38th CENTR Administrative workshop
|
|
- April French
- 5 years ago
- Views:
Transcription
1 38th CENTR Administrative workshop Welcome and introductions 2. Host presentation (Regina Fuchsová,.eu) 3. OpenData (Benoît Ampeau,.fr) 4. Plans on Dropcatching and trade / transfer operations (Mickaël Vigreux,.fr) 5. Approval of the "Registry requirements towards registrars" table (see Admin 37) 6. Update from the Registrar Requirements Task Force (RARTF) (Stefan Kovač,.rs) 7. Tour de table of registry updates Lunch Lightning Talks 8.1 Registrar accreditation (Unni Solas,.no, Marie Ekh,.se, Stefan Kovač,.rs) followed by a group discussion 8.2 Registrar satisfaction surveys (Jasper Kesteloot,.be; Regina Fuchsová,.eu; Ines Esteves,.pt) followed by a group discussion 9. Types of supportive documents for data within domain registration (Peter Biro,.sk) Coffee break 10. Tour de Table revisited 11. Rush, rush - DENIC's "new system" for domainers (Sascha Kämpf,.de) 12. Feedback round End of workshop 8th CENTR R&D workshop
2 Welcome and introductions (Mohsen Souissi, Alex Mayrhofer, Co-Chairs) 1.1 Tour de Table 1.2 Agenda bashing 1.3 Administrativa Lunch Coffee break 2. Update on members R&D activities 2.1 TLD Labs -.jprs R&D platform (Shoji Noguchi, JPRS) 2.2 Update from other Registries 3. Data & Measurement Research 3.1 DNS & BGP infrastructure measurements and analysis (Dave Knight, Dyn) 3.2 OpenINTEL - Measuring 60% of the DNS name space, everyday (Mattijs Jonker, OpenINTEL Consortium) 3.3 Domain Popularity Ranking Revisited (Sebastian Castro, NZRS) 3.4 TLD Traffic Analysis goes Open Source (Moritz Müller, SIDN) 3.5 cctld Operators sharing zone Data and Summaries (Paul Hoffman, ICANN) 3.6 Panel: Q&A on Data centric Projects and Ideas (Sebastian Castro, NZRS / Moritz Müller, SIDN / Paul Hoff /Mattijs Jonker, OpenINTEL Consortium / Dave Knight, Dyn) 4. Security & Cryptography Research 4.1 Honeypot as a Service (Bedrich Kosata, CZ.NIC) 4.2 Measuring the deployment of Elliptic Curve Cryptography in DNSSEC (Maciej Andzi?ski, NASK) 4.3 Providing support of new cryptographic algorithms in software libraries (Dmitry Belyavsky, TCINET) 5. Emerging Topics 5.1 DNS over TCP: The new frontier (Stéphane Bortzmeyer, AFNIC) 5.2 Other emerging Topics. Panel discussion (Panelists to be confirmed)
3 17.30 End of the workshop 6. Summary, Action plan, and Wrap-up (Mohsen Souissi, Alex Mayrhofer, Co-Chairs) 11th CENTR Security workshop Opening, welcome, what will we learn today 1. Host Introduction (Dirk Jumpertz,.eu) 3. Interactive part Lunch Everybody will be asked to write down: - The most interesting or impacting security incident in general last year? - What was the security incident with the most impact in your organisation last year and why? 4. Security Incidents & Processes 4.1 Major security incidents (case studies) and the incident management handling process in theory and pract Tomek, SBA-Research) 4.2 Encrypting Malware (Ivo Kutts,.lv) 4.3 SYN flood attack against WEB service (Tomas Mackus,.lt) 4.4 IIS Security Incident process (Anne-Marie Eklund Löwinder,.se)) 4.5 DDoS attack to JP DNS (Yoshiro Yoneya,.jp) 5. Mango Dynamic web from text files (Ivo Kutts,.lv) 6. Lightning talks - open format 6.1 Sink holes (Dirk Jumpertz,.eu) 6.2 External pentest (Erwin Lansing,.dk) 6.3 MISP (Zarko Kecic,.rs) 7. Small Registries and Security (Andrej Bagon,.si) 8. GDPR (Dirk Jumpertz,.eu) 9. Randomness and (EC)DSA (Daniel Stirnimann,.ch/.li)
4 15.45 Coffee break 10. SITO (Moritz Muller,.nl) 11. TLP [Red] round - only for CoCs What did we learn today? Wrap up and closing. Day 2: Interactive sessions Data protection / privacy 9.00 Internet of Things 9.00 Use of a domain name 9.00 Security awareness game (group 1) 9.00 Advanced presentation skills 9.00 CENTRstats demo (group 1) Secure Coding Threats to the industry Coffee break Coffee break Hot topics from other regions Innovation culture within registries
