PROGRAM CONFERENCE 2017
|
|
- Hillary Johns
- 5 years ago
- Views:
Transcription
1 October CONFERENCE EVENT PARTNERS Copyright Cyber Security (ACSC) is JIGHI trademark registered #CSC
2 PREFACE October The digital is a promising sector for. In the last fews years, the continent has experienced an evolving in insertion less than of 5% in 2007 to 28% in Providers of progress and jobs, the internet, mobile networks, and communication technologies (ICT) have become very essential for development. This refers to cybercrime. Those days the continent is threatened by cyber criminal activities. We always witness many attacks of different sites and especially the increasing of 42% of cyber attacks in since 2012 as revealed by the 2013 symentec report like a failure in cyberspace securisation. A digital Security is essential to support digital transformation. The Cyber Security allows an overview of technological advances, the economic and social challenges associated to these advances and also the security and the preservation of data challenges are both private and public level. It helps citizens to understand clearly the issues attached to the cybercrime. Cyber Security (ACSC) is JIGHI trademark registered 2016-
3 October THEME The state of cyber security in : Economic opportunities and the looming dangers of cyber threats theme The current state of cyber security in How to meet the challenges of Cyber Security in? The threats landscape and the economic opportunities of cyber Security in How to create an environment of trust and confidence as the engine of thriving digital economy in? 3
4 Octobre THEME The state of cyber security in : Economic opportunities and the looming dangers of cyber threats 1 The state of cyber security in : Economic opportunities and the looming dangers of cyber threats Date : 10 Octobre Sponsor: n Union Meet the Challenges of Cyber Security in When Everything Becomes Digital The Economic Commission for (ECA), Economic Report on (), states that "Despite the recent slowdown in the world economy and the weakening of 's economic with what this implies for inclusion and sustainability, the long-term growth prospects of the continent remain promising. The long-term fundamentals of the economy remain strong, as the rate of growth has everything to gain from the demographic dividend, as well as from the industrialization and structural transformation program. " This new, symbolized by the formula " is rising", finds expression in the development of its middle class and in the rapid adoption of mobile telephony. Here are the data to retain for the n continent: - Number of Internet users: 362 million (29%) - Number of social network users: 170 million (14%) - Number of mobile social network users: 150 million (12%) In one year, has gained 13 million Internet users, 42 million users of social networks and 48 million users of social networks on mobile phone. 4
5 October THEME 1 The state of the Cyber Security in in a digital world is a market that is pursuing his digital transformation. The internet and technologies informations and communications are included in the economic activities of the continent with a percentage of 28 of the cyber space penetration in However this growing openness in cyberspace promotes the development of cyber criminal activities which constitute a breakout of this digitization. In terms of cyber security, by facing the challenges of its digital transformation it remains relevant to highlight the experience of the continent. 2 A global view of the landscape of Cyber Security in Date : 10 October Sponsor: n Union 1- INTERNET ACCESS IN AFRICA: Before discussing the issue of cyber Security in, it s necessary to make a serie of observations on the Connectivity side of the n continent : - Internet penetration rate has reached 29% in 2016 in against 77% in Europe. In view of these findings, the cyber Security problem is secondary for other n states. 2- CYBERSECURITY STILL RESERVED FROM THREATS However, beyond these insufficients, there is a digital development in, which relay a holder to the economic growth. But in africa, as elsewhere, the digital technology development is the synonym of threats development. Although the level of cyber attacks in has remained limited, the insufficient in fight against cybercrime make us fear with the cyber criminals actions multiplication at the development of the digital Economy disadvantages. Concerning cybersecurity the african states actions are still reserved - less than 50% of n countries have a legislative framework in order to punish cybercrime - weakness of the security provisions is needed to prevent and control the risks - Insufficient of technical expertise in term of cybersecurity - low number of regional cooperation mechanims. 3- WHAT PERSPECTIVES FOR AFRICA CYBER SECURITY? The lack of cybersecurity has colossal economic consequences,traditionnally, africa has a high rate of software hack. According to a research, the low rate of software hack in the region is about 73%; these recent years it has evolved a little. The high level of unauthorized software use can aggravate the problems caused by viruses and malware. Cybercrime causes more than a billion dollars to each year. It is difficult to measure the extent of cybersecurity challenges. Cybercrime is transnational in nature. Therefore, the fight against cybercrime requires coordinated and targeted strategies. 5
