Cyber Security Report Q2 2023-2024
Cyber Security Report Q2 2023-2024
Report
32 nd Edition
October - December 2023
A report by:
The National KE-CIRT/CC
+254-703-042700 or
+254-730-172700
[email protected]
www.ke-cirt.go.ke
NATIONAL KE-CIRT/CC
Strategic Direction
Our Vision
Digital Access for All
Our Mission
Enabling a Sustainable Digital Society through
Responsive Regulation
Cybersecurity Mandate
The 5th Strategic Plan (2023 - 2027) of the Communications Authority of Kenya (CA), aims
to build upon past achievements, tackle present challenges and opportunities in the
evolving ICT landscape and enhance the Authority’s performance in the digital access
for all. This plan will guide the Authority’s activities and ensure its continued
contribution to the growth and development of the ICT sector in Kenya.
The Kenya Information and Communications Act (KICA), mandates the Authority to
develop a framework for facilitating the investigation and prosecution of cybercrime
offences. It is in this regard, and in order to mitigate cyber threats and foster a safer
Kenyan cyberspace, that the government established the National Kenya Computer
Incident Response Team – Coordination Centre (National KE-CIRT/CC).
The National KE-CIRT/CC detects, prevents and responds to various cyber threats
targeted at the country on a 24/7 basis. It also acts as the interface between local and
international ICT service providers whose platforms may be used to perpetrate
cybercrimes, and our Judicial Law and Order Sector which investigates and prosecutes
cybercrimes. The enactment of the Computer Misuse and Cyber Crimes Act (CMCA) has
further enhanced the multi-agency collaboration framework through the establishment
of the National Computer and Cybercrimes Coordination Committee (NC4).
02
NATIONAL KE-CIRT/CC
Director General's
Perspective This year marked the fourth consecutive year that the
Authority has spearheaded activities towards
national commemoration of the global October
Cybersecurity Awareness Month (OCSAM).
Consequently, the Authority rolled out the inaugural
"CA Cybersecurity Bootcamp & Hackathon Series"
targeting students in universities and other
institutions of higher learning. The overarching theme
of the series was, “The Paradox of Progress: Securing
a Digital Nation”.
The Authority, as the regulator for the ICT sector in In the spirit of devolution, we broadened the scope of
Kenya, is mandated to develop a national cyber the series this year to cover four other counties
security management framework. We are executing (Eldoret, Mombasa, Kisumu and Nyeri) in addition to
this responsibility through the National Kenya Nairobi. We were impressed by the level of
Computer Incident Response Team – Coordination enthusiasm witnessed this year, with a record over
Centre (National KE-CIRT/CC), a multi-agency 6,000 students expressing interest to take part in the
national collaboration framework that is Kenya’s bootcamp and hackathon competitions. The top
point of contact on cyber security matters. teams in the regional bootcamp and hackathon
series qualified for the national competition which
Since the operationalization of the National KE- was held in Nairobi, with the winning teams in the
CIRT/CC over seven years ago, we have noted that bootcamp and hackathon competition both coming
citizens and businesses alike are increasingly being from Nairobi County.
targeted through sophisticated cyber attacks. In that
7-year period alone, we detected over 1.6 billion cyber Granted, the management of cybercrime is not the
threat attempts targeted at critical information sole responsibility of government. The interconnected
infrastructure (CII) service providers and nature of our digital world demands a unified front
subsequently issued over 31 million cyber threat amongst governments, law enforcement agencies,
advisories to organisations in both the private and private enterprises, and cybersecurity experts,
public sectors. Cyber threat activity has grown among others. Collaboration not only enhances
exponentially, and in the last 3 months alone, the cyber threat detection and response capabilities but
National KE-CIRT/CC detected over 1.2 billion attacks. also facilitates the exchange of best practices and
Most of these attacks exploited system cyber threat intelligence, undertaking joint simulation
vulnerabilities, which may be attributed to the exercises, conducting vulnerability assessments and
proliferation of Internet of Things (IoT) devices which penetration testing, all aimed at fostering resilience in
are inherently insecure. the face of dynamic cyber threats.
Over the same period, the Digital Forensics Lab (DFL) In alignment with the Authority's 5th Strategic Plan
has facilitated the investigation of 9,442 cyber crimes (2023 - 2027), we will continue building our national
and 560 requests for digital forensics analysis cybersecurity capacity and capabilities by shifting
spanning network forensics, disk forensics and our focus on emerging and dynamic technologies
mobile forensics. This has enabled the successful such as artificial intelligence and machine learning,
prosecution of various cybercrimes and other quantum computing, post-quantum cryptography,
technology-related crimes. In order to fully respond cloud security, and cyber risk visibility, amongst
to the ever-evolving cyber threat landscape, there is others.
an urgent need to build a critical pool of
cybersecurity professionals equipped with the
necessary skills and tools to be on the frontline in
Mr. David Mugonyi, MBS
safeguarding our country's digital assets. Director General/CEO
03
NATIONAL KE-CIRT/CC
Malware
Malware propagation has surged, infiltrating systems with harmful software, while phishing attacks
have become even more prevalent, targeting unsuspecting users through deceptive emails and
websites. Hackers commonly target to steal user logins, credit card credentials and other types of
personal and financial information, as well as gain access to private databases.
* Ransomware is an advanced sub-type of malware that enables cyber threat actors to gain control of a system and limit users’ access to
files unless a ransom is paid.
Ransomware
Ransomware attacks have spiked considerably, leveraging sophisticated techniques to extort valuable data. The rise of
cryptocurrencies is credited with helping to fuel ransomware attacks by allowing ransom demands to be paid anonymously. As
a result, instances of cryptojacking have seen a sharp rise. Cryptojacking is characterized by cyber criminals hijacking third-
party home or work computers to “mine” for cryptocurrency. Because mining for cryptocurrency generally requires immense
amounts of computer processing power, hackers can make money by secretly piggybacking on someone else’s systems.
Social Engineering
It is often said that the human element is the weakest link in cybersecurity. However, it may well be the
most important. Social engineering tactics have evolved, manipulating human psychology to breach
security protocols. This can expose sensitive information or lead to the execution of malicious content.
Latest social engineering trends globally include business email compromise (BEC), supply chain
attacks, and search engine optimization (SEO) poisoning.
Cloud Security
Cloud security attacks have intensified, exploiting vulnerabilities within cloud infrastructures. Securing
cloud environments presents unique challenges due to data breaches, misconfigurations and insider
threats. Specific security measures and best practices are required for effective cloud security. This
may include identity and access management (IAM), data loss prevention (DLP) and incident response
and forensics.
04
NATIONAL KE-CIRT/CC
1,292,285,408 943.01%
During the three month period between October and December 2023, the National KE-CIRT/CC detected over 1.2 billion cyber threat
events, which represented a 943.01% increase from the 123 million threat events detected in the previous period (July to September
2023). This exponential increase is attributed to enhancement of our cyber threat monitoring capabilities and the existence of
vulnerable systems due to system misconfigurations. Further, the increased exploitation of “system vulnerabilities” is also aligned to
global trends, and relates to the global surge in the deployment and use of Internet of Things (IoT) devices which are inherently
insecure.
0 500,000,000 1,000,000,000
8,061,267 44.44%
In response to the detected cyber threat events, the National KE-CIRT/CC issued 8,061,267 advisories between the period October
to December 2023, which represented a 44.44% increase compared to the 5,580,972 advisories that were issued during the previous
period, July to September 2023. There was a significant increase in the number of advisories related to system attacks during this
period, with the advisories aimed at guiding users on keeping system software up to date, including regular patching of
vulnerable systems, using strong passwords and multi-factor authentication, and hardening of firewall configurations.
05
NATIONAL KE-CIRT/CC
Misconfiguration attacks can be attributed to limited investment in cybersecurity, outdated systems, default
system login credentials, and limited cyber risk visibility, thereby raising the susceptibility of CIIs to cyber
attacks.
1,269,267,620
BRUTE FORCE
9,670,849
MALWARE
MOBILE APP
ATTACKS 13,221,698
52,705
Comparison of cyber threat advisories (per vector) issued during the period October to December 2023.
Malware
Brute Force
System Attacks
Mobile Application
DDoS
06
NATIONAL KE-CIRT/CC
Malware Trends
Threats Detected Advisories Issued
13,221,698 781,561
75.94% 397.87%
During the three month period between October to December 2023, the National KE-CIRT/CC detected
13,221,698 malware threat attempts targeting critical infrastructure service providers. This represented a
75.94% increase from the previous period, July to September 2023.
Majority of the attacks were targeted at organisations within the ICT sector. Attackers targeted end-user
devices, web applications and networking devices belonging to Internet Service Providers (ISPs) and cloud-
based services. Most attackers exploited phishing campaigns and worms which is a type of computer virus
End-User Devices
Web Applications
Top Targeted Systems Networking Devices
Email Systems
ISPs
Cloud Service Providers
Top Affected Industries Government
Academia/Education
During the period, malware attacks were targeted at systems deemed to hold sensitive data such as personal
and financial information. The attack objectives were mainly to steal sensitive information such as personal
financial information, disrupt and sabotage systems and take control of entire networks for malicious
purposes.
To mitigate this risk, the National KE-CIRT/CC recommended the following actions to affected organizations:
Security by design, that is, developing software and hardware systems that are inherently secure.
Consider deploying asset management software for managing hardware and software inventories.
Deploying Domain-based Message Authentication, Reporting and Conformance (DMARC).
Improve end-user cyber hygiene and awareness in organizations, through capacity building of staff.
07
NATIONAL KE-CIRT/CC
72,536 2,041,236
31.96% 16.28%
During the three month period between October to December 2023, the National KE-CIRT/CC detected
72,536 web application attack attempts targeting critical infrastructure service providers. This represented
a 31.96% decrease from the previous period, July to September 2023.
Majority of the attacks were targeted at government systems. Attackers targeted user login credentials,
vulnerable web browsers and database servers belonging to government and Internet Service Providers
(ISPs). Most attackers exploited vulnerabilities in SSL and TLS security misconfigurations.
Login Pages
Session Cookies
Top Targeted Systems Database Systems
Cross-site requests forgery
File upload vulnerabilities
Government
ISPs
Top Affected Industries Cloud Services
Academia
During the period, web application attacks were targeted at systems regarded to hold sensitive data such as
user credentials used to authenticate systems, financial data, and public services.
The attack objectives were mainly to make services unavailable, manipulate databases and release sensitive
data for purposes of damaging organizations’ reputations.
To mitigate this risk, the National KE-CIRT/CC recommended the following actions to affected organizations:
Disabling SSL 3.0 support in system/ application configurations.
Upgrading end-of-life (EOL) products.
Apply the relevant patches and updates as provided.
08
NATIONAL KE-CIRT/CC
9,670,849 1,573,384
89.57% 169.34%
During the three month period from October to December 2023, the National KE-CIRT/CC detected 9,670,849
brute force attack attempts majorly targeting CII providers. This represented a 89.57% increase from the
previous period, July to September 2023.
Majority of the attacks were targeted at organisations within the ICT sector and government systems.
Attackers targeted user login credentials and database servers belonging to government organisations
and cloud-based services. Most attackers exploited vulnerabilities in the remote desktop protocol and
user login credentials.
Login Pages
Database Servers
Cloud Services
Top Targeted Systems Mail Servers
Point-of-Sale (PoS) Systems
Remote Access Systems
Cloud services
Top Affected Industries
Government
During the period, brute force attacks were targeted at systems deemed to hold sensitive data such as login
credentials and financial information.
