REPUBLIC OF GHANA MINISTRY OF COMMUNICATIONS. Ghana National Cyber Security Policy & Strategy

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "REPUBLIC OF GHANA MINISTRY OF COMMUNICATIONS. Ghana National Cyber Security Policy & Strategy"

Transcription

1 REPUBLIC OF GHANA MINISTRY OF COMMUNICATIONS Ghana National Cyber Security Policy & Strategy Final Draft July

2 Document Version Version Date Remark Ver. 1.0 March 2015 Final Draft handed over to Ministry of Communications Ver September 2015 Final version after Validation Workshop 2 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

3 Document EXECUTIVE Contact a. SUMMARY Table of Contents I. SECTION ONE: BACKGROUND i. CHALLENGES, DEVELOPMENTS WITH FOCUS ON THE POLICY... 7 ii. Overview... 9 iii. Global Regional Activities Initiatives on Cyber Security II. NEED FOR POLICY b. III. RELEVANT PROVISION ICT4AD 14 INTRODUCTION SECTION TWO: CYBER SECURITY POLICY DEFINITIONS CNII POLICY SECTORS FOR GHANA I. CONTEXT Legislative POLICY STATEMENT Cyber & Regulatory Framework Culture Security Technology Framework Research of security and Capacity Building Compliance & Development towards Self-Reliance Child Online and Protection Enforcement P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y iv. Local Initiatives...

4 Cyber Security Emergency Readiness c. International Cooperation I. SECTION THREE: NATIONAL CYBER SECURITY STRATEGY i. STRATEGIC ACTIONS FOR POLICY THRUST... ii. Strategy Specific Initiatives Implementation Timelines Policy Working Group... Awareness Program Center (NCSC)... Council (NCSCC)... National Cyber Computer Security Security Crisis Incidence Management Response Plan Team (NCSCMP) (National CSIRT) APPENDIX P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

5 GLOSSARY AU CCI Commonwealth Africa Union CERT Computer Emergency Cyber Response Initiative Council for Scientific and Industrial Team CSIRT Computer Security Incidence Response Research CNII Critical National Information Infrastructure Team CID COP Criminal Child Online Investigation Protection Department EOCO ETA Economic Electronic Transactions and Organized Act Crime Office GARNET FIRST Ghanaian Forum of Incident Academic Response and Research and Security Network Teams ICT4AD Information Development and Communication Technology for Accelerated ITU IMPACT International Multilateral Partnership telecommunications against Cyber Union ISOC/IEC International Organization for Standardization Threat Electrotechnical Commission / International LI Legislative Instrument 5 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

6 MDA NCA Ministries, Communications Departments and Authority Agencies NITA NitaCERT NITA National Computer Information Emergency Technology Response Agency NCSAW Awareness Program Team NCSCC Council Center NCSPWG NCSCMP National Cyber Security Working Crisis Management Group PKI Public Key Infrastructure Plan R& SIM D Research Subscriber and Identification Development UNECA United Nations Economic Module WG Working Group Commission for Africa 6 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

7 The more expansion EXECUTIVE people today of Internet in Africa, representing the largest growth in the world, means SUMMARY disruptive activities by tendencies cyber criminals have to defraud access has other to caused Internet, the with debate users its and attendant on cyber commit security risks cybercrimes. of attack to on from These the people top disruptive of with agenda for almost every country, and many countries are strategizing on how to combat cyber criminals. Several global initiatives are also addressing cyber crime and enhancement the on cyber security. crimes The and ITU s is IMPACT helping program these member is providing countries several secure member their countries cyber early space. warning The of Commonwealth countries adopt efficient Cyber Initiative cyber security (CCI) policies is another and initiative Infrastructure. that seeks to help commonwealth ratified At the continental by African Presidents. level, the African (AU) has developed a cyber security convention which was criminals remains The cyber prevalent defraud menace unsuspecting because Ghana of has inadequate Internet been more users laws of of cyber on large cyber fraud. sums crime The of popular money to prosecute sakawa in Ghana cyber where and criminals. abroad cyber The cyber as there Electronic crime. are legal However, Transaction gaps this caused is Act not by (2008) adequate rapidly has change for provisions law in enforcement the cyber law landscape. in enforcement the fight against There agencies is, cyber however, to crime fight the to of which fighting need need to the fully cyber to address brought menace. all under aspects Several one of umbrella initiatives cyber security, for are Ghana. on-going and apply to address a multi-stakeholder the cyber menace, approach all Africa Accelerated The Ministry (UNECA) Development of Communications, began a (ICT4AD) process Ghana in policy 2011 with to to the identify review support gaps some of as UN aspects a Economic result of the Ghana s Commission changing ICT ICT for 7 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

8 cyber landscape document. security and Cyber policy recent security and developments strategy is one of for the in Ghana four ICTs thematic that has were been areas not developed. under originally this The envisaged review policy and has and the nine put national in policy the pillars readiness and and includes international effective cooperation. governance, legal framework, technology framework, response cyber includes Five special establishment initiatives have of institutional been included frameworks, in the first creating five year awareness, strategic ensuring plan. These coordination initiatives implemented, security Ghana initiatives will have and a enforcement solid cyber security of cyber base standards framework in to Ghana. address When its cyber fully of needs. 8 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

9 a. SECTION ONE: BACKGROUND 9 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

10 I. i. CHALLENGES, Overview DEVELOPMENTS WITH FOCUS ON THE POLICY In a effect number recent on times, the of government cyber Ghana image has websites experienced of Ghana by and Internet a number are indications hackers. of cyber These of attacks security attacks including weakness have defacing a denting of our of cyber widespread information infrastructure infrastructure and many and countries but space. also Cyber ensuring are not attacks that only there have focusing are become very on good protecting very incidence sophisticated their responds critical and teams Since the place turn of to the respond century, to incidents we have cyber seen a security rapid growth incidents. growth various has brought its wake extensive cyber activities and of the subsequently Internet in Ghana. attacks The The biggest information challenge infrastructure is that the as designated well as cyber central fraud point popularly in the country known where as Sakawa. victims on of is many Sakawa under years resourced. to can apprehend report In to cases any the suspect when Police these because CID incidences Cybercrime of the lack had Unit of been is expertise not reported, visible in tracking nationally it has these taken and criminals cyber enough criminals using computers based were apprehended forensic and processed skills. To to make court, matters there are, worse, more when often, such convict legal basis to prosecute these criminal, as the legal system is inadequate not cyberspace and punish cyber criminals. Consequently, Ghana s image continues dwindle to For many years, and cyber therefore cafes considered have been as the a cyber main crime source prone of Internet country. access, as many in people could not afford the high cost of personal computers and Internet access and, as 10 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

