23rdWorld Computer Congress Daejeon
Joint IFIP TC3 and UNESCO Participation Programme
Mission Statement:
The Internet is global. Is the security in the global net a local issue? One for all, all for one: We are connected and by demonstrating Information Security Solidarity from rich countries, we foster least developed countries as well as the rich countries: we all connected!
Joining means supporting ISES:
Not joining means taking into account barriers and inequality
General Background
Information Security Education & Solidarity (ISES):
Sharing Strategies, Implementation, and Experience: Stimulation new Action
October 5, 2015: time of the sessions on the WCC’2015 web site.
The Internet is global. Is security in the global net a local issue? One for all, all for one: We are connected and by demonstrating Information Security Solidarity from rich countries, we also foster least developed countries’ information security: in return rich countries benefit from fewer attacks: we remain all connected!
In support of the millennium development goals of a more wealth and gender balanced future and in preventing conflicts in these respect we engage for information security.
|
Detailed description |
|
Goal: The main aim of ISES is to provide a platform for discussion on ICT Security by experts from different countries and different advancement. The current situation in different countries is discussed openly in terms of ICT security, strategies and implementation. The debate and dialogue on IT security models applied by least developed and wealthy nations creates inspiration for new action and mutual support: the resulting actions should improve ICT security readiness and lead to global minimum security standards compliance. |
|
Background: There is a growing concern about security when using technology globally. This indicates the need for a structured approach to knowledge and skills development among the users. For developing nations, ICT is a key component in improving the quality of life and participation in global economic activities. Being able to operate ICT is therefore essential. But not being able to operate devices securely and protect them against attack does not harm just the poorest population – it also harms the wealthy regions. Failure to this limits their economic and social goals, widening the gap between the rich and the poor. An attack on one unsecure system can affect the rest of cyberspace. Information security depends on user behaviour and protection, access to secure and protective software. National efforts such as cyber laws, forensic capabilities, and incident response capabilities are crucial. Current cyber models appear not to perform as they should, and we need to consider secure, vigilant and resilient cyber models for risk management and for driving innovation in the cyber world. Such models could minimise emerging cyber threats globally and increase trust in cyberspace and especially in emerging economies where ICT plays an important part in the future economy, and where cyber security is at an early stage.
The discussion will include:
- current situation on IT security in developing world
- identify what are the actual policies/strategies in place
- identify what models are working for implementation
- identify what challenges being faced on implementation
- agree on key concepts for further discussion
|
|
Raymond Morel
IFIP GA and TC3, Moderator / Organiser
Senior Expert in Information Security and Policy Support Actions,
|
|
Serah Francis
Kenya
Master in Information Security, Mgt. at Gjøvik University, Norway
Currently, doing research on ICT and IT-Security Strategy and implementation in Kenya.
|
|
Krishna Penmetsa
India
India Advisor and a guest professor for universities and companies in Austria and Norway in the areas of strategic planning and information security. His specialisations are student exchange, university co-operations with a main focus on research and international business including emerging markets. He is Managing Director of KRIMSH Consulting Private Limited.
|
|
Rajan Raj Pant
Chairman, ITSERT-NP, Nepal
Founder& Chairman of Information Security Emergency Team of Nepal (ITSERT-NP) the first CERT/CSIRT community of Nepal. Former IT Controller of Government of Nepal he has more than 21 years’ experience in IT system and security. He was pioneer in establishing PKI infrastructure in Government of Nepal. Presently Rajan is serving Merchant trade Asia SdnBhd, Malaysia as IT Advisor and responsible for providing vision and awareness regarding the latest trends in cyber security, Implementation of large-scale public, private and hybrid clouds, Advisor for the protection of Payment Card Industry (PCI), and Personally Identifiable Information (PII) data, To provide insight on the state of cyber security and how individuals and organizations can adequately protect themselves from loss. He possesses Master of Business Administration (MBA-IT) and Master in Law (LLM) and ITIL expert CEH, CHFIv8, ISO 27001 LA, COBITv5. He has spoken in various conferences in different countries.
|
|
JaeDok SHIM
Korea
International Certifications Manager at Korea Productivity Centre (KPC). KPC is ICDL National Operator for Korea. Jaedok Shim is International Certifications Manager at Korea Productivity Center (KPC). KPC is a special corporation under the Ministry of trade, industry and energy of Korea. KPC, since its foundation in 1957, has played a pivotal role in increasing productivity of the industries to promote the rapid growth of the national economy. KPC also has been introducing Internet Ethics Qualification which provides knowledge and standards of information security, internet addiction and cyber law since 2012. Since Jaedok joined KPC, he has been responsible for ICDL Korea managing the overall development of ICDL. With several years’ worth of ICDL success in Korea, he has spoken at ECDL Foundation forums in Bonn, Oslo, London and Bucharest.
