Committed to connecting the world

Girls in ICT

Programme

Joint ITU-ATU Workshop on Cybersecurity Strategy in African Countries
Khartoum, Republic of Sudan,  24 – 26 July 2016

Contact: tsbworkshops@itu.int

Day 1, 24 July 2016

​08:00 - 09:00Registration
​09:00 - 10:00​Welcome and Opening Remarks

Master of Ceremony from Sudan, Reem Ismail


The objective of the workshop is to build capacity and to share experiences and best practices in countries and to provide information regarding the status of implementations of existing cyber security strategies; to identify any gaps; and to yield a way forward.

Keynote speakers:
​10:00 - 10:30 Group Photo, Coffee / Tea Break
​10:30 - 12:00Session 1: National Cybersecurity Strategies development (what is needed, and the way toward elaboration)

Moderator: Kiru Pillay, South Africa [ Biography ]

The objective of session 1 is to discuss the best way to initiate the work toward the development of a National Cybersecurity Strategy. What are the initial requirements, who should be involved?

A further objective of this session is to understand the development process toward a solid National Cybersecurity Strategy, what are the main components or propriety areas.
​12:45 - 14:00 ​Lunch Break
​14:00 - 15:30 Session 2: Implementation of the National Cybersecurity Strategy (NCS)

Moderator: Meriem Slimani, ATU [ Biography ]

The objective of session 2 is to understand pros and cons in having a national strategy implemented and at what cost. What are the financial implications, the lessons learnt?

Discussion

​15:30 - 15:45 ​Coffee Break
​15:45 - 17:00Session 3 - ​Integration of a National Cybersecurity Strategy (NCS) in the overall national ICT strategy

Moderator: Cisse Kane, ACSIS [ Biography ]

The objective of session 3 is to analyse how the National Cybersecurity Strategy is an integral part of a national and regional framework, the interdependencies and the constraints with the other ICT cybersecurity related plans.

           

Discussion

Day 2, 25 July 2016

​09:00 - 10:30Session 4: Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach

Moderator: Esam Abulkhirat, Libya [ Biography ]

CIP is paying a bigger role than in the past on the management of critical services that most of the time are managed by the private sector. CIP must be an integral part of the National Cybersecurity Strategy and as such the engagement of the private sector and the other critical sectors in the country.

           

Discussion

​10:30 - 10:45 ​Coffee Break
​10:45 - 12:30Session 5: National versus regional versus international

Moderator: Bertrand Kisito NGA, Cameroon [ Biography ]

A roundtable panel will be organized to understand what the impact is of a national strategy in the regional and international context? Is there a need to develop also an international strategy for a country? 

           

Discussion

​12:30 - 14:00 Lunch Break   
​14:00 - 15:30Session 6: CIRT: Requirements and implementation

Moderator: Abdelgadir Alsayed, Zain Sudan [ Biography ]

The objective of session 6 is to understand what the typical requirements are for building a Computer Incident Response Team (CIRT)? Which cybersecurity strategies are necessary for setting-up a CIRT? How can a CIRT be implemented in a country?

          

Discussion

​15:30 - 15:45 ​Coffee Break
​15:45 - 16:20Session 7: CIRT: Experiences and best practices

Moderator: Almerindo Graziano, Silensec

The objective of session 7 is to learn from experiences made in establishing and operating a Computer Incident Response Team (CIRT). Are there best practices which can be shared? How can CIRTs cooperate across country borders?

          

Discussion

​16:20-17:00​Session 1 ( Continuation )

Moderator: Abusofian Dafalla, COMESA [ Biography ] 

Discussion

​20:00 ​Social Networking Event Hosted by Sudan

 *To be confirmed

Day 3, 26 July 2016

​09:00 - 10:45​Training on Information Security Risk Management and on National Cybersecurity Strategy 
 

       
​10:45 - 11:00 ​Coffee Break
​11:00 - 12:45​Training on Information Security Risk Management and on National Cybersecurity Strategy
          
​12:45 - 14:00 ​Lunch Break
​14:00 - 16:00​Training on National Cybersecurity Strategy
          
​16:00 - 16:15 ​Coffee Break
​16:15 - 17:00​Training on National Cybersecurity Strategy
          

 *To be confirmed