SlideShare uma empresa Scribd logo
1 de 24
Protecting BordersAn Ally’s prospective Dr.Mohamed Reda mreda@alliedsoft.net
Modern EgyptInformation Technology ..es government 2011isquit_Egypt_v11 (2).wmv
Egyptian ICT industry in numbers
Economist last issue 12/2010
Target revenue CAGR R&D $145m 33% BPO $260m 45% Technical Support $200m 27% ITO $480m 33% ICT Export Targets 1,085 145 260 200 250 480 35 40 61 115 2010 2005 Target Revenues: US$ 1.1 Billion Source: AT Kearney
Alexandria Bombing “Although 2011 started tragically, I feel it will be a year of eagerly anticipated change, where Egyptians will stand against sectarianism and unite as one,” Father RafaeilSarwat of the Mar-Mina church told Ahram Online. The Coptic priest was commenting on the now widespread call by Muslim intellectuals and activists upon Egyptian Muslims at large to flock to Coptic churches across the country to attend Coptic Christmas Eve mass, to show solidarity with the nation's Coptic minority, but also to serve as "human shields" against possible attacks by Islamist militants
10 203 Egypt is safer than most of its peers, with no deadly terrorist attacks in over 2 years Safety and security in Egypt ,[object Object]
Terrorist attacks in 2004-2006 concentrated mainly on tourist areas on the Sinai Peninsula
Before 2004, no terrorist attacks involving foreigners occurred in almost 6 years
There are no reports of business discontinuity of any multinational operating in Egypt due to terrorist attacksMorocco Egypt US UK France 784 Philippines 3,062 Afghanistan 3,731 India Incidents of terrorism from January 2005 to June 2008 Source: Worldwide Incidents Tracking System (WITS), US Department of State
11 4.8 GDP US$ billion BPO services can contribute over 10% of overall GDP growth between 2007-2017 Exports of  goods and  services 5.5% 5.3% 45% 7.1% 5.5% 45% BPO services can contribute over 23% of export growth between 2007-2017 BPO services can create 1.5 million jobs US$ billion BPO LIKELY TO HAVE A MAJOR IMPACT ON THE EGYPTIAN ECONOMY AND CREATE 1.5 MILLION JOBS BY 2017 Contribution of offshore BPO industries CAGR (2007-2017) 100%=1701 100%=2102 100% =125 4% BPO 1% 2007 2012E 2017E CAGR (2007-2017) 100%=34 100%=473 100%=683 88% 96% 99% 12% 4% 1% 2007 2012E 2017E 1.550 Additional employment (direct and indirect) ‘000 people 2002-2007 2007-2012E 2017 1	Assuming 6.0% growth in GDP 	2	Assuming 5.0% growth in GDP  3  	Assuming exports grow at GDP growth rates + BPO industry contribution 	Source: World Bank report, The Economist ; Mckinsey analysis
Basic Security agencies in Egypt General Intelligence Services National Security Investigation Military Intelligence Service National Security Agency
Defeating the bad guys The use of converted shekhNagehIbrahim“Fatwa” to be spread around and on the WEB Empower intellectual religious source of education AL AZHAR The use of intellectuals to build group discussions in the internet and in special clubs and social network
Nageh Ibrahim Aug 2, 2010 ... Dr. Nageh Ibrahim, the ideological theorist of the Islamic Group in Egypt and a member of its Shura Council, said the revisions have been ...www.al-shorfa.com/cocoon/meii/xhtml/en_GB/.../feature-01
Recent Developments in the Area of Cyber Security in Egypt  Ministry of Communication and Information Technology
Legislative Developments  Egypt issued a number of relevant regulations to build and develop the legal and regulatory infrastructure for ICT industry in Egypt.  The Intellectual Property Rights (IPR) Law in 2002 (Law no. 82/2002).  The Telecommunications Act issued in 2003 (Law no. 10/2003).  The e-signature law issued in 2004 (Law no. 15/2004).  A draft CyberSecurity law has been prepared by a working group of legal and technical of experts formed by a ministerial decree from the Minister of Communications and Information Technology. The draft law is expected to be forwarded to the legislative bodies in the near future.  In addition, Egypt has strengthened its legal framework for combating child pornography and child exploitation on-line by adopting a special article on that topic in its comprehensive Child Act (Law no. 126/2008).
