Israel To Assist Nigeria With Cybersecurity

Israel has pledged to assist Nigeria in tackling cyber-crime and internal insecurity through the use of modern technology.

This was announced by Guy Feldman, the Israeli ambassador to Nigeria, in Abuja‎ at a conference tagged: ‘Homeland and Cyber Security’.

Feldman said there was need for all hands to be on deck to address the ugly trend of cyber-crime in Nigeria. He said Israel is a small country but it has a vast experience in cyber security, due to its technology and human capital development.

Feldman emphasised the need to deploy hi-tech technology, surveillance cameras and security gadgets to Nigeria’s strategic sectors such as the financial and oil sectors.

The ambassador said that both countries were already discussing how to strengthen ties and enhance business/security relations.

According to thecable.ng, Feldman described Nigeria as the “Lion of Africa’’ which deserves all the support from the international community to evolve a virile and prosperous nation.

He said Israel has the technology and human resources to deal with the cyber security challenge.  And Nigeria’s Minister of Interior Abdulrahman Dambazau emphasised the need to enhance cyber security. His message was that Nigeria would continue to collaborate with Israel and other foreign countries.

Aviad Marco, an Israeli security expert, who delivered a lecture on the efforts at tackling cyber-crime, described the phenomenon as a new form of terrorism. Marco said that the activities of hackers, especially on sensitive database, could bring a country down if not checkmated.

Meanwhile, Nigeria has been receiving foreign support on other homeland security issues as well: The Office of International Narcotics and Law Enforcement within the United States Embassy, in collaboration with the Atlanta Police Department and the Nigeria Police Force, have concluded a one-week Fingerprint Analysis and Forensics training program for 66 police officers, according to punchng.com.

The program was aimed at establishing a US-trained group of Nigerian police investigators skilled in the proper recognition, documentation, and development of latent fingerprint evidence captured from a crime scene.

I-HLS:         African States Quick To Adopt Network Surveillance:

 

« Cyber Security Market Is In A People-Power Crisis
Both Police & Business Must Deal With Cyber Extortion »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

Detack

Detack

Detack is an independent supplier of IT security auditing and consulting services.

Jamcracker

Jamcracker

Jamcracker is a cloud services management and cloud governance solutions company, with more than a decade of experience providing industry leading software and services.

Radiflow

Radiflow

Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

ProcessUnity

ProcessUnity

ProcessUnity is a leading provider of Third-Party Risk Management software, helping companies remediate risks posed by third-party service providers.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

PureSoftware

PureSoftware

PureSoftware is a global software products and digital services company that is driving transformation for the world’s top organizations across various industry verticals.

Staris

Staris

Human based defense is dead. Staris is reinventing application security for an increasingly AI driven world.

aiComply

aiComply

aiComply's AI-driven platform offers automated intelligence for an efficient cybersecurity compliance workflow, eliminating onerous manual and time-consuming paperwork.