SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Building A Secure Cyberspace for
Innovative Enterprise:
A Collective Responsibility

Secure Africa Conference 2013
Centre For Management Development , Lagos

Kayode Yussuf

|

CyberSecurity Advocate
’Start by doing what is necessary,
then what is possible
and suddenly, you’re doing the impossible.’
Saint Francis of Assisi
Some Hard Facts
• The world today is reliant on the internet, British
businesses earn £1 in every £5 from the internet –
www.gov.uk

• We expect govt and our institutions to protect us
from online security breaches
• Over 600 million phishing attacks per annum –
www.go-golf.com
• Cybercrime is costing the world $110 billion every
year - Symantec Corp
Whose responsibility is it to secure our
Cyberspace?
Find X?
Government

Professional
Associations

X
Individuals

Private
Sector
Cybersecurity is a shared responsibility, and each of us
has a role to play. Emerging cyber threats require the
engagement of the entire society—from government
and law enforcement to the private sector and most
importantly, members of the public.
• Janet Napolitano
Former Secretary, Department of Homeland Security
Building A Secure Cyberspace for
Innovative Enterprise
Strengthening The Cyber Ecosystem In
Nigeria, How?
Build Collaborative Communities
‘Law enforcement agencies are often “reluctant to
use new techniques, and don’t always maximize
current technology. Criminals, however, are
certainly maximizing the benefits of technology in
their wrongdoing.’
• Noboru Nakatani,
Executive Director INTERPOL’s Global Complex for Innovation.
Next Steps
• Favorable policies and legislation ( Nigeria’s Cyber-security
law and Creative Commons licensing for Education)
• Mass enlightenment
• Immediate creation and support of a CERT
• Law enforcement agencies must work together
• Inter-nation collaborations
• Citizens participation through volunteering
Next Steps Cont’d
• Empower Individuals and Organizations to Operate
Securely
• Build Collaborative Communities with CSO and
professional bodies to serve as lobbyists
• Cyber-Competitions sponsored by private
organizations & government
• PPP in research & development in CyberSecurity
What is expected of the Public?
Be cyber-security conscious
Make information available
Get involved in community projects
Enlightening people around you
What is expected of the Public?
•
•
•
•

•
•
•
•
•
•

Secure your devices, PCs and online accounts
Never click on links in emails
Never open the attachments unless you are sure of its source
Do not give out personal information over the phone or in an
email unless completely sure
Set secure passwords and don't share them with anyone.
Keep your operating system, browser, anti-virus and other critical
software up to date.
Verify the authenticity of requests from companies or individuals
by contacting them directly.
For e-Mail, turn off the option to automatically download
attachments.
Be suspicious of unknown links or requests sent through email or
text message
Pay close attention to website URLs.
What I do to enlightening people
• Personal enlightenment amongst friends
• Speaking at conferences and seminars
• Organizing trainings

• Organizing conferences…. NGSECURE
If each one can reach one,
then each one can teach one
what a beautiful nation Nigeria can be…..
Chaz B,
OAP and Producer of Sharing Life Issues with Chaz B
If each one can reach one,
then each one can teach one
what a beautiful & safe world
we can live in…..
Kayode Yussuf’s remixed
Thank you for listening, we hope you
join us secure Nigeria

Kayode Yussuf
+234-8029730059
kayusyussuf@yahoo.com
@k_whybaba

Weitere ähnliche Inhalte

Was ist angesagt?

cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshHome
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthDababrata Mondal
 
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...Cédric Laurant
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescentsTreesa Lobo
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 

Was ist angesagt? (20)

cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescents
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 

Andere mochten auch

Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...Bruce Damer
 
Building Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the InternetBuilding Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the Internetipspat
 
Economy, Politics & Culture in Cyberspace
Economy, Politics & Culture in CyberspaceEconomy, Politics & Culture in Cyberspace
Economy, Politics & Culture in CyberspaceOzgur Uckan
 
