FRANKFURTSYMPOSIUM Archives

Frankfurt Symposium

FRANKFURTSYMPOSIUM@LISTSERV.CRL.EDU

Options: Use Forum View

Use Monospaced Font
Show HTML Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Skills for Africa Training Institute <[log in to unmask]>
Reply To:
Date:
Tue, 21 Mar 2023 14:49:45 +0000
Content-Type:
multipart/alternative
Parts/Attachments:
text/plain (12 kB) , text/html (83 kB)


<https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KOKTELeLsJYhfgt9Th06IMPKRIpuGNPJ7kOLSX2lGToVgxAufBrag36fOIygNVuzCHZFDoucc-AicG2RxRKn7IEFNoF4wkUEYtIpbIZBMLP7J41>

TRAINING COURSE ON ADVANCED CYBER SECURITY, SYSTEMS AUDIT 

AND ICT COUNTER INTELLIGENCE SOLUTIONS



Dates

Fees

Location

Apply

03/04/2023 - 14/04/2023

$2700

Nairobi



<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPnm45t4pnJHZEJ8ZGZ-_ZFHg4CRVYBbpRgRu-M87BmM2WYNdfePnLiJRgKX_pwgkhV-Aas_AK9cPklK_VkVu6pRLBOwAPtsJnVLy2L-Y4vpVE0>

Physical Class





<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuo8FotEi-lP6zMwONqTfc6aRGT5srX85uW7UVTv4QRsOMrxzl5boUyWqeH4aQf9QJyQCJoVvK9msrq1JOPJTIAdqgAqlCw_4jVf7pj0aiaAbf0>

Online 

    Class

01/05/2023 - 12/05/2023

$4500

Dubai



<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPqP7L5WKAP1V92_0JNFVEkw1WklLIYhNVEr-659bPUz_PxztEZJknMFUq5GnTcnFdipSFpUBOWMbYR5IXr20pcK2EbxFvrbcw-4C-oGOtaUyj0>

Physical Class





<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMucWYZdCiNPXsgx87J6T3h6TxvYHW9DafHtXiuasXofw74KpZsYZ11nvOUV0K7AsZZZM4y81uINJcxXwXXOqBi9id_jGsrF5BgGThwIcEad34O0>

Online 

    Class

05/06/2023 - 16/06/2023

$3000

Mombasa



<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPwKEtaIZscdHPY19jgXeeOGbw9Yu7R6TNw6vMh8uZJKteu7UC7PLFb0-50e2TZBvZexDLFZA7HQf71t7EFBYEXxOdtZMXu_w77wd0EHHZ2CJh0>

Physical Class





<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuGpbq4arOghTRnT52ll31IUgNSmfhJw9LnxgR9FrmZlFLygFNHIhd5eCNfRDEEyRbI8o04q2GbsplNtjHpqYQLYKmwKnT1rc4KvuKSfac2ITr0>

Online 

    Class

03/07/2023 - 14/07/2023

$3500

Kigali



<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPcZspNuM7gK9lQf6pVyuRrPYB_7cLpyJJ9QPSL57H4D6yRnu5jabgKk9yQN8Hj_pYHDsZ9UfgmzDu5HLOxxOD58jP8etjld6TPZqoQltyLObw0>

Physical Class





<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuZ0om9nvIyvcgk3ULjJZo-vi3oxwdolzF8yQkxfmMS5-b2Yb1VISMF7rGsNJuPeQbShS2eIjL7RWNPjQ6TL_lSx728m9H6AgXuktWxrN6R57p0>

Online 

    Class

07/08/2023 - 18/08/2023

$2700

Nairobi



<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoP_6pLaE18GIR7tUHxpvPsXr7EDIgbArw9k6CjpcI0uTC7VUevf-5zONLKN9dFB9VRWOUEgcbhOt5L6DdxiCQfW9Ch279H8ZzQ7RiD6ZV5etdT0>

Physical Class





<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuhXjcFqmTEjhwJm_89T1sp6dLAzosR_WFEyaV0ARYf9o1wCi8yQwdI2p48I6rSrhq0w8ERozB73Hj0xdo7aQ2HqxpUBTmnSrjbf_R_PF2pxYr0>

Online 

    Class

04/09/2023 - 15/09/2023

$3000

Mombasa



<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPCZzmmBBnLYDgD22DiItJCtoIg4Yk6Dw8U8KAaxtSfDHLtHt5WsaFqAafJrZkRs0XCd9YrtgLao5UVmbTGi-YBf1SoQkkHKwgGbmVBsk6I4ch0>