|
|
Jaesuk YUN
Senior Researcher, Korea Internet & Security Agency
Senior Researcher in Korea Internet & Security Agency(KISA). He has joined Korea Information Security Agency (renamed as Korea Internet & Security Agency) in 2000, and has been an information securitypolicyspecialist for over 16 years. He has extensive training/experience in the areas of cybersecurity, ICT policy, and privacy protection and been in charge of varioustasksincludinganalyzing information securitypolicies of OECD, APEC, ITU, conducting Knowledge Sharing Program (KSP) projects for UAE, and capacity building of cybersecurity for developing countries. He has been a vice-rapporteur of ITU-D SG2 Q3/2(cybersecurity) since September 2014.
|
|
ISES Activities and Events |
|
Meanwhile different ISES activities and events took place and their development is speeding up. ISES planning meetings provide a forum for:
- Sharing knowledge between local and international experts
- Facilitating networking of stakeholders and developing synergy
- Outlining cooperative projects to address the issues in the framework of main international programs.
- Defining an agenda and various regionally adapted strategies for continued planning and cooperation.
|
|
ISES Past Events |
|
- Initial ISES Meeting at WCCE 2013 in Torun July 2013 (Ref.1)
- Contribution to different Action Lines of WISIS+10 October 2013 (Ref.2)
- Accepted Activity Proposal of ISES to IFIP TC3 Executive meeting January 2014
- Accepted Activity Proposal of ISES to IFIP Board March 2014
- Presentation at WISIS+10 High Level Meeting July 9, 2014 in Geneva (Ref. 3)
- Explanatory workshop during KEYCICT in Potsdam, Berlin 2014 (Ref. 4)
- Finalization of a IFIP Project for the UNESCO Coordination Programme 2014/15 by August 31, 2014TC 3: Education to IFIP GA, Vienna, Austria, 12th and 13th of September 2014 by Bernard Cornu - TC3 chair and THE ”TORUN VISION” (Ref. 5).
|
|
ISES Upcoming events for period 2 (Phase 1) and 2 (Phase 2) |
|
2015 (Phase 1); the actual application, current application
- Task Force Meeting in (tbd) April / May 4Q-2015 depending on the acceptation of the proposal. This will be a working meeting to set out the real agenda and the real work in a global context.
- In 2015 ISES Meeting through video conferencing tools in first semester (tbd) with only a few people who want to engage from different regions with heavy point on IT security curriculum (Cf. A preliminary list of participation members (Ref. 6)).
- In 2015 IFIP Working Conference (WG 3.1 and 3.3), Vilnius, Lithuania, “Digital technologies, towards a new culture of learning: Computing for the next generation (DTCOL)”. Face to face meeting with ISES members and 1 or 2 paper presentations.
- In 2015 a full stream in IFIP WCC 2015 at Daejeon among the 4 pillars of the congress (New IT-oriented jobs for near future, Seoul accord and related topics, IP3 (IT professionalism and certification) related topics, K-12 creative IT Education). This will be meeting face to face with engaged participants to discuss this project in perspective of a country to create community. A presentation of the work done for the whole year and to prepare for Phase 2.
- In Preparation October / November after WCC 2015 thematic expert workshop on ISES problematic, collected through the Villnius and Daejeon activities. Location in Europe TBD with international (overseas) participation.
2 (Phase 2) Planned for future UNSCO participation programme 2
- In 2016 we plan to deliver a proposal for the UNESCO participation programme 2
- May 2016 in the framework WSIS we provide a follow on workshop with in-depth implementation strategy and policy issues.
- In 2016 Hawaii, IFIP WG 3.4. Conference, ITEM WG 3.7. Agenda to be discussed at IFIP WCCE’ 2015 at Daejeon.
- In September 2016, we are ready to contribute on ISES subjects to the IFIP WITFOR conference in Costa-Rica
- May 2017, Participation with a workshop for WISIS 2017
- In 2017 one of the main streams during IFIP WCCE’2017 in Dublin facilitates presentations and strategic dialogue on the Declaration on Information Security Education and Solidarity (ISES).
- Evolution on the participation programme of UNESCO (one option)
- We are open for contributing to other IFP-, EU-, and UNESCO Workshop
|
Information Security Education & Solidarity (ISES):
The way to balance wealth and gender
|