CRCC 2015 Information for Distinguished Regional Guests Updated 4/13/15 Central Region Communications Conference (CRCC) Summary 12 Partner Nations Invited • Recurring U.S. Central Command (USCENTCOM)-led multilateral, multi-stakeholder (government + private-sector) engagement with regional senior information and communications technology (ICT) leaders • A unique opportunity to merge military, legislative and regulatory leadership perspectives for a more robust understanding of each sector’s role in national security • Purpose is to foster relationships and encourage international exchange and dialogue on ICT issues of common interest to: – Support regional stability, economic development, global commerce Primary Audience • Regional Ministers of Communication and Information Technology and their US counterparts • Regional Senior Regulatory Authorities and their US counterparts • Regional Senior Military Communications Officers and their US counterparts • DC-based Ambassadors from each partner nation – Enhance partnerships as a foundation for ongoing cooperation Principal US Participation – Address future challenges to include crisis response / disaster relief • U.S. Central Command (USCENTCOM) as Host – Increase awareness of mutually beneficial ICT approaches • Department of Defense (DoD) – Promote interoperability between communications systems • Department of State (DoS) • Federal Communications Commission (FCC) • Department of Commerce (DoC) • Department of Homeland Security (DHS) • Private-Sector (industry / academia) – Promote common hardware, software, processes & data standards – Mature multilateral, multi-stakeholder approaches 2 Afghanistan, Bahrain, Egypt, Iraq, Jordan, Kuwait, Lebanon, Oman, Qatar, Saudi Arabia, UAE, Yemen UNCLASSIFIED Partner Information Exchanges 2009 Manama Bahrain 2010 Amman Jordan 2012 Washington DC 2014 Washington DC 2015 Wash DC 12-14 May 2015 Central Region Communications Conference (CRCC) 2014 CRCC Key Takeaways: • Cyber security remains a timely and relevant regional topic • Government partnership with industry and academia is essential • National cyber security self-assessments / strategies are essential first steps • Regional partners want / need cyber security training 3 UNCLASSIFIED CRCC 2015 Summary • 12 – 14 May 2015 – 12 May DV Reception – 13-14 May Conference Sessions • CRCC will be held at Marriott Washington Dulles Hotel Marriott Washington Dulles Hotel 45020 Aviation Drive Dulles, Virginia 20166 USA Phone: 1-703-471-9500 http://www.marriott.com/hotels/travel/iadap-washington-dulles-airport-marriott/ • Theme – “Building a Secure, Reliable and Interoperable Global Telecommunication Infrastructure” 4 Supporting Attendance Information for Distinguished Regional Guests • Where to stay: For the convenience of our distinguished regional guests it is highly recommended they stay at the conference hotel, the Marriott Washington Dulles Hotel at 45020 Aviation Drive Dulles, Virginia 20166 USA – Please reserve rooms by April 17, 2015 • How to get there: – The hotel will provide a shuttle from Dulles International Airport • What to wear: – Reception for Distinguished Guests (May 12): Gentlemen: Business / National Dress Ladies: Business (dress, pants outfit) / National Dress – Conference Sessions (13,14 May): Gentlemen: Business / National Dress / Class A Uniform (General / Flag Officers Only) Ladies: Business (dress, pants outfit) / National Dress / Class A Uniform (General / Flag Officers Only) 5 CRCC 2015 Desired Information Sharing in Presentations & Discussions • Experiences and perspectives regarding national cyber security strategies, initiatives and challenges • Presentations and remarks regarding the legal, regulatory, policy, and standards environments impacting national cyber security strategies • Key national roles in forming and promoting cyber security strategies, policies and standards • The state of cyber security collaboration and information exchange within respective governments and among regional and international communities • The state of national incident management efforts (e.g., progress towards national CERTs) • Progress towards a culture of security and examples of public and private-sector collaboration 6 CRCC 2015 Topics for Roundtable and Panel Discussions • National Strategies, Policies, and Standards – Build on the 2014 focus on national strategies, extended to supporting policies and standards • Watch, Warning and National