SlideShare une entreprise Scribd logo
1  sur  16
Building A Secure Cyberspace for
Innovative Enterprise:
A Collective Responsibility

Secure Africa Conference 2013
Centre For Management Development , Lagos

Kayode Yussuf

|

CyberSecurity Advocate
’Start by doing what is necessary,
then what is possible
and suddenly, you’re doing the impossible.’
Saint Francis of Assisi
Some Hard Facts
• The world today is reliant on the internet, British
businesses earn £1 in every £5 from the internet –
www.gov.uk

• We expect govt and our institutions to protect us
from online security breaches
• Over 600 million phishing attacks per annum –
www.go-golf.com
• Cybercrime is costing the world $110 billion every
year - Symantec Corp
Whose responsibility is it to secure our
Cyberspace?
Find X?
Government

Professional
Associations

X
Individuals

Private
Sector
Cybersecurity is a shared responsibility, and each of us
has a role to play. Emerging cyber threats require the
engagement of the entire society—from government
and law enforcement to the private sector and most
importantly, members of the public.
• Janet Napolitano
Former Secretary, Department of Homeland Security
Building A Secure Cyberspace for
Innovative Enterprise
Strengthening The Cyber Ecosystem In
Nigeria, How?
Build Collaborative Communities
‘Law enforcement agencies are often “reluctant to
use new techniques, and don’t always maximize
current technology. Criminals, however, are
certainly maximizing the benefits of technology in
their wrongdoing.’
• Noboru Nakatani,
Executive Director INTERPOL’s Global Complex for Innovation.
Next Steps
• Favorable policies and legislation ( Nigeria’s Cyber-security
law and Creative Commons licensing for Education)
• Mass enlightenment
• Immediate creation and support of a CERT
• Law enforcement agencies must work together
• Inter-nation collaborations
• Citizens participation through volunteering
Next Steps Cont’d
• Empower Individuals and Organizations to Operate
Securely
• Build Collaborative Communities with CSO and
professional bodies to serve as lobbyists
• Cyber-Competitions sponsored by private
organizations & government
• PPP in research & development in CyberSecurity
What is expected of the Public?
Be cyber-security conscious
Make information available
Get involved in community projects
Enlightening people around you
What is expected of the Public?
•
•
•
•

•
•
•
•
•
•

Secure your devices, PCs and online accounts
Never click on links in emails
Never open the attachments unless you are sure of its source
Do not give out personal information over the phone or in an
email unless completely sure
Set secure passwords and don't share them with anyone.
Keep your operating system, browser, anti-virus and other critical
software up to date.
Verify the authenticity of requests from companies or individuals
by contacting them directly.
For e-Mail, turn off the option to automatically download
attachments.
Be suspicious of unknown links or requests sent through email or
text message
Pay close attention to website URLs.
What I do to enlightening people
• Personal enlightenment amongst friends
• Speaking at conferences and seminars
• Organizing trainings

• Organizing conferences…. NGSECURE
If each one can reach one,
then each one can teach one
what a beautiful nation Nigeria can be…..
Chaz B,
OAP and Producer of Sharing Life Issues with Chaz B
If each one can reach one,
then each one can teach one
what a beautiful & safe world
we can live in…..
Kayode Yussuf’s remixed
Thank you for listening, we hope you
join us secure Nigeria

Kayode Yussuf
+234-8029730059
kayusyussuf@yahoo.com
@k_whybaba

Contenu connexe

Tendances

cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshHome
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthDababrata Mondal
 
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...Cédric Laurant
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescentsTreesa Lobo
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 

Tendances (20)

cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescents
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 

En vedette

Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...Bruce Damer
 
Building Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the InternetBuilding Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the Internetipspat
 
Economy, Politics & Culture in Cyberspace
Economy, Politics & Culture in CyberspaceEconomy, Politics & Culture in Cyberspace
Economy, Politics & Culture in CyberspaceOzgur Uckan
 
