Professional Documents
Culture Documents
Azerbaijan
| Laman Huseynzade
THE REPUBLIC OF
AZERBAIJAN
Established:
On the 26th september of 2012 the decree was signed by President of th
e Republic of Azerbaijan
Mission:
➢Coordination of information security authorities
➢Awareness and education of people and private sector
➢Incident handling
➢Prevention of cyber attacks
➢Eliminate results of cyber attacks
➢Monitoring internet traffic of country
➢Analyzing cyber threats
➢Providing services in the field of information security and
personal data protection
CYBERSECURITY STRATEGY
PROJECT CONTENT
1. INTRODUCTION
2. DEFINITIONS
3. AIMS AND PRINCIPLES
4. THREATS AGAINST NATIONAL CYBERSPACE
5. MAIN ACTIVITIES
5.1. Improving legal and organizational fundamentals of cyber security
5.2. Increasing cyber security of critical infrastructures
5.3. Fight against cybercrime
5.4. Conducting scientific researches and staff training
5.5. Increasing the culture of information security
5.6. Cooperation on cyber security
PROJECT SCHEDULE
1. ESTABLISHING OF WORKING GROUP (representatives from different
ministries) – APRIL 2018
1. PREPERATION OF DRAFT VERSION OF STRATEGY –MAY-AUGUST 2018
2. CONCORDANCE WITH GOVERNMENT ORGANIZATIONS – SEPTEMBER 2018
3. ASSES PROPOSALS OF GOVERNMENT ORGANIZATIONS – OCTOBER 2018
4. APPROVAL OF THE STRATEGY BY PRESIDENT – EXPECTED NOVEMBER 2018
5. PREPARING ACTION PLAN REGARDING TO THE STRATEGY – 3 MONTHS AFTER
APPROVAL
REQUIREMENTS
1. Identifying critical infrastructure
2. Improving legal acts based on international experience
3. Increasing staff training
4. Cooperation with different countries and international organizations in the field of
cyber security
GOALS AND CHALLENGES IN THE FIELD OF
INFORMATION SECURITY
1. APPROVING OF CYBERSECURITY STRATEGY
2. APPROVING OF ACTION PLAN REGARDING TO THE CYBER
SECURITY STRATEGY
3. IMPROVING LEGAL ACTS IN THE FIELD OF INFORMATION
SECURITY, AS WELL AS DATA PROTECTION
4. STRENGTHENING THE FIGHT AGAINST CYBERCRIME
5. PREPARATION OF HIGHLY QUALIFIED SPECIALISTS IN THE FIELD
OF INFORMATION SECURITY
6. STRENGTHENING CYBER SECURITY OF CRITICAL INFORMATION
INFRASTRUCTURES
COOPERATION BETWEEN AZERBAIJAN AND
KOREA
✓ System of the Electronic Government Training Center has been implemented b
y the grant of the government of the Republic of Korea.
✓ Experts regularly participate trainings and courses held by KISA and KOICA.
✓ We have presented some projects to KOICA in the field of information security.
✓ Our expert studied master education sponsored by KOICA.
✓ CYBER SECURITY SERVICE is a member of CAMP (The Cyber security Alliance fo
r Mutual Progress ) since 2016.
[ National Information Security Policy Course ]
Cambodia
| Ratha Nuth
Cambodia ICT and Cybersecurity
Mr. Nuth Ratha,
ICT Security Department
General ICT Department
Ministry of Posts and Telecommunications, Cambodia
Temple
12
1. About Cambodia
Phnom Penh
Capital City
13
1. About Cambodia
15
2. Cambodia’s Telecom in Brief
16
2. Cambodia’s Telecom in Brief
Fiber Optic Cable Infrastructure
17
2. Domain Registration
.com.kh
77.88%
18
3. About MPTC
19
3. Capacity
Capacity Development
Development onCambodia
on Cybersecurity in Cybersecurity
in Cambodia
OBJECTIVE
OUTPUT
OUTPUT
OUTPUT 2
• IDS/IPS
• WAF
• Network Analyzing Tool
• Vulnerability assessment tool (for Web Application)
• SIEM (Security Information and Event Management) tool
IMPLEMENTATION SCHEDULE
Challenges
Issue
• GAIS Project
• PAIS Project
• Cambodia ICT Masterplan 2020
• Consultation on Information Security Policy in Cambodia
• Feasibility Study on Digital Signature in Cambodia
Thank You
26
[ National Information Security Technical Course ]
Colombia
| Arnol Garavito
COLOMBIA
Boyacá Department
Government
ICT Direction
ARNOL FILYP GARAVITO OCHOA
1ST General Introduction of the Country
2nd ICT Status of the Country
Deficit of IT professionals
58.000 New Students
2014 IT Careers to 2018
93.431
2018
35.504
100%
EMPLOYMENT
Redeemable
ICT INDUSTRY Credits
Promotional
campaigns in IT
Careers
Health Secretary
Secretary of Agricultural
Development
Carlos Andres Amaya
Planning secretary
Governor
Secretary of Education
1500 employees in Boyacá
Productivity Secretary
and ITC
5th Self Introduction (About Me)
I'm Arnol Filyp Garavito Ochoa, I'm husband and father of two magi
cal princesses, I'm a Electronic Engineer
and course master in management TIC, I'm currently
working in the Governorate of Boyacá, implementing different tech
nologies and promoting projects.
