SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
Enhancing Cybersecurity Readiness Through
International Cooperation

Mohd Noor Amin (mohd.amin@impact-alliance.org)
Chairman, Management Board
31 May 2012
Global Attacks




                 2
IMPACT’s Global Response Centre’s
Statistics
Top 30 Attack Destination Countries




  Attack Percentage Scale

      High     1.55 –41.52

      Med      0.16– 1.49

      Low      0.02 – 0.14

      Very     0 – 0.01
      Low




                                      4
Top 30 Attack Source Countries




 Attack Percentage Scale


     High     1.41 % – 31.30 %


     Med      0.29 % – 1.15 %


     Low      0.00% – 0.28 %




                                 5
Global Statistics
   Top Malware for April 2012
                                                     HUER/HTML.Malware


                                                     HTML/Infected.Webpage.
                                                     Gen2
                                                     ADSPY/AdSpy.Gen2


                                                     TR/Downloader.Gen2


                                                     TR/Crypt.XPACK.Gen3

             Spam Outbreak from January 2012 to April 2012

                                                                                   Top Malware Affected Sectors Worldwide
  4000000                                                                                                                   Finance - 45 %

  3000000                                                                                                                   Personal Sites - 3 %

  2000000                                                                                                                   Business - 3 %
  1000000                                                                                                                   Computers & Tech - 7%
          0                                                                                                                 Pornography - 2 %
         9/1/2012               9/2/2012           9/3/2012             9/4/2012
                                                                                                                            Forums and newsgroups - 3
                                                                                                                            %
                     Top Spam Relaying countries                                                                            Search Engines - 4 %
        40.00%                                                                                                              Shopping - 7%
        20.00%
                                                                                                                            Business-3%
         0.00%
                                                                                                                            social networking-6%

                                                                                                                            Other Categories-14%
 Statistical Information Sources: Symantec, Kaspersky, McAfee, Sophos, Commtouch, Trendmicro, Websense Securitylabs, Atlas Arbor, ThreatExpert



                                                                                                                                                        6
Key Cybersecurity Challenges
 Lack of adequate and interoperable national or regional legal frameworks
 Lack of secure software and ICT-based applications
 Lack of appropriate national and global organizational structures to deal with
  cyber incidents
 Lack of information security professionals and skills within governments; lack of
  basic awareness among users
 Lack of international cooperation between industry experts, law enforcements,
  regulators, academia & international organizations to address a global challenge




                                                                                      7
Addressing The Challenges
• Developing national Computer Incident Response Teams (CIRTs)
• Enhancing public-private partnerships to enhance expertise, knowledge, skills, resources &
  experience
• Enhancing international cooperation:
  – between nations to mitigate cyber attacks
  – Regulator, law enforcement & national CIRT/CERTs
• Cyber laws needs to be put in place and harmonised
• Increase capability & capacity building programs




                                                                                               8
ITU-IMPACT
Global Cybersecurity Alliance
ITU–IMPACT Collaboration
      The International Multilateral Partnership Against Cyber Threats (IMPACT) is the
  cybersecurity executing arm of the United Nations’ (UN) specialised agency - the
   International Telecommunication Union (ITU) - bringing together governments,
academia and industry experts to enhance the global community’s capabilities in dealing with
                                         cyber threats.




 ITU & IMPACT signs a Memorandum of Understanding in      ITU & IMPACT signs a Cooperation Agreement in May
 2008. IMPACT becomes the physical home of ITU’s Global   2011. IMPACT becomes the cybersecurity executing arm
 Cybersecurity Agenda to operationalise cybersecurity     of the United Nations’ specialised agency, ITU. IMPACT
 services across 193 countries.                           now will expand its services to the UN System.



                                                                                                               10
Cybersecurity Services Deployed
142 countries have joined the ITU-IMPACT coalition




           World’s largest cybersecurity alliance of its kind

                                                                11
ITU’s Global Cybersecurity Agenda (GCA)
 Framework for International Cooperation
   ITU’s Global Cybersecurity Agenda (GCA) – UN backed framework to enhance
    confidence and security in the information society.