6 October Discussion/interview: Connectivity and cyber security issues in 4 Date : 10 Octobre Sponsor : Orange 1- THE ISSUE OF CONNECTIVITY BEFORE CYBERSECURITY: is a market in a full digital change. A digital revolution is underway. The continent is innovating and the use of new technologies is widespread. The first priority for 's development is to improve connectivity across the continent; this digital transformation, due to the digital revolution of uses, exposes us to ever more numerous and dangerous attacks, which makes cyber security an important business issue, even strategic. Indeed, cyber security has become among the main news in, the media enthusiasm has made the headlines. Cyber-attacks and cybersecurity have attracted the attention of the media on the side of companies and consumers. They have even been at the heart of the presidential elections in several countries. In this regard, it could be said that all, even people who have never been connected, were hit by cyber attacks and computer hacking in Governments, companies, privates... The Cyber security concerns all the actors. Is it difficult to explain the need for general mobilization and "cyber posture" beyond these risks? Before, the cyber attacks were only concerned by others... Today, the awareness is manifesting, in the States, companies and even the individuals. There is still room for progress. But this awareness is not always followed by actions as high as the risks and the stakes: - Policymakers, including politicians men and women, must be the first to be convinced. - Mobilization also involves the development of an operational or citizen reserve that contributes to cyber security by providing its expertise, but also participates in "cyber resilience" through its action within the company. It is a way of putting citizens back at the center of security and defense. 6
7 October THEME 2 The threats landscape and the economic opportunities of cyber Security in Cyber security and Economy are improving a close relationship. Some digital data are regularly produced by assessing the cyber attacks cost, cyber threats, cybercrime, measuring the negative effects of the economic activity, productivity, and growth phenomenon. The Cybersecurity tends to reduce those risks and the induced effects of cyber attacks by various actors in the society. It is now an industry, which is structured around its products, its services, its markets, its rules. Therefore the challenge is to understand better this economy of cybersecurity, its perspectives impact. 7 Business Opportunities: New solutions and innovations to address the specific landscape of n economies Date : 11/10 October Sponsor : IBM Despite real needs, so far few companies have invested in the cyber security market in French-speaking. however, states, governments, large and medium-sized companies, or individuals, they are all exposed to cybercrime., like other continents, must prepare to face to what is one of the main risks in the 21st century. - Web sites must be developed with a maximum security requirement, - training in cyber security needs to be strengthened, - audits must be encouraged However, it is true that, a very fragmented continent, is a difficult market to penetrate. Each country, each sub region has its own specific problems that needs to be understood, even if there are constants on a continental scale. Provided they can be lifted, these obstacles look like opportunities. We must not hesitate either to "play collectively", for example by entering into clusters. In long term, it is also necessary to develop a close relationship to penetrate this fertile but still nascent market. This involves a local presence that requires significant investments and teams that are both competent and reliable. 7
8 October 9 Can become the a leader in cyber security? View points of leaders and technologists Date : 11 October Sponsor : Smart is a market in a full digital change. A digital revolution is underway. The continent now has nearly 281 million Internet users with an average access rate of just 23%. The negative side of these advances, remarkable for the rest, lies in the development of cyber criminality which spread is very rapidly on the n continent as elsewhere. Still imperfectly apprehended, this represents a major challenge for n countries. This constitutes a risk but also an opportunity in terms of innovation. Effectively, While there are relatively few actions initiated to fight cybercrime and cyber-terrorism in, a few steps have been taken to raise the level of computer security: some countries have adapted their legislative framework to fight cybercrime. Today, 15 n countries have an operational CERT, Some states have already their own anti-cybercrime platform. In 2014, the n Union Convention on Cybersecurity and Protection of Personal Data was signed. In addition, parastatal structures, such as the DSI Club, composed of government officials, private sector leaders, academics, that regularly meet to help countries referenced in their digital transition. 8
9 October THEME 3 How to meet the challenges of Cyber Security in? The cyber crime constitutes a new infraction form that is relatively developing in relation to the digitalization. It constitutes, today, an undeniable Universal phenomenon that engages the becoming of the cyber space due to its multi-forms and cross-cutting character. So the cyber crime constitutes an important concern for the world but especially in where the digital is one of the pillars of its development. That is why it is therefore imperative that special attention must be given to the urgent measures that need to be implemented in order to prevent or reduce at least the most important systemic risks inherent in cyber crime concerning the continent. 3 Cyber Resilience : A fundamental imperative for the E-Gouvernment Date : 11 Octobre Sponsor : Solutech is a market in a full digital change, which the E-Government constitutes one of the pillars of these innovations. The negative side of these advances lies in the development of cybercrime which spreads very rapidly on the n continent as elsewhere. This requires the adoption of a holistic approach to cyber resilience and a traditional view of security. For West n States, the cost of the cybercrime is not negligible. According to the latest study (2), cyber crime costs 0.08% of GDP per year in Nigeria. A proportion close to that of France, which accounts for 0.11%. Face to these attacks, governments must be aware of the issue of cybercrime and the need to face it. Cyber security: what level of maturity and awareness for n countries? How can the government put in place mechanisms to strengthen cyber resilience? Public-private partnership to fight cyber attacks and incidents in, state of play? How governments follow the private sector experts in the fight against cybercrime? 9
