DSCI NEWS. Inside Our Mission PUBLIC ADVOCACY OUTREACH PROGRAMS THOUGHT LEADERSHIP CAPACITY BUILDING CONNECT WITH DSCI. e be. o n
|
|
- Beverley Sullivan
- 5 years ago
- Views:
Transcription
1 JULY - SEPTEMBER 2011 Vol. 2 No. 3 DSCI NEWS Q U A R T E R LY N E W S L E T T E R O F D ATA S E C U R I T Y C O U N C I L O F I N D I A DATA SECURITY COUNCIL OF INDIA A Initiative Our Vision Information Security Summit December 6-7, New Delhi 2011 Harness data protection as a lever for economic development of India through global integration of practices and standards conforming to various legal regimes. Inside Our Mission To create trustworthiness of Indian companies as global sourcing service providers, and to assure clients worldwide that India is a secure destination for outsourcing where privacy and protection of customer data are enshrined in the global best practices followed by the industry. Editorial Board Rahul Jain Senior Consultant, DSCI Kartik Korpal Asst. Manager Marketing & Communications, DSCI Contact Us PUBLIC ADVOCACY OUTREACH PROGRAMS THOUGHT LEADERSHIP CAPACITY BUILDING CONNECT WITH DSCI Our Objectives Public Advocacy on Data Protection and Cyber Security Capacity Building on Security and Privacy Thought Leadership through Best Practices Independent Oversight for Assurance & Dispute resolution through ADR towards Self-Regulation Cyber Crime Speedier Trial through training of Law Enforcement Agencies and Judiciary DATA SECURITY COUNCIL OF INDIA Niryat Bhawan, 3rd Floor, Rao Tula Ram Marg New Delhi , India Phone: , Fax: info@dsci.in, Website: Facebook: C DS I Co rp Linkedin: Twitter: o ra te M e be m rsh Visit: taxonomypage/105 ip is o pe n Designed by Swati Communications Tel: ,
2 Public Advocacy DSCI takes a proactive role for policy enablement that affects ICT - Strong Engagement & Enactment through the Government. DSCI expresses relief over clarification on Rules notified u/s 43A of ITAA, 2008 IT industry has welcomed clari fication issued by the Ministry of Communications & Information Technology on the Rules notified under Section 43A of the IT (Amendment) Act, The clarification was issued vide a press note on 24 th August. ( Expressing relief over the clarification, Dr. Kamlesh Bajaj, CEO, DSCI said: The interpretation requiring companies to take written consent from individuals about the use of sensitive personal information they collect and process was a matter of concern for outsourcing organizations in India and abroad as well as service provider industry in India. It was perceived to impose additional burden on the industry and thereby adversely impacting outsourcing to India. I hope the clarification puts to rest ambiguous interpretations of these Rules. Ever since the notification of these Rules, DSCI has been conveying the concerns of the industry to the Ministry, requesting it to clarify its intent behind such Rules. The clarification clearly points out that personal data processed by service providers for outsourcing companies, whether located in India or abroad, does not attract provisions of some of these Rules since privacy principles are to be followed by the outsourcing company and not the service provider. The clarification adds: These Rules are regarding sensitive personal data or information and are applicable to the body corporate or any person located within India. Any such body corporate, providing services relating to collection, storage, dealing or handling of sen- 2
3 sitive personal data or information under contractual obligation with any legal entity located within or outside India, is not subject to the requirement of Rules 5 & 6. The above clarification implies that outsourcing organizations abroad are not required to comply with these Rules and hence are not required to adjust their existing data collection practices. Instead, these organizations are governed by the data protection legislations in their respective countries and the service providers in India, in turn, are governed by the contracts signed between them and the outsourcing organizations. This is true for outsourcers in India also. However, the service providers in India are required to follow reasonable security practices for protecting sensitive personal information processed by them, failing which they are liable to pay compensation to the person so affected. Clarification on Rules notified u/s 43A of ITAA, 2008 Service Providers are exempt from Rules 5 & 6, i.e., Requirements on Consent, Choice, Access & Correction, Retention, Discrepancies & Grievances, and Disclosure as these are the legal obligations of the outsourcing organizations which have direct relationship with the end customers, unlike service providers who are acting on behalf of such organizations. Providers of information are natural persons (individuals) who provide their sensitive personal information to a body corporate and not the outsourcing organizations in the context of outsourcing as was being interpreted by some of the law firms and attorneys. Consent under Rule 5(1) includes consent given by any mode of electronic communication and is not restricted to consent provided through letter or fax or . Refer: Further, with announcement of the notification, DSCI engaged with industry to address specific queries on security and privacy. Please visit response%20to%20members %20queries%20on%20Section%2043A.pdf for the set specific queries. DSCI presented the developments and the said notification to the CEOs of