IoT Security Policy and Regulation Initiatives in China. Fan Dongyang, Huawei

Size: px
Start display at page:

Download "IoT Security Policy and Regulation Initiatives in China. Fan Dongyang, Huawei"

Transcription

1 IoT Security Policy and Regulation Initiatives in China Fan Dongyang, Huawei

2 China Economy Facilitating High-quality Growth The new norm Going digital GDP Growth Rate Supply-side reform E-commerce is on the rise between 2006 and 2014,shipping leapt tenfold from 1 billion to 10 billion packages delivered. $14,3b sales Nov in Alibaba platform, 60% increase from

3 The National Strategies Internet + Develop e-commerce, industry networks, and online banking, and raise the profile of Internet companies on the world stage. Boosting growth by infusing mobile Internet, cloud computing, big data, and IoT into manufacturing and others. Manufacture 2025 Enhance industry base, quality and brand, break through in main areas. Promoting green production, streamline industry structure, transformation to services and globalization Platform, Application, Technology, Security, Mechanism Action Plan for Promoting Development of Big Data Previous: Special Action Plan for M2M Development ( ) 3

4 Cybersecurity Internet benefit for the country and people To proceed together with development Protection system for critical information infrastructure Core technologies Innovation, harmonization, green, open, and sharing 4

5 Industry and Ministries MIIT (Ministry of Industry and Information Technologies) Telecom + other about 20 industries CAC (Cyberspace Administration of China, Office of the Central Leading Group for Cyberspace of CCCP) Cybersecurity and Informationization NDRC (National Development and Reform Commission) MOST (Ministry of Science and Technology) SAC (Standardization Administration of China) 5

6 Industry Alliances Industry 4.0 Group IIC China Team Others Strategy Alliance for M2M Industry Technology Innovation M2M Standardization Group Smart City Standardization Group AII Members Industry(225) ICT(29) University(8) 225 Research(11) Security(6) Abroad(10) 6

7 Non-governmental Organizations for Policies Self-regulation of data flow Industry IOT Cloud Service and Terminal standards Industry 4.0 public policy Internet + Car + Traffic Summit Energy Internet opportunities and challenges How to protect information security in the Big Data time Information security impact on China economy Digital Forum Security of social network Way of China Cybersecurity legislation IT industry Cybersecurity best practices Industry control system security workshop 7

8 Available Law and Regulations 2015 State Council - China Computer Information System Security Protection Regulation (first in 1994) 2007 MPS - Management Method for Information Security Protection for Classified Levels 2001 NPC Standing Committee Resolution about Protection of Internet Security 2012 NPC Standing Committee Resolution about Enhance Network Information Protection July 2015: National Security Law - secure and controllable systems and data security in critical infrastructure and key areas 2014 MIIT Guidance on Enhance Telecom and Internet Security 2013 MIIT Regulation about Telecom and Internet Personal Information Protection 2014 China Banking Regulatory Commission - Guidance for Applying Secure and Controllable Information Technology to Enhance Banking Industry Cybersecurity and Informatization Development 8

9 Law and Regulations in the Pipe Line CAC: Administrative Measures on Internet Information Services CAC Rules on Security Protection for Critical Information Infrastructure Cybersecurity Law - second read June 2016 Cyber Sovereignty Security of Product and Service Security of Network Operation (Classified Levels Protection, Critical Infrastructure) Data Security (Category, Personal Information) Information Security 9

10 Standardization - CCSA TC10 Ubiquitous Networks Security Requirements for Ubiquitous Networks M2M Technical Specification (Release 1) - Security Solutions Baseline for classified protection of IOT perception communication system Research on Physical layer security technology of Ubiquitous Network Perceived Extension Layer Terminal embedded operating system security requirements of the M2M Secure technology requirements for protocols of sensor layer of M2M Research on the security of communication between vehicle and Infrastructure TC8 Network and Information Security Requirement for classified level security protection of M2M information system Security framework and technical requirement for logistics information service General requirement for M2M node authentication TC11 Mobile Internet Application and Terminal Research on information security problems and key technologies of mobile internet vehicle Information security research for on-board intelligent terminal Security Requirements Analysis for Smart City 10