Infrastructure Developments  Public Key Infrastructure (PKI): Egypt has adopted a strict hierarchal architecture for implementing PKI, the technology required to perform qualified e-signature in Egypt. Currently, several governmental and private entities, including leading private banks and Egypt Post, are establishing PKI-enabled infrastructure. PKI is also becoming central to the efforts of protecting the digital identity for individuals and for organizations, thus enabling advanced e-business, e-government and e-commerce activities.  Root (Certificate Authority) CA: Egypt has started establishing a Root CA trust center, which is up and running since September 2009. This trust center is established according to the latest international security specifications. The Root CA trust centre is going to be the very heart of the national PKI efforts, and will be central for digital identity management efforts. In addition, three companies have been licensed to issue electronic signatures certificates and are currently linked to and operating under the umbrella of the Root CA.  Gov-CA: The Ministry of Finance has established a governmental entity responsible for issuing governmental electronic signatures certificates to ensure the full protection and confidentiality for their transactions, in cooperation with the Ministry of State for Administrative development.
Operational Framework for Cyber Security  A national Computer Emergency Response Team (EG-CERT) has been established within the Egyptian Telecommunication Regulatory Authority (NTRA) on April 2009. EG-CERT currently has 16 full-time professionals and operates on a 24/7 basis.  EG-CERT provides support in protecting national critical information infrastructure, especially in the ICT sector and in the financial sector.  EG-CERT has provided expertise in investigating several incidents, including the well-known PHISH PHRY case (uncovered in Oct 2009) that involved a phishing ring of 100 individuals from Egypt and the USA.  The NTRA sponsors a comprehensive national program for training cyber security professionals. During the past 18 months, the program provided internationally recognized certification for over 170 professionals from 38 organizations from the ICT sector, the banking/financial sector, and the academic sector.
International Cooperation  EG-CERT has signed cooperation agreements with the US-CERT, the South Korean Information Security Agency (KISA), and Cyber Security Malaysia. It is currently applying for membership in the Forum of Incident Response and Security Teams (FIRST).  Egypt has participated in the ITU’s High Level Experts Group on Cyber Security (HLEG) that forwarded its recommendations to the Secretary General of the ITU late in 2008. Currently, Egypt chairs the ITU’s Council Working Group for Child Online Protection.  Egypt is an observer of the OECD’s Committee for Information, Computer and Communications Policy (ICCP), including the working party on Information  MCIT 4 Jan 2011  Security and Privacy (WPISP). We also participated in the OECD ministerial meeting held in South Korea (June 2008).  Egypt is a member of the International Multilateral Partnership Against Cyber-Threats (IMPACT), that was initiated by Malaysia in 2008. IMPACT has effectively become the physical home of the ITU’s Global Security Agenda GCA.
Developing Partnerships between American and Egyptian IT Firms:Building Business in the Middle East and Africa ITEC and NVTC
21 Information Technology Export Community, ITEC ITEC core consists of 34 members/companies.  ITEC is serving 3726 Egyptian companies.  ITEC focus on IT export and international business collaboration. ITEC core members have over LE 6.2 BN business volume , of which 50% is in international markets. Total employment of core members around 15,000 IT professionals.

Mais conteúdo relacionado

Semelhante a Protecting Borders: An Ally's Perspective on Egyptian Cyber Security

CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
180119 Digital Government in Japan
180119 Digital Government in Japan180119 Digital Government in Japan
180119 Digital Government in JapanKenji Hiramoto
 
WSIS+10 Country Reporting - EGYPT
WSIS+10 Country Reporting - EGYPTWSIS+10 Country Reporting - EGYPT
WSIS+10 Country Reporting - EGYPTDr Lendy Spires
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyookaAmbrose Ruyooka,PMP,CGEIT, CRISC
 
Exdir presentation on ict for everyone at bandung ind
Exdir presentation on ict for everyone at bandung indExdir presentation on ict for everyone at bandung ind
Exdir presentation on ict for everyone at bandung indrr_almario
 
Cybersecurity Event 2010
Cybersecurity Event 2010Cybersecurity Event 2010
Cybersecurity Event 2010segughana
 
e-Government: Thoughts on Leveraging Technology for Organisational Excellence...
e-Government: Thoughts on Leveraging Technology for Organisational Excellence...e-Government: Thoughts on Leveraging Technology for Organisational Excellence...
e-Government: Thoughts on Leveraging Technology for Organisational Excellence...Chinenye Mba-Uzoukwu
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Mwando
 
Pymes y tic en egipto
Pymes y tic en egiptoPymes y tic en egipto
Pymes y tic en egiptoMaria Tobon
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
Market Mapping report
Market Mapping reportMarket Mapping report
Market Mapping reportZiad Jaser
 

Semelhante a Protecting Borders: An Ally's Perspective on Egyptian Cyber Security (20)

Cyber Security For Businesses
Cyber Security For BusinessesCyber Security For Businesses
Cyber Security For Businesses
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
180119 Digital Government in Japan
180119 Digital Government in Japan180119 Digital Government in Japan
180119 Digital Government in Japan
 
WSIS+10 Country Reporting - EGYPT
WSIS+10 Country Reporting - EGYPTWSIS+10 Country Reporting - EGYPT
WSIS+10 Country Reporting - EGYPT
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
dcb1222 - Feature3
dcb1222 - Feature3dcb1222 - Feature3
dcb1222 - Feature3
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
 
Internet Governance Backround
Internet Governance BackroundInternet Governance Backround
Internet Governance Backround
 
Exdir presentation on ict for everyone at bandung ind
Exdir presentation on ict for everyone at bandung indExdir presentation on ict for everyone at bandung ind
Exdir presentation on ict for everyone at bandung ind
 
ICT Sector Worldwide Update 2013
ICT Sector Worldwide Update 2013ICT Sector Worldwide Update 2013
ICT Sector Worldwide Update 2013
 
ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1
 
Cybersecurity Event 2010
Cybersecurity Event 2010Cybersecurity Event 2010
Cybersecurity Event 2010
 
e-Government: Thoughts on Leveraging Technology for Organisational Excellence...
e-Government: Thoughts on Leveraging Technology for Organisational Excellence...e-Government: Thoughts on Leveraging Technology for Organisational Excellence...
e-Government: Thoughts on Leveraging Technology for Organisational Excellence...
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
 
Pymes y tic en egipto
Pymes y tic en egiptoPymes y tic en egipto
Pymes y tic en egipto
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Market Mapping report
Market Mapping reportMarket Mapping report
Market Mapping report
 

Mais de svito

Kevin Plexico presentation
Kevin Plexico presentationKevin Plexico presentation
Kevin Plexico presentationsvito
 
Paul nicholas presentation
Paul nicholas presentationPaul nicholas presentation
Paul nicholas presentationsvito
 
David silverberg presentation
David silverberg presentationDavid silverberg presentation
David silverberg presentationsvito
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentationsvito
 
Day 2 intro slide fr com score
Day 2 intro slide fr com scoreDay 2 intro slide fr com score
Day 2 intro slide fr com scoresvito
 
Evan Kohlmann Presentation
Evan Kohlmann PresentationEvan Kohlmann Presentation
Evan Kohlmann Presentationsvito
 
CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1svito
 
CES Government 2011 Program
CES Government 2011 ProgramCES Government 2011 Program
CES Government 2011 Programsvito
 
LTG. Michael Vane Presentation
LTG. Michael Vane PresentationLTG. Michael Vane Presentation
LTG. Michael Vane Presentationsvito
 
Mark Borkowski Presentation
Mark Borkowski PresentationMark Borkowski Presentation
Mark Borkowski Presentationsvito
 

Mais de svito (10)

Kevin Plexico presentation
Kevin Plexico presentationKevin Plexico presentation
Kevin Plexico presentation
 
Paul nicholas presentation
Paul nicholas presentationPaul nicholas presentation
Paul nicholas presentation
 
David silverberg presentation
David silverberg presentationDavid silverberg presentation
David silverberg presentation
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 
Day 2 intro slide fr com score
Day 2 intro slide fr com scoreDay 2 intro slide fr com score
Day 2 intro slide fr com score
 
Evan Kohlmann Presentation
Evan Kohlmann PresentationEvan Kohlmann Presentation
Evan Kohlmann Presentation
 
CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1
 
CES Government 2011 Program
CES Government 2011 ProgramCES Government 2011 Program
CES Government 2011 Program
 
LTG. Michael Vane Presentation
LTG. Michael Vane PresentationLTG. Michael Vane Presentation
LTG. Michael Vane Presentation
 
Mark Borkowski Presentation
Mark Borkowski PresentationMark Borkowski Presentation
Mark Borkowski Presentation
 

Protecting Borders: An Ally's Perspective on Egyptian Cyber Security

  • 1. Protecting BordersAn Ally’s prospective Dr.Mohamed Reda mreda@alliedsoft.net
  • 2. Modern EgyptInformation Technology ..es government 2011isquit_Egypt_v11 (2).wmv
  • 5.
  • 6.
  • 7. Target revenue CAGR R&D $145m 33% BPO $260m 45% Technical Support $200m 27% ITO $480m 33% ICT Export Targets 1,085 145 260 200 250 480 35 40 61 115 2010 2005 Target Revenues: US$ 1.1 Billion Source: AT Kearney
  • 8.
  • 9. Alexandria Bombing “Although 2011 started tragically, I feel it will be a year of eagerly anticipated change, where Egyptians will stand against sectarianism and unite as one,” Father RafaeilSarwat of the Mar-Mina church told Ahram Online. The Coptic priest was commenting on the now widespread call by Muslim intellectuals and activists upon Egyptian Muslims at large to flock to Coptic churches across the country to attend Coptic Christmas Eve mass, to show solidarity with the nation's Coptic minority, but also to serve as "human shields" against possible attacks by Islamist militants
  • 10.
  • 11. Terrorist attacks in 2004-2006 concentrated mainly on tourist areas on the Sinai Peninsula
  • 12. Before 2004, no terrorist attacks involving foreigners occurred in almost 6 years
  • 13. There are no reports of business discontinuity of any multinational operating in Egypt due to terrorist attacksMorocco Egypt US UK France 784 Philippines 3,062 Afghanistan 3,731 India Incidents of terrorism from January 2005 to June 2008 Source: Worldwide Incidents Tracking System (WITS), US Department of State
  • 14. 11 4.8 GDP US$ billion BPO services can contribute over 10% of overall GDP growth between 2007-2017 Exports of goods and services 5.5% 5.3% 45% 7.1% 5.5% 45% BPO services can contribute over 23% of export growth between 2007-2017 BPO services can create 1.5 million jobs US$ billion BPO LIKELY TO HAVE A MAJOR IMPACT ON THE EGYPTIAN ECONOMY AND CREATE 1.5 MILLION JOBS BY 2017 Contribution of offshore BPO industries CAGR (2007-2017) 100%=1701 100%=2102 100% =125 4% BPO 1% 2007 2012E 2017E CAGR (2007-2017) 100%=34 100%=473 100%=683 88% 96% 99% 12% 4% 1% 2007 2012E 2017E 1.550 Additional employment (direct and indirect) ‘000 people 2002-2007 2007-2012E 2017 1 Assuming 6.0% growth in GDP 2 Assuming 5.0% growth in GDP 3 Assuming exports grow at GDP growth rates + BPO industry contribution Source: World Bank report, The Economist ; Mckinsey analysis
  • 15. Basic Security agencies in Egypt General Intelligence Services National Security Investigation Military Intelligence Service National Security Agency
  • 16. Defeating the bad guys The use of converted shekhNagehIbrahim“Fatwa” to be spread around and on the WEB Empower intellectual religious source of education AL AZHAR The use of intellectuals to build group discussions in the internet and in special clubs and social network
  • 17. Nageh Ibrahim Aug 2, 2010 ... Dr. Nageh Ibrahim, the ideological theorist of the Islamic Group in Egypt and a member of its Shura Council, said the revisions have been ...www.al-shorfa.com/cocoon/meii/xhtml/en_GB/.../feature-01
  • 18. Recent Developments in the Area of Cyber Security in Egypt Ministry of Communication and Information Technology
