Академический Документы
Профессиональный Документы
Культура Документы
Ye
a
Africa 2014
RE
MENT
E
G
A
AN
COVE
RESPOND
The Programme is
Structured on an
Actual Threat
Management
Framework
INCIDE
N
T
M
Whoever is first in the field and awaits the coming of the enemy,
will be fresh for the fight; whoever is second in the field and has
to hasten to battle will arrive exhausted.
- Sun Tzu, The Art of War
LIGENCE
TEL
PREVENT
DETECT
THREA
T IN
Session 2
Establishing a Robust Threat
Intelligence & Talent Management
Capability
Session 1
The Threat Never Sleeps Best Practices in 24/7 Cyber
Security Monitoring
Prevent Session
Session 1
Cyber Underworld - An overview of
Global Threat Groups
(& Guidance to Mitigate Risks)
Detect Session
Session 2
Latest Detection Tools & Techniques
to Detect Cyber Intrusions
Session 1
Law Enforcement & Legal
Framework to Combat Cyber Crime
in Africa
Session 2
Current & Proposed Cyber
Collaboration Initiatives on the
Continent
www.cyberconafrica.org
Respond Session
Session 1
Recover Session
Regular Price
R 3650,00
R 4500,00
Law enforcement
Intelligence agencies
Defence teams
Internal Auditors
Technical and Support Specialists
Systems Integrators
Webmasters
Security Analysts
Business Continuity Managers
CTOs
Chief Architects
Senior IT Program Management
Systems Planners and Analysts
Strategic Planners
www.cyberconafrica.org