Cybersecurity for ALL

Similar documents
Cybersecurity for ALL

INTRODUCTION OVERVIEW ON CYBERCRIME

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

ITU-IMPACT. Regional Cybersecurity Forum - CLMV

RESOLUTION 130 (REV. BUSAN, 2014)

Global Cybersecurity Agenda

Regional Cyber security Forum for Africa and Arab States, Tunis, Tunisia 4 th -5 th June 2009

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity for ALL

Cybersecurity & Spam after WSIS: How MAAWG can help

Promoting Global Cybersecurity

INTERNATIONAL TELECOMMUNICATION UNION

RESOLUTION 130 (Rev. Antalya, 2006)

Global cybersecurity and international standards

ITU-IMPACT Capacity Building for Least Developed & Developed Countries

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

RESOLUTION 45 (Rev. Hyderabad, 2010)

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

E-Strategies in Africa

Collaboration between National CSIRTs. Marco Obiso Cybersecurity Coordinator International Telecommunication Union (ITU)

Regional Workshop for CIS on Conformance and Interoperability. ITU C&I Programme Pillars 3 and 4. Moscow, Russian Federation, August 2014

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

ITU at a glance. Getting to know the United Nations specialized agency for information and communication technologies

ITU. The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

RESOLUTION 67 (Rev. Buenos Aires, 2017)

RESOLUTION 47 (Rev. Buenos Aires, 2017)

Related to the Internet

Collaborative Regulation in the APP Economy

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

The Arab ICT Organization

Mr. Francesco Marelli Head of Unit, UNICRI

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

Internet Governance and the World Summit on the Information Society (WSIS)

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

ITU Academia. Smart Partnership for ICT4SDG. Jaroslaw K. PONDER Coordinator for Europe Region

EU policy on Network and Information Security & Critical Information Infrastructures Protection

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Role of ITU in Building Security & Trust in Cyberspace

Forum. Ningbo, China 25 February

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009

WHO-ITU National ehealth Strategy Toolkit

WSIS Action Lines Roadmaps C2, C5, C6

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

Implementation of WTDC-14 Regional Initiatives for Europe

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

RESOLUTION 140 (REV. BUSAN, 2014)

ITU-APT FOUNDATION OF INDIA Annual Convention: Outcomes of RPMs and TDAG-10 March 22, 2010 New Delhi, India Sameer Sharma, Senior Advisor ITU

ITU Academy & Centres of Excellence

Arab Regional Initiatives and Projects

ENISA EU Threat Landscape

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Donor Countries Security. Date

OAS Cybersecurity Capacity Building Efforts

2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

ENISA s Position on the NIS Directive

13967/16 MK/mj 1 DG D 2B

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

JOINT MEDIA STATEMENT

European Union Agency for Network and Information Security

INTERNATIONAL TELECOMMUNICATION UNION

Diana Korka Economic Affairs Officer, ICT Policy Section UNCTAD

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Internet Governance: Today and Tomorrow

Security and resilience in Information Society: the European approach

ITU Model Cybercrime Law: Project Overview

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

HLG Briefly. HLG was established on March 6, 2015 during the 46 th Session of the UN Statistical Commission

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

GUIDING PRINCIPLES I. BACKGROUND. 1 P a g e

National CIRT - Montenegro. Ministry for Information Society and Telecommunications

CONNECT ARAB STATES SUMMIT

Commonwealth Cyber Declaration

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

Committed to Connecting the World ICT Apps

PacNOG-21. Migrating to IPv6 : Experiences from Asia-Pacific

2014 ITU Plenipotentiary Conference PP-14 SNAPSHOT OF SOME OF THE KEY ISSUES

RESOLUTIONS Review and Status of Implementation

Cybersecurity and Vulnerability Assessment

The cost of cybercrime the benefits of cooperation

Donor Countries Security. Date

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

BACKGROUND PAPER. Sub-Regional Platform on Disaster Risk Reduction

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

European Union Financing Mechanisms for ICT in Latin American context

Securing Europe's Information Society

BROADBAND DEFINITION

Transcription:

Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities ITU Regional Cybersecurity Forum for Americas 23 November 2009 in Santo Domingo, Dominican republic Souheil Marine Head, ICT Applications and Cybersecurity Division ITU Telecommunication Development Bureau souheil.marine@itu.int International Telecommunication Union

Introduction to ITU Leading UN agency for information and communication technologies (ICT) Founded in 1865, ITU is the oldest specialized agency in the UN system Global focal point for governments and the private sector with 191 Member States, 900+ Sector Members and Associates ITU Headquarters in Geneva, 11 regional and area offices, 700 staff of 80 nationalities November 2009 2

ITU Activities ITU work is implemented through its three Sector s: Standardization (ITU-T) Radiocommunication (ITU-R) Development (ITU-D) ITU also organizes TELECOM events: ITU Website: www.itu.int/ ITU TELECOM WORLD 2009: an event for the global telecommunication and information communication technology (ICT) sector, and a platform for global telecommunications and ICTs November 2009 3

Cybersecurity Issues and Challenges Constant evolution of the nature of cyber threats Vulnerabilities in software and hardware applications and services changing and increasing Countries are increasingly at risk and under attack Low entry barriers and increasing sophistication of the type of cybercrimes committed Loopholes in current legal frameworks Absence of appropriate national organizational structures to deal with the threats Inadequate cooperation amongst the various stakeholders and stakeholder groups November 2009 4

Global Cybersecurity Cooperation The lack of cybersecurity is global problem that cannot be solved by any single entity alone! The world is faced with the challenging task of developing harmonized and comprehensive strategies at the global and international level and implementing these with the various relevant national, regional, and international stakeholders in the countries November 2009 5

WSIS and Promoting a Global Culture of Cybersecurity From WSIS Phase II: Tunis Agenda 39. We seek to build confidence and security in the use of ICTs by strengthening the trust framework. We reaffirm the necessity to further promote, develop and implement in cooperation with all stakeholders a global culture of cybersecurity, as outlined in UNGA Resolution 57/239 and other relevant regional frameworks. This culture requires national action and increased international cooperation to strengthen security while enhancing the protection of personal information, privacy and data. Continued development of the culture of cybersecurity should enhance access and trade and must take into account the level of social and economic development of each country and respect the development-oriented aspects of the Information Society. November 2009 6

Global Framework for Cybersecurity At the World Summit on the Information Society (WSIS) in 2005, ITU was entrusted by leaders of the international community to act as the facilitator for WSIS Action Line C5: Building confidence and security in the use of ICTs November 2009 7

ITU and Cybersecurity ITU constitutes a unique global forum to discuss cybersecurity. The ITU Secretary-General has set cybersecurity as a top priority. ITU Membership has been calling for a greater role to be played by ITU in matters relating to cybersecurity through a number of Resolutions, Decisions, Programs and Recommendations. ITU provides a global perspective and expertise and is promoting cybersecurity through a range of activities. November 2009 8

ITU Global Cybersecurity Agenda Building confidence and security in the use of ICTs In 2007, ITU Secretary-General launched the Global Cybersecurity Agenda, an international framework for collaboration on Cybersecurity matters that addresses five main areas: 1. Legal Measures 2. Technical and Procedural Measures 3. Organizational Structure 4. Capacity Building 5. International Cooperation November 2009 9

Legal Measures Summary of objective: Harmonization of legal frameworks and the elaboration of strategies for cybercrime legislation globally applicable and interoperable with national/regional legislative measures Related activities/initiatives Resources ITU Cybercrime Legislation Resources ITU Toolkit for Cybercrime Legislation Publications ITU Publication on Understanding Cybercrime: AGuide for Developing Countries Training and Events Capacity building, training (training for judges, etc.) Regional workshops and events November 2009 10

