Global Cyberspace Cooperation Update and Prognosis, June 2015 Bruce W. McConnell Senior Vice President

Slides:



Advertisements
Similar presentations
INTERNET GOVERNANCE WHAT DOES IT MEAN FOR AFRICA? ASHOK.B.RADHAKISSOON.
Advertisements

STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
International Telecommunication Union ITU-D Overview.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
UNODC & the Global Response to Cybercrime
Ministry of Interior of Montenegro,,The Fight against corruption and organized crime in Montenegro Ministry of Interior of Montenegro,,The Fight against.
L-Root: Expanding Distribution in Africa. 2 One of 13 root name servers containing Internet Protocol addresses Operated by ICANN using anycast technology.
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
State of play and activities in 2014 March 2014
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
Nairobi Convention Clearinghouse THE NAIROBI CONVENTION CLEARINGHOUSE AND INFORMATION SHARING SYSTEM 26 November-5 December 2007, Silver Springs, Nairobi,
Measurement of crime at international level Side Event UNSC New York February 2012 Angela Me Chief Statistics and Surveys Section UNODC.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Cyber Crime in the Digital Age
Work Stream 4: Financial Market Infrastructures & Cross-Border Market Practices The Asia Pacific Financial Forum (APFF) Seattle Symposium, 7 July 2014.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Strategies to prevent and respond to violence against children who are in contact with the justice system APJJC Second Meeting “Towards child-friendly.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Revised Draft Strategic Plan 4 December 2010.
Research Statement Motivating Your Research in Five Sentences.
European Commission Taxation and Customs Union 11 Taxing Multinational Corporations: Addressing Transfer Pricing and Cross Border Tax Avoidance Thomas.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
1 How to Improve Law Enforcement - Service Providers Cooperation in India A presentation by: Lalit Mathur ISPAI.
Co-funded By the European Union INHOPE The International Association of Internet Hotlines Budapest 25 September 2012 Denton Howard INHOPE Training & Services.
Federal Bureau of Investigation
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Internet Governance What ? Where ? How ? Wim Degezelle International Conference on DNS and Internet Riga, Latvia 19 April 2013.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
OVERVIEW OF CAPITAL MARKET DEVELOPMENT IN THE LAC REGION Carolin A. Crabbe Infrastructure and Financial Markets Division INTER-AMERICAN DEVELOPMENT BANK.
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
1 WFC 2015, Mexico Worldwide implementation of the PFMI Froukelien Wendt, Monetary and Capital Markets Department, IMF.
UIC presentation North South Conference, Catania, 27 April 2013 Jacques COLLIARD, head of UIC security Division.
A National approach to Cyber security/CIIP: Raising awareness.
SECI Regional Center for Combating Transborder Crime 22. – 23. June 2010 Bucharest, Romania.
1 Jim Devlin Comptroller of the Currency November 5, 2009 Data Breaches in Payments Systems -- Roles and Best Practices for the Public and Private Sector.
Making South Africa a Global Leader in Harnessing ICTs for Socio-economic Development SECRET 1 PRESENTATION TO THE PORTFOLIO COMMITTEE ON COMMUNICATIONS:
World summit on the information society 1 WSIS: Internet Governance President of the WSIS Phase II Preparatory Committee Ambassador Janis Karklins April.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
Looking Forward the Post-2015 Sustainable Development Goals (SDGs) UNSD-DFID Project on National Development Indicators: Country Director's Meeting, New.
Global Energy Basel GEB – The Investment Platform for Sustainable Infrastructure Presentation of
“FIGHT AGAINST CORRUPTION – Integrative feedback of domestic and international activities” Ohrid, Macedonia, 15 October 2010.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
The CIA and the INS The CIA
First ARF Inter-sessional Meeting on non proliferation Beijing, China 1-3 July 2009 First ARF Inter-sessional Meeting on non proliferation Beijing, China.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Update on Liberia’s ICT Regulations and E-commerce Services at the Harmonization of ECOWAS Region Cyber Legislation, Accra March 2014 By Cllr. Roosevelt.
Strengthening national capacities to prevent and combat cybercrime: UNODC Global Programme on Cybercrime Tania Banuelos Crime Prevention and Criminal Justice.
SUNY/CID: Connecting People and Ideas for Integrated Development James Utermark Acting Director Center for International Development US Government Democracy.
UNGGIM – PRIVATE SECTOR NETWORK. AGENDA > OVERVIEW OF PRIVATE SECTOR >PURPOSE AND VISION OF PRIVATE SECTOR NETWORK > STRUCTURE AND TERMS OF REFERENCE.
Information Exchange Between National and International Entities Santiago, Chile, 46th CIAT General Assembly Sergio Mujica, WCO Deputy Secretary General.
UHC2030: working together to strengthen health systems
ANSI – ESOs meeting Washington February 2017
UNFPA ESARO Technical Adviser, Population Data Policy
New Industry Initiatives in CyberSecurity
Attribution & the globalization of criminal evidence
MUTUAL ASSISTANCE Brussels, June 2013 M O N T E N E G R O
Governance, Risk Management & Compliance (GRC) Market Share, Segmentation, Report 2024
COMBATING THE SEXUAL EXPLOITATION
Europol Unclassified The role of regional and global law enforcement bodies and opportunities for enhanced cooperation - Europol 2nd Global Wildlife Enforcement.
Forth International Forum
Institutional Framework, Resources and Management
Combating Cybercrime: Tools and Capacity Building for Emerging Economies WSIS 2015, Geneva Jinyong Chung May 25, 2015.
Outline of Presentation
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Global Cyberspace Cooperation Update and Prognosis, June 2015 Bruce W. McConnell Senior Vice President

EastWest Institute 2  Make the world a safer place by addressing seemingly intractable problems that threaten regional and global stability.  Independent, International, Non-partisan  Founded in 1980, with offices in New York, Brussels, Moscow and Washington.  In 1980, E-W meant NATO-Warsaw Pact  Reunification of Germany  Former Soviet Union  China  90 Percent Privately Funded

EastWest and Cyber 3  Started in 20018, Expanded 2013  Five Global Summits  Berlin December 2014  NEW YORK – SEPTEMBER 9-10, 2015  ~300 Participants/40 Countries  Methodology: Convene, Reframe, Mobilize  Ongoing Breakthrough Work Streams

Ongoing Cooperation Work Streams 4  Increasing the Global Availability of Secure ICT Products and Services  Modernizing International Procedures against Cyber- enabled Crimes  Promoting Two-factor Authentication  Managing Global Encryption  Promoting Measures of Restraint in Cyber Armaments  Governing and Managing the Internet  Managing Objectionable Content Across National Borders  Increasing Transparency and Accountability in Personal Data Collection  Strengthening Critical Infrastructure Resilience and Preparedness

Cyber-Enabled Crime 5  Regular Crimes, Enabled by New Tools  Distinction Between Dual- and Single- Criminality  Law Enforcement to Law Enforcement  Law Enforcement to Companies

Modernizing International Procedures 6  Europol EC3, FBI, Major ISP  Corporate Transparency on Response Policies – Best Practices  Uniform MLAT Request Form  UNODC, Interpol  Single Point of Contact/Vetting  How You Can Help...

Managing Objectionable Content 7  May Not Be Dual Criminality  Platform Companies in Quasi-Judicial Role  Issues of Location, Jurisdiction, Law  Partner: Internet Jurisdiction Project  Standard Forms and Protocols for …  Takedown Requests  Domain Seizure Requests  Subscriber Information

Join us in New York, September  Thank you!  Now, Your Ideas Bruce W. McConnell Senior Vice President