11 Standardization TC260 (IT Security) 11 Framework for critical information infrastructure Industrial control system security network security Management requirements Technical requirement for Industrial network Audit guidance protocol Classification guidance General reference model and requirements for Classification system security design guidance M2M security Protection technical requirement and test method Technical requirement for M2M data Specified firewall technical requirements transmission security Isolation and information exchange system security technical Technical requirement for M2M sensor gateway requirement Technical requirement for M2M sensor device Vulnerability detection technical requirement and test method Technical requirement for information security of Supervision security technical requirement and test method smart connected devices

12 Standardization Smart Manufacture Information Security Software, Device, Network, Data and security Protection Information Security Management Management and Supervision Industrial control network security, and information security Security requirement for industrial automatic product Distributed Control System security protection, management, audit, risk and vulnerability detection Security requirement for the programmable logic controller Network security specification of EPA(Ethernet for Plant Automation) for industrial measurement and control system Secure and controllable information system Electrical Power System Sensor network security: general technical specification, network transmission security technical and test specification, etc. 12

13 Summary The regulations for IoT Security are yet to come Intentions are for critical infrastructure, classified levels of security protection, information security and core technologies 13 13

14 Thank You Open, Transparent, Cooperative 14

China IoT New Developments and EU- China Cooperation

China IoT New Developments and EU- China Cooperation China IoT New Developments and EU- China Cooperation June 2014, London Shirley Zhang China Academy of Telecommunication Research(CATR), Ministry of Industry and Information Technology(MIIT),China Email:zhangxueli@catr.cn

More information

Development Progress and OEM Perspective of C-V2X in China

Development Progress and OEM Perspective of C-V2X in China Development Progress and OEM Perspective of C-V2X in China Dr. Xiang Dang (ABM) Deputy General Manager Research& Advanced Technology Department SAIC MOTOR 1 C-V2X Development Progress in China 2 OEM s

More information

Benefits of Open Cross Border Data Flows

Benefits of Open Cross Border Data Flows /SMEWG41/039 Agenda Item: 16.3 Benefits of Open Cross Border Data Flows Purpose: Information Submitted by: United States 41 st Small and Medium Enterprises Working Group Meeting Iloilo, Philippines 23-24

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

China ITS Standardization

China ITS Standardization SESEC III Special Report Author: Betty XU Date of draft: 2015-01-16 China ITS Standardization Part 1: Main Organizations Jan 2015 Seconded European Standardization Expert in China Project (SESEC) Executive

More information

National program of digital transformation

National program of digital transformation National program of digital transformation Omuraliev Mirlan Deputy Chairman State Committee of Information Technologies and Communications of the Kyrgyz Republic Global Infrastructure Cooperation Conference

More information

CYBERSECURITY INITIATIVES IN VANUATU

CYBERSECURITY INITIATIVES IN VANUATU CYBERSECURITY INITIATIVES IN VANUATU OUTLINE COUNTRY OVERVIEW TELECOMMUNICATIONS/ICT SECTOR REFORM PROGRAM MODERN BUSINESS ENABLING ENVIRONMENT POLICIES RELATING TO TELECOMMS POLICIES RELATING TO ICT LESSONS

More information

ICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015

ICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015 ICT Policy Perspective for APEC Ministry of Internal Affairs and Communications March 2015 Current Status in APEC Region 1 GDP Growth Rate Twice the global average Share of Global Communications Service

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

System and Practice of Information Security Certification for IT products in China

System and Practice of Information Security Certification for IT products in China System and Practice of Information Security Certification for IT products in China Catalogue 01 Introduction to IT product information security certification 02 Practice of industrial control security

More information

The EU Digital Single Market Roadmap

The EU Digital Single Market Roadmap The EU Digital Single Market Roadmap A Weber Shandwick Brief - 6 May Snapshot Background Objectives Published by the European Commission, the EU s executive, on May 6 One of President Jean Claude Juncker

More information

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

Green California Summit. Paul Clanon Executive Director California Public Utilities Commission April 19, 2011

Green California Summit. Paul Clanon Executive Director California Public Utilities Commission April 19, 2011 Green California Summit Paul Clanon Executive Director California Public Utilities Commission April 19, 2011 1 Presentation Overview What is Smart Grid Why Smart Grid California s Commitment to Smart Grid

