SlideShare a Scribd company logo
1 of 17
The Nigerian Cybersecurity
Space – How Regulated? Who
Regulates?
Starring:
Chinatu Uzuegbu
CCISO, CISSP, CISM, CISA, CEH, ……
CyberSecurity Consultant RoseTech
THE SENATE, FEDERAL REPUBLIC OF NIGERIA, Committee on ICT and Cybercrime event
Theme:
The Digital Theatre and the Future of Nigeria
Chinatu Uzuegbu
❖ Managing Cyber Security Consultant, RoseTech.
❖ Founding Past President, (ISC)2 Nigeria Chapter.
❖ Member, Global (ISC)2 Chapter Advisory Committee(CAC).
❖ Member, VigiTrust Advisory Board, Ireland.
❖ Mentor, Open Cyber Security Mentorship Program(OCMP), AfrHackton and
Cyber in Africa Initiative.
❖ Global Ambassador, WomenTech Network
❖ Finalist, Top 50 Women in Cybersecurity, Africa, 2020
❖ Alumni, London Graduate School in Collaboration with CommonWealth
University- Dubai Leadership Summit. 2020
❖ Alumni, University of Liverpool- MSc. Information Systems Management
❖ Alumni, University of Port Harcourt-BSc. Computer science & Maths.
❖ Over 15 years Wealth of experience in IT and 10 years in Information
Security with FIs, Manufacturing and Computer Firms.
❖ Professionally:CCISO, CISSP, CISM, CISA, CEH and other related IT
Certifications.
❖ Professional Membership: (ISC)2, ISACA, EC-COUNCIL, CSEAN.
❖ Participated and Attended both International and Local Conferences.
❖ Aside Profession, inclined to Learning New Things, Reading, Cooking and
Adventures.
❖ Open to Cyber Security Related Services.
Preamble
Cyber
Cyber Security
CyberSpace The Communication and Interoperable Handshakes of
The Cybernetics with Pictorial illustration.
Concept of the CIA Triad, the approach to securing The
CyberSpace.
Concept of The Cybernetics
The CyberSpace of a Nation The Global National Security Alliance Perspective
The Conceptual and Contextual Approach
You can’t go wrong with GAP Analysis/Checklist
Laws, Regulations, Frameworks and
Governance
International Regulations and
Frameworks
How Regulated is Nigeria across All
Sectors and Industries?
Seamless alignment with The Standards/Best Practices
is the way to go!
The SMART principle approach would help.
Importance of Regulations and
Frameworks
Who Regulates in Nigeria? Key Players of the various Industries overseen by ONSA.
Conclusion
Cyber
The Concept of The Cybernetics
❖ Coined out from the word Cybernetics.
❖ Cybernetics is the study of Medical Science, Biological Science, Applied
Science, Natural Science, Engineering, Electronic devices, Data,
Information, Artificial Intelligence, Machine Learning , Infrastructures,
Computers, Laptops, Technology, Communications, and other related
systems with the aim of promoting good governance and Control
around the inter-connectivity and interoperability of these elements-
The Cybernetic Elements.
❖ Cybernetics is derived from the Greek word Kybernetes meaning a
Person in Control, more like a Man on the Steering for a long drive.
CyberSpace
The CyberSpace of a Nation
ONSA
Parliament Commissioning Bodies
Regulatory
Bodies
Contratual and
standards
•The Forces
•Law
Enforcement
•All Public Sectors:
•Education
•Transportation
•Health
•Trades and Commerce
•Immigration
•National Population
•National Communications
•National Identity
•Revenues
•Postal Services
•NITDA
•ICT
• Others
EFCC
NFIU
CBN
Others
Governance of any firm
outside the government
Private Sector
Cyber Security
The Concept of The CIA Triad
❖ The Process or act of protecting your Cybernetic
Elements from Undue Disclosure, Modification and
Destruction.
❖ The Process or act of protecting our Cybernetic Elements
based on the acceptable level of Confidentiality, Integrity
and Availability-The CIA Triad.
❖ The CIA Triad is generally seen as the philosophy of Cyber
Security:
➢ Confidentiality- The act of protecting the
Cybernetic elements from unauthorised Disclosure
➢ Integrity- The act of protecting the Cybernetic
elements from unauthorised Modification.
➢ Availability- The act of protecting the Cybernetic
Elements from unauthorised Destruction.
The other
side of the
coin
Modification
The Philosophy of Cyber Security
The philosophy of Cyber Security can be categorised
into three Layers:
1. The Focused or Objective Layer- Achieving an
Acceptable level of: Confidentiality, Integrity and
Availability(CIA Triad).
2. The Three Control Types: Administrative, Technical
and Physical.
3. The Seven Security Measures, Safeguards or