I consider myself a
very calm person, dreame, shy and responsible but
very cheerful. I like to work in the ICT area because
from there we can improve the quality of services to citizens and cr
eate developments for or nation.
Costa Rica
| Elder Briceno
Cibersecurity in Costa Rica
Elder Briceño Mendoza
Cybersecurity Analyst
Cybersecurity Incident Response Team
Ministry of Science, Technology and Telecommunications
29/11/2018
Cibersecurity policy and government
coordination in Costa Rica
• Cybersecurity Incident Response Team (CSIRT-CR)
– Created by decree in 2012, established in 2017.
– Government CSIRT and internal department in MICITT.
– SPOC for internal/external cybersecurity stakeholders.
• Strategical roadmap:
– Awareness raising
– Completing the legal framework
– Training current/potential CSIRT-CR employees
– Partnering with internal/external stakeholders
– National Cybersecurity Strategy implementation
Specific Initiative
Djibouti
| Liban Houssein Ali
DJIBOUTI
DSSI
LIBAN HOUSSEIN
29/10 – 02/11
Information Security Technical Course
Republic Of DJIBOUTI
Djibouti is a country located in the horn of
Africa
▪ Capital: Djibouti
▪ Religion Muslim
▪ Population: Almost a Million
▪ Area: 23 200 km
▪ Language: French and Arabic
▪ Presence of Military Bases: USA, France, Japan, China
Who is ANSIE
ANSIE (National Agency of Information Systems) was created in 2016 and
is attached to the Presidency of the Republic
- For Administration:
❖ Modernization of the functioning of the administrations through the use of the new
Information and Communication Technologies (ICT)
❖ Allow a faster exchange of information between the administration and citizens
❖ Increased transparency on the part of the administration and a reduction in the
running costs of the administration
❖ Apply a vast program of dematerialization
- For Citizen:
❖ Make the administration more accessible to the citizen and facilitate his efforts
❖ Develops powerful and safe tools, to simplify the lives of Djibouti citizens, whether
health, civil status or taxation
Who is ANSIE
- For Enterprise:
❖ Supports companies in their administrative procedures by providing them with tools
to facilitate their exchanges and the transmission of documents with the
administration
- E-ID
➢ ANSIE want to provide an Electronic Card or ID
for each citizen (On-going)
ICT GOALS AND
CHALLENGES
THANKS
[ National Information Security Technical Course ]
Ecuador
| David Mayorga
ECUADOR
Banking sector:
• Defacement
• Spear phishing
• Malware
• DDoS
Nation's tax collection agency
Mission:
Manage the tax policy, within the framework of
the constitutional principles, ensuring the
collection sufficiency destined to the promotion of
the social cohesion.
GENERAL DIRECTOR
USD 320.000,00
Challenges
• Internal fraud
• Budget restrictions
• Human resources restrictions
Cooperation
Egypt
| Ahmed Mashaly
Egypt
Eg-CERT
Cyber Security Awareness
Ahmed Mashaly
22-10-2018
National Security Policy/ 5days
ICT STATUS OF THE COUNTRY
Project name :
National cyber security
awareness campaign.
ICT PROJECTS
PROJECT CONTENTS :
1- Planning.
2- Developing content and setting measurements.
3- Delivering the content.
4- Measuring the progress and improving the
material and delivery methods.
Estimated to start mid 2019.
