Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, June 2014

Size: px
Start display at page:

Download "Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, 23-25 June 2014"

Transcription

1 Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, June July 2014 RESTRICTED 1

2 ICT as a Modern Solution Security Threats, Early Detection and Prevention of Crimes. Kenya s National Cyber Security Framework By Lt. Col. Hans Nyange, KMOD... 1 July 2014 RESTRICTED 2

3 SITUATION OVERVIEW A Brief Look Back: The Emergence of Kenya in the ICT Map ICTs have assumed a highly strategic role in the development of the Kenyan economy in the current millennium Between the years 2000 and 2012, the country's wider transport and communications sector, of which ICT is a part of, grew by a Compounded Annual Growth Rate (CAGR) of 7.7 percent, outperforming all other sectors of the national economy Estimates indicate that ICT spending in Kenya has surged considerably over the past five years, growing from 8.9% of gross domestic product (GDP) in 2006 to an estimated 12.1% of GDP in July 2014 RESTRICTED 3

4 SITUATION OVERVIEW Cont d The enactment of the Kenya Communications Act in 1998, which introduced competition in the mobile communications sector and liberalized the larger telecommunications market, was the critical catalyst that triggered the country s ICT development - in 1999, prior to the issuance of the first two mobile licenses, there were only 15,000 mobile subscribers throughout the country The landing of four undersea fiber optic cables (TEAMs and SEACOM in 2009, EASSy in 2010 and Lion-2 in 2012) brought an additional capacity to the country, resulting in faster connectivity rates As of September 2013, there were 31.3 million mobile subscribers in Kenya, equating to a mobile penetration rate of 76.9 percent Approximately 19.1 million Kenyans now have access to the Internet, equating to a penetration rate of 47.1 percent 1 July 2014 RESTRICTED 4

5 SITUATION OVERVIEW cont d A Brief Look Back: Government of Kenya (GoK) Initiatives; It is important to note that the development of ICTs in Kenya has been brought about by the Government s (GoK) efforts, through the Ministry of Information and Communication Technologies (MoICT), in encouraging investments in Internet Infrastructure ICT has been recognized, in Kenya s Vision 2030, as one of the enablers in achieving transformation into a middle-income country providing high quality life to all citizens i.e. the use of ICT provides government, the private sector and other stakeholders with an efficient and timely means of delivering essential services to their stakeholders With the landing of the undersea fiber optic cables (FOC) along the coast of Kenya and the rollout of the National Optic Fiber Backbone Infrastructure (NOFBI), Internet use has exploded and is expected to grow exponentially 1 July 2014 RESTRICTED 5

6 SITUATION OVERVIEW cont d Internet social networking tools such as blogs, Facebook and Twitter, amongst others, have gained popularity throughout the country, and coupled with the ease of access to such services, has led to the proliferation of communities of interest with global membership thus presenting convenient channels through which cyber criminals can reach unsuspecting users Towards this end, cybersecurity has become a global concern and a key item in the information agenda of many countries and various international fora Kenya has recognized this and, as a result, has facilitated the development of a national cybersecurity management framework 1 July 2014 RESTRICTED 6

7 SITUATION OVERVIEW cont d The cybersecurity management framework incorporates the Kenya Information and Communications Technology Sector Policy of 2006, the Kenya Information and Communications Act of 1998 and the Kenya Information and Communications (Electronic Certification and Domain Name Administration) Regulations of 2010 (KICR 2010), the relevant provisions of international cybercrime conventions - including the proposed draft African Union Convention on Cybercrime, among other legal instruments Cybercrime management requires collaboration with various stakeholders including law enforcement, various government agencies, military, the private sector and academia, among others In this regard, GoK has established a collaboration framework through the setup of a national computer incident response team (CIRT) 1 July 2014 RESTRICTED 7

8 SITUATION OVERVIEW cont d Looking Ahead: ICT's role in the future of Kenya; For Kenya to achieve the full benefits of ICT, three focus areas have been identified as key strategic pillars as part of its National ICT Master Plan These three pillars are in-line with the Vision 2030 roadmap to transform the country into a modern, globally competitive, middle income nation offering a high quality of life for all citizens, as well as the Jubilee Government Manifesto s vision of leveraging ICTs to propel Kenya into Africa s high-tech capital and create a Silicon Savannah 1 July 2014 RESTRICTED 8

