PROGRAM CONFERENCE 2017

Size: px
Start display at page:

Download "PROGRAM CONFERENCE 2017"

Transcription

1 October CONFERENCE EVENT PARTNERS Copyright Cyber Security (ACSC) is JIGHI trademark registered #CSC

2 PREFACE October The digital is a promising sector for. In the last fews years, the continent has experienced an evolving in insertion less than of 5% in 2007 to 28% in Providers of progress and jobs, the internet, mobile networks, and communication technologies (ICT) have become very essential for development. This refers to cybercrime. Those days the continent is threatened by cyber criminal activities. We always witness many attacks of different sites and especially the increasing of 42% of cyber attacks in since 2012 as revealed by the 2013 symentec report like a failure in cyberspace securisation. A digital Security is essential to support digital transformation. The Cyber Security allows an overview of technological advances, the economic and social challenges associated to these advances and also the security and the preservation of data challenges are both private and public level. It helps citizens to understand clearly the issues attached to the cybercrime. Cyber Security (ACSC) is JIGHI trademark registered 2016-

3 October THEME The state of cyber security in : Economic opportunities and the looming dangers of cyber threats theme The current state of cyber security in How to meet the challenges of Cyber Security in? The threats landscape and the economic opportunities of cyber Security in How to create an environment of trust and confidence as the engine of thriving digital economy in? 3

4 Octobre THEME The state of cyber security in : Economic opportunities and the looming dangers of cyber threats 1 The state of cyber security in : Economic opportunities and the looming dangers of cyber threats Date : 10 Octobre Sponsor: n Union Meet the Challenges of Cyber Security in When Everything Becomes Digital The Economic Commission for (ECA), Economic Report on (), states that "Despite the recent slowdown in the world economy and the weakening of 's economic with what this implies for inclusion and sustainability, the long-term growth prospects of the continent remain promising. The long-term fundamentals of the economy remain strong, as the rate of growth has everything to gain from the demographic dividend, as well as from the industrialization and structural transformation program. " This new, symbolized by the formula " is rising", finds expression in the development of its middle class and in the rapid adoption of mobile telephony. Here are the data to retain for the n continent: - Number of Internet users: 362 million (29%) - Number of social network users: 170 million (14%) - Number of mobile social network users: 150 million (12%) In one year, has gained 13 million Internet users, 42 million users of social networks and 48 million users of social networks on mobile phone. 4

5 October THEME 1 The state of the Cyber Security in in a digital world is a market that is pursuing his digital transformation. The internet and technologies informations and communications are included in the economic activities of the continent with a percentage of 28 of the cyber space penetration in However this growing openness in cyberspace promotes the development of cyber criminal activities which constitute a breakout of this digitization. In terms of cyber security, by facing the challenges of its digital transformation it remains relevant to highlight the experience of the continent. 2 A global view of the landscape of Cyber Security in Date : 10 October Sponsor: n Union 1- INTERNET ACCESS IN AFRICA: Before discussing the issue of cyber Security in, it s necessary to make a serie of observations on the Connectivity side of the n continent : - Internet penetration rate has reached 29% in 2016 in against 77% in Europe. In view of these findings, the cyber Security problem is secondary for other n states. 2- CYBERSECURITY STILL RESERVED FROM THREATS However, beyond these insufficients, there is a digital development in, which relay a holder to the economic growth. But in africa, as elsewhere, the digital technology development is the synonym of threats development. Although the level of cyber attacks in has remained limited, the insufficient in fight against cybercrime make us fear with the cyber criminals actions multiplication at the development of the digital Economy disadvantages. Concerning cybersecurity the african states actions are still reserved - less than 50% of n countries have a legislative framework in order to punish cybercrime - weakness of the security provisions is needed to prevent and control the risks - Insufficient of technical expertise in term of cybersecurity - low number of regional cooperation mechanims. 3- WHAT PERSPECTIVES FOR AFRICA CYBER SECURITY? The lack of cybersecurity has colossal economic consequences,traditionnally, africa has a high rate of software hack. According to a research, the low rate of software hack in the region is about 73%; these recent years it has evolved a little. The high level of unauthorized software use can aggravate the problems caused by viruses and malware. Cybercrime causes more than a billion dollars to each year. It is difficult to measure the extent of cybersecurity challenges. Cybercrime is transnational in nature. Therefore, the fight against cybercrime requires coordinated and targeted strategies. 5