The objective of these attacks was mainly to gain elevated privileges, gain unauthorized access and exfiltrate
sensitive data for financial gain.
To mitigate this risk, the National KE-CIRT/CC recommended the following actions to the affected organizations:
Implement patch management on devices running network-based services.
Implement appropriate access management with strong password management.
Disconnect devices from the network if not in use.
Update softwares to the latest versions.
09
NATIONAL KE-CIRT/CC
52,705 34,425
94.15% 378.59%
During the three month period October to December 2023, the National KE-CIRT/CC detected 52,705 mobile
application attack attempts targeting end-user devices. This represented a 94.15% increase from the
previous period, July to September 2023.
Majority of the attacks were targeted at end-user devices. Attackers targeted mobile devices and Android
TVs. Most attackers leverages malware to compromise end-user devices.
Mobile
Cryptominer
Top Targeted Exploits
Trojan
During the period, there was an increase in mobile application attacks targeted at end-user devices.
The perpetrators of these attacks mainly sought to steal sensitive user data such as PII, login credentials and
financial details for malicious purposes.
To mitigate this risk, the National KE-CIRT/CC carried out cyber awareness for end users recommending the
following actions:
Disable Android Debug Bridge (ADB) on mobile devices.
Only download applications from trusted sources.
Check application permissions.
Keep device and utilities software up to date.
10
NATIONAL KE-CIRT/CC
1,269,267,620 3,511,238
1041.94% 14.11%
0 500,000,000 1,000,000,000
ISPs
Top Affected Industries Cloud Service providers
System attacks were targeted at CII systems that hold sensitive data such as financial information. The
objectives of these attacks were to disrupt, compromise and sabotage essential systems and services on a
large scale.
To mitigate this risk, the National KE-CIRT/CC recommended the following actions to affected organizations:
Keep software up to date and apply patches as soon as they are released.
Use of strong passwords and multi-factor authentication.
Hardening of firewall configurations.
11
NATIONAL KE-CIRT/CC
270 10.30%
During the three month period October to December 2023, the National KE-CIRT/CC received 270 digital
investigation requests. This represented a 10.30% decrease from the last period, July to September 2023.
200
150
100
50
0
g
n
t
d
eft
t
e
en
en
ew
tio
in
au
us
Th
ly
m
m
Ab
a
Fr
N
ul
ge
on
te
a
ke
e
rB
ld
at
ci
in
in
rs
Fa
hi
e
In
D
nl
r
pe
yb
nf
C
g/
O
Im
I
C
ht
ki
ig
ac
yr
H
op
C
Digital Forensics
213 162.96%
During the three month period October to December 2023, the National KE-CIRT/CC received 213 forensic
requests. This represented a 162.96% increase from the previous period, July to September 2023.
200
150
100
50
0
Disk Forensics Mobile Forensics Network Forensics
12
NATIONAL KE-CIRT/CC
Digital Investigations
Trends
Hacking/Data Theft
12.5% Impersonation
21%
Fake News
25.1%
Online Fraud
19.9%
Child Abuse
Cyber Bullying
3.7%
17%
During the period, Facebook, X (formerly Twitter), Telegram, Instagram, YouTube, TikTok, Google,
WhatsApp and various blogs, were the top platforms that cyber threat actors leveraged to carry out
diverse online harms whose objectives included stealing sensitive data, youth radicalization, reputational
damage to individuals, revenge attacks and for financial benefit.
Most of the cases of impersonation reported to the National KE-CIRT/CC during the period were majorly
committed on Facebook, X, Telegram, Instagram and TikTok, with the motive being mainly political,
revenge attacks and for purposes of propagating fraud. Victims reported to have lost money and
consumer goods through these impersonating accounts. Also notable during this period was the use of
Telegram by kidnappers to demand ransom, in an attempt to force the victims' families to pay.