5 11.30 EU Commission security expert Crash course on EU policy-making CENTRstats demo (group 2) Zero Growth Lunch Lunch Domain name abuse CENTRstats demo (group 3) Engaging the channel Security awareness game (group 2) Registry liability Break-out room Cybersecurity demo Big Data Crisis management (part 1) Collaboration pitches CENTR RAR Day preparations
6 15.00 Unconference / Open Space (part 1) Coffee break Coffee break NIS Directive Data monetisation Crisis management (part 2) ID federations Security awareness game (group 3) Unconference / Open Space (part 2) 20th CENTR Marketing workshop Welcome and introductions Tour de table of registry updates Statistics & metrics Lunch break From NO plan to A plan CENTRstats, methodology & Data sharing (Patrick Myles, CENTR) Competition law approach to market definition and market shares (Cristina Vila Gisbert, EU and competition lawyer at Cuatrecasas) Comments & Discussion (Michiel Henneke, SIDN) (Malene Hansen,.dk) uk &.wales: segmentation, partnership and celebration (Neil Dagger,.uk)
7 14.30 Customised Reduction Schemes (CRS) and Registrar Club (Daniela Medda & Regina Fuchsová,.eu) New corporate identity of.nl (Marnie van Duijnhoven,.nl) Wrap-up, topics for next meeting Coffee break 34th CENTR Technical workshop Opening and Welcome 1. Tour de Table 2. Zonefile Access for.se (Patrik Wallström, IIS) 3. Updates on TRTF (Stéphane Bortzmeyer, AFNIC) 4. WHOIS No More: The Future of Registration Metadata (Scott Hollenbeck, Verisign) 5. RDAP and other technical work at IANA (Kim Davies, ICANN) 6. Where are we in DNS privacy? (Stéphane Bortzmeyer, AFNIC) Lunch 7. DevOps the AWSome way (Maarten Bosteels, Tom Wouters, DNS Belgium) 8. DNS Anycast Deployment: Lessons from the First Year (Amanda Swain, CIRA) 9. Coming of age of a zone file (Ulrich Wisser, IIS) Coffee break AOB & End of the meeting 50th CENTR Legal & Regulatory workshop Welcome and introductions
8 2. Approval of the Agenda 3. Host Presentation (Geo Van Langenhove,.eu) 4. Open Mic AOB We will try something new which I have decided to dub "Open Mic". The traditional tour de table has become such a big success that it takes very long (the last time we did one, in Belgrade, it was finished at around 3 pm). There's nothing wrong with that - rather to the contrary, many of you have told me that the tour de table and the discussions that derive from it are particularly interesting and helpful. Nevertheless, the sheer duration of the tour de table makes it impossible to have one at every meeting, for there would hardly be any time left for anything else (which is why we didn't have one at the last meeting in Lisbon). 5. "Can an Injunction Against the Domain Name Holder Trigger Registry Liability? - A New Law Suit Against n (Bernhard Erler,.at) 6. "Court Assessment of.be's Terms & Conditions - More Than a Play on Words? (Peter Vergote,.be) 7. "Privacy RFCs - A GDPR Compliance Tool?" (Nathalie Boulvard & Stephane Bortzmeyer,.fr 8. "Hide & Seek - Ways to Hide the Registrant's Identity and How to Cope With Them" (Geo Van Langenhove,.eu) 9. "How.nz Solved Names Registered to Struck Off Companies" (Steven Heath,.nz) 10. "Opening Pandora's Box (?) - Addressing, Blocking, Seizure, and Take-down of Domain Names - Norid's W (Ann-Cathrin Marcussen,.no)
TLD-OPS Standing Committee Meeting cctld Security and Stability Together
Meeting cctld Security and Stability Together October 31, 2017 ICANN60, Abu Dhabi Jacques Latour,.ca (Chair) Agenda TLD-OPS Meeting @ ICANN60, Oct 29, 2017 1. Opening and welcome (Jacques) 2. TLD-OPS introduction
More informationWhat Data Must Be Protected under GDPR?
