38th CENTR Administrative workshop

Size: px
Start display at page:

Download "38th CENTR Administrative workshop"

Transcription

1 38th CENTR Administrative workshop Welcome and introductions 2. Host presentation (Regina Fuchsová,.eu) 3. OpenData (Benoît Ampeau,.fr) 4. Plans on Dropcatching and trade / transfer operations (Mickaël Vigreux,.fr) 5. Approval of the "Registry requirements towards registrars" table (see Admin 37) 6. Update from the Registrar Requirements Task Force (RARTF) (Stefan Kovač,.rs) 7. Tour de table of registry updates Lunch Lightning Talks 8.1 Registrar accreditation (Unni Solas,.no, Marie Ekh,.se, Stefan Kovač,.rs) followed by a group discussion 8.2 Registrar satisfaction surveys (Jasper Kesteloot,.be; Regina Fuchsová,.eu; Ines Esteves,.pt) followed by a group discussion 9. Types of supportive documents for data within domain registration (Peter Biro,.sk) Coffee break 10. Tour de Table revisited 11. Rush, rush - DENIC's "new system" for domainers (Sascha Kämpf,.de) 12. Feedback round End of workshop 8th CENTR R&D workshop

2 Welcome and introductions (Mohsen Souissi, Alex Mayrhofer, Co-Chairs) 1.1 Tour de Table 1.2 Agenda bashing 1.3 Administrativa Lunch Coffee break 2. Update on members R&D activities 2.1 TLD Labs -.jprs R&D platform (Shoji Noguchi, JPRS) 2.2 Update from other Registries 3. Data & Measurement Research 3.1 DNS & BGP infrastructure measurements and analysis (Dave Knight, Dyn) 3.2 OpenINTEL - Measuring 60% of the DNS name space, everyday (Mattijs Jonker, OpenINTEL Consortium) 3.3 Domain Popularity Ranking Revisited (Sebastian Castro, NZRS) 3.4 TLD Traffic Analysis goes Open Source (Moritz Müller, SIDN) 3.5 cctld Operators sharing zone Data and Summaries (Paul Hoffman, ICANN) 3.6 Panel: Q&A on Data centric Projects and Ideas (Sebastian Castro, NZRS / Moritz Müller, SIDN / Paul Hoff /Mattijs Jonker, OpenINTEL Consortium / Dave Knight, Dyn) 4. Security & Cryptography Research 4.1 Honeypot as a Service (Bedrich Kosata, CZ.NIC) 4.2 Measuring the deployment of Elliptic Curve Cryptography in DNSSEC (Maciej Andzi?ski, NASK) 4.3 Providing support of new cryptographic algorithms in software libraries (Dmitry Belyavsky, TCINET) 5. Emerging Topics 5.1 DNS over TCP: The new frontier (Stéphane Bortzmeyer, AFNIC) 5.2 Other emerging Topics. Panel discussion (Panelists to be confirmed)

3 17.30 End of the workshop 6. Summary, Action plan, and Wrap-up (Mohsen Souissi, Alex Mayrhofer, Co-Chairs) 11th CENTR Security workshop Opening, welcome, what will we learn today 1. Host Introduction (Dirk Jumpertz,.eu) 3. Interactive part Lunch Everybody will be asked to write down: - The most interesting or impacting security incident in general last year? - What was the security incident with the most impact in your organisation last year and why? 4. Security Incidents & Processes 4.1 Major security incidents (case studies) and the incident management handling process in theory and pract Tomek, SBA-Research) 4.2 Encrypting Malware (Ivo Kutts,.lv) 4.3 SYN flood attack against WEB service (Tomas Mackus,.lt) 4.4 IIS Security Incident process (Anne-Marie Eklund Löwinder,.se)) 4.5 DDoS attack to JP DNS (Yoshiro Yoneya,.jp) 5. Mango Dynamic web from text files (Ivo Kutts,.lv) 6. Lightning talks - open format 6.1 Sink holes (Dirk Jumpertz,.eu) 6.2 External pentest (Erwin Lansing,.dk) 6.3 MISP (Zarko Kecic,.rs) 7. Small Registries and Security (Andrej Bagon,.si) 8. GDPR (Dirk Jumpertz,.eu) 9. Randomness and (EC)DSA (Daniel Stirnimann,.ch/.li)

4 15.45 Coffee break 10. SITO (Moritz Muller,.nl) 11. TLP [Red] round - only for CoCs What did we learn today? Wrap up and closing. Day 2: Interactive sessions Data protection / privacy 9.00 Internet of Things 9.00 Use of a domain name 9.00 Security awareness game (group 1) 9.00 Advanced presentation skills 9.00 CENTRstats demo (group 1) Secure Coding Threats to the industry Coffee break Coffee break Hot topics from other regions Innovation culture within registries

