SlideShare a Scribd company logo
Practical & Proactive Approach to
Combating Cyber Crimes.
Starring:
Chinatu Uzuegbu
CCISO, CISSP, CISM, CISA, CEH, ……
Cyber Security Consultant, RoseTech.
CyberACON21
Chinatu Uzuegbu
❖ Managing Cyber Security Consultant, RoseTech.
❖ Founding Past President, (ISC)2 Nigeria Chapter.
❖ Member, Global (ISC)2 Chapter Advisory Committee(CAC).
❖ Member, VigiTrust Advisory Board, Ireland.
❖ Mentor, Open Cyber Security Mentorship Program(OCMP), AfrHackton
and Cyber in Africa Initiative.
❖ Global Ambassador, WomenTech Network
❖ Finalist, Top 50 Women in Cybersecurity, Africa, 2020
❖ Alumni, London Graduate School in Collaboration with CommonWealth
University- Dubai Leadership Summit. 2020
❖ Alumni, University of Liverpool- MSc. Information Systems Management
❖ Alumni, University of Port Harcourt-BSc. Computer science & Maths.
❖ Over 15 years Wealth of experience in IT and 10 years in Information
Security with FIs, Manufacturing and Computer Firms.
❖ Professionally:CCISO, CISSP, CISM, CISA, CEH and other related IT
Certifications.
❖ Professional Membership: (ISC)2, ISACA, EC-COUNCIL, CSEAN.
❖ Participated and Attended both International and Local Conferences.
❖ Aside Profession, inclined to Learning New Things, Reading, Cooking and
Adventures.
❖ Open to Cyber Security Related Services.
Preamble
Crime
Cyber
Cyber
Security
Proactive & Practical Approach to Combating Cyber Crimes:
Cyber
Crimes
The thieves are in
White Collar
Suits!
Life is a war
zone!
Concept of the
CIA Triad
❖ Identify
❖ Classify
❖ Determine
❖ Protect
❖ Monitor
Concept of The
Cybernetics
Crime
Life indeed is a War Zone
Any unruly behaviour that is punishable by
Law:
Against Morality
Against Persons
White-Collar
Organized Crime
Against Property
Hate/Malicious
Cyber
The Concept of The Cybernetics
❖ Coined out from the word Cybernetics.
❖ Cybernetics is the study of Medical Science, Biological Science,
Applied Science, Natural Science, Engineering, Electronic devices,
Data, Information, Artificial Intelligence, Machine Learning ,
Infrastructures, Computers, Laptops, Technology,
Communications, and other related systems with the aim of
promoting good governance and Control around the
inter-connectivity and interoperability of these elements-The
Cybernetic Elements.
❖ Cybernetics is derived from the Greek word Kybernetes meaning a
Person in Control, more like a Man on the Steering for a long drive.
Cyber Crime
The Thieves are now in White-Collar
❖ As earlier defined, a Crime is any unruly behaviour
that is punishable by Law.
❖ A Cyber Crime could be defined as any unruly or
unauthorised or malicious act that could lead to
undue Disclosure, Modification, Destruction or
theft of Critical Information Assets while working
on The Cybernetic Elements.
❖ The Cyber Criminals mostly leverage on a Common
ground to trigger-The Internet World Wide
Web(www).
The Prevalent Losses To Cyber Crimes
1. IBM 2021
Data
Breach
Report
10% $1.07m 11
Increase in
average total cost
of a breach,
2020-2021
$1.07m 11 Increase in average
total cost of a breach, 2020-2021
Cost difference where remote
work was a factor in causing the
breach
11 Increase in average
total cost of a breach,
2020-2021 Cost
difference where remote
work was a factor in
causing the breach
Consecutive years
healthcare had the
highest industry cost of a
breach
2. Nigeria has
recorded$6
trillion to Cyber
Crime in 10
years.
In2020, there was
global loss of $170
Billion and
$400Billion is
envisaged in 2027.
$200 billion loss
reported by
Nigerian banks
as at 2019
Other Prevalent Top Cyber Crimes
❖ Social Engineering Attacks
❖ Business Email Compromise
❖ Social Media
❖ Insiders
❖ Mobile Security Threats
❖ Ransomware
❖ Denial of Service
❖ Man-in-The Middle Attacks
❖ Others
