National Cybersecurity a multi-stakeholder approach Wednesday, 11 th - - PowerPoint PPT Presentation

national cybersecurity
SMART_READER_LITE
LIVE PREVIEW

National Cybersecurity a multi-stakeholder approach Wednesday, 11 th - - PowerPoint PPT Presentation

ISACA-KENYA ANNUAL CONFERENCE 2018 National Cybersecurity a multi-stakeholder approach Wednesday, 11 th April 2018 By: Vincent Ngundi HEAD OF NATIONAL KE-CIRT/CC & CYBERSECURITY CONTENT National Cybersecurity Policy Framework 1)


slide-1
SLIDE 1

ISACA-KENYA ANNUAL CONFERENCE 2018

National Cybersecurity

a multi-stakeholder approach

Wednesday, 11th April 2018

By: Vincent Ngundi HEAD OF NATIONAL KE-CIRT/CC & CYBERSECURITY

slide-2
SLIDE 2

1)

National Cybersecurity Policy Framework

2)

National Cybersecurity Governance Framework

3)

National KE-CIRT/CC Operational Framework

4)

National KE-CIRT/CC Vision & Mandate

5)

National KE-CIRT/CC Collaboration Framework

6)

National Cyber Threat Landscape

7)

Collaboration: A Whole-of-Society Approach

2

CONTENT

slide-3
SLIDE 3

3

NATIONAL CYBERSECURITY FRAMEWORK

Policy + Governance + Operations

slide-4
SLIDE 4

VISION 2030

ICT Sector Policy

National Cyber Security Strategy

Kenya Information & Communications Act + Regulations

National KE-CIRT/CC

4

National Cybersecurity: Policy Framework

Law Enforcement

NATIONAL CYBERSECURITY CENTRE (NCC)

slide-5
SLIDE 5

NATIONAL SECURITY COUNCIL (NSC)

[Chaired by the President]

National Security Advisory Committee (NSAC)

[Chaired by the Head of Public Service]

National Cybersecurity Steering Committee (NCSC)

[Chaired by the Cabinet Secretary/MoICT]

National KE-CIRT/CC

[Multi-agency Collaboration]

Communications Authority of Kenya

Law Enforcement

[DCI | KDF | NIS]

National Cybersecurity: Governance Framework

slide-6
SLIDE 6

NATIONAL KE-CIRT/CC

[CA + Law Enforcement]

Multi-agency Collaboration Framework

National KE-CIRT/CC Cybersecurity Committee (NKCC)

[multi-agency + multi-stakeholder] e-Govt. Sector CIRT Telcom Sector CIRT Financial Sector CIRT Academia Sector CIRT Critical Info. Infrastructure International Partners

National Cybersecurity: Operational Framework

slide-7
SLIDE 7

NATIONAL KE-CIRT/CC

Implement National Cybersecurity Policies, Laws & Regulations National Cybersecurity Awareness & Capacity Building Technical Co-ordination & Response to Cyber Incidents (24/7) Early Warning & Technical Advisories (24/7) Development & Implementation

  • f a NPKI

R&D on Cybersecurity Establish Collaborations

  • n Cybersecurity

[PPP]

National KE-CIRT/CC: Vision & Mandate

VISION Provision of comprehensive cybersecurity services to protect the Nation’s cyberspace in order to promote access to and use of Information and Communication services in Kenya MISSION Responding to cybersecurity incidences in a timely fashion and building a national culture of cybersecurity LAW KICA Part VIA, Section 83C: Develop a framework for facilitating the investigation and prosecution

  • f

cybercrime offenses

slide-8
SLIDE 8

8

National KE-CIRT/CC: Collaboration Framework

slide-9
SLIDE 9

9

NATIONAL CYBER THREAT LANDSCAPE

Statistics + Threat Vectors

slide-10
SLIDE 10

10

National Cyber Threat Landscape

43 78 65 346 488 1700 1000000 2000000 3000000 4000000 5000000 6000000 7000000 8000000 200 400 600 800 1000 1200 1400 1600 1800 Q3(2016) Q1(2017) Q2(2017) Q3(2017) Q4(2017) Q1(2018)

CYBER THREATS & RESPONSE

slide-11
SLIDE 11

11

National Cyber Threat Landscape

Malware 41% Systems Misconfig 39% Impersonation 9% Brute Force 5% Web-application 2% Botnet/DDoS 2% Online Abuse 2%