5 11.30 EU Commission security expert Crash course on EU policy-making CENTRstats demo (group 2) Zero Growth Lunch Lunch Domain name abuse CENTRstats demo (group 3) Engaging the channel Security awareness game (group 2) Registry liability Break-out room Cybersecurity demo Big Data Crisis management (part 1) Collaboration pitches CENTR RAR Day preparations

6 15.00 Unconference / Open Space (part 1) Coffee break Coffee break NIS Directive Data monetisation Crisis management (part 2) ID federations Security awareness game (group 3) Unconference / Open Space (part 2) 20th CENTR Marketing workshop Welcome and introductions Tour de table of registry updates Statistics & metrics Lunch break From NO plan to A plan CENTRstats, methodology & Data sharing (Patrick Myles, CENTR) Competition law approach to market definition and market shares (Cristina Vila Gisbert, EU and competition lawyer at Cuatrecasas) Comments & Discussion (Michiel Henneke, SIDN) (Malene Hansen,.dk) uk &.wales: segmentation, partnership and celebration (Neil Dagger,.uk)

7 14.30 Customised Reduction Schemes (CRS) and Registrar Club (Daniela Medda & Regina Fuchsová,.eu) New corporate identity of.nl (Marnie van Duijnhoven,.nl) Wrap-up, topics for next meeting Coffee break 34th CENTR Technical workshop Opening and Welcome 1. Tour de Table 2. Zonefile Access for.se (Patrik Wallström, IIS) 3. Updates on TRTF (Stéphane Bortzmeyer, AFNIC) 4. WHOIS No More: The Future of Registration Metadata (Scott Hollenbeck, Verisign) 5. RDAP and other technical work at IANA (Kim Davies, ICANN) 6. Where are we in DNS privacy? (Stéphane Bortzmeyer, AFNIC) Lunch 7. DevOps the AWSome way (Maarten Bosteels, Tom Wouters, DNS Belgium) 8. DNS Anycast Deployment: Lessons from the First Year (Amanda Swain, CIRA) 9. Coming of age of a zone file (Ulrich Wisser, IIS) Coffee break AOB & End of the meeting 50th CENTR Legal & Regulatory workshop Welcome and introductions

8 2. Approval of the Agenda 3. Host Presentation (Geo Van Langenhove,.eu) 4. Open Mic AOB We will try something new which I have decided to dub "Open Mic". The traditional tour de table has become such a big success that it takes very long (the last time we did one, in Belgrade, it was finished at around 3 pm). There's nothing wrong with that - rather to the contrary, many of you have told me that the tour de table and the discussions that derive from it are particularly interesting and helpful. Nevertheless, the sheer duration of the tour de table makes it impossible to have one at every meeting, for there would hardly be any time left for anything else (which is why we didn't have one at the last meeting in Lisbon). 5. "Can an Injunction Against the Domain Name Holder Trigger Registry Liability? - A New Law Suit Against n (Bernhard Erler,.at) 6. "Court Assessment of.be's Terms & Conditions - More Than a Play on Words? (Peter Vergote,.be) 7. "Privacy RFCs - A GDPR Compliance Tool?" (Nathalie Boulvard & Stephane Bortzmeyer,.fr 8. "Hide & Seek - Ways to Hide the Registrant's Identity and How to Cope With Them" (Geo Van Langenhove,.eu) 9. "How.nz Solved Names Registered to Struck Off Companies" (Steven Heath,.nz) 10. "Opening Pandora's Box (?) - Addressing, Blocking, Seizure, and Take-down of Domain Names - Norid's W (Ann-Cathrin Marcussen,.no)

TLD-OPS Standing Committee Meeting cctld Security and Stability Together

TLD-OPS Standing Committee Meeting cctld Security and Stability Together Meeting cctld Security and Stability Together October 31, 2017 ICANN60, Abu Dhabi Jacques Latour,.ca (Chair) Agenda TLD-OPS Meeting @ ICANN60, Oct 29, 2017 1. Opening and welcome (Jacques) 2. TLD-OPS introduction

More information

What Data Must Be Protected under GDPR?

