| 
  | 
	
	
		| 
		HLS 2008 Sessions on Cybersecurity | 
	
	
		| 
		
		 
		  
		 
   | 
		
		
			- The Internet has transformed modern life and continues to grow 
			at an astonishing rate - ITU estimates that, by the start of 2008, 
			there were 1.3 billion Internet users worldwide.
 
  
			- The strong growth in Internet access has been accompanied by a 
			proliferation in cyberthreats and the risks of venturing online. 
 
  
			- It is increasingly difficult to protect end-users, especially 
			more vulnerable users online such as children, from the growing 
			risks associated with online access. 
 
  
			- No country is safe – cybercriminals strike at will, and 
			anonymously. Such far-reaching challenges posed by these new and 
			greater cyberthreats can only be addressed at the global level.
 
		 
		
			
		Background information on Cybersecurity... 
		
		   | 
	
	
		| 
		
		  | 
		
		  | 
	
	
		
		Session 2, 12 November, 15:00-16:15 
		Managing cyberthreats through harmonized policies and organizational 
		structures | 
	
	
		
		 
		This Session will examine how cyberthreats 
			can be detected and managed effectively through harmonized policies 
			and improved organization structures. 
		The absence of effective institutions to deal with cyber-attacks is a 
		major issue. Some countries have established specific agencies with 
		watch, warning and incident response capabilities. Other countries 
		prefer to promote capacity to deal with cyber-incidents within existing 
		law enforcement agencies. What lessons can be learned from the 
		experience of different countries? And how can cooperation and the flow 
		of information between national institutions be improved? 
			
		   | 
	
	
		
		Session 3, 12 November, 16:45-18:00 
		Addressing the technical and legal challenges related to the borderless 
		nature of cybercrime | 
	
	
		
		 
		This Session considers how the technical and legal challenges 
		associated with cybercrime can best be addressed. 
		Threats to cybersecurity are global in nature. Cybercriminals can 
			strike at will, exploiting technical vulnerabilities and legal 
			loopholes through cross-border operations that show no respect for 
			geographical boundaries or jurisdictional borders. This makes it 
			difficult for any single national or regional legal framework to 
			address cyberthreats effectively. What are the major challenges 
		countries face in fighting cybercrime? How can countries deal with these 
		challenges?  
			
		   | 
	
	
		
		Session 5, 13 November, 11:00-12:30 
		Be Safe Online: A Call to Action | 
	
	
		
		 
		What can be done and what should be done to protect our most valuable 
		resource – our children?The most vulnerable Internet users online are 
			children. In 
			industrialized countries, as many as 60% of children and teenagers 
			use online chatrooms regularly, and evidence suggests that as many 
			of three-quarters of these may be willing to share personal 
			information in exchange for online goods and services. In some 
			countries, as many as one in five children may be targeted by a 
			predator or paedophile each year. These trends are increasingly true 
		in many emerging and developing countries as well.  
			
		   | 
	
	
		
		Session 6, 13 November, 14:30-15:45 and 
		16:00-17:30 
		ITU Global Cybersecurity Agenda: Towards an International Roadmap for 
		Cybersecurity | 
	
	
		
		 
		The last two Sessions will look at how the framework and expert 
		proposals developed within the GCA can 
			help countries promote cybersecurity.There are many valuable national and regional initiatives underway 
			to promote cybersecurity. However, the growing global cyberthreats 
			need a global basis on which they can be addressed. On 17 May 2007, 
			the ITU Secretary-General Dr. Hamadoun Touré launched the Global 
			Cybersecurity Agenda (GCA) as a framework for international 
			cooperation to promote cybersecurity and enhance confidence and 
			security in the information society. The GCA seeks to encourage 
			collaboration amongst all relevant partners in building confidence 
			and security in the use of ICTs.  
			
		   |