GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

Similar documents
Package of initiatives on Cybersecurity

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY

Cyber Security in Europe

Commonwealth Cyber Declaration

About Issues in Building the National Strategy for Cybersecurity in Vietnam

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

Provisional Translation

Call for Expressions of Interest

Promoting Global Cybersecurity

Cybersecurity for ALL

Global cybersecurity and international standards

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

Presented by: Njei Check Head, Audit Security Division, ANTIC

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

Bradford J. Willke. 19 September 2007

Directive on security of network and information systems (NIS): State of Play

Discussion on MS contribution to the WP2018

GLOBAL CYBERSECURITY INDEX 2016

Securing Europe's Information Society

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

European Union Agency for Network and Information Security

ENISA EU Threat Landscape

Cyber Security Strategy

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

MALAYSIA S APPROACH IN CAPACITY BUILDING. Dr Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia 24 March 2017

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Cybersecurity Strategy of the Republic of Cyprus

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

Birendra Kumar Mishra. Director General Department of Information Technology Ministry Of Science and Technology Government of Nepal

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert

NIS Standardisation ENISA view

Cyber Security Strategy

Systemic Analyser in Network Threats

Itu regional workshop

Cybersecurity & Digital Privacy in the Energy sector

1 History of CyberSecurity in the Philippines 2 3

EU policy on Network and Information Security & Critical Information Infrastructures Protection

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

6 CONCLUSION AND RECOMMENDATION

ITU-IMPACT Capacity Building for Least Developed & Developed Countries

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

RESOLUTION 130 (REV. BUSAN, 2014)

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

National Policy and Guiding Principles

Establishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges

How Can NRA Contribute to the Improvement of IT Security? Rytis Rainys, Communications Regulatory Authority of the Republic of Lithuania

13967/16 MK/mj 1 DG D 2B

ENISA Cooperation in the EU / NIS Directive

Co-operation with Law Enforcement Agencies in South Africa. 19 September 2008

Rohana Palliyaguru Director -Operations Sri Lanka CERT CC APCERT AGM and Conference, 24 th October 2018 Shanghai, China MINISTRY OF TELECOMMUNICATION

ENISA s Position on the NIS Directive

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

Building a Resilient Security Posture for Effective Breach Prevention

Child Online Protection in Child Pornography Namibia

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

Critical Information Infrastructure Protection Law

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Garry Mukelabai Communications Authority Zambia

CYBER CRIME LEGISLATION COURSE MALAYSIAN COMMUNCIATIONS AND MULTIMEDIA COMMISSION MALAYSIA

ECOWAS Cyber security Agenda

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

The cost of cybercrime the benefits of cooperation

National Communications Authority

The NIS Directive and Cybersecurity in

RESOLUTION 45 (Rev. Hyderabad, 2010)

OAS Cybersecurity Capacity Building Efforts

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

Towards an Egyptian Framework for CyberSecurity

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

China and International Governance of Cybercrime

Cyber Security Technologies

Policy recommendations. Technology fraud and online exploitation

Cyber Security Development. Ghana in Perspective

Australian Government Cyber-security Activities in the Pacific

Information Sharing and Cooperation

General Framework for Secure IoT Systems

European Directives and reglements for Information security

Cybersecurity & Spam after WSIS: How MAAWG can help

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

THE VALUE OF INTERNATIONAL COOPERATION IN CYBERSPACE: LESSONS FROM THE UNGGE PROCESS

Transcription:

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

Presented By Mrs K.Gunesh-Balaghee,, Assistant Solicitor General Mr M.Armmogum,, Ag Senior State Counsel Mrs B.Kissoon-Luckputtya, Assistant Permanent Secretary, Ministry of Technology, Communication and Innovation Mr P.Luckwa, IT System Engineer, ICT Authority Dr K. Usmani,, Officer- In-Charge, CERT-MU Mr. Bulladin N., Cybercrime Investigator, Police Department

Presentation Outline Part 1 Statistics and Electronic Evidence on Cybercrime Part 2 Principal Challenges in Confronting Cybercrime Part 3 Policy and Strategies to Address Challenges

About Mauritius Small Island in the Indian Ocean (Area:2,040 kms) Population: 1.25 million ( Mauritius in Figures,CSO-2013) Literacy: 89.8 % (CSO, 2011) Upper Middle Income Country, GDP-US$9,227 (World Bank 2014) Most Innovative Country in Africa ( INSEAD, WIPO 2104 ) Global Innovation Index ( Score: 40.94) Global Competitive Index: 1 st in Sub Saharan Africa and 39 th Globally, score 4.52( WEF-2014-15) Global Cybersecurity Index: 1 st in Africa ( ITU 2013-2014) E-Government Index: 2 nd Rank in Africa after Tunisia ( UN e- Gov. Survey 2014) ICT Development Index: 1 st in Africa ( ITU-MIS 2014 Report)

Part 1 Statistics and Electronic Evidence on Cybercrime

Incident Statistics Reported to CERT-MU 2014

Part 2 Principal Challenges in Confronting Cybercrime

Principal Challenges o Strategic institutional co-ordination o Enforcement mechanism and legal status o Control standards and guidelines o Centralized Incident Reporting o Data Interception and Retention at the Gateway Level o Mutual Assistance o Public Awareness

Part 2 Overview of the National Cybersecurity Initiatives

National Cybersecurity Initiatives National Information and Communication Technology Strategic Plan 2007-2011 In 2011 the NICTSP 2007-11 was succeeded by the second National ICT Strategic Plan 2011-2014.Reviewed plan aimed to engender a secure and resilient ICT environment

National Cybersecurity Initiatives Currently a new Strategic Plan 2015-2020 is being developed to realise the vision of the government to make Mauritius a smart island.

National Cybersecurity Initiatives Setting up of a Mauritian CERT in 2008 (CERT is affiliated to FIRST) PKI Ecosystem already setup including CCA, CA Implement the recommendations of the Anti-Spam Action Plan and legislation Development of a Child Safety Action Plan and legislation Organization of Regional Information Security Event

National Cybersecurity Initiatives (contd..) Promote the adoption of information security standards at the national level Setting up of a local chapters of international professional information security associations in Mauritius ( ISACA local chapter is operational since 2010) National Information Security Awareness programme and Capacity building

National Cybersecurity Strategy 14 Mauritius developed a Comprehensive National Cybersecurity Strategy in 2015. The strategy has been approved by the Government in 2014. The strategy is categorized into 4 main goals and 28 action plans. The strategy implementation will be done over a period of five years ( 2014-2019).

Strategic Goals of the New Cybersecurity Strategy Goal 1 To secure our Cyberspace and establish a front line of defense against Cybercrime. Goal 2 To enhance our resilience to Cyber Attacks and be able to defend against the full spectrum of Threats. Goal 3 To develop an efficient collaborative model between the authorities and the business community for the purpose of advancing National Cyber Security and Cyber Defense. Goal 4 To improve the Cyber Expertise and the comprehensive Cyber Security Awareness of whole society

Action Plan Goal 1 Project Code Project Name GOAL 1: TO SECURE OUR CYBERSPACE AND ESTABLISH A FRONT LINE OF DEFENSE AGAINST CYBER CRIME CS1P1 CS1P2 CS1P3 CS1P4 CS1P5 CS1P6 CS1P7 CS1P8 Setting up of a Cyber Threat Monitoring System Setting up of a content filtering system to block illicit materials on ICT devices Establish a mechanism for the removal of illegal contents Conducting Cyber Security Drills Enhance Law Enforcement capability on cybersecurity International and Regional Cooperation on cybercrime Enhance the security of cyberspace Legal Framework Assessment

Action Plan Goal 2 GOAL 2: TO ENHANCE OUR RESILIENCE TO CYBER ATTACKS AND BE ABLE TO DEFEND AGAINST THE FULL SPECTRUM OF THREATS CS2P1 CS2P2 CS2P3 CS2P4 CS2P5 Develop and Implement a CIIP Framework Development and Implementation of a Cyber Crisis Management Plan Provision for Fiscal Schemes and Incentives Creation of a national test-bed for network security Adoption of a Cyber Security Controls Scheme for protection against cyber threats

Action Plan Goal 3 GOAL 3: DEVELOP AN EFFICIENT COLLABORATIVE MODEL BETWEEN THE AUTHORITIES AND THE BUSINESS COMMUNITY FOR THE PURPOSE OF ADVANCING CYBER SECURITY CS3P1 CS3P2 CS3P3 CS3P4 CS3P5 CS3P6 CS3P7 CS3P8 CS3P9 CS3P10 Promote Information Risk Management at National level Promote the universal adoption of Information Security standards at National level Promote Secure software Development Promote the designation of a Senior Information Security Personnel (CISO, IS Consultants, Information Security Experts) within organisations Promote the implementation of Information Security Standards in the Civil Service To promote e-government initiatives and ensure conformance to security best practices Adoption of guidelines for procurement of ICT products Conducting mandatory Information Security Audit Collaboration with industry for research and development To establish a collaborative framework with vendors and service providers to improve the visibility of the integrity of ICT products and testing and validating the security of such products.

Action Plan Goal 4 GOAL 4: TO IMPROVE THE CYBER EXPERTISE AND THE COMPREHENSIVE CYBER SECURITY EDUCATION & AWARENESS OF ALL SOCIETAL ACTORS CS4P1 CS4P2 CS4P3 CS4P4 CS4P5 Promote security certifications and trainings from renowned International organisations Establish cyber security training programmes for SMEs Cyber Security Education Cyber Security Awareness in Civil Service Organisation of International Cyber Security annual events

Thank You for your attention