e-security Task Group Hong Kong Post e-cert: Enabling Secure Electronic Transactions
|
|
- Shon Mason
- 6 years ago
- Views:
Transcription
1 E Hong Kong Post e-cert: Enabling Secure Electronic Transactions Doc no: telwg29/ ESTG/09 Agenda item: 7 e-security Task Group Submitted by: Hong Kong, China Hong Kong Post e-cert: Enabling Secure Electronic Transactions Contact: Y C Lam yc_lam@hkpo.gov.hk APEC Telecommunications and Information Working Group 29th Meeting March 2004 Hong Kong, China Please note: This document is not an official APEC document until approved by the Telecommunications and Information Working Group. This version is a draft provided for discussion purposes only.
2 About Hongkong Post Hongkong Post e-cert : Enabling Secure Electronic Transactions Y. C. LAM Senior Manager, CA Special Projects Hongkong Post APEC TEL 29 March 2004 Providing postal services in HK for > 160 years Handling > 1.2 billion mail items per year (>3.3M items / day) Operating the First Recognized Certification Authority in HK since Jan 2000 Chairman of the Hong Kong PKI Forum since 2002 Hongkong Post Certification Authority Hongkong Post e-certe Personal Users Corporate Users e-cert (Personal) e-cert (Organisational) e-cert (Encipherment) Bank-Cert (Personal) Bank-Cert (Corporate) e-cert (Server) First recognized CA in HK under the Electronic Transactions Ordinance since Jan 2000 Mobile e-cert (Personal) Global e-cert (Personal) Mobile e-cert (Organisational) Global e-cert (Organisational) Mobile e-cert (Server) Has issued >410K e-certs to individuals and organisations Electronic ID Electronic Business Card Business Unit Server ID Has issued >210K e-certs on Smart ID Cards Digital Signatures (under the Electronic Transactions Ordinance) Enciphered Communications (e.g. SSL) Storage Media of HK Post e-cert e-banking Floppy Disk Smart Card e-banking Other secure media (e.g. USB token) (Coming soon)
3 Online Securities Trading Online Data Transmission Online Securities Trading Online Data Transmission Authenticate using e-cert Authenticate using e-cert Other Applications Smart ID Card Secure communication Software Applications Online Betting E-government e-cert (incl. Private Keys) Other Applications Online Access to Personal Credit Report Online Shopping Other nonimmigration applications Electronic Trading Services Online Postal Service Application Online Auction Replacement Period : Mid 2003 Mid 2007 Smart ID Card Free e-cert e Program Option of first-year-free use of e-cert embedded to Smart ID Card Smart ID Card Free e-cert e Program Objectives: From 15 Mar 04, citizen born in 1962 & 1963 start to get smart ID card All citizen are welcome to register in advance To educate the general public the advantages and usages of e-cert To encourage the adoption of e-cert enabled applications in different industries To build up a critical mass of e-cert users in the market Embedded e- Cert Library Card Driving Licence (Yr 05-06)
4 Promotion Promotion Campaign: Commercial on TV and buses Promotion on radios Marketing collaterals including posters, banners, leaflets, online and print advertisements, etc. Ways to Register Citizens may apply for embedding One-Year-Free e- Cert into smart ID card via Online application Post office e-cert Service Counters at Smart ID Card Centres Smart Card Reader Mass Consumers can access public smart card readers: Smart Card Reader Mass consumers can also buy their own smart card readers: The Government equips public computer facilities with smart card readers for public use Business Opportunities Hong Kong s Current Population: 6.8 million Critical Mass of ready users to be capitalized for e-businesses!!!! Business Values To e-service providers : Enhanced security, reduced risk of fraud Non-repudiation, minimize dispute and financial loss Enhanced customer confidence, service image Provide additional value added services through Internet Marketing exposure through Smart ID free e-cert joint promotional campaigns to reach out to right target audience
