CTO, 26/04/2013. B.P 6170 Yaoundé Tél : (+237) Internet :
|
|
- Collin Lynch
- 5 years ago
- Views:
Transcription
1 CTO, B.P 6170 Yaoundé Tél : (+237) infos@antic.cm Internet :
2 PRESENTATION OUTLINE 1. Context 2. Internet Resource Management in Cameroon 2.1. Legal status 2.2. «.CM» Domain Name 2.3. IP Address 3. Ensuring Cybersafety in Cameroon 3.1. Organisational measures 3.2 Technical measures 4. Conclusion
3 1. CONTEXT In order to attend the 2035 vision, the State must activate all the development levers, including the Information and Communication Technologies (ICT) which has emerged in the recent years as an important factor in economic growth. Cameroon is currently experiencing rapid growth of e-services (e- Government and e-commerce related services) development, Internet usage increase and high penetration of mobile services. To this effect, the Government must ensure a trustworthy environment in the ICT sector which is pestered with scourge of cybercrimes.
4 1. CONTEXT Legal and Regulatory Framework To curb the scourge of cybercrimes, on December 21, 2010, the Head of State promulgated a set of laws governing this sector; the Prime Minister, Head of Government has also signed decrees to ensure the proper implementation of the laws. Laws N 2010/012 and N 2010/013 Decree organizing ANTIC and ART Enforcement Decree on Security Audits Decree on Electronic Certification Decree on Naming and Addressing Resources
5 2.INTERNET RESOURCES MANAGEMENT IN CAMEROON 2.1. Legal Status Following the enactment of the Law N 2010/013 relating to Electronic Communication in Cameroon by the President of the Republic and the Decree N 2013/0402/PM signed by the Prime Minister and Head of Government, ANTIC has the mandate to manage the following Internet resouces : «.CM» Domain Names IP Addresses in Cameroon
6 2.INTERNET RESOURCES MANAGEMENT IN CAMEROON 2.2. «.CM» Domain Names 14 Registrars registering domain names under the Cameroon s cctld (.cm ) Cameroon s cctld is managed with a policy stakeholders which is respected by all the Currently there are domain names under the Cameroon s cctld ANTIC is hosting and managing the zone s master/primary server meanwhile slave/secondary DNS services are provided by CAMTEL (03), ITU (01), RIPE (01) VERIZONE (01)
7 2.INTERNET RESOURCES MANAGEMENT IN CAMEROON 2.3. Public IP addresses Currently, AfriNIC allocates public IP addresses to ISPs in Cameroon With the regulation in place, ANTIC has planned to establish partnership with AfriNIC in order to manage public IP addresses in Cameroon IPv4 is still widely used by ISP, however some ISP are currently managing IPv6 addresses ANTIC and stakeholders are developing plans to switch from IPv4 to IPv6 The realization of a national IXP is going on The elaboration of charter to be respected by LIRs( Local Internet Registeries) is currently going on ANTIC has organised several meetings with LIRs in order to discuss on the new orientations of public IP address management inline with legal framework in place ANTIC has implemented a whois application
8 . CYBERSECURITY MEASURES IN CAMEROON 3.1. Organizational measures Elaboration of a National Information Security Policy Establishment of a formal framework for the fight against cybercrime involving all cybersecurity actors (SED, DGSN, DGRE, MINPOSTEL, ANTIC, ART) Reinforce the cybersecurity legal framework Sensitization and promotion of teaching cybersecurity related courses in universities Building partnerships with some organizations (Yahoo, Google, FIRST, INTERPOL) Elaboration of standards related to cybersecurity(charter, procedure, policy) Set up sustainable funding mechanisms for cybersecurity activities
9 . CYBERSECURITY MEASURES IN CAMEROON 3.2. Technical measures Set up a national PKI (Public Key Infrastructure) Set up a CIRT Conduct security audit nationwide Set up an IXP (Internet Exchange Point) Set up a national datacenter Put in place technical infrastructure to protect and monitor our cyberspace
10 4. CONCLUSIONS & PERSPECTIVES Develop a strategic framework involving different government structures in order to elaborate a national IT security policy Introduce IT Security Officer positions with respective roles in public and private agencies Reinforce the cybersecurity legal framework Put in place technical infrastructure(equipment and software) to protect and monitor our cyberspace Promote the development of local expertise in the cybersecurity Establish sustainable funding mechanisms for carrying out cybersecurity activities
