Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

Similar documents
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity for ALL

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

E-Strategies in Africa

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

Role of ITU in Building Security & Trust in Cyberspace

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 130 (Rev. Antalya, 2006)

International Cooperation on Child Online Protection

GLOBAL CYBERSECURITY INDEX 2016

ITU-IMPACT. Regional Cybersecurity Forum - CLMV

Collaboration between National CSIRTs. Marco Obiso Cybersecurity Coordinator International Telecommunication Union (ITU)

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

RESOLUTION 67 (Rev. Buenos Aires, 2017)

ECOWAS Cyber security Agenda

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

INTRODUCTION OVERVIEW ON CYBERCRIME

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

Promoting Global Cybersecurity

RESOLUTION 47 (Rev. Buenos Aires, 2017)

WSIS Forum Open Consultation Process

Global Cybersecurity Agenda

Cybersecurity & Spam after WSIS: How MAAWG can help

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

Global cybersecurity and international standards

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Kigali, Rwanda 5 December Session 1 Regional Initiatives for Africa

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

e-governance in Africa let s speed up the process! Economic Commission for Africa

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

Regional Development Forum For the Arab States(RDF-ARB) 2018

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

Smart Sustainable Cities

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

Cybersecurity for ALL

ITU-IMPACT Capacity Building for Least Developed & Developed Countries

The Power of the SE4All Action Agenda and Investment Prospectus

HLG Briefly. HLG was established on March 6, 2015 during the 46 th Session of the UN Statistical Commission

RESOLUTION 140 (REV. BUSAN, 2014)

Scope of the Member State mechanism

2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

WSIS Action Lines Roadmaps C2, C5, C6

Child Online Protection

10025/16 MP/mj 1 DG D 2B

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

BACKGROUND PAPER. Sub-Regional Platform on Disaster Risk Reduction

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

CONNECT ARAB STATES SUMMIT

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

The United Republic of Tanzania. Domestication of Sustainable Development Goals. Progress Report. March, 2017

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Sustainable Energy for All (SEforALL)

Child Online Protection in Child Pornography Namibia

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

Cybersecurity & Digital Privacy in the Energy sector

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Cybersecurity for ALL

REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY

BROADBAND DEFINITION

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

OCTOPUS CONFERENCE COOPERATION AGAINST CYBERCRIME Workshop 1: Policies, activities and initiatives on cybercrime of international organisations

European Directives and reglements for Information security

From Hyogo to Sendai. Anoja Seneviratne Disaster Management Centre

ENISA EU Threat Landscape

The cost of cybercrime the benefits of cooperation

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

The Arab ICT Organization

ASEAN COOPERATION ON DISASTER MANAGEMENT. Disaster Management & Humanitarian Assistance Division, ASEAN Secretariat

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

Joint Declaration by G7 ICT Ministers

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

13967/16 MK/mj 1 DG D 2B

Integrated African Strategy on Weather and Climate Services

Australian Government Cyber-security Activities in the Pacific

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

ITU. The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania

Plan of action for Implementation of the Sendai Framework for Disaster Risk Reduction in Central Asia and South Caucasus Region

Draft Resolution for Committee Consideration and Recommendation

Commonwealth Cyber Declaration

Comprehensive Study on Cybercrime

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

EXPERT GROUP MEETING ON CYBERCRIME

Related to the Internet

JOINT AFRICA-EU STRATEGY - ANNUAL REFERENCE GROUP ON INFRASTRUCTURE MEETING- VENUE:

ENISA s Position on the NIS Directive

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Implementation of WTDC-14 Regional Initiatives for Europe

Transcription:

Cybersecurity Capacity Building @ ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

The importance of Cybersecurity From industrial age to information societies - Increasing dependence on the availability of ICTs - Number of Internet users growing constantly (now 40% of world s population) Statistics and reports show that cyber-threats are on the rise - The likely annual cost to the global economy from Cybercrime is estimated at more than $455 billion [McAfee Report]. Developing countries most at risk as they adopt broader use of ICTs - Mobile-broadband penetration in Africa almost 20% in 2014- up from less than 2% in 2010 (Source: ITU ICT Statistics) - Need for timely cybersecurity measures Source: Symantec (2014) 2