During this period, there was an increase in cases of incitement, cyber bullying and fake news, which
were primarily carried out on Facebook, X, Telegram, Instagram, YouTube, TikTok, various blogs, and
WhatsApp. The motives behind these included revenge and retaliation, youths radicalization, financial
benefit, political incitement and clickbait. These had the impact of fanning ethnic tensions, political riots
and violence that caused injuries to individuals, loss of life, reputation damage and financial loss to the
victims.
The National KE-CIRT/CC also received reports of hacking of personal accounts such as Gmail, YouTube,
X, Facebook, and WhatsApp, for purposes of data theft. There were also cases of copyright infringement,
which were associated with blogs and domains, as well as Facebook, X, Telegram, Instagram, YouTube,
TikTok, Google, and WhatsApp platforms.
To address these trends, the National KE-CIRT/CC has developed and rolled out a cyber awareness
campaign programme to raise the level of understanding about these online harms and to empower
Kenyans with the skills and knowledge needed to stay safe online.
13
NATIONAL KE-CIRT/CC
Mobile Forensics
85.9%
Fraud
Robbery
Theft
Murder
Top crimes for which digital forensics
Impersonation
investigations are requested
Incitement
Child Abuse
Data Breach
Cyberbullying
Mobile
Main types of forensic analysis
Disk
conducted
Network
14
NATIONAL KE-CIRT/CC
15
NATIONAL KE-CIRT/CC
The National KE-CIRT/CC Cybersecurity Committee (NKCC) draws its membership from over 50 public
and private sector organizations across various sectors in the country. All NKCC member organisations
operate CIIs. The main objective of the NKCC is to nurture trust networks amongst stakeholders, so as to
build capacity and facilitate the sharing of information on emerging cyber trends, and identify a
collective strategy to address these emerging issues.
The NKCC holds quarterly meetings during which the National KE-CIRT/CC updates members on
emerging cyber security matters. During these meetings, the various sector CIRTs are also given an
opportunity to apprise members on the emerging trends within their respective sectors. The 45th
Meeting of the NKCC was held on 29th November, 2023 at the African Advanced Level
Telecommunications Institute (AFRALTI), in Nairobi.
During the meeting, members discussed the rising frequency of attacks on critical systems. The
transport sector alerted members of a surge in Distributed Denial of Service (DDoS) and Supply Chain
Attacks mainly due to organisations having different contracts with diverse service providers. The
sector also reported the attempted spoofing attacks on satellite communication systems.
The 45th NKCC meeting coincided with a training on, "Cyber Incident Response, Crisis Management and
Digital Forensics" that was held from 20th November to 1st December 2023, during which over 60
members were taken through a rigorous, hands-on programme geared towards enhancing their
technical skills and knowledge.
16
NATIONAL KE-CIRT/CC
The focus of the conference was on capacity building amongst Kenya’s cybersecurity workforce. This
theme was mainly informed by the fact that an inadequate cybersecurity workforce is not only a local
challenge, but also a global one. The Authority brought together diverse sectors that included
academia, finance, telecommunications, energy, health, transportation, manufacturing, amongst
others. Discussions at the forum centred around effective, efficient and sustainable ways of building a
critical pool of local cybersecurity personnel, equipped with the skills, expertise and tools necessary to
safeguard Kenya’s digital transformation.
