SlideShare a Scribd company logo
1 of 9
Cyber Security Awareness Month 2017:
Nugget 7
WRAP-UP!
Chinatu Uzuegbu
CISSP, CISM, CISA, CEH,OCA, ITIL, MCSE, MCDBA
Senior Cyber Security Consultant
RoseTech CyberCrime Solutions Ltd
info@rtechcybercrimesolutions.com
chinatuuzuegbu@gmail.com
+2348037815577
Cyber Security Awareness Month 2017:
WRAP-UP
• It was an exciting and pleasurable time in the October 2017 National Cyber Security
Awareness Program.
• I personally had a nice time sharing those Nuggets with you, I hope you found them useful and
refreshing.
• I would advice you skim through each of the Nuggets as individual, business or governmental
body, they would go a long way to helping you understand what you are protecting, how much
protection it requires and what to do to fight against the potential crimes around it.
• It would be better to take it in sequence , that is from the first down to the last Nugget.
• The essence of the Awareness Program is to stir you as a User, Business or Governmental
body to the Clarion Call of proactively protecting your information assets from uncertainties
and Cyber Threats.
• The truth still remains that the rate of Cyber Crimes is drastically increasing! We need to be
very conscious of this and imbibe the culture of staying safe both in managing our Information
resources and Online. ‘STOP, THINK and CONNECT’ anytime you are Online or on the
Internet.
• We urge you to watch out for subsequent Cyber Security papers and presentations as you
Follow us on the various Media.
• We would quickly take a snapshot of what was covered in this series of Cyber Security
Awareness Month Program.
• Thank you for being part of the National Cyber Security Awareness Month 2017.
Cyber Security Awareness Month 2017:
In the Series.....
• We kicked off the Cyber Security Awareness Program with ‘Breaking News’
revealing the speed of Cyber Crimes as new Technologies emerge, how it has
affected the Global world, Africa and Nigeria as a whole and the objectives behind
the National Cyber Security Awareness Month Program.(please refer to ‘Breaking
News’)
• Then we looked at the basic concepts of Cyber Security in Nugget 1, ‘Identify and
Classify your Information Assets’ , revealed the importance of identifying ,
evaluating and classifying your Information Assets as the first step in Cyber
Security. It is the Value you place on your Assets that would determine the Measure
of protection required on the Asset. (Please see Identify and Classify Your
Information Assets).
• Nugget 2, ‘Protecting Your Information Assets’, further revealed the various
Techniques and Controls applied in Cyber Security. The CIA(Confidentiality, Integrity,
Availability) Triad, the three Control Types(Administrative, Technical and Physical)
and the 7 Techniques and Services(Preventive, Detective, Deterrent, Corrective,
Restorative, Compensative and Directive). It is important to understand each term
and the concept around each. (Please see Nugget2).
• Nugget3, ‘Determining The Ideal Security Measures’ emphasized a level of assurance
that the Security Measure /Counter Measure/Safeguard on your Information Asset is the best
and most suitable at that point in time. Vulnerabilities and Risk Analysis Techniques would
apply here(Please see Nugget3).
Cyber Security Awareness Month 2017:
In the Series..... Cont’d
• Nugget 4 , ‘The Cyber Crime ACT 2015’ revealed the current version of Cyber Crime
(Prevention and Prohibition) ACT we are running in Nigeria. We need to enforce it and
inculcate it into our various industries as User, Business or Governmental body, after all Cyber
Security is everyone’s Responsibility. We would advice you check it out and per use it here
https://cert.gov.ng/images/uploads/CyberCrime_(Prohibition,Prevention,etc)_Act,_2015.pdf.
Kindly share with all concerned and let it get across to every citizen of Nigeria.
• Nugget 5, ‘Combating Cyber Crimes 1’ drove us to the landing point of the 2017 National
Cyber Security Awareness Month with Threats associated with Social Engineering which is the
most common and successful Cyber Crimes. Majority of the attacks may not be possible if the
human wing is secured enough with the right knowledge and skills ahead of the bad guys.
User Training is important, security metrics and campaigns should be used to measure the level
of Security knowledge.
• Finally, Nugget 6, ‘Combating Cyber Crimes 2’, exposed other Cyber Threats aside Social
Engineering, the truth is that the list is unending, Cyber Security cuts across Software and
Applications , Patches. Operations, Physical , Encryptions, Networks and Communications,
Access Controls, System Updates, Mobile, Logs and Monitoring, Firewalls, Social Media, in fact
virtually everything is riding on the internet and managing them up to the Internet is paramount.
(Please see Nugget 6).
• We would advice you go back to each Nugget, per use and kindly share with others, remember
Cyber Security is the responsibility of everyone.
Cyber Security Awareness Month 2017:
In this Series..... Pictorial View
Cyber Security Awareness Month 2017:
In Conclusion
• It is a good practice to understand what you are protecting, how to protect it and fight
against the threats surrounding it. This is what Cyber Security is all about.
• To achieve and enforce a good measure of Cyber Security, We advise that the User,
Business and Governmental body abide to the local and Global Standards and
Regulations.
• These Regulatory bodies have a way of enforcing entities to maintain due Care and
Due Diligence in carrying out their duties.
• Examples of such Regulatory bodies are the ISO(International Standard
Organisations) group, that of Cyber Security is tagged ISO 27001 for Information
Security Management System, NIST(National Institute of Standards and
Technology), that of E-mail Cyber Security is NIST-45 and that of Risk is NIST-30.
• We also have other bodies such as Economic and Financial Crimes Commission
(EFCC), Central Bank of Nigeria(CBN), Nigerian Financial Intelligence Unit(NFIU),
Payment Card Industry Data Security Standards (PCIDSS), Health Insurance
Portability and Accountability ACT(HIPAA )and others. HIPAA is more applied in the
USA.
• Businesses and Governments should not just aim at the Certifications but ensure
that each of the frameworks are duly applied, enforced and well maintained.
• Most of the frameworks are integrated and customised to suit the Business
processes and thus, make enforcement seamless.
Cyber Security Awareness Month 2017:
In Conclusion...... Cont’d
• Always remember that the human wing is the weakest link in any organisation. It is a
good practice to promote both local and abroad trainings for Users.
• Authentication loop hole is another area that grants easy and unauthorised access
to the bad guys. It is a good practice to enforce the Multi factor authentication
technique, Manage Passwords effectively, use the Single-Sign-On techniques to
reduce the administrative bottle necks.
• It is important to ensure Segregation of Duties, Principle of Least privilege(User can
only access resources required to do the job and nothing more) and Need To
Know(User can only utilise the level of knowledge required). Logs and Monitoring
tools must apply, preferably SIEM(Security Information and Events Monitoring).
• Standards such as Open Web Application Security Project (OWASP) and Open Source Security
Testing Methodology (OSSTM) should apply on Software and Applications as well as
Integrated Code testing techniques such as Fuzzy should apply.
• Layered Security, Defence-in-depth and End Point Security, the way to go!
• Always run tools to test level of Penetrations, intrusion detections and preventions.
• Run Vulnerability scans on daily basis as new vulnerabilities emerge daily.
• Always run Patches, Updates, Anti-Malwares, Monitoring, Encrypt data in motion and at rest,
embrace full disk encryption for your lap tops and others.
• Always STOP, THINK and CONNECT.
Subsequent Series on Cyber Security:
Watch out/Contact Us
• Kindly watch-out for more Articles, Posts and Publications on Cyber
Security especially as the Threats emerge.
• Also follow us on the various Media Linkedin, Facebook and Twitter.
• You can as well contact us for your training/prep on your Cyber Security
Certification Exams such as CISSP(Certified Information Systems Security
Professional), CISM(Certified Information Security Manager), CISA(Certified
Information Systems Audit) and CEH (Certified Ethical Hacker).
• Also contact us for your holistic and Resilient Cyber Security Solutions and
Training , Penetration Testing, Big Data Security and Systems Audit.
• We handle both Corporate and Individual Trainings.
• Thanks again for being part of the Cyber Security Awareness Month, we
appreciate you.
• We hope this helps a great deal!
Thank You!
See you in the subsequent Series
Chinatu Uzuegbu
CISSP, CISM, CISA, CEH,OCA, ITIL, MCSE, MCDBA, MSc.(Liverpool)
Senior Cyber Security Consultant
RoseTech CyberCrime Solutions Ltd
info@rtechcybercrimesolutions.com
chinatuuzuegbu@gmail.com
+2348037815577
Membership: ISACA, ISACA Lagos, ISC2, CSEAN,

