DSCI NEWS. Inside Our Mission PUBLIC ADVOCACY OUTREACH PROGRAMS THOUGHT LEADERSHIP CAPACITY BUILDING CONNECT WITH DSCI. e be. o n

Size: px
Start display at page:

Download "DSCI NEWS. Inside Our Mission PUBLIC ADVOCACY OUTREACH PROGRAMS THOUGHT LEADERSHIP CAPACITY BUILDING CONNECT WITH DSCI. e be. o n"

Transcription

1 JULY - SEPTEMBER 2011 Vol. 2 No. 3 DSCI NEWS Q U A R T E R LY N E W S L E T T E R O F D ATA S E C U R I T Y C O U N C I L O F I N D I A DATA SECURITY COUNCIL OF INDIA A Initiative Our Vision Information Security Summit December 6-7, New Delhi 2011 Harness data protection as a lever for economic development of India through global integration of practices and standards conforming to various legal regimes. Inside Our Mission To create trustworthiness of Indian companies as global sourcing service providers, and to assure clients worldwide that India is a secure destination for outsourcing where privacy and protection of customer data are enshrined in the global best practices followed by the industry. Editorial Board Rahul Jain Senior Consultant, DSCI Kartik Korpal Asst. Manager Marketing & Communications, DSCI Contact Us PUBLIC ADVOCACY OUTREACH PROGRAMS THOUGHT LEADERSHIP CAPACITY BUILDING CONNECT WITH DSCI Our Objectives Public Advocacy on Data Protection and Cyber Security Capacity Building on Security and Privacy Thought Leadership through Best Practices Independent Oversight for Assurance & Dispute resolution through ADR towards Self-Regulation Cyber Crime Speedier Trial through training of Law Enforcement Agencies and Judiciary DATA SECURITY COUNCIL OF INDIA Niryat Bhawan, 3rd Floor, Rao Tula Ram Marg New Delhi , India Phone: , Fax: info@dsci.in, Website: Facebook: C DS I Co rp Linkedin: Twitter: o ra te M e be m rsh Visit: taxonomypage/105 ip is o pe n Designed by Swati Communications Tel: ,

2 Public Advocacy DSCI takes a proactive role for policy enablement that affects ICT - Strong Engagement & Enactment through the Government. DSCI expresses relief over clarification on Rules notified u/s 43A of ITAA, 2008 IT industry has welcomed clari fication issued by the Ministry of Communications & Information Technology on the Rules notified under Section 43A of the IT (Amendment) Act, The clarification was issued vide a press note on 24 th August. ( Expressing relief over the clarification, Dr. Kamlesh Bajaj, CEO, DSCI said: The interpretation requiring companies to take written consent from individuals about the use of sensitive personal information they collect and process was a matter of concern for outsourcing organizations in India and abroad as well as service provider industry in India. It was perceived to impose additional burden on the industry and thereby adversely impacting outsourcing to India. I hope the clarification puts to rest ambiguous interpretations of these Rules. Ever since the notification of these Rules, DSCI has been conveying the concerns of the industry to the Ministry, requesting it to clarify its intent behind such Rules. The clarification clearly points out that personal data processed by service providers for outsourcing companies, whether located in India or abroad, does not attract provisions of some of these Rules since privacy principles are to be followed by the outsourcing company and not the service provider. The clarification adds: These Rules are regarding sensitive personal data or information and are applicable to the body corporate or any person located within India. Any such body corporate, providing services relating to collection, storage, dealing or handling of sen- 2

