SlideShare a Scribd company logo
Building A Secure Cyberspace for
Innovative Enterprise:
A Collective Responsibility

Secure Africa Conference 2013
Centre For Management Development , Lagos

Kayode Yussuf

|

CyberSecurity Advocate
’Start by doing what is necessary,
then what is possible
and suddenly, you’re doing the impossible.’
Saint Francis of Assisi
Some Hard Facts
• The world today is reliant on the internet, British
businesses earn £1 in every £5 from the internet –
www.gov.uk

• We expect govt and our institutions to protect us
from online security breaches
• Over 600 million phishing attacks per annum –
www.go-golf.com
• Cybercrime is costing the world $110 billion every
year - Symantec Corp
Whose responsibility is it to secure our
Cyberspace?
Find X?
Government

Professional
Associations

X
Individuals

Private
Sector
Cybersecurity is a shared responsibility, and each of us
has a role to play. Emerging cyber threats require the
engagement of the entire society—from government
and law enforcement to the private sector and most
importantly, members of the public.
• Janet Napolitano
Former Secretary, Department of Homeland Security
Building A Secure Cyberspace for
Innovative Enterprise
Strengthening The Cyber Ecosystem In
Nigeria, How?
Build Collaborative Communities
‘Law enforcement agencies are often “reluctant to
use new techniques, and don’t always maximize
current technology. Criminals, however, are
certainly maximizing the benefits of technology in
their wrongdoing.’
• Noboru Nakatani,
Executive Director INTERPOL’s Global Complex for Innovation.
Next Steps
• Favorable policies and legislation ( Nigeria’s Cyber-security
law and Creative Commons licensing for Education)
• Mass enlightenment
• Immediate creation and support of a CERT
• Law enforcement agencies must work together
• Inter-nation collaborations
• Citizens participation through volunteering
Next Steps Cont’d
• Empower Individuals and Organizations to Operate
Securely
• Build Collaborative Communities with CSO and
professional bodies to serve as lobbyists
• Cyber-Competitions sponsored by private
organizations & government
• PPP in research & development in CyberSecurity
What is expected of the Public?
Be cyber-security conscious
Make information available
Get involved in community projects
Enlightening people around you
What is expected of the Public?
•
•
•
•

•
•
•
•
•
•

Secure your devices, PCs and online accounts
Never click on links in emails
Never open the attachments unless you are sure of its source
Do not give out personal information over the phone or in an
email unless completely sure
Set secure passwords and don't share them with anyone.
Keep your operating system, browser, anti-virus and other critical
software up to date.
Verify the authenticity of requests from companies or individuals
by contacting them directly.
For e-Mail, turn off the option to automatically download
attachments.
Be suspicious of unknown links or requests sent through email or
text message
Pay close attention to website URLs.
What I do to enlightening people
• Personal enlightenment amongst friends
• Speaking at conferences and seminars
• Organizing trainings

• Organizing conferences…. NGSECURE
If each one can reach one,
then each one can teach one
what a beautiful nation Nigeria can be…..
Chaz B,
OAP and Producer of Sharing Life Issues with Chaz B
If each one can reach one,
then each one can teach one
what a beautiful & safe world
we can live in…..
Kayode Yussuf’s remixed
Thank you for listening, we hope you
join us secure Nigeria

Kayode Yussuf
+234-8029730059
kayusyussuf@yahoo.com
@k_whybaba

More Related Content

What's hot

cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
Fahmi Albaheth
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
Beckusq
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
sudheerreddy59
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Aurobindo Nayak
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
Brian Honan
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
Boston Global Forum
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
Home
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Benjamin Ang
 
Cyberspace
CyberspaceCyberspace
Cyberspace
Utchi
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
Dababrata Mondal
 
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...Cédric Laurant
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
atifkhanniazi
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescents
Treesa Lobo
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
famudal
 

What's hot (20)

cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescents
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 

Viewers also liked

Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Bruce Damer
 
Building Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the InternetBuilding Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the Internet
ipspat
 
Economy, Politics & Culture in Cyberspace
Economy, Politics & Culture in CyberspaceEconomy, Politics & Culture in Cyberspace
Economy, Politics & Culture in Cyberspace
Ozgur Uckan
 