6 October Discussion/interview: Connectivity and cyber security issues in 4 Date : 10 Octobre Sponsor : Orange 1- THE ISSUE OF CONNECTIVITY BEFORE CYBERSECURITY: is a market in a full digital change. A digital revolution is underway. The continent is innovating and the use of new technologies is widespread. The first priority for 's development is to improve connectivity across the continent; this digital transformation, due to the digital revolution of uses, exposes us to ever more numerous and dangerous attacks, which makes cyber security an important business issue, even strategic. Indeed, cyber security has become among the main news in, the media enthusiasm has made the headlines. Cyber-attacks and cybersecurity have attracted the attention of the media on the side of companies and consumers. They have even been at the heart of the presidential elections in several countries. In this regard, it could be said that all, even people who have never been connected, were hit by cyber attacks and computer hacking in Governments, companies, privates... The Cyber security concerns all the actors. Is it difficult to explain the need for general mobilization and "cyber posture" beyond these risks? Before, the cyber attacks were only concerned by others... Today, the awareness is manifesting, in the States, companies and even the individuals. There is still room for progress. But this awareness is not always followed by actions as high as the risks and the stakes: - Policymakers, including politicians men and women, must be the first to be convinced. - Mobilization also involves the development of an operational or citizen reserve that contributes to cyber security by providing its expertise, but also participates in "cyber resilience" through its action within the company. It is a way of putting citizens back at the center of security and defense. 6

7 October THEME 2 The threats landscape and the economic opportunities of cyber Security in Cyber security and Economy are improving a close relationship. Some digital data are regularly produced by assessing the cyber attacks cost, cyber threats, cybercrime, measuring the negative effects of the economic activity, productivity, and growth phenomenon. The Cybersecurity tends to reduce those risks and the induced effects of cyber attacks by various actors in the society. It is now an industry, which is structured around its products, its services, its markets, its rules. Therefore the challenge is to understand better this economy of cybersecurity, its perspectives impact. 7 Business Opportunities: New solutions and innovations to address the specific landscape of n economies Date : 11/10 October Sponsor : IBM Despite real needs, so far few companies have invested in the cyber security market in French-speaking. however, states, governments, large and medium-sized companies, or individuals, they are all exposed to cybercrime., like other continents, must prepare to face to what is one of the main risks in the 21st century. - Web sites must be developed with a maximum security requirement, - training in cyber security needs to be strengthened, - audits must be encouraged However, it is true that, a very fragmented continent, is a difficult market to penetrate. Each country, each sub region has its own specific problems that needs to be understood, even if there are constants on a continental scale. Provided they can be lifted, these obstacles look like opportunities. We must not hesitate either to "play collectively", for example by entering into clusters. In long term, it is also necessary to develop a close relationship to penetrate this fertile but still nascent market. This involves a local presence that requires significant investments and teams that are both competent and reliable. 7

8 October 9 Can become the a leader in cyber security? View points of leaders and technologists Date : 11 October Sponsor : Smart is a market in a full digital change. A digital revolution is underway. The continent now has nearly 281 million Internet users with an average access rate of just 23%. The negative side of these advances, remarkable for the rest, lies in the development of cyber criminality which spread is very rapidly on the n continent as elsewhere. Still imperfectly apprehended, this represents a major challenge for n countries. This constitutes a risk but also an opportunity in terms of innovation. Effectively, While there are relatively few actions initiated to fight cybercrime and cyber-terrorism in, a few steps have been taken to raise the level of computer security: some countries have adapted their legislative framework to fight cybercrime. Today, 15 n countries have an operational CERT, Some states have already their own anti-cybercrime platform. In 2014, the n Union Convention on Cybersecurity and Protection of Personal Data was signed. In addition, parastatal structures, such as the DSI Club, composed of government officials, private sector leaders, academics, that regularly meet to help countries referenced in their digital transition. 8