ITU and Cybersecurity 2003 2005 WSIS entrusted ITU as sole facilitator for WSIS Action Line C5 Building Confidence and Security in the use of ICTs 2007 ITU Secretary-General launched the Global Cybersecurity Agenda (GCA).A framework for international cooperation in cybersecurity 2008-2010 ITU Membership endorsed the GCA as the ITU-wide strategy on international cooperation. In 2008 the Child Online Protection Initiative was launched, as an international and multistakeholder collaborative framework fostering the protection of children online 3

Global Cybersecurity Agenda (GCA) GCA builds upon five pillars: 1. Legal Measures 2. Technical and Procedural Measures 3. Organizational Structure 4. Capacity Building 5. International Cooperation 4

GCA: From Strategy to Action 1. Legal Measures ITU Cybercrime Legislation Resources Publication on Understanding Cybercrime: A Guide for Developing Countries (new edition: November 2014) HIPSSA, HIPCAR, ICB4PAC Projects (executed with EU) MoU with UNODC for assistance to Member States 3. Organizational Structures National CIRT deployment and cooperation Regional Cybersecurity Centres (RCCs) Regional and International Cyber Drills Global Cybersecurity Agenda (GCA) 2. Technical and Procedural Measures ITU Standardization Work: ITU-T SG 17 ITU-R recommendations on security ICT Security Standards Roadmap ITU-T JCA on COP 4. Capacity Building 5. International Cooperation ITU s Child Online Protection (COP) Initiative Collaboration with other IGOs and Private Sector UN-wide Coordination Mechanisms ITU National Cybersecurity Strategy Guide Global Cybersecurity Index (GCI) Cyberwellness Profiles Technical assistance and projects in LDCs Elaboration of Best Practices at ITU-D SG 2 Q3/2 Regional Cybersecurity Workshops Training for high-level Member State officials 5

GCA pillar on Legal Measures Related activities 6

National Strategies Developing comprehensive and efficient National Cybersecurity Strategies is fundamental for building a secure ICT ecosystem. ITU together with its partners helps countries organize Child Online Protection Strategy Framework workshops to assist national stakeholders in planning and deploying an effective and practical approach to COP at a national level. 7

Partnerships for Assistance ITU-UNODC collaboration since 2011 Joint assistance to Member States in mitigating the risks posed by cybercrime Best practices in cybercrime legislations Information Sharing ITU-EC-ACP PROJECTS HIPCAR- Enhancing Competitiveness in the Caribbean through the Harmonization of ICT Policies, Legislation and Regulatory Procedures HIPSSA- Support for Harmonization of the ICT Policies in Sub-Saharan Africa ICB4PA C- In parallel to the ITU and EU co-funded project in the Caribbean the same organizations launched a project in the Pacific 8

HIPSSA PROJECT Harmonization of the ICT Policies in Sub-Saharan Africa Sub-regional programs: 1) East Africa 2) Central Africa 3) Southern Africa 4) West Africa Regional Outcomes on Cybersecurity ECOWAS cybersecurity guidelines ECCAS Model Law / CEMAC Directives on Cybersecurity SADC model law on data protection/ e- transactions/cybercrime In-Country Technical Assistance 9

Publications Committed to Connecting the World New edition 2014: ITU Publication on UNDERSTANDING CYBERCRIME: Phenomena, Challenges and Legal Response The Guide serves to help developing countries better understand the implications related to the growing cyber-threats and assist in the assessment of the current legal framework and in the establishment of a sound legal foundation. COMBATTING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Joint project among several partners under the coordination of the World Bank to build capacity in developing countries in the policy, legal and criminal justice aspects of the combat against cybercrime 10

Other GCA related activities 11

National CIRTs for enhancing global resilience 101 National CIRTs Worldwide 12

ITU s National CIRT Programme Assessments conducted for 61 countries 25 of them in Africa. In progress in Ethiopia and Republic of Congo Implementation completed for 9 countries 7 of them in Africa: Burkina Faso, Côte d'ivoire, Ghana, Kenya, Tanzania, Uganda and Zambia Implementation in progress for 6 countries Burundi and Gambia among others 9 cyber drills conducted with participation of over 90 countries Latest Cyberdrill for Africa in September 2014, in Livingstone, Zambia 13

ITU s National CIRT Programme Assess existing capability of/need for national cybersecurity mechanisms On-site assessment through meetings, training, interview sessions and site visits Form recommendations for plan of action (institutional, organizational and technical requirements) Implement based on the identified needs and organizational structures of the country Assist with planning, implementation, and operation of the CIRT. Continued collaboration with the newly established CIRT for additional support Capacity Building and trainings on the operational and technical details Exercises organized at both regional and international levels Help enhance the communication and response capabilities of the participating CIRTs Improve overall cybersecurity readiness in the region Provide opportunities for public-private cooperation 14