More information

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Legal framework of ensuring of cyber security in the Republic of Azerbaijan Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic

More information

SESEC III. China IT/ICT Standardization Newsletter. January, February, March 2018

SESEC III. China IT/ICT Standardization Newsletter. January, February, March 2018 Author: Betty XU Distributed to: SESEC Partners, EU standardization stakeholders Date of issue: 2018-04-20 SESEC III China IT/ICT Standardization Newsletter January, February, March 2018 Seconded European

More information

Role of CAICT in promoting ICT research, stakeholder cooperation and capacity building. Dr XIE, YI. Vice President, CAICT

Role of CAICT in promoting ICT research, stakeholder cooperation and capacity building. Dr XIE, YI. Vice President, CAICT Role of CAICT in promoting ICT research, stakeholder cooperation and capacity building Dr XIE, YI Vice President, CAICT 1 Role in ICT field the Think-tank for government & the Platform for Industry CAICT

More information

China and International Governance of Cybercrime

China and International Governance of Cybercrime China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of

More information

Regional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America

Regional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America Regional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America CLT 217 - Cartagena, 21 June 217 Elena Scaramuzzi - Cullen International 216 comparison digital strategies

More information

5G Progress in China. May, 2017

5G Progress in China. May, 2017 5G Progress in China May, 2017 5G Development Plan in China LI Keqiang, Premier of China s State Council: Held an executive meeting of China s State Council and adopted The 13th Five-Year Plan for National

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

Information Technology Branch Organization of Cyber Security Technical Standard

Information Technology Branch Organization of Cyber Security Technical Standard Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:

More information

How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations

How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations By Dr. Saeed Al Dhaheri @DDSaeed Chairman, We are the leading Smart Solutions Integrator. With our far sight and

More information

REALISING JORDAN S MOBILE FUTURE 28 APRIL 2014 AMMAN, JORDAN

REALISING JORDAN S MOBILE FUTURE 28 APRIL 2014 AMMAN, JORDAN REALISING JORDAN S MOBILE FUTURE 28 APRIL 2014 AMMAN, JORDAN ROLE OF THE GSMA WE ARE THE GLOBAL INDUSTRY VOICE SHAPING THE FUTURE OF MOBILE INDUSTRY FORUM POLICY ADVOCATE MARKET THINK TANK BUSINESS CATALYST

More information

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

JOINT MEDIA STATEMENT

JOINT MEDIA STATEMENT The 18 th ASEAN Telecommunications and Information Technology Ministers Meeting and Related Meetings Bali, Indonesia, 6 December 2018 JOINT MEDIA STATEMENT 1. The 18 th ASEAN Telecommunications and Information

More information

Cybersecurity Strategy of the Republic of Cyprus

Cybersecurity Strategy of the Republic of Cyprus Cybersecurity Strategy of the Republic of Cyprus George Michaelides Commissioner of Electronic Communications and Postal Regulation http://www.ocecpr.org.cy 12 th February 2016 Cybersecurity Strategy of

More information

ICTs AND SUSTAINABLE ENERGY: Realizing the Full Potential

ICTs AND SUSTAINABLE ENERGY: Realizing the Full Potential ICTs AND SUSTAINABLE ENERGY: Realizing the Full Potential STEPHEN HARPER GLOBAL DIRECTOR ENERGY AND ENVIRONMENT POLICY OCTOBER 2012 You Need to Have a Smart Society To Have a Sustainable Society If consumption

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014 World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014 Document WTDC14/28- E 10 February 2014 Original: French SOURCE: TITLE: ALG/28/1 Objective: 3 Ministry of Post and

More information

11th Annual WCO PICARD Conference Manila, Philippines September 2016 Transforming China ecustoms and E-Port into National Single Window

11th Annual WCO PICARD Conference Manila, Philippines September 2016 Transforming China ecustoms and E-Port into National Single Window 11th Annual WCO PICARD Conference Manila, Philippines 27-29 September 2016 Transforming China ecustoms and E-Port into National Single Window Wellington LIU Tao Huawei Tech Phils.Inc Outline Progress of