What Data Must Be Protected under GDPR? Date: 11 November 2017 TO: John Jeffrey, ICANN FROM: Greg Aaron, ithreat Cyber Group RE: strawman proposal for WHOIS with GDPR This document proposes a solution that could be implemented by May 2018. It

More information

IANA ccnso Update Kim Davies ICANN 55, 8 March 2016

IANA ccnso Update Kim Davies ICANN 55, 8 March 2016 IANA ccnso Update Kim Davies ICANN 55, 8 March 2016 Agenda Introduction to IANA Performance Overview Implementing new post-transition performance metrics Framework of Interpretation RDAP Update Other Work

More information

DNSSEC in Sweden: Five Years of Practical Experience. Anne-Marie Eklund Löwinder Quality and Security Manager

DNSSEC in Sweden: Five Years of Practical Experience. Anne-Marie Eklund Löwinder Quality and Security Manager DNSSEC in Sweden: Five Years of Practical Experience Anne-Marie Eklund Löwinder Quality and Security Manager Amel@iis.se http://www.iis.se What s the problem Up until recently, DNSSEC looked like a solution

More information

DNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific

DNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific DNS Abuse Handling FIRST TC Noumea New Caledonia Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific 10 September 2018 1 The Domain Name System (DNS) The root

More information

Introduction. Prepared by: ICANN Org Published on: 12 January 2018

Introduction. Prepared by: ICANN Org Published on: 12 January 2018 Proposed Interim Models for Compliance with ICANN Agreements and Policies in Relation to the European Union s General Data Protection Regulation For Discussion Prepared by: ICANN Org Published on: 12 January

More information

President s Report 2009

President s Report 2009 President s Report 2009 Paul Twomey, President and CEO Public Forum 2 March 2009 At Large Summit New gtld Program IDN cctld Fast Track 2010 Operating Plan and Budget Improving Institutional Confidence

More information

Eight Minute Expert GDPR

Eight Minute Expert GDPR Eight Minute Expert GDPR GDPR Login Password MIN1 What is the GDPR? The General Data Protection Regulation is a new regulation by the EU that will replace the current Data Protection Directive of 1995.

More information

2016 APNIC Survey Results Asia Pacific Network Information Centre

2016 APNIC Survey Results Asia Pacific Network Information Centre 2016 APNIC Survey Results Asia Pacific Network Information Centre Conducted and prepared by Survey Matters. Agenda Survey Process and Methodology 3 Participation and Service Satisfaction 6 Respondents

More information

General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR) & WHOIS at ICANN Savenaca Vocea APNIC 46, Noumea 11 September 2018 About the General Data Protection Regulation (GDPR) The European Union s (EU s) GDPR aims to

More information

Yes. [No Response] General Questions

Yes. [No Response] General Questions General Questions Q1. Do you agree that the proposals to refine the WHOIS opt-out eligibility and to provide a framework for registrar privacy services meets the policy objectives set out in the consultation

More information

Cyber Security Congress 2017

Cyber Security Congress 2017 Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee

More information

Exploring Replacements for WHOIS A Next Generation Registration Directory Service (RDS)

Exploring Replacements for WHOIS A Next Generation Registration Directory Service (RDS) Exploring Replacements for WHOIS A Next Generation Registration Directory Service (RDS) EWG Consultation with the ICANN Community Wednesday 20 November, 2013 Registration Directory Service (RDS) Session

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

ICANN Policy Update & KSK Rollover

ICANN Policy Update & KSK Rollover ICANN Policy Update & KSK Rollover Savenaca Vocea VP, Stakeholder Engagement - Oceania Commonwealth Broadband Pacific Forum 2017, Apia, Samoa 25-27 July 2017 1 Overview Coordinating with our partners,

More information

Deploying the IETF s WHOIS Protocol Replacement

Deploying the IETF s WHOIS Protocol Replacement #ICANN51 16 October 2014 Deploying the IETF s WHOIS Protocol Replacement Francisco Arias Director, Technical Services Global Domains Division Edward Lewis Technical Services Sr. Manager Global Domains

More information

Draft Applicant Guidebook, v3

Draft Applicant Guidebook, v3 Draft Applicant Guidebook, v3 Module 5 Please note that this is a discussion draft only. Potential applicants should not rely on any of the proposed details of the new gtld program as the program remains

More information

What we did last OARC. Keith Mitchell DNS-OARC RIPE77 DNS WG Amsterdam, Oct 2018

What we did last OARC. Keith Mitchell DNS-OARC RIPE77 DNS WG Amsterdam, Oct 2018 What we did last OARC Keith Mitchell DNS-OARC RIPE77 DNS WG Amsterdam, Oct 2018 OARC's Mission Statement The Domain Name System Operations Analysis and Research Center (DNS-OARC) is a non-profit, membership

More information

Hogan Lovells Comments on the 3 ICANN Models for WHOIS Compliance with GDPR published on 12 January 2018

Hogan Lovells Comments on the 3 ICANN Models for WHOIS Compliance with GDPR published on 12 January 2018 Introduction Comments on the 3 ICANN Models for WHOIS Compliance with GDPR published on 12 January 2018 These comments are in response to the request from ICANN for comments on the three interim GDPR models

