Joseph Richardson Senior Fellow, ICC ICC Survey of CERT Capacity in Africa July 2010.

Slides:



Advertisements
Similar presentations
INTERNET GOVERNANCE WHAT DOES IT MEAN FOR AFRICA? ASHOK.B.RADHAKISSOON.
Advertisements

WCDR Thematic Panel Governance: Institutional and Policy Frameworks for Risk Reduction Annotated Outline UNDP – UNV – ProVention Consortium – UN-Habitat.
Philippine Cybercrime Efforts
AfriMAP’s The Justice Sector and the Rule of Law in Namibia
Presented by Mostefa Boudiaf Turin, 9 July 2007 Prepared by Maria Sabrina De Gobbi ILO Employment Policy Unit - Employment Strategy Department « Trade.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
Strategy and Policy Unit: Current Activities and Future Tasks
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Dr. Rose Mwebaza Advisor – Women’s Economic and Political Participation Building an enabling environment for Women’s Economic and Political Participation.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
National Cybersecurity Management System
June, 2003 Poverty and Climate Change Reducing the Vulnerability of the Poor through Adaptation Poverty and Climate Change Reducing the Vulnerability of.
MALAWI CAADP IMPLEMENTATION PROGRESS A PRESENTATION MADE AT THE FANRPAN REGIONAL POLICY DIALOGUE- MAPUTO, MOZAMBIQUE. 3 rd September, 2000 By K. Ng’ambi.
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
Africa Energy Challenges and Opportunities By Atef Marzouk Energy, Senior Policy Officer Department of Infrastructure and Energy African Union Commission.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
Cooperatives and Youth in the Context of Rural Development Presented at the Seminar Organized by Agri-Seta Prof. Muxe Nkondo National Small Business Advisory.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
Keynote II - ICT4DEV Keynote II - ICT4DEV global e-schools and communities initiative transforming education, empowering communities, promoting development.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
Successful strategies for supporting regional FLEG declarations Regional Conference on ”Update on the 2005 Saint Petersburg Ministerial Declaration” Tbilisi,
OECD RECOMMENDATION ON DIGITAL GOVERNMENT STRATEGIES From citizen-centric to citizen-driven approaches Barbara Ubaldi Programme Manager– Reform of the.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
The Draft SADC Annex on Trade in Services UNCTAD Secretariat Sub-regional Conference on Improving Industrial Performance and Promoting Employment in SADC.
Gap Analysis of Ongoing Youth Employment Efforts.
Collaboration for Maritime Security African Union Workshop April 2012 Phillip J. Heyl Chief, Air & Maritime Security Branch (J5)
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
CSO Development Effectiveness and Promotion of an Enabling Environment
A National approach to Cyber security/CIIP: Raising awareness.
An Analysis of the Cyber Security Strategy (2008) of Estonia Based in part on ITU Q.22/1 Report On Best Practices For A National Approach To Cybersecurity:
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
The new cyber threats in 2013 – the hungarian approach Mr. Mihály Zala, Major-general President of National Security Authority of Hungary.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
IMPLEMENTATION OF THE STRATEGY FOR THE HARMONISATION OF STATISTICS IN AFRICA (SHaSA) FIRST MEETING OF AFRICAN GROUP ON GOVERNACE AND PEACE AND SECURITY.
August 2006 “Making Finance Work for Africa“ AFRICA FinancialSector AFTFS Going Forward, Priorities for Africa Access to Finance and Financial Infrastructure.
Session 6: Summary of Discussion A. Institutional Barriers and Potential Solutions 1. Natural environment does not have national or institutional boundaries,
Sample of Stocktaking Exercise Replies Changes in African Agriculture Resulting from Implementation of CAADP Approaches Josue Dione, AUC/DREA.
 Civil Society is understood to encompass all associations formal and informal that are outside the state and the private market sector. They are associations,
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Session 3: Suggested Approaches. Introduction India is implementing most of the elements in the FI Not deliberate implementation of FI Suggested approaches.
The African Regional Preparatory Conference for the WSIS Access: Africa’s key to an inclusive Information Society 28 January – 4 February 2005 Accra, Ghana.
Monitoring the Paris Declaration in 2011 Preliminary Findings Working Party on Aid Effectiveness Paris, 5-8 July 2011.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Athens, Greece May 15, 2005 Global Public Policy.
1 FAO REGIONAL WORKSHOP ON RICE AND AQUACULTURE FOR PRODUCTIVITY INCREASE AND MARKET DEVELOPMENT IN EAST AFRICA, KAMPALA,UGANDA, APRIL 2009 AQUACULTURE.
Highlights on the New ICT Strategy After the 25 th January Revolution Dr. Mohamed Salem Minister of Communications and Information Technology October 2011.
CIP Prevention, detection, response and mitigation of the combination of physical and cyber threats to the transport infrastructure of Europe Dr.
1 EMPLOYMENT, SOCIAL PROTECTION AND DECENT WORK Outcomes from Workshop in Dakar 30 June-2 July 2011 Hjördis D’Agostino Ogendo European Commission DG EuropeAid.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
THE ROLE OF GOOD GOVERNANCE IN SUSTAINABLE DEVELOPMENT REGIONAL CONFERENCE ON LEADERSHIP, GOVERNANCE AND INTRGRITY AT KIGALI RWANDA BY PETER KIMEMIA NEPAD.
What is CAADP? How and why do we support it? What should we do differently? Cross Team Meeting, March 10 th 2010 Terri Sarch Africa Regional Department.
A COMPREHENSIVE APPROACH
Cyber Security and Georgia. New Challenges
Johannesburg, South Africa
Call for Action & International Initiative
Cybersecurity in the ECOWAS region
APPOINTMENT OF CENTRAL DRUG AUTHORITY NEW MEMBERS
The Biodiversity and Protected Areas Management (BIOPAMA) Programme
The Sendai Framework Data Readiness Review 2017
8 Building Blocks of National Cyber Strategies
National Cyber Strategy Preparedness: 8 Preparatory Questions
Sub-regional workshop on integration of administrative data, big data and geospatial information for the compilation of SDG indicators for English-speaking.
ESS Cooperation: New Financial supporting frameworks?
Combating Cybercrime: Tools and Capacity Building for Emerging Economies WSIS 2015, Geneva Jinyong Chung May 25, 2015.
Promoting Global Cybersecurity
Cyber Security Ecosystem of Georgia. Experience and Challenges
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
Institution and Capacity- Building
Presentation transcript:

Joseph Richardson Senior Fellow, ICC ICC Survey of CERT Capacity in Africa July 2010

 Develop a better understanding of cyber security and CERT capacity in Africa.  Input from all participants; ◦ Governments ◦ Private Sector ◦ Civil Society ◦ Academia

 The African Union (AU) ◦ An international organization consisting of 53 African states whose objectives include to coordinate and intensify cooperation for development.  The World Information Technology and Services Alliance (WITSA) ◦ A consortium of over 60 information technology (IT) industry associations from economies around the world.

 Incident management ◦ Which of 23 identified potential functions associated with incident management (CERT activity) are being performed in country?  Legal infrastructure ◦ On a scale of 0-5 what progress has been made on six (6) key cybercrime elements (from review of laws to international cooperation)? ◦ What other laws associated with cyber security have been addressed (privacy, data protection, commercial law, etc)?  National Strategy for Cyber security ◦ Which of 17 potential national objectives for cyber security are included in a national strategy or being done outside such a strategy?

 26 valid responses from 12 countries ◦ 35 % government employees ◦ 50 % private sector ◦ 11 % academia ◦ 4 % civil society

 22 % report their country has a CERT with national responsibility (N-CERT)  30 % report their country is addressing 16 or more of the 23 cyber incident management functions.  61 % report their country is addressing 6 or fewer of the 23 functions.

 For each of the 6 cyber crime functions ◦ 45 % of respondents reported no action. ◦ 5% of respondents reported completed action.  For other legal infrastructures associated with cyber security ◦ 50 % reported no action on any of the other legal infrastructures

 35 % have a national strategy ◦ Addressing on average 62% of the 17 objectives.  65 % have no national strategy ◦ Yet they are addressing 13 % of the 17 objectives

 Efforts are underway in most countries of Africa to address cyber security providing a base upon which to build. ◦ Including across a range of N-CERT functions  An N-CERT is correlated with activity across the full range of incident management functions.  The development of a national cyber security strategy is correlated with a comprehensive response to cyber security.