WEBVTT

00:00.260 --> 00:03.510
- Behind this question of yours

00:03.510 --> 00:06.150
is a fundamental concept

00:06.150 --> 00:09.010
that we would strongly recommend

00:09.980 --> 00:11.266
to be used

00:11.266 --> 00:14.540
when approaching cyber security

00:15.720 --> 00:16.553
as a whole.

00:16.553 --> 00:20.470
Which is the concept of capability.

00:20.470 --> 00:22.750
Capability approach to cyber security.

00:22.750 --> 00:25.260
The concept of capability

00:26.460 --> 00:29.710
means that any capability

00:29.710 --> 00:32.310
including cyber security capability,

00:32.310 --> 00:36.670
must be approached, focused on doctoring,

00:36.670 --> 00:40.470
organization, leadership, material,

00:40.470 --> 00:43.230
personal training and interoperability.

00:43.230 --> 00:46.970
Without interoperability,
at the technical,

00:46.970 --> 00:49.490
and the semantic, and at the human level,

00:49.490 --> 00:54.470
one cannot do whatever we
need to do in cyber security.

00:54.470 --> 00:57.710
Hence corporation
without interoperability,

00:57.710 --> 00:59.970
cooperation is not achievable.

00:59.970 --> 01:03.480
Because, look, if you don't
speak the same language,

01:03.480 --> 01:05.010
I'm not speaking about English,

01:05.010 --> 01:06.710
or French, or Portuguese.

01:06.710 --> 01:09.160
I'm speaking about the same semantics.

01:09.160 --> 01:11.640
I'm speaking about when you and me

01:11.640 --> 01:13.820
speak about cyber security,

01:13.820 --> 01:17.430
we both know what we are talking about.

01:17.430 --> 01:18.913
This is interoperability.

01:19.830 --> 01:21.980
Also, at the technical level,

01:21.980 --> 01:26.200
machines, computers must
exchange information

01:26.200 --> 01:29.390
in order for knowledge

01:29.390 --> 01:31.400
and wisdom come out of it.

01:31.400 --> 01:34.630
And people, regardless
of their nationalities,

01:34.630 --> 01:39.060
of their languages, of their
cultures, making the same,

01:39.060 --> 01:41.330
making sense out of that information.

01:41.330 --> 01:46.330
So, interoperability, is in
this area of cyber security

01:46.680 --> 01:50.830
a very, very important
matter that must be,

01:50.830 --> 01:54.340
and should be taken into
account from the very beginning.

01:54.340 --> 01:57.100
That's the reason why, as I've shown

01:57.100 --> 01:59.570
in my presentation, our strategy.

01:59.570 --> 02:04.570
The second version of our
strategy has a part solely

02:04.720 --> 02:07.560
dedicated to concepts.

02:07.560 --> 02:11.780
We define the concepts
for every national citizen

02:11.780 --> 02:16.740
that uses that strategy to
know what we are talking about,

02:16.740 --> 02:19.520
when we speak about cyber
space, cyber security,

02:19.520 --> 02:22.440
cyber defense, and cyber crime.

02:22.440 --> 02:24.403
This is something that,

02:25.846 --> 02:28.510
is not, is afterwards helping

02:28.510 --> 02:32.530
people to change their culture
and change their minds.

02:32.530 --> 02:33.363
Okay?

02:35.980 --> 02:39.620
This is so important that if it wasn't,

02:39.620 --> 02:42.870
if it wasn't for that,
we wouldn't probably

02:42.870 --> 02:44.023
be standing here.

02:45.660 --> 02:49.170
These 41 nations exchanging
information together,

02:49.170 --> 02:50.870
and sharing their own practices.

02:50.870 --> 02:54.180
So, and also, the fact that,

02:54.180 --> 02:58.490
this event was organized,
was definitely helped

02:58.490 --> 03:02.410
by the existence of
computers, of networks.

03:02.410 --> 03:03.820
And the theme,

03:03.820 --> 03:06.250
that is across the board,

03:06.250 --> 03:08.700
for both computers and networks.

03:08.700 --> 03:10.830
Which is information in cyber security

03:10.830 --> 03:14.630
because cyber security
is very, very relevant

03:14.630 --> 03:18.380
for resilience of the
computers, of the networks,

03:18.380 --> 03:23.040
and for, to guarantee that
information is not compromised,

03:23.040 --> 03:27.140
is not misused, and is
not changed and tweaked,

03:27.140 --> 03:30.360
in order for us to develop

03:30.360 --> 03:35.180
wrong decisions based on fake information.

03:35.180 --> 03:39.830
So, this is, what you've
just asked is, I think,

03:39.830 --> 03:44.830
the pillar that is
actually driving us to come

03:45.180 --> 03:49.933
to Africa Endeavor and to
AFRICOM-organized event

03:51.960 --> 03:54.020
such as this event.

03:54.020 --> 03:57.910
I think these events are
absolutely fundamental

03:57.910 --> 04:02.360
to people from different cultures,
from different countries,

04:02.360 --> 04:06.403
that by the end of the
day, share the same pains.

04:07.830 --> 04:11.740
To change the way they,

04:11.740 --> 04:13.300
based on different maturities,

04:13.300 --> 04:14.403
in which they are.

04:15.530 --> 04:18.030
To share the ways they,

04:18.030 --> 04:23.030
the actions they have in
place to mitigate those pains.

04:23.050 --> 04:25.210
By sharing that

04:26.560 --> 04:29.253
knowledge and that experience,

04:30.460 --> 04:32.000
by the end of the conference,

04:32.000 --> 04:35.570
everybody will get out of here more rich,

04:35.570 --> 04:38.310
more knowledgeable, and more resilient,

04:38.310 --> 04:42.640
to sustain any attack that
may come in the future.

04:42.640 --> 04:44.470
And, that's for sure.

04:44.470 --> 04:47.133
They will come in the future, new attacks.

04:47.133 --> 04:50.700
By creating this network, we will know,

04:50.700 --> 04:53.760
we will attach faces to names,

04:53.760 --> 04:55.860
and we'll know who to call to

04:56.900 --> 05:00.353
in order for us to be
helped on solving a problem.