5 Business Values To customers : Enhanced user experience with a universal security token Easy to use with ATM-like service experience Enjoy trusted services without being expose to the risk of spoofing attack etc Enjoy additional value added services online Support for Business Partners Support for e-cert enabling technology: Hongkong Post provides free trial/use of a development tool : DSVS and e-as A simple and easy to implement PKI module Easy migration from username/password to e-cert Successful cases : Go2HK, Layoyo.com, Tai Fook Securities... Support for Business Partners Joint Promotion Channels for Partners: Welcome Kit for Smart ID e-cert Roving Shows Seminars and Exhibitions Promotion Campaigns Hongkong Post e-cert Newsletter Support for Business Partners Promotion Channels for Partners: Marketing materials and advertisements Press interviews demo on partners applications Editorial in newspaper and magazines Partner web Looking Ahead Looking Ahead Continuous support to e-services Hong Kong has already developed a firm infrastructure for e-business e-community is created with Smart ID Card e-cert as Universal Security Token Low cost of implementation with DSVS and e-as free toolkits New e-business opportunities are derived Banking and Financial Services Home Education and Entertainment Enterprise Appl ns Buying and Selling Medical & Health Hongkong Post CA / PKI Supply Chain Support Gov t Services Critical Mass of e-certs e on Smart ID Cards
6 Thank You
PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1
PAA PKI Mutual Recognition Framework Copyright PAA, 2009. All Rights Reserved 1 Agenda Overview of the Framework Components of the Framework How It Works Other Considerations Questions and Answers Copyright
More informationASIA PKI Forum Overcome PKI Deployment Obstacles. Terry Leahy, CISSP Vice President, Wells Fargo Sept 15th, 2003
ASIA PKI Forum Overcome PKI Deployment Obstacles Terry Leahy, CISSP Vice President, Wells Fargo Sept 15th, 2003 Agenda PKI technology and business benefits Deployment related obstacles Closer look of obstacles
More informationForum. Ningbo, China 25 February
2014/SOM1/SCE-COW/014 Agenda Item: 4 Telecommunications and Inform ation Working Group Strategic Plan Purpose: Consideration Submitted by: TEL Chair Forum Doc. No.: 2013/SOM3/SCE/017 SOM Steering Committee
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationHong Kong s Personal Data (Privacy) Ordinance
Asia Privacy Bridge Forum 11 May 2016 Hong Kong s Personal Data (Privacy) Ordinance Fanny Wong Deputy Privacy Commissioner for Personal Data Hong Kong, China The Personal Data Landscape in Asia 2011 2003
More informationDevelopment of smart authentication and identification in Asia
Development of smart authentication and identification in Asia Asia PKI Consortium Dr. Wei-Chung Hwang weichung.hwang@gmail.com Nov 16, 2017 Agenda About APKIC Background Current Development New trends
More informationTowards an Egyptian Framework for CyberSecurity
Towards an Egyptian Framework for CyberSecurity Dr. Sherif Hashem Executive VP, ITIDA Chairman of the CyberSecurity Committee, MCIT shashem@itida.gov.eg S. Hashem - June 2009 1 Outline Egypt Building Digital
More informationConnecting Global Insight
China Telecom Global Newsletter April 206 Connecting Global Insight with CTG Monthly News Newly Expanded Capacity of TPE Poised to Capture Surging Demand Across the Pacific The Trans-Pacific Express (TPE)
More informationE-Signature Law of Iraq no. ( 78) of 2012
INTER-REGIONAL STANDARDIZATION FORUM FOR BRIDGING THE STANDARDIZATION GAP (BSG) Muscat, Oman, 11-12 December 2017 E-Signature Law of Iraq no. ( 78) of 2012 Halah Alrubaye Projects follow-up manager, Ministry
More informationeid Applications Cross Border Authentication
eid Applications Cross Border Authentication 07 November 2017 Mr. Gary Yeung, MH Hon Secretary Chairman, eid Committee Smart City Consortium Smart City Consortium Background What is Smart City Consortium?
