International Telecommunication Union   ITU
عربي  |  中文  |  Español  |  Français  |  Русский
Site Map Contact us Print Version
Home : Office of the Secretary-General : Corporate Strategy Division
Abstracts for Meeting Presentations
Abstract for presentation by Mr. Demostenes Chryssikos, Crime Prevention and Criminal Justice Officer, United Nations Office on Drugs and Crime (UNODC)

Title of Presentation: "UNODC Activities Related to Cybersecurity ".

The UNODC presentation at the second facilitation meeting for WSIS Action Line C5: “Building Confidence and Security in the use of ICTs” will make reference to the general mandate for UNODC, arising from the Bangkok Declaration on “Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice”, endorsed by General Assembly resolution 60/177 of 16 December 2005, “to enhance and supplement existing cooperation to prevent, investigate and prosecute high-technology and computer-related crime, including through the development of partnerships with the private sector”.

he presentation will further focus on the more specific mandate for UNODC to elaborate a study on fraud and the criminal misuse and falsification of identity, in accordance with Economic and Social Council resolution 2004/26 of 21 July 2004. In that resolution, the Council had requested the Secretary-General to convene an intergovernmental expert group for the purpose of preparation of the study. The expert group was convened on an open-ended intergovernmental basis, and met twice, in March 2005 and January 2007. Between the two sessions, a questionnaire was prepared, circulated for discussion and sent to all Member States. 46 Member States responded, providing the majority of the data used in the study. A draft report, including conclusions and recommendations, was prepared and circulated to the experts, and then revised based on comments received. The results of the study were presented to the Commission on Crime Prevention and Criminal Justice at its 16th session, held on 23-27 April 2007 in Vienna.

The part of the study on identity-related crime, which is considered to include both “identity-theft” and “identity-fraud”, provides a series of recommendations in areas such as international cooperation; jurisdictional aspects; domestic powers to investigate, prosecute and punish related offences; cooperation between criminal justice systems and the private sector; identity-related crime in the context of development, reconstruction and economic transition; prevention; and training. The UNODC officer will share those findings and recommendations with the participants looking forward to a constructive dialogue and exchange of views.

Abstract for presentation by Mr. Richard COX, CIO, The Spamhaus Project

Text coming soon.

Abstract for presentation by Ms. Solange Ghernaouti-Hélie, Professor, HEC - University of Lausanne, Switzerland

Title of Presentation: "Enhancing Cybersecurity Knowledge by an Educational Program Framework".

This presentation proposes an initiative developed by the University of Lausanne to promote cybersecurity education at regional and international levels. A global educational program framework related to cyberthreats issues is identified to meet WSIS action line C5 goals, in order to contribute to cyberthreats control and to countermeasures’ quality improvement at different levels. This comprehensive program takes into consideration the necessity to understand cybersecurity issues and to develop effective countermeasures by policy makers, regulators, IT engineers, executives and end users. The structure of this program, including examples of putting into practices is presented.

Top of page

Abstract for presentation by Mr. Seymour GOODMAN, Professor, Georgia Institute of Technology, United States of America

Text coming soon.

Abstract for presentation by Ms. Diana KORSAKAITE, Deputy Director, Communications Regulatory Authority, Lithuania

Title of Presentation: "Integral Enabling System as the Mission of a National Strategy".

Cyber security is considered to be one of the most important factors to build a new kind of information and knowledge society, information and knowledge economy worldwide – only secure flow of data over ICT networks ensures confidence of general public in technological novelties and promotes wider adoption of ICTs into daily lives. Cyber threats have no state boards, but can make significant negative impact on national economy and personal life.

The truly international feature of cyber security was duly regarded in WSIS Tunis, final documents of which made a call for global action. This encouraged looking more closely at cyber security challenges at the national level and search for new more effective measures to combat cyber security threats. In the meeting, the Lithuanian experience in developing a cyber security strategic approach will be presented, including the reasons behind the need for a strategy, the integral system of strategic guidelines and the evolving changes.

Abstract for presentation by Mr. Alexander NTOKO, Strategy and Policy Unit, International Telecommunication Union (ITU)

Title of Presentation: "Text coming soon".

Text coming soon.