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
Bruce Damer
 
An Origin of Life in Salt Water or Fresh Water?
An Origin of Life in Salt Water or Fresh Water?An Origin of Life in Salt Water or Fresh Water?
An Origin of Life in Salt Water or Fresh Water?
Bruce Damer
 
A Ministry of Design!
A Ministry of Design!A Ministry of Design!
A Ministry of Design!
Lesley Ann Noel
 
Solar space heating and cooling
Solar space heating and coolingSolar space heating and cooling
Solar space heating and coolingAniket Gavali
 
Interior design seminar presentation
Interior design seminar presentationInterior design seminar presentation
Interior design seminar presentationhighcraft
 

Viewers also liked (8)

Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
 
Building Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the InternetBuilding Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the Internet
 
Economy, Politics & Culture in Cyberspace
Economy, Politics & Culture in CyberspaceEconomy, Politics & Culture in Cyberspace
Economy, Politics & Culture in Cyberspace
 
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
 
An Origin of Life in Salt Water or Fresh Water?
An Origin of Life in Salt Water or Fresh Water?An Origin of Life in Salt Water or Fresh Water?
An Origin of Life in Salt Water or Fresh Water?
 
A Ministry of Design!
A Ministry of Design!A Ministry of Design!
A Ministry of Design!
 
Solar space heating and cooling
Solar space heating and coolingSolar space heating and cooling
Solar space heating and cooling
 
Interior design seminar presentation
Interior design seminar presentationInterior design seminar presentation
Interior design seminar presentation
 

Similar to Building a secure cyberspace for innovative enterprise, a collective responsibility

Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
Triveni Prabaakar
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
PrinceBanton1
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
PrinceBanton1
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Quick Heal Technologies Ltd.
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
Ayodeji Rotibi
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
211 Check
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
SPMTPCAMPUS
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
imen Tekaya Bouaziz
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
Simon Aderinlola
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
CRO Cyber Rights Organization
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
SPMTPCAMPUS
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
Aarush59
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
Iulia Porneala
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
VaishnaviPalkar
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
PREMTRIVEDI5
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
javed75
 

Similar to Building a secure cyberspace for innovative enterprise, a collective responsibility (20)

Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
 

More from Kayode Yussuf

How creative commons promotes open data at open data day 2017 lagos by kayode...
How creative commons promotes open data at open data day 2017 lagos by kayode...How creative commons promotes open data at open data day 2017 lagos by kayode...
How creative commons promotes open data at open data day 2017 lagos by kayode...
Kayode Yussuf
 
Building innovation through trust
Building innovation through trustBuilding innovation through trust
Building innovation through trust
Kayode Yussuf
 
Getting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyGetting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons story
Kayode Yussuf
 
Creative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekCreative commons and science education for audax computer science week
Creative commons and science education for audax computer science week
Kayode Yussuf
 
How to licencse cc by kayode yussuf
How to licencse cc by kayode yussufHow to licencse cc by kayode yussuf
How to licencse cc by kayode yussuf
Kayode Yussuf
 
Safe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufSafe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussuf
Kayode Yussuf
 
Safe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufSafe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussuf
Kayode Yussuf
 
Creative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekCreative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekKayode Yussuf
 
Building the creative commons community in nigeria
Building the creative commons community in nigeriaBuilding the creative commons community in nigeria
Building the creative commons community in nigeria
Kayode Yussuf
 
Creative commons nigeria kayode
Creative commons nigeria kayodeCreative commons nigeria kayode
Creative commons nigeria kayodeKayode Yussuf
 
Getting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyGetting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons story
Kayode Yussuf
 

More from Kayode Yussuf (11)

How creative commons promotes open data at open data day 2017 lagos by kayode...
How creative commons promotes open data at open data day 2017 lagos by kayode...How creative commons promotes open data at open data day 2017 lagos by kayode...
How creative commons promotes open data at open data day 2017 lagos by kayode...
 
