Geneva, Switzerland, 15-16 September 2014 Towards a partnership-based framework for secure ICT Infrastructure in developing countries Bill McCrum Senior.

Slides:



Advertisements
Similar presentations
Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
Advertisements

Its a new digital world with new digital dangers….
A strategy for a Secure Information Society –
Philippine Cybercrime Efforts
International Telecommunication Union ITU-D Overview.
The role of networks in the process of immigrant integration NIKOS STATHOPOULOS, NIKOS STATHOPOULOS, DIRECTOR, G&D SOCIAL LAB LTD Integration programs.
INTERNATIONAL UNION FOR CONSERVATION OF NATURE. 2 Implemented in 12 countries of Africa, Asia, Latin America and the Middle East, through IUCN regional.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Geneva, Switzerland, 2 June 2014 The Regulatory aspects of CPND, CLI and OI “the ITRs” Sherif Guinena SG2 Chairman ITU Workshop on “Caller ID Spoofing”
Standardization Framework (Myanmar) Ye Yint Win President Myanmar Computer Professionals Association Chair-Standardization Committee, Myanmar Computer.
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
 Background  Why the ITRs are important  The need to revise the ITRs  Preparatory process  Some key proposals  Expectations for WCIT-12.
EUROPEAN COMMISSION Objective 3 Territorial Co-operation Workshop 3: EUROPEAN GROUPING OF CROSS BORDER COOPERATION DG Regional Policy Brussels,
Internal Auditing and Outsourcing
IAEA International Atomic Energy Agency How do you know how far you have got? How much you still have to do? Are we nearly there yet? What – Who – When.
Critical Role of ICT in Parliament Fulfill legislative, oversight, and representative responsibilities Achieve the goals of transparency, openness, accessibility,
The WIPO Development Agenda: An Overview Geneva May, 2009 Esteban Burrone World Intellectual Property Organization.
International Telecommunication Union CHALLENGING POLICY STEPS TOWARDS IMPLEMENTING COMMON ALERTING PLATFORMS Orhan Osmani Emergency Telecommunications.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Corporate Governance in the Caribbean Environment “The Caribbean Corporate Governance Forum” Trevor E Blake General Manager – ECSE.
ANSI Conference on U.S. Leadership in ISO and IEC Presented by Dr. Carmiña Londoño Group Leader, Global Standards and Information Group, National.
Best Practice in Nuclear Security and the role of the World Institute for Nuclear Security (WINS) Towards a CBN Security Culture: developing a holistic.
World summit on the information society 1 Pierre Gagné International Telecommunication Union March 2004 WSIS Follow-up Building the Information Society:
A National approach to Cyber security/CIIP: Raising awareness.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
ICGFM International Conference “New Developments in Government Bringing Together the Tools, Talent and Technology” 2007 ICGFM International Conference.
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
NEW MEXICO CRIME DATA PROJECT Prepared and Presented by Ada Pecos Melton, MPA American Indian Development Associates th St., NW, Suite 212 Albuquerque,
International Telecommunication Union Committed to connecting the world 1 Conformity and Interoperability ITU’s Initiatives 2011 ICT Week and Commemoration.
Environmental Management System Definitions
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
SUMMARY OF DISCUSSIONS AMONG AFRICAN SITES PRIOR TO THE WORLD BANK'S VIDEO- CONFERENCE: “OPEN STANDARDS FOR GOVERNMENT TRANSFORMATION” 17TH APRIL 2009.
The Canada Border Services Agency and Coordinated Border Management Regional Conference of Customs Directors General, April 22-25, 2012.
Legal and institutional foundation of economic statistics Overview of international experience Regional Workshop for African Countries on Compilation of.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
The Role of Peer Review in a Multilateral Framework on Competition Policy Andrea Bruce Investment Trade Policy UNCTAD Regional Seminar for Latin America.
Durban, South Africa, 8 July 2013 Outcome of WTSA-12 on spam Xiaoya Yang, Head, WTSA Programmes Division ITU-TSB ITU Workshop on “Countering.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Future needs for capacity building and recommendations to the OIE Dr Sarah Kahn Consultant to the OIE
“DEVELOPMENT OF A NATIONAL ICT POLICY ICT Policy in the ECTEL Member States Mr. Donnie Defreitas MSc, (Hav.), ECTEL Caribbean Internet Forum Bay Gardens.
Overview of Good Regulatory Practice Kent Shigetomi Office of the U.S. Trade Representative.
V Global Forum on Fighting Corruption and Safeguarding Integrity – South Africa Trade and Customs Partnership to fight against corruption and safeguard.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Telecommunications Industry Association (TIA) ADVANCING GLOBAL COMMUNICATIONS.
ITU Perspective: The ITU Development Sector and the Information Society Désiré Karyabwite IP Coordinator / E-STrategies International Telecommunication.
UNGGIM – PRIVATE SECTOR NETWORK. AGENDA > OVERVIEW OF PRIVATE SECTOR >PURPOSE AND VISION OF PRIVATE SECTOR NETWORK > STRUCTURE AND TERMS OF REFERENCE.
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
Cyber Security – An Existential Threat? (IIC, Singapore)
Charlotte McClain-Nhlapo Senior Operations Officer The World Bank
POLITICAL ENVIRONMENT OF BUSINESS
Cybersecurity in the ECOWAS region
Co-operating with the European Aviation safety Agency
Session 2 European Regulatory Environment (just a part!)
8 Building Blocks of National Cyber Strategies
ITU an Overview Combined International SNO and 8th African SNO
National Cyber Strategy Preparedness: 8 Preparatory Questions
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
European Regulatory Environment (just a part!)
ILO’s Approach to Labour Migration
Challenges and Successes in the Zambian ICT Security Sector
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
Malcolm Johnson, Director, Telecommunication Standardization Bureau
8.
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Geneva, Switzerland, September 2014 Towards a partnership-based framework for secure ICT Infrastructure in developing countries Bill McCrum Senior Director, Telecom Consulting ITU Workshop on “ICT Security Standardization for Developing Countries” (Geneva, Switzerland, September 2014)

CONTENTS Overview Policy and Legislation Regulation and Enforcement Infrastructure Challenges in Developing Countries Economic Impacts of Insecure ICTs Unique Role of ITU-T Mutual Recognition Agreements (MRAs) Conclusion and Recommendations Geneva, Switzerland, September

Three Principal Component areas of a Partnership Framework Institutional  Policy  Legislation  Regulation  Enforcement Technical  Accreditation  Certification  Testing Labs  Standards Operational  Mutual Recognition Agreements Geneva, Switzerland, September

OVERVIEW Many governments have proposed and are enacting policies, legislation, regulations & strategies to secure their ICT infrastructure A partnership framework for policy, legal, regulatory and enforcement is highly desirable Today’s global ICT infrastructure is highly interdependent but with a wide variety of system suppliers and incompatible equipment Many organizations setting standards in ICT security – cooperative framework can help New frameworks needed to include all aspects from standards to compliance and best practices. Geneva, Switzerland, September

Small Sample of the Problem Hacking attacks on State entities according to a major Asian country report, now estimated at one every 30 seconds Same scale of attacks are now commonplace in most developed countries affecting State, Business and Personal activities Yahoo quote: “there are only two types of companies: the ones that have been attacked, and the ones that just don’t know it yet” “Intrusion Prevention” company reports that 100% of large Corporations investigated had active commercial espionage infections Geneva, Switzerland, September

Framework Policy Component Policies that recognize reliance on the interconnectedness of a secure global digital infrastructure for prosperity A policy of regional and global engagement on a common cybersecurity framework as an essential step in the process Interoperability identified as a top policy challenge especially in developing countries Commitment to globally accepted standards as a key policy for achievement of connectivity Geneva, Switzerland, September

Framework Legislative Component A targeted legal framework needed to prosecute offenders in e-fraud and ICT infrastructure attacks with global reach Appropriate legislation to deal with electronic offenders at all levels with a long reach Pressure groups are being formed to lobby legislative assemblies for speedy legal remedies New legislation is envisaged that would require mandated disclosure of all security incidents and fraud losses to appropriate authorities New USA Cybersecurity Information Sharing Act launched in past few weeks Geneva, Switzerland, September

Framework Regulatory Component Regulator’s interest spiked by increasingly costly and sophisticated cyber attacks ($100’s of Millns) Renewed interest by governments to audit cyber security defenses of corporations and financial institutions within a defined framework Audits should be done against defined standards, laws and regulations with global collaboration Basic principles of fair notice and due process must be respected in all jurisdictions Defensive and remedial actions against hackers must not be held hostage to partisan political agendas Geneva, Switzerland, September

Framework Enforcement Component Laws and regulations are struggling to keep pace with the volume and sophistication of attacks Enforcement must be carried out in keeping with laws, regulations and standards within an agreed framework Many countries have laws but no enforcement Others have enforcement but inadequate laws Expect enforcement agencies to increasingly hold parties responsible for the unlawful release or failure to protect sensitive information Enforcement must have global reach and be based on trusted credentials across borders Geneva, Switzerland, September

ICT Infrastructure Challenges in Developing Countries Surveys conducted by the ITU in 2011 and 2013 identified a wide range of conformance and interoperability problems in developing countries. Prominent findings in common:  Incompatibility of new equipment with legacy equipment even among equipment of same supplier – pass through services, including security, reduced to lowest common denominator  No national conformity assessment capabilities  Non-standard proprietary interface specifications and no commitment to international standards  Inadequate financial resources and expertise in country  Susceptibility to malicious and opportunistic economic cybercrime Geneva, Switzerland, September

Economic Impacts of Insecure ICT Infrastructure Significant delays in deployment of new services such as e-health, e-education, e-financial services, e-government, social networking Delayed full participation in the 21 st century digital world Result is reduced economic growth, lost opportunity and lower standards of living Concerns with QoS, security and trust in ICT infrastructure and services Problems with counterfeit products and dumping Need for institutional reforms at many levels Geneva, Switzerland, September

Unique Role of ITU The ITU-T standards development process accommodates input from every Member State of the United Nations on an equal footing This is especially important to developing countries which often cannot afford to send large delegations to standards development bodies to promote their viewpoints The ITU Bureaux offer developing countries:  Inclusion – a voice in the standards process  Training and mentoring - access to expertise  Coordination and trusted brokering of partnerships amongst Member States for support, assistance and sharing of resources Geneva, Switzerland, September

Operational Component of Framework “Mutual Recognition Agreements” Establishment and maintenance of a secure ICT infrastructure requires the following facilities:  Testing Labs, Certification and Accreditation Bodies - services potentially shared among multiple countries  Capability of assessing conformity to security standards and other standards for interoperability and regulatory compliance  MRAs can provide trusted sharing of such facilities among multiple partners based on trusted credentials  Legal and Regulatory instruments need to be in place to permit the trusted sharing required  Countries within a region sharing cultural, social and economic goals can find MRAs a very useful tool Geneva, Switzerland, September

Conclusions and Recommendations A secure ICT infrastructure is essential to economic prosperity and growth The 3 components of a partnership framework presented here must move towards convergence of principles globally to make this happen MRAs can provide a trusted partnership framework to facilitate the discussions of like- minded parties in ICT infrastructure security MRAs are now a well established instrument of cooperation and collaboration across sovereign boundaries and can be recommended for this challenge – and the ITU can help. Geneva, Switzerland, September

Geneva, Switzerland, September THANK YOU FOR YOUR ATTENTION