CTO assists with cybersecurity strategy

Make text smaller Make text larger

  • Present and future security: Bermuda’s cybersecurity strategy was discussed by a group of experts and Bermuda Government officials and ministers. From the left: Marisa Stones, Jamahl Simmons, Ronnie Viera, Walter Roban, Wayne Caines, Stu Daniels, Lovitta Foggo, Martin Koyabe, Michael Tucker

    Present and future security: Bermuda’s cybersecurity strategy was discussed by a group of experts and Bermuda Government officials and ministers. From the left: Marisa Stones, Jamahl Simmons, Ronnie Viera, Walter Roban, Wayne Caines, Stu Daniels, Lovitta Foggo, Martin Koyabe, Michael Tucker


Key needs, gaps and opportunities for Bermuda’s cybersecurity position have been identified in close consultation with members of the Commonwealth Telecommunications Organisation.

Representatives of the CTO were on the island to assist with Bermuda’s cybersecurity strategy.

The CTO is an intergovernmental organisation whose core functions include research and assignment services, training and capacity-building and conducting knowledge-sharing events.

It has extensive experience working with information communication and technology ministries, regulatory authorities and private-sector stakeholders on national cybersecurity strategies, national ICT strategies, regulatory frameworks, strategic planning for regulatory authorities and ICT ministries, egovernance and regulatory and operational capacity building.

Wayne Caines, Minister for National Security, said: “The CTO is working closely with the Department of ICT Policy and Innovation, specifically related to creating a robust cybersecurity framework for Bermuda.

“Last week, the CTO was on island supporting Bermuda, by providing technical assistance to the Cybersecurity Working Group for the development of Bermuda’s National Cybersecurity Strategy.

“The activities included conducting a series of workshops with relevant stakeholders to assess the cybersecurity maturity of Bermuda and facilitating a series of strategic planning sessions with stakeholders to develop strategic objectives of the first draft of Bermuda’s National Cybersecurity Strategy.”

“The goal of the sessions was to facilitate open dialogue and brainstorming among the stakeholders in order to identify gaps in Bermuda’s current cybersecurity posture. The process has assisted us in identifying key needs, gaps, and opportunities most pertinent to Bermuda’s cyber-ecosystem. The discussions have resulted in the development of the draft strategy and the identification of solutions for addressing priority needs. This included consideration of resource requirements, dependencies, potential roles, responsibilities, mechanisms and commitments to realise the proposed cybersecurity strategy.”

Mr Caines added: “Following the completion of the workshops, the CTO team will continue to work with the Cybersecurity Working Group to finalise the draft National Cybersecurity Strategy.

“A consultative process will then follow to ensure that the final National Cybersecurity Strategy is based on a shared vision.

“The draft Cybersecurity Strategy Report will be presented to all stakeholders, including those who didn’t actively take part in the workshop development process, at a consultative stakeholder workshop later this year. The CTO team will then work with Cybersecurity Working Group to finalise the National Cybersecurity Strategy, incorporating agreed modifications and comments.”

The Throne Speech included mention of the creation of a National Cybersecurity Strategy by the Cybersecurity Working Group.

The working group consists of volunteers made up of both public and private sector professionals who have been given the mandate to develop a robust strategy through consultation with relevant stakeholders.

The national cybersecurity strategy is a plan of actions to develop and strengthen the security and resilience of the cyberspace, infrastructure and information and communication technology services of a jurisdiction.

You must be registered or signed-in to post comment or to vote.

Published Mar 18, 2018 at 5:27 pm (Updated Mar 18, 2018 at 9:35 pm)

CTO assists with cybersecurity strategy

What you
Need to
Know
1. For a smooth experience with our commenting system we recommend that you use Internet Explorer 10 or higher, Firefox or Chrome Browsers. Additionally please clear both your browser's cache and cookies - How do I clear my cache and cookies?
2. Please respect the use of this community forum and its users.
3. Any poster that insults, threatens or verbally abuses another member, uses defamatory language, or deliberately disrupts discussions will be banned.
4. Users who violate the Terms of Service or any commenting rules will be banned.
5. Please stay on topic. "Trolling" to incite emotional responses and disrupt conversations will be deleted.
6. To understand further what is and isn't allowed and the actions we may take, please read our Terms of Service
7. To report breaches of the Terms of Service use the flag icon

  • Take Our Poll

    Today's Obituaries

    eMoo Posts