Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda

Similar documents
Cyber Security - What Would a Breach Really Mean for your Business?

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum April 2013 Yaoundé, Cameroon

INFORMATION SECURITY TESTING

Addressing Cyber Risk Building robust cyber governance

Executive Cyber Security Training. One Day Training Course

The UK cyber security strategy: Landscape review. Cross-government

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

Day 3-24 April Day 2-23 April 2013

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

Honourable members of the National Parliaments of the EU member states and candidate countries,

Professional Certificate in Ethics and Anti-Corruption Compliance

Cyber Risk and Insurance What companies need to know

Digital Forensics Services

THE REPUBLIC OF UGANDA DPP

Sponsorship Opportunities Thomas Odams. Events Manager, EMEA, RANT Events t: m:

Cyber Risk & Insurance

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cyber security Country Experience: Establishment of Information Security Projects.

Pacific Islands Telecommunications Association

CEOP Relationship Management Strategy

Cyber Security Strategy

CYBER SECURITY TRAINING SAFE AND SECURE

ESKISP Direct security testing

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy

Cyber crime risk management protecting your business 4 November 2015

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

ETI PERSPECTIVE 2020: A FIVE YEAR STRATEGY

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Address C-level Cybersecurity issues to enable and secure Digital transformation

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

National Cyber Security Policy -2013

Cloud Services for Microsoft

Business Plan 2012/13

WAPIS PROGRAMME. West African Police Information System. This Programme is funded by the European Union

DECLARATION OF THE 7 th WORLD SCIENCE FORUM ON The Enabling Power of Science. 7 th World Science Forum, Budapest, 7 th November 2015 PREAMBLE

Playing Our Part in Responding to National Threats

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

PCL2\ \1 CYBER RISKS: RISK MANAGEMENT STRATEGIES

BSc (HONS) MANAGEMENT

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

APCC London Regional Forum. Monday, 16 th June 2014

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

REGISTER AT IIF.COM/TRAINING

IPSOS MORI S 2016 FUTURE OF RESEARCH SERIES

Services for professional procurement. Be better informed, make better decisions. Trading House Qualification System (THQS)

Department for Business, Innovation and Skills 1 Victoria Street London SW1H 0ET. 7 th May Dear Sir or Madam,

Targeting the problem together

A NEW APPROACH TO CYBER SECURITY

The global challenge

(FOR THE HANDLING AND PROCESSING OF MOBILE PHONES AND OTHER MOBILE DEVICES SO AS TO ENSURE THAT THOSE DEVICES IDENTIFIED AS STOLEN ARE HANDLED IN

ESKISP Conduct security testing, under supervision

Helen Grant MP Minister for Sport and Tourism Department for Culture, Media and Sport 100 Parliament Street LONDON SW1A 2BQ 29 January 2014

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit

Digital Marketplace - G-Cloud

THE WORLD IS MOVING FAST, SECURITY FASTER.

LETTER TO BROKERS. Today we are launching Reputation Risk Solutions Limited:

Cybersecurity Governance

CYBER RISK INTERNATIONAL COMPANY PROFILE

Ethical Trading Initiative Management Benchmarks

Raising Finance in the Bond Market

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

Udyen Jain & Associates Quality and expertise that you deserve. OCA, Organisation Conseil Audit Your vision, our expertise

Retention. A Workshop on Retention Policies:- The risks, possible approaches and implementation issues

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

Cyber Security Awareness Workshop

Below are the module descriptions for all modules currently taught on our BA (Hons) Accounting and Finance course.

Guiding Principles on Cyber Security. Guidance for Internet Service Providers and Government

Governance, Risk, and Compliance (GRC) White Paper

ICT Barriers, High Tech Crime, and Police

Reducing Cost and Risk Through Software Asset Management

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE

Digital preservation a European perspective

5 th Infosec Week & Cyber Bootcamp. 12 th to 16 th October ISEG Lisbon School of Economics & Management

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

The Recover Report. It s business. But it s personal.