3 sitive personal data or information under contractual obligation with any legal entity located within or outside India, is not subject to the requirement of Rules 5 & 6. The above clarification implies that outsourcing organizations abroad are not required to comply with these Rules and hence are not required to adjust their existing data collection practices. Instead, these organizations are governed by the data protection legislations in their respective countries and the service providers in India, in turn, are governed by the contracts signed between them and the outsourcing organizations. This is true for outsourcers in India also. However, the service providers in India are required to follow reasonable security practices for protecting sensitive personal information processed by them, failing which they are liable to pay compensation to the person so affected. Clarification on Rules notified u/s 43A of ITAA, 2008 Service Providers are exempt from Rules 5 & 6, i.e., Requirements on Consent, Choice, Access & Correction, Retention, Discrepancies & Grievances, and Disclosure as these are the legal obligations of the outsourcing organizations which have direct relationship with the end customers, unlike service providers who are acting on behalf of such organizations. Providers of information are natural persons (individuals) who provide their sensitive personal information to a body corporate and not the outsourcing organizations in the context of outsourcing as was being interpreted by some of the law firms and attorneys. Consent under Rule 5(1) includes consent given by any mode of electronic communication and is not restricted to consent provided through letter or fax or . Refer: Further, with announcement of the notification, DSCI engaged with industry to address specific queries on security and privacy. Please visit response%20to%20members %20queries%20on%20Section%2043A.pdf for the set specific queries. DSCI presented the developments and the said notification to the CEOs of the leading BPO organizations in the country, at the CEO s Closed Group Meeting in the NASSCOM BPO Summit 2011, New Delhi. The members reflected positively on the notification and appreciated the role of DSCI in bringing it about. Planning Commission forms Privacy Group With the initiation of National programmes like Unique Identification number, NATGRID among others, most of which will be implemented through ICT platforms, concerns have been expressed on the possible invasion of citizen s privacy. Right to privacy bill is under discussion. In order to understand these concerns and identify interventions for effectively addressing these issues, Panning Commission has set up Pri- vacy Group, under the chairmanship of Justice AP Shah, Former Chief Justice of Delhi High Court and organized a meeting with all the stakeholders. As an active proponent of the privacy issues, DSCI was invited to the session to brief the members on Data Privacy & Security. The meeting was held on 30th September 2011 and Justice AP Shah, Former Chief Justice of Delhi High Court provide the key note speech while Dr. Shri Ashwani Kumar, Minister of State for Planning, S&T and Earth Sciences presided over the meeting. Each member presented their views and perspectives on privacy. During his presentation titled Evolution of Privacy in India, Dr. Kamlesh Bajaj explained how the Indian economy was facing new challenges with 3

4 greater application of information technology. Stressing the significance of privacy in governance, commercial transactions and various other critical areas, he said: We must secure privacy of our citizens, but at the same time we must ensure that stringent privacy regulations don t hinder trans-border data flows which have brought immense economic benefits to our country in the post-globalization era. Dr. Bajaj pushed for legal recognition to self-regulatory bodies saying global experiences suggest that self-regulatory mechanisms can enforce greater business discipline than bureaucratic authorities. Dr. Bajaj further informed the Group that he had earlier made following recommendations to the committee set up by Department of Personnel and Training on framing the privacy bill: 1. Have light weight regulations based on global privacy principles that value economic benefits of data flow and usage, while guaranteeing privacy to citizens 2. Avoid bureaucratic structures that could hinder business interests and lose the spirit during implementation such as creation of a Data Protection Authority - No single authority can ensure effective enforcement of regulations across different industry verticals in such a vast country. 3. Rely on self-regulation of businesses that promote practices, making the privacy program relevant to technology advancements 4. Provide legal recognition to the role of self-regulatory bodies, promoted by industry associations, in enforcing privacy codes in the interest of citizens rights 5. Create regulatory structure that provides right incentives for organizations to do privacy 6. Establish a mechanism, in the form of public private partnership, to resolve the disputes and grievances of citizens 7. Promote trans-border data flows 8. Differentiate between Online Privacy (B2C) and Privacy in B2B environments 9. Promote Privacy by Design 10. Create provisions for continuously enhancing end user education and awareness on Privacy. The Group, along with Dr. Bajaj, is likely to be converted into a regular committee, under the chairmanship of Justice A P Shah, to provide valuable and pragmatic inputs to the government in finalizing the Right to Privacy Bill. NASSCOM-DSCI forms Cyber Security Advisory Group India s current infrastructure development process is making greater use of IT applications and thus vulnerable to cyber attacks which may have serious implications for the nation and economy at large. Recent news items highlighting cyber attacks against organizations like IMF, Citigroup, Lockheed, CIA, CBI, NIA raise concerns on the security of the critical infrastructure. Cyber security is thus clearly linked to national security. While the government is taking proactive steps such as the formulation of cyber security policy, industry has to do its bit with a view to focus on the role of private sector, since more and more of critical infrastructure is in the private domain. With a view to help develop public-private-partnerships, and policies, NASSCOM along with DSCI constituted the Cyber Security Advisory Group. The Group will work towards Public private partnership in capacity building and policy recommendations on best practices for cyber security and assurance framework, awareness and education, cyber forensics, encryption, incident management, information sharing and analysis, assurance in ICT supply chain, Research and Development and global linkages for knowledge exchange. The group comprises leaders from the Government, Law Enforcement, Industry bodies industry verticals 4