The following are some snapshots capturing the moments and discussions from the conference:
Mr. Christopher Wambua, Ag. Director General, Dr. Vincent Ngundi, Ag. Director, Cyber Security,
Communications Authority of Kenya, addressing Communications Authority of Kenya, making his
delegates remarks
Mr. Victor Guo, Huawei, President, Sub-Saharan Mr. Keniz Agira, Chairman, Kenya Cyber Security &
Africa Enterprise Business Group Forensics Association (KCSFA)
17
NATIONAL KE-CIRT/CC
Diverse stakeholders during the 2023 October Cyber Staff members of Communications Authority of
Security Awareness Month (OCSAM) Conference Kenya follow proceedings during the event
Panel session on Cyber Security in Practice: Panel session on Navigating the Cyber Security
Innovative Approaches to Develop and Identify Talent Landscape: Cyber Security Skills Needed
Cyber Security Capabilities Now and in the Future
Mr. Andy Chadwick, Head of Africa Cyber Network, Mr. Matano Ndaro (right), Director, Postal and
at the UK's Foreign Commonwealth and Telecommunications Services, Communications
Development Office (FCDO), during a panel session Authority of Kenya, awards a student during the
national competition
18
NATIONAL KE-CIRT/CC
Mr. Steven Zhang (right), Deputy CEO, Huawei Kenya Mr. Ndaro and Mr. Zhang share a light moment
awards a student during the national competition during the event
Mr. William Baraza (right), Director, AFRALTI, Mr. Baraza poses for a photo with the winning team
presents a student with an award from the Mombasa bootcamp competition
Mr. Jack Zhao (right), Huawei Kenyas, awards a Mr. Zhao celebrates with the winning team from the
student during the national competition Nyeri bootcamp competition
19
NATIONAL KE-CIRT/CC
Celebrating Excellence in
Cybersecurity: 2023 Bootcamp
and Hackathon Series Finale
This year marked the fourth consecutive year that the Authority has spearheaded national
commemorations of the October Cybersecurity Awareness Month (OCSAM) activities.
Consequently, we rolled out the inaugural "CA Cybersecurity Bootcamp & Hackathon Series
2023," targeting students in universities and in other institutions of higher learning.
The bootcamp competition was an intense and hands-on learning programme, aimed at
imparting core competencies and knowledge that are geared towards bridging the existing
cybersecurity skills and capabilities gap within the Kenyan context. The hackathon
competition, on the other hand, brought together cybersecurity enthusiasts and ethical
hackers in an event featuring curated challenges in a gaming format.
In the spirit of devolution, we broadened the scope of the series this year to cover four other
counties that included Eldoret, Mombasa, Kisumu and Nyeri, in addition to Nairobi. We were
impressed by the level of enthusiasm witnessed this year, with a record of over 6,000 students
expressing an interest to take part in the competitions.
The competition comprised two phases. The first, following closure of registration, entailed a
two-week session of online classes. At the end of the two weeks, participants took an online
exam. The top 30 students from the bootcamp and the top 100 students from the hackathon in
each region qualified for the second phase – the onsite competition. The onsite classes for the
bootcamp competition involved grouping the top 30 students in each region into teams of
three. These teams attended classes on information systems security from Monday
to Thursday, culminating in an exam on Friday. Results were determined
collectively, and the top three groups were recognized at the
regional awards ceremonies.
20
NATIONAL KE-CIRT/CC
The national competition brought together the winning teams from Nairobi, Nyeri, Kisumu,
Eldoret, and Mombasa in Nairobi. Held over two days, the event featured a rigorous, hands-on
programme that tested the students' technical skills and knowledge, that culminated in an
examination. Throughout the competition, the students showcased exceptional zeal and
teamwork in their pursuit of the coveted first prize.
