Global Cybersecurity Agenda

Similar documents
Global cybersecurity and international standards

Cybersecurity for ALL

ITU-IMPACT Capacity Building for Least Developed & Developed Countries

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 45 (Rev. Hyderabad, 2010)

INTERNATIONAL TELECOMMUNICATION UNION

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Regional Cyber security Forum for Africa and Arab States, Tunis, Tunisia 4 th -5 th June 2009

RESOLUTION 130 (Rev. Antalya, 2006)

Promoting Global Cybersecurity

ITU Global Cybersecurity Agenda (GCA) A Framework for International Cooperation in Cybersecurity

Commonwealth Cyber Declaration

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

Cybersecurity & Spam after WSIS: How MAAWG can help

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Cybersecurity for ALL

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

Internet Governance and the World Summit on the Information Society (WSIS)

RESOLUTION 140 (REV. BUSAN, 2014)

RESOLUTION 47 (Rev. Buenos Aires, 2017)

WSIS Forum Open Consultation Process

GLOBAL CYBERSECURITY INDEX 2016

INTERNATIONAL TELECOMMUNICATION UNION

WSIS Implementation and Follow-up Towards the Overall Review WSIS+10

Role of ITU in Building Security & Trust in Cyberspace

Related to the Internet

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

SPACE for SDGs a Global Partnership

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Cybersecurity, Trade, and Economic Development

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

Cybersecurity & Digital Privacy in the Energy sector

World Summit on the Information Society (WSIS) and the Digital Divide

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Collaboration between National CSIRTs. Marco Obiso Cybersecurity Coordinator International Telecommunication Union (ITU)

THE VALUE OF INTERNATIONAL COOPERATION IN CYBERSPACE: LESSONS FROM THE UNGGE PROCESS

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Committed to connecting the world

ENISA s Position on the NIS Directive

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Donor Countries Security. Date

Internet Governance: Today and Tomorrow

Globally Networked Customs Context, Concept, Rationale and Benefits - Indian Customs Perspective

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Donor Countries Security. Date

CSTD Working Group on improvements to the IGF Summary of the 3 rd meeting

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

PLENIPOTENTIARY CONFERENCE REPORT 3 FINAL CONFERENCE WRAP-UP This is a final wrap-up report on the ITU Plenipotentiary Conference of 2010.

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

RESOLUTION 67 (Rev. Buenos Aires, 2017)

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

WSIS Action Lines Roadmaps C2, C5, C6

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

OAS Cybersecurity Capacity Building Efforts

The Arab ICT Organization

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.

International Cooperation on Child Online Protection

The Philippine ICT Statistics Portal: From Concept to Reality

Information technology Security techniques Information security controls for the energy utility industry

ITU Academia. Smart Partnership for ICT4SDG. Jaroslaw K. PONDER Coordinator for Europe Region

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

A Global Protocol on Cybersecurity and Cybercrime

KOBE REPORT draft Report of Session 5.4, Thematic Cluster 5. Telecommunications Saves Lives: role of information and communication technologies

Draft Resolution for Committee Consideration and Recommendation

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

AADMER Work Programme

etrade for all Year in Review Let s make e-commerce inclusive and drive development

PROGRAM SUMMARY OBJECTIVES RESULTS. Last updated date: 7/27/2017. Target Beneficiaries. Donor Security

ENISA EU Threat Landscape

Cybersecurity Strategy of the Republic of Cyprus

Australian Government Cyber-security Activities in the Pacific

G7 Bar Associations and Councils

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

Legal Foundation and Enforcement: Promoting Cybersecurity

Cybersecurity for ALL

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Module 4: ICT Trends for Government Leaders

Itu regional workshop

The Global Context of Sustainable Development Data

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

Caribbean Cyber Security: Not Only Government s Responsibility

Presented by: - Anselm Charles ICT Manager CARICOM IMPACS

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

Jo-Anna Wood WHO Global Observatory for ehealth: research and resources for use in Australia HIC 2016

Transcription:

Global Cybersecurity Agenda A Framework for International Cooperation in Cybersecurity ITU Workshop on Frameworks for National Action: Cybersecurity and Critical Information Infrastructure Protection 17 Geneva, Switzerland Yayeh Kitaw Corporate Strategy Division International Telecommunication Union 1

