International Telecommunication Union   ITU
عربي  |  中文  |  Español  |  Français  |  Русский
 
 Advanced Search Advanced Search Site Map Contact us Print Version
 
Home : ITU-D : ICT Applications and Cybersecurity Division : Events
   

Meeting Presentations

The presentations made during the ITU Regional Cybersecurity Forum can be found below. 

 

Monday
18 February 2008

Welcoming Address: Dr. Hessa Al Jaber, Secretary General, ictQATAR (English)

Opening Remarks: Sami Al Basheer Al Morshid, Director, ITU Telecommunication Development Sector (ITU-D) (Arabic)(English)

Presentation: Ian Cook, Security Evangelist, Team Cymru Research, “Setting the Stage ― The Changing Cybersecurity Threat Environment”

Session 1: Towards a Framework for Cybersecurity and Critical Information Infrastructure Protection

Session Moderator: Rich Pethia, Director, CERT Coordination Center (CERT/CC), United States of America

Speaker: Robert Shaw, Head, ICT Applications and Cybersecurity Division, ITU Telecommunication Development Sector (ITU-D), “Overview of ITU-D Activities Related to Cybersecurity and Critical Information Infrastructure Protection

Speaker: James Ennis, Department of State, United States of America, Rapporteur ITU-D Study Group 1 Question 22 ― Securing Information and Communication Networks: Best Practices for Developing a Culture of Cybersecurity, “Best Practices for Organizing National Cybersecurity Efforts

Session 2: Management Framework for Organizing National Cybersecurity/CIIP Efforts

Session Moderator: Bradford Willke, Senior Technical Staff, Survivable Enterprise Management, CERT, Carnegie Mellon University, United States of America

Speaker: Christine Sund, Cybersecurity Coordinator, ICT Applications and Cybersecurity Division, ITU Telecommunication Development Sector (ITU-D), “Promoting a Culture of Cybersecurity

Speaker: Bradford Willke, Senior Technical Staff, Survivable Enterprise Management, CERT, Carnegie Mellon University, United States of America “Government ― Industry Collaboration

Speaker: Ian Dowdeswell, Manager, Watch, Warning, Investigation, and Response, Q-CERT, Qatar, “Incident Management Capabilities

Session 3: Management Framework for Organizing National Cybersecurity/CIIP Efforts (Continued)

Session Moderator: Sherif Hashem, Executive Vice President, Information Technology Industry Development Agency, Ministry of Communications and Information Technology, Arab Republic of Egypt

Speaker: Nibal Idlebi, ICT for Development Team Leader, Information and Communication Technology Division, United Nations Economic and Social Commission for West Asia (UN-ESCWA), “Cyber Legislation in the ESCWA Region ― Security Issues

Speaker: Joseph Richardson, United States of America, “A National Cybersecurity Strategy

Tuesday
19 February 2008

Session 4: Country Case Studies

Session Moderator: Marilyn Cade, Advisor to AT&T, United States of America, Case Study ― Government ― Industry Collaboration

Speaker: Raja Azrina Raja Othman, Chief Technology Officer, CyberSecurity Malaysia, and Malaysian Computer Emergency Response Team (MyCERT), Malaysia, Country Case Study ― Promoting a Culture of Cybersecurity, “Promoting a Culture of Cybersecurity among Critical National Information Infrastructure

Speaker: Laile Di Silvestro, Business Operations Manager, Microsoft Corporation, Case Study ― Government ― Industry Collaboration, “Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection

Speaker: Marilyn Cade, Advisor to AT&T, United States of America, Case Study ― Government ― Industry Collaboration, “Country Case Studies for Government – Industry Collaboration

Session 5: Country Case Studies (Continued)

Session Moderator: Julia Allen, Member of Technical Staff, Software Engineering Institute, Carnegie Mellon University, United States of America

Speaker: Belhassen Zouari, Chief Executive Officer, National Agency for Computer Security and Cert-Tcc, Tunisia, Country Case Study ― Incident Management Capabilities, “Watch, Warning and Incident Response Capabilities : Implementing a National Strategy

Speaker: Mark Krotoski, National Coordinator, Computer Hacking and Intellectual Property Program, Computer Crime & Intellectual Property Section, Department of Justice, United States of America, Country Case Study ― Legal Foundation and Enforcement, “Legal Foundation and Enforcement: Promoting Cybersecurity

Session 6: Country Case Studies (Continued)

Session Moderator: Shamsul Jafni Shafie, Director, Security, Trust and Governance Department, Malaysian Communications and Multimedia Commission (MCMC), Malaysia

Speaker: Steve Huth, Director, Q-CERT, Qatar, Country Case Study ― A National Cybersecurity Strategy, “Case Study on National Cybersecurity Strategy ― Qatar

Speaker: Fatma Bazargan, aeCERT, Telecom Regulatory Authority, United Arab Emirates, Country Case Study ― A National Cybersecurity Strategy “A National Cybersecurity Strategy ― aeCERT Roadmap

Speaker: Suliman A. Al Samhan, Information Security Specialist, SA-CERT, Communications and Information Technology Commission, Saudi Arabia, Country Case Study ― A National Cybersecurity Strategy, “Saudi Arabia Computer Emergency Response Team

Session 7: Review and Discussion: Management Framework for Organizing National Cybersecurity/CIIP Efforts