More information

APNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013

APNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database

More information

Security and Stability Advisory Committee!! Activities Update! ICANN Los Angeles Meeting! October 2014! #ICANN51

Security and Stability Advisory Committee!! Activities Update! ICANN Los Angeles Meeting! October 2014! #ICANN51 Security and Stability Advisory Committee!! Activities Update! ICANN Los Angeles Meeting! October 2014! 1 Agenda 1. Overview (5 minutes) 2. Recent Achievements (5 minutes) 3. IANA Functions Stewardship

More information

Registry Internet Safety Group (RISG)

Registry Internet Safety Group (RISG) Registry Internet Safety Group (RISG) Re: Potential for Malicious Conduct and new TLD Process RISG s mission is to facilitate data exchange and promulgate best practices to address Internet identity theft,

More information

CODEV-NIC free registry software

CODEV-NIC free registry software CODEV-NIC free registry software Stéphane Bortzmeyer AFNIC (".fr" registry) bortzmeyer@nic.fr 2 March 2006 1 CODEV-NIC free registry software Permission is granted to copy, distribute and/or modify this

More information

The European Platform in Network and Information Security (NIS) Fabio Martinelli

The European Platform in Network and Information Security (NIS) Fabio Martinelli The European Platform in Network and Information Security (NIS) Fabio Martinelli Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche IIT-CNR, Pisa, Italy Institute of Informatics and

More information

Proposed Interim Model for GDPR Compliance-- Summary Description

Proposed Interim Model for GDPR Compliance-- Summary Description Proposed Interim Model for GDPR Compliance-- Summary Description (The Calzone Model, 28 February 2018) Prepared by: ICANN Org I. Introduction The Proposed Interim Model balances competing elements of models

More information

MPLS Deployment. APNIC Technical Workshop September 28 to October 2, APNIC42, Colombo, Sri Lanka.

MPLS Deployment. APNIC Technical Workshop September 28 to October 2, APNIC42, Colombo, Sri Lanka. MPLS Deployment APNIC Technical Workshop September 28 to October 2, 2016. APNIC42, Colombo, Sri Lanka. Presenter Nurul Islam Roman Manager, Training & Technical Assistance, APNIC Nurul manages APNIC training

More information

DNSSEC at Scale. Dani Grant CloudFlare

DNSSEC at Scale. Dani Grant CloudFlare DNSSEC at Scale Dani Grant DNS @ CloudFlare CloudFlare - Authoritative DNS provider (includes DNSSEC for free) - 4M+ domains - 40+ billion queries per day - 76 edge locations in 40 countries (growing)

More information

RDAP Implementation. Francisco Arias & Gustavo Lozano 21 October 2015

RDAP Implementation. Francisco Arias & Gustavo Lozano 21 October 2015 RDAP Implementation Francisco Arias & Gustavo Lozano 21 October 2015 Agenda 1 2 3 History of Replacing WHOIS protocol gtld RDAP Profile RDAP Profile Details 4 5 Open Issues gtld RDAP Profile Conclusion

More information

DNSSEC for the Root Zone. ICANN 37 Nairobi March 2010

DNSSEC for the Root Zone. ICANN 37 Nairobi March 2010 DNSSEC for the Root Zone ICANN 37 Nairobi March 2010 Kim Davies, ICANN This design is the result of a cooperation between ICANN & VeriSign with support from the U.S. DoC NTIA Design Design Requirements

More information

Incident Command: The far side of the edge

Incident Command: The far side of the edge Incident Command: The far side of the edge Lisa Phillips Tom Daly Maarten Van Horenbeeck 30 POPs; 5 Continents; ~7Tb/sec Network Inspiration Program Goals FEMA National Incident Management Fire Department

More information

6056/17 MK/ec 1 DG D 2B

6056/17 MK/ec 1 DG D 2B Council of the European Union Brussels, 8 February 2017 (OR. en) 6056/17 OUTCOME OF PROCEEDINGS From: On: 20 January 2017 To: Subject: General Secretariat of the Council Horizontal Working Party on Cyber

More information

Internet Engineering Task Force (IETF) April Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC

Internet Engineering Task Force (IETF) April Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC Internet Engineering Task Force (IETF) Request for Comments: 6605 Category: Standards Track ISSN: 2070-1721 P. Hoffman VPN Consortium W.C.A. Wijngaards NLnet Labs April 2012 Abstract Elliptic Curve Digital

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

WELCOME ISO/IEC 27001:2017 Information Briefing

WELCOME ISO/IEC 27001:2017 Information Briefing WELCOME ISO/IEC 27001:2017 Information Briefing Denis Ryan C.I.S.S.P NSAI Lead Auditor Running Order 1. Market survey 2. Why ISO 27001 3. Requirements of ISO 27001 4. Annex A 5. Registration process 6.