Incident Response – How each nation addresses the need and authorities for intra/inter-governmental coordination on cyber security to include establishment of national computer security incident response teams (CSIRT) – CSIRTs was the subject of a April 24, 2014 Webinar co-hosted by USCENTCOM and Department of State, with presentations by Department of Homeland Security, Packet Clearing House, and Carnegie Mellon’s Software Engineering Institute CERT. • SCADA and the Protection of Critical Infrastructures – A topic of great regional interest and subject of a August 28, 2014 Webinar co-hosted by USCENTCOM and Department of State, with presentations by National Defense University, Department of Energy, and Department of Homeland Security • Cooperation Among Government, Industry, Academia and Civil Society – How each nation fosters cooperation within and across respective communities • Regional / International Cooperation – The role of regional and international cooperation in advancing respective national cyber security programs 7 Information Requested from Regional Guests Prior to the Conference • For presenters request presentations two weeks in advance – Dual Arabic / English (each line of text) or English-only preferred • Biography, with photo preferred • Full name with rank and position title – if not in the biography • Short name or how they prefer to be addressed (for the badge) • English proficiency (e.g., excellent, some English, interpreter requested) • Travel arrangements – Arrival day, time and airline once known • Support anticipated from respective embassy in DC – For example, will the DC-based embassy coordinate pickup and drop-off at the airport? • Food allergies and restrictions – The hotel does not serve halal meals, but will offer vegetarian dishes – Please indicate in response requests for vegetarian dishes 8 CRCC 2015 Proposed Regional Participation By invitation only • The Islamic Republic of Afghanistan – – • The Kingdom of Bahrain – – – – • Ministry of Communications Prime Minister’s Advisory Commission Communications and Media Commission Ministry of Defense Ministry of Information and Communications Technology Telecommunications Regulatory Commission Jordan Armed Forces The State of Kuwait – – 9 Ministry of Communications and Information Technology National Telecommunications Regulatory Authority Egypt CERT • Egyptian Armed Forces • The Hashemite Kingdom of Jordan – – – • • The Republic of Iraq – – – – • • Ministry of Interior Bahrain Economic Development Board Telecommunications Regulatory Authority Bahrain Defense Forces The Arab Republic of Egypt – – – – • Ministry of Information and Communications Technology Ministry of Defense • Ministry of Communications Kuwait Armed Forces • The State Of Lebanon – Ministry of Communications – Lebanese Armed Forces The Sultanate of Oman – Ministry of Transport and Communications – Ministry of Commerce and Industry – Oman Information Technology Authority – Oman National CERT – Sultan's Armed Forces DC-based Ambassadors The State of Qatar of partner nations and – Supreme Council for ICT respective Defense Attachés – consistent with – Qatar CERT approach for CRCC 2014 – Qatari Armed Forces The Kingdom of Saudi Arabia – Ministry of Interior – Ministry of Communications and Information Technology – Communications and Information Technology Commission – Saudi Arabia CERT – Ministry of Defense The United Arab Emirates (U.A.E.) – Ministry of Economy (addresses communications) – Telecommunications Regulatory Authority – UAE CERT – UAE Armed Forces The Republic of Yemen – Ministry of Telecommunications and IT – Public Telecommunication Corporation – Yemen Armed Forces CRCC 2015 Proposed US Participation • Department of Defense (DoD) • U.S. Central Command (Host) • Federal Communications Commission (FCC) • DoD Chief Information Officer (CIO) • Department of Homeland Security • Office of Secretary of Defense, Cyber Policy • Department of Commerce • Joint Staff J5 • National Defense University (NDU) • Joint Staff J6 / CIO • Private-Sector (Industry and Academia) • Department of Energy • U.S. Cyber Command – Key to credible multi-stakeholder message • Defense Information Systems Agency – USTTI identifies/invites industry reps • Department of State • Office of International Communications and Information Policy • Office of the Coordinator for Cyber Issues • Bureau of Near East Affairs 10 – NDU identifies/invites academia reps
© Copyright 2024