More informationRFID Journal LIVE! Exhibitor Marketing Tools and Services
RFID Journal LIVE! 2016 Exhibitor Marketing Tools and Services Quedah Locket Marketing Coordinator 212-584-9400 x3 qlocket@rfidjournal.com Alan McIntosh Senior Director of Sales 212-584-9400 x4 amcintosh@rfidjournal.com
More informationDIGITAL AGENDA FOR EUROPE
DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background
More informationDesigning and Managing a Windows Public Key Infrastructure
Designing and Managing a Windows Public Key Infrastructure Key Data Course #: 2821A Number of Days: 4 Format: Instructor-Led Certification Track: Exam 70-214: Implementing and Managing Security in a Windows
More informationADR in Asia Conference
ADR in Asia Conference October 31 2018 1 ABOUT THE ADR IN ASIA CONFERENCE The ADR in Asia Conference is a major event in the arbitration calendar. It is a platform for some of the most prominent members
More informationNetherlands Food and Consumer Product Safety Authority (NVWA) Alexander J. Moret e-cert Specialist. Geneva, 2016 Jun 28. June 28, 2016 NVWA 1
Netherlands Food and Consumer Product Safety Authority (NVWA) Alexander J. Moret e-cert Specialist Geneva, 2016 Jun 28 June 28, 2016 NVWA 1 Netherlands Food and Consumer Product Safety Authority (NVWA)
More informationNFC Service Launch in Hong Kong. Alex Kun SVP, Product Development and Management Wireless Business
NFC Service Launch in Hong Kong Alex Kun SVP, Product Development and Management Wireless Business 25-06-2013 Latest Contactless Development Landscape Octopus in Hong Kong 21 million cards issued Acceptance
More informationCryptography and digital security: future needs and challenges seen from a commercial perspective
Tan Teck-Lee Chief Innovation and Technology Officer Cryptography and digital security: future needs and challenges seen from a commercial perspective French-German- Singaporean Applied Cryptography workshop
More informationCS155b: E-Commerce. Lecture 6: Jan. 25, Security and Privacy, Continued
CS155b: E-Commerce Lecture 6: Jan. 25, 2001 Security and Privacy, Continued FIREWALL A barrier between an internal network & the Internet Protects the internal network from outside attacks Executes administrator-defined
More informationPKI is Alive and Well: The Symantec Managed PKI Service
PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions
More informationVirtual Wallet Activities
Virtual Wallet Activities 1 2015 Cisco and/or its affiliates. All rights reserved. Contents 2 2015 Cisco and/or its affiliates. All rights reserved. Advertising Outdoor Advertising Outdoor banner ads,
More informationPartner Program Proof of Performance Requirements
Proof of Performance Partner Program Proof of Performance Requirements Recent GRC audit found that proof of performance (PoP) criteria for partner programs were generally not defined or detailed enough
More informationUSA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036
US-China Business Council Comments on The Draft Measures for Security Review of Online Products and Services March 6, 2017 On behalf of the more than 200 members of the US-China Business Council (USCBC),
More informationEffective Partnerships: Security and Privacy in Smart Cities
SESSION ID: SEC-R03 Effective Partnerships: Security and Privacy in Smart Cities Mr. Robert (Bob) Butler Chief Security Advisor IO Data Centers LLC Dr. Irv Lachow Principal Cyber Researcher The MITRE Corporation
More informationwhite paper SMS Authentication: 10 Things to Know Before You Buy
white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationHow Next Generation Trusted Identities Can Help Transform Your Business
SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2
More informationIssues in Assessing Commercial Certification Service Trust
The Open Group Security Program Group Building Trust on the Net ---- San Diego -- April 30, 1998 Issues in Assessing Commercial Certification Service Trust Michael S. Baum, J.D., M.B.A. VP, Practices &
More informationBetter Mutual Authentication Project
Better Mutual Authentication Project Recommendations & Requirements for Improving Web Authentication for Retail Financial Services Presented to W3C Workshop on: Transparency & Usability of Web Authentication
