SlideShare a Scribd company logo
Building National Capacity for
Cybersecurity Assurance
By Marcel Ambiana Belingue, Senior Manager, Programmes, CTO
Presented at the 2013 Cybersecurity Forum
25 - 26 April 2013, Yaounde, Cameroon
1
Overview
1 About CTO
2 Cyber Risk Management in National ICT Policy Development
3 Cybersecurity as a Business Continuity Strategy
4 PDT – A Capacity Building Programme for Cybersecurity
2
About CTO
Vision:
To be the preferred partner organisation for governments, the
private sector and civil society in delivering effective ICTs for
development (ICT4D) in the Commonwealth and beyond.
Our Mission:
To promote, facilitate and guide members in using ICTs to deliver
effective development interventions.
Strategic Focus
Youth and ICTs | Regulatory environments | Skills development
ICTs and disabilities | Cybersecurity | Mobile broadband
3
Cyber Risk Management in National ICT Policy
Development
4
Source: iDA, Singapore
Cyber Risk Management in National ICT Policy
Development
Singapore’s iGov2010 (2006-2010)
 Vision: To be an integrated government that delights customers and
connects citizens through ICTs
 Driven by strategic thrusts, including Singapore’s competitiveness
 Security and partnerships among the key enablers
 Stated targets e.g. 8 out 10 users being “very satisfied” with the
quality of govenment e-services
 Part of a long-term vision, strategies, goals and policies
e-Government strategies play a key role in setting standards in
establishing a safe cyber space.
5
Cyber Risk Management in National ICT Policy
Development
Singapore’s
 iDA (planning, policy development, regulation, industry
development)
 iN2015 – An Intelligent Nation, a Global City
 Become #1 in the World in using ICTs to add value to the economy
 Sectoral transformation of key economic sectors; ultra-high speed,
pervasive, intelligent and trusted communication infrastructure; ICT-
savvy and globally competitive workforce
 National Trust Framework built on Indentity, Privacy, and
Security
 Key economic sectors: Financial services, Tourism, hospitality &
retail, government, manufacturing & logistics, education, etc
6
Cybersecurity as a Business Continuity Strategy
 Think information security
 Ensure resilience in processes and systems
 Adopt coping mechanisms
 Encourage shifts in attitudes and committment
 Undertake business impact assessments & security audits
 Have known and understood continuity plans
 ... etc
7
PDT – A Capacity Building Programme for
Cybersecurity
Some background facts
 Created in 1985
 Part of CTO membership until 2003
 Over 110 programmes delivered since 2010
 Over 36,000 ICT professionals trained since its creation
 Reaching out to meembers in 31 countries
PDT’s vision
“To be the preferred partnership for the delivery of cost-effective
access to ICT knowledge for human capital development.”
8
PDT – A Capacity Building Programme for
Cybersecurity
PDT key benefits
 in-house bespoke training and consulting programmes funded by
CTO and developed to meet member-specific strategic and
operational needs
 priority and sponsored access to regional and international training
programmes
 access to international expertise and exposure to the latest industry
best practice
 opportunities for benchmarking and long-term partnerships
 priority registration for other CTO programmes.
9
PDT – A Capacity Building Programme for
Cybersecurity
Who is the PDT for?
 Government ICT ministries
 Communications regulatory agencies
 Network operators and service providers
 Manufacturers
 Professional services firms
10
Caribb.
12%
W. Africa
21%
Pacific
13%
Asia
9%
ES Africa
45%
Policy
10%
Regulatio
n
14%
Technolo
gy
56%
Managem
ent
20%
PDT – A Capacity Building Programme for
Cybersecurity
Programme Funding
 Membership
 Requesting partners’ membership contributions: 70%
 Supplying partners’ membersip contributions: 13%
 Programme’s commercialisation
 Local partner’s contribution 10%
 Delegates fees 7%
11
PDT – A Capacity Building Programme for
Cybersecurity
Programme Development – September to March
12
Training
Requirements
Processed
Requirements
Agregated
Requirements
Open/Regional
Programme
Bilateral
Programme
Recommended
Programme
Evaluation
Approved
Programme
Supplier Proposals
Requests for
Proposals
Implemented
Programme
Projects
Marketing
Plans
Costed
Proposals
Supplier
Invitations

More Related Content

What's hot

CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Iad 2014 summit review
Iad 2014 summit reviewIad 2014 summit review
Iad 2014 summit review
Adrian Hall
 
