2 ictQATAR “ Information and Communication Technology (ICT) improves how we live and work in countless ways.”  The Ministry of Information Communication.

Slides:



Advertisements
Similar presentations
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Advertisements

1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Philippine Cybercrime Efforts
E-Strategies and ICT Infrastructure Policies and Regulations ITU-WTO Workshop Geneva Dec Mostafa Terrab, infoDev.
International Telecommunication Union ITU-D Overview.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
ITU E-Commerce Conference for the Arab Region - May 2001 A Digital Signature Act for Egypt: Understanding the Challenges! Dr. Sherif Hashem Head, Electronic.
Tanzania Communications Regulatory Authority - TCRA Response to Cyber incidences in Tanzania: Where are we? Presented at Cyber Security Mini Conference.
Government Information Assurance (GIA) Policy. 2 Current Scenario  It is a connected world!  More and More services are being provided online  Continuous.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
A regional initiative for managing the impacts of diving and snorkeling activities on coral reefs.
Cyber and Maritime Infrastructure
DHS, National Cyber Security Division Overview
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
(Geneva, Switzerland, September 2014)
Strategy and Policy Unit: Current Activities and Future Tasks
NIS Directive and NIS Platform
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
National Cybersecurity Management System
Adapting to Climate Change: Canada’s Experience and Approach Elizabeth Atkinson Climate Change Impacts and Adaptation Directorate Natural Resources Canada.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
The Crown and Suppliers: A New Way of Working People & Security15:35 – 16:20 Channels & Citizen Engagement Social Media ICT Capability Risk Management.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
A Framework for an African Policy Towards Creating Cyber Security Awareness IST-Africa 2011, Gaborone, Botswana May 2011 Zama Dlamini - CSIR Barend.
M ISSION : The mission of the information security office is to assist in building a security aware university culture through education and technical.
Evolving IT Framework Standards (Compliance and IT)
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
A National approach to Cyber security/CIIP: Raising awareness.
Cyber Security & Fraud – The impact on small businesses.
Week 3 E-GOVERNMENT. Security PRIVACY Learning outcome At the end of this slide, student can: 1) Explain the network security 2) Understand the contribution.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Global policy framework and standards on ICT accessibility UNDESA/DSPD FPRUM DISABILITY INCLUSION AND ACCESSIBLE URBAN DEVELOPMENT Nairobi, Kenya 28 October.
ITU Regional Standardization Forum for Asia-Pacific (Jakarta, Indonesia, October 2015) TTA’s activities on bridging standardization gap Kihun Kim.
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Digital Enlightenment.
ISACA Ireland Cyber Security Policy 9 February 2016.
H UMAN R ESOURCES M ANAGEMENT August 18, O UTLINE Key Results Ensure all stakeholders are well informed of cybersecurity and its financial impact.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Presented by Solomon Ingba David Afoenyi Afure Iloka Niteabai Domininc.
06 Sep 2006 Cyber security Cyber Security for Protection of Critical Information Infrastructure B J Srinath Director & Scientist ‘ F ’, CERT-In Department.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
NEW ZEALAND’S CYBER SECURITY STRATEGY Presentation by: MED, DIA & GCSB.
KSA 17 th IPv6 Taskforce Meeting 5 th May Welcoming Dr. Sulaiman Mirdad Deputy Governor IT Affairs - CITC.
CARIBBEAN WORKSHOP ON E-GOVERNMENT BEST PRACTICES Port of Spain, Trinidad & Tobago, July 26-28, 2005.
Iowa Communications Alliance
Dimitra Liveri | NIS Expert CSA CEE Summit 2017|Ljubljana - 9 March
Information Technology Sector
About the NIS directive
8 Building Blocks of National Cyber Strategies
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Cybersecurity: The State Regulators’ Perspective
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
Trust and Security Unit
Cyber Risk & Cyber Insurance - Overview
Cyber Security Culture
Committed to connecting the world
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
Institution and Capacity- Building
National Information Assurance (NIA) Policy
Thames Valley Chamber / Claire Logic
Presentation transcript:

2 ictQATAR “ Information and Communication Technology (ICT) improves how we live and work in countless ways.”  The Ministry of Information Communication Technology - ictQATAR - helps deliver on that promise for the people of Qatar.  The program includes initiatives such as: eHealth, eGovernment, eLearning and Cyber Security

3 CS/Q-CERT  ICT is only beneficial if online activities are safe, resilient and secure.  To safeguard users, industry and government information and systems, ictQATAR created CS/Q-CERT, the nations center for information security.  CS/Q-CERT: ● Qatar's National Centre for Information Security ● An ictQATAR initiative ● Works with organizations who deliver critical services in Qatar

4 Partnerships  Regional: ● MENOG, GCC-CERT, Arab League  International: ● FIRST, ITU, MERIDIAN  Qatar a “Botnet Free” nation by 2012 ● Partnership with Service Providers  ISA99/IEC SCADA Standards ● Voting Members

5 What do we do?  National Information Assurance  Critical Information Infrastructure Protection  Incident Management ● Threat Intelligence ● Incident Response ● Forensic  Awareness  Training

6 Critical Sectors Sectors are deemed critical when their incapacitation or destruction would have a debilitating impact on the national security and social well-being of a nation

7 Key Elements to improve Cyber Security Collaboration and Information Exchange Incident Management LegalFramework Culture of Cybersecurity

8 Services for Sectors  Legislations and Regulations ● Critical Information Infrastructure Protection Draft Law ● Data Privacy Draft Law  Sector / Technology Specific Regulations-ICSv3 ● NIA (National Information Assurance Manual) ● Banking Technologies Risk Governance (with QCB) ● Blackberry security guidelines for government agencies

9 Services for Sectors  Policy and Compliance Services ● Expert advice and consulting on implementing an Information Security Management System (ISMS) using GIA Policies  Incident Management ● Assistance on managing Cyber Security Incidents ● Expert Advice on setting up SOCs

10 Services for Sectors  Threat Intelligence ● Threat Alerting  Trainings and Awareness ● Trainings on NIA Implementation ● Technical Trainings on Information Security (SANS) ● Corporate Awareness programs

11 Reach Out  Service Catalog ● We have revamped our services and offerings to our stakeholders ● The Service Catalog will help you assess how Q- CERT can assist you in your information security program.

12 Reach Out  Website ● We have revamped our website ● This is inline with our strategy to reach out to our stakeholders and provide the best services possible in the most effective way. ● It provides you with an insight on our projects, offerings and a lot of useful tools and articles. ● It will be our endeavor to keep it updated with tools, tips that may be of value addition to our stakeholders.

THANK YOU Khalid Al-Hashmi