Abstract for presentation by Ms. Audrey PLONK, Information Security and Privacy, Organisation of Economic Cooperation and Development (OECD)

Title of Presentation: "Policies to Protect the Critical Information Infrastructure in Several OECD Member Countries".

This presentation will provide an overview of ongoing work by the OECD Working Party on Information Security and Privacy (WPISP) on similarities and differences in policies for protecting the critical information infrastructure (CII) across several OECD countries. With a view to identifying good practices, the OECD WPISP studies focus on the definition of the CII, risk management strategies, frameworks and policies regarding the CII, as well as challenges to information sharing and cross-border cooperation for addressing the risk to the CII. In 2006, the WPISP conducted a first study examining policies in four volunteer OECD countries. The final report from that study is available on the OECD Information Security and Privacy website. A second study is being conducted in 2007 that examines the policies of three additional OECD countries.

Title of Presentation: "OECD - APEC Joint Work on Malicious Software".

Rapid advances in technology and increased dependence on the Internet have made information systems and networks, including those that support national critical infrastructures, vulnerable to failure, outage, and attacks by malicious actors. To complement ongoing efforts to improve the security of information systems and networks, and better tackle the international dimension of information security risks, the OECD and APEC have partnered to examine the issues of malicious code and malicious software, commonly known as "malware". The OECD and the APEC are developing analytical report on malware focusing on how it is used to compromise information systems and networks with the goal of:

  • Informing policymakers on the impacts of malware;
  • Cataloguing data trends in malware growth and evolution;
  • Examining the economics of malware and the business models behind malicious activity involving malware;
  • Evaluating existing technical and non-technical countermeasures to combat malware and identify gaps; and,
  •  Outlining recommendations to secure information systems from the threat of malware.

In addition to the analytical report, APEC and OECD held a Malware Workshop April 22 - 23, 2007 at the APEC TEL 35 meeting in Manila, Philippines. The workshop brought together representatives from the various communities addressing malware in order to inform policymakers of the issues, gain a better collective understanding of the issues, and inform the analytical report. The issues of malware demand close international cooperation and coordination among the various stakeholders in the security community.

Top of page

Abstract for presentation by Mr. Suresh RAMASUBRAMANIAN, Manager, Outblaze, India

Text coming soon.

Abstract for presentation by Mr. Grégoire RIBORDY, CEO and Co-founder, ID Quantique, Switzerland

Title of Presentation: "Text coming soon".

Text coming soon.

Abstract for presentation by Mr. Nabil SAHLI, CEO of the National Agency for Computer Security and Head of the Public Tunisian CERT (CERT-TCC)

Title of Presentation: "Insights into the Tunisian Experience and Strategy in the Establishment of National Watch, Warning and Incident Response Capabilities".

As a case example for developing countries, we will present the Tunisian Experience in establishing the first public CERT in Africa (CERT-Tcc), to outline the tasks that are important for CERTs in developing countries. We will give an overview about :

  • The awareness and information actions carried by the CERT-TCC and the specific actions carried due to our position as a public CERT (parents and youth and common ICT users awareness).
  • The launch of an incident handling team and the accompanying lawful measures, besides the establishment of a Watch and Alert Center and reaction plan.
  • Professional Training and Education actions, based on the launch of training sessions for trainers and on the launch of Masters in IT security
  • Research and Development strategy and actions, based on the open-source approach, for the rapid and efficient emergence of national R&D activities.
  • The collaboration with associations (NGO).

We will close by presenting an overview about some of the urgent needs of less developing countries and present some key points to consider when building CERTs in less developing countries.

Abstract for presentation by Mr. Stein SCHJOLBERG, Chief Judge, Moss Tingrett, Moss District Court, Norway

Title of Presentation: "Global Harmonization of Cybercrime Legislation".

The global harmonization of national cybercrime legislation has been an evolution over a period of 30 years. From a Bill, through recommendations to the adoption of a convention, we have reached a time of bringing information of the basic standards and principles of what is achieved to the global society.

Based on the convention and recommendations from global organizations it is today necessary to envisage the elaboration of a global legal framework on cybercrime. This presentation will consider different future models for global harmonization of cybercrime legislation.

