Promoting Global Cybersecurity

Similar documents
Cybersecurity & Spam after WSIS: How MAAWG can help

RESOLUTION 45 (Rev. Hyderabad, 2010)

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

RESOLUTION 130 (Rev. Antalya, 2006)

RESOLUTION 130 (REV. BUSAN, 2014)

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

Cybersecurity for ALL

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

Countering Spam. ITU-T Study Group 17 Geneva, Switzerland 11 October 2005

Internet Governance and the World Summit on the Information Society (WSIS)

RESOLUTION 67 (Rev. Buenos Aires, 2017)

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

Commonwealth Cyber Declaration

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Cyber Security in Europe

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

RESOLUTION 140 (REV. BUSAN, 2014)

Draft Resolution for Committee Consideration and Recommendation

Global cybersecurity and international standards

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

World Summit on the Information Society (WSIS) and the Digital Divide

Garry Mukelabai Communications Authority Zambia

Australian Government Cyber-security Activities in the Pacific

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

Valérie Andrianavaly European Commission DG INFSO-A3

Related to the Internet

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593

GLOBAL CYBERSECURITY INDEX 2016

2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Cyber Security Strategy

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

Global Cybersecurity Agenda

Security and resilience in Information Society: the European approach

Cybersecurity Strategy of the Republic of Cyprus

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

ENISA Cooperation in the EU / NIS Directive

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

G8 Lyon-Roma Group High Tech Crime Subgroup

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

National Policy and Guiding Principles

About Issues in Building the National Strategy for Cybersecurity in Vietnam

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

1 History of CyberSecurity in the Philippines 2 3

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

ITU Model Cybercrime Law: Project Overview

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

10025/16 MP/mj 1 DG D 2B

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Joint Declaration by G7 ICT Ministers

21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM

WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015!

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/56/561/Add.2)]

Comprehensive Study on Cybercrime

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

The cost of cybercrime the benefits of cooperation

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

Background. Threats. Present Status. Challenges and Strategies 9/30/2009 TRAI 2

Global Wildlife Cybercrime Action Plan1

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Data Protection and Cybercrime Challenges

Directive on security of network and information systems (NIS): State of Play

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Directive on Security of Network and Information Systems

OAS Cybersecurity Capacity Building Efforts

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

European Union Agency for Network and Information Security

Cybersecurity & Digital Privacy in the Energy sector

INTERNATIONAL TELECOMMUNICATION UNION

Forum. Ningbo, China 25 February

Legal Foundation and Enforcement: Promoting Cybersecurity

15412/16 RR/dk 1 DGD 1C

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness

Preparatory process of the second High-level United Nations Conference on South-South Cooperation

Smart Sustainable Cities

Itu regional workshop

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

Bradford J. Willke. 19 September 2007

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

GLOBAL AGENDA FOR CYBER CAPACITY BUILDING

GENERAL ASSEMBLY RESOLUTION A/RES/67/195. Information and communications technologies for development

Transcription:

Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1

Agenda Critical Infrastructures Cybersecurity Threats National Cybersecurity Themes Emerging International Cooperation Agenda in Promoting Global Cybersecurity References Draft WSIS Language Some Possible Future ITU Activities 2

Critical Infrastructures All countries depend on critical infrastructures for their national security: Telecommunications Banking & Financial Markets Health & Emergency Services Transportation Systems Critical Manufacturing Energy and Water Vital Government Services 3

Cybersecurity and Critical Information Infrastructures In 21st century, most critical infrastructures are dependent on information and communications systems that span the globe These are called Critical Information Infrastructures (CIIs) 4

Cybersecurity Threats There is continuum of threats to CIIs: Negligent/malicious employees independent hackers professional and organized attackers cyberterrorism Evidence the threat is increasingly serious, global and costly 5

Cybersecurity and Critical Information Infrastructure Protection Rapid growth of ICTs led to shift in perception of gravity of threat in the mid- 1990s Critical information infrastructure linkage made to other critical infrastructure systems Potential of Force Multiplier effects During this period, a number of countries began an assessment of their vulnerabilities/threats and considered how to redress them 6

National Cybersecurity Themes Identification of what constitutes critical sectors and risk assessment Interagency and multi-stakeholder approach prevails Private-public partnerships identified as crucial Harmonization of national legal provisions to enhance judicial and police cooperation Need for cooperative international action identified and acknowledged 7

Emerging International Cooperation Agenda in Promoting Global Cybersecurity some examples. 8

