Today 316

Yesterday 625

All 39464657

Friday, 5.07.2024
eGovernment Forschung seit 2001 | eGovernment Research since 2001
IT Governance and Cyber Security Institute of sub-Sahara has been launched in Zimbabwe to address common information technology security risks being faced by 21st century organisations.

ITGCSI also assists organisations identify how they use information to meet their strategic business goals, then determine the best ways to protect their information assets throughout the information security lifecycle.

The independent and non-profit trust was founded end of 2011.

An advisory board chaired by Professor Gabriel Kabanda assisted by Dr Richard Young runs the institute.

The board comprises 15 members drawn from across the globe.

The board meets periodically to discuss ICT security, best practices, work on cyber incident preventative measures and raise awareness on how to behave on the Internet.

In a interview with Herald Business, last week the institute's spokesperson, Dr Young, said the organisation supplies authoritative opinion and guidance on all aspects of IT governance, information and cyber security issues to Zimbabwe and the sub Saharan region.

He said the institute harnesses its world-renowned expertise and the collective knowledge and experience of its members to deliver practical solutions to overcome wide-ranging security challenges impacting business information today.

"The growing use of ICT applications, the popularity of social networks, and the useful services on the Internet have created the challenge to build trust, confidence in the security, reliability, and privacy of these technologies.

"These are cardinal elements in facilitating transactions that increase sales, build customer loyalty and enhance the customer experience through the web," said Dr Young.

He added that with billions of individuals worldwide now on the Internet, cyber-criminals are taking advantage of unsophisticated users, enterprises, and unsecured machines to usher in a new era of high-profit, low-overhead crimes targeting information and intellectual property.

"Despite many misconceptions that downplay the ability of cyber-terrorists to destroy critical infrastructure possibly overwhelmed by the effort, costs and conflicts that arise in attempting to implement effective security measures, have adopted the erroneous 'security by obscurity' philosophy. They assume they are protected by their relatively small presence in cyberspace" he said.

However, it only takes one unsecured machine on the network to create potential risk for everyone else.

The risk and the cost of defences are high, and the trend is moving both upward.

Meanwhile, the institute is organising annual events to be held in the sub-Saharan African region, which offer a an opportunity to discuss key security challenges and gain practical advice from peers and leading global industry experts.

This year's symposium would be held in Zimbabwe in May.

According to the institute's feasibility study most participants from the region are interested in seeking awareness, understanding, strategies, threats and risks, and national cyber security maps to handle IT governance and cyber security matters.

---

Quelle/Source: AllAfrica, 19.03.2012

Bitte besuchen Sie/Please visit:

Go to top