© 2015 ABI Research www.abiresearch.com The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to.

Slides:



Advertisements
Similar presentations
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Advertisements

Philippine Cybercrime Efforts
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
1 African ICT Roadmap to Achieve NEPAD Objectives Arusha, Tanzania, 1-3 April 2003 Roles of Government and ATU in the Implementation of NEPAD ICT objectives.
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
Tanzania Communications Regulatory Authority - TCRA Response to Cyber incidences in Tanzania: Where are we? Presented at Cyber Security Mini Conference.
State of play and activities in 2014 March 2014
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
DHS, National Cyber Security Division Overview
ITU activities on Cyber security
Examples of Best Practices: Anti- corruption Strategy of the TCA Musa KAYRAK Senior Auditor, CISA.
Introducing Regulatory Impact Analysis into the Turkish Legal Framework Prime Minister’s Office, Better Regulation Group The Project Implementation Team.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Regional Development Forum for Europe Regional Development Forum for Europe "Broadband for Sustainable Development” April 2015 / Bucharest, Romania.
WTDC-14 REGIONAL INITIATIVES FOR EUROPE Call for Preliminary Commitments.
ITU.
Regional Development Forum for Europe Regional Development Forum for Europe "Broadband for Sustainable Development” April 2015 / Bucharest, Romania.
Strategy and Policy Unit: Current Activities and Future Tasks
NIS Directive and NIS Platform
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Geneva, Switzerland, September 2014 ENISA role in ICT standardization Sławomir Górniak, ENISA ITU Workshop on “ICT.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Session 3 - Plenary on implementing Principle 1 on an Explicit Policy on Regulatory Quality, Principle 3 on Regulatory Oversight, and Principle 6 on Reviewing.
‘Approaches to programme planning and budgeting’ Experience of Regional Centre for the Safeguarding of Intangible Cultural Heritage in South-Eastern Europe.
International Telecommunication Union Helping the world communicate Fifth African Development Forum "Youth and leadership in the 21 Century" 14 to 18 November.
Helping the world communicate ITU/BDT/HRD Youth Programme Regional Interagency Working Group Asia and Pacific region 1 st December, Bangkok.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
Safety Driven Performance Conference 2013 The future of managing asset-intensive businesses John Keefe APM/RBMI Technical Manager Asset Integrity Services.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
1 From E-Government to Connected Governance: Harnessing Information & Communication Technologies for Knowledge Acquisition and Sharing Michael G. Mimicopoulos.
Toolkit for Mainstreaming HIV and AIDS in the Education Sector Guidelines for Development Cooperation Agencies.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
A National approach to Cyber security/CIIP: Raising awareness.
Media Projects Marija Gaćeša and Violeta Ćorić Belgrade, 1 st October Ministry of Finance.
ASIA-PACIFIC TELECOMMUNITY (APT) “Key Activities and Programs” TCT/TTA Joint Seminar “NGN Broadband Development and Implementation” 29 January 2009 By:
European Commission Introduction to the Community Programme for Employment and Social Solidarity PROGRESS
Making South Africa a Global Leader in Harnessing ICTs for Socio-economic Development SECRET 1 PRESENTATION TO THE PORTFOLIO COMMITTEE ON COMMUNICATIONS:
The ten-year framework of the Global Centre for ICT in Parliament ECPRD Working Group on ICT Annual Meeting November 2010 Bucharest,
ITU Carla Licciardello Policy Analyst
Environmental Management System Definitions
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Energy security of APEC economies: policy options for energy resource diversification in the Asia-Pacific region 47th Energy Working Group Meeting Kunming,
International Telecommunication Union The ITU Conformity & Interoperability Programme Pillars 3 and 4 Sameer Sharma Senior Advisor ITU Regional Office.
Helping the world communicate ITU/BDT/SIS Children and Youth Special Initiative ITU-TELECOM YOUTH FORUM ASIA September 2008 Bangkok.
ITU Strategic Planning ICE Proposal January, 2014.
Future needs for capacity building and recommendations to the OIE Dr Sarah Kahn Consultant to the OIE
ITU Regional Standardization Forum for Asia-Pacific (Jakarta, Indonesia, October 2015) TTA’s activities on bridging standardization gap Kihun Kim.
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Digital Enlightenment.
The Federal eGovernment of the United Arab Emirates the United Arab Emirates(20/06/2012) 1.
A Joint Collaborative Project by the International Telecommunication Union and ABI Research Genève, Suisse
Cybersecurity Strategy in Japan May 2016 Yasu TANIWAKI Deputy Director-General National center of Incident readiness and Strategy for Cybersecurity (NISC)
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Regional Initiatives for Europe Child Online Protection 16 February 2016 CWG-COP, ITU Headquarters Jaroslaw K. PONDER Europe Coordinator
ITC-ILO/ACTRAV Course A Trade Union Training on Occupational Safety, Health & HIV/AIDS (26/11 – 07/12/2012, Turin) Introduction to National Occupational.
1 Office of ASG/CITO Crisis Information Management Strategy UNGIWG-11, Geneva 15 March 2011 A written consent by the UN is required to use the information.
TAIEX-REGIO Workshop on Applying the Partnership Principle in the European Structural and Investment Funds Bratislava, 20/05/2016 Involvement of Partners.
Project: EaP countries cooperation for promoting quality assurance in higher education Maria Stratan European Institute for Political Studies of Moldova.
Cyber Security and Georgia. New Challenges
GLOBAL CYBERSECURITY INDEX
Ratification of African Telecommunications Union (ATU) Convention of  
Pakistan Cyber Security Association (PCSA)
Ratification of African Telecommunications Union (ATU) Convention of  
Cybersecurity in the ECOWAS region
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
ITU an Overview Combined International SNO and 8th African SNO
Trust and Security Unit
Cyber Security Ecosystem of Georgia. Experience and Challenges
The European Union response to cyber threats
Community of Users.
Presentation transcript:

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. ITU Regional Development Forum for Europe on “Broadband for Sustainable Development” 20 – 22 April 2015, Bucharest, Romania Regional Initiative EUR4 Building confidence and security in the use of telecommunications/ICTs Tym Kurpeta

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. Introduction Context o World Telecommunication Development Conference 2014 o EUR4 Building confidence and security in the use of telecommunications/ICTs ITU and Cybersecurity o The Global Cybersecurity Agenda & other initiatives o Child Online Protection ITU/ABI Research Global Cybersecurity Index o Measuring and Ranking Cybersecurity Commitment o Results and case studies Agenda.

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. Context The World Telecommunication Development Conference 2014 (WTDC-14) approved five Regional Initiatives for Europe (RI-EUR): EUR1 Spectrum management and transition to digital broadcasting; EUR2 Development of broadband access and adoption of broadband; EUR3 Ensuring access to telecommunications/ICTs, in particular for persons with disabilities; EUR4 Building confidence and security in the use of telecommunications/ICTs; EUR5 Entrepreneurship, innovation and youth.

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. ITU & Cybersecurity ITU Global Cybersecurity Agenda (GCA) is a framework for international cooperation aimed at enhancing confidence and security in the information society. The GCA is designed for cooperation and efficiency, encouraging collaboration with and between all relevant partners and building on existing initiatives to avoid duplicating efforts. The GCA has fostered initiatives such as: Child Online Protection (COP) The Global Cybersecurity Index (GCI) The ITU-IMPACT Partnership National CIRT Programme

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. Child Online Protection ABI Research is a key private sector partner in ITU’s Child Online Protection initiative

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. Child Online Protection Key areas: Legal measures Technical and Procedural Measures Organizational Structures Capacity Building International Cooperation Key objectives: ​ Identify risks and vulnerabilities to children in cyberspace Create awareness Develop practical tools to help minimize risks Share knowledge and experience

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. Global Cybersecurity Index A Joint Collaborative Project between the ITU and ABI Research

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. Aims of the Project Promote Government Strategies at a National Level Integrate Security into the Core of Technological Progress Foster a Global Culture of Cybersecurity Drive Implementation Efforts Across Industries and Sectors Goals Measure and Rank Each Nation State’s Level of Cybersecurity Commitment Objective

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. Conceptual Framework 1.Legal Criminal Legislation Regulation and Compliance 2.Technical CERT/CIRT/CSIRT Standards Certification 3.Organizational Policy Roadmap for Governance Responsible Agency National Benchmarking 4.Capacity Building Standardization Development Manpower Development Professional Certification Agency Certification 5.Cooperation Intra-state Cooperation Intra-agency Cooperation Public-private Partnerships International Cooperation Following the Global Cybersecurity Agenda Framework, the GCI identifies 5 indicators

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. Timeframe and Project Activities The project represents a combined effort of 18 months, from inception to publication. As well as a global rank, the GCI averages ranks in 6 regions: Arab States Europe Asia-Pacific Americas Commonwealth of Independent States Africa GCI Research Phases

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. Primary Research Arab States 73% Arab States 73% Africa 68% Asia-Pacific 64% Americas 37% Europe 37% CIS 25% Response Rate Surveys sent out to all ITU Member States Available in English, French, and Spanish 103 total responses received

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. GCI Results: Top 5 CountryIndexGlobal Rank United States of America Canada Australia Malaysia Oman New Zealand Norway Brazil Estonia Germany India Japan Republic of Korea United Kingdom0.7065

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. GCI Results: Heat Map

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. URUGUAY Regulatory Framework on Cybersecurity Policy on Information Security in Public Sector Information Security Direction National Computer Incident Response Centre CERTuy Decree Personal data protection and habeas data action Act EU Commission decision on the adequate protection of personal data by Uruguay (2012) Uruguay became the first non-European state to join COE's personal data protection convention (2013). LEGAL MEASURES

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. OMAN TECHNICAL Oman National Computer Emergency Readiness Team (OCERT) Oman’s Information Security Management Framework is part of the overall ITA standards framework and is based on a structured collection of independent guidelines, processes, and practices, primarily from ISO Information Technology Authority (ITA) as a parent organization of OCERT is ISO certified and encouraging all organizations to adopt and implement the ISO framework. Through the cybersecurity professional development service, OCERT is providing professional cybersecurity training in different security domains by providing information security competency and capability courses and certifications. The training is categorized to three levels (Level 3, Level 2, and Level 1, with Level 1 being the most senior level).