More information

Recommendations for Small and Medium Enterprises. Event Date Location

Recommendations for Small and Medium Enterprises. Event Date Location Recommendations for Small and Medium Enterprises Event Date Location B20 Structure B20 Members worldwide B20 Cross-thematic Group Small and Medium Enterprises CTG SMEs: Composition Coordination Group 129

More information

Forum. Ningbo, China 25 February

Forum. Ningbo, China 25 February 2014/SOM1/SCE-COW/014 Agenda Item: 4 Telecommunications and Inform ation Working Group Strategic Plan Purpose: Consideration Submitted by: TEL Chair Forum Doc. No.: 2013/SOM3/SCE/017 SOM Steering Committee

More information

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November

More information

Environment Report,

Environment Report, South Korea Telecom Investment Environment Report, 2008-2009 In virtue of communications infrastructure construction and improvement, the number of subscribers for broadband and mobile services surged.

More information

International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015)

International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Risk Management Theory Application in national information security risk control Analysis of the relationship

More information

Smart infrastructure: unleashing ICT and road synergies

Smart infrastructure: unleashing ICT and road synergies Smart infrastructure: unleashing ICT and road synergies Fifth Meeting of the Working Group on the Asian Highway ESCAP 7 October 2013, Bangkok Tiziana Bonapace, Chief, ICT and Development section, IDD ESCAP

More information

Protecting Critical Information Infrastructure in times of increasing cyber conflict

Protecting Critical Information Infrastructure in times of increasing cyber conflict Protecting Critical Information Infrastructure in times of increasing cyber conflict Jan Neutze Director of Cybersecurity Policy (Europe/Middle East/Africa) Microsoft Critical Infrastructures are under

More information

Data Protection Regulations and International Data Flows: Implications for Trade and Development

Data Protection Regulations and International Data Flows: Implications for Trade and Development Data Protection Regulations and International Data Flows: Implications for Trade and Development Cécile Barayre (cecile.barayre@unctad.org) Economic Affairs Officer, ICT Analysis Section Division on Technology

More information

eheath and mhealth China Unicom s experience and view

eheath and mhealth China Unicom s experience and view eheath and mhealth China Unicom s experience and view Dr. Xiongyan Tang China Unicom Research Institute 25 June 2013, Shanghai Contents China Unicom s M2M services China Unicom s activities in ehealth

More information

Diana Korka Economic Affairs Officer, ICT Policy Section UNCTAD

Diana Korka Economic Affairs Officer, ICT Policy Section UNCTAD Diana Korka Economic Affairs Officer, ICT Policy Section UNCTAD UNESCAP Regional Consultation on e-commerce for Sustainable Development in Asia and the Pacific Bangkok, 30 October 2017 Information Economy

More information

Chinese Server Market Development and Major Brand Analysis

Chinese Server Market Development and Major Brand Analysis Industry Intelligence Program Computing Chinese Server Market Development and Major Brand Analysis Abstract Taking advantage of the rise of cloud and mobile computing, the server industry has been booming

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment Fundamentals of Cybersecurity/CIIP Building Capacity: Using a National Strategy & Self- Presented to: 2009 ITU Regional Cybersecurity Forum for Asia-Pacific Connecting the World Responsibly 23-25 25 September

More information

RWANDA S APPROACH TOWARDS EMERGING TECHNOLOGIES, opportunities and challenges

RWANDA S APPROACH TOWARDS EMERGING TECHNOLOGIES, opportunities and challenges 5 th SG 13 Regional Workshop for Africa on "ITU-T Standardization Work on Future Networks: Towards a Better Future for Africa" (Cairo, Egypt, 2-3 April 2017) RWANDA S APPROACH TOWARDS EMERGING TECHNOLOGIES,

More information

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses

More information

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA)

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA) ขอแค ประมาณ ร ปน นะโม Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA) 1 Government agencies need to develop the Digital Government Master

More information

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES DOCUMENT DETAIL Security Classification Unclassified Authority National Information Technology Authority - Uganda

More information

ICT and Disaster Risk Reduction Division ESCAP

ICT and Disaster Risk Reduction Division ESCAP 1 ICT and Disaster Risk Reduction Division ESCAP http://www.unescap.org/publications/artificial-intelligence-and-broadband-divide-state-ict-connectivity-asia-and-pacific Landscape 2 3 Trends Potentials

