Concept Note: GIDC. Feasibility Study(F/S) on Government Integrated Data Center (GIDC) for the Republic of Nicaragua

Size: px
Start display at page:

Download "Concept Note: GIDC. Feasibility Study(F/S) on Government Integrated Data Center (GIDC) for the Republic of Nicaragua"

Transcription

1 Concept Note: GIDC 1. Title of Proposed Project Feasibility Study(F/S) on Government Integrated Data Center (GIDC) for the Republic of Nicaragua 2. Organization Nicaraguan Institute for Telecommunications and Post (TELCOR) 3. Project Background A Government Integrated Data Center (GIDC) is a core infrastructure element required to establish effective e-governance. GIDCs, as an exclusive government data center, offers efficient and effective integrated ICT resources including IT systems, infrastructure, integrated operations systems, and human capital as necessary to process electronic public administration services and functions. To carry out the 21 projects drawn from the e-government Master Plan for Nicaragua, it is essential that the Nicaraguan government resolve the issues arising from the implementation and operation of individual systems of each ministry, which leads to redundant investment in information systems, a lack of security measures and an inferior computing environment. Furthermore, it is crucial that the government establishes a GIDC to provide the foundation for reliable and sustainable e- Governance. Implementation and operation of the GIDC will contribute to the integration of necessary ICT resources of different ministries, which will effectively reduce the costs for the government in the long term. 4. Project Description The objective of the main project is to establish a scalable GIDC, which will set the foundation for Nicaragua as the leading countries for e-governance best practices in the region. As a first step, it is necessary to undertake the feasibility study (FS) regarding GIDC, which shall include current status analysis, detailed implementation plan, cost estimation, and relevant components. The estimated cost for each step for GIDC implementation is as follows; (1) Feasibility Study: $200,000 (2) Project Management Consulting(including monitoring and auditing): $1,000,000 (3) Construction & Implementation: $14,000, Priority of Project It is one of the top priority projects in the e-government master plan. We plan to implement the GIDC in the near future. 6. Expected Outcomes of Project

2 (1) Feasibility Study Consulting Report including As-Is status analysis, To-Be model, establishment and implementation plan (2) Financial Analysis to initiate main project 7. Expectations on Korean Experts (1) Experts or companies who have experiences in ICT and/or GIDC projects (2) Experts or companies who have experiences in ICT and/or International Cooperation and Development projects (3) Experienced on businesses in Central and South America with coordination of local consultants and regional experts who speaks Spanish 8. Others The Nicaraguan government is executing the National Human Development Plan (NHDP) for poverty reduction and national development. It deploys various infrastructure projects and social welfare programs to provide benefits to the poor for national socio-economic transformation. Through the national plan, the Nicaraguan government is going to utilize ICT for country modernization in the public administration, education and health sectors to increase quality of life for our citizens. One of the strategic pillars is the National Broadband Plan to increase accessibility and affordability of connectivity to those in the rural areas.

3 Concept Note: NicaCERT 1. Title of Proposed Project Feasibility Study (F/S) on CERT(Computer Emergency Response Team) for the Republic of Nicaragua 2. Organization Nicaraguan Institute for Telecommunications and Post (TELCOR) 3. Project Background Nicaragua expects to have a specific plan to implement a national CERT infrastructure and develop human and institutional capacity for CERT operation by benchmarking KR- CERT best practices and solutions. Nicaragua is aiming to implement a national CERT in conjunction with the national fiber optic network deployment to leverage synergies; reducing the cost of implementation, improving the protection of new critical infrastructure, improving response time to address incidents by enabling a real-time integrated management system for the benefit of the central and local government, private sector, and citizens. Ultimately, Nicaragua expects to establish an Integrated Security Operation Center for the integrated monitoring to protect the country s information systems and critical infrastructures. Through the findings of the E-Government Master Plan (M/P), successfully executed by NIPA in 2014, TELCOR became aware of the importance and necessity of a national CERT program. Additionally, in October 2014, TELCOR has visited KISA (Korea Internet Security Agency) to understand the best practices and lessons learned from Korea s CERT exerience. Hence, the Republic of Nicaragua shall take the necessary first steps to implement a national CERT with the support of the Korean government and its experts, which is also supported by the MOU framework signed between our two coutntries for ICT cooperation. 4. Project Description (1) Objective - The project will provide a feasibility study on the implementation of CERT in Nicaragua for crisis management in response to attacks on critical information infrastructures and advise on appropriate preventive and protective measures and countermeasures. (2) Scope - As-Is analysis on national cyber security policies, infrastructure and related status in Nicaragua - To-Be Model suggestion on CERT scheme, law and regulations - Implementation plan of CERT with roadmap, governance structure, hardware and software recommendations, training plan, financial analysis (CAPEX/OPEX) (3) Functions and Services

