Accessibility

Critical Information Infrastructure Protection in Focus for Panama

On 8 July, an online seminar organized by LAC4 in collaboration with the Panama National Authority for Government Innovation was held to support members of the Panama Government in defining, identifying, and protecting Critical Information Infrastructures (CII). Led by Perit Kirkmann-Raave, a CIIP Lead Expert at the National Cyber Security Centre of Estonia (NCSC-EE), the session brought together 47 participants from key Panama institutions.

The workshop opened with remarks from Adolfo Campos, Political Officer at the Delegation of the European Union to Panama, Francisco Guinard, Deputy Administrator General of the Panama National Authority for Government Innovation (AIG) and César Moliné, Regional Director from LAC4.

Throughout the session, the importance of Critical Infrastructures (CI) and the relevance of correctly distinguishing them were analyzed, including Critical Information Infrastructures (CII) as a fundamental part of CI. Specifically, the session focused on effective measures and mechanisms to protect CII, drawing lessons from the European Union’s frameworks and Estonia’s leading practices in the field. The discussions emphasized the importance of a combination of updated regulations and security policies with practical exercises and testing, involving collaboration between public institutions and private sector stakeholders.

Most important take-aways for successful CIIP include:

  • Critical infrastructure is generally thought of as the key systems, services and functions whose disruption or destruction would have a debilitating impact on public health and safety, commerce, and national security or any combination of those matters.
  • It’s crucial to identify and prioritize truly essential services; trying to protect everything equally can dilute resources and jeopardize the most critical systems.
  • Modernised cybersecurity laws and regulations are fundamental for safeguarding national networks and infrastructures.
  • Understanding how critical infrastructures support key societal functions, like public health, the economy, and national security, helps prioritize efforts, especially for high-impact entities.
  • Providers must conduct risk assessments as a mandatory part of their responsibilities. The state may review these processes to ensure they are properly carried out in accordance with applicable laws.
  • Clear, well-defined response plans are essential to prevent disruptions from escalating into crises.
  • CII operators must remain accountable for the full infrastructure, including outsourced components.
  • Governments must not only create targeted policies but also foster the use of advanced, efficient technologies to secure CII.
  • Adopting an information security standard provides a reliable roadmap for meeting baseline cybersecurity requirements.
  • CII protection should be based on four core principles: operator accountability, risk-based defenses, impact mitigation, and strong collaboration across sectors.
  • CIIP is a shared duty between public institutions and the private sector.
  • A successful protection strategy requires adequate resources, qualified personnel, robust processes, and suitable technology.
  • Regular tabletop and real-time (live-fire) exercises are essential for testing and improving cyber response readiness.
  • Penetration testing plays a key role in uncovering critical vulnerabilities in CIIs.
  • In case of incidents, forensic capabilities, including malware detection and tailed reports, are needed for thorough analysis and recovery.
  • Assigning a designated point of contact in each essential service streamlines coordination during a cyberattack.
  • Ongoing information sharing, through reports or events, on evolving threats and cybersecurity practices is vital for keeping defenses current.

Keep reading similar articles
Members-only Seminar on Vulnerability Assessment

The 7th LAC4 members-only seminar, led by Sangsoo Jeong, joining from Seoul through the cooperation with CAMP and KISAs and expert Priit Kaup, focused on strengthening national approaches to Vulnerability Management and Assessments.

LAC4 Steering Committee Met in Brussels

LAC4 Steering Committee gathered this week on 27 November in Brussels at the Permanent Representation of Estonia to the European Union to take a stock on past activities and discuss future actions.

CyberWeek@LAC4 2025 Wrapped: Building Borderless Resilience in Latin America and the Caribbean

CyberWeek@LAC4 2025 concluded today in Santo Domingo with 0ct0b3rf35t, a platform to offer informal exchange of national experiences and best practices in dealing with cyber incidents. Over the course of four days, more than 40 speakers from more than 20 countries took the stage to exchange knowledge with more than 150 participants from more than 30 countries for building regional cyber resilience and strengthen cooperation between LAC and European countries.

Building Borderless Resilience: Day 2 at CyberWeek@LAC4 2025

The second day of CyberWeek@LAC4 2025 dove deep into threat and organizational resilience and cross-border cooperation. Through hands-on workshops and national case studies, participants examined how to strengthen detection capabilities and adapt to evolving regulatory and operational demands.

Building Borderless Resilience: Day 1 at CyberWeek@LAC4 2025

The first day of CyberWeek@LAC4 2025 revolved around improving technical skills and capabilities with case studies from the region and Europe as well as explaining the importance of communications when mitigating often very technical threats.

CyberWeek@LAC4 2025 Opens with Plenary Session

CyberWeek@LAC4 2025, taking place from today until Thursday, opened with a plenary session and networking reception for participants and stakeholders from Latin America, the Caribbean and the European Union.