Examples of Recent Initiatives ITU Toolkit for Cybercrime Legislation aims to provide countries with sample legislative language and reference material that can assist in the establishment of harmonized cybercrime laws and procedural rules. ITU Publication on Understanding Cybercrime: A Guide for Developing Countries provides a comprehensive overview of the most relevant topics linked to the legal aspect of cybersecurity and cybercrime. www.itu.int/itu-d/cyb/cybersecurity/legislation.html November 2009 11

Technical and Procedural Measures Summary of objective : Development of strategies for the establishment of globally accepted security protocols, standards, minimum security criteria and accreditation schemes for hardware and software applications and systems Related activities/initiatives Security Activities ITU Standardization Work ICT Security Standards Roadmap promoting collaboration ITU Radiocommunication security activities Study Groups ITU-T Study Group 17 ITU-T Study Group 2 November 2009 12

Cybersecurity Study Group Activities in ITU-T T (Standardization) Focus on different topic areas Security, access and transport networks, multimedia, signaling, numbering, naming and addressing, tariffs, IP and NGN Cooperation and collaborative activities with many organizations including regional telecom forums, IETF, ISO,IEC, ETSI, etc. Examples of specific ITU-T activities related to cybersecurity and Child Online Protection include: Study Group 17 Primary focus on communication security The Leading Study Group on security for ITU-T Study Group 2 Operational aspects of service provision and telecommunication management works on harmonizing numbering resources for child helplines, etc. November 2009 13

Specific Cybersecurity Study Group Activities in ITU-T T (Standardization) Study Group 17 has primary focus on communication security and is the Lead Study Group on security for ITU-T Work under way under Study Group 17 Questions: November 2009 14

Other Cybersecurity Initiatives in ITU-T Correspondence group on exchange of network digital forensics Draft Recommendation on Traceback use cases and capabilities X.1240-series of Recommendations on technical means for countering spam Supplement 5 to ITU-T Recommendation E.164 New Draft Recommendation on Specification of an Intl Numbering Resource for use in the provisioning of International Help lines November 2009 15

Some Cybersecurity Initiatives in ITU-R R (Radiocommunication( Radiocommunication) Radio spectrum global frequency management is increasingly important for building confidence and security and creating an enabling environment in the use of ICTs Some examples of ongoing activities include: Recommendation ITU-R M.1457 Security mechanism incorporated in IMT-2000 Recommendation ITU-R M.1645 Framework and overall objectives of the future development of IMT-2000 and systems beyond IMT-2000 Recommendation ITU-R M.1223 Evaluation of security mechanism for IMT-2000 Recommendation ITU-R M.1078 Security principles for IMT-2000 November 2009 16

Organizational Structures Summary of objective : Elaboration of global strategies for the creation of appropriate national and regional organizational structures and policies on cybercrime, watch, warning and incident response and universal identity systems Related activities/initiatives ITU Secretary-General Dr Hamadoun Touré Partnerships International Multilateral Partnership Against Cyber Threats (IMPACT) collaboration services Partnerships with other entities to deliver specific services to Member States Projects Development of national computer incident response teams (CIRTs) and watch, warning and incident response related training Etc. Training/ Assistance Capacity building and training Regional workshops and events Direct assistance to countries November 2009 17

ITU-IMPACT IMPACT Alliance Background Information ITU launched the Global Cybersecurity Agenda (GCA) as framework for international cooperation Within GCA, ITU and the International Multilateral Partnership Against Cyber-Threats (IMPACT) are pioneering the deployment of solutions and services to address cyber-threats on a global scale. In September 2008, ITU and IMPACT signed a Memorandum of Understanding (MoU) IMPACT s global headquarters in Cyberjaya, Malaysia becomes the physical home of the GCA. In March 2009 the global headquarters of IMPACT inaugurated by Malaysia s Prime Minister Dato Seri Abdullah Haji Ahmad Badawi and ITU Secretary-General Dr Hamadoun Touré November 2009 18

