SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Building National Capacity for
Cybersecurity Assurance
By Marcel Ambiana Belingue, Senior Manager, Programmes, CTO
Presented at the 2013 Cybersecurity Forum
25 - 26 April 2013, Yaounde, Cameroon
1
Overview
1 About CTO
2 Cyber Risk Management in National ICT Policy Development
3 Cybersecurity as a Business Continuity Strategy
4 PDT – A Capacity Building Programme for Cybersecurity
2
About CTO
Vision:
To be the preferred partner organisation for governments, the
private sector and civil society in delivering effective ICTs for
development (ICT4D) in the Commonwealth and beyond.
Our Mission:
To promote, facilitate and guide members in using ICTs to deliver
effective development interventions.
Strategic Focus
Youth and ICTs | Regulatory environments | Skills development
ICTs and disabilities | Cybersecurity | Mobile broadband
3
Cyber Risk Management in National ICT Policy
Development
4
Source: iDA, Singapore
Cyber Risk Management in National ICT Policy
Development
Singapore’s iGov2010 (2006-2010)
 Vision: To be an integrated government that delights customers and
connects citizens through ICTs
 Driven by strategic thrusts, including Singapore’s competitiveness
 Security and partnerships among the key enablers
 Stated targets e.g. 8 out 10 users being “very satisfied” with the
quality of govenment e-services
 Part of a long-term vision, strategies, goals and policies
e-Government strategies play a key role in setting standards in
establishing a safe cyber space.
5
Cyber Risk Management in National ICT Policy
Development
Singapore’s
 iDA (planning, policy development, regulation, industry
development)
 iN2015 – An Intelligent Nation, a Global City
 Become #1 in the World in using ICTs to add value to the economy
 Sectoral transformation of key economic sectors; ultra-high speed,
pervasive, intelligent and trusted communication infrastructure; ICT-
savvy and globally competitive workforce
 National Trust Framework built on Indentity, Privacy, and
Security
 Key economic sectors: Financial services, Tourism, hospitality &
retail, government, manufacturing & logistics, education, etc
6
Cybersecurity as a Business Continuity Strategy
 Think information security
 Ensure resilience in processes and systems
 Adopt coping mechanisms
 Encourage shifts in attitudes and committment
 Undertake business impact assessments & security audits
 Have known and understood continuity plans
 ... etc
7
PDT – A Capacity Building Programme for
Cybersecurity
Some background facts
 Created in 1985
 Part of CTO membership until 2003
 Over 110 programmes delivered since 2010
 Over 36,000 ICT professionals trained since its creation
 Reaching out to meembers in 31 countries
PDT’s vision
“To be the preferred partnership for the delivery of cost-effective
access to ICT knowledge for human capital development.”
8
PDT – A Capacity Building Programme for
Cybersecurity
PDT key benefits
 in-house bespoke training and consulting programmes funded by
CTO and developed to meet member-specific strategic and
operational needs
 priority and sponsored access to regional and international training
programmes
 access to international expertise and exposure to the latest industry
best practice
 opportunities for benchmarking and long-term partnerships
 priority registration for other CTO programmes.
9
PDT – A Capacity Building Programme for
Cybersecurity
Who is the PDT for?
 Government ICT ministries
 Communications regulatory agencies
 Network operators and service providers
 Manufacturers
 Professional services firms
10
Caribb.
12%
W. Africa
21%
Pacific
13%
Asia
9%
ES Africa
45%
Policy
10%
Regulatio
n
14%
Technolo
gy
56%
Managem
ent
20%
PDT – A Capacity Building Programme for
Cybersecurity
Programme Funding
 Membership
 Requesting partners’ membership contributions: 70%
 Supplying partners’ membersip contributions: 13%
 Programme’s commercialisation
 Local partner’s contribution 10%
 Delegates fees 7%
11
PDT – A Capacity Building Programme for
Cybersecurity
Programme Development – September to March
12
Training
Requirements
Processed
Requirements
Agregated
Requirements
Open/Regional
Programme
Bilateral
Programme
Recommended
Programme
Evaluation
Approved
Programme
Supplier Proposals
Requests for
Proposals
Implemented
Programme
Projects
Marketing
Plans
Costed
Proposals
Supplier
Invitations

Weitere ähnliche Inhalte

Was ist angesagt?

CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Iad 2014 summit review
Iad 2014 summit reviewIad 2014 summit review
Iad 2014 summit reviewAdrian Hall
 
CTO Annual Report 2009-10
CTO Annual Report 2009-10CTO Annual Report 2009-10
CTO Annual Report 2009-10segughana
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCERudy Shoushany
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
neXt Curve The Great Gap: Digital Leadership & Governance
neXt Curve The Great Gap: Digital Leadership & GovernanceneXt Curve The Great Gap: Digital Leadership & Governance
neXt Curve The Great Gap: Digital Leadership & GovernanceLeonard Lee
 
ICT Association Suriname at Virtual Educa Caribbean 2012
ICT Association Suriname at Virtual Educa Caribbean 2012ICT Association Suriname at Virtual Educa Caribbean 2012
ICT Association Suriname at Virtual Educa Caribbean 2012Cyril Soeri
 
Darmanin Emanuel
Darmanin EmanuelDarmanin Emanuel
Darmanin EmanuelTecnimap
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.accenture
 
Helping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldHelping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldGood Things Foundation
 
iTaNGO project information session slides
iTaNGO project information session slidesiTaNGO project information session slides
iTaNGO project information session slidesiTaNGOproject
 
iTaNGO Information Session slides
iTaNGO Information Session slidesiTaNGO Information Session slides
iTaNGO Information Session slidesiTaNGOproject
 
Technology Readiness and Innovation in the field of business and security
Technology Readiness and Innovation in the field of business and securityTechnology Readiness and Innovation in the field of business and security
Technology Readiness and Innovation in the field of business and securityElias Aravantinos,[LION]
 

Was ist angesagt? (15)

CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Iad 2014 summit review
Iad 2014 summit reviewIad 2014 summit review
Iad 2014 summit review
 
CTO Annual Report 2009-10
CTO Annual Report 2009-10CTO Annual Report 2009-10
CTO Annual Report 2009-10
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCE
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
Security Culture
Security CultureSecurity Culture
Security Culture
 
neXt Curve The Great Gap: Digital Leadership & Governance
neXt Curve The Great Gap: Digital Leadership & GovernanceneXt Curve The Great Gap: Digital Leadership & Governance
neXt Curve The Great Gap: Digital Leadership & Governance
 
ICT Association Suriname at Virtual Educa Caribbean 2012
ICT Association Suriname at Virtual Educa Caribbean 2012ICT Association Suriname at Virtual Educa Caribbean 2012
ICT Association Suriname at Virtual Educa Caribbean 2012
 
Darmanin Emanuel
Darmanin EmanuelDarmanin Emanuel
Darmanin Emanuel
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
Helping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldHelping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital World
 
iTaNGO project information session slides
iTaNGO project information session slidesiTaNGO project information session slides
iTaNGO project information session slides
 
iTaNGO Information Session slides
iTaNGO Information Session slidesiTaNGO Information Session slides
iTaNGO Information Session slides
 
Technology Readiness and Innovation in the field of business and security
Technology Readiness and Innovation in the field of business and securityTechnology Readiness and Innovation in the field of business and security
Technology Readiness and Innovation in the field of business and security
 

Andere mochten auch

Stake holder map
Stake holder mapStake holder map
Stake holder mapTarun bhatt
 
PRESENTATION ON STAKE HOLDERS MAP OF BUSINESS
PRESENTATION ON STAKE  HOLDERS MAP OF BUSINESSPRESENTATION ON STAKE  HOLDERS MAP OF BUSINESS
PRESENTATION ON STAKE HOLDERS MAP OF BUSINESSsai kumar chintha
 
Role of Government in Indian Business Environment
Role of Government in Indian Business Environment Role of Government in Indian Business Environment
Role of Government in Indian Business Environment Manjunath Motupalli
 
Issues in Corporate Governance
Issues in Corporate GovernanceIssues in Corporate Governance
Issues in Corporate GovernanceLanguage Explore
 
Issues of corporate governance presented by Dushyant Maheshwari
Issues of corporate governance presented by Dushyant MaheshwariIssues of corporate governance presented by Dushyant Maheshwari
Issues of corporate governance presented by Dushyant MaheshwariDUSHYANT MAHESHWARI
 
Economic role of government in Indian Business
Economic role of government in Indian BusinessEconomic role of government in Indian Business
Economic role of government in Indian BusinessGeorge V James
 