9 October THEME 3 How to meet the challenges of Cyber Security in? The cyber crime constitutes a new infraction form that is relatively developing in relation to the digitalization. It constitutes, today, an undeniable Universal phenomenon that engages the becoming of the cyber space due to its multi-forms and cross-cutting character. So the cyber crime constitutes an important concern for the world but especially in where the digital is one of the pillars of its development. That is why it is therefore imperative that special attention must be given to the urgent measures that need to be implemented in order to prevent or reduce at least the most important systemic risks inherent in cyber crime concerning the continent. 3 Cyber Resilience : A fundamental imperative for the E-Gouvernment Date : 11 Octobre Sponsor : Solutech is a market in a full digital change, which the E-Government constitutes one of the pillars of these innovations. The negative side of these advances lies in the development of cybercrime which spreads very rapidly on the n continent as elsewhere. This requires the adoption of a holistic approach to cyber resilience and a traditional view of security. For West n States, the cost of the cybercrime is not negligible. According to the latest study (2), cyber crime costs 0.08% of GDP per year in Nigeria. A proportion close to that of France, which accounts for 0.11%. Face to these attacks, governments must be aware of the issue of cybercrime and the need to face it. Cyber security: what level of maturity and awareness for n countries? How can the government put in place mechanisms to strengthen cyber resilience? Public-private partnership to fight cyber attacks and incidents in, state of play? How governments follow the private sector experts in the fight against cybercrime? 9

10 October 6 Overcoming the cyber security challenges in : Some initiatives and solutions Date : 11/10 October Sponsor : PWC faces several challenges related to the Internet: security risk, intellectual property violations and protection of personal data. Cyber criminals target individuals within and beyond their national borders and n governments lack of the technical and financial capacity to target and track electronic exchanges deemed sensitive to the national security. These challenges are: - Low level of security arrangements necessary to prevent and control technological and information risks. - Lack of technical know-how in cyber security and inability to monitor and defend national networks, making n countries vulnerable to cyber espionage and cyber terrorism. - Inability to put in place the necessary legal frameworks to fight the cybercrime. - The issues of cyber security are broader than those of national security. However, few major initiatives have been implemented in in the area of cyber security. While ICTs are hailed as the panacea to 's many problems, cyber security is a crucial issue that needs to be addressed in greater depth. - There is a need to establish an information society that respects values, rights and freedoms and guarantees, equal access to information while encouraging the creation of authentic knowledge and building confidence in the use of ICTs in. In general, stakeholders, such as ICT regulatory bodies, law enforcement agencies, justice, IT professionals and users, are unaware of security issues related to ICT. 10

11 October THEME 4 How to create an environment of trust and confidence as the engine of thriving digital economy in? The digital development is a vector of growth and an innovation for the continent. This rise doesnot work without the problems emergence related to the digital security that face the cyber threats progression (Identity theft, software, destabilization, spying, etc. ). The cyber security players of the continent are invited to exchange the digital protected space and trusted development in order to better protect themselves.. 8 Cybersecurity in : Can we trust digital solutions in? How to create trust in applications and internet technology offerings? Date : 12/10 October Sponsor :VISA 1- Make trust and compliance a new success lever for your digital strategy? The digital wave transformation is unprecedented and the business opportunities have never been so abundant. At the same time, new risks arise and most of the time, the security systems in place are obsolete in the face of these new threats. 90% of the companies recognize that their defense systems are inadequate. The costs associated with cybercrime are estimated at 345 billion each year. A new security approach : Security is not only designed to manage these uncertainties, but also to be in the center of the digital growth strategy. - The Digital transition increases risk The risks of cyber security increase while protection is becoming weak in comparison, because the general consensus is that the potential benefits exceed the risks. 2- New security challenges in the digital age While boundaries between the physical and virtual worlds, companies and partners, suppliers and customers are increasingly blurred, value chains in terms of trust are rapidly evolving. Some years ago, companies have become accustomed to operate in a "us against others" culture. These borders are fading. Therefore, a holistic approach is not only necessary, it is also vital. - Moving from risk-oriented security to business-oriented security - Risk management must begin with the priorities management - Consider all ecosystems and value chains - Moving from reactive security management to preventive and real-time investigations 3- Building trust, taking advantage of opportunities - Security: think globally, act vertically The Digital has brought many opportunities for the companies, regardless of their size and their activity sector. It now plays a fundamental role in modern companies, as it offers new ways of working, standing out from the competition and to communicate. 11