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

Poland: Initiative for Polish Industry 4.0 The Future Industry Platform

Poland: Initiative for Polish Industry 4.0 The Future Industry Platform Digital Transformation Monitor Poland: Initiative for Polish Industry 4.0 The Future Industry Platform February 2018 Internal Market, Industry, Entrepreneurshi p and SMEs Skitterphoto/Pexels.com Country:

More information

Smart Sustainable Cities. Trends and Real-World Opportunities

Smart Sustainable Cities. Trends and Real-World Opportunities Smart Sustainable Cities Trends and Real-World Opportunities Role Of The GSMA WE ARE THE GLOBAL INDUSTRY VOICE SHAPING THE FUTURE OF MOBILE INDUSTRY FORUM POLICY ADVOCATE MARKET THINK TANK BUSINESS CATALYST

More information

INDUSTRY 4.0 Summit 2018

INDUSTRY 4.0 Summit 2018 EVENT BROCHURE 12th 13th July 2018 JW Marriott Hotel Hanoi INDUSTRY 4.0 Summit 2018 HOSTED & ORGANIZED BY EVENT OVERVIEW Industry 4.0 Summit 2018 hosted by the Government of the Socialist Republic of Viet

More information

Cyber Security in Europe and CEER s new PEER initiative

Cyber Security in Europe and CEER s new PEER initiative NARUC-CEER International Forum, 27 April 2017, Arlington, Virginia Cyber Security in Europe and CEER s new PEER initiative Lord Mogg, CEER President Outline New EU legislativedevelopments: NIS Directive

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Digital Security Risks to Transport Infrastructure: Automated Vehicles February, 2018

Digital Security Risks to Transport Infrastructure: Automated Vehicles February, 2018 OECD Workshop on Digital Security and Resilience in Critical Infrastructure and Essential Services Digital Security Risks to Transport Infrastructure: Automated Vehicles 15-16 February, 2018 Eva Molnar

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Procuring Telecommunications and ICT Solutions in China. Neil Gallagher Director of Sales - Europe 31 st October 2018

Procuring Telecommunications and ICT Solutions in China. Neil Gallagher Director of Sales - Europe 31 st October 2018 Procuring Telecommunications and ICT Solutions in China Neil Gallagher Director of Sales - Europe 31 st October 2018 1 Agenda A short history of Telecommunications in China The role of Ministry of Industry

More information

Economic and Social Council

Economic and Social Council United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization

More information

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration

More information

DIGITIZING INDUSTRY, ICT STANDARDS TO

DIGITIZING INDUSTRY, ICT STANDARDS TO DIGITIZING INDUSTRY, ICT STANDARDS TO DELIVER ON DIGITAL SINGLE MARKET OBJECTIVES ETSI When Standards Support Policy 14 November 2016 Emilio Davila Gonzalez Unit Start ups & Innovation, EC DG Connect 72%

More information

Harmonizing of EU and EaP Digital Markets: HDM Initiative

Harmonizing of EU and EaP Digital Markets: HDM Initiative Harmonizing of EU and EaP Digital Markets: HDM Initiative cooperation for the creation of pan-european DSM NTA Summit 3 rd June 2015, Brussels Content What does Harmonisation mean? What is HDM initiative

More information

Building digital societies in Asia: mobile government and m-services

Building digital societies in Asia: mobile government and m-services Building digital societies in Asia: mobile government and m-services Asia-Pacific Regional Forum on e-government, Smart Cities, and Digital Societies for Sustainable Development, August 2015 About the

More information

OPTIMIZING CONNECTIVITY: Updated Recommendations to Improve China s Information Technology Environment

OPTIMIZING CONNECTIVITY: Updated Recommendations to Improve China s Information Technology Environment OPTIMIZING CONNECTIVITY: Updated Recommendations to Improve China s Information Technology Environment February 2018 Since China s Cybersecurity Law came into effect in June of 2017, the government has

More information

Since the 1980s, a new generation of

Since the 1980s, a new generation of What is China doing to accelerate 5G transport network deployment? By Haiyi Zhang, China Academy of Information and Communications Technology (CAICT) Since the 1980s, a new generation of revolutionary