5 such as IT/BPO, Bank, Telecom, Energy, Legal, etc. It is chaired by Chairman of NASSCOM Executive Council while CEO, DSCI is Member Secretary. CSCAP holds its first meeting in Malaysia The Council for Security Cooperation in the Asia Pacific (CSCAP) is a non-governmental (second track) process for dialogue on security issues in the Asia Pacific region. CSCAP provides an informal mechanism for scholars, officials and others in their private capacities to discuss political and security issues and challenges facing the region. The Council held its fi rst meeting in Malaysia with representation from member countries. From India, Along with DIT, DSCI was nominated by the Ministry of External Affairs, GoI, to be a part of the Study Group of the Council to promote joint efforts towards increasing cyber security in Asia Pacific countries and prepare a memorandum on cyber security for the region. EU representatives requested for Safe Harbour framework with India In a meeting organized by Ministry of commerce with EU officials, a group of Indian IT experts explained how Indian legislations were commensurate with EU adequacy standard for privacy protection and requested EU representatives to develop a Safe Harbour framework with India considering strong economic engagements between the two sides. The group, led by Dr. Gulshan Rai, DG, CERT-In, included DSCI CEO Dr. Kamlesh Bajaj and Director Mr. Vinayak Godse. Referring to various provisions of the IT (Amendment) Act 2008 and Rules notified under it, the group pointed out that Indian legal framework fixed strict accountabilities on body corporate to maintain privacy of personal data and stipulated stringent penalties in the event of failure to protect sensitive personal information. European Commission s Directive on Data Protection prohibits transfer of personal data to non-european Union countries that do not meet EU adequacy standard for privacy protection. Indian IT industry, especially the BPO sector is of the view that EU Directive acts as stumbling blocks to free movement of data to a third country as the cost of compliance is prohibitively high. A section of the industry further believes that such Directive works as non-tariff barriers and denies market access to them against the principles of free trade enunciated by the WTO. XII five-year plan on Information Technology sector: Cyber Security Government of India s Xll five-year plan on Information Technology Sector includes cyber security as an important agenda item. The Plan takes into account the specific topics related to the cyber security and explores the opportunity for public-private partnership in addressing these. DSCI provided thought leadership in the following 4 areas of the Plan, with suggestion for PPP opportunities: Security Policy Compliance & Assurance - Creation of National cyber security index - Development of Sectoral cyber security frameworks - Cyber security studies & surveys - Security audits, assessments, certifications, metrics, maturity Security Incident Early Warning & Response - National framework for responding to cyber threats - Botnet cleaning centers - Cyber forensics techniques, standards Capacity building & Security Training - Security education & skill building - Training & Awareness - Content Development, Labs, Certifications, Platforms Collaboration - International Engagement UN, Asia-Pacific, etc. - Information Sharing, events, workshops, seminars - Development of International Standards 5

6 Outreach Programs DSCI organizes various conferences and seminars and participates in the events in India and abroad to draw focus on data security and privacy concerns and DSCI s approach towards data protection. DSCI CEO addresses international conference on Internet at Sonipat Information & communication technologies are now invading the privacy of individuals firstly, through a centralized database, secondly, through profiling by co-relating multiple databases and thirdly, through social networking in which the data subject is data creator also - said Dr. Kamlesh Bajaj, CEO, DSCI at an international conference held in Sonipat. The conference, titled The Internet and a Changing World, was jointly organized by Jindal School of International Affairs, United Nations University (Tokyo), and the Campaign for a United Nations Parliamentary Assembly. Dr. Bajaj chaired the thematic panel on The Internet and Privacy. Outlining the evolution of the concept of privacy, Dr. Bajaj said: Privacy concerns in the context of technology dates back to 1890s when the printing press was used to invade the privacy of the influential people through magazines and newspapers. The concept of right to be let alone emerged as a consequence of this, and today, privacy is considered to be a part of Right to Liberty guaranteed under Article 21 of Indian Constitution. He also explained how surveillance technology was invading privacy of individuals and how the state should respond to protect national security by ensuring privacy. Dr. Bajaj responded to several questions from the audience ranging from the right to privacy, surveillance technology invading privacy and the State s enlarged role for protecting national security that seems to compromise individual privacy. Indo-French Technological Meet: DSCI Director speaks about privacy issues Ubifrance and the French Trade Commission in India jointly organized Indo-French Technology Meet 2011 from 19 th September to 1 st October across the three cities - New Delhi, Mumbai and Bengaluru. The Meet showcased French expertise and state-of-the-art technologies from France in five key sectors: secure payment and identification systems, green building, sustainable mobility, nuclear energy and aerospace. 6 DSCI Director Mr. Vinayak Godse spoke about security and privacy issues in ID projects with specific reference to smart card and bio-metrics technology in a closed door meeting with business leaders held on the sidelines of the Meet in New Delhi.

