Third Eye Africa

Tailored Security Solutions For a Safer Africa

Addressing Social Security Challenges with Expertise and Innovation

Army soldier silhouettes
Army Ranger in field Uniforms
Army soldier silhouettes
WHO WE ARE

ABOUT US

At 3iA we help or clients in the national security, law enforcement agencies to design and develop tailor-made solutions to detect and prevent cyber-terrorism, cyber-espionage, sabotage, subversion, and organised crime (TESSOC) by harnessing cutting edge technologies.

Our approach is to partner and capacitate African intelligence communities and their law-enforcement agencies to mitigate most of today’s world national security threats.

WHAT WE DO

Our Services

Our cybersecurity training is in line with the global Cybersecurity Capacity Maturity Model Framework (CCMMF) and its five dimensions which include helping our clients a fair chance to reach the required cybersecurity compliance to source funding. The CCMMF includes the following dimensions, which informs our training: 

  • Developing cybersecurity policy and strategy
  • Encouraging responsible cybersecurity culture within society
  • Building cybersecurity knowledge and capabilities
  • Creating effective legal and regulatory frameworks
  • Controlling risks through standards and technologies.
SOLUTIONS

Our Approach

Our approach at 3iA is underpinned by the following four pillars:

Pillar 1:

Cybersecurity Workforce Development

  • Training of Cybersecurity Incident Response Teams (CSIRT)
  • Develop Cybersecurity Road Map for specific clients.
  • Sourcing of cutting-edge technologies.
  • Partner to design, develop, and implement Cybersecurity Framework.
  • Capacitate national training institutions.
  • Design, develop, and implement SIEM and assist in self-operating.
Pillar 2:

Cyber Intelligence Training

  • Capacitate CSIRT to mitigate cyber threats such as TESSOC).
  • Source & supply Secure Communication solutions for our clients.
  • Assist to develop National Critical Infrastructure Classification Model.
  • Design, develop and implement regional INTEX Protocol.
  • Design, develop and implement Cybersecurity Early Warning Systems.
  • Capacitate CSIRT to monitor and manage security incidents & events.
  • Integrate all border security and surveillance systems in the SIEM.
Pillar 3:

Cyberspace Military Operations

Integrate the following capabilities in the country’s doctrine:

  • Cyber warfare both offensive & defensive
  • Information warfare capabilities
  • Counter-TESSOC capabilities
  • Integrate UAV and counter-UAV capabilities for cyberspace protection.
Pillar 4:

Cyber Command Fusion Centre

Partner to design, develop and establish a Cyber Command as part of each client’s ORBAT through:

  • Develop and capacitate ‘Blue Forces’ capabilities.
  • Develop and capacitate ‘Red Forces’ capabilities.
  • Develop and capacitate ‘Black Force’ capabilities.
  • Develop Cyber Command Doctrine.
NEWSROOM

GET THE LATEST UPDATES

Let's work together to address the challenges and build a safer, more secure future.