SlideShare a Scribd company logo
Building A Secure Cyberspace for
Innovative Enterprise:
A Collective Responsibility

Secure Africa Conference 2013
Centre For Management Development , Lagos

Kayode Yussuf

|

CyberSecurity Advocate
’Start by doing what is necessary,
then what is possible
and suddenly, you’re doing the impossible.’
Saint Francis of Assisi
Some Hard Facts
• The world today is reliant on the internet, British
businesses earn £1 in every £5 from the internet –
www.gov.uk

• We expect govt and our institutions to protect us
from online security breaches
• Over 600 million phishing attacks per annum –
www.go-golf.com
• Cybercrime is costing the world $110 billion every
year - Symantec Corp
Whose responsibility is it to secure our
Cyberspace?
Find X?
Government

Professional
Associations

X
Individuals

Private
Sector
Cybersecurity is a shared responsibility, and each of us
has a role to play. Emerging cyber threats require the
engagement of the entire society—from government
and law enforcement to the private sector and most
importantly, members of the public.
• Janet Napolitano
Former Secretary, Department of Homeland Security
Building A Secure Cyberspace for
Innovative Enterprise
Strengthening The Cyber Ecosystem In
Nigeria, How?
Build Collaborative Communities
‘Law enforcement agencies are often “reluctant to
use new techniques, and don’t always maximize
current technology. Criminals, however, are
certainly maximizing the benefits of technology in
their wrongdoing.’
• Noboru Nakatani,
Executive Director INTERPOL’s Global Complex for Innovation.
Next Steps
• Favorable policies and legislation ( Nigeria’s Cyber-security
law and Creative Commons licensing for Education)
• Mass enlightenment
• Immediate creation and support of a CERT
• Law enforcement agencies must work together
• Inter-nation collaborations
• Citizens participation through volunteering
Next Steps Cont’d
• Empower Individuals and Organizations to Operate
Securely
• Build Collaborative Communities with CSO and
professional bodies to serve as lobbyists
• Cyber-Competitions sponsored by private
organizations & government
• PPP in research & development in CyberSecurity
What is expected of the Public?
Be cyber-security conscious
Make information available
Get involved in community projects
Enlightening people around you
What is expected of the Public?
•
•
•
•

•
•
•
•
•
•

Secure your devices, PCs and online accounts
Never click on links in emails
Never open the attachments unless you are sure of its source
Do not give out personal information over the phone or in an
email unless completely sure
Set secure passwords and don't share them with anyone.
Keep your operating system, browser, anti-virus and other critical
software up to date.
Verify the authenticity of requests from companies or individuals
by contacting them directly.
For e-Mail, turn off the option to automatically download
attachments.
Be suspicious of unknown links or requests sent through email or
text message
Pay close attention to website URLs.
What I do to enlightening people
• Personal enlightenment amongst friends
• Speaking at conferences and seminars
• Organizing trainings

• Organizing conferences…. NGSECURE
If each one can reach one,
then each one can teach one
what a beautiful nation Nigeria can be…..
Chaz B,
OAP and Producer of Sharing Life Issues with Chaz B
If each one can reach one,
then each one can teach one
what a beautiful & safe world
we can live in…..
Kayode Yussuf’s remixed
Thank you for listening, we hope you
join us secure Nigeria

Kayode Yussuf
+234-8029730059
kayusyussuf@yahoo.com
@k_whybaba

More Related Content

PPTX
Need for Improved Critical Industrial Infrastructure Protection
PPTX
Stop in the name of norton
PPTX
Cyber Civil Defense - Risk Masters - Allan Cytryn
PDF
Cyber Security: The Strategic View
PDF
Cyberterrorism. Past, Present, Future
PDF
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
PPT
Cyber crime in a Smart Phone & Social Media Obsessed World
PDF
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Need for Improved Critical Industrial Infrastructure Protection
Stop in the name of norton
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Security: The Strategic View
Cyberterrorism. Past, Present, Future
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Cyber crime in a Smart Phone & Social Media Obsessed World
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)

What's hot (20)