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

Singapore: Your Gateway to ASEAN*

Singapore: Your Gateway to ASEAN* Singapore: Your Gateway to ASEAN* Margaret Hanson Muse Regional Senior Commercial Officer March 2017 *Association of Southeast Asian Nations ASEAN Economic Community at a Glance ASEAN at a Glance Image:

More information

2010/TELMIN/011 Benefiting Socio-Economic Activities Through the Application of ICT

2010/TELMIN/011 Benefiting Socio-Economic Activities Through the Application of ICT 2010/TELMIN/011 Benefiting Socio-Economic Activities Through the Application of ICT Submitted by: Japan 8 th Ministerial Meeting on Telecommunications and Information Industry Okinawa, Japan 30-31 October

More information

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 18-19 APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 At the Trieste Western Balkans Summit, we stressed the importance of the

More information

IT POLICY AND PROJECTS THAILAND

IT POLICY AND PROJECTS THAILAND IT POLICY AND PROJECTS THAILAND Mr. Kitti Sriboonyagorn Acting Director Digital Technology Infrastructure Bureau Ministry of Digital Economy and Society Thailand 4.0 is a model aims to eliminate the middle

More information

Cyber-physical systems - a Key Enabler for the Digitalisation of European Industry

Cyber-physical systems - a Key Enabler for the Digitalisation of European Industry Cyber-physical systems - a Key Enabler for the Digitalisation of European Industry CPS Week Wien, 14 April 2016 Dr. Max Lemke Head of Unit, CONNECT-A3 European Commission 1 Three dimensions of Value Creation

More information

A European Perspective on Smart Grids

A European Perspective on Smart Grids A European Perspective on Smart Grids Patricia Arsene Unit Smart Cities and Sustainability CONNECT/H Sustainable & Secure Society DG Communication Networks, Content and Technology European Commission European

More information

Shaping smarter and more sustainable cities from WSIS to Habitat III

Shaping smarter and more sustainable cities from WSIS to Habitat III Shaping smarter and more sustainable cities from WSIS to Habitat III Cristina Bueti Advisor ITU-T 2 May 2016 Who are we? What do we do? Allocation of global radio spectrum and satellite orbits Committed

More information

Quality Assurance and esecurity

Quality Assurance and esecurity Ministère de l Economie, de l Industrie et de l Emploi Department for Economy, Industry and Employment Quality Assurance and esecurity Claude DAULAUD In-vehicle Communication, Telematics and Co-operative

More information

Harmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT

Harmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT Harmonisation of Digital Markets in the EaP Vassilis Kopanas European Commission, DG CONNECT vassilis.kopanas@ec.europa.eu The cost of non-europe European Parliament Research Study, March 2014 Fully realising

More information

QBPC s Mission and Objectives

QBPC s Mission and Objectives QBPC s Mission and Objectives Mission To make contributions to facilitate and promote continuous improvements in administrative and judicial protection for intellectual property in China; to enable the

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

EU policy on Network and Information Security & Critical Information Infrastructures Protection

EU policy on Network and Information Security & Critical Information Infrastructures Protection EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and

More information

Japan s Cyber Diplomacy

Japan s Cyber Diplomacy Japan s Cyber Diplomacy As the importance of cyberspace is increasing, cyber threats are rapidly growing. The Ministry of Foreign Affairs (MOFA) needs to lead international discussions on how to ensure

More information

The Arab ICT Organization

The Arab ICT Organization The Arab ICT Organization UNCITRAL, 21-22 April, 2016 The Arab ICT Organization SUMMARY I. About AICTO : creation, organs, membership II. objectives III. Action Plan IV. Working groups V. Projects : the

More information

Welcome to China NCPC!