  • 19. Legislative Developments Egypt issued a number of relevant regulations to build and develop the legal and regulatory infrastructure for ICT industry in Egypt. The Intellectual Property Rights (IPR) Law in 2002 (Law no. 82/2002). The Telecommunications Act issued in 2003 (Law no. 10/2003). The e-signature law issued in 2004 (Law no. 15/2004). A draft CyberSecurity law has been prepared by a working group of legal and technical of experts formed by a ministerial decree from the Minister of Communications and Information Technology. The draft law is expected to be forwarded to the legislative bodies in the near future. In addition, Egypt has strengthened its legal framework for combating child pornography and child exploitation on-line by adopting a special article on that topic in its comprehensive Child Act (Law no. 126/2008).
  • 20. Infrastructure Developments Public Key Infrastructure (PKI): Egypt has adopted a strict hierarchal architecture for implementing PKI, the technology required to perform qualified e-signature in Egypt. Currently, several governmental and private entities, including leading private banks and Egypt Post, are establishing PKI-enabled infrastructure. PKI is also becoming central to the efforts of protecting the digital identity for individuals and for organizations, thus enabling advanced e-business, e-government and e-commerce activities. Root (Certificate Authority) CA: Egypt has started establishing a Root CA trust center, which is up and running since September 2009. This trust center is established according to the latest international security specifications. The Root CA trust centre is going to be the very heart of the national PKI efforts, and will be central for digital identity management efforts. In addition, three companies have been licensed to issue electronic signatures certificates and are currently linked to and operating under the umbrella of the Root CA. Gov-CA: The Ministry of Finance has established a governmental entity responsible for issuing governmental electronic signatures certificates to ensure the full protection and confidentiality for their transactions, in cooperation with the Ministry of State for Administrative development.
  • 21. Operational Framework for Cyber Security A national Computer Emergency Response Team (EG-CERT) has been established within the Egyptian Telecommunication Regulatory Authority (NTRA) on April 2009. EG-CERT currently has 16 full-time professionals and operates on a 24/7 basis. EG-CERT provides support in protecting national critical information infrastructure, especially in the ICT sector and in the financial sector. EG-CERT has provided expertise in investigating several incidents, including the well-known PHISH PHRY case (uncovered in Oct 2009) that involved a phishing ring of 100 individuals from Egypt and the USA. The NTRA sponsors a comprehensive national program for training cyber security professionals. During the past 18 months, the program provided internationally recognized certification for over 170 professionals from 38 organizations from the ICT sector, the banking/financial sector, and the academic sector.
  • 22. International Cooperation EG-CERT has signed cooperation agreements with the US-CERT, the South Korean Information Security Agency (KISA), and Cyber Security Malaysia. It is currently applying for membership in the Forum of Incident Response and Security Teams (FIRST). Egypt has participated in the ITU’s High Level Experts Group on Cyber Security (HLEG) that forwarded its recommendations to the Secretary General of the ITU late in 2008. Currently, Egypt chairs the ITU’s Council Working Group for Child Online Protection. Egypt is an observer of the OECD’s Committee for Information, Computer and Communications Policy (ICCP), including the working party on Information MCIT 4 Jan 2011 Security and Privacy (WPISP). We also participated in the OECD ministerial meeting held in South Korea (June 2008). Egypt is a member of the International Multilateral Partnership Against Cyber-Threats (IMPACT), that was initiated by Malaysia in 2008. IMPACT has effectively become the physical home of the ITU’s Global Security Agenda GCA.
  • 23. Developing Partnerships between American and Egyptian IT Firms:Building Business in the Middle East and Africa ITEC and NVTC
  • 24. 21 Information Technology Export Community, ITEC ITEC core consists of 34 members/companies. ITEC is serving 3726 Egyptian companies. ITEC focus on IT export and international business collaboration. ITEC core members have over LE 6.2 BN business volume , of which 50% is in international markets. Total employment of core members around 15,000 IT professionals.
  • 25.
  • 26.