12 October 5 Cyber Security in : How to adapt in the absence of expertise Date : 11/10 October Sponsor : Club DSI As organizations migrate to digital, the lack of clean infrastructure and the outsourcing of IT services is a real security management challenge. At issue, the inability of the RSSI to manage the risk. Five key points to implement a cyber security policy for organizations that are moving to digital (3). 1- Develop leadership and governance Improving leadership and governance is probably more important than developing technology tools and skills. The Decision-making, prioritization, budget allocation, measurement, reporting, transparency and accountability are key attributes of an effective program that balances the need to protect and the need to manage the company. 2- Adapting to evolving threats The RSSI s must go beyond the logic of preventing all threats. Difficult to admit, but perfect protection is not possible. Gartner expects that 60% of cybersecurity budgets in companies will be devoted to early detection of threats by This is less than 30% in "Organizations need to detect and respond to malicious behaviors and incidents because even the best preventive controls can not prevent all the incidents. " 3 - Align cyber security with the speed of change of Business Companies that adopt digital technology are moving at a faster pace than traditional businesses. The RSSI s must evaluate and transform their programs to become digital business facilitators rather than barriers to innovation. 4- Scan the new contours of cyber security Before it was perhaps easier to protect the data: they resided exclusively in Data's centers locals. New technologies are spilling out data now outside, via cloud and mobility. By 2018, 25% of the company's data traffic will come directly from the mobile to the cloud, by passing the company's security controls. This means addressing cyber security issues on technologies and assets that they do not own or control. 5- Initiating change of process and management change With the acceleration caused by the digital technology, the power that technology gives to individuals, we need to change the behavior and commitment of employees and customers. Cyber security must meet the needs of people through process changes. A 'people-centric' cyber security approach gives each person greater autonomy to use data and digital devices. 12

13 October Hotel, CONTACT / FOLLOWERS

INFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE.

INFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE. INFORMATION GENERALE October 10-11-12 Radisson Blu Hotel Abidjan PRESS RELEASE www.africacybersecurityconferencecom Copyright Africa Cyber Security Conference (ACSC) is JIGHI trademark registered 2016-2017

More information

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME INTERPOL FOUNDATION TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME TOGETHER WE CAN MAKE THE WORLD SAFER Every age is defined by the innovations it brings, the way in which it responds to the major

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

Cyber Security Roadmap

Cyber Security Roadmap Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY

REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY SPEECH BY MR. JOE MUCHERU, CABINET SECRETARY, MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY DURING THE AFRICA CYBER DEFENSE

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014 World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014 Document WTDC14/28- E 10 February 2014 Original: French SOURCE: TITLE: ALG/28/1 Objective: 3 Ministry of Post and

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

The UK s National Cyber Security Strategy

The UK s National Cyber Security Strategy The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING

CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING 1 CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING Under Canada s G7 presidency, Energy Ministers or their representatives from Canada, France, Germany, Italy,

More information

Qatar s National ICT Plan

Qatar s National ICT Plan Overview Qatar s National ICT Plan Qatar has made significant progress toward creating an innovative and vibrant ICT sector that will secure a thriving, diversified economy and enrich the quality of life

More information

RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 45 (Rev. Hyderabad, 2010) 212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference

More information

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM www.pwc.com Safeguarding company from cyber-crimes and other technology scams ASSOCHAM Rahul Aggarwal - Director The new digital business ecosystem is complex and highly interconnected The new business

More information

RESOLUTION 130 (Rev. Antalya, 2006)

RESOLUTION 130 (Rev. Antalya, 2006) Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference

More information

Introductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht

Introductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht Introductory Speech to the Ramboll Event on the future of ENISA Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht BRUSSELS 22 ND MARCH 2017 www.enisa.europa.eu European Union Agency For Network

More information

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 130 (REV. BUSAN, 2014) RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International

More information

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER AMCHAM Background AMCHAM Thailand was formed in 1956 with a membership of 8 American companies and 60 American nationals. Today, AMCHAM has over 650 members, comprising 2,000 executives and professionals.

More information

FOR FINANCIAL SERVICES ORGANIZATIONS

FOR FINANCIAL SERVICES ORGANIZATIONS RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly

More information

ECOWAS Cyber security Agenda

ECOWAS Cyber security Agenda The African Internet Governance Forum AfIGF 2017 04 06 December 2017 Sharm El-Sheikh, Egypt Empowering Global Cooperation on Cyber-security for Sustainable Development & Peace ECOWAS Cyber security Agenda

More information

H2020 WP Cybersecurity PPP topics

H2020 WP Cybersecurity PPP topics Info Day 2017 SC7 Secure Societies 06-07/03/2017 H2020 WP 2017 - Cybersecurity PPP topics Rafael Tesoro Cybersecurity & Digital Privacy, DG CNECT Cyberspace: a backbone of digital society & economic growth

More information

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified - 1 - Background for the Government Resolutions Regarding Advancing the National Preparedness for Cyber Security and Advancing National Regulation and Governmental Leadership in Cyber Security On February

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Are you safe? Your business growth strategies are at the heart of the cyber risks your organization faces

Are you safe? Your business growth strategies are at the heart of the cyber risks your organization faces Are you safe? Your business growth strategies are at the heart of the cyber risks your organization faces 36 Deloitte A Middle East Point of View Summer 2015 Cyber Security Most reports on cyber security

More information

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank WORLD BANK DONOR PERSPECTIVE ON CYBER SECURITY Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank MYTH NUMBER ONE:

More information

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE WHITEPAPER RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE CONTENTS Executive Summary........................................ 3 Transforming How We Think About Security.......................... 4 Assessing

More information

align security instill confidence

align security instill confidence align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed

More information

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 18-19 APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 At the Trieste Western Balkans Summit, we stressed the importance of the

More information

Itu regional workshop

Itu regional workshop Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on

More information

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation

More information

PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity

PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY New Brunswick Growth Opportunity New Brunswick Growth Opportunity Province of New Brunswick PO 6000, Fredericton NB E3B 5H1 Canada ISBN 978-1-4605-1669-0

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

Emerging Technologies The risks they pose to your organisations

Emerging Technologies The risks they pose to your organisations Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

Research Infrastructures and Horizon 2020

Research Infrastructures and Horizon 2020 Research Infrastructures and Horizon 2020 Christos VASILAKOS DG Research & 1 st CoPoRI Workshop on EoE 11-12 June 2012 Hamburg, DE The EU Framework Programme for Research and 2014-2020 Research and Europe

More information

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for

More information

Internet Interconnection An Internet Society Public Policy Briefing

Internet Interconnection An Internet Society Public Policy Briefing Internet Interconnection An Internet Society Public Policy Briefing 30 October 2015 Introduction The Internet comprises thousands of independently owned, managed, and operated networks that connect with

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

A new approach to Cyber Security

A new approach to Cyber Security A new approach to Cyber Security Feel Free kpmg.ch We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward.

More information

Provisional Translation

Provisional Translation Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious

More information

Regional Development Forum For the Arab States(RDF-ARB) 2018

Regional Development Forum For the Arab States(RDF-ARB) 2018 Regional Development Forum For the Arab States(RDF-ARB) 2018 ICT4SDGs: Towards the implementation of WTDC17 outcomes Algiers, Algeria 12, 13 February 2018 Background Concept Note In the framework of the

More information

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society ECOSOC Resolution 2008/3 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society The Economic and Social Council, Recalling

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

EU policy on Network and Information Security & Critical Information Infrastructures Protection

EU policy on Network and Information Security & Critical Information Infrastructures Protection EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and

More information

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security

More information

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia

More information

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution

More information

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 www.pwc.com RIMS Perk Session 2015 - Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 Los Angeles RIMS Agenda Introductions What is Cybersecurity? Crown jewels The bad

More information

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services THE NEED FOR MATURE CYBER DEFENSE CAPABILITIES The average annual cost of cyber crime reached $11.7 million per organization

More information

Cyber Security in Smart Commercial Buildings 2017 to 2021

Cyber Security in Smart Commercial Buildings 2017 to 2021 Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the

More information

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses

More information

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018 INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1

