cybersecurity

Philippines Training of Trainers on Frontier ICTs and Cybersecurity for Sustainable Development

Philippines Training of Trainers on Frontier ICTs and Cybersecurity for Sustainable Development

 

The Asian and Pacific Training Centre for ICT for Development (APCICT), in cooperation with the Development Academy of the Philippines, is organizing the Philippines Training of Trainers on Frontier ICTs and Cybersecurity for Sustainable Development. This training will be held from the 11th to 14th April 2023 in Manila, Philippines.  

The four-day event aims to expand the pool of resource persons in the country who can provide support to central and local government officials on safely leveraging frontier technologies for sustainable development. As frontier ICTs are increasingly leveraged for realizing the Sustainable Development Goals, it is crucial for countries to develop guiding frameworks in the adoption of these technologies in their national development efforts. 

The training programme will look into the fundamental concepts of frontier ICTs, the challenges and risks associated with the application of frontier ICTs, and the importance of security and privacy measures to protect against security threats. 

Organizer
APCICT/ESCAP, Development Academy of the Philippines
Location
Manila, Philippines
Creation Date
Attachments
Date
Apr 11th 2023 - Apr 14th 2023

Internet Security and Networked Governance in International Relations

This paper asks whether the Internet’s heavy reliance on non-hierarchical, networked forms of governance is compatible with growing concerns about cyber-security from traditional state actors. Networked governance is defined as a semipermanent, voluntary negotiation system that allows interdependent actors to opt for collaboration or unilateral action in the absence of an overarching authority.

UK Smart Grid Cyber Security

This report provides an approach and management framework to address the cyber security challenges faced nationally and by the Distribution Network Organisations as the current network infrastructure is developed with new Smart Grid systems and technologies. It is intended to provide a sound basis upon which detailed and enduring smart grid cyber security efforts can be built through the „low carbon transition‟.

Policing cybercrimes: Situating the Public Police in Networks of Security within Cyberspace

The Internet and the criminal behaviour it transforms (cybercrime) pose considerable challenges for order maintenance and law enforcement because Internet-related offending takes place within a global context while crime tends to be nationally defined. Policing cyber-crime is made all the more complex by the very nature of policing and security being networked and nodal and also because within this framework the public police play only a small part in the policing of the Internet.

Global Law and Global Challenges - Cyber Warfare: Law and Policy Proposals for U.S. and Global Governance

Cybersecurity is the newest and most unique national security issue of the twenty-first century. Cyber warfare uses computer technologies as defensive and offensive weapons in international relations. Until now, there has been no national debate within the United States over the concept of cyber warfare; neither its meaning nor the international laws that govern this concept have been discussed at any length, and nor have the domestic rules regarding it.

Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers

This report is a significant contribution to the discussion of the roles and responsibilities of chief information security officers (CISOs) in state governments across the United States. It identifies both strategies and activities used by successful state CISOs, and thereby provides a good roadmap to success for all state CISOs. The report cites the Multi-State Information Sharing and Analysis Center (MS-ISAC), which has been championed since its inception by the New York state chief cybersecurity officer as one key cybersecurity collaboration success.

The Dangers of Surveillance

This article seeks to explain the harms of government surveillance. Drawing on law, history, literature, and the work of scholars in the emerging interdisciplinary field of “surveillance studies,” the article offers an account of what those harms are and why they matter. The article moves beyond the vagueness of current theories of surveillance to articulate a more coherent understanding and a more workable approach. At the level of theory, the paper explains why and when surveillance is particularly dangerous and when it is not.

Caught in the cloud Privacy, encryption, and government back doors in the web 2.0 era

Over the last few years, consumers, corporations and governments have rushed to move their data to “the cloud,” adopting web-based applications and storage solutions provided by companies that include Amazon, Google, Microsoft and Yahoo. Cloud computing services provide consumers with vast amounts of cheap, redundant storage and allow them to instantly access their data from a web-connected computer anywhere in the world. Unfortunately the shift to cloud computing needlessly exposes users to privacy invasion and fraud by hackers.