The entire Domain pulse organisation team thanked participants at Domain pulse 2017.

Size: px
Start display at page:

Download "The entire Domain pulse organisation team thanked participants at Domain pulse 2017."

Transcription

1 No 1/ 2017 Domain pulse Dear reader, What do a leek, a circus tent and awardwinning chef Toni Mörwald have in common? That s right all three played a central role at the 2017 Domain pulse evening event at Palazzo in Vienna. Whisking participants off on a journey into the world of the Thrill Seekers, the spectacular show capped an action-packed opening day at the conference, which was held under the banner of Networks and Networkers this year. The respected researcher and philosopher Harald Katzmair opened Domain pulse with a keynote speech that explored questions such as: What do we actually need networks for? And what makes a good network in the first place? The insights into ICANN after the IANA Stewardship Transition and a panel discussion covering future opportunities and trends in the domain industry provided ample food for thought. The second day also had numerous highlights up its sleeve, with the speakers turning their attentions exclusively to the fight against evil networks. Current registry projects that also play a key role in underpinning the security and stability of the network were also in the spotlight. For us, Domain pulse 2017 is now over, and we have long since surpassed our initial goal of creating an environment where participants could share expertise and network with fellow professionals. Domain pulse is now the most important forum in the German-speaking countries for experts looking to discuss all the current topics and trends shaping the domain industry. This was clearly borne out by the results of the visitor survey, with respondents rating the mix of topics, organisation and fringe programme as very good. We are very pleased with the feedback we received and would like to use this issue of the.at-report to show our gratitude to everyone who participated! Richard Wein & Robert Schischka General managers nic.at All of the presentations as well as video footage of the keynote talks and sessions are available online at We wish you an enjoyable read and are already looking forward to the next Domain pulse, which will take place in Munich from February 2018! Richard Wein and Robert Schischka The entire Domain pulse organisation team thanked participants at Domain pulse Publication details: Owner and publisher: nic.at GmbH, Jakob-Haringer-Strasse 8/V, 5020 Salzburg. Concept and editorial: Monika Pink-Rank, Simone Binder, Sandra Lettenbichler. Photos: nic.at, Anna Rauchenberger. Place of publication: Salzburg, March

2 Domain pulse: Networks Why we need a strong network Network ecology in times of disruption Inspired by the theme of Networks and Networkers, the social scientist and philosopher Harald Katzmair devoted the first keynote talk to the question of why we need strong networks and what constitutes a strong network. The modern world is shaped by disruption and transformation, which means that opportunities for planning are diminishing all the time. In Katzmair s view only companies that build up resilient networks will be in a position to cope with these challenges. The defining success factor is striking the right balance between robustness and variability. And this is best achieved if the network comprises a broad cast of characters including pioneers, doers, controllers, people who have suffered setbacks, visionaries and therapists all of whom are equally important, as long as they work together. Harald Katzmair, FASresearch Governing the network ICANN, the multi-stakeholder model and the networks of the future ICANN Vice President Cherine Chalaby brought an eightpoint message from the ICANN board with him to Domain pulse. The board reaffirmed its belief that the DNS driven by developments such as Anycast and DNSSEC is becoming increasingly important, and stronger. The domain market will continue to grow and reap the rewards of new top level domains and internationalised domain names (IDNs). But Chalaby also emphasised the importance of the ICANN community, and not just because it will determine the timeframe for the next round of ngtlds. The new structure also gives the community much more influence and a greater right of reply. The IANA Stewardship Transition also helped to build trust between the community and ICANN board. ICANN is 100% committed to working with the global community in all its rich diversity. Chalaby cited collaborative multi-stakeholder networks like ICANN as an effective governance model that is well placed to solve global challenges in today s world. Cherine Chalaby, ICANN ICANN after the IANA Stewardship Transition Internet governance specialist Wolfgang Kleinwächter praised the successful IANA Stewardship Transition as a milestone in history that no-one would have believed possible even as recently as 10 years ago. It brought together two sharply-contrasting governance styles: the innovative, contemporary multistakeholder model and the traditional top-down governance model practiced by nation states. The open questions are now: can the successful multi-stakeholder model be applied to other areas? Will states accept a purely advisory role? How well do the new structures There is no international treaty recognising ICANN. The most important thing is a stable legal system where it is headquartered. Erich Schweighofer, University of Vienna and mechanisms drawn up on paper work in the real world? And could there be any legal issues surrounding the fact that ICANN is based in the USA and as such is subject All governments have equal say leaving them all equally dissatisfied. For them, stability of the internet is paramount. Thomas Schneider BAKOM & ICANN GAC to Californian state law. Wolfgang Kleinwächter discussed the issues alongside fellow experts Thomas Rickert, Thomas Schneider and Erich Schweighofer. The new model has been put through its paces with different scenarios designed to test its suitability. This also won over the Americans. Thomas Rickert, eco Verband & CCWG Enhancing ICANN Accountability 2

