute
Nelson Mandela TributeITU
 
4th Generation Regulation: driving digital communications ahead
4th Generation Regulation: driving digital communications ahead4th Generation Regulation: driving digital communications ahead
4th Generation Regulation: driving digital communications aheadITU
 
Measuring the Information Society 2014 report overview
Measuring the Information Society 2014 report overviewMeasuring the Information Society 2014 report overview
Measuring the Information Society 2014 report overviewITU
 
Statshot december 2012
Statshot december 2012Statshot december 2012
Statshot december 2012ITU
 
WSIS+10 High-Level Event briefing
WSIS+10 High-Level Event briefingWSIS+10 High-Level Event briefing
WSIS+10 High-Level Event briefingITU
 
Measuring the Information Society report 2012 launch presentation
Measuring the Information Society report 2012 launch presentationMeasuring the Information Society report 2012 launch presentation
Measuring the Information Society report 2012 launch presentationITU
 
Digital Opportunities: Innovative ICT Solutions for Youth Employment
Digital Opportunities: Innovative ICT Solutions for Youth EmploymentDigital Opportunities: Innovative ICT Solutions for Youth Employment
Digital Opportunities: Innovative ICT Solutions for Youth EmploymentITU
 
WCIT12 myth busting presentation
WCIT12 myth busting presentationWCIT12 myth busting presentation
WCIT12 myth busting presentationITU
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU
 
The Future of ICT / TIME: Futurist Gerd Leonhard in Cologne (NSN)
The Future of ICT / TIME: Futurist Gerd Leonhard in Cologne (NSN)The Future of ICT / TIME: Futurist Gerd Leonhard in Cologne (NSN)
The Future of ICT / TIME: Futurist Gerd Leonhard in Cologne (NSN)Gerd Leonhard
 
#Plenipot14 media briefing
#Plenipot14 media briefing#Plenipot14 media briefing
#Plenipot14 media briefingITU
 
Itu world slideshare
Itu world slideshareItu world slideshare
Itu world slideshareITU
 
ITU review of Child Online Protection activities in Central + South Eastern E...
ITU review of Child Online Protection activities in Central + South Eastern E...ITU review of Child Online Protection activities in Central + South Eastern E...
ITU review of Child Online Protection activities in Central + South Eastern E...ITU
 
System Transformation
System TransformationSystem Transformation
System TransformationITU
 
ITU Standardization of Telebiometric applications
ITU Standardization of Telebiometric applications ITU Standardization of Telebiometric applications
ITU Standardization of Telebiometric applications ITU
 
ICT for SDGs
ICT for SDGsICT for SDGs
ICT for SDGsITU
 
Forecasts & Trend in the ICT Industry
Forecasts & Trend in the ICT IndustryForecasts & Trend in the ICT Industry
Forecasts & Trend in the ICT IndustryIBA
 
Emerging & Future Trends in ICT
Emerging & Future Trends in ICTEmerging & Future Trends in ICT
Emerging & Future Trends in ICTDerek Keats
 
Safe Listening Standards
Safe Listening StandardsSafe Listening Standards
Safe Listening StandardsITU
 

Andere mochten auch (20)

Nelson Mandela Tribute
Nelson Mandela TributeNelson Mandela Tribute
Nelson Mandela Tribute
 
4th Generation Regulation: driving digital communications ahead
4th Generation Regulation: driving digital communications ahead4th Generation Regulation: driving digital communications ahead
4th Generation Regulation: driving digital communications ahead
 
Measuring the Information Society 2014 report overview
Measuring the Information Society 2014 report overviewMeasuring the Information Society 2014 report overview
Measuring the Information Society 2014 report overview
 
The Future of ICT Training: Will You Survive?
The Future of ICT Training: Will You Survive?  The Future of ICT Training: Will You Survive?
The Future of ICT Training: Will You Survive?
 