7 7

8 Thought Leadership DSCI regularly undertakes study and surveys to develop reports on the various facets of data security and privacy in India. These reports, jointly produced by various corporate entities including major consulting firms amongst others, highlight the current state and concern of data security and privacy. DSCI Excellence Awards

9 Hon ble Union Minister of State for Communications & IT, Mr. Sachin Pilot gave away the 1 st DSCI Excellence Awards at a ceremony held in Hotel Imperial in New Delhi on 22 July. Eight business enterprises were awarded for their excellence in adopting proactive and innovative data security measures. Two business leaders were honoured with Security Leader of the Year Award for their individual contributions towards data security. Mr. Pilot congratulated DSCI on bringing focus on data security practices and initiatives being undertaken by the industry and encouraged the role of an independent body focused on promoting a culture of data protection in India. He lauded the steps taken by the winning organizations and individuals in establishing safe practices in their organizations and also highlighted the initiatives being taken by the Government towards promoting data protection while emphasizing the role of public partnership in building trustworthiness of Indian companies. DSCI instituted DSCI Excellence Awards to annually honour organizations and individuals who have taken strategic, proactive and innovative security efforts to help their organization address real risks; elevate the role of security function and its contribution in the overall business ecosystem of an organization; and bring about awareness towards the need for information Security within organizations and society at large to harness security as a lever for economic growth. The organizations which were honoured with DSCI Excellence Awards are: Bharti Airtel Limited for Security in Telecom HDFC Bank Ltd. For Security in Bank Cognizant Technology Solutions for Security in IT Services Company (Large) IBM Daksh Business Process Services Pvt. Ltd. For Security in Global BPO Financial Technologies (India) Limited for Security in IT Services Company (SME) Hewlett Packard GBS, Global E-Business Operations Private Limited for Security in Captive BPO CSC for Raising Security Awareness For their individual contribution, DSCI honoured Mr. Felix Mohan, Global CISO, Bharti Airtel Limited and Mr. Raja Vijay Kumar Adapa, VP & Global Information Security Leader, Genpact with Security Leader of the Year Award. W I N N E R S The Awards ceremony was the culmination of a detailed evaluation process developed by DSCI, in consultation with Pricewaterhouse Coopers, with eminent experts from the industry serving on the Jury panel to decide the winners. The Jury comprised the following: Mr. Jerry Rao, Founder Mphasis and former Chairman, NASSCOM Dr. Ganesh Natarajan, CEO, Zensar Technology Dr. K. Ramakrishnan, CEO, Indian Bankers Association Dr. D.P.S. Seth, Former Chairman BSNL & Member TRAI DSCI is focussed on promoting data protection in the country while assuring the clients worldwide that India is a secure destination for outsourcing. While on one hand, DSCI promotes data security through its Frameworks DSF(C) and DPF(C), it has also decided to recognise organizations and individuals who have implemented strong, effective and resilient security programs and have shown high level of preparedness and dedication in increasing information security awareness, through DSCI Excellence Awards which have been instituted this year. This will boost the confidence of the industry and also inspire others to strengthen their security practices to match global standards. Bharti Airtel Limited HDFC Bank Ltd. Cognizant Technology Solutions IBM Daksh Business Process Services Pvt. Ltd. Financial Technologies (India) Limited Hewlett Packard GBS CSC 9 9