3 .at- report and Networkers Challenges for the network: The domain industry in fl ux Sideways growth, a multitude of new market participants, and new, booming markets. These are the defining characteristics of the present-day domain market. This year s Domain pulse put these topics at the top of the agenda, inviting independent market observers to present their statistics and insights from the perspective of country specific top level domains (cctlds) and generic top level As far as domain registrations from the Chinese market go, quantity over quality is the order of the day. Many spam domains are deleted again very quickly. Denis Wisotzki, ntldstats domains (gtlds) alike. They were followed by a pair of high-profile panel discussions that explored development opportunities for the industry, tackling questions such as whether it is possible to generate additional sales through marketing, and whether the key to success lays in new markets such as China. In all, ten experts shared their views. We can see a clear stagnation when it comes to European cctld domain registrations and the gross profit margin is coming under increasing pressure. Patrick Myles, CENTR The Chinese like to speculate and this has also applied to domains for some time now. But what counts for the industry is whether the longterm demand is there. Giuseppe Graziano, GRGG.com 20% growth in the Chinese e-commerce sector is our chance! There is definitely demand for good domain names and serious providers. Matthias Meyer- Schönherr, Sedo You have to take the specifics of the Chinese market into account. Trust and long-term relationship management are extremely important. Philipp Grabensee, Afilias 10 million domains were registered in China in 2016, and 2017 will be even better than that! Trading domains has become a very popular activity over the past five years. Ray Zheng, Racent Inc There are currently 1.8 billion Facebook users worldwide. Every single one of these users has a domain name with Facebook. But the question is: how are we going to ensure that all of these users get a domain? Neal McPherson, 1&1 Internet SE The problem with the domain industry is that it is not clearly communicating the benefits and uses. And our experience shows that cutting prices is counterproductive for domains. The higher the price, the more valuable customers perceive the domain to be. Katrin Ohlmer, dotzon Domains work particularly well in cultures with a very strong entrepreneurial spirit. This young generation in particular likes ngtlds and uses them in creative ways. Toby Hall, Minds & Machines Only very few top level domains cannibalise each other. In our experience, campaigns run by other registries actually benefit us.com is the only really competition.. Michiel Henneke, SIDN 3

