SlideShare ist ein Scribd-Unternehmen logo
1 von 12
CTO CYBERSECURTY FORUM 2010 17th-18th June 2010, London, UK East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant Director, Information Technology Communications Commission of Kenya (CCK)
CONTENTS Preamble Examples of Cybersecurity issues The EACO Cybersecurity Taskforce Achievements made by EACO Taskforce  Challenges Lessons learned and Recommendations
1. Preamble Declaration of Principles of the World Summit on the Information Society (WSIS), held in Tunis in 2005 adopted by Heads of States and Governments stated that: Cyber security is threatening the evolution of the Internet and hence a global concern; There is need to build confidence and security in the use of ICTs at the national, regional & global levels; There is need to also ensure the protection of data and privacy, while dealing with Cyber security issues; and ICTs should be used for developmental purposes.
1. Preamble (Cont’d) Cybersecurity has become a global concern due to: The global and Borderless nature of the Internet.  The exponential growth in the use of the Internet:  There are over 1.8 billion Internet users globally. Social Networking: Facebook, Twitter, etc. Convergence between Telecom, broadcasting, IT, etc (IP Telephony, digital TV…).  Financial services (E-Commerce, E-Banking, Mobile Money/M-Money.)  E-Government Services (E-Tax, E-Procurement, E-Education, E-Health). Hence to ensure security in the Cyberspace requires national, regional and international cooperation.
2. Examples of Cybersecurity issues We are already witnessing highly sophisticated cyber criminal acts on Critical Infrastructure: April 2007:  Estonia experiences cyber attacks on its critical national infrastructure. August 2008:  Russia is accused of attacking Georgian government websites in a cyber war that accompanied their military bombardment. December 2009:  Google detects a highly sophisticated and targeted attack on their corporate infrastructure originating from China. The Conficker Worm: Attack on the DNS; As such, Cybersecurity management should be in every country’s National ICT Agenda.
3. The EACO Cybersecurity Taskforce Definition of EACO: East Africa Communications Organization (EACO): ICT Regulators, Telecom Operators, Postal Operators, Broadcasting & Operators Member E.A. Countries: Kenya, Tanzania, Uganda, Rwanda & Burundi; The recent landing of three (3) fibre optic cables along the Coast of the East Africa has led to high Internet speeds and hence exponential growth in the use of the Internet/ICTs in the region: On one hand, this has brought East Africa closer to the rest of the global information ecosystem; On the other hand, it has made East Africa more prone to cybersecurity attacks (faster speeds favourable to criminals). Hence, East Africa region is making conscious and deliberate efforts to enhance Cybersecurity management in the region under the EACObanner.
3. The EACO Cybersecurity Taskforce (Cont’d) The EACO Cybersecurity Taskforce was formed in 2008 to coordinate the development of a Cybersecurity management framework for the EACO region. The EACO Taskforce Members are the 5 East Africa Countries: Tanzania, Uganda, Burundi, Rwanda, Kenya. The taskforce is Chaired by Kenya.
3. The EACO Cybersecurity Taskforce (Cont’d) The TOR of the EACO taskforce is to: Facilitate the establishment of National Computer Emergency Response Teams (CERTs) to facilitate Internet-wide response to Cybersecurity events and conduct research targeted at improving the security of existing systems; Coordinate response to Cybersecurity incidents at the regional level; Establish regional and international partnerships with other national entities involved with the management of Cybersecurity incidents; Provide regional Cybersecurity Incident reports annually to EACO member countries, among others.
4. Achievements made by EACO Taskforce So far the taskforce has attained several milestones, including: Partnership with the ITU (and IMPACT) in the deployment of National Cybersecurity frameworks;  Benchmark visits to Finland and Hungary  (2009); Capacity Building workshops: In Kenya in collaboration with ICANN, FIRST, ENISA (March 2010 in Nairobi). In Kenya in collaboration with Symantec (March  2010 in Nairobi). In Uganda in collaboration with the ITU-IMPACT (May 2010 in Uganda). Country Assessment by the ITU-IMPACT on the national CERT establishment needs for the EACO member countries; EACO member countries have now embarked on the establishment of national CERTs in their respective countries.
5. Challenges Some of the challenges the EACO region is experiencing in the management of Cybersecurity include: Lack of relevant Policies, Legal & Regulatory frameworks; Lack of national Cybersecurity management frameworks (national CERTs); Lack of Certification Service Providers (CSPs) for the provision of digital certificates;  Limited Cybersecurity Awareness; Inadequate Policy, Technical and Legal Capacity; Lack of National Points of Contact (POC) which are key in the creation of Trust Networks; Lack of Regional and International Cybersecurity collaboration frameworks, among others.
6. Lessons learned and Recommendations Cybersecurityis a growing global concern due to its borderless nature, and hence there is need for collaboration and concerted effort in the management of Cybersecurity globally.  At the national level, there’s need for countries to: Develop relevant Policies, Legal and Regulatory frameworks; Establish national CERTs; Establish a Trusted Point of Contact (TPOC); Build Capacity: – Technical, legal and policy;  Create Cybersecurity Awareness; Harmonize Cybersecurity management frameworks at the Regional level; Establish a collaboration framework aimed at partnering with the global Cybersecurity management community; To build trust at the National, regional and international level.
Thank you/ASANTE! Michael K. KatunduAssistant Director, Information TechnologyCommunications Commission of Kenya (CCK)katundu@cck.go.ke

