AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele

Slides:



Advertisements
Similar presentations
1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Advertisements

Philippine Cybercrime Efforts
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
Tanzania Communications Regulatory Authority - TCRA Response to Cyber incidences in Tanzania: Where are we? Presented at Cyber Security Mini Conference.
David A. Brown Chief Information Security Officer State of Ohio
E-Security Background IT Infrastructure in Sikkim Current Status of Cyber Security& Cyber Crime in SIkkimCurrent Status of Cyber Security& Cyber Crime.
DHS, National Cyber Security Division Overview
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
NIS Directive and NIS Platform
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Legal Framework on Information Security Ministry of Trade, Tourism and Telecommunication Nebojša Vasiljević.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
1 Information Technology Security Services at The University of Michigan Paul Howell Chief Information Technology Security Officer.
The Cyber Defense center and its services portfolio McAfee Professional Services – Foundstone Services.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
The National Cyber Security Strategy and Action Plan A presentation by Ms. Antoinette Lucas-Andrews Director, International Affairs Ministry.
Fair competition commission 1 Fifth Annual African Dialogue Consumer Protection Conference September 10-12, 2013 ● Livingstone, Zambia Empowering and Educating.
Cybersecurity Governance in Ethiopia
2 ictQATAR “ Information and Communication Technology (ICT) improves how we live and work in countless ways.”  The Ministry of Information Communication.
ITU Carla Licciardello Policy Analyst
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Cyber security implementation within an organization Ltn Andri Rebane Estonian MoD CIO.
1 st Workshop on issues and trends arising from the European IRRS missions Findings and Conclusions A.Munuera Brussels, 22 nd and 23 rd January 2014.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
 The East African Communications Organization (EACO) is an inter- governmental organization established by ICT regulators and operators from the East.
Information and Cyber Security
Sofia, 09 June Sofia, 09 June 2010 MINISTRY OF TRANSPORT, INFORMATION TECHNOLOGY AND COMMUNICATIONS Executive Agency “Electronic Communication Networks.
Role and Objectives of the Cybersecurity Bureau კიბერუსაფრთხოების ბიურო Cyber Security Bureau Speaker: Mari Malvenishvili GITI 2015.
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Digital Enlightenment.
ISACA Ireland Cyber Security Policy 9 February 2016.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Cyberlaw Harmonization in the East African Community Cécile Barayre-El Shami Programme Manager, E-Commerce and Law Reform, ICT Analysis Section, Division.
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
Information Security Officer Meeting
Cyber Security and Georgia. New Challenges
Cyber Security – An Existential Threat? (IIC, Singapore)
Johannesburg, South Africa
Cybersecurity - What’s Next? June 2017
Cybersecurity in the ECOWAS region
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
Public-private cooperation
California Cybersecurity Integration Center (Cal-CSIC)
About the NIS directive
European Cybercrime Centre - EC3
Cybersecurity in Belarus a general overview of support areas
Cyber Security coordination in Europe CERT-EU’s perspective
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
5G Security Training
8 Building Blocks of National Cyber Strategies
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
ITU an Overview Combined International SNO and 8th African SNO
Survey of ICT Standardization Capability of Developing Countries
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Trust and Security Unit
Cyber Security professions Overview
Promoting Global Cybersecurity
Cyber Security Ecosystem of Georgia. Experience and Challenges
Challenges and Successes in the Zambian ICT Security Sector
The European Union response to cyber threats
OVERVIEW OF EACO WORKING GROUP 07: E-WASTE AND COUNTERFEIT GADGETS MANAGEMENT PRESENTED TO THE 3RD AWARENESS WORKSHOP, 14TH – 16TH MAY 2018, KIGALI,
OVERVIEW OF EACO WORKING GROUP 07: E-WASTE AND COUNTERFEIT GADGETS MANAGEMENT PRESENTED TO THE 3RD AWARENESS WORKSHOP, 14TH – 16TH MAY 2018, KIGALI,
DSC Contract Management Committee Meeting
5th PASET Forum Kigali, Rwanda| May 22, 2019
5th PASET Forum Kigali, Rwanda| May 22, 2019
Presentation transcript:

AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele Cyber Security Specialist - ZICTA Member of Zambia CIRT

LEGAL FRAMEWORK In 2009, a new regulatory regime, Zambia Information and Communications Technology Authority (ZICTA) ,was ushered in after enacting three laws; However the law, Electronic Communications and Transactions (ECT) Act of 2009, is the one that addresses the following with regards to cyberspace: Protect of personal information Protection of critical databases Access to stored communication Encryption Communication Cyber Inspectors Cyber Crime