10 October 6 Overcoming the cyber security challenges in : Some initiatives and solutions Date : 11/10 October Sponsor : PWC faces several challenges related to the Internet: security risk, intellectual property violations and protection of personal data. Cyber criminals target individuals within and beyond their national borders and n governments lack of the technical and financial capacity to target and track electronic exchanges deemed sensitive to the national security. These challenges are: - Low level of security arrangements necessary to prevent and control technological and information risks. - Lack of technical know-how in cyber security and inability to monitor and defend national networks, making n countries vulnerable to cyber espionage and cyber terrorism. - Inability to put in place the necessary legal frameworks to fight the cybercrime. - The issues of cyber security are broader than those of national security. However, few major initiatives have been implemented in in the area of cyber security. While ICTs are hailed as the panacea to 's many problems, cyber security is a crucial issue that needs to be addressed in greater depth. - There is a need to establish an information society that respects values, rights and freedoms and guarantees, equal access to information while encouraging the creation of authentic knowledge and building confidence in the use of ICTs in. In general, stakeholders, such as ICT regulatory bodies, law enforcement agencies, justice, IT professionals and users, are unaware of security issues related to ICT. 10
11 October THEME 4 How to create an environment of trust and confidence as the engine of thriving digital economy in? The digital development is a vector of growth and an innovation for the continent. This rise doesnot work without the problems emergence related to the digital security that face the cyber threats progression (Identity theft, software, destabilization, spying, etc. ). The cyber security players of the continent are invited to exchange the digital protected space and trusted development in order to better protect themselves.. 8 Cybersecurity in : Can we trust digital solutions in? How to create trust in applications and internet technology offerings? Date : 12/10 October Sponsor :VISA 1- Make trust and compliance a new success lever for your digital strategy? The digital wave transformation is unprecedented and the business opportunities have never been so abundant. At the same time, new risks arise and most of the time, the security systems in place are obsolete in the face of these new threats. 90% of the companies recognize that their defense systems are inadequate. The costs associated with cybercrime are estimated at 345 billion each year. A new security approach : Security is not only designed to manage these uncertainties, but also to be in the center of the digital growth strategy. - The Digital transition increases risk The risks of cyber security increase while protection is becoming weak in comparison, because the general consensus is that the potential benefits exceed the risks. 2- New security challenges in the digital age While boundaries between the physical and virtual worlds, companies and partners, suppliers and customers are increasingly blurred, value chains in terms of trust are rapidly evolving. Some years ago, companies have become accustomed to operate in a "us against others" culture. These borders are fading. Therefore, a holistic approach is not only necessary, it is also vital. - Moving from risk-oriented security to business-oriented security - Risk management must begin with the priorities management - Consider all ecosystems and value chains - Moving from reactive security management to preventive and real-time investigations 3- Building trust, taking advantage of opportunities - Security: think globally, act vertically The Digital has brought many opportunities for the companies, regardless of their size and their activity sector. It now plays a fundamental role in modern companies, as it offers new ways of working, standing out from the competition and to communicate. 11
12 October 5 Cyber Security in : How to adapt in the absence of expertise Date : 11/10 October Sponsor : Club DSI As organizations migrate to digital, the lack of clean infrastructure and the outsourcing of IT services is a real security management challenge. At issue, the inability of the RSSI to manage the risk. Five key points to implement a cyber security policy for organizations that are moving to digital (3). 1- Develop leadership and governance Improving leadership and governance is probably more important than developing technology tools and skills. The Decision-making, prioritization, budget allocation, measurement, reporting, transparency and accountability are key attributes of an effective program that balances the need to protect and the need to manage the company. 