SlideShare ist ein Scribd-Unternehmen logo
1 von 24
December 2010
An Overview of ITU’s Cybersecurity Activities
Cybersecurity for ALL
CTO meeting
25, 26 April 2013
Yaoundé
ITU International Cooperation on Cybersecurity
Jean-Jacques MASSIMA-LANDJI,
ITU Representative for Central Africa and
Madagascar
jean-jacques.massima@itu.int
December 2010
Why International Cooperation?
► The victim can be anywhere around the globe
while the criminal is operating in elsewhere
in far away
► The challenges are inherently international
in scope and require international cooperation,
investigative assistance, and common substantive
and procedural provisions
► Thus, it is important that countries harmonize their legal frameworks to combat
cybercrime and facilitate international cooperation.
Phenomena of Cybercrime
Harmonization on legal framework
December 2010
Legal Challenges to Fight Against Cybercrime
 Challenges in Drafting National Criminal Laws
► The main challenge for national criminal legal systems is
the delay between the recognition of potential abuses of
new technologies and necessary amendments to the
national criminal law. This challenge remains as relevant
and topical as ever as the speed of network innovation
accelerates.
 Increasing Use of ICTs and the Need for New
Investigative Instruments
► Recent developments in ICTs have not only resulted in
new cybercrimes and new criminal methods, but also
new methods of investigating cybercrime. Advances in
ICTs have greatly expanded the abilities of law
enforcement agencies. Conversely, offenders may use
new tools to prevent identification and hamper
investigation.
December 2010 4
Global Framework for Cybersecurity
At the World Summit on the Information Society (WSIS)
in 2005, ITU was entrusted by leaders of the international
community to act as the facilitator for
WSIS Action Line C5:
“Building confidence and
security in the use of ICTs”
December 2010
ITU Global Cybersecurity Agenda
In 2007, ITU Secretary-General launched the Global
Cybersecurity Agenda, an international framework for
collaboration on Cybersecurity matters that addresses
five main areas:
1. Legal Measures
2. Technical and Procedural
Measures
3. Organizational Structure
4. Capacity Building
5. International Cooperation
“Building confidence and
security in the use of ICTs”
6
December 2010
Legal Measures
 Summary of objective:
Harmonization of legal frameworks and
the elaboration of strategies for cybercrime legislation
globally applicable and interoperable
with national/regional legislative measures
• ITU Cybercrime
Legislation Resources
• ITU Toolkit for
Cybercrime Legislation
Resources
• ITU Publication on
Understanding Cybercrime:
A Guide for
Developing Countries
Publications
•Capacity building, training
(training for judges, etc.)
•Regional workshops and events
Training and Events
Related activities/initiatives
7
December 2010 8
Examples of Recent Initiatives
ITU Publication on Understanding
Cybercrime: A Guide for Developing
Countries provides a comprehensive
overview of the most relevant topics
linked to the legal aspect of cybersecurity
and cybercrime.
ITU Toolkit for Cybercrime Legislation
aims to provide countries with sample
legislative language and reference material
that can assist in the establishment of
harmonized cybercrime laws and
procedural rules.
 www.itu.int/ITU-D/cyb/cybersecurity/legislation.html
December 2010
Technical and Procedural Measures
 Summary of objective :
Development of strategies for the establishment of
globally accepted security protocols, standards,
minimum security criteria and accreditation schemes
for hardware and software applications and systems
• ITU Standardization Work
• ICT Security Standards
Roadmap promoting
collaboration
• ITU Radiocommunication
security activities
Security Activities
• ITU-T Study Group 17
• ITU-T Study Group 2
Study Groups
Related activities/initiatives
9
December 2010
Organizational Structures
 Summary of objective :
Elaboration of global strategies for the creation of
appropriate national and regional organizational structures
and policies on cybercrime, watch, warning and
incident response and universal identity systems
Partnerships
• Development of national
computer incident
response teams (CIRTs)
and watch, warning and
incident response related
training
• Etc.
Projects
• Capacity building and training
• Regional workshops and
events
• Direct assistance to countries
Training/ Assistance
Related activities/initiatives
ITU Secretary-General Dr Hamadoun Touré
10
• International Multilateral
Partnership Against Cyber
Threats (IMPACT)
collaboration services
•Partnerships with other
entities to deliver specific
services to Member States
December 2010
Capacity Building
 Summary of objective :
Development of global strategies to facilitate human
and institutional capacity building across
all relevant aspects of cybersecurity
• ITU National Cybersecurity/
CIIP Self-Assessment Tool
• ITU Toolkit for Promoting a
Culture of Cybersecurity
• ITU Botnet Mitigation
Toolkit and pilot projects
Toolkits and Resources
• IMPACT Training and
Skills Development
Centre
• IMPACT Research
Division
IMPACT Project
• Capacity building and
training across all the pillars
of the GCA
• Targeted workshops and
events
Training and Events
Related activities/initiatives
11
December 2010
International Cooperation
 Summary of objective :
Development of proposals to enhance international
dialogue on issues that pertain to cybersecurity and
enhance cooperation and coordination across
all relevant activities
• ITU Secretary-General
High Level Expert Group
(HLEG) deliverables
Working Together
• ITU-IMPACT collaboration
• ITU Cybersecurity Gateway
• ITU’s Child Online
Protection (COP)
initiative
Information Sharing
• World Telecommunication
and Policy Forum WTPF 2009
• Regional cybersecurity
forums
Conferences/ Events
Related activities/initiatives
12
December 2010
National Cybersecurity Agency: Examples
 US Government: Cyberspace Policy Review – Assuring a Trusted and
Resilient Information and Communications Infrastructure – May 2009
 Canada: Canadian Cyber Incident Response Centre (CCIRC) – Integrated
