SlideShare a Scribd company logo
1 of 9
Economic sustainable growth

Social development


Country competitiveness
Critical infrastructures reliance on ICT

Strategic industries
Both a requirement and an enabler
To be safe
And to build TRUST
Digital crime
Hacktivism
Cyberwarfare
Frauds
Piracy/counterfeits
Privacy issues
Awareness

Trainings

Legal framework

Partnerships
National
Strategies /    ICT              Projects and
Policy          Infrastructure   Solutions      Relationship




Social, Economic, Political and IT Alignment
http://syntropolis.net/media/news_pictures/gas-champion-
qatar-diversify-investments/lng.jpg
http://www.lgfcunewsworks.org/images/photos/large/using
atm2-lg.jpg
http://www.airplane-pictures.net/images/uploaded-
images/2011-2/20/122936.jpg
http://blog.ljmu.ac.uk/wp-content/uploads/2011/11/cyber-
security.jpg

More Related Content

What's hot

ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data ProtectionNICVA
 
Cybersecurity, a presidential mandate
Cybersecurity, a presidential mandateCybersecurity, a presidential mandate
Cybersecurity, a presidential mandateDImension Data
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityGareth Niblett
 
I4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric WachholzI4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric WachholzPaul van Heel
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsGareth Niblett
 
ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/9/21
ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/9/21ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/9/21
ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/9/21Mark Goldstein
 
ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/5/20
ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/5/20ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/5/20
ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/5/20Mark Goldstein
 
Current Situation IT Security Awareness and Education in Afghanistan
Current Situation IT Security Awareness and Education in AfghanistanCurrent Situation IT Security Awareness and Education in Afghanistan
Current Situation IT Security Awareness and Education in Afghanistanzohraz
 
Innovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart SecurityInnovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart SecurityJean-Luc David
 
Global challenges in the new information age
Global challenges in the new information ageGlobal challenges in the new information age
Global challenges in the new information ageNitish Rai
 
Consultation for inclusive infrastructure - Tarick GRACIDA, GIFT
Consultation for inclusive infrastructure - Tarick GRACIDA, GIFTConsultation for inclusive infrastructure - Tarick GRACIDA, GIFT
Consultation for inclusive infrastructure - Tarick GRACIDA, GIFTOECD Governance
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesArthit Suriyawongkul
 
Upcoming conferences on information technology
Upcoming conferences on information technologyUpcoming conferences on information technology
Upcoming conferences on information technologyConference Alerts
 

What's hot (18)

ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data Protection
 
Cybersecurity, a presidential mandate
Cybersecurity, a presidential mandateCybersecurity, a presidential mandate
Cybersecurity, a presidential mandate
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic Security
 
I4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric WachholzI4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric Wachholz
 
Information technology
Information technologyInformation technology
Information technology
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 Threats
 
Csa UK agm 2019 - Chris J Hodson - Visibility in the cloud
Csa UK agm 2019 - Chris J Hodson - Visibility in the cloudCsa UK agm 2019 - Chris J Hodson - Visibility in the cloud
Csa UK agm 2019 - Chris J Hodson - Visibility in the cloud
 
ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/9/21
ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/9/21ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/9/21
ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/9/21
 
ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/5/20
ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/5/20ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/5/20
ASU Law - Arizona Fintech Innovation & Regulation Presentation 11/5/20
 
Current Situation IT Security Awareness and Education in Afghanistan
Current Situation IT Security Awareness and Education in AfghanistanCurrent Situation IT Security Awareness and Education in Afghanistan
Current Situation IT Security Awareness and Education in Afghanistan
 
Secure I T 2011
Secure I T 2011Secure I T 2011
Secure I T 2011
 
Innovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart SecurityInnovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart Security
 
Global challenges in the new information age
Global challenges in the new information ageGlobal challenges in the new information age
Global challenges in the new information age
 