4 - Consulting on CERT feasibility and sustainability in Nicaragua - Survey on the As-Is status related to cyber security and prioritized requirements for security emergency response - Review on the best practices in Korea - Guides on prerequisites for national CERT operation such as resources, training, management and operation (4) Estimated Cost - Roughly around $200,000 for consulting activities by Korean and local experts for a feasibility study project on CERT in Nicaragua 5. Priority of Project Based on the Master Plan for the national information strategy and planning of Nicaragua established in 2014, a national Security Emergency Response (SER) capability is urgently required to prevent and address cyber-attacks on Nicaraguan critical infrastructures and mitigate the national ICT vulnerability. Also, the Nicaraguan government strongly needs a national CERT infrastructure to minimize risks and to reduce recovery time from cyberattacks when it does occur. Specific criminal legislation on cybercrime, regulation & compliance related to cyber security has been enacted recently, but Nicaragua does not have any official CIRT (Computer Incident Response Team), standards or frameworks on cyber security. There are academic institutions offering specialized training in the field of information security and computer forensic, but Nicaragua still needs experts/professionals certified by internationally recognized certification programs in cyber security. Also, Nicaragua needs to introduce R&D programs in order to operate and maintain a CERT program. 6. Expected Outcomes of Project 1. Feasibility Study including an As-Is analysis, To-Be model and implementation plan 2. Financial Analysis to initiate main project 3. Project Concept Paper preparation 7. Expectations on Korean Experts 1. Experts or companies who have experiences in ICT and/or Cyber Security consulting projects 2. Experts or companies who have experiences in ICT and/or International Cooperation and Development projects 3. Experienced on businesses in Central and South America with coordination of local consultants and regional experts who speaks Spanish 8. Others The Nicaraguan government is executing the National Human Development Plan (NHDP) for poverty reduction and national development. It deploys various infrastructure projects and social welfare programs to provide benefits to the poor for national socio-economic transformation. Through the national plan, the Nicaraguan government is going to utilize ICT for country modernization in the public administration, education and health sectors to increase quality of life for our citizens. One of the strategic pillars is the National Broadband Plan to increase

5 accessibility and affordability of connectivity to those in the rural areas. * Please fill-in the template accordingly within 3 pages

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution

More information

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 130 (REV. BUSAN, 2014) RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International

More information

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. DRAFT SUBMISSION OF [ORGANIZATION] PROJECTS/ACTIVITIES/STUDIES [Date] Objective: This

More information

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank WORLD BANK DONOR PERSPECTIVE ON CYBER SECURITY Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank MYTH NUMBER ONE:

More information

RFD. for ICERT ( ) RESULTS-FRAMEWORK DOCUMENT. Department of Information Technology. Results-Framework Document (RFD) for CERT-In ( )

RFD. for ICERT ( ) RESULTS-FRAMEWORK DOCUMENT. Department of Information Technology. Results-Framework Document (RFD) for CERT-In ( ) Results-Framework Document (RFD) for CERT-In (-) RFD RESULTS-FRAMEWORK DOCUMENT for ICERT Department of Information Technology (-) Page 1 of 13 Results-Framework Document (RFD) for CERT-In (-) SECTION