More informationHONG KONG. www,esclgov,hk. Electronic Service Delivery Scheme ELECTRONIC SERVICE DELIVERY. & x m m 9 9= ft
HONG KONG www,esclgov,hk Electronic Service Delivery Scheme ELECTRONIC SERVICE DELIVERY & x m m 9 9= ft THE UNIVERSITY OF HONG KONG LIBRARIES Hong Kong Collection gift from Vice-Chancellor's Office A Pioneer
More informationFileMaker Business Alliance. Program Guide
FileMaker Business Alliance Program Guide FileMaker Business Alliance Program Guide Get Started... 3 FBA Business Types and Requirements... 4 Partner Levels... 7 FBA Six Pillars of Excellence... 10 Contact
More informationhidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION
HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused
More informationSAFE-BioPharma RAS Privacy Policy
SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what
More informationIndex. Cabinet of Egypt Information and Decision
348 Index Index A accessibility 17, 236 accessing the Internet 233 access control mechanisms 318 actors 294 adoption decisions 283 advertising 218 agent-based negotiation system 120 Amazon.com 111 application
More informationINTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD
INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University
More informationSingapore s National Digital Identity (NDI):
Singapore s National Digital Identity (NDI): Leaving no one behind Kwok Quek Sin Director, National Digital Identity Programme Government Technology Agency PART 1 INTRODUCTION TO NDI Better Living For
More informationSéminaire sur la Certification Electronique
Séminaire sur la Certification Electronique Algiers Algeria, 8-9 December, 2009 International Telecommunication Arab Regional Office Assisting Governments in Developing e-commerce Ecosystems: A Synthesis
More informationFrom the E-readiness Assessment and Analysis to an Action Plan and Policies Recommendations. Gabriel Accascina
From the E-readiness Assessment and Analysis to an Action Plan and Policies Recommendations Gabriel Accascina gabriel@it4dev.net Contents The E-readiness Assessment (ERA) process and analysis The components
More informationGovernmentOnline Gatekeeper The Government s Public Key Infrastructure
Gatekeeper The Government s Public Key Infrastructure Peter Anderson General Manager GPKI Branch Office for Government Online 30 June 2000 Why? Consumer and business demand Over 6 million users (Nov 99)
More informationA Regulator s Perspective on Accountability and How to Incentivise It
Centre for Information Policy Leadership (CIPL) Workshop in collaboration with the Singapore Personal Data Protection Commission Implementing Accountability 26 July 2018 A Regulator s Perspective on Accountability
More informationGlobal Infrastructure Hub Update. G20 Infrastructure Working Group, January 2019
Global Infrastructure Hub Update G20 Infrastructure Working Group, January 2019 IWG Update Introduction Dear IWG members, After a successful 2018, we start 2019 with great enthusiasm, ready to deliver
More informationJob Title: Short-Term Consultant (STC) China Market Outreach Consultant (150 days) based out of Hong Kong
Job Title: Short-Term Consultant (STC) China Market Outreach Consultant (150 days) based out of Hong Kong Department: Lighting Global within IFC Energy and Water (CASEE) Background IFC, a member of the
More informationFederal Voting Assistance Program (FVAP)
16th Annual Computer Security Application Conference (ACSAC) December 2000 Federal Voting Assistance Program (FVAP) Provide Background on VOI Pilot Effort Provide High Level Technical Overview Security
More informationThe current status of Esi TC and the future of electronic signatures
SG&A ETSI FUTURE WORKSHOP Sophia Antipolis, 16th January 2006 The current status of Esi TC and the future of electronic signatures Riccardo Genghini, Chairman of Etsi Esi TC riccardo.genghini@sng.it The
More informationEstablishing Trust Across International Communities
Establishing Trust Across International Communities 6 Feb 2013 info@federatedbusiness.org www.federatedbusiness.org Proprietary - British Business Federation Authority 1 Strategic Drivers - Industry 1.
