Cyber Security and CIIP RWANDA. Towards a primarily knowledge based economy by the year 2020 RURA

Similar documents
Cyber security Country Experience: Establishment of Information Security Projects.

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

ITU National Cybersecurity/CIIP Self-Assessment Tool

Cybersecurity for ALL

National Cyber Security Strategies

2. Cyber legislation harmonization process in Central Africa

Cyber Security ( Lao PDR )

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

National Cyber Security Strategy of Afghanistan (NCSA)

National Cyber Security Policy (Draft) March 2015

Draft WGIG Issues Paper on E-Commerce

National Cyber Security Policy -2013

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

CYBER SECURITY IN TANZANIA COUNTRY REPORT

Legal Issues / Estonia Cyber Incident

Cyber security initiatives in European Union and Greece The role of the Regulators

ADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013

The Geneva Protocol on Cybersecurity and Cybercrime

Making our Cyber Space Safe

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

Charter of Consumer Rights in the Digital World

The global challenge

Bradford J. Willke, CISSP

National Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

What legal aspects are needed to address specific ICT related issues?

ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia

Overview of ITU Cybersecurity Activities

FOURTH PARLIAMENTARY FORUM ON SHAPING THE INFORMATION SOCIETY THE TRIPLE CHALLENGE OF CYBER-SECURITY: INFORMATION, CITIZENS AND INFRASTRUCTURE

RWANDA CONTRIBUTION TO CWG-INTERNATIONAL INTERNET RELATED PUBLIC POLICY ISSUES.

Regional Development Forum for Africa /5/2009 Lusaka (Zambia) Broadband Wireless Infrastructure & IPv6 Issues.

Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth

A Global Protocol on Cybersecurity and Cybercrime

REGULATING DEVELOPMENT

INFORMATION and COMMUNICATION TECHNOLOGIES AUTHORITY NOTICE OF VACANCIES

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, June 2014

Draft WGIG Issues Paper on Spam

Network Resource Management Directive

Cyber Security: Policy of the Internet Infrastructure

Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure

Pacific Islands Telecommunications Association

Model ICT Accessibility Policy Overview ITU - Telecommunication Development Bureau

National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal November 2009

Microsoft Response to DCMS Communications Review for a Digital Age

FUTURE PLANS OF BROADBAND SERVICE PROVIDERS. Ganson Lewela Head of Regulatory Airtel Networks Kenya Ltd. CTO Forum 14 th 16 th Sep 2015

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

Agenda 1. Introduction and Background:

Lessons from Defending Cyberspace

Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment

How To Write An Article On The European Cyberspace Policy And Security Strategy

SRO-EA s Cyber security Initiatives in Eastern Africa

INFORMATION TECHNOLOGY TRAINING COURSES

Harmonising Cyber Security Across the Caribbean: CTU Initiatives & Activities

REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY

THE INTER-SESSIONAL PANEL OF THE UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT December 2010 Geneva UGANDA CONTRIBUTION

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

Certified Identity and Access Manager (CIAM) Overview & Curriculum

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Protection of Essential Infrastructure and Services

Reinvigorating National Telecommunication Training and Research Institutes for Innovation Topic: Models and Funding

Cyber Security in Austria

ITU Global Cybersecurity Agenda (GCA)

Information Technology Services

Honourable members of the National Parliaments of the EU member states and candidate countries,

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK

Some organizations implement ISO/IEC Information security INTERNATIONAL

ETNO Reflection Document in reply to the EC consultation on Future networks and the Internet early challenges regarding the Internet of things

Federal Communications Commission Public Safety and Homeland Security Bureau

European Organization for Security (EOS) - Description and Envisaged Activities for 2012

Guiding principles for security in a networked society

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cyber security Indian perspective & Collaboration With EU

TELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA

Department of Veterans Affairs Office of Inspector General Strategic Plan FY

Cyber Security Solutions

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

InsureTech 2015: Addressing cybersecurity and fraud in the ME insurance industry

GSR 13. 4th Generation regulation: driving digital communications ahead

Information Security Policy

TABLE OF CONTENTS Information Systems Security Handbook Information Systems Security program elements. 7

