Breakout Session B: Cyber Security and Cybercrime Trends in Africa
|
|
|
- Miles Mills
- 10 years ago
- Views:
Transcription
1 Breakout Session B: Cyber Security and Cybercrime Trends in Africa
2 Global Forum for Cyber Expertise Awareness Initiative The African Union, Symantec, and the U.S. Department of State committed to develop a comprehensive report that presents detailed technical data on cybersecurity and cybercrime trends in Africa. The Goal: To gain a comprehensive view of the major occurrences of cyber incidents affecting organizations and individuals in the territory of AU Member States. Governments and other interested parties can then utilize this information to strengthen prevention and response mechanisms to confront the diverse range of cyber threats. 2
3 Partners: Cybercrime & Cybersecurity Trends in Africa African Union U.S. Department of State Organization of American States (OAS) Council of Europe Symantec Corporation 3
4 Coming in early
5 5
6 Africa s IT Infrastructure Driving Digitization Africa s internet is already integrally connected to Europe s, especially Mediterranean countries This connection will only grow stronger as more undersea cables connect more of Africa. Mobile internet connections most common But connectivity and cost are still significant obstacles 6
7 Cybercrime As IT sector grows, cybercrime grows: Malware on the rise Botnets Hacktivism Spearphishing and Spam Ransomware Institutional Capacity to Fight Cybercrime Few cybercrime laws Disparity in capacity among countries Legacy technology Low level of awareness 7
8 8
9 Symantec threat intelligence Identify more threats + take action faster + prevent impact Worldwide Coverage Global Scope and Scale 24x7 Event Logging Rapid Detection Threat Activity 69M+ sensors 157+ countries 4.5B+ authentications/day Preemptive Security Alerts Malware Intelligence Symantec GIN Symantec Probe Network Symantec.cloud Skeptic Vulnerabilities 51,644+ vulnerabilities 16,687 vendors 43,391 products Information Protection Spam/Phishing 5M decoy accounts 3B+ messages/daily 1.4B+ web requests/daily Threat Triggered Actions
10 Malicious Activity Data Tables Top 10 source African countries for attacks Country Africa Rank Percentage Incident Count South Africa 1 31% 220,727 Morocco 2 16% 106,144 Uganda 3 10% 63,234 Egypt 4 9% 57,204 Mauritius 5 8% 52,974 Kenya 6 4% 27,172 Tunisia 7 4% 25,665 Nigeria 8 3% 20,158 Zimbabwe 9 3% 19,319 Algeria 10 10,790 10
11 Malware Top 10 source African Countries for malware Country Rank Percentage within Africa Incident Count South Africa 1 36% 712,773 Egypt 2 20% 394,800 Algeria 3 8% 165,311 Tunisia 4 7% 129,254 Cote D Ivoire 5 5% 101,846 Morocco 6 5% 101,248 Nigeria 7 3% 54,559 Sudan 8 48,304 Mauritius 9 44,320 Kenya 10 32,874 11
12 Spam Top 10 source African countries for Spam Country Rank Percentage within Africa Incident Count South Africa 1 24% 86,947,667 Egypt 2 18% 63,788,313 Algeria 3 13% 45,810,103 Tunisia 4 10% 37,014,318 Morocco 5 10% 36,524,817 Nigeria 6 3% 10,385,420 Mauritius 7 8,902,475 Kenya 8 7,979,144 Zimbabwe 9 6,161,185 Cote D Ivoire 10 5,578,413 12
13 Botnets Top 10 source African countries for bots Country Rank Percentage within Africa Incident Count Egypt 1 31% 2,037,491 Algeria 2 18% 1,179,989 Morocco 3 15% 968,284 Tunisia 4 11% 736,563 South Africa 5 9% 581,893 Sudan 6 3% 203,415 Mauritius 7 135,427 Kenya 8 131,488 Nigeria 9 106,023 Libya 10 1% 79,250 13
14 Global Government Partnerships United States FBI Latin America & Caribbean Organization of American States Europe ENISA NCA EC3 Africa Africa Union South Korea KISA KNPA Australia CERT Australia Australian Federal Police 14
15 Government Cybersecurity Partnership Program Europol s Cyber Crime Centre (EC3) In October 2014 we signed an MOU to cooperate on cybercrime investigations and information sharing. We are currently working together on joint cybercrime investigations. Organization of American States (OAS) In May 2014 we entered into a partnership to develop a report that assessed the state of cybersecurity in Latin America and the Caribbean. It is regularly referenced and has lead to numerous business and thought leadership opportunities. International Telecommunication Union (ITU) In June 2014 we entered into an agreement to share strategic cyber threat information and to co-brand the ISTR that is distributed to government leaders in all 193 Member States and more than 700 private sector members around the world. Korea National Police Agency (KNPA) In October 2013 we signed an MOU to cooperate on cybercrime investigations and information sharing. African Union In April 2015, through the Global Forum on Cyber Expertise (GFCE), Symantec entered into a partnership with the African Union and the U.S. Department of State to develop a comprehensive report to assess the state of cybersecurity in Africa. 15
16 Breakout Questions 1). In many ways, Africa is where the United States, Europe and parts of Asia were years ago. They are at the beginning of an internet boom. What lessons learned could be passed along? Where should they start in securing their infrastructure and fighting cybercrime? 2). Multi-national organizations with experiences that span countries and jurisdictions often have a wealth of practical experience that will be beneficial to cyber strategy formulation and capacity building programs. However, trust in international companies is still an issue in many countries where cybersecurity is concerned. How can these trust issues be overcome? 16
17 Thank You William Wright Director, Government Affairs
Promoting Cyber security in Africa. [email protected]
Promoting Cyber security in Africa [email protected] Where are We today Af* Do you remember Af* at Cotonou Internet Governance meeting on December 1998? Premises from Af* (African Internet Organizations
Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.
Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating
Cyber Security @ ITU. By Tomas Lamanauskas, ITU
Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and
Corporate Overview Creating Business Advantage
Corporate Overview Creating Business Advantage 14 April 2013 Agenda The power of the group Our achievements Quick facts African regulatory environment Portfolio of offerings Creating value in Africa African
Cybercrime Security Risks and Challenges Facing Business
Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact
Tackling Cyber Crime in the UK. Andy Archibald Deputy Director National Cyber Crime Unit
Tackling Cyber Crime in the UK Andy Archibald Deputy Director National Cyber Crime Unit Cybercrime Facts Cost of Cybercrime Reports of cyber crime to Action Fraud increase d by 30% 229 median number of
Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
Internet Society (ISOC)
Internet Society (ISOC) African Regional Bureau Dawit Bekele, Manager, African Regional Bureau INET Africa, Abuja, May 4 2007 1 Internet Society Who we are Founded 1991 by Internet Pioneers International,
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority
Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)
Regional Seminar on Cyber Preparedness Organised by World Bank Group, Financial Sector Advisory Center (FINSec) ITU s work in Cybersecurity and Global Cybersecurity Index (GCI) Vijay Mauree Programme Coordinator,
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cyber Security Challenges & Capacity Building By Marco Obiso International
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
CURRICULUM VITAE. Kodzo Gadzekpo ADOMEY
CURRICULUM VITAE Kodzo Gadzekpo ADOMEY University of Ghana Computing Systems University of Ghana, Legon +233-203574626 +233-243574626 [email protected] [email protected] OBJECTIVE To secure the post
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
Cybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund
Romanian National Computer Security Incident Response Team CERT-RO. [email protected] http://www.cert-ro.eu
Romanian National Computer Security Incident Response Team CERT-RO [email protected] http://www.cert-ro.eu About A Digital Agenda for Europe, Pillar : Trust and Security, Action 38 Member States to
Strategic Analysis for Strategic Analysis for Growth Development Growth & Development. International Economics. www.tradeeconomics.
Strategic Analysis for Strategic Analysis for Growth Development Growth & Development International Economics www.tradeeconomics.com 1 Strategy is about making choices, trade-offs; it s about deliberately
Building Blocks of a Cyber Resilience Program. Monika Josi [email protected]
Building Blocks of a Cyber Resilience Program Monika Josi [email protected] About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
2013 ITU survey on measures taken to raise awareness on cybersecurity
2013 ITU survey on measures taken to raise awareness on cybersecurity Securing information and communication networks: best practices for developing a culture of cybersecurity SURVEY BACKGROUND Raising
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014
Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014 1 July 2014 RESTRICTED 1 ICT as a Modern Solution Security Threats, Early Detection and Prevention
CISSA Cybersecurity capacity building workshop. May 2015
CISSA Cybersecurity capacity building workshop Good Practices in Developing Cybersecurity and Cybercrime Strategies Prof Anthoni van Nieuwkerk Centre for Defence and Security Management University of the
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
Cybersecurity Risk Management in the Telecom Sector. MUSTAPHA HUNEYD Corporate Information Security
Cybersecurity Risk Management in the Telecom Sector MUSTAPHA HUNEYD Corporate Information Security Cyber Security Risks World Economic Forum Global Risks 2014 - Ninth Edition Critical Infrastructure Critical
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
Best Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union
ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY
Contact Centre Integration Assessment
Contact Centre Integration Assessment How well are your business objectives aligned with the right contact centre technologies? Knowing how the technology in your contact centre supports service delivery
Technology Crime Services
Technology Crime Services Presentation Summary Cyber Safety for the Corporate world Challenges to Police how you can assist Making your company crime resistant Reporting Online crime Traditional Policing
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
UNAIDS 2013 AIDS by the numbers
UNAIDS 2013 AIDS by the numbers 33 % decrease in new HIV infections since 2001 29 % decrease in AIDS-related deaths (adults and children) since 2005 52 % decrease in new HIV infections in children since
Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
ORGANIZADOR: APOIANTE PRINCIPAL:
ORGANIZADOR: APOIANTE PRINCIPAL: Miguel Gomes 912412885 [email protected] Alliances Portugal, Africa, Brasil Coverage One of the biggest CSP worlwide Tec. Inovator Strong Cloud Bet and investment
Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning
Global Cybersecurity Center for Development Korea Internet & Security Agency Ministry of Science, ICT and Future Planning Contents Ⅰ Background Ⅱ Vision Ⅲ Roles and Responsibilities Ⅳ Partnership Plan
Global Cybersecurity Index Good Practices
AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM Entitled by: Cristine Hoepers, Klaus Steding-Jessen,
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency
ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For
MANAGED SECURITY SERVICES (MSS)
MANAGED SECURITY SERVICES (MSS) The Cyber Security Initiative. Cybercrime is becoming an important factor for CIOs and IT professionals, but also for CFOs, compliance officers and business owners. The
RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015
RETHINKING ORC: NRF S CYBER SECURITY EFFORTS OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015 No Organization is Secure Source: http://www.informationisbeautiful.net An Average
Pacific Islands Telecommunications Association
Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: [email protected] www.pita.org.fj INVITATION
INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries
INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries Torbjörn Fredriksson ([email protected]) Chief, ICT Analysis Section, UNCTAD Commonwealth Cybersecurity
(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
Cybersecurity in the Commonwealth: Setting the Stage
Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!
Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both! Matteo Masserini Steven Kulley Tarun Sondhi Emerging Region Sales Specialist Regional Product Manager - EMEA
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
Merchant Acquiring. Africa
Merchant Acquiring Africa A Lafferty Group September 2015 Table of Contents Introduction 8 Graph 1: Global:Banked Adult Population 2013 8 Acquiring models 8 Credit cards in Africa 9 Graph 2: Africa: POS
Governance, Risk and Compliance Assessment
Governance, Risk and Compliance Assessment Information security is a pervasive business requirement and one that no organisation can afford to get wrong. If it s not handled properly, your business could
Excerpt Sudan Fixed Telecommunications: Low Penetration Rates Get a Boost from Broadband Internet and VoIP Services
Excerpt Sudan Fixed Telecommunications: Low Penetration Rates Get a Boost from Broadband Internet and VoIP Services This report is part of Pyramid Research s series of Africa & Middle East Country Intelligence
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015
Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Global E-commerce and Cyberlaw Developments By Torbjörn Fredriksson UNCTAD
ADVOC. the international network of independent law firms
ADVOC the international network of independent law firms About ADVOC ADVOC is an international network of independent law firms, sharing international expertise in jurisdictions across the globe Our member
Multilateral Legal Responses to Cyber Security in Africa: Any Hope for Effective International Cooperation?
2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace M.Maybaum, A.-M.Osula, L.Lindström (Eds.) 2015 NATO CCD COE Publications, Tallinn Permission to make digital or hard copies
5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN
COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
Security Intelligence
IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers
ITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
Council of the European Union Brussels, 9 September 2014 (OR. en)
Council of the European Union Brussels, 9 September 2014 (OR. en) 12929/14 LIMITE ENFOPOL 253 ASIM 71 FRONT 189 RELEX 721 COMIX 437 NOTE From: To: Subject: Presidency Law Enforcement Working Party Proposal
How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner [email protected] 202.669.0495
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner [email protected] 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity
OUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
Establishing and supporting CERTs for Internet security
Report on the Activities of the IGF Best Practice Forum (BPF) for: Establishing and supporting CERTs for Internet security Cristine Hoepers, CERT.br/NIC.br Maarten Van Horenbeeck, FIRST Adli Wahid, FIRST
Introduction of the GCCD. (Global Cybersecurity Center for Development)
Introduction of the GCCD (Global Cybersecurity Center for Development) Contents Ⅰ Ⅱ Ⅲ Ⅳ Ⅴ Ⅵ Ⅶ Background Vision Roles and Responsibilities Organizational Structure and Facilities Partnership Plan GCCD
Threats to Local Governments and What You Can Do to Mitigate the Risks
Association of Minnesota Counties Threats to Local Governments and What You Can Do to Mitigate the Risks Andrew Dolan Director of Government Affairs Multi-State Information Sharing and Analysis Center()
CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE
CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,
EU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100
SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define
Lith Networking and Network Marketing Safety
DIRECTION TO SUCCESS. PUBLIC AND PRIVATE SECTORS PARTNERSHIP WSIS Action Line Facilitation Meeting: Building confidence and security in the use of ICTs (C5) Partnerships for Global Cybersecurity ITU Geneva,
Policy Brief. Tackling the challenges of cybersecurity in Africa. 1. Introduction
Policy Brief NTIS/002/2014 Tackling the challenges of cybersecurity in Africa 1. Introduction The 2013 Economic Report on Africa, a joint publication of the Economic Commission for Africa (ECA) and the
Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:
3 rd EAIGF (2010 EAIGF) rd EAIGF 11 TH 13 TH AUGUST 2010, KAMPALA, UGANDA SECURITY MANAGEMENT IN EAST AFRICA: The East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant
Women in an Age of Cyber Wars: Risks, Management and Opportunity
: Risks, Management and Opportunity Key Note Address, European Summer Academy for Leading Women June 26, 2015, Malta Dr. Sarah Lohmann, Institute for Political Science, University of the German National
NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA
NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA ViS!T - Verwaltung integriert sichere Informationstechnologie, Wien, 29.10.2014 European Union Agency
The European Response to the rising Cyber Threat
SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic
Consumers benefit from lower mobile
Consumers benefit from lower mobile termination rates Mobile termination rates no longer pose an obstacle to competition. Cell C and Telkom Mobile have continued to place pressure on MTN and Vodacom to
Achieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
ICT Barriers, High Tech Crime, and Police
ICT Barriers, High Tech Crime, and Police Mitchell F. Rice, Ph.D. Fellow, National Academy of Public Administration (Washington, DC) Professor of Political Science Mail Stop 4348 Texas A&M University College
