WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Similar documents
CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

The UK s National Cyber Security Strategy

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Cybersecurity, Trade, and Economic Development

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

PROGRAM CONFERENCE 2017

Package of initiatives on Cybersecurity

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

ECOWAS Cyber security Agenda

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

Promoting Global Cybersecurity

UNIVERSAL BROADBAND ACCESS NATIONAL SAFTY AND SECURITY IMPERATIVES

Cyber Security and Cyber Fraud

Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition

Policy recommendations. Technology fraud and online exploitation

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

Cyber Security Roadmap

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

Commonwealth Cyber Declaration

Legal Foundation and Enforcement: Promoting Cybersecurity

REGIONAL AND INTERNATIONAL TRENDS IN INFORMATION SOCIETY ISSUES CYBERCRIME CHALLENGE

National Communications Authority

Data Protection and Cybercrime Challenges

Garry Mukelabai Communications Authority Zambia

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Cybersecurity & Digital Privacy in the Energy sector

G7 Bar Associations and Councils

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

Regional Development Forum For the Arab States(RDF-ARB) 2018

RESOLUTION 130 (Rev. Antalya, 2006)

Draft Resolution for Committee Consideration and Recommendation

Security in India: Enabling a New Connected Era

Itu regional workshop

ITU Model Cybercrime Law: Project Overview

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

RESOLUTION 130 (REV. BUSAN, 2014)

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.

Electronic payments in the Netherlands

Towards a more secure Cyber Space for South Africa

Cybersecurity, safety and resilience - Airline perspective

ENISA EU Threat Landscape

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

Background. Threats. Present Status. Challenges and Strategies 9/30/2009 TRAI 2

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Robert Holleyman, President and CEO, BSA The Software Alliance

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

Real estate predictions 2017 What changes lie ahead?

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

SECURITY, SAFETY AND SOVEREIGNTY FOR THE INDO-ASIA-PACIFIC

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

National Policy and Guiding Principles

Presented by: - Anselm Charles ICT Manager CARICOM IMPACS

The cost of cybercrime the benefits of cooperation

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity

Cybersecurity and Hospitals: A Board Perspective

Cyber Security Strategy

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

EXPERT GROUP MEETING ON CYBERCRIME

Bradford J. Willke. 19 September 2007

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified

Presented by: Njei Check Head, Audit Security Division, ANTIC

OAS Cybersecurity Capacity Building Efforts

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

Caribbean Cyber Security: Not Only Government s Responsibility

Data Governance for Smart City Management

The Global Cybercrime Industry

Angela McKay Director, Government Security Policy and Strategy Microsoft

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

The Challenge of Spam An Internet Society Public Policy Briefing

AFRICA The Next Digital Payments Revolution

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

E Government in Tonga

THE VALUE OF INTERNATIONAL COOPERATION IN CYBERSPACE: LESSONS FROM THE UNGGE PROCESS

Cyber Security Strategy

Cyber Risk for Maritime

Surviving the rise of. cybercrime. A new approach to threat prevention.

Horizon 2020 Security

Cybercrime and e-evidence: challenges and solutions.

Inter-American Port Security Cooperation Plan

Cyber Security Development. Ghana in Perspective

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

China and International Governance of Cybercrime

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

Tom Haye Chief Officer Hampshire Special Constabulary

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

Transcription:

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe

INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the AU Commission charged with coordinating, reporting and advising the Chairperson on security threats to the continent. The security threats facing the continent include political instability, transnational organized crimes, environmental issues and other issues including cybercrime that could have ramification son the well being of the peoples and government of Africa. In doing its duties, the ISC relies on regional mechanisms such as; Regional Economic Communities Regional Police Cooperation mechanisms INTERPOL CISSA ETC The ISC also tries to provide platforms for these institutions to to interact and exchange intelligence

THE TREND OF CYBERCRIME IN AFRICA The Internet is changing people s lives and transforming economic sectors such as agriculture, banking and transportation among others The rapid spread of smartphones has made Africa become the global leader in internet penetration growth Digital connectivity in Africa increased from 167.3 million in 2012 to 412 million at the end of 2017 and with prospects to further growth Africa s digital revolution is not just about connectivity, it is also about implementing policies that allow for the participation of the people of the continent in the new economy But Africa s cyberspace has become a hot bed of risks (as explained by the delegate from Ghana yesterday The whole sphere is affected by sophisticated malware intrusions, financial cybercrime, phishing and mass surveillance Financial losses because of cybercrime in the continent was estimated at $3.5 billion in 2016, rising from the estimated $ billion in 2015 This figure is expected to continue to grow because of the lack of technology and skills to fend off such attacks Internet scams on the continent has moved beyond the notorious 419 Nigerian email scams Social media has emerged to become the favored method used by scammers as criminals use fake Links, fake news, phishing etc to try to dupe potential victims This is becoming common as internet penetration is increasing in Africa, 32.5% at the end of 2017 13.7% of the population now use social media in several transactions 177 million people across the continent are on Facebook at the end of 2017 About 94%of them use mobile device to access social network

AFRICA S ATTEMPT AT COMBATING CYBERCRIME Africa s cyberspace remains one of the most vulnerable in the world Many African countries have weak infrastructure and responses against cybercrime Just about 20% of African countries have put in place legal framework for cybersecurity Only 11 countries have adopted substantive laws on cybercrime Even where laws and procedures exist, the systems lag behind the rapid pace of innovation in the digital development However, in 2014, the African Union took and important step to greater digital safety by adopting a cybersecurity convention that addressed issues from cybercrime to personal data protection and e-commerce It wasn t an easy process as the AU engaged all the Member States and REC s to achieve this Despite this breakthrough, a vast majority of AU Member States are yet to sign the Convention

WAY FORWARD A resilient cyberspace is vital to fulfilling Africa s potentials and meeting society s rising expectations. This demands pragmatic political action, good cyber governance and smart regulation system The AU should therefore continue to use its resources and expertise to mobilize its Member States to implement best digital best practices and stay up to date with innovations Providing compatible laws within each REC would likely improve matters Exchange and sharing of information, experience and good practices among AU Member States

CONCLUSION With a young population that is rapidly adopting new technologies, Africa is on the verge of an internet boom. The current cyber threat landscape in Africa shows that users are being impacted both by threats that are trending globally as well as some that more specific to the region. To keep pace, Africa needs to urgently address efforts to combat cybercrime and improve its cyber security posture. It will take a concerted effort from international governments, industry, and civil society to fight cybercrime and improve cyber security so that Africa can reach its full potential and stay on track to derive maximum benefit in the expanding global economy

THANK YOU