10 First draft of CSMIC released DSCI is a member of Cloud Services Measurement Initiative Consortium (CSMIC) led by Carnegie Mellon University (CMU), US. CSMIC aims to address the need for industrywide, globally accepted measures for calculating the benefits and risks of cloud-computing services. The major product of the consortium s efforts is the Service Measurement Index (SMI), a set of businessrelevant Key Performance Indicators (KPI s) that provide a standardized method for measuring and comparing a business service. Features of SMI and High Level Attributes of Service Measurement Index (SMI) have been finalized post public consultation. These include two important attributes suggested by DSCI - Security Capabilities and Threat & Vulnerability Management. The consortium will now develop metrics under each attribute. DSCI will contribute in development of Security & Privacy related metrics which will help businesses ascertain and compare capabilities of cloud service providers in the area of security and privacy. This, along with other parameters of the framework, will help businesses select the right cloud service provider. Members are advised to refer the current version of the framework at documents/10508/186d5f13-f40e-47adb9a6-4f246cf7e34f and share their observations with DSCI. Development of Security Framework for Banks CEO, DSCI is a member of Working Group on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds created by Reserve Bank of India. The Group aims at collaborative efforts by members for exploring detailed service provider assessment and monitoring frameworks and best practices from a banking context. RBI in its e-banking report had recommended development of Security Framework for the Banks. DSCI submitted the Proposal for Development of Security framework for banking industry to High Level Group. The HLG has in principle approved the proposal and would work with RBI & Indian Banks Association for funding the project. The framework will help in areas relating to IT Governance, Information security, IT operations, Information system audit, Cyber frauds, Business Continuity Planning, customer education and legal issues arising out of use of IT in Banking. DSCI Best Practices Frameworks DSCI Frameworks, DSF and DPF through their best practices help bring about dynamism into security and privacy to enable an organization respond to ever increasing threats enterprise wide. The Frameworks are endorsed by the industry and also by analyst firms like Gartner and Forrester, and have been recommended by RBI in its Electronic Banking Committee Report. With the Data Centric approach of the Frameworks, wherein consolidation of detailed assessment of the enterprise s security and risk management requirements are considered, DSCI is working towards establishing the Frameworks as a Standard for security practices in the organizations. DSF is expected to fulfill the requirements of Reasonable Security Practices under Rule 8 of Rules notified u/s 43A. DSCI is engaged with Bureau of Indian Standards for recognizing DSF as a Standard. White Paper on Types of Attacks With the ongoing digitization of the business world, our cyberspace is experiencing newer and newer threats. In order to understand and address them, DSCI has brought out a white paper providing comprehensive details on the nature and extent of these threats. Please visit files/type%20of%20attacks_dsci _White%20Paper_1.pdf and share with us your comments and suggestions to make it more informative. Members are invited to contribute to the growing repository of information and updates on DSCI Website, in form of articles, white papers etc.

11 Capacity Building DSCI has been actively involved in developing and imparting training and capacity building for various government and corporate entities. DSCI opens another Cyber Lab at Kolkata West Bengal Minister for Information Technology, Shri. Partha Chatterjee, inaugurated the 8 th Cyber Lab of DSCI at Lalbazar in Kolkata on 10 August. DSCI Cyber Labs, established at the locations of cyber crime cells in the country, have so far trained over 9,000 police officers. The training seeks to enable law enforcement officials to track down and bring cyber criminals to justice with the help of computer forensic tools. DSCI Cyber Labs DSCI Training Programs on Cyber Crimes DSCI organized a Level 3 Advanced Training Program on cyber crime for police officers at Central Bureau of Investigation Academy in Ghaziabad. The five-day training course covered advanced concepts in cyber crime investigation and cyber forensics. The training was attended by over 30 police officers from National Investigation Agency, Myanmar Police, Nepal Police and other state police of India. The experience of running Cyber Labs and these programs helped DSCI formulate Standard Operating Procedures for cyber crime investigation in Cyber Crime Investigation Manual. The Manual was released early this year by the then Union Home Secretary, Shri, G K Pillai and has been distributed to all the police stations across the Country. DSCI is now in process of developing Cyber Crime Training Material. Cyber Crime Investigation Program DSCI is working closely with the Ministry of Home Affairs on the Cyber Crime Investigation Program (CCIP) on a country wide basis since cyber crimes are no longer confined to cities that are important to the IT/ BPO companies. This proposal has been approved in principle and the MHA and the Home Secretary will inaugurate the DSCI Workshop on CCIP for state DGPs, likely to be held in next quarter. 11

