TERNET IN-Country Cybersecurity, Trust and Identity Workshop (Face-to-Face)

Africa/Johannesburg
    • 09:00 10:00
      Monday, 29 January: Welcome and Introduction (1 hour)
      1. Threat Universe & Landscape
      2. Organizations cyber risk profiling
        o Cyber kill chain
      3. Regulatory Universe
      4. Maturity Assessment (CMMI)
      5. Cybersecurity Reference Architecture
      6. Cybersecurity governance model (strategy 2 execution)
      7. Change management #1 round-table (prioritized milestone roadmap)
    • 10:00 12:00
      Monday, 29 January: Understanding the Principles of Identity Federation and eduGAIN
      1. Threat Universe & Landscape
      2. Organizations cyber risk profiling
        o Cyber kill chain
      3. Regulatory Universe
      4. Maturity Assessment (CMMI)
      5. Cybersecurity Reference Architecture
      6. Cybersecurity governance model (strategy 2 execution)
      7. Change management #1 round-table (prioritized milestone roadmap)
    • 12:00 14:00
      Monday, 29 January: Lunch Break
      1. Threat Universe & Landscape
      2. Organizations cyber risk profiling
        o Cyber kill chain
      3. Regulatory Universe
      4. Maturity Assessment (CMMI)
      5. Cybersecurity Reference Architecture
      6. Cybersecurity governance model (strategy 2 execution)
      7. Change management #1 round-table (prioritized milestone roadmap)
    • 14:00 16:00
      Monday, 29 January: Exploring Identity Federation Principles and eduGAIN
      1. Threat Universe & Landscape
      2. Organizations cyber risk profiling
        o Cyber kill chain
      3. Regulatory Universe
      4. Maturity Assessment (CMMI)
      5. Cybersecurity Reference Architecture
      6. Cybersecurity governance model (strategy 2 execution)
      7. Change management #1 round-table (prioritized milestone roadmap)
    • 16:00 17:00
      Monday, 29 January: Hands-On: Access and Configuration of Virtual Machines
      1. Threat Universe & Landscape
      2. Organizations cyber risk profiling
        o Cyber kill chain
      3. Regulatory Universe
      4. Maturity Assessment (CMMI)
      5. Cybersecurity Reference Architecture
      6. Cybersecurity governance model (strategy 2 execution)
      7. Change management #1 round-table (prioritized milestone roadmap)
    • 09:00 17:00
      Day 2
      1. A 100000km view of the cloud
      2. Cloud governance model
      3. Cloud risk assessment
        o Threat Modelling, risks, vulnerabilities
      4. Cloud computing & security
      5. Identity & access governance
        o Joiner, mover, leaver,
        o Provisioning & de-provisioning
        o Platforms (Azure AD, applications, roles, groups etc.)
        o AAA - Segregation of duty controls
      6. Roadmap to zero trust
      7. Change management #2 round table - cloud risk assessment
    • 09:00 17:00
      Day 3
      1. Zero trust governance framework
        a. Identity and Access Management (IAM)
        b. Device and User Authentication
        c. Network Segmentation
        d. Network Visibility and Monitoring
        e. Least Privilege Access
        f. Continuous Authentication and Authorization
        g. Policy Enforcement and Access Control
        h. Threat Intelligence and Analytics
        i. Change Management #5 Round table - Reflection & forging forward