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)Bruce Damer
 
An Origin of Life in Salt Water or Fresh Water?
An Origin of Life in Salt Water or Fresh Water?An Origin of Life in Salt Water or Fresh Water?
An Origin of Life in Salt Water or Fresh Water?Bruce Damer
 
Solar space heating and cooling
Solar space heating and coolingSolar space heating and cooling
Solar space heating and coolingAniket Gavali
 
Interior design seminar presentation
Interior design seminar presentationInterior design seminar presentation
Interior design seminar presentationhighcraft
 

En vedette (8)

Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
 
Building Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the InternetBuilding Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the Internet
 
Economy, Politics & Culture in Cyberspace
Economy, Politics & Culture in CyberspaceEconomy, Politics & Culture in Cyberspace
Economy, Politics & Culture in Cyberspace
 
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
 
An Origin of Life in Salt Water or Fresh Water?
An Origin of Life in Salt Water or Fresh Water?An Origin of Life in Salt Water or Fresh Water?
An Origin of Life in Salt Water or Fresh Water?
 
A Ministry of Design!
A Ministry of Design!A Ministry of Design!
A Ministry of Design!
 
Solar space heating and cooling
Solar space heating and coolingSolar space heating and cooling
Solar space heating and cooling
 
Interior design seminar presentation
Interior design seminar presentationInterior design seminar presentation
Interior design seminar presentation
 

Similaire à Building a secure cyberspace for innovative enterprise, a collective responsibility

INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxTriveni Prabaakar
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentationPrinceBanton1
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentationPrinceBanton1
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation211 Check
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxSPMTPCAMPUS
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptxSPMTPCAMPUS
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxPREMTRIVEDI5
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxjaved75
 

Similaire à Building a secure cyberspace for innovative enterprise, a collective responsibility (20)

Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
 

Plus de Kayode Yussuf

How creative commons promotes open data at open data day 2017 lagos by kayode...
How creative commons promotes open data at open data day 2017 lagos by kayode...How creative commons promotes open data at open data day 2017 lagos by kayode...
How creative commons promotes open data at open data day 2017 lagos by kayode...Kayode Yussuf
 
Building innovation through trust
Building innovation through trustBuilding innovation through trust
Building innovation through trustKayode Yussuf
 
Getting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyGetting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyKayode Yussuf
 
Creative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekCreative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekKayode Yussuf
 
How to licencse cc by kayode yussuf
How to licencse cc by kayode yussufHow to licencse cc by kayode yussuf
How to licencse cc by kayode yussufKayode Yussuf
 
Safe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufSafe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufKayode Yussuf
 
Safe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufSafe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufKayode Yussuf
 
Creative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekCreative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekKayode Yussuf
 
Building the creative commons community in nigeria
Building the creative commons community in nigeriaBuilding the creative commons community in nigeria
Building the creative commons community in nigeriaKayode Yussuf
 
Creative commons nigeria kayode
Creative commons nigeria kayodeCreative commons nigeria kayode
Creative commons nigeria kayodeKayode Yussuf
 
Getting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyGetting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyKayode Yussuf
 

Plus de Kayode Yussuf (11)

How creative commons promotes open data at open data day 2017 lagos by kayode...
How creative commons promotes open data at open data day 2017 lagos by kayode...How creative commons promotes open data at open data day 2017 lagos by kayode...
How creative commons promotes open data at open data day 2017 lagos by kayode...
 