ICT GOALS AND CHALLENGES
El Salvador
| Guillermo Funes
El Salvador
MINISTRY OF JUSTICE AND
PUBLIC SECURITY
IT
GUILLERMO FUNES
29TH OCT 2018
2018 ICT EXPERT TRAINING PROGRAM
29TH OCT - 2ND NOV 2018
EL SALVADOR:
Area: 21,000 square kms (Smallest country in
Central America
Pupulation: 7,000,000
Mobile Phones: 9,000,000
Goverment’s CSIRT
Goverment Scope (Executive Branch Only)
Members:
• Ministry of Justice and Public Security
• National Police
• President’s Office
• Ministry of Education
• Deputy Ministry of Technology
• National Security Council (Leaded by the Minister of Justice and
Public Security)
Development of a National Cybersecurity
Strategy
Development of a Methodology of Cyberdefense
for Organizations(Public and Private)
Development of a System for Early Awareness,
including Monitoring Devices
Changing the law for include Cybersecurity and
Cyberdefense, Critical Infrastructures
Promove the Cybersecurity in the National
priority list
Protect the technology used againts crime :
• Telephone intervention
• Bracelets for law offenders
• System of jammers for cellphone signal around th
e correctional facilities
• Video surveillance System
• 400 Kilometers of fiber optic
Honduras
| Jose Angel Pineda Ortiz
Honduras
Oct 29th
Security Technical Expert Course / Oct 29th ~ Nov 2nd
ICT Projects & Status
ICT Projects and Status
Honduras
• E-Government
• Cybersecurity
• Free Wi-Fi Zones in public spot
• Broadband
ICT Status - Honduras
• Statistics
National Emergency System 911
Mission:
Serve and coordinate immediately the emergency calls
make it to the 911 for any citizen or foreigner inside
the national territory.
Objectives:
Save and protect life, goods and everyone in Honduras
through the qualified personnel of the National
Emergency System 911(nine, one, one) with the
highest standard of operativity.
National Emergency System 911
National Emergency System 911
National Emergency System 911
Ongoing ICT Projects
Ongoing ICT Projects
• Speech Recognition
• Cyber security
Indonesia
| Henry Tampubolon
Indonesia
Henry Tampubolon
Directorate of Standardization
DG SDPPI
MCIT
Information Security Policy Course
A GLANCE OF ICT POLICY IN INDONESIA
Thank you
[ National Information Security Policy Course ]
Jordan
| Tareq Almajali
Information Security Policy
Jordan
Ministry of information
communication technology
security division
Tareq Ziad Al majali
16-10-2018
Information Security Policy
29-oct-2018 – 02-nov-2018
ICT and IT Enabled Services
(ITES)
Jordan’s ICT and IT Enabled Services (ITES) sector has come a long way in the past years and
has achieved a great deal of accomplishments in which we can all take great pride.
Today, the ICT ecosystem in Jordan is considered one of the most developed and robust in the region.
With the rise of internet penetration and the invasion of new technologies, ICT and ITES are
listed amongst the government’s highest priorities, and are expected to continue to contribute
to the Jordanian economy.
• Total population in Jordan around 9.80 million, internet users are around 8.70 million which means 89%
of total population.
• Also mobile connections are 11.34 million that means 116% of population in Jordan.
• Jordan has ranked in eighth place amongst the top 12 countries to fall victim to frequent cyber attacks in
the Arab world.
• The list was compiled by Kaspersky Lab, a multinational cyber security and anti-virus provider
headquartered in Moscow, Russia.
• According to statistics released by the Public Security Directorate (PSD), the number of cybercrimes
committed in Jordan since the beginning of 2018 has reached 1158 crimes.
Ministry of Information and Communications
Technology
Established in April 2002, the Ministry of Information and
Communications Technology [MoICT] is the government entity
responsible for articulating policy in the areas of Information
Technology, Telecommunications, and Post in the Hashemite Kingdom
of Jordan.
The sectors within Information Technology (IT) and Telecommunications are identified as particular drivers and enablers
of economic and social growth.
MoICT has overall responsibility for the achievement of National goals and objectives within ICT, and has various
means and relationships at its disposal through which to achieve them.
MoICT accordingly has broad powers of oversight and Action within the sectors that comprise ICT.
In addition to developing, incubating, and supporting ICT initiatives at a national level, the Ministry’s mandate includes s
timulating local and foreign technology investments as well as promoting awareness and adoption of ICT by all segments
by all segments of the population, in an all-inclusive approach.
The Ministry, through a dynamic public-private partnership process, works to create, promote, and drive new ICT
opportunities in Jordan, which will facilitate the positioning of the Kingdom as a regional player in technology adoption
and development, a key step to creating a knowledge-based economy.
National Information Assurance
and Cyber Security Strategy
National CyberSecurity Strategy (NCS) covering the period to 2023 provides a summary of the progress made against
the delivery of the objectives set out in 2012 and considers how current trends in cyber threats indicate a more robust national
approach to the governance of cyber security is required.
