ARF WORK PLAN on Security of and in the Use of Information and - - PowerPoint PPT Presentation

arf work plan
SMART_READER_LITE
LIVE PREVIEW

ARF WORK PLAN on Security of and in the Use of Information and - - PowerPoint PPT Presentation

ASEAN Regional Forum (ARF) Seminar on Operationalizing Cyber Confidence Building Measures (CBMs) 21 22 October 2015 Singapore ARF WORK PLAN on Security of and in the Use of Information and Communications Technologies (ICT) ARF CYBER CBM


slide-1
SLIDE 1

ASEAN Regional Forum (ARF) Seminar on Operationalizing Cyber Confidence‐Building Measures (CBMs) 21‐22 October 2015 Singapore

ARF CYBER CBM – MOVING FORWARD

ARF WORK PLAN

  • n Security of and in the Use of Information

and Communications Technologies (ICT)

slide-2
SLIDE 2

ARF WORK PLAN

  • Cyber crisis respond;
  • Research and analysis;
  • Awareness on threats for non‐

technical and policy makers;

  • Cyber criminals;
  • Terrorist use of ICTs;
  • Diplomatic;
  • Policy;
  • Technical;
  • Enforcement.
  • National laws, policies,

best practices, strategies;

  • Periodic surveys;
  • Databases on potential

threats and possible remedies;

  • Terminology;
  • Through online and
  • ffline channel.

Information Sharing Cooperation Capacity Building Norms, Rules and Responsible Behaviour of State Cultural Diversity Points of Contact

Promote transparency

& develop CBM

Awareness Cooperation in CIP Cooperation in responding to criminal & terrorist use of ICTs

  • n Security of and in the Use of Information

and Communications Technologies (ICT)

slide-3
SLIDE 3

R E C O M M E N DAT I O N

Findings:

  • 1. continuously promote transparency & develop

CBM;

  • 2. regional capacity and capability building;
  • 3. critical national information infrastructure

protection;

  • 4. discuss on rules, norms and principles of

responsible behavior;

  • 5. discuss on terminology to promote

understanding between participating countries;

  • 6. establish point of contact;
  • 7. strengthen & establish domestic cyber security

incidents management;

  • 8. address & pursue practical measures in managing

jurisdictional and legal issues as well as technical gaps that exist amongst states.

Workshop and seminars

ARF WORK PLAN

  • n Security of and in the Use of Information

and Communications Technologies (ICT)

‐ Recommending CBM taking into account the suggested activities set out in the work plan; ‐ Develop processes and procedures for sharing information between ARF contact points on preventing ICT crises and criminal and terrorist use of ICTs; ‐ Establishment of a contacts database and propose a location to host the database.

Study Group

slide-4
SLIDE 4

CBM i. Identify and establish points of contact at the policy and technical levels; ii. Develop mechanisms and processes to enhance inter‐State confidence‐building; iii. Encourage transparency via information sharing of various aspects

  • f national and transnational threats;

iv. information sharing of categories of critical infrastructure & efforts to protect them, including national laws and policies for CIP a) Develop a repository of national laws and policies; b) Develop mechanisms and processes on CIP; c) Develop technical, legal and diplomatic mechanisms to address ICT‐related requests d) classify ICT incidents in terms of the scale and seriousness of the incident, to facilitate the exchange of information on incidents. v. Strengthen cooperative mechanisms between relevant agencies to address ICT security incidents; vi. Enhance cooperation, including the development of focal points for the exchange of information on malicious ICT use and the provision

  • f assistance in investigations;
  • vii. Establish a national CERT and/or CSIRT or officially designate an
  • rganization to fulfil this role

UNGGE ARF WORK PLAN

  • n Security of and in the Use of Information

and Communications Technologies (ICT)

slide-5
SLIDE 5
  • Focusing CBMs at regional level is more practical to produce

effective outcomes;

  • Align with UNGGE Report ‐ CBMs, capacity building and rules,

norms and principles of responsible behavior;

  • ARF cyber CBMs can be implemented through:
  • Establishment of open ended Study Group on CBMs
  • Conduct workshops & seminar which support the work of the

Study Group

Conclusion ARF WORK PLAN

  • n Security of and in the Use of Information

and Communications Technologies (ICT)

slide-6
SLIDE 6

Thank You