the leading BPO organizations in the country, at the CEO s Closed Group Meeting in the NASSCOM BPO Summit 2011, New Delhi. The members reflected positively on the notification and appreciated the role of DSCI in bringing it about. Planning Commission forms Privacy Group With the initiation of National programmes like Unique Identification number, NATGRID among others, most of which will be implemented through ICT platforms, concerns have been expressed on the possible invasion of citizen s privacy. Right to privacy bill is under discussion. In order to understand these concerns and identify interventions for effectively addressing these issues, Panning Commission has set up Pri- vacy Group, under the chairmanship of Justice AP Shah, Former Chief Justice of Delhi High Court and organized a meeting with all the stakeholders. As an active proponent of the privacy issues, DSCI was invited to the session to brief the members on Data Privacy & Security. The meeting was held on 30th September 2011 and Justice AP Shah, Former Chief Justice of Delhi High Court provide the key note speech while Dr. Shri Ashwani Kumar, Minister of State for Planning, S&T and Earth Sciences presided over the meeting. Each member presented their views and perspectives on privacy. During his presentation titled Evolution of Privacy in India, Dr. Kamlesh Bajaj explained how the Indian economy was facing new challenges with 3
4 greater application of information technology. Stressing the significance of privacy in governance, commercial transactions and various other critical areas, he said: We must secure privacy of our citizens, but at the same time we must ensure that stringent privacy regulations don t hinder trans-border data flows which have brought immense economic benefits to our country in the post-globalization era. Dr. Bajaj pushed for legal recognition to self-regulatory bodies saying global experiences suggest that self-regulatory mechanisms can enforce greater business discipline than bureaucratic authorities. Dr. Bajaj further informed the Group that he had earlier made following recommendations to the committee set up by Department of Personnel and Training on framing the privacy bill: 1. Have light weight regulations based on global privacy principles that value economic benefits of data flow and usage, while guaranteeing privacy to citizens 2. Avoid bureaucratic structures that could hinder business interests and lose the spirit during implementation such as creation of a Data Protection Authority - No single authority can ensure effective enforcement of regulations across different industry verticals in such a vast country. 3. Rely on self-regulation of businesses that promote practices, making the privacy program relevant to technology advancements 4. Provide legal recognition to the role of self-regulatory bodies, promoted by industry associations, in enforcing privacy codes in the interest of citizens rights 5. Create regulatory structure that provides right incentives for organizations to do privacy 6. Establish a mechanism, in the form of public private partnership, to resolve the disputes and grievances of citizens 7. Promote trans-border data flows 8. Differentiate between Online Privacy (B2C) and Privacy in B2B environments 9. Promote Privacy by Design 10. Create provisions for continuously enhancing end user education and awareness on Privacy. The Group, along with Dr. Bajaj, is likely to be converted into a regular committee, under the chairmanship of Justice A P Shah, to provide valuable and pragmatic inputs to the government in finalizing the Right to Privacy Bill. NASSCOM-DSCI forms Cyber Security Advisory Group India s current infrastructure development process is making greater use of IT applications and thus vulnerable to cyber attacks which may have serious implications for the nation and economy at large. Recent news items highlighting cyber attacks against organizations like IMF, Citigroup, Lockheed, CIA, CBI, NIA raise concerns on the security of the critical infrastructure. Cyber security is thus clearly linked to national security. While the government is taking proactive steps such as the formulation of cyber security policy, industry has to do its bit with a view to focus on the role of private sector, since more and more of critical infrastructure is in the private domain. With a view to help develop public-private-partnerships, and policies, NASSCOM along with DSCI constituted the Cyber Security Advisory Group. The Group will work towards Public private partnership in capacity building and policy recommendations on best practices for cyber security and assurance framework, awareness and education, cyber forensics, encryption, incident management, information sharing and analysis, assurance in ICT supply chain, Research and Development and global linkages for knowledge exchange. The group comprises leaders from the Government, Law Enforcement, Industry bodies industry verticals 4