The use of Cyberspace is transforming business, making it more efficient and effective. It is opening up markets, allowing
commerce to take place at lower cost and enabling people to do business on the move. It has promoted fresh thinking,
innovative business models and new sources of growth and business opportunity for established enterprise and
emerging entrepreneurs alike. It enables companies to provide a better, cheaper and more convenient shopping experience
to customers. It also helps individuals to shop around, compare prices and find what they want.
These actors are not only working relentlessly to compromise digital assets, they are also looking for new and simple ways
of damaging its integrity and disrupting its availability.
Secure cyber space is essential for Jordanian entities to prosper, to grow and to demonstrate to external
organizations that Jordan is a safe place in which they can conduct business. For national security and prosperity, it is
incumbent upon us all to play our part; this includes both the public and private sector organizations and staff, as well as our
citizens. To address the challenges of cyber security head on, and seize the opportunities that cyber space offers,
requires leadership and governance of cyber at the highest levels.
NIACSS goals
•Strengthen Jordan’s National Security by Preventing Cyber Attacks to
Critical Information Infrastructures.
•Minimize Risks to Critical Information Infrastructures and Government
Networks by Reducing Vulnerabilities.
• Minimize Damage and Recovery Time from Cyber Attacks regardless of
source or intent.
• Enhance Jordan’s Economy and improve National Prosperity by
Increasing Confidence and Trust in Government, and by extension,
Private Information Systems Security, thereby encouraging investment
and creating opportunities for enhanced collaborative processes.
• Increase Information Security Awareness and its importance to National
Security through a National Information Security Awareness and Training
Program
KOICA in Jordan
KOICA implements projects related to "e-government" to promote the administrative efficiency and
transparency of developing partner governments.
Since narrowing the digital divide in a knowledge-based society expedites poverty alleviation and
promotes sustainable economic development, KOICA has made continuous efforts to reduce the digital
divide and facilitate economic development.
KOICA's ICT cooperation focuses on fostering ICT human resources by strengthening ICTeducation
infrastructure, and enhancing ICT education capacity implementinge-government initiatives such as
drawing up ICT master plans, and building infrastructure and systems, and expanding ICT usage by
launching internet phone networks, remote medical treatment, computerized libraries, Through these
assistance programs, KOICA is striving to achieve Target 18 of MDG 8, which aims to create global
partnerships for
development and make the benefits of new technologies available to the developing world.
[ National Information Security Policy Course ]
Kosovo
| Rifat Hyseni
Kosovo
Tax Administration of Kosovo
IT Department
RIFAT HYSENI
29 October 2019
Information Security Policy Course/ PERIOD
ICT STATUS OF THE COUNTRY
(cybersecurity National Strategy)
ICT FIGURES BASED ON EACH COURSE.
- The Internet penetration based on users is at least 76.62% or
1,080,038 Internet users (based on Census 2011 total
population).
- subscription rates)
- No Information of umber of cyber attacks given monthly..
EXPLAIN ABOUT YOUR ORGANIZATION
Executive State Agency,
Administrating the revenue at National Level.
• Education,
• Audit,
• Collection,
Information Technology, Automation, Services etc.
DESCRIBE ICT PROJECTS IN YOUR
ORGANIZATION/COUNTRY (RELATED TO THE
TRAINING COURSE, EITHER ONGOING OR TO-BE)
Moldova
| Artur Munteanu
UNCLASSIFIED
Security and Intelligence Service of the Republic of Moldova
Republic of Moldova
120
UNCLASSIFIED
Security and Intelligence Service of the Republic of Moldova
ICT is one of the most dynamic sectors in the Moldovan Economy and
represents one of the priority areas for development for the Moldovan
Government
ICT Infrastructure:
• Fixed Communication;
• Mobile Connection;
• International Communication.
121
UNCLASSIFIED
Security and Intelligence Service of the Republic of Moldova
Regarding general ICT development, Moldova has fulfilled 58% of the ICT
development index (2016).
