Session 5.3 Alexander Ntoko

50 %
50 %
Information about Session 5.3 Alexander Ntoko
Technology

Published on March 19, 2014

Author: CommonwealthTelecommunications

Source: slideshare.net

ITU mandate on cybersecurity 2003 – 2005 WSIS entrusted ITU as sole facilitator for WSIS Action Line C5 - “Building Confidence and Security in the use of ICTs” 2007 ITU Cybersecurity Agenda (GCA) was elaborated and endorsed by ITU Member States GCA is a framework for international cooperation in cybersecurity 2008 to date ITU Membership endorsed the GCA as the ITU-wide strategy on international cooperation. Building confidence and security in the use of ICTs is widely present in PP and Conferences’ resolutions. In particular WTSA 12, PP 10 and WTDC 10 produced Resolutions (WTSA 12 Res 50, 52, 58, PP Res 130, 174, 179, 181 and WTDC 45 and 69) which touch on the most relevant ICT security related issues, from legal to policy, to technical and organization measures.

Global Cybersecurtiy Agenda (GCA) • GCA is designed for cooperation and efficiency, encouraging collaboration with and between all relevant partners, and building on existing initiatives to avoid duplicating efforts. • GCA builds upon five pillars: 1. Legal Measures 2. Technical and Procedural Measures 3. Organizational Structure 4. Capacity Building 5. International Cooperation • Since its launch, GCA has attracted the support and recognition of leaders and cybersecurity experts around the world. • H.E. Blaise Compaoré, President of Burkina Faso, and H.E. Dr Óscar Arias Sánchez, Former President of the Republic of Costa Rica and Nobel Peace Laureate, are both Patrons of the GCA.

High-Level Expert Group (HLEG) • The High-Level Expert Group (HLEG) on Cybersecurity was established in 2007. It is comprised of over 100 renowned experts from a broad range of backgrounds, sectors and geographical regions. • These experts worked tirelessly to formulate proposals to the ITU Secretary-General on strategies to curb cyberthreats, combat cybercrime and promote cybersecurity. • Its outputs include the Report of the Chairman of the HLEG, a set of strategic proposals, and the HLEG Global Strategic Report, which summarizes the HLEG’s work in seeking to promote cybersecurity around the world.

ITU National Cybersecurity Strategy Guide Report on ITU-D SG1 Q22 Technical assistance and projects Regional Cybersecurity Seminars Regional Centres 4. Capacity Building Global Cybersecurity Agenda (GCA) CIRT assessments and deployment ITU work on CIRTs cooperation ITU Cybersecurity Information Exchange Network (CYBEX) MoU with FIRST ITU-D SG 1 Q22 3. Organizational Structures 5. International Cooperation ITU High-Level Expert Group (HLEG) ITU-IMPACT Collaboration ITU Cybersecurity Gateway ITU’s Child Online Protection(COP) Collaboration with UN, and other IGOs, as well as with Symantec, Trend Micro, ABI research, etc ITU Publication on Understanding Cybercrime: A Guide for Developing Countries MoU with UNODC ITU-EC project 1. Legal Measures ITU Standardization Work and ITU-D SG1 Q22 ICT Security Standards Roadmap ITU-T JCA on COP Cooperation and other industry partners 2. Technical and Procedural Measures GCA: From Strategy to Action

ITU-T Activities ITU-T Study Group 17 • Lead Study Group for Telecommunication Security • Mandate for Question 4/17 (Q.4/17): Cybersecurity • Provides ICT Security Standards Roadmap • ITU-T Cybersecurity Information Exchange Framework (CYBEX) • ITU-T Security Manual "Security in telecommunications and information technology • Focus Group on Identity Management (IdM) • Approved over 100 Recommendations on security for communication • JCA on COP WTSA Resolutions  ITU WTSA Resolution 50: Cybersecurity  ITU WTSA Resolution 52: Countering and combating spam  ITU WTSA Resolution 58: Encourage the creation of national computer incident response teams, particularly for developing countries

ITU-R Activities • Establish fundamental security principles for IMT-2000 (3G) networks • Issue ITU-R Recommendation on security issues in network management architecture for digital satellite system and performance enhancements of transmission control protocol over satellite networks ITU-R Recommendations • Recommendation ITU-R M.1078: Security principles for International Mobile Telecommunications-2000 (IMT-2000) • Recommendation ITU-R M.1223: Evaluation of security mechanisms for IMT-2000 • Recommendation ITU-R M.1457: Detailed specifications of the radio interfaces of International Mobile Telecommunications-2000 (IMT-2000) • Recommendation ITU-R M.1645: Framework and overall objectives of the future development of IMT-2000 and systems beyond IMT-2000 • Recommendation ITU-R S.1250: Network management architecture for digital satellite systems forming part of SDH transport networks in the fixed-satellite service • Recommendation ITU-R S.1711: Performance enhancements of transmission control protocol over satellite networks

Agreements with IMPACT, who signed an MoU with INTERPOL Collaboration with UNODC - To work together globally in building capacity on combating cybercrime and improve cybersecurity Collaboration with Symantec and Trend Micro - To make use of the expertise of globally recognized industry players Building a global movement The recent establishment of global collaborations emphasize the role of ITU as global catalyst on international cooperation in cybersecurity and BDT as mechanism to implement Collaboration with ABI Research – The Global Cybersecurity Index (GCI) Collaboration with FIRST – To share best practises on computer incident response Collaboration with Member States – Regional Cybersecurity Centres