More information

Ministerial Meeting 19 th June 2015 Nuku alofa, Tonga

Ministerial Meeting 19 th June 2015 Nuku alofa, Tonga Asia Pacific Regional Development Forum 2015: Smartly Digital Asia Pacific Outcome of the Pacific ICT Ministerial Meeting 19 th June 2015 Nuku alofa, Tonga Presented by: Paula P. Ma u CEO, MIC, Tonga Outline

More information

Japanese ODA Loan. Ex-Ante Evaluation

Japanese ODA Loan. Ex-Ante Evaluation Japanese ODA Loan Ex-Ante Evaluation 1.Name of the Project Country: The Republic of the Union of Myanmar Project: Communication Network Improvement Project Loan Agreement: March 26, 2015 Loan Amount: 10,500

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

E Government in Tonga

E Government in Tonga Asia Pacific Regional Forum on e Government, 19 20 August 2015, Bangkok E Government in Tonga Presented by: Mr. Paula P. Ma u CEO MEIDECC Presentation Outline I. Background II. National ICT Plan III. E

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES DOCUMENT DETAIL Security Classification Unclassified Authority National Information Technology Authority - Uganda

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

ICT and Disaster Risk Reduction Division ESCAP

ICT and Disaster Risk Reduction Division ESCAP 1 ICT and Disaster Risk Reduction Division ESCAP http://www.unescap.org/publications/artificial-intelligence-and-broadband-divide-state-ict-connectivity-asia-and-pacific Landscape 2 3 Trends Potentials

More information

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018 INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF 28 th November 2018 AGENDA 1. State of Cybersecurity Globally 2. State of Cybersecurity in South Africa 2.1

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

Status of E Government in Tonga. Presented by: Ms. Siasini Petelo Ministry of Communications TONGA

Status of E Government in Tonga. Presented by: Ms. Siasini Petelo Ministry of Communications TONGA Status of E Government in Tonga Presented by: Ms. Siasini Petelo Ministry of Communications TONGA National ICT Visions and Strategy for Tonga. National Priorities TSDFII outlines Priority Areas aimed at

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Cyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB

Cyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB Cyber Security Strategic Level Landscape in Poland Krzysztof Silicki NASK Institute, Poland ENISA MB, EB Big picture January 2015 2013 June 2013 CSIRTs in Poland CERT.GOV.PL - Governmental CERT est. 2008

More information

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. DRAFT SUBMISSION OF [SRI LANKA] Broadband Priorities for the Asia Pacific Information

More information

J.Enhancing energy security and improving access to energy services through development of public-private renewable energy partnerships

J.Enhancing energy security and improving access to energy services through development of public-private renewable energy partnerships J.Enhancing energy security and improving access to energy services through development of public-private renewable energy partnerships Background ESCAP, jointly with the ECLAC, the ECA, the ECE, and the

More information

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy Andrea Glorioso European Commission DG INFSO-A3 Andrea.Glorioso@ec.europa.eu Network and

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,

More information

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Title: Facilitating Investment in Cybersecurity as a means of achieving the Sustainable Development Goals Description: Information

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

Itu regional workshop

Itu regional workshop Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

GUIDING PRINCIPLES I. BACKGROUND. 1 P a g e

GUIDING PRINCIPLES I. BACKGROUND. 1 P a g e GUIDING PRINCIPLES I. BACKGROUND At the Summit of the Americas held in Port-of-Spain, Trinidad and Tobago, in April 2009, the leaders of the Western Hemisphere noted that energy challenges are among the

More information

Expanding ICT Infrastructure for Rural Areas in Korea

Expanding ICT Infrastructure for Rural Areas in Korea Expanding ICT Infrastructure for Rural Areas in Korea Hyongsoon Kim*, Eunyoung Lee** * Digital Infrastructure Division, National Information Society Agency, Seoul, Korea **Dept. of Computer Science, Dongduk

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 45 (Rev. Hyderabad, 2010) 212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

Securing Europe's Information Society

Securing Europe's Information Society Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU

More information

CONNECT ARAB STATES SUMMIT

CONNECT ARAB STATES SUMMIT CONNECT ARAB STATES SUMMIT Doha, Qatar, 5-7 March 2012 Draft Concept Paper Overview The Connect Arab States Summit is being organized by the International Telecommunication Union (ITU) in partnership with

More information

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia

More information

Proposed Regional ehealth Strategy ( )

Proposed Regional ehealth Strategy ( ) Proposed Regional ehealth Strategy (2014-2020) Strategic Area 1: Policy & Strategy Strategic Area 2: Tools & Methods Strategic Area 3: Collaboration & Partnership Strategic Area 4: Human Resource Development

More information

From the E-readiness Assessment and Analysis to an Action Plan and Policies Recommendations. Gabriel Accascina

From the E-readiness Assessment and Analysis to an Action Plan and Policies Recommendations. Gabriel Accascina From the E-readiness Assessment and Analysis to an Action Plan and Policies Recommendations Gabriel Accascina gabriel@it4dev.net Contents The E-readiness Assessment (ERA) process and analysis The components

More information

Implementing a National Strategy : the case of the Tunisian CERT

Implementing a National Strategy : the case of the Tunisian CERT Implementing a National Strategy : the case of the Tunisian CERT Belhassen ZOUARI, CEO, National Agency for Computer Security, Head of Cert-Tcc, E-mail : B.Zouari@ansi.tn a fast Historical Overview end

More information

Global cybersecurity and international standards

Global cybersecurity and international standards World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level

More information

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus Cybersecurity governance in Europe Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus ska@unipi.gr Elements of a national cybersecurity strategy Set the vision,

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

Disaster risk reduction in a changing climate

Disaster risk reduction in a changing climate Disaster risk reduction in a changing climate Paola Albrito Head, United Nations Office for Disaster Risk Reduction Europe 7 th Annual Meeting of the European Forum for Disaster Risk Reduction, 3 October

More information

Position Title: IT Security Specialist

Position Title: IT Security Specialist Position Title: IT Security Specialist SASRIA SOC LIMITED Sasria, a state-owned company, is the only short-term insurer in South Africa that provides affordable voluntary cover against special risks such

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

ICTS for SUSTAINABLE DEVELOPMENT IN ASIA PACIFIC ITU ASIA & THE PACIFIC REGIONAL DEVELOPMENT FORUM

ICTS for SUSTAINABLE DEVELOPMENT IN ASIA PACIFIC ITU ASIA & THE PACIFIC REGIONAL DEVELOPMENT FORUM ICTS for SUSTAINABLE DEVELOPMENT IN ASIA PACIFIC ITU ASIA & THE PACIFIC REGIONAL DEVELOPMENT FORUM 1 ICTS FOR SUSTAINABLE DEVELOPMENT IN ASIA-PACIFIC Implementation of the ITU Asia-Pacific Regional Initiatives

More information

Plan of action for Implementation of the Sendai Framework for Disaster Risk Reduction in Central Asia and South Caucasus Region

Plan of action for Implementation of the Sendai Framework for Disaster Risk Reduction in Central Asia and South Caucasus Region Plan of action for Implementation of the Sendai Framework for Disaster Risk Reduction 2015-2030 in Central Asia and South Caucasus Region I. Background All governments in the Central Asia and South Caucasus

More information

Cybersecurity Strategy of the Republic of Cyprus

Cybersecurity Strategy of the Republic of Cyprus Cybersecurity Strategy of the Republic of Cyprus George Michaelides Commissioner of Electronic Communications and Postal Regulation http://www.ocecpr.org.cy 12 th February 2016 Cybersecurity Strategy of

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing

More information

Towards a European Cloud Computing Strategy

Towards a European Cloud Computing Strategy Towards a European Cloud Computing Strategy Jorge Gasós European Commission Information Society and Media Directorate General Trust and Security Unit Security, privacy, and trust in the information society

More information

National Cyber Incident Response - Architectural Concepts

National Cyber Incident Response - Architectural Concepts CSIRT Contributions to National Cyber Incident Response: An Architectural Perspective with U.S. Examples Bradford J. Willke Team Lead, Information Security Assessment & Evaluation Survivable Enterprise

