SlideShare a Scribd company logo
Organisational Capacity Building Philip Victor Director, Training, Skills Development & Outreach International Multilateral Partnership Against Cyber Threats 18 June 2010
Issues and Challenges Cyber attacks continue to escalate in frequency and variations Lack of cyber laws & harmonisation in nations have made these nations as launching pad for cyber attacks Lack of cyber security professionals  2
Issues and Challenges 3
Addressing the Challenges Nations need to build it’s capacity and capability to enhance its state of readiness to counter cyber threats and attacks  4
Role of IMPACT
IMPACT The world’s foremost cybersecurity alliance. IMPACT brings together governments of the world, industry and the academia to operationalise cybersecurity initiatives across ITU’s 191 member states. 6
Global Cybersecurity Agenda (GCA)  Capacity Building Capacity building needs to be promoted in order to develop a sustainable and proactive culture of cybersecurity Legal Measures Technical & Procedural Measures GCA Organisational Structures International Cooperation 7
Centre for Training & Skills Development ,[object Object]
Specialised seminars & workshops
Trainings via ITU’s Centre of Excellence (CoE)
Scholarship programs – partnership with global certification bodies
SANS (US$1 mil grant)
EC-Council (US$1 mil grant)
Global certification courses
SANS
(ISC)2
EC-Council 8

More Related Content

What's hot

CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhousesegughana
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview
Glenn McKnight
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
GovCloud Network
 
Short Introduction to Internet Governance
Short Introduction to Internet GovernanceShort Introduction to Internet Governance
Short Introduction to Internet Governance
DiploFoundation
 
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in AfricaCTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
Commonwealth Telecommunications Organisation
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
DATA SECURITY SOLUTIONS
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)
Benjamin Ang
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
Benjamin Ang
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
Bangladesh Network Operators Group
 
GIC Introduction to Internet Governance
GIC   Introduction to Internet GovernanceGIC   Introduction to Internet Governance
GIC Introduction to Internet Governance
DiploFoundation
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyond
Benjamin Ang
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
ARIN
 
Internet Governance for Operators
Internet Governance for OperatorsInternet Governance for Operators
Internet Governance for Operators
RIPE NCC
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Benjamin Ang
 
Icann addressing e friction
Icann addressing e frictionIcann addressing e friction
Icann addressing e friction
Adrian Hall
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
APNIC
 

What's hot (20)

CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Internet Governance: Overview
Internet Governance: Overview Internet Governance: Overview
Internet Governance: Overview
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
Short Introduction to Internet Governance
Short Introduction to Internet GovernanceShort Introduction to Internet Governance
Short Introduction to Internet Governance
 
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in AfricaCTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 
GIC Introduction to Internet Governance
GIC   Introduction to Internet GovernanceGIC   Introduction to Internet Governance
GIC Introduction to Internet Governance
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyond
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Internet Governance for Operators
Internet Governance for OperatorsInternet Governance for Operators
Internet Governance for Operators
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 
Icann addressing e friction
Icann addressing e frictionIcann addressing e friction
Icann addressing e friction
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 

Viewers also liked

CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Borensegughana
 
GBF-Issue-5-Teaser
GBF-Issue-5-TeaserGBF-Issue-5-Teaser
GBF-Issue-5-Teasersegughana
 
GBF-Issue-1-Teaser
GBF-Issue-1-TeaserGBF-Issue-1-Teaser
GBF-Issue-1-Teasersegughana
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Wardsegughana
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Reportsegughana
 
CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattanisegughana
 

Viewers also liked (6)

CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
 
GBF-Issue-5-Teaser
GBF-Issue-5-TeaserGBF-Issue-5-Teaser
GBF-Issue-5-Teaser
 
GBF-Issue-1-Teaser
GBF-Issue-1-TeaserGBF-Issue-1-Teaser
GBF-Issue-1-Teaser
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Report
 
CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattani
 

Similar to CTO-CyberSecurityForum-2010-Philip Victor

Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
ITU
 
3.4 itu cop shah
3.4 itu cop shah3.4 itu cop shah
3.4 itu cop shah
Mr Nyak
 
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landjiCTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
Commonwealth Telecommunications Organisation
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
Knowledge Group
 
Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...
Global Risk Forum GRFDavos
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
Dr David Probert
 
CNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia PacificCNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia Pacific
APNIC
 
Internet Governance Forum and Remote Participation - ICT@c Manila,Philippin...
Internet Governance Forum and Remote Participation - ICT@c Manila,Philippin...Internet Governance Forum and Remote Participation - ICT@c Manila,Philippin...
Internet Governance Forum and Remote Participation - ICT@c Manila,Philippin...
Charity Gamboa Embley
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 
Nov 2013 Gamification e-newsletter
Nov 2013 Gamification e-newsletterNov 2013 Gamification e-newsletter
Nov 2013 Gamification e-newsletter
David Wortley
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
consultancyss
 
GFCE-V Meeting 2020: Lessons learned - building technical capacity for Intern...
GFCE-V Meeting 2020: Lessons learned - building technical capacity for Intern...GFCE-V Meeting 2020: Lessons learned - building technical capacity for Intern...
GFCE-V Meeting 2020: Lessons learned - building technical capacity for Intern...
APNIC
 