Internal and external business environment
Internal and external business environmentInternal and external business environment
Internal and external business environmentAashish Sahi
 

Andere mochten auch (8)

Stake holder map
Stake holder mapStake holder map
Stake holder map
 
PRESENTATION ON STAKE HOLDERS MAP OF BUSINESS
PRESENTATION ON STAKE  HOLDERS MAP OF BUSINESSPRESENTATION ON STAKE  HOLDERS MAP OF BUSINESS
PRESENTATION ON STAKE HOLDERS MAP OF BUSINESS
 
Role of Government in Indian Business Environment
Role of Government in Indian Business Environment Role of Government in Indian Business Environment
Role of Government in Indian Business Environment
 
Issues in Corporate Governance
Issues in Corporate GovernanceIssues in Corporate Governance
Issues in Corporate Governance
 
Issues of corporate governance presented by Dushyant Maheshwari
Issues of corporate governance presented by Dushyant MaheshwariIssues of corporate governance presented by Dushyant Maheshwari
Issues of corporate governance presented by Dushyant Maheshwari
 
Economic role of government in Indian Business
Economic role of government in Indian BusinessEconomic role of government in Indian Business
Economic role of government in Indian Business
 
Stakeholder Mapping
Stakeholder MappingStakeholder Mapping
Stakeholder Mapping
 
Internal and external business environment
Internal and external business environmentInternal and external business environment
Internal and external business environment
 

Ähnlich wie CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue

John Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public SectorJohn Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public Sectoritnewsafrica
 
Programme for ICT Development and Training
Programme for ICT Development and TrainingProgramme for ICT Development and Training
Programme for ICT Development and TrainingHilda Muchando
 
CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010segughana
 
E-Government and E-Health Strategies by Mrs. Veronica Boateng
E-Government and E-Health Strategies by Mrs. Veronica BoatengE-Government and E-Health Strategies by Mrs. Veronica Boateng
E-Government and E-Health Strategies by Mrs. Veronica BoatengFrancisco J Grajales III
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 
National Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdfNational Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdfsri_ias
 
Qatar's NIA Policy Program
Qatar's NIA Policy ProgramQatar's NIA Policy Program
Qatar's NIA Policy ProgramSamir Pawaskar
 
Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...
Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...
Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...The Digital Insurer
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxfalknoor56
 
TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governanceguestea68b0
 
Ramping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for DevelopmentRamping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for DevelopmentOlivier Serrat
 
From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...
From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...
From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...accacloud
 
GICT Training & Certification
GICT Training & CertificationGICT Training & Certification
GICT Training & CertificationITEC
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 
Digital-Trust-Whitepaper
Digital-Trust-WhitepaperDigital-Trust-Whitepaper
Digital-Trust-Whitepaperdigitalinasia
 

Ähnlich wie CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue (20)

John Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public SectorJohn Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public Sector
 
Prof. Barya Keynote address
Prof. Barya  Keynote addressProf. Barya  Keynote address
Prof. Barya Keynote address
 
Programme for ICT Development and Training
Programme for ICT Development and TrainingProgramme for ICT Development and Training
Programme for ICT Development and Training
 
CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010
 
E-Government and E-Health Strategies by Mrs. Veronica Boateng
E-Government and E-Health Strategies by Mrs. Veronica BoatengE-Government and E-Health Strategies by Mrs. Veronica Boateng
E-Government and E-Health Strategies by Mrs. Veronica Boateng
 
How young people are engaging with ict in the commonwealth
How young people are engaging with ict in the commonwealthHow young people are engaging with ict in the commonwealth
How young people are engaging with ict in the commonwealth
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
National Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdfNational Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdf
 
Qatar's NIA Policy Program
Qatar's NIA Policy ProgramQatar's NIA Policy Program
Qatar's NIA Policy Program
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
 
Roles and Challenges for Government CIOs
Roles and Challenges for Government CIOsRoles and Challenges for Government CIOs
Roles and Challenges for Government CIOs
 
Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...
Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...
Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docx
 
TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governance
 
Ramping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for DevelopmentRamping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for Development
 
From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...
From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...
From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...
 
