CRCC Information for Distinguished Regional Guests. Updated 4/13/15
|
|
- Hilary Parks
- 6 years ago
- Views:
Transcription
1 CRCC 2015 Information for Distinguished Regional Guests Updated 4/13/15
2 Central Region Communications Conference (CRCC) Summary 12 Partner Nations Invited 2 Recurring U.S. Central Command (USCENTCOM)-led multilateral, multi-stakeholder (government + private-sector) engagement with regional senior information and communications technology (ICT) leaders A unique opportunity to merge military, legislative and regulatory leadership perspectives for a more robust understanding of each sector s role in national security Purpose is to foster relationships and encourage international exchange and dialogue on ICT issues of common interest to: Support regional stability, economic development, global commerce Enhance partnerships as a foundation for ongoing cooperation Address future challenges to include crisis response / disaster relief Increase awareness of mutually beneficial ICT approaches Promote interoperability between communications systems Promote common hardware, software, processes & data standards Mature multilateral, multi-stakeholder approaches Afghanistan, Bahrain, Egypt, Iraq, Jordan, Kuwait, Lebanon, Oman, Qatar, Saudi Arabia, UAE, Yemen Primary Audience Regional Ministers of Communication and Information Technology and their US counterparts Regional Senior Regulatory Authorities and their US counterparts Regional Senior Military Communications Officers and their US counterparts DC-based Ambassadors from each partner nation Principal US Participation U.S. Central Command (USCENTCOM) as Host Department of Defense (DoD) Department of State (DoS) Federal Communications Commission (FCC) Department of Commerce (DoC) Department of Homeland Security (DHS) Private-Sector (industry / academia)
3 UNCLASSIFIED Partner Information Exchanges 2009 Manama Bahrain 2010 Amman Jordan 2012 Washington DC 2014 Washington DC 2015 Wash DC May 2015 Central Region Communications Conference (CRCC) CRCC Key Takeaways: Cyber security remains a timely and relevant regional topic Government partnership with industry and academia is essential National cyber security self-assessments / strategies are essential first steps Regional partners want / need cyber security training UNCLASSIFIED
4 4 CRCC 2015 Summary May May DV Reception May Conference Sessions CRCC will be held at Marriott Washington Dulles Hotel Marriott Washington Dulles Hotel Aviation Drive Dulles, Virginia USA Phone: Theme Building a Secure, Reliable and Interoperable Global Telecommunication Infrastructure
5 5 Supporting Attendance Information for Distinguished Regional Guests Where to stay: For the convenience of our distinguished regional guests it is highly recommended they stay at the conference hotel, the Marriott Washington Dulles Hotel at Aviation Drive Dulles, Virginia USA Please reserve rooms by April 17, 2015 How to get there: The hotel will provide a shuttle from Dulles International Airport What to wear: Reception for Distinguished Guests (May 12): Gentlemen: Business / National Dress Ladies: Business (dress, pants outfit) / National Dress Conference Sessions (13,14 May): Gentlemen: Business / National Dress / Class A Uniform (General / Flag Officers Only) Ladies: Business (dress, pants outfit) / National Dress / Class A Uniform (General / Flag Officers Only)
6 6 CRCC 2015 Desired Information Sharing in Presentations & Discussions Experiences and perspectives regarding national cyber security strategies, initiatives and challenges Presentations and remarks regarding the legal, regulatory, policy, and standards environments impacting national cyber security strategies Key national roles in forming and promoting cyber security strategies, policies and standards The state of cyber security collaboration and information exchange within respective governments and among regional and international communities The state of national incident management efforts (e.g., progress towards national CERTs) Progress towards a culture of security and examples of public and private-sector collaboration