9 SITUATION OVERVIEW cont d The first pillar of the ICT Master Plan covers the domain of e-government services, by seeking to ensure that the provision of e-government information and services support national efforts to improve productivity, efficiency, effectiveness and governance The second pillar is ICT as a driver of industry, which aims at transforming key economic sectors, and Small and Medium Enterprises (SMEs), in particular, through ICT; and The third pillar is developing Kenyan ICT businesses to deliver exportable quality products and services that are comparable to the best in the world, which will in turn help to develop a thriving local ICT sector 1 July 2014 RESTRICTED 9

10 KENYA NATIONAL CYBERSECURITY FRAMEWORK Kenya s national cybersecurity framework (NCSF) aims at enhancing the security of Kenya s cyber space and creating confidence in the use and adoption of ICTs in Kenya The NCSF consists of the following: The National Cybersecurity Strategy (NCS) The National Public Key Infrastructure (NPKI) and its licensing regime, the Electronic Certifications Service Provider (E-CSP) The National Kenya Computer Incident Response Team - Coordination Centre (KE- CIRT/CC) The current NCSF was launched on 24 June 2014, at the Communications Authority of Kenya (CAK) grounds, Nairobi The objective of the launch was to formally present the reviewed NCSF to the public in order to create awareness of the Government s efforts towards the management of cyber crime 1 July 2014 RESTRICTED 10

11 THE NATIONAL CYBERSECURITY STRATEGY Kenya s MoICT has undertaken the task of spearheading the process of developing the national cybersecurity strategy (NCS) and has since invited stakeholders and all Kenyans in general to participate in the review of the draft strategy The NCS defines Kenya s cybersecurity vision, key objectives, and ongoing commitment to support national priorities by encouraging ICT growth and aggressively protecting critical information infrastructure The NCS covers the following: GoK regulatory, policy and legal framework GoK cybersecurity governance maturity analysis NCS goals Development impacts and key benefits 1 July 2014 RESTRICTED 11

12 THE NATIONAL CYBERSECURITY STRATEGY cont d The GoK Regulatory, Policy, and Legal Framework essential inputs include: Analyzing GoK s baseline cybersecurity governance model Analyzing GoK s baseline cybersecurity governance model Evaluating GoK s cybersecurity maturity Highlighting national cybersecurity master plan considerations from other nations; and, Providing recommendations for a GoK Regulatory, Policy, and Legal Framework that; Identify needed laws, regulations, and policies Define governance roles and responsibilities Prescribe measures to secure critical cyber infrastructure in the public and private sectors Involve the private sector in policy development Facilitate international cooperation Define and protects against cybercrime Balance information security and privacy considerations; and, Promote secure online transactions through trusted identities 1 July 2014 RESTRICTED 12

13 THE NATIONAL CYBERSECURITY STRATEGY cont d The NCS proposes Cybersecurity governance as follows: The National Security Advisory Council (NSAC); This is the overall committee that is chaired by the Head of Public Service and draws membership from various GoK ministries and agencies whose functions relate to national security and reports to the National Security Council (NSC), which is chaired by the President of the Republic of Kenya The National Cyber Security Committee (NCSC); The NCSC provides policy over-sight and advice on cybersecurity issues The NCSC comprises of the Principal Secretaries (PSs) and CEO s of relevant GoK ministries, agencies and parastatals, and reports to NSAC The NCSC is chaired by the PS MoICT 1 July 2014 RESTRICTED 13

14 THE NATIONAL CYBERSECURITY STRATEGY cont d The National Kenya Computer Incident Response Team - Coordination Centre (KE- CIRT/CC) Cybersecurity Committee (NKCC); The National KE-CIRT/CC Cybersecurity Committee (NKCC) main purpose is to participate in the implementation of the National KE-CIRT/CC and facilitate coordination and collaboration in the response to Cybersecurity incidents, among other cyber-crime management activities The NKCC reports to the NCSC The NKCC is chaired by CAK and draws its membership from the MoICT, ICTA, law enforcement, the Directorate of Public Prosecutions (DPP), public utility service providers, Internet Service Providers (ISPs), telecommunication operators, academia, the banking/financial sector, among others 1 July 2014 RESTRICTED 14

