National Cyber Strategy Preparedness: 8 Preparatory Questions

Slides:



Advertisements
Similar presentations
Presented at the ECOSOC 2012 Development Cooperation Forum 1 st High-level Symposium Bamako, Mali 5-6 May 2011 by Timothy Lubanga, Assistant Commissioner.
Advertisements

Tips and Resources IASC Cluster/Sector Leadership Training
Philippine Cybercrime Efforts
Gaining Senior Leadership Support for Continuity of Operations
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
Digital public services and innovation
INTRODUCTION An ICT policy is in the final stages of being adopted; Provisions in the policy and related strategies which are meant to facilitate policy.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
What is Capacity, Capacity Assessment, and Capacity Development Capacity is defined as “the ability of individuals, organizations, and societies to perform.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Project Human Resource Management
E-government in the Pacific Islands: project update Rowena Cullen Graham Hassall.
 By Emmanuel Habumuremyi Lemigo Hotel 17 August 2011.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
United Nations Economic Commission for Africa (UNECA) On the Road to Athens African Ministerial Positions on IG during WSIS 18–21 September 2006, Cairo,
CHAPTER 10 Technology Issues.
World summit on the information society 1 Pierre Gagné International Telecommunication Union March 2004 WSIS Follow-up Building the Information Society:
Cybersecurity Governance in Ethiopia
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
A National approach to Cyber security/CIIP: Raising awareness.
John Grant Chief General Manager National Office for the Information Economy Canberra, Australia The Government OnLine Strategy.
CBP National Trade Strategy Winter Presenter’s Name June 17, 2003 CBP’s Trade Vision  CBP’s trade vision is to develop a swift, safe, and secure.
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Joseph Richardson Senior Fellow, ICC ICC Survey of CERT Capacity in Africa July 2010.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Cross Cutting Initiatives - Education William E. Kelly Professor of Civil Engineering The Catholic University of America.
The African Regional Preparatory Conference for the WSIS Access: Africa’s key to an inclusive Information Society 28 January – 4 February 2005 Accra, Ghana.
ICT Capacity Building Program Development Framework and implementation 6-7 May, 2003 Addis Ababa.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Athens, Greece May 15, 2005 Global Public Policy.
Name Project Management Symposium June 8 – 9, 2015 Slide 1 Susan Hostetter, Reed Livergood, Amy Squires, and James Treat 2015 Project Management Symposium.
“DEVELOPMENT OF A NATIONAL ICT POLICY ICT Policy in the ECTEL Member States Mr. Donnie Defreitas MSc, (Hav.), ECTEL Caribbean Internet Forum Bay Gardens.
Assisting African countries to improve compilation of basic economic statistics: an outline of the UNSD strategy Vladimir Markhonko United Nations Statistics.
A look into current and future trends in national policies for eHealth and Innovation in the WHO European Region Clayton Hamilton, eHealth and Innovation.
E-Strategy Sudan National Information Society Strategy.
UNGGIM – PRIVATE SECTOR NETWORK. AGENDA > OVERVIEW OF PRIVATE SECTOR >PURPOSE AND VISION OF PRIVATE SECTOR NETWORK > STRUCTURE AND TERMS OF REFERENCE.
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
CARILEC. An Association of Electric Utilities CARILEC An Association of Electric Utilities The Caribbean Electric Utility Service Corporation (CARILEC)
In relation to WSIS Plan of Action – Internet Governance
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Johannesburg, South Africa
Agenda Challenges Open Data Initiative Future Plan Open Data
MGMT 452 Corporate Social Responsibility
Developing reporting system for SDG and Agenda 2063, contribution of National Statistical System, issues faced and challenges CSA Ethiopia.
inclusive Information Society
Auditing Sustainable Development Goals
Information Sharing for Integrated care A 5 Step Blueprint
Integrated Management System and Certification
About the NIS directive
HEALTH IN POLICIES TRAINING
Collective Impact Fall 2017.
8 Building Blocks of National Cyber Strategies
National Incident Response Discussion Exercise
Guidelines on Integrated Economic Statistics
Managing Change and Other Keys to Successful Implementation
Community Technology Assessments
International experience in economic statistics programmes
Day One Activities Day Two Activities Strengths and Challenges –
Capacities for Successful Implementation
Guidelines on Integrated Economic Statistics
Chapter 8 Developing an Effective Ethics Program
Gem Complete Health Services
Qatar’s Gateway to the 21st Century
Guidelines on Integrated Economic Statistics
Investing in Data Management Capabilities
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Workshop on Continental Strategy for Data Collection and Validation SRO-EA’s activities on Statistics Mr. Mactar Seck Economic Affairs Officer ICT Policies.
5th PASET Forum Kigali, Rwanda| May 22, 2019
RCA Workshop on RCARO Future Strategies July 2007
Presentation transcript:

Cyber Strategy Workshop for African Union Member States July 23-27, 2018 Addis Ababa, Ethiopia

National Cyber Strategy Preparedness: 8 Preparatory Questions

The 8 Preparatory Questions Activity Introduction to the 8 Preparatory Questions for Developing and Implementing a National Cyber Strategy National teams review and discuss each question @ 2018 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution Unlimited. Case 17-2155

1. Is the Internet part of your development plan 1. Is the Internet part of your development plan? Is it as important as Roads? Water? Electricity? Internet access can provide citizens with health, economic, and knowledge benefits. It is an essential pre-requisite for nations to be a part of the digital global economy. @ 2018 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution Unlimited. Case 17-2155

2. Does Leadership Prioritize Cyber Capacity Building? An effective cyber strategy will requires cross-government agreement about its importance. Cyber capabilities and processes are interconnected, it is difficult to implement in only part of the government or in some industries. Broad commitment is usually necessary in order to provide resources, coordinate implementation, and convincingly communicate to the larger society. @ 2018 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution Unlimited. Case 17-2155

3. Do you have Defined Cyber Stakeholders? Cyberspace connects: Government Industry Academia Individuals Cyberspace involves: ICT Infrastructure Data Regulations Technologies Legal issues Ethical issues @ 2018 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution Unlimited. Case 17-2155

4. Do Stakeholders have Roles and Responsibilities? Different entities will need to have defined roles because cyberspace impacts many parts of society. Identifying Stakeholders isn’t enough, each entity needs to know what their roles are, what part they play, and what their responsibilities are. Stakeholders also need to be held accountable and to understand the metrics used to measure success. @ 2018 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution Unlimited. Case 17-2155

5. Are the Stakeholders Regularly Involved? It is important that stakeholders are working together to solve cyber issues and have regular opportunities to connect. Having stakeholders who are not actively involved will weaken your ability to coordinate and deconflict cyber activities. Stakeholders who coordinate regularly are more likely to find common goals and objectives, which enables leveraging and sharing of resources. @ 2018 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution Unlimited. Case 17-2155

6. How do Stakeholders Communicate? Formal structures for stakeholders to communicate about priorities, roles, and responsibilities, and to coordinate efforts are important to start progress and maintain momentum. If there isn’t structure it can be difficult to ensure everyone’s priorities and resource needs are accounted for. There can be more than one approach depending on the goal – forums can be government only, industry only, public-private focused, or based on specific initiatives. Choose the format that is best for the needs of implementing a national strategy. @ 2018 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution Unlimited. Case 17-2155

7. Is there a Legal Framework for Cyberspace? A legal framework should include things like: Institutionalizing cyber roles and responsibilities Legitimizing electronic transactions Defining online theft and fraud Setting cybercrime investigations, prosecution, and judicial procedures and standards Addressing privacy, regulatory, and security concerns @ 2018 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution Unlimited. Case 17-2155

8. Are There Dedicated Government Resources for Cyber Capacity Building? Even the most basic cyber strategy will require resources to execute. Resources mean not only money, but also manpower and training, infrastructure and necessary partnerships. @ 2018 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution Unlimited. Case 17-2155

Answering the 8 Preparatory Questions In your packet, you have a copy of the 8 Questions and an Answer Table Using the Answer Table and working in national groups, answer the 8 Questions to the best of your ability with Yes; Yes, However, or No; No, However. This process will be facilitated by the speaker and groups will discuss and record each question Designate one member of the delegation to record answers on the hardcopy Answer Table Designate another delegation member to record answers on the on-line survey tool When you are finished answering the questions, turn in the Answer Table to a facilitator. @ 2018 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution Unlimited. Case 17-2155

Survey Monkey Access https://www.surveymonkey.com/r/ZCP6FSC to input your results. @ 2018 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution Unlimited. Case 17-2155

National Results – Delegation Nation________________ Question Yes Yes, However No No, However 1. Is internet connectivity a significant part of your country’s national development plan?  2. Does a broad segment of the government (and all key decision makers) agree that cyber capacity building is a national priority? 3. Does your country have a defined set of cybersecurity stakeholders? 4. Have roles and responsibilities been identified for cybersecurity stakeholders? 5. Are stakeholders consistently involved in resolving cyber-related issues such as strategy, policy, legislation, or national priorities? 6. Is there an organizational structure or some other formal means by which stakeholders communicate about cyber or technology priorities, roles, and responsibilities, and coordinate their efforts? 7. Does your country have a legal framework that applies to cyberspace? 8. Can the government realistically identify and commit resources for cyber capacity building?  TOTALS @ 2018 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution Unlimited. Case 17-2155

Questions? @ 2018 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution Unlimited. Case 17-2155