7 CRCC 2015 Topics for Roundtable and Panel Discussions 7 National Strategies, Policies, and Standards Build on the 2014 focus on national strategies, extended to supporting policies and standards Watch, Warning and National Incident Response How each nation addresses the need and authorities for intra/inter-governmental coordination on cyber security to include establishment of national computer security incident response teams (CSIRT) CSIRTs was the subject of a April 24, 2014 Webinar co-hosted by USCENTCOM and Department of State, with presentations by Department of Homeland Security, Packet Clearing House, and Carnegie Mellon s Software Engineering Institute CERT. SCADA and the Protection of Critical Infrastructures A topic of great regional interest and subject of a August 28, 2014 Webinar co-hosted by USCENTCOM and Department of State, with presentations by National Defense University, Department of Energy, and Department of Homeland Security Cooperation Among Government, Industry, Academia and Civil Society How each nation fosters cooperation within and across respective communities Regional / International Cooperation The role of regional and international cooperation in advancing respective national cyber security programs
8 8 Information Requested from Regional Guests Prior to the Conference For presenters request presentations two weeks in advance Dual Arabic / English (each line of text) or English-only preferred Biography, with photo preferred Full name with rank and position title if not in the biography Short name or how they prefer to be addressed (for the badge) English proficiency (e.g., excellent, some English, interpreter requested) Travel arrangements Arrival day, time and airline once known Support anticipated from respective embassy in DC For example, will the DC-based embassy coordinate pickup and drop-off at the airport? Food allergies and restrictions The hotel does not serve halal meals, but will offer vegetarian dishes Please indicate in response requests for vegetarian dishes
9 9 CRCC 2015 Proposed Regional Participation The Islamic Republic of Afghanistan Ministry of Information and Communications Technology Ministry of Defense The Kingdom of Bahrain Ministry of Interior Bahrain Economic Development Board Telecommunications Regulatory Authority Bahrain Defense Forces The Arab Republic of Egypt Ministry of Communications and Information Technology National Telecommunications Regulatory Authority Egypt CERT Egyptian Armed Forces The Republic of Iraq Ministry of Communications Prime Minister s Advisory Commission Communications and Media Commission Ministry of Defense The Hashemite Kingdom of Jordan Ministry of Information and Communications Technology Telecommunications Regulatory Commission Jordan Armed Forces The State of Kuwait Ministry of Communications Kuwait Armed Forces By invitation only The State Of Lebanon Ministry of Communications Lebanese Armed Forces The Sultanate of Oman Ministry of Transport and Communications Ministry of Commerce and Industry Oman Information Technology Authority Oman National CERT Sultan's Armed Forces The State of Qatar Supreme Council for ICT Qatar CERT Qatari Armed Forces The Kingdom of Saudi Arabia Ministry of Interior DC-based Ambassadors of partner nations and respective Defense Attachés consistent with approach for CRCC 2014 Ministry of Communications and Information Technology Communications and Information Technology Commission Saudi Arabia CERT Ministry of Defense The United Arab Emirates (U.A.E.) Ministry of Economy (addresses communications) Telecommunications Regulatory Authority UAE CERT UAE Armed Forces The Republic of Yemen Ministry of Telecommunications and IT Public Telecommunication Corporation Yemen Armed Forces
10 10 CRCC 2015 Proposed US Participation Department of Defense (DoD) U.S. Central Command (Host) DoD Chief Information Officer (CIO) Office of Secretary of Defense, Cyber Policy Joint Staff J5 Joint Staff J6 / CIO U.S. Cyber Command Defense Information Systems Agency Department of State Office of International Communications and Information Policy Office of the Coordinator for Cyber Issues Bureau of Near East Affairs Federal Communications Commission (FCC) Department of Homeland Security Department of Commerce Department of Energy National Defense University (NDU) Private-Sector (Industry and Academia) Key to credible multi-stakeholder message USTTI identifies/invites industry reps NDU identifies/invites academia reps
Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More information25-27 February 2019 The Ritz-Carlton Bahrain Manama, Bahrain
25-27 February 2019 The Ritz-Carlton Bahrain Manama, Bahrain Under the Patronage of His Excellency, Lieutenant General, Sheikh Rashid bin Abdullah Al Khalifa, Minister of Interior, Kingdom of Bahrain Sponsorship
More informationInput on Proposals and Positions for 2016 World Telecommunication Standardization
This document is scheduled to be published in the Federal Register on 05/17/2016 and available online at http://federalregister.gov/a/2016-11609, and on FDsys.gov Billing Code 3510-60-P DEPARTMENT OF COMMERCE