STATE OF CYBER SECURITY IN ETHIOPIA

Mohamed ElHarras CIIP Strategies and Policies Executive Director

Cyber Security in EU: ENISA approach

Public Consultation On Draft Resolution to Issue Anti-SPAM Regulations

CYSPA - EC projects supporting NIS

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

The Case for a CARICOM Broadband Policy

INFORMATION GOVERNANCE POLICY

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How To Protect The Internet From Natural Disasters

Government of the People s Republic of Bangladesh National Telecommunications Policy (Draft) August 2015

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Transcription:

Cyber Security and CIIP RWANDA Cyber Security and CIIP Towards a primarily knowledge based economy by the year 2020 Aimable Karangwa ICT Applications Expert aimable.karangwa@rura.gov.rw Rwanda Utilities Regulatory Agency Phone: (250) 0835 2915 Fax: (250) 58 45 63 P.O Box 7289 KIGALI/RWANDA WWW.rura.gov.rw 1

Agenda NICI Plan Challenges Strategies to overcome challenges Regulator Obligations 2

NICI Plan NICI Plan: National Information and Communication Infrastructure Policy and Plan. 1999 2020, 20 years journey to reduce poverty Objective: Move from a primarily agricultural economy to a primarily knowledge based economy by the year 2020. 2000: NICI Plan framework created to achieve this ambitious mission. 3

NICI Plan objective 4

NICI PLAN phases 5

Challenges 2006: <<Solution Building>> phase introduces new ICT applications and Cyber Security issues. Lack ICT applications policy and regulatory framework Lack of awareness of Cyber Security Issues. 6

Strategies to overcome Challenges 2001: Creation of (Rwanda Utilities Regulatory Agency) With mission to regulate certain public utilities, namely: Telecommunication ICT, Water Gas Transport Electricity 7

Strategies to overcome challenges Security is a principal Concern Adoption of appropriate legislation against the misuse of ICTs for criminal or other purposes and activities intended to affect the integrity of our national CII. Targeted stakeholders: - Policy Makers: Ministry of ICT - Licensing and Regulatory Framework: Regulator - Judiciary power professionals - Business owners & Managers - IT providers and professionals - End Users 8

: Organization Structure Board Director General Board Secretary Procurement Officer Internal Audit DG Secretary PRO Executive Assistant ICT Deputy DG Transport Deputy DG ICT Infrastructure Dvp. Director Telecom Standards NGN Standards Broadcasting Standards Wireless and Broadcasting Standards ICT Resource Mgmt and Monitoring Dir. ICT Resource Mgmt. Spectrum Numbering Internet Resources ICT Applications, Postal and Cyber Security Dir. ICT Applications Postal Services 9 Cyber Security

Cyber Security & CIIP: Obligations Regulator: Define National Cyber Security strategies and guidelines (ITU standards) Judiciary Power professionals: Define a legal framework enforceable at a national level but compatible with international level Develop measures to fight against cyber crime and collaborate at international levels 10

Cyber Security & CIIP: Obligations, contd. Business owners & Managers Produce effective security processes Awareness of ICT related risks and security costs Collaborate with the Cyber Security regulator and technical professionals. 11

Cyber Security & CIIP: Obligations, contd. IT providers and professionals Analyze, design, develop and implement efficient security tools and measures of protection that are: Cost effective user friendly Transparent Auditable Third party controllable 12

Cyber Security & CIIP: Obligations, contd. End Users Awareness among all users Adoption of a security behaviour for ICTs Help the end user to understand the threats (virus, spam, identity theft, data protection, privacy ): Raise awareness of Cyber Cafe managers and school managers To make them define practical recommendations for the safe use of ICT and communicate them to people they interact with. 13

Cyber Security & CIIP: Obligations, contd. End Users Facilitate definition and deployment of national cyber security strategies and international cooperation: Create local know how based on well recognized standards and answer specific local needs by integrating local cultural values in national standards derived from international standards and recognized best practices. 14

Cyber Security & CIIP: Obligations, contd. End Users Vehicle a common understanding of what Cyber Security means to all. Educational events in partnership with local actors (schools, private or public institutions etc ) 15

Thanks for your attention 16