More informationOnline Marketing Your GIS Data, Products or Services
Online Marketing Your GIS Data, Products or Services David Gadish, Ph.D. Assistant Professor College of Business and Economics California State University Los Angeles dgadish@calstatela.edu Abstract -
More informationBroadband network initiatives and future plans in Vietnam
Expert Consultation on the Asian Information Superhighway and Regional Connectivity Broadband network initiatives and future plans in Vietnam DR. Nguyen Hong Van Email: hvan@vinaren.vn Director of Vietnam
More informationING Public Key Infrastructure Technical Certificate Policy
ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document
More informationTrusted Identities That Drive Global Commerce
Trusted Identities That Drive Global Commerce For information of the BCS/EEMA Community A truly Federated Trust Network - Building upon core competences of the worlds banks & payments systems Governance
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationEnterprise Business. Solution Partner Program Guideline
[ 键入文字 ] Huawei Enterprise Solution Partner Program Guidelines Enterprise Business Solution Partner Program Guideline Huawei Technologies Co., Ltd. Huawei Technologies Co., Ltd. i Contents 1 Program Overview...
More informationITEC Guide to Datacomms. PART 39 Guide to the European Powerline Communications Project OPERA
MAKING ELECTRICAL TECHNOLOGY WORK ITEC Guide to Datacomms PART 39 Guide to the European Powerline Communications Project OPERA This leaflet is produced by EUR ING David Stefanowicz and illustrated by Nancy
More informationMobile Payments Building the NFC Ecosystem
Mobile Payments Smart Card Alliance / NFC Forum Joint Workshop Building the NFC Ecosystem 2010 Smart Card Alliance Annual Conference Peter Preuss Nokia Chairman, NFC Forum Marketing Committee Cooperation
More informationThe significance of the UPU s.post and certification initiative
The significance of the UPU s.post and certification initiative Groups (TC, ESG, AESUG, PTC...) Dr.Ahmed KADA Vice chairman Telematics cooperative UPU Development Manager, Poste maroc kada@poste.ma Physical
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More informationTransport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank
WORLD BANK DONOR PERSPECTIVE ON CYBER SECURITY Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank MYTH NUMBER ONE:
More informationEMERGING TRENDS AROUND AUTHENTICATION
EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,
More informationSpree Privacy Policy
Spree Privacy Policy Effective as at 21 November 2018 Introduction Spree respects your privacy and it is important to us that you have an enjoyable experience buying and selling with us but also that you
More informationMake Better Connections Discover the Benefits of GSMA Membership
Make Better Connections Discover the Benefits of GSMA Membership Anne Bouverot, Director General GSMA The GSMA is playing an important role in the development of the mobile industry, uniting the world
More informationChapter 1 Introduction to Computers
Chapter 1 Introduction to Computers Chapter 1 Objectives Recognize the importance of computer literacy Discuss the uses of the Internet and World Wide Web Define the term, computer Describe the categories
More informationITONLINEEXAM.COM. Chapter 1 Basic Introduction to Computers
ITONLINEEXAM.COM Chapter 1 Basic Introduction to Computers A World of Computers Computers are everywhere 2 What Is a Computer? A computer is an electronic device, operating under the control of instructions
More informationBruno Leiniö Latin America Health Day
Bruno Leiniö Latin America Health Day Content Diagnostics Opp. Brazilian National Development Bank IOT Opp. TechEmerge Program Opp. Diagnostics 75% of the population depend on the universal public system
More informationⅠ.. Legal Regime on Telecommunications in China Ⅱ.. Background and Process for Making the Telecommunications Law Ⅲ.. Main Issues Addressed by the Draf
China s Telecommunications Law in the Future By Zhao Xiaoguang Department of Industry, Transport and Commerce of the LAO October, 2009 Ⅰ.. Legal Regime on Telecommunications in China Ⅱ.. Background and
More informationChallenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation
Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation 27 May 2011 ?????? Conception is easy Delivery is difficult 2 Agenda About Aadhaar- What the world
More informationPayThankYou LLC Privacy Policy
PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the
More informationS H O W D I R E C T O R Y F R E E L I S T I N G
ORDER FORM 1-A S H O W D I R E C T O R Y F R E E L I S T I N G It is COMPULSORY to attach this form together with the Official Contract Form and fax it to Each contracted stand in the exhibition is entitled
More informationU.S. E-Authentication Interoperability Lab Engineer
Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI
More informationYour Gateway to the Art World. Media Kit 2018
Your Gateway to the Art World Media Kit 2018 Highly Engaged Audience Tang Art Advisory is a full-service art advisory firm operating out of New York, East Hampton, Philadelphia, Miami, London and Hong
More informationDriving Canada s digital future
Driving Canada s digital future Rob Malcolmson, Senior Vice President, Regulatory October 29, 2015 Canada s largest communications company Customer connections 21M+ Revenues $21B+ Enterprise value $74B
More informationEMERGENCY MOBILE ALERT. Partner organisation campaign guide
EMERGENCY MOBILE ALERT Partner organisation campaign guide What is Emergency Mobile Alert? A public education campaign for Emergency Mobile Alert is scheduled to begin on 12 November. Emergency Mobile
More informationIndia IPv6 development Status
India IPv6 development Status 2016 Taiwan Internet Forum 13-12-2016 Ajai Kumar Manager, NIXI Ajai@nixi.in IPv6 Deployment Status in India as per Cisco http://6lab.cisco.com/stats/index.php 09-12-2016 ERNET
More informationUS Federal PKI Bridge. Ram Banerjee VP Vertical Markets
US Federal PKI Bridge Ram Banerjee VP Vertical Markets e-gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationPAKISTAN HOW TO SPEED UP THE INTRODUCTION OF EHEALTH SERVICES IN DEVELOPING COUNTRIES
HOW TO SPEED UP THE INTRODUCTION OF EHEALTH SERVICES IN DEVELOPING COUNTRIES V. Androuchko¹, Asif Zafar Malik² ¹International University in Geneva, Switzerland ² Rawalpindi Medical College, Pakistan 1
More informationCertDigital Certification Services Policy
CertDigital Certification Services Policy Page: 2 ISSUED BY : DEPARTAMENT NAME DATE ELECTRONIC SERVICES COMPARTMENT COMPARTMENT CHIEF 19.03.2011 APPROVED BY : DEPARTMENT NAME DATE MANAGEMENT OF POLICIES
More informationCYBER SECURITY and Mobile Money: Challenges and Opportunities NOVEMBER 28 TH 2016 PRESENTER: CECIL WILLIAMS
CYBER SECURITY and Mobile Money: Challenges and Opportunities NOVEMBER 28 TH 2016 PRESENTER: CECIL WILLIAMS 1 The BIG picture Mobile Money 2 "Mobile to overtake fixed Internet access by 2014" Bold prediction
More informationDigital Identity Trends in Banking
i-sprint Innovations Identity and Security Management Solution Provider Digital Identity Trends in Banking Banking Vietnam 2017 Proven Bank Grade Identity and Security Management Solution Designed, Architected
More informationBroadband Workshop. Strategy, Technology Driving Forces - Development of Broadband in China
BB Strategy, Technology Driving Forces -Development of Broadband in China Doc no: telwg29/ BB/06 Agenda item : Broadband Workshop Submitted by: China Strategy, Technology Driving Forces - Development of
More information21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong
Date: Time: 21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong The Chinese Manufacturers Industry About Vocational
More informationInternet of Things real life cases Alex Ahlberg
Internet of Things real life cases Alex Ahlberg Sales Manager, Symantec Finland & Baltics Symantec At a Glance 175M endpoints under protection $4.6B annual revenue 2123 patents 385,000 customers worldwide
More informationThe Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan
Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy
More informationIntroducing TechWorld
Introducing TechWorld TechWorld is fresh. TechWorld is energetic. Techworld is the hot new site in the Australian IT market. Backed by the world s largest publisher of IT websites, TechWorld informs, analyses
