Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
ITU E-Commerce Conference for the Arab Region - May 2001 A Digital Signature Act for Egypt: Understanding the Challenges! Dr. Sherif Hashem Head, Electronic.
Advertisements

Launching Egyptian Root CA and Inaugurating E-Signature Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA.
 Cyber Ecosystem & Data Security Subhro Kar CSCE 824, Spring 2013 University of South Carolina, Columbia.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
National Cybersecurity Awareness Campaign 11
1 July 08, 2010 Information Security Officer Meeting.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
1 Regulatory Challenges During and Following a Major Safety or Security Event Muhammad Iqbal Pakistan Nuclear Regulatory Authority Presentation at General.
Strengthening Public Finance Management Through Computerization of Procurement Management System High Level Forum on Procurement Reforms in Africa Tunisia.
June 2003 © S.Hashem Empowering E-Business in Egypt: Facing the Challenges! Dr. Sherif Hashem Director, Information Society Development Office Ministry.
1 Ben Woelk RIT Information Security Office Advancing Digital Self Defense Establishing a Culture of Security Awareness at the Rochester Institute of Technology.
Information and Communication Technologies in the field of general education in Armenia NATIONAL CENTER OF EDUCATIONAL TECHNOLOGIES.
National Public Health Performance Standards Local Assessment Instrument Essential Service:3 Inform, Educate, and Empower People about Health Issues.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Experiences from establishing a national Centre for Information Security in Norway TERENA Networking Conference 2003 Maria Bartnes Dahl &
Communication strategy and techniques to launch InnovMed Dr. Fatma H. Sayed Vienna meeting 25 June 2007.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
National Telecom Regulatory Authority EGYPT Eng. Aly Anis Livingstone, Zambia September 2013 The Fifth Annual African Consumer Protection Dialogue.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Seán Paul McGurk National Cybersecurity and Communications
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Nuclear Power Plant/Electric Grid Regulatory Coordination and Cooperation - ERO Perspective David R. Nevius and Michael J. Assante 2009 NRC Regulatory.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1:1 Computing Initiative RttT Fidelity Check Spring 2013.
Copyright © 2010 APCERT Graham Ingram AusCERT SC member of APCERT AP* Retreat, Gold Coast 23 rd August 2010.
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
2 ictQATAR “ Information and Communication Technology (ICT) improves how we live and work in countless ways.”  The Ministry of Information Communication.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
The new cyber threats in 2013 – the hungarian approach Mr. Mihály Zala, Major-general President of National Security Authority of Hungary.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 August 18, 2010 Disaster Recovery Coordinators’ Meeting.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Hosted by SACCCS work on public engagement Gallagher Convention Centre, Midrand, South Africa 28 October 2011 Sharon Mashau – Assistant Manager: Public.
Action Plan For the formulation or review of a National Policy on ICT and Education JANUARY 2007 Belize.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
PPP Legal & Regulatory Framework. PPP Policy In July 2008 GOK approved the PPP policy directive through which: PPPs are identified as a method for investing.
Managing Access at the University of Oregon : a Case Study of Scholars’ Bank by Carol Hixson Head, Metadata and Digital Library Services
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Cyber Services Plc BRIEF SUMMARY  Founded in 2015  Founders and members are security veterans with proven international reputation  Resources.
TRAINING OPTIONS AT CYBER SERVICES PLC Anett Mádi-Nátor, Director of International Operations Ferenc Frész, CEO.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
MCIT’s Human Resource Development Programs in ICT Ayman El-Dessouki Professional Training Program Supervisor MCIT Ministry of Communications & Information.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Financial Sector Cybersecurity R&D Priorities The Members of the FSSCC R&D Committee November 2014.
ICT Indicators Egypt Profile Eng. Hesham Baraka Director of Information Center (NTRA) Dr. Nagwa Elshnawy Director of Strategic Planning ( ITIDA ) Presented.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Security Officer Meeting
DIGITAL CZECH REPUBLIC Impact of Digital Revolution
Cyber Security coordination in Europe CERT-EU’s perspective
8 Building Blocks of National Cyber Strategies
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Threat landscape financial sector
NERC Cyber Security Standard
Computer Emergency Response Team
The Secure Contingency Plan
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP Eg-CERT Cyber security Awareness Team Ahmed Mashaly Senior IT Security Engineer Egyptian Computer Emergency Response Team EgyCERT 12/4/2014

OWASP Roadmap Eg-CERT. Eg-CERT 2013 incident report. Cyber security awareness plan. Application security awareness program.

OWASP EG-CERT is charged with providing computer and information security incident response, support, defence and analysis against cyber attacks and collaboration with government, financial entities and any other critical information infrastructure sectors scoped to Egypt.

OWASP Established 0n April Under Egyptian National Telecom Regulatory Authority (NTRA)

OWASP July 2009, 24/7 Monitoring & Incident Response. September 2009, Forensics Analysis Service..

OWASP April 2011, Malware analysis & Reverse Engineering.

OWASP March 2012, Full member in FIRST (Forum of Incident Response and Security Teams). September 2013, EG-CERT has it’s own premises.

OWASP

Cyber Security Awareness Started operations in Small scale operations. Preparation for launching a full scale awareness campaign.

OWASP Why do we need awareness The target is simply providing the most possible level of protection to both the Egyptian critical information infrastructure and the Egyptian ordinary computer users.

OWASP Why do we need awareness It is fairly known for cyber security professional that humans are the weakest link in the whole ecosystem of cyber security.

OWASP Why does Egypt need awareness Percentage of computers running Microsoft software reporting malware infections in Egypt.

OWASP Why does Egypt need awareness

OWASP Infection rates Many elements can affect the infection rates:- - OS type(It takes a relatively long time to switch to open source, or to develop domestic operating systems ).

OWASP Infection rates Many elements can affect the infection rates:- - Lack of antimalware software - Pirated software - Lack of awareness.

OWASP What’s the Plan

OWASP Fresh ideas How to Spread awareness of online threats and making it a culture ? Looking for more creative ways to make it happen.

OWASP Awareness targets The targets for the awareness campaign can be categorized into three categories each has its proper communication channels and method:- -Organizations. - Public. -Technical

OWASP Organizations : Which is the most critical We should start by trying to define what is critical. We define the proper communication channels and methods. We handle the critical targets.

OWASP Organizations : Which is the most critical Examples for most critical assets :- - Ministries and governmental entities. - Banking sector. -Telecom infrastructure.

OWASP Organizations : Which is the most critical Examples for less critical assets :- - Universities. - Private sector organizations.

OWASP Public scope The main issue regarding the public scope of the campaign is communication channels and methods.

OWASP Communication channels - Printed media. - Radio. -Television. -Social media.

OWASP Technical IT professionals. An important part of any national awareness campaign is awareness for IT professionals.

OWASP Application Security Awareness Program (ASAP) Program duration: July - November 50 Developer 5 groups (each 10 trainees)

OWASP Application Security Awareness Program (ASAP)

OWASP Course duration: Three full day sessions (24 hours) Program total number of session: 15 session 4 days per month Application Security Awareness Program (ASAP)

OWASP OWASP participants: 3 Application security experts 3 Lab Assistants Application Security Awareness Program (ASAP)

OWASP Application Security Awareness Program (ASAP) Program target Audience (Stage 1): -Governmental applications developers -Banking Sector -Ministries websites and applications

OWASP Application Security Awareness Program (ASAP) Program partners: Central bank of Egypt (CBE) Information and Decision Support Center (IDSC) Egyptian Banking Institute (EBI)

OWASP Questions

OWASP