2- Adapting to evolving threats The RSSI s must go beyond the logic of preventing all threats. Difficult to admit, but perfect protection is not possible. Gartner expects that 60% of cybersecurity budgets in companies will be devoted to early detection of threats by This is less than 30% in "Organizations need to detect and respond to malicious behaviors and incidents because even the best preventive controls can not prevent all the incidents. " 3 - Align cyber security with the speed of change of Business Companies that adopt digital technology are moving at a faster pace than traditional businesses. The RSSI s must evaluate and transform their programs to become digital business facilitators rather than barriers to innovation. 4- Scan the new contours of cyber security Before it was perhaps easier to protect the data: they resided exclusively in Data's centers locals. New technologies are spilling out data now outside, via cloud and mobility. By 2018, 25% of the company's data traffic will come directly from the mobile to the cloud, by passing the company's security controls. This means addressing cyber security issues on technologies and assets that they do not own or control. 5- Initiating change of process and management change With the acceleration caused by the digital technology, the power that technology gives to individuals, we need to change the behavior and commitment of employees and customers. Cyber security must meet the needs of people through process changes. A 'people-centric' cyber security approach gives each person greater autonomy to use data and digital devices. 12
13 October Hotel, CONTACT / FOLLOWERS
INFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE.
INFORMATION GENERALE October 10-11-12 Radisson Blu Hotel Abidjan PRESS RELEASE www.africacybersecurityconferencecom Copyright Africa Cyber Security Conference (ACSC) is JIGHI trademark registered 2016-2017
More informationWORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe
WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationCybersecurity & Digital Privacy in the Energy sector
ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European
More informationTO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME
INTERPOL FOUNDATION TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME TOGETHER WE CAN MAKE THE WORLD SAFER Every age is defined by the innovations it brings, the way in which it responds to the major
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationThe challenges of the NIS directive from the viewpoint of the Vienna Hospital Association
The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the
More informationBrussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER
COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationCYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME
FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationSAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity
SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationCyber Security Roadmap
Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010
ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions
More informationVdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe
Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationREPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY
REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY SPEECH BY MR. JOE MUCHERU, CABINET SECRETARY, MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY DURING THE AFRICA CYBER DEFENSE
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationWorld Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014
World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014 Document WTDC14/28- E 10 February 2014 Original: French SOURCE: TITLE: ALG/28/1 Objective: 3 Ministry of Post and
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationThe UK s National Cyber Security Strategy
The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016
More informationNEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES
NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need
More informationCHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING
CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING 1 CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING Under Canada s G7 presidency, Energy Ministers or their representatives from Canada, France, Germany, Italy,
More informationQatar s National ICT Plan
Overview Qatar s National ICT Plan Qatar has made significant progress toward creating an innovative and vibrant ICT sector that will secure a thriving, diversified economy and enrich the quality of life
More informationRESOLUTION 45 (Rev. Hyderabad, 2010)
212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference
More informationSafeguarding company from cyber-crimes and other technology scams ASSOCHAM
www.pwc.com Safeguarding company from cyber-crimes and other technology scams ASSOCHAM Rahul Aggarwal - Director The new digital business ecosystem is complex and highly interconnected The new business
More informationRESOLUTION 130 (Rev. Antalya, 2006)
Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference
More informationIntroductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht
Introductory Speech to the Ramboll Event on the future of ENISA Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht BRUSSELS 22 ND MARCH 2017 www.enisa.europa.eu European Union Agency For Network
More informationRESOLUTION 130 (REV. BUSAN, 2014)
RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International
More informationAMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER
AMCHAM Background AMCHAM Thailand was formed in 1956 with a membership of 8 American companies and 60 American nationals. Today, AMCHAM has over 650 members, comprising 2,000 executives and professionals.
