PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURE By Emmanuel E. Ekuwem, PhD, MIEEE, NPOM CEO, Teledom Group Immediate Past National President, Association.

Slides:



Advertisements
Similar presentations
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
Advertisements

NSA Final Review Meeting Brussels - June 2013 Advocating and lobbying for the adoption of the OPCAT and the NPM’ Presented by: Dalal Khawaja.
The French approach to CIIP ENISA workshop. Coordination of CIP in France ANSSI 2 A cross-ministerial issue The General Secretariat for Defense and National.
Directions 1) Complete the Anticipation Activity-first page of packet!
Commissioner Lindiwe Mokate South African Human Rights Commission 12 November, 2014 SAHRC’S Work on Children’s Rights 1.
Introduction: The Role of Agencies
South African Human Rights Commission Presentation to the Select Committee on Security and Constitutional Development ‘SAHRC Submission on the Criminal.
Three Branches of Government Lesson 2. The Executive Branch The President of the United States is the leader of the executive branch. The President’s.
PLS 121: American Politics and Government The Constitution The Budget Making Process.
Government: How it works for you. Did you know there are three branches of the Federal Government? Executive Legislative Judicial.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
“Framework for mainstreaming Ireland's experience" Siobhan Barron Director National Disability Authority Ireland.
Legal Framework on Information Security Ministry of Trade, Tourism and Telecommunication Nebojša Vasiljević.
Session 4.2: Creation of national ICT security infrastructure for developing countries National IP-based Networks Security Centres for Developing Countries.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
The Republic of Sudan Ministry of Finance & National Economy General Directorate for Public Procurement, Contracting & Disposal of Surplus Public Procurement.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
CI Consumer Justice and Protection programme Indrani Thuraisingham CI Office for Asia-Pacific and the Middle East.
Legislative Process: How a Bill Becomes a Law
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Cybersecurity Governance in Ethiopia
A.ABDULLAEV, Director of the Public Fund for Support and Development of Print Media and Information Agencies of Uzbekistan.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
How a Bill Becomes a Law.
1 Governance, accountability and performance reporting in the public sector Des Pearson Executive in Residence August 2013.
International Conference on Cybercrime, DBI, Abuja Nov., 2010 CASE FOR THE ESTABLISHMENT OF A NATIONAL COMPUTER EMERGENCY READINESS TEAM (CERT) By.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
CIVILIAN SECRETARIAT FOR POLICE. PRESENTATION TO THE SELECT COMMITTEE ON SECURITY AND CONSTITUTIONAL DEVELOPMENT OF THE NCOP 11 SEPTEMBER 2013 CRIMINAL.
Arnsburger Str. 64, Frankfurt, Germany Tel , Fax Internet:
PRESENTATION TO THE NCOP ON THE CONVENTION ON INTERNATIONAL INTERESTS IN MOBILE EQUIPMENT BILL, MARCH 2007.
NATIONAL ASSEMBLY OF KENYA PUBLIC ACCOUNTS COMMITTEE (PAC) 2013 ACCOUNTABILITY CONFERENCE RESOLUTIONS IMPLEMENTATION STATUS OF RESOLUTIONS.
HOW A BILL BECOMES LAW ?. IDEAS Come from private citizens, interest groups, the president, or officials in executive.
American Gov’t Midterm Review Federalism – who does what.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
ISACA Ireland Cyber Security Policy 9 February 2016.
Summary of Previous Lecture Planning. Planning Machinery Most countries of the world have established a planning agency of one kind or another for the.
THE ROLE OF THE COMPLIANCE OFFICER IN THE ANTI- BRIBERY AND CORRUPTION BATTLE IN NIGERIA By Prof. Akin Oyebode LL.M. (Kiev), LL.M. (Harvard); D. Jur. (York,
The Executive Branch The Cabinet, Executive Agencies and Beyond…..
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
Presented by Solomon Ingba David Afoenyi Afure Iloka Niteabai Domininc.
Legislative Branch Notes. ● Congress: A. Consists of – a bicameral legislature ● House of Representatives (435 members, based upon populations of the.
REPUBLIC of the PHILIPPINES. Philippine Legal System Government Structure Three (3) branches of the government: EXECUTIVE LEGISLATIVE JUDICIARY.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Planning and Coordination in Environmental Governance: Indonesian Way of Undoing Thing Laode M. Syarif, Ph.D Hasanuddin University Makassar - Indonesia.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Presenter: Shelley King University of KwaZulu-Natal, South Africa The slow development of legislature in South Africa to combat human trafficking- Challenges.
Critical Infrastructure Protection Committee Report to NERC Standing Committees in Joint Session Long Beach, CA March 2005 Public Release.
Cyber Security and Georgia. New Challenges
How a Bill Becomes a Law.
Johannesburg, South Africa
NISF Objectives Conceptual structure for guiding IS activities
The Legislative Process
Mrs. Wells and Buddy Wells Mod 26-28
8 Building Blocks of National Cyber Strategies
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Critical Infrastructure Protection Committee Report to NERC Standing Committees in Joint Session Long Beach, CA March 2005 Public Release.
Session 4 – ICT role in critical infrastructure protection
Legislative Process: How a Bill Becomes a Law
  The Second Consultative Meeting on Strengthening Partnerships with National Rapporteurs on Trafficking in Persons and Equivalent Mechanisms Wednesday.
Combating Cybercrime: Tools and Capacity Building for Emerging Economies WSIS 2015, Geneva Jinyong Chung May 25, 2015.
Promoting Global Cybersecurity
Congress: The Legislative Branch
Branches of Gov’t.
JUDICIAL Interprets the Law
Deborah Housen-Couriel, ADV.
EU Law and Policy Dr. Mahamat K. Dodo European Union Center Pusan National University Produced: April 4, 2013.
Coordination of the National Statistical System of the Republic of Macedonia Kruševo, 2018.
Legislative Process: How a Bill Becomes a Law
Presentation transcript:

PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURE By Emmanuel E. Ekuwem, PhD, MIEEE, NPOM CEO, Teledom Group Immediate Past National President, Association of Telecom Companies of Nigeria (ATCON)

International Conference on Cybercrime, DBI, Abuja Nov., 2010 Where are we coming from and where are we heading to? How slowly have we been moving; what happened? President Obasanjo’s “Presidential Committee on 419 on the Internet under Basil Udotai, Esq’s excellent Coordinatorship Representative of the then relevant Law Enforcement Agencies: Police, EFCC, ICPC, NSA, SSS, etc and the Ministries of S &T, Justice; NCC, NITDA; NIG, ATCON, ALTON, NCS, CPN, etc. Ministers of S & T and Justice/Attorney General as Co-Chairmen

International Conference on Cybercrime, DBI, Abuja Nov., 2010 Where are coming from and where are heading to?--2 Many very constructive meetings of the committee Extensive consultations with stakeholders Report submitted to the President with recommendations containing, among others, the subject of this international conference: CERT Implementation

International Conference on Cybercrime, DBI, Abuja Nov., 2010 Where are we coming from and where are we heading to?--3 Mr. President commended the committee for a “brilliant work” A draft Executive bill sent to the National Assembly Commencement of Public Hearings by relevant committees of Senate and House of Representatives

International Conference on Cybercrime, DBI, Abuja Nov., 2010 Needless Controversies on the Draft Bill--1 While the 419 Committee deliberations lasted, the majority always had their way……as it should be in a democracy Those who did not have their way during those deliberation sessions of the 419 Committee took their fight to the Public Hearings of the National Assembly High level lobby set in

International Conference on Cybercrime, DBI, Abuja Nov., 2010 Issues that Triggered Controversies-1 No need for an independent Agency or Body of whatever form Almost every law enforcement agency claimed that it had sufficient provisions within the law setting it up to host the Cyber security outfit

International Conference on Cybercrime, DBI, Abuja Nov., 2010 Issues that Triggered Controversies-2 Should the Cyber security agency or body be: A department (Directorate) in NITDA? A department in EFCC? A department of the Police? A department in the office of the NSA? An autonomous Agency that reports to the NSA? etc

International Conference on Cybercrime, DBI, Abuja Nov., 2010 Issues that Triggered Controversies-3 If Cyber security matters can be handled under the ambit of existing laws, did we need a new legislation? What would constitute Critical Information Infrastructure? Do we need a law to designate Critical Information Infrastructure and criminalize its attack with stiff penalties

International Conference on Cybercrime, DBI, Abuja Nov., 2010 Chaos of Draft Bills Every shade of opinion on the scope, form and hosting of the Cyber security outfit had a tendency to want to sponsor a draft bill. Which shade or version is in the House? Probably the product of compromises for the good of the country

International Conference on Cybercrime, DBI, Abuja Nov., 2010 Critical Information Infrastructure Major ICT service media for Access (IP and GSM/CDMA cellular), Switching, Transport, Billing, Storage, Processing and Interconnectivity upon which national economic activities and productivity depends; impairment of which impedes, disrupts and eventually sabotages the nation’s economy. This impairment can be considered an ACT of WAR against Nigeria.

International Conference on Cybercrime, DBI, Abuja Nov., 2010 Information Infrastructure for the Critical Sectors Security Telecommunication Financial Services….banking, insurance, NSE, NDIC, PENCOM, etc Aviation Petroleum Power Health Water Governments

International Conference on Cybercrime, DBI, Abuja Nov., 2010 Critical Information Infrastructure Protection (CIIP) Enabling laws to define, designate and criminalize attacks Physical Virtual

International Conference on Cybercrime, DBI, Abuja Nov., 2010 CIIP Redundancies, backups, distributed architecture CERTs FIRSTs

International Conference on Cybercrime, DBI, Abuja Nov., 2010 CIIP: CERT to the Rescue Barring physical attacks, CERT action Inter-CERT collaborations Some form of CERT coordination

International Conference on Cybercrime, DBI, Abuja Nov., 2010 Seek Yee First Self-Protection Sector designation of its CII Sector CERT establishment Partnership with the Police and other relevant law enforcement agencies Show CERT value in CII by reporting incidents

International Conference on Cybercrime, DBI, Abuja Nov., 2010 Thank You