More information

Overview. Objectives. Components. Information and Communication Technologies Sector Development Project. Project

Overview. Objectives. Components. Information and Communication Technologies Sector Development Project. Project Ministry of Communication Technologies Information and Communication Technologies Sector Development Project Video conference on from strategy to implementation: Lessons learned in World Bank funded ICT

More information

Building Resilience to Disasters for Sustainable Development: Visakhapatnam Declaration and Plan of Action

Building Resilience to Disasters for Sustainable Development: Visakhapatnam Declaration and Plan of Action Building Resilience to Disasters for Sustainable Development: Visakhapatnam Declaration and Plan of Action Adopted at the Third World Congress on Disaster Management Visakhapatnam, Andhra Pradesh, India

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

HFA Implementation Review Simplified Version for ACDR2010

HFA Implementation Review Simplified Version for ACDR2010 HFA Implementation Review Simplified Version for ACDR2010 Country: Republic of Korea Date of data filled out: Nov. 25, 2009 Name of the respondent: Dugkeun Park 1 Priority for action 1: Ensure that disaster

More information

DIGITAL AGENDA FOR EUROPE

DIGITAL AGENDA FOR EUROPE DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background

More information

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses

More information

Committed to connecting the world

Committed to connecting the world ITU-T: Standardization Sector Produces standards covering all fields of telecommunications on a worldwide basis and defines tariff and accounting principles for international telecommunication services

More information

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE Devi Annamalai Security, Trust and Governance MCMC 28th August 2007 Hanoi. Vietnam BACKGROUND MCMC is a statutory body established under the Malaysian Communications

More information

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

Joint Declaration by G7 ICT Ministers

Joint Declaration by G7 ICT Ministers Joint Declaration by G7 ICT Ministers (Action Plan on implementing the Charter) G7 ICT Ministers Meeting in Takamatsu, Kagawa - 29-30 April 2016 [Preamble] 1. We, the Information and Communication Technology

More information

Israel and ICS Cyber Security

Israel and ICS Cyber Security Israel and ICS Cyber Security Dr. Tal Steinherz Chief Technology Office Israel (INCB) 1 October 2015 The INCB The Israeli leads efforts and advises the government on: Cyber Ecosystem Establishing techno-scientific

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

OAS Cybersecurity Capacity Building Efforts

OAS Cybersecurity Capacity Building Efforts OAS Cybersecurity Capacity Building Efforts Are We Ready in Latin America and the Caribbean? 2016 Cybersecurity Report www.cybersecurityobservatory.com The opinions expressed in this publication are of

More information

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

A Strategy for a secure Information Society Dialogue, Partnership and empowerment A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information

More information

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA Executive summary of the public audit report THE CYBER SECURITY ENVIRONMENT IN LITHUANIA 9 December 2015, No. VA-P-90-4-16 Full audit report in Lithuanian is available on the website of the National Audit

More information

Thailand s Broadband Initiatives and dfuture Plans

Thailand s Broadband Initiatives and dfuture Plans Expert Consultation on the Asian Information Superhighway and Regional Connectivity 24 & 25 September 2013, Manila, Philippines Thailand s Broadband Initiatives and dfuture Plans Nachai Kulhintang Ministry

More information

Sri Lanka THE JOURNEY OF TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY

Sri Lanka THE JOURNEY OF TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY THE JOURNEY OF Sri Lanka TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY Presented by Dr. Ajith Madurapperuma on behalf of the ICTA Email: ajitolanka@gmail.com A PRESENTATION BY The Information Communication

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best

More information

E-Signature Law of Iraq no. ( 78) of 2012

E-Signature Law of Iraq no. ( 78) of 2012 INTER-REGIONAL STANDARDIZATION FORUM FOR BRIDGING THE STANDARDIZATION GAP (BSG) Muscat, Oman, 11-12 December 2017 E-Signature Law of Iraq no. ( 78) of 2012 Halah Alrubaye Projects follow-up manager, Ministry