Physical Class





<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuiL7Nb_WhOYWRVBWY3DlFI6p0XyGSFYpMISPJI0MvDS-OI2DRYx_7t_wzAI5fIzqblqE2A-zMuS5qkrIybxCzVp16AroePM-O9n4ws6eoOe8a0>

Online 

    Class

02/10/2023 - 13/10/2023

$3500

Kigali



<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPJlKLKI8yYX_CDqezn5n_3RlfEOOZtvI10GirHAKAbpIkZjvA4JrqVrDWF6ca_u3Ijyrf6a1UuHIoxRS2T68tBvSbC9HxOrScCPrV-OOiN4LP0>

Physical Class





<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuipxHG5Y0QLdu4709Ar3R-b-B0K1Meixn8pKsCf9eMX6ux0SGZ5JpsXtDbjA9cDcnEtAyc-I4Xa0BhYGDYccCT59Lo7xr8OhCFV8wp8RKwbK80>

Online 

    Class

06/11/2023 - 17/11/2023

$3000

Mombasa



<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPpNa7B-_9veMyRXdlpG4qy2XFmrYVBq-IqLQYbQxbyliKrtStLgSEB_R5d_gsFMYTZf4wm7ph6o8FSKxITefuF6BTaBZptIIuY_HZn4-UJW5L0>

Physical Class





<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuEmK4fPUaXkkDHoP_5z-jYTzs3mA7e3qgaJJL1KozKfQ35QJQD07r2j4yWzt53D9A-ya-KnbATauylK8h8TjVwMbRnz9Fd11f3mdt0nJLe5xx0>

Online 

    Class

04/12/2023 - 15/12/2023

$2700

Nairobi



<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPMdSAuywGDIzRHK1VW-GrgwUmEHPS5aNo4qAXikGVxc215vja12JTgnXH5roP2IbffUy6fdyN8LSvWNMox6j0qIIyk9J9I-lbLBheWNa42vj-0>

Physical Class





<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMu-whq5lUNvbOizgKVt8gZuwZttojlkm6s4ntCbWH9tIZ5rKjVAy4Vy5du17hhH2DfFEsbLpKsxAsjUWflKPilvmsqqeSZP0LnQfGU6INqxztm0>

Online 

    Class



<https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KNTFFNY6jLTlannTsFNp1-eHHTEpo81Iu7a_dxejK8aXHL3zLPkUEkttCQx_n4wNO1hGOx5LtSMPWvoDKFbnLPZoeK7YxZuLOUtWvj1WW1gOcw1>

Calendar for 2023 

Workshops

 



<https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KM-cgdd93er8oiDD9RVWshihhlnnKouN9h2vGFMiElRvzu44mgTaveuusVyYC6Zus3dZXbKYbbm6njc9zvkKFAC0HsZwjol2pr1EEQQF5Gn0GQ1>

Contact 

us

 



<https://133IK.trk.elasticemail.com/tracking/click?d=TdO1gCuQ71hpWL60BWNntuwf2IWJfk_kJQ_Oex5_ejjxKwO9e8XGsKnbIiI6uZ9PELGMJi6Q2X5j7gDP9rVUH6smaQzKGX2_dHfTwCF5sSVRWfeotIfVmoIRmIe2vD-qZVOWlzeoCQ_1nvBsnNxcnAw1>

Whatapp

 

INTRODUCTION

Information 

and know-how are valuable company assets, and in times of fierce competition, 

organizations need to protect their information and systems against the threat 

of corporate espionage. Many organizations are unaware of potential information 

leaks, and as a result counterintelligence operations are neglected or are 

simply a series of routine technical measures. However, employees typically 

represent a major weak spot for organizations – which means that existing 

processes and structures for information flows need to be 

challenged.

Empirical 

research indicates that most information losses are traced back to a company’s 

employees, or the personnel of its suppliers, customers, or partners – all of 

whom have access to confidential information.

The 

training will look at the different threats organizations might face and ways in 

which they can protect and secure it against attacks. Participants will also 

learn how to set up counterintelligence processes that involve collecting 

information and conducting counterintelligence activities.

Course 

Objectives

By 

the end of this course, participants should be able to:

·       

Know the purpose of a 

cybersecurity audit

·       

Define cybersecurity audit 

controls

·       

Identify cybersecurity audit 

frameworks

·       

Explain proper audit team 

performance

·       

Define the benefits of a 

cybersecurity audit

·       

Learn how to identify vulnerable 

points within your organization and how to secure them.

Run 

  awareness campaigns among your colleagues in order to raise awareness of 

  espionage threats and protect them from attacks.

Develop 

  in-depth knowledge of the various forms of contemporary espionage 

  threats.

Master 

  how to identify, monitor, and evaluate information 

  risks.

Become 

  familiar with ethical and legal counterintelligence activities and 

  techniques.

Seize 

  the opportunity to share experience and knowledge with competitive/market 

  intelligence experts and peers from a range of industries.

Duration

14 

Days

Who 

should Attend

·       

Individuals involved in 

cybersecurity management

·       

Learning and development 

professionals

·       

Internal 

auditors

IT 

  professionals and managers working with information systems, who need to 

  understand best practices and standards to ensure security and integrity of 

  these systems

·       

Individuals seeking to gain 

knowledge about the main processes of auditing a cybersecurity 

program

·       

Individuals interested to pursue 

a career in cybersecurity audit

Competitive/Market 

  Intelligence Analysts and Managers

Knowledge 

  and Information Managers

Specialists 

  from R&D, Technology and Risk Management

COURSE 

CONTENT

What 

is a Cybersecurity Audit?

·       

Introduction

·       

What is a Cybersecurity 

Audit?

·       

When to Perform a Cybersecurity 

Audit

Controls 

and Frameworks

·       

Cybersecurity Audit 

Controls

·       

Cybersecurity Audit 

Frameworks

Completing 

the Audit

·       

The Audit

·       

Audit 

Completion

Understanding 

Cyber Threat Intelligence

·       

Defining 

Threats

·       

Understanding 

Risk

·       

Cyber Threat Intelligence and 

Its Role

·       

Expectation of Organizations and 

Analysts

·       

Diamond Model and Activity 

Groups

·       

Four Types of Threat 

Detection

·       

Process of auditing information 

systems

·       

Governance and management of 

IT

·       

Information systems’ 

acquisition, development and implementation

·       

Protection of information 

assets

·       

Information systems’ operation, 

maintenance and service management

Threat 

Intelligence Consumption

·       

Sliding Scale of 

Cybersecurity

·       

Consuming Intelligence for 

Different Goals

·       

Enabling Other Teams with 

Intelligence

Positioning 

the Team to Generate Intelligence

·       

Building an Intelligence 

Team

·       

Positioning the Team in the 

Organization

·       

Prerequisites for Intelligence 

Generation

Planning 

and Direction (Developing Requirements)

·       

Intelligence 

Requirements

·       

Priority Intelligence 

Requirements

·       

Beginning the Intelligence 

Lifecycle

·       

Threat 

Modeling

Recent 

cybercrime trends

·       

Cyberwar attacks leading to the 

shutdown of production facilities or utilities (e.g. Stuxnet, 

Emotet).

·       

Ransomware trojans and smart 

viruses.

Recent 

espionage threats and protection

·       

Risk audits: Identification, 

monitoring, and evaluation of risks for information theft.

·       

Electronic eavesdropping — 

reality or fiction?

·       

Audio-visual information 

gathering.

·       

Product piracy.

Information 

drainage through social engineering

·       

Threats: Elicitation, back-door 

recruitment, external personnel, Romeo approaches, social media activities 

(sockpuppets), and pretext calls.

·       

Protection: Vulnerability 

analysis, employee training, and never-talk-to-strangers 

policies.

Security 

of data and communication networks

·       

Protection against hacking and 

orchestrated attacks.

·       

The weak spot — exploiting the 

human factor.

·       

Opportunities and limitations 

for technical counterintelligence solutions.

·       

Secure communication: Safe data 

transfer methods, minimization of communication risks, and protection of 

corporate communication structures.

·       

Internet: How to securely 

conduct research, transfer data, and avoid harmful 

software.

·       

Illustration of attacks with 

numerous small case studies.

Counterintelligence: 

The role of CI/MI professionals in espionage 

protection.

·       

Prevention 

campaigns.

·       

Penetration tests for an 

outside-in perspective.

·       

Briefing/de-briefing of 

colleagues with sensitive external contacts.

 

 

THE 

END

 

 

 

 

<https://133IK.trk.elasticemail.com/tracking/unsubscribe?d=LSyIvUzS6_xI62TKxj2aRes3Afeo86oNqwZXxlSFJ-Cu79p9_l9aGNHpkKM723VuvhzVzxQMF2N6YefP46FHGgY9JtogfRlneVvSud1mava5rDLiA-opyT76pZ6s-WEgkg2>

UNSUBSCRIBE

ATOM RSS1 RSS2