More information

Alright, we will continue with Registries and Registrars and our first speaker is Steve who will talk about registrar basics is that correct, Steve?

Alright, we will continue with Registries and Registrars and our first speaker is Steve who will talk about registrar basics is that correct, Steve? PRAGUE Introduction to Registries and Registrars Sunday, June 24, 2012 00:00 to 00:00 ICANN - Prague, Czech Republic Alright, we will continue with Registries and Registrars and our first speaker is Steve

More information

The WHOIS: security and privacy issues

The WHOIS: security and privacy issues The WHOIS: security and privacy issues Giovanni Seppia CENTR General Manager giovanni@centr.org Network and Information security: political and technical challenges Introducing CENTR What is CENTR? Council

More information

Advisory Statement: Temporary Specification for gtld Registration Data

Advisory Statement: Temporary Specification for gtld Registration Data Advisory Statement: Temporary Specification for gtld Registration Data Adopted on 17 May 2018 by ICANN Board Resolutions 2018.05.17.01 2018.05.17.09 On 17 May 2018, the ICANN Board of Directors (ICANN

More information

In Accountable IoT We Trust

In Accountable IoT We Trust In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design

More information

Reference Architecture for the Operationalization of a BCMS. Boban Kršić, Chief Information Security Officer. verinice.xp - Berlin, 07.

Reference Architecture for the Operationalization of a BCMS. Boban Kršić, Chief Information Security Officer. verinice.xp - Berlin, 07. Reference Architecture for the Operationalization of a BCMS Boban Kršić, Chief Information Security Officer verinice.xp - Berlin, 07. February 2017 DENIC Mission Founded in 1996 as a cooperative in Frankfurt

More information

Update on ICANN Domain Name Registrant Work

Update on ICANN Domain Name Registrant Work 1 Update on ICANN Domain Name Registrant Work Brian Gutterman Registrant Program Manager GDD Strategic Programs ICANN60 1 November 2017 2 Agenda Focus on Registrants Service and Information Domain Name

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

ICANN GDPR Proposed Models Redaction Proposal EXECUTIVE SUMMARY:

ICANN GDPR Proposed Models Redaction Proposal EXECUTIVE SUMMARY: EXECUTIVE SUMMARY: The ICANN Redaction Model is proposed as an interim solution while ICANN Org and the community develop a long-term replacement to WHOIS. If adopted, registries and registrars do not

More information

DNSSEC the.se way: Overview, deployment and lessons learned. Anne-Marie Eklund Löwinder Quality & Security Manager

DNSSEC the.se way: Overview, deployment and lessons learned. Anne-Marie Eklund Löwinder Quality & Security Manager DNSSEC the.se way: Overview, deployment and lessons learned Anne-Marie Eklund Löwinder Quality & Security Manager My agenda Getting Started Finding out about.se Finding out what DNS does for you Why DNSSEC?

More information

Identifier Technology Health Indicators (ITHI) Alain Durand, Christian Huitema 13 March 2018

Identifier Technology Health Indicators (ITHI) Alain Durand, Christian Huitema 13 March 2018 Identifier Technology Health Indicators (ITHI) Alain Durand, Christian Huitema 13 March 2018 ITHI Principles of Operation Technical focus Problem areas à Metrics à Measurement Current value and trend over

More information

DRAFT: gtld Registration Dataflow Matrix and Information

DRAFT: gtld Registration Dataflow Matrix and Information DRAFT: gtld Registration Dataflow Matrix and Information Summary of Input Received From Contracted Parties and Interested Stakeholders. Version 2 6 November 2017 ICANN DRAFT: gtld Registration Dataflow

More information

Implementation Strategy for Cybersecurity Workshop ITU 2016

Implementation Strategy for Cybersecurity Workshop ITU 2016 Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential

More information

Impacts of the GDPR in Afnic - Registrar relations: FAQ

Impacts of the GDPR in Afnic - Registrar relations: FAQ Impacts of the GDPR in Afnic - Registrar relations: FAQ Background The adoption of Regulation (Eu) 2016/679 of the European Parliament and of the Council of April 27, 2016 on the protection of natural

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

Université Cheikh Anta DIOP de Dakar. DNS Ecosystem. IROC Workshop October UCAD II

Université Cheikh Anta DIOP de Dakar. DNS Ecosystem. IROC Workshop October UCAD II Université Cheikh Anta DIOP de Dakar DNS Ecosystem IROC Workshop October 3-7 2016 UCAD II 1 Internet view The InterNet: the network of networks How Internet Works Each node connected to Internet uses an

More information

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013 Trustworthy ICT FP7-ICT-2013-10 Objective 1.5 WP 2013 1 General Overview Focused in a limited number of technologies in emerging application of high economic impact in the security area, Cloud Computing

More information

RIPE Network Coordination Centre. K-root and DNSSEC. Wolfgang Nagele RIPE NCC.