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)Bruce Damer
 
An Origin of Life in Salt Water or Fresh Water?
An Origin of Life in Salt Water or Fresh Water?An Origin of Life in Salt Water or Fresh Water?
An Origin of Life in Salt Water or Fresh Water?Bruce Damer
 
Solar space heating and cooling
Solar space heating and coolingSolar space heating and cooling
Solar space heating and coolingAniket Gavali
 
Interior design seminar presentation
Interior design seminar presentationInterior design seminar presentation
Interior design seminar presentationhighcraft
 

Andere mochten auch (8)

Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
 
Building Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the InternetBuilding Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the Internet
 
Economy, Politics & Culture in Cyberspace
Economy, Politics & Culture in CyberspaceEconomy, Politics & Culture in Cyberspace
Economy, Politics & Culture in Cyberspace
 
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
 
An Origin of Life in Salt Water or Fresh Water?
An Origin of Life in Salt Water or Fresh Water?An Origin of Life in Salt Water or Fresh Water?
An Origin of Life in Salt Water or Fresh Water?
 
A Ministry of Design!
A Ministry of Design!A Ministry of Design!
A Ministry of Design!
 
Solar space heating and cooling
Solar space heating and coolingSolar space heating and cooling
Solar space heating and cooling
 
Interior design seminar presentation
Interior design seminar presentationInterior design seminar presentation
Interior design seminar presentation
 

Ähnlich wie Building a secure cyberspace for innovative enterprise, a collective responsibility

INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxTriveni Prabaakar
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentationPrinceBanton1
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentationPrinceBanton1
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation211 Check
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxSPMTPCAMPUS
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptxSPMTPCAMPUS
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxPREMTRIVEDI5
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxjaved75
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxMalikMumtaz6
 

Ähnlich wie Building a secure cyberspace for innovative enterprise, a collective responsibility (20)

Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 

Mehr von Kayode Yussuf

How creative commons promotes open data at open data day 2017 lagos by kayode...
How creative commons promotes open data at open data day 2017 lagos by kayode...How creative commons promotes open data at open data day 2017 lagos by kayode...
How creative commons promotes open data at open data day 2017 lagos by kayode...Kayode Yussuf
 
Building innovation through trust
Building innovation through trustBuilding innovation through trust
Building innovation through trustKayode Yussuf
 
Getting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyGetting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyKayode Yussuf
 
Creative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekCreative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekKayode Yussuf
 
How to licencse cc by kayode yussuf
How to licencse cc by kayode yussufHow to licencse cc by kayode yussuf
How to licencse cc by kayode yussufKayode Yussuf
 
Safe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufSafe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufKayode Yussuf
 
Safe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufSafe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufKayode Yussuf
 
Creative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekCreative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekKayode Yussuf
 
Building the creative commons community in nigeria
Building the creative commons community in nigeriaBuilding the creative commons community in nigeria
Building the creative commons community in nigeriaKayode Yussuf
 
Creative commons nigeria kayode
Creative commons nigeria kayodeCreative commons nigeria kayode
Creative commons nigeria kayodeKayode Yussuf
 
Getting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyGetting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyKayode Yussuf
 

Mehr von Kayode Yussuf (11)

How creative commons promotes open data at open data day 2017 lagos by kayode...
How creative commons promotes open data at open data day 2017 lagos by kayode...How creative commons promotes open data at open data day 2017 lagos by kayode...
How creative commons promotes open data at open data day 2017 lagos by kayode...
 