                       Capacity
                       Building




                                           International
Legal Measures
                                           Cooperation


                 Global Cybersecurity
                        Agenda



         Technical &
                                  Organisational
         Procedural
                                    Structure
          Measures




                                                                               12
Operationalising ITU’s Global
Cybersecurity Agenda




                                13
ITU-IMPACT’s Partners

               International
               Organisations




                               Academia
                  Alliance      (200+)    Child Online Protection
    Industry




                                                                    14
International Cooperation
Dr Hamadoun Touré – Secretary General, ITU




                                 “Without international
                                 cooperation, the problem
                                 cannot be adequately
                                 addressed since, more
                                 often than not, the
                                 criminal is not resident in
                                 the same country where
                                 the crime takes place”




                                                           15
International Cooperation
Why International Cooperation?

                         Estonian Minister for Economic Affairs and
                               Communications, Juhan Parts




     “Adequate international cooperation is essential.” "Because if something happens in
cyberspace... it's a border crossing issue. We have to have horizontal cooperation globally," he
                                             added.


                                                                                               16
Key Partnership Milestones
ITU-IMPACT
•   Capacity building
     a)   Trained over 200 cybersecurity professionals and practitioners in 2010
     b)   Deployed 250 scholarships to 43 partner countries globally (SANS & EC-Council)
     c)   Trained 50 law enforcement officers globally on Network Investigation
     d)   Conducted the world’s first UN-backed Cyber Drill for CLMV (Cambodia, Lao, Myanmar & Vietnam)
          countries
•   CIRT/CERT Implementation
     a)   Conducted over 30 country readiness assessments
     b)   Deployed and implemented CIRT for Montenegro
•   IMPACT Government Security Scorecard (IGSS)
     a)   Successfully deployed the pilot IGSS implementation for the Malaysian government
•   Child Online Protection (COP)
     a)   Successfully conducted the first COP National Strategy Framework for Brunei
•   Cybercrime Investigation
     a)   Conducted 3 cybercrime investigations with key partners



                                                                                                      17
Key Initiatives Planned
ITU-IMPACT
•   New enhanced version of ESCAPE to be rolled out for better and greater information sharing and
    collaboration between key stakeholders in cybersecurity
•   Cybersecurity readiness to be conducted for the Caribbean & Ivory Coast
•   To deploy National CIRTs for Burkina Faso, Zambia, Uganda, Kenya & Tanzania
•   Training planned for the following regions:
     •   Eastern Europe (Host: Turkey)
     •   Asia Pacific (Host: Lao)
     •   Africa (Host: Cameron)
     •   Pacific Island (Host: Fiji)
•   Cyber Drill is planned to be held at the following regions (Partners: Kaspersky, F-Secure, Trend Micro &
    ABI Research):
     •   Arab region – July 2012
     •   African region
     •   Eastern Europe region
•   COP National Strategy Framework – to be deployed in other regions in 2012


                                                                                                               18
Moving Forward
ITU-IMPACT
•   ITU-IMPACT has created a politically neutral platform for governments,
    academia, industry and international organisations to come together on
    a single platform
•   IMPACT’s Electronically Secured Collaborative Applications Platform for
    Experts (ESCAPE) is a community based platform where knowledge,
    expertise, experience, ideas can be shared, exchanged and discussed. A
    platform where various communities can be created to look into a
    myriad of areas from law enforcement, regulators, policy makers,
    security experts, judiciary, CERT/CIRTs, specialised groups, etc.
•   ITU-IMPACT welcomes governments, industry, academia, security
    experts and international organisations to come together to work
    towards a common goal of addressing cyber threats globally on this
    platform.

                                                                          19
Conclusion
Dr. Hamadoun Touré

“There are no borders in cyberspace and therefore only a global coalition
  can tackle this problem. We need a global framework where everyone
                  commits to not attacking everyone else”




                                                                            20
Thank you
  www.facebook.com/impactalliance




        IMPACT            T +60 (3) 8313 2020
        Jalan IMPACT      F +60 (3) 8319 2020
        63000 Cyberjaya   E contactus@impact-alliance.org
        Malaysia          impact-alliance.org               © Copyright 2010 IMPACT. All Rights Reserved.