124
UNCLASSIFIED
Security and Intelligence Service of the Republic of Moldova
126
[ National Information Security Technical Course ]
Mongolia
| Dashbalbar Sukhbaatar
COUNTRY PROFILE
MONGOLIA
Communications Regulatory Commission of
Mongolia
Dashbalbar. S
2018-10-29
➢ COUNTRY PROFILE
➢ ICT SECTOR ORGANIZATIONAL STRUCTURE AND
WORLD RANK OF MONGOLIA
➢ STATISTICS OF ICT SECTOR OF MONGOLIA
➢ LEGAL ENVIRONMENT AND ESTABLISHMENT OF
CRC
➢ MISSION AND MAIN RESPONSIBILITIES OF CRC
COUNTRY PROFILE
COUNTRY PROFILE
ICT SECTOR STRUCTURE
President Parliament
Prime Minister
Communications
Communication and Information Cabinet members of
Regulatory Commission
Technology Authority (CITA)
(CRC) the Government
IT Park 16 Ministries
3,886.2
4,000.0
3,409.4
3,500.0
3,027.2 3,068.2
2,811.5 2,877.6
3,000.0
2,373.0
2,500.0
2,023.0
2,000.0 1,743.5
1,500.0
1,000.0
500.0
0.0
2009 2010 2011 2012 2013 2014 2015 2016 2017
3,886.2
4,000.0
3,409.4
3,500.0
3,027.2 3,068.2
2,811.5 2,877.6
3,000.0
2,373.0
2,500.0
2,023.0
2,000.0 1,743.5
1,500.0
1,000.0
500.0
0.0
2009 2010 2011 2012 2013 2014 2015 2016 2017
71.90%
21.71%
2017 year: 26,354[TB]
Source:
10
CRC of Mongolia (2017.12.31)
ICT SECTOR:
KEY INDICATORS AND STATISTICS
4.NUMBER OF CABLE TELEVISION SUBSCRIBERS (thousands subscribers 2017.12.31)
900
855.9
800
796.6
700
725.8
669.9
600
Type 2017 year
500
523.8
Cable 5.70%
482.6
400
Satellite 44.68%
300
DTV 21.37%
294.5
200
210.8 IPTV 28.25%
100
Total 100.00%
0
2010 2011 2012 2013 2014 2015 2016 2017
0
2010 2011 2012 2013 2014 2015 2016 2017
Legal Framework:
Montenegro
| Goran Tomkovic
Cybersecurity in Montenegro
Goran Tomković
CIRT-ME
Homes: Businesses:
Year Incidents
2013 22 Incidents:
2014 42
• Malware,
2015 132 • Web Defacement
2016 - May 163 • DDoS
2017 532 • Internet Fraud
• Inappropriate content on the Internet
2018 (1 oct) 364
Total 1255
Cybersecurity Status in Montenegro
CIRT Services
•Incident Handling, Response
and Coordination
•Security Advisories
•Public-Private Partnership
•World Bank
•CAMP Membership
[ National Information Security Policy Course ]
Peru
| Adriana Alejandra Narvaez Palacios
FONAFE
Fondo Nacional de Financiamiento de la Actividad Empresarial del Estado
National Fund for the Financing of the State's Business Activity
Lima - Perú
Adriana Alejandra Narváez Palacios
Octubre 2018
Information Security Policy Course/
29 Oct – 2 Nov
Timeline
Profesional experience
Risk Management Trainning KISA
2018
Practicante de
Manufactura 2016 - 2018
2011 Especialista de Riesgos
Analista de Riesgos
Practicante de y procesos
2017 2018
Riesgos Information Security
Magister en Policy Course
2010 - 2011 2012 - 2014 Administración
de Empresas
PERÚ
CULTURE: NAZCA
LINES (ICA, PERÚ)
MISSION
"We are the corporation of
State companies that
provides quality goods and
services and generates value
economic, social and
environmental for the
development of the country“
32 companies
Relationship between Risk Management and other frameworks
It allows management to
have an efficient strategy
Promotes the to ensure compliance
establishment of
adequate controls that
Corporate with the Company's
objectives.
mitigate the effects of Governance
an unwanted
interruption or disaster
Business
ISO 9001
Continuity
Provides an approach
on which to base
Allows the them. processes to
strengthening of
Risk Management guarantee the
Information quality of products
Security and / or services
Internal
ISO 27001
Control
Provides the guidelines
It focuses on the for the development of
development of controls that the Risk Assessment
ISO 37001 component
serve for the development of
Anti-Bribery Management
4TH ICT PROJECTS
Project 1: Improvement of Business Management
Intranet FONAFE
• Centralize as the only point of attention to the citizen through voice solutions, mail, social
networks, SMS and interactive chat.
5TH ICT GOALS OF PERU
In Peru there is a digital government
secretary in charge of the Presidency
of the Council of Ministers, in
addition there is a working group for
the implementation of the digital
national agenda with a view to the
year 2021, in that year Peru
celebrates its 200th anniversary as
the foundation of the country.