Building innovation through trust
Building innovation through trustBuilding innovation through trust
Building innovation through trust
 
Getting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyGetting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons story
 
Creative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekCreative commons and science education for audax computer science week
Creative commons and science education for audax computer science week
 
How to licencse cc by kayode yussuf
How to licencse cc by kayode yussufHow to licencse cc by kayode yussuf
How to licencse cc by kayode yussuf
 
Safe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufSafe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussuf
 
Safe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufSafe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussuf
 
Creative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekCreative commons and science education for audax computer science week
Creative commons and science education for audax computer science week
 
Building the creative commons community in nigeria
Building the creative commons community in nigeriaBuilding the creative commons community in nigeria
Building the creative commons community in nigeria
 
Creative commons nigeria kayode
Creative commons nigeria kayodeCreative commons nigeria kayode
Creative commons nigeria kayode
 
Getting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyGetting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons story
 

Kürzlich hochgeladen

Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 

Kürzlich hochgeladen (20)

Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 

Building a secure cyberspace for innovative enterprise, a collective responsibility

  • 1. Building A Secure Cyberspace for Innovative Enterprise: A Collective Responsibility Secure Africa Conference 2013 Centre For Management Development , Lagos Kayode Yussuf | CyberSecurity Advocate
  • 2. ’Start by doing what is necessary, then what is possible and suddenly, you’re doing the impossible.’ Saint Francis of Assisi
  • 3. Some Hard Facts • The world today is reliant on the internet, British businesses earn £1 in every £5 from the internet – www.gov.uk • We expect govt and our institutions to protect us from online security breaches • Over 600 million phishing attacks per annum – www.go-golf.com • Cybercrime is costing the world $110 billion every year - Symantec Corp
  • 4. Whose responsibility is it to secure our Cyberspace? Find X? Government Professional Associations X Individuals Private Sector
  • 5. Cybersecurity is a shared responsibility, and each of us has a role to play. Emerging cyber threats require the engagement of the entire society—from government and law enforcement to the private sector and most importantly, members of the public. • Janet Napolitano Former Secretary, Department of Homeland Security
  • 6. Building A Secure Cyberspace for Innovative Enterprise
  • 7. Strengthening The Cyber Ecosystem In Nigeria, How?
  • 8. Build Collaborative Communities ‘Law enforcement agencies are often “reluctant to use new techniques, and don’t always maximize current technology. Criminals, however, are certainly maximizing the benefits of technology in their wrongdoing.’ • Noboru Nakatani, Executive Director INTERPOL’s Global Complex for Innovation.
  • 9. Next Steps • Favorable policies and legislation ( Nigeria’s Cyber-security law and Creative Commons licensing for Education) • Mass enlightenment • Immediate creation and support of a CERT • Law enforcement agencies must work together • Inter-nation collaborations • Citizens participation through volunteering
  • 10. Next Steps Cont’d • Empower Individuals and Organizations to Operate Securely • Build Collaborative Communities with CSO and professional bodies to serve as lobbyists • Cyber-Competitions sponsored by private organizations & government • PPP in research & development in CyberSecurity
  • 11. What is expected of the Public? Be cyber-security conscious Make information available Get involved in community projects Enlightening people around you
  • 12. What is expected of the Public? • • • • • • • • • • Secure your devices, PCs and online accounts Never click on links in emails Never open the attachments unless you are sure of its source Do not give out personal information over the phone or in an email unless completely sure Set secure passwords and don't share them with anyone. Keep your operating system, browser, anti-virus and other critical software up to date. Verify the authenticity of requests from companies or individuals by contacting them directly. For e-Mail, turn off the option to automatically download attachments. Be suspicious of unknown links or requests sent through email or text message Pay close attention to website URLs.
  • 13. What I do to enlightening people • Personal enlightenment amongst friends • Speaking at conferences and seminars • Organizing trainings • Organizing conferences…. NGSECURE
  • 14. If each one can reach one, then each one can teach one what a beautiful nation Nigeria can be….. Chaz B, OAP and Producer of Sharing Life Issues with Chaz B
  • 15. If each one can reach one, then each one can teach one what a beautiful & safe world we can live in….. Kayode Yussuf’s remixed
  • 16. Thank you for listening, we hope you join us secure Nigeria Kayode Yussuf +234-8029730059 kayusyussuf@yahoo.com @k_whybaba