Contenu connexe

Tendances

UNICEF Digital Citizenship and Safety- Indonesia presentation
UNICEF Digital Citizenship and Safety- Indonesia presentationUNICEF Digital Citizenship and Safety- Indonesia presentation
UNICEF Digital Citizenship and Safety- Indonesia presentationAkshay Sinha
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revistathe_ro0t
 
Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...journalBEEI
 
UNICEF Digital Citizenship and Safety- South Africa presentation
UNICEF Digital Citizenship and Safety- South Africa presentationUNICEF Digital Citizenship and Safety- South Africa presentation
UNICEF Digital Citizenship and Safety- South Africa presentationAkshay Sinha
 
Il Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webIl Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webSymantec Italia
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paperAkshay Sinha
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsBooz Allen Hamilton
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Symantec Italia
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis MPhil/MRes/BSc
 
An exploration of e-safety messages to young people, parents and practitioner...
An exploration of e-safety messages to young people, parents and practitioner...An exploration of e-safety messages to young people, parents and practitioner...
An exploration of e-safety messages to young people, parents and practitioner...Krishna De
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET-  	  Secured Authentication using Image Shield Protection and Database ...IRJET-  	  Secured Authentication using Image Shield Protection and Database ...
IRJET- Secured Authentication using Image Shield Protection and Database ...IRJET Journal
 
Social Media In the Defence & Military 2011
Social Media In the Defence & Military 2011Social Media In the Defence & Military 2011
Social Media In the Defence & Military 2011Dale Butler
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?CPPGroup Plc
 

Tendances (19)

UNICEF Digital Citizenship and Safety- Indonesia presentation
UNICEF Digital Citizenship and Safety- Indonesia presentationUNICEF Digital Citizenship and Safety- Indonesia presentation
UNICEF Digital Citizenship and Safety- Indonesia presentation
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 
Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...
 
AVG Threat Report Q4 2012
AVG Threat Report Q4 2012AVG Threat Report Q4 2012
AVG Threat Report Q4 2012
 
UNICEF Digital Citizenship and Safety- South Africa presentation
UNICEF Digital Citizenship and Safety- South Africa presentationUNICEF Digital Citizenship and Safety- South Africa presentation
UNICEF Digital Citizenship and Safety- South Africa presentation
 
Sophos social-media-wpna
Sophos social-media-wpnaSophos social-media-wpna
Sophos social-media-wpna
 
Il Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webIl Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del web
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
 
An exploration of e-safety messages to young people, parents and practitioner...
An exploration of e-safety messages to young people, parents and practitioner...An exploration of e-safety messages to young people, parents and practitioner...
An exploration of e-safety messages to young people, parents and practitioner...
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET-  	  Secured Authentication using Image Shield Protection and Database ...IRJET-  	  Secured Authentication using Image Shield Protection and Database ...
IRJET- Secured Authentication using Image Shield Protection and Database ...
 
Social Media In the Defence & Military 2011
Social Media In the Defence & Military 2011Social Media In the Defence & Military 2011
Social Media In the Defence & Military 2011
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?
 

Similaire à Strengthening Global Cybersecurity Cooperation

National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Ray Bugg
 
Eliminating Security Uncertainty
Eliminating Security UncertaintyEliminating Security Uncertainty
Eliminating Security UncertaintyDell World
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final ResultsCIONET
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxmeghanivkwserie
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxpriestmanmable
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Global Cyber Security Industry
Global Cyber Security IndustryGlobal Cyber Security Industry
Global Cyber Security IndustryReportLinker.com
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 

Similaire à Strengthening Global Cybersecurity Cooperation (20)

National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)
 