15 THE NATIONAL CYBERSECURITY STRATEGY cont d Strategic Goals: To promote the Government s commitment to cybersecurity, the Strategy includes four strategic goals; Enhance the nation s cybersecurity posture in a manner that facilitates the country s growth, safety, and prosperity Build national capability by raising cybersecurity awareness and developing Kenya s workforce to address cybersecurity needs Foster information sharing and collaboration among relevant stakeholders to facilitate an information sharing environment focused on achieving the Strategy s goals and objectives Provide national leadership by defining the national cybersecurity vision, goals, and objectives and coordinating cybersecurity initiatives at the national level 1 July 2014 RESTRICTED 15

16 THE NATIONAL PUBLIC KEY INFRASTRUCTURE The National Public Key Infrastructure (NPKI) project is coordinated by MoICT in collaboration with CAK and ICTA A PKI refers to a system for the creation, storage and distribution of digital certificates which are used to verify that a particular public key (online identity) belongs to a certain entity A PKI is a technical infrastructure that comprises of a Root Certification Authority (RCA) and a Certification Authority (CA), referred to as an Electronic Certification Service Provider (E-CSP) in Kenya s legal and regulatory framework The PKI creates a framework for protecting communications and stored information from unauthorized access and disclosure by addressing the fundamentals of Cybersecurity - confidentiality, integrity, authentication and non-repudiation A PKI is, therefore, key to the rollout of e-transaction services 1 July 2014 RESTRICTED 16

17 THE NATIONAL PUBLIC KEY INFRASTRUCTURE cont d The Kenya Information and Communications Act of 1998 mandates the CAK to issue a licence to a person operating an Electronic Certification Service through a licensing framework for E-CSPs Kenya s NPKI comprises of a Root Certification Authority (RCA), which is managed by CAK, as a regulatory function, and the Government Certification Authority (GCA), an E- CSP managed by ICTA The NPKI is instrumental towards the effectiveness of the licensing of E-CSPs by ICTA since a licensed E-CSP must be accredited by the RCA for its digital certificates to be globally recognized and trusted Other countries within Africa who have deployed an NPKI include Cameroon, Mauritius, Algeria, Tunisia and Rwanda 1 July 2014 RESTRICTED 17

18 KENYA COMPUTER INCIDENT RESPONSE TEAM - COORDINATION CENTRE (KE-CIRT/CC) The National KE-CIRT/CC was established in October 2012 with the technical assistance of the International Telecommunication Union (ITU) through the International Multilateral Partnership Against Cyber Threats (IMPACT) program KE-CIRT/CC is Kenya s national cybersecurity trusted point of contact and is mandated with offering advice on cybersecurity matters nationally and coordinating responses to cyber incidents in collaboration with relevant stakeholders locally, regionally and globally The functions of KE-CIRT/CC include: Offering advisories on cybersecurity matters and coordinating cyber incidents responses, in collaboration with relevant actors locally, regionally and internationally Acting as the national trusted point of contact for information security matters Gathering and disseminating technical information on computer security incidents Carrying out research and analysis on computer security Capacity building in information security and creating and maintaining awareness on cybersecurity-related activities Facilitating the development of NPKI, among others 1 July 2014 RESTRICTED 18

19 KENYA COMPUTER INCIDENT RESPONSE TEAM - COORDINATION CENTRE (KE-CIRT/CC) cont d KE-CIRT/CC collaborates with various stakeholders as follows: National Level; Collaboration with various stakeholders in cybercrime management through NKCC i.e. law enforcement agencies, ICTA, ISPs, telecommunication operators, academia, the banking/financial sector, among others Acting as the point of contact for local sector computer Incident response teams (CIRTs) including law enforcement sector CIRT, e-government sector CIRT, ISPs/Telkom Operators sector CIRT, academia sector CIRT, banking/financial sector CIRT, among others Regional Level; Collaboration with the other East African national CIRTs under the East Africa Communications Organization (EACO) Cybersecurity Working Group which is chaired by Kenya 1 July 2014 RESTRICTED 19

20 KENYA COMPUTER INCIDENT RESPONSE TEAM - COORDINATION CENTRE (KE-CIRT/CC) cont d At the Global Level; Collaboration with ITU) through the IMPACT program Collaboration with national CIRTs in jurisdictions outside of East Africa such as the US-CERT and the Japanese CERT (JP-CERT), among others. Collaboration with the Forum for Incident Response and Security Teams (FIRST), an international confederation of trusted CIRTs who cooperatively handle computer security incidents and promote incident prevention programs Cyber crime incidents can be reported to KE-CIRT/CC through: Web portal: cirt@ke-cirt.go.ke Tel: /446 or /446; Fax: A letter addressed to:`director-general, Communications Authority of Kenya, P.O. Box 14448, Nairobi 00800, KENYA 1 July 2014 RESTRICTED 20

