A graphic showing the connection routes of the world wide web.

G-SIRT’s never-ending battle to build cyber defense capacity

Defending Mauritius Against Cyber Threats

January 2021, Zahl 10.04

“The last three iterations of the Global Cybersecurity Index (GCI) published by the United Nations’ International Telecommunication Union have ranked Mauritius as the country most commit­ted to cyber security preparedness in Africa. How the Government Security Incident Response Team (G-SIRT) approaches capacity building — one of five pillars of criteria evaluated in the GCI — is evaluated here.

Importance of Capacity Building

The G-SIRT operates under the Information Technology Security Unit (ITSU) of the Ministry of Information Technology, Communication and Innovation. The ITSU emphasizes the importance of constant development of its technical staff to achieve its objectives, which are:

  • Implementing government policies regarding information technology (IT) security.
  • Assisting ministries/departments in implementing security standards.
  • Disseminating information on IT security.
  • Carrying out security audits.
  • Handling IT security incidents.

Cyber security awareness is accessible to a wide range of public officers through various deployment modes, such as:

  • IT security awareness presentations conducted on-site.
  • Circulation of fact sheets on security threats such as phishing, ransomware and identity theft.
  • A cyber security module available via a 24/7 electronic learning system…”

    Excerpt from Madan Kumar Moolhye, “Defending Mauritius Against Cyber Threats,” per Concordiam: Journal of European Security Defense Issues 10, No. 4, 2021: 46-49.

    Madan Kumar Moolhye is a cyber security professional at the IT Security Unit of the Ministry of Technology, Communication and Innovation of Mauritius. He has more than 14 years of experience in information and communications technology network operations and support management, and more than seven years of experience in project management and cyber security. He is a Certified Information Security Professional (2014) and a certified Lead Auditor (2006) for the ISO/IEC 27001 Information Security Standard.

    This article reflects the views of the author and are not necessarily the official policy of the United States, Germany, or any other governments.