The following are some photos of the students from the National Bootcamp and Hackathon
Competitions:
Cybersecurity experts in the making: Students fully engaged in the national bootcamp, honing their
skills to defend our digital infrastructure against the ever-evolving cyber threats
Unlocking cybersecurity solutions: Engaged in the national hackathon, students strategizing, coding,
and fortifying our defences in the journey towards Kenya's digital transformation
21
NATIONAL KE-CIRT/CC
Mr. Adam Lane (centre), Deputy CEO, Huawei Mr. Ndaro (third left), poses for a photo with the
Kenya, awards the bootcamp winners hackathon winners
KISUMU
His Excellency Dr. Mathew Owili (extreme left), Ms. Rosalind Muriithi (extreme left), Director,
Deputy Governor, Kisumu County, honours the Internal Audit and Risk Assurance,
bootcamp winners Communications Authority of Kenya, lauds the
hackathon winners
22
NATIONAL KE-CIRT/CC
ELDORET
Mr. Ezra Chiloba (second left), former Director Ms. Bhoke Christina Nchama (second left), Board
General, Communications Authority of Kenya, Member, Communications Authority of Kenya,
commends the bootcamp winners fetes the hackathon winners
MOMBASA
Dr. Mbwarali Kame (second right), CEC, Mr. Mahmud Noor (third left), Founder, Swahili Pot
Education and Digital Transformation, Hub, poses for a photo with the hackathon
Mombasa County, applauds the bootcamp winners
winners
NYERI
Mr. Victor Maina (second left), Principal Ms. Esther Muthoni Ndung’u (centre), CEC,
Officer, Central and Eastern Regional Office, Gender, Youth and Social Services, Nyeri
Communications Authority of Kenya, poses County, congratulates the hackathon winners
for a photo with the bootcamp winners
23
NATIONAL KE-CIRT/CC
Youth Mentorship in
Cybersecurity
The final component of the 2023 Bootcamp and Hackathon Series involved study tours for the 35
regional finalists from Nairobi, Mombasa, Eldoret, Nyeri and Kisumu, who had competed in both the
Bootcamp and Hackathon competition of the series. This phase was carried out in partnership with
various organizations in both public and private sector.
The study tour served as a mentorship opportunity for the finalists, and involved study visits to
partnering organizations. This gave the students first-hand practical experience on cybersecurity
operations as a way of translating theory to practice. The partnering organizations for the 2023 series
included the ICT Authority (ICTA), Konza Technopolis Development Authority (KoTDA), Kenya Network
Information Centre (KENIC), African Advanced Level Telecommunications Institute (AFRALTI), Technology
Service Providers of Kenya (TESPOK), Kenya Bankers Association (KBA), Safaricom PLC, Huawei
Technologies Kenya, Liquid Intelligent Technologies and Airtel Networks Kenya.
The winning teams from the regional bootcamp and Students from the national competition at the
hackathon at the Authority's premises National KE-CIRT/CC Monitoring Room
24
NATIONAL KE-CIRT/CC
The students on a study tour at Safaricom PLC's IT Mr. Njuguna, Safaricom PLC, takes a question from a
Security Operation Center (SOC) along Waiyaki Way, student
Nairobi
Students at the Kenya Network Information Centre A brief talk on the history of Konza Technopolis
(KeNIC) offices in Nairobi Development Authority (KoTDA) in Machakos County
Ms. Jessica Wanjohi (right), from Communications The students from the national competition pose for
Authority of Kenya, with a staff member from KoTDA a photo in front of the KoTDA offices
25
NATIONAL KE-CIRT/CC
Staff members from CA and and Huawei Kenya pose A staff member from Huawei Kenya performs a demo
for a photo with the students at the Huawei Training of an equipment at the Huawei Training Center
Center, at AFRALTI, Nairobi
Mr. Fidelis Muia, Director of Technical Services, Kenya Mr. Muia poses for a group photo with students at
Bankers Association (KBA), counselling the students the KBA offices in Nairobi
Mr. Emmanuel Emurugat from ICT Authority (ICTA), Staff from CA and AFRALTI pose for a group photo with
explaining to the students about the Presidential the students at AFRALTI grounds
DigiTalent Programme (PDTP)
26
NATIONAL KE-CIRT/CC
Future Insights on
Cyberecurity
In enhancing our national cybersecurity readiness and resilience
capabilities, we shift our focus on leveraging the new frontier of
emerging trends, going into 2024 and beyond.
These domains are the centre of our strategic focus as we move forward,
bringing our cybersecurity initiatives into a new era defined by
innovation, versatility, and unrelenting resilience.
27
NATIONAL KE-CIRT/CC
Thank
You
We're here to help. Report an incident.
Email
[email protected]
Hotlines
+254 703 042700
+254 730 172700
Website
www.ke-cirt.go.ke
Social Media
@KeCIRT
28