Cyber Security Development. Ghana in Perspective

Similar documents
National Communications Authority

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Overview on the Project achievements

Designing Robustness and Resilience in Digital Investigation Laboratories

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

Way to new challenges

Criminal Justice Statistics on Cybercrime & Electronic Evidence

CYBERCRIME RESPONDERS TRAININGS

Strategic and operational threat analysis at Europol's EC3

UNODC tackling cybercrime in support of a safe and secure AP-IS

Promoting Global Cybersecurity

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Cybercrime and e-evidence: challenges and solutions.

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

10007/16 MP/mj 1 DG D 2B

G8 Lyon-Roma Group High Tech Crime Subgroup

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

Global cybersecurity and international standards

Project III Public/private cooperation

UCD Centre for Cybersecurity & Cybercrime Investigation. University College Dublin School of Computer Science

The cost of cybercrime the benefits of cooperation

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Cyber Security Strategy

Cyber Intel within European Cybercrime Center Ops

List of beneficiaries who are to be awarded grants for the implementation of CEPOL training activities in 2014

2CENTRE A collaborative model for capacity building against cybercrime. Cormac Callanan 2CENTRE Industry Liaison

Cybersecurity for ALL

UNODC. International Cooperation and Assistance in Cybercrime Matters

ASEAN s Cyber Confidence Building Measures

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

INTERPOL Capacity Building and Training Activities. Lili SUN Head of Training Unit Cybercrime Directorate June 15, 2017

Rohana Palliyaguru Director -Operations Sri Lanka CERT CC APCERT AGM and Conference, 24 th October 2018 Shanghai, China MINISTRY OF TELECOMMUNICATION

CYBER CRIME LEGISLATION COURSE MALAYSIAN COMMUNCIATIONS AND MULTIMEDIA COMMISSION MALAYSIA

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

PROGRAM SUMMARY OBJECTIVES RESULTS. Last updated date: 7/27/2017. Target Beneficiaries. Donor Security

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

PROJECT RESULTS Summary

Dr. Herbert Gustav Yankson GLACY+ Ghana National Team (Member)

Act Pacific Islands Law Officers Network Cybercrime Workshop

Comprehensive Study on Cybercrime

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

10025/16 MP/mj 1 DG D 2B

UCD Centre for Cybersecurity & Cybercrime Investigation

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

1 History of CyberSecurity in the Philippines 2 3

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

TURNING STRATEGIES INTO ACTION DISASTER MANAGEMENT BUREAU STRATEGIC PLAN

Department of Justice Policing and Victim Services BUSINESS PLAN

Package of initiatives on Cybersecurity

15412/16 RR/dk 1 DGD 1C

Republic of Mauritius CYBERCRIME STRATEGY Page

Global Wildlife Cybercrime Action Plan1

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

A Multi-Stakeholder Approach in the Fight Against Cybercrime

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

China and International Governance of Cybercrime

INTERPOL s Role and Efforts in Combating Cybercrime. Dr. Madan M. Oberoi Director Cyber Innovation and Outreach

Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis)


Sri Lanka THE JOURNEY OF TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Cybersecurity and Vulnerability Assessment

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

Cybercrime Capacity Building a cooperative process

University Diploma. GLACY Global Action on Cybercrime. Eastern Partnership region

OCTOPUS CONFERENCE COOPERATION AGAINST CYBERCRIME Workshop 1: Policies, activities and initiatives on cybercrime of international organisations

Legal Foundation and Enforcement: Promoting Cybersecurity

Legal, Ethical, and Professional Issues in Information Security

National Cybersecurity preparation to deal with Cyber Attacks

Cybersecurity in Higher Ed

Guiding principles on the Global Alliance against child sexual abuse online

Resolution: Advancing the National Preparedness for Cyber Security

Presented by the Federal Interagency Elder Justice Working Group May 13, 2013

NERC Staff Organization Chart Budget 2019

IJESRT. (I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114

Cybersecurity Strategy of the Republic of Cyprus

New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3)

Assistant Secretary-General Michèle Coninsx Executive Director, CTED

NERC Staff Organization Chart Budget 2019

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NERC Staff Organization Chart Budget 2018

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established

Privacy Impact Assessment

Virtual Currencies and The Commonwealth. 1 June 2016

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Co-operation against cybercrime CSIRTs LE private sector

UNODC/CCPCJ/EG.4/2017/CRP.1

PIONEER TRAINING INSTITUTE

Transcription:

Cyber Security Development Ghana in Perspective

GHANA S CYBER SECURITY JOURNEY NCSPS Development Establishment of CERT NCSPS Validation 2015 Adoption of NCSPS by Cabinet 2016 NCSTWG NCSIAC NCSPS Review GLACY+ Project Security Governance Initiative (SGI) World Bank/Oxford University Engagement Establishment of National Cyber Security Centre (NCSC) Other Activities. 2017 To Date 2014 2011 NCSTWG : National Cyber Security Technical Working Group NCSIAC : National Cyber Security Inter-Ministerial Advisory Council NCSPS : National Cyber Security Policy & Strategy GLACY+ : Global Action on Cybercrime Extended

PARTNERS FOR GHANA S CYBER SECURITY DEVELOPMENT GLACY + NATIONAL CYBER SECURITY INTER-MINISTERIAL ADVISORY COUNCIL (NCSIAC) WORLD BANK NATIONAL CYBER SECURITY POLICY & STRATEGY (NCSPS) SGI NATIONAL CYBER SECURITY TECHNICAL WORKING GROUP (NCSTWG) NATIONAL CYBER SECURITY CENTRE (NCSC) OTHERS

NATIONAL CYBER SECURITY ORGANIZATIONAL STRUCTURE

SUB WORKING GROUPS

CYBER SECURITY CHALLENGES Financial Challenges Technology Challenges Cultural / Social Barriers Human Resource / Skillset Political Commitment Other Success

NCSPS POLICY PILLARS Child Online Protection Compliance & Enforcement Cyber Security Emergency Readiness International Cooperation POLICY PILLARS Effective Governance Legislative & Regulatory Framework Cyber Security Technology Framework Research & Development towards Self-Reliance Culture of security & Capacity Building

MANDATE OF CRIMINAL JUSTICE SUB COMMITTEE Develop a cybercrime training strategy to build capacity of law enforcement Agencies, Prosecutors and Judges Accession to the Budapest Convention Create Awareness Review Our cybercrime legislation Private Sector Collaboration Develop Guidelines for Digital Evidence Handling Develop SOP for Digital Forensic Labs Review of LEA s Technical Capacity

ROAD TO ACCESSION OF BUDAPEST CONVENTION Ghana s Request Assessment of Ghana s Legislations Induction into GLCAY+ Programme Cabinet Sub Committee to review the instrument Full Cabinet Approval Rectification by Parliament Presidential Assent October 2018

GHANA S CYBERCRIME TRAINING STRATEGY Cybercrime should not be treated as a specialized area of investigations for all cases All Police officers must have knowledge of Ghana s cyber laws and first responder responsibilities (achievable within 5years) All investigators and senior officers must have knowledge in cybercrime investigations to fight computer assisted crimes (achievable within 5 years). Specialized cyber investigators be trained to investigate computer dependent crimes. Creation of specialized units in all regions to investigate specialized cases and a Cybercrime Directorate at the Headquarters to oversee the activities of specialized Units and investigate the cases beyond the capabilities of specialized Units

GHANA S CYBERCRIME TRAINING STRATEGY Cybercrime training syllabus will be divided into three categories A. Introductory Cyber laws, first responder duties and introductory courses to cyber investigation and digital forensics B. Intermediate Internet /social media/email investigation Computer assisted crimes investigation C. Advanced Computer dependent crimes investigation; Computer, Mobile phone, Network, Malware and Cryptocurrency Forensics

GHANA S CYBERCRIME TRAINING STRATEGY Category A for all Police Officers To be taught at all Police Training Schools, Police Academy and Command& Staff Colleges Category A and B for all Investigators and Senior officers To be taught at the Detective Training Academy, Police Academy and Command and Staff College. Category A, B, C for specialized cyber investigators

EXPECTED ACTIVITIES FOR LEA UNDER GLACY+ International workshop on LE training Strategies Needs Assignment & Adaptation of Training Materials APRIL 2018 Delivery of ECTEG Material? Internship of Trainers in EU States And Certification Programmes? Full Integration In the LEA Training Curriculum? 2017

CONTACT US National Cyber Security Centre Ministry of Communications Abdul Diouf Road Ridge - Accra. Tel: +233 302 685628 / 050 3185846 Digital Address: GA-079-0539 E-mail: info@cybersecurity.gov.gh Website: www.cybersecurity.gov.gh

Thank You

Questions