More informationVenue. Sheraton Oman Hotel. P. O. Box 3260, Ruwi 112 Muscat, Sultanate of Oman Tel: Website:
Venue Sheraton Oman Hotel Sheraton Oman Hotel P. O. Box 3260, Ruwi 112 Muscat, Sultanate of Oman Tel: +968 2237 7777 Website: http://www.sheratonoman.com For reservations, please contact: Ms. Mary Antonette
More informationBrussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER
COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38
More informationNational Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director
National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best
More informationMs. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations
Opening Remarks by Ms. Izumi Nakamitsu, High Representative for Disarmament Affairs, at the High-Level Event on Cyber Security, hosted by the Prime Minister of Bangladesh Ms. Izumi Nakamitsu High Representative
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF
SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security
More informationNational Cyber Incident Response - Architectural Concepts
CSIRT Contributions to National Cyber Incident Response: An Architectural Perspective with U.S. Examples Bradford J. Willke Team Lead, Information Security Assessment & Evaluation Survivable Enterprise
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationResolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)]
United Nations A/RES/62/91 General Assembly Distr.: General 8 February 2008 Sixty-second session Agenda item 71 (a) Resolution adopted by the General Assembly [without reference to a Main Committee (A/62/L.30
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationPresentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT
Presentation to the ITU on the Q-CERT Incident Management Team Ian M Dowdeswell Incident Manager, Q-CERT 2 Q-CERT Mission The Mission of Q-CERT is to be a world-class center of excellence providing expert
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationRegional Workshop on Frameworks for Cybersecurity and CIIP Feb 2008 Doha, Qatar
Regional Workshop on Frameworks for Cybersecurity and CIIP 18 21 Feb 2008 Doha, Qatar A National Cybersecurity Strategy aecert Roadmap Eng. Fatma Bazargan aecert Project Manager Technical Affairs Department
More informationFundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment
Fundamentals of Cybersecurity/CIIP Building Capacity: Using a National Strategy & Self- Presented to: 2009 ITU Regional Cybersecurity Forum for Asia-Pacific Connecting the World Responsibly 23-25 25 September
More informationResolution: Advancing the National Preparedness for Cyber Security
Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationINTRODUCTION OVERVIEW ON CYBERCRIME
INTRODUCTION OVERVIEW ON CYBERCRIME 1 Global Coalition ITU-IMPACT s Global Alliances 2 IMPACT Introduction The International Multilateral Partnership Against Cyber Threats (IMPACT) was established in 2008
More informationThe Arab ICT Organization
The Arab ICT Organization UNCITRAL, 21-22 April, 2016 The Arab ICT Organization SUMMARY I. About AICTO : creation, organs, membership II. objectives III. Action Plan IV. Working groups V. Projects : the
More informationDr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt
Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?
More informationCyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation
Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED
More informationThe Middle East Bureau Shaping the future of the Internet together
Presentation to the Internet Society Board of Trustees The Middle East Bureau Shaping the future of the Internet together Friday 9 November 2018 Marriott Marquis Queen's Park Hotel Bangkok, Thailand Outline
More informationThe African Internet Governance Forum AfIGF December 2017 Hyatt Regency Hotel, Sharm El-Sheikh, Egypt
The African Internet Governance Forum AfIGF 2017 4 6 December 2017 Hyatt Regency Hotel, Sharm El-Sheikh, Egypt Draft Outcome Document: Recommendations Background of AfIGF The African Internet Governance
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationMadam Chair, the Secure World Foundation (SWF) extend our congratulations to you on your
Secure World Foundation Exchange of Views Statement United Nations Committee on the Peaceful Uses of Outer Space Scientific and Technical Subcommittee 31 January 2017 Madam Chair, the Secure World Foundation
More informationCall for Expressions of Interest
Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...
More informationResolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]
United Nations General Assembly Distr.: General 9 February 2010 Sixty-fourth session Agenda item 50 Resolution adopted by the General Assembly [on the report of the Second Committee (A/64/417)] 64/187.
More informationNATO Partnerships. Arina DANILA Planning, Policy and Partnerships Section Strategy Directorate, Defence Investment Division 10 November 2011
NATO Partnerships Arina DANILA Planning, Policy and Partnerships Section Strategy Directorate, Defence Investment Division 10 November 2011 1 Outline The Big Picture A network of partnerships About the
More informationThe President s Spectrum Policy Initiative
The President s Spectrum Policy Initiative THE PRESIDENT S SPECTRUM POLICY INITIATIVE SPECTRUM MANAGEMENT FOR THE 21 ST CENTURY SPECTRUM MANAGEMENT REFORM Presentation To The National Academies Committee
More informationJOINT MEDIA STATEMENT
The 18 th ASEAN Telecommunications and Information Technology Ministers Meeting and Related Meetings Bali, Indonesia, 6 December 2018 JOINT MEDIA STATEMENT 1. The 18 th ASEAN Telecommunications and Information
More informationCritical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level
Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,
More informationUAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory
UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives
More informationDisaster Risk Management Unit 2015
Disaster Risk Management Unit 2015 Earthquakes Tsunami Floods Landslides Forest Fires Wars and armed conflicts Explosions Major Hazards that Threaten Lebanon Needs Assessment The UNDP / Presidency of Council
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationCybersecurity Risk Management:
Cybersecurity Risk Management: Building a Culture of Responsibility G7 ICT and Industry Multistakeholder Conference September 25 2017 Adam Sedgewick asedgewick@doc.gov Cybersecurity in the Department of
More informationPlenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014
Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 WGPL AHG Document DL/13(Rev.2)- E 28 October 2014 English only WGPL Ad Hoc Group on Resolution 174 RESOLUTION 174 (GUADALAJARA, 2010REV.
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationANNOUNCEMENT. United Nations / Germany High Level Forum: The way forward after UNISPACE+50 and Space2030
ANNOUNCEMENT United Nations / Germany High Level Forum: The way forward after UNISPACE+50 and Space2030 Organized by the United Nations Office for Outer Space Affairs (UNOOSA) and German Space Administration
More informationU.S. CHAMBER DELEGATION TO CYBER WEEK TEL AVIV, ISRAEL J U N E ,
U.S. CHAMBER DELEGATION TO CYBER WEEK TEL AVIV, ISRAEL J U N E 2 3-2 6, 2 0 1 9 Cyber Week Tel Aviv, 2019 Now in its 9th year, Cyber Week is recognized as one of the top international cybersecurity conferences
More informationGUIDING PRINCIPLES I. BACKGROUND. 1 P a g e
GUIDING PRINCIPLES I. BACKGROUND At the Summit of the Americas held in Port-of-Spain, Trinidad and Tobago, in April 2009, the leaders of the Western Hemisphere noted that energy challenges are among the
More informationForum. Ningbo, China 25 February
2014/SOM1/SCE-COW/014 Agenda Item: 4 Telecommunications and Inform ation Working Group Strategic Plan Purpose: Consideration Submitted by: TEL Chair Forum Doc. No.: 2013/SOM3/SCE/017 SOM Steering Committee
More informationDr Jarrah AlZubi MDG+ Technical Advisor
Dr Jarrah AlZubi MDG+ Technical Advisor jarrah_alzubi@acwua.org Reducing water losses (non-revenue water) in urban water utilities: experiences from the Mediterranean, January 22-23, 2013 Center for Mediterranean
More informationRegional Development Forum For the Arab States(RDF-ARB) 2018
Regional Development Forum For the Arab States(RDF-ARB) 2018 ICT4SDGs: Towards the implementation of WTDC17 outcomes Algiers, Algeria 12, 13 February 2018 Background Concept Note In the framework of the
More informationArab Regional Initiatives and Projects
Workshop for Maghreb countries to promote the development and implementation of Conformity Assessment programs, Tunis (Tunisia), 9 11 December 2014 Arab Regional Initiatives and Projects 2011-2014, 2015-2018