Welcome to China NCPC! Welcome to China NCPC! Introduction to China NCPC CNCPC 1 General Information of CNCPC 2 What China NCPC has done I. General Information of CNCPC I. General Information of CNCPC Development 1994 CNCPC

More information

E Government in Tonga

E Government in Tonga Asia Pacific Regional Forum on e Government, 19 20 August 2015, Bangkok E Government in Tonga Presented by: Mr. Paula P. Ma u CEO MEIDECC Presentation Outline I. Background II. National ICT Plan III. E

More information

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud Cybersecurity Policy in the EU: The Network and Information Security Directive - Security for the data in the cloud Microsoft Commitment to Cybersecurity Security at the heart of our products and services

More information

Hannover Declaration

Hannover Declaration Hannover Declaration On 28 April 2016, the Ministry of Economy, Trade and Industry (METI) of Japan and the Federal Ministry for Economic Affairs and Energy (BMWi) of the Federal Republic of Germany released

More information

Controlling traffic In a Connected world

Controlling traffic In a Connected world Controlling traffic In a Connected world Stefan Myhrberg Transport engagements Ericsson Ericsson Internal 2013-10-14 Page 1 Impact on society Communication Is a basic Human need Smartphone 4G Mobile video

More information

2017/SOM3/DIA/007 Digital Trade Building Blocks

2017/SOM3/DIA/007 Digital Trade Building Blocks 2017/SOM3/DIA/007 Digital Trade Building Blocks Submitted by: Information Technology Industry Council Dialogue on Regional Trade Agreements and Free Trade Agreements Ho Chi Minh City, Viet Nam 27 August

More information

Cyber Security Law --- Are you ready?

Cyber Security Law --- Are you ready? Cyber Security Law --- Are you ready? Xun Yang Of Counsel, Commercial IP and Technology 9 May 2017 1 / B_LIVE_APAC1:2207856v1 Content Overview of Cyber Security Law Legislative Development Key Issues in

More information

Perspectives and research progress on 5G standard. MIIT, CHINA October 20, 2015

Perspectives and research progress on 5G standard. MIIT, CHINA October 20, 2015 Perspectives and research progress on 5G standard MIIT, CHINA October 20, 2015 1 5G Promotion Principles of Chinese Government Strengthen the cooperation between vendors, operators, universities, and research

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

China s Digital Economy: Innovation Policies and Reflections

China s Digital Economy: Innovation Policies and Reflections 2018/SOM3/EC/CONF/006 China s Digital Economy: Innovation Policies and Reflections Submitted by: Tencent Research Institute Conference on Good Regulatory Practices - Regulatory Reform the Digital Age Port

More information

IEEE World Forum on Internet of Things December, 2015 Milan, Italy. Impact of IoT on 5G: Benefits and Challenges. 5G Special Generation

IEEE World Forum on Internet of Things December, 2015 Milan, Italy. Impact of IoT on 5G: Benefits and Challenges. 5G Special Generation IEEE World Forum on Internet of Things 14-16 December, 2015 Milan, Italy Impact of IoT on 5G: Benefits and Challenges 5G Special Generation University of Surrey, 5GIC Monday, 14 December 2015 r.tafazolli@surrey.ac.uk

More information

MOTION FOR A RESOLUTION

MOTION FOR A RESOLUTION European Parliament 2014-2019 Plenary sitting B8-0155/2019 6.3.2019 MOTION FOR A RESOLUTION to wind up the debate on the statements by the Council and the Commission pursuant to Rule 123(2) of the Rules

More information

Digital Single Market Strategy for Europe

Digital Single Market Strategy for Europe Supporting European Union and Southeast Asia ICT strategic partnership and policy dialogue: Connecting ICT EU-SEA Research, Development and Innovation Knowledge Networks Digital Single Market Strategy

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

Connecting the Connectivities Symposium 11 June Thailand

Connecting the Connectivities Symposium 11 June Thailand Connecting the Connectivities Symposium 11 June 2018 Thailand Fatouma Toure Ibrahima Operations Adviser Infrastructure and Urban Development Hub Singapore POPULATION NOT EVENLY DISTRIBUTED AROUND THE WORLD

More information

Laws and Regulations & Data Governance

Laws and Regulations & Data Governance Executive Development Course: Digital Government for Transformation Towards Sustainable and Resilient Societies the Singapore Experience Laws and Regulations & Data Governance 2-6 April 2018 UNDP Global

More information

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell

More information

DIGITAL AGENDA FOR EUROPE

DIGITAL AGENDA FOR EUROPE DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background

More information