11 a cyber result crime. of lack of operational guideline, cyber cafes have become fertile ground for Ghana s mobile The increased penetration mobile use penetration of has smart brought phones, stood about at especially % an increase with at in the the mobile introduction end of phone March of threats M-commerce, and The fraud. high likely There to is bring therefore more a need incidents to create like hackings awareness and of other risk of attacks cyber attacks to mobile and phone exploitations users. is for registered cyber mobile criminal all users. SIM continue As card a in to result Ghana engage of mobile but SIM there Box fraud, still fraud remain the and National other high crime fraudulent Communications in the activities. mobile space Authority as Until sector highly recently, driven. sensitive This Ghana s government result Internet has information been backbone that many using and government free resources officials services have been send such largely and Yahoo receiving private Google establishment making it vulnerable to information theft. However, since 2008, with and on a massive government of the National network Information rollout Technology to ensure efficiency Agency in (NITA), government Ghana operations embarked the and Data datacenter improved services facilities service to all that Ministries delivery enable to Departments citizens. NITA provide. The and result Agencies is and that webhosting NITA (MDAs) now and has services has Internet national under and government Public communication Key designated Infrastructure within government. second (PKI) level and There domain Digital is (.gov.gh) the Certificates need NITA of is a also strong to enhance implementing public secure private the partnership the private and in crafting public sectors. our national cyber security policy to take care of the interests of 11 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

12 Cyber ii. Global Security Activities is central on to Cyber the Information Security have countries high levels of networked computers and knowledge automation economy. stand greater Countries risks which with less developed with less developed network infrastructure networked strive computer become infrastructure. a knowledge As many society, countries than network African Internet countries infrastructures where will over be the rolled last out few with years, automation. massive submarine This is evidenced fiber optic in many backbones transit have landed on the shores and massive in-country fiber cable bring a proportionate are being risk rolled to critical out. An information increase infrastructure. network computer infrastructure optic will For have developed many been years, working many around countries securing with high their degree critical of information networked infrastructure computer infrastructure crimes. cyber security policies and strategies to mitigate cyber incidences and have and access place No one information country control from the cyber Internet. space It and is therefore everyone very from important anywhere that in countries the world put can swift response robust security systems around as risk critical of attacks national cannot information eliminated. infrastructure Additionally and set using up very an in international is also essential. approach of cooperation to secure cyber space and mitigate cyber crimes Many already responses countries have Computer with high Security networked Incidents computer Response infrastructure Teams (CSIRTs) and global in place companies incidences. to However cyber incidences developing are economies, coordinated very to few mitigate CSIRTs the have impact been of where setup, cyber 12 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

13 although infrastructure it is expands. top of the agenda for many of these countries as networked computer The Partnership a International against Telecommunication Cyber Threat (IMPACT) Union program (ITU) through has over the the International last few years Multilateral around leadership the world. role is Today, providing IMPACT early warning has over systems 152 countries and training members. cyber ITU security has experts indeed played developed developing a policies framework and strategy for developing around cyber countries security. to help them kick start a process of Forum Computer recommendation of Incident Security and Response Incidents through Response a and rigorous Security standards Teams Teams (CSIRTs). process. (FIRST Membership Inc.) is a global to FIRST forum is by of The elaborated Africa Budapest and the by USA. Convention the Council The Convention on of Cyber Europe Security is with open the to which participation any country has been which of in Canada, force wants since Japan, to participate South was The 100 countries. convention is used as a guideline, reference standard or model law in more than Governments iii. Regional in Initiatives Africa iatives cyber countries. security. Many A countries decade today ago, have have infrastructure invested moved the massive was ICT a major discussion in-country challenge infrastructure from to infrastructure many and African the to connectivity coming and up and many access African challenge countries is has waning. opened The up networked cyber space computer to many more infrastructure Africa accompanying and Kenya already this, the have risk a of CERT using in the place. Internet. Many A countries few countries are also like Tunisia, in the process citizens South 13 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

14 of to (AU) developing harmonize and the cyber the UN development Economic security policy Commission of and cyber strategy security for Africa (including policy (UNECA) and formation strategy, have of developed CERTs). the Africa In a Union cyber order security Ratification fight against and of cyber cybercrime the convention, crime. convention it can and be argued, has been will ratified foster by regional African cooperation heads of States. in the In annually for 2010, African AfricaCERT in countries. different Africa was formed countries and on have the been establishment undertaking and capacity management building of program CSIRTs Today s iv. Local society Initiatives As threat networked to business computer thrives and communication. virtually infrastructure on using expands the Internet in the for country, communication there is and increasing business. Recent the incidences development several have cyber been of attacks a uncoordinated cyber on security government and policy in websites many and cases, strategy. in Ghana there Resolutions is were a wake-up no of reporting call cyber for The structure National put in Information place to guide Technology dealing Agency with future (NITA) s attacks. the Departments government and network Agencies initiated (MDAs) discussion to setup a amongst NITA Computer concern stakeholder of Emergency ensuring the security Ministries, Response of team incidences (nitacert) within the to government coordinate network. cyber incidences and assist in resolving future 14 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