12 Connect with DSCI DSCI understands the value of engaging security and privacy professionals across the globe in its efforts to promote data protection in the country and organizations, and provides with multiple options and channels to connect with stakeholders. DSCI Chapter Fraternity is now 1200 member strong and DSCI Corporate Members are now over 605. Collectively, DSCI Members represent over 500 companies across all major verticals including IT/BPO, Bank, Telecom, Energy, Manufacturing, etc. DSCI welcomes all the new members and looks forward to collective efforts towards increasing awareness on data security. This quarter saw Chapters organizing meetings on Measuring Effectiveness Infosec Controls, IT Privacy law viz. 43A, DDOS Attack and Resolution from Experience and Social Networking & Controls towards Information Security & Privacy. The members actively contribute to the Knowledge Corner on DSCI website. Pl visit taxonomypage/226. DSCI members can also connect with us, and more than 300 members, through the following social media platforms. 1. DSCI Website: incorporates interactive Web 2.0 features. DSCI content is forthcoming and the site offers easy browsing of DSCI consultation papers, policy papers and reports. It provides means for sharing the content with social networking sites, interactive updates on DSCI events and has details on the programs for different target groups. It provides emergency services contact and gives an opportunity for security skill registry (an individual can register their security skills with DSCI) and many such features. Register your skills with DSCI at 2. Social Media: DSCI provides updates, notification, event details on the social media sites in an endeavor to connect with security and privacy professionals, industry, international bodies, etc. Follow us on... Facebook: connect Twitter: LinkedIn : 3. RSS Feed: Subscribe RSS feed for update on DSCI position papers, consultation papers and study and survey reports at DSCI homepage at Papers/Reports tab or dsci.in/rss.xml DSCI members are invited to avail Members Discount at the NASS- COM-DSCI Annual Information Security Summit

DSCI Framework and Practices are based on sound principles that are

DSCI Framework and Practices are based on sound principles that are Our Vision Vol.2 No.1 January - March 2010 Q u a r t e r l y N e w s l e t t e r o f D a t a S e c u r i t y C o u n c i l o f I n d i a DSCI - SRO Harness Data Protection as a lever for economic development

More information

Driving Global Resilience

Driving Global Resilience Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

13967/16 MK/mj 1 DG D 2B

13967/16 MK/mj 1 DG D 2B Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:

More information

Resolution: Advancing the National Preparedness for Cyber Security

Resolution: Advancing the National Preparedness for Cyber Security Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government

More information

Draft Resolution for Committee Consideration and Recommendation

Draft Resolution for Committee Consideration and Recommendation Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security

More information

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

RESOLUTION 130 (Rev. Antalya, 2006)

RESOLUTION 130 (Rev. Antalya, 2006) Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

KISH REMARKS APEC CBPR NOV 1 CYBER CONFERENCE KEIO Page 1 of 5 Revised 11/10/2016

KISH REMARKS APEC CBPR NOV 1 CYBER CONFERENCE KEIO Page 1 of 5 Revised 11/10/2016 Page 1 of 5 INTRODUCTION Jim, thank you for the kind introduction. It is an honor to join the panel. Congratulations to Dr. Murai and Dr. Tezuka for the success of the Keio Cybersecurity Center. Congratulations

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,

More information

Data Governance for Smart City Management

Data Governance for Smart City Management The 4th Asia-Pacific Regional Forum on Smart Sustainable Cities and e-government 2018 Data Governance for Smart City Management July 2018 Thanh Hoa City, Vietnam Mi Kyoung Park United Nations Project Office

More information

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

EISAS Enhanced Roadmap 2012

EISAS Enhanced Roadmap 2012 [Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

The role of municipal government in preventing crime and building community safety

The role of municipal government in preventing crime and building community safety NATIONAL MUNICIPAL NETWORK ON CRIME PREVENTION Background and Reference Document Overview The National Municipal Network on Crime Prevention brings together Canadian municipalities from across the country

More information

USA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036

USA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036 US-China Business Council Comments on The Draft Measures for Security Review of Online Products and Services March 6, 2017 On behalf of the more than 200 members of the US-China Business Council (USCBC),

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 130 (REV. BUSAN, 2014) RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

RESOLUTION 47 (Rev. Buenos Aires, 2017)

RESOLUTION 47 (Rev. Buenos Aires, 2017) Res. 47 425 RESOLUTION 47 (Rev. Buenos Aires, 2017) Enhancement of knowledge and effective application of ITU Recommendations in developing countries 1, including conformance and interoperability testing

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

Resolution adopted by the General Assembly on 14 December [without reference to a Main Committee (A/61/L.44 and Add.1)]

Resolution adopted by the General Assembly on 14 December [without reference to a Main Committee (A/61/L.44 and Add.1)] United Nations A/RES/61/132 General Assembly Distr.: General 1 March 2007 Sixty-first session Agenda item 69 (a) Resolution adopted by the General Assembly on 14 December 2006 [without reference to a Main

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

My name is Joe Bhatia, and I am president and CEO of the American National Standards Institute.

