Webinar Recap: Cybersecurity and Data Breach Management in Kenya & Nigeria
Hosted by the Data Privacy and Governance Society of Kenya (DPGSK) and the Data Privacy Lawyers Association of Nigeria (DPLAN)
Key Topics Covered:
- Common Cybersecurity Threats in Kenya and Nigeria
- Legal Frameworks for Cybersecurity and Data Protection
- Emerging Trends and Future Preparedness
- Role of Data Protection Officers (DPOs)
- Cross-Border Data Transfers and Multinational Compliance
1. Common Cybersecurity Threats
Panelists: Cephas (Kenya) & Uchenna (Nigeria)
Key Threats Identified:
- Insider Threats: Employees or trusted individuals misusing access (e.g., fraud, SIM swap scams).
- Third-Party Risks: Vulnerabilities from vendors/suppliers with weak security controls.
- Social Engineering: Phishing, scams, and manipulation (e.g., fake “bank official” calls).
- Ransomware: Attacks targeting critical infrastructure (e.g., healthcare, banking).
- Legacy Systems: Outdated tech in organizations (especially public sector) increasing vulnerability.
Examples:
- Kenya: SIM swap fraud, government database breaches.
- Nigeria: Mobile banking scams, ransomware attacks on fintech platforms.
2. Legal Frameworks
Panelists: Queen Esther (Nigeria) & Daphne (Kenya)
Nigeria:
- Cybercrimes (Prohibition & Prevention) Act 2015: Criminalizes cyber offenses but lacks a dedicated enforcement agency.
- Nigeria Data Protection Act (NDPA) 2023: Establishes the Nigeria Data Protection Commission (NDPC).
- Gaps: Low public awareness, overlapping mandates, and no clear DPO qualifications.
Kenya:
- Computer Misuse and Cybercrimes Act (2018): Focuses on criminal penalties but lacks preventive measures.
- Data Protection Act 2019: Requires breach reporting within 72 hours.
- Gaps: Overlap between regulators (e.g., ODPC, NC4), lack of sector-specific guidelines.
Shared Challenges:
- Laws are reactive (punitive) rather than proactive (preventive).
- Need for harmonized regional laws (e.g., like EU GDPR).
3. Emerging Trends (Next 5 Years)
Panelists: Cephas & Uchenna
Future Threats & Solutions:
- AI-Enabled Attacks: Deepfakes, automated hacking.
- Solution: AI-driven defense systems.
- Blockchain Risks: Cryptocurrency fraud, smart contract exploits.
- Cloud Security Misconfigurations: Unsecured databases exposing sensitive data.
- Zero-Trust Architecture: Continuous authentication to limit insider risks.
- Cyber Insurance: Growing adoption to mitigate financial losses.
4. Role of Data Protection Officers (DPOs)
Panelists: Daphne & Queen Esther
Key Responsibilities:
- Oversee compliance with data protection laws.
- Lead breach response and reporting (e.g., notifying regulators within 72 hours).
- Train staff on cybersecurity best practices.
Challenges:
- Conflict of Interest: DPOs often lack independence (e.g., dual roles as IT staff).
- Funding: SMEs struggle to afford trained DPOs.
- Awareness: Many organizations misunderstand the DPO’s role.
5. Cross-Border Data Transfers
Panelist: Cephas (Kenya)
Kenya’s Approach:
- Data Protection Act: Requires “security safeguards” for cross-border transfers.
- Localization Rules: Critical data must be stored in Kenya or have a local copy.
- Multinationals: Must comply with Kenyan laws if processing citizens’ data.
Nigeria: Similar requirements under NDPA, but enforcement is evolving.
Closing Thoughts
Panelists’ Recommendations:
- Collaboration: Cybersecurity and data privacy teams must work together.
- Harmonization: Advocate for Africa-wide data protection laws (like GDPR).
- Proactive Measures: Invest in AI/blockchain defenses and cyber insurance.
- Transparency: Report breaches early to maintain trust.
Quote from Panelist:
“Good cybersecurity enables data protection, and good data protection promotes privacy awareness.”

