Breakout Session B: Cyber Security and Cybercrime Trends in Africa

Similar documents
Promoting Cyber security in Africa.

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber ITU. By Tomas Lamanauskas, ITU

Corporate Overview Creating Business Advantage

Cybercrime Security Risks and Challenges Facing Business

Tackling Cyber Crime in the UK. Andy Archibald Deputy Director National Cyber Crime Unit

Executive Director Centre for Cyber Victim Counselling /

Internet Society (ISOC)

Microsoft s cybersecurity commitment

Cyber security Country Experience: Establishment of Information Security Projects.

Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)

Promoting a cyber security culture and demand compliance with minimum security standards;

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

Cyber Diplomacy A New Component of Foreign Policy 6

CURRICULUM VITAE. Kodzo Gadzekpo ADOMEY

Protecting the Infrastructure: Symantec Web Gateway

Cybersecurity for ALL

Romanian National Computer Security Incident Response Team CERT-RO.

Strategic Analysis for Strategic Analysis for Growth Development Growth & Development. International Economics.

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

2013 ITU survey on measures taken to raise awareness on cybersecurity

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, June 2014

CISSA Cybersecurity capacity building workshop. May 2015

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

Cybersecurity Risk Management in the Telecom Sector. MUSTAPHA HUNEYD Corporate Information Security

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

Best Practices for a BYOD World

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

Contact Centre Integration Assessment

Technology Crime Services

What legal aspects are needed to address specific ICT related issues?

UNAIDS 2013 AIDS by the numbers

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

ORGANIZADOR: APOIANTE PRINCIPAL:

Global Cybersecurity Center for Development. Korea Internet & Security Agency Ministry of Science, ICT and Future Planning

Global Cybersecurity Index Good Practices

The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

MANAGED SECURITY SERVICES (MSS)

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015

Pacific Islands Telecommunications Association

INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries

(BDT) BDT/POL/CYB/Circular

Cybersecurity in the Commonwealth: Setting the Stage

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Merchant Acquiring. Africa

Governance, Risk and Compliance Assessment

Excerpt Sudan Fixed Telecommunications: Low Penetration Rates Get a Boost from Broadband Internet and VoIP Services

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

ADVOC. the international network of independent law firms

Multilateral Legal Responses to Cyber Security in Africa: Any Hope for Effective International Cooperation?

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Security Intelligence

ITU National Cybersecurity/CIIP Self-Assessment Tool

Council of the European Union Brussels, 9 September 2014 (OR. en)

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

OUTCOME OF PROCEEDINGS

Department of Homeland Security Federal Government Offerings, Products, and Services

Establishing and supporting CERTs for Internet security

Introduction of the GCCD. (Global Cybersecurity Center for Development)

Threats to Local Governments and What You Can Do to Mitigate the Risks

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

EU policy on Network and Information Security and Critical Information Infrastructure Protection

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

Lith Networking and Network Marketing Safety

Policy Brief. Tackling the challenges of cybersecurity in Africa. 1. Introduction

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

Women in an Age of Cyber Wars: Risks, Management and Opportunity

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA

The European Response to the rising Cyber Threat

Consumers benefit from lower mobile

Achieving Global Cyber Security Through Collaboration

ICT Barriers, High Tech Crime, and Police

Transcription:

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

Global Forum for Cyber Expertise Awareness Initiative The African Union, Symantec, and the U.S. Department of State committed to develop a comprehensive report that presents detailed technical data on cybersecurity and cybercrime trends in Africa. The Goal: To gain a comprehensive view of the major occurrences of cyber incidents affecting organizations and individuals in the territory of AU Member States. Governments and other interested parties can then utilize this information to strengthen prevention and response mechanisms to confront the diverse range of cyber threats. 2

Partners: Cybercrime & Cybersecurity Trends in Africa African Union U.S. Department of State Organization of American States (OAS) Council of Europe Symantec Corporation 3

Coming in early 2016.. 4

5

Africa s IT Infrastructure Driving Digitization Africa s internet is already integrally connected to Europe s, especially Mediterranean countries This connection will only grow stronger as more undersea cables connect more of Africa. Mobile internet connections most common But connectivity and cost are still significant obstacles 6

