Practices in and reflections on development, security, and peace in contexts of violent extremism and terrorism by government, civil society and community delegates

Agenda side event, hosted by the Dutch PM to the UN June 10 Venue: Dutch PM to the UN, 666 Third Avenue, 19th Floor 8:30 - 9:00

Registration and coffee

9:00 - 9:15

Welcome by Mr. Karel van Oosterom, Dutch Ambassador to the UN

9:15 - 10:15 Panel Civil society engagement and a human security approach on countering violent extremism in Mali Panelists Ambassador Mr. S.E.M. Sékou Kassé, Ambassador for Mali to the UN (TBC) Ms. Oulie Keita, Director of Programs of Freedom House, Board member of Wanep Mali Mr. Moussa Bambara Project Management and Conflict Management Specialist at Governance team of USAID Mali Imam Diallo Religious Leader and President of the organization of Association Malienne pour la Paix et le Salut (AMPS), Mali (TBC) Moderator: Mr. Fulco van Deventer, deputy director, Human Security Collective 10:20 – 11:20 Panel Intra and Interfaith dialogue to prevent and counter violent extremism Panelists Mr. Abdi Billow from WAJIR Peace and Development Agency, Kenya Father George Ehusani from Interfaith Activities and Partnership for Peace (IFAP), Nigeria Father Gary Donegan, Rector of the Passionist Community in Holy Cross, Ardoyne, Northern Ireland Moderator: Mr. Ivo Veenkamp, chief operating officer, Hedayah

Closing of the panels by a delegate of the Dutch PM 11:30

Transfer to UN Conference Room 3, UN Secretariat Building, 1 St Avenue & E. 45th Street accompanied by delegate of the Dutch PM.

Venue: UN Secretariat Building, Conference Room 3 12:00 – 12:40 Stand up lunch at the south end of 1B Corridor of the Conference Building 12:40 – 1:40 Panel Reintegrating violent extremist offenders: a role for government and communities Panelists Welcome remarks by delegate of the Dutch PM Mr. Eelco Kessels, Program manager, ICCT, The Hague Dr. Shanthikumar Hettiarachchi, Consultant, South Asian Network on Conflict Research, Sri Lanka Mr. Max Boon, victim of the 2009 Jakarta Marriot Hotel bombing and Founder Aliansi Indonesia Damai (Alliance for a Peaceful Indonesia, AIDA) Fourth panelist (TBC) Moderator: Ms. Lia van Broekhoven, director, Human Security Collective 1:45 – 2:45

Panel Role of young community leaders in fostering resilient communities Panelists Word of Welcome by Mr. Jehangir Khan, director CTITF Introduction by Ms. Jeanne Abdulla, program director, Human Security Collective Mr. Krmanj Othman, Young Advocacy Team, United Network of Young Peacebuilders (UNOY), Iraq Ms. Rewa Barghouthi, Palestinian Center for Peace and Democracy (PCPD), The State of Palestine Ms. Gulalai Ismail, Aware Girls, Pakistan Mr. Marouane Bakit, Society Hope Makers for Human Rights, Libya Mr. Robert Ochola, From the Graves to the Ground, Kenya Ms. Mathilda Flemming, International Secretariat, UNOY, The Hague Moderator: Mr. Peter Knoope, director ICCT Closing of the panels by a delegate of the Dutch PM

Practices in and reflections on development, security ... -

Panelists. Ambassador Mr. S.E.M. Sékou Kassé, Ambassador for Mali to the UN (TBC). Ms. Oulie Keita, Director of Programs of Freedom House, Board member of. Wanep Mali. Mr. Moussa Bambara Project Management and Conflict Management. Specialist at Governance team of USAID Mali. Imam Diallo Religious Leader ...

385KB Sizes 1 Downloads 165 Views

Recommend Documents

Practices in and reflections on development, security ... -
Panelists. Ambassador Mr. S.E.M. Sékou Kassé, Ambassador for Mali to the UN (TBC). Ms. Oulie Keita, Director of Programs of Freedom House, Board member of. Wanep Mali. Mr. Moussa Bambara Project Management and Conflict Management. Specialist at Gov

Synchrophasor Security Practices
Feb 22, 2011 - PMU's require new/more communication channels. • Potential of cyber intrusion. • Paper offers: – Best practices for mitigating cybersecurity ...

Zizzo et al_Comments and Reflections on Ethics in Screening.pdf ...
and PAE was reduced, and the potential social risks of a posi- tive screen were minimal, then an opt-out method may be pref- erable in an effort to increase participation and the success of a. screening program. Cost-Effectiveness of a PAE Biomarker

On closure operators, reflections and protolocalisations in Goursat ...
By defining a closure operator on effective equivalence relations in a regular cat- egory C, it is possible to establish a bijective correspondence between these ...

pdf-2980\bookless-in-baghdad-reflections-on-writing-and ...
THAROOR. DOWNLOAD EBOOK : BOOKLESS IN BAGHDAD: REFLECTIONS ON. WRITING AND WRITERS BY SHASHI THAROOR PDF. Page 1 ...

Principles and Practices of Youth in Development Work.pdf ...
"Social planning as an integral element of the 20. community work process". Discuss this statement. with help of an example. CYP-II 1 P.T.O.. Page 1 of 6 ...

On closure operators, reflections and ... - Semantic Scholar
By defining a closure operator on effective equivalence relations in a regular cat- egory C, it is possible to establish a bijective correspondence between these closure operators and the regular epireflective subcategories of C, on the model of the

Synchrophasor Security Practices
I. INTRODUCTION. Synchrophasor technology can be summarized as marking .... synchronous optical networks (SONETs), wireless links, and so on. There are ...

Security, development and political participation in ...
Apr 1, 2002 - amnesty policy for communist insurgents, which yielded dramatic results in ... entitled The Defence of Thailand 1994.7 The "Master Plan" argued that .... including near-universal primary schooling, good levels of basic health care, ....

SaaS Security Best Practices: Minimizing Risk in the Cloud - Media15
Aug 7, 2015 - To minimize risk in the cloud, we have established the following best ..... are accessed by the appropriate users in the appropriate computing.

reflections on the consequences of biocosmology in modern biology
based mainly on medicine, and are thus related to biology, my field of research. But the scope of .... meaning (the whole), but only at the end of the sentence.

SaaS Security Best Practices: Minimizing Risk in the Cloud - Media15
Aug 7, 2015 - OTP one-time password. SaaS software as a service. SBI security business intelligence. SCIM system for cross-domain identity management.

pdf-143\reflections-on-the-revolution-in-france-christmas-summary ...
Try one of the apps below to open or edit this item. pdf-143\reflections-on-the-revolution-in-france-christmas-summary-classics-by-edmund-burke.pdf.

Read Information Security: Principles and Practices
Jun 14, 2014 - Read Information Security: Principles and Practices (2nd. Edition) ... information security in all 10 domains ... increasingly rigorous compliance.