5 such as IT/BPO, Bank, Telecom, Energy, Legal, etc. It is chaired by Chairman of NASSCOM Executive Council while CEO, DSCI is Member Secretary. CSCAP holds its first meeting in Malaysia The Council for Security Cooperation in the Asia Pacific (CSCAP) is a non-governmental (second track) process for dialogue on security issues in the Asia Pacific region. CSCAP provides an informal mechanism for scholars, officials and others in their private capacities to discuss political and security issues and challenges facing the region. The Council held its fi rst meeting in Malaysia with representation from member countries. From India, Along with DIT, DSCI was nominated by the Ministry of External Affairs, GoI, to be a part of the Study Group of the Council to promote joint efforts towards increasing cyber security in Asia Pacific countries and prepare a memorandum on cyber security for the region. EU representatives requested for Safe Harbour framework with India In a meeting organized by Ministry of commerce with EU officials, a group of Indian IT experts explained how Indian legislations were commensurate with EU adequacy standard for privacy protection and requested EU representatives to develop a Safe Harbour framework with India considering strong economic engagements between the two sides. The group, led by Dr. Gulshan Rai, DG, CERT-In, included DSCI CEO Dr. Kamlesh Bajaj and Director Mr. Vinayak Godse. Referring to various provisions of the IT (Amendment) Act 2008 and Rules notified under it, the group pointed out that Indian legal framework fixed strict accountabilities on body corporate to maintain privacy of personal data and stipulated stringent penalties in the event of failure to protect sensitive personal information. European Commission s Directive on Data Protection prohibits transfer of personal data to non-european Union countries that do not meet EU adequacy standard for privacy protection. Indian IT industry, especially the BPO sector is of the view that EU Directive acts as stumbling blocks to free movement of data to a third country as the cost of compliance is prohibitively high. A section of the industry further believes that such Directive works as non-tariff barriers and denies market access to them against the principles of free trade enunciated by the WTO. XII five-year plan on Information Technology sector: Cyber Security Government of India s Xll five-year plan on Information Technology Sector includes cyber security as an important agenda item. The Plan takes into account the specific topics related to the cyber security and explores the opportunity for public-private partnership in addressing these. DSCI provided thought leadership in the following 4 areas of the Plan, with suggestion for PPP opportunities: Security Policy Compliance & Assurance - Creation of National cyber security index - Development of Sectoral cyber security frameworks - Cyber security studies & surveys - Security audits, assessments, certifications, metrics, maturity Security Incident Early Warning & Response - National framework for responding to cyber threats - Botnet cleaning centers - Cyber forensics techniques, standards Capacity building & Security Training - Security education & skill building - Training & Awareness - Content Development, Labs, Certifications, Platforms Collaboration - International Engagement UN, Asia-Pacific, etc. - Information Sharing, events, workshops, seminars - Development of International Standards 5
6 Outreach Programs DSCI organizes various conferences and seminars and participates in the events in India and abroad to draw focus on data security and privacy concerns and DSCI s approach towards data protection. DSCI CEO addresses international conference on Internet at Sonipat Information & communication technologies are now invading the privacy of individuals firstly, through a centralized database, secondly, through profiling by co-relating multiple databases and thirdly, through social networking in which the data subject is data creator also - said Dr. Kamlesh Bajaj, CEO, DSCI at an international conference held in Sonipat. The conference, titled The Internet and a Changing World, was jointly organized by Jindal School of International Affairs, United Nations University (Tokyo), and the Campaign for a United Nations Parliamentary Assembly. Dr. Bajaj chaired the thematic panel on The Internet and Privacy. Outlining the evolution of the concept of privacy, Dr. Bajaj said: Privacy concerns in the context of technology dates back to 1890s when the printing press was used to invade the privacy of the influential people through magazines and newspapers. The concept of right to be let alone emerged as a consequence of this, and today, privacy is considered to be a part of Right to Liberty guaranteed under Article 21 of Indian Constitution. He also explained how surveillance technology was invading privacy of individuals and how the state should respond to protect national security by ensuring privacy. Dr. Bajaj responded to several questions from the audience ranging from the right to privacy, surveillance technology invading privacy and the State s enlarged role for protecting national security that seems to compromise individual privacy. Indo-French Technological Meet: DSCI Director speaks about privacy issues Ubifrance and the French Trade Commission in India jointly organized Indo-French Technology Meet 2011 from 19 th September to 1 st October across the three cities - New Delhi, Mumbai and Bengaluru. The Meet showcased French expertise and state-of-the-art technologies from France in five key sectors: secure payment and identification systems, green building, sustainable mobility, nuclear energy and aerospace. 6 DSCI Director Mr. Vinayak Godse spoke about security and privacy issues in ID projects with specific reference to smart card and bio-metrics technology in a closed door meeting with business leaders held on the sidelines of the Meet in New Delhi.