21 GROUP PRESENTATION/CASE STUDY ICT and Modern Criminality in Africa Cause or Cure: ICTs have contributed immensely to both causes and cures of modern criminality in Africa modern as opposed to traditional criminality that did not involve use of technology; Al Shabaab / Al Qaida Case Study: Spread ideology through internet websites e.g. Twitter Conduct recruitment and financial transactions Conduct trainings and convey instructions as part of command and control (C2) Implement plans and execute attacks Efficient Technologies: Soft Technologies; Information based technologies e.g. GIS mapping, PKIs for online transactions, GPS tracking, Data sharing and analysis, Finger print identification software Hard Technologies; Material based technologies e.g. CCTV monitors, Computers, Biometrics scanners, GPS bracelets and Data Centers 1 July 2014 RESTRICTED 21

22 CLARIFICATIONS 1 July 2014 RESTRICTED 22

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that: 3 rd EAIGF (2010 EAIGF) rd EAIGF 11 TH 13 TH AUGUST 2010, KAMPALA, UGANDA SECURITY MANAGEMENT IN EAST AFRICA: The East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant

More information

RWANDA CONTRIBUTION TO CWG-INTERNATIONAL INTERNET RELATED PUBLIC POLICY ISSUES.

RWANDA CONTRIBUTION TO CWG-INTERNATIONAL INTERNET RELATED PUBLIC POLICY ISSUES. RWANDA CONTRIBUTION TO CWG-INTERNATIONAL INTERNET RELATED PUBLIC POLICY ISSUES. (Ref: CL-13/168 of 22 November 2013) 1.0. Introduction Since 2000, the Government of Rwanda (GoR) embarked on a 20 year journey

More information

Cyber Security @ ITU. By Tomas Lamanauskas, ITU

Cyber Security @ ITU. By Tomas Lamanauskas, ITU Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya

Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya i Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya ii Executive Summary Global information and communication technology

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

REPUBLIC OF GHANA MINISTRY OF COMMUNICATIONS. Ghana National Cyber Security Policy & Strategy

REPUBLIC OF GHANA MINISTRY OF COMMUNICATIONS. Ghana National Cyber Security Policy & Strategy REPUBLIC OF GHANA MINISTRY OF COMMUNICATIONS Ghana National Cyber Security Policy & Strategy Final Draft March 2014 EXECUTIVE Document Contact a. SUMMARY Table of Contents I. SECTION ONE: BACKGROUND i.

More information

TELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA

TELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA TELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA (TESPOK) BACKGROUND TESPOK is a professional, non-profit organization representing the interests of telecommunication service providers in Kenya.

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,

More information

REPUBLIC OF GHANA MINISTRY OF COMMUNICATIONS. Ghana National Cyber Security Policy & Strategy

REPUBLIC OF GHANA MINISTRY OF COMMUNICATIONS. Ghana National Cyber Security Policy & Strategy REPUBLIC OF GHANA MINISTRY OF COMMUNICATIONS Ghana National Cyber Security Policy & Strategy Final Draft July 23 2015 Document Version Version Date Remark Ver. 1.0 March 2015 Final Draft handed over to

More information

Making our Cyber Space Safe

Making our Cyber Space Safe Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov

More information

ITU Global Cybersecurity Agenda (GCA)

ITU Global Cybersecurity Agenda (GCA) International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,

More information

Cybersecurity Governance

Cybersecurity Governance AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional

More information

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For

More information

National Cyber Security Strategy of Afghanistan (NCSA)

National Cyber Security Strategy of Afghanistan (NCSA) Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA

More information

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

Breakout Session B: Cyber Security and Cybercrime Trends in Africa Breakout Session B: Cyber Security and Cybercrime Trends in Africa Global Forum for Cyber Expertise Awareness Initiative The African Union, Symantec, and the U.S. Department of State committed to develop

More information

Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)

Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI) Regional Seminar on Cyber Preparedness Organised by World Bank Group, Financial Sector Advisory Center (FINSec) ITU s work in Cybersecurity and Global Cybersecurity Index (GCI) Vijay Mauree Programme Coordinator,

