REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY

Similar documents
KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

Thank you Director of Ceremonies,

Commonwealth Cyber Declaration

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

INFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE.

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Garry Mukelabai Communications Authority Zambia

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

RESOLUTION 130 (REV. BUSAN, 2014)

Liberia ICT Policy

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

ITU Regional Development Forum, 18 th -19 th May, 2009 LUSAKA, ZAMBIA

Package of initiatives on Cybersecurity

SILVER SPRINGS HOTEL, KAMPALA, UGANDA FROM 24TH 28TH JULY 2017 AGENDA ITEM AND AGREED

NATIONAL BROADBAND POLICY AND IMPLEMENTATION STRATEGY. Task Team Leader

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

THE AFRICA GEOTHERMAL CENTER OF EXCELLENCE- AGCE

Cybersecurity for ALL

RESOLUTION 45 (Rev. Hyderabad, 2010)

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.

E Government in Tonga

DIGITAL AGENDA FOR EUROPE

RESOLUTION 130 (Rev. Antalya, 2006)

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

The UK s National Cyber Security Strategy

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

CONNECT ARAB STATES SUMMIT

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

New Partners Join Charter of Trust to Protect Critical Infrastructure

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Cyber Security and Cyber Fraud

Sri Lanka THE JOURNEY OF TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

ENISA EU Threat Landscape

Presented by: Njei Check Head, Audit Security Division, ANTIC

Strengthening telecommunications infrastructure for economic growth and security: A case for Zambia

National CIRT - Montenegro. Ministry for Information Society and Telecommunications

The cost of cybercrime the benefits of cooperation

PROPONENT TESTIMONY BEFORE THE HOUSE PUBLIC UTILITIES COMMITTEE HB402 Tuesday, January 23, 2018 JOSH MOTZER PUBLIC POLICY DIRECTOR CENTURYLINK

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Germany Candidate for the ITU Council

OAS Cybersecurity Capacity Building Efforts

ICT AS A DEVELOPMENT TOOL, BENEFITS, OPPORTUNITIES AND CHALLENGES TO DEVELOPING COUNTRIES: KENYA S EXPERIENCE

ASREN Arab States Research and Education Network

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

Cybersecurity and Vulnerability Assessment

Cyber Security Strategy

Draft Resolution for Committee Consideration and Recommendation

RWANDA S APPROACH TOWARDS EMERGING TECHNOLOGIES, opportunities and challenges

Good afternoon. I am pleased to join you at the National Security Conference today.

Qatar s National ICT Plan

Provisional Translation

Angela McKay Director, Government Security Policy and Strategy Microsoft

National Communications Authority

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

G7 Bar Associations and Councils

Itu regional workshop

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

ECOWAS Cyber security Agenda

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

PROGRAM CONFERENCE 2017

Co-operation with Law Enforcement Agencies in South Africa. 19 September 2008

Security in Today s Insecure World for SecureTokyo

Madam MC, Distinguished Ladies and Gentlemen, Presenters and Conference Participants,

Cybersecurity & Digital Privacy in the Energy sector

Stakeholders Analysis

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

The University of Queensland

INTERNATIONAL TELECOMMUNICATION UNION

6 CONCLUSION AND RECOMMENDATION

Global Cybersecurity Agenda

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

RESOLUTION 67 (Rev. Buenos Aires, 2017)

Statement by Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism

WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015!

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

19-20 September 2018 The Trans Resort Kuta, Bali - Indonesia

Implementation Strategy for Cybersecurity Workshop ITU 2016

OPPORTUNITIES IN THE KENYAN ICT SECTOR

21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM

Legal Foundation and Enforcement: Promoting Cybersecurity

National program of digital transformation

THE ACCENTURE CYBER DEFENSE SOLUTION

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Promoting Global Cybersecurity

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

BROADBAND DEFINITION

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Security in India: Enabling a New Connected Era

Transcription:

REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY SPEECH BY MR. JOE MUCHERU, CABINET SECRETARY, MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY DURING THE AFRICA CYBER DEFENSE SUMMIT STAKEHOLDERS MEETING HELD ON 14 TH FEBRUARY 2018 AT RADISSON BLU HOTEL, NAIROBI Page 1 of 10