Cyber Security
The Concept of The CIA Triad
❖ The Process or act of protecting your Cybernetic Elements from
Undue Disclosure, Modification and Destruction.
❖ The Process or act of protecting our Cybernetic Elements based on
the acceptable level of Confidentiality, Integrity and
Availability-The CIA Triad.
❖ The CIA Triad is generally seen as the philosophy of Cyber Security:
➢ Confidentiality- The act of protecting the Cybernetic
elements from unauthorised Disclosure
➢ Integrity- The act of protecting the Cybernetic elements from
unauthorised Modification.
➢ Availability- The act of protecting the Cybernetic Elements
from unauthorised Destruction.
The other
side of the
coin
D
i
s
c
l
o
s
u
r
e
D
e
s
t
r
u
c
t
i
o
n
Modification
The Philosophy of Cyber Security
The philosophy of Cyber Security can be
categorised into three Layers:
1. The Focused or Objective Layer- Achieving an
Acceptable level of: Confidentiality, Integrity and
Availability(CIA Triad).
2. The Three Control Types: Administrative,
Technical and Physical.
3. The Seven Security Measures, Safeguards or
Countermeasures: Preventive, Detective,
Deterrent, Corrective, Recovery, Compensative
and Directive.
CIA Triad
Admin Tech Physical
Prevent, Detect, Deter, Correct,
Recover, Compensate, Direct
Proactive & Practical Approach to Combating Cyber Crimes
https:/
/de.slideshare.net/Chinatu
Identification
M
o
n
i
t
o
r
P
r
o
te
c
ti
o
n
D
e
t
e
r
m
i
n
e
Classification
Combating
Cyber Crimes
Final Points
1. Your primary obligation is to support and
meet your Organisation’s Business goals
and Objectives.
2. You must understand the Business
Processes of your organisation.
3. You must embrace the concept of the CIA
Triad as your ultimate responsibility.
4. You must be able to categorise your
Business functions as they are applied into
Administrative, Technical and Physical.
5. You must understand when to apply the 7
measures of Control and be able to tie
each to the respective Control Types.
6. You must ensure that the cost of Control
Measures is not higher than the value of
Asset you are applying the control on.
7. You must embrace multi-layered security. You
cannot go wrong with Defense in depth.
8. You must ensure the culture of Security is
driven and supported from The Top
Management.
9. You must carry all stakeholders and the
Business Unit Heads along while assessing Risk.
10. You cannot go wrong with Frameworks,
Standards and Best Practices.
11. Carry your organisation along through
Awareness training and other Security initiatives.
12. Cyber Security is everyone’s Business, get
involved.
International Frameworks
and Standards
❖ https://www.iso.org/isoiec-27001-information-
security.html
❖ https://csrc.nist.gov/Projects/risk-management
/sp800-53-controls/
❖ https://www.pcisecuritystandards.org/pci_secu
rity/
❖ https://www2.ed.gov/policy/gen/guid/fpco/fer
pa/index.html
❖ https://www.cisa.gov/federal-information-secu
rity-modernization-act
❖ https://www.ftc.gov/tips-advice/business-cent
er/privacy-and-security/gramm-leach-bliley-act
❖ https://www.hhs.gov/hipaa/index.html
Nigerian Cyber Security
Frameworks and Initiatives
1. National CyberSecurity Policy and
Strategy-NCPS.
https://education.gov.ng/national-cybersec
urity-policy-and-strategy-2021/#1
2. Nigeria Data Protection Regulation-NDPR.
https://nitda.gov.ng/wp-content/uploads/20
21/01/NDPR-Implementation-Framework.p
df
3. Other Frameworks and Regulatory ACTs
from NCC, CBN and others.
The level of Protection you apply on
any Asset is determined by the Value
you place on the Asset.
“Together we can Combat Cyber Crimes”
Thanks!
Contact us:
RoseTech CyberCrime Solutions Ltd.
rosetechCyberSol@gmail.com
www.rtechccsl.com
+2348037815577
https://www.linkedin.com/in/chinatu-uzue
gbu-67593119/

