<html><head><meta http-equiv="Content-Type" content="text/html charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class=""><div class=""></div><div class=""><br class=""><div class="">
<div style="color: rgb(0, 0, 0); letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class=""><div class=""><div style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class=""><div class=""><div style="orphans: 2; widows: 2; font-family: arial; font-size: 16px; margin: 0in 0in 0pt;" class=""><strong class=""><b class=""><i class=""><font face="Arial" color="#003366" size="2" class=""><span style="font-size: 11pt;" class="">Opeyemi Onifade, CISSP, CGEIT</span></font></i></b></strong></div><div style="orphans: 2; widows: 2; margin: 0in 0in 0pt;" class=""><strong class=""><b class=""><span style="color: rgb(0, 51, 102); font-family: arial; font-size: 11pt; font-weight: normal;" class="">Managing Consultant</span></b></strong></div><div style="orphans: 2; widows: 2; font-family: arial; font-size: 16px; margin: 0in 0in 0pt;" class=""><font face="Arial" color="black" size="1" class=""><span lang="EN-GB" style="font-size: 9pt;" class="">________________________________</span></font></div><div style="orphans: 2; widows: 2; font-family: arial; font-size: 16px; margin: 0in 0in 0pt;" class=""><font face="Arial" color="#1f497d" size="2" class=""><span lang="FR" style="font-size: 10pt;" class=""><b class="">Afenoid Enterprise Limited</b><o:p class=""></o:p></span></font></div><div style="orphans: 2; widows: 2; margin: 0in 0in 0pt;" class=""><font color="#1f497d" face="Arial" class=""><span style="font-size: 13px;" class="">Block B, Ground  Floor, AUJ Office Complex</span></font></div><div style="orphans: 2; widows: 2; font-family: arial; font-size: 16px; margin: 0in 0in 0pt;" class=""><font face="Arial" color="#1f497d" size="2" class=""><span lang="FR" style="font-size: 10pt;" class="">Plot 564/565 Independence Avenue<o:p class=""></o:p></span></font></div><div style="orphans: 2; widows: 2; font-family: arial; font-size: 16px; margin: 0in 0in 0pt;" class=""><font face="Arial" color="#1f497d" size="2" class=""><span lang="FR" style="font-size: 10pt;" class="">Central Business District 900211</span></font></div><div style="orphans: 2; widows: 2; font-family: arial; font-size: 16px; margin: 0in 0in 0pt;" class=""><font face="Arial" color="#1f497d" size="2" class=""><span lang="FR" style="font-size: 10pt;" class="">Abuja</span></font></div><div style="orphans: 2; widows: 2; font-family: arial; font-size: 16px; margin: 0in 0in 0pt;" class=""><font face="Arial" color="#1f497d" size="2" class=""><span lang="FR" style="font-size: 10pt;" class="">T: +234 (0) 809 836 5259</span></font></div><div style="orphans: 2; widows: 2; font-family: arial; font-size: 16px; margin: 0in 0in 0pt;" class=""><font face="Arial" color="#003366" size="2" class=""><span lang="PT-BR" style="font-size: 10pt;" class="">M:</span></font><span style="color: rgb(31, 73, 125); font-family: Arial; font-size: 13px;" class="">+234 (0) 802 836 5259</span></div><div style="orphans: 2; widows: 2; font-family: arial; font-size: 16px; margin: 0in 0in 0pt;" class=""><span style="color: rgb(31, 73, 125); font-family: Arial; font-size: 13px;" class="">email: <a href="mailto:opeyemi@afenoid.com" class="">opeyemi@afenoid.com</a> </span></div><div style="orphans: 2; widows: 2; font-size: 16px; margin: 0in 0in 0pt;" class=""><span style="text-align: -webkit-auto; font-size: 10pt;" class=""><font color="#1f497d" face="Arial" class="">URL: <a href="http://www.afenoid.com.ng" class="">www.afenoid.com.ng</a></font></span></div><div style="orphans: 2; widows: 2;" class=""><i style="color: rgb(0, 128, 0); font-family: Arial; font-size: 13px;" class=""><b class="">Afenoid......Strengthening Organisations, Empowering Professionals</b></i></div></div><div class=""><i style="color: rgb(0, 128, 0); font-family: Arial; font-size: 13px;" class=""><b class=""><br class=""></b></i></div><div class=""><span style="color: rgb(52, 52, 52); font-family: Arial, Helvetica, sans-serif; font-size: 15px; line-height: 17px;" class=""><br class=""></span></div></div><div class="">_______________________</div><div class=""><div style="font-family: UICTFontTextStyleBody;" class=""><span style="background-color: rgba(255, 255, 255, 0);" class="">The information in this e-mail is confidential, and intended solely for the addressee. Access to this e-mail by anyone else is unauthorized. Any copying or further distribution beyond the original recipient is not intended, and may be unlawful. The opinions enclosed are those of the sender, and do not necessarily reflect those of AFENOID ENTERPRISE LIMITED. </span></div></div></div><div class=""><span style="background-color: rgba(255, 255, 255, 0);" class=""><br class=""></span></div></div><br class="Apple-interchange-newline"><br class="Apple-interchange-newline">