RIPE Network Coordination Centre. K-root and DNSSEC. Wolfgang Nagele RIPE NCC. K-root and DNSSEC Wolfgang Nagele RIPE NCC RIPE NCC One of the five Regional Internet Registries Provides IP address and AS number resources to Europe and Middle-East regions DNS related work - Parent

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

Supporting Internet Growth and Evolution: The Transition to IPv6

Supporting Internet Growth and Evolution: The Transition to IPv6 2010/TEL41/DSG/WKSP2/004 Agenda Item: Panel Discussion 1 Supporting Internet Growth and Evolution: The Transition to IPv6 Submitted by: APNIC Workshop for IPv6: Transforming the Internet Chinese Taipei

More information

CompTIA Security+ Study Guide (SY0-501)

CompTIA Security+ Study Guide (SY0-501) CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes

More information

Centre for cybersecurity Belgium : Role, Missions et future capacities

Centre for cybersecurity Belgium : Role, Missions et future capacities Centre for cybersecurity Belgium : Role, Missions et future capacities NLO meeting 30/01/2018 Phédra Clouner Deputy Director CCB 01 CCB mission & services Page 2 Legal Basis R.D. 10/10/2014 Contribute

More information

ECTA POSITION PAPER ON WHOIS

ECTA POSITION PAPER ON WHOIS 23 May 2018 ECTA POSITION PAPER ON WHOIS I. INTRODUCTION The Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to

More information

Facing Up to the Challenges

Facing Up to the Challenges Information Security, Data Breaches and Protecting Cardholder Information: Facing Up to the Challenges SEPTEMBER 13-14, 2006 Account Number PIN Number Social Security Number Social Security Number Information

More information

Experience Security, Risk, and Governance

Experience Security, Risk, and Governance Experience Security, Risk, and Governance Agenda and recommended event path 26 28 March Vienna, Austria Contents 3 Welcome 4 Overview 5 Evening Programs 6 Sessions at-a-glance 11 Digital Transformation

More information

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:

More information

RIPE NCC DNS Update. Wolfgang Nagele DNS Services Manager

RIPE NCC DNS Update. Wolfgang Nagele DNS Services Manager RIPE NCC DNS Update Wolfgang Nagele DNS Services Manager DNS Department Services Reverse DNS for RIPE NCC zones Secondary for other RIRs K-root F-reverse (in-addr.arpa & ip6.arpa) Secondary DNS for cctlds

More information

Rights Protection Mechanisms: User Feedback Session

Rights Protection Mechanisms: User Feedback Session 15 October 2014 Rights Protection Mechanisms: User Feedback Session Agenda Introduction (10) Panel & Interactive Discussion (50) o Trademark Clearinghouse o Sunrise Period o Trademark Claims Service o

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

RDAP Implementation. 7 March 2016 Francisco Arias & Gustavo Lozano ICANN 55 7 March 2016

RDAP Implementation. 7 March 2016 Francisco Arias & Gustavo Lozano ICANN 55 7 March 2016 RDAP Implementation 7 March 2016 Francisco Arias & Gustavo Lozano ICANN 55 7 March 2016 Agenda 1 2 3 Introduction [10 min] Differentiated Access [15 min] Thick Whois vs Registrar s RDAP [20 min] 4 5 Registrar

More information

DNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010

DNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010 DNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010 Kim Davies Manager, Root Zone Services Internet Corporation for Assigned Names & Numbers Recap DNS originally not designed with

More information

CISO View: Top 4 Major Imperatives for Enterprise Defense

CISO View: Top 4 Major Imperatives for Enterprise Defense CISO View: Top 4 Major Imperatives for Enterprise Defense James Christiansen Chief Information Security Officer Evantix, Inc. Gary Terrell CIPP Chief Information Security Officer Adobe Session ID: Star

More information

Afilias DNSSEC Practice Statement (DPS) Version

Afilias DNSSEC Practice Statement (DPS) Version Afilias DNSSEC Practice Statement (DPS) Version 1.07 2018-02-26 Page 1 of 8 1. INTRODUCTION 1.1. Overview This document was created using the template provided under the current practicing documentation.