Statshot december 2012
Statshot december 2012Statshot december 2012
Statshot december 2012
 
WSIS+10 High-Level Event briefing
WSIS+10 High-Level Event briefingWSIS+10 High-Level Event briefing
WSIS+10 High-Level Event briefing
 
Measuring the Information Society report 2012 launch presentation
Measuring the Information Society report 2012 launch presentationMeasuring the Information Society report 2012 launch presentation
Measuring the Information Society report 2012 launch presentation
 
Digital Opportunities: Innovative ICT Solutions for Youth Employment
Digital Opportunities: Innovative ICT Solutions for Youth EmploymentDigital Opportunities: Innovative ICT Solutions for Youth Employment
Digital Opportunities: Innovative ICT Solutions for Youth Employment
 
WCIT12 myth busting presentation
WCIT12 myth busting presentationWCIT12 myth busting presentation
WCIT12 myth busting presentation
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
The Future of ICT / TIME: Futurist Gerd Leonhard in Cologne (NSN)
The Future of ICT / TIME: Futurist Gerd Leonhard in Cologne (NSN)The Future of ICT / TIME: Futurist Gerd Leonhard in Cologne (NSN)
The Future of ICT / TIME: Futurist Gerd Leonhard in Cologne (NSN)
 
#Plenipot14 media briefing
#Plenipot14 media briefing#Plenipot14 media briefing
#Plenipot14 media briefing
 
Itu world slideshare
Itu world slideshareItu world slideshare
Itu world slideshare
 
ITU review of Child Online Protection activities in Central + South Eastern E...
ITU review of Child Online Protection activities in Central + South Eastern E...ITU review of Child Online Protection activities in Central + South Eastern E...
ITU review of Child Online Protection activities in Central + South Eastern E...
 
System Transformation
System TransformationSystem Transformation
System Transformation
 
ITU Standardization of Telebiometric applications
ITU Standardization of Telebiometric applications ITU Standardization of Telebiometric applications
ITU Standardization of Telebiometric applications
 
ICT for SDGs
ICT for SDGsICT for SDGs
ICT for SDGs
 
Forecasts & Trend in the ICT Industry
Forecasts & Trend in the ICT IndustryForecasts & Trend in the ICT Industry
Forecasts & Trend in the ICT Industry
 
Emerging & Future Trends in ICT
Emerging & Future Trends in ICTEmerging & Future Trends in ICT
Emerging & Future Trends in ICT
 
Safe Listening Standards
Safe Listening StandardsSafe Listening Standards
Safe Listening Standards
 

Ähnlich wie Protecting Critical Infrastructure: a multi-layered approach

Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillaydotZADNA
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victorsegughana
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...APNIC
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasEmyana Ruth
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomySettapong_CyberSecurity
 
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCAFrancis Amaning
 

Ähnlich wie Protecting Critical Infrastructure: a multi-layered approach (20)

Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
GROUP-1 (1).pdf
GROUP-1 (1).pdfGROUP-1 (1).pdf
GROUP-1 (1).pdf
 
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
International Collaboration for Regional Cybersecurity Risk, by Yurie Ito [AP...
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNas
 
CTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu MkandawireCTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu Mkandawire
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
CTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu MkandawireCTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu Mkandawire
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
 

Mehr von ITU

Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? ITU
 
Global Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersGlobal Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersITU
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsITU
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...ITU
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GITU
 
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...ITU
 
Connected Cars & 5G
Connected Cars & 5GConnected Cars & 5G
Connected Cars & 5GITU
 
5G for Connected and Automated Driving
5G for Connected and Automated Driving5G for Connected and Automated Driving
5G for Connected and Automated DrivingITU
 
Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of AutomotiveITU
 
The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. ITU
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesITU
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learningITU
 
Machine learning for 5G and beyond
Machine learning for 5G and beyondMachine learning for 5G and beyond
Machine learning for 5G and beyondITU
 
Efficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsEfficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsITU
 
AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportITU
 
Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15ITU
 
One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim ITU
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsITU
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...ITU
 
Enhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesEnhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesITU
 

Mehr von ITU (20)

Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected? Do we need a wakeup call to keep driver-less cars protected?
Do we need a wakeup call to keep driver-less cars protected?
 
Global Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturersGlobal Virtual Mobile Network for Car manufacturers
Global Virtual Mobile Network for Car manufacturers
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT Ecosystems
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...Learning from the past: Systematization for Attacks and Countermeasures on Mo...
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
Trustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5GTrustworthy networking and technical considerations for 5G
Trustworthy networking and technical considerations for 5G
 
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
 
Connected Cars & 5G
Connected Cars & 5GConnected Cars & 5G
Connected Cars & 5G
 
5G for Connected and Automated Driving
5G for Connected and Automated Driving5G for Connected and Automated Driving
5G for Connected and Automated Driving
 
Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of Automotive
 
The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities. The Connected Vehicle - Challenges and Opportunities.
The Connected Vehicle - Challenges and Opportunities.
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devices
 