PDF
cybersecurity- A.Abutaleb
PPTX
Cyberspace slide show
PDF
Cybercrime Research Paper
PPTX
C3 and digital citizenship
PPT
Cyberterrorism final
PPT
Cybersecurity
PPTX
How to Like Social Media Network Security
PPTX
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
PPTX
Introduction to cybercrime
PPT
Seminar on Cyber Crime
PPTX
Cyber Security & Crime In Bangladesh
PDF
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
PPT
28658043 cyber-terrorism
PPTX
Cyberspace
PPTX
Cybersecurity 2 cyber attacks
PPTX
Cyber Crime & Its Effect on Youth
PDF
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
PPT
Social media & cyber crime
PPTX
Cyber crimes among adolescents
PDF
Social Media Security Risk Slide Share Version
cybersecurity- A.Abutaleb
Cyberspace slide show
Cybercrime Research Paper
C3 and digital citizenship
Cyberterrorism final
Cybersecurity
How to Like Social Media Network Security
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
Introduction to cybercrime
Seminar on Cyber Crime
Cyber Security & Crime In Bangladesh
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
28658043 cyber-terrorism
Cyberspace
Cybersecurity 2 cyber attacks
Cyber Crime & Its Effect on Youth
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Social media & cyber crime
Cyber crimes among adolescents
Social Media Security Risk Slide Share Version
Ad

Viewers also liked (8)

PPT
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
PDF
Building Fences In Cyberspace: Business Method Patents and the Internet
PDF
Economy, Politics & Culture in Cyberspace
PPT
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
PPT
An Origin of Life in Salt Water or Fresh Water?
PPTX
A Ministry of Design!
PPTX
Solar space heating and cooling
KEY
Interior design seminar presentation
Bruce Damer's presentation at the Ecotechnics Institute Technosphere 2005 Con...
Building Fences In Cyberspace: Business Method Patents and the Internet
Economy, Politics & Culture in Cyberspace
Bruce Damer's talk at the CONTACT2012 conference (March 30, 2012)
An Origin of Life in Salt Water or Fresh Water?
A Ministry of Design!
Solar space heating and cooling
Interior design seminar presentation
Ad

Similar to Building a secure cyberspace for innovative enterprise, a collective responsibility (20)

PDF
Network Security
PDF
Internet safety and security strategies for building an internet safety wall
PDF
Research report cybersecurity strategy development- gerald & jeremy
PPTX
National Cyber Security Awareness Month - Michael Kaiser
PDF
Personal cyber safety
PPTX
Cyber Safety and Digital Empowerment.pptx
PPTX
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
PPTX
Cyber security presentation for practical
PPTX
Cyber security presentation for practical
PPTX
HQ Cyber Security PPT Cybersecurity awareness
PPTX
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
PDF
Cyber Security Strategies and Approaches
PPTX
Cyber security
PDF
Almanac 2023. Top Cyber News MAGAZINE. Published in January 2024
PPTX
The ABC's and Importance of Cyber Security
PDF
Cyber savvy (2)
PDF
Delusions of-safety-cyber-savvy-ceo
PPTX
National cyber security policy final
PPT
Unit 4 e security
PPSX
Cyber Security Awareness Month 2017-Wrap-Up
Network Security
Internet safety and security strategies for building an internet safety wall
Research report cybersecurity strategy development- gerald & jeremy
National Cyber Security Awareness Month - Michael Kaiser
Personal cyber safety
Cyber Safety and Digital Empowerment.pptx
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
Cyber security presentation for practical
Cyber security presentation for practical
HQ Cyber Security PPT Cybersecurity awareness
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Cyber Security Strategies and Approaches
Cyber security
Almanac 2023. Top Cyber News MAGAZINE. Published in January 2024
The ABC's and Importance of Cyber Security
Cyber savvy (2)
Delusions of-safety-cyber-savvy-ceo
National cyber security policy final
Unit 4 e security
Cyber Security Awareness Month 2017-Wrap-Up

More from Kayode Yussuf (11)

PPTX
How creative commons promotes open data at open data day 2017 lagos by kayode...
PDF
Building innovation through trust
PPTX
Getting innovative with oer, the creative commons story
PPTX
Creative commons and science education for audax computer science week
PPTX
How to licencse cc by kayode yussuf
PPTX
Safe collaborative efforts cc by kayode yussuf
PPTX
Safe collaborative efforts cc by kayode yussuf
PPTX
Creative commons and science education for audax computer science week
PPTX
Building the creative commons community in nigeria
PPT
Creative commons nigeria kayode
PPTX
Getting innovative with oer, the creative commons story
How creative commons promotes open data at open data day 2017 lagos by kayode...
Building innovation through trust
Getting innovative with oer, the creative commons story
Creative commons and science education for audax computer science week
How to licencse cc by kayode yussuf
Safe collaborative efforts cc by kayode yussuf
Safe collaborative efforts cc by kayode yussuf
Creative commons and science education for audax computer science week
Building the creative commons community in nigeria
Creative commons nigeria kayode
Getting innovative with oer, the creative commons story

