December 7, 2022

News Blog Telopia

Highlighting the significance of accreditation and licensure for cybersecurity practitioners and repair suppliers

3 min read

In mild of Ghana’s digitization agenda and institution of the Cybersecurity Authority comes a agency dedication and assurance of the Authorities to advertise Data Communication and Expertise (ICT) and safe the ICT infrastructure of the nation.

Highlighting the proceedings for the reason that institution is the willingness of the federal government to push from its present third place within the Africa cybersecurity rating to the first place by 2023.

Imposing the Cybersecurity regulation, formulating the Cybersecurity Licensure framework, forcibly implementing the licensure of cybersecurity options and merchandise and issuing accreditation for Cybersecurity professionals and practitioners are the main bridges the federal government must cross if it desires to realize this feat.

The steaming anticipation for most individuals within the business for the reason that inception of the Act has been pivoting round areas regarding accreditation for Cybersecurity professionals and practitioners and the licensure of cybersecurity options and merchandise.

Though the specifics and particulars of the accreditation and licensure should not but spelt out, it’s value stating the benefit it provides to professionals, practitioners, the business and what it means going ahead.

Act 1038 establishes the Cyber Safety Authority; to control cyber safety actions within the nation, to advertise the event of cybersecurity within the nation and to supply for associated issues.

A significant inclusion within the Act is the Important Data Infrastructure (CII) directive. The CII directive aligns with the strategic imperatives of our Nationwide Cybersecurity Coverage and Technique, which seeks to construct a resilient digital ecosystem, safe digital infrastructure, develop nationwide capability, deter cybercrime, and strengthen cooperation.

See also  Showmax titles had been the most important winner at Emmys 2022

The underlying goal of this directive is to determine baseline cybersecurity necessities for all designated CII homeowners, set up the necessities and procedures for incident response, together with reporting mechanisms of cybersecurity incidents by designated CII homeowners, and set up the procedures for audit and compliance pursuant to part 38 of the cybersecurity act, 2020 (Act 1038).

Important infrastructure and delicate knowledge must be dealt with by certified and competent practitioners or licensed corporations. Certified and competent means individuals who’re really licensed and are outfitted with the required technicalities and information within the area. Licensed corporations will need to have met all the necessities wanted to supply the answer or promote the product.

A profound strategy to validating and verifying this qualification and authorization is thru the issuance of a license and accreditation. Subsequently, in that order, the Authorities seeks to construct a framework or scheme that can see to this course.

Because of this practitioners and organizations, by advantage of the accreditation and license, are sure to a code of conduct and ethics of apply which can guarantee some sanity within the business and shield the curiosity of practitioners, organizations, and their shoppers.

Enterprise homeowners or managers are due to this fact assured of some stage of confidence in individuals securing or dealing with their infrastructure.

Moreover, this may promote cybersecurity consciousness within the nation, result in the institution of extra cybersecurity coaching establishments or certification our bodies, problem establishments to enhance upon their options, coaching, and curriculums to suit the wants of the business, and in the end promote analysis and improvement packages aiming at streamlining and enhancing Data safety governance, danger, and compliance.


In regards to the author

Daniel Kwaku Ntiamoah Addai,

Pc/Cybersecurity, Digital/Reminiscence/Malware forensics, Forensic Investigation and Audit, Networking, and a very good researcher within the area of Data communication and know-how.