[kictanet] IG Discussion 2009, Day 9 of 10 - National Cybersecurity strategies

Michuki Mwangi michuki at swiftkenya.com
Mon May 11 10:51:22 EAT 2009


Hi All,

Coming into this very very late.

Security will remain what a colleague of mine refers to as "broccoli
technology" basically its good (healthy for you) but we dont necessarily
like the taste of it.

The only time we get to eat broccoli is when the doctor orders.

As such until when data & information forms the lifeline of our
businesses shall we look at security more seriously.

Regards,

Michuki.

Catherine Adeya wrote:
> Walu,
> 
> Sorry I am coming in at the tail end...but is the question here an issue of we cannot do it? or we do not want to do it? or we cannot justify prioritizing doing it?
> 
> Nyaki
> 
> 
> 
> 
> ________________________________
> From: John Walubengo <jwalu at yahoo.com>
> To: elizaslider at yahoo.com
> Cc: KICTAnet ICT Policy Discussions <kictanet at lists.kictanet.or.ke>
> Sent: Thursday, May 7, 2009 1:57:26 PM
> Subject: Re: [kictanet] IG Discussion 2009, Day 9 of 10 - National Cybersecurity  strategies
> 
> 
> Emergency Response Teams? - for Computer or other disasters? Very difficult concept for Kenyans.  We live in a culture that thrives on crisis-management...I bet 99.9% of Kenyan graduates submitted their final projects - or +2hr before and after the deadline. 
> 
> Its a culture that must be overcome if we shall ever setup a computer emergency response team.
> 
> walu.
> nb: but maybe we could learn from the medical practitioners, they seem to respond better to swine, chicken and other emerging cocktails of flu.
> 
> --- On Thu, 5/7/09, mwende njiraini <mwende.njiraini at gmail.com> wrote:
> 
>> From: mwende njiraini <mwende.njiraini at gmail.com>
>> Subject: Re: [kictanet] IG Discussion 2009, Day 9 of 10 - National Cybersecurity  strategies
>> To: jwalu at yahoo.com
>> Cc: "KICTAnet ICT Policy Discussions" <kictanet at lists.kictanet.or.ke>
>> Date: Thursday, May 7, 2009, 10:36 AM
>> Morning,
>>
>> Reference to email below - you may wish to make reference
>> to the following
>> additional resources
>>
>>    - One more CERT in Africa: Mauritius Gets Computer
>> Emergency Response
>>    Team -
>>  
>> http://www.pcworld.com/businesscenter/article/146123/mauritius_gets_computer_emergency_response_team.html
>>    - CERT is located at Carnegie Mellon University,
>> involved in Internet
>>    security vunerabilities, long term network changes
>> research:
>>    http://www.cert.org/
>>    - Team Cymru is a specialized Internet security research
>> firm :
>>    http://www.team-cymru.org/
>>    - FIRST is the global Forum for Incident Response and
>> Security Teams:
>>    http://www.first.org/
>>
>> Kind regards
>> Mwende
>> Please note the change in the subject line today is IG
>> Discussion 2009,*Day
>> 9 of 10 *
>>
>> *Disclaimer: Views expressed here (except those quoted or
>> referenced) are
>> the author’s own*
>>
>>
>> On 5/7/09, mwende njiraini
>> <mwende.njiraini at gmail.com> wrote:
>>
>>> Good morning,
>>>
>>>
>>>
>>> Today we have the opportunity of discussing the last
>> aspect of
>>> cybersecurity: Computer Security Incident Response
>> Teams (CSIRTs)/Computer
>>> Emergency Response Teams (CERT). CSIRTs/CERTs are
>> responsible for preparing
>>> for, detecting, managing and responding to
>> cybersecurity incidents as well
>>> as creating consumer awareness.
>>>
>>>
>>>
>>> Global cybersecurity is said to be ‘as strong as the
>> weakest link’.  Developing
>>> countries particularly in Africa have not sufficiently
>> addressed
>>> cybersecurity issues.  While some countries have
>> initiated efforts to
>>> develop cybersecurity capabilities through the
>> establishment of National
>>> CSIRTs/CERTs, the CERT-TCC in Tunisia is the only
>> active national CERT in
>>> Africa (http://www.ansi.tn/en/about_cert-tcc.htm).
>>>
>>>
>>>
>>> In establishing a National CERT/CSIRT…
>>>
>>>    - What structure could be adopted?
>>>    - What services should be offered?
>>>    - What elements could be considered to establish
>> trust in this
>>>    institution thereby encouraging organizations with
>> critical information
>>>    infrastructure (CII) such as government agencies,
>> banks, educational
>>>    institutions, water and power companies, etc, to
>> share of cybersecurity
>>>    incidents?
>>>
>>>
>>>
>>> Kind regards
>>>
>>> Mwende
>>>
>>> *Disclaimer: Views expressed here (except those quoted
>> or referenced) are
>>> the author’s own*
>>>
>> _______________________________________________
>> kictanet mailing list
>> kictanet at lists.kictanet.or.ke
>> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
>>
>> This message was sent to: jwalu at yahoo.com
>> Unsubscribe or change your options at
>> http://lists.kictanet.or.ke/mailman/options/kictanet/jwalu%40yahoo.com
> 
> 
>       
> 
> _______________________________________________
> kictanet mailing list
> kictanet at lists.kictanet.or.ke
> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
> 
> This message was sent to: elizaslider at yahoo.com
> Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/elizaslider%40yahoo.com
> 
> 
> 
>       
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> kictanet mailing list
> kictanet at lists.kictanet.or.ke
> http://lists.kictanet.or.ke/mailman/listinfo/kictanet
> 
> This message was sent to: michuki at swiftkenya.com
> Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/michuki%40swiftkenya.com




More information about the KICTANet mailing list