6th COOPERATION COUNTRY
AND KOREA
The "VI International Conference of the Public Company
Network: Transparency and Integrity as Pillars of Good
Management", This is an event that takes place every year, is
organized by the Inter-American Development Bank (IDB), in
cooperation with the Government of Republic of Korea of the
South, and the development of Good Practices in the
countries of Latin America and the Caribbean
Tunisia
| Nada Laabidi
ARAB INFORMATION AND COMMUNICATION
TECHNOLOGIES ORGANIZATION
3 5 6 3
ICT Development Index (IDI) 2017 (ICT access – ICT use – ICT Skills)
International Telecommunication Union
1. ICT status in the Arab region
(some indicators)
• Highest- and lowest-ranking Arab Countries, IDI 2017
1. ICT status in the Arab region
(some indicators)
• Proportion of households with internet access, 2017 : 47,2 %
47.7
50
39.4
40
43.7
30
20
64.2
10
0
Male Female
Male Female
Total Population Ages 15-24
Source : ITU
2. Cybersecurity status in the
Arab region
2. Cybersecurity status in the
Arab region
• UAE : Country faced 86 cyber attacks in the first two months of 2018
• Kuwait : In February there was an attempt by cyber criminals to hack
the website of Kuwait's Ministry of the Interior
• Saudi Arabia : December 2017 Saudi Aramco's (Saudi Arabia's state-
owned oil company) safety system was attacked by malicious software
• Tunisia : March 2018, DDoS attack against the OVH servers hosted in
the Tunisian Internet Agency (IXP).
• In May 2017 all Golf countries were subject to Wannacry ransomware
2. Cybersecurity status in the
Arab region
Arab States scorecard (green for high, yellow for medium, and red for low).
s upon the basis of the 25 indicators (GCI – 2017)
2. Cybersecurity status in the
Arab region
2.1 : Cybersecurity readiness of Arab states
R.R Country Score G. Rank R.R Country Score G. Rank
Medium
Low
8 Comoros – Iraq – Kuwait – Lebanon – Libya – Mauritania – Somalia - Yemen
CyberSecurity legislation
in the Arab region
Low
7 Comoros – Djibouti –Iraq- Lebanon – Libya – Somalia - Yemen
CyberSecurity Training
in the Arab region
High
10Algeria – Bahrain – Egypt – Morocco – Oman – Qatar - Saudi Ar
abia - Syria – Tunisia - United Arab Emirates
Medium
Low
12 Comoros – Djibouti – Iraq – Jordan – Kuwait – Lebanon – Libya – Mauritania –
Somalia – Palestine – Sudan - Yemen
CyberSecurity - LEGAL MESURES
in the Arab region
Cybercriminal legislation - CyberSecurity legislation - CyberSecurity Training
Low
10 Comoros – Djibouti – Iraq –Jordan –Kuwait –Lebanon –Libya – Mauritania – So
malia -Yemen
CyberSecurity – TECHNICAL MESURES
in the Arab region
National CERT/CIRT/CSIRT - Government CERT/CIRT/CSIRT - Sectorial CERT/CIRT/CSIRT - Stan
dards for organizations - Standards for professionals - Child online protection
Qatar
Low
11 Algeria – Comoros – Djibouti – Iraq – Jordan – Kuwait – Lebanon - Libya – Mau
ritania – Somalia - Yemen
CyberSecurity – ORGANIZATIONAL MESURES
in the Arab region
Strategy – Responsible Agency – Cybersecurity metrics
2 Oman – Qatar
High
10 Algeria – Bahrain – Egypt – Jordan – Lebanon – Libya – Mauritania – Morocco – Tu
nisia - United Arab Emirates
Medium
Low
10 Comoros – Djibouti – Iraq – Kuwait - Saudi Arabia – Somalia – Palestine – Suda
n – Syria - Yemen
CyberSecurity – CAPACITY BUILDING
in the Arab region
Standardization bodies – Cybercesurity good practices – R&D programmes – Public awarness
campaigns – Professional programmes – incentive mechanisms – Home-Grown industry
Low
12 Bahrain – Comoros – Djibouti – Iraq – Kuwait –Lebanon – Mauritania – Somalia
– Palestine – Sudan – Syria - Yemen
CyberSecurity – COOPERATION
in the Arab region
Bilateral agreements – Multilateral agreements – International participation – Public Private Partners
hips – Interagency partnerships
Low
11 Comoros – Iraq – Jordan – Kuwait – Libya – Mauritania – Somalia – Palestine –
Sudan – Syria - Yemen
GCI in the Arab Region
Legal Measures – Technical Measures – Organizational Measures –
Capacity Building – Cooperation
Low
13 Comoros – Djibouti – Iraq – Jordan – Kuwait – Lebanon – Libya – Mauritania –
Somalia – Palestine – Sudan – Syria - Yemen
2. Cybersecurity status in the
Arab region
2.1 : Cybersecurity readiness of Arab region
Top three ranked Arab countries and an average score GCI-2017
12 countries
Cybercrime’s Law
2. Cybersecurity status in the
Arab region
2.3 : Cybercrime Legal Frameworks & Measures in the Arab countries
Country Legislation en Description
acted
Morocco 2003 law to fight terrorism in 2003. It resorted to this law to thwart some web sites that used by te
rrorists to launch their attacks.