Sata Presentation Jc
Sata Presentation   JcSata Presentation   Jc
Sata Presentation Jc
 
GICT Training & Certification
GICT Training & CertificationGICT Training & Certification
GICT Training & Certification
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
Digital-Trust-Whitepaper
Digital-Trust-WhitepaperDigital-Trust-Whitepaper
Digital-Trust-Whitepaper
 

Mehr von Commonwealth Telecommunications Organisation

Mehr von Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 

Kürzlich hochgeladen

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue

  • 1. Building National Capacity for Cybersecurity Assurance By Marcel Ambiana Belingue, Senior Manager, Programmes, CTO Presented at the 2013 Cybersecurity Forum 25 - 26 April 2013, Yaounde, Cameroon 1
  • 2. Overview 1 About CTO 2 Cyber Risk Management in National ICT Policy Development 3 Cybersecurity as a Business Continuity Strategy 4 PDT – A Capacity Building Programme for Cybersecurity 2
  • 3. About CTO Vision: To be the preferred partner organisation for governments, the private sector and civil society in delivering effective ICTs for development (ICT4D) in the Commonwealth and beyond. Our Mission: To promote, facilitate and guide members in using ICTs to deliver effective development interventions. Strategic Focus Youth and ICTs | Regulatory environments | Skills development ICTs and disabilities | Cybersecurity | Mobile broadband 3
  • 4. Cyber Risk Management in National ICT Policy Development 4 Source: iDA, Singapore
  • 5. Cyber Risk Management in National ICT Policy Development Singapore’s iGov2010 (2006-2010)  Vision: To be an integrated government that delights customers and connects citizens through ICTs  Driven by strategic thrusts, including Singapore’s competitiveness  Security and partnerships among the key enablers  Stated targets e.g. 8 out 10 users being “very satisfied” with the quality of govenment e-services  Part of a long-term vision, strategies, goals and policies e-Government strategies play a key role in setting standards in establishing a safe cyber space. 5
  • 6. Cyber Risk Management in National ICT Policy Development Singapore’s  iDA (planning, policy development, regulation, industry development)  iN2015 – An Intelligent Nation, a Global City  Become #1 in the World in using ICTs to add value to the economy  Sectoral transformation of key economic sectors; ultra-high speed, pervasive, intelligent and trusted communication infrastructure; ICT- savvy and globally competitive workforce  National Trust Framework built on Indentity, Privacy, and Security  Key economic sectors: Financial services, Tourism, hospitality & retail, government, manufacturing & logistics, education, etc 6
  • 7. Cybersecurity as a Business Continuity Strategy  Think information security  Ensure resilience in processes and systems  Adopt coping mechanisms  Encourage shifts in attitudes and committment  Undertake business impact assessments & security audits  Have known and understood continuity plans  ... etc 7
  • 8. PDT – A Capacity Building Programme for Cybersecurity Some background facts  Created in 1985  Part of CTO membership until 2003  Over 110 programmes delivered since 2010  Over 36,000 ICT professionals trained since its creation  Reaching out to meembers in 31 countries PDT’s vision “To be the preferred partnership for the delivery of cost-effective access to ICT knowledge for human capital development.” 8
  • 9. PDT – A Capacity Building Programme for Cybersecurity PDT key benefits  in-house bespoke training and consulting programmes funded by CTO and developed to meet member-specific strategic and operational needs  priority and sponsored access to regional and international training programmes  access to international expertise and exposure to the latest industry best practice  opportunities for benchmarking and long-term partnerships  priority registration for other CTO programmes. 9
  • 10. PDT – A Capacity Building Programme for Cybersecurity Who is the PDT for?  Government ICT ministries  Communications regulatory agencies  Network operators and service providers  Manufacturers  Professional services firms 10 Caribb. 12% W. Africa 21% Pacific 13% Asia 9% ES Africa 45% Policy 10% Regulatio n 14% Technolo gy 56% Managem ent 20%
  • 11. PDT – A Capacity Building Programme for Cybersecurity Programme Funding  Membership  Requesting partners’ membership contributions: 70%  Supplying partners’ membersip contributions: 13%  Programme’s commercialisation  Local partner’s contribution 10%  Delegates fees 7% 11
  • 12. PDT – A Capacity Building Programme for Cybersecurity Programme Development – September to March 12 Training Requirements Processed Requirements Agregated Requirements Open/Regional Programme Bilateral Programme Recommended Programme Evaluation Approved Programme Supplier Proposals Requests for Proposals Implemented Programme Projects Marketing Plans Costed Proposals Supplier Invitations