L’Organisation Arabe des TICs (AICTO) organise en partenariat avec l’Union Internationale des Télécommunications (UIT) et le Parc Technologique « Elgazala » un workshop régional sur « Les politiques de confidentialité des données et de Cybersécurité », les 05 et 06 décembre 2016, au parc technologique « Elgazala », à Tunis.

Ce workshop vise à examiner les aspects juridiques et techniques relatifs à la cyber sécurité et la confidentialité des données à l’échelle Arabe et Internationale et présenter et partager les bonnes pratiques en la matière et trouver les moyens opportuns pour les implémenter.

Au programme de ce workshop qui s’étale sur deux jours, sont prévus 4 panels à travers lesquels tous les intervenants, échangeront les idées et les expériences sur la protection des données et la cyber sécurité suivant les approches règlementaires et juridiques et les approches technologiques, ainsi que l’examen des défis de l’écosystème numérique avec l’essor des nouvelles tendances technologiques tel que : le Cloud computing, l’IoT, M2M, etc.).

Les travaux de ce workshop seront conclus par une table ronde à laquelle des experts discuteront la dialectique entre la sécurité et la confidentialité des données, ainsi que les approches pratiquées par les pays représentés en terme de politiques nationales de  sécurité et de confidentialité des données relatives aux nouveaux services numériques.

Les inscriptions se feront en ligne sur le lien ci-dessous :


The use of cloud computing is rapidly evolving in many Arab & African countries due to its cost-efficiency and flexibility. This technology holds the potential to eliminate the requirements for the setup of expensive computing infrastructure for IT-based solutions and plications. However, this rapid growing of the cloud computing market motivated malicious users to revise their attack techniques to cope with the specific features of the cloud infrastructure. Especially, attacks on data privacy are becoming a crucial issue since resource sharing is a pillar of the cloud model.

Henceforth, many of the Arab &African countries need to take the lead in formulating national and regional regulatory policy, frameworks and legal measures addressing cybersecurity, as these may not yet fully balance data privacy against providing the means by which governments can address cybercrime and cyber threats in general. While establishing such a balance is a challenging task for all governments, it is an action that builds confidence and security in the use of the Internet and its various applications, and one that enables socio-economic development in the modern age. The extremely rapid deployment of big data technologies, cloud services, and the Internet of Things as well as the constant and dynamic evolution of cyber threats make this task all the more urgent and critically important.

The traditional discussion on the balance between individual liberties and security remains actual. As cyberspace is borderless, this balance requires decisions on common policies, security strategies and coherent legal frameworks at the regional level, as well as possibly actions to achieve a coordinated and coherent implementation of these.

This workshop aims at providing advocacy on the policies, challenges and objectives of cloud services privacy, data protection and security, as well as possible actions for regional actions and their expected impacts.

This workshop engages key leaders of cybersecurity Programs to help share experiences, challenges, and ideas, and to contribute to the process of formulation the appropriate policies and frameworks and knowledge sharing on cloud services and IOT security challenges throughout the region.


  • Share the latest issues and best practices regarding the legislations and regulations in place to address the issues related to data privacy.
  • Encourage formulation of national and regional regulatory and technical policies and frameworks and legal measures to ensure data privacy and combat the different forms of cyberthreats in the Arab region, thereby ensuring optimal and secure use of the Internet and its various applications and building confidence in the Internet
  • Discuss potential concerns on implementation and success factors.
Article similaire