More Related Content

What's hot

Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
Inderjeet Singh
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
Chinatu Uzuegbu
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
PECB
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
Matthew Rosenquist
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
APNIC
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
Jisc
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
Kroll
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
Community Protection Forum
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security Challenges
Jorge Sebastiao
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI Report
Benjamin Ang
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
Kroll
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
Wee Tang
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
Olivier Busolini
 

What's hot (20)

Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security Challenges
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI Report
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 

Similar to Combating cyber crimes chinatu

Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
Chinatu Uzuegbu
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
SharmilaMore5
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
The eCore Group
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
jasonuchiha2
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
mohitsrivastavabtech
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
DamaineFranklinMScBE
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
Dan Michaluk
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
Dawn Yankeelov
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
Chinatu Uzuegbu
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Joe Bartolo
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
Shiva Bissessar
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
You will be the required technical report; a ten-page single-spaced .docx
You will be the required technical report; a ten-page single-spaced .docxYou will be the required technical report; a ten-page single-spaced .docx
You will be the required technical report; a ten-page single-spaced .docx
taishao1
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Eric Vanderburg
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
techtutorus
 

Similar to Combating cyber crimes chinatu (20)

Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
You will be the required technical report; a ten-page single-spaced .docx
You will be the required technical report; a ten-page single-spaced .docxYou will be the required technical report; a ten-page single-spaced .docx
You will be the required technical report; a ten-page single-spaced .docx
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 

More from Chinatu Uzuegbu

Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdf
Chinatu Uzuegbu
 
Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdf
Chinatu Uzuegbu
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptx
Chinatu Uzuegbu
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
Chinatu Uzuegbu
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
Chinatu Uzuegbu
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
Chinatu Uzuegbu
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
Chinatu Uzuegbu
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
Chinatu Uzuegbu
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
Chinatu Uzuegbu
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
Chinatu Uzuegbu
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
Chinatu Uzuegbu
 

More from Chinatu Uzuegbu (15)

Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdf
 
Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdf
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptx
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Combating cyber crimes chinatu