within the Strategic Government Operations Centre (GOC)
 UK Government: Cybersecurity Strategy for the UK – Safety, Security &
Resilience in Cyberspace (UK Office of Cybersecurity – June 2009)
 Australia: Australian Cybersecurity Policy and Co-ordination Committee
(CSPC – Nov 2009), within the Attorney-General’s Government Dept
 Malaysia: “Cybersecurity Malaysia” – Mosti : Ministry of Science, Technology
& Innovation, and includes the MyCERT & Training Centre
 Singapore: Cybersecurity Awareness Alliance & the IDA Security Masterplan
(Sept 2009) -Singapore Infocomm Techology Security Authority - SITSA
 South Korea: Korea Internet and Security Agency (KISA – July 2009)
 Cameroon, Congo, Gabon: Agencies in charge of Cyber security installed.
…..Many nations are now also following similar National Strategies, using their
National CIRTs as the focus & catalyst to develop National Cyber Agencies.
13
December 2010
ITU: National CIRT Implementation Framework
14
December 2010
Enhanced Incident Response
Enhanced Incident
Management
Culture of Cybersecurity
Prevention & Mitigation
Strategy
Public-Private Sector
Collaboration
National PKI
National Awareness Strategy
Cyber Crime Legislation
National Identity and Access
Management Framework
eGovernment Framework
Child Online Protection
Disaster Recovery Strategy
“Building Blocks”
of the
“National Cybersecurity
Programme”
within the Principles of
“International
Cooperation”
Human Capacity
Building
Assist in Drafting the National
Cybersecurity Strategy
CIRT Benefits
December 2010
ITU-IMPACT Activities
The ITU Telecommunication Development Bureau (BDT) is facilitating the
implementation process, managing communication and needs assessment with
Member States and coordinating with IMPACT, to ensure effective delivery of
the services provided.
Computer Incident Response Teams
(CIRTs) and Incident Management
capabilities at National level
National CIRT
Capacity building and training, on-site, on-line, and training on the job
Regional workshops and events, to ensure sustainability and operations of the solutions
Direct assistance to countries, to map the deployment with the needs of the Administration
Capacity Building
16
Global Response Centre
Global Early Warning System,
detecting and monitoring cyber-threats
December 2010
How many children are using the
Internet?
Proportion of Internet Users, by age and total
(2008)
0
20
40
60
80
100
N
icaragua
Palestine
H
ondurasC
uba
ElSalvadorEgypt
ParaguayO
m
an
AzerbaijanM
exicoU
kraineThailand
M
auritius
C
osta
R
ica
BrazilC
hile
M
acao,ChinaBahrain
H
ong
Kong,ChinaEU27
N
ew
Zealand
Singapore
Korea
(R
ep.)JapanC
anada
Switzerland
Less than 15
15-24
Total
Source: ITU.
December 2010
Objectives
 Identify risks and vulnerabilities to children in cyberspace
 Create awareness
 Develop practical tools to help minimize risk
 Share knowledge and experience
 Child Online Protection (COP)
COP is a global initiative created by ITU,
aims to tackle cybersecurity holistically, addressing
legal, technical, organizational and procedural
issues as well as capacity building and international
cooperation
www.itu.int/cop
December 2010
Guidelines for policy-makers
Children’s Charities’ Coalition on Internet
Safety (CHIS)
United Nations Interregional Crime and
Justice Research Institute (UNICRI)
International Centre for Missing and
Exploited Children (ICMEC)
Child Helpline International (CHI)
INTERPOL
Guidelines on COP
 ITU has been working with some COP members to develop initial
sets of guidelines for the different stakeholders.
Guidelines for industry
Children’s Charities’ Coalition on
Internet Safety (CHIS)
GSM Association
European Broadcasting Union (EBU)
INTERPOL
AfrISPA
Telecom Italia
Vodafone
Guidelines for parents, guardians and
educators
Children’s Charities’ Coalition on Internet
Safety (CHIS)
University of Edinburgh, United Kingdom
Insafe Network
European Network and Information
Security Agency (ENISA)
European Commission’s Safer Internet
programme
Cyber Peace Initiative
Guidelines for children
Telefónica
Children’s Charities’ Coalition on
Internet Safety (CHIS)
Save the Children
INTERPOL
http://www.itu.int/cop
December 2010
• Elaborated in cooperation with COP
partners.
• The “Child Online Protection National
Strategy Guide” assess the local status
on the ground and presents a Country
Action Plan for developing a national
strategy based on the five pillars of
the GCA.
COP National Strategy Guide
COP National Strategy Guide
December 2010
COP National Survey
• Carried out by the ITU, it aims to
determine the scope of COP
policy and legal frameworks
across the world, establishing a
database with issues faced at the
national level.
• More than 90 countries have
participated in the Survey.
(Results available at ITU COP
website)
COP Survey
December 2010
COP Statistical Framework
• The Child Online Protection
Statistical Framework and
Indicators 2010 is the world’s first
attempt on measuring child online
protection in a country.
• It has particular emphasis on
measures that allow international
comparison.
COP Statistical Framework
December 2010
COP Global Initiative
• 2010: H.E. Laura Chinchilla (President of
Costa Rica), the New COP Patron
• 2010: Ms. Deborah Tate, US
Former Federal
Communications
Commissioner , COP Special
Envoy
COP Special Envoy & COP Patron
December 2010 24
With the number of school girls opting to study technology-related
disciplines on the decline in most countries worldwide, ITU is committed
to championing the catalytic role a tech career can play in creating
exciting, far-reaching opportunities for women and girls.
To help inspire girls to consider a future in
technology, ITU established ‘Girls in ICT
Day’ back in 2010 and supports the
global organization of activities every year
on the fourth Thursday in April.
In only its third year, global momentum
around Girls in ICT Day continues to grow
with over 100 countries expected to hold
events hosted by governments, private sector and NGOs in 2013.
International Initiatives
December 2010
Thank You!
For more information on ITU’s Cybersecurity Activities
visit the website at: www.itu.int/cybersecurity/
or contact cybmail@itu.int