</div>


<br class=""><div><blockquote type="cite" class=""><div class="">On 5 Sep 2017, at 5:09 PM, Eleonora Anna MAZZUCCHI <<a href="mailto:EMAZZUCCHI@unog.ch" class="">EMAZZUCCHI@unog.ch</a>> wrote:</div><br class="Apple-interchange-newline"><div class=""><font size="3" face="Cambria" class=""><b class="">Dear All, </b></font>
<br class="">
<br class=""><font size="3" face="Cambria" class=""><b class="">This is a reminder of the </b></font><a href="https://www.intgovforum.org/multilingual/content/bpf-on-cybersecurity-2017-call-for-contributions" class=""><font size="3" color="blue" face="Cambria" class=""><b class="">open
call for contributions</b></font></a><font size="3" face="Cambria" class=""><b class=""> (included
below) from the </b></font><a href="https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-1" class=""><font size="3" color="blue" face="Cambria" class=""><b class="">IGF
2017 BPF on Cybersecurity</b></font></a><font size="3" face="Cambria" class=""><b class="">.
All stakeholders are invited and encouraged to submit their written inputs
by <u class="">Friday 15 September</u>. Contributions outlining best practices and
case studies in response to the questions below are welcome from both individuals
and organizations.</b></font>
<br class="">
<br class=""><font size="3" face="Cambria" class=""><b class="">We look forward to hearing from many
of you, and please do reach out with any questions on making a submission!</b></font>
<br class="">
<br class="">
<br class=""><font size="3" face="Cambria" class="">Best regards,</font>
<br class="">
<br class=""><font size="3" face="Cambria" class="">Eleonora</font>
<br class=""><font size="3" face="Cambria" class="">IGF Secretariat</font>
<br class="">
<br class="">
<br class="">
<br class="">
<br class="">
<br class="">
<br class=""><font size="1" color="#5f5f5f" face="sans-serif" class="">From:      
 </font><font size="1" face="sans-serif" class="">Eleonora Anna MAZZUCCHI/UNOG/GVA/UNO</font>
<br class=""><font size="1" color="#5f5f5f" face="sans-serif" class="">To:      
 </font><font size="1" face="sans-serif" class=""><a href="mailto:bp_cybersec_2016@intgovforum.org" class="">bp_cybersec_2016@intgovforum.org</a>,
<a href="mailto:bp_gender@intgovforum.org" class="">bp_gender@intgovforum.org</a>, <a href="mailto:bpf-localcontent@intgovforum.org" class="">bpf-localcontent@intgovforum.org</a>, <a href="mailto:dc@intgovforum.org" class="">dc@intgovforum.org</a>,
<a href="mailto:intersessional_2015@intgovforum.org" class="">intersessional_2015@intgovforum.org</a>, <a href="mailto:igfregionals@intgovforum.org" class="">igfregionals@intgovforum.org</a>, <a href="mailto:outreach_com_2015@intgovforum.org" class="">outreach_com_2015@intgovforum.org</a>,
<a href="mailto:maarten@first.org" class="">maarten@first.org</a>, <a href="mailto:solugbile@gmail.com" class="">solugbile@gmail.com</a>, Markus Kummer <<a href="mailto:kummer.markus@gmail.com" class="">kummer.markus@gmail.com</a>></font>
<br class=""><font size="1" color="#5f5f5f" face="sans-serif" class="">Date:      
 </font><font size="1" face="sans-serif" class="">15/08/2017 18:40</font>
<br class=""><font size="1" color="#5f5f5f" face="sans-serif" class="">Subject:    
   </font><font size="1" face="sans-serif" class="">Cybersecurity
BPF - Call for Inputs Now Open!</font>
<br class="">
<hr noshade="" class="">
<br class="">
<br class=""><font size="3" face="Cambria" class="">Dear All, </font>
<br class="">
<br class=""><font size="3" face="Cambria" class="">On behalf of the IGF 2017 Best Practice
Forum (BPF) on Cybersecurity, we are pleased to inform you that the BPF
has opened a call for contributions until <b class=""><u class="">15 September 2017</u>.
