Articles from KICTANet 21 August 2023

KICTANet Newsletter

[View this in your browser.](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCJmNWFiYTM2MWYxZWUiLGZhbHNlXQ)

Welcome to our weekly newsletter, where we bring you the latest updates and developments in the world of technology and policy in Kenya and beyond.

Highlights: Training on Online Gender-Based Violence for Law Enforcement

Digitalization has increased instances and the intensification of online violence within the digital sphere due to anonymity, automation, remote action, easy accessibility, and dissemination. Consequently, victims are being silenced and pushed out of digital spaces. Online gender-based violence is an action by one or more people that harm others based on their sexual or gender identity or by enforcing harmful …

[Read more](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCI3NThmODI1ZjAxNWYiLGZhbHNlXQ)

(www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCI3NThmODI1ZjAxNWYiLGZhbHNlXQ)

Training on Online Gender Based Violence for Law Enforcement Sector

Date: 17th August 2023 Time: 8:00 am to 4:30 pm Venue: Royal Tulips Hotel Nairobi Introduction KICTANet in partnership with GIZ is implementing a project on Online Gender Based Violence in Kenya. The Project has two parts one on qualitative and quantitative research on online gender-based violence in Kenya and one capacity building on online gender-based violence for women in …

[Read more](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCJjZWJlMzZjMGU1MzUiLGZhbHNlXQ)

What You Need to Know About Data Governance and Why it Matters

[The benefits of data governance for the public and private sectors](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCI3NTJiZDM4NGFlMDkiLGZhbHNlXQ)

Data governance is a set of rules, procedures, and practices that leverage data as an asset for wealth creation. This article explains what data governance is and why it is important for both the public and private sectors.

[Read more](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCI3NTJiZDM4NGFlMDkiLGZhbHNlXQ)

Worldcoin Project Runs into Kenyan Turbulence

By John Walubengo The Cabinet Secretary in charge of Interior Security, Prof. Kithure Kindiki, ordered the Kenyan operations of a startup organization called Worldcoin to stop last week. This came after the media reported long queues of Kenyans who were receiving 50 USD, or about Ksh 7,000, for simply looking at a shiny globe-like object called the Orb. The Communication …

[Read more](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCJiZmE1MzRkYWJkOTciLGZhbHNlXQ)

[Worldcoin -TheOrb Image Credits: Worldcoin](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCJiZmE1MzRkYWJkOTciLGZhbHNlXQ)

Cyberattacks on Critical Infrastructure: What You Need to Know

[Computer code seen on a screen with a skull representing a computer virus attack. Photo: Shutterstock Images](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCIxNzU0MWE4ZDI1M2YiLGZhbHNlXQ)

Learn what critical infrastructure is, why it is important, and how cyberattacks can affect it. Find out the common types of cyberattacks and how to prevent them.

[Read more](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCIxNzU0MWE4ZDI1M2YiLGZhbHNlXQ)

Policy Brief: Kenya’s Cybersecurity Capacity Building Needs Outlined

The “Mapping Kenya’s Cybersecurity Capacity-Building Needs” policy brief addresses the growing need for cybersecurity capacity-building in Kenya.

[Read more](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCIyMGJmNzE0Y2UzNWEiLGZhbHNlXQ)

[Cyber threats are growing amid the coronavirus pandemic](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCIyMGJmNzE0Y2UzNWEiLGZhbHNlXQ)

How to Best Represent Experiences of Persons with Disabilities.

[Accessibility computer icon](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCIwZWM4NDMyMjYwOTEiLGZhbHNlXQ)

Whilst browsing the internet, I stumbled upon two photos. The first photo showcased a woman wearing glasses and sitting in a wheelchair while using a laptop. I had planned to use this free stock photo for an article I was working on. It perfectly matched the theme and highlighted the involvement of people with disabilities and women in the digital …

[Read more](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCIwZWM4NDMyMjYwOTEiLGZhbHNlXQ)

Kenya’s Cyberspace Under Attack: A Call for Multistakeholder Approach

Kenya’s cyberspace experienced a cyber attack from a group calling itself ‘Anonymous Sudan’, believed to be hired cyber-mercenaries from Eastern Europe. The attack targeted critical government and private sector services, causing servers to shut down. Defending against such attacks requires a deliberate, long-term, multistakeholder approach, as outlined in Kenya’s National Cybersecurity Strategy.

[Read more](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCI4MTU4Njc1Y2NjZGYiLGZhbHNlXQ)

[Data-privacy-Mati Mango](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCI4MTU4Njc1Y2NjZGYiLGZhbHNlXQ)

E-Citizen Attack: How Cyber Insecurity Enables Inaccessibility

[Logo of the e-citizen website](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCIyNWI3NWExM2ZkYzYiLGZhbHNlXQ)

The government of Kenya’s e-services is under attack. The e-Citizen platform, which hosts several essential public services and sensitive data, came under a distributed denial of service (DDoS) attack. For days now, no one can access these crucial services online. A collective of hackers claiming to be associated with Anonymous Sudan took responsibility. By Thursday, 27th of July, Kenyans could …

[Read more](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCIyNWI3NWExM2ZkYzYiLGZhbHNlXQ)

KICTANet Statement on Revised Zero Draft at OEWG Fifth Session

KICTANet’s statement on the revised zero draft during the Fifth Substantive Session of the OEWG, including suggestions for stakeholder contributions to the implementation of various proposals.

[Read more](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCI5MTdkODg4ZGU4MGQiLGZhbHNlXQ)

[Ms Grace Githaiga at the Open-ended Working Group](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCI5MTdkODg4ZGU4MGQiLGZhbHNlXQ)

Visit Our Socials

We always want to engage you on our social media pages.

[Check it out](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCJmNDEzZjkzNmQwZmQiLGZhbHNlXQ)

[Unsubscribe](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCI0MzVlNzhjOTI5ZmEiLGZhbHNlXQ) | [Manage your subscription](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCI1NzU3ZmVjMjUxMjMiLGZhbHNlXQ)
[facebook](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCI0Mjk0NDQ4ZWEzZWQiLGZhbHNlXQ) [twitter](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCJmN2Q1NDBkZWIwOGEiLGZhbHNlXQ) [instagram](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCIyNDQyYjliYzFiMzQiLGZhbHNlXQ) [youtube](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCI4MGY3YjNlOTFjNWMiLGZhbHNlXQ) [linkedin](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCJkZWMyMDU1NGFkNGUiLGZhbHNlXQ) [custom](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCJmYWNkYTVhYzViNjMiLGZhbHNlXQ)

[Email Marketing Powered by MailPoet](www.kictanet.or.ke?mailpoet_router&endpoint=track&action=click&data=WyIzMiIsImQ4YTUxYjEzN2Y5OWI0OGE4NmQwMDUyOGFhZGNhMWMxIiwiMjEiLCJjNzQzYmI3YjZjNTUiLGZhbHNlXQ)