ITU-IMPACT IMPACT Alliance Partners Key intergovernmental organizations Industry and academia Leading cybersecurity training institutions United Nations International Police Organization INTERPOL Etc. Symantec Corporation Kaspersky Lab F-Secure Corporation Trend Micro Inc. Microsoft Corporation Cisco Systems Inc. Dell Inc. Etc. The SANS TM Institute International Council of E-Commerce Consultants (EC-Council) The Honeynet Project (ISC) 2 Inc. November 2009 19

ITU-IMPACT IMPACT Activities The ITU Telecommunication Development Bureau (BDT) is facilitating the implementation process, managing communication and needs assessment with Member States and coordinating with IMPACT, to ensure effective delivery of the services provided. Global Response Centre Global Early Warning System, detecting and monitoring cyber-threats National CIRT Computer Incident Response Teams (CIRTs) and Incident Management capabilities at National level Capacity Building Capacity building and training, on-site, on-line, and training on the job Regional workshops and events, to ensure sustainability and operations of the solutions Direct assistance to countries, to map the deployment with the needs of the Administration November 2009 20

Global Response Centre (GRC) Main Objectives: GRC acts as the foremost cyber threat resource centre for the global community. It provides emergency response to facilitate identification of cyber threats and sharing of resources to assist Member States Two Prime Highlights NEWS (Network Early Warning System) Information collaboration platform providing Real time threat monitoring and assessment Statistical cyber threat trend analysis Malware threat centre ESCAPE (Electronically Secure Collaboration Application Platform for Experts) A collaborative platform for authorized cyber experts to pool resources and remotely collaborate with each other in a secure and trusted environment A comprehensive and growing database of key resources around the world November 2009 21

Establishing National CIRTs Initiative: To provide Incident Management, Advisories and Mailing List services, plus IMPACT ESCAPE and NEWS integration and Local Honeypot deployment Incident Response and Handling Incident Response and Handling Vulnerability Analysis and Handling Vulnerability Analysis and Handling Alerts and Warnings Alerts and Warnings Technology Watch Technology Watch Training and Awareness Training and Awareness ITU will support countries in the implementation of the National CIRT through the establishment of the overarching policy framework to support this technical solution and related watch, warning and incident response capabilities as part of a national strategy. November 2009 22

Capacity Building Training and services that will be offered include scholarship for developing countries and organization of specific training workshops to facilitate knowledge sharing IMPACT is building a catalogue of courses, according to the requirements expressed by ITU, in order to respond to the training needs expressed by the countries November 2009 23

ITU-IMPACT IMPACT Alliance Status of collaboration Fourty countries joined the ITU-IMPACT collaboration AFR AR ASP EUR Burkina Burkina Faso, Faso, Cape Cape Verde, Verde, Côte Côte d'ivoire, d'ivoire, Democratic Democratic Republic Republic of of Congo, Congo, Gabon, Gabon, Ghana, Ghana, Kenya, Kenya, Mauritius, Mauritius, Nigeria, Nigeria, Seychelles, Seychelles, Sudan, Sudan, Tanzania, Tanzania, Uganda Uganda and and Zambia Zambia Egypt, Egypt, Iraq, Iraq, Morocco, Morocco, Saudi Saudi Arabia, Arabia, Syrian Syrian Arab Arab Republic, Republic, Tunisia Tunisia and and United United Arab Arab Emirates Emirates Afghanistan, Afghanistan, India, India, Indonesia, Indonesia, Israel, Israel, Lao, Lao, Malaysia, Malaysia, Nepal Nepal and and Philippines Philippines Andorra, Andorra, Bulgaria, Bulgaria, Italy, Italy, Montenegro, Montenegro, Poland, Poland, Romania, Romania, Serbia Serbia and and Switzerland Switzerland AMS Brazil and Costa Rica Brazil and Costa Rica Note: By the end of the year, all Member States that confirmed their participation will be able to access the Global Response Center (GRC) First regions to benefit: Together with the ITU-EC project, ten countries from the African region: Burundi, Burkina Faso, Cote D Ivoire, Ghana, Kenya, Nigeria, Rwanda, Tanzania, Uganda and Zambia; four countries from EU region, namely Romania, Montenegro, Poland and Serbia November 2009 24