</b></font>
<br class="">
<br class=""><font size="3" face="Cambria" class=""><b class="">All stakeholders are now invited to
make their submissions using the questionnaire below. </b></font>
<br class="">
<br class=""><font size="3" face="Cambria" class="">This year's BPF work focuses on the cybersecurity
implications of policies for universal access and achieving the Sustainable
Development Goals (SDGs) - we would be grateful for your inputs on these
important issues! All submission instructions are included in the call
details below and</font><a href="https://www.intgovforum.org/multilingual/content/bpf-on-cybersecurity-2017-call-for-contributions" class=""><font size="3" color="blue" face="Cambria" class=""><b class="">
available on the IGF's website</b></font></a><font size="3" face="Cambria" class=""><b class="">.
</b></font>
<br class="">
<br class=""><font size="3" face="Cambria" class="">For any questions, please do reach out
to the Secretariat, BPF lead expert Maarten van Horenbeeck, and/or co-facilitators
Segun Olugbile and Markus Kummer.</font>
<br class="">
<br class=""><font size="3" face="Cambria" class="">We look forward to receiving your contributions!</font>
<br class="">
<br class=""><font size="3" face="Cambria" class="">Best regards,</font>
<br class="">
<br class=""><font size="3" face="Cambria" class="">Eleonora</font>
<br class=""><font size="3" face="Cambria" class="">IGF Secretariat</font>
<br class="">
<br class="">
<br class="">
<br class="">
<br class="">
<br class=""><font size="3" color="red" face="Arial" class=""><b class="">BPF on Cybersecurity 2017 -
Call for Contributions</b></font>
<br class="">
<br class="">
<br class=""><font size="3" color="#2f2f2f" face="Arial" class=""><i class="">All stakeholders are invited
to submit written contributions addressing the below questions and issues
to the 2017 </i></font><a href="https://www.intgovforum.org/multilingual/lexicon/8" class=""><font size="3" color="#008000" face="Arial" class=""><i class="">IGF</i></font></a><font size="3" color="#2f2f2f" face="Arial" class=""><i class="">
</i></font><a href="https://www.intgovforum.org/multilingual/lexicon/8" class=""><font size="3" color="#008000" face="Arial" class=""><i class="">BPF</i></font></a><font size="3" color="#2f2f2f" face="Arial" class=""><i class="">
on Cybersecurity mailing list (subscribe: </i></font><a href="http://www.intgovforum.org/mailman/listinfo/bp_cybersec_2016_intgovforum.org" class=""><font size="3" color="#3f8080" face="Arial" class=""><i class="">https://www.intgovforum.org/mailman/listinfo/bp_cybersec_2016_intgovforum.org</i></font></a><font size="3" color="#2f2f2f" face="Arial" class=""><i class="">)
by <b class="">15 September 2017.</b></i><i class=""> While it is envisioned that initial
drafting of the output document will begin on 15 September, this should
be considered a soft deadline as contributions will be welcome after the
15th of September, particularly contributions from IGF National and Regional
Initiatives (NRIs) and from other relevant entities or organisations who
may be holding meetings relating to cybersecurity prior to the IGF annual
meeting in December.</i></font><p class=""><font size="3" color="#2f2f2f" face="Arial" class=""><i class="">Contributions will then be
compiled and synthesized by the Secretariat, and further circulated to
the community for comment and further work towards an output document for
the BPF to be presented at the 12th IGF in Geneva, Switzerland from 18-21
December.</i></font>
</p><p class=""><font size="3" color="#2f2f2f" face="Arial" class=""><i class="">All individuals and organizations
are asked to kindly try to keep their contributions to <b class="">no more than
2-3 pages</b></i><i class="">, and are encouraged to include URLs/Links to relevant
information/examples/best practices as applicable. When including specific
examples or detailed proposals, those may be included as an Appendix to
the document. <b class="">Please attach contributions as Word Documents (or other
applicable non-PDF text).</b></i></font>
</p><p class=""><font size="3" color="#2f2f2f" face="Arial" class=""><b class="">Overview:</b></font>
</p><p class=""><font size="3" color="#2f2f2f" face="Arial" class="">During 2015 and 2016, the Policy
Options for Connecting and Enabling the Next Billion(s) (CENB) activity
within the Internet Governance Forum identified two major elements:</font>