Tunisia 2003 The Tunisian legislator took a measure to resist the phenomenon of terrorism by issuing a law to fight
terrorism on December 10th, 2003. The first chapter of this law referred to the fight and rejection of t
errorism. The second chapter referred to the definition of terrorism, crimes of money laundering, fun
ding of terrorism. The third chapter dealt with the sanctions to be inflicted with a view to preventing
such crimes
Saudi Arabia March 2007 Royal decree in 2007
Anti-Cyber Crime Law, Royal Decree No. M/17, 26 March 2007
Sudan 2007 Cybercrime Act, 2007
Algeria 2008 In 2008, the Algerian government tabled a new draft before the national parliament to fight agains
t cyber crimes. By virtue of this draft, the government will be entitled to punish all criminals who wou
ld break into or destroy web sites and computers, steal protected data and numbers of credit card
s, establish or visit pro-terrorist sites. In the same vein, Algeria issued a law, in 2005, to fight terrorism,
money laundering and terrorism funding.
Oman February 2011 Royal Decree No 12/2011 issuing the Cyber Crime Law
Source : Research Paper - Joyce Hakmeh - Cybercrime Legislation in the GCC Countries - Fit for Purpose?
- Database of Legislation of the UNODC
2. Cybersecurity status in the
Arab region
2.3 : Cybercrime Legal Frameworks & Measures in the Arab countries
UAE August 2012 Federal Decree Law no. 5 (2012) On Combating Cybercrimes
Bahrain September 2014 Law No. (60) of 2014 on Information Technology Crimes
Qatar September 2014 Law No. (14) of 2014 Promulgating the Cybercrime Prevention Law
Kuwait July 2015 Law No. (63) for the year 2015 on Combating Information Technology Crimes
Cybercrime Law that contains 18 articles dealing with the complete spectrum of c
Jordan ybercrime, including everything from minor offences such as unauthorised access
to computer material to more serious crimes like identity theft and credit card frau
d
Egypt 2018 Law No.175/2018 « Anti-Cybercrime law »
Source : Research Paper - Joyce Hakmeh - Cybercrime Legislation in the GCC Countries - Fit for Purpose?
- Database of Legislation of the UNODC
2. Cybersecurity status in the
Arab region
About AICTO
Members
Our mission
AICTO’s Vision
E-Trust
Technical Assistance
E-trust
Program 1 :
E-Trust : AAECA-Net
Working Group :
Program 2. CS Technical Program 3. CS Capacity Program 4. CS Studies &
assistance & consultancy Building & Awareness Reports Cybersecurity & Data
Privacy
ARAB INFORMATION AND COMMUNICATION TECHNOLOGIES
ORGANIZATION
Program 1 : E-Trust
Towards building an
interregional - PKI’s (Public and - Awareness activities - Common Training
Multistakeholders private) actions
- Technical assistance
e-Trust Network - Governmental
- Trainings and - Common
based on Laws bodies (Ministries,
Vision & Main principles :
Membership
Activities
Activities
- Law-enforcement
Program 4 :
CyberSecurity Studies & Reports
Conducting regional studies - Surveys - Common Studies
and surveys to collect
- Studies - Common reports &
updated data on the status of
the CS in the Arab region Roadmaps
- Working group :
(some studies includes also Cybersecurity & Data Privacy - Common database on
the African region) :
Main principles and Focus :
Cybersecurity indicators in
Activities
Status in quo
Ukraine
| Anastasiia Bondarchuk
SECURITY SERVICE OF UKRAINE
Anastasiia Bondarchuk
DATE
Security Technical Expert Course/ 10.29 – 11.02
SECURITY SERVICE OF UKRAINE
Targets of attacks
Transportation
Mass-media
Logistics and
telecommunication Trading networks
Government
institutions
SECURITY SERVICE OF UKRAINE
Guatemala
| Carlos David Figueroa Guevara
COUNTRY
Government Democratic
Political Division
and Administrative 22 States
Population by Sex 48.7% Male
51.3% Female
• Technology: World class services, including QOS, MPLS (implemented for 5 years),
TrafficShaping, failover / failback and disaster recovery.
• In 2017 Guatemala was the fourth country in Latin America most prone to cyber attacks
Objective
To direct and orient the labour and social policy of the country.