Capacity Building Summary of objective : Development of global strategies to facilitate human and institutional capacity building across all relevant aspects of cybersecurity Related activities/initiatives Toolkits and Resources ITU National Cybersecurity/ CIIP Self-Assessment Tool ITU Toolkit for Promoting a Culture of Cybersecurity ITU Botnet Mitigation Toolkit and pilot projects IMPACT Project IMPACT Training and Skills Development Centre IMPACT Research Division Training and Events Capacity building and training across all the pillars of the GCA Targeted workshops and events November 2009 25

Examples of Some Ongoing Initiatives ITU National Cybersecurity/CIIP Self Assessment Tool To assist governments in examining existing national policies, procedures, norms, institutions and other elements necessary for formulating cybersecurity strategies www.itu.int/itu-d/cyb/cybersecurity/readiness.html ITU Study on the Financial Aspects of Network Security: Malware and Spam, 2008 The study develops a framework within which the financial impacts and implications can be assessed and brings together the many disparate sources of financial data on malware and spam. www.itu.int/itu-d/cyb/cybersecurity/spam.html November 2009 26

ITU-EC HIPCAR Project Enhancing Competitiveness in the Caribbean through the Harmonization of ICT Policies, Legislation and Regulatory Procedures Harmonization in this project involves promoting the development of consistent, coherent and effective ICT policies, legislation and regulations across the Caribbean, aimed at: enhancing regional competitiveness and socio-economic & cultural development facilitating market integration create an enabling environment for ICT development & connectivity fostering investment in improved ICT capacities & services protecting ICT consumers interests HIPCAR is part of a global ITU-EC project for ACP countries, also involving Africa and the Pacific... November 2009 27

Project work areas & partners Work areas: 1) ICT Legislative Framework information society issues, e.g. ecommerce (transactions & evidence); cybercrime; privacy & data protection; interception of communications; access to public information 2) Telecommunications Acts Review: universal access/service 3) Telecommunications Acts Review: interconnection & licensing 4) egovernment Partner organisations at country level: Bodies responsible for ICT policy and regulation Organisations representing the ICT service industry & ICT consumers Organisations responsible for ICT capacity development (CoEs, etc.) Partner organisations at regional & international level CARICOM Secretariat Caribbean Telecommunications Union (CTU) Caribbean Centre for Development Administration (CARICAD) Caribbean Association of National Telecommunications Organizations (CANTO) Eastern Caribbean Telecommunications Authority (ECTEL) European Commission November 2009 28

Project implementation two phases Phase I - Development of regional models in each work area (based on int l best practices & country experiences) a) Assessment of current situation b) ICT policy guidelines b) Draft model legislation supporting these policies c) Implementation guidelines for transposing the model legislation into local laws & regulations Phase I workplan key elements: 1. Undertake a regional assessment & prepare the draft proposals 2. Review & finalize the proposals through 2 consultation workshops with regional working groups and country focal points 3. Clearance of the proposals by the project Steering Committee 4. Follow-up advocacy of the proposals in the countries with the support of CARICOM Secretariat & CTU 5. Validation of the proposals through a regional Senior Officials meeting Phase II Country-level implementation Transposition of regional models into national policies, laws & regulations (with adaptation as needed) including implementation assistance & capacity building November 2009 29