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet GovernanceRIPE NCC
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 
Darmanin Emanuel
Darmanin EmanuelDarmanin Emanuel
Darmanin EmanuelTecnimap
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundusegughana
 
Internet Governance
Internet GovernanceInternet Governance
Internet GovernanceARIN
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategiesBenjamin Ang
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction FIA2010
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Benjamin Ang
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013M P Keshava
 
IGF MAG Update
IGF MAG UpdateIGF MAG Update
IGF MAG UpdateAPNIC
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
ID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionIGF Indonesia
 

Was ist angesagt? (20)

Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet Governance
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
CTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu MkandawireCTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu Mkandawire
 
Darmanin Emanuel
Darmanin EmanuelDarmanin Emanuel
Darmanin Emanuel
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
IGF MAG Update
IGF MAG UpdateIGF MAG Update
IGF MAG Update
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
ID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship Transition
 

Andere mochten auch (6)

Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Increasing universal access through telecentres
Increasing universal access through telecentresIncreasing universal access through telecentres
Increasing universal access through telecentres
 
Driving mobile broadband usage through innovative services
Driving mobile broadband usage through innovative servicesDriving mobile broadband usage through innovative services
Driving mobile broadband usage through innovative services
 
Fidelis Cybersecurity Overview
Fidelis Cybersecurity OverviewFidelis Cybersecurity Overview
Fidelis Cybersecurity Overview
 
Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...
 