Date: 11 November 2017 TO: John Jeffrey, ICANN FROM: Greg Aaron, ithreat Cyber Group RE: strawman proposal for WHOIS with GDPR This document proposes a solution that could be implemented by May 2018. It
More informationIANA ccnso Update Kim Davies ICANN 55, 8 March 2016
IANA ccnso Update Kim Davies ICANN 55, 8 March 2016 Agenda Introduction to IANA Performance Overview Implementing new post-transition performance metrics Framework of Interpretation RDAP Update Other Work
More informationDNSSEC in Sweden: Five Years of Practical Experience. Anne-Marie Eklund Löwinder Quality and Security Manager
DNSSEC in Sweden: Five Years of Practical Experience Anne-Marie Eklund Löwinder Quality and Security Manager Amel@iis.se http://www.iis.se What s the problem Up until recently, DNSSEC looked like a solution
More informationDNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific
DNS Abuse Handling FIRST TC Noumea New Caledonia Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific 10 September 2018 1 The Domain Name System (DNS) The root
More informationIntroduction. Prepared by: ICANN Org Published on: 12 January 2018
Proposed Interim Models for Compliance with ICANN Agreements and Policies in Relation to the European Union s General Data Protection Regulation For Discussion Prepared by: ICANN Org Published on: 12 January
More informationPresident s Report 2009
President s Report 2009 Paul Twomey, President and CEO Public Forum 2 March 2009 At Large Summit New gtld Program IDN cctld Fast Track 2010 Operating Plan and Budget Improving Institutional Confidence
More informationEight Minute Expert GDPR
Eight Minute Expert GDPR GDPR Login Password MIN1 What is the GDPR? The General Data Protection Regulation is a new regulation by the EU that will replace the current Data Protection Directive of 1995.
More information2016 APNIC Survey Results Asia Pacific Network Information Centre
2016 APNIC Survey Results Asia Pacific Network Information Centre Conducted and prepared by Survey Matters. Agenda Survey Process and Methodology 3 Participation and Service Satisfaction 6 Respondents
More informationGeneral Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) & WHOIS at ICANN Savenaca Vocea APNIC 46, Noumea 11 September 2018 About the General Data Protection Regulation (GDPR) The European Union s (EU s) GDPR aims to
More informationYes. [No Response] General Questions
General Questions Q1. Do you agree that the proposals to refine the WHOIS opt-out eligibility and to provide a framework for registrar privacy services meets the policy objectives set out in the consultation
More informationCyber Security Congress 2017
Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee
More informationExploring Replacements for WHOIS A Next Generation Registration Directory Service (RDS)
Exploring Replacements for WHOIS A Next Generation Registration Directory Service (RDS) EWG Consultation with the ICANN Community Wednesday 20 November, 2013 Registration Directory Service (RDS) Session
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationICANN Policy Update & KSK Rollover
ICANN Policy Update & KSK Rollover Savenaca Vocea VP, Stakeholder Engagement - Oceania Commonwealth Broadband Pacific Forum 2017, Apia, Samoa 25-27 July 2017 1 Overview Coordinating with our partners,
More informationDeploying the IETF s WHOIS Protocol Replacement
#ICANN51 16 October 2014 Deploying the IETF s WHOIS Protocol Replacement Francisco Arias Director, Technical Services Global Domains Division Edward Lewis Technical Services Sr. Manager Global Domains
More informationDraft Applicant Guidebook, v3
Draft Applicant Guidebook, v3 Module 5 Please note that this is a discussion draft only. Potential applicants should not rely on any of the proposed details of the new gtld program as the program remains
More informationWhat we did last OARC. Keith Mitchell DNS-OARC RIPE77 DNS WG Amsterdam, Oct 2018
What we did last OARC Keith Mitchell DNS-OARC RIPE77 DNS WG Amsterdam, Oct 2018 OARC's Mission Statement The Domain Name System Operations Analysis and Research Center (DNS-OARC) is a non-profit, membership
