Registry Internet Safety Group www.registrysafety.org.

Slides:



Advertisements
Similar presentations
Certification Industry Against Counterfeiting
Advertisements

WHOIS – Data Elements – making a Difference ICANN Carthage Meeting October 2003 Marilyn Cade, Director AT&T Commercial and Business Constituency (BC)
GNSO goals Bruce Tonkin Chair, GNSO Council Sao Paulo, 4 Dec 2006.
Whois Task Force GNSO Public Forum Wellington March 28, 2006.
ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
And the Briefing for the ICANN Board Bucharest, Romania June 2002.
The following 10 questions test your knowledge of client site assignment in Configuration Manager Configuration Manager 2007 Client Site Assignment.
Some Comments on ccTLD Manager Local & Global Responsibilities Frank March Chair,.nz Oversight Committee (NZOC) (also IT & Telecoms Policy Group)
Domain Names and Web Hosting in 2009 and Beyond Adam Eisner Product Manager, Domains Tucows Inc.
Handling Internet Network Abuse Reports at APNIC 21 October 2010 LAP-CNSA Workshop, Melbourne George Kuo.
Fraud and Identity Theft: The United Nations Crime Commission Intergovernmental Expert Group on Fraud and the Criminal Misuse and Falsification of Identity.
 DB&A, Knowledge Management Within and Across Projects June 15, 2012 INNOVATION for a better world.
Best Practice Corporate Governance and Protection of Wider Stakeholder Interests in.uk Lesley Cowley – CEO Nominet.
APTLD New Initiative: APTLD Registry Gateway Jian Zhang June 2012 Moscow.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
© Prentice Hall, © Prentice Hall, ObjectivesObjectives 1.An understanding of the relationship between data and information 2.Insights.
Introduction to ICANN’s new gTLD program. A practical example: the Dot Deloitte case. Jan Corstens, Partner, Deloitte WIPO Moscow, 9 Dec 2011.
Yusuf İ slam Ş EFLEK 11 TM/A 85.  An acceptable use policy is a set of rules applied by the owner/manager of a network, website or large computer system.
Overview Who is AusRegistry? Why use the existing infrastructure? What this means for you? Questions raised and Important points.
Co-funded By the European Union INHOPE The International Association of Internet Hotlines Budapest 25 September 2012 Denton Howard INHOPE Training & Services.
1 11 Combatting Trafficking in Persons (CTiP) Regional Support Office – The Bali Process 27 September 2013.
Report of the WIPO Internet Domain Name Process. Genesis USG White Paper, June 5, 1998: –“The U.S. Government will seek international support to call.
A Boon or a Curse. What is the ‘Internet’?  It is a network of networks that consists of millions of private, public, academic, business, and government.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
1 Dot KE ccTLD RE-DELEGATION & MANAGEMENT EXPERIENCE Workshop on Internet Governance at the national level 19 th July 2005 Michael Katundu, Communications.
Computer-Assisted Communication
In Dec-2010 ICANN Board requested advice from ALAC, GAC, GNSO and ccNSO on definition, measures, and 3- year targets, for competition, consumer trust,
Michael Yakushev, cctld.ru Board Member.  WHOIS existed before ICANN (1982-)  Review of WHOIS Policy is prescribed by AoC (2009)  Review Team was formed.
Update from ICANN staff on SSR Activities Greg Rattray Tuesday 21 st 2010.
© 2005, SWITCH ccTLD „.CH“ (Switzerland), part 2 Marcel Schneider Dipl. El. Ing. FH/STV/EUR-ING Manager Special Operations and International Relations.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
GNSO Public Forum Dr Bruce Tonkin Chair, GNSO Council Lisbon, 29 March 2007.
ccTLD IDN Report ccTLD Meeting, Montreol June 24, 2003 Young-Eum
The ccTLD Governance Project ITU ccTLD Workshop March 2003 Professor Michael Geist University of Ottawa, Faculty of Law Technology Counsel, Osler, Hoskin.
Adrian Kinderis – AusRegistry International Best Practices of a ccTLD Registry BEST PRACTICES OF A ccTLD REGISTRY ADRIAN KINDERIS AUSREGISTRY INTERNATIONAL.
Moshe Fogel Manager, Afilias LLC
Network Abuse Update Frank Salanitri Project & Systems Services Manager, APNIC.
1 Behind Phishing: An Examination of Phisher Modi Operandi Speaker: Jun-Yi Zheng 2010/05/10.
Overview of DNS Industry Trends AfTLD 2 nd African ccTLD Event Lesley Cowley Chief Executive 7 th April 2008.
Building the Net: 6 Trends Shaping the Digital Economy SIIA: BUILDING THE DIGITAL ECONOMY Building The Net: Trends Report.
The challenge of services for new registries Giovanni Seppia Cape Town, November 30, 2004.
1 1 The GNSO Role in Internet Governance Presented by: Chuck Gomes Date: 13 May 2010.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Securing Future Growth: Getting Ready for IPv6 NOW! ccTLD Workshop, 8 th April 2011 Noumea, New Caledonia Miwa Fujii, Senior IPv6 Program Specialist, APNIC.
Governmental Advisory Committee Public Safety Working Group 1.
.ORG, The Public Interest Registry. 2 Proprietary & Confidential What is Domain Security? Domain security is: 1) Responsibility. Any TLD should have a.
Afilias – intro/update Presented by: Desiree Miloshevic, Advisor, International Affairs and Policy Development February 26, 2004, APTLD meeting, APRICOT.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
1 Domain Name Marketplace Patrick Jones Registry Liaison Manager 29 March 2007.
A week in the life of (IRT address) Frank Salanitri Project & Systems Services Manager, APNIC.
Erik Barnett Assistant Deputy Director
Internet Corporation for Assigned Names and Numbers President’s Strategy Committee Report São Paulo December 2006.
Human Rights Reporting: The Telecommunications Industry Dialogue Christine Diamente Alcatel-Lucent Head of Brand & Corporate Sustainability Ethical Corporation.
GNSO IDN work Dr Bruce Tonkin Chair, GNSO Council IDN Workshop Marrakech, June 25, 2006.
GRC: Aligning Policy, Risk and Compliance
Voluntary Standards and Government: Working Together A Positive Collaboration Benefits Both the Public and Private Sectors Presentation by Mary C. McKiel,
THE LARGEST NAME SERVICE ACTING AS A PHONE BOOK FOR THE INTERNET The Domain Name System click here to next page 1.
Why to Register Multiple Domain Name Extensions for Your Website?
Horizon 2020 Secure Societies Disaster-Resilience Workshop 18 Mar /06/2016.
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
I2Coalition: How To Build Relationships And Save Money With Better Abuse Reporting Moderator: Michele Neylon CEO, Blacknight.
Public Safety Working Group (PSWG)
.uk Public Policy Partnership
McAfee Issue Updating the antivirus with the most recent version accessible Activate security software suite.
Critical Vehicle Conversions
Why the Multistakeholder Approach Works
EXPLORING GLOBAL COOPERATION OPPORTUNITIES
One Size Does Not Fit All
Combatting Trafficking in Persons (CTiP)
The Domain Abuse Activity Reporting System (DAAR)
Presentation transcript:

Registry Internet Safety Group

The Purpose of RISG Facilitate dialogue and collaboration, Affect change, and Create and adopt best practices to address Internet identity theft

RISG Members gTLD Registries: Afilias Limited, AusRegistry, NeuStar, Public Interest Registry, and Verisign ccTLD Registries: SIDN (.NL), CNNIC (.CN),.NZ, and Nominet (.UK) ◦Major ccTLD registries provide expertise and global perspective Internet Security: Cyveillance, Internet Identity, MarkMonitor, McAfee, Shinkuro and Symantec Corporation Global Law Enforcement: FBI & UK ◦Law enforcement perspective on Internet crime and solutions Registrars: GoDaddy, MarkMonitor, Melbourne IT, Network Solutions, SnapNames Chair: Alexa Raad, PIR | Vice Chair: Roelof Meijer, SIDN | Secretary: Greg Aaron, Afilias |

Complete Value Chain Members represent multiple capabilities and interests ◦Best possible view of issues ◦ Range of viewpoints ◦Ability to see multiple angles of each issue Best Chance for Achieving Effective Remedies

What RISG is Not Internet Police Content Control or Censorship A Body Defining Binding Policy

RISG Benefits For the members: ◦Industry collaboration ◦Proactivity on our part avoids unnecessary regulation later For the industry: ◦Consistent and effective processes regardless of TLD Safer Internet for all users: ◦Minimizes damage as problems are identified quicker and resolved sooner Develop and Increase Global Perspective

What are we doing? Best Practices Data Sharing Plan ◦Identify curative & preventative goals and associated use cases ◦Identify data relevant to each use case ◦Comply with legal requirements for data sharing Anti-Phishing ◦What types of threats to handle? ◦How to respond to the threats? ◦Identify reliable data indicators of Phishing. ◦How to work with law enforcement?

Explore Options and Best Practices to Stop Internet Identity Theft Adopt domain suspension at the registry level? Positively identify Phishing Sites across TLDs Adopt consistent policies across TLDs to minimize domain abuse

What RISG Needs to Succeed Internet Community Participation ◦Particularly ccTLDs Global Law Enforcement Cooperation Communication of our findings and best practices ◦Followed by voluntary adoption

Interested? To Join Contact: Adam Palmer, Law & Policy Counsel The Public Interest Registry 1775 Wiehle Avenue, Suite 200 Reston, VA USA