More informationFOR FINANCIAL SERVICES ORGANIZATIONS
RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly
More informationECOWAS Cyber security Agenda
The African Internet Governance Forum AfIGF 2017 04 06 December 2017 Sharm El-Sheikh, Egypt Empowering Global Cooperation on Cyber-security for Sustainable Development & Peace ECOWAS Cyber security Agenda
More informationH2020 WP Cybersecurity PPP topics
Info Day 2017 SC7 Secure Societies 06-07/03/2017 H2020 WP 2017 - Cybersecurity PPP topics Rafael Tesoro Cybersecurity & Digital Privacy, DG CNECT Cyberspace: a backbone of digital society & economic growth
More informationState of Israel Prime Minister's Office National Cyber Bureau. Unclassified
- 1 - Background for the Government Resolutions Regarding Advancing the National Preparedness for Cyber Security and Advancing National Regulation and Governmental Leadership in Cyber Security On February
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationAre you safe? Your business growth strategies are at the heart of the cyber risks your organization faces
Are you safe? Your business growth strategies are at the heart of the cyber risks your organization faces 36 Deloitte A Middle East Point of View Summer 2015 Cyber Security Most reports on cyber security
More informationTransport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank
WORLD BANK DONOR PERSPECTIVE ON CYBER SECURITY Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank MYTH NUMBER ONE:
More informationRSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE
WHITEPAPER RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE CONTENTS Executive Summary........................................ 3 Transforming How We Think About Security.......................... 4 Assessing
More informationalign security instill confidence
align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed
More informationCONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE
CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 18-19 APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 At the Trieste Western Balkans Summit, we stressed the importance of the
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More informationDIGITAL TRANSFORMATION IN FINANCIAL SERVICES
DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation
More informationPEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity
PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY New Brunswick Growth Opportunity New Brunswick Growth Opportunity Province of New Brunswick PO 6000, Fredericton NB E3B 5H1 Canada ISBN 978-1-4605-1669-0
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationEmerging Technologies The risks they pose to your organisations
Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things
More informationLeading the Digital Transformation from the Centre of Government
37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00
More informationResearch Infrastructures and Horizon 2020
Research Infrastructures and Horizon 2020 Christos VASILAKOS DG Research & 1 st CoPoRI Workshop on EoE 11-12 June 2012 Hamburg, DE The EU Framework Programme for Research and 2014-2020 Research and Europe
More informationCLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for
More informationInternet Interconnection An Internet Society Public Policy Briefing
Internet Interconnection An Internet Society Public Policy Briefing 30 October 2015 Introduction The Internet comprises thousands of independently owned, managed, and operated networks that connect with
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationA new approach to Cyber Security
A new approach to Cyber Security Feel Free kpmg.ch We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward.
More informationProvisional Translation
Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious
More informationRegional Development Forum For the Arab States(RDF-ARB) 2018
Regional Development Forum For the Arab States(RDF-ARB) 2018 ICT4SDGs: Towards the implementation of WTDC17 outcomes Algiers, Algeria 12, 13 February 2018 Background Concept Note In the framework of the
More informationAssessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society
ECOSOC Resolution 2008/3 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society The Economic and Social Council, Recalling
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationCyber Security in Europe
Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationEU policy on Network and Information Security & Critical Information Infrastructures Protection
EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and
More informationISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF
SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security
More informationUN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security
UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia
More informationCybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution
More informationRIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015
www.pwc.com RIMS Perk Session 2015 - Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 Los Angeles RIMS Agenda Introductions What is Cybersecurity? Crown jewels The bad
More informationMATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services
MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services THE NEED FOR MATURE CYBER DEFENSE CAPABILITIES The average annual cost of cyber crime reached $11.7 million per organization
More informationCyber Security in Smart Commercial Buildings 2017 to 2021
Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the
More informationNetherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice
Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses
More informationINDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018
INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1
More informationCybersecurity, safety and resilience - Airline perspective
Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,
More informationLegal Foundation and Enforcement: Promoting Cybersecurity
Legal Foundation and Enforcement: Promoting Cybersecurity Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection February 19, 2008 Mark L. Krotoski Computer
More informationCanada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?
Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY
More informationHOSTED SECURITY SERVICES
HOSTED SECURITY SERVICES A PROVEN STRATEGY FOR PROTECTING CRITICAL IT INFRASTRUCTURE AND DEVICES Being always-on, always-connected might be good for business, but it creates an ideal climate for cybercriminal
More informationOUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY
OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY ADOPTED BY THE PARTICIPANTS OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY AT NEW DELHI
More informationETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)
ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security
More informationehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration
ehealth Ministerial Conference 2013 Dublin 13 15 May 2013 Irish Presidency Declaration Irish Presidency Declaration Ministers of Health of the Member States of the European Union and delegates met on 13
More informationPosition Title: IT Security Specialist
Position Title: IT Security Specialist SASRIA SOC LIMITED Sasria, a state-owned company, is the only short-term insurer in South Africa that provides affordable voluntary cover against special risks such
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationCommonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017
Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Title: Facilitating Investment in Cybersecurity as a means of achieving the Sustainable Development Goals Description: Information
More informationSecuring Europe's Information Society
Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU
More informationGlobal cybersecurity and international standards
World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level
More informationCONNECT ARAB STATES SUMMIT
CONNECT ARAB STATES SUMMIT Doha, Qatar, 5-7 March 2012 Draft Concept Paper Overview The Connect Arab States Summit is being organized by the International Telecommunication Union (ITU) in partnership with
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationCOMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document
EUROPEAN COMMISSION Strasbourg, 7.2.2013 SWD(2013) 31 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a Directive of the European
More informationPosition Paper of the ASD Civil Aviation Cybersecurity Taskforce
Contact: Yoann Viaouet Position Paper of the ASD Civil Aviation Cybersecurity Taskforce April 2017 Content Executive Summary... 2 The need for a global cybersecurity framework: the role of ICAO... 3 The
More informationProgram 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR
Program The structure of the workshop will be fully participatory for each session. We will ask several participants to take the lead in some panels, and to present the main challenges or comment on certain
More informationH2020 Opportunities in the Area of Security and Critical Infrastructure Protection
H2020 Opportunities in the Area of Security and Critical Infrastructure Protection Angelo MARINO Head of Unit Security Research AIIC General Assembly Rome, 26/10/2013 NOT LEGALLY BINDING Outline The context:
More informationKENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D
KENYA YOUR RELIABLE PARTNER AT THE ITU Candidate for the ITU Council in Region D KENYA: CANDIDATE FOR ITU COUNCIL IN REGION D (AFRICA) The Republic of Kenya has been a member of the International Telecommunication
More information2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope
Timestamp 8/30/2013 15:34:00 The information solicited through this questionnaire will only be used in aggregate form, unless otherwise authorised by the respondent. Do you authorise us to cite/share your
More informationSecurity in a Converging IT/OT World
Security in a Converging IT/OT World Introduction Around the winter solstice, darkness comes early to the citizens of Ukraine. On December 23, 2015, it came a little earlier than normal. In mid-afternoon,
More informationA Strategy for a secure Information Society Dialogue, Partnership and empowerment
A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationWhat do you see as GSMA s
GSMA: Connecting everyone and everything to a better future Mats Granryd, Director General of GSMA, shares his thoughts on the development of 5G, the Internet of Things, and why mobile is so important
More informationThe State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016 Identifying Cybersecurity Gaps to Rethink State of the Art Executive Summary Executive Summary While the advent of digital technology has fueled new business
More information