  • 1. Practical & Proactive Approach to Combating Cyber Crimes. Starring: Chinatu Uzuegbu CCISO, CISSP, CISM, CISA, CEH, …… Cyber Security Consultant, RoseTech. CyberACON21
  • 2. Chinatu Uzuegbu ❖ Managing Cyber Security Consultant, RoseTech. ❖ Founding Past President, (ISC)2 Nigeria Chapter. ❖ Member, Global (ISC)2 Chapter Advisory Committee(CAC). ❖ Member, VigiTrust Advisory Board, Ireland. ❖ Mentor, Open Cyber Security Mentorship Program(OCMP), AfrHackton and Cyber in Africa Initiative. ❖ Global Ambassador, WomenTech Network ❖ Finalist, Top 50 Women in Cybersecurity, Africa, 2020 ❖ Alumni, London Graduate School in Collaboration with CommonWealth University- Dubai Leadership Summit. 2020 ❖ Alumni, University of Liverpool- MSc. Information Systems Management ❖ Alumni, University of Port Harcourt-BSc. Computer science & Maths. ❖ Over 15 years Wealth of experience in IT and 10 years in Information Security with FIs, Manufacturing and Computer Firms. ❖ Professionally:CCISO, CISSP, CISM, CISA, CEH and other related IT Certifications. ❖ Professional Membership: (ISC)2, ISACA, EC-COUNCIL, CSEAN. ❖ Participated and Attended both International and Local Conferences. ❖ Aside Profession, inclined to Learning New Things, Reading, Cooking and Adventures. ❖ Open to Cyber Security Related Services.
  • 3. Preamble Crime Cyber Cyber Security Proactive & Practical Approach to Combating Cyber Crimes: Cyber Crimes The thieves are in White Collar Suits! Life is a war zone! Concept of the CIA Triad ❖ Identify ❖ Classify ❖ Determine ❖ Protect ❖ Monitor Concept of The Cybernetics
  • 4. Crime Life indeed is a War Zone Any unruly behaviour that is punishable by Law: Against Morality Against Persons White-Collar Organized Crime Against Property Hate/Malicious
  • 5. Cyber The Concept of The Cybernetics ❖ Coined out from the word Cybernetics. ❖ Cybernetics is the study of Medical Science, Biological Science, Applied Science, Natural Science, Engineering, Electronic devices, Data, Information, Artificial Intelligence, Machine Learning , Infrastructures, Computers, Laptops, Technology, Communications, and other related systems with the aim of promoting good governance and Control around the inter-connectivity and interoperability of these elements-The Cybernetic Elements. ❖ Cybernetics is derived from the Greek word Kybernetes meaning a Person in Control, more like a Man on the Steering for a long drive.
  • 6. Cyber Crime The Thieves are now in White-Collar ❖ As earlier defined, a Crime is any unruly behaviour that is punishable by Law. ❖ A Cyber Crime could be defined as any unruly or unauthorised or malicious act that could lead to undue Disclosure, Modification, Destruction or theft of Critical Information Assets while working on The Cybernetic Elements. ❖ The Cyber Criminals mostly leverage on a Common ground to trigger-The Internet World Wide Web(www).
  • 7. The Prevalent Losses To Cyber Crimes 1. IBM 2021 Data Breach Report 10% $1.07m 11 Increase in average total cost of a breach, 2020-2021 $1.07m 11 Increase in average total cost of a breach, 2020-2021 Cost difference where remote work was a factor in causing the breach 11 Increase in average total cost of a breach, 2020-2021 Cost difference where remote work was a factor in causing the breach Consecutive years healthcare had the highest industry cost of a breach 2. Nigeria has recorded$6 trillion to Cyber Crime in 10 years. In2020, there was global loss of $170 Billion and $400Billion is envisaged in 2027. $200 billion loss reported by Nigerian banks as at 2019
  • 8.
  • 9. Other Prevalent Top Cyber Crimes ❖ Social Engineering Attacks ❖ Business Email Compromise ❖ Social Media ❖ Insiders ❖ Mobile Security Threats ❖ Ransomware ❖ Denial of Service ❖ Man-in-The Middle Attacks ❖ Others
  • 10. Cyber Security The Concept of The CIA Triad ❖ The Process or act of protecting your Cybernetic Elements from Undue Disclosure, Modification and Destruction. ❖ The Process or act of protecting our Cybernetic Elements based on the acceptable level of Confidentiality, Integrity and Availability-The CIA Triad. ❖ The CIA Triad is generally seen as the philosophy of Cyber Security: ➢ Confidentiality- The act of protecting the Cybernetic elements from unauthorised Disclosure ➢ Integrity- The act of protecting the Cybernetic elements from unauthorised Modification. ➢ Availability- The act of protecting the Cybernetic Elements from unauthorised Destruction. The other side of the coin D i s c l o s u r e D e s t r u c t i o n Modification
  • 11. The Philosophy of Cyber Security The philosophy of Cyber Security can be categorised into three Layers: 1. The Focused or Objective Layer- Achieving an Acceptable level of: Confidentiality, Integrity and Availability(CIA Triad). 2. The Three Control Types: Administrative, Technical and Physical. 3. The Seven Security Measures, Safeguards or Countermeasures: Preventive, Detective, Deterrent, Corrective, Recovery, Compensative and Directive. CIA Triad Admin Tech Physical Prevent, Detect, Deter, Correct, Recover, Compensate, Direct
  • 12. Proactive & Practical Approach to Combating Cyber Crimes https:/ /de.slideshare.net/Chinatu Identification M o n i t o r P r o te c ti o n D e t e r m i n e Classification Combating Cyber Crimes
  • 13. Final Points 1. Your primary obligation is to support and meet your Organisation’s Business goals and Objectives. 2. You must understand the Business Processes of your organisation. 3. You must embrace the concept of the CIA Triad as your ultimate responsibility. 4. You must be able to categorise your Business functions as they are applied into Administrative, Technical and Physical. 5. You must understand when to apply the 7 measures of Control and be able to tie each to the respective Control Types. 6. You must ensure that the cost of Control Measures is not higher than the value of Asset you are applying the control on. 7. You must embrace multi-layered security. You cannot go wrong with Defense in depth. 8. You must ensure the culture of Security is driven and supported from The Top Management. 9. You must carry all stakeholders and the Business Unit Heads along while assessing Risk. 10. You cannot go wrong with Frameworks, Standards and Best Practices. 11. Carry your organisation along through Awareness training and other Security initiatives. 12. Cyber Security is everyone’s Business, get involved.
  • 14. International Frameworks and Standards ❖ https://www.iso.org/isoiec-27001-information- security.html ❖ https://csrc.nist.gov/Projects/risk-management /sp800-53-controls/ ❖ https://www.pcisecuritystandards.org/pci_secu rity/ ❖ https://www2.ed.gov/policy/gen/guid/fpco/fer pa/index.html ❖ https://www.cisa.gov/federal-information-secu rity-modernization-act ❖ https://www.ftc.gov/tips-advice/business-cent er/privacy-and-security/gramm-leach-bliley-act ❖ https://www.hhs.gov/hipaa/index.html
  • 15. Nigerian Cyber Security Frameworks and Initiatives 1. National CyberSecurity Policy and Strategy-NCPS. https://education.gov.ng/national-cybersec urity-policy-and-strategy-2021/#1 2. Nigeria Data Protection Regulation-NDPR. https://nitda.gov.ng/wp-content/uploads/20 21/01/NDPR-Implementation-Framework.p df 3. Other Frameworks and Regulatory ACTs from NCC, CBN and others.
  • 16. The level of Protection you apply on any Asset is determined by the Value you place on the Asset.
  • 17. “Together we can Combat Cyber Crimes”
  • 18. Thanks! Contact us: RoseTech CyberCrime Solutions Ltd. rosetechCyberSol@gmail.com www.rtechccsl.com +2348037815577 https://www.linkedin.com/in/chinatu-uzue gbu-67593119/