Building innovation through trust
Building innovation through trustBuilding innovation through trust
Building innovation through trust
 
Getting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyGetting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons story
 
Creative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekCreative commons and science education for audax computer science week
Creative commons and science education for audax computer science week
 
How to licencse cc by kayode yussuf
How to licencse cc by kayode yussufHow to licencse cc by kayode yussuf
How to licencse cc by kayode yussuf
 
Safe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufSafe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussuf
 
Safe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussufSafe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussuf
 
Creative commons and science education for audax computer science week
Creative commons and science education for audax computer science weekCreative commons and science education for audax computer science week
Creative commons and science education for audax computer science week
 
Building the creative commons community in nigeria
Building the creative commons community in nigeriaBuilding the creative commons community in nigeria
Building the creative commons community in nigeria
 
Creative commons nigeria kayode
Creative commons nigeria kayodeCreative commons nigeria kayode
Creative commons nigeria kayode
 
Getting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons storyGetting innovative with oer, the creative commons story
Getting innovative with oer, the creative commons story
 

Dernier

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Dernier (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Building a secure cyberspace for innovative enterprise, a collective responsibility

  • 1. Building A Secure Cyberspace for Innovative Enterprise: A Collective Responsibility Secure Africa Conference 2013 Centre For Management Development , Lagos Kayode Yussuf | CyberSecurity Advocate
  • 2. ’Start by doing what is necessary, then what is possible and suddenly, you’re doing the impossible.’ Saint Francis of Assisi
  • 3. Some Hard Facts • The world today is reliant on the internet, British businesses earn £1 in every £5 from the internet – www.gov.uk • We expect govt and our institutions to protect us from online security breaches • Over 600 million phishing attacks per annum – www.go-golf.com • Cybercrime is costing the world $110 billion every year - Symantec Corp
  • 4. Whose responsibility is it to secure our Cyberspace? Find X? Government Professional Associations X Individuals Private Sector
  • 5. Cybersecurity is a shared responsibility, and each of us has a role to play. Emerging cyber threats require the engagement of the entire society—from government and law enforcement to the private sector and most importantly, members of the public. • Janet Napolitano Former Secretary, Department of Homeland Security
  • 6. Building A Secure Cyberspace for Innovative Enterprise
  • 7. Strengthening The Cyber Ecosystem In Nigeria, How?
  • 8. Build Collaborative Communities ‘Law enforcement agencies are often “reluctant to use new techniques, and don’t always maximize current technology. Criminals, however, are certainly maximizing the benefits of technology in their wrongdoing.’ • Noboru Nakatani, Executive Director INTERPOL’s Global Complex for Innovation.
  • 9. Next Steps • Favorable policies and legislation ( Nigeria’s Cyber-security law and Creative Commons licensing for Education) • Mass enlightenment • Immediate creation and support of a CERT • Law enforcement agencies must work together • Inter-nation collaborations • Citizens participation through volunteering
  • 10. Next Steps Cont’d • Empower Individuals and Organizations to Operate Securely • Build Collaborative Communities with CSO and professional bodies to serve as lobbyists • Cyber-Competitions sponsored by private organizations & government • PPP in research & development in CyberSecurity
  • 11. What is expected of the Public? Be cyber-security conscious Make information available Get involved in community projects Enlightening people around you
  • 12. What is expected of the Public? • • • • • • • • • • Secure your devices, PCs and online accounts Never click on links in emails Never open the attachments unless you are sure of its source Do not give out personal information over the phone or in an email unless completely sure Set secure passwords and don't share them with anyone. Keep your operating system, browser, anti-virus and other critical software up to date. Verify the authenticity of requests from companies or individuals by contacting them directly. For e-Mail, turn off the option to automatically download attachments. Be suspicious of unknown links or requests sent through email or text message Pay close attention to website URLs.
  • 13. What I do to enlightening people • Personal enlightenment amongst friends • Speaking at conferences and seminars • Organizing trainings • Organizing conferences…. NGSECURE
  • 14. If each one can reach one, then each one can teach one what a beautiful nation Nigeria can be….. Chaz B, OAP and Producer of Sharing Life Issues with Chaz B
  • 15. If each one can reach one, then each one can teach one what a beautiful & safe world we can live in….. Kayode Yussuf’s remixed
  • 16. Thank you for listening, we hope you join us secure Nigeria Kayode Yussuf +234-8029730059 kayusyussuf@yahoo.com @k_whybaba