SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Date: 28, 29 March, 2017
Holiday Inn, SandtonVenue:
who should attend
STAYING SAFE AND SECURED
ON TODAY AND
TOMORROW’S AFRICA
CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED
ON TODAY AND
TOMORROW’S AFRICA
CYBERSPACE WORKSHOP 2017
Dr. Maurice Dawson PhD, D.Sc
University of Missouri
St. Louis,
United States of
America
2 Power Sessions
Main - Session 1:
The State Of Cyber Security – Physical Security
Information Management (PISM)
Limited Session II:
Exclusive Executive Roundtable - WikiLeak releases
& reports from the African Union (AU) regarding physical security
QUESTIONS & HOW TO REGISTER
Phone: +27 11 066 8500
Website: www.thembosdev.biz
Fax: 086 621 2923
E-mail: info@thembosdev.biz
ICT expert or practitioner, Telecommunications Corporates
& Companies Personnel, Aviation ICT Officials, Other
Transportation controls network hubs, Business dealer in
Cyberspace services provider or supplier, Academicians
and researchers, Government Departments & Public Service
ICT systems Officials & staff, Students, General ICT Security
visit our website: www.thembosdev.biz
STAYING SAFE AND SECURED
ON TODAY AND
TOMORROW’S AFRICA
CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED
ON TODAY AND
TOMORROW’S AFRICA
CYBERSPACE WORKSHOP 2017
This is the most essential programme of the year around the dangers of cybercrime
and how to manage safety within the most indispensable digital sphere & technology
system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of
Everything there is a potential market that is approximately $14.4 trillion and over 99%
of physical devices are still unconnected.” ~Mo Dawson. Your participation give you
golden access to a transcending Cyberspace picture, enhanced solution oriented
capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies
Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business
dealer in Cyberspace services provider or supplier, Academicians and researchers,
Government Departments & Public service ICT systems Officials & staff, Students,
general ICT security involvement and on top of that your enhanced multidimensional scope
& prosperity out of this untapped gold mine is guaranteed.
Objectives and Benefits:
The key objectives are to build state of the art cyber security strength. This intensive
workshop is to set this platform for ICT based organizations, academic institutions,
state security institutions, individual ICT services providers, etc. The objective to
collectively share, learn and develop the needed networking required to help detect
and set up counteractive measures and solution to unforeseen cyber & detectable
cyber dangers today and tomorrow. We will achieve that by using the intensive two
days to by diving into knowledge and techniques in the following:
i. Access controls best strategies - lessons from USA failures and WikiLeak cables
ii. Advanced mass surveillance of intelligence to minimize most 'daemon' threats
iii. Testing applications and systems against known vulnerabilities
iv. To enhance skills and explore advanced
v. To enable discovery of latest insights in cyber security spheres beyond the worth of
admission cost
vi. Incorporation of National Initiative for Cyber Security Education (NICE) Framework
for South African cyber security education and ICT roles
Event Profile:
This one of a kind event provides an in-depth examination of advanced principles of
cyber security. A broad range of topics are covered, including penetration testing, formal
verification of systems, formal models of information flow and protection, distributed
system authentication, protocol design and attack, computer viruses and malware, as
well as intrusion and anomaly detection models. Multi-level security architecture, active
defenses, investigation and forensics, network firewalls, virtualization, anonymity and