Ähnlich wie CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji

ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillaydotZADNA
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eumanelmedina
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victorsegughana
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19consultancyss
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityAFRINIC
 
Itu D Presentation Jan2009
Itu D Presentation Jan2009Itu D Presentation Jan2009
Itu D Presentation Jan2009pinardclark
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyGenève Lab
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategyBright Boateng
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
Fostering Innovation in the ICT Ecosystem
Fostering Innovation in the ICT EcosystemFostering Innovation in the ICT Ecosystem
Fostering Innovation in the ICT EcosystemJaroslaw Ponder
 
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)OneCoverNepal
 
Jarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsJarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsMustafa Jarrar
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
 

Ähnlich wie CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji (20)

ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eu
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurity
 
Itu D Presentation Jan2009
Itu D Presentation Jan2009Itu D Presentation Jan2009
Itu D Presentation Jan2009
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public Policy
 
Why a Global AT Centers Leadership Network?_Alex Leblois_G3ict
Why a Global AT Centers Leadership Network?_Alex Leblois_G3ict Why a Global AT Centers Leadership Network?_Alex Leblois_G3ict
Why a Global AT Centers Leadership Network?_Alex Leblois_G3ict
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Fostering Innovation in the ICT Ecosystem
Fostering Innovation in the ICT EcosystemFostering Innovation in the ICT Ecosystem
Fostering Innovation in the ICT Ecosystem
 
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
 
Jarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsJarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 Calls
 
GROUP-1 (1).pdf
GROUP-1 (1).pdfGROUP-1 (1).pdf
GROUP-1 (1).pdf
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 

Mehr von Commonwealth Telecommunications Organisation

Mehr von Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
Session 4.1 Roy Arends
Session 4.1 Roy ArendsSession 4.1 Roy Arends
Session 4.1 Roy Arends
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Session 2.2 Simon Milner
Session 2.2 Simon MilnerSession 2.2 Simon Milner
Session 2.2 Simon Milner
 