Consultation for inclusive infrastructure - Tarick GRACIDA, GIFT
Consultation for inclusive infrastructure - Tarick GRACIDA, GIFTConsultation for inclusive infrastructure - Tarick GRACIDA, GIFT
Consultation for inclusive infrastructure - Tarick GRACIDA, GIFT
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity Differences
 
Upcoming conferences on information technology
Upcoming conferences on information technologyUpcoming conferences on information technology
Upcoming conferences on information technology
 
Cyber Espionage: how to sell a country in 17 days!
Cyber Espionage: how to sell a country in 17 days!Cyber Espionage: how to sell a country in 17 days!
Cyber Espionage: how to sell a country in 17 days!
 

Viewers also liked

Berkman Center Broadband Study 13 Oct09
Berkman Center Broadband Study 13 Oct09Berkman Center Broadband Study 13 Oct09
Berkman Center Broadband Study 13 Oct09OneWebDay, Inc.
 
The Use of Arabic Script in the Internet Addressing System
The Use of Arabic Script in the Internet Addressing System The Use of Arabic Script in the Internet Addressing System
The Use of Arabic Script in the Internet Addressing System OneWebDay, Inc.
 
XLINK-A300N Mobile IP City Wi-Fi System AP rated 300Mbps
XLINK-A300N Mobile IP City Wi-Fi System AP rated 300MbpsXLINK-A300N Mobile IP City Wi-Fi System AP rated 300Mbps
XLINK-A300N Mobile IP City Wi-Fi System AP rated 300MbpsHotware International Inc.
 
Taghreedat Project - developing Online Arabic content
Taghreedat Project - developing Online Arabic contentTaghreedat Project - developing Online Arabic content
Taghreedat Project - developing Online Arabic contentOneWebDay, Inc.
 

Viewers also liked (7)

Berkman Center Broadband Study 13 Oct09
Berkman Center Broadband Study 13 Oct09Berkman Center Broadband Study 13 Oct09
Berkman Center Broadband Study 13 Oct09
 
The Use of Arabic Script in the Internet Addressing System
The Use of Arabic Script in the Internet Addressing System The Use of Arabic Script in the Internet Addressing System
The Use of Arabic Script in the Internet Addressing System
 
Hotware marine electrical_power
Hotware marine electrical_powerHotware marine electrical_power
Hotware marine electrical_power
 
XLINK-A300N Mobile IP City Wi-Fi System AP rated 300Mbps
XLINK-A300N Mobile IP City Wi-Fi System AP rated 300MbpsXLINK-A300N Mobile IP City Wi-Fi System AP rated 300Mbps
XLINK-A300N Mobile IP City Wi-Fi System AP rated 300Mbps
 
Taghreedat Project - developing Online Arabic content
Taghreedat Project - developing Online Arabic contentTaghreedat Project - developing Online Arabic content
Taghreedat Project - developing Online Arabic content
 
Hotware dc ac products small
Hotware dc ac products smallHotware dc ac products small
Hotware dc ac products small
 
Hotware dc ac_work-vehicle_electrical_power
Hotware dc ac_work-vehicle_electrical_powerHotware dc ac_work-vehicle_electrical_power
Hotware dc ac_work-vehicle_electrical_power
 

Similar to e-Trust and cyber security

CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Andrea Mennillo
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
HCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptxHCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptxJordanKinobe1
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical IndustryIJRTEMJOURNAL
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industryjournal ijrtem
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexShivamSharma909
 
Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...Arun Shankar
 
Open data for data sharing and transparency
Open data for data sharing and transparencyOpen data for data sharing and transparency
Open data for data sharing and transparencysnewell4
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital eraRicardo de Almeida
 
Security of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart CitiesSecurity of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart CitiesCharles Mok
 

Similar to e-Trust and cyber security (20)

CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Cyber Readiness Index 2.0
Cyber Readiness Index 2.0Cyber Readiness Index 2.0
Cyber Readiness Index 2.0
 
HCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptxHCSCA101 Basic Concepts of Information Security.pptx
HCSCA101 Basic Concepts of Information Security.pptx
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical Industry
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Caribbean Digital Economy:Opportunities and Challenges
Caribbean Digital Economy:Opportunities and ChallengesCaribbean Digital Economy:Opportunities and Challenges
Caribbean Digital Economy:Opportunities and Challenges
 
Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...
 