identity, mobile security, and database security models and mechanisms are also studied.
The course content is largely influenced by latest research in the field.
1. Assess the strengths and weaknesses of the national strategies and determine their
implications for the development and implementation of an enterprise information
assurance strategy.
2. Evaluate an enterprise infrastructure in light of information assurance laws, policies,
and guidance, and recommend a strategy for assuring the information component of
that infrastructure.
3. Identify and structure threats from information terrorists and apply appropriate
countermeasures
4. Implement security protocols to address social engineering hacks
Course Description
The purpose of this course is to twofold. First, it provides an overview or a survey of
the vast field of software assurance. The goal is to make participants aware of the
fundamentals of the secure software lifecycle. Specifically, the course enables
participants to apply principles of secure development and management. Second,
this course provides a real world application that allows the all who take part to
experience the secure software lifecycle process by developing concrete artifacts.
Secure Software Concepts.
Guest Presenter Bio:
Dr. Maurice Dawson PhD, D.Sc serves as an
Assistant Professor of Information Systems at
the University of Missouri – St. Louis, which is the
only National Security Agency Center of Academic
Excellence in the St. Louis metropolitan region.
Dawson was a former visiting assistant professor
(honorary) of industrial and systems engineering at
The University of Tennessee Space Institute, and
Fulbright Scholar to Chelyabinsk, Russia. He is the
founding editor-in-chief of the International Journal
of Hyper-connectivity and the Internet of Things,
and co-editor of the book “New Threats and
Countermeasures in Digital Crime and Cyber
Terrorism.” Dawson comes to academia with more
than 10 years of experience from the defense and
aerospace industry. Dawson holds terminal degrees
in computer science and cyber security.
THE EVENT CONTENT
Key learning Areas:
1. Defining Cyber Security and General Security Concepts
2. Careers in Cyber Security, Security Trends, Information
Security and Risk Management
3. Access Control, Bash Scripting, Introduction to NIST SP 800 Series
4. Security Architecture and Design, DIACAP IA Controls, Virtualization
5. Physical and Environmental Security, Virtual Reality, Augmented
Reality for Physical Security
6. Telecommunications and Network Security
7. Cryptography and Cryptographic Applications
8. Business Continuity and Disaster Recovery
9. Legal, Regulations, Compliance, and Investigations
10. Security Policies and Regulations
11. Application Security
12. Operations Security
13. Cyber Terrorism, Destructive Coding Practices
14. Human Intelligence (HUMINT), Signals Intelligence (SIGINT), Imagery
Intelligence (IMINT), Measurement and Signatures Intelligence
(MASINT), Open Source Intelligence (OSINT)
15. Offensive Security, Defensive Security
16. Risk Management
17. Software Development Methodologies Secure Software
Requirements
18. Policy Decomposition
19. Data Classification and Categorization
20. Requirements Secure Software Design
21. Design Process
22. Design Considerations
23. Securing Commonly Used Architectures
24. Technologies Secure Software Implementation/Coding
25. Common Software Vulnerabilities and Countermeasures
26. Defensive Coding Practices
27. Secure Software Coding Operations Secure Software Testing
28. Security Testing on principles of secure development and
management.
29. Security Quality Assurance Testing
30. Reverse Engineering
31. Certification and Accreditation (DIACAP, NIST SP 800 Series,
Common Criteria,
NSA Rainbow Series, Directive of Central Intelligence Directives)
Agenda
Day 1
This session provides an in-depth examination of advanced principles of cyber security. A broad range of topics are covered, including