4 No 1 / 2017 Domain pulse Exploiting and protecting users of the network Networks of Control: Privacy and data protection in times of User Tracking and Big Data We allow countless companies to access our data. Not just Google and Facebook, but also makers of other apps. The majority of these apps don t just harvest data; they also share them with third parties. Over time this helps build up detailed profiles of our personal desires, weaknesses, attitudes and preferences. These are then used for marketing purposes or as material to manipulate public opinion. One example highlighted by Wolfie Christl is Cambridge Analytica, whose targeted campaigns are believed to have significantly influenced the outcome of the US presidential elections. His book Networks of Control has just been published. Wolfie Christl, Cracked Labs The new EU Data Protection and its impact on the domain industry In 2018 the EU s new data protection directive will enter into force. What is special about the new legislation is that it applies to anyone offering a service in Europe. This poses a particular challenge to companies that are subject to different, or less stringent, data protection laws in other jurisdictions. In other words, they have to raise the level of data protection to European standards or come up with special solutions. As a result, data protection is the burning issue for compliance experts right now. The European Union is determined to enforce this new law and data protection authorities are increasingly active, thanks to higher budgets, more staff and better equipment. Oliver Süme, Fieldfischer Continuosly working for the network What do a cat, Swiss chocolate, a powerbank, a steamship, Shakespeare and Trump have to do with the latest crop of registry projects? Nothing whatsoever at first glance, at least. But the Registry Infotainment Session hosted by nic.at, DENIC and SWITCH soon got to the bottom of the matter. The cat was the star of nic.at s advertising campaign for the short domain launch last year, while Swiss chocolate helped SWITCH employees on their way to winning the tender for being the.ch Registry until The powerbank represents the importance of electricity and the foundation of the Austrian Energy Cert at nic.at. The less-than-agile steamship symbolised DENIC s experiences with ICANN during the data escrow accreditation process. And finally Shakespeare comes into it with the To be or not to be quotation from Hamlet, which is a comment on ICANN s meticulousness during the protracted contract negotiations that led to the adoption of the.versicherung TLD transfer. A promotion video for the RcodeZero Anycast network from nic.at subsidiary IPCom provided the highlight. Inspired by the notion of America First, RcodeZero Secondary nic.at collated all the arguments for US President Donald Trump outlining why our RcodeZero Service is an absolute must for all registrars and domain owners. Watch the video: L-r: Susanne Pöchacker (moderator), Richard Wein (nic.at), Martin Schlicksbier (nic.at), Otmar Lendl (CERT.at), Barbara Schlossbauer (nic.at), Urs Eppenberger (SWITCH), Andreas Musielak (DENIC). 4

5 No 1 / 2017 Domain pulse For more infos check The network of evil and how to combat it Three in-demand keynote speakers gave talks delivering insights into the murky world of cyber crime. Peter Zinn, from the Netherlands crack cyber crime unit, provided a run through of its history, looking at everything from the early days of cyber crime to an increasingly complex future. Volker Kozok from the German Ministry of Defence used the Russo-Ukrainian cyberwar to show how the internet and social networks can be used being used to wage war and for propaganda purposes. Éireann Leverett flew the flag for cyber insurance and showed how it can play a significant role in enhancing overall IT security. Cyber-insurance: The myths and facts Éireann Leverett freely admits that he was not the biggest fan of cyber insurance when he first heard about it. Until he came to the conclusion that security is an economic problem, rather than a technical one. In his presentation he dispelled some of the most common myths surrounding cyber insurance, and presented a number of cold hard facts. Among the most widespread misconceptions is the notion that costs for cyber insurance would eat into security budgets. But he disagrees, saying that budgets for prevention and fixing damage have to be kept apart. Insurance is part of damage repair, so it has no place in the security budget. Many people are saying that it is not possible to evaluate and calculate the risk at this time. But many IT-related risks can be quantified very clearly including the resulting costs. What counts above everything else is understanding threat scenarios and developing scalable insurance models there is still some way to go here, and we will only be able to get there if security experts and insurance companies share data and compare their experiences with each other. Leverett also presented five cyber insurance products. In his view The more companies that conclude cyber insurance policies, the cheaper they will become. This will also give rise to new security services which will help us to better understand attackers and better protect ourselves from general security threats. Éireann Leverett, Concinnity Risks Russo-Ukrainian cyber war and the use of social media Hacker groups from Russia and Ukraine have honed their skills over recent years and are now among the best in the world, something that Lieutenant Colonel Kozok is very well placed to confirm in his capacity as an expert in this particular field. He has witnessed how attacks have progressed from amateurish phishing mails in questionable German and English to highly-professional ransomeware operations. These illegal activities make a considerable contribution to both countries economies: customer service included. But it s not just private individuals that the Russian and Ukrainian hacker groups have their sights on. Germany is also in the crosshairs. Kozok also talked about a propaganda war that circulates fake news and false reports with a view to preventing accurate and objective reporting. Volker Kozok, German Ministry of Defence Don t worry, be happy? The evolution of cyber crime Peter Zinn painted a particular bleak picture of what s ahead. At the moment we are lining up to network our devices online: in the smart homes of today, smartphones loaded with smart software regulate everything from thermostat controls to alarm systems. Smart cities are now taking this idea one step further by networking buildings and infrastructure. Zinn revealed what he saw as the logical next step in a thought experiment. The internet of the people will physically connect people with the internet, a step made possible thanks to implants in our bodies. But the problem is that these computers, as small as they are, are vulnerable to attack. What sounds like something out of a Hollywood film is already reality, with cases already confirmed of pace makers being hacked making it theoretically possible to trigger cardiac arrest from afar. Instead of looking on as a passive observer while developments snowball, Zinn urged people to get involved and help to shape the future themselves. Peter Zinn, Cyber Agents 5