More informationHogan Lovells Comments on the 3 ICANN Models for WHOIS Compliance with GDPR published on 12 January 2018
Introduction Comments on the 3 ICANN Models for WHOIS Compliance with GDPR published on 12 January 2018 These comments are in response to the request from ICANN for comments on the three interim GDPR models
More informationAPNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013
APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database
More informationSecurity and Stability Advisory Committee!! Activities Update! ICANN Los Angeles Meeting! October 2014! #ICANN51
Security and Stability Advisory Committee!! Activities Update! ICANN Los Angeles Meeting! October 2014! 1 Agenda 1. Overview (5 minutes) 2. Recent Achievements (5 minutes) 3. IANA Functions Stewardship
More informationRegistry Internet Safety Group (RISG)
Registry Internet Safety Group (RISG) Re: Potential for Malicious Conduct and new TLD Process RISG s mission is to facilitate data exchange and promulgate best practices to address Internet identity theft,
More informationCODEV-NIC free registry software
CODEV-NIC free registry software Stéphane Bortzmeyer AFNIC (".fr" registry) bortzmeyer@nic.fr 2 March 2006 1 CODEV-NIC free registry software Permission is granted to copy, distribute and/or modify this
More informationThe European Platform in Network and Information Security (NIS) Fabio Martinelli
The European Platform in Network and Information Security (NIS) Fabio Martinelli Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche IIT-CNR, Pisa, Italy Institute of Informatics and
More informationProposed Interim Model for GDPR Compliance-- Summary Description
Proposed Interim Model for GDPR Compliance-- Summary Description (The Calzone Model, 28 February 2018) Prepared by: ICANN Org I. Introduction The Proposed Interim Model balances competing elements of models
More informationMPLS Deployment. APNIC Technical Workshop September 28 to October 2, APNIC42, Colombo, Sri Lanka.
MPLS Deployment APNIC Technical Workshop September 28 to October 2, 2016. APNIC42, Colombo, Sri Lanka. Presenter Nurul Islam Roman Manager, Training & Technical Assistance, APNIC Nurul manages APNIC training
More informationDNSSEC at Scale. Dani Grant CloudFlare
DNSSEC at Scale Dani Grant DNS @ CloudFlare CloudFlare - Authoritative DNS provider (includes DNSSEC for free) - 4M+ domains - 40+ billion queries per day - 76 edge locations in 40 countries (growing)
More informationRDAP Implementation. Francisco Arias & Gustavo Lozano 21 October 2015
RDAP Implementation Francisco Arias & Gustavo Lozano 21 October 2015 Agenda 1 2 3 History of Replacing WHOIS protocol gtld RDAP Profile RDAP Profile Details 4 5 Open Issues gtld RDAP Profile Conclusion
More informationDNSSEC for the Root Zone. ICANN 37 Nairobi March 2010
DNSSEC for the Root Zone ICANN 37 Nairobi March 2010 Kim Davies, ICANN This design is the result of a cooperation between ICANN & VeriSign with support from the U.S. DoC NTIA Design Design Requirements
More informationIncident Command: The far side of the edge
Incident Command: The far side of the edge Lisa Phillips Tom Daly Maarten Van Horenbeeck 30 POPs; 5 Continents; ~7Tb/sec Network Inspiration Program Goals FEMA National Incident Management Fire Department
More information6056/17 MK/ec 1 DG D 2B
Council of the European Union Brussels, 8 February 2017 (OR. en) 6056/17 OUTCOME OF PROCEEDINGS From: On: 20 January 2017 To: Subject: General Secretariat of the Council Horizontal Working Party on Cyber
More informationInternet Engineering Task Force (IETF) April Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC
Internet Engineering Task Force (IETF) Request for Comments: 6605 Category: Standards Track ISSN: 2070-1721 P. Hoffman VPN Consortium W.C.A. Wijngaards NLnet Labs April 2012 Abstract Elliptic Curve Digital
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationWELCOME ISO/IEC 27001:2017 Information Briefing
WELCOME ISO/IEC 27001:2017 Information Briefing Denis Ryan C.I.S.S.P NSAI Lead Auditor Running Order 1. Market survey 2. Why ISO 27001 3. Requirements of ISO 27001 4. Annex A 5. Registration process 6.
More informationAlright, we will continue with Registries and Registrars and our first speaker is Steve who will talk about registrar basics is that correct, Steve?
PRAGUE Introduction to Registries and Registrars Sunday, June 24, 2012 00:00 to 00:00 ICANN - Prague, Czech Republic Alright, we will continue with Registries and Registrars and our first speaker is Steve
More informationThe WHOIS: security and privacy issues
The WHOIS: security and privacy issues Giovanni Seppia CENTR General Manager giovanni@centr.org Network and Information security: political and technical challenges Introducing CENTR What is CENTR? Council
More informationAdvisory Statement: Temporary Specification for gtld Registration Data
Advisory Statement: Temporary Specification for gtld Registration Data Adopted on 17 May 2018 by ICANN Board Resolutions 2018.05.17.01 2018.05.17.09 On 17 May 2018, the ICANN Board of Directors (ICANN
More informationIn Accountable IoT We Trust
In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design
More informationReference Architecture for the Operationalization of a BCMS. Boban Kršić, Chief Information Security Officer. verinice.xp - Berlin, 07.
Reference Architecture for the Operationalization of a BCMS Boban Kršić, Chief Information Security Officer verinice.xp - Berlin, 07. February 2017 DENIC Mission Founded in 1996 as a cooperative in Frankfurt
More informationUpdate on ICANN Domain Name Registrant Work
1 Update on ICANN Domain Name Registrant Work Brian Gutterman Registrant Program Manager GDD Strategic Programs ICANN60 1 November 2017 2 Agenda Focus on Registrants Service and Information Domain Name
More informationENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010
ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions
More informationICANN GDPR Proposed Models Redaction Proposal EXECUTIVE SUMMARY:
EXECUTIVE SUMMARY: The ICANN Redaction Model is proposed as an interim solution while ICANN Org and the community develop a long-term replacement to WHOIS. If adopted, registries and registrars do not
More informationDNSSEC the.se way: Overview, deployment and lessons learned. Anne-Marie Eklund Löwinder Quality & Security Manager
DNSSEC the.se way: Overview, deployment and lessons learned Anne-Marie Eklund Löwinder Quality & Security Manager My agenda Getting Started Finding out about.se Finding out what DNS does for you Why DNSSEC?