penetration testing, formal verification of systems, formal models of information flow and protection, distributed system authentication,
protocol design and attack, computer viruses and malware, as well as intrusion and anomaly detection models. Multi-level security architecture,
active defenses, investigation and forensics, network firewalls, virtualization, anonymity and identity, mobile security, and database security
models and mechanisms are also studied.
Introduction8:00 – 8:15
Defining Cyber Security8:15 – 9:00
Information Security and Risk Management9:00 – 9:45
Coffee
Physical and Environmental Security10:10 – 11:00
Business Continuity and Disaster Recovery11:00 – 12:00
Lunch
NIST SP 800 Series1:30 – 2:30
Coffee
Discussions I (Continue uncompleted subjects or Presenter’s initiative based on the day’s presentation)2:45 – 3:30
Discussion II/Questions & answers3:30 – 4:30
Day 2
This session provides organizations developing Internet-enabled technologies and those that are connected to begin
addressing risks associated with their products. Creating a process that allows for updating application software, and system configurations
while undergoing an annual compliance helps create a more security hardened product.
Introductions8:00 – 8:15
Application Security8:15 – 9:00
All Source Intelligence9:00 – 9:45
Coffee
Offensive Security10:10 – 11:00
Defensive Security11:00 – 12:00
Lunch
Cyber Terrorism1:30 – 2:30
Coffee
Discussions I (Continue uncompleted subjects or Presenter’s initiative based on the day’s presentation)2:45 – 3:30
Discussion II/Questions & answers3:30 – 4:30
visit our website: www.thembosdev.biz
The Exclusive Executive Roundtable Content
Day 3
Exclusive Executive Roundtable for State Security Experts, Department Decision-makers, Research Institution Experts (ICT), IGO VIPs and
Diplomats: WIKILEAKS RELEASES & REPORTS FROM THE AFRICAN UNION (AU) REGARDING PHYSICAL SECURITY.
This is special exclusive limited roundtable seminar for designated state and intergovernmental organisation representatives around policy
matters, etc.
Introductions8:00 – 8:15
Discussion I: Physical Security Case Report:8:15 – 9:00
African Union Assassination Attempt
Discussion II: South African Computer9:00 – 9:45
Security Challenges
Coffee
Discussion III: Terrorism and Sympathizers on the Internet10:10 – 11:00
Discussion IV: Developing Educational Centers for Cyber Security Education11:00 – 12:00
Lunch
Discussion V: Cryptography and1:30 – 2:30
Cryptographic Applications
Coffee
Discussion VI: The Dark Web and Anonymity2:45 – 3:30
End of Roundtable
visit our website: www.thembosdev.biz
SEMINAR REGISTRATION FORM
AUTHORISING PERSON / SUPERVISOR:
Name
Title Company Name
Address
City State Zip
Phone Fax Email
(Needed for Con firmation & Sending Pre-Reading Materials)
ATTENDEE NAME ATTENDEE EMAIL COURSE TITLE DATE(S) CITY/STATE PRICE
TOTAL R________
BILL TO: (If Different than Authorizing Person)
Name
Title Company Name
Address
City State Zip
Phone Fax Email
(Needed for Con firmation & Sending Pre-Reading Materials)
Please help our logistics team and register early. Cancel up to 24 hours in advance without penalty.
(*See Public Seminar Pricing Schedule on Previous Page)
cn
Bill Purchase Order #:
Bank Account Details
Authorising Signature
Course Fee R7,990 for 2-Days: Training Manual, WWIKC Memorabilia, Certificate, Teas and Lunches
Course Fee R2,490 for Executive Roundtable: Training Manual, WWIKC Memorabilia, Certificate, Teas and Lunches
Course Fee R9,490 for 3-Days: Training Manual, WWIKC Memorabilia, Certificate, Teas and Lunches
Select
Account name: THEMbosdev Investments Ltd
Account No.: 62657315191
Type: Cheque
Branch code: 250655
Foreign transfer switch code: FIRNZAJJ
QUESTIONS & HOW TO REGISTER
Phone: +27 11 066 8500
Website: www.thembosdev.biz
Fax: 086 621 2923
E-mail: info@thembosdev.biz visit our website: www.thembosdev.biz

