Webinar Recap: Cybersecurity and Data Breach Management in Kenya & Nigeria

Hosted by the Data Privacy and Governance Society of Kenya (DPGSK) and the Data Privacy Lawyers Association of Nigeria (DPLAN)

Key Topics Covered:

  1. Common Cybersecurity Threats in Kenya and Nigeria
  2. Legal Frameworks for Cybersecurity and Data Protection
  3. Emerging Trends and Future Preparedness
  4. Role of Data Protection Officers (DPOs)
  5. Cross-Border Data Transfers and Multinational Compliance

1. Common Cybersecurity Threats

Panelists: Cephas (Kenya) & Uchenna (Nigeria)

Key Threats Identified:

  • Insider Threats: Employees or trusted individuals misusing access (e.g., fraud, SIM swap scams).
  • Third-Party Risks: Vulnerabilities from vendors/suppliers with weak security controls.
  • Social Engineering: Phishing, scams, and manipulation (e.g., fake “bank official” calls).
  • Ransomware: Attacks targeting critical infrastructure (e.g., healthcare, banking).
  • Legacy Systems: Outdated tech in organizations (especially public sector) increasing vulnerability.

Examples:

  • Kenya: SIM swap fraud, government database breaches.
  • Nigeria: Mobile banking scams, ransomware attacks on fintech platforms.

2. Legal Frameworks

Panelists: Queen Esther (Nigeria) & Daphne (Kenya)

Nigeria:

  • Cybercrimes (Prohibition & Prevention) Act 2015: Criminalizes cyber offenses but lacks a dedicated enforcement agency.
  • Nigeria Data Protection Act (NDPA) 2023: Establishes the Nigeria Data Protection Commission (NDPC).
    • Gaps: Low public awareness, overlapping mandates, and no clear DPO qualifications.

Kenya:

  • Computer Misuse and Cybercrimes Act (2018): Focuses on criminal penalties but lacks preventive measures.
  • Data Protection Act 2019: Requires breach reporting within 72 hours.
    • Gaps: Overlap between regulators (e.g., ODPC, NC4), lack of sector-specific guidelines.

Shared Challenges:

  • Laws are reactive (punitive) rather than proactive (preventive).
  • Need for harmonized regional laws (e.g., like EU GDPR).

3. Emerging Trends (Next 5 Years)

Panelists: Cephas & Uchenna

Future Threats & Solutions:

  1. AI-Enabled Attacks: Deepfakes, automated hacking.
    • Solution: AI-driven defense systems.
  2. Blockchain Risks: Cryptocurrency fraud, smart contract exploits.
  3. Cloud Security Misconfigurations: Unsecured databases exposing sensitive data.
  4. Zero-Trust Architecture: Continuous authentication to limit insider risks.
  5. Cyber Insurance: Growing adoption to mitigate financial losses.

4. Role of Data Protection Officers (DPOs)

Panelists: Daphne & Queen Esther

Key Responsibilities:

  • Oversee compliance with data protection laws.
  • Lead breach response and reporting (e.g., notifying regulators within 72 hours).
  • Train staff on cybersecurity best practices.

Challenges:

  • Conflict of Interest: DPOs often lack independence (e.g., dual roles as IT staff).
  • Funding: SMEs struggle to afford trained DPOs.
  • Awareness: Many organizations misunderstand the DPO’s role.

5. Cross-Border Data Transfers

Panelist: Cephas (Kenya)

Kenya’s Approach:

  • Data Protection Act: Requires “security safeguards” for cross-border transfers.
  • Localization Rules: Critical data must be stored in Kenya or have a local copy.
  • Multinationals: Must comply with Kenyan laws if processing citizens’ data.

Nigeria: Similar requirements under NDPA, but enforcement is evolving.


Closing Thoughts

Panelists’ Recommendations:

  1. Collaboration: Cybersecurity and data privacy teams must work together.
  2. Harmonization: Advocate for Africa-wide data protection laws (like GDPR).
  3. Proactive Measures: Invest in AI/blockchain defenses and cyber insurance.
  4. Transparency: Report breaches early to maintain trust.

Quote from Panelist:
“Good cybersecurity enables data protection, and good data protection promotes privacy awareness.”

I O

I O

Ian Olwana supports African organisations in turning data protection laws into practical, sustainable governance practices.

http://datagovernance.africa

Leave a Reply

Your email address will not be published. Required fields are marked *