Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Security and Privacy in Pegulated Environments

237 views

Published on

Presentation at the 2016 Ghana IGF

Published in: Internet
  • Be the first to comment

  • Be the first to like this

Security and Privacy in Pegulated Environments

  1. 1. SECURITY AND PRIVACY IN REGULATED ENVIRONMENTS
  2. 2. “Cyber Security embraces the protection of both private and public sector interest in cyber space and their dependency on digital networks and also the protection of exploitation of opportunities— commercial or public policy—that cyberspace offers.”
  3. 3. BUSINESS DRIVERS & CHALLENGES oIncreasing sophistication, frequency and scale of cybercrime oMalicious and inadvertent leakage of sensitive data o Loss of intellectual property o Increasing regulatory environment oInterconnections between corporate and process control networks oVulnerabilities introduced by the rise of cloud computing, mobile devices and Web 2.0 applications within the enterprise (see next figure)
  4. 4. GHANA CRITICAL NATIONAL INFORMATION INFRASTRUCTURE 1.National Defense and Security 2. Banking and Finance 3. Information and Communications 4. Energy 5. Transportation 6. Water 7. Health Services 8. Government 9. Emergency services 10. Food and Agriculture 9/1/2016 4
  5. 5. REGULATED ENVIRONMENTS – INFORMATION INFRASTRUCTURE Regulated Environments:  Internet Service Providers &  Mobile Network Operators -NCA  Financial Operators – Bank of Ghana  Power SCADA operators – Energy Commission Who are being protecting?  Subscribers  Clients What are the intervention for security?  Regulatory provisions for Cyber Security?  Data protection?  Data aging policy? 01/09/2016 ...CERT-GH, SHARING INFORMATION FOR ENHANCE CYBER SECURITY 6
  6. 6. THANK YOU QUESTIONS?

×