Yesim Nazlar: (6/27/2017 07:58) Hello, my name is Yeşim Nazlar and I will be monitoring this chat room. In this role, I am the voice for the remote participants, ensuring that they are heard equally with those who are “in-room” participants. When submitting a question that you want me to read out loud on the mic, please provide your name and affiliation if you have one, start your sentence with <QUESTION> and end it with <QUESTION>. When submitting a comment that you want me to read out loud of the mic, once again provide your name and affiliation if you have one then start your sentence with a <COMMENT> and end it with <COMMENT>.  Text outside these quotes will be considered as part of “chat” and will not be read out loud on the mic. Any questions or comments provided outside of the session time will not be read aloud. Please note that audio is may be available in French and Spanish. All chat sessions are being archived and follow the ICANN Expected Standards of Behavior: https://urldefense.proofpoint.com/v2/url?u=https-3A__www.icann.org_resources_pages_expected-2Dstand&d=DwIFaQ&c=FmY1u3PJp6wrcrwll3mSVzgfkbPSS6sJms7xcl4I5cM&r=mrDeztziKLa7gZqGADzxcnHA3QXmXYsnChWYBR4NElI&m=HQzvALdO1nZjGbkwFctISyTU7nP4SPSLWfRlUbhCAqc&s=vNQMYDnUPG4fZV12Vg2DmFucJZa9VNgHSf64jHVrAcQ&e=

  Gabdibé GAB-HINGONNE: (08:19) Bonjour. Thank you Yesim Nazlar

  Adam Ahmat Doungous: (08:28) Bonjour

  Adam Ahmat Doungous: (08:29) si on peut avoir des liens pour plus d'information de la part de presentateur?

  Gabdibé GAB-HINGONNE: (08:32) Pourriez-vous nous donner des noms des applications et logiciels qui aident à la protection des Comptes? Merci

  Gabdibé GAB-HINGONNE: (08:34) Comment distinguer les logiciels malveillants des bons? Merci

  Sebastien (ALAC): (08:44) I am very surprise of the propmotion of Google DNS servers by ICANN

  Abdeldjalil Bachar Bong: (08:47) Symantec

  Abdeldjalil Bachar Bong: (08:47) https://urldefense.proofpoint.com/v2/url?u=https-3A__www.symantec.com_content_dam_symantec_docs_reports_istr-2D21-2D2016-2Den.pdf&d=DwIFaQ&c=FmY1u3PJp6wrcrwll3mSVzgfkbPSS6sJms7xcl4I5cM&r=mrDeztziKLa7gZqGADzxcnHA3QXmXYsnChWYBR4NElI&m=HQzvALdO1nZjGbkwFctISyTU7nP4SPSLWfRlUbhCAqc&s=DtTJzx84IULmiBhqJBHMArRuzyE9Ru7Md0EaoANUH54&e=

  Abdeldjalil Bachar Bong: (08:48) 2017 Internet Security Threat Report

  Abdeldjalil Bachar Bong: (08:48) https://urldefense.proofpoint.com/v2/url?u=https-3A__www.symantec.com_security-2Dcenter_threat-2Dreport&d=DwIFaQ&c=FmY1u3PJp6wrcrwll3mSVzgfkbPSS6sJms7xcl4I5cM&r=mrDeztziKLa7gZqGADzxcnHA3QXmXYsnChWYBR4NElI&m=HQzvALdO1nZjGbkwFctISyTU7nP4SPSLWfRlUbhCAqc&s=-OUjc3x67ArdYZz2JbsdDsfSdUUUhFelAxnX-N5tffc&e=

  Abdeldjalil Bachar Bong: (08:48) https://urldefense.proofpoint.com/v2/url?u=https-3A__s1.q4cdn.com_585930769_files_doc-5Fdownloads_lifelock_ISTR22-5FMain-2DFINAL-2DAPR24.pdf&d=DwIFaQ&c=FmY1u3PJp6wrcrwll3mSVzgfkbPSS6sJms7xcl4I5cM&r=mrDeztziKLa7gZqGADzxcnHA3QXmXYsnChWYBR4NElI&m=HQzvALdO1nZjGbkwFctISyTU7nP4SPSLWfRlUbhCAqc&s=qu3HbNjlml_TIXAfaa11IrhO_PXE-NMTb5Vcv2orDqo&e=

  Abdeldjalil Bachar Bong: (08:52) ITU Cybersecurity Activities https://urldefense.proofpoint.com/v2/url?u=http-3A__www.itu.int_en_action_cybersecurity_Pages_default.aspx&d=DwIFaQ&c=FmY1u3PJp6wrcrwll3mSVzgfkbPSS6sJms7xcl4I5cM&r=mrDeztziKLa7gZqGADzxcnHA3QXmXYsnChWYBR4NElI&m=HQzvALdO1nZjGbkwFctISyTU7nP4SPSLWfRlUbhCAqc&s=JwMt043_LIj0Xe_a1rD_6M0pS291to4KGCJKo3G-XZE&e=

  Abdeldjalil Bachar Bong: (08:54) Internet Infrastructure Security Guidelines for Africa https://urldefense.proofpoint.com/v2/url?u=https-3A__www.internetsociety.org_doc_aiisg&d=DwIFaQ&c=FmY1u3PJp6wrcrwll3mSVzgfkbPSS6sJms7xcl4I5cM&r=mrDeztziKLa7gZqGADzxcnHA3QXmXYsnChWYBR4NElI&m=HQzvALdO1nZjGbkwFctISyTU7nP4SPSLWfRlUbhCAqc&s=J1va2d4OJSmfxn4tDKalgQXV4UnmvAwq2PZSSP9ihEM&e=  

  Abdeldjalil Bachar Bong: (08:58) Global Cybersecurity Index ITU  https://urldefense.proofpoint.com/v2/url?u=https-3A__www.itu.int_en_ITU-2DD_Cybersecurity_Pages_GCI.aspx&d=DwIFaQ&c=FmY1u3PJp6wrcrwll3mSVzgfkbPSS6sJms7xcl4I5cM&r=mrDeztziKLa7gZqGADzxcnHA3QXmXYsnChWYBR4NElI&m=HQzvALdO1nZjGbkwFctISyTU7nP4SPSLWfRlUbhCAqc&s=L48rTwOQxLeAoaUvxEaiE81IzSXy1SbhhyZzxgswhgw&e=

  Bakary KOUYATE: (08:59) Pouvons avoir le lien de la présentation

  Bakary KOUYATE: (08:59) ??

  Abdeldjalil Bachar Bong: (09:00) Unifying the Global Response to Cybercrime | APWG https://urldefense.proofpoint.com/v2/url?u=http-3A__www.antiphishing.org_&d=DwIFaQ&c=FmY1u3PJp6wrcrwll3mSVzgfkbPSS6sJms7xcl4I5cM&r=mrDeztziKLa7gZqGADzxcnHA3QXmXYsnChWYBR4NElI&m=HQzvALdO1nZjGbkwFctISyTU7nP4SPSLWfRlUbhCAqc&s=izKNGEVeg_Oka9MfXQQIivjBmh6a2C4DuBRWPjXQcs8&e=

  Gabdibé GAB-HINGONNE: (09:08) D'accord pour webinaire!

  Yesim Nazlar: (09:08) Thank you for your participation. The meeting is now adjourned.

  • No labels