</p><p class=""><font size="3" face="Arial" class="">·        </font><font size="3" color="#2f2f2f" face="Arial" class="">Which
policy options are effective at creating an enabling environment, including
deploying infrastructure, increasing usability, enabling users and ensuring
affordability;</font>
</p><p class=""><font size="3" face="Arial" class="">·        </font><font size="3" color="#2f2f2f" face="Arial" class="">How
Connecting and Enabling the Next Billion(s) contributes to reaching the
new Sustainable Development Goals (SDGs).</font>
</p><p class=""><font size="3" color="#2f2f2f" face="Arial" class="">The Best Practice Forum on Cybersecurity
realizes that making Internet access more universal, and thus it supporting
the SDGs, has significant cybersecurity implications. Well-developed cybersecurity
helps contribute to meeting the SDGs. Poor cybersecurity can reduce the
effectiveness of these technologies, and thus limit our opportunities to
helping achieve the SDGs.</font>
</p><p class=""><font size="3" color="#2f2f2f" face="Arial" class="">BPF participants have conducted
an initial study of how the policy proposals compiled as part of CENB Phase
I and II may affect, or be affected by, cybersecurity implications.</font>
</p><p class=""><font size="3" color="#2f2f2f" face="Arial" class="">As part of this ongoing effort,
the IGF is now calling for public input to collect additional risks and
cybersecurity policy recommendations that can help mitigate security impacts,
and help ensure ICTs and the Internet continue to help contribute to achieving
the SDGs.</font>
</p><p class=""><font size="3" color="#2f2f2f" face="Arial" class=""><b class="">Relevant reading:</b></font>
</p><p class=""><font size="3" color="#2f2f2f" face="Arial" class="">Summary Records of the BPF<br class="">
</font><a href="https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-1" class=""><font size="3" color="#3f8080" face="Arial" class="">https://www.intgovforum.org/multilingual/content/bpf-cybersecurity-1</font></a>
</p><p class=""><font size="3" color="#2f2f2f" face="Arial" class="">UN Sustainable Development Goals
- </font><a href="http://www.un.org/sustainabledevelopment/sustainable-development-goals/" class=""><font size="3" color="#3f8080" face="Arial" class="">http://www.un.org/sustainabledevelopment/sustainable-development-goals/</font></a>
</p><p class=""><font size="3" color="#2f2f2f" face="Arial" class="">Policy Options for Connecting
& Enabling the Next Billion(s) - Phase II<br class="">
</font><a href="https://www.intgovforum.org/multilingual/index.php?q=filedepot_download/3416/549" class=""><font size="3" color="#3f8080" face="Arial" class="">https://www.intgovforum.org/multilingual/index.php?q=filedepot_download/3416/549</font></a>
</p><p class=""><font size="3" color="#2f2f2f" face="Arial" class="">Security focused reading of
CENB Phase I -<br class="">
</font><a href="https://www.intgovforum.org/multilingual/index.php?q=filedepot_download/4904/687" class=""><font size="3" color="#3f8080" face="Arial" class="">https://www.intgovforum.org/multilingual/index.php?q=filedepot_download/4904/687</font></a>
</p><p class=""><font size="3" color="#2f2f2f" face="Arial" class="">Security focused analysis of
CENB Phase II -<br class="">
</font><a href="https://www.intgovforum.org/multilingual/index.php?q=filedepot_download/4904/688" class=""><font size="3" color="#3f8080" face="Arial" class="">https://www.intgovforum.org/multilingual/index.php?q=filedepot_download/4904/688</font></a>
</p><p class=""><font size="3" color="#2f2f2f" face="Arial" class=""><b class="">Questions:</b></font>
</p><p class=""><font size="3" face="Arial" class="">·        </font><font size="3" color="#2f2f2f" face="Arial" class="">How
does good cybersecurity contribute to the growth of and trust in ICTs and
Internet Technologies, and their ability to support the Sustainable Development
Goals (SDGs)?</font>
</p><p class=""><font size="3" face="Arial" class="">·        </font><font size="3" color="#2f2f2f" face="Arial" class="">How
does poor cybersecurity hinder the growth of and trust in ICTs and Internet
Technologies, and their ability to support the Sustainable Development
Goals (SDGs)?</font>
</p><p class=""><font size="3" face="Arial" class="">·        </font><font size="3" color="#2f2f2f" face="Arial" class="">Assessment
of the CENB Phase II policy recommendations identified a few clear threats.