Mais conteúdo relacionado

Mais procurados

NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusCisco Security
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrrorFlinturgy
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYIJNSA Journal
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...Cybersecurity Education and Research Centre
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaINFOGAIN PUBLICATION
 
Compliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan PrecsenyiCompliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan Precsenyie-Democracy Conference
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdSusan Darby
 
International Cyber Security 2012
International Cyber Security 2012International Cyber Security 2012
International Cyber Security 2012Sharmin Ahammad
 
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...Miguel A. Amutio
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewIOSR Journals
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Ferenc Fresz
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsBooz Allen Hamilton
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 

Mais procurados (20)

NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrror
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
Compliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan PrecsenyiCompliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan Precsenyi
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
International Cyber Security 2012
International Cyber Security 2012International Cyber Security 2012
International Cyber Security 2012
 
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
D372326.pdf
D372326.pdfD372326.pdf
D372326.pdf
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
 

Semelhante a STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017

Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challengescyberprosocial
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...AI Publications
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptxDolchandra
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organizationMohammed Mahfouz Alhassan
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxaudeleypearl
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 

Semelhante a STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017 (20)

Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptx
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 

Mais de Maurice Dawson

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsMaurice Dawson
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsMaurice Dawson
 
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Maurice Dawson
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
 
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyCTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyMaurice Dawson
 
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMaurice Dawson
 
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMaurice Dawson
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Maurice Dawson
 
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...Maurice Dawson
 
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Maurice Dawson
 
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramUMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramMaurice Dawson
 
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Maurice Dawson
 
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMaurice Dawson
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...Maurice Dawson
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Maurice Dawson
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyMaurice Dawson
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityMaurice Dawson
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsMaurice Dawson
 
Microblogging in higher education: Digital Natives, knowledge creation, socia...
Microblogging in higher education: Digital Natives, knowledge creation, socia...Microblogging in higher education: Digital Natives, knowledge creation, socia...
Microblogging in higher education: Digital Natives, knowledge creation, socia...Maurice Dawson
 

Mais de Maurice Dawson (20)

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
 
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyCTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and Destroy
 
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMWAIS Fall 2017 Newsletter
MWAIS Fall 2017 Newsletter
 
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMWAIS Fall 2018 Newsletter
MWAIS Fall 2018 Newsletter
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...
 
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
 
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS
 
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramUMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer Program
 
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018
 
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual Conference
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
 
Microblogging in higher education: Digital Natives, knowledge creation, socia...
Microblogging in higher education: Digital Natives, knowledge creation, socia...Microblogging in higher education: Digital Natives, knowledge creation, socia...
Microblogging in higher education: Digital Natives, knowledge creation, socia...
 

Último

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Último (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017