More information

Cybersecurity, safety and resilience - Airline perspective

Cybersecurity, safety and resilience - Airline perspective Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,

More information

Legal Foundation and Enforcement: Promoting Cybersecurity

Legal Foundation and Enforcement: Promoting Cybersecurity Legal Foundation and Enforcement: Promoting Cybersecurity Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection February 19, 2008 Mark L. Krotoski Computer

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

HOSTED SECURITY SERVICES

HOSTED SECURITY SERVICES HOSTED SECURITY SERVICES A PROVEN STRATEGY FOR PROTECTING CRITICAL IT INFRASTRUCTURE AND DEVICES Being always-on, always-connected might be good for business, but it creates an ideal climate for cybercriminal

More information

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY ADOPTED BY THE PARTICIPANTS OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY AT NEW DELHI

More information

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security

More information

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration ehealth Ministerial Conference 2013 Dublin 13 15 May 2013 Irish Presidency Declaration Irish Presidency Declaration Ministers of Health of the Member States of the European Union and delegates met on 13

More information

Position Title: IT Security Specialist

Position Title: IT Security Specialist Position Title: IT Security Specialist SASRIA SOC LIMITED Sasria, a state-owned company, is the only short-term insurer in South Africa that provides affordable voluntary cover against special risks such

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Title: Facilitating Investment in Cybersecurity as a means of achieving the Sustainable Development Goals Description: Information

More information

Securing Europe's Information Society

Securing Europe's Information Society Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU

More information

Global cybersecurity and international standards

Global cybersecurity and international standards World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level

More information

CONNECT ARAB STATES SUMMIT

CONNECT ARAB STATES SUMMIT CONNECT ARAB STATES SUMMIT Doha, Qatar, 5-7 March 2012 Draft Concept Paper Overview The Connect Arab States Summit is being organized by the International Telecommunication Union (ITU) in partnership with

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document EUROPEAN COMMISSION Strasbourg, 7.2.2013 SWD(2013) 31 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a Directive of the European

More information

Position Paper of the ASD Civil Aviation Cybersecurity Taskforce

Position Paper of the ASD Civil Aviation Cybersecurity Taskforce Contact: Yoann Viaouet Position Paper of the ASD Civil Aviation Cybersecurity Taskforce April 2017 Content Executive Summary... 2 The need for a global cybersecurity framework: the role of ICAO... 3 The

More information

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR Program The structure of the workshop will be fully participatory for each session. We will ask several participants to take the lead in some panels, and to present the main challenges or comment on certain

More information

H2020 Opportunities in the Area of Security and Critical Infrastructure Protection

H2020 Opportunities in the Area of Security and Critical Infrastructure Protection H2020 Opportunities in the Area of Security and Critical Infrastructure Protection Angelo MARINO Head of Unit Security Research AIIC General Assembly Rome, 26/10/2013 NOT LEGALLY BINDING Outline The context:

More information

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D KENYA YOUR RELIABLE PARTNER AT THE ITU Candidate for the ITU Council in Region D KENYA: CANDIDATE FOR ITU COUNCIL IN REGION D (AFRICA) The Republic of Kenya has been a member of the International Telecommunication

More information

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope Timestamp 8/30/2013 15:34:00 The information solicited through this questionnaire will only be used in aggregate form, unless otherwise authorised by the respondent. Do you authorise us to cite/share your

More information

Security in a Converging IT/OT World

Security in a Converging IT/OT World Security in a Converging IT/OT World Introduction Around the winter solstice, darkness comes early to the citizens of Ukraine. On December 23, 2015, it came a little earlier than normal. In mid-afternoon,

More information

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

A Strategy for a secure Information Society Dialogue, Partnership and empowerment A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

What do you see as GSMA s

What do you see as GSMA s GSMA: Connecting everyone and everything to a better future Mats Granryd, Director General of GSMA, shares his thoughts on the development of 5G, the Internet of Things, and why mobile is so important

More information

The State of Cybersecurity and Digital Trust 2016

The State of Cybersecurity and Digital Trust 2016 The State of Cybersecurity and Digital Trust 2016 Identifying Cybersecurity Gaps to Rethink State of the Art Executive Summary Executive Summary While the advent of digital technology has fueled new business

More information