AI and machine learning
AI and machine learningAI and machine learning
AI and machine learning
 
Machine learning for 5G and beyond
Machine learning for 5G and beyondMachine learning for 5G and beyond
Machine learning for 5G and beyond
 
Efficient Deep Learning in Communications
Efficient Deep Learning in CommunicationsEfficient Deep Learning in Communications
Efficient Deep Learning in Communications
 
AI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 ReportAI for Good Global Summit - 2017 Report
AI for Good Global Summit - 2017 Report
 
Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15Standardization of XDSL and MGfast in ITU-T SG15
Standardization of XDSL and MGfast in ITU-T SG15
 
One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim
 
ICTs, LDCs and the SDGs
ICTs, LDCs and the SDGsICTs, LDCs and the SDGs
ICTs, LDCs and the SDGs
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...Collection Methodology for Key Performance Indicators for Smart Sustainable C...
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
 
Enhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable citiesEnhancing innovation and participation in smart sustainable cities
Enhancing innovation and participation in smart sustainable cities
 

Kürzlich hochgeladen

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Protecting Critical Infrastructure: a multi-layered approach

  • 1. www.itu150.org Protecting Critical Infrastructure A multi-layered approach Tomas Lamanauskas Head, Corporate Strategy Division 21 April 2015
  • 2. Committed to Connecting the World 2 The importance of Cybersecurity • From industrial age to information societies - Increasing dependence on the availability of ICTs - Number of Internet users growing constantly (now 40% of world’s population) • Statistics and reports show that cyber- threats are on the rise - The likely annual cost to the global economy from Cybercrime is estimated at more than $455 billion (Source: McAfee Report on Economic Impact of Cybercrime, 2013). • Developing countries most at risk as they adopt broader use of ICTs - E.g. Africa leading in Mobile-broadband penetration: almost 20% in 2014- up from less than 2% in 2010 (Source: ITU ICT Statistics) • Need for building cybersecurity capacity - Protection is crucial for the socio-economic wellbeing of a country in the adoption of new technologies Source: Symantec 2014 Internet Security Threat Report
  • 3. Committed to Connecting the World 3 Critical Infrastructure Protection and Cybersecurity
  • 5. Committed to Connecting the World Coordinated Response Need for a multi-level response to the cybersecurity challenges International Cooperation frameworks and exchange of information Harmonization of legislation and best practices at regional level National strategies and policies National response capabilities Country level capacity building and training International Regional National 5
  • 7. Committed to Connecting the World 7 Legal Measures - Legal Measures Strategy - Government Legal Authority - Adequate Cybercrime legislation Technical/Proce dural Measures - National Cybersecurity Goals and Framework - Secure Government Infrastructure - Global Technical Collaboration Organizational Structures - Government Coordination - National Focal Point - National CIRT - Public-Private Partnerships Capacity Building - Cybersecurity Skills and Training - Culture of Cybersecurity - Cybersecurity Innovation International Cooperation - Multi-/Bilateral collaboration - Inter-Agency Collaboration Holistic Approach- Five areas of action
  • 8. Committed to Connecting the World 8 ITU Activities
  • 9. Committed to Connecting the World ITU and Cybersecurity 2003 – 2005 WSIS entrusted ITU as sole facilitator for WSIS Action Line C5 “Building Confidence and Security in the use of ICTs” 2007 ITU Secretary-General launched the Global Cybersecurity Agenda (GCA). A framework for international cooperation in cybersecurity 2008 - 2010 ITU Membership endorsed the GCA as the ITU-wide strategy on international cooperation. In 2008 the Child Online Protection Initiative was launched, as an international and multistakeholder collaborative framework fostering the protection of children online 9
  • 10. Committed to Connecting the World 10 100 National CIRTs Worldwide Need to fill the gaps National CIRTs are in the first line of cyber-response • Providing incident response support; • Dissemination of early warnings and alerts • Facilitating communications and information sharing among stakeholders • Developing mitigation and response strategies and coordinating incident response • Sharing data and information about the incident and corresponding responses • Publicising best practices in incident response and prevention advice • Coordinating international cooperation on cyber incidents