Examples: Promoting Global Cybersecurity WTSA Resolution 50 (2004): Cybersecurity WSIS Phase I (2003) DoP: 5) Building confidence and security in the use of ICTs & AP: C5. Building confidence and security in the use of ICTs ITU PP Res 130 (2002): Strengthening the role of ITU in information and communication network security UNGA Resolutions 58/199 (2004) and 57/239 (2002): Creation of a global culture of cybersecurity and protection of critical information infrastructure 9

ITU WSIS Thematic Meeting on Cybersecurity When: June 28 July 1 2005 What: This conference will examine the recommendations in the WSIS first phase s Plan of Action that relate to building confidence and security in the use of ICTs and the promotion of a global culture of cybersecurity Where: ITU Headquarters, Geneva, Switzerland See http://www.itu.int/cybersecurity/ 10

Meeting Themes Six Broad Themes: information sharing of national approaches, good practices and guidelines; developing watch, warning and incident response capabilities; harmonizing national legal approaches and international legal coordination; technical standards; privacy, data and consumer protection; providing assistance to developing economies. First day of meeting focused on countering spam as follow-up to 2004 Thematic Meeting on Countering Spam 11

Status of Cybersecurity & Spam Discussions towards WSIS Phase II On the road to Tunis See Sub-Committee A Chair s Paper on Chapter 3 after Prepcom-3 4th Reading at: http://www.itu.int/wsis/docs2/pc3/working/dt10rev4.pdf 12

WSIS Prepcom 3: 19-30 Sept 2005: Cybersecurity Chapter Three: Internet Governance, 3b) Public Policy Issues Related to the Use of the Internet We seek to build confidence and security in the use of ICTs by strengthening the trust framework. We reaffirm the necessity to further promote, develop and implement in cooperation with all stakeholders a global culture of cyber-security, as outlined in UNGA Resolution 57/239 and other relevant regional frameworks. This culture requires national action and increased international cooperation to strengthen security while enhancing the protection of personal information, privacy and data. Continued development of the culture of cyber-security should enhance access and trade and must take into account the level of social and economic development of each country and respect the development-oriented aspects of the Information Society. (Agreed) 13

WSIS Prepcom 3: 19-30 Sept 2005: Cybersecurity Chapter Three: Internet Governance, 3b) Public Policy Issues Related to the Use of the Internet [We underline the importance of the prosecution of cybercrime, including cybercrime committed in one jurisdiction but having effects in another. We call upon governments in cooperation with other stakeholders to develop necessary legislation for the investigation and prosecution of cybercrime, noting existing frameworks, for example, UNGA Resolutions 55/63 and 56/121 on Combatting the criminal misuse of information technologies and the Council of Europe's Convention on Cybercrime. [We further underline the necessity of effective and efficient tools and mechanisms, at national and international levels, to promote international cooperation among, inter alia, law enforcement agencies on cybercrime.]. ] (Not Agreed) 14

WSIS Prepcom 3: 19-30 Sept 2005: Spam Chapter Three: Internet Governance, 3b) Public Policy Issues Related to the Use of the Internet We resolve to deal effectively with the significant and growing problem posed by spam. We take note of current multilateral, multistakeholder frameworks for regional and international cooperation on spam, for example, the APEC Anti-Spam Strategy, the London Action Plan, the Seoul Melbourne Anti-Spam Memorandum of Understanding and the relevant activities of the OECD and ITU. We call upon all stakeholders, to adopt a mult-pronged approach to counter spam that includes, inter alia, consumer and business education; appropriate legislation, law enforcement authorities and tools; the continued development of technical and self regulatory measures; best practices; and international cooperation. (Agreed) Note there is nothing in this multi-pronged approach that cannot be argued to apply more generally to promoting global cybersecurity 15

Possible Future ITU Specific Activities on Cybersecurity Survey, describe and raise awareness of issues generally faced by national policy makers: Development of best practices, standards, technical guidelines and procedures to reduce vulnerabilities National coordination mechanisms Appropriate national legal infrastructures Watch, warning and recovery capabilities Government/industry partnerships Outreach to civil society and consumers 16

Closing Remarks Each May 17th, ITU celebrates World Telecommunication Day, which celebrates ITU s founding in 1865 and its history of helping the world communicate Promoting Global Cybersecurity is 2006 theme: ITU plans related awareness-raising campaign Formulating our ideas and welcome your input on how we can tie ITU s policy and technical agenda on cybersecurity together 17

Thank you International Telecommunication Union Helping the world communicate 18