More informationPrioritized Action Plan of the Arab Strategy for Disaster Risk Reduction 2030
Prioritized Action Plan 2018-2020 of the Arab Strategy for Disaster Risk Reduction 2030 1. Preamble to implement the Sendai Framework for Disaster Risk Reduction 2015-2030 1.1. The Sendai Framework for
More informationAsia-Europe Environment Forum (ENVforum) Report to the ASEM Environment Ministers Meeting 25 April 2007 Copenhagen, Denmark
Asia-Europe Environment Forum (ENVforum) Report to the ASEM Environment Ministers Meeting 25 April 2007 Copenhagen, Denmark Your Excellencies, Distinguished Ministers, ladies and gentlemen We wish to thank
More informationCritical Infrastructure Resilience
Critical Infrastructure Resilience Climate Resilience Webinar Series U.S. Department of Housing and Urban Development Disclaimer This presentation is intended to provide communities and states with the
More informationThe GCC Interconnection Grid
GCC Interconnection Authority The GCC Interconnection Grid ME Power & Water Conference Abu Dhabi, UAE Nabeel H. Al-Maskati, PhD Hassan K. Al-Asaad, Asaad, MBA March 2007 Background Gulf Cooperation Council
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour
More informationCritical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.
Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,
More informationCONNECT ARAB STATES SUMMIT
CONNECT ARAB STATES SUMMIT Doha, Qatar, 5-7 March 2012 Draft Concept Paper Overview The Connect Arab States Summit is being organized by the International Telecommunication Union (ITU) in partnership with
More informationSAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity
SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,
More informationPIPELINE SECURITY An Overview of TSA Programs
PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the
More informationInternational Policy Division, Global ICT Strategy Bureau
MIC International Policy Division, Global ICT Strategy Bureau Communications News Newsletter of the Ministry of Internal Affairs and Communications(MIC), Japan Please Feel free to use articles in this
More informationCONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE
CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 18-19 APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 At the Trieste Western Balkans Summit, we stressed the importance of the
More informationOAS Cybersecurity Capacity Building Efforts
OAS Cybersecurity Capacity Building Efforts Are We Ready in Latin America and the Caribbean? 2016 Cybersecurity Report www.cybersecurityobservatory.com The opinions expressed in this publication are of
More informationRESOLUTION 130 (Rev. Antalya, 2006)
Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference
More informationMember of the County or municipal emergency management organization
EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,
More informationCybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More informationARRA State & Local Energy Assurance Planning & Implementation
State Energy Policy and Technology Outlook Conference February 2, 2010, Washington, DC ARRA State & Local Energy Assurance Planning & Implementation Alice Lippert Senior Technical Advisor Office of Electricity
More informationUAE Space Policy Efforts Towards Long Term Sustainability of Space Activities Agenda Item 4; COPUOS June 2017 By: Space Policy and
UAE Space Policy Efforts Towards Long Term Sustainability of Space Activities Agenda Item 4; COPUOS 2017 07-16 June 2017 By: Space Policy and Regulations Directory 1 The UAE will build the first city on
More informationINDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS
SEPTEMBER 2017 INDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS INDIA UAE Over the years UAE is India s 3rd largest trade partner globally UAE is the second largest export destination of
More informationITU- Arab Regional Cyber Security Center s Activities & Regional Threats landscape
ITU- Arab Regional Cyber Security Center s Activities & Regional Threats landscape ENG. BADAR ALI ALSALEHI HEAD OF ITU-ARAB REGIONALCYBER SECURITY CENTER DG OF OMAN NATIONAL CERT Dar es Salaam November
More informationInnovative solutions for rolling out broadband in the local loop: What really matters?