15 The Team was Ministry (CERT) of project Communication in 2013 in initiated collaboration the national with the ITU-IMPACT. Computer Emergency The national Response early established in August 2014 is fully operational handling incidents and sending CERT institutions warning such to as its Ghanaian constituents. Academic The and National Research Security Network Council (GARNET) and in many academia other out are The working SIM registration on different by projects NCA is towards another securing initiative cyberspace. using Unit to mobile alleviate phones. cyber The and Ghana other related Police crimes. Service The has to mitigate also Economic put cyber in and place crimes Organized the cybercrime committed Office Center (EOCO) for the financial under the sector Attorney are all General s government Department initiatives and geared Financial towards Intelligence mitigating Crime crime On the in business general and side, computer the opening crime of in an particular. organizations investigate cyber crime thoroughly e-crime and Bureau improve in Ghana protection has of greatly cyber space. helped on In needs spite cyber to all be security these addressed. initiatives, amongst the the fact consuming still remains public that of there ICT is products a general and lack services of education which As Ghana II. NEED strives FOR to POLICY increased will compete emphasis on information on become informational and an computer information activities systems and and the knowledge information will work efficiently economy, industry. on there Businesses the is right an 15 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

16 information nations the to protect to produce critical the national output information required. infrastructure It is becoming to ensure extremely national necessary security for for citizens. wake of As recent networked cyber wars, computer and ensure infrastructure a safe cyber increases, space there to enable will be wealth an increase creation in attacks the information on critical and information knowledge infrastructure society. There that is therefore is required an to increasing sustain the need economy to protect of in critical system and ensure national when national any information attack security. is made infrastructure on the CNII, (CNII) to and avoid create loss of a robust revenue incidence due to down response time The that national users, need to especially create a children, security culture of the Internet by creating are exposed awareness to must of the be enormous addressed threats Internet cyber are exposed security and policy. the Awareness vulnerabilities creation our (education) phones, computers of the risks and users PDAs of by the to a can business economy drastically are where involved. reduce Ghanaians This cyber will can incidences create a wealth very with conducive its in peace consequential environment without loss fear of in of harassment the revenue information when cyber criminal and fraudsters. by Government other same public way, Internet business many and businesses can phone be brought services may to grind a are halt to attacked. if a the halt NITA if There the infrastructure is therefore is of attacked. the ISPs need and to In develop security order risks technical to government capacity of and local private technocrats sector critical to enable information them manage infrastructure. the cyber management to share of knowledge all critical information on incidence infrastructures response and (both ensure public that and there private), is a uniform the policy risk In 16 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

17 must partnership address model. the need for a central coordinating body and work with a public private III. Pillar RELEVANT 14 of the PROVISION ICT4AD policy ICT4AD cybercrime. international The cooperation pillar among and building other relates things infrastructure to Security places emphasis for Agencies security using on agencies capacity ICT to to building, combat them use ICT to combat crime. Additionally, the pillar is to ensure that the legal enable offenders. policy is up to date to help law enforcement agencies prosecute any cyber text crime of The prescribes fight Electronic against punishment cyber Transaction crime. for cyber Act (ETA) crime 2008 perpetuators. has specific The legislation Act addresses on cyber issues crime on and the The protection Data Protection of private data Act of which government, has been citizens passed and by businesses the Parliament Ghana. of Ghana ensures The as wealth. a Pillar means 14 of and mitigating the ETA cyber fail to incidences capture a that holistic may approach affect the to ability securing of citizens the cyber to create space The what cyber several different security. on-going agencies A initiatives National of Government, which Cyber are academia Security not coordinated and framework business makes covering are it impossible doing policy to enhance to know implementation the national cyber strategy security done of Ghana. holistically will ensure coordination and greatly enhance and 17 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

18 b. SECTION TWO: CYBER SECURITY POLICY 18 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

19 INTRODUCTION Ghana s people that a people are determination free with from a culture cyber to secure attacks of cyber its with cyber security devastating space achieved is driven effects. through by This a desire awareness is informed to ensure creation by that the and fact our capacity occur. reduces Our building the ability number are to identify in of a actual better and attacks position understand significantly to handle threats cyber and attacks how enhances they as can and the be continuous when handled they operation interest only to government and of security the national but of the also infrastructure nation. to operators We also on who which recognize provide critical that public information the services threat are is to not citizens held restricted and the private networks, thus the need for private public partnership. DEFINITIONS For the purpose of this policy document, and destruction Critical virtual), National would systems Information have and a devastating functions Infrastructure that impact are (CNII) on: vital may to the be nations defined that as those their incapacity assets (real or National Confidence market while economic that maintaining the strength nation's favorable key growth standards area can of living. successfully compete in global 19 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

20 National image National Projection defense of national and image security towards enhancing stature and sphere of influence. Government Guarantee sovereignty capability to and functions independence whilst maintaining internal security. Public Maintain order to perform and deliver minimum essential public services. Delivering health and and managing safety optimal health care to the citizen. CNII on Countries SECTORS identify FOR the GHANA Ghana, them the can following affect factors sectors CNII mentioned based have been the above. identified level For of networked the as CNII purpose sectors: computers of policy as and it relates how attacks to National Banking Information and Defense and Finance Communications and Security Energy 7. Transportation 8. Water 9. Health Government Emergency Services services 20 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

21 VISION 10. Food and Agriculture A in community secure a safe and cyber protecting stable space, connected Ghana s with a well-researched Ghana cyber with space Internet and equipped trained users with working academic global and and creating standards professional wealth responding efficiently prosecute swiftly to cyber criminals. incidents, and with up-to-date laws and systems in place and to To MISSION identify, STATEMENT threats measures posed analyze, on identified address critical and remediate national information the immediate infrastructures and potential (CNIIs) cyber and security and meet the in place countries that cyber will adequately security needs. regulate and secure the system infrastructures put POLICY This policy SCOPE against research, cyber and covers development crime, all creating aspect of of cyber public cyber laws awareness, security and legal and investment measures, national response in national education, including security, scientific, fight enforcement rephrase sentence) and protection of critical national information infrastructures. (We can law 21 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

