
so I'd like this opportunity let's put our hands together for me [Applause] thank you very much the communication authority of Kenya is the University regulator as I was talking about when it was established in 19 uh by the communication information and communication Act of 1998 so mostly the communication the participating the development of information and communication sector including uh broadcasting cyber security multimedia telecommunication e-commerce and Courier Service all right so our overall mandate is licensing Communication Service uh protection of consumers I know Andrew is one of our licenses yeah okay regulation of Broadcasting the universe success service is now like um it is it's a fund that we use for you know to enhance connectivity within the country uh type of group of equipment so yeah okay we also one of our Market is promotes developed in first Fair competition this one is now in terms of tariffs uh like for example those types for The Telecast so we worked with them to Lloyds from ready to depending on the Italians thank you all right so we have two of us one the one that established us is information and communication Act of 1998 as I've already talked about specifically on section 83 CEO of Kika uh you know here we are here because of cyber security so I don't want to go to other function our function I'll go directly to the one for cyber security so under section 83c or kick up on each one section and cyber security or or this one basically talks about promote and participating the efficiency efficient management or critical information infrastructure okay like dot ke like Spectrum so develop a framework to facilitate the investigation and prosecution of cyber final offenses uh then another one is develop regulation with respect to cyber security so the other one was Kika we have now the computer which is a cyber crime act I had so many people here saying okay the professor was saying Professor don't start our Network this law talks about how many people are aware about this law the computer listens and cyber crime Act how many please read before you get into somebody's Network okay it's very important and Andrew has really emphasized on this you have to know you have to learn you have to continuous learning and love is very important you have to be and Professor Patrick said you have to be ethical so you need to know about this so This basically is uh facilitate investigation and prosecution of cyber crime just like Kika participated the process of digital evidence then there is issue of CIA then there is issue of penalties that's the one I'm talking about so it's very important for you to learn about that as an edible or an ethical hacker so the two laws uh give back to a national computer incident responsive coordination Center and it's called National cases so the Mandate is to be ticketed and Foster safe Kenyan cyberspace is a multi-agency collaboration framework so we have different uh we have different uh sector sets from Academia we're working with Kenneth as communication of director of Kenya and law enforcement we have no enforcement we have telecoms you can see also the Central Park yeah yeah so so the financial sector through Kenya Bankers Association we work with them then computer forensic and computers have a security forensic Association I've seen their partner here in this meeting so they are also one of our stakeholders uh so okay said what what does case search does the national Casa does [Music] um it detect prevent and respond to various about Target and the country okay and we work on 24 7 hours yeah and then we have also some we have also digital forensic Club which is quickly the state of Earth Systems that facilitate National safer threats and others have already talked about the collaborative the multi-stakeholder so we have no enforcement who you know take the case up to the courts so the function of national patient is number one developed National cyber security framework technicalization for stakeholders then we do research in cyber security then there is also the national public infrastructure who knows publicly infrastructure here thank you uh-huh anybody cryptography foreign certification service providers electronic scientific certification service providers so once we give you that lessons you'll be able to you know sell digital signatures how many people know what digital statements are he's sorry oops okay so they sell uh the actors because as a regulator ours is used to lessons we must get Limited just like liquid now they will provide internet we give them lessons and they provide internet Okay so that's basically function of National Cancer I have to talk about collaboration cyber security is not a standalone function we must collaborate we must talk to each other why Italy is borderless as you know it's just one Village you can sit somewhere in South Africa or even somewhere in U.S once you have a laptop and an internet you're done because they are every how many how many how many organizations can keep up with the technology always patching and patching and patching the vulnerability are always there okay always the technology there is dynamic into technology every day new things come new update comes a good example is your phones so you've seen those updates those operating system how many people read what it does to your phone first why do you trust cyber security is about trust the security is about trust so you bought this for you know oh I'm great and trust me because I use their platform so it's trust iPhone I trust them because I use there so it's about trust cyber security is just about trust if you don't trust there is no cyber security so these are the days you collaboration with the reinforcement the one that is really standing in for me is the one maybe okay among all this team we collaborate all of them they are equally very important you'll see we collaborative WhatsApp the service providers I know we Kenyan we love you know online it's it's okay there is freedom of uh Speech but I know you guys you learn so we collaborate with all those uh stakeholders and as communication of the Richer of Kenya through the national cases you can do it alone we have to collaborate so now what I was talking about is of importance what uh what CA is doing the current activity we have annual cyber security conference and uh this one will take place in naivasha 17 to 19th October 2022 how many people know that October is a cyber security Awareness Month please raise your hand okay so inconvenience of that so as a combination of director of Kenya through National research that is why we're preparing for that uh address of the security progress you know to also join globally the global village on creating security awareness foreign Exchange I think cyber security is cutting across the industry nobody knows everything that you have to talk to your colleague somebody is very good in natural security somebody is very good in handling security Hardware security you know somebody is a good developer like they can write script so all these things you like you have to talk together so the collaboration it has collaboration and teamwork in cyber security will have you know Industries stakeholders from around Kenya to come and you know discuss and collaborate and interact so we also want to enhance creation of trust and network which we already have but now when we come together in a Russia we enhance that we've continued enhancing that so in this year we have considered you know boot camp this is where I'm sure most of you will be interested to see this so boot camp is basically training on issues of cyber security and it will be from 26 September to 10 to 7th October the top performers will be invited for an award ceremony that