Transcription:

Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda The East Africa Economic & Hi-Tech Crime Forum, Uganda, 2011 (the Forum), is an interactive conference focused on providing practical training as well as the opportunity to build and develop working relationships with vendors, clients, regulators, partners and investors. The Forum has positioned itself to launch an aggressive campaign to develop trust and accountability throughout the East African Region, going straight to the heart of what will drive further economic development and business opportunity. Interest in the East Africa Economic & Hi-Tech Crime Forum 2011 has grown from strength to strength as private organisations, professional associations and government institutions within the East African region and beyond become sensitized to the benefits of investing their resources and man power to minimise the impact of economic crime in general and the growing threat of that crime being committed through the misuse of technology. Whilst this may not change perspectives overnight this Forum aims to provide premium access to the latest information, resources and training focused on tackling Economic & Hi-Tech Crime in East Africa. Hosted by: The Benefits of Attending Include 1. Sensitization to Economic & Hi-Tech Crime prevention methods within East Africa and Beyond 2. Advice on how you and your organisation can gain by protecting itself against Economic & Hi-Tech Crime 3. Foresight to anticipate Economic & Hi-Tech Crime issues before they arise 4. Exclusive Insights on how the fight against Economic Crime can push forward development 5. Understanding of the recent EAC Legislation & how it will affect your organisation 6. Practical training on the best tried & tested practices of globally recognised experts 7. Premium support in the fight against Economic & Hi-Tech Crime 8. Focus on Cost-Effective methods that protect against Economic & Hi-Tech Crime 9. 12 Streamlined Interactive s empowering you to meet both your organisation s & your own professional development needs 10. Access to the latest technology resources designed to Prepare, Prevent and Protect your organisation against Economic & Hi-Tech Crimes Supported by:

FINAL AGENDA: For assistance in the selection of delegates to attend, the delivery of the topics will bring together three main professional stakeholder groups: 1. Legal, including operational risk and compliance 2. Technical, including IT and data technology risk 3. Accounting, including Internal Audit and Risk 08:00am - 09:00am 09:00am 09:30am 09:30am 10:30am 10:30am 11:00am 11:00am - 12:30am Interactive s 12:30pm 13:30pm 13:30pm 15:00 pm Interactive s 15:00pm 15:30pm 15:30pm 17:00pm Registration & Welcome Coffee Opening Address and Instruction Dr. Rugunda Minister ICT and Major General Kale Kayihura Economic and hi-tech crime in East Africa Covering: - Local trends - Uganda Case study Mustapha Mugisha Fraud Risk Management Led by John Webb Lunch Break Fighting the Emergence of Cyber Crime in East Africa: Strategies, Frameworks & Lessons from Other Africa Countries Led by Albert Antwi- Boasiako UCC presentation Led by Patrick Mwesigwa 08:30am 09:30am Day 2 Welcome Coffee & Days Announcements 09:30am 10:30am Business Case for Compliance Led By Gavin Irwin (Room 1) ACFE Investigation Model Led by Mustapha Mugisha (Room 2) 10:30am 11:00am 11:00am - 12:30am Interactive s 12:30pm 13:30pm 13:30pm 15:00 pm Interactive s 15:00pm 15:30pm 15:30pm 17:00pm Interactive s Forensic Accounting Led by John Webb Lunch Break Business Case for e-discovery Led by Albert Antwi - Boasiako Question Time Panel: IGP, DPP, ISACA, KTPN Speaker: Albert Antwi Boasiako African Center for Cyberlaw and Cybercrime Prevention

08:30am 09:30am Day 3 Welcome Coffee & Days Announcements 09:30am 10:30am 10:30am 11:00am 11:00am - 12:30am Interactive s 12:30pm 13:30pm No Tech Hacking Led by Johnny Long Insider Fraud Prevention Led by Daniels Ochieng Lunch Break 13:30pm 15:00 pm Interactive s 15:00pm 15:30pm Interim Remedies Led by Philip Aliker (Room 1) The use of computer forensics within banking Led by Collins Ojiambo (Room 2) 15:30pm 17:00pm Panel Session Strategies For National Cyber Security Efforts African Centre for Cyber Law and Cyber Crime Prevention Hosted by: Supported by:

EAST AFRICA ECONOMIC AND HI-TECH CRIME FORUM UGANDA 2011 Fighting the Emergence of Cyber Crime in East Africa: Strategies, Frameworks & Lessons from Other Africa Countries PRESENTATION OUTLINE: 1. Introduction ---Overview of the cyber crime problem Global & Africa Perspective ---Specific case scenarios and examples to illustrate the magnitude of the problem to the developing world e.g. most overseas merchants do no accept credit card purchases from countries like Nigeria and Ghana because of cyber risks ---Cyber governance & nodes on security in the cyber space 2. Multi-Dimensional Framework of Fighting Cyber Crime from the East Africa Perspective 1. Legal Dimensions ----institutional & legal dynamics towards high tech crimes ----enacting new cyber legislations and conventions ----harmonizing existing criminal laws to response to cyber threats 2. Educational Dimensions ---national awareness and capacity building in the fight against the threat ---knowledge sharing through multilateral organizations/institutions ---the role of the universities & learning centres ---developing cyber crime knowledge base 2. Technological Dimensions ---exploring technology to response to technology-driven problem ---exploring cost-effective technologies ---opportunities to consider open source technology solutions ---developing partnership with global cyber crime solution providers 3. Case Study: The Public Sphere and Policing of Cyber Crime in East Africa ---Instituting the neo-peelian Paradigm of Policing in Cyber Crime Policing in East Africa ---Training the police to improve law enforcement response ---Equipping the police ---Regulating & Enforcing the behaviour of online/internet users 4. An African Response to Cyber Threats Lessons from Other African Countries # The Mauritius Example ---Overview of the legal and institutional framework in Mauritius ---Establishment of Police High Tech Crime Unit in the country - 2000 ---Mauritius National Information Security Strategy Plan since 2007 ---Establishment of Computer Emergency Response Team in Mauritius (CERT-mu) 2008 ---How the Mauritius Example has improved enforcement and the fight of high tech crimes (argument to be supported by data to be collected from the Mauritius authorities) 5. Conclusions ---Critical challenges in developing effective response to cyber threats in East Africa ---Forum discussion as to how to address these challenges with participants given the opportunity to provide their opinion/experiences/their views ---Questions & Answer session [1 hour 30 mins

EAST AFRICA ECONOMIC AND HI-TECH CRIME FORUM UGANDA 2011 Business Case for e-discovery in Corporate East Africa PRESENTATION OUTLINE: 1. Introduction ---A Brief Questionnaire on e-discover to be completed by participants before the start of the presentation. Rationale: participants self-assessment of their perception of e-discovery as an emerging area of GRC. The questionnaire will be reviewed at the end of the lecture together with the assessment of lecture outcomes. ---A preview of e-discovery as an integral component of Governance, Risk Management & Compliance (GRC) ---A preview of the emergence of e-discovery solutions and models across the global corporate landscape and relevance of e-discovery to the emerging Corporate East Africa. 2. The Economics of e-discovery in the Corporate Sector East Africa in Perspective (Why Businesses across East Africa should invest in e-discovery solutions) ---e-discovery & Corporate Litigations Readiness Practical Case: Avoidance/reduction in fines due to breaching Legal requirements ---e-discovery & Corporate Due Diligence Processes Practical Case: facilitates investigations prior to business partnerships, contracts, advantages in tender processes, etc ---Corporate Obligations: Compliance & Regulations Practical Case: Compliance with existing legislations, compliance with SLAs ---e-discovery as a Proactive Risk Management Solution Practical Case: in business continuity and disaster recovery process ---Quality Corporate Information Governance Quality of corporate information/data, process for automated data search, effective storage & archive management, transparency in data/information flow, effective information/data auditing system ---Corporate cost prevention/reduction Cost/Benefit Analysis of e-discovery, reduction in cost of data migration during system change, reduction in time spent on information search, facilitates & fastens business processes including request processes 3. e-discovery Models & Technologies ---Proactive vs. Reactive e-discovery Models ---Proactive e-discovery Model for the corporate sector with reference to the Electronic Discovery Reference Model (EDRM) ---highlighting the importance of implementing proactive e-discovery solutions ---e-discovery best practices in the corporate sector ---e-discovery Technology Solutions 4. Conclusion, Questions & Reviews ---review the questionnaire completed by participants and assessing lecture outcomes ---questions and answer sessions ---conclusions with highlights on cost effective strategies and mechanism to adopt e-discovery solutions. [1 hour 30 mins]

THE TEAM BEHIND THE FORUM: Focus on East Africa is a multimedia trade & investment communication firm whose primary objective is to build positive economic perceptions of East Africa globally. With its headquarters in London and offices in Kampala, and growing, the firm aims to effectively present the East African business perspective and leverage business partnerships in a globalising market-place. The firm works across the publishing, internet, research, public affairs, market visits and forums platforms to deliver fully integrated communications solutions for its clients. KTPN Limited is a business information, training and management private limited company. KTPN stands for the Knowledge to Power Network that is focused on empowering people. Namely, graduates (or equivalent) who through their knowledge and experiences can utilise their ideas to build sustainable businesses and develop their careers not only to benefit themselves, but also for the communities around them. The Managing Director has experience of running large corporate security conferences in London, UK that attracted delegates from around the world. Forum Contact Details: Mr. Joel Ankunda Matsiko LL.B (Hons) Managing Director KTPN Limited t: +44 (0) 20 8133 2179 m: +44 (0) 78 3594 2875 Uganda Number: M: + 256 (0) 788 601 495 e: jmatsiko@ktpn.uk.com w: www.ktpn.uk.com Registered In England No: 07429128 Hosted by: Supported by: