By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union

Slides:



Advertisements
Similar presentations
GAMMA Overview. Key Data Grant Agreement n° Starting date: 1 st September 2013 Duration: 48 months (end date 31 st August 2017) Total Budget:
Advertisements

Introduction to InfraGard. About InfraGard InfraGard is a public-private volunteer organization that serves as the critical link that forms a tightly-
The Most Analytical and Comprehensive Defense Network in a Box.
David A. Brown Chief Information Security Officer State of Ohio
DHS, National Cyber Security Division Overview
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
InfraGard A Partnership For Protecting America. What is InfraGard “ A cooperative undertaking between the U.S. Government (the FBI) and an association.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Website Hardening HUIT IT Security | Sep
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
The Most Analytical and Comprehensive Defense Network in a Box.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
FBI’s InfraGard.
Dell Connected Security Solutions Simplify & unify.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Recent Cyber Attacks and Countermeasures September 2006.
Protecting Internet Infrastructure Michael M. Roberts [ ] MS&E 237 July 11, 2002 Stanford University.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Network security Product Group 2 McAfee Network Security Platform.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Part 1: Corporate Operational benefits, Non-technical information for FSOs and ISSMs/ISSOs Part 2: Technical Tips on how to conduct a better audit review.
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
Surveillance and Security Systems Cyber Security Integration.
OIT Security Operations
Cloud App Security vs. O365 Advanced Security Management
Information Security – Current Challenges
Ilija Jovičić Sophos Consultant.
Building an Information Sharing Community
Cyber Security: State of the Nation
Compliance with hardening standards
California Cybersecurity Integration Center (Cal-CSIC)
Advanced Threat Protection
Threat Management Gateway
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
Joe, Larry, Josh, Susan, Mary, & Ken
Infrastructure, Data Center & Managed Services
Transforming IT Management
I have many checklists: how do I get started with cyber security?
8 Building Blocks of National Cyber Strategies
Securing Your Digital Transformation
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Healthcare Cloud Security Stack for Microsoft Azure
UW System Information Security
Information Protection
InfraGard – Presented by Andrew Reece KC Chapter InfraGard Member
Microsoft Data Insights Summit
Information Protection
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union Example of CERT By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union July 25, 2018

ZMtech Cybersoft CERT Services & Solutions Cyber threat poses a challenge. No organization by itself has adequate scope of relevant information, awareness, and intelligence of the threat landscape The way to overcome this limitation is via access to and sharing of relevant cyber threat intelligence, analysis, and response among trusted Public-private partners as well as relevant law enforcement authorities

Understanding of how to manage cyber security risks to systems, assets, clients, data and capabilities Controls & safeguards necessary to protect or deter cyber security threats Continuous monitoring to provide protections and real time alerts Incidence response activities Business continuity plans to recover capabilities

Summary of Cybersoft’ Proprietary Implemented Solutions Item No. Solutions Group No. of Deployments Cumulative Totals 1. Enterprise Resource Planning (ERP)   Public Institutions 7 Private Institutions 6 International Organizations and NGO’s 3 Integrated Civil Service Information System Records, Archive and Library Information System 27 50 2. Pension System for the F.D.R.E. 2 52 3. Web Portals 54 4. Justice System Reform Program Solutions 578 632 5. Integrated Higher Education Information System 638 6. Websites 19 657 7. Integrated Socio-Economic Information Systems 664 8. Various Windows Management Information Systems 20 684 9 Cyber Network Solutions 15  699  10. Specialized Consultancy 4 703

Example ZMtech belongs to InfraGard FBI groups InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure With thousands of vetted members nationally, InfraGard's membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.

Attack continuum Before, During and After Security methods must focus on both detection and the ability to mitigate the impact after an attacker gets in. You need to look at security model holistically and gain visibility and control not just at the endpoints but across the extended network and the entire attack continuum before an attack happens, during the time it’s in progress, and after it has damaged systems or stolen information. Before: Identify what’s on the extended network to implement policies and controls to defend it  ZMtech Cybersoft  Services Designs and builds advanced security solutions (Next-Generation Firewalls, IPS and IDS etc.) implements policies and controls to defend it Provides User Aweraness training Provides Advanced network and application penetration testing services Recommends Centralized Data Management System e.g.:  

Cyber-ERP Subsystems

Cyber-ERP Systems

● During: Detect and block malware continuously Continuous security monitoring   ZMtech Cybersoft  Services Automates security monitoring across various sources of security information. Provides intrusion prevention systems, and email and web security.   ● After:  ZMtech Cybersoft  Services Reduces the impact of an attack by identifying point of entry, determining the scope, containing the threat, eliminating the risk of re-infection, and re-mediating

Try ZMtech Cybersoft Services and Solutions You will Like Them!