Weitere ähnliche Inhalte

Was ist angesagt?

ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCandice Tang
 
ITU Committed to connecting the world
ITU Committed to connecting the worldITU Committed to connecting the world
ITU Committed to connecting the worldDr Lendy Spires
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
 
Why Romania tops global internet speed-
Why Romania tops global internet speed-Why Romania tops global internet speed-
Why Romania tops global internet speed-Dan Barbulescu
 
International Telecommunication Union (ITU)
International Telecommunication Union (ITU)International Telecommunication Union (ITU)
International Telecommunication Union (ITU)Aswin KP
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondBenjamin Ang
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Benjamin Ang
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT UpdatesAPNIC
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
 

Was ist angesagt? (20)

ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
T0 b060000033301pdfe
T0 b060000033301pdfeT0 b060000033301pdfe
T0 b060000033301pdfe
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
Bueti introduction
Bueti introductionBueti introduction
Bueti introduction
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
 
CTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu MkandawireCTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu Mkandawire
 
CTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu MkandawireCTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu Mkandawire
 
ITU Committed to connecting the world
ITU Committed to connecting the worldITU Committed to connecting the world
ITU Committed to connecting the world
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Why Romania tops global internet speed-
Why Romania tops global internet speed-Why Romania tops global internet speed-
Why Romania tops global internet speed-
 
International Telecommunication Union (ITU)
International Telecommunication Union (ITU)International Telecommunication Union (ITU)
International Telecommunication Union (ITU)
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyond
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 

Andere mochten auch

CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victorsegughana
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Reportsegughana
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhousesegughana
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Wardsegughana
 
CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattanisegughana
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johansonsegughana
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Borensegughana
 

Andere mochten auch (7)

CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Report
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
 
CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattani
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
 

Ähnlich wie CTO-CybersecurityForum-2010-Michael Katundu

The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
ITU News Issue 1 2007 - Sharing out spectrum for ENG
ITU News Issue 1 2007 - Sharing out spectrum for ENGITU News Issue 1 2007 - Sharing out spectrum for ENG
ITU News Issue 1 2007 - Sharing out spectrum for ENGRoger G Bunch
 
Cybersecurity Event 2010
Cybersecurity Event 2010Cybersecurity Event 2010
Cybersecurity Event 2010segughana
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
Telecommunication union by Sayef Amin +8801924122222
Telecommunication union by Sayef Amin +8801924122222Telecommunication union by Sayef Amin +8801924122222
Telecommunication union by Sayef Amin +8801924122222Asian Paint Bangladesh Ltd
 
UNECA- State of ICT policy and linkage with agriculture in africa
UNECA- State of ICT policy and linkage with agriculture in africaUNECA- State of ICT policy and linkage with agriculture in africa
UNECA- State of ICT policy and linkage with agriculture in africaNawsheen Hosenally
 
National Initiatives ITU
National Initiatives ITUNational Initiatives ITU
National Initiatives ITUAdrian Hall
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityEthical Sector
 
Fred samuel, tech change preso may 8th 2013
Fred samuel, tech change preso may 8th 2013Fred samuel, tech change preso may 8th 2013
Fred samuel, tech change preso may 8th 2013Gerard McCarthy
 

Ähnlich wie CTO-CybersecurityForum-2010-Michael Katundu (20)

Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landjiCTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
 
Internet Governance Backround
Internet Governance BackroundInternet Governance Backround
Internet Governance Backround
 
ITU News Issue 1 2007 - Sharing out spectrum for ENG
ITU News Issue 1 2007 - Sharing out spectrum for ENGITU News Issue 1 2007 - Sharing out spectrum for ENG
ITU News Issue 1 2007 - Sharing out spectrum for ENG
 
Cybersecurity Event 2010
Cybersecurity Event 2010Cybersecurity Event 2010
Cybersecurity Event 2010
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
CTO Cybersecurity Forum 2013 Cecile Barayre
CTO Cybersecurity Forum 2013 Cecile BarayreCTO Cybersecurity Forum 2013 Cecile Barayre
CTO Cybersecurity Forum 2013 Cecile Barayre
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
NITA-U presentation 11th august 2011
NITA-U presentation 11th august 2011 NITA-U presentation 11th august 2011
NITA-U presentation 11th august 2011
 
Telecommunication union by Sayef Amin +8801924122222
Telecommunication union by Sayef Amin +8801924122222Telecommunication union by Sayef Amin +8801924122222
Telecommunication union by Sayef Amin +8801924122222
 
UNECA- State of ICT policy and linkage with agriculture in africa
UNECA- State of ICT policy and linkage with agriculture in africaUNECA- State of ICT policy and linkage with agriculture in africa
UNECA- State of ICT policy and linkage with agriculture in africa
 
UNECA- State of ICT policy and linkage with agriculture in africa
UNECA- State of ICT policy and linkage with agriculture in africaUNECA- State of ICT policy and linkage with agriculture in africa
UNECA- State of ICT policy and linkage with agriculture in africa
 
National Initiatives ITU
National Initiatives ITUNational Initiatives ITU
National Initiatives ITU
 
NITA-U Presentation at 1st National Communication conference 5-9-2011
NITA-U Presentation at 1st National Communication conference 5-9-2011NITA-U Presentation at 1st National Communication conference 5-9-2011
NITA-U Presentation at 1st National Communication conference 5-9-2011
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 
Fred samuel, tech change preso may 8th 2013
Fred samuel, tech change preso may 8th 2013Fred samuel, tech change preso may 8th 2013
Fred samuel, tech change preso may 8th 2013
 
Bueti introduction
Bueti introductionBueti introduction
Bueti introduction
 

Mehr von segughana

CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Wardsegughana
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwesegughana
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crainsegughana
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torressegughana
 
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will GardnerCTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardnersegughana
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oramsegughana
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamssegughana
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonoghsegughana
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-DdosCTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddossegughana
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnettsegughana
 
CTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKayCTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKaysegughana
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Ministersegughana
 
CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010segughana
 

Mehr von segughana (15)

CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crain
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torres
 
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will GardnerCTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardner
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oram
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-DdosCTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
 
CTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKayCTO-Cybersecurity Forum-Angela McKay
CTO-Cybersecurity Forum-Angela McKay
 
CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Minister
 
CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010
 

CTO-CybersecurityForum-2010-Michael Katundu

  • 1. CTO CYBERSECURTY FORUM 2010 17th-18th June 2010, London, UK East Africa Communications Organizations (EACO) Region Experience Michael K. Katundu Assistant Director, Information Technology Communications Commission of Kenya (CCK)
  • 2. CONTENTS Preamble Examples of Cybersecurity issues The EACO Cybersecurity Taskforce Achievements made by EACO Taskforce Challenges Lessons learned and Recommendations
  • 3. 1. Preamble Declaration of Principles of the World Summit on the Information Society (WSIS), held in Tunis in 2005 adopted by Heads of States and Governments stated that: Cyber security is threatening the evolution of the Internet and hence a global concern; There is need to build confidence and security in the use of ICTs at the national, regional & global levels; There is need to also ensure the protection of data and privacy, while dealing with Cyber security issues; and ICTs should be used for developmental purposes.
  • 4. 1. Preamble (Cont’d) Cybersecurity has become a global concern due to: The global and Borderless nature of the Internet. The exponential growth in the use of the Internet: There are over 1.8 billion Internet users globally. Social Networking: Facebook, Twitter, etc. Convergence between Telecom, broadcasting, IT, etc (IP Telephony, digital TV…). Financial services (E-Commerce, E-Banking, Mobile Money/M-Money.) E-Government Services (E-Tax, E-Procurement, E-Education, E-Health). Hence to ensure security in the Cyberspace requires national, regional and international cooperation.
  • 5. 2. Examples of Cybersecurity issues We are already witnessing highly sophisticated cyber criminal acts on Critical Infrastructure: April 2007: Estonia experiences cyber attacks on its critical national infrastructure. August 2008: Russia is accused of attacking Georgian government websites in a cyber war that accompanied their military bombardment. December 2009: Google detects a highly sophisticated and targeted attack on their corporate infrastructure originating from China. The Conficker Worm: Attack on the DNS; As such, Cybersecurity management should be in every country’s National ICT Agenda.
  • 6. 3. The EACO Cybersecurity Taskforce Definition of EACO: East Africa Communications Organization (EACO): ICT Regulators, Telecom Operators, Postal Operators, Broadcasting & Operators Member E.A. Countries: Kenya, Tanzania, Uganda, Rwanda & Burundi; The recent landing of three (3) fibre optic cables along the Coast of the East Africa has led to high Internet speeds and hence exponential growth in the use of the Internet/ICTs in the region: On one hand, this has brought East Africa closer to the rest of the global information ecosystem; On the other hand, it has made East Africa more prone to cybersecurity attacks (faster speeds favourable to criminals). Hence, East Africa region is making conscious and deliberate efforts to enhance Cybersecurity management in the region under the EACObanner.
  • 7. 3. The EACO Cybersecurity Taskforce (Cont’d) The EACO Cybersecurity Taskforce was formed in 2008 to coordinate the development of a Cybersecurity management framework for the EACO region. The EACO Taskforce Members are the 5 East Africa Countries: Tanzania, Uganda, Burundi, Rwanda, Kenya. The taskforce is Chaired by Kenya.
  • 8. 3. The EACO Cybersecurity Taskforce (Cont’d) The TOR of the EACO taskforce is to: Facilitate the establishment of National Computer Emergency Response Teams (CERTs) to facilitate Internet-wide response to Cybersecurity events and conduct research targeted at improving the security of existing systems; Coordinate response to Cybersecurity incidents at the regional level; Establish regional and international partnerships with other national entities involved with the management of Cybersecurity incidents; Provide regional Cybersecurity Incident reports annually to EACO member countries, among others.
  • 9. 4. Achievements made by EACO Taskforce So far the taskforce has attained several milestones, including: Partnership with the ITU (and IMPACT) in the deployment of National Cybersecurity frameworks; Benchmark visits to Finland and Hungary (2009); Capacity Building workshops: In Kenya in collaboration with ICANN, FIRST, ENISA (March 2010 in Nairobi). In Kenya in collaboration with Symantec (March 2010 in Nairobi). In Uganda in collaboration with the ITU-IMPACT (May 2010 in Uganda). Country Assessment by the ITU-IMPACT on the national CERT establishment needs for the EACO member countries; EACO member countries have now embarked on the establishment of national CERTs in their respective countries.
  • 10. 5. Challenges Some of the challenges the EACO region is experiencing in the management of Cybersecurity include: Lack of relevant Policies, Legal & Regulatory frameworks; Lack of national Cybersecurity management frameworks (national CERTs); Lack of Certification Service Providers (CSPs) for the provision of digital certificates; Limited Cybersecurity Awareness; Inadequate Policy, Technical and Legal Capacity; Lack of National Points of Contact (POC) which are key in the creation of Trust Networks; Lack of Regional and International Cybersecurity collaboration frameworks, among others.
  • 11. 6. Lessons learned and Recommendations Cybersecurityis a growing global concern due to its borderless nature, and hence there is need for collaboration and concerted effort in the management of Cybersecurity globally. At the national level, there’s need for countries to: Develop relevant Policies, Legal and Regulatory frameworks; Establish national CERTs; Establish a Trusted Point of Contact (TPOC); Build Capacity: – Technical, legal and policy; Create Cybersecurity Awareness; Harmonize Cybersecurity management frameworks at the Regional level; Establish a collaboration framework aimed at partnering with the global Cybersecurity management community; To build trust at the National, regional and international level.
  • 12. Thank you/ASANTE! Michael K. KatunduAssistant Director, Information TechnologyCommunications Commission of Kenya (CCK)katundu@cck.go.ke