08:30 - 12:00 | Registration |
09:00 - 10:45 | Session 3: Cybersecurity and data protection
Moderator: Sacid Sarikaya, SG17 Vice-Chairman, WP2/17 Chairman, Turkey [ Biography | Presentation ]
Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment. Widespread use of internet technologies and increasing number of cyber threats make cyber security more important. In this session, representatives from Kenya will share their cyber security experiences and challenges. Also, ITU-T cyber security standards, information exchange techniques, and ITU-D cyber security studies will be presented by the experts.
-
Securing information and communication networks: best practices for developing a culture of cybersecurity:
Eliot Lear, Former (acting) ITU-D Q.22/1 Rapporteur, CISCO Systems [ Biography | Presentation ]
-
ITU-T CYBEX standards for Cybersecurity and data protection:
Youki Kadobayashi, ITU-T Q4/17 Rapporteur [ Biography | Presentation ]
-
Overview of Kenya’s Cybersecurity Framework:
Michael Kamuti Katundu,Information Technology Communications Authority of Kenya CIRT/CC [ Biography | Presentation ]
-
CYBEX implementation in Japan: MyJVN: JVN Security Content Automation Framework and CYBEX collaboration
Masato Terada, Hitachi [ Biography | Presentation ]
-
Validation and Reverse Business Process Documentation of on line services:
Maurizio Talamo, Tor Vergata University of Rome [ Biography | Presentation ]
Discussion Panel: All |
| |
10:45 - 11:00 |
Coffee Break |
11:00 - 12:45 | Session 4: ICT role in critical infrastructure protection
Moderator:
Antonio Guimaraes, SG17 Vice-Chairman, WP4/17 Chairman, Brazil [
Biography | Presentation ]
Critical infrastructure is a term used by governments to describe assets that are essential for the functioning of a society, such as energy, transportation, telecommunication, water supply, agriculture, public health, financial services, etc. Most critical infrastructures rely on Information and Communication Technologies (ICTs), including industrial control systems (ICS), to perform essential functions. This dependency represents potential vulnerabilities and risks to operations. This section will focus in existing ICT security standards, guidelines, methodologies, and practices to enable critical infrastructure providers to achieve the resilience required.
-
Critical telecommunication infrastructure protection in Brazil: Antonio Guimaraes; Paulo Moura, National Telecommunication Agency, Anatel, Brazil [ Biography | Presentation ]
- Critical Information Infrastructure Protection (CIIP): A Commonwealth Perspective: Martin Koyabe, Commonwealth Telecommunication Organization [ Biography | Presentation ]
-
Critical infrastructure protection: standardization to protect critical infrastructure objects:
Vyacheslav Zolotnikov, Kaspersky Lab [ Biography | Presentation ]
- Security by Design in Smart Grids – A Need to Rethink ICT in Power System Controls: Carsten Strunge, Energinet.dk, Denmark [Biography | Presentation ]
-
Towards a partnership-based framework for secure ICT infrastructure in developing countries: Bill McCrum, Telecom Consultant[ Biography | Presentation ]
-
ICT Regulator Role on National Security and Critical Infrastructure Protection:
Suliman Alsamhan, Electronic Evidence Supervisor, Communication and Information Technology Commission (CITC), Saudi Arabia [ Biography | Presentation ]
Discussion Panel: All |
12:45 - 14:00 |
Lunch Break |
14:00 - 15:45 | Session 5: Trust services and cloud security
Moderator:
Heung Youl Youm, SG17 Vice-Chairman, WP3/17 Chairman, Korea (Republic of) [
Biography | Presentation ]
Cloud computing is a model for enabling service user’s ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources. Identity management (IdM) is the management of the life cycle and use of identity information. This session will focus on presenting existing ICT security standards, guidelines, and best practices in the area of cloud computing security and identity management to ensure trust services and cloud computing security.
-
Cloud security standardization activities in ITU-T: Huirong Tian, China [ Biography | Presentation ]
-
ITU-T SG17 Identity management (IdM) Progress Report : Abbie Barbir, ITU-T Q10/17 Rapporteur [ Biography | Presentation ]
-
X.509 in a changing world: Erik Andersen, Denmark [ Biography | Presentation ]
- National ID management system in Korea: Daeseon Choi, Electronics and Telecommunications Research Institute, Authentication Research Section /Leader [ Biography | Presentation ]
- Introduction to ISO 29003 - Identity Proofing: Patrick Curry, British Business Federation Authority (& SC27 WG5) [ Biography | Presentation ]
Discussion Panel: All |
15:45 - 16:00 |
Coffee Break |
16:00 - 17:45 | Session 6: Security standardization challenges
Moderator:
Herb Bertine (invited) [
Biography | Presentation ]
After a set of presentations that highlight ICT security standardization efforts in international and regional bodies, a roundtable discussion will explore security standardization challenges. Topics will include insights on the benefits and challenges associated with collaboration and cooperation and on challenges associated with ensuring standards will meet the needs of users, especially those in developing countries.
-
ISO Security Standardization News: Walter Fumy, ISO/IEC JTC 1/SC27, Chairman of SC27 [ Biography | Presentation ]
-
IETF: Kathleen Moriarty, IETF - Security Area Director [ Biography | Presentation ]
-
ETSI TC Cyber: Charles Brookson, Chairman of new ETSI TC CYBER Technical Committee [ Biography | Presentation ]
- Cloud & Developing Nations: Frederic Gittler, Cloud Security Alliance (CSA) [ Biography | Presentation ]
-
Issues with standards Damir Rajnovic, FIRST [ Biography |Presentation ]
-
Securing the Digital Frontier: The Need for Robust Cyber-Security Standards: Carol Cosgrove-Sacks, OASIS [
Biography | Presentation ]
-
Regional Asia Information Security Exchange (RAISE) Forum: Koji Nakao, KDDI and Co-Chairman, RAISE Forum [
Biography | Presentation ]
-
ITU-T Study Group 17 Security: Arkadiy Kremer, Chairman, ITU-T Study Group 17 [
Biography | Presentation ]
Open Roundtable - All speakers plus other organizations present (e.g., CCSA, TTA)
|
17:45 - 18:30 |
Closing Panel
Mohammed Elhaj, SG17 Vice-Chairman, Q1/17 Rapporteur, Sudan [
Biography | Presentation ]
Summary and Conclusions:
Final Discussions:
Closing Remarks:
|