International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.

Slides:



Advertisements
Similar presentations
EU Presidency Conference Effective policies for the development of competencies of youth in Europe Warsaw, November 2011 Improving basic skills in.
Advertisements

1 Entering through the same door - Universal design put simple Soren Ginnerup Danish Building Research Institute Consultant to the COE group on Universal.
Consultation Process Towards the Post-2015 Framework on Disaster Risk Reduction Youcef Ait Chellouche UNISDR AFRICA.
A Guide to Localizing the Hyogo Framework for Action
1 A Framework for Common Action around shared goals Presentation by Harald Lossack, GTZ on Behalf of OECD/DAC ENVIRONET PEP Meeting 15 June 2006.
Introduction to VET Quality Assurance in the UK Mark Novels 6 th December 2011 Quality Assurance in Technical and Vocational Education and Skills Study.
1 ESA/STAT/AC.219/8 Region-wide Programme to Improve Vital Statistics and Civil Registration Systems prepared by: Margarita F Guerrero, Ph D Regional Adviser.
Best practice for ensuring quality in international statistics - The Principal Global Indicators - Werner Bier, Per Nymand-Andersen European Central Bank.
Developing a programme for the implementation of the 2008 SNA and supporting statistics Meeting on Scaling up the coordination and resources for the implementation.
1 Agenda item 4: Work modalities of the revised ISDR system to support the implementation of Hyogo Framework- Elements to be reviewed in groups- & prepare.
Armand Racine Consultant Chemicals Branch
1 POLICY ON SCIENCE AND TECHNOLOGY BY: M.B. WILLIAMS DIRECTOR, DEPARTMENT OF SCIENCE AND TECHNOLOGY.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
The Africa Action Plan An IEG Evaluation CSO Forum April 15, 2011.
© Copyright International Telecommunication Union (ITU). All Rights Reserved page - 1 Alexander NTOKO Project Manager, ITU Electronic Commerce.
The Implementation Structure DG AGRI, October 2005
The European Qualifications Framework (EQF)
Joint presentation by respective units in DGs AGRI, EMPL and REGIO IPA Components III, IV and V: Conditions for successful preparation and absorption of.
1 18/02/ nd Regional Consultative Meeting for Disaster Risk Reduction in Central Asia Bishkek, November Adam Yao, ECHO, Head of Office for.
Regional Forum for Europe Broadband: A Pillar of Social and Economic Development 6-7 September 2012 Sheraton Hotel, Tirana Sofie Maddens Toscano ITU Expert.
ITU Regional Seminar on E-commerce Bucharest, Romania May 2002 National E-commerce Strategies for Development Dr. Susanne Teltscher United Nations.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
1 Importance and challenges of measuring the information society: ITU and Partnership advances and perspectives Vanessa Gray Market, Economics, Finance.
Pacific Regional Digital Strategy II Suella Hansen & Noelle Jones Presentation for APT 28 April 2010.
UNODC & the Global Response to Cybercrime
International Telecommunication Union National Reporting on WSIS Implementation Mechanisms and ICT Strategies Jaroslaw K. Ponder International Telecommunication.
Harmonized support to scaling up the national AIDS response Ini Huijts 7 th June 2006 ODI meeting, London.
Responsible Care and its relation to Global Product Strategy.
European Commission – Directorate-General Communication 1 Lessons learned from the European Year of Volunteering Preparations for the European.
EMS Checklist (ISO model)
Effectively applying ISO9001:2000 clauses 6 and 7.
Evaluating administrative and institutional capacity building
EuropeAid Co-operation Office Institutional Capacity Development Operations for the ACP Countries Unit AIDCO C4 Centralised Operations for the ACP Countries.
SAI Performance Measurement Framework
How to commence the IT Modernization Process?
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
Addition 1’s to 20.
25 seconds left…...
Week 1.
International Telecommunication Union Committed to Connecting the World Measuring the Information Society Report 24 November 2014.
1 Unit 1 Kinematics Chapter 1 Day
NORMAPME ISO User Guide for European SMEs The essence of.
State of play and activities in 2014 March 2014
Panel themes of the International Conference “Europe against Counterfeit Medicines” G.N. Gildeeva, Deputy head of the Department of Registration of Medicines.
Features of an integrated National Online Child Protection Strategy
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Asia-Pacific Finance and Development Centre 2006 Biennial Forum Shanghai, September 2006 Session V: Regional Cooperation and Innovation Development Presented.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
National Cybersecurity Management System
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Disaster risk reduction – How did we get here?
Caribbean Telecommunications Union. 6th Caribbean Internet Forum (CIF), Port of Spain, October Caribbean Telecommunications Union The Internet: Governance.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
1 Hyogo Framework for Action 2005 – 2015 “Building the resilience of nations and communities to disasters” ASEAN REGIONAL FORUM The 8 th.
World summit on the information society 1 Pierre Gagné International Telecommunication Union March 2004 WSIS Follow-up Building the Information Society:
Toolkit for Mainstreaming HIV and AIDS in the Education Sector Guidelines for Development Cooperation Agencies.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
A National approach to Cyber security/CIIP: Raising awareness.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Risk and Crisis Management Building OECD Principles on Country Crisis Management.
International Telecommunication Union National Online Child Protection Focal Point: Safety, Awareness and Abuse Incident Reporting “Integrated aspects.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
Cyber Security and Georgia. New Challenges
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
8 Building Blocks of National Cyber Strategies
National Cyber Strategy Preparedness: 8 Preparatory Questions
Cyber Security Ecosystem of Georgia. Experience and Challenges
Presentation transcript:

International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza (Smart Village)-Egypt, December 2011 Dr. Frederick Wamala (Ph.D), CISSP ®

Quotations  “ We are all in this together, by ourselves, ” – Lily Tomlin, American Actress

ITU National Cybersecurity Strategy Guide  Cybersecurity is a global issue. Thus, ITU Global Cybersecurity Agenda  Global action is as strong as the most insecure State  “Eating the Elephant”  National goals & interests  We use Ends-Ways-Means strategy reference model  Risk management driven 3

ARB Regional Initiative 5: Cybersecurity  Expected Result  Encourage the adoption of national frameworks and coordinated national and regional strategies against Cybercrime in the Arab region  Key Performance Indicators  Number of National Strategies  ITU National Cybersecurity Strategy Guide  The Guide covers issues to consider when devising or reviewing national cybersecurity strategies;  A nationally-led, regionally and globally harmonised effort to build human and institutional capacity to prevent, detect, react and deter cyber threats 4

Cybersecurity Strategy Model 5

National Cybersecurity Context  Threat to critical national infrastructure  Systems, services and functions vital to public health and safety, commerce, and national security  A national cybersecurity strategy:  Treats cyberspace as a strategic domain  Forms a basis for a national cybersecurity programme  Strategy requires all stakeholders to assume responsibility for and take steps to reduce risk  Executive; Private Sector; Legislature; Judiciary; Law Enforcement; Intelligence; Citizens; Civil Society etc  Universal and national values as guiding principles 6

Guiding Principles: Examples  Universal: The UN Declaration of Human Rights  National core values/principles vital to cybersecurity 7

Ends – Why Devise National Strategies?  We are a poor developing country with limited connectivity to Internet. Cybersecurity is a problem for OECD countries that have more systems.  The Arab region doesn’t have anything electronic to steal. We predominantly deal in commodities such as oil. So why should we care? 8

Ends – Governance 9

Ends – National Economy 10

Ends – National Security 11

HOW: Strategy Elaboration Process 12  A high-level view of the process/Activities

National Strategy Elaboration Flowchart  Stage 0: Cybersecurity Strategic Driver  Data leakages; Development plans; Security strategies  Stage 1: Direct and Coordinate elaboration  Select lead agency, agree agenda and terms of reference  Stage 2: Define and Issue Strategy  Publish strategy; Highlight roles and responsibilities  Stage 3: Sector or GCA-pillar specific strategies  Create sector-specific strategies and action plans  Stage 4: Implement Cybersecurity Strategy  Implement sector-specific actions plans; Monitor  Stage 5: Report on Compliance and Efficacy 13

Ways – Approaches to Executive Strategy  What actions should we take to achieve the Ends (objectives) of the National Cybersecurity Strategy? 14

Ways – Priority 1: Legal Measures  Legacy Measures Strategy  Build capacity to regulate actions in cyberspace  Government Legal Authority  Provide national governments legal authority to run coherent national cybersecurity programmes  Parliamentary Cybersecurity Process  Simplify approach to handling cybercrime legislation  Law Enforcement Governance Framework  Coordinate law enforcement, investigatory, policy and regulatory activities against cybercrime  Global Fight Against Cybercrime 15

Priority 2 – Technical and Procedural  Cybersecurity Framework (ISO – ISMS) 16

Example: UK Security Policy Framework 17

Example: UK Security Policy Framework 18

Priority 3 – Organisational Structures  Cybersecurity Focal Point e.g. DHS; OCSIA 19

Priority 4 – Capacity Building  Cybersecurity Skills and Training 20

Priority 4 – Capacity Building  Judicial Capacity  Improve judicial capacity to fight cybercrime;  Short-term training and modifying legal curricula  National Culture of Cybersecurity  Government-led holistic effort to develop a national cybersecurity culture e.g. DHS Awareness Month;  Government, business, home and vulnerable users  Cybersecurity Innovation  Enhance knowledge and foster innovation across sectors to defend cyberspace and use opportunities. For example, Federal R&D Program, December

Priority 5 – International Cooperation  Cybersecurity is a global challenge  A coordinated national and global response required  ITU Global Cybersecurity Agenda  A widely adopted framework for global cooperation  Devise an international cybersecurity strategy  Links all activities under the five GCA pillars  Bi-lateral Agreements in Priority Areas  Allies may formulate focused agreements;  Assurance and monitoring  The goal is to ensure that strategies meet objectives 22

Questions? 23 Obtain a copy of the ITU National Cybersecurity Strategy Guide at: or contact