6 Domain pulse 2017 Network art by Irene Anton The opulent Landtagssaal hall inside Palais Niederösterreich Breath-taking acrobatics at Palazzo in Vienna Instead of the traditional baton, this year Richard Wein handed over the Domain pulse leek Smiling faces at Domain pulse SWITCH s pick-me-up of choice: chocolate! Relaxed atmosphere at Palazzo Sand artist Anna reveals the host city for 2018: Munich! All the presentations are available at Visit to view the photo gallery Postings and comments on Video clips on and press releases at under ABOUT nic.at Press. 6

ICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia

ICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia ICANN and Russia Dr. Paul Twomey President and CEO 10 June 2007 1 ICANN s mission To coordinate, overall, the global Internet's system of unique identifiers, and to ensure stable and secure operation of

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

July 13, Via to RE: International Internet Policy Priorities [Docket No ]

July 13, Via  to RE: International Internet Policy Priorities [Docket No ] July 13, 2018 Honorable David J. Redl Assistant Secretary for Communications and Information and Administrator, National Telecommunications and Information Administration U.S. Department of Commerce Washington,

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR Program The structure of the workshop will be fully participatory for each session. We will ask several participants to take the lead in some panels, and to present the main challenges or comment on certain

More information

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department. Application for the post of the Executive Director of the European Network and Information Security Agency (ENISA) Udo Helmbrecht Presentation to the ENISA Management Board in Brussels on April 3 rd 2009

More information

TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING

TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING In 2014, West Midlands Police (WMP) committed to a striking transformation programme that would help the force meet current and future policing

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

How Your Organization Can Drive Success in the Age of Digital Disruption

How Your Organization Can Drive Success in the Age of Digital Disruption How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,

More information

Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition

Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition VIENNA CYBER SECURITY WEEK 2018 Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition SECURITY & DIPLOMACY 29-30 January 15A Favoritenstraße, 1040 Taubstummengasse

More information

Fiscal year 2017: TÜV Rheinland continues growth strategy with investments in future-oriented topics

Fiscal year 2017: TÜV Rheinland continues growth strategy with investments in future-oriented topics Fiscal year 2017: TÜV Rheinland continues growth strategy with investments in future-oriented topics 04/25/2018 Cologne The international testing service provider, TÜV Rheinland, continued its ongoing

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

Website Designs Australia

Website Designs Australia Proudly Brought To You By: Website Designs Australia Contents Disclaimer... 4 Why Your Local Business Needs Google Plus... 5 1 How Google Plus Can Improve Your Search Engine Rankings... 6 1. Google Search

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

Emerging Technologies The risks they pose to your organisations

Emerging Technologies The risks they pose to your organisations Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things

More information

A new approach to Cyber Security

A new approach to Cyber Security A new approach to Cyber Security Feel Free kpmg.ch We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward.

