Meeting Presentations
The presentations made during the ITU Regional Cybersecurity Forum can be found below.
Monday
18 February 2008
|
Welcoming Address: Dr. Hessa Al Jaber, Secretary General, ictQATAR
(English)
Opening Remarks: Sami Al Basheer Al Morshid, Director, ITU Telecommunication Development Sector (ITU-D)
(Arabic)(English)
Presentation: Ian Cook, Security Evangelist, Team Cymru Research, “Setting the Stage ― The Changing Cybersecurity Threat Environment”
Session 1: Towards a Framework for Cybersecurity and Critical Information Infrastructure Protection
Session Moderator: Rich Pethia, Director, CERT Coordination Center (CERT/CC), United States of America
Speaker: Robert Shaw, Head, ICT Applications and Cybersecurity Division, ITU Telecommunication Development Sector (ITU-D), “Overview of ITU-D Activities Related to
Cybersecurity and Critical Information
Infrastructure Protection”
Speaker: James Ennis, Department of State, United States of America, Rapporteur ITU-D Study Group 1 Question 22 ― Securing Information and Communication Networks: Best Practices for Developing a Culture of Cybersecurity, “Best Practices for Organizing National Cybersecurity Efforts”
Session 2: Management Framework for Organizing National Cybersecurity/CIIP Efforts
Session Moderator: Bradford Willke, Senior Technical Staff, Survivable Enterprise Management, CERT, Carnegie Mellon University, United States of America
Speaker: Christine Sund, Cybersecurity Coordinator, ICT Applications and Cybersecurity Division, ITU Telecommunication Development Sector (ITU-D), “Promoting a Culture of Cybersecurity”
Speaker: Bradford Willke, Senior Technical Staff, Survivable Enterprise Management, CERT, Carnegie Mellon University, United States of America “Government ― Industry Collaboration”
Speaker: Ian Dowdeswell, Manager, Watch, Warning, Investigation, and Response, Q-CERT, Qatar, “Incident Management Capabilities”
Session 3: Management Framework for Organizing National Cybersecurity/CIIP Efforts (Continued)
Session Moderator: Sherif Hashem, Executive Vice President, Information Technology Industry Development Agency, Ministry of Communications and Information Technology, Arab Republic of Egypt
Speaker: Nibal Idlebi, ICT for Development Team Leader, Information and Communication Technology Division, United Nations Economic and Social Commission for West Asia (UN-ESCWA), “Cyber Legislation in the ESCWA Region ― Security Issues”
Speaker: Joseph Richardson, United States of America, “A National Cybersecurity Strategy”
|
Tuesday
19 February 2008 |
Session 4: Country Case Studies
Session Moderator: Marilyn Cade, Advisor to AT&T, United States of America, Case Study ― Government ― Industry Collaboration
Speaker: Raja Azrina Raja Othman, Chief Technology Officer, CyberSecurity Malaysia, and Malaysian Computer Emergency Response Team (MyCERT), Malaysia, Country Case Study ― Promoting a Culture of Cybersecurity, “Promoting a Culture of Cybersecurity among Critical National Information Infrastructure”
Speaker: Laile Di Silvestro, Business Operations Manager, Microsoft Corporation, Case Study ― Government ― Industry Collaboration, “Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection”
Speaker: Marilyn Cade, Advisor to AT&T, United States of America, Case Study ― Government ― Industry Collaboration, “Country Case Studies for Government – Industry Collaboration”
Session 5: Country Case Studies (Continued)
Session Moderator: Julia Allen, Member of Technical Staff, Software Engineering Institute, Carnegie Mellon University, United States of America
Speaker: Belhassen Zouari, Chief Executive Officer, National Agency for Computer Security and Cert-Tcc, Tunisia, Country Case Study ― Incident Management Capabilities, “Watch, Warning and Incident Response Capabilities : Implementing a National Strategy”
Speaker: Mark Krotoski, National Coordinator, Computer Hacking and Intellectual Property Program, Computer Crime & Intellectual Property Section, Department of Justice, United States of America, Country Case Study ― Legal Foundation and Enforcement, “Legal Foundation and Enforcement: Promoting Cybersecurity”
Session 6: Country Case Studies (Continued)
Session Moderator: Shamsul Jafni Shafie, Director, Security, Trust and Governance Department, Malaysian Communications and Multimedia Commission (MCMC), Malaysia
Speaker: Steve Huth, Director, Q-CERT, Qatar, Country Case Study ― A National Cybersecurity Strategy, “Case Study on National Cybersecurity Strategy ― Qatar”
Speaker: Fatma Bazargan, aeCERT, Telecom Regulatory Authority, United Arab Emirates, Country Case Study ― A National Cybersecurity Strategy “A National Cybersecurity Strategy ― aeCERT Roadmap”
Speaker: Suliman A. Al Samhan, Information Security Specialist, SA-CERT, Communications and Information Technology Commission, Saudi Arabia, Country Case Study ― A National Cybersecurity Strategy, “Saudi Arabia Computer Emergency Response Team”
Session 7: Review and Discussion: Management Framework for Organizing National Cybersecurity/CIIP Efforts
Session Moderator: Robert Shaw, Head, ICT Applications and Cybersecurity Division, ITU Telecommunication Development Sector (ITU-D)
Panelist: Marilyn Cade, Advisor to AT&T, United States of America
Panelist: Suliman Al Samhan, Information Security Specialist, SA-CERT, Communications and Information Technology Commission, Saudi Arabia
Panelist: Shamsul Jafni Shafie, Director, Security, Trust and Governance Department, Malaysian Communications and Multimedia Commission (MCMC), Malaysia
Panelist: Bradford Willke, Senior Technical Staff, Survivable Enterprise Management, CERT, Carnegie Mellon University, United States of America
Panelist: Sherif Hashem, Executive Vice President, Information Technology Industry Development Agency, Ministry of Communications and Information Technology, Arab Republic of Egypt
Panelist: Joseph Richardson, United States of America
|
Wednesday
20 February 2008 |
Sessions 8 and 9 : ITU National Cybersecurity/CIIP Self-Assessment Toolkit: An Exercise
Session Moderator: Joseph Richardson, United States of America
Information on the ITU National Cybersecurity/CIIP Self-Assessment Toolkit
can be found
here.
Session 10: Regional and International Cooperation
Session Moderator: Michael Lewis, Deputy Director, Q-CERT, Qatar
Speaker: Mark Krotoski, National Coordinator, Computer Hacking and Intellectual Property Program, Computer Crime & Intellectual Property Section, Department of Justice, United States of America and Representative for the 24/7 High Tech Crime Network, “Promoting Regional and International Cooperation On Cybersecurity Issues”
Speaker: Ebrahim Al-Haddad, Head, ITU Regional Office for Arab States
Speaker: Majid Al Sharhan, Saudi Arabia, Gulf Cooperation Council (GCC)
Speaker: Khaled Foda,
Head of IT Section,
Telecommunication and IT Department,
League of Arab States
Session 11: Wrap-Up, Recommendations and the Way Forward
Session Moderator: Robert Shaw, Head, ICT Applications
and Cybersecurity Division, ITU Telecommunication Development Sector
(ITU-D)
***
Closing Remarks: Michael Lewis, Deputy Director, Q-CERT, Qatar
Closing Remarks: Ebrahim Al-Haddad, Head, ITU Regional Office for Arab States
|
Thursday
21 February 2008 |
CYBERSECURITY FORENSICS WORKSHOP
INCIDENT ANALYSIS, CYBER FORENSICS, AND ENGAGEMENT WITH LAW ENFORCEMENT |
Session 1: Presentation of an Incident
Speaker: Michael Lewis, Q-CERT, Qatar, “Presentation of the Incident”
Session 2: Forensically-Safe Techniques for Crime Scene Investigation
Speaker: Mounir Kamal, Q-CERT, Qatar, “Forensically-Safe Techniques for Crime Scene Investigation”
Session 3: Live Memory Acquisition and Analysis
Speaker: Cal Waits, CERT/CC, United States of America, “Live Memory Acquisition and Analysis”
Session 4: Device Imaging and Analysis
Speaker: Mounir Kamal, Q-CERT, Qatar “Device Imaging and Analysis”
***
Case Study: Sultanate of Oman
Speaker: Ahmed Al Siyabi, Ministry of Justice, Sultanate of
Oman, “Case Study from the
Sultanate of Oman: Judicial Evidence in Cybercrimes, الأدلة القضائية في
أمن الفضاء الحاسوبي”,
Presentation and
Paper
(in Arabic)
***
Session 5: Cyber-Forensics and the Role of Expert Witnesses
Speaker: Raja Azrina Raja Othman, CyberSecurity Malaysia, and Malaysian Computer Emergency Response Team (MyCERT), Malaysia, “Cyber-Forensics and the Role of Expert Witnesses”
Session 6: Engagement with Law Enforcement
Panelist: Mounir Kamal, Q-CERT, Qatar
Panelist: Cal Waits, CERT/CC, United States of America
Panelist: Raja Azrina Raja Othman, CyberSecurity Malaysia, and Malaysian Computer Emergency Response Team (MyCERT), Malaysia
Session 7: Reviewing the Results of the Analysis
Speaker: Ian Dowdeswell, Q-CERT, Qatar, “Reviewing the Results of the Analysis”
Cybersecurity Forensics Workshop Closing
Closing Remarks: Michael Lewis, Deputy Director, Q-CERT, Qatar
|
|