Open data for data sharing and transparency
Open data for data sharing and transparencyOpen data for data sharing and transparency
Open data for data sharing and transparency
 
The importance of cie in the digital era
The importance of cie in the digital eraThe importance of cie in the digital era
The importance of cie in the digital era
 
Security of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart CitiesSecurity of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart Cities
 

More from OneWebDay, Inc.

Fostering free speech in Qatar
Fostering free speech in QatarFostering free speech in Qatar
Fostering free speech in QatarOneWebDay, Inc.
 
Internet Governance Model & The Sustainability Debate
Internet Governance Model & The Sustainability Debate Internet Governance Model & The Sustainability Debate
Internet Governance Model & The Sustainability Debate OneWebDay, Inc.
 
Arab Internet Governance Forum MultiStakeholder Model
Arab Internet Governance Forum MultiStakeholder ModelArab Internet Governance Forum MultiStakeholder Model
Arab Internet Governance Forum MultiStakeholder ModelOneWebDay, Inc.
 
The Internet: Spurring innovation and economic growth
The Internet: Spurring innovation and economic growthThe Internet: Spurring innovation and economic growth
The Internet: Spurring innovation and economic growthOneWebDay, Inc.
 
The Arab Region in the New Internet World
The Arab Region in the New Internet World The Arab Region in the New Internet World
The Arab Region in the New Internet World OneWebDay, Inc.
 
ICANN Draft Strategic Plan 2010-2013
ICANN Draft Strategic Plan 2010-2013ICANN Draft Strategic Plan 2010-2013
ICANN Draft Strategic Plan 2010-2013OneWebDay, Inc.
 

More from OneWebDay, Inc. (6)

Fostering free speech in Qatar
Fostering free speech in QatarFostering free speech in Qatar
Fostering free speech in Qatar
 
Internet Governance Model & The Sustainability Debate
Internet Governance Model & The Sustainability Debate Internet Governance Model & The Sustainability Debate
Internet Governance Model & The Sustainability Debate
 
Arab Internet Governance Forum MultiStakeholder Model
Arab Internet Governance Forum MultiStakeholder ModelArab Internet Governance Forum MultiStakeholder Model
Arab Internet Governance Forum MultiStakeholder Model
 
The Internet: Spurring innovation and economic growth
The Internet: Spurring innovation and economic growthThe Internet: Spurring innovation and economic growth
The Internet: Spurring innovation and economic growth
 
The Arab Region in the New Internet World
The Arab Region in the New Internet World The Arab Region in the New Internet World
The Arab Region in the New Internet World
 
ICANN Draft Strategic Plan 2010-2013
ICANN Draft Strategic Plan 2010-2013ICANN Draft Strategic Plan 2010-2013
ICANN Draft Strategic Plan 2010-2013
 

Editor's Notes

  1. Image sources:http://syntropolis.net/media/news_pictures/gas-champion-qatar-diversify-investments/lng.jpg http://www.lgfcunewsworks.org/images/photos/large/usingatm2-lg.jpg
  2. piracy and counterfeits => bad securityexample of gov infected by OEM pre-installed pirated version of Windowscorrelation between piracy and malware attacksImage: http://blog.ljmu.ac.uk/wp-content/uploads/2011/11/cyber-security.jpg
  3. increase digital literacy (Security Intelligence Report shows infections rates, high in our region)cloud = way to get secure quickly
  4. Having a holistic approach: National Cyber Security Agenda