Session Moderator: Robert Shaw, Head, ICT Applications and Cybersecurity Division, ITU Telecommunication Development Sector (ITU-D)

Panelist: Marilyn Cade, Advisor to AT&T, United States of America

Panelist: Suliman Al Samhan, Information Security Specialist, SA-CERT, Communications and Information Technology Commission, Saudi Arabia

Panelist: Shamsul Jafni Shafie, Director, Security, Trust and Governance Department, Malaysian Communications and Multimedia Commission (MCMC), Malaysia

Panelist: Bradford Willke, Senior Technical Staff, Survivable Enterprise Management, CERT, Carnegie Mellon University, United States of America

Panelist: Sherif Hashem, Executive Vice President, Information Technology Industry Development Agency, Ministry of Communications and Information Technology, Arab Republic of Egypt

Panelist: Joseph Richardson, United States of America

Wednesday
20 February 2008

Sessions 8 and 9 : ITU National Cybersecurity/CIIP Self-Assessment Toolkit: An Exercise

Session Moderator: Joseph Richardson, United States of America

Information on the ITU National Cybersecurity/CIIP Self-Assessment Toolkit can be found here.

Session 10: Regional and International Cooperation

Session Moderator: Michael Lewis, Deputy Director, Q-CERT, Qatar

Speaker: Mark Krotoski, National Coordinator, Computer Hacking and Intellectual Property Program, Computer Crime & Intellectual Property Section, Department of Justice, United States of America and Representative for the 24/7 High Tech Crime Network, “Promoting Regional and International Cooperation On Cybersecurity Issues

Speaker: Ebrahim Al-Haddad, Head, ITU Regional Office for Arab States

Speaker: Majid Al Sharhan, Saudi Arabia, Gulf Cooperation Council (GCC)

Speaker: Khaled Foda, Head of IT Section, Telecommunication and IT Department, League of Arab States

 

Session 11: Wrap-Up, Recommendations and the Way Forward

Session Moderator: Robert Shaw, Head, ICT Applications and Cybersecurity Division, ITU Telecommunication Development Sector (ITU-D)

***

Closing Remarks: Michael Lewis, Deputy Director, Q-CERT, Qatar

Closing Remarks: Ebrahim Al-Haddad, Head, ITU Regional Office for Arab States

Thursday
21 February 2008
CYBERSECURITY FORENSICS WORKSHOP
INCIDENT ANALYSIS, CYBER FORENSICS, AND ENGAGEMENT WITH LAW ENFORCEMENT

Session 1: Presentation of an Incident

Speaker: Michael Lewis, Q-CERT, Qatar, “Presentation of the Incident

Session 2: Forensically-Safe Techniques for Crime Scene Investigation

Speaker: Mounir Kamal, Q-CERT, Qatar, “Forensically-Safe Techniques for Crime Scene Investigation

Session 3: Live Memory Acquisition and Analysis

Speaker: Cal Waits, CERT/CC, United States of America, “Live Memory Acquisition and Analysis

Session 4: Device Imaging and Analysis

Speaker: Mounir Kamal, Q-CERT, Qatar “Device Imaging and Analysis
 

***

Case Study: Sultanate of Oman

Speaker: Ahmed Al Siyabi, Ministry of Justice, Sultanate of Oman, “Case Study from the Sultanate of Oman: Judicial Evidence in Cybercrimes, الأدلة القضائية في أمن الفضاء الحاسوبي”, Presentation and Paper (in Arabic)

***

Session 5: Cyber-Forensics and the Role of Expert Witnesses

Speaker: Raja Azrina Raja Othman, CyberSecurity Malaysia, and Malaysian Computer Emergency Response Team (MyCERT), Malaysia, “Cyber-Forensics and the Role of Expert Witnesses

Session 6: Engagement with Law Enforcement

Panelist: Mounir Kamal, Q-CERT, Qatar

Panelist: Cal Waits, CERT/CC, United States of America

Panelist: Raja Azrina Raja Othman, CyberSecurity Malaysia, and Malaysian Computer Emergency Response Team (MyCERT), Malaysia

Session 7: Reviewing the Results of the Analysis

Speaker: Ian Dowdeswell, Q-CERT, Qatar, “Reviewing the Results of the Analysis

Cybersecurity Forensics Workshop Closing

Closing Remarks: Michael Lewis, Deputy Director, Q-CERT, Qatar

Contributions
 

ITU Regional Cybersecurity Forum in Doha, Qatar, 18-21 February 2008

Contribution from the Ministry of Justice, Sultanate of Oman, “Case Study from the Sultanate of Oman: Judicial Evidence in Cybercrimes, الأدلة القضائية في أمن الفضاء الحاسوبي”, Presentation and Paper (in Arabic)

 

Any additional contributions can be sent by e-mail to the
ITU-D ICT Applications and Cybersecurity Division

Meeting Detailss  
Date:  18-21 February 2008
Location: Doha, Qatar
 
This regional workshop is organized by ITU in collaboration with ictQATAR and Q-CERT.




[More on cybersecurity...]

 

Resources  
ITU Cybersecurity Gateway


[More ITU-D resources]

 

Top - Feedback - Contact Us -  Copyright © ITU 2010 All Rights Reserved
Contact for this page : BDT Support
Updated : 2008-04-29