Top of page

Abstract for presentation by Mr. Georges SEBEK, Counsellor of ITU-T Study Group 17, International Telecommunication Union (ITU)

Title of Presentation: "Report on ITU-T Study Group 17 activities".

Text coming soon.

Abstract for presentation by Mr. Alexander SEGER, Head of Technical Cooperation, Department of Crime Problems, Council of Europe, Strasbourg, France
Title of Presentation: "Developing National Legislation on Cybercrime: The Convention on Cybercrime as a Guideline".

In order to establish a legislative framework to meet the challenges of cybercrime countries need to:

 - Criminalise certain conduct in their substantive criminal law. As a minimum this should include illegal access to a computer system, illegal interception, data interference, system interference, the misuse of devices, computer-related forgery and fraud, child pornography, xenophobia and racism, infringement of copyright and related rights

 - Give law enforcement/criminal justice the means to investigate, prosecute and adjudicate cybercrimes in their criminal procedure law. As a minimum this should provide for expedited preservation of computer and traffic data, production order, search and seizure of stored computer data, real-time collection of traffic data, interception of content data and procedural safeguards

 - Allow for efficient international cooperation by harmonising legislation, making provisions and establishing institutions for police and judicial cooperation, and concluding or joining agreements.

The Convention on Cybercrime of the Council of Europe serves any country as a clear guideline for the development of national legislation along these lines. In addition, it provides a framework for effective international cooperation among the increasing number of parties to this treaty.

Top of page

Abstract for presentation by Mr. Robert SHAW, Head, ICT Applications and Cybersecurity Division, Development Bureau, International Telecommunication Union (ITU)

Title of Presentation: "Report on ITU-D Cybersecurity-Related Activities" and "Report from meeting of ITU-D Study Group 1/Q22".

Text coming soon.
Abstract for presentation by Mr. Mark SUNNER, Chief Security Analyst, MessageLabs, United Kingdom

Title of Presentation: "Text coming soon".

Text coming soon.

Abstract for presentation by Mr. Manuel SUTER, Research Fellow, Center for Security Studies (CSS), ETH Zurich, Switzerland

Title of Presentation: "A Generic National Framework for Critical Information Infrastructure Protection".

Meeting Background Paper :  "A Generic National Framework for Critical Information Infrastructure Protection"

The task of Critical Information Infrastructure Protection (CIIP) is acknowledged as an indispensable component of national security policy all over the world. Some countries have built up sophisticated CIIP organizations, involving agencies from different ministries, and building on a variety of initiatives and programs. However, since these solutions are fairly resource-intensive, they are not suitable for a majority of the countries of the world. Thus, in order to help countries to determine their individual solution, the presented generic model offers building blocks for a working, government-led CIIP unit.

By concentrating on the most essential tasks, cooperation between various stakeholders, flexibility and adaptability, one may develop a relatively inexpensive solution that can be further tailored, if necessary, to country-specific needs.

Abstract for presentation by Mr. Marco THORBRUEGGE, Senior Expert on Computer Incident and Response Handling Policy, European Network and Information Security Agency (ENISA)

Title of Presentation: "Information Sharing and Incident Response – A European Perspective".

Mr. Thorbruegge's presentation will give a summarised picture of what’s going on in the field of Information Sharing and Incident Response. The presentation will shortly introduce the European Network and Information Security Agency (ENISA) and its work in various fields of NIS, with a special emphasis on the work in the field of CERT/CSIRT cooperation and support, as CSIRTs (Computer Security and Incident Response Teams) play a leading role in both fields and are a key factor for a comprehensive and successful security strategy on various levels.

Finally the presentation will give the audience some information about a feasibility study for a “European Information Sharing and Alerting System” (EISAS) that the ENISA is currently carrying out, based on a request from the European Commission.

Abstract for presentation by Ms. Jody R. WESTBY, American Bar Association’s Privacy & Computer Crime Committee, Author of “Governing for Information Security Implementation Guide” for Carnegie Mellon's CERT

Title of Presentation: "Governance for Security and Dependability"

Ms. Jody Westby's presentation focuses on how governance is the critical foundation for an organization to manage incident response and provide critical information to national or regional coordination centers.

Top of page



Top - Feedback - Contact Us -  Copyright © ITU 2008 All Rights Reserved
Contact for this page :
Updated : 2008-03-14