Do you see particular policy options to help address, with particular attention
to the multi-stakeholder environment, the following cybersecurity challenges:</font>
</p><p class=""><font size="3" face="Arial" class="">o        </font><font size="3" color="#2f2f2f" face="Arial" class="">Denial
of Service attacks and other cybersecurity issues that impact the reliability
and access to Internet services</font>
</p><p class=""><font size="3" face="Arial" class="">o        </font><font size="3" color="#2f2f2f" face="Arial" class="">Security
of mobile devices, which are the vehicle of Internet growth in many countries,
and fulfill critical goals such as payments</font>
</p><p class=""><font size="3" face="Arial" class="">o        </font><font size="3" color="#2f2f2f" face="Arial" class="">Potential
abuse by authorities, including surveillance of Internet usage, or the
use of user-provided data for different purposes than intended</font>
</p><p class=""><font size="3" face="Arial" class="">o        </font><font size="3" color="#2f2f2f" face="Arial" class="">Confidentiality
and availability of sensitive information, in particular in medical and
health services</font>
</p><p class=""><font size="3" face="Arial" class="">o        </font><font size="3" color="#2f2f2f" face="Arial" class="">Online
abuse and gender-based violence</font>
</p><p class=""><font size="3" face="Arial" class="">o        </font><font size="3" color="#2f2f2f" face="Arial" class="">Security
risks of shared critical services that support Internet access, such as
the Domain Name System (DNS), and Internet Exchange Point (IXP) communities</font>
</p><p class=""><font size="3" face="Arial" class="">o        </font><font size="3" color="#2f2f2f" face="Arial" class="">Vulnerabilities
in the technologies supporting industrial control systems</font>
</p><p class=""><font size="3" face="Arial" class="">o        </font><font size="3" color="#2f2f2f" face="Arial" class="">Use
of information collected for a particular purpose, being repurposed for
other, inappropriate purposes. For instance, theft of information from
smart meters, smart grids and Internet of Things devices for competitive
reasons, or the de-anonymization of improperly anonymized citizen data</font>
</p><p class=""><font size="3" face="Arial" class="">o        </font><font size="3" color="#2f2f2f" face="Arial" class="">The
lack of Secure Development Processes combined with an immense growth in
the technologies being created and used on a daily basis</font>
</p><p class=""><font size="3" face="Arial" class="">o        </font><font size="3" color="#2f2f2f" face="Arial" class="">Unauthorized
access to devices that take an increasing role in people’s daily lives</font>
</p><p class=""><font size="3" face="Arial" class="">o        </font><font size="3" color="#2f2f2f" face="Arial" class="">Other:
describe a cybersecurity issue critical to developing the SDGs in ways
not listed above relevant to your stakeholder community (100 words or less)</font>
</p><p class=""><font size="3" face="Arial" class="">·        </font><font size="3" color="#2f2f2f" face="Arial" class="">Many
Internet developments do not happen in a highly coordinated way - a technology
may be developed in the technical community or private sector, and used
by other communities and interact in unexpected ways. Stakeholders are
managing complexity.<br class="">
This both shows the strength and opportunities of ICTs and Internet Technologies,
but also the potential risks. New technologies may be insufficiently secure,
resulting in harms when they are deployed: conversely we may adopt security
requirements or measures that prevent the development, deployment, or widespread
use of technologies that would generate unforeseen benefits. Where do you
think lies the responsibility of each stakeholder community in helping
ensure cybersecurity does not hinder future Internet development?</font>
</p><p class=""><font size="3" face="Arial" class="">·        </font><font size="3" color="#2f2f2f" face="Arial" class="">Where
do you think lies the responsibility of each stakeholder community in helping
ensure cybersecurity does not hinder future Internet development?</font>
</p><p class=""><font size="3" face="Arial" class="">·        </font><font size="3" color="#2f2f2f" face="Arial" class="">What
is for you the most critical cybersecurity issue that needs solving and
would benefit most from a multi-stakeholder approach within this BPF? Should
any stakeholders be specifically invited in order for this issue to be
addressed?</font>
</p><div class="">
<br class="webkit-block-placeholder"></div><div class="">
<br class="webkit-block-placeholder"></div><div class="">
<br class="webkit-block-placeholder"></div><div class="">
<br class="webkit-block-placeholder"></div><div class="">
<br class="webkit-block-placeholder"></div><div class="">
<br class="webkit-block-placeholder"></div><div class="">
<br class="webkit-block-placeholder"></div><div class="">
<br class="webkit-block-placeholder"></div><div class="">
<br class="webkit-block-placeholder"></div><div class=""><br class="webkit-block-placeholder"></div></div></blockquote></div><br class=""></div></body></html>