More informationIdentifier Technology Health Indicators (ITHI) Alain Durand, Christian Huitema 13 March 2018
Identifier Technology Health Indicators (ITHI) Alain Durand, Christian Huitema 13 March 2018 ITHI Principles of Operation Technical focus Problem areas à Metrics à Measurement Current value and trend over
More informationDRAFT: gtld Registration Dataflow Matrix and Information
DRAFT: gtld Registration Dataflow Matrix and Information Summary of Input Received From Contracted Parties and Interested Stakeholders. Version 2 6 November 2017 ICANN DRAFT: gtld Registration Dataflow
More informationImplementation Strategy for Cybersecurity Workshop ITU 2016
Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential
More informationImpacts of the GDPR in Afnic - Registrar relations: FAQ
Impacts of the GDPR in Afnic - Registrar relations: FAQ Background The adoption of Regulation (Eu) 2016/679 of the European Parliament and of the Council of April 27, 2016 on the protection of natural
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationUniversité Cheikh Anta DIOP de Dakar. DNS Ecosystem. IROC Workshop October UCAD II
Université Cheikh Anta DIOP de Dakar DNS Ecosystem IROC Workshop October 3-7 2016 UCAD II 1 Internet view The InterNet: the network of networks How Internet Works Each node connected to Internet uses an
More informationTrustworthy ICT. FP7-ICT Objective 1.5 WP 2013
Trustworthy ICT FP7-ICT-2013-10 Objective 1.5 WP 2013 1 General Overview Focused in a limited number of technologies in emerging application of high economic impact in the security area, Cloud Computing
More informationRIPE Network Coordination Centre. K-root and DNSSEC. Wolfgang Nagele RIPE NCC.
K-root and DNSSEC Wolfgang Nagele RIPE NCC RIPE NCC One of the five Regional Internet Registries Provides IP address and AS number resources to Europe and Middle-East regions DNS related work - Parent
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationSupporting Internet Growth and Evolution: The Transition to IPv6
2010/TEL41/DSG/WKSP2/004 Agenda Item: Panel Discussion 1 Supporting Internet Growth and Evolution: The Transition to IPv6 Submitted by: APNIC Workshop for IPv6: Transforming the Internet Chinese Taipei
More informationCompTIA Security+ Study Guide (SY0-501)
CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes
More informationCentre for cybersecurity Belgium : Role, Missions et future capacities
Centre for cybersecurity Belgium : Role, Missions et future capacities NLO meeting 30/01/2018 Phédra Clouner Deputy Director CCB 01 CCB mission & services Page 2 Legal Basis R.D. 10/10/2014 Contribute
More informationECTA POSITION PAPER ON WHOIS
23 May 2018 ECTA POSITION PAPER ON WHOIS I. INTRODUCTION The Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to
More informationFacing Up to the Challenges
Information Security, Data Breaches and Protecting Cardholder Information: Facing Up to the Challenges SEPTEMBER 13-14, 2006 Account Number PIN Number Social Security Number Social Security Number Information
More informationExperience Security, Risk, and Governance
Experience Security, Risk, and Governance Agenda and recommended event path 26 28 March Vienna, Austria Contents 3 Welcome 4 Overview 5 Evening Programs 6 Sessions at-a-glance 11 Digital Transformation
More informationWelcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time
TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:
More informationRIPE NCC DNS Update. Wolfgang Nagele DNS Services Manager
RIPE NCC DNS Update Wolfgang Nagele DNS Services Manager DNS Department Services Reverse DNS for RIPE NCC zones Secondary for other RIRs K-root F-reverse (in-addr.arpa & ip6.arpa) Secondary DNS for cctlds
More informationRights Protection Mechanisms: User Feedback Session
15 October 2014 Rights Protection Mechanisms: User Feedback Session Agenda Introduction (10) Panel & Interactive Discussion (50) o Trademark Clearinghouse o Sunrise Period o Trademark Claims Service o
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationRDAP Implementation. 7 March 2016 Francisco Arias & Gustavo Lozano ICANN 55 7 March 2016
RDAP Implementation 7 March 2016 Francisco Arias & Gustavo Lozano ICANN 55 7 March 2016 Agenda 1 2 3 Introduction [10 min] Differentiated Access [15 min] Thick Whois vs Registrar s RDAP [20 min] 4 5 Registrar
More informationDNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010
DNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010 Kim Davies Manager, Root Zone Services Internet Corporation for Assigned Names & Numbers Recap DNS originally not designed with
More informationCISO View: Top 4 Major Imperatives for Enterprise Defense
CISO View: Top 4 Major Imperatives for Enterprise Defense James Christiansen Chief Information Security Officer Evantix, Inc. Gary Terrell CIPP Chief Information Security Officer Adobe Session ID: Star
More informationAfilias DNSSEC Practice Statement (DPS) Version
Afilias DNSSEC Practice Statement (DPS) Version 1.07 2018-02-26 Page 1 of 8 1. INTRODUCTION 1.1. Overview This document was created using the template provided under the current practicing documentation.