More information

NATIONAL BROADBAND POLICY AND IMPLEMENTATION STRATEGY. Task Team Leader

NATIONAL BROADBAND POLICY AND IMPLEMENTATION STRATEGY. Task Team Leader NATIONAL BROADBAND POLICY AND IMPLEMENTATION STRATEGY BY Task Team Leader Outline of Presentation Introduction Broadband and the Economy Broadband for Sustainable Development Ecosystem Driving Broadband

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE

More information

THE CONNECT 2020 AGENDA FOR GLOBAL TELECOMMUNICATION/ICT DEVELOPMENT. April 8, 2015

THE CONNECT 2020 AGENDA FOR GLOBAL TELECOMMUNICATION/ICT DEVELOPMENT. April 8, 2015 THE CONNECT 2020 AGENDA FOR GLOBAL TELECOMMUNICATION/ICT DEVELOPMENT April 8, 2015 Connect 2020 Agenda for global telecommunication/ict development 2 Connect 2020 sets out the shared vision, goals and

More information

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

CITY COUNCIL AGENDA REPORT

CITY COUNCIL AGENDA REPORT CITY COUNCIL AGENDA REPORT Subject: AUMA RESOLUTION BROADBAND INTERNET Recommendation(s) That the AUMA Broadband Resolution 2016, provided as Attachment 1 to the May 24, 2016 report entitled AUMA Resolution

More information

PAKISTAN HOW TO SPEED UP THE INTRODUCTION OF EHEALTH SERVICES IN DEVELOPING COUNTRIES

PAKISTAN HOW TO SPEED UP THE INTRODUCTION OF EHEALTH SERVICES IN DEVELOPING COUNTRIES HOW TO SPEED UP THE INTRODUCTION OF EHEALTH SERVICES IN DEVELOPING COUNTRIES V. Androuchko¹, Asif Zafar Malik² ¹International University in Geneva, Switzerland ² Rawalpindi Medical College, Pakistan 1

More information

Establishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges

Establishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges Vietnam Computer Emergency Response Team Establishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges Vu Quoc Khanh, Director General of VNCERT Cybersecurity situation

More information

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope Timestamp 8/30/2013 15:34:00 The information solicited through this questionnaire will only be used in aggregate form, unless otherwise authorised by the respondent. Do you authorise us to cite/share your

More information

Implementation Strategy for Cybersecurity Workshop ITU 2016

Implementation Strategy for Cybersecurity Workshop ITU 2016 Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential

More information

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF

More information

Industrial control systems

Industrial control systems Industrial control systems Attractive targets for cyber-attacks A five-point strategy for a secure environment The risk of a cyber-attack is real and continues to rise Cyber threats to industrial control

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

HOTEL RESILIENT Plan ahead stay ahead. With support from the German Government through

HOTEL RESILIENT Plan ahead stay ahead. With support from the German Government through HOTEL RESILIENT Plan ahead stay ahead With support from the German Government through WHAT CAN GO WRONG WILL GO WRONG Murphy s Law More than 40% of hotels do not reopen after large disasters FEMA 2010

More information

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350 Έκδοση 1.2-2018.02.14 TLP1: WHITE 1 TLP Sources may use TLP: WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release.

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015!

WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015! FACILITATED BY: WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015! WSIS Forum 2012 was held from the 14-18th of May in Geneva. WSIS Forum 2012 resulted in an Outcome Document that aims

More information

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society ECOSOC Resolution 2008/3 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society The Economic and Social Council, Recalling

More information

Towards a more secure Cyber Space for South Africa

Towards a more secure Cyber Space for South Africa 22 October 2013 Towards a more secure Cyber Space for South Africa Prof Basie Von Solms Director : Centre for Cyber Security University of Johannesburg basievs@uj.ac.za International comments African comments

More information

Creating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular

Creating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular Creating NIS Compliant Country in a Non-Regulated Environment Jurica Čular (jcular@zsis.hr) What NIS actually is? NIS Directive NIS Network Information Security Directive EU Cyber Security Policy Mandatory

More information