  • 11. Committed to Connecting the World 11 National CIRT Programme  Assess existing capability of/need for national cybersecurity mechanisms  On-site assessment through meetings, training, interview sessions and site visits  Form recommendations for plan of action (institutional, organizational and technical requirements)  Implement based on the identified needs and organizational structures of the country  Assist with planning, implementation, and operation of the CIRT.  Continued collaboration with the newly established CIRT for additional support  Capacity Building and trainings on the operational and technical details  Exercises organized at both regional and international levels  Help enhance the communication and response capabilities of the participating CIRTs  Improve overall cybersecurity readiness in the region  Provide opportunities for public-private cooperation
  • 12. Committed to Connecting the World 12 ITU’s National CIRT Programme • Assessments conducted for 64 countries • Implementation completed for 9 countries ​Burkina Faso, Côte d'Ivoire, Cyprus, Ghana, Kenya​, Montenegro, Tanzania, Uganda, Zambia • Implementation in progress for 6 countries Barbados, ​Burundi, Gambia, Jamaica, Lebanon​, Trinidad and Tobago • 9 cyber drills conducted with participation of over 100 countries Organized in Myanmar, Jordan, Bulgaria, Uruguay, Oman, Lao P.D.R., Turkey, Peru, Zambia
  • 13. Committed to Connecting the World Objective The Global Cybersecurity Index (GCI) measures and ranks each nation state’s level of cybersecurity development in five main areas: • Legal Measures • Technical Measures • Organizational Measures • Capacity Building • National and International Cooperation Goals - Promote cyberesecurity strategies at a national level - Drive implementation efforts across industries and sectors - Integrate security into the core of technological progress - Foster a global culture of cybersecurity 13 Final Global and Regional Results 2014 are on ITU Website Next iteration in progress
  • 14. Committed to Connecting the World 14 Enhancing Cybersecurity in Least Developed Countries project Aims at supporting the 49 Least Developed Countries in strengthening their cybersecurity capabilities. How • Assessment for selected key government ministries & subsequent solutions provision • Capacity building through training of trainers, workshops,.. • Customised guidelines on legislation, regulation and technologies End Result • protection of their national infrastructure, including the critical information infrastructure, thereby making the Internet safer and protecting Internet users • serve national priorities and maximize socio-economic benefits in line with the objectives of the World Summit on the Information Society (WSIS) and the Millennium Development Goals (MDGs). We are only as secure as our weakest link Implemented in 4 countries Different stages of planning/implementation in 15 more
  • 15. Committed to Connecting the World Economic Impact of Standardization Adds 0.3% - 1% to the GDP Source: European Commission ITU-T Study Group 17 – Security • Over 300 standards (ITU-T Recommendations) relevant to security • Key areas of current work: • Cybersecurity • Child Online Protection • Security architectures and frameworks • Countering spam • Identity management • Security of applications and services for the Internet of Things, web services, social networks, cloud computing and Big Data Standardization 15
  • 16. Committed to Connecting the World 16 Capacity building initiatives, joint consultations and more. Best practices in cybercrime legislations, joint technical assistance to member states, information sharing Tap on expertise of globally recognized industry players and accelerate info sharing with ITU member states Building a global partnership Collaboration with ABI Research – The Global Cybersecurity Index (GCI) Collaboration with FIRST – To share best practices on computer incident response, engage in joint events, facilitate affiliation of national CIRTS of member states Collaboration with Member States – Regional Cybersecurity Centres
  • 17. Committed to Connecting the World UN-wide cooperation mechanisms UN-wide Framework on Cybersecurity and Cybercrime (2013)  Developed by ITU and UNODC along with 33 UN Agencies.  Enables enhanced coordination among UN entities in their response to concerns of Member States regarding cybercrime and cybersecurity UN System Internal Coordination Plan on Cybersecurity and Cybercrime (2014)  Developed building on the UN-wide Framework on Cybersecurity and Cybercrime upon request by the UN Secretary-General, Mr. Ban Ki-moon  Designed as a guide to improve the internal coordination activities of the UN system organizations on related matters 17
  • 18. Committed to Connecting the World • Cyberdrill for African Region 5-7 May 2015, Kigali, Rwanda • Cyberdrill for Arab Region 17-19 May 2015, Hurghada, Egypt • Capacity Building Programme on Critical National Infrastructure Protection 20-21 May 2015, Hurghada, Egypt • International Conference on Computer Security in a Nuclear World: Expert Discussion and Exchange 1-5 June 2015, Vienna, Austria. Organized by IAEA in cooperation with INTERPOL, ITU, UNICRI and IEC 18 Upcoming Relevant Events

Hinweis der Redaktion

  1. 14