RSS Feed  Les actualités de la BRVM en Flux RSS

NEWS FINANCIÈRES

Nous agrégeons les sources d’informations financières spécifiques Régionales et Internationales. Info Générale, Economique, Marchés Forex-Comodities- Actions-Obligataires-Taux, Vieille règlementaire etc.

Combating cyberattacks: Mali is preparing a coordinated national framework 2026-2030

11/12/2025
Source : ORISHAS FINANCE
Categories: Compliance

Enjoy a simplified experience

Find all the economic and financial information on our Orishas Direct application to download on Play Store

Faced with the rise of cyber threats, Mali structures its national response. Thus, during the Council of Ministers on Wednesday 5 December 2025, the Malian government officially took note of the National Cyber Security Strategy 2026-2030.

Authorities are working on a road map aimed at strengthening the country's resilience and modernising digital governance and protect increasingly targeted infrastructures. This road map is in line with the main national guidelines, in particular” Mali Kura put on ɛ 107%; font-family: "Bookman Old Style”, serif">taasira ka bn San 2063 ma” and the National Strategy for Emergence and Development sustainable 2024-2033, which place digital technology at the heart of the modernization of administration, the efficiency of public services and growth economical.

This frame of reference should allow the country to strengthen its digital resilience in the face of the multiplication of cyberattacks and to the growing risks associated with the digital transformation of the State and the economy.

According to the Malian government, “cybersecurity has become a global concern, due to sophistication increasing number of attacks and the financial damage they cause to states and to businesses. Despite several legislative and regulatory texts adopted in recent years, Mali did not yet have a strategy coordinated national, requiring each actor to initiate isolated actions”.

The implementation of the National Strategy of Cybersecurity should allow Mali to fill the most loopholes urgent issues in its digital ecosystem. It should not only strengthen the protection of critical infrastructures but also establishing standards of more homogeneous security, improve the response to incidents and structure the cooperation with international partners.

Provided by AWS Translate

0 COMMENTAIRE