22 POLICY Ghana, CONTEXT uncoordinated Many like many initiatives developing are being economies put place faces to the secure risk the of cyber-attacks. space of Different custodians of critical national information infrastructure are unaware of their Ghana. behind ensuring the national the maintenance policy is the of cyber realization security that within a combination the country. of persistent The driving computer force roles vulnerabilities infrastructures and at risks. worldwide connectivity has placed the national critical information In heightened taking Africa, place Governments threats to ensure to national that are legal discussing information systems how infrastructure. are to updated secure their to Several enable cyberspace national proper in persecution initiatives the wake are of of cyber The threat criminals. Union of African Commission countries that cyber-attacks to in develop fighting cybercrime a pose convention to African and at ensuring the governments regional cyber level security. has to prompted harmonize the the African efforts The the awareness national cyber security information policy will infrastructure. address major The cyber policy risks seeks facing to Ghana address from the attacks lack on problem of of Sakawa risks users which and has businesses tagged as face a doing haven business of cyber in fraudsters cyber space. will The be of addressed base, building systems by the and policy. technology The policy framework also addresses for combating the need cyber-attacks to develop and knowledge cybercrime for and cyber in the security near future expects create to make a culture Ghana of cyber self sufficient security in in Ghana. the fight capacity against 22 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

23 The National systems National of Information ten Cyber critical Security Infrastructure sectors. Policy (CNII) (NCSP) which seeks comprises to address the the networked risks to information the Critical The to ensure develop policy recognizes and establish the a critical comprehensive and highly program interdependent and a series nature of of frameworks the CNII and that aims developed the to effectiveness ensure that the of CNII cyber are security protected controls to a level over that vital commensurate assets. It is the being risks will faced. The economy regulatory, policy and has will been based designed on to a number facilitate of Ghana s frameworks move that towards comprises a knowledge-based aspects. technology, public-private cooperation, institutional, and legislation international and 23 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

24 Effective I. POLICY Governance STATEMENT Government promote the gains effective from will any cooperation centralize initiatives, coordination government between public will of establish national and private formal cyber sectors. and security encourage In order initiatives to informal sustain and information sharing exchanges. Legislative Government & through Regulatory the Framework reviewing nature of cyber and enhancing security threats. Ghana s Attorney In order laws General s relating to empower department to cyber national space set law up to enforcement a address periodic the process agencies dynamic of to capacity laws. properly building prosecute programs cyber to security acquire new crimes, skills Government and effective will ways establish of enforcing progressive and in Government harmony with will international ensure that laws, all applicable treaties and local conventions. legislation is complementary cyber to Policy Cyber Security measures Technology will be put Framework framework that specifies cyber in place security to develop requirement a national controls cyber and security baselines technology for CNII 24 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

25 elements. evaluation/certification This will program be accompanied for cyber security will product mechanism and systems. to implement an Culture Government of security will invest and Capacity every resource Building national security, culture government of security. will support As part the of standardization the needed process to of and develop, development coordination foster of of and culture cyber maintain of security cyber a awareness also: and education programmes across all elements of the CNII. Government will Establish Identify the national an effective level mechanism for cyber security knowledge dissemination at professionals minimum requirements and qualifications for information security Research In order for & Development Ghana to become towards self-reliant Self-Reliance commensurate prioritization of with cyber the security risk, research Government and in protecting will development formalize the CNII activities the to coordination a enlarge level that and is strengthen encouraged properties, the technologies by cyber promoting security and the innovations research development community. through and focused Research commercialization research and development and of development. intellectual will be Government industry. will also put measures place to nurture the growth of cyber security 25 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

26 Compliance In order to ensure and Enforcement be Government put in place will to also standardize compliance strengthen cyber and the enforcement, security monitoring systems policy and across enforcement measures all elements and of mechanism standards of the CNII. and will develop a standard cyber security risk Management Framework. Child Policy Online measures Protection industry, Government Civil Society, will be implemented and relevant through international multi-stakeholder child online working protection by government concerned and will create encourage awareness dialogue of the possibilities national and and dangers local of levels the Internet. to engage agencies. all Cyber To ensure Security cyber Emergency security Readiness stakeholders will include the will development effective emergency and cyber strengthening security readiness, incident of the government reporting national computer mechanisms. together with security This all incidence advisories business response and threat team warnings (CSIRT) in a and timely sector manner CSIRTs, and the dissemination development of of vulnerability elements continuity management framework. The government will also encourage a standard assessment of the programs. CNII to monitor cyber security events and perform periodic vulnerability all 26 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

27 Policy International measures Cooperation relevant Government international will will make be cyber put every in place security effort to encourage to bodies, promote panels the active active and participation participation multi-national in of Ghana all agencies. relevant in all international conference. cyber security activities by hosting an annual international cyber security 27 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

28 c. SECTION THREE: NATIONAL CYBER SECURITY STRATEGY 28 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

29 For FIRST each 5 YEAR policy thrust, CYBER specific SECURITY strategic STRATEGIC actions will PLAN be implemented ( ) year other strategic plan. actions These from actions other policy may thrusts. be implemented in isolation or under in concert the first with 5- Action I. STRATEGIC ACTIONS FOR POLICY THRUST Item Effective Policy Thrust Action Plan Policy Drivers Collaborators Governance 1. Government institutions structure to and ensure will put set long term in up place cyber governance sustenance security Ministry of information Cyber Security exchange. activity Action including Communications, of National Council, will be NCA, Security 1. taken business partnership as and collaboration Institutions). civil society of The (public government, to be setup include: institutions private General Attorney NITA, National Cyber Computer Security Council Incidence Response Center (CSIRT) Security 4. National Cyber Security Policy Team Legislative Working Group Regulatory Framework and 1. Government Review Attorney General s Committee will set Department up under Cyber to Law the do Attorney General s Department, Ministry Communication, Ministry of of P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

30 3. Cyber Technology Framework Security a accommodate cyber study environment on the legal laws challenges and of child Ghana online the to protection year Stage 1: identifications and review of every issues three the Stage cyber 2. Review environment current laws on in cyber Stage amendment environment 3. Make of national recommendations laws for 1. Government stakeholders international in will information collaboration review and / with adopt cyber key security robustness series, standards of NIST, CNII such etc sectors as increase ISO/IEC ensure Government safety in cyberspace for all and expand scheme the and national its partners certification will also management standardized for & information assurance. Digital Forensics security 2. Investigations will the be developed Standards that will be and used Model law academia enforcement to teach agencies students, and to train be by used witnesses by in the cybercrime lawyers cases. and expert Forensics 4. Setup professional strong 3. A NITA Interior, Professional Security Associations, Standards Organizations, Universities Professional Certification and Centers association such as Digital 30 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