CTO Annual Report 2009-10
CTO Annual Report 2009-10CTO Annual Report 2009-10
CTO Annual Report 2009-10segughana
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCE
Rudy Shoushany
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
neXt Curve The Great Gap: Digital Leadership & Governance
neXt Curve The Great Gap: Digital Leadership & GovernanceneXt Curve The Great Gap: Digital Leadership & Governance
neXt Curve The Great Gap: Digital Leadership & Governance
Leonard Lee
 
ICT Association Suriname at Virtual Educa Caribbean 2012
ICT Association Suriname at Virtual Educa Caribbean 2012ICT Association Suriname at Virtual Educa Caribbean 2012
ICT Association Suriname at Virtual Educa Caribbean 2012
Cyril Soeri
 
Darmanin Emanuel
Darmanin EmanuelDarmanin Emanuel
Darmanin EmanuelTecnimap
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
Knowledge Group
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
accenture
 
Helping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldHelping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital World
Good Things Foundation
 
iTaNGO project information session slides
iTaNGO project information session slidesiTaNGO project information session slides
iTaNGO project information session slides
iTaNGOproject
 
iTaNGO Information Session slides
iTaNGO Information Session slidesiTaNGO Information Session slides
iTaNGO Information Session slidesiTaNGOproject
 
Technology Readiness and Innovation in the field of business and security
Technology Readiness and Innovation in the field of business and securityTechnology Readiness and Innovation in the field of business and security
Technology Readiness and Innovation in the field of business and security
Elias Aravantinos,[LION]
 

What's hot (15)

CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Iad 2014 summit review
Iad 2014 summit reviewIad 2014 summit review
Iad 2014 summit review
 
CTO Annual Report 2009-10
CTO Annual Report 2009-10CTO Annual Report 2009-10
CTO Annual Report 2009-10
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCE
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
Security Culture
Security CultureSecurity Culture
Security Culture
 
neXt Curve The Great Gap: Digital Leadership & Governance
neXt Curve The Great Gap: Digital Leadership & GovernanceneXt Curve The Great Gap: Digital Leadership & Governance
neXt Curve The Great Gap: Digital Leadership & Governance
 
ICT Association Suriname at Virtual Educa Caribbean 2012
ICT Association Suriname at Virtual Educa Caribbean 2012ICT Association Suriname at Virtual Educa Caribbean 2012
ICT Association Suriname at Virtual Educa Caribbean 2012
 
Darmanin Emanuel
Darmanin EmanuelDarmanin Emanuel
Darmanin Emanuel
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
Helping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldHelping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital World
 
iTaNGO project information session slides
iTaNGO project information session slidesiTaNGO project information session slides
iTaNGO project information session slides
 
iTaNGO Information Session slides
iTaNGO Information Session slidesiTaNGO Information Session slides
iTaNGO Information Session slides
 
Technology Readiness and Innovation in the field of business and security
Technology Readiness and Innovation in the field of business and securityTechnology Readiness and Innovation in the field of business and security
Technology Readiness and Innovation in the field of business and security
 

Viewers also liked

Stake holder map
Stake holder mapStake holder map
Stake holder map
Tarun bhatt
 
PRESENTATION ON STAKE HOLDERS MAP OF BUSINESS
PRESENTATION ON STAKE  HOLDERS MAP OF BUSINESSPRESENTATION ON STAKE  HOLDERS MAP OF BUSINESS
PRESENTATION ON STAKE HOLDERS MAP OF BUSINESS
sai kumar chintha
 
Role of Government in Indian Business Environment
Role of Government in Indian Business Environment Role of Government in Indian Business Environment
Role of Government in Indian Business Environment
Manjunath Motupalli
 
Issues in Corporate Governance
Issues in Corporate GovernanceIssues in Corporate Governance
Issues in Corporate Governance
Language Explore
 
Issues of corporate governance presented by Dushyant Maheshwari
Issues of corporate governance presented by Dushyant MaheshwariIssues of corporate governance presented by Dushyant Maheshwari
Issues of corporate governance presented by Dushyant MaheshwariDUSHYANT MAHESHWARI
 
Economic role of government in Indian Business
Economic role of government in Indian BusinessEconomic role of government in Indian Business
Economic role of government in Indian BusinessGeorge V James
 
Stakeholder Mapping
Stakeholder MappingStakeholder Mapping
Stakeholder Mapping
Anand Subramaniam
 
Internal and external business environment
Internal and external business environmentInternal and external business environment
Internal and external business environmentAashish Sahi
 

Viewers also liked (8)

Stake holder map
Stake holder mapStake holder map
Stake holder map
 
PRESENTATION ON STAKE HOLDERS MAP OF BUSINESS
PRESENTATION ON STAKE  HOLDERS MAP OF BUSINESSPRESENTATION ON STAKE  HOLDERS MAP OF BUSINESS
PRESENTATION ON STAKE HOLDERS MAP OF BUSINESS
 
