09:00 - 10:30 | Session 4: Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach
Moderator: Esam Abulkhirat, Libya [ Biography ]
CIP is paying a bigger role than in the past on the management of critical services that most of the time are managed by the private sector. CIP must be an integral part of the National Cybersecurity Strategy and as such the engagement of the private sector and the other critical sectors in the country.
- National Critical Information Infrastructure Policy, Kiru Pillay, Department of Telecommunications and Postal Services, South Africa [ Biography | Presentation ]
- Critical Infrastructure Protection (CIP) as Example of a Multi-Stakeholder Approach, Christopher Ganizani Banda, Malawi [ Biography | Presentation ]
- Cybersecurity Strategy, Ali Murkid, Group Chief Information Security Officer, ECOBANK [ Biography | Presentation ]
- Enhancing the security of CIIPs in Europe -ENISA’s Approach, Serge Zongo [ Biography ] & Rouda Alamir Ali [ Biography ], BDT [ Presentation ]
Discussion |
10:30 - 10:45 |
Coffee Break |
10:45 - 12:30 | Session 5: National versus regional versus international
Moderator: Bertrand Kisito NGA, Cameroon [ Biography ]
A roundtable panel will be organized to understand what the impact is of a national strategy in the regional and international context? Is there a need to develop also an international strategy for a country?
- ITU-T CYBEX Standards for Cybersecurity Information Dissemination and Exchange, Martin Euchner, TSB [ Biography | Presentation ]
- Stratégie nationale de cybersécurité: impacts et défis régionaux et internationaux, Emmanuel Adjovi, L’Organisation internationale de la Francophonie (OIF) [ Biography | Abstract | Presentation ]
- African Union Perspectives on Cybersecurity and Cybercrime, Souhila Amazouz, African Union [ Biography | Abstract | Presentation ]
- Overview, Projects & Activities, Esam Abulkhirat, Organization of Islamic Cooperation Computer Emergency Response Team (OIC-CERT)
- COMESA Cybersecurity Program, Abu Sufian E Dafalla, COMESA [ Biography | Presentation ]
Discussion |
12:30 - 14:00 | Lunch Break |
14:00 - 15:30 | Session 6: CIRT: Requirements and implementation
Moderator: Abdelgadir Alsayed, Zain Sudan [ Biography ]
The objective of session 6 is to understand what the typical requirements are for building a Computer Incident Response Team (CIRT)? Which cybersecurity strategies are necessary for setting-up a CIRT? How can a CIRT be implemented in a country?
- BDT CIRT Programme, Serge V. Zongo, BDT [ Biography | Presentation ]
- The Importance of Cyber Threat Intelligence for CERTs, Almerindo Graziano, Silensec [ Biography ]
- Brief about National Computer Security and Incident Response Center (Rw-CSIRT), Charles Mugisha, Rwanda CSIRT [ Presentation ] remote
- CIRT: Requirements and Implementation, Muataz Elsadig, Sudan CERT [ Biography | Presentation ]
Discussion |
15:30 - 15:45 |
Coffee Break |
15:45 - 16:20 | Session 7: CIRT: Experiences and best practices
Moderator: Almerindo Graziano, Silensec
The objective of session 7 is to learn from experiences made in establishing and operating a Computer Incident Response Team (CIRT). Are there best practices which can be shared? How can CIRTs cooperate across country borders?
- NISSA in a Nutshell, Esam Abulkhirat, National Information Security & Safety Authority, NISSA, Libya [ Biography | Presentation ]
- Tunisian Experience in the National Cybersecurity, Nadhir Loghmari, Agence Nationale de la Sécurité Informatique Tunisie, Tunisia [ Biography | Presentation ]
- Eg-CERT Lessons Learned, Ahmed Mashaly, NTRA, Egypt [ Presentation ]
Discussion |
16:20-17:00 | Session 1 ( Continuation )
Moderator: Abusofian Dafalla, COMESA [ Biography ]
- Etat de lieux de la stratégie de la cyber sécurité au Cameroun, Bertrand Kisito Nga, République du Cameroun [ Biography | Abstract ]
- Stratégie relative à la Cyber Sécurité dans les Pays Africains, Jean Pierre Pongo Konga, République Démocratique du Congo [ Biography | Presentation ]
Discussion |