Objective The Global Cybersecurity Index (GCI) aims to measure and rank each nation state s level of cybersecurity development in five main areas: Legal Measures Technical Measures Organizational Measures Capacity Building National and International Cooperation Goals - Promote cyberesecurity strategies at a national level - Drive implementation efforts across industries and sectors - Integrate security into the core of technological progress - Foster a global culture of cybersecurity 104 countries have responded Final Global and Regional Results 2014 are on ITU Website Next iteration in progress 15

16

Cyberwellness Country Profiles Factual information on cybersecurity achievements on each country based on the GCA pillars 145 profiles to date & more being prepared Live documents Invite countries to assist us in maintaining updated information e.g. 17

Enhancing Cybersecurity in Least Developed Countries project Aims at supporting the 49 Least Developed Countries in strengthening their cybersecurity capabilities. How Assessment for selected key government ministries & subsequent solutions provision Capacity building through training of trainers, workshops,.. Customised guidelines on legislation, regulation and technologies End Result We are only as secure as our weakest link protection of their national infrastructure, including the critical information infrastructure, thereby making the Internet safer and protecting Internet users serve national priorities and maximize socio-economic benefits in line with the objectives of the World Summit on the Information Society (WSIS) and the Millennium Development Goals (MDGs). Implemented in 4 countries- Sierra Leone, Republic of Guinea, Comoros and Vanuatu Different stages of planning/implementation in 15 more 18

Other ITU Activities in Africa Memorandum of Understanding with the Nigerian Communication Commission to set up a Regional Cybersecurity Centre in the African country (July 2013). Implementation in progress. ITU offered inputs to the draft of the African Union Convention on Cybersecurity. The first Sub-Regional Forum on Cybersecurity and fight against Cybercrime for members of Economic Community of Central African States was held from 24-27 February 2015 in Cameroon

Child Online Protection Initiative Partners: - 10 international organizations - 34 civil society organizations - 13 private sector organizations Key Objectives: Identify risks and vulnerabilities to children in cyberspace Create awareness Develop practical tools to help minimize risk Share knowledge and experience 20

COP Activities in Africa The Regional Conference on Africa Child Online Protection (ACOP) was held in Kampala, Uganda in December 2014 with the aim to promote Pan-African awareness building on issues related to Child Online Safety COP National Strategy Framework: ITU together with its partners helps countries in Africa organize Child Online Protection Strategy Framework workshops to assist national stakeholders in planning and deploying an effective and practical approach to COP at a national level. E-safety pilot in Ethiopia: Endorsed from the Ethiopian Ministry of Communication and Information Technology (MCIT). Trained a total of up to 150 safety ambassadors from government, law enforcement and educators from 25 schools across Addis Ababa. Ongoing work with IWF for the establishment of a hotline in Uganda.

2012 2013 2014 National Strategies Cameroon Ghana Mauritius Sierra Leone Gambia Zambia Uganda National Strategy Frameworks Drawn

UN-wide cooperation mechanisms UN-wide Framework on Cybersecurity and Cybercrime (2013) Developed by ITU and UNODC along with 33 UN Agencies. Enables enhanced coordination among UN entities in their response to concerns of Member States regarding cybercrime and cybersecurity UN System Internal Coordination Plan on Cybersecurity and Cybercrime (2014) Developed building on the UN-wide Framework on Cybersecurity and Cybercrime upon request by the UN Secretary-General, Mr. Ban Ki-moon Designed as a guide to improve the internal coordination activities of the UN system organizations on related matters 23

Coordinated Response Need for a multilevel response to the cybersecurity challenges International International Cooperation frameworks and exchange of information Regional Harmonization of legislation and best practices at regional level National National strategies and policies National response capabilities Country level capacity building and training 24

Coordinated Response in Africa Need for strengthening national implementation processes International Active Participation in Intergovernmental Processes Regional AU Convention On Cybersecurity And Personal Data Protection ITU HIPSSA Project etc. National About half the countries in the region have relevant legislation in place to address cybercrime. Only 14 National CIRTs 25

Thank You http://www.itu.int/cybersecurity cybersecurity@itu.int 26

COP Activities in Africa 27