Kürzlich hochgeladen

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji

  • 1. December 2010 An Overview of ITU’s Cybersecurity Activities Cybersecurity for ALL CTO meeting 25, 26 April 2013 Yaoundé ITU International Cooperation on Cybersecurity Jean-Jacques MASSIMA-LANDJI, ITU Representative for Central Africa and Madagascar jean-jacques.massima@itu.int
  • 2. December 2010 Why International Cooperation? ► The victim can be anywhere around the globe while the criminal is operating in elsewhere in far away ► The challenges are inherently international in scope and require international cooperation, investigative assistance, and common substantive and procedural provisions ► Thus, it is important that countries harmonize their legal frameworks to combat cybercrime and facilitate international cooperation. Phenomena of Cybercrime Harmonization on legal framework
  • 3. December 2010 Legal Challenges to Fight Against Cybercrime  Challenges in Drafting National Criminal Laws ► The main challenge for national criminal legal systems is the delay between the recognition of potential abuses of new technologies and necessary amendments to the national criminal law. This challenge remains as relevant and topical as ever as the speed of network innovation accelerates.  Increasing Use of ICTs and the Need for New Investigative Instruments ► Recent developments in ICTs have not only resulted in new cybercrimes and new criminal methods, but also new methods of investigating cybercrime. Advances in ICTs have greatly expanded the abilities of law enforcement agencies. Conversely, offenders may use new tools to prevent identification and hamper investigation.
  • 4. December 2010 4 Global Framework for Cybersecurity At the World Summit on the Information Society (WSIS) in 2005, ITU was entrusted by leaders of the international community to act as the facilitator for WSIS Action Line C5: “Building confidence and security in the use of ICTs”
  • 5. December 2010 ITU Global Cybersecurity Agenda In 2007, ITU Secretary-General launched the Global Cybersecurity Agenda, an international framework for collaboration on Cybersecurity matters that addresses five main areas: 1. Legal Measures 2. Technical and Procedural Measures 3. Organizational Structure 4. Capacity Building 5. International Cooperation “Building confidence and security in the use of ICTs” 6
  • 6. December 2010 Legal Measures  Summary of objective: Harmonization of legal frameworks and the elaboration of strategies for cybercrime legislation globally applicable and interoperable with national/regional legislative measures • ITU Cybercrime Legislation Resources • ITU Toolkit for Cybercrime Legislation Resources • ITU Publication on Understanding Cybercrime: A Guide for Developing Countries Publications •Capacity building, training (training for judges, etc.) •Regional workshops and events Training and Events Related activities/initiatives 7
  • 7. December 2010 8 Examples of Recent Initiatives ITU Publication on Understanding Cybercrime: A Guide for Developing Countries provides a comprehensive overview of the most relevant topics linked to the legal aspect of cybersecurity and cybercrime. ITU Toolkit for Cybercrime Legislation aims to provide countries with sample legislative language and reference material that can assist in the establishment of harmonized cybercrime laws and procedural rules.  www.itu.int/ITU-D/cyb/cybersecurity/legislation.html
  • 8. December 2010 Technical and Procedural Measures  Summary of objective : Development of strategies for the establishment of globally accepted security protocols, standards, minimum security criteria and accreditation schemes for hardware and software applications and systems • ITU Standardization Work • ICT Security Standards Roadmap promoting collaboration • ITU Radiocommunication security activities Security Activities • ITU-T Study Group 17 • ITU-T Study Group 2 Study Groups Related activities/initiatives 9
  • 9. December 2010 Organizational Structures  Summary of objective : Elaboration of global strategies for the creation of appropriate national and regional organizational structures and policies on cybercrime, watch, warning and incident response and universal identity systems Partnerships • Development of national computer incident response teams (CIRTs) and watch, warning and incident response related training • Etc. Projects • Capacity building and training • Regional workshops and events • Direct assistance to countries Training/ Assistance Related activities/initiatives ITU Secretary-General Dr Hamadoun Touré 10 • International Multilateral Partnership Against Cyber Threats (IMPACT) collaboration services •Partnerships with other entities to deliver specific services to Member States
  • 10. December 2010 Capacity Building  Summary of objective : Development of global strategies to facilitate human and institutional capacity building across all relevant aspects of cybersecurity • ITU National Cybersecurity/ CIIP Self-Assessment Tool • ITU Toolkit for Promoting a Culture of Cybersecurity • ITU Botnet Mitigation Toolkit and pilot projects Toolkits and Resources • IMPACT Training and Skills Development Centre • IMPACT Research Division IMPACT Project • Capacity building and training across all the pillars of the GCA • Targeted workshops and events Training and Events Related activities/initiatives 11
  • 11. December 2010 International Cooperation  Summary of objective : Development of proposals to enhance international dialogue on issues that pertain to cybersecurity and enhance cooperation and coordination across all relevant activities • ITU Secretary-General High Level Expert Group (HLEG) deliverables Working Together • ITU-IMPACT collaboration • ITU Cybersecurity Gateway • ITU’s Child Online Protection (COP) initiative Information Sharing • World Telecommunication and Policy Forum WTPF 2009 • Regional cybersecurity forums Conferences/ Events Related activities/initiatives 12
