+ All Categories
Home > Technology > STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017

STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017

Date post: 21-Feb-2017
Category:
Upload: maurice-dawson
View: 30 times
Download: 0 times
Share this document with a friend
5
Date: 28, 29 March, 2017 Holiday Inn, Sandton Venue: who should attend STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017 STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017 Dr. Maurice Dawson PhD, D.Sc University of Missouri St. Louis, United States of America 2 Power Sessions Main - Session 1: The State Of Cyber Security – Physical Security Information Management (PISM) Limited Session II: Exclusive Executive Roundtable - WikiLeak releases & reports from the African Union (AU) regarding physical security QUESTIONS & HOW TO REGISTER Phone: +27 11 066 8500 Website: www.thembosdev.biz Fax: 086 621 2923 E-mail: [email protected] ICT expert or practitioner, Telecommunications Corporates & Companies Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public Service ICT systems Officials & staff, Students, General ICT Security
Transcript
Page 1: STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017

Date: 28, 29 March, 2017Holiday Inn, Sandton Venue:

who should attend

STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017

STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017

Dr. Maurice Dawson PhD, D.Sc

University of Missouri St. Louis, United States of America

2 Power SessionsMain - Session 1:The State Of Cyber Security – Physical Security Information Management (PISM)

Limited Session II:Exclusive Executive Roundtable - WikiLeak releases & reports from the African Union (AU) regarding physical security

QUESTIONS & HOW TO REGISTER

Phone: +27 11 066 8500 Website: www.thembosdev.bizFax: 086 621 2923 E-mail: [email protected]

ICT expert or practitioner, Telecommunications Corporates & Companies Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public Service ICT systems Officials & staff, Students, General ICT Security

Page 2: STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017

visit our website: www.thembosdev.biz

STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017

STAYING SAFE AND SECUREDON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed.

Objectives and Benefits:

The key objectives are to build state of the art cyber security strength. This intensive workshop is to set this platform for ICT based organizations, academic institutions, state security institutions, individual ICT services providers, etc. The objective to collectively share, learn and develop the needed networking required to help detect and set up counteractive measures and solution to unforeseen cyber & detectable cyber dangers today and tomorrow. We will achieve that by using the intensive two days to by diving into knowledge and techniques in the following:

i. Access controls best strategies - lessons from USA failures and WikiLeak cablesii. Advanced mass surveillance of intelligence to minimize most 'daemon' threatsiii. Testing applications and systems against known vulnerabilitiesiv. To enhance skills and explore advanced v. To enable discovery of latest insights in cyber security spheres beyond the worth of admission costvi. Incorporation of National Initiative for Cyber Security Education (NICE) Framework for South African cyber security education and ICT roles

Event Profile:

This one of a kind event provides an in-depth examination of advanced principles of cyber security. A broad range of topics are covered, including penetration testing, formal verification of systems, formal models of information flow and protection, distributed system authentication, protocol design and attack, computer viruses and malware, as well as intrusion and anomaly detection models. Multi-level security architecture, active defenses, investigation and forensics, network firewalls, virtualization, anonymity and identity, mobile security, and database security models and mechanisms are also studied. The course content is largely influenced by latest research in the field.

1. Assess the strengths and weaknesses of the national strategies and determine their implications for the development and implementation of an enterprise information assurance strategy.2. Evaluate an enterprise infrastructure in light of information assurance laws, policies, and guidance, and recommend a strategy for assuring the information component of that infrastructure.3. Identify and structure threats from information terrorists and apply appropriate countermeasures4. Implement security protocols to address social engineering hacks

Course Description

The purpose of this course is to twofold. First, it provides an overview or a survey of the vast field of software assurance. The goal is to make participants aware of the fundamentals of the secure software lifecycle. Specifically, the course enables participants to apply principles of secure development and management. Second, this course provides a real world application that allows the all who take part to experience the secure software lifecycle process by developing concrete artifacts. Secure Software Concepts.

Guest Presenter Bio:

Dr. Maurice Dawson PhD, D.Sc serves as anAssistant Professor of Information Systems at the University of Missouri – St. Louis, which is the only National Security Agency Center of Academic Excellence in the St. Louis metropolitan region. Dawson was a former visiting assistant professor (honorary) of industrial and systems engineering at The University of Tennessee Space Institute, and Fulbright Scholar to Chelyabinsk, Russia. He is the founding editor-in-chief of the International Journalof Hyper-connectivity and the Internet of Things, and co-editor of the book “New Threats and Countermeasures in Digital Crime and Cyber Terrorism.” Dawson comes to academia with morethan 10 years of experience from the defense and aerospace industry. Dawson holds terminal degrees in computer science and cyber security.