31 4. Culture of Cyber Security & Capacity Building 5. Research Development towards Self & Reliance 1. Association Efforts number will of Ghana incidents of Information/cyber through made to improved security reduce awareness development including children creations for by all & developing stakeholders online skill National program Cyber and portal Security targeted Awareness at all a stakeholders using different by packaging content for providers 2. demographics. Capacity will be built through different increased information certification course an prepare Ghana and for cyber self-reliance security on to 3. cyber Targeted security. capacity building will be in implemented cyber to improve investigation for prosecution law and enforcement enforcement of cyber on 1. crime A Security National in Ghana. that will R&D be developed roadmap for to Cyber attending Ghana to will its cyber self security sufficient ensure 2. Technologies relevant & desirable needs. 3. CNII Domain will competency be developed. development for will 3.1. be Natural Industry provided growth for: of Cyber Security Ministry Communications, of Nongovernmental Organizations, Universities, Professional Certification Centers Cyber businesses Ministry Communications, of Ministry Education, Universities, of Council Scientific Industrial for Research and (CSIR), Professional Certification 31 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

32 6. Compliance 7. Cyber Build Updating Research R&D Labs roadmap at Universities regularly Centers, Enforcement & 1. A framework national Risk for CNII Management will be developed to CNII. ensure a uniform framework for all Communications Ministry of NITA, Ministry Environment, NCA, Science of technology, Professional & Security Private Sector Bodies, IT (Finance, Network Operators), Research Education Network and Emergency Readiness Security 1. A cyber for framework swift attacks responses for and mitigation ensuring to attacks of structures risk that of Ministry threaten Setup national of National security Cyber through: Communications of National Council, management National Cyber Committee security council) (under Crises Sector Security (Financial, Private Operators), Positioning CSIRTs in the National line of and responding sector Ministry Interior, NITA of to Setup Management emergencies of National WG Cyber continuously Crises reviewing recommendations by committee structures to be and acted making on 2. Organize Hacking Workshops to 32 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

33 8. Child 9. International Online exploit vulnerabilities systems and identify Protection Develop children which ensures as a framework they engage that for with the protection the Internet of 1. Ensuring Structures put that in place Organizational for agencies A Technical Monitoring Framework and Procedural 2. Capacity Measures stakeholders for working with all raising and Building public education. Awareness Legal Implementation Cooperation Measures and International Cooperation Ghana international online will cyber engage security in and relevant prioritize protection meetings child sign engagement and join and conventions International/regional or and stakeholders work together to address children s online risk by Ministry Communications of Ministry Gender, and of Protection; Social Children Ministry Interior, of Educations Ministry of Ministry Foreign of Ministry Communications, National of Council, of Ministry Security Ministry Interior, of Affairs. Gender Child Protection and and Social 33 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

34 34 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

35 The i. policy Strategy will be Implementation implemented in three Timelines stages: Short STRATEGY Term TIMELINE Year 1-2 ACTIVITIES analyze up Identifying institutional vulnerabilities CNII structures and addressing and and put creating g place immediate public stop gap awareness Concerns measures Identify while setting CNII, The Effective - short Implement governance term will focus Action on 4 following to assist policy ministry thrust: CNIIs, other stakeholders evaluate vulnerabilities put in place a and stop gap of develop communications measure measures to identify and address Begin building immediate institution concerns. by implementing Actions 1-3 to Cyber Culture of Implement Cyber Security - Security Implement Emergency Action Action 21 Readiness to to begin develop awareness framework creation Child stakeholders Online Coordinate Protection with local Develop universities framework or existing for engaging entities with to help all with Set leading the up expert the expertise. COP group stakeholder advising Committee the national to Government serve as the Ghana. formulation (Other and actions implementation stipulated of in a the national Ghana COP COP plan strategy) on for the Medium Term Year 3-4 Building standards the and infrastructure institutional - arrangements Setting-up the (mechanisms) necessary systems, and building process, 35 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

36 capacity The Culture medium of amongst Cyber term Security researchers will focus & Capacity on and following information Building policy security thrust: professionals Research Implement & Development Action 1 Compliance Implement Actions towards 1-2 and Self Reliance Implement and enforcement Action and accompanying accompanying infrastructure infrastructure Long Term Year 5+ Developing Legislative - Implement and self-reliance Regulatory Action 1 Framework and professionals, improving monitoring the mechanisms the - in mechanisms terms and creating of for technology compliance, the culture as evaluating of well cyber as security The Cyber long Security Continuous term strategy Technology review will focus and Framework improvement on following policy thrust: Compliance Enforcing & Enforcement Culture compliance of cyber security adopted Risk Management framework within CNII for - Continuous awareness creation Details ii. Specific of Specific Initiatives are attached in the appendix. initiatives including strategic objectives, estimated cost and drivers 36 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

37 APPENDIX 37 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

38 The Implementation TECHNICAL Strategy: PROPOSAL Programs and Initiatives APPENDIX -1 (STRUCTURING THE IMPLEMENTATION STRATEGY PROGRAMS AND INTIATIVE) Program Title of Program/Initiative Strategic National Cyber Security y Policy Working Group Objective To sectors assist MoC to collate all cyber security initiatives To identify critical national information infrastructure in medium support as term defined policy strategy drivers by the to policy setup structures for Relevant To Cyber design Security and implement Awareness a program comprehensive National Background Policy Achievable Objective to Program National & Goals /Initiative ICT4D National In order to Security, have continuous Law and order activity and on enhanced the Cyber cyber security Security policy and strategy, it is proposed that the current Adhoc technical 38 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

