Committed to connecting the world

Lunch time talks @ ITU-D Study Groups Cybersecurity

​Time ​Title, synopsis and speaker

 


1315h-1325h

Title: The Good Shepherd

During this session, we will explore the challenges faced in cybersecurity investigations today including focusing on the growing number of attacks, their increasing sophistication and the lack of available skills to respond appropriately.  We will show how existing permitter security solutions are failing and that without adopting a different approach to data breaches, it is not possible for organizations to respond either quickly or to effectively find the source of the attack.  Knowing your data and controlling it is a fundamental, yet important step towards reducing the gap between detection and investigation and subsequently mitigation of any cybersecurity incident.

Speaker: Mr Stuart Clark, Director of Cybersecurity & Investigation Services, Nuix Technology UK Ltd.



1330h-1340h

Title: Increasing the scale and effectiveness of cyber security capacity building

The Global Cyber Security Capacity Centre at the University of Oxford is working to provide tools for and contribute knowledge towards increasing the scale and effectiveness of cyber security capacity building across the world.  In order to accomplish these objectives, the GCSCC is developing a cyber capability maturity model, connecting recipients and providers of cyber security capacity through the Cybersecurity Capacity Portal, and gathering and documenting unique capacity building experiences, among other initiatives.  These three projects will be the focus of the presentation.

Speaker: Mr Taylor Roberts, James Martin Fellow, Global Cyber Security Capacity Centre, Oxford Martin School, University of Oxford

 

 

​1345h-1355h

Title: Public Private Partnerships (PPPs) models in cyber security - Indian perspective

Building successful PPs in cyber security is critical for India to ensure a secure cyberspace.  A "Roadmap" for PPP on Cybersecurity, along with its effective implementation is warranted which includes setting up of an institutional framework, capacity building, development of standards and assurance mechanisms, research and development, policy enforcement, augmentation of testing and certification facilities for ICT products, education and awareness, information sharing, etc.  mechanisms need to be developed which bring government and industry together to strengthen the cybersecurity ecosystem in India.

Speaker: Mr Rahul Jain, Principal consultant, Data Security Council of India (DSCI)



1400h-1410h
Title: Promoting effective Cybersecurity Management in Developing Economies: The Cybersecurity Capability Maturity Model
Reports have shown that developing economies are at greater risk to cyber-threats and criminals.  Therefore there is an urgent need to develop suitable technical and management solutions that can aid in the effective management of these risks and help achieve sustainable security advantage.  It is argued that to assist in achieving this goal, a capability-centred approach is necessary instead of any traditional threat-based approach.  The contribution therefore presents the Cybersecurity Capability Maturity Model (CM2), a capability-centric approach that identifies six stages of maturity and development for cybersecurity management.

Speaker: Ms Corlane Barclay, Researcher/Lecturer, University of Technology of Jamaica