11 Thank you for your Kind attention!
Presented by: Njei Check Head, Audit Security Division, ANTIC
Windhoek, 30th May 2017 Presented by: Njei Check Head, Audit Security Division, ANTIC B.P 6170 Yaoundé Tél : (+237) 694 405 868 Email : das@antic.cm Website : http://www.antic.cm SUMMARY 1 INTRODUCTION
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationCybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution
More informationCIGF Terminology and Concepts. C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U )
+ CIGF Terminology and Concepts C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U ) What We Will Cover Fundamentals IG Actors Common Acronyms Concepts Infrastructure Legal Socio Cultural
More informationGLOBAL CYBERSECURITY INDEX 2016
GLOBAL CYBERSECURITY INDEX 2016 Objective The Global Cybersecurity Index (GCI) measures each nation state s level of cybersecurity commitment in five main areas: Legal Technical Organizational Capacity
More informationFirst Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.
First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. DRAFT SUBMISSION OF [ORGANIZATION] PROJECTS/ACTIVITIES/STUDIES [Date] Objective: This
More informationINDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018
INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationBROADBAND DEFINITION
2 BROADBAND DEFINITION 3 THE GAP AFRICA VS WORLD WHAT S HAPPING IN THE SECTOR 2013, there are almost as many mobile-cellular subscriptions as people in the world, with more than half in the Asia-Pacific
More informationDeveloping a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya
Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya Lucky Waindi waindi@cck.go.ke Mwende Njiraini Njiraini@cck.go.ke 1 Content Part 1: Introduction Part 2: Developing
More informationCyber Security in Europe
Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing
More informationCybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015
Cybersecurity Capacity Building @ ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015 The importance of Cybersecurity From industrial age to information societies - Increasing dependence on the availability
More informationNational Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director
National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best
More informationENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010
ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions
More informationCommonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017
Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Title: Facilitating Investment in Cybersecurity as a means of achieving the Sustainable Development Goals Description: Information
More informationThe UK s National Cyber Security Strategy
The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016
More informationGlobal cybersecurity and international standards
World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level
More informationFundamental Principles of the Internet. Open, Distributed and Bottom-up.
Fundamental Principles of the Internet Open, Distributed and Bottom-up. 1 Internet s history = Giving rise to the governance principles that are open, interconnected, distributed, and transnational!2 Source:
More informationImplementing Cyber Standards for SMEs: A Commonwealth Approach
Implementing Cyber Standards for SMEs: A Commonwealth Approach Commonwealth Cybersecurity Forum 2017 BT Centre, London, UK 22-24 March 2017 Dr Martin Koyabe Manager, Technical Support & Consultancy Commonwealth
More informationThe challenges of the NIS directive from the viewpoint of the Vienna Hospital Association
The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the
More informationInternet Governance and the World Summit on the Information Society (WSIS)
Internet Governance and the World Summit on the Information Society (WSIS) Dr Tim Kelly, Head, Strategy and Policy Unit, ITU & Secretary, Content Sub-Committees, WSIS Internet Governance Workshop, Bangkok,
More informationAn Amsterdam Update. RIPE Network Coordination Centre. Nick Hyrka. APNIC 25, 29 April 2008, Taiwan 1. ArtistServer.
An Amsterdam Update ArtistServer.com/Brillman ArtistServer.com/Brillman APNIC 25, 29 April 2008, Taiwan http://www.ripe.net 1 Personnel Changes New key staff Anand Buddhdev Database Manager Andrea Cima
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationEstablishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges
Vietnam Computer Emergency Response Team Establishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges Vu Quoc Khanh, Director General of VNCERT Cybersecurity situation
More informationModernising the public sector through the cloud
Modernising the public sector through the cloud Alison Gillwald (PhD) & Mpho Moyo Executive Director: Research ICT Africa RIA Associate Adjunct Professor: University of Cape Town RIA Workshop RANICTP2
More informationREPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY
REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY SPEECH BY MR. JOE MUCHERU, CABINET SECRETARY, MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY DURING THE AFRICA CYBER DEFENSE
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationCybersecurity & Digital Privacy in the Energy sector
ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European
More informationPromoting Cyber Standards for SMEs: A Commonwealth Approach. Shola Taylor Secretary-General, CTO
Promoting Cyber Standards for SMEs: A Commonwealth Approach Shola Taylor Secretary-General, CTO Acknowledgement Botswana Cameroon Nigeria Jamaica Uganda What we know today about SMEs Potential targets
More informationImpact of Infrastructure Modernization and Selection of Appropriate Technical Solutions to Enhance IPO Business Services
Impact of Infrastructure Modernization and Selection of Appropriate Technical Solutions to Enhance IPO Business Services Evaluating and deciding on the appropriate technology according to the needs and
More informationLiberia ICT Policy
Liberia ICT Policy 2017-2021 Initial Stakeholders Consultation Eleanor Sarpong Head of Policy and Advocacy November 23, 2016 a4ai.org Goals of consultation To convene under the auspices of the GoL (MoPT
More informationGlobal Cybersecurity Agenda
Global Cybersecurity Agenda A Framework for International Cooperation in Cybersecurity ITU Workshop on Frameworks for National Action: Cybersecurity and Critical Information Infrastructure Protection 17
More informationENISA Cooperation in the EU / NIS Directive
ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security
More informationRelated to the Internet
International Public Policy Issues Related to the Internet and the Role of the Governments Regional Follow-up to the Outcome of the World Summit on the Information Society Marco Obiso ICT Applications
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationZambia National Standardization Organization Audit
Sixth SG13 Regional Workshop for Africa on Standardization of future networks: What opportunities for Africa? (Abidjan, Côte d Ivoire, 26-27 March 2018) Zambia National Standardization Organization Audit
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationEU policy on Network and Information Security & Critical Information Infrastructures Protection
EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and
More informationProvisional Translation
Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious
More informationCritical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.
Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,
More informationGLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius
GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius Presented By Mrs K.Gunesh-Balaghee,, Assistant Solicitor General Mr M.Armmogum,, Ag Senior State Counsel Mrs B.Kissoon-Luckputtya,
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)
COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion
More informationUSA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036
US-China Business Council Comments on The Draft Measures for Security Review of Online Products and Services March 6, 2017 On behalf of the more than 200 members of the US-China Business Council (USCBC),
More informationKENIC Report 2007/8. 33 rd ICANN Meeting, 4 th November 2008, Intercontinental Hotel, Cairo. Ali Hussein
KENIC Report 2007/8 33 rd ICANN Meeting, 4 th November 2008, Intercontinental Hotel, Cairo Ali Hussein Outline KENIC Background 2007/8 Highlights Highlights: h Governance Area Highlights: Technical Area
More informationSemantic Interoperability of Basic Data in the Italian Public Sector Giorgia Lodi
Semantic Interoperability of Basic Data in the Italian Public Sector Giorgia Lodi SEMIC conference 2013 21 June 2013 Dublin (AgID) Created last year, AgID is a public body that merged three different existing
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,
More informationWay to new challenges
Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@ When? Since 2001, informal working group starting with a few members from EU Law
More informationThe cost of cybercrime the benefits of cooperation
CTO Cyber Security Forum 2013 Bringing safety, resilience and security into cyberspace Yaoundé, Cameroon, 25 April 2013 The cost of cybercrime the benefits of cooperation Alexander.seger@coe.int www.coe.int/cybercrime
More informationCYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME
FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List
More informationWorkshop on Addressing the Barriers to IPv6 Deployment Spanish use case
Workshop on Addressing the Barriers to IPv6 Deployment Spanish use case Cristina Ramos cristinapilar.ramos@correo.gob.es Agenda Agenda IPv6 addressing plan Barriers Conclusions 1 Background Digital Agenda
More informationTHE CONNECT 2020 AGENDA FOR GLOBAL TELECOMMUNICATION/ICT DEVELOPMENT. April 8, 2015
THE CONNECT 2020 AGENDA FOR GLOBAL TELECOMMUNICATION/ICT DEVELOPMENT April 8, 2015 Connect 2020 Agenda for global telecommunication/ict development 2 Connect 2020 sets out the shared vision, goals and
More informationThe Arab ICT Organization
The Arab ICT Organization UNCITRAL, 21-22 April, 2016 The Arab ICT Organization SUMMARY I. About AICTO : creation, organs, membership II. objectives III. Action Plan IV. Working groups V. Projects : the
More informationSustainable Management of Waste Electrical and Electronic Equipment (WEEE) in Latin America
Sustainable Management of Waste Electrical and Electronic Equipment (WEEE) in Latin America Content The Context The Report Country Assessment WEEE Management Challenges in Latin America Main Findings of
More informationLao PDR Practice for Information Security
Lao PDR Practice for Information Security Ministry of Science and Technology (MOST) Department of Information and Technology (DIT) Daovalath Phommalath PhD EU-SEA Workshop International Cooperation on
More informationWORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November
More information10025/16 MP/mj 1 DG D 2B
Council of the European Union Brussels, 9 June 2016 (OR. en) 10025/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:
More informationAPNIC input to the Vietnam Ministry of Information and Communications ICT Journal on IPv6
APNIC input to the Vietnam Ministry of Information and Communications ICT Journal on IPv6 April 2013 Question One Since APNIC formally announce that Asia Pacific was the first region on the world coming
More informationNIS Standardisation ENISA view
NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number
More informationLegal framework of ensuring of cyber security in the Republic of Azerbaijan
Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic
More informationRESOLUTION 130 (REV. BUSAN, 2014)
RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International
More informationCyber Security Beyond 2020
Paulo Empadinhas Steve Purser NLO meeting ENISA Athens 26/04/2017 European Union Agency for Network and Information Security Main findings ENISA s current tasks and product portfolio shall be retained.