is at naivasha we're going to sponsor you okay at the annual conference uh Center so you need to register for that but uh you have to be a student or you just finished legally or Masters we don't want experts because there is a way we will know if you apply so please apply on www right now we were still working on it so once the page is up you keep on checking www.ksach.co.ke so you can apply so please apply so the top 10 will be awarded okay so that is it maybe everybody can see that I'm sure you'll be interested the top 10 performing students will be awarded with trophies certificate of participation an exam certificate voucher that is for professionals from a group certification providers then you will be you will participate in Christopher's Hands-On training skill in naivasha that's like for three days just before the conference another important thing about all this you'll be able to meet the industries stakeholders how amazing is that you interact with them you learn right now you see what Andrew did to you you've learned a lot and so we have so many and I'm sure Andrew will also participate in our conference so so we have so many of type of animals out there please come please apply participate I'm sure there is exam and all that Brilliance those people who are going to pass who are going to consider we're going to sponsor you at naivasha you will participate okay apart from all this is still going to participate in the conference and imagine being recognized before those the locals they call us who are now the potential employers all right so back to you it's if the ball is in your hand so we also have heart problem I'm sure we have hackers around here so we also have a couple we're working with the kcf6 case Kenya cyber security forensic Association and uh on the social coding and Hands-On Workshop so we'll be you will be given some challenges and problem solving to participate and despite the creativity engagement so so the top five will be given I know what money okay this time it's money so if you're able to keep an electronical system of ours will be given more to money but it's not a small money for students are you it's not a small money I don't want to disclose it you have to work hard so there is good money there you'll be allowed to attend the dream conference will be trained and then you will be given also certificate you'll either recognize and then also you will interact with the stakeholders our stakeholders the cyber security stabilities uh Professor Paula here is one of our speaker so uh Professor Okay so Okay so I think Andrew has talked about so many things how you can you know what you need to do the reading people all that so I don't need to bore you with that maybe for the career in the field of cyber security if you want to be in maybe 10 years and to say that you if somebody says in five years you want to be a manager that's around the world around what question I didn't answer sorry but uh Andrew okay our dreams are back so we're going to be in five to ten years Chief Information Security Officer your dreams are varied so these are the I.T experience that you need to have there is the scissors certified information security manager so these are just they are the one that these are just there I'm not promoting any product but these are the common one which is in the market so they if you want to be a security architect architect so cssp the county they need to have the you need to to know more of network Hardware's configuration there is management if you see so if you want to be cyber security engineer you need to have those skills to play tracking skills you need to understand the architecture the C plus plus they buy them you know you need to know how to write the scripts and all that for you to be a network engineer then okay I don't want to promote any whatever but I know the the other speakers who are coming after me they will talk about this so you want to be a malware analyst you should know you should be set certified revised engineering my lawyer certification you should have that okay then programming I realized in security you must know program civilian just read the script if now we will depend on everything like for example if you depend on everything like what Andrew will develop and you don't want to develop yours what will happen see you will be will not be able to open up your mind is it so it's time you have the capability look right now we have YouTubes where you can utilize it is that not true back in our days we didn't have any YouTube anyway I don't want to say I'm very old but back in our days you didn't we didn't have when we were studying we didn't have uh the Youtube but for you you can learn anything anytime you can upgrade what the professors or even the lecturers teaches you actually if I didn't go to specific like for example you want to learn to learn better to have to happen they thought the truths are there but what makes you different from others you have to develop viewers and we have that capability then in a scale model you have that capability you can do it you can collaborate with your activity like three to four why do you wait for you to be employed you can sit down and create a very nice cyber security solution like a security solution to solve one or something maybe because cyber Security Solutions they all of them they don't do one thing and they're actually very expensive so you can direct it if you want it for network network iot Cloud depending on what you want to achieve so why can't you develop U.S we have brilliant professors okay please uh look at that very important then you want to be a penetration tester so you have to be an ethical happen ethical and ethical hacker which one Professor Patrick talked about being ethical in everything that you do so when you suck when you're giving that certificate you're accepted to be anybody okay then there is also the offensive security certification professionals and so many others okay so you need to also learn I know all those things so you want to be a computer forensic analyst we have so many so many so many certifications for computer forensic analysts but at least at the bottom maybe you can have the uh you can be certified be certified forensic or beta Examiner and certified computer certified computer Examiner okay at most that is the basic but you can do so many there is that now you can go to now specifically mobile if you want to do computer computer forensic you can go to now this currency converter Network currency you convert Mumbai forensic depending no no after learning the general and now you can go deep inside the opportunities are there all right so how will you be how do you how can you contact the National case set so I as I've already told you www.kesa.go.ke then if you want to like there is cyber bullying there is so many things happening online somebody put a picture and desire more picture online or something you can report to us okay so those are one of the things we do we also do creation of awareness as I've already talked about a function of sat before so the telephone number is there let me write letters it is official and you want maybe like evidence or something Yeah so basically I forgot to mention about injection we also give in Junction International questions you will get to learn all these but now you have to apply to our HR so they are going to consider please apply if you feel like and I'm not promising anything but uh once you apply then if the opportunities are already there for others why not you so that is our incident we put in Portal if you have any incidents if you also you also want to tell us something maybe you found out something you also want to mention then this is the place uh thank you very much any questions