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationThe emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18
The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18 European Union Agency for Network and Information Security
More informationData-Gathering for Recent DNS Events Keith Mitchell OARC Programme Manager Internet Systems Consortium UKNOF7 3rd Apr 2007
Data-Gathering for Recent DNS Events Keith Mitchell OARC Programme Manager Internet Systems Consortium UKNOF7 3 rd Apr 2007 What is OARC? Operations, Analysis and Research Center for the Internet Co-ordination
More informationIncident Response WG Status
Incident Response WG Status Joerg Schweiger WG Chair Cartagena, December 2010, ICANN ccnso Meeting Charter Purpose assist in implementing sustainable mechanisms
More informationAbout SaudiNIC. What we have done.. ( ) What is Next.. ( ) Lessons learned
About SaudiNIC What we have done.. ( ) What is Next.. ( ) Lessons learned SaudiNIC is a non-profit unit that is operated by Communication and Information Technology Commission (CITC) which is a semi-governmental
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationRIPE Address Policy Working Group
RIPE 62, Amsterdam 1 RIPE Address Policy Working Group May 5, 2011 RIPE 62, Amsterdam WG Chairs: Gert Döring, & Sander Steffann please remember: this session is webcast Agenda APWG overall Agenda A. administrative
More informationAfrican Domain Name System Market Study 2016
African Domain Name System Market Study 2016 54 African countries, including 6 Indian and Atlantic Ocean Islands Identify strengths and weaknesses in the industry ecosystem within the region Develop recommendations
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationAgenda. IETF 102 Preview Recognition Technical Plenary The Future of Internet Access IAB, IAOC, and IESG open mic sessions
IETF 101 Plenary Agenda Welcome Host presentation Brief updates on hot topics IETF Chair report Administrative topics IRTF update NomCom report and requests Jonathan B. Postel Award nominee solicitation
More informationIoT and Privacy by Design
IoT and Privacy by Design A recap on previous presentation More recent work on GDPR, NIS Cyber Security, and the Human Right to Privacy The design process for consumer goods and services 2 current examples
More informationCLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS
CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made
More informationThank you. So, there was the echo.
COPHAG ccnso TLD-OPS Standing Committee COPHAG ccnso TLD-OPS Standing Committee Sunday, March 12, 2017 13:45 to 15:00 CET ICANN58 Copenhagen, Denmark It is Sunday, March 12 th, 2017 in Hall B41 for the
More informationIntellectual Property Constituency (IPC)
Contractual Compliance Intellectual Property Constituency (IPC) Tuesday, 14 October 2014 Agenda Registrar Related Update since ICANN 50 Registry Related Update since ICANN 50 Audit Programs Update Questions
More informationICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia
ICANN and Russia Dr. Paul Twomey President and CEO 10 June 2007 1 ICANN s mission To coordinate, overall, the global Internet's system of unique identifiers, and to ensure stable and secure operation of
More informationProgramme. Legal Instruments for the Internet Economy. Building Capacity and Implementing Regulation. Malta, 14 th to 19 th September, 2015
A MALTA COMMONWEALTH THIRD COUNTRY TRAINING PROGRAMME Programme Legal Instruments for the Internet Economy Building Capacity and Implementing Regulation Malta, 14 th to 19 th September, 2015 www.diplomacy.edu/courses/legalinstruments2015
More informationIntroduction to ISO/IEC 27001:2005
Introduction to ISO/IEC 27001:2005 For ISACA Melbourne Chapter Technical Session 18 th of July 2006 AD Prepared by Endre P. Bihari JP of Performance Resources What is ISO/IEC 17799? 2/20 Aim: Creating
More informationAPTLD & MYNIC JOINT SURVEY
INTERNET SECURITY & CCTLDS SURVEY RESULTS 24 th June 2008, Tuesday ccnso meeting, Paris, France Survey Objectives Survey Summary:- For APTLD members to examine the roles and responsibilities of cctlds