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
OneCoverNepal
 
ISOC Overview and ISOC Canada
ISOC  Overview and ISOC CanadaISOC  Overview and ISOC Canada
ISOC Overview and ISOC Canada
Glenn McKnight
 
AITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformationAITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformation
APNIC
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
dotZADNA
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
Yuri Anisimov
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eumanelmedina
 

Similar to CTO-CyberSecurityForum-2010-Philip Victor (20)

Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
3.4 itu cop shah
3.4 itu cop shah3.4 itu cop shah
3.4 itu cop shah
 
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landjiCTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 
CNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia PacificCNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia Pacific
 
Internet Governance Forum and Remote Participation - ICT@c Manila,Philippin...
Internet Governance Forum and Remote Participation - ICT@c Manila,Philippin...Internet Governance Forum and Remote Participation - ICT@c Manila,Philippin...
Internet Governance Forum and Remote Participation - ICT@c Manila,Philippin...
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Nov 2013 Gamification e-newsletter
Nov 2013 Gamification e-newsletterNov 2013 Gamification e-newsletter
Nov 2013 Gamification e-newsletter
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
GFCE-V Meeting 2020: Lessons learned - building technical capacity for Intern...
GFCE-V Meeting 2020: Lessons learned - building technical capacity for Intern...GFCE-V Meeting 2020: Lessons learned - building technical capacity for Intern...
GFCE-V Meeting 2020: Lessons learned - building technical capacity for Intern...
 
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
npCert Initiatives in Nepal (Nepal Computer Emergency Response Team)
 
ISOC Overview and ISOC Canada
ISOC  Overview and ISOC CanadaISOC  Overview and ISOC Canada
ISOC Overview and ISOC Canada
 
AITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformationAITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformation
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eu
 

More from segughana

CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwesegughana
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Glorisosegughana
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carrsegughana
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crainsegughana
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundusegughana
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torressegughana
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will GardnerCTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardnersegughana
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oramsegughana
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamssegughana
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonoghsegughana
 
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-DdosCTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddossegughana
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buettisegughana
 
CTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKayCTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKaysegughana
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Ministersegughana
 

More from segughana (16)

CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crain
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torres
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will GardnerCTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardner
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oram
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
 
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-DdosCTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buetti
 
CTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKayCTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKay
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Minister
 

CTO-CyberSecurityForum-2010-Philip Victor

  • 1. Organisational Capacity Building Philip Victor Director, Training, Skills Development & Outreach International Multilateral Partnership Against Cyber Threats 18 June 2010
  • 2. Issues and Challenges Cyber attacks continue to escalate in frequency and variations Lack of cyber laws & harmonisation in nations have made these nations as launching pad for cyber attacks Lack of cyber security professionals 2
  • 4. Addressing the Challenges Nations need to build it’s capacity and capability to enhance its state of readiness to counter cyber threats and attacks 4
  • 6. IMPACT The world’s foremost cybersecurity alliance. IMPACT brings together governments of the world, industry and the academia to operationalise cybersecurity initiatives across ITU’s 191 member states. 6
  • 7. Global Cybersecurity Agenda (GCA) Capacity Building Capacity building needs to be promoted in order to develop a sustainable and proactive culture of cybersecurity Legal Measures Technical & Procedural Measures GCA Organisational Structures International Cooperation 7
  • 8.
  • 10. Trainings via ITU’s Centre of Excellence (CoE)
  • 11. Scholarship programs – partnership with global certification bodies
  • 12. SANS (US$1 mil grant)
  • 15. SANS
  • 18.
  • 20. Training & Skills Development IMPACT Network Forensics & Investigation Course: 6th – 9th April 2010 (Brunei) Closed session for law enforcement agencies 11
  • 21. Training & Skills Development IMPACT Network Forensics Course: 3rd – 7th May 2010 (IMPACT Global HQ) 22 participants from 5 countries 12
  • 22. Training & Skills Development IMPACT-SANS IPv6 Training: 26th May 2010 (IMPACT Global HQ) Training conducted by Dr Johannes Ullrich (SANS Internet Storm Center) 13
  • 23. Training & Skills Development IMPACT-SANS IPv6 Security Training at IMPACT Global HQ, Malaysia Training conducted by Dr Johannes Ullrich (SANS) – 72 participants 14
  • 24. Cybersecurity Workshop IMPACT-ITU conducted cybersecurity workshop for East Africa (Kenya, Tanzania, Uganda and Zambia) : 26th – 29th April 2010 Session conducted in Kampala, Uganda 15
  • 25. Cybersecurity Workshop IMPACT-ITU conducted cybersecurity workshop for West Africa (Burkina Faso, Côte d'Ivoire, Ghana, Nigeria, Mali and Senegal) : 17th – 21st May 2010 Session conducted in Ouagadougou, Burkina Faso 16
  • 26. Thank You philip.victor@impact-alliance.org IMPACT Jalan IMPACT 63000 Cyberjaya Malaysia T +60 (3) 8313 2020 F +60 (3) 8319 2020 E contactus@impact-alliance.org impact-alliance.org © Copyright 2010 IMPACT. All Rights Reserved.