CYBER THREAT ATTACK VECTORS

Malware Systems Misconfig Impersonation Brute Force Web-application Botnet/DDoS Online Abuse

slide-12
SLIDE 12

12

COLLABORATION

A Whole-of-Society Approach

slide-13
SLIDE 13

13

Background: Challenges in Collaboration CYBER- INSECURITY

Just for Techies Complex Environment Silo-based Culture Everyone for Themselves

(one-of-society)

Banks Finance Public Utility Government Telco Business

Backroom Boardroom Situation Room People Processes Technology OT+IT Public Busines s Gov.

slide-14
SLIDE 14

14

Whole-of-Society Approach

SILO APPROACH

Fragmented security and risk management CONVERGENCE RISK-BASED APPROACH

Converged approach highlights vulnerabilities in 3 key areas: People + Processes + Physical (OT+IT)

slide-15
SLIDE 15

15

Whole-of-Society Approach

SILO APPROACH

Fragmented security and risk management CONVERGENCE RISK-BASED APPROACH

Converged approach highlights vulnerabilities in 3 key areas: People + Processes + Physical (OT+IT)

CULTURAL BARRIERS TO SECURITY

Challenge has been internal cross- departmental cultures with limited communication between physical and IT security for instance

slide-16
SLIDE 16

16

Whole-of-Society Approach

SILO APPROACH

Fragmented security and risk management CONVERGENCE RISK-BASED APPROACH

Converged approach highlights vulnerabilities in 3 key areas: People + Processes + Physical (OT+IT)

CULTURAL BARRIERS TO SECURITY

Challenge has been internal cross- departmental cultures with limited communication between physical and IT security for instance MAPPING ASSETS & PROCESSES

Organizations should develop an integrated security risk framework: tech + processes + safeguards + systems + management

slide-17
SLIDE 17

17

Whole-of-Society Approach

SILO APPROACH

Fragmented security and risk management CONVERGENCE RISK-BASED APPROACH

Converged approach highlights vulnerabilities in 3 key areas: People + Processes + Physical (OT+IT)

CULTURAL BARRIERS TO SECURITY

Challenge has been internal cross- departmental cultures with limited communication between physical and IT security for instance MAPPING ASSETS & PROCESSES

Organizations should develop an integrated security risk framework: tech + processes + safeguards + systems + management

STAKEHOLDER BUY-IN

Develop a culture of cybersecurity: processes + training + awareness + assessment/audit

slide-18
SLIDE 18

18

Whole-of-Society Approach

SILO APPROACH

Fragmented security and risk management CONVERGENCE RISK-BASED APPROACH

Converged approach highlights vulnerabilities in 3 key areas: People + Processes + Physical (OT+IT)

CULTURAL BARRIERS TO SECURITY

Challenge has been internal cross- departmental cultures with limited communication between physical and IT security for instance MAPPING ASSETS & PROCESSES

Organizations should develop an integrated security risk framework: tech + processes + safeguards + systems + management

STAKEHOLDER BUY-IN

Develop a culture of cybersecurity: processes + training + awareness + assessment/audit

EVOLVING THREATS

monitoring + capability review + share

slide-19
SLIDE 19

19

Whole-of-Society Approach

SILO APPROACH

Fragmented security and risk management CONVERGENCE RISK-BASED APPROACH

Converged approach highlights vulnerabilities in 3 key areas: People + Processes + Physical (OT+IT)

CULTURAL BARRIERS TO SECURITY

Challenge has been internal cross- departmental cultures with limited communication between physical and IT security for instance MAPPING ASSETS & PROCESSES

Organizations should develop an integrated security risk framework: tech + processes + safeguards + systems + management

STAKEHOLDER BUY-IN

Develop a culture of cybersecurity: processes + training + awareness + assessment/audit

EVOLVING THREATS

monitoring + capability review + share

COMMUNICATION

frequency + audience + content more vs less & push vs pull

slide-20
SLIDE 20

20

Whole-of-Society Approach

SILO APPROACH

Fragmented security and risk management CONVERGENCE RISK-BASED APPROACH

Converged approach highlights vulnerabilities in 3 key areas: People + Processes + Physical (OT+IT)

CULTURAL BARRIERS TO SECURITY

Challenge has been internal cross- departmental cultures with limited communication between physical and IT security for instance MAPPING ASSETS & PROCESSES

Organizations should develop an integrated security risk framework: tech + processes + safeguards + systems + management

STAKEHOLDER BUY-IN

Develop a culture of cybersecurity: processes + training + awareness + assessment/audit

EVOLVING THREATS

monitoring + capability review + share

COMMUNICATION

frequency + audience + content more vs less & push vs pull

COLLABORATION

internal + external

  • Govt. + Business + Public + Intl.
slide-21
SLIDE 21

.Thank You.

21