Page 3: STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017

THE EVENT CONTENTKey learning Areas: 1. Defining Cyber Security and General Security Concepts2. Careers in Cyber Security, Security Trends, Information Security and Risk Management3. Access Control, Bash Scripting, Introduction to NIST SP 800 Series4. Security Architecture and Design, DIACAP IA Controls, Virtualization5. Physical and Environmental Security, Virtual Reality, Augmented Reality for Physical Security6. Telecommunications and Network Security7. Cryptography and Cryptographic Applications8. Business Continuity and Disaster Recovery9. Legal, Regulations, Compliance, and Investigations10. Security Policies and Regulations11. Application Security12. Operations Security13. Cyber Terrorism, Destructive Coding Practices14. Human Intelligence (HUMINT), Signals Intelligence (SIGINT), Imagery Intelligence (IMINT), Measurement and Signatures Intelligence (MASINT), Open Source Intelligence (OSINT)

15. Offensive Security, Defensive Security16. Risk Management17. Software Development Methodologies Secure Software Requirements18. Policy Decomposition19. Data Classification and Categorization20. Requirements Secure Software Design21. Design Process22. Design Considerations23. Securing Commonly Used Architectures24. Technologies Secure Software Implementation/Coding25. Common Software Vulnerabilities and Countermeasures26. Defensive Coding Practices27. Secure Software Coding Operations Secure Software Testing28. Security Testing on principles of secure development and management.29. Security Quality Assurance Testing30. Reverse Engineering31. Certification and Accreditation (DIACAP, NIST SP 800 Series, Common Criteria, NSA Rainbow Series, Directive of Central Intelligence Directives)

Agenda

Day 1

This session provides an in-depth examination of advanced principles of cyber security. A broad range of topics are covered, includingpenetration testing, formal verification of systems, formal models of information flow and protection, distributed system authentication, protocol design and attack, computer viruses and malware, as well as intrusion and anomaly detection models. Multi-level security architecture, active defenses, investigation and forensics, network firewalls, virtualization, anonymity and identity, mobile security, and database security models and mechanisms are also studied.

Introduction8:00 – 8:15Defining Cyber Security8:15 – 9:00 Information Security and Risk Management9:00 – 9:45

CoffeePhysical and Environmental Security10:10 – 11:00 Business Continuity and Disaster Recovery11:00 – 12:00

LunchNIST SP 800 Series1:30 – 2:30

Coffee Discussions I (Continue uncompleted subjects or Presenter’s initiative based on the day’s presentation)2:45 – 3:30 Discussion II/Questions & answers3:30 – 4:30

Day 2

This session provides organizations developing Internet-enabled technologies and those that are connected to begin addressing risks associated with their products. Creating a process that allows for updating application software, and system configurations while undergoing an annual compliance helps create a more security hardened product.

Introductions8:00 – 8:15 Application Security8:15 – 9:00 All Source Intelligence9:00 – 9:45

Coffee Offensive Security10:10 – 11:00Defensive Security11:00 – 12:00

Lunch Cyber Terrorism1:30 – 2:30

CoffeeDiscussions I (Continue uncompleted subjects or Presenter’s initiative based on the day’s presentation)2:45 – 3:30 Discussion II/Questions & answers3:30 – 4:30

visit our website: www.thembosdev.biz

Page 4: STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017

The Exclusive Executive Roundtable Content

Day 3

Exclusive Executive Roundtable for State Security Experts, Department Decision-makers, Research Institution Experts (ICT), IGO VIPs and Diplomats: WIKILEAKS RELEASES & REPORTS FROM THE AFRICAN UNION (AU) REGARDING PHYSICAL SECURITY.

This is special exclusive limited roundtable seminar for designated state and intergovernmental organisation representatives around policy matters, etc.

Introductions8:00 – 8:15 Discussion I: Physical Security Case Report:8:15 – 9:00

African Union Assassination Attempt Discussion II: South African Computer9:00 – 9:45

Security ChallengesCoffee

Discussion III: Terrorism and Sympathizers on the Internet10:10 – 11:00 Discussion IV: Developing Educational Centers for Cyber Security Education11:00 – 12:00

LunchDiscussion V: Cryptography and1:30 – 2:30

Cryptographic ApplicationsCoffee

Discussion VI: The Dark Web and Anonymity2:45 – 3:30

End of Roundtable

visit our website: www.thembosdev.biz

Page 5: STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017

SEMINAR REGISTRATION FORM

AUTHORISING PERSON / SUPERVISOR:

Name

Title Company Name

Address

City State Zip

Phone Fax Email

(Needed for Con firmation & Sending Pre-Reading Materials)

ATTENDEE NAME ATTENDEE EMAIL COURSE TITLE DATE(S) CITY/STATE PRICE

TOTAL R________

BILL TO: (If Different than Authorizing Person)

Name

Title Company Name

Address

City State Zip

Phone Fax Email

(Needed for Con firmation & Sending Pre-Reading Materials)

Please help our logistics team and register early. Cancel up to 24 hours in advance without penalty.

(*See Public Seminar Pricing Schedule on Previous Page)

cn

Bill Purchase Order #:

Bank Account Details

Authorising Signature

Course Fee R7,990 for 2-Days: Training Manual, WWIKC Memorabilia, Certificate, Teas and Lunches

Course Fee R2,490 for Executive Roundtable: Training Manual, WWIKC Memorabilia, Certificate, Teas and Lunches

Course Fee R9,490 for 3-Days: Training Manual, WWIKC Memorabilia, Certificate, Teas and Lunches

Select

Account name: THEMbosdev Investments LtdAccount No.: 62657315191Type: ChequeBranch code: 250655Foreign transfer switch code: FIRNZAJJ

QUESTIONS & HOW TO REGISTER

Phone: +27 11 066 8500 Website: www.thembosdev.bizFax: 086 621 2923 E-mail: [email protected]

visit our website: www.thembosdev.biz


Recommended