Building innovation through trust
Building innovation through trustBuilding innovation through trust
Building innovation through trust
 
Getting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyGetting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons story
 
Creative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekCreative commons and science education for audax computer science week
Creative commons and science education for audax computer science week
 
How to licencse cc by kayode yussuf
How to licencse cc by kayode yussufHow to licencse cc by kayode yussuf
How to licencse cc by kayode yussuf
 
Safe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufSafe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussuf
 
Safe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufSafe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussuf
 
Creative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekCreative commons and science education for audax computer science week
Creative commons and science education for audax computer science week
 
Building the creative commons community in nigeria
Building the creative commons community in nigeriaBuilding the creative commons community in nigeria
Building the creative commons community in nigeria
 
Creative commons nigeria kayode
Creative commons nigeria kayodeCreative commons nigeria kayode
Creative commons nigeria kayode
 
Getting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyGetting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons story
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Building a secure cyberspace for innovative enterprise, a collective responsibility

  • 1. Building A Secure Cyberspace for Innovative Enterprise: A Collective Responsibility Secure Africa Conference 2013 Centre For Management Development , Lagos Kayode Yussuf | CyberSecurity Advocate
  • 2. ’Start by doing what is necessary, then what is possible and suddenly, you’re doing the impossible.’ Saint Francis of Assisi
  • 3. Some Hard Facts • The world today is reliant on the internet, British businesses earn £1 in every £5 from the internet – www.gov.uk • We expect govt and our institutions to protect us from online security breaches • Over 600 million phishing attacks per annum – www.go-golf.com • Cybercrime is costing the world $110 billion every year - Symantec Corp
  • 4. Whose responsibility is it to secure our Cyberspace? Find X? Government Professional Associations X Individuals Private Sector
  • 5. Cybersecurity is a shared responsibility, and each of us has a role to play. Emerging cyber threats require the engagement of the entire society—from government and law enforcement to the private sector and most importantly, members of the public. • Janet Napolitano Former Secretary, Department of Homeland Security
  • 6. Building A Secure Cyberspace for Innovative Enterprise
  • 7. Strengthening The Cyber Ecosystem In Nigeria, How?
  • 8. Build Collaborative Communities ‘Law enforcement agencies are often “reluctant to use new techniques, and don’t always maximize current technology. Criminals, however, are certainly maximizing the benefits of technology in their wrongdoing.’ • Noboru Nakatani, Executive Director INTERPOL’s Global Complex for Innovation.
  • 9. Next Steps • Favorable policies and legislation ( Nigeria’s Cyber-security law and Creative Commons licensing for Education) • Mass enlightenment • Immediate creation and support of a CERT • Law enforcement agencies must work together • Inter-nation collaborations • Citizens participation through volunteering
  • 10. Next Steps Cont’d • Empower Individuals and Organizations to Operate Securely • Build Collaborative Communities with CSO and professional bodies to serve as lobbyists • Cyber-Competitions sponsored by private organizations & government • PPP in research & development in CyberSecurity
  • 11. What is expected of the Public? Be cyber-security conscious Make information available Get involved in community projects Enlightening people around you
  • 12. What is expected of the Public? • • • • • • • • • • Secure your devices, PCs and online accounts Never click on links in emails Never open the attachments unless you are sure of its source Do not give out personal information over the phone or in an email unless completely sure Set secure passwords and don't share them with anyone. Keep your operating system, browser, anti-virus and other critical software up to date. Verify the authenticity of requests from companies or individuals by contacting them directly. For e-Mail, turn off the option to automatically download attachments. Be suspicious of unknown links or requests sent through email or text message Pay close attention to website URLs.
  • 13. What I do to enlightening people • Personal enlightenment amongst friends • Speaking at conferences and seminars • Organizing trainings • Organizing conferences…. NGSECURE
  • 14. If each one can reach one, then each one can teach one what a beautiful nation Nigeria can be….. Chaz B, OAP and Producer of Sharing Life Issues with Chaz B
  • 15. If each one can reach one, then each one can teach one what a beautiful & safe world we can live in….. Kayode Yussuf’s remixed
  • 16. Thank you for listening, we hope you join us secure Nigeria Kayode Yussuf +234-8029730059 kayusyussuf@yahoo.com @k_whybaba