More information

National Cyber Security Policy (Draft) March 2015

National Cyber Security Policy (Draft) March 2015 National Cyber Security Policy (Draft) March 2015 ACRONYMS Acronym AMIS CCIP CIIs CMU CS CSIRT/CERT CSOC DDos EA EDPRS EU e-gov FDI G2B G2C G2G GDP GEA GoR GSA HMIS ICT IEC IOS IT IaaS ITSD KIST KLab MOD

More information

SRO-EA s Cyber security Initiatives in Eastern Africa

SRO-EA s Cyber security Initiatives in Eastern Africa UNECA Sub Regional Office For Esatern Africa SRO-EA 2010 EAIGF 11-13 August 2010, Kampala, Uganda SRO-EA s Cyber security Initiatives in Eastern Africa Mr Mactar SECK United Nations ECA SRO- EA Key Categories

More information

Ministry of Technology, Communication and Innovation

Ministry of Technology, Communication and Innovation Ministry of Technology, Communication and Innovation Expression of Interest for a Market Sounding Exercise For the implementation of a Third International gateway through the installation of a new submarine

More information

Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS

Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS UbuntuNet Connect 2015 F.F. Tusubira & A. Ndiwalana Knowledge Consulting Ltd Outline Background Current reality

More information

COMMUNICATIONS COMMISSION OF KENYA PUBLIC CONSULTATION PAPER ON LICENSING AND REGULATORY FRAMEWORK FOR DOT KE DOMAIN NAME REGISTRY SERVICES

COMMUNICATIONS COMMISSION OF KENYA PUBLIC CONSULTATION PAPER ON LICENSING AND REGULATORY FRAMEWORK FOR DOT KE DOMAIN NAME REGISTRY SERVICES COMMUNICATIONS COMMISSION OF KENYA PUBLIC CONSULTATION PAPER ON LICENSING AND REGULATORY FRAMEWORK FOR DOT KE DOMAIN NAME REGISTRY SERVICES Consultation Paper No 1. Introduction The dot KE Domain Name,

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide

National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide Taieb DEBBAGH, PhD, CISA Secretary General Ministry of Industry, Trade and New Technologies, Morocco ITU Regional

More information

2013 Africa Union Framework for Cyber security in Africa

2013 Africa Union Framework for Cyber security in Africa Contributions by DotConnectAfrica 2013 Africa Union Framework for Cyber security in Africa Comments to the DRAFT AFRICAN UNION CONVENTION ON THE ESTABLISHMENT OF A CREDIBLE LEGAL FRAMEWORK FOR CYBER SECURITY

More information

Cybersecurity in the Commonwealth: Setting the Stage

Cybersecurity in the Commonwealth: Setting the Stage Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if

More information

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth

Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth Commonwealth Cybersecurity Forum BT Centre, London 22-24 April 2015 Dr Martin Koyabe Head of Research & Consultancy

More information

Capacity Building to Strengthen Cybersecurity: Thailand Update

Capacity Building to Strengthen Cybersecurity: Thailand Update Capacity Building to Strengthen Cybersecurity: Thailand Update ASEAN Regional Forum Workshop on Measures to Enhance Cyber Security Legal and Cultural Aspects September 11-12, 2013 1 1 Chain is only as

More information

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed

More information

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a

More information

National Cyber Security Strategy 2015-2017

National Cyber Security Strategy 2015-2017 National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

CYBER SECURITY IN TANZANIA COUNTRY REPORT

CYBER SECURITY IN TANZANIA COUNTRY REPORT CYBER SECURITY IN TANZANIA COUNTRY REPORT Abstract Tanzania does not have specific legislations dealing with cyber security. Currently the laws which are in place were made before cyber security was an

More information

Information and Communications Technology

Information and Communications Technology Information and Communications Technology 8 Policy Recommendations For the advancement of Knowledge Societies across Africa A Product of the African Leadership in ICT Course www.gesci.org Senthil Kumar,

More information

EU policy on Network and Information Security and Critical Information Infrastructure Protection

EU policy on Network and Information Security and Critical Information Infrastructure Protection EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

Cybersecurity @ ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int. www.itu150.org

Cybersecurity @ ITU. Carla Licciardello Policy Analyst Carla.licciardello@itu.int. www.itu150.org Cybersecurity @ ITU Carla Licciardello Policy Analyst Carla.licciardello@itu.int www.itu150.org Where are we coming from Specialized agency of the UN for telecommunications and ICTs Some more info about

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues. Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Fostering Information Security Awareness Among Responding Countries

Fostering Information Security Awareness Among Responding Countries Unclassified DSTI/ICCP/REG(2005)1/FINAL DSTI/ICCP/REG(2005)1/FINAL Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 16-Dec-2005

More information

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU

More information

CYBERSECURITY INDEX OF INDICES

CYBERSECURITY INDEX OF INDICES Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration

More information

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva Finnish Cyber Security Strategy Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva 1 Changing threat landscape 2 Annual losses caused by cybercrime over $400 billion

More information

National Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA

National Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA National Information Technology Center (NITC) National Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA Ahmed Otoom, Ph.D. Disclaimer This presentation does

More information

Australian Government Cyber Security Review

Australian Government Cyber Security Review Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and

More information

VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION

VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION VALLETTA DECLARATION ON THE INTERNATIONAL INSTITUTE FOR JUSTICE AND THE RULE OF LAW FOUNDATION Introduction Algeria, the European Union, France, Germany, Italy, Japan, Jordan, Malta, Morocco, The Netherlands,

More information

The Danish Cyber and Information Security Strategy

The Danish Cyber and Information Security Strategy February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives

More information

BSA GLOBAL CYBERSECURITY FRAMEWORK

BSA GLOBAL CYBERSECURITY FRAMEWORK 2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access

More information

Cyber Security ( Lao PDR )

Cyber Security ( Lao PDR ) ITU Cyber security Forum and Cyber Drill 9-11 December 2013,Lao Plaza Hotel, Vientiane, Lao PDR Country updates on Cyber Security ( Lao PDR ) By Khamla Sounnalat Deputy head of LaoCERT Ministry of Posts

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

2. Cyber legislation harmonization process in Central Africa

2. Cyber legislation harmonization process in Central Africa Introduction 1. What is cyber legislation? 2. Cyber legislation harmonization process in Central Africa The sub-region concerned; Partner international organizations in the harmonization of cyber legislation

More information

IMPLICATIONS OF OVERLAPPING MEMBERSHIP ON THE EXPECTED GAINS FROM ACCELERATED PROGRAM FOR ECONOMIC INTEGRATION (APEI)

IMPLICATIONS OF OVERLAPPING MEMBERSHIP ON THE EXPECTED GAINS FROM ACCELERATED PROGRAM FOR ECONOMIC INTEGRATION (APEI) IMPLICATIONS OF OVERLAPPING MEMBERSHIP ON THE EXPECTED GAINS FROM ACCELERATED PROGRAM FOR ECONOMIC INTEGRATION (APEI) ABSTRACT In September 2012, five like-minded and reform oriented countries namely Malawi,

More information

INFORMATION SECURITY AWARENESS & TRAINING PROGRAM

INFORMATION SECURITY AWARENESS & TRAINING PROGRAM INFORMATION SECURITY AWARENESS & TRAINING PROGRAM By Serah Francis MSc Student, Gjøvik University, Norway ISES Member IFIP TC3 ISES Project INTRODUCTION Africa has 167 million Internet Users and is estimated

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 4/17 Geneva, 11-20 February 2009 Ref. : TD 0244 Rev.2 Source:

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

Let me now give you some insights into what is currently being done by my government in Kenya.

Let me now give you some insights into what is currently being done by my government in Kenya. Speech by David Siele, Director of Higher Education at the Ministry of Education, Kenya, at the ONLINE EDUCA BERLIN conference, Berlin, Germany, November 30, 2006 Your Excellencies Honourable Ministers

More information

Cyber-safety for Senior Australians. Inquiry Submission

Cyber-safety for Senior Australians. Inquiry Submission SUBMISSION NO. 32 Cyber-safety for Senior Australians Inquiry Submission The AISA Response to the Parliament s Joint Select Committee s call for submissions Date 23 March 2012 Page 1 Executive Summary:

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

PREPARED BY: Ms Irene Joseph Facilitator

PREPARED BY: Ms Irene Joseph Facilitator REPORT ON CYBERSECURITY- CORPORATE INFORMATION, DATA LEAKAGE AND PENETRATION TESTING FORUM HELD ON 29 TH NOVEMBER, 2012 AT TANZANIA GLOBAL LEARNING AGENGY PREPARED BY: Ms Irene Joseph Facilitator 1 Contents

More information

Michael Yakushev PIR-Center, Moscow (Russia)

Michael Yakushev PIR-Center, Moscow (Russia) Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:

More information

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013 State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

HiveColab. UGANDA NATIONAL INTERNET GOVERNANCE FORUM 2011 HELD AT HIVE COLAB, NAKAWA Harnessing Internet Development in Uganda

HiveColab. UGANDA NATIONAL INTERNET GOVERNANCE FORUM 2011 HELD AT HIVE COLAB, NAKAWA Harnessing Internet Development in Uganda HiveColab UGANDA NATIONAL INTERNET GOVERNANCE FORUM 2011 HELD AT HIVE COLAB, NAKAWA Harnessing Internet Development in Uganda Introduction This report presents the proceedings and key issues that emerged

More information

Corporate Overview Creating Business Advantage

Corporate Overview Creating Business Advantage Corporate Overview Creating Business Advantage 14 April 2013 Agenda The power of the group Our achievements Quick facts African regulatory environment Portfolio of offerings Creating value in Africa African

More information

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015 Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cyber Security Challenges & Capacity Building By Marco Obiso International

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

COMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011

COMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011 COMMISSION DE L UNION AFRICAINE REPUBLIQUE DU SENEGAL ---------------- MINISTERE DE LA COMMUNICATION, DES TELECOMMUNICATIONS ET DES TECHNOLOGIES DE L INFORMATION ET DE LA COMMUNICATION AFRICAN ICT MINISTERIAL

More information

ADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013

ADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013 ADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013 1 CONTENT INTRODUCTION COMESA CYBER SECUIRTY PROGRAMME CYBER SECURITY ECONOMICS WHY PPPs? PPPs ACTORs CHALLENGES

More information

Tentative Action Plan

Tentative Action Plan Republic of Serbia Ministry of Science and Environmental Protection Serbia and Montenegro Tentative Action Plan Draft 1 Belgrade, September 2005 Tentative Action Plan - Draft 1 Section 1 and 2 Information

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services

DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services April 24, 2015 DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT Services 1 Question 6: How should the security

More information

RE: Comments on Vietnam s Draft Law on Information Security, version 2.22

RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 July 10, 2013 Ministry of Information and Communications 18 Nguyen Du Hanoi, Vietnam RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 Dear Sir/Madam: The Information Technology

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy 2015 Action Plan A LIVING ACTION PLAN WITH ANNUAL REVIEWS New Zealand s Cyber Security Strategy provides a single cohesive framework to ensure that New Zealand is secure, resilient

More information

Cyber Security and Critical Information Infrastructure

Cyber Security and Critical Information Infrastructure Cyber Security and Critical Information Infrastructure Dr. Gulshan Rai Director General Indian Computer Emergency Response Team (CERT- In) grai [at] cert-in.org.in The Complexity of Today s Network Changes

More information

Cybersecurity Capacity Assessment of the Republic of Kosovo. Lara Pace Kosovo June 2015

Cybersecurity Capacity Assessment of the Republic of Kosovo. Lara Pace Kosovo June 2015 Cybersecurity Capacity Assessment of the Republic of Kosovo Lara Pace Kosovo June 2015 CMM - Five Dimensions Levels of Maturity Start- up: At this level either nothing exists, or it is very embryonic in

More information

State Security Agency/ Staatsveiligheidsagentskap STATE SECURITY AGENCY NO. 609 04 DECEMBER 2015 THE NATIONAL CYBERSECURITY POLICY FRAMEWORK (NCPF)

State Security Agency/ Staatsveiligheidsagentskap STATE SECURITY AGENCY NO. 609 04 DECEMBER 2015 THE NATIONAL CYBERSECURITY POLICY FRAMEWORK (NCPF) State Security Agency/ Staatsveiligheidsagentskap 609 State Security Agency: National Cybersecurity Policy Framework (NCPF): For public information 39475 66 No. 39475 GOVERNMENT GAZETTE, 4 DECEMBER 2015

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

Cloud and Critical Information Infrastructures

Cloud and Critical Information Infrastructures Cloud and Critical Information Infrastructures Cloud computing in ENISA Dr. Evangelos Ouzounis Head of Infrastructure & Services Unit www.enisa.europa.eu About ENISA The European Union Network and Information

More information

CYSPA - EC projects supporting NIS

CYSPA - EC projects supporting NIS CYSPA - EC projects supporting NIS Nina Olesen, EOS March 2014 Athens, Greece www.cyspa.eu CYSPA the European project The European Cyber Security Protection Alliance, or CYSPA, is an initiative by 17 organisationsfrom

More information