Information and communication technologies (ICTs) are today vital for social and economic development and play an important role in meeting the targets set in the Millennium Development Goals (MDS). The pivotal role played by ICTs as one of the pillars for building the information society is an immense opportunity for all nations but at the same time, ICTs are today also being used for cyber-crimes and other forms of cyber-attacks, threatening user confidence in the use of ICTs. Can we collectively and effectively curb these cyber-threats?
· Welcome address: H. E. Laura Thompson, Ambassador, Permanent Representative, Permanent Mission of Costa Rica (TBC)
· Opening address: Dr. Hamadoun I. Touré, ITU Secretary-General
Session 2 20 Minutes
The role of Standardization in Cybersecurity
This session explores the vital role of standardization in promoting cybersecurity. Standardization and standards institutes build user confidence by establishing clear standards and guidelines for risk management, as well as ensuring that these standards are met (e.g. in norms, trading standards and quality certification). The ITU carried out pioneering work in establishing standards for electronic authentication as the basis for most electronic transactions over public networks including the Internet (e.g. X.509). However, given the size of private sector investments in emerging ICTs, what promising avenues for collaboration in standardization exist? Do standards in security differ in any way from other types of standards? And how can standards in security hope to keep up with fast-evolving ICTs, let alone the hackers? This session explores the rationale and need for international collaboration in the development and use of standards in cybersecurity.
Mr. Malcolm Johnson, Director Telecommunication Standardization Bureau, ITU
Art Reilly, Senior Director for Strategic Technology Policy, Cisco Systems
Xioaya Yang, Engineer, Telecommunication Standardization Bureau, ITU
Session 3 20 Minutes
Cybersecurity Work Programme to Assist Developing Countries
Developing countries, with limited human, institutional and financial resources, face particular challenges in elaborating and implementing national cybersecurity and critical information infrastructure protection (CIIP) policies. The ITU Telecommunication Development Bureau has a Study Group developing a best practices framework for national cybersecurity efforts and a closely related Cybersecurity Work Programme for Developing Countries scoping how it plans to assist countries in developing cybersecurity/CIIP capacities. This session provides a review of these activities and the specific initiatives underway.
Juan Zavattiero, Head, ITU Regional Office of Americas
Alexander Ntoko, Head Corporate Strategy, ITU
Session 4 20 Minutes
International dialogue, cooperation and coordination to address global challenges in building confidence and security in the use of ICTs
The legal, technical and institutional challenges posed by cyberattacks and cybercrime are global and far reaching, and can only be addressed through a coherent strategy taking into account the role of different stakeholders and existing initiatives, within a framework of international cooperation.
With its 191 Member States, calls from its Membership and its role as moderator/facilitator for WSIS Action Line C.5, ITU is uniquely placed to bring together interested stakeholders to discuss how best to respond to growing challenges in Cybersecurity. The Global Cybersecurity Agenda (GCA) is platform for dialogue and international cooperation aimed at leveraging existing initiatives, working with recognized sources of expertise in a framework for international cooperation to elaborate global strategies for enhancing confidence and security in the information society.
Facilitator: Alexander Ntoko, Head Corporate Strategy, ITU
· Dr. Hamadoun I. Touré, ITU Secretary-General
· Mr. Maud de Boer-Buquicchio, Deputy Secretary General, Council of Europe
· Mr. Shamsul Jafni Shafie, Director, Security, Trust and Governance Department, Content, Consumer and Network Security Division, Malaysian Communications and Multimedia Commission
Open Discussion - 20 Minutes
Outcomes and closing remarks - 5 minutes