Countermeasures: Preventive, Detective, Deterrent,
Corrective, Recovery, Compensative and Directive.
CIA Triad
Admin Tech Physical
Prevent, Detect, Deter, Correct,
Recover, Compensate, Direct
Regulations, Governance and
Frameworks
● Regulation is the overarching concept that drives Governance
and Frameworks for necessary compliance and enforcements.
● Governance is the framework of authority and accountability
that defines and controls the outputs, outcomes and benefits
from projects, programmes and portfolios. The mechanism
whereby the investing organisation exerts financial and
technical control over the deployment of the work and the
realisation of value.
● A framework is a conceptual structure defined by the
governance of an organisation to set out policies within the
company.
Importance of Regulations and
Frameworks
● Promotes good Security Posture and Culture.
● Promotes Clean Hygiene in your Processes.
● Assurance that you are aligned with Best
Practices.
● Accurate posture when combined with GAP
Analysis.
● You cannot go wrong with Regulations……..
International Regulations and Frameworks
•ECPA-Electronics Communications Privacy Act.
•GLBA-Graham Leach Bliley Act
•SOX-Sarbanes-Oxley Act.
•HIPAA-Health Insurance Portability and Accountability Act.
•FERPA-Family Educational Rights and Privacy Act.
•DMCA-The Digital Millennium Copyright Act.
•European Union Data Directive(Privacy Regulatory) on Personally Identifiable
Information-PII.
•The Privacy Shield(replacement of US Safe Harbor) for countries outside EU in
need of EU Citizens data consent: Canada(PIPEDA), Australia, Argentina,
EFTA(Switzerland, Iceland and Others), Asia Pacific Economic Corporations) and
other Companies through Contractual bindings.
Links to Some International
Frameworks
❖ https://www.iso.org/isoiec-27001-information-security.html
❖ https://csrc.nist.gov/Projects/risk-management/sp800-53-
controls/
❖ https://www.pcisecuritystandards.org/pci_security/
❖ https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html
❖ https://www.cisa.gov/federal-information-security-
modernization-act
❖ https://www.ftc.gov/tips-advice/business-center/privacy-and-
security/gramm-leach-bliley-act
❖ https://www.hhs.gov/hipaa/index.html
Nigerian Cyber Security
Frameworks and Initiatives
1. National CyberSecurity Policy and Strategy-
NCPS.
https://education.gov.ng/national-
cybersecurity-policy-and-strategy-2021/#1
2. Nigeria Data Protection Regulation-NDPR.
https://nitda.gov.ng/wp-
content/uploads/2021/01/NDPR-
Implementation-Framework.pdf
3. Other Frameworks and Regulatory ACTs from
NCC, CBN and others.
How Regulated is Nigeria across All Sectors and Industries?
● Could only be ascertained and measured with Synergy and Collaborations with All
Governing Bodies and Key Players of the various Industries but it has to be driven
from ONSA.
● The involvement of All Key Players of the various Bodies would ensure all areas and
Critical Paths are well outlined.
● Customization of the Standard and International Regulations around each Sector
highly depends on the jurisdiction of the Nation. The Location and what should
apply.
● Already existing Regulations should be enforced and tested globally to ensure
alignment with other developed Countries especially that of NDPR.
● The publicity with fines that go with violations should be catchy and lets those in
Diaspora understand the regulations that apply here too when it has to do with
relative transfer and exchange of Information.
● ONSA should map out a sub-section tagged Cyber Security Alliance to drive the
Regulations and enforcements
The Regulation Structure
ONSA
Parliament Commissioning Bodies
Regulatory
Bodies
Contratual and
standards
•The Forces
•Law
Enforcement
•All Public Sectors:
•Education
•Transportation
•Health
•Trades and Commerce
•Immigration
•National Population
•National Communications
•National Identity
•Revenues
•Postal Services
•NITDA
•ICT
• Others
EFCC
NFIU
CBN
Others
Governance of any firm
outside the government
Private Sector
Conclusion
● Running with Regulations is achievable if we could
apply the concept of The National Security
Alliance.
● Most Key Industries are already aligning their
processes with Standard Regulations, identify
them and inculcate them into the Cyber Security
Alliance group to represent each industry under
the various Sectors.
Thank You!

More Related Content

Similar to The Nigerian Cybersecurity Space-How Regulated Are We?

Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paperWesen Tegegne
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategyBright Boateng
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...itnewsafrica
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxHillaryObomighie
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Benjamin Ang
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxsoulscout02
 
What is expected from an organization under NCA ECC Compliance?
What is expected from an organization under NCA ECC Compliance?What is expected from an organization under NCA ECC Compliance?
What is expected from an organization under NCA ECC Compliance?VISTA InfoSec
 
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docxOutline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docxalfred4lewis58146
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationJacqueline Fick
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Jisc
 
Using ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernanceUsing ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernancePECB
 
The Impact of Security Operations Management in Risk Management
The Impact of Security Operations Management in Risk ManagementThe Impact of Security Operations Management in Risk Management
The Impact of Security Operations Management in Risk ManagementPECB
 

Similar to The Nigerian Cybersecurity Space-How Regulated Are We? (20)

Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptx
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
 
What is expected from an organization under NCA ECC Compliance?
What is expected from an organization under NCA ECC Compliance?What is expected from an organization under NCA ECC Compliance?
What is expected from an organization under NCA ECC Compliance?
 
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docxOutline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
Outline for an Enterprise IT Security PolicyNo NameJanuary 24, 201.docx
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46
 
Using ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernanceUsing ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and Governance
 
The Impact of Security Operations Management in Risk Management
The Impact of Security Operations Management in Risk ManagementThe Impact of Security Operations Management in Risk Management
The Impact of Security Operations Management in Risk Management
 

More from Chinatu Uzuegbu

Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfChinatu Uzuegbu
 
Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfChinatu Uzuegbu
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxChinatu Uzuegbu
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfChinatu Uzuegbu
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfChinatu Uzuegbu
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfChinatu Uzuegbu
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfChinatu Uzuegbu
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfChinatu Uzuegbu
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfChinatu Uzuegbu
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfChinatu Uzuegbu
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpChinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Chinatu Uzuegbu
 

More from Chinatu Uzuegbu (19)

Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdf
 
Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdf
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptx
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 

Recently uploaded

Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...anilsa9823
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30JSchaus & Associates
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxPeter Miles
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...tanu pandey
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos WebinarLinda Reinstein
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...ranjana rawat
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...Hemant Purohit
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxaaryamanorathofficia
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28JSchaus & Associates
 

Recently uploaded (20)

Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
 
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptx
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
 

The Nigerian Cybersecurity Space-How Regulated Are We?

