Download presentation
Presentation is loading. Please wait.
Published byEleanore Hutchinson Modified over 6 years ago
1
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Example of CERT By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union July 25, 2018
3
ZMtech Cybersoft CERT Services & Solutions
Cyber threat poses a challenge. No organization by itself has adequate scope of relevant information, awareness, and intelligence of the threat landscape The way to overcome this limitation is via access to and sharing of relevant cyber threat intelligence, analysis, and response among trusted Public-private partners as well as relevant law enforcement authorities
4
Understanding of how to manage cyber security risks to systems, assets, clients, data and capabilities Controls & safeguards necessary to protect or deter cyber security threats Continuous monitoring to provide protections and real time alerts Incidence response activities Business continuity plans to recover capabilities
6
Summary of Cybersoft’ Proprietary Implemented Solutions
Item No. Solutions Group No. of Deployments Cumulative Totals 1. Enterprise Resource Planning (ERP) Public Institutions 7 Private Institutions 6 International Organizations and NGO’s 3 Integrated Civil Service Information System Records, Archive and Library Information System 27 50 2. Pension System for the F.D.R.E. 2 52 3. Web Portals 54 4. Justice System Reform Program Solutions 578 632 5. Integrated Higher Education Information System 638 6. Websites 19 657 7. Integrated Socio-Economic Information Systems 664 8. Various Windows Management Information Systems 20 684 9 Cyber Network Solutions 15 699 10. Specialized Consultancy 4 703
7
Example ZMtech belongs to InfraGard FBI groups
InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure With thousands of vetted members nationally, InfraGard's membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.
8
Attack continuum Before, During and After
Security methods must focus on both detection and the ability to mitigate the impact after an attacker gets in. You need to look at security model holistically and gain visibility and control not just at the endpoints but across the extended network and the entire attack continuum before an attack happens, during the time it’s in progress, and after it has damaged systems or stolen information. Before: Identify what’s on the extended network to implement policies and controls to defend it ZMtech Cybersoft Services Designs and builds advanced security solutions (Next-Generation Firewalls, IPS and IDS etc.) implements policies and controls to defend it Provides User Aweraness training Provides Advanced network and application penetration testing services Recommends Centralized Data Management System e.g.:
10
Cyber-ERP Subsystems
11
Cyber-ERP Systems
12
● During: Detect and block malware continuously
Continuous security monitoring ZMtech Cybersoft Services Automates security monitoring across various sources of security information. Provides intrusion prevention systems, and and web security. ● After: ZMtech Cybersoft Services Reduces the impact of an attack by identifying point of entry, determining the scope, containing the threat, eliminating the risk of re-infection, and re-mediating
15
Try ZMtech Cybersoft Services and Solutions
You will Like Them!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.