ITU-IMPACT Initiative • 147 Member States joined the initiative • Conducted over 50 country assessment to determine cybersecurity readiness • Facilitated the deployment of 15 CIRTs [Computer Incident Response Teams] • Trained over 2700 cybersecurity professional and practitioners globally • Granted over 360 scholarships to 52 countries to create new professionals • Conducted world’s first cyber drills benefitting more than 60 countries

ITU’s Child Online Protection • Under the GCA umbrella, ITU initiated the Child Online Protection initiative (COP) in November 2008. • COP has been established as an international collaborative network for promoting the online protection of children and young people worldwide by providing guidance on safe online behavior. Objectives • Identify risks and vulnerabilities to children in cyberspace • Create awareness • Develop practical tools to help minimize risk • Share knowledge and experience July 2013: H.E. Dame Patience Goodluck Jonathan, First Lady of Nigeria was appointed ITU COP Champion

The Global Cybersecurity Index (GCI) Objective The Global Cybersecurity Index (GCI) aims to measure and rank each nation state’s level of cybersecurity development in five main areas: • Legal Measures • Technical Measures • Organizational Measures • Capacity Building • National and International Cooperation Goal Promote government strategies at a national level Drive implementation efforts across industries and sectors Integrate security into the core of technological progress Foster a global culture of cybersecurity

LDC project The “Enhancing Cybersecurity in LDCs” project aims at supporting the 48 LDCs in strengthening their cybersecurity capabilities. • to better respond to cyberthreats to ensure enhanced protection of their national infrastructure, including the critical information infrastructure, thereby making the Internet safer and protecting Internet users, • to serve national priorities and maximize socio-economic benefits in line with the objectives of the World Summit on the Information Society (WSIS) and the Millennium Development Goals (MDGs). 1212 BDT through the ICTDF made available 500.000 USD to start implementation, out of the total required amount of around 4 Million USD. Resource mobilization activities are taking place to secure the necessary resources. The project was launched in May 2013 for Haití, Sierra Leone, Gambia, Guinea, Djibouti, Mauritania, Comoros, Vanuatu

UN-wide framework on Cybersecurity & Cybercrime • ITU and UNODC, along with some 33 UN Agencies, developed UN-wide framework on Cybersecurity & Cybercrime. • Document focuses on the external efforts of UN entities concerning Member States • The purpose of this framework is:  To enable enhanced coordination among UN entities in their response to concerns of Member States regarding cybercrime and cybersecurity  To ensure more efficient and effective response mechanisms within the governments through the development of specialized policies based on the 7 basic principles included in this framework. • Framework document presented to and endorsed by the UN CEB in November 2013

(WCIT-12)  WCIT-12 set the ground for international cooperation on cybersecurity matters  Article 6, ITRs: Security and robustness of networks  Article 7, ITRs: Unsolicited bulk electronic communications  ITRs signed by 89 countries

Let’s work together

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

ITU mandate on cybersecurity - CTO

concerns of Member States regarding cybercrime and cybersecurity To ensure more efficient and effective response mechanisms within the
Read more

Programme | WSC CA Workshop

Programme; Venue; Registration; Takeaways ... Session Topic. Speakers; ... Alexander Ntoko Lane Hallenbeck: 13:00 : Event closure .
Read more

Reggaeton Session - Vol. 5 - Microsoft Store

Reggaeton Session - Vol. 5 Verschiedene Künstler. 2011 • 15 Musiktitel • Hip Hop • R&B / Soul • Rosenklang. Album ... Tony Alexander.
Read more

CST European User Conference 2016

CST European User Conference 2016 ... Session 5.2 Tilmann Wittig: Session 5.3 Maryam Kiyani: ... Alexander E. Hramov, ...
Read more

The Essential Report on IP Telephony - ITU

The Essential Report on IP Telephony ... the 2000 session of the ITU Council decided to convene the third World ... Mr Alexander Ntoko, ...
Read more

Reggaeton Session - Vol. 5 - Microsoft Store

Reggaeton Session - Vol. 5 Various Artists. 2011 • 15 kappaletta • HipHop / R&B • R&B • Rosenklang. Osta ... Tony Alexander. Reggaeton Session ...
Read more

UPDATE - JANUARY 2015 - Olympics

THE IOC SESSIONS . UPDATE - JANUARY 2015 1. ... Antonia CojuangcoJaworski, Alexander - Zhukov, ... IOC Session . 20 January 2015 ...
Read more

Briefing on the open consultation on enhanced cooperation ...

Briefing on the open consultation on enhanced cooperation on public policy issues related to the Internet, 18 May 2012 Summary report of the Chair
Read more

Xaõ Seffcheque – Wikipedia

Personendaten; NAME: Seffcheque, Xaõ: ALTERNATIVNAMEN: Sevschek, Alexander (wirklicher Name) KURZBESCHREIBUNG: österreichischer Musiker und Drehbuchautor
Read more