More informationProposal for a model to address the General Data Protection Regulation (GDPR)
Proposal for a model to address the General Data Protection Regulation (GDPR) Introduction Please find the Executive Summary of the data model in Part A of this document. Part B responds to the requirements
More informationRoot KSK Roll Delay Update
Root KSK Roll Delay Update PacNOG 21 Patrick Jones, Sr. Director, Global Stakeholder Engagement 4 December 2017 1 Background When you validate DNSSEC signed DNS records, you need a Trust Anchor. A Trust
More informationOperations, Analysis and Research Center for the Internet Co-ordination centre to protect Global DNS infrastructure Trusted, neutral environment for
Recent DNS Events and OARC Activities Keith Mitchell OARC Programme Manager Internet Systems Consortium RIPE54 DNS WG Tallinn, Estonia May 2007 What is OARC? Operations, Analysis and Research Center for
More informationLeasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands
Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life s conference provides the ideal setting for the industry to come together to discuss its progress
More informationPolicy Session 4 Identifying Risk: An abundance of Potential Shock Waves
Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves Ray Stanton Interim Group CiSO & Director Digital Risk, National Grid &, Group CiSO/CiRO, Redwood Technologies Group 9 th May 2017
More informationCEH: CERTIFIED ETHICAL HACKER v9
CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever
More informationAnti-Phishing Working Group
Anti-Phishing Working Group www.antiphishing.org DNS Policy Sub-Committee Overview Rod Rasmussen Rod.Rasmussen@InternetIdentity.com Anti-Phishing Working Group Launched in 2003 2600+ members 1600+ companies
More informationName Collision Occurrence Management Framework
23 June 2014 Name Collision Occurrence Management Framework Francisco Arias Director, Technical Services Global Domains Division Agenda Introduction & Background SSAC Comment Concerning JAS Phase One Report
More informationIO7- E-learning pilot planning and evaluation report
Project Number: 2014-1-ES01-KA200-004372 Intergeneration Mentoring for Entrepreneurs IO7- E-learning pilot planning and evaluation report The European Commission support for the production of this publication
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationInternet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice ISSN: March 2017
Internet Engineering Task Force (IETF) Request for Comments: 8109 BCP: 209 Category: Best Current Practice ISSN: 2070-1721 P. Koch DENIC eg M. Larson P. Hoffman ICANN March 2017 Initializing a DNS Resolver
More informationDNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific
DNS/DNSSEC Workshop In Collaboration with APNIC and HKIRC Hong Kong Champika Wijayatunga Regional Security Engagement Manager Asia Pacific 22-24 January 2018 1 Agenda 1 2 3 Introduction to DNS DNS Features
More informationDS TTL shortening experience in.jp
DS TTL shortening experience in.jp APRICOT2014 DNS Session 27 Feb 2014 Yoshiro YONEYA Copyright 2014 Japan Registry Services Co., Ltd. 1 What is DS? Establish a DNSSEC chain
More informationThe SPARKS Project Motivation, Objectives and Results
The SPARKS Project Motivation, Objectives and Results Paul Smith paul.smith@ait.ac.at AIT Austrian Institute of Technology SEGRID Project Workshop 14 th November, 2016, Barcelona, Spain The SPARKS Project
More informationRolling the Root Zone DNSSEC Key Signing Key Edward Lewis AFRINIC25 November 2016
Rolling the Root Zone DNSSEC Key Signing Key Edward Lewis AFRINIC25 November 2016 edward.lewis@icann.org 1 Motivation for this talk ICANN is about to change an important configuration parameter in DNSSEC
More informationReviewing New gtld Program Safeguards Against DNS Abuse. ICANN Operations and Policy Research 28 January 2016
Reviewing New gtld Program Safeguards Against DNS Abuse ICANN Operations and Policy Research 28 January 2016 Discussion Details This discussion is being recorded. Recordings and supporting materials will
More information