Presentation Outline The need for a global solution What is the Global Cybersecurity Agenda (GCA) How will the GCA work Conclusion 2

The Global Nature of Threats Constant evolution of the nature of cyberthreats Low entry barriers and increasing sophistication of cybercrime Loopholes in current legal frameworks Vulnerabilities of software applications Absence of appropriate organizational structures 3

The Need for Global Strategies Cyberthreats issues are global Time, geography, location of victims are no longer barriers Countries can not easily close their borders to cyberthreats Legal and technical measures at the national and regional level are necessary but not sufficient Attempts to try to solve these challenges at the national and regional level have proven insufficient Cybercriminals are shifting their operations to countries where appropriate and enforceable laws are not yet in place. Understanding what cybersecurity means to all The value of critical resources and assets such as data vary from country to country 4

ITU as a Forum for International Cooperation in Cybersecurity ITU Secretary-General has identified cybersecurity as one of the top priorities ITU was entrusted to take the lead as sole facilitator for Action Line C5, Building confidence and security in the use of information and communication technologies (ICTs) at the second phase of the WSIS in Tunis in 2005. ITU membership has been calling for a greater role to be played by ITU in matters relating to cybersecurity through various Resolutions, Decisions, Programmes and Recommendations. 5

The Global Cybersecurity Agenda Launched in May 2007 by the ITU s Secretary-General, Dr. Hamadoun Touré on World Telecommunication and Information Society Day The Global Cybersecurity Agenda (GCA) is an ITU framework for international cooperation aimed at proposing strategies for solutions to enhance confidence and security in the use of ICTs will build on existing national and regional initiatives avoid duplication and encourage collaboration A Unique vision, a unique forum 17 May 2007, International Herald Tribune supplement 9 July 2007, UN Secretary- General historic visit to ITU 6

The Global Cybersecurity Agenda The GCA is built upon five strategic pillars: Legal frameworks Technical measures Organizational Structures Capacity Building International Cooperation 7

An Agenda for Change, Setting Achievable Goals Elaboration of strategies for: A Global Strategy 1 the development of a model cybercrime legislation 2 the creation of appropriate national and regional organizational structures and policies on cybercrime 3 the establishment of security criteria and accreditation schemes for software applications and systems. 4 the creation of a global framework for watch, warning and incident response 5 the creation and endorsement of a generic and universal digital identity system 6 the facilitation of human and institutional capacity-building 7 international cooperation, dialogue and coordination A Five-Part Platform 8

High-Level Experts Group ITU s Secretary-General will seek the advice of the High-Level Experts Group (HLEG) on strategies in all five work areas or pillars. A global multi-stakeholder think-tank made up of high level experts Its members of the HLEG will be nominated by the ITU Secretary-General. Its work will be funded primarily through voluntary contributions (cash and in-kind) Balance in the membership of HLEG, its members will be nominated as follows: a Member States (10) government representatives of countries from the five world regions b Industry (20) manufacturers, operators, service providers, software developers, security and other information technology firms c International organizations (5) d Academic and research institutions (5) e Individual experts (5) 9

Responsibilities of the High-Level Experts Group To further develop the Global Cybersecurity Agenda, by proposing refinements to its main goals To analyze current developments in cybersecurity, including both threats and state-of-the-art solutions, anticipate emerging and future challenges and formulate proposals to the ITU Secretary-General To meet to goals of the GCA To provide guidance on possible long-term strategies and emerging trends in cybersecurity 10

Conclusion Towards a global Cyberpeace Cybersecurity issues are global and demand a global solution The magnitude of this issue calls for a coordinated global response to ensure that there are no safe heavens for cybercriminals. ITU will act as a catalyst and facilitator for these partners to share experience and best practice, so as to step up efforts for a global response to cybercrime. In this way, working together, we can create a cyberspace that is somewhere safe for people to trade, learn and enjoy. Dr Hamadoun I. Touré 11

More information The Global Cybersecurity Agenda web site itu.int/cybersecurity/gca/ ITU activities in Cybersecurity itu.int/cybersecurity/ WSIS Action Line C5: Building confidence and security in the use of ICTs itu.int/wsis/c5/ 12

International Telecommunication Union Helping the World Communicate 13