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Tartificialntelligence_presentation.pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Approach and Philosophy of On baking technology
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
A Presentation on Touch Screen Technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Encapsulation theory and applications.pdf
PDF
August Patch Tuesday
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
A Presentation on Artificial Intelligence
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Tartificialntelligence_presentation.pptx
OMC Textile Division Presentation 2021.pptx
Hindi spoken digit analysis for native and non-native speakers
Digital-Transformation-Roadmap-for-Companies.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
cloud_computing_Infrastucture_as_cloud_p
Zenith AI: Advanced Artificial Intelligence
Approach and Philosophy of On baking technology
Univ-Connecticut-ChatGPT-Presentaion.pdf
WOOl fibre morphology and structure.pdf for textiles
A novel scalable deep ensemble learning framework for big data classification...
A Presentation on Touch Screen Technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Encapsulation theory and applications.pdf
August Patch Tuesday
A comparative study of natural language inference in Swahili using monolingua...
A Presentation on Artificial Intelligence

Building a secure cyberspace for innovative enterprise, a collective responsibility

  • 1. Building A Secure Cyberspace for Innovative Enterprise: A Collective Responsibility Secure Africa Conference 2013 Centre For Management Development , Lagos Kayode Yussuf | CyberSecurity Advocate
  • 2. ’Start by doing what is necessary, then what is possible and suddenly, you’re doing the impossible.’ Saint Francis of Assisi
  • 3. Some Hard Facts • The world today is reliant on the internet, British businesses earn £1 in every £5 from the internet – www.gov.uk • We expect govt and our institutions to protect us from online security breaches • Over 600 million phishing attacks per annum – www.go-golf.com • Cybercrime is costing the world $110 billion every year - Symantec Corp
  • 4. Whose responsibility is it to secure our Cyberspace? Find X? Government Professional Associations X Individuals Private Sector
  • 5. Cybersecurity is a shared responsibility, and each of us has a role to play. Emerging cyber threats require the engagement of the entire society—from government and law enforcement to the private sector and most importantly, members of the public. • Janet Napolitano Former Secretary, Department of Homeland Security
  • 6. Building A Secure Cyberspace for Innovative Enterprise
  • 7. Strengthening The Cyber Ecosystem In Nigeria, How?
  • 8. Build Collaborative Communities ‘Law enforcement agencies are often “reluctant to use new techniques, and don’t always maximize current technology. Criminals, however, are certainly maximizing the benefits of technology in their wrongdoing.’ • Noboru Nakatani, Executive Director INTERPOL’s Global Complex for Innovation.
  • 9. Next Steps • Favorable policies and legislation ( Nigeria’s Cyber-security law and Creative Commons licensing for Education) • Mass enlightenment • Immediate creation and support of a CERT • Law enforcement agencies must work together • Inter-nation collaborations • Citizens participation through volunteering
  • 10. Next Steps Cont’d • Empower Individuals and Organizations to Operate Securely • Build Collaborative Communities with CSO and professional bodies to serve as lobbyists • Cyber-Competitions sponsored by private organizations & government • PPP in research & development in CyberSecurity
  • 11. What is expected of the Public? Be cyber-security conscious Make information available Get involved in community projects Enlightening people around you
  • 12. What is expected of the Public? • • • • • • • • • • Secure your devices, PCs and online accounts Never click on links in emails Never open the attachments unless you are sure of its source Do not give out personal information over the phone or in an email unless completely sure Set secure passwords and don't share them with anyone. Keep your operating system, browser, anti-virus and other critical software up to date. Verify the authenticity of requests from companies or individuals by contacting them directly. For e-Mail, turn off the option to automatically download attachments. Be suspicious of unknown links or requests sent through email or text message Pay close attention to website URLs.
  • 13. What I do to enlightening people • Personal enlightenment amongst friends • Speaking at conferences and seminars • Organizing trainings • Organizing conferences…. NGSECURE
  • 14. If each one can reach one, then each one can teach one what a beautiful nation Nigeria can be….. Chaz B, OAP and Producer of Sharing Life Issues with Chaz B
  • 15. If each one can reach one, then each one can teach one what a beautiful & safe world we can live in….. Kayode Yussuf’s remixed
  • 16. Thank you for listening, we hope you join us secure Nigeria Kayode Yussuf +234-8029730059 kayusyussuf@yahoo.com @k_whybaba