39 ensure committee (WG) to a keep quick for cyber the implementation momentum security be of converted the policy cyber to and security a strategy. Working agenda Group to Description of Program/Initiative The made which National up composition of current Cyber represent policy Security drafting a Policy public Adhoc private WG technical (NSCPWG) collaboration committee will and be by bottom-up overcome virtue of any approach. the shortfall selection New in skill of the members such members, as legal may also expertise be represent added in to a Working Communication conversion Group. from The the NCSPWG Adhoc Technical will assist Committee the Ministry to the that require immediate to establish attention recommended such as specific the awareness programs of Program/Initiative Rationale Implementation The between campaign rationale for the for first the setting year of up the of policy. the the adoption of the WG and is the to avoid implementation any vacuum of awareness long term structures creation. of the policy as well as begin a process of Program/Initiative Specific Goals Implementation Support implementation Develop implementing of strategy agency to begin actual Cyber Security Security, Awareness a National including Awareness portal the creation Creation of National Program Cyber on Program/Initiative Timeframe One Assisting structures policy for the implementing achievement agencies of long term to build goals the role (may after year be extended first in active year if engagement necessary) with but will policy continue implementation in advisory Program/Initiatives Deliverables and Target 39 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

40 National Program/Initiative Program Cyber Security (NCSAP) Deliverables Awareness Time 3-months Bound Measurable form policy adoption (TBM) Target Identification National Cyber of Critical Security (NCSP) National Awareness Portal 6-months from adoption of policy Information the concerns. Policy (CNII Infrastructure ) and immediate as prescribed by 12- Months from adoption of policy Program /Initiative: Output, Outcome and Beneficiaries and Estimated Cost NCSAP activities, Document will well online detailing informed activities awareness professionals etc. and program budget. and including, The citizens outcome workshops, on of threats program media beneficiaries cyberspace and will how be government they can guard security against professional, these threats. citizens The main and NCSP Oversee businesses the in creation Ghana. support downloads and support of Interactive where citizens Portal can with report all relevant incidences, information, Outcomes and will receive include updates a one stop of latest shop for cyber citizens security and information. business seek find citizenry, everything government on cyber and security. businesses The Ghana. main beneficiaries are the to CNII Oversee NCSPWG Infrastructure investigative will and assist determine work selecting critical to determine consultants ones based the to National policy do exercise. documents. Information outcome expansion will be a document with all details of CNII as it today The Government plans for next five years. The main beneficiary and Members of NCSWG of Ghana. must be rewarded for role for the period when is 40 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

41 COST seating WG they meets are allowance actively monthly, involved and estimated expenses in implementation. Budget cover of for GHC100, any This activity must performed. include year If a (seating any programme entity allowance+ in related support costs meals of as this + well venue) plan, or we ( it In simply will order be refer to appropriate get to the this buy-in budget to state from OVERHEADS.) as Project Implementation Management, Monitoring and Evaluation Agencies Supporting and their Implementation Supporting Implementation Responsibilities Assignment Ministry of Communications Agency Oversight Assigned of NCSWG, Responsibility National Security Council funding Technical/security / monitoring and project CNII input for evaluation creation and of new cyber advisory security for defining National Technology Information Agency/ National structure Communication Authority Technical collating CNII, advisory web and portal guide on Program Program/Initiative Success /Initiative Factors Critical Commitment WG members of members to work to implement policy, motivation of Implementation Risk Factors Inactivity Communications of WG members or lack of needed support form Ministry of Non Additional Comments and Remarks 41 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

42 (STRUCTURING THE IMPLEMENTATION TECHNICAL APPENDIX STRATEGY PROPOSAL 2 The Implementation Strategy: Programs PROGRAMS and Initiatives AND INTIATIVE) Program Title of Program/Initiative Strategic National Cyber Security Awareness Program Objective Objectives To To define Security Awareness Goals and General To identify Public) Intended Audience ( Stakeholders, Identify define Topics to be covered Current Training Needs obtain Support establish Security Policy define Delivery Methods to be used develop a Strategy for Implementation design develop Awareness Training Evaluation Strategy Strategy Methods Relevant To create a National Awareness portal Policy Objective Achievable & Goals National ICT4D Background to Program /Initiative The Culture to stimulate, National motivate, Cyber Security and remind Awareness the audience Program what shall is be used of Cyber Security, Awareness creation 42 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

43 Description of Program/Initiative The to expected National of them. train different Cyber stakeholders Security Awareness on different Program aspects is a of program security consummate with the intent with of the helping risks to them avoid provide incidences a reasonable of cyber assessment, attacks. This will take the form of identification, cyber stakeholders. training and evaluation of different sets need awareness portal The that program will establish will include a permanent a cyber awareness security of Program/Initiative Rationale Implementation The campaign rationale the for the internet and informed take appropriate community setting preventive is able up the to measure Awareness foresee any to Campaign overcome possible attack is such that Program/Initiative attacks. and the general The campaign public to will help be develop targeted culture at main of cyber stakeholders Specific Goals Implementation To develop level of awareness in the community security. to To mitigate media and risk other of cyber awareness attacks programs by workshops, mass access develop to information a national on awareness cyber security portal and for easy Program/Initiative Time-Frame On-going downloads program. In the quick first fixes year, it is proposed that the National and responsible hand Cyber over for to ensuring Security the emerging Policy that the WG organization country begin attains work that on a will level the be program awareness to mitigate cyber incidences. of Program/Initiatives Deliverables and Target Program/Initiative Deliverables Time Bound Measurable (TBM) Target 43 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