HIPCAR Working Group 1 Information Society Issues, e.g. ecommerce & cybersecurity Activities to date: - Organization of Project Planning Meeting (Grenada, 15-16 December 2008) - Designation of Country Focal Points & Working Group members - Constitution of the Working Group & hiring of regional experts - Preparation of & request for comments on draft Assessment Reports on the current situation in the Caribbean relating to the WG s six work areas: ecommerce (Transactions & Evidence), Access to Public Information, Privacy & Data Protection, Cybercrime, Interception of Communications - Work undertaken by: - senior regional expert: Karen Stephen-Dalton - junior regional expert: Pricilla Banner - Project management by ITU (in collaboration with CTU): - Manager: S. Bazzanella, Coordinator: K. Ludwig www.itu.int/itu-d/projects/itu_ec_acp/hipcar November 2009 30

Examples of Some Ongoing Initiatives ITU Regional Cybersecurity Forums 8 regional cybersecurity events held in 2007 and 2008 in all regions. Three more took/will take place in 2009: 2009 ITU Regional Cybersecurity Forum for Africa and Arab States held in Tunisia, 4-5 June 2009 2009 ITU Regional Cybersecurity Forum for Asia Pacific held in India, 23-25 September 2009 2009 ITU Regional Cybersecurity Forum for Americas to be held in Dominican Republic, 23-25 November 2009 www.itu.int/itu-d/cyb/events/ November 2009 31

International Cooperation Summary of objective : Development of proposals to enhance international dialogue on issues that pertain to cybersecurity and enhance cooperation and coordination across all relevant activities Related activities/initiatives Working Together ITU Secretary-General High Level Expert Group (HLEG) deliverables Information Sharing ITU-IMPACT collaboration ITU Cybersecurity Gateway ITU s Child Online Protection (COP) initiative Conferences/ Events World Telecommunication and Policy Forum WTPF 2009 Regional cybersecurity forums November 2009 32

Child Online Protection (COP) COP is a global initiative created by ITU, as part of the Global Cybersecurity Agenda, aims to address cybersecurity holistically. COP Objectives: Identify risks and vulnerabilities to children in cyberspace Create awareness Develop practical tools to help minimize risk Share knowledge and experience www.itu.int/cop/ November 2009 33

Child Online Protection (COP) Guidelines Guidelines for Children Guidelines for Parents, Guardians and Educators Guidelines for Industry Guidelines for Policy Makers The Draft Guidelines can be found online at: www.itu.int/cop The Guidelines were presented in October at ITU TELECOM WORLD 2009 November 2009 34

ITU-D s s Approach to Cybersecurity Needs for global solutions and harmonized international frameworks ITU Global Cybersecurity Agenda (GCA) Integrated approach to cybersecurity undertaken within the WTDC Program 3 managed by ITU-D s s ICT Applications and Cybersecurity Division Implementation at national, regional and international level Special focus on developing countries Multi-stakeholder approach ITU Study Groups work ITU Conferences outcomes Addressing the specific requirements of the countries, to provide strategies at national level November 2009 35

Links to More Information An Overview of ITU Activities in Cybersecurity www.itu.int/cybersecurity/ ITU Global Cybersecurity Agenda www.itu.int/cybersecurity/gca/ ITU-D ICT Applications and Cybersecurity Division www.itu.int/itu-d/cyb/ ITU National Cybersecurity/CIIP Self-Assessment Toolkit www.itu.int/itu-d/cyb/projects/readiness.html ITU Cybercrime Legislation Resources www.itu.int/itu-d/cyb/cybersecurity/legislation.html ITU Botnet Project Website www.itu.int/itu-d/cyb/cybersecurity/projects/botnet.html Regional Cybersecurity Forums and Conferences www.itu.int/itu-d/cyb/events/ ITU Child Online Protection (COP) www.itu.int/cop/ November 2009 36

Thank You! For more information on ITU s Cybersecurity Activities visit the website at: www.itu.int/cybersecurity/ or contact cybmail@itu.int International Telecommunication Union