Role of Government in Indian Business Environment
Role of Government in Indian Business Environment Role of Government in Indian Business Environment
Role of Government in Indian Business Environment
 
Issues in Corporate Governance
Issues in Corporate GovernanceIssues in Corporate Governance
Issues in Corporate Governance
 
Issues of corporate governance presented by Dushyant Maheshwari
Issues of corporate governance presented by Dushyant MaheshwariIssues of corporate governance presented by Dushyant Maheshwari
Issues of corporate governance presented by Dushyant Maheshwari
 
Economic role of government in Indian Business
Economic role of government in Indian BusinessEconomic role of government in Indian Business
Economic role of government in Indian Business
 
Stakeholder Mapping
Stakeholder MappingStakeholder Mapping
Stakeholder Mapping
 
Internal and external business environment
Internal and external business environmentInternal and external business environment
Internal and external business environment
 

Similar to CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue

John Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public SectorJohn Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public Sector
itnewsafrica
 
Programme for ICT Development and Training
Programme for ICT Development and TrainingProgramme for ICT Development and Training
Programme for ICT Development and Training
Hilda Muchando
 
CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010segughana
 
E-Government and E-Health Strategies by Mrs. Veronica Boateng
E-Government and E-Health Strategies by Mrs. Veronica BoatengE-Government and E-Health Strategies by Mrs. Veronica Boateng
E-Government and E-Health Strategies by Mrs. Veronica Boateng
Francisco J Grajales III
 
How young people are engaging with ict in the commonwealth
How young people are engaging with ict in the commonwealthHow young people are engaging with ict in the commonwealth
How young people are engaging with ict in the commonwealth
Commonwealth Telecommunications Organisation
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
Chintan Pathak
 
National Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdfNational Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdf
sri_ias
 
Qatar's NIA Policy Program
Qatar's NIA Policy ProgramQatar's NIA Policy Program
Qatar's NIA Policy ProgramSamir Pawaskar
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
Malaysia University of Science and Technology (MUST)
 
Roles and Challenges for Government CIOs
Roles and Challenges for Government CIOsRoles and Challenges for Government CIOs
Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...
Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...
Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...
The Digital Insurer
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docx
falknoor56
 
TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governanceguestea68b0
 
Ramping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for DevelopmentRamping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for Development
Olivier Serrat
 
From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...
From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...
From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...
accacloud
 
Sata Presentation Jc
Sata Presentation   JcSata Presentation   Jc
GICT Training & Certification
GICT Training & CertificationGICT Training & Certification
GICT Training & Certification
ITEC
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
Benjamin Ang
 
Digital-Trust-Whitepaper
Digital-Trust-WhitepaperDigital-Trust-Whitepaper
Digital-Trust-Whitepaper
digitalinasia
 

Similar to CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue (20)

John Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public SectorJohn Bosco Arends- Emerging Threats Against Public Sector
John Bosco Arends- Emerging Threats Against Public Sector
 
Prof. Barya Keynote address
Prof. Barya  Keynote addressProf. Barya  Keynote address
Prof. Barya Keynote address
 
Programme for ICT Development and Training
Programme for ICT Development and TrainingProgramme for ICT Development and Training
Programme for ICT Development and Training
 
CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010
 
E-Government and E-Health Strategies by Mrs. Veronica Boateng
E-Government and E-Health Strategies by Mrs. Veronica BoatengE-Government and E-Health Strategies by Mrs. Veronica Boateng
E-Government and E-Health Strategies by Mrs. Veronica Boateng
 
How young people are engaging with ict in the commonwealth
How young people are engaging with ict in the commonwealthHow young people are engaging with ict in the commonwealth
How young people are engaging with ict in the commonwealth
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
National Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdfNational Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdf
 
Qatar's NIA Policy Program
Qatar's NIA Policy ProgramQatar's NIA Policy Program
Qatar's NIA Policy Program
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
 
Roles and Challenges for Government CIOs
Roles and Challenges for Government CIOsRoles and Challenges for Government CIOs
Roles and Challenges for Government CIOs
 
Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...
Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...
Webinar : TDI TechMap23 - Exploring the latest tech trends and their impact o...
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docx
 
TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governance
 
Ramping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for DevelopmentRamping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for Development
 
From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...
From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...
From Vision to Procurement: Principles for Adopting Cloud Computing in the Pu...
 
Sata Presentation Jc
Sata Presentation   JcSata Presentation   Jc
Sata Presentation Jc
 
GICT Training & Certification
GICT Training & CertificationGICT Training & Certification
GICT Training & Certification
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
Digital-Trust-Whitepaper
Digital-Trust-WhitepaperDigital-Trust-Whitepaper
Digital-Trust-Whitepaper
 

More from Commonwealth Telecommunications Organisation

Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Telecommunications Organisation
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Telecommunications Organisation
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
We learn it agenda
We learn it agendaWe learn it agenda
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
Commonwealth Telecommunications Organisation
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
Commonwealth Telecommunications Organisation
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3

More from Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 

CTO Cybersecurity Forum 2013 Marcel Ambiana Belingue

  • 1. Building National Capacity for Cybersecurity Assurance By Marcel Ambiana Belingue, Senior Manager, Programmes, CTO Presented at the 2013 Cybersecurity Forum 25 - 26 April 2013, Yaounde, Cameroon 1
  • 2. Overview 1 About CTO 2 Cyber Risk Management in National ICT Policy Development 3 Cybersecurity as a Business Continuity Strategy 4 PDT – A Capacity Building Programme for Cybersecurity 2
  • 3. About CTO Vision: To be the preferred partner organisation for governments, the private sector and civil society in delivering effective ICTs for development (ICT4D) in the Commonwealth and beyond. Our Mission: To promote, facilitate and guide members in using ICTs to deliver effective development interventions. Strategic Focus Youth and ICTs | Regulatory environments | Skills development ICTs and disabilities | Cybersecurity | Mobile broadband 3
  • 4. Cyber Risk Management in National ICT Policy Development 4 Source: iDA, Singapore
  • 5. Cyber Risk Management in National ICT Policy Development Singapore’s iGov2010 (2006-2010)  Vision: To be an integrated government that delights customers and connects citizens through ICTs  Driven by strategic thrusts, including Singapore’s competitiveness  Security and partnerships among the key enablers  Stated targets e.g. 8 out 10 users being “very satisfied” with the quality of govenment e-services  Part of a long-term vision, strategies, goals and policies e-Government strategies play a key role in setting standards in establishing a safe cyber space. 5
  • 6. Cyber Risk Management in National ICT Policy Development Singapore’s  iDA (planning, policy development, regulation, industry development)  iN2015 – An Intelligent Nation, a Global City  Become #1 in the World in using ICTs to add value to the economy  Sectoral transformation of key economic sectors; ultra-high speed, pervasive, intelligent and trusted communication infrastructure; ICT- savvy and globally competitive workforce  National Trust Framework built on Indentity, Privacy, and Security  Key economic sectors: Financial services, Tourism, hospitality & retail, government, manufacturing & logistics, education, etc 6
  • 7. Cybersecurity as a Business Continuity Strategy  Think information security  Ensure resilience in processes and systems  Adopt coping mechanisms  Encourage shifts in attitudes and committment  Undertake business impact assessments & security audits  Have known and understood continuity plans  ... etc 7
  • 8. PDT – A Capacity Building Programme for Cybersecurity Some background facts  Created in 1985  Part of CTO membership until 2003  Over 110 programmes delivered since 2010  Over 36,000 ICT professionals trained since its creation  Reaching out to meembers in 31 countries PDT’s vision “To be the preferred partnership for the delivery of cost-effective access to ICT knowledge for human capital development.” 8
  • 9. PDT – A Capacity Building Programme for Cybersecurity PDT key benefits  in-house bespoke training and consulting programmes funded by CTO and developed to meet member-specific strategic and operational needs  priority and sponsored access to regional and international training programmes  access to international expertise and exposure to the latest industry best practice  opportunities for benchmarking and long-term partnerships  priority registration for other CTO programmes. 9
  • 10. PDT – A Capacity Building Programme for Cybersecurity Who is the PDT for?  Government ICT ministries  Communications regulatory agencies  Network operators and service providers  Manufacturers  Professional services firms 10 Caribb. 12% W. Africa 21% Pacific 13% Asia 9% ES Africa 45% Policy 10% Regulatio n 14% Technolo gy 56% Managem ent 20%
  • 11. PDT – A Capacity Building Programme for Cybersecurity Programme Funding  Membership  Requesting partners’ membership contributions: 70%  Supplying partners’ membersip contributions: 13%  Programme’s commercialisation  Local partner’s contribution 10%  Delegates fees 7% 11
  • 12. PDT – A Capacity Building Programme for Cybersecurity Programme Development – September to March 12 Training Requirements Processed Requirements Agregated Requirements Open/Regional Programme Bilateral Programme Recommended Programme Evaluation Approved Programme Supplier Proposals Requests for Proposals Implemented Programme Projects Marketing Plans Costed Proposals Supplier Invitations