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18

The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18 The emerging EU certification framework: A role for ENISA Dr. Andreas Mitrakas Head of Unit EU Certification Framework Conference Brussels 01/03/18 European Union Agency for Network and Information Security

More information

Data-Gathering for Recent DNS Events Keith Mitchell OARC Programme Manager Internet Systems Consortium UKNOF7 3rd Apr 2007

Data-Gathering for Recent DNS Events Keith Mitchell OARC Programme Manager Internet Systems Consortium UKNOF7 3rd Apr 2007 Data-Gathering for Recent DNS Events Keith Mitchell OARC Programme Manager Internet Systems Consortium UKNOF7 3 rd Apr 2007 What is OARC? Operations, Analysis and Research Center for the Internet Co-ordination

More information

Incident Response WG Status

Incident Response WG Status Incident Response WG Status Joerg Schweiger WG Chair Cartagena, December 2010, ICANN ccnso Meeting Charter Purpose assist in implementing sustainable mechanisms

More information

About SaudiNIC. What we have done.. ( ) What is Next.. ( ) Lessons learned

About SaudiNIC. What we have done.. ( ) What is Next.. ( ) Lessons learned About SaudiNIC What we have done.. ( ) What is Next.. ( ) Lessons learned SaudiNIC is a non-profit unit that is operated by Communication and Information Technology Commission (CITC) which is a semi-governmental

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

RIPE Address Policy Working Group

RIPE Address Policy Working Group RIPE 62, Amsterdam 1 RIPE Address Policy Working Group May 5, 2011 RIPE 62, Amsterdam WG Chairs: Gert Döring, & Sander Steffann please remember: this session is webcast Agenda APWG overall Agenda A. administrative

More information

African Domain Name System Market Study 2016

African Domain Name System Market Study 2016 African Domain Name System Market Study 2016 54 African countries, including 6 Indian and Atlantic Ocean Islands Identify strengths and weaknesses in the industry ecosystem within the region Develop recommendations

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Agenda. IETF 102 Preview Recognition Technical Plenary The Future of Internet Access IAB, IAOC, and IESG open mic sessions

Agenda. IETF 102 Preview Recognition Technical Plenary The Future of Internet Access IAB, IAOC, and IESG open mic sessions IETF 101 Plenary Agenda Welcome Host presentation Brief updates on hot topics IETF Chair report Administrative topics IRTF update NomCom report and requests Jonathan B. Postel Award nominee solicitation

More information

IoT and Privacy by Design

IoT and Privacy by Design IoT and Privacy by Design A recap on previous presentation More recent work on GDPR, NIS Cyber Security, and the Human Right to Privacy The design process for consumer goods and services 2 current examples

More information

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made

More information

Thank you. So, there was the echo.

Thank you. So, there was the echo. COPHAG ccnso TLD-OPS Standing Committee COPHAG ccnso TLD-OPS Standing Committee Sunday, March 12, 2017 13:45 to 15:00 CET ICANN58 Copenhagen, Denmark It is Sunday, March 12 th, 2017 in Hall B41 for the

More information

Intellectual Property Constituency (IPC)

Intellectual Property Constituency (IPC) Contractual Compliance Intellectual Property Constituency (IPC) Tuesday, 14 October 2014 Agenda Registrar Related Update since ICANN 50 Registry Related Update since ICANN 50 Audit Programs Update Questions

More information

ICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia

ICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia ICANN and Russia Dr. Paul Twomey President and CEO 10 June 2007 1 ICANN s mission To coordinate, overall, the global Internet's system of unique identifiers, and to ensure stable and secure operation of

More information

Programme. Legal Instruments for the Internet Economy. Building Capacity and Implementing Regulation. Malta, 14 th to 19 th September, 2015

Programme. Legal Instruments for the Internet Economy. Building Capacity and Implementing Regulation. Malta, 14 th to 19 th September, 2015 A MALTA COMMONWEALTH THIRD COUNTRY TRAINING PROGRAMME Programme Legal Instruments for the Internet Economy Building Capacity and Implementing Regulation Malta, 14 th to 19 th September, 2015 www.diplomacy.edu/courses/legalinstruments2015

More information

Introduction to ISO/IEC 27001:2005

Introduction to ISO/IEC 27001:2005 Introduction to ISO/IEC 27001:2005 For ISACA Melbourne Chapter Technical Session 18 th of July 2006 AD Prepared by Endre P. Bihari JP of Performance Resources What is ISO/IEC 17799? 2/20 Aim: Creating

More information

APTLD & MYNIC JOINT SURVEY

APTLD & MYNIC JOINT SURVEY INTERNET SECURITY & CCTLDS SURVEY RESULTS 24 th June 2008, Tuesday ccnso meeting, Paris, France Survey Objectives Survey Summary:- For APTLD members to examine the roles and responsibilities of cctlds