  • 1. Date: 28, 29 March, 2017 Holiday Inn, SandtonVenue: who should attend STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017 STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017 Dr. Maurice Dawson PhD, D.Sc University of Missouri St. Louis, United States of America 2 Power Sessions Main - Session 1: The State Of Cyber Security – Physical Security Information Management (PISM) Limited Session II: Exclusive Executive Roundtable - WikiLeak releases & reports from the African Union (AU) regarding physical security QUESTIONS & HOW TO REGISTER Phone: +27 11 066 8500 Website: www.thembosdev.biz Fax: 086 621 2923 E-mail: info@thembosdev.biz ICT expert or practitioner, Telecommunications Corporates & Companies Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public Service ICT systems Officials & staff, Students, General ICT Security
  • 2. visit our website: www.thembosdev.biz STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017 STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017 This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed. Objectives and Benefits: The key objectives are to build state of the art cyber security strength. This intensive workshop is to set this platform for ICT based organizations, academic institutions, state security institutions, individual ICT services providers, etc. The objective to collectively share, learn and develop the needed networking required to help detect and set up counteractive measures and solution to unforeseen cyber & detectable cyber dangers today and tomorrow. We will achieve that by using the intensive two days to by diving into knowledge and techniques in the following: i. Access controls best strategies - lessons from USA failures and WikiLeak cables ii. Advanced mass surveillance of intelligence to minimize most 'daemon' threats iii. Testing applications and systems against known vulnerabilities iv. To enhance skills and explore advanced v. To enable discovery of latest insights in cyber security spheres beyond the worth of admission cost vi. Incorporation of National Initiative for Cyber Security Education (NICE) Framework for South African cyber security education and ICT roles Event Profile: This one of a kind event provides an in-depth examination of advanced principles of cyber security. A broad range of topics are covered, including penetration testing, formal verification of systems, formal models of information flow and protection, distributed system authentication, protocol design and attack, computer viruses and malware, as well as intrusion and anomaly detection models. Multi-level security architecture, active defenses, investigation and forensics, network firewalls, virtualization, anonymity and identity, mobile security, and database security models and mechanisms are also studied. The course content is largely influenced by latest research in the field. 1. Assess the strengths and weaknesses of the national strategies and determine their implications for the development and implementation of an enterprise information assurance strategy. 2. Evaluate an enterprise infrastructure in light of information assurance laws, policies, and guidance, and recommend a strategy for assuring the information component of that infrastructure. 3. Identify and structure threats from information terrorists and apply appropriate countermeasures 4. Implement security protocols to address social engineering hacks Course Description The purpose of this course is to twofold. First, it provides an overview or a survey of the vast field of software assurance. The goal is to make participants aware of the fundamentals of the secure software lifecycle. Specifically, the course enables participants to apply principles of secure development and management. Second, this course provides a real world application that allows the all who take part to experience the secure software lifecycle process by developing concrete artifacts. Secure Software Concepts. Guest Presenter Bio: Dr. Maurice Dawson PhD, D.Sc serves as an Assistant Professor of Information Systems at the University of Missouri – St. Louis, which is the only National Security Agency Center of Academic Excellence in the St. Louis metropolitan region. Dawson was a former visiting assistant professor (honorary) of industrial and systems engineering at The University of Tennessee Space Institute, and Fulbright Scholar to Chelyabinsk, Russia. He is the founding editor-in-chief of the International Journal of Hyper-connectivity and the Internet of Things, and co-editor of the book “New Threats and Countermeasures in Digital Crime and Cyber Terrorism.” Dawson comes to academia with more than 10 years of experience from the defense and aerospace industry. Dawson holds terminal degrees in computer science and cyber security.