My name is Joe Bhatia, and I am president and CEO of the American National Standards Institute. S. Joe Bhatia President and CEO American National Standards Institute Opening Remarks 1 st Indo-U.S. Summit on Standards in Trade February 16, 2010 New Delhi, India Good morning, everyone. My name is Joe

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

Global cybersecurity and international standards

Global cybersecurity and international standards World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

National Open Source Strategy

National Open Source Strategy National Open Source Strategy Ministry of Communications & Information Technology - Egypt June 2014 Outline Background Vision & Mission Preliminary Targets Strategic Objectives Enablers Ministry of Communications

More information

IDENTITY ASSURANCE PRINCIPLES

IDENTITY ASSURANCE PRINCIPLES IDENTITY ASSURANCE PRINCIPLES PRIVACY AND CONSUMER ADVISORY GROUP (PCAG) V3.1 17 th July 2014 CONTENTS 1. Introduction 3 2. The Context of the Principles 4 3. Definitions 6 4. The Nine Identity Assurance

More information

Forum. Ningbo, China 25 February

Forum. Ningbo, China 25 February 2014/SOM1/SCE-COW/014 Agenda Item: 4 Telecommunications and Inform ation Working Group Strategic Plan Purpose: Consideration Submitted by: TEL Chair Forum Doc. No.: 2013/SOM3/SCE/017 SOM Steering Committee

More information

Securing Europe's Information Society

Securing Europe's Information Society Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU

More information

IPv6 From Developing Country Perspective

IPv6 From Developing Country Perspective International Telecommunication Union IPv6 From Developing Country Perspective Baher Esmat Chair Egypt IPv6 Task Force Outline o Egypt Information Society o Growth in Internet and mobile services o CIT

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives

More information

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing

More information

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)]

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)] United Nations A/RES/62/91 General Assembly Distr.: General 8 February 2008 Sixty-second session Agenda item 71 (a) Resolution adopted by the General Assembly [without reference to a Main Committee (A/62/L.30

More information

International Policy Division, Global ICT Strategy Bureau

International Policy Division, Global ICT Strategy Bureau MIC International Policy Division, Global ICT Strategy Bureau Communications News Newsletter of the Ministry of Internal Affairs and Communications(MIC), Japan Please Feel free to use articles in this

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018 INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1

More information

21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong

21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong Date: Time: 21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong The Chinese Manufacturers Industry About Vocational

More information

EU policy on Network and Information Security & Critical Information Infrastructures Protection

EU policy on Network and Information Security & Critical Information Infrastructures Protection EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 45 (Rev. Hyderabad, 2010) 212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference

More information

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/56/561/Add.2)]

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/56/561/Add.2)] United Nations A/RES/56/195 General Assembly Distr.: General 21 January 2002 Fifty-sixth session Agenda item 98 (b) Resolution adopted by the General Assembly [on the report of the Second Committee (A/56/561/Add.2)]

More information

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90 th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

INDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS

INDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS SEPTEMBER 2017 INDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS INDIA UAE Over the years UAE is India s 3rd largest trade partner globally UAE is the second largest export destination of

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

Data Protection System of Georgia. Nina Sarishvili Head of International Relations Department

Data Protection System of Georgia. Nina Sarishvili Head of International Relations Department Data Protection System of Georgia Nina Sarishvili Head of International Relations Department 14/12/2016 Legal Framework INTERNATIONAL INSTRUMENTS CoE 108 Convention AP on Supervisory Authorities and Trans-

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Plan a Pragmatic Approach to the new EU Data Privacy Regulation AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General

More information

Legal and Regulatory Developments for Privacy and Security

Legal and Regulatory Developments for Privacy and Security Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions

More information

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent

More information

Recommendations for Small and Medium Enterprises. Event Date Location

Recommendations for Small and Medium Enterprises. Event Date Location Recommendations for Small and Medium Enterprises Event Date Location B20 Structure B20 Members worldwide B20 Cross-thematic Group Small and Medium Enterprises CTG SMEs: Composition Coordination Group 129

More information

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best

More information

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE Devi Annamalai Security, Trust and Governance MCMC 28th August 2007 Hanoi. Vietnam BACKGROUND MCMC is a statutory body established under the Malaysian Communications

More information

Regulating Cyber: the UK s plans for the NIS Directive

Regulating Cyber: the UK s plans for the NIS Directive Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

ACCAB. Accreditation Commission For Conformity Assessment Bodies

ACCAB. Accreditation Commission For Conformity Assessment Bodies ACCAB Accreditation Commission For Conformity Assessment Bodies ACCAB Platinum Plus Accreditation For Certification Bodies, Inspection Bodies, Testing & Calibration Laboratories and Medical Laboratories

More information

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER AMCHAM Background AMCHAM Thailand was formed in 1956 with a membership of 8 American companies and 60 American nationals. Today, AMCHAM has over 650 members, comprising 2,000 executives and professionals.

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document EUROPEAN COMMISSION Strasbourg, 7.2.2013 SWD(2013) 31 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a Directive of the European

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

HPH SCC CYBERSECURITY WORKING GROUP

HPH SCC CYBERSECURITY WORKING GROUP HPH SCC A PRIMER 1 What Is It? The cross sector coordinating body representing one of 16 critical infrastructure sectors identified in Presidential Executive Order (PPD 21) A trust community partnership

More information

National Cybersecurity preparation to deal with Cyber Attacks

National Cybersecurity preparation to deal with Cyber Attacks National Cybersecurity preparation to deal with Cyber Attacks Dr. Chaichana Mitrpant Assistant Executive Director, Electronic Transactions Development Agency (ETDA) 1 Over all Internet usage in Thailand

More information

Workday s Robust Privacy Program

Workday s Robust Privacy Program Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield

More information

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified - 1 - Background for the Government Resolutions Regarding Advancing the National Preparedness for Cyber Security and Advancing National Regulation and Governmental Leadership in Cyber Security On February

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41

More information

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016 ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)

More information

The United Republic of Tanzania. Domestication of Sustainable Development Goals. Progress Report. March, 2017

The United Republic of Tanzania. Domestication of Sustainable Development Goals. Progress Report. March, 2017 The United Republic of Tanzania Domestication of Sustainable Development Goals Progress Report March, 2017 Prepared by the National Bureau of Statistics Table of Contents 1. Background... 1 2. Progress

More information

Directive on Security of Network and Information Systems

Directive on Security of Network and Information Systems European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA Executive summary of the public audit report THE CYBER SECURITY ENVIRONMENT IN LITHUANIA 9 December 2015, No. VA-P-90-4-16 Full audit report in Lithuanian is available on the website of the National Audit

More information

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)] United Nations General Assembly Distr.: General 9 February 2010 Sixty-fourth session Agenda item 50 Resolution adopted by the General Assembly [on the report of the Second Committee (A/64/417)] 64/187.

More information

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER [13800] - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS

More information

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia

More information

Cyber Security Roadmap

Cyber Security Roadmap Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different

More information

Poland: Initiative for Polish Industry 4.0 The Future Industry Platform

Poland: Initiative for Polish Industry 4.0 The Future Industry Platform Digital Transformation Monitor Poland: Initiative for Polish Industry 4.0 The Future Industry Platform February 2018 Internal Market, Industry, Entrepreneurshi p and SMEs Skitterphoto/Pexels.com Country:

More information

Resolution adopted by the General Assembly. [on the report of the Fifth Committee (A/61/592/Add.4)]

Resolution adopted by the General Assembly. [on the report of the Fifth Committee (A/61/592/Add.4)] United Nations General Assembly Distr.: General 2 May 2007 Sixty-first session Agenda item 117 Resolution adopted by the General Assembly [on the report of the Fifth Committee (A/61/592/Add.4)] 61/263.

More information

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society ECOSOC Resolution 2008/3 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society The Economic and Social Council, Recalling

More information

Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues

Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues Introduction This background note outlines, in a non-exhaustive manner,

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Scope of the Member State mechanism

Scope of the Member State mechanism FIRST MEETING OF THE MEMBER STATE MECHANISM ON SUBSTANDARD/SPURIOUS/FALSELY-LABELLED/ 2 November 2012 FALSIFIED/COUNTERFEIT MEDICAL PRODUCTS Provisional agenda item 4 Scope of the Member State mechanism

More information