  • 1. The Nigerian Cybersecurity Space – How Regulated? Who Regulates? Starring: Chinatu Uzuegbu CCISO, CISSP, CISM, CISA, CEH, …… CyberSecurity Consultant RoseTech THE SENATE, FEDERAL REPUBLIC OF NIGERIA, Committee on ICT and Cybercrime event Theme: The Digital Theatre and the Future of Nigeria
  • 2. Chinatu Uzuegbu ❖ Managing Cyber Security Consultant, RoseTech. ❖ Founding Past President, (ISC)2 Nigeria Chapter. ❖ Member, Global (ISC)2 Chapter Advisory Committee(CAC). ❖ Member, VigiTrust Advisory Board, Ireland. ❖ Mentor, Open Cyber Security Mentorship Program(OCMP), AfrHackton and Cyber in Africa Initiative. ❖ Global Ambassador, WomenTech Network ❖ Finalist, Top 50 Women in Cybersecurity, Africa, 2020 ❖ Alumni, London Graduate School in Collaboration with CommonWealth University- Dubai Leadership Summit. 2020 ❖ Alumni, University of Liverpool- MSc. Information Systems Management ❖ Alumni, University of Port Harcourt-BSc. Computer science & Maths. ❖ Over 15 years Wealth of experience in IT and 10 years in Information Security with FIs, Manufacturing and Computer Firms. ❖ Professionally:CCISO, CISSP, CISM, CISA, CEH and other related IT Certifications. ❖ Professional Membership: (ISC)2, ISACA, EC-COUNCIL, CSEAN. ❖ Participated and Attended both International and Local Conferences. ❖ Aside Profession, inclined to Learning New Things, Reading, Cooking and Adventures. ❖ Open to Cyber Security Related Services.
  • 3. Preamble Cyber Cyber Security CyberSpace The Communication and Interoperable Handshakes of The Cybernetics with Pictorial illustration. Concept of the CIA Triad, the approach to securing The CyberSpace. Concept of The Cybernetics The CyberSpace of a Nation The Global National Security Alliance Perspective The Conceptual and Contextual Approach You can’t go wrong with GAP Analysis/Checklist Laws, Regulations, Frameworks and Governance International Regulations and Frameworks How Regulated is Nigeria across All Sectors and Industries? Seamless alignment with The Standards/Best Practices is the way to go! The SMART principle approach would help. Importance of Regulations and Frameworks Who Regulates in Nigeria? Key Players of the various Industries overseen by ONSA. Conclusion
  • 4. Cyber The Concept of The Cybernetics ❖ Coined out from the word Cybernetics. ❖ Cybernetics is the study of Medical Science, Biological Science, Applied Science, Natural Science, Engineering, Electronic devices, Data, Information, Artificial Intelligence, Machine Learning , Infrastructures, Computers, Laptops, Technology, Communications, and other related systems with the aim of promoting good governance and Control around the inter-connectivity and interoperability of these elements- The Cybernetic Elements. ❖ Cybernetics is derived from the Greek word Kybernetes meaning a Person in Control, more like a Man on the Steering for a long drive.
  • 6. The CyberSpace of a Nation ONSA Parliament Commissioning Bodies Regulatory Bodies Contratual and standards •The Forces •Law Enforcement •All Public Sectors: •Education •Transportation •Health •Trades and Commerce •Immigration •National Population •National Communications •National Identity •Revenues •Postal Services •NITDA •ICT • Others EFCC NFIU CBN Others Governance of any firm outside the government Private Sector
  • 7. Cyber Security The Concept of The CIA Triad ❖ The Process or act of protecting your Cybernetic Elements from Undue Disclosure, Modification and Destruction. ❖ The Process or act of protecting our Cybernetic Elements based on the acceptable level of Confidentiality, Integrity and Availability-The CIA Triad. ❖ The CIA Triad is generally seen as the philosophy of Cyber Security: ➢ Confidentiality- The act of protecting the Cybernetic elements from unauthorised Disclosure ➢ Integrity- The act of protecting the Cybernetic elements from unauthorised Modification. ➢ Availability- The act of protecting the Cybernetic Elements from unauthorised Destruction. The other side of the coin Modification
  • 8. The Philosophy of Cyber Security The philosophy of Cyber Security can be categorised into three Layers: 1. The Focused or Objective Layer- Achieving an Acceptable level of: Confidentiality, Integrity and Availability(CIA Triad). 2. The Three Control Types: Administrative, Technical and Physical. 3. The Seven Security Measures, Safeguards or Countermeasures: Preventive, Detective, Deterrent, Corrective, Recovery, Compensative and Directive. CIA Triad Admin Tech Physical Prevent, Detect, Deter, Correct, Recover, Compensate, Direct