44 Start National Detailed Cyber Awareness Security Program Time Portal table 6-months 3-months Policy Adoption program of Delivery of Holistic Awareness 12 Months from adoption of of policy Program /Initiative: Output, Outcome and Beneficiaries and Estimated Cost National Awareness Cyber Program Security Informed cyber work in incidences emerging stakeholders information and and crimes. public. economy Citizens Outcome in and peace in business substantial to create in worth. reduction Ghana can in level Estimated Internet of protection users cost of Ghana against entire should program threats Know online for 5 how years get will themselves be about a GHC2.5m basic National Awareness Cyber Portal Security One for year stop one. shop Annual cyber budget security of alerts, about quick GHC500, downloads through on emerging threats. Interactive portal where questions and can information Estimated web cost 2.0 of applications. portal creation Outcome and maintenance will be informed year community. be one asked GHC10, GHC20, Subsequent year may be down to less than is Project Implementation Management, Monitoring and Evaluation Agencies Supporting and their Implementation Supporting Implementation Responsibilities Assignment Ministry National of Cyber Communication Agency Security Policy & Assigned Responsibility WG Security (year Council one). National and Center Cyber Oversight of program; funding, take over by end of year 2 to monitoring ( Capacity building and evaluation after year 2) National Technology Information Agency/ National Technical web portal advisory development. and guide Capacity on 44 P a g e N a t i o n a l C y b e r S e c u r i t y P o l i c y & S t r a t e g y

REPUBLIC OF GHANA MINISTRY OF COMMUNICATIONS. Ghana National Cyber Security Policy & Strategy

REPUBLIC OF GHANA MINISTRY OF COMMUNICATIONS. Ghana National Cyber Security Policy & Strategy REPUBLIC OF GHANA MINISTRY OF COMMUNICATIONS Ghana National Cyber Security Policy & Strategy Final Draft March 2014 EXECUTIVE Document Contact a. SUMMARY Table of Contents I. SECTION ONE: BACKGROUND i.

More information

Making our Cyber Space Safe

Making our Cyber Space Safe Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

Kenya s Experience in CERT Implementation

Kenya s Experience in CERT Implementation Kenya s Experience in CERT Implementation Commonwealth Cybersecurity Forum 2015 22-24 th April 2015, London, UK Outline Cybersecurity Agenda in Kenya Cybersecurity Governance Framework in Kenya ITU Technical

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Cybersecurity and Cybercrime. Ministry of National Security

Cybersecurity and Cybercrime. Ministry of National Security Cybersecurity and Cybercrime Ministry of National Security Objective of Presentation What is the nature of Cybersecurity and Cybercrime? Purpose of Legislation Potential Impact on business operations What

More information

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks

More information

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014 Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014 1 July 2014 RESTRICTED 1 ICT as a Modern Solution Security Threats, Early Detection and Prevention

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013 State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council

More information

Cyber Security @ ITU. By Tomas Lamanauskas, ITU

Cyber Security @ ITU. By Tomas Lamanauskas, ITU Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and

More information

Cybersecurity Initiatives

Cybersecurity Initiatives Port Vila, 20 November 2014 The Government of The Republic of Vanuatu Cybersecurity Initiatives Telecommunications & Radiocommunications Regulator By Louise Nasak, Technical and Internet Governance Manager,

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

National Cyber Security Strategy of Afghanistan (NCSA)

National Cyber Security Strategy of Afghanistan (NCSA) Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

Ministerie van Toerisme, Economische Zaken, Verkeer en Telecommunicatie Ministry of Tourism, Economic Affairs, Transport and Telecommunication

Ministerie van Toerisme, Economische Zaken, Verkeer en Telecommunicatie Ministry of Tourism, Economic Affairs, Transport and Telecommunication SME Policy Framework for St. Maarten May, 2014 Department of Economic Affairs, Transportation & P. 1 of 16 TABLE OF CONTENTS 1. Introduction 2. SME Developments in St. Maarten 2.1 Definition 2.2 Government

More information

ITU Global Cybersecurity Agenda (GCA)

ITU Global Cybersecurity Agenda (GCA) International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund

More information

RWANDA CONTRIBUTION TO CWG-INTERNATIONAL INTERNET RELATED PUBLIC POLICY ISSUES.

RWANDA CONTRIBUTION TO CWG-INTERNATIONAL INTERNET RELATED PUBLIC POLICY ISSUES. RWANDA CONTRIBUTION TO CWG-INTERNATIONAL INTERNET RELATED PUBLIC POLICY ISSUES. (Ref: CL-13/168 of 22 November 2013) 1.0. Introduction Since 2000, the Government of Rwanda (GoR) embarked on a 20 year journey

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

National Cyber Security Strategy 2015-2017

National Cyber Security Strategy 2015-2017 National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National

More information

Cyber Security Bangladesh Perspectives. Reza Salim*

Cyber Security Bangladesh Perspectives. Reza Salim* Cyber Security Bangladesh Perspectives by Reza Salim* Paper prepared for ITU WSIS Thematic Meeting on Cyber Security ITU Headquarters, Geneva, Switzerland June 28 - July 1, 2005 * Reza Salim, Associate

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

National Cyber Security Policy (Draft) March 2015

National Cyber Security Policy (Draft) March 2015 National Cyber Security Policy (Draft) March 2015 ACRONYMS Acronym AMIS CCIP CIIs CMU CS CSIRT/CERT CSOC DDos EA EDPRS EU e-gov FDI G2B G2C G2G GDP GEA GoR GSA HMIS ICT IEC IOS IT IaaS ITSD KIST KLab MOD

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

Cyber security trends & strategy for business (digital?)

Cyber security trends & strategy for business (digital?) Cyber security trends & strategy for business (digital?) Presentation by Anwer Yusoff Head, Industry & Business Development C y b e r S e c u r i t y M a l a y s i a NATIONAL CYBERSECURITY TECHNICAL SPECIALIST

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

TRINIDAD AND TOBAGO CYBER SECURITY AGENCY POLICY AND BILL

TRINIDAD AND TOBAGO CYBER SECURITY AGENCY POLICY AND BILL TRINIDAD AND TOBAGO CYBER SECURITY AGENCY POLICY AND BILL Presented By: Sunita Ramsumair Legal Officer Ministry of National Security September 29, 2014 Format of Presentation Background Trinidad and Tobago

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka Overview of ITU Cybersecurity Activities NGN Migration Strategies and Access Modernization 26 May 2011 Dhaka Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific 1 Agenda Why Cybersecurity?

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl

More information

Qatar Computer Emergency Team

Qatar Computer Emergency Team Cyber Security Division Qatar Computer Emergency Team An initiative Introduction Qatar aims to fully exploit information and communications technology to become one of the most successful knowledge-based

More information

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015.