Sri Lanka
| Kanishka Karunasena
SRI LANKA
Dr Kanishka Karunasena
29-10-2018
Phishing 08 08 12 14 23 26
Abuse/Privacy Vio 08 08 08 21 32 21
lation
Scams 06 18 12 18 12 16
160 141
Malicious Softwar 02 02 03 12 21 30
e/ Ransomware 140 118 143
3500 3537
3537 Social Media Related Incidents Reported
3000 2850
2500
1947 fake social media 2250 2200
accounts 400 photo 2000
785 hacking social media abuse
accounts 1500 1425
1200
1000 1100
47 17
threatening pornographic 500
53 involving videos Other 281
misuse of 80
phone 7 copyright 0
numbers violations 2010 2011 2012 2013 2014 2015 2016 2017
SRI LANKA CERT
Vision
• To be Sri Lanka’s flagship organization and trusted source of advice on th
reats and vulnerabilities to Information Systems through proactive preve
ntion and effective action.
Mission
To be the single and the most trusted point of contact for Information Security in
Sri Lanka
• Sri Lanka (CERT) is the single trusted source of advice about the latest thr
eats and vulnerabilities affecting computer systems and networks, and a
source of expertise to assist the nation and member organizations, in resp
onding to and recovering from Cyber attacks.
• It was set up in June 2006, now functioning under the Ministry of Teleco
mmunication and Digital Infrastructure.
Establishment of Governance Framework
Establishment of a governance framework to implement
Projects
national information and cyber security strategy.
Uzbekistan
| Farrukh Abduvakhidov
Republic of Uzbekistan «Electronic Government»
system development Center
Information Technology
Development Department
FARRUKH ABDUVAKHIDOV
http://uzbekistan.travel
http://e-government.uz/uz
UZBEKISTAN PROFILE 2
Capital: Tashkent
9
2015-2019
ICT Infrastructure
Development Program POPULATION BUSINESS
(9 projects)
28
2013-2020 State services Portal Government Bodies
E-Government
Development Program
(28 projects)
Database of Database of
7 Public Health Entities Individuals
TAX 1
8 Education Procurement 2
Data Center
“Electronic Government” system development center under the Ministry for development of
information technologies and communications of the Republic of Uzbekistan on the basis of the
government decision (RCM No. 250 dated September 16, 2013), whose main tasks are:
▪ Developing strategic directions for further development and improvement of "Electronic government" system on the
basis of the analysis and research of global trends and the experience of foreign countries;
▪ Providing a single technological approach on formation of Electronic government system, which provides a consistent
mechanism design, development and integration of information systems, information resources and databases used in gover
nment organization, the organization of normative-methodical support of projects of "Electronic government";
▪ Arranging of a systemic reorganization of functional and operational processes of government authorities’ activity,
preparation of proposals on optimization, improvement and implementation of innovative mechanisms for managing busines
s processes associated with the provision of public services;
▪ Conducting target analysis and preparation of proposals on improvement of the existing legal framework for the effective im
plementation of the "Electronic government" system;
▪ Conducting systematic monitoring and evaluation of the implementation and development of information and
communication technologies, including the study on the effectiveness of implementation of information systems and resourc
es, conducting system of rating on the implementation effectiveness of information and communication technologies in the a
ctivities of state bodies within "e-Government" system.
▪ Developing a method for determining the key performance indicators of the effectiveness of the provision and use of
online government services, the target indicators and implementation indicators of projects within the “Electronic government
” system.
http://e-government.uz/en/menu/umumiy-malumotlar
Major e-Government
projects in detail
THE UNIFIED PORTAL OF INTERACTIVE PUBLIC SERVICES
my2.gov.uz
The Unified Portal of Interactive Public Services is established in 2013,
currently provides around 300 types of modern and popular public services, including electronic b
usiness registration. The new version (my2.gov.uz) was launched in May, 2017
Discuss the regulatory and legal
documents’ drafts openly
Is being discussed - 33
Discussed - 1060
To be revised - 16
1306 Doc.s
Accepted - 64
UZBEKISTAN OPEN DATA
data.gov.uz
• Launched in 2015
• 3735 datasets on 18 topics
• 129 data agencies
• 3035k downloads
• API for apps
UNIFIED IDENTIFICATION SYSTEM ID.GOV.UZ
Launched in October, 2016
Advantages:
1. One account - all
e-government systems
2. Individuals and legal entities
identification
3. User data privacy
List of connected resources
Single window
centers
41 from 62
Licensed
types of activities
128 363
entries in the register o
f licenses and permits