More informationPhishing is Yesterday s News Get Ready for Pharming
April 2005 Copyright 2005 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust
More informationBuilding on existing security
Building on existing security infrastructures Chris Mitchell Royal Holloway, University of London http://www.isg.rhul.ac.uk/~cjm 1 Acknowledgements This is joint work with Chunhua Chen and Shaohua Tang
More informationIs your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner
Is your privacy secure? HIPAA Compliance Workshop September 2008 Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Agenda Have you secured your key operational, competitive and financial
More informationesign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5,
esign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5, 2 0 1 7 Presentation Outline e-sign Architecture Interesting Challenges
More informationStrong Customer Authentication and common and secure communication under PSD2. PSD2 in a nutshell
Strong Customer Authentication and common and secure communication under PSD2 PSD2 in a nutshell Summary On August 12, the EBA has issued the long-awaited draft of the Regulatory Technical Standards (RTS)
More informationHEC Opens New Resource Centre to Promote Power Quality
Hongkong Electric Centre, 44 Kennedy Road, Hong Kong Tel : 2843 3111 Fax : 2810 0506 Website : www.heh.com Press Release 3 August 2005 HEC Opens New Resource Centre to Promote Power Quality A new resource
More informationEfficient, broad-based solution for a Swiss digital ID
Press release November 21, 2017 Government and private sector produce joint solution Efficient, broad-based solution for a Swiss digital ID The people of this country should have a simple, secure and unambiguous
More informationMWC Shanghai Exhibitor Webinar
MWC Shanghai Exhibitor Webinar Welcome! Webinar Agenda Welcome & introduction Accommodation and travel Speakers: 3 exhibitor online service tools Exhibitor communications Exhibitor key contacts Event benefits
More informationLow Carbon Building Technology Gateway Phase 2
Development plots Project positioning Low Carbon Building Technology Gateway Phase 2 To support the pathway to 2013 and 2016 low carbon step changes there are a number of Innovation Gateway s underway
More informationWhat is ISO ISMS? Business Beam
1 Business Beam Contents 2 Your Information is your Asset! The need for Information Security? About ISO 27001 ISMS Benefits of ISO 27001 ISMS 3 Your information is your asset! Information is an Asset 4
More informationDATA ENHANCEMENT DATA SETS
BUSINESS DATA SETS The Dun & Bradstreet UK Marketing File (UKMF) consists of over 3.4 million actively trading organisations, ranging from small businesses and shops through to blue-chip corporations.
More informationWorld Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014
World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014 Document WTDC14/28- E 10 February 2014 Original: French SOURCE: TITLE: ALG/28/1 Objective: 3 Ministry of Post and
More informationETSY.COM - PRIVACY POLICY
At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,
More informationA HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage
A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION Establish Create Use Manage SIMPLE. SECURE. SMART. ALL FROM A SINGLE SOURCE. As the ways to access your organization and its sensitive data increase,
More informationCybersecurity and the China Mobile Payment Market: The Risk to Chinese Consumers Is Great
Cybersecurity and the China Mobile Payment Market: The Risk to Chinese Consumers Is Great Deborah Weinswig Managing Director, FGRT deborahweinswig@fung1937.com US: 646.839.7017 HK: 852.6119.1779 CN: 86.186.1420.3016
More informationNational Cyber Security and Cyber Terrorism Summit
Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationAchieving online trust through Mutual Authentication
Achieving online trust through Mutual Authentication Agenda Where do we need trust online? who are the affected parties? Authenticating the site to a consumer V by V and SecureCode, next generation browsers
More informationTrusted Computing Group
Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing
More information