| Meeting PresentationsThe presentations made during the ITU Regional Cybersecurity Forum can be found below.     
	
		
		| Monday 18 February 2008
 |  
		| Welcoming Address: Dr. Hessa Al Jaber, Secretary General, ictQATAR 
		(English) Opening Remarks: Sami Al Basheer Al Morshid, Director, ITU Telecommunication Development Sector (ITU-D) 
		(Arabic)(English) Presentation: Ian Cook, Security Evangelist, Team Cymru Research, “Setting the Stage ― The Changing Cybersecurity Threat Environment” Session 1: Towards a Framework for Cybersecurity and Critical Information Infrastructure ProtectionSession Moderator: Rich Pethia, Director, CERT Coordination Center (CERT/CC), United States of America Speaker: Robert Shaw, Head, ICT Applications and Cybersecurity Division, ITU Telecommunication Development Sector (ITU-D), “Overview of ITU-D Activities Related to
Cybersecurity and Critical Information
Infrastructure Protection” Speaker: James Ennis, Department of State, United States of America, Rapporteur ITU-D Study Group 1 Question 22 ― Securing Information and Communication Networks: Best Practices for Developing a Culture of Cybersecurity, “Best Practices for Organizing National Cybersecurity Efforts” Session 2: Management Framework for Organizing National Cybersecurity/CIIP EffortsSession Moderator: Bradford Willke, Senior Technical Staff, Survivable Enterprise Management, CERT, Carnegie Mellon University, United States of America Speaker: Christine Sund, Cybersecurity Coordinator, ICT Applications and Cybersecurity Division, ITU Telecommunication Development Sector (ITU-D), “Promoting a Culture of Cybersecurity” Speaker: Bradford Willke, Senior Technical Staff, Survivable Enterprise Management, CERT, Carnegie Mellon University, United States of America “Government ― Industry Collaboration” Speaker: Ian Dowdeswell, Manager, Watch, Warning, Investigation, and Response, Q-CERT, Qatar, “Incident Management Capabilities” Session 3: Management Framework for Organizing National Cybersecurity/CIIP Efforts (Continued)Session Moderator: Sherif Hashem, Executive Vice President, Information Technology Industry Development Agency, Ministry of Communications and Information Technology, Arab Republic of Egypt Speaker: Nibal Idlebi, ICT for Development Team Leader, Information and Communication Technology Division, United Nations Economic and Social Commission for West Asia (UN-ESCWA), “Cyber Legislation in the ESCWA Region ― Security Issues” Speaker: Joseph Richardson, United States of America, “A National Cybersecurity Strategy” |  
	
		
		| Tuesday 19 February 2008
 |  
		| Session 4: Country Case StudiesSession Moderator: Marilyn Cade, Advisor to AT&T, United States of America, Case Study ― Government ― Industry Collaboration Speaker: Raja Azrina Raja Othman, Chief Technology Officer, CyberSecurity Malaysia, and Malaysian Computer Emergency Response Team (MyCERT), Malaysia, Country Case Study ― Promoting a Culture of Cybersecurity, “Promoting a Culture of Cybersecurity among Critical National Information Infrastructure” Speaker: Laile Di Silvestro, Business Operations Manager, Microsoft Corporation, Case Study ― Government ― Industry Collaboration, “Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection” Speaker: Marilyn Cade, Advisor to AT&T, United States of America, Case Study ― Government ― Industry Collaboration, “Country Case Studies for Government – Industry Collaboration” Session 5: Country Case Studies (Continued)Session Moderator: Julia Allen, Member of Technical Staff, Software Engineering Institute, Carnegie Mellon University, United States of America Speaker: Belhassen Zouari, Chief Executive Officer, National Agency for Computer Security and Cert-Tcc, Tunisia, Country Case Study ― Incident Management Capabilities, “Watch, Warning and Incident Response Capabilities : Implementing a National Strategy”  Speaker: Mark Krotoski, National Coordinator, Computer Hacking and Intellectual Property Program, Computer Crime & Intellectual Property Section, Department of Justice, United States of America, Country Case Study ― Legal Foundation and Enforcement, “Legal Foundation and Enforcement: Promoting Cybersecurity” Session 6: Country Case Studies (Continued)Session Moderator: Shamsul Jafni Shafie, Director, Security, Trust and Governance Department, Malaysian Communications and Multimedia Commission (MCMC), Malaysia  Speaker: Steve Huth, Director, Q-CERT, Qatar, Country Case Study ― A National Cybersecurity Strategy, “Case Study on National Cybersecurity Strategy ― Qatar” Speaker: Fatma Bazargan, aeCERT, Telecom Regulatory Authority, United Arab Emirates, Country Case Study ― A National Cybersecurity Strategy “A National Cybersecurity Strategy ― aeCERT Roadmap” Speaker: Suliman A. Al Samhan, Information Security Specialist, SA-CERT, Communications and Information Technology Commission, Saudi Arabia, Country Case Study ― A National Cybersecurity Strategy, “Saudi Arabia Computer Emergency Response Team” Session 7: Review and Discussion: Management Framework for Organizing National Cybersecurity/CIIP EffortsSession Moderator: Robert Shaw, Head, ICT Applications and Cybersecurity Division, ITU Telecommunication Development Sector (ITU-D) Panelist: Marilyn Cade, Advisor to AT&T, United States of America Panelist: Suliman Al Samhan, Information Security Specialist, SA-CERT, Communications and Information Technology Commission, Saudi Arabia Panelist: Shamsul Jafni Shafie, Director, Security, Trust and Governance Department, Malaysian Communications and Multimedia Commission (MCMC), Malaysia Panelist: Bradford Willke, Senior Technical Staff, Survivable Enterprise Management, CERT, Carnegie Mellon University, United States of America Panelist: Sherif Hashem, Executive Vice President, Information Technology Industry Development Agency, Ministry of Communications and Information Technology, Arab Republic of Egypt Panelist: Joseph Richardson, United States of America |  
	
		
		| Wednesday 20 February 2008
 |  
		| Sessions 8 and 9 : ITU National Cybersecurity/CIIP Self-Assessment Toolkit: An ExerciseSession Moderator: Joseph Richardson, United States of America Information on the ITU National Cybersecurity/CIIP Self-Assessment Toolkit 
		can be found
		
		here. Session 10: Regional and International CooperationSession Moderator: Michael Lewis, Deputy Director, Q-CERT, Qatar  Speaker: Mark Krotoski, National Coordinator, Computer Hacking and Intellectual Property Program, Computer Crime & Intellectual Property Section, Department of Justice, United States of America and Representative for the 24/7 High Tech Crime Network, “Promoting Regional and International Cooperation On Cybersecurity Issues” Speaker: Ebrahim Al-Haddad, Head, ITU Regional Office for Arab States Speaker: Majid Al Sharhan, Saudi Arabia, Gulf Cooperation Council (GCC)  Speaker: Khaled Foda,
Head of IT Section,
Telecommunication and IT Department,
League of Arab States
   Session 11: Wrap-Up, Recommendations and the Way ForwardSession Moderator: Robert Shaw, Head, ICT Applications 
		and Cybersecurity Division, ITU Telecommunication Development Sector 
		(ITU-D) *** Closing Remarks: Michael Lewis, Deputy Director, Q-CERT, Qatar  Closing Remarks: Ebrahim Al-Haddad, Head, ITU Regional Office for Arab States |  
	
		
		| Thursday 21 February 2008
 |  
		| CYBERSECURITY FORENSICS WORKSHOP INCIDENT ANALYSIS, CYBER FORENSICS, AND ENGAGEMENT WITH LAW ENFORCEMENT
 |  
		| Session 1: Presentation of an IncidentSpeaker: Michael Lewis, Q-CERT, Qatar,  “Presentation of the Incident” Session 2: Forensically-Safe Techniques for Crime Scene InvestigationSpeaker: Mounir Kamal, Q-CERT, Qatar,  “Forensically-Safe Techniques for Crime Scene Investigation” Session 3: Live Memory Acquisition and AnalysisSpeaker: Cal Waits, CERT/CC, United States of America,  “Live Memory Acquisition and Analysis” Session 4: Device Imaging and AnalysisSpeaker: Mounir Kamal, Q-CERT, Qatar “Device Imaging and Analysis” 
 *** Case Study: Sultanate of Oman Speaker: Ahmed Al Siyabi, Ministry of Justice, Sultanate of 
		Oman, “Case Study from the 
		Sultanate of Oman: Judicial Evidence in Cybercrimes, الأدلة القضائية في 
		أمن الفضاء الحاسوبي”,
		Presentation and 
		Paper  (in Arabic) *** Session 5: Cyber-Forensics and the Role of Expert WitnessesSpeaker: Raja Azrina Raja Othman, CyberSecurity Malaysia, and Malaysian Computer Emergency Response Team (MyCERT), Malaysia, “Cyber-Forensics and the Role of Expert Witnesses” Session 6: Engagement with Law EnforcementPanelist: Mounir Kamal, Q-CERT, Qatar 
 Panelist: Cal Waits, CERT/CC, United States of America
 Panelist: Raja Azrina Raja Othman, CyberSecurity Malaysia, and Malaysian Computer Emergency Response Team (MyCERT), Malaysia
 Session 7: Reviewing the Results of the AnalysisSpeaker: Ian Dowdeswell, Q-CERT, Qatar, “Reviewing the Results of the Analysis” Cybersecurity Forensics Workshop ClosingClosing Remarks: Michael Lewis, Deputy Director, Q-CERT, Qatar  |  |