LEGAL FRAMEWORK SADC proposed the separation of our ECT act into three (3) Bills Cybercrime & Cyber Security Bill Data Protection Bill Electronic Transactions and Communications Bill This has since been done and submitted to the Ministry of Justice Other developments: Undertook A Cyber Security Maturity Assessment – in partnership with WorldBank and Oxford University Formation of a National Cyber Security Technical Committee Currently finalizing National Cyber Security Policy and Cyber security Strategy

E-GOVERNMENT

OBJECTIVE OF ZmCIRT 1- Serve as a trusted focal point 2 - Develop a capability to support incident reporting. 3 - Develop an infrastructure for coordinating response. 4 - Conduct incident, vulnerability & Artifact analysis. 5 - Participate in Cyber Watch functions. 6 - Help organizations develop their own incident management capabilities. 7 -Facilitate Cyber drills and Exercises 8 - Make security best practices & guidance available. 9 - Provide awareness, education & trainings

Facilitated Specialist Training Course of Govt. Institutions HISTORY & TIMELINE 2012 2013 Facilitated Specialist Training Course of Govt. Institutions Facilitated Specialist Training Course of Govt. Institutions ISO2700, Ethical Hacking, Reverse Malware Analysis, Mobile Security, Intrusion Detection System Computer Forensics Investigations –Windows In Depth -408 Advanced Computer Forensic Analysis and Incident Response -508 GSEC boot Camp Kick started the Digital forensics assistance to Law enforcement silensec.com - Trainers SANS.com - Trainers 20th August 2012 COMPUTER INCIDENT RESPONSE TEAM Established Kick started the National Cyber Security Awareness Tour to cover All 10 provinces Police Computer Forensic Lab setup by CIRT Hosted AfNOG and AfriCERT Training CERT – INCIDENT RESPONSE, Network Forensic Training, ITU - Partners IMPACT ITU - Partners AfNOG & JPCERT - Trainers

Facilitated Specialist Training Course of Govt. Institutions HISTORY & TIMELINE 2014 2015 Facilitated Specialist Training Course of Govt. Institutions Network Pentesting, Log Analysis Mobile (IOS, ANDROID,BLACKEBERRY0& MAC OS Forensics Honey Pot setup and deployment Hosted the First Africa Cyber drill IMPACT- ITU - Trainers Training undertaken with CII, Law Enforcement, Judiciary , and defense forces silensec.com , IMPACT-ITU , BIT DEFENDER & NUIX - Trainers Adopted ISO27000 series standards – National Gazette ZM CIIRT MoU Zambia Bureau of Standards

HISTORY & TIMELINE 2016 2017 2018 ZmCIRT is affiliated with FIRST SIGNED MoU with Financial Intelligence Commission (FIC) Facilitated train the Trainer Program in collaboration with Ministry of Higher Education Information sharing regarding financial fraud or Cyber –enabled financial Fraud ZM CIRT Trained over 200 high school teachers in basic Cyber security Started the ICT girls club in High schools Cyber security awareness programme targeting university and colleges ZmCIRT is affiliated with FIRST First Phishing Cyber DRILL Conducted silensec.com , IMPACT-ITU , BIT DEFENDER & NUIX - Trainers ZM CIRT Contributed to drafting of Cybersecurity , Cybercrime and Data Protection Bills ZM CIIRT Draft Laws are before parliament ZmCIRT, Ministry of Justice, Smart Zambia Institute, Ministry Transport and Communication, Independent Broadcasting Authority and Zambia Information Communication & Technology Authority - Stakeholders

SERVICES Reactive Services Proactive Services Artifact Handling Alerts & Warnings Announcements Artifact Analysis Incident Handling Technology Watch Artifact response Incident Analysis Security Audits Artifact response coordination Incident response support Security Assessments Security Quality Management Incident response coordination Configuration & Maintenance of Security Risk Analysis Incident response on site Development of Security Tools Awareness Building Vulnerability Handling Intrusion detection services Security Consulting Vulnerability Analysis Security related information dissemination Education/Training Vulnerability Response Project Evacuation or Certification Vulnerability Response Coordination

ON GOING NATIONAL ACTIVITIES… Formulation of Public Key Infrastructure Framework Establishment of National Cyber Security Agency Creation of Sub-Sector CIRTS

THANK YOU…. ZIKOMO ZAMBIA at 50 yrs. + 4 yrs. on 24th October 2018