Cybercrime As IT sector grows, cybercrime grows: Malware on the rise Botnets Hacktivism Spearphishing and Spam Ransomware Institutional Capacity to Fight Cybercrime Few cybercrime laws Disparity in capacity among countries Legacy technology Low level of awareness 7

8

Symantec threat intelligence Identify more threats + take action faster + prevent impact Worldwide Coverage Global Scope and Scale 24x7 Event Logging Rapid Detection Threat Activity 69M+ sensors 157+ countries 4.5B+ authentications/day Preemptive Security Alerts Malware Intelligence Symantec GIN Symantec Probe Network Symantec.cloud Skeptic Vulnerabilities 51,644+ vulnerabilities 16,687 vendors 43,391 products Information Protection Spam/Phishing 5M decoy accounts 3B+ email messages/daily 1.4B+ web requests/daily Threat Triggered Actions

Malicious Activity Data Tables Top 10 source African countries for attacks Country Africa Rank Percentage Incident Count South Africa 1 31% 220,727 Morocco 2 16% 106,144 Uganda 3 10% 63,234 Egypt 4 9% 57,204 Mauritius 5 8% 52,974 Kenya 6 4% 27,172 Tunisia 7 4% 25,665 Nigeria 8 3% 20,158 Zimbabwe 9 3% 19,319 Algeria 10 10,790 10

Malware Top 10 source African Countries for malware Country Rank Percentage within Africa Incident Count South Africa 1 36% 712,773 Egypt 2 20% 394,800 Algeria 3 8% 165,311 Tunisia 4 7% 129,254 Cote D Ivoire 5 5% 101,846 Morocco 6 5% 101,248 Nigeria 7 3% 54,559 Sudan 8 48,304 Mauritius 9 44,320 Kenya 10 32,874 11

Spam Top 10 source African countries for Spam Country Rank Percentage within Africa Incident Count South Africa 1 24% 86,947,667 Egypt 2 18% 63,788,313 Algeria 3 13% 45,810,103 Tunisia 4 10% 37,014,318 Morocco 5 10% 36,524,817 Nigeria 6 3% 10,385,420 Mauritius 7 8,902,475 Kenya 8 7,979,144 Zimbabwe 9 6,161,185 Cote D Ivoire 10 5,578,413 12

Botnets Top 10 source African countries for bots Country Rank Percentage within Africa Incident Count Egypt 1 31% 2,037,491 Algeria 2 18% 1,179,989 Morocco 3 15% 968,284 Tunisia 4 11% 736,563 South Africa 5 9% 581,893 Sudan 6 3% 203,415 Mauritius 7 135,427 Kenya 8 131,488 Nigeria 9 106,023 Libya 10 1% 79,250 13

Global Government Partnerships United States FBI Latin America & Caribbean Organization of American States Europe ENISA NCA EC3 Africa Africa Union South Korea KISA KNPA Australia CERT Australia Australian Federal Police 14

Government Cybersecurity Partnership Program Europol s Cyber Crime Centre (EC3) In October 2014 we signed an MOU to cooperate on cybercrime investigations and information sharing. We are currently working together on joint cybercrime investigations. Organization of American States (OAS) In May 2014 we entered into a partnership to develop a report that assessed the state of cybersecurity in Latin America and the Caribbean. It is regularly referenced and has lead to numerous business and thought leadership opportunities. International Telecommunication Union (ITU) In June 2014 we entered into an agreement to share strategic cyber threat information and to co-brand the ISTR that is distributed to government leaders in all 193 Member States and more than 700 private sector members around the world. Korea National Police Agency (KNPA) In October 2013 we signed an MOU to cooperate on cybercrime investigations and information sharing. African Union In April 2015, through the Global Forum on Cyber Expertise (GFCE), Symantec entered into a partnership with the African Union and the U.S. Department of State to develop a comprehensive report to assess the state of cybersecurity in Africa. 15

Breakout Questions 1). In many ways, Africa is where the United States, Europe and parts of Asia were 10-15 years ago. They are at the beginning of an internet boom. What lessons learned could be passed along? Where should they start in securing their infrastructure and fighting cybercrime? 2). Multi-national organizations with experiences that span countries and jurisdictions often have a wealth of practical experience that will be beneficial to cyber strategy formulation and capacity building programs. However, trust in international companies is still an issue in many countries where cybersecurity is concerned. How can these trust issues be overcome? 16

Thank You William Wright Director, Government Affairs William_Wright@Symantec.com