7 7
8 Thought Leadership DSCI regularly undertakes study and surveys to develop reports on the various facets of data security and privacy in India. These reports, jointly produced by various corporate entities including major consulting firms amongst others, highlight the current state and concern of data security and privacy. DSCI Excellence Awards
9 Hon ble Union Minister of State for Communications & IT, Mr. Sachin Pilot gave away the 1 st DSCI Excellence Awards at a ceremony held in Hotel Imperial in New Delhi on 22 July. Eight business enterprises were awarded for their excellence in adopting proactive and innovative data security measures. Two business leaders were honoured with Security Leader of the Year Award for their individual contributions towards data security. Mr. Pilot congratulated DSCI on bringing focus on data security practices and initiatives being undertaken by the industry and encouraged the role of an independent body focused on promoting a culture of data protection in India. He lauded the steps taken by the winning organizations and individuals in establishing safe practices in their organizations and also highlighted the initiatives being taken by the Government towards promoting data protection while emphasizing the role of public partnership in building trustworthiness of Indian companies. DSCI instituted DSCI Excellence Awards to annually honour organizations and individuals who have taken strategic, proactive and innovative security efforts to help their organization address real risks; elevate the role of security function and its contribution in the overall business ecosystem of an organization; and bring about awareness towards the need for information Security within organizations and society at large to harness security as a lever for economic growth. The organizations which were honoured with DSCI Excellence Awards are: Bharti Airtel Limited for Security in Telecom HDFC Bank Ltd. For Security in Bank Cognizant Technology Solutions for Security in IT Services Company (Large) IBM Daksh Business Process Services Pvt. Ltd. For Security in Global BPO Financial Technologies (India) Limited for Security in IT Services Company (SME) Hewlett Packard GBS, Global E-Business Operations Private Limited for Security in Captive BPO CSC for Raising Security Awareness For their individual contribution, DSCI honoured Mr. Felix Mohan, Global CISO, Bharti Airtel Limited and Mr. Raja Vijay Kumar Adapa, VP & Global Information Security Leader, Genpact with Security Leader of the Year Award. W I N N E R S The Awards ceremony was the culmination of a detailed evaluation process developed by DSCI, in consultation with Pricewaterhouse Coopers, with eminent experts from the industry serving on the Jury panel to decide the winners. The Jury comprised the following: Mr. Jerry Rao, Founder Mphasis and former Chairman, NASSCOM Dr. Ganesh Natarajan, CEO, Zensar Technology Dr. K. Ramakrishnan, CEO, Indian Bankers Association Dr. D.P.S. Seth, Former Chairman BSNL & Member TRAI DSCI is focussed on promoting data protection in the country while assuring the clients worldwide that India is a secure destination for outsourcing. While on one hand, DSCI promotes data security through its Frameworks DSF(C) and DPF(C), it has also decided to recognise organizations and individuals who have implemented strong, effective and resilient security programs and have shown high level of preparedness and dedication in increasing information security awareness, through DSCI Excellence Awards which have been instituted this year. This will boost the confidence of the industry and also inspire others to strengthen their security practices to match global standards. Bharti Airtel Limited HDFC Bank Ltd. Cognizant Technology Solutions IBM Daksh Business Process Services Pvt. Ltd. Financial Technologies (India) Limited Hewlett Packard GBS CSC 9 9
10 First draft of CSMIC released DSCI is a member of Cloud Services Measurement Initiative Consortium (CSMIC) led by Carnegie Mellon University (CMU), US. CSMIC aims to address the need for industrywide, globally accepted measures for calculating the benefits and risks of cloud-computing services. The major product of the consortium s efforts is the Service Measurement Index (SMI), a set of businessrelevant Key Performance Indicators (KPI s) that provide a standardized method for measuring and comparing a business service. Features of SMI and High Level Attributes of Service Measurement Index (SMI) have been finalized post public consultation. These include two important attributes suggested by DSCI - Security Capabilities and Threat & Vulnerability Management. The consortium will now develop metrics under each attribute. DSCI will contribute in development of Security & Privacy related metrics which will help businesses ascertain and compare capabilities of cloud service providers in the area of security and privacy. This, along with other parameters of the framework, will help businesses select the right cloud service provider. Members are advised to refer the current version of the framework at documents/10508/186d5f13-f40e-47adb9a6-4f246cf7e34f and share their observations with DSCI. Development of Security Framework for Banks CEO, DSCI is a member of Working Group on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds created by Reserve Bank of India. The Group aims at collaborative efforts by members for exploring detailed service provider assessment and monitoring frameworks and best practices from a banking context. RBI in its e-banking report had recommended development of Security Framework for the Banks. DSCI submitted the Proposal for Development of Security framework for banking industry to High Level Group. The HLG has in principle approved the proposal and would work with RBI & Indian Banks Association for funding the project. The framework will help in areas relating to IT Governance, Information security, IT operations, Information system audit, Cyber frauds, Business Continuity Planning, customer education and legal issues arising out of use of IT in Banking. DSCI Best Practices Frameworks DSCI Frameworks, DSF and DPF through their best practices help bring about dynamism into security and privacy to enable an organization respond to ever increasing threats enterprise wide. The Frameworks are endorsed by the industry and also by analyst firms like Gartner and Forrester, and have been recommended by RBI in its Electronic Banking Committee Report. With the Data Centric approach of the Frameworks, wherein consolidation of detailed assessment of the enterprise s security and risk management requirements are considered, DSCI is working towards establishing the Frameworks as a Standard for security practices in the organizations. DSF is expected to fulfill the requirements of Reasonable Security Practices under Rule 8 of Rules notified u/s 43A. DSCI is engaged with Bureau of Indian Standards for recognizing DSF as a Standard. White Paper on Types of Attacks With the ongoing digitization of the business world, our cyberspace is experiencing newer and newer threats. In order to understand and address them, DSCI has brought out a white paper providing comprehensive details on the nature and extent of these threats. Please visit files/type%20of%20attacks_dsci _White%20Paper_1.pdf and share with us your comments and suggestions to make it more informative. Members are invited to contribute to the growing repository of information and updates on DSCI Website, in form of articles, white papers etc.
11 Capacity Building DSCI has been actively involved in developing and imparting training and capacity building for various government and corporate entities. DSCI opens another Cyber Lab at Kolkata West Bengal Minister for Information Technology, Shri. Partha Chatterjee, inaugurated the 8 th Cyber Lab of DSCI at Lalbazar in Kolkata on 10 August. DSCI Cyber Labs, established at the locations of cyber crime cells in the country, have so far trained over 9,000 police officers. The training seeks to enable law enforcement officials to track down and bring cyber criminals to justice with the help of computer forensic tools. DSCI Cyber Labs DSCI Training Programs on Cyber Crimes DSCI organized a Level 3 Advanced Training Program on cyber crime for police officers at Central Bureau of Investigation Academy in Ghaziabad. The five-day training course covered advanced concepts in cyber crime investigation and cyber forensics. The training was attended by over 30 police officers from National Investigation Agency, Myanmar Police, Nepal Police and other state police of India. The experience of running Cyber Labs and these programs helped DSCI formulate Standard Operating Procedures for cyber crime investigation in Cyber Crime Investigation Manual. The Manual was released early this year by the then Union Home Secretary, Shri, G K Pillai and has been distributed to all the police stations across the Country. DSCI is now in process of developing Cyber Crime Training Material. Cyber Crime Investigation Program DSCI is working closely with the Ministry of Home Affairs on the Cyber Crime Investigation Program (CCIP) on a country wide basis since cyber crimes are no longer confined to cities that are important to the IT/ BPO companies. This proposal has been approved in principle and the MHA and the Home Secretary will inaugurate the DSCI Workshop on CCIP for state DGPs, likely to be held in next quarter. 11
12 Connect with DSCI DSCI understands the value of engaging security and privacy professionals across the globe in its efforts to promote data protection in the country and organizations, and provides with multiple options and channels to connect with stakeholders. DSCI Chapter Fraternity is now 1200 member strong and DSCI Corporate Members are now over 605. Collectively, DSCI Members represent over 500 companies across all major verticals including IT/BPO, Bank, Telecom, Energy, Manufacturing, etc. DSCI welcomes all the new members and looks forward to collective efforts towards increasing awareness on data security. This quarter saw Chapters organizing meetings on Measuring Effectiveness Infosec Controls, IT Privacy law viz. 43A, DDOS Attack and Resolution from Experience and Social Networking & Controls towards Information Security & Privacy. The members actively contribute to the Knowledge Corner on DSCI website. Pl visit taxonomypage/226. DSCI members can also connect with us, and more than 300 members, through the following social media platforms. 1. DSCI Website: incorporates interactive Web 2.0 features. DSCI content is forthcoming and the site offers easy browsing of DSCI consultation papers, policy papers and reports. It provides means for sharing the content with social networking sites, interactive updates on DSCI events and has details on the programs for different target groups. It provides emergency services contact and gives an opportunity for security skill registry (an individual can register their security skills with DSCI) and many such features. Register your skills with DSCI at 2. Social Media: DSCI provides updates, notification, event details on the social media sites in an endeavor to connect with security and privacy professionals, industry, international bodies, etc. Follow us on... Facebook: connect Twitter: LinkedIn : 3. RSS Feed: Subscribe RSS feed for update on DSCI position papers, consultation papers and study and survey reports at DSCI homepage at Papers/Reports tab or dsci.in/rss.xml DSCI members are invited to avail Members Discount at the NASS- COM-DSCI Annual Information Security Summit
DSCI Framework and Practices are based on sound principles that are
Our Vision Vol.2 No.1 January - March 2010 Q u a r t e r l y N e w s l e t t e r o f D a t a S e c u r i t y C o u n c i l o f I n d i a DSCI - SRO Harness Data Protection as a lever for economic development
More informationDriving Global Resilience
Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)
COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion
More informationBrussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER
COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38
More information13967/16 MK/mj 1 DG D 2B
Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:
More informationResolution: Advancing the National Preparedness for Cyber Security
Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government
More informationDraft Resolution for Committee Consideration and Recommendation
Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations
More informationENISA s Position on the NIS Directive
ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)
ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security
More informationCybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationRESOLUTION 130 (Rev. Antalya, 2006)
Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationCybersecurity & Digital Privacy in the Energy sector
ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European
More informationKISH REMARKS APEC CBPR NOV 1 CYBER CONFERENCE KEIO Page 1 of 5 Revised 11/10/2016
Page 1 of 5 INTRODUCTION Jim, thank you for the kind introduction. It is an honor to join the panel. Congratulations to Dr. Murai and Dr. Tezuka for the success of the Keio Cybersecurity Center. Congratulations
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,
More informationData Governance for Smart City Management
The 4th Asia-Pacific Regional Forum on Smart Sustainable Cities and e-government 2018 Data Governance for Smart City Management July 2018 Thanh Hoa City, Vietnam Mi Kyoung Park United Nations Project Office
More informationSAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity
SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationEISAS Enhanced Roadmap 2012
[Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationThe role of municipal government in preventing crime and building community safety
NATIONAL MUNICIPAL NETWORK ON CRIME PREVENTION Background and Reference Document Overview The National Municipal Network on Crime Prevention brings together Canadian municipalities from across the country
More informationUSA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036
US-China Business Council Comments on The Draft Measures for Security Review of Online Products and Services March 6, 2017 On behalf of the more than 200 members of the US-China Business Council (USCBC),
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationRESOLUTION 130 (REV. BUSAN, 2014)
RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationRESOLUTION 47 (Rev. Buenos Aires, 2017)
Res. 47 425 RESOLUTION 47 (Rev. Buenos Aires, 2017) Enhancement of knowledge and effective application of ITU Recommendations in developing countries 1, including conformance and interoperability testing
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationResolution adopted by the General Assembly on 14 December [without reference to a Main Committee (A/61/L.44 and Add.1)]
United Nations A/RES/61/132 General Assembly Distr.: General 1 March 2007 Sixty-first session Agenda item 69 (a) Resolution adopted by the General Assembly on 14 December 2006 [without reference to a Main
More informationSOC for cybersecurity
April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory
More informationMy name is Joe Bhatia, and I am president and CEO of the American National Standards Institute.
S. Joe Bhatia President and CEO American National Standards Institute Opening Remarks 1 st Indo-U.S. Summit on Standards in Trade February 16, 2010 New Delhi, India Good morning, everyone. My name is Joe
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationGlobal cybersecurity and international standards
World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationNational Open Source Strategy
National Open Source Strategy Ministry of Communications & Information Technology - Egypt June 2014 Outline Background Vision & Mission Preliminary Targets Strategic Objectives Enablers Ministry of Communications
More informationIDENTITY ASSURANCE PRINCIPLES
IDENTITY ASSURANCE PRINCIPLES PRIVACY AND CONSUMER ADVISORY GROUP (PCAG) V3.1 17 th July 2014 CONTENTS 1. Introduction 3 2. The Context of the Principles 4 3. Definitions 6 4. The Nine Identity Assurance
More informationForum. Ningbo, China 25 February
2014/SOM1/SCE-COW/014 Agenda Item: 4 Telecommunications and Inform ation Working Group Strategic Plan Purpose: Consideration Submitted by: TEL Chair Forum Doc. No.: 2013/SOM3/SCE/017 SOM Steering Committee
More informationSecuring Europe's Information Society
Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU
More informationIPv6 From Developing Country Perspective
International Telecommunication Union IPv6 From Developing Country Perspective Baher Esmat Chair Egypt IPv6 Task Force Outline o Egypt Information Society o Growth in Internet and mobile services o CIT
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationUAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory
UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives
More informationISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF
SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security
More informationCyber Security in Europe
Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing
More informationResolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)]
United Nations A/RES/62/91 General Assembly Distr.: General 8 February 2008 Sixty-second session Agenda item 71 (a) Resolution adopted by the General Assembly [without reference to a Main Committee (A/62/L.30
More informationInternational Policy Division, Global ICT Strategy Bureau
MIC International Policy Division, Global ICT Strategy Bureau Communications News Newsletter of the Ministry of Internal Affairs and Communications(MIC), Japan Please Feel free to use articles in this
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationINDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018
INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1
More information21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong
Date: Time: 21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong The Chinese Manufacturers Industry About Vocational
More informationEU policy on Network and Information Security & Critical Information Infrastructures Protection
EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationRESOLUTION 45 (Rev. Hyderabad, 2010)
212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference
More informationResolution adopted by the General Assembly. [on the report of the Second Committee (A/56/561/Add.2)]
United Nations A/RES/56/195 General Assembly Distr.: General 21 January 2002 Fifty-sixth session Agenda item 98 (b) Resolution adopted by the General Assembly [on the report of the Second Committee (A/56/561/Add.2)]
More information79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90
th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationINDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS
SEPTEMBER 2017 INDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS INDIA UAE Over the years UAE is India s 3rd largest trade partner globally UAE is the second largest export destination of
More informationDirective on security of network and information systems (NIS): State of Play
Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission
More informationData Protection System of Georgia. Nina Sarishvili Head of International Relations Department
Data Protection System of Georgia Nina Sarishvili Head of International Relations Department 14/12/2016 Legal Framework INTERNATIONAL INSTRUMENTS CoE 108 Convention AP on Supervisory Authorities and Trans-
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationPlan a Pragmatic Approach to the new EU Data Privacy Regulation
AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General
More informationLegal and Regulatory Developments for Privacy and Security
Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions
More informationMitigation Framework Leadership Group (MitFLG) Charter DRAFT
Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent
More informationRecommendations for Small and Medium Enterprises. Event Date Location
Recommendations for Small and Medium Enterprises Event Date Location B20 Structure B20 Members worldwide B20 Cross-thematic Group Small and Medium Enterprises CTG SMEs: Composition Coordination Group 129
More informationTHE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER
THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationNational Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director
National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best
More informationNATIONAL STRATEGY:- MALAYSIAN EXPERIENCE
NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE Devi Annamalai Security, Trust and Governance MCMC 28th August 2007 Hanoi. Vietnam BACKGROUND MCMC is a statutory body established under the Malaysian Communications
More informationRegulating Cyber: the UK s plans for the NIS Directive
Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationACCAB. Accreditation Commission For Conformity Assessment Bodies
ACCAB Accreditation Commission For Conformity Assessment Bodies ACCAB Platinum Plus Accreditation For Certification Bodies, Inspection Bodies, Testing & Calibration Laboratories and Medical Laboratories
More informationAMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER
AMCHAM Background AMCHAM Thailand was formed in 1956 with a membership of 8 American companies and 60 American nationals. Today, AMCHAM has over 650 members, comprising 2,000 executives and professionals.