More informationImplementing a National Strategy : the case of the Tunisian CERT
Implementing a National Strategy : the case of the Tunisian CERT Belhassen ZOUARI, CEO, National Agency for Computer Security, Head of Cert-Tcc, E-mail : B.Zouari@ansi.tn a fast Historical Overview end
More informationRIPE. Réseaux IP Européens. Rob Blokzijl. RIPE Chairman. Rob Blokzijl. RIPE 57, Dubai, October,
RIPE Réseaux IP Européens Rob Blokzijl RIPE Chairman K13@NIKHEF.nl 1 RIPE History Terms of Reference About RIPE RIPE Working Groups RIPE Meetings Policy Development Process More Information 2 History of
More informationE-Strategies in Africa
E-Strategies in Africa Makane Faye mfaye@uneca.org United Nations Economic Commission for Africa Contents National E-strategies Lessons learned The WayForward from Global Vision to National Implementation
More informationBradford J. Willke. 19 September 2007
A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure
More informationSri Lanka THE JOURNEY OF TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY
THE JOURNEY OF Sri Lanka TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY Presented by Dr. Ajith Madurapperuma on behalf of the ICTA Email: ajitolanka@gmail.com A PRESENTATION BY The Information Communication
More informationMinisterial Meeting 19 th June 2015 Nuku alofa, Tonga
Asia Pacific Regional Development Forum 2015: Smartly Digital Asia Pacific Outcome of the Pacific ICT Ministerial Meeting 19 th June 2015 Nuku alofa, Tonga Presented by: Paula P. Ma u CEO, MIC, Tonga Outline
More informationSAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity
SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,
More informationUAE Space Policy Efforts Towards Long Term Sustainability of Space Activities Agenda Item 4; COPUOS June 2017 By: Space Policy and
UAE Space Policy Efforts Towards Long Term Sustainability of Space Activities Agenda Item 4; COPUOS 2017 07-16 June 2017 By: Space Policy and Regulations Directory 1 The UAE will build the first city on
More informationICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia
ICANN and Russia Dr. Paul Twomey President and CEO 10 June 2007 1 ICANN s mission To coordinate, overall, the global Internet's system of unique identifiers, and to ensure stable and secure operation of
More informationCONNECT ARAB STATES SUMMIT
CONNECT ARAB STATES SUMMIT Doha, Qatar, 5-7 March 2012 Draft Concept Paper Overview The Connect Arab States Summit is being organized by the International Telecommunication Union (ITU) in partnership with
More informationSecuring Europe's Information Society
Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU
More informationCommittee on the Internal Market and Consumer Protection
European Parliament 2014-2019 AMDMTS: 12 Regulation on ISA, the "EU Cybersecurity Agency", and repealing Regulation (EU) s created with Go to http://www.at4am.ep.parl.union.eu \000000.doc United in diversity
More informationAfrica s Common Position on Internet Governance The Dakar Resolution
Document WSIS-II/PC-3/CONTR/88-E 16 September 2005 Original: English The African Information and Communication Technologies (ICT) Ministers Africa s Common Position on Internet Governance The Dakar Resolution
More informationDiscussion on MS contribution to the WP2018
Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several
More informationDHS Cybersecurity: Services for State and Local Officials. February 2017
DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated
More informationUAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory
UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives
More informationThe Objectiives. Give the UAE an extensive global presence in the cyber world.
