Shall governments have access to encrypted messaging apps content?
RealTyme
Session 250
Proposed Agenda (45 minutes)
Segment
Duration
Content
1. Framing the Debate
5 mins
Introduce the central question and reframe it: access vs. governance.
2. Real-World Threats
10 mins
Show AI- and post-quantum-driven threat landscape (slides 3–7 from earlier).
3. Participant Testimonial Clip or Quote
3–5 mins
Video or selected quotes from ITU training participants reacting to AI misuse, policy gaps, or collaboration tools.
4. Insights from the Field
10 mins
Share your key takeaways from the training: The Legacy Challenge, Data Ownership, Future-Proofing.
5. Interactive Poll or Scenario
5 mins
“Would you allow your government to inspect encrypted content in this scenario?” Use a real-world case.
6. Panel Reflection / Open Floor
7 mins
Invite audience or panelists to reflect: What is a balanced approach?
7. Closing Message
3 mins
A vision for governance without backdoors: sovereign communication, ethical AI use, and post-quantum preparation.
-
C1. The role of governments and all stakeholders in the promotion of ICTs for development
-
C2. Information and communication infrastructure
-
C4. Capacity building
-
C5. Building confidence and security in use of ICTs
-
C7. ICT applications: benefits in all aspects of life — E-government
-
C7. ICT applications: benefits in all aspects of life — E-learning
ITU Acadmy Course Description
As governments increasingly rely on digital communication tools, emerging threats from AI-driven cyberattacks and post-quantum decryption risks pose significant challenges. This three-hour interactive training is designed for government officials, cybersecurity leaders, and policymakers seeking to enhance data sovereignty, compliance, and secure communication strategies in a rapidly evolving digital landscape.
Participants will explore:
The Legacy Challenge – How outdated GSM networks and consumer messaging apps create security vulnerabilities.
The Data Ownership Challenge – The risks of AI-driven data processing, cloud jurisdiction issues, and compliance gaps.
Future-Proofing Government Communication – Best practices for secure collaboration, AI-enabled threat mitigation, and preparing for post-quantum encryption.
Through real-world case studies, hands-on exercises, and expert insights, attendees will develop practical strategies to protect their digital identities, sensitive government data, and critical communication infrastructure.
https://academy.itu.int/training-courses/full-catalogue/secure-government-communications-ai-and-post-quantum-era
-
Goal 9: Build resilient infrastructure, promote sustainable industrialization and foster innovation
-
Goal 10: Reduce inequality within and among countries
Does this course have any restrictions?
By nationality
Angola, Bangladesh, Benin, Burkina Faso, Burundi, Cambodia, Central African Republic, Chad, Comoros, Democratic Republic of the Congo, Djibouti, Eritrea, Ethiopia, Gambia, Guinea (Republic of), Guinea-Bissau, Haiti, Kiribati, Lao People’s Democratic Republic, Lesotho, Liberia, Madagascar, Malawi, Mali, Mauritania, Mozambique, Nepal, Niger, Rwanda, São Tomé & Príncipe, Senegal, Sierra Leone, Solomon Islands, Somalia, Sudan, South Sudan, Timor-Leste, Togo, Tuvalu, Uganda, Tanzania, Zambia, Belize, Cabo Verde, Cuba, Dominica, Dominican Republic, Grenada, Fiji, Jamaica, Maldives, Marshall Islands, Mauritius, Micronesia, Papua New Guinea, Samoa, St. Lucia, St. Vincent & Grenadines, Suriname, Timor-Leste, Tonga, Vanuatu
https://www.linkedin.com/posts/global-forum-on-cyber-expertise-gfce_gfce-cyberforgood-ituacademy-activity-7328427773151154176-x_KC?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAAMwO0BP9YKIpvEdE01mS57aMoZJxxgibs
https://www.linkedin.com/posts/realtyme_cybersecurity-legacysystems-mobilethreats-activity-7335712087857364992-ctyL?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAAMwO0BP9YKIpvEdE01mS57aMoZJxxgibs