International Telecommunication Union   ITU
عربي  |  中文  |  Español  |  Français  |  Русский
 
 Advanced Search Advanced Search Site Map Contact us Print Version
 
Home : ITU-D : ICT Applications and Cybersecurity Division : Events
   

2009 ITU Regional Cybersecurity Forum for Africa and Arab States

“Connecting the World Responsibly”

Forum Agenda

THURSDAY 04 June 2009

08:00−09:30

Forum Registration and Badging

09:30−10:00

Forum Opening and Welcome

 

Welcoming Address: TBD

Opening Remarks: TBD

10:00−11:15

Session 1: Setting The Stage ― Towards an Integrated Approach for Cybersecurity and Critical Information Infrastructure Protection (CIIP)

 

Session Description: Confidence and security in using information and communication technologies are vital for building an inclusive, secure and global Information Society. The continuing changes in the use of ICTs, systems and networks offer significant advantages but also require a much greater emphasis on cybersecurity and critical information infrastructure protection by governments, businesses, other organizations and individual users, who develop, own, provide, manage service and use these networks. Given the interconnected features of ICTs, genuine cybersecurity can only be promoted when all connected stakeholders are aware of the existing dangers and threats and how they can protect themselves online. Government must play a leading role in bringing about a culture of cybersecurity and in supporting the efforts of other participants in this regard. In addition, regional and international cooperation is critical in fostering a global culture of cybersecurity. This session shares an overview of the current cyber-threat landscape and provides an insight into the challenges faced by countries, businesses and citizens in managing their every-day lives in this new and constantly changing environment.

11:15−11:30

Coffee/Tea Break

11:30−13:00

Session 2: Mapping the Global Issue with National and Regional Needs

 

Session Description: ITU, through its Global Cybersecurity Agenda (GCA), has put in place a framework for international cooperation in cybersecurity, to provide a global platform where all relevant stakeholders can discuss and work together in order to best respond in a coordinated manner to the growing cybersecurity challenges. Each country and region, however, has its own requirements and needs, that need to be addressed taking in consideration the national and regional context. ITU is working with Members States to ensure that specific requirements are taken into account in order to properly assist. This session explores how a top-down and bottom-up approach can work to harmonize the overall efforts in order to provide an integrated and consistent response and assistance to Member States.

13:00−14:30

Lunch

14:30−15:45

Session 3: Cybersecurity in the National Agenda and Actions to be Considered in Developing a National Cybersecurity Strategy

 

Session Description: The need to build confidence and security in the use of ICTs, promote cybersecurity and protect critical infrastructures at the national level is generally acknowledged. As national public and private sector actors bring their own perspective to the relevant importance of issues, in order to have a consistent approach, some countries have established cybersecurity/CIIP institutional framework structures while others have used a light-weight and non-institutional approach. What issues should be considered in a national strategy for cybersecurity and critical information infrastructure protection? Which actors should be involved? This session will discuss some of the elements required to develop and organize national cybersecurity/CIIP efforts. The session will also introduce the ITU National Cybersecurity/CIIP Self Assessment Tool which is intended to assist national governments in examining their existing policies, procedures, norms, institutions, and relationships in light of national needs to enhance cybersecurity and address critical information infrastructure protection.

15:45−16:00

Coffee/Tea Break

16:00−17:15

Session 4: Concrete Actions to Foster Regional and International Cooperation

 

Session Description: Regional and international cooperation is key in fostering cybersecurity efforts and in facilitating interactions and exchanges. The challenges posed by cyber-attacks and cybercrime are global and far reaching, and can only be addressed through a coherent strategy within a framework of international cooperation, taking into account the roles of different stakeholders and existing initiatives. As facilitator for WSIS Action Line C5 dedicated to building confidence and security in the use of ICTs, ITU is discussing with key stakeholders on how to best respond in a coordinated manner to the growing cybersecurity challenges. This session will review some of the ongoing regional initiatives to further the discussions, in order to identify possible next steps and concrete actions to foster and promote regional and international cooperation for enhanced cybersecurity.

17:15−17:30

Daily Wrap-Up and Announcements

19:00−

Reception

 

FRIDAY 05 JUNE 2009

09:30−10:45

Session 5: Developing a Legal Foundation and Establishing Effective Enforcement

 

Session Description: Appropriate national legislation, international legal coordination and enforcement are all important elements in preventing, detecting and responding to cybercrime and the misuse of ICTs. This requires updating of criminal laws, procedures and policies to address cybersecurity incidents and respond to cybercrime. As a result, many countries have made amendments in their penal codes, or are in the process of adopting amendments, taking in consideration existing international frameworks and recommendations. This session looks closer at the need for a sound legal foundation and effective enforcement, reviews some of the national legal approaches taken and explores potential areas for international legal coordination efforts.

10:45−11:00

Coffee/Tea Break

11:00−12:45

Session 6: Elaborating on Technical Solutions for Resiliency of Information and Communication Networks

 

Session Description: The expansion and evolution of telecommunications brings new opportunities, as well as new challenges. Convergence and the move towards networks based on internet protocol (IP) or next generation networks (NGNs) are redefining the industry and business strategies. New services and applications, such as voice over internet protocol (VoIP), are disrupting business models and calling regulatory frameworks into question. Faced with this transition, governments, regulators, operators and manufacturers are struggling to anticipate and adapt to tomorrow's emerging issues. This session provides an overview of the threats to the networks and what technical measures and standards that can be adopted to foster improved network resiliency. The purpose of the session is to help countries better understand how they can mitigate the impact of security threats and ensure that communications over public telecommunication networks remain reliable, secure, interoperable and user-friendly.

12:45−14:00

Lunch

14:00−15:30

Session 7: Defining Sound Organizational Structures and Developing Incident Management Capabilities

 

Session Description: A key activity for addressing cybersecurity requires the establishment of watch, warning and incident response capabilities to prepare for, detect, manage, and responding to cyber incidents through. Effective incident management requires consideration of funding, human resources, training, technological capability, government and private sector collaboration, and legal requirements. Collaboration at all levels of government and with the private sector, academia, regional and international organizations, is necessary to raise awareness of potential attacks and steps toward remediation. This session discusses best practices, organizational structures and related standards in the technical, managerial and financial aspects of establishing national, regional and international watch, warning, and incident response capabilities.

15:30−15:45

Coffee/Tea Break

15:45−17:00

Session 8: Promoting a Culture of Cybersecurity through Innovative Partnerships

 

Session Description: The realities of cyberspace make it clear that everyone has to work together. Responding effectively to cyber-threats requires resources, know-how and strong investments on capacity developments; these efforts cannot be undertaken by only one entity. The key element is bringing the public and the private sectors together in trusted forums and joint activities, to address the common cybersecurity challenges and develop solid capacity building plans. These collaborative efforts should involve every cyber-user; from citizens to corporations, law enforcement, and critical infrastructure providers. The basis of a successful partnership is trust, which is necessary for establishing, developing and maintaining sharing relationships between the different parties. This session looks closer at the benefits as well as challenges associated with innovative and sustainable partnerships for enhanced cybersecurity, and how joint efforts generate concrete steps forward.

17:00−17:30

Session 9: Forum Wrap-Up, Recommendations and the Way Forward

 

Session Description: The final session of the forum reports some of the main findings from the event and tries to elaborate recommendations for future activities in order to enhance cybersecurity and increase the protection of critical information infrastructures in Africa and the Arab States.

17:30−18:00

Forum Closing

 

Closing remarks: Representative, Tunisia

Closing remarks: Representative, ITU Regional Office

 

 

 

 

Forum Details  
Date: 4-5 June 2009
Location: Hôtel Karthago Le Palace, Tunis, Tunisia
This regional cybersecurity forum was hosted by the National Agency for Computer Security (ANSI), Ministry of Communication Technologies, Tunisia



 

Related Events  


[More on CYB events...]

[More on cybersecurity...]


 

 

Top - Feedback - Contact Us -  Copyright © ITU 2012 All Rights Reserved
Contact for this page : BDT Support
Updated : 2009-06-08