Innovative solutions for rolling out broadband in the local loop: What really matters? Experience from the WB analytical work applicable to the specific case of Iraq Natalija Gelvanovska Enabling Broadband
More informationIsrael and ICS Cyber Security
Israel and ICS Cyber Security Dr. Tal Steinherz Chief Technology Office Israel (INCB) 1 October 2015 The INCB The Israeli leads efforts and advises the government on: Cyber Ecosystem Establishing techno-scientific
More informationYour Technology and Network is safe with us!!!
Your Technology and Network is safe with us!!! Naizak Distribution, part of Abdul Karim Holding group (AKH) is one of the leading value add distributors (VAD) of security, systems administration, cloud,
More informationAFRICA AND MIDDLE EAST AVIATION SECURITY ROADMAP
AFRICA AND MIDDLE EAST AVIATION SECURITY ROADMAP GASeP: The Roadmap to foster Aviation Security in Africa and the Middle East Sharm El Sheikh, Egypt, 22-24 August 2017 REGIONAL MINISTERIAL CONFERENCE ON
More informationThe United Republic of Tanzania. Domestication of Sustainable Development Goals. Progress Report. March, 2017
The United Republic of Tanzania Domestication of Sustainable Development Goals Progress Report March, 2017 Prepared by the National Bureau of Statistics Table of Contents 1. Background... 1 2. Progress
More informationDepartamento de Asia y Pacífico
Departamento de Asia y Pacífico Shanghai Cooperation Organization Joint Communiqué of Meeting of the Council of the Heads of the Member States of the Shanghai Cooperation Organisation 2010-6-11 Tenth Meeting
More informationResolution adopted by the General Assembly on 14 December [without reference to a Main Committee (A/61/L.44 and Add.1)]
United Nations A/RES/61/132 General Assembly Distr.: General 1 March 2007 Sixty-first session Agenda item 69 (a) Resolution adopted by the General Assembly on 14 December 2006 [without reference to a Main
More informationPerspectives from the U.S. Federal Communications Commission: Lessons Learned on ICTs in Disaster Prevention and Relief
Perspectives from the U.S. Federal Communications Commission: Lessons Learned on ICTs in Disaster Prevention and Relief Thomas Sullivan International Bureau Federal Communications Commission July 2012
More informationASREN Arab States Research and Education Network
ASREN Arab States Research and Education Network IPv6 & NREN Internet2 Middle East Regional Interest Group Meeting Amman Jordan 13 Dec. 2011 Alaa AL-Din Al-Radhi IPv6, Cyber Security & Emerging Technologies:
More informationInformation sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3
Information sharing in the EU policy on NIS & CIIP Andrea Servida European Commission DG INFSO-A3 Andrea.Servida@ec.europa.eu COM(2006) 251 - Towards a secure Information Society DIALOGUE structured and
More informationIndonesia ICT Consultative Forum (IICF)
Indonesia ICT Consultative Forum (IICF) I. Background In September 2013, the US-ASEAN Business Council led several ICT companies to Malaysia and Indonesia on a Senior Executive Business Mission. During
More informationGovernment-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection
Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection L. Laile Di Silvestro Senior Strategist Worldwide Public Sector Microsoft Government Industry Collaboration
More informationExecutive Order on Coordinating National Resilience to Electromagnetic Pulses
Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE
More informationMETHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS
METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS The cybersecurity maturity has been assessed against 25 criteria across five themes. Each of the criteria are given a Yes, No, Partial, or Not Applicable
More informationStatement by Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism
Statement by Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism Meeting of the United Nations Security Council Counter-Terrorism Committee Mr. Chairman, Excellencies,
More informationEnhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert
Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert European Union Agency For Network And Information Security Securing Europe s Information
More informationStatement for the Record
Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before
More information8 th APEC Transportation Ministerial Meeting Tokyo, Japan SEPTEMBER 5, 2013 Ministerial Joint Statement
8 th APEC Transportation Ministerial Meeting Tokyo, Japan SEPTEMBER 5, 2013 Ministerial Joint Statement 1. As Ministers responsible for transportation in the APEC region, we met in Tokyo, Japan, on September
More informationThe challenges of the NIS directive from the viewpoint of the Vienna Hospital Association
The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the
More informationKOBE REPORT draft Report of Session 5.4, Thematic Cluster 5. Telecommunications Saves Lives: role of information and communication technologies
KOBE REPORT draft Report of Session 5.4, Thematic Cluster 5 Telecommunications Saves Lives: role of information and communication technologies 1. Summary Chair: Dr Cosmas L. Zavazava, Head, Unit for Least
More information2nd EU-GCC BUSINESS FORUM
EU-GCC Trade and Business Facility 2nd EU-GCC BUSINESS FORUM PPP and Infrastructure investment opportunities in the GCC 9-10 JANUARY, 2017, RIYADH, SAUDIA ARABIA Registration http://eu-gcc.org/event/ VENUE:
More informationInternet Governance: Today and Tomorrow
Internet Governance: Today and Tomorrow Philip Smith Internet Society Board of Trustees APNIC 28 Beijing August 25, 2009 The Internet Society Founded in 1992 by Internet pioneers International non-profit
More informationThe U.S. National Spatial Data Infrastructure
June 18, 2014 INSPIRE Conference 2014 The U.S. National Spatial Data Infrastructure past present and future Ivan B. DeLoatch Executive Director, Federal Geographic Data Committee U.S. Geological Survey
More informationThe Federal Council s Basic Strategy. for Critical Infrastructure Protection
The Federal Council The Federal Council s Basic Strategy for Critical Infrastructure Protection Basis for the national critical infrastructure protection strategy 18 May 2009 Table of Contents 1 Introduction...
More informationSecurity Director - VisionFund International
Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone
More informationArctic Action Overview
Selected Topics International Arctic Council National Arctic Action Overview Interagency Working Group on Alaska Energy and Permitting Issues [E.O. 13580] Report to the President (March 2013) National
More informationGlobal Security Advisor
Global Security Advisor Location: [North America] [United States] Category: Security *Preferred location: USA. Other locations will be considered globally where WVI is registered to operate. PURPOSE OF
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationINDUSTRY 4.0 Summit 2018
EVENT BROCHURE 12th 13th July 2018 JW Marriott Hotel Hanoi INDUSTRY 4.0 Summit 2018 HOSTED & ORGANIZED BY EVENT OVERVIEW Industry 4.0 Summit 2018 hosted by the Government of the Socialist Republic of Viet
More informationProject III Public/private cooperation
Project Cybercrime@EAP III Public/private cooperation Արևելյան Գործընկերություն Східне партнерство Eastern Partnership აღმოსავლეთ პარტნიორობა Parteneriatul Estic Şərq tərəfdaşlığı Partenariat Oriental
More informationINDEX ABOUT US 3 ARAB CERTIFIED QUALITY MANAGER PROGRAM. Body of Knowledge 6 UNESCO ICT INDICATORS 8 MESSAGE FROM THE CHAIRM AN
INDEX MESSAGE FROM THE CHAIRM AN 2 ABOUT US 3 ARAB CERTIFIED QUALITY MANAGER PROGRAM 5 Body of Knowledge 6 UNESCO ICT INDICATORS 8 1 MASSAGE FROM THE CHAIRMAN Welcome to the Arab Knowledge and Management
More information