Eliminating Security Uncertainty
Eliminating Security UncertaintyEliminating Security Uncertainty
Eliminating Security Uncertainty
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Global Cyber Security Industry
Global Cyber Security IndustryGlobal Cyber Security Industry
Global Cyber Security Industry
 
Mon cirt khaltar
Mon cirt khaltarMon cirt khaltar
Mon cirt khaltar
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 

Plus de Positive Hack Days

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesPositive Hack Days
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerPositive Hack Days
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesPositive Hack Days
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikPositive Hack Days
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQubePositive Hack Days
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityPositive Hack Days
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Positive Hack Days
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для ApproofPositive Hack Days
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Positive Hack Days
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложенийPositive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложенийPositive Hack Days
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application SecurityPositive Hack Days
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летPositive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиPositive Hack Days
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОPositive Hack Days
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке СиPositive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CorePositive Hack Days
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опытPositive Hack Days
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterPositive Hack Days
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиPositive Hack Days
 

Plus de Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Dernier

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Dernier (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Strengthening Global Cybersecurity Cooperation

  • 1. Enhancing Cybersecurity Readiness Through International Cooperation Mohd Noor Amin (mohd.amin@impact-alliance.org) Chairman, Management Board 31 May 2012
  • 3. IMPACT’s Global Response Centre’s Statistics
  • 4. Top 30 Attack Destination Countries Attack Percentage Scale High 1.55 –41.52 Med 0.16– 1.49 Low 0.02 – 0.14 Very 0 – 0.01 Low 4
  • 5. Top 30 Attack Source Countries Attack Percentage Scale High 1.41 % – 31.30 % Med 0.29 % – 1.15 % Low 0.00% – 0.28 % 5
  • 6. Global Statistics Top Malware for April 2012 HUER/HTML.Malware HTML/Infected.Webpage. Gen2 ADSPY/AdSpy.Gen2 TR/Downloader.Gen2 TR/Crypt.XPACK.Gen3 Spam Outbreak from January 2012 to April 2012 Top Malware Affected Sectors Worldwide 4000000 Finance - 45 % 3000000 Personal Sites - 3 % 2000000 Business - 3 % 1000000 Computers & Tech - 7% 0 Pornography - 2 % 9/1/2012 9/2/2012 9/3/2012 9/4/2012 Forums and newsgroups - 3 % Top Spam Relaying countries Search Engines - 4 % 40.00% Shopping - 7% 20.00% Business-3% 0.00% social networking-6% Other Categories-14% Statistical Information Sources: Symantec, Kaspersky, McAfee, Sophos, Commtouch, Trendmicro, Websense Securitylabs, Atlas Arbor, ThreatExpert 6
  • 7. Key Cybersecurity Challenges  Lack of adequate and interoperable national or regional legal frameworks  Lack of secure software and ICT-based applications  Lack of appropriate national and global organizational structures to deal with cyber incidents  Lack of information security professionals and skills within governments; lack of basic awareness among users  Lack of international cooperation between industry experts, law enforcements, regulators, academia & international organizations to address a global challenge 7
  • 8. Addressing The Challenges • Developing national Computer Incident Response Teams (CIRTs) • Enhancing public-private partnerships to enhance expertise, knowledge, skills, resources & experience • Enhancing international cooperation: – between nations to mitigate cyber attacks – Regulator, law enforcement & national CIRT/CERTs • Cyber laws needs to be put in place and harmonised • Increase capability & capacity building programs 8