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING

CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING 1 CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING Under Canada s G7 presidency, Energy Ministers or their representatives from Canada, France, Germany, Italy,

More information

Asset Management conference 2016

Asset Management conference 2016 Asset Management conference 2016 The changing face of Asset Management 27 September 2016 2016 Grant Thornton Ireland. All rights reserved Cyber security 27 September 2016 Mike Harris Partner Grant Thornton

More information

Thin client position at Dutch government and health care institutions

Thin client position at Dutch government and health care institutions Thin client position at Dutch government and health care institutions Nationwide thin client survey by market research agency Conclusr Research commissioned by IGEL Technology 1 Table of content Preface

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 130 (REV. BUSAN, 2014) RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International

More information

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:

More information

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration ehealth Ministerial Conference 2013 Dublin 13 15 May 2013 Irish Presidency Declaration Irish Presidency Declaration Ministers of Health of the Member States of the European Union and delegates met on 13

More information

Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited

More information

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG Document WSIS-II/PC-3/CONTR/035-E 17 August 2005 Original: English UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG Y:\APP\PDF_SERVER\ALL-USER\IN\COORDUNIT\WGIG-COVER.DOC 17.08.05 17.08.05 www.itu.int/wsis

More information

In the Domain Name System s language, rcode 0 stands for: no error condition.

In the Domain Name System s language, rcode 0 stands for: no error condition. 12/2017 SIMPLE, FAST, RESILIENT In the Domain Name System s language, rcode 0 stands for: no error condition. If a DNS server answers a query with this result code, the service is running properly. This

More information

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made

More information

THE CYBERSECURITY LITERACY CONFIDENCE GAP

THE CYBERSECURITY LITERACY CONFIDENCE GAP CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks

More information

Village Software. Security Assessment Report

Village Software. Security Assessment Report Village Software Security Assessment Report Version 1.0 January 25, 2019 Prepared by Manuel Acevedo Helpful Village Security Assessment Report! 1 of! 11 Version 1.0 Table of Contents Executive Summary

More information

HOW BUSINESS FUNCTIONS ARE DRIVING PUBLIC CLOUD ADOPTION ACROSS THE TECHNOLOGY, MEDIA & ENTERTAINMENT INDUSTRY

HOW BUSINESS FUNCTIONS ARE DRIVING PUBLIC CLOUD ADOPTION ACROSS THE TECHNOLOGY, MEDIA & ENTERTAINMENT INDUSTRY HOW BUSINESS FUNCTIONS ARE DRIVING PUBLIC CLOUD ADOPTION ACROSS THE TECHNOLOGY, MEDIA & ENTERTAINMENT INDUSTRY Telecoms, Media & Entertainment Industry Report Contents 2 4 6 Executive Summary Context for

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: October Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of managed environments,

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

Micro Focus Partner Program. For Resellers

Micro Focus Partner Program. For Resellers Micro Focus Partner Program For Resellers Contents Micro Focus Today About Micro Focus Our solutions for digital transformation Products and Solutions Program Membership Tiers Become a Portfolio Expert

More information

GSMA Digital Dividend Spectrum Low-Cost LTE Device. User Survey Final Report. Martin Garner Senior Vice President

GSMA Digital Dividend Spectrum Low-Cost LTE Device. User Survey Final Report. Martin Garner Senior Vice President GSMA Digital Dividend Spectrum Low-Cost LTE Device User Survey Final Report Martin Garner Senior Vice President Agenda Executive summary Survey aims and approach Key findings Recommendations Country market

More information

Internet Governance in January January 2017

Internet Governance in January January 2017 Internet Governance in January 2017 31 January 2017 Main events in January 15-18 Jan: UN World Data Forum (Cape Town) 17-20 Jan: World Economic Forum Annual Meeting 2017 (Davos-Klosters) 23-24 Jan: Internet

More information

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives SECURING THE UK S DIGITAL PROSPERITY Enabling the joint delivery of the National Cyber Security Strategy's objectives 02 November 2016 2 SECURING THE UK S DIGITAL PROSPERITY SECURING THE UK S DIGITAL PROSPERITY

More information

Cyber Security Congress 2017

Cyber Security Congress 2017 Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee

More information

Cybersecurity and Privacy Innovation Forum Brussels, 28 April Keynote address. Giovanni Buttarelli European Data Protection Supervisor

Cybersecurity and Privacy Innovation Forum Brussels, 28 April Keynote address. Giovanni Buttarelli European Data Protection Supervisor Cybersecurity and Privacy Innovation Forum 2015 Brussels, 28 April 2015 Keynote address Giovanni Buttarelli European Data Protection Supervisor Ladies and gentlemen, Let me first thank the organisers for

More information

VERITAS 2017 TRUTH IN CLOUD REPORT

VERITAS 2017 TRUTH IN CLOUD REPORT WHITE PAPER VERITAS 2017 TRUTH IN CLOUD REPORT The rise of multi-cloud: Combatting misconceptions and realigning data management responsibilities CLOUD-FIRST MENTALITY Today, many organisations are taking

More information

2015 VORMETRIC INSIDER THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:

More information

The security challenge in a mobile world

The security challenge in a mobile world The security challenge in a mobile world Contents Executive summary 2 Executive summary 3 Controlling devices and data from the cloud 4 Managing mobile devices - Overview - How it works with MDM - Scenario

More information

Itu regional workshop

Itu regional workshop Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

ICANN Strategic Plan for fiscal years

ICANN Strategic Plan for fiscal years ICANN Strategic Plan for fiscal years 2016-2020 For best results, download this document and view it outside of your browser with Adobe Reader version 9 or higher. CLICK HERE TO BEGIN Introduction ICANN

More information

Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017

Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017 Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017 Petr Jirásek et al Praha 2017 Executive Summary Substantial growth in the use of information technologies

More information

Regional Development Forum For the Arab States(RDF-ARB) 2018

Regional Development Forum For the Arab States(RDF-ARB) 2018 Regional Development Forum For the Arab States(RDF-ARB) 2018 ICT4SDGs: Towards the implementation of WTDC17 outcomes Algiers, Algeria 12, 13 February 2018 Background Concept Note In the framework of the

More information

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness 2011/EPWG/WKSP/020 Session 4 Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness Submitted by: Australia Workshop on Private Sector Emergency Preparedness Sendai,

More information

BUSINESS LECTURE TWO. Dr Henry Pearson. Cyber Security and Privacy - Threats and Opportunities.

BUSINESS LECTURE TWO. Dr Henry Pearson. Cyber Security and Privacy - Threats and Opportunities. BUSINESS LECTURE TWO Dr Henry Pearson Cyber Security and Privacy - Threats and Opportunities. Introduction Henry started his talk by confessing that he was definitely not a marketer, as he had been occupied

More information

BACKUP TO THE FUTURE A SPICEWORKS SURVEY

BACKUP TO THE FUTURE A SPICEWORKS SURVEY BACKUP TO THE FUTURE A SPICEWORKS SURVEY 02 BACKUP TO THE FUTURE A SPICEWORKS SURVEY METHODOLOGY This research study was conducted by Spiceworks, the professional network for the IT industry, from a survey

More information

The data quality trends report

The data quality trends report Report The 2015 email data quality trends report How organizations today are managing and using email Table of contents: Summary...1 Research methodology...1 Key findings...2 Email collection and database

More information

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the

More information

Cybersecurity. Topic Background

Cybersecurity. Topic Background Cybersecurity Topic Background The growth of the Internet has allowed nations, organizations, and people to connect in ways previously unimagined. This new interconnectivity has allowed for collaboration,

More information

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the

More information

13967/16 MK/mj 1 DG D 2B

13967/16 MK/mj 1 DG D 2B Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:

More information

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018 Looking Back 2017 2018 Looking Ahead IT industry leaders, experts and analysts share their insights and opinions as they look back at key developments in 2017, as well as technology and market trends they

More information

Internet Governance in April April 2016

Internet Governance in April April 2016 Internet Governance in April 2016 26 April 2016 Main events in April 3-6 Apr: Global Privacy Summit 2016 (Washington DC) 3-8 Apr: IETF 95 (Buenos Aires) 4-6 Apr: IGF Open Consultations and MAG meeting

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: June 2013 Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported and lost, while the

More information

ICANN STRATEGIC PLAN JULY 2011 JUNE 2014

ICANN STRATEGIC PLAN JULY 2011 JUNE 2014 ICANN STRATEGIC PLAN JULY 2011 JUNE 2014 ICANN One World. One Internet. ICANN is a global organization that coordinates the Internet unique identifier systems for worldwide public benefit, enabling a single,

More information

President s Report 2009

President s Report 2009 President s Report 2009 Paul Twomey, President and CEO Public Forum 2 March 2009 At Large Summit New gtld Program IDN cctld Fast Track 2010 Operating Plan and Budget Improving Institutional Confidence

More information

The energy sector reloaded

The energy sector reloaded 1 The energy sector reloaded Association of Energy Market Innovators 2 Discourse at bne is very much in line with our approach as a network company. That s because the combination of expertise across sectors,

More information

Registry Internet Safety Group (RISG)

Registry Internet Safety Group (RISG) Registry Internet Safety Group (RISG) Re: Potential for Malicious Conduct and new TLD Process RISG s mission is to facilitate data exchange and promulgate best practices to address Internet identity theft,

More information

G8 Lyon-Roma Group High Tech Crime Subgroup

G8 Lyon-Roma Group High Tech Crime Subgroup G8 Lyon-Roma Group High Tech Crime Subgroup In October 2009, a series of recommendations for amendments to ICANN s Registrar Accreditation Agreement (RAA) was proposed to ICANN by law enforcement agencies

More information

Big data privacy in Australia

Big data privacy in Australia Five-article series Big data privacy in Australia Three actions you can take towards compliance Article 5 Big data and privacy Three actions you can take towards compliance There are three actions that

More information

How to Create, Deploy, & Operate Secure IoT Applications

How to Create, Deploy, & Operate Secure IoT Applications How to Create, Deploy, & Operate Secure IoT Applications TELIT WHITEPAPER INTRODUCTION As IoT deployments accelerate, an area of growing concern is security. The likelihood of billions of additional connections

More information

Internet Governance in January January 2018

Internet Governance in January January 2018 Internet Governance in January 2018 30 January 2018 A look back: Main events in January 17-19 Jan. MAPPING Surveillance Event (Rome) 17-19 Jan. ITU Expert Group on the International Telecommunication Regulations

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

Security Awareness Training Courses

Security Awareness Training Courses Security Awareness Training Courses Trusted Advisor for All Your Information Security Needs ZERODAYLAB Security Awareness Training Courses 75% of large organisations were subject to a staff-related security

More information

One World. One Internet.

One World. One Internet. ICANN STRATEGIC PLAN JULY 2012 JUNE 2015 DRAFT PLAN One World. One Internet. One World. One Internet. ICANN is the global organization that coordinates the Internet s unique identifier systems for worldwide

More information

CIGF Terminology and Concepts. C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U )

CIGF Terminology and Concepts. C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U ) + CIGF Terminology and Concepts C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U ) What We Will Cover Fundamentals IG Actors Common Acronyms Concepts Infrastructure Legal Socio Cultural

More information

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial

More information

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,

More information

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation

More information

Ambition Market Insights

Ambition Market Insights The second half of 2017 has seen strong hiring activities, driven by a number of key factors, across the technology sector. Many organisations were embracing technology to make their business more efficient

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital

More information

SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT.

SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT. SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT www.hackersday.org ABOUT NISS National Information Security (NISS) is an initiative of National Information Security Council which is

More information

Thinking cities. Khalil Laaboudi. Smart & Sustainable Cities. Global Marketing

Thinking cities. Khalil Laaboudi. Smart & Sustainable Cities. Global Marketing Thinking cities Khalil Laaboudi Smart & Sustainable Cities Global Marketing Thinking Cities -- Agenda I. Ericsson in the World and in Hong Kong II. III. IV. Networked Society and other global trends New

More information

12/2017. Issue 2 // 2017: A REVIEW

12/2017. Issue 2 // 2017: A REVIEW 12/2017 Issue 2 // 2017: A REVIEW nic // report Content Introduction 01 EU General Data Protection Regulation 02 Review 2017 04 Behind the Scenes 06 Preview 2018 08 Cranberry Orange Secco. The nic.at New

More information

INFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE.

INFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE. INFORMATION GENERALE October 10-11-12 Radisson Blu Hotel Abidjan PRESS RELEASE www.africacybersecurityconferencecom Copyright Africa Cyber Security Conference (ACSC) is JIGHI trademark registered 2016-2017

More information

Preparing for cyber-attacks: the intersection of cybersecurity and physical security

Preparing for cyber-attacks: the intersection of cybersecurity and physical security Preparing for cyber-attacks: the intersection of cybersecurity and physical security Published on 12 Dec 2018 Terry Gold of D6 Research has been giving cyber in physical security presentations at a variety

More information

TRUSTED MOBILITY INDEX

TRUSTED MOBILITY INDEX TRUSTED MOBILITY INDEX Published May 2012 A GLOBAL STUDY INDEXING CONSUMER CONFIDENCE IN MOBILITY The mobile ecosystem of devices, services and networks is at a critical inflection point. While the mobile

More information

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA 1 SECURING DIGITAL IDENTITY THE KEY TO ASIA S VAST POTENTIAL IN E-COMMERCE We are living through an exciting time for digital commerce in Asia.

More information

The GDPR data just got personal

The GDPR data just got personal GDPR QUICK REFERENCE GUIDE The GDPR data just got personal What it is, what it means and how it affects you The GDPR is a gamechanger for organizations holding, and protecting, personal, identifiable data

More information

NIS Directive : Call for Proposals

NIS Directive : Call for Proposals National Cyber Security Centre, in Collaboration with the Research Institute in Trustworthy Inter-connected Cyber-physical Systems (RITICS) Summary NIS Directive : Call for Proposals Closing date: Friday

More information

SMART. Investing in urban innovation

SMART. Investing in urban innovation SMART Investing in urban innovation What Smart Belfast? Belfast has ambitious plans for the future. Building on our economic revival, we want to make our city an outstanding place to live, work and invest.

More information

AMPEG AMPEG. Security Level Management. Keep the attack surface small KWS SAAT SE. 70 Countries at a Glance. A Security Lighthouse Case Study

AMPEG AMPEG. Security Level Management. Keep the attack surface small KWS SAAT SE. 70 Countries at a Glance. A Security Lighthouse Case Study AMPEG AMPEG Security Level Management Keep the attack surface small KWS SAAT SE 70 Countries at a Glance A Security Lighthouse Case Study The more complex the technical and organisational structures of

More information

BE PART OF MEDIA & ENTERTAINMENT S FUTURE.

BE PART OF MEDIA & ENTERTAINMENT S FUTURE. BE PART OF MEDIA & ENTERTAINMENT S FUTURE. Exhibits: 9-12 April 2018 Las Vegas Convention Center, Las Vegas, Nevada, USA www.connectedmedia-ip.com Follow us using @CMIP2018 CONNECTED MEDIA IP AT THE 2018

More information

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Title: Facilitating Investment in Cybersecurity as a means of achieving the Sustainable Development Goals Description: Information

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

The UK s National Cyber Security Strategy

The UK s National Cyber Security Strategy The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016

More information

Draft Resolution for Committee Consideration and Recommendation

Draft Resolution for Committee Consideration and Recommendation Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations

More information