  • 3. THE EVENT CONTENT Key learning Areas: 1. Defining Cyber Security and General Security Concepts 2. Careers in Cyber Security, Security Trends, Information Security and Risk Management 3. Access Control, Bash Scripting, Introduction to NIST SP 800 Series 4. Security Architecture and Design, DIACAP IA Controls, Virtualization 5. Physical and Environmental Security, Virtual Reality, Augmented Reality for Physical Security 6. Telecommunications and Network Security 7. Cryptography and Cryptographic Applications 8. Business Continuity and Disaster Recovery 9. Legal, Regulations, Compliance, and Investigations 10. Security Policies and Regulations 11. Application Security 12. Operations Security 13. Cyber Terrorism, Destructive Coding Practices 14. Human Intelligence (HUMINT), Signals Intelligence (SIGINT), Imagery Intelligence (IMINT), Measurement and Signatures Intelligence (MASINT), Open Source Intelligence (OSINT) 15. Offensive Security, Defensive Security 16. Risk Management 17. Software Development Methodologies Secure Software Requirements 18. Policy Decomposition 19. Data Classification and Categorization 20. Requirements Secure Software Design 21. Design Process 22. Design Considerations 23. Securing Commonly Used Architectures 24. Technologies Secure Software Implementation/Coding 25. Common Software Vulnerabilities and Countermeasures 26. Defensive Coding Practices 27. Secure Software Coding Operations Secure Software Testing 28. Security Testing on principles of secure development and management. 29. Security Quality Assurance Testing 30. Reverse Engineering 31. Certification and Accreditation (DIACAP, NIST SP 800 Series, Common Criteria, NSA Rainbow Series, Directive of Central Intelligence Directives) Agenda Day 1 This session provides an in-depth examination of advanced principles of cyber security. A broad range of topics are covered, including penetration testing, formal verification of systems, formal models of information flow and protection, distributed system authentication, protocol design and attack, computer viruses and malware, as well as intrusion and anomaly detection models. Multi-level security architecture, active defenses, investigation and forensics, network firewalls, virtualization, anonymity and identity, mobile security, and database security models and mechanisms are also studied. Introduction8:00 – 8:15 Defining Cyber Security8:15 – 9:00 Information Security and Risk Management9:00 – 9:45 Coffee Physical and Environmental Security10:10 – 11:00 Business Continuity and Disaster Recovery11:00 – 12:00 Lunch NIST SP 800 Series1:30 – 2:30 Coffee Discussions I (Continue uncompleted subjects or Presenter’s initiative based on the day’s presentation)2:45 – 3:30 Discussion II/Questions & answers3:30 – 4:30 Day 2 This session provides organizations developing Internet-enabled technologies and those that are connected to begin addressing risks associated with their products. Creating a process that allows for updating application software, and system configurations while undergoing an annual compliance helps create a more security hardened product. Introductions8:00 – 8:15 Application Security8:15 – 9:00 All Source Intelligence9:00 – 9:45 Coffee Offensive Security10:10 – 11:00 Defensive Security11:00 – 12:00 Lunch Cyber Terrorism1:30 – 2:30 Coffee Discussions I (Continue uncompleted subjects or Presenter’s initiative based on the day’s presentation)2:45 – 3:30 Discussion II/Questions & answers3:30 – 4:30 visit our website: www.thembosdev.biz
  • 4. The Exclusive Executive Roundtable Content Day 3 Exclusive Executive Roundtable for State Security Experts, Department Decision-makers, Research Institution Experts (ICT), IGO VIPs and Diplomats: WIKILEAKS RELEASES & REPORTS FROM THE AFRICAN UNION (AU) REGARDING PHYSICAL SECURITY. This is special exclusive limited roundtable seminar for designated state and intergovernmental organisation representatives around policy matters, etc. Introductions8:00 – 8:15 Discussion I: Physical Security Case Report:8:15 – 9:00 African Union Assassination Attempt Discussion II: South African Computer9:00 – 9:45 Security Challenges Coffee Discussion III: Terrorism and Sympathizers on the Internet10:10 – 11:00 Discussion IV: Developing Educational Centers for Cyber Security Education11:00 – 12:00 Lunch Discussion V: Cryptography and1:30 – 2:30 Cryptographic Applications Coffee Discussion VI: The Dark Web and Anonymity2:45 – 3:30 End of Roundtable visit our website: www.thembosdev.biz
  • 5. SEMINAR REGISTRATION FORM AUTHORISING PERSON / SUPERVISOR: Name Title Company Name Address City State Zip Phone Fax Email (Needed for Con firmation & Sending Pre-Reading Materials) ATTENDEE NAME ATTENDEE EMAIL COURSE TITLE DATE(S) CITY/STATE PRICE TOTAL R________ BILL TO: (If Different than Authorizing Person) Name Title Company Name Address City State Zip Phone Fax Email (Needed for Con firmation & Sending Pre-Reading Materials) Please help our logistics team and register early. Cancel up to 24 hours in advance without penalty. (*See Public Seminar Pricing Schedule on Previous Page) cn Bill Purchase Order #: Bank Account Details Authorising Signature Course Fee R7,990 for 2-Days: Training Manual, WWIKC Memorabilia, Certificate, Teas and Lunches Course Fee R2,490 for Executive Roundtable: Training Manual, WWIKC Memorabilia, Certificate, Teas and Lunches Course Fee R9,490 for 3-Days: Training Manual, WWIKC Memorabilia, Certificate, Teas and Lunches Select Account name: THEMbosdev Investments Ltd Account No.: 62657315191 Type: Cheque Branch code: 250655 Foreign transfer switch code: FIRNZAJJ QUESTIONS & HOW TO REGISTER Phone: +27 11 066 8500 Website: www.thembosdev.biz Fax: 086 621 2923 E-mail: info@thembosdev.biz visit our website: www.thembosdev.biz