  • 10. ITU–IMPACT Collaboration The International Multilateral Partnership Against Cyber Threats (IMPACT) is the cybersecurity executing arm of the United Nations’ (UN) specialised agency - the International Telecommunication Union (ITU) - bringing together governments, academia and industry experts to enhance the global community’s capabilities in dealing with cyber threats. ITU & IMPACT signs a Memorandum of Understanding in ITU & IMPACT signs a Cooperation Agreement in May 2008. IMPACT becomes the physical home of ITU’s Global 2011. IMPACT becomes the cybersecurity executing arm Cybersecurity Agenda to operationalise cybersecurity of the United Nations’ specialised agency, ITU. IMPACT services across 193 countries. now will expand its services to the UN System. 10
  • 11. Cybersecurity Services Deployed 142 countries have joined the ITU-IMPACT coalition World’s largest cybersecurity alliance of its kind 11
  • 12. ITU’s Global Cybersecurity Agenda (GCA) Framework for International Cooperation  ITU’s Global Cybersecurity Agenda (GCA) – UN backed framework to enhance confidence and security in the information society. Capacity Building International Legal Measures Cooperation Global Cybersecurity Agenda Technical & Organisational Procedural Structure Measures 12
  • 14. ITU-IMPACT’s Partners International Organisations Academia Alliance (200+) Child Online Protection Industry 14
  • 15. International Cooperation Dr Hamadoun Touré – Secretary General, ITU “Without international cooperation, the problem cannot be adequately addressed since, more often than not, the criminal is not resident in the same country where the crime takes place” 15
  • 16. International Cooperation Why International Cooperation? Estonian Minister for Economic Affairs and Communications, Juhan Parts “Adequate international cooperation is essential.” "Because if something happens in cyberspace... it's a border crossing issue. We have to have horizontal cooperation globally," he added. 16
  • 17. Key Partnership Milestones ITU-IMPACT • Capacity building a) Trained over 200 cybersecurity professionals and practitioners in 2010 b) Deployed 250 scholarships to 43 partner countries globally (SANS & EC-Council) c) Trained 50 law enforcement officers globally on Network Investigation d) Conducted the world’s first UN-backed Cyber Drill for CLMV (Cambodia, Lao, Myanmar & Vietnam) countries • CIRT/CERT Implementation a) Conducted over 30 country readiness assessments b) Deployed and implemented CIRT for Montenegro • IMPACT Government Security Scorecard (IGSS) a) Successfully deployed the pilot IGSS implementation for the Malaysian government • Child Online Protection (COP) a) Successfully conducted the first COP National Strategy Framework for Brunei • Cybercrime Investigation a) Conducted 3 cybercrime investigations with key partners 17
  • 18. Key Initiatives Planned ITU-IMPACT • New enhanced version of ESCAPE to be rolled out for better and greater information sharing and collaboration between key stakeholders in cybersecurity • Cybersecurity readiness to be conducted for the Caribbean & Ivory Coast • To deploy National CIRTs for Burkina Faso, Zambia, Uganda, Kenya & Tanzania • Training planned for the following regions: • Eastern Europe (Host: Turkey) • Asia Pacific (Host: Lao) • Africa (Host: Cameron) • Pacific Island (Host: Fiji) • Cyber Drill is planned to be held at the following regions (Partners: Kaspersky, F-Secure, Trend Micro & ABI Research): • Arab region – July 2012 • African region • Eastern Europe region • COP National Strategy Framework – to be deployed in other regions in 2012 18
  • 19. Moving Forward ITU-IMPACT • ITU-IMPACT has created a politically neutral platform for governments, academia, industry and international organisations to come together on a single platform • IMPACT’s Electronically Secured Collaborative Applications Platform for Experts (ESCAPE) is a community based platform where knowledge, expertise, experience, ideas can be shared, exchanged and discussed. A platform where various communities can be created to look into a myriad of areas from law enforcement, regulators, policy makers, security experts, judiciary, CERT/CIRTs, specialised groups, etc. • ITU-IMPACT welcomes governments, industry, academia, security experts and international organisations to come together to work towards a common goal of addressing cyber threats globally on this platform. 19
  • 20. Conclusion Dr. Hamadoun Touré “There are no borders in cyberspace and therefore only a global coalition can tackle this problem. We need a global framework where everyone commits to not attacking everyone else” 20
  • 21. Thank you www.facebook.com/impactalliance IMPACT T +60 (3) 8313 2020 Jalan IMPACT F +60 (3) 8319 2020 63000 Cyberjaya E contactus@impact-alliance.org Malaysia impact-alliance.org © Copyright 2010 IMPACT. All Rights Reserved.