Cyber Security and Georgia. New Challenges

Slides:



Advertisements
Similar presentations
Workshop on National Platforms 23 – 29 August 2008, Davos Switzerland Federal Department of Foreign Affairs FDFA Swiss Agency for Development and Cooperation.
Advertisements

4 th Global Congress Combating Counterfeiting & Piracy Dubai, February 3-8, 2008 Challenge 7 : Strengthening Cooperation and Collaboration at the Global.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
UNODC & the Global Response to Cybercrime
Anti-SPAM activities in Malaysia - Current Situation, Regulatory Environment and Future Developments ITU virtual conference on anti-spam regulation and.
1 African ICT Roadmap to Achieve NEPAD Objectives Arusha, Tanzania, 1-3 April 2003 Roles of Government and ATU in the Implementation of NEPAD ICT objectives.
Ministry of Interior of Montenegro,,The Fight against corruption and organized crime in Montenegro Ministry of Interior of Montenegro,,The Fight against.
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
State of play and activities in 2014 March 2014
Panel themes of the International Conference “Europe against Counterfeit Medicines” G.N. Gildeeva, Deputy head of the Department of Registration of Medicines.
MINISTRY FOR INFORMATION SOCIETY AND TELECOMMINUCATIONS CIRT - Computer Incident Response Team GOVERNMENT OF MONTENEGRO MINISTRY FOR INFORMATION SOCIETY.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
Speaker: Tamar Shapatava
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Priorities to Combat Counterfeiting and Piracy Koji Yonetani Director Intellectual Property Affairs Division Ministry of Foreign Affairs of Japan
Strategy and Policy Unit: Current Activities and Future Tasks
Overview of the Georgian ICT sphere, its challenges and advantages 2014 Ministry of Economy and Sustainable Development of Georgia.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
6 August 2015 Rule of law: implementing a comprehensive and integrated approach in prevention and fight against corruption in the Danube region,
Legal Framework on Information Security Ministry of Trade, Tourism and Telecommunication Nebojša Vasiljević.
Caribbean Telecommunications Union. 6th Caribbean Internet Forum (CIF), Port of Spain, October Caribbean Telecommunications Union The Internet: Governance.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
Cybersecurity Governance in Ethiopia
A National approach to Cyber security/CIIP: Raising awareness.
An Analysis of the Cyber Security Strategy (2008) of Estonia Based in part on ITU Q.22/1 Report On Best Practices For A National Approach To Cybersecurity:
ITU Carla Licciardello Policy Analyst
1 BORDER SECURITY AND MANAGEMENT Intra-service co-operation Inter-agency co-operation Presented by: Visiting expert Goran Krsteski Geneva.
Whole of Government Approach to Combating People Trafficking, including Victim Support Presenter Scott Wilson, Principal Legal Officer Commonwealth Government.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
© OECD A joint initiative of the OECD and the European Union, principally financed by the EU THE COORDINATION OF THE DECENTRALIZATION PROCESS Claudia Lung.
Укрепление доверия в киберпространстве Trust and Confidence in Cyberspace.
2010 Ministry of Economic Development of Georgia Communications and IT Department Overview of the Georgian ICT Sphere and its Future Development Irakli.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Information and Cyber Security
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
A Joint Collaborative Project by the International Telecommunication Union and ABI Research Genève, Suisse
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
ALBANIA Report in ICT development Albania is a member of eSEE WG and in this framework its achievements are: eSEE Agenda commitment 1.Adoption of National.
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
Johannesburg, South Africa
Pakistan Cyber Security Association (PCSA)
ITU Activities in the CIS Region Farid Nakhli, Programme Officer, ITU Area Office for CIS 1 Samarkand, 1-2 June 2017.
Cybersecurity in the ECOWAS region
Access and participation: moving towards explicit policies
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
Public-private cooperation
Cybersecurity in Belarus a general overview of support areas
New Developments in ICT Statistics
8 Building Blocks of National Cyber Strategies
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
Forth International Forum
Promoting Global Cybersecurity
Cyber Security Ecosystem of Georgia. Experience and Challenges
29/11/2018.
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
Institution and Capacity- Building
Fostering Cooperation between National Rapporteurs and Equivalent Mechanisms and Cooperation with International and Regional Organizations Consultative.
Role of the Council of Europe - International Partner Organisation Justice Programme Prague, 20 March 2019 Criminal Law Cooperation Unit Action against.
Role of the Council of Europe - International Partner Organisation Justice Programme Prague, 20 March 2019 Criminal Law Cooperation Unit Action against.
UNODC and CYBERCRIME October 2009.
SECURITY IN THE DIGITAL AGE
Presentation transcript:

Cyber Security and Georgia. New Challenges Internet Development Initiative Vladimer Svanadze

According to the Global Cybersecurity Index 2017 reported by the International Telecommunication Union (ITU), Georgia was placed 8th in the World, 2nd in the Europe, and 1st in the CIS Top three ranked countries in Commonwealth of Independent States (CIS) Source: Global Cybersecurity Index 2017 Country GCI Score Legal Technical Organizational Capacity Building Cooperation Georgia 0.81 0.91 0.77 0.82 0.9 0.7 Russian Federation 0.78 0.67 0.85 Belarus 0.59 0.63 0.33 0.68 0.47

Top ten most committed countries, GCI (normalized score) Source: Global Cybersecurity Index 2017 Country GCI Score Legal Technical Organizational Capacity Building Cooperation Singapore 0.92 0.95 0.96 0.88 0.97 0.87 United States 0.91 1 0.73 Malaysia 0.89 0.77 Oman 0.98 0.82 0.85 0.75 Estonia 0.84 0.99 0.94 0.64 Mauritius 0.74 0.70 Australia 0.86 0.44 Georgia 0.81 0.90 France 0.60 0.61 Canada 0.93 0.71

The five pillars of the Global Cybersecurity Index (GCI) Legal Measured based on the existence of legal institutions and frameworks dealing with cybersecurity and cybercrime; Technical Measured based on the existence of technical institutions and frameworks dealing with cybersecurity; Organizational Measured based on the existence of policy coordination institutions and strategies for cybersecurity development at the national level; Capacity Building Measured based on the existence of research and development, education and training programmes; certified professionals and public sector agencies fostering capacity building; Cooperation Measured based on the existence of partnerships, cooperative frameworks and information sharing networks.

Academia University of Georgia; Technical Society. Stakeholders of the Georgian Cybersecurity Government Data Exchange Agency, Cyber Security Bureau, Cybercrime Division, CERT.GOV.GE, The Personal Data Protection Inspector Office; Civil Society Georgian Research and Educational Networking Association/GRENA, Internet Development Initiative/IDI; Private Sector UGT; Academia University of Georgia; Technical Society.

Georgia's legal space of cyber security December, 2011 - National Security Concept of Georgia; June, 2012 - Law on Information Security; May, 2013 - Cyber Security Strategy and Action Plan for 2013 – 2015; 2013 - defined critical infrastructure subjects; August, 2014 - Association Agreement with the European Union; January, 2017 - Cyber Security Strategy and Action Plan for 2016(7) – 2018

Georgian Cyber Security Strategy Main directions Research and analysis; New legislative - normative base; Institutional coordination of cyber security; Raising public awareness and formulation of educational base; International cooperation.

Georgian Cyber Security Entities January, 2010 - LEPL Data Exchange Agency of the Ministry of Justice; January, 2011 - CERT.GOV.GE; December, 2012 - Department of Combating Cybercrime in the Central Criminal Police Department of the Ministry of Internal Affairs; 2013 - The Personal Data Protection Inspector Office; February, 2014 - LEPL Cyber Security Bureau of the Ministry of Defense.

Cyber attacks 2008 – 2014 by APT28/FireEye

Q&A