  • 9. Regulations, Governance and Frameworks ● Regulation is the overarching concept that drives Governance and Frameworks for necessary compliance and enforcements. ● Governance is the framework of authority and accountability that defines and controls the outputs, outcomes and benefits from projects, programmes and portfolios. The mechanism whereby the investing organisation exerts financial and technical control over the deployment of the work and the realisation of value. ● A framework is a conceptual structure defined by the governance of an organisation to set out policies within the company.
  • 10. Importance of Regulations and Frameworks ● Promotes good Security Posture and Culture. ● Promotes Clean Hygiene in your Processes. ● Assurance that you are aligned with Best Practices. ● Accurate posture when combined with GAP Analysis. ● You cannot go wrong with Regulations……..
  • 11. International Regulations and Frameworks •ECPA-Electronics Communications Privacy Act. •GLBA-Graham Leach Bliley Act •SOX-Sarbanes-Oxley Act. •HIPAA-Health Insurance Portability and Accountability Act. •FERPA-Family Educational Rights and Privacy Act. •DMCA-The Digital Millennium Copyright Act. •European Union Data Directive(Privacy Regulatory) on Personally Identifiable Information-PII. •The Privacy Shield(replacement of US Safe Harbor) for countries outside EU in need of EU Citizens data consent: Canada(PIPEDA), Australia, Argentina, EFTA(Switzerland, Iceland and Others), Asia Pacific Economic Corporations) and other Companies through Contractual bindings.
  • 12. Links to Some International Frameworks ❖ https://www.iso.org/isoiec-27001-information-security.html ❖ https://csrc.nist.gov/Projects/risk-management/sp800-53- controls/ ❖ https://www.pcisecuritystandards.org/pci_security/ ❖ https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html ❖ https://www.cisa.gov/federal-information-security- modernization-act ❖ https://www.ftc.gov/tips-advice/business-center/privacy-and- security/gramm-leach-bliley-act ❖ https://www.hhs.gov/hipaa/index.html
  • 13. Nigerian Cyber Security Frameworks and Initiatives 1. National CyberSecurity Policy and Strategy- NCPS. https://education.gov.ng/national- cybersecurity-policy-and-strategy-2021/#1 2. Nigeria Data Protection Regulation-NDPR. https://nitda.gov.ng/wp- content/uploads/2021/01/NDPR- Implementation-Framework.pdf 3. Other Frameworks and Regulatory ACTs from NCC, CBN and others.
  • 14. How Regulated is Nigeria across All Sectors and Industries? ● Could only be ascertained and measured with Synergy and Collaborations with All Governing Bodies and Key Players of the various Industries but it has to be driven from ONSA. ● The involvement of All Key Players of the various Bodies would ensure all areas and Critical Paths are well outlined. ● Customization of the Standard and International Regulations around each Sector highly depends on the jurisdiction of the Nation. The Location and what should apply. ● Already existing Regulations should be enforced and tested globally to ensure alignment with other developed Countries especially that of NDPR. ● The publicity with fines that go with violations should be catchy and lets those in Diaspora understand the regulations that apply here too when it has to do with relative transfer and exchange of Information. ● ONSA should map out a sub-section tagged Cyber Security Alliance to drive the Regulations and enforcements
  • 15. The Regulation Structure ONSA Parliament Commissioning Bodies Regulatory Bodies Contratual and standards •The Forces •Law Enforcement •All Public Sectors: •Education •Transportation •Health •Trades and Commerce •Immigration •National Population •National Communications •National Identity •Revenues •Postal Services •NITDA •ICT • Others EFCC NFIU CBN Others Governance of any firm outside the government Private Sector
  • 16. Conclusion ● Running with Regulations is achievable if we could apply the concept of The National Security Alliance. ● Most Key Industries are already aligning their processes with Standard Regulations, identify them and inculcate them into the Cyber Security Alliance group to represent each industry under the various Sectors.