Data privacy and cloud security

Similar documents
Leading the Digital Transformation from the Centre of Government

Cybersecurity & Digital Privacy in the Energy sector

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Global Cybersecurity Agenda

Angela McKay Director, Government Security Policy and Strategy Microsoft

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

ENISA EU Threat Landscape

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

Global cybersecurity and international standards

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

Securing Europe's Information Society

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Outcomes of the workshop 5G Security: Phase 1 landscape and foreseen evolutions took place at Oulu, on 12-of June.

National Policy and Guiding Principles

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

RESOLUTION 130 (REV. BUSAN, 2014)

Regional Development Forum For the Arab States(RDF-ARB) 2018

Cybersecurity for ALL

Commonwealth Cyber Declaration

Promoting Global Cybersecurity

Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

ASEAN Cyber Security and Cyber Crime Center: Possibility and Way Forward

Systemic Analyser in Network Threats

IMPORTANT GLOBAL CYBERLAW TRENDS 2017

Programme. Legal Instruments for the Internet Economy. Building Capacity and Implementing Regulation. Malta, 14 th to 19 th September, 2015

ITU Annual Regional Human Capacity Building Workshop on. Strengthening Capacities in Internet Governance in Africa. Abuja, August 2018

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration

ITU Annual Regional Human Capacity Building Workshop on. Strengthening Capacities in Internet Governance in Africa. Abuja, August 2018 PROGRAMME

National Communications Authority

European Directives and reglements for Information security

10025/16 MP/mj 1 DG D 2B

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 21 October /13 LIMITE CO EUR-PREP 37. NOTE General Secretariat of the Council

RESOLUTION 130 (Rev. Antalya, 2006)

Standardization in the area of Cooperative systems in the MENA region

Package of initiatives on Cybersecurity

IGF 2018 Workshop Proposals Pre-Evaluation Figures

ITU Forum on Smart Sustainable Cities Abu Dhabi-UAE, 3-4 May 2015

Telecommunication Development Bureau (BDT)

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

National program of digital transformation

INTERNATIONAL TELECOMMUNICATION UNION

ITU Regional Development Forum 18 JULY 2018

RESOLUTION 45 (Rev. Hyderabad, 2010)

13967/16 MK/mj 1 DG D 2B

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

4 th - 5 th 6 th June 2013, Speke Resort, Uganda Day 1

Modernising the public sector through the cloud

Regulating for a Digital Economy

China and International Governance of Cybercrime

Robert Holleyman, President and CEO, BSA The Software Alliance

Itu regional workshop

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

PROTECT International Exhibition and Conference on Security & Safety. March 12 13, 2018 at New World Makati Hotel, Manila, Philippines

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt

ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis - Tunisia, Feb. 2017

Telecommunication Development Bureau (BDT)

VIENNA CYBER SECURITY WEEK 2019 Protecting Critical Infrastructure

Scope of the Member State mechanism

IoT Security Policy and Regulation Initiatives in China. Fan Dongyang, Huawei

Legal Foundation and Enforcement: Promoting Cybersecurity

G7 Bar Associations and Councils

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Inter-American Port Security Cooperation Plan

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified

Committed to connecting the world

INFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE.

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

New CEPIS Mission

CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING

Introductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER

Caribbean Stakeholders Meeting: Cyber Security and Cybercrime (CSM II) Provisional Agenda. Day 1: 16 March 2016

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

RESOLUTION 47 (Rev. Buenos Aires, 2017)

Cyber Security in Europe

Agenda. 1. 5G Brasil Structure 2. Scenarios 3. Vertical Markets 4. Technological Trends 5. 5G at Inatel 6. Conclusions

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Cybersecurity & Spam after WSIS: How MAAWG can help

EVENT REPORT MARCH 2016, BT TOWER, LONDON, UK. DATE: March VENUE: BT Tower London, UK

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

Cyber Security Strategy

ICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015

Cyber Security Roadmap

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

UNODC tackling cybercrime in support of a safe and secure AP-IS

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY

Cyber Security and Cyber Fraud

Australian Government Cyber-security Activities in the Pacific

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity

Society, the economy and the state depend on information and communications technology (ICT).

Transcription:

Data privacy and cloud security Abstract The use of cloud computing is rapidly evolving in many Arab & African countries due to its costefficiency and flexibility. This technology holds the potential to eliminate the requirements for the setup of expensive computing infrastructure for IT-based solutions and infrastructures. However, this rapid growing of the cloud computing market motivated malicious users to revise their attack techniques to cope with the specific features of the cloud infrastructure. Especially, attacks on data privacy are becoming a crucial issue since resource sharing is a pillar of the cloud model. Henceforth, many of the Arab &African countries need to take the lead in formulating national and regional regulatory policy, frameworks and legal measures addressing cybersecurity, as these may not yet fully balance data privacy against providing the means by which governments can address cybercrime and cyber threats in general. While establishing such a balance is a challenging task for all governments, it is an action that builds confidence and security in the use of the Internet and its various applications, and one that enables socio-economic development in the modern age. The extremely rapid deployment of big data technologies, cloud services, and the Internet of Things as well as the constant and dynamic evolution of cyber threats make this task all the more urgent and critically important. The traditional discussion on the balance between individual liberties and security remains actual. As cyberspace is borderless, this balance requires decisions on common policies, security strategies and coherent legal frameworks at the regional level, as well as possibly actions to achieve a coordinated and coherent implementation of these. This workshop aims at providing advocacy on the policies, challenges and objectives of cloud services privacy, data protection and security, as well as possible actions for regional actions and their expected impacts. This workshop engages key leaders of cybersecurity Programs to help share experiences, challenges, and ideas, and to contribute to the process of formulation the appropriate policies and frameworks and knowledge sharing on cloud services and IOT security challenges throughout the region. Highlights Share the latest issues and best practices regarding the legislations and regulations in place to address the issues related to data privacy. Encourage formulation of national and regional regulatory and technical policies and frameworks and legal measures to ensure data privacy and combat the different forms of cyber threats in the Arab region, thereby ensuring optimal and secure use of the Internet and its various applications and building confidence in the Internet Discuss potential concerns on implementation and success factors.

Agenda Day 1 [5 December 2016] 08.30 09.30 Delegates registration 09.30 10.00 Opening Ceremony HE. Mr. Mohamed Ben Amor [Secretary General - AICTO] Ms. Rouda AlAmir Ali, [Programme Officer, ITU- Arab Regional Office] Mr. Mohamed Ali Mejeri [General Director - Elgazala Technopark - Tunisia] HE. Mr. Habib dabebi [Secretary of State of Knowledge Economy- Tunisia] 10:00-10.30 10:30 11:30 KeyNote Speech Mr. Chawki Gaddes [INPDP President] Session 1: Data classification This session will define and classify the data being generated by using Internet and digital services. - Data definition - Data classification - Big data 11:30-12:00 Coffee Break Mr. Chawki Gaddes [INPDP President] Mr. Nawfel Frikha [CEO - ANSI] Mr. Mohamed Jomni [ICT Director - ALECSO] Mr. Mohamed Basti [ISACA Tunisian Chapter of ISACA] 12.00 13.00 Session 2: Enforcing privacy: Regulatory & Legal approaches This session will provide advocacy on the regulatory and legal measures related to cloud services, data protection and security. It discuss the impacts of applying such policies in order to enable greater confidence that data collected through the provision of cloud services is used for greater societal benefit in ways which respects end-user privacy. - Cloud Computing in Arab countries: Legal and Legislative Aspects, Facts and Horizons Mr. Mohamed Ben Amor [Secretary General - AICTO] Ms. Rouda AlAmir Ali [Programme Officer, ITU Arab Regional Office] Mr. Faycel Ajina [Cybersecurity Expert] Dr. Patrick Boismenu [Crime Prevention and Criminal Justice Officer (Cybercrime, United Nations Office on Drugs and Crime -UNODC] Mr. Mohamed Mdalla [Directeur Juriste - Tunisie Télécom] Countries

13:.00 14:30 Session 3: Enforcing privacy: Technological approaches Technologies can play a strong role in ensuring data protection rules are followed. Through technological means and careful design, it is possible to limit data collection, to mathematically restrict further data processing, to assuredly limit unnecessary access, amongst other privacy measures. This session will discuss new technologies, and the ways in which these technologies will contribute to ensure data protection. Mr. Farouk Kammoun [Professor Emeritus- President of SESAME University] Mr. Nizar ben Neii Dr. Mohamed Hamdi [Director of Development, Cooperation and Communication - Elgazala Technopark] Mr. Robin Wilton [ Technical Outreach for Identity and Privacy, ISOC] [Remotely] 14:30-16:00 Lunch

Day 2 [6 December 2016] 09.00 10.30 Session 1: Challenges in the Digital Ecosystem This session will discuss the new technologies (IOT, M2M, ) and business opportunities, and the ways in which Data privacy and security could be achieved to stimulate the evolution of these services and applications. - Machine-to-machine, Internet of Things, Big Data, Cloud Computing and new business challenges - Regional priorities and concerns for protecting data Mr. Sami Trimech [Director of Strategic Planning and Development - AICTO] Ms. Zeineb Gouider [Dataxion] Mr. Ali Boutris [Forsys] Ms. Selma Ben Amor [Ericsson] 10:30-11:00 11:00-12: 15 Coffee Break Session 2: Round table: Security versus data privacy This session will discuss the different approaches that countries are applying for ensuring data privacy and promoting the new digital services, as well as national policies to secure these services. - Best practices - Experience from countries - Data protection Policy trends in a smart connected world Dr. Mohamed Hamdi [Director of Development, Cooperation and Communication - Elgazala Technopark] Ms. Rouda AlAmir Ali [Programme Officer - ITU Arab Regional Office] Mr. Jean Francois Beuze [Cipharis] Mr. Hichem Besbes [President INT - Tunisia] Countries representatives Final conclusions and closing of the workshop