More Related Content

What's hot

Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsinLabFIB
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPTRajat Kumar
 
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Ronan Martin
 
Cybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsBryan Len
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWPICPE
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-managementMark Gibson
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?RONIKMEHRA
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
Cyber security
Cyber securityCyber security
Cyber securityEduonix
 

What's hot (20)

Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
 
Cybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity laws
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-management
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber Security Awareness Month 2017-Wrap-Up

Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...NRBsanv
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfChinatu Uzuegbu
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldTEWMAGAZINE
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilienceSymantec
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxaudeleypearl
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkJack Shaffer
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 

Similar to Cyber Security Awareness Month 2017-Wrap-Up (20)

Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
RaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docxRaoNayakShelve inNetworkingSecurityUser levelB.docx
RaoNayakShelve inNetworkingSecurityUser levelB.docx
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 

More from Chinatu Uzuegbu

Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfChinatu Uzuegbu
 
Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfChinatu Uzuegbu
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxChinatu Uzuegbu
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfChinatu Uzuegbu
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?Chinatu Uzuegbu
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfChinatu Uzuegbu
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfChinatu Uzuegbu
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfChinatu Uzuegbu
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfChinatu Uzuegbu
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfChinatu Uzuegbu
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Chinatu Uzuegbu
 

More from Chinatu Uzuegbu (16)

Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdf
 
Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdf
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptx
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 

Recently uploaded

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Recently uploaded (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Cyber Security Awareness Month 2017-Wrap-Up

  • 1. Cyber Security Awareness Month 2017: Nugget 7 WRAP-UP! Chinatu Uzuegbu CISSP, CISM, CISA, CEH,OCA, ITIL, MCSE, MCDBA Senior Cyber Security Consultant RoseTech CyberCrime Solutions Ltd info@rtechcybercrimesolutions.com chinatuuzuegbu@gmail.com +2348037815577
  • 2. Cyber Security Awareness Month 2017: WRAP-UP • It was an exciting and pleasurable time in the October 2017 National Cyber Security Awareness Program. • I personally had a nice time sharing those Nuggets with you, I hope you found them useful and refreshing. • I would advice you skim through each of the Nuggets as individual, business or governmental body, they would go a long way to helping you understand what you are protecting, how much protection it requires and what to do to fight against the potential crimes around it. • It would be better to take it in sequence , that is from the first down to the last Nugget. • The essence of the Awareness Program is to stir you as a User, Business or Governmental body to the Clarion Call of proactively protecting your information assets from uncertainties and Cyber Threats. • The truth still remains that the rate of Cyber Crimes is drastically increasing! We need to be very conscious of this and imbibe the culture of staying safe both in managing our Information resources and Online. ‘STOP, THINK and CONNECT’ anytime you are Online or on the Internet. • We urge you to watch out for subsequent Cyber Security papers and presentations as you Follow us on the various Media. • We would quickly take a snapshot of what was covered in this series of Cyber Security Awareness Month Program. • Thank you for being part of the National Cyber Security Awareness Month 2017.
  • 3. Cyber Security Awareness Month 2017: In the Series..... • We kicked off the Cyber Security Awareness Program with ‘Breaking News’ revealing the speed of Cyber Crimes as new Technologies emerge, how it has affected the Global world, Africa and Nigeria as a whole and the objectives behind the National Cyber Security Awareness Month Program.(please refer to ‘Breaking News’) • Then we looked at the basic concepts of Cyber Security in Nugget 1, ‘Identify and Classify your Information Assets’ , revealed the importance of identifying , evaluating and classifying your Information Assets as the first step in Cyber Security. It is the Value you place on your Assets that would determine the Measure of protection required on the Asset. (Please see Identify and Classify Your Information Assets). • Nugget 2, ‘Protecting Your Information Assets’, further revealed the various Techniques and Controls applied in Cyber Security. The CIA(Confidentiality, Integrity, Availability) Triad, the three Control Types(Administrative, Technical and Physical) and the 7 Techniques and Services(Preventive, Detective, Deterrent, Corrective, Restorative, Compensative and Directive). It is important to understand each term and the concept around each. (Please see Nugget2). • Nugget3, ‘Determining The Ideal Security Measures’ emphasized a level of assurance that the Security Measure /Counter Measure/Safeguard on your Information Asset is the best and most suitable at that point in time. Vulnerabilities and Risk Analysis Techniques would apply here(Please see Nugget3).
  • 4. Cyber Security Awareness Month 2017: In the Series..... Cont’d • Nugget 4 , ‘The Cyber Crime ACT 2015’ revealed the current version of Cyber Crime (Prevention and Prohibition) ACT we are running in Nigeria. We need to enforce it and inculcate it into our various industries as User, Business or Governmental body, after all Cyber Security is everyone’s Responsibility. We would advice you check it out and per use it here https://cert.gov.ng/images/uploads/CyberCrime_(Prohibition,Prevention,etc)_Act,_2015.pdf. Kindly share with all concerned and let it get across to every citizen of Nigeria. • Nugget 5, ‘Combating Cyber Crimes 1’ drove us to the landing point of the 2017 National Cyber Security Awareness Month with Threats associated with Social Engineering which is the most common and successful Cyber Crimes. Majority of the attacks may not be possible if the human wing is secured enough with the right knowledge and skills ahead of the bad guys. User Training is important, security metrics and campaigns should be used to measure the level of Security knowledge. • Finally, Nugget 6, ‘Combating Cyber Crimes 2’, exposed other Cyber Threats aside Social Engineering, the truth is that the list is unending, Cyber Security cuts across Software and Applications , Patches. Operations, Physical , Encryptions, Networks and Communications, Access Controls, System Updates, Mobile, Logs and Monitoring, Firewalls, Social Media, in fact virtually everything is riding on the internet and managing them up to the Internet is paramount. (Please see Nugget 6). • We would advice you go back to each Nugget, per use and kindly share with others, remember Cyber Security is the responsibility of everyone.
  • 5. Cyber Security Awareness Month 2017: In this Series..... Pictorial View
  • 6. Cyber Security Awareness Month 2017: In Conclusion • It is a good practice to understand what you are protecting, how to protect it and fight against the threats surrounding it. This is what Cyber Security is all about. • To achieve and enforce a good measure of Cyber Security, We advise that the User, Business and Governmental body abide