  • 12. December 2010 National Cybersecurity Agency: Examples  US Government: Cyberspace Policy Review – Assuring a Trusted and Resilient Information and Communications Infrastructure – May 2009  Canada: Canadian Cyber Incident Response Centre (CCIRC) – Integrated within the Strategic Government Operations Centre (GOC)  UK Government: Cybersecurity Strategy for the UK – Safety, Security & Resilience in Cyberspace (UK Office of Cybersecurity – June 2009)  Australia: Australian Cybersecurity Policy and Co-ordination Committee (CSPC – Nov 2009), within the Attorney-General’s Government Dept  Malaysia: “Cybersecurity Malaysia” – Mosti : Ministry of Science, Technology & Innovation, and includes the MyCERT & Training Centre  Singapore: Cybersecurity Awareness Alliance & the IDA Security Masterplan (Sept 2009) -Singapore Infocomm Techology Security Authority - SITSA  South Korea: Korea Internet and Security Agency (KISA – July 2009)  Cameroon, Congo, Gabon: Agencies in charge of Cyber security installed. …..Many nations are now also following similar National Strategies, using their National CIRTs as the focus & catalyst to develop National Cyber Agencies. 13
  • 13. December 2010 ITU: National CIRT Implementation Framework 14
  • 14. December 2010 Enhanced Incident Response Enhanced Incident Management Culture of Cybersecurity Prevention & Mitigation Strategy Public-Private Sector Collaboration National PKI National Awareness Strategy Cyber Crime Legislation National Identity and Access Management Framework eGovernment Framework Child Online Protection Disaster Recovery Strategy “Building Blocks” of the “National Cybersecurity Programme” within the Principles of “International Cooperation” Human Capacity Building Assist in Drafting the National Cybersecurity Strategy CIRT Benefits
  • 15. December 2010 ITU-IMPACT Activities The ITU Telecommunication Development Bureau (BDT) is facilitating the implementation process, managing communication and needs assessment with Member States and coordinating with IMPACT, to ensure effective delivery of the services provided. Computer Incident Response Teams (CIRTs) and Incident Management capabilities at National level National CIRT Capacity building and training, on-site, on-line, and training on the job Regional workshops and events, to ensure sustainability and operations of the solutions Direct assistance to countries, to map the deployment with the needs of the Administration Capacity Building 16 Global Response Centre Global Early Warning System, detecting and monitoring cyber-threats
  • 16. December 2010 How many children are using the Internet? Proportion of Internet Users, by age and total (2008) 0 20 40 60 80 100 N icaragua Palestine H ondurasC uba ElSalvadorEgypt ParaguayO m an AzerbaijanM exicoU kraineThailand M auritius C osta R ica BrazilC hile M acao,ChinaBahrain H ong Kong,ChinaEU27 N ew Zealand Singapore Korea (R ep.)JapanC anada Switzerland Less than 15 15-24 Total Source: ITU.
  • 17. December 2010 Objectives  Identify risks and vulnerabilities to children in cyberspace  Create awareness  Develop practical tools to help minimize risk  Share knowledge and experience  Child Online Protection (COP) COP is a global initiative created by ITU, aims to tackle cybersecurity holistically, addressing legal, technical, organizational and procedural issues as well as capacity building and international cooperation www.itu.int/cop
  • 18. December 2010 Guidelines for policy-makers Children’s Charities’ Coalition on Internet Safety (CHIS) United Nations Interregional Crime and Justice Research Institute (UNICRI) International Centre for Missing and Exploited Children (ICMEC) Child Helpline International (CHI) INTERPOL Guidelines on COP  ITU has been working with some COP members to develop initial sets of guidelines for the different stakeholders. Guidelines for industry Children’s Charities’ Coalition on Internet Safety (CHIS) GSM Association European Broadcasting Union (EBU) INTERPOL AfrISPA Telecom Italia Vodafone Guidelines for parents, guardians and educators Children’s Charities’ Coalition on Internet Safety (CHIS) University of Edinburgh, United Kingdom Insafe Network European Network and Information Security Agency (ENISA) European Commission’s Safer Internet programme Cyber Peace Initiative Guidelines for children Telefónica Children’s Charities’ Coalition on Internet Safety (CHIS) Save the Children INTERPOL http://www.itu.int/cop
  • 19. December 2010 • Elaborated in cooperation with COP partners. • The “Child Online Protection National Strategy Guide” assess the local status on the ground and presents a Country Action Plan for developing a national strategy based on the five pillars of the GCA. COP National Strategy Guide COP National Strategy Guide
  • 20. December 2010 COP National Survey • Carried out by the ITU, it aims to determine the scope of COP policy and legal frameworks across the world, establishing a database with issues faced at the national level. • More than 90 countries have participated in the Survey. (Results available at ITU COP website) COP Survey
  • 21. December 2010 COP Statistical Framework • The Child Online Protection Statistical Framework and Indicators 2010 is the world’s first attempt on measuring child online protection in a country. • It has particular emphasis on measures that allow international comparison. COP Statistical Framework
  • 22. December 2010 COP Global Initiative • 2010: H.E. Laura Chinchilla (President of Costa Rica), the New COP Patron • 2010: Ms. Deborah Tate, US Former Federal Communications Commissioner , COP Special Envoy COP Special Envoy & COP Patron
  • 23. December 2010 24 With the number of school girls opting to study technology-related disciplines on the decline in most countries worldwide, ITU is committed to championing the catalytic role a tech career can play in creating exciting, far-reaching opportunities for women and girls. To help inspire girls to consider a future in technology, ITU established ‘Girls in ICT Day’ back in 2010 and supports the global organization of activities every year on the fourth Thursday in April. In only its third year, global momentum around Girls in ICT Day continues to grow with over 100 countries expected to hold events hosted by governments, private sector and NGOs in 2013. International Initiatives
  • 24. December 2010 Thank You! For more information on ITU’s Cybersecurity Activities visit the website at: www.itu.int/cybersecurity/ or contact cybmail@itu.int