More informationCybersecurity in Higher Ed
Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,
More informationCOMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document
EUROPEAN COMMISSION Strasbourg, 7.2.2013 SWD(2013) 31 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a Directive of the European
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationHPH SCC CYBERSECURITY WORKING GROUP
HPH SCC A PRIMER 1 What Is It? The cross sector coordinating body representing one of 16 critical infrastructure sectors identified in Presidential Executive Order (PPD 21) A trust community partnership
More informationNational Cybersecurity preparation to deal with Cyber Attacks
National Cybersecurity preparation to deal with Cyber Attacks Dr. Chaichana Mitrpant Assistant Executive Director, Electronic Transactions Development Agency (ETDA) 1 Over all Internet usage in Thailand
More informationWorkday s Robust Privacy Program
Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield
More informationState of Israel Prime Minister's Office National Cyber Bureau. Unclassified
- 1 - Background for the Government Resolutions Regarding Advancing the National Preparedness for Cyber Security and Advancing National Regulation and Governmental Leadership in Cyber Security On February
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41
More informationASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016
ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)
More informationThe United Republic of Tanzania. Domestication of Sustainable Development Goals. Progress Report. March, 2017
The United Republic of Tanzania Domestication of Sustainable Development Goals Progress Report March, 2017 Prepared by the National Bureau of Statistics Table of Contents 1. Background... 1 2. Progress
More informationDirective on Security of Network and Information Systems
European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security
More informationGlobal Alliance Against Child Sexual Abuse Online 2014 Reporting Form
Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support
More informationTHE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER
FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationTHE CYBER SECURITY ENVIRONMENT IN LITHUANIA
Executive summary of the public audit report THE CYBER SECURITY ENVIRONMENT IN LITHUANIA 9 December 2015, No. VA-P-90-4-16 Full audit report in Lithuanian is available on the website of the National Audit
More informationResolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]
United Nations General Assembly Distr.: General 9 February 2010 Sixty-fourth session Agenda item 50 Resolution adopted by the General Assembly [on the report of the Second Committee (A/64/417)] 64/187.
More informationPresidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER [13800] - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS
More informationUN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security
UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia
More informationCyber Security Roadmap
Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different
More informationPoland: Initiative for Polish Industry 4.0 The Future Industry Platform
Digital Transformation Monitor Poland: Initiative for Polish Industry 4.0 The Future Industry Platform February 2018 Internal Market, Industry, Entrepreneurshi p and SMEs Skitterphoto/Pexels.com Country:
More informationResolution adopted by the General Assembly. [on the report of the Fifth Committee (A/61/592/Add.4)]
United Nations General Assembly Distr.: General 2 May 2007 Sixty-first session Agenda item 117 Resolution adopted by the General Assembly [on the report of the Fifth Committee (A/61/592/Add.4)] 61/263.
More informationAssessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society
ECOSOC Resolution 2008/3 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society The Economic and Social Council, Recalling
More informationBackground Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues
Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues Introduction This background note outlines, in a non-exhaustive manner,
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationScope of the Member State mechanism
FIRST MEETING OF THE MEMBER STATE MECHANISM ON SUBSTANDARD/SPURIOUS/FALSELY-LABELLED/ 2 November 2012 FALSIFIED/COUNTERFEIT MEDICAL PRODUCTS Provisional agenda item 4 Scope of the Member State mechanism
More information