Overview of UAEnic RIPE Regional Meeting Doha, 17-18 Jan 06 Sultan Al Shamsi sultan@nic.ae Agenda Who is UAEnic? The Objectives UAEnic Time Lines Internet in the UAE Domain Name System Operating Mirror
More informationDIGITAL AGENDA FOR EUROPE
DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background
More informationData Governance for Smart City Management
The 4th Asia-Pacific Regional Forum on Smart Sustainable Cities and e-government 2018 Data Governance for Smart City Management July 2018 Thanh Hoa City, Vietnam Mi Kyoung Park United Nations Project Office
More informationLACNIC REPORT. Ernesto Majó Communications Manager
LACNIC REPORT Ernesto Majó Communications Manager ernesto@lacnic.net RIPE 55, Amsterdam October 24 2007 LACNIC s 5th Anniversary (31/10/2007) Membership Evolution 900 804 800 700 728 Small/Micro No Resource
More informationBuilding e-governance capacity in African countries
Industry Canada Industrie Canada The DOT Force Agenda - A G8 Focus on Africa - Building e-governance capacity in African countries Richard Bourassa Director, International Policy Electronic Commerce Branch
More informationThe African Internet Governance Forum AfIGF December 2017 Hyatt Regency Hotel, Sharm El-Sheikh, Egypt
The African Internet Governance Forum AfIGF 2017 4 6 December 2017 Hyatt Regency Hotel, Sharm El-Sheikh, Egypt Draft Outcome Document: Recommendations Background of AfIGF The African Internet Governance
More informationBuilding Blocks and Rationale of Broadband Plans
Building Blocks and Rationale of Broadband Plans Vincent ROGER-MACHART Implementation of WRC-15 Outcomes and Development of National Broadband Plans, Cotonou, 26 April 2016 National Broadband Plans Objectives
More informationIP Addressing and ICT Development in the Pacific Islands. Anne Lord and Save Vocea, APNIC ICT Workshop, Fiji, November, 2002
IP Addressing and ICT Development in the Pacific Islands Anne Lord and Save Vocea, APNIC ICT Workshop, Fiji, 11-13 November, 2002 A Glimpse of the Future. What is ICT Development? E-commerce and E-education
More informationICT: THE PHILIPPINE EXPERIENCE
ICT: THE PHILIPPINE EXPERIENCE Director Maria Teresa Garcia Information and Communications Technology Office Department of Science and Technology Conference on IT Utilization to Strengthen Economic and
More informationDECREE OF THE MINISTER OF COMMUNICATION AND INFORMATION TECHNOLOGY NUMBER : 20/PER/M.KOMINFO/12/2010
DECREE OF THE MINISTER OF COMMUNICATION AND INFORMATION TECHNOLOGY NUMBER : 20/PER/M.KOMINFO/12/2010 ON MANAGEMENT INFORMATION SYSTEM AND MONITORING OF SUBDISTRICT INTERNET SERVICE BY THE GRACE OF GOD
More informationCENTER FOR SECURITY STUDIES
CENTER FOR SECURITY STUDIES Swiss Federal Institute of Technology (ETH Zurich) A Generic National Framework for Critical Information Infrastructure Protection 2nd WSIS Action Line C5 Meeting ITU Headquarters,
More informationBackground Brief. The need to foster the IXPs ecosystem in the Arab region
Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed
More informationIASC Subsidiary Bodies. [Sub-Working Group on Emergency Telecommunications] Work Plan for 2010
INTER-AGENCY STANDING COMMITTEE WORKING GROUP MEETING IASC Subsidiary Bodies [Sub-Working Group on Emergency Telecommunications] Work Plan for 2010 Narrative Summary The mandate of the IASC sub Working
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationCritical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level
Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration
More informationWorkshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats
Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW
More informationNATIONAL INSTITUTE OF FORENSIC SCIENCE
NATIONAL INSTITUTE OF FORENSIC SCIENCE LEGISLATIVE OUTLINE National Institute of Forensic Sciences (NIFS) The NIFS will be responsible for the coordination, administration, and oversight of all of the
More informationBackground Brief. The need to foster the IXPs ecosystem in the Arab region
Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed
More informationWorld Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014
World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014 Document WTDC14/28- E 10 February 2014 Original: French SOURCE: TITLE: ALG/28/1 Objective: 3 Ministry of Post and
More informationGarry Mukelabai Communications Authority Zambia
Garry Mukelabai Communications Authority Zambia ICT in Zambia. Current and Future Legislations. Way Forward? Pop 12 million. Zambia pioneers of internet in region. Over 10 Internet Service Providers Internet
More informationCyber Security Roadmap
Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different
More informationASREN Arab States Research and Education Network
ASREN Arab States Research and Education Network IPv6 & NREN Internet2 Middle East Regional Interest Group Meeting Amman Jordan 13 Dec. 2011 Alaa AL-Din Al-Radhi IPv6, Cyber Security & Emerging Technologies:
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More information