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. TURKEY ORGANIZATIONAL The National Cybersecurity Strategy and Action Plan The action plan consists of 29 main actions and 95 sub-actions and assigns responsibilities about legislation, capacity building, development of technical infrastructure, etc. The Cybersecurity Board was established in order to determine the measures regarding cybersecurity; to approve the prepared plans, programs, reports, procedures, principles, and standards; and ensure their application and coordination. In the last 3 years, three cybersecurity exercises were organized at the national level with participants from both the public and private sector. The exercises played a big role in raising awareness of cybersecurity and also were a great tool for measuring the development of cybersecurity.

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. AZERBAIJAN CAPACITY BUILDING Azerbaijan Ministry of Communications and High Technologies has officially recognized national or sector-specific research and development programs/projects for cybersecurity standards, best practices, and guidelines to be applied in the private and the public sector. The Technical Committee is to implement the preparation of national standards on the basis of international (regional) and interstate standards. Azerbaijan conducts short training courses on E-government and information security. AZ-CERT organizes capture-the-flag competitions to enhance professional competence in information security. The IT and Communications Department of the State Oil Company of Azerbaijan Republic (SOCAR) is certified under ISO 27001:2005. SOCAR IT and Communications Department is certified under ISO 27001:2005.

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. REPUBLIC OF KOREA KISA has in place a number of memorandums of understanding on cybersecurity cooperation with the following: OCSIA (United Kingdom), INCB (Israel), Australia, CNCERT (China), STS (Kazakhstan), CERT Romania, Korea-China-Japan CERT, and private sector cooperation with Microsoft, Checkpoint, and McAfee. Information Communications Infrastructure Protection Committee to decide and deliberate on protection of critical ICT infrastructure to guarantee national security and stabilize the life of the people National Cybersecurity Conference: Private/public/military response team (Article 8) organized and operated for decision-making on cyberthreats, situation monitoring, analyzing of threats, and joint investigation Cooperation and participation in meetings with APCERT (Asia-Pacific Computer Emergency Response Team), FIRST (Forum of Incident Response and Security Teams) COOPERATION

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. ROMANIA Romania ranked no.13 in Global Ranking, among Indonesia and Luxembourg. In Regional Ranking Romania ranked no. 10, ahead of inter alia Lithuania, Switzerland and Bulgaria. Legal: The Budapest Convention, Anti-Corruption Law, Cyber Security Strategy and the National Action Plan Technical: officially recognized national CIRT – CER-RO, as well as a few sectorial CERTs Organizational: Romania’s Cyber Security Strategy – officially recognized national strategy; The National Action Plan on implementation of the Romania’s Cybersecurity Strategy – national governance roadmap Cooperation: Romania is a member of the ITU-IMPACT initiative. Romania is affiliated with ENISA and TERENA. CERT-RO is a member of FIRST. Romania ranked no.13 in Global Ranking, among Indonesia and Luxembourg. In Regional Ranking Romania ranked no. 10, ahead of inter alia Lithuania, Switzerland and Bulgaria. Legal: The Budapest Convention, Anti-Corruption Law, Cyber Security Strategy and the National Action Plan Technical: officially recognized national CIRT – CER-RO, as well as a few sectorial CERTs Organizational: Romania’s Cyber Security Strategy – officially recognized national strategy; The National Action Plan on implementation of the Romania’s Cybersecurity Strategy – national governance roadmap Cooperation: Romania is a member of the ITU-IMPACT initiative. Romania is affiliated with ENISA and TERENA. CERT-RO is a member of FIRST. CASE STUDY

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. GCI 2.0 The Global Cybersecurity Index will have a 2.0 iteration The project will be open to participation with new partner organizations that wish to contribute to the GCI 2.0 research and development. Why Participate as a GCI Partner? Cooperation is an intrinsic element of cybersecurity and we encourage the sharing of information at this international level. Better measurement capabilities will provide better support for cybersecurity development at the nation state level.

© 2015 ABI Research The material contained herein is for the individual use of the purchasing Licensee and may not be distributed to any other person or entity by such Licensee including, without limitation, to persons within the same corporate or other entity as such Licensee, without the express written permission of Licensor. Contact Information International Telecommunication Union Rosheen Awotar-Mauree, Cybersecurity Marco Obiso, Cybersecurity Luc Dandurand, Head, ICT Applications and Cybersecurity Division ABI Research Tymoteusz Kurpeta, Project Manager Michela Menting, Practice Aaron Boyd, Chief Strategy Stuart Carlaw, Chief Research GCI Website