Mr. Sammy Itemere, Principal Secretary, State Department of Broadcasting and Telecommunications, Mr. Scott Ragsdale, Naseba Chairman to Ministry of ICT and Africa Cyberspace Network, Distinguished Guests, Ladies and Gentlemen, I am happy to join you this morning, as we prepare for the Africa Cyber Defense Summit, a forum that is determined to develop a common continental strategy for cyber defense that threatens ICT advancements. The choice of Nairobi to host the Summit is laudable, as the Republic of Kenya has made significant strides in the adoption of ICT. Page 2 of 10

The Kenyan government fully supports the adoption and spread of technology by creating enablers to support infrastructure, technology, policies, laws, capacity-building efforts and private sector businesses that own and run the technology ecosystem. Distinguished Guests, Ladies and Gentlemen, We use technology because it is appropriate for us: its features, its price and its availability have dovetailed with our everyday concerns and needs. Technology has become universal without the need for special interventions to encourage its adoption. In Kenya, we have made deliberate efforts to grow and expand the ICT sector through a revamped infrastructure. Today, the country is connected to four undersea fiber optic cables with a total connectivity bandwidth of over 850,000 Mbps. Page 3 of 10

We have extended 6000 Km of the National Optic Fibre Backbone Infrastructure (NOFBI) to all the 47 County headquarters to enhance rural ICT and Internet connectivity and make e-government services more accessible to constituents. In the mobile telephony industry, mobile subscriptions stood at 41 million subscribers representing mobile penetration of over 90 per cent based on the Communication Authority report by September 2017. During the period, mobile money transactions were valued at an impressive Kshs.1.65 trillion. Page 4 of 10

In alignment with Kenya s Vision 2030, the Government is also strategically positioning the young generation to compete fairly and equally with their peers globally. It is for this reason that the we initiated the Digital Literacy Program (DLP), which is focused on tapping IT innovative potential of children in their formative ages. The program aims at integrating advanced digital learning and teaching Solutions in all our Public Primary schools. We have issued over 1 million children with Digital Literacy devices in over 19,500 public schools. Two local assembly plants have been established to guarantee the program s sustainability and grow the local ecosystem. Teachers have also been digitally skilled. Page 5 of 10

Ladies and gentlemen As you can see from the programs cited, it is evident that the Kenya s heavy investment in ICT as a critical resource needs to be protected at all cost. We want to be in solidarity with our continental and global partners in seeking solutions to protect ICT gains across the continent. As we endeavor to promote the use of ICT, we cannot ignore the growing increase in cyber and other computer related crimes. Cybercrime impacts negatively on a country s economy damage and this therefore calls for coordinated efforts to curb its spread. The sophisticated nature of global cybercrimes sometimes presents a challenge to cross-boundary law enforcement. Page 6 of 10

I trust that the stakeholders gathered here today, will critically deliberate on this and propose strategies that will deflate cyber criminals. In Kenya, we are committed to putting in place sufficient policy and legal frameworks to address cybercrimes. The Computer and Cybercrimes Bill has been presented to the National Assembly for approval. We also have in place a National Cyber Security Strategy, which provides a national-level plan to defend and secure the country s digital infrastructure. The strategy includes the development of information security management controls and procedures; cyber security systems; and identity and access management systems, among other key issues. Page 7 of 10

To secure online transactions, the Government is also committed to fully operationalizing the Public Key Infrastructure (PKI), which offers digital certificates to those transacting online. The PKI system will enhance information security in government IT systems, including e-government services. Other on-going initiatives include the Cyber security framework for co-operation and collaboration between the Northern Corridor Integration Projects Partner States to prevent and respond to evolving cyber security threats and other initiatives under the East African Community (EAC) and the East African Communications Organization (EACO). Page 8 of 10

The Government is aware of the risks inherent in a technology that connects us to the whole world. We have a national Kenya Computer Incidents Response Team (CIRT), that monitors and responds to cyber threats and acts as a national point of reference on cyber security issues. Kenya is also actively represented in regional and international cybersecurity policymaking fora such as those organized by the UN, ITU, AU and EAC, where we have made our contributions to the development of relevant laws and policies. As I conclude Ladies and Gentlemen, I would like to say that the idea of a Cyber Defense Summit for Africa is timely. I am very excited to support the establishment of Africa s first Research Institute devoted to Cybersecurity in Kenya. Page 9 of 10

I look forward to hosting distinguished colleagues, titans of industry, academics and young innovators as we jointly take on the challenge of securing Africa from breaches and attacks against our valuable ICTs. I trust that each one of you will commit to work towards the establishment of the Institute. With those remarks, it is my pleasure to declare this Stakeholders meeting officially open. (Happy Valentine s Day and a blessed Lent to those that practice the season!) Thank You! Page 10 of 10