By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union Example of CERT By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union July 25, 2018
ZMtech Cybersoft CERT Services & Solutions Cyber threat poses a challenge. No organization by itself has adequate scope of relevant information, awareness, and intelligence of the threat landscape The way to overcome this limitation is via access to and sharing of relevant cyber threat intelligence, analysis, and response among trusted Public-private partners as well as relevant law enforcement authorities
Understanding of how to manage cyber security risks to systems, assets, clients, data and capabilities Controls & safeguards necessary to protect or deter cyber security threats Continuous monitoring to provide protections and real time alerts Incidence response activities Business continuity plans to recover capabilities
Summary of Cybersoft’ Proprietary Implemented Solutions Item No. Solutions Group No. of Deployments Cumulative Totals 1. Enterprise Resource Planning (ERP) Public Institutions 7 Private Institutions 6 International Organizations and NGO’s 3 Integrated Civil Service Information System Records, Archive and Library Information System 27 50 2. Pension System for the F.D.R.E. 2 52 3. Web Portals 54 4. Justice System Reform Program Solutions 578 632 5. Integrated Higher Education Information System 638 6. Websites 19 657 7. Integrated Socio-Economic Information Systems 664 8. Various Windows Management Information Systems 20 684 9 Cyber Network Solutions 15 699 10. Specialized Consultancy 4 703
Example ZMtech belongs to InfraGard FBI groups InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure With thousands of vetted members nationally, InfraGard's membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.
Attack continuum Before, During and After Security methods must focus on both detection and the ability to mitigate the impact after an attacker gets in. You need to look at security model holistically and gain visibility and control not just at the endpoints but across the extended network and the entire attack continuum before an attack happens, during the time it’s in progress, and after it has damaged systems or stolen information. Before: Identify what’s on the extended network to implement policies and controls to defend it ZMtech Cybersoft Services Designs and builds advanced security solutions (Next-Generation Firewalls, IPS and IDS etc.) implements policies and controls to defend it Provides User Aweraness training Provides Advanced network and application penetration testing services Recommends Centralized Data Management System e.g.:
Cyber-ERP Subsystems
Cyber-ERP Systems
● During: Detect and block malware continuously Continuous security monitoring ZMtech Cybersoft Services Automates security monitoring across various sources of security information. Provides intrusion prevention systems, and email and web security. ● After: ZMtech Cybersoft Services Reduces the impact of an attack by identifying point of entry, determining the scope, containing the threat, eliminating the risk of re-infection, and re-mediating
Try ZMtech Cybersoft Services and Solutions You will Like Them!