WiKi Security Skip to main content
Background

Feasibility Study (F/S) for Tanzania Cybersecurity Training / Certification Center Project was successfully completed.

Feasibility Study (F/S) for Tanzania Cybersecurity Training / Certification Center Project was successfully completed.

Feasibility Study (F/S) for Tanzania Cybersecurity Training / Certification Center Project was successfully completed.

   The Tanzania ICT Commission recognizes the importance of cybersecurity at the national level, and as part of this, we are pursuing a national cybersecurity policy with great interest in fostering professional experience.

   The Korean government agency KISA (Korea Internet & Security Agency) and the Tanzania Government ICT Commission signed a project agreement for the establishment of the "Tanzania Cybersecurity Training/Certification Center" as part of the "Feasibility Study (F/S) for Tanzania Cybersecurity Training/Certification Center." KISA signed an agreement with WikiSecurity Co., Ltd., a specialized cybersecurity company, for the execution of the project.

   From June to December 2022, for a period of six months, they conducted a current status survey, best practice benchmarking, and TO-BE model design for the establishment of a national-level Cybersecurity Training / Certification Center in Tanzania.

The main tasks carried out by WikiSecurity Co., Ltd. in this project are as follows:

  1. Consultation The consultation will be conducted to understand the current status of cybersecurity education. Issues and challenges of the status quo will be discussed to determine potential solutions. The consultation will also focus on the future scope/requirements based on the ministry's strategies. Identified future scope and requirements will be incorporated into the TO-BE model.

  2. AS-IS Analysis AS-IS analysis will be used to collect the current status, including interviews, research, and surveys about the cybersecurity environment of Tanzania.

  3. Best Practices Benchmark Along with the establishment of the AS-IS, the review of best practices in cybersecurity training across the world will be conducted to find the most efficient and effective methods. The outcome of the reviews will be used to determine the TO-BE model.

  4. Gap Analysis Gap analysis will be conducted to determine the gap between the current status and future scope, and will be used to design the TO-BE model. Insights from the best practices review will be considered during the gap analysis.

  5. TO-BE Model Design Based on the issues and challenges identified from the gap analysis, and the future strategies of the ministry, the TO-BE model will be determined. The TO-BE model will capture the current unfulfilled requirements, future requirements, and scope of cybersecurity training in Tanzania.

  6. Feasibility Analysis Social, economic, and technical feasibility analyses of each option will be provided. Based on the feasibility analysis, the most probable option will be identified.

  7. Implementation Plan Based on the selected most feasible option, an implementation plan will be created. The plan will include detailed subsections, such as security devices or software, the construction of a 4-story building, and the training courses and contents

Conference
Mounts. Made By Admin

© 2016. All Rights Reserved