BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT

Slides:



Advertisements
Similar presentations
Disaster Risk Reduction and Governance. Ron Cadribo.
Advertisements

1 The AU-ECA-AfDB Land Policy Initiative Progress Made & Way Forward Joan Kagwanja UNECA Land Governance in Support of the MDGs: Responding to New Challenges.
Philippine Cybercrime Efforts
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
INTERNATIONAL UNION FOR CONSERVATION OF NATURE. 2 Implemented in 12 countries of Africa, Asia, Latin America and the Middle East, through IUCN regional.
1 Pipeline Security Presented to: Pipeline Safety Trust New Orleans, Louisiana November 5, 2010.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
DHS, National Cyber Security Division Overview
National Cyber Security and Information (Cyber) Security Awareness Prof SH (Basie) von Solms Immediate Past President : IFIP University of Johannesburg.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Strategy and Policy Unit: Current Activities and Future Tasks
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
E-Waste Management Policy and Strategy in Uganda
The Crown and Suppliers: A New Way of Working People & Security15:35 – 16:20 Channels & Citizen Engagement Social Media ICT Capability Risk Management.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
2008 Adobe Systems Incorporated. All Rights Reserved. Developing an eLearning Strategy at a Nigerian University By Jerome Terpase Dooga, Christopher Tony.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Outcomes of the 16 th Regional Disaster Managers Meeting held from 9 th – 11 th August 2010 Presentation to the Pacific Humanitarian Team Monday 6 th December.
IMPLEMENTING THE WSIS ACTION PLAN NAIROBI, March 2004 Jose Toscano Director, External Affairs International Telecommunications Satellite Organization.
World summit on the information society 1 Pierre Gagné International Telecommunication Union March 2004 WSIS Follow-up Building the Information Society:
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Information Sharing Challenges, Trends and Opportunities
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Freight Council Webinar February 21, 2006 Anthony T. Furst Director, FHWA Office of Freight Management and Operations The Framework for National Freight.
A National approach to Cyber security/CIIP: Raising awareness.
2 ictQATAR “ Information and Communication Technology (ICT) improves how we live and work in countless ways.”  The Ministry of Information Communication.
Assessing The Development Needs of the Statistical System NSDS Workshop, Trinidad and Tobago, July 27-29, 2009 Presented by Barbados.
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
National Quality Infrastructure TRTA3 Approach
The Canada Border Services Agency and Coordinated Border Management Regional Conference of Customs Directors General, April 22-25, 2012.
Risk and Crisis Management Building OECD Principles on Country Crisis Management.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
DEVELOPMENT COOPERATION FRAMEWORK Presentation by Ministry of Finance 10 December 2013.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Proprietary Information of BearingPoint Inc. | Copyright 2005 BearingPoint Inc. All rights reserved. America’s First National Critical Infrastructure Exercise.
Introducing Regulatory Impact Analysis into the Turkish Legal Framework Improving Transparency, Consultation and Communication of RIAs March 2009.
PRESENTATION TO PORTFOLIO COMMITTEE ON WATER AFFAIRS AND FORESTRY Cindy Damons 28 May 2008 The role of municipalities in managing and giving effect to.
ELEMENTS OF STRATEGY FOR ACHIEVING SOCIAL PROTECTION FLOOR Global Network, Cape Town 7 December 2012 BY AFRICAN LABOUR RESEARCH NETWORK (ALRN)
1 Ubuntunet Alliance Albert Nsengiyumva Deputy Chair, UbuntuNet Coordinator, RwEdNet Development Partner Meeting 10 November 2008, Lilongwe, Malawi.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
ISACA Ireland Cyber Security Policy 9 February 2016.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
1 Office of ASG/CITO Crisis Information Management Strategy UNGIWG-11, Geneva 15 March 2011 A written consent by the UN is required to use the information.
Joint Principles for Adaptation (JPAs) By Marlene/Rudolf
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Cyber Security – An Existential Threat? (IIC, Singapore)
Update from the Faster Payments Task Force
Cybersecurity in the ECOWAS region
Public-private cooperation
School Safety in the Post-2015 Framework on Disaster Risk Reduction Toward Sendai and Beyond
8 Building Blocks of National Cyber Strategies
America’s First National Critical Infrastructure Exercise
AVI AFRIQUE October 2018 Tshepo Peege
Cyber Security Ecosystem of Georgia. Experience and Challenges
Securing free and fair European elections
Refreshing New Zealand’s Cyber Security Strategy 2018
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
UNODC and CYBERCRIME October 2009.
Presentation transcript:

BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT Presenter: C. MASIGA Event: ICT PITSO 2015 Date: 25/08/15

PRESENTATION OUTLINE Current Situational Analysis Remedial Actions for CSA Expected Benefits Critical Success Factors Conclusion

Current Botswana Situational Analysis The national and economic security of Botswana depends on the reliable functioning of critical infrastructure: No framework for coordination of efforts against cyber security threats & risk Similar to financial and reputational risk, cybersecurity risk affects a company’s bottom line: In event of attack (external & internal), who to call, what to do etc. Members of public left behind: Education & Awareness Programs lacking

Current Botswana Situational Analysis National cyberspace vulnerable (BW has been attacked): Concerted & Individual efforts remain weak Use of ICTs to break laws ; Potential national security threat Lack of public confidence on using ICTs: Usage of ICTs at Government, Business & Individual low in Botswana (WEF Reports 2013 & 2014)

Current Situational Analysis (Cont) Rapid technology adoption- incoherent with local laws, regulations and security systems If a Motswana were to come under cyber attack, do they know who to call? Do respondents have capacity and capability to help? If Government systems are under attack, what is the first response? Who responds? What happens immediately after system restoration?

NATIONAL CYBER SECURITY STRATEGY (NCSS): The Project The Strategy: “A guide to creating a cohesive and inclusive approach to delivering a safe, secure and resilient cyberspace; a comprehensive framework to facilitate coordinated responses by Government, the private sector, and allies to significant cyber incident.” The Framework will not be a one-size-fits-all approach to managing cybersecurity risk for critical infrastructure. Organizations will continue to have unique risks – different threats, different vulnerabilities, different risk tolerances – and how they implement the practices in the Framework will vary.

NCSS Project as Remedial Action Objectives and Motivation of Project: Create a safe cyber space in Botswana Protection & safeguarding critical infrastructure & key resources Protect users of ICTs Coordinated response to Influx of ICT devices leading to increase in use of ICT Cybercrime laws that need updating Balance security and protection of democracy Increase citizen confidence on ICT usage

NATIONAL CYBER SECURITY STRATEGY (NCSS) Project Technical collaboration between CTO and Botswana International Best Practice blended with local knowledge Collaboration among public and private institutions: Government, Business Botswana, Service providers, Academia, Public etc National Political will- Directed at Permanent Secretary (Accounting Officer) level under MTC Minister

NCSS Project Deliverables Defined vision for Botswana’s ICT protection Roadmap for securing Botswana’s Cyber space Clear Roles and Responsibilities for stakeholders Informed public on cyber security Conducive legal and political environment Public-Private partnership to achieve a secure e-Botswana

NCSS Structures Project Structure Area Addressed Institutional Working Group Strategy vision Objectives of strategy Coordination of different players Policy, Legal and Regulatory PLR Situational analysis Revamping & drafting of laws Awareness Working Group Stakeholder engagement Public capacity building Public awareness raising Technical Working Group Technical capabilities development Research and development Incident response

Expected benefits Economic & Social Increased confidence leading to increased online transactions ICTs leading to increase in efficiency General Safety and Security More informed public Clear roles and responsibilities for different institutions Deliberate efforts to prevent and respond to threats International and Local Collaboration Public private partnership Botswana collaborating with international partners: Global Threats Shared knowledge for better response and protection

Critical Success Factors ( CSFs) Political Will Need to be driven from highest offices Importance need to be understood across all sectors Funding Public-Private funding key- sectors need to fund their own efforts Adequate and appropriate resources need funding Stakeholder Buy-in Public need to have ownership Trust between potential victims and respondents Proper coordination of efforts Cyber drills among sectors National response and sector response need to be coordinated International assistance and information sharing is key

Way forward August –September 2015 – Collection of Information & Drafting of Components of Strategy October 2015 - Consolidation of components of strategy November 2015 - Workshop (Draft Strategy and Annexes) December 2015 – Refinement of Draft Strategy March 2015 – Process of adoption of Draft Strategy

Conclusion Presentation addressed : Definition of NCSS Rationale for NCSS CSA and Remedial action Expected Benefits Critical Success Factors Concluded that : Cyber crime is real Currently Botswana has vulnerabilities NCSS can help protect Botswana NCSS needs support ( public and private) to succeed

You are invited to participate in this project Contact us at: Department of Telecommunications & Postal Services Telephone: 3632900 Email: rkeikotlhaile@gov.bw and cmasiga@gov.bw KE A LEBOGA