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015. Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Sudan Paper Presented by Sudan Ministry of Trade The views reflected are

More information

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document

More information

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that: 3 rd EAIGF (2010 EAIGF) rd EAIGF 11 TH 13 TH AUGUST 2010, KAMPALA, UGANDA SECURITY MANAGEMENT IN EAST AFRICA: The East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant

More information

MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017

MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017 MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO - Podgorica, July CONTENTS 1. INTRODUCTION... 3 2. DEFINITIONS... 5 3. CYBER SECURITY MANAGEMENT SYSTEM... 8 3.1 METHOD OF MONITORING STARTEGY

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT

BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT Presenter: C. MASIGA Event: ICT PITSO 2015 Date: 25/08/15 PRESENTATION OUTLINE Current Situational Analysis Remedial Actions for CSA Expected Benefits

More information

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY

More information

Cybersecurity Strategy of the Republic of Cyprus

Cybersecurity Strategy of the Republic of Cyprus Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE

More information

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis Westlaw Journal Computer & Internet Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 31, ISSUE 14 / DECEMBER 12, 2013 Expert Analysis The Cybersecurity Framework: Risk Management

More information

Memorandum Cybersecurity - how should the legislation meet the new challenges?

Memorandum Cybersecurity - how should the legislation meet the new challenges? ! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact

More information

Tentative Action Plan

Tentative Action Plan Republic of Serbia Ministry of Science and Environmental Protection Serbia and Montenegro Tentative Action Plan Draft 1 Belgrade, September 2005 Tentative Action Plan - Draft 1 Section 1 and 2 Information

More information

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

More information

CISSA Cybersecurity capacity building workshop. May 2015

CISSA Cybersecurity capacity building workshop. May 2015 CISSA Cybersecurity capacity building workshop Good Practices in Developing Cybersecurity and Cybercrime Strategies Prof Anthoni van Nieuwkerk Centre for Defence and Security Management University of the

More information

Draft WGIG Issues Paper on E-Commerce

Draft WGIG Issues Paper on E-Commerce Draft WGIG Issues Paper on E-Commerce This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members, but it does not

More information

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For

More information

Global Cybersecurity Index Good Practices

Global Cybersecurity Index Good Practices AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section

Transnational Challenges and Approaches to Investigating Trafficking Offences. Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Transnational Challenges and Approaches to Investigating Trafficking Offences Ilias Chatzis, Chief, Human Trafficking and Migrant Smuggling Section Trafficking in persons: a low risk / high profit crime

More information

Cybersecurity Governance

Cybersecurity Governance AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional

More information

COMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011

COMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011 COMMISSION DE L UNION AFRICAINE REPUBLIQUE DU SENEGAL ---------------- MINISTERE DE LA COMMUNICATION, DES TELECOMMUNICATIONS ET DES TECHNOLOGIES DE L INFORMATION ET DE LA COMMUNICATION AFRICAN ICT MINISTERIAL

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

SRO-EA s Cyber security Initiatives in Eastern Africa

SRO-EA s Cyber security Initiatives in Eastern Africa UNECA Sub Regional Office For Esatern Africa SRO-EA 2010 EAIGF 11-13 August 2010, Kampala, Uganda SRO-EA s Cyber security Initiatives in Eastern Africa Mr Mactar SECK United Nations ECA SRO- EA Key Categories

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES GERMANY September 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy

More information

AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION)

AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION) AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION) AG/RES. 2004 (XXXIV-O/04) ADOPTION OF A COMPREHENSIVE INTER-AMERICAN STRATEGY TO COMBAT THREATS TO CYBERSECURITY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

THE UNIVERSITY ON NAIROBI STRATEGIC PLAN, 2008-2013

THE UNIVERSITY ON NAIROBI STRATEGIC PLAN, 2008-2013 THE UNIVERSITY ON NAIROBI STRATEGIC PLAN, 2008-2013 INTRODUCTION University of Nairobi is the oldest university in Kenya and has its origins in the Royal Technical College of East Africa (RTCA), which

More information

DECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA

DECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA AHG/Decl.2 (XXXII) 32 nd OAU Summit DECLARATION AND PLAN OF ACTION ON DRUG CONTROL ABUSE AND ILLICIT DRUG TRAFFICKING IN AFRICA The features of the Plan of Action elaborated herewith comprise five sections

More information

Kenya country experience: A Safer Cyber Space for Children

Kenya country experience: A Safer Cyber Space for Children Kenya country experience: A Safer Cyber Space for Children Africa Child Online Protection (ACOP) Summit 15th-16th December, 2014, Kampala, Uganda Mercy Wanjau Patricia Muchiri. Vincent Ngundi. Geoffrey

More information

National. icr Policy

National. icr Policy National icr Policy TABLE OF CONTENTS Forward Acknowledgements 1. Principles...1 1.0 Introduction...1 1.1 Vision...2 1.2 Mission...2 1.3 Policy Context...2 2. Policy Objectives...4 2.1 ICT Infrastructure...4

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009 Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

More information

Cybersecurity @ ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int. www.itu150.org

Cybersecurity @ ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int. www.itu150.org Cybersecurity @ ITU Carla Licciardello Policy Analyst Carla.licciardello@itu.int www.itu150.org Where are we coming from Specialized agency of the UN for telecommunications and ICTs Some more info about

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

Cyber security Indian perspective & Collaboration With EU

Cyber security Indian perspective & Collaboration With EU Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of

More information

Save the Children. Protecting Children in Zambia from Violence, Abuse, Neglect and Exploitation

Save the Children. Protecting Children in Zambia from Violence, Abuse, Neglect and Exploitation Protecting Children in Zambia from Violence, Abuse, Neglect and Exploitation Baseline 2010: National Child Protection System in Zambia What is a National Child Protection System and why do we need it?

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya

Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya i Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya ii Executive Summary Global information and communication technology

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

Information Security Summit 2005

Information Security Summit 2005 Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government

More information