More information

Proposal for a model to address the General Data Protection Regulation (GDPR)

Proposal for a model to address the General Data Protection Regulation (GDPR) Proposal for a model to address the General Data Protection Regulation (GDPR) Introduction Please find the Executive Summary of the data model in Part A of this document. Part B responds to the requirements

More information

Root KSK Roll Delay Update

Root KSK Roll Delay Update Root KSK Roll Delay Update PacNOG 21 Patrick Jones, Sr. Director, Global Stakeholder Engagement 4 December 2017 1 Background When you validate DNSSEC signed DNS records, you need a Trust Anchor. A Trust

More information

Operations, Analysis and Research Center for the Internet Co-ordination centre to protect Global DNS infrastructure Trusted, neutral environment for

Operations, Analysis and Research Center for the Internet Co-ordination centre to protect Global DNS infrastructure Trusted, neutral environment for Recent DNS Events and OARC Activities Keith Mitchell OARC Programme Manager Internet Systems Consortium RIPE54 DNS WG Tallinn, Estonia May 2007 What is OARC? Operations, Analysis and Research Center for

More information

Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands

Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life s conference provides the ideal setting for the industry to come together to discuss its progress

More information

Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves

Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves Ray Stanton Interim Group CiSO & Director Digital Risk, National Grid &, Group CiSO/CiRO, Redwood Technologies Group 9 th May 2017

More information

CEH: CERTIFIED ETHICAL HACKER v9

CEH: CERTIFIED ETHICAL HACKER v9 CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever

More information

Anti-Phishing Working Group

Anti-Phishing Working Group Anti-Phishing Working Group www.antiphishing.org DNS Policy Sub-Committee Overview Rod Rasmussen Rod.Rasmussen@InternetIdentity.com Anti-Phishing Working Group Launched in 2003 2600+ members 1600+ companies

More information

Name Collision Occurrence Management Framework

Name Collision Occurrence Management Framework 23 June 2014 Name Collision Occurrence Management Framework Francisco Arias Director, Technical Services Global Domains Division Agenda Introduction & Background SSAC Comment Concerning JAS Phase One Report

More information

IO7- E-learning pilot planning and evaluation report

IO7- E-learning pilot planning and evaluation report Project Number: 2014-1-ES01-KA200-004372 Intergeneration Mentoring for Entrepreneurs IO7- E-learning pilot planning and evaluation report The European Commission support for the production of this publication

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice ISSN: March 2017

Internet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice ISSN: March 2017 Internet Engineering Task Force (IETF) Request for Comments: 8109 BCP: 209 Category: Best Current Practice ISSN: 2070-1721 P. Koch DENIC eg M. Larson P. Hoffman ICANN March 2017 Initializing a DNS Resolver

More information

DNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific

DNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific DNS/DNSSEC Workshop In Collaboration with APNIC and HKIRC Hong Kong Champika Wijayatunga Regional Security Engagement Manager Asia Pacific 22-24 January 2018 1 Agenda 1 2 3 Introduction to DNS DNS Features

More information

DS TTL shortening experience in.jp

DS TTL shortening experience in.jp DS TTL shortening experience in.jp APRICOT2014 DNS Session 27 Feb 2014 Yoshiro YONEYA Copyright 2014 Japan Registry Services Co., Ltd. 1 What is DS? Establish a DNSSEC chain

More information

The SPARKS Project Motivation, Objectives and Results

The SPARKS Project Motivation, Objectives and Results The SPARKS Project Motivation, Objectives and Results Paul Smith paul.smith@ait.ac.at AIT Austrian Institute of Technology SEGRID Project Workshop 14 th November, 2016, Barcelona, Spain The SPARKS Project

More information

Rolling the Root Zone DNSSEC Key Signing Key Edward Lewis AFRINIC25 November 2016

Rolling the Root Zone DNSSEC Key Signing Key Edward Lewis AFRINIC25 November 2016 Rolling the Root Zone DNSSEC Key Signing Key Edward Lewis AFRINIC25 November 2016 edward.lewis@icann.org 1 Motivation for this talk ICANN is about to change an important configuration parameter in DNSSEC

More information

Reviewing New gtld Program Safeguards Against DNS Abuse. ICANN Operations and Policy Research 28 January 2016

Reviewing New gtld Program Safeguards Against DNS Abuse. ICANN Operations and Policy Research 28 January 2016 Reviewing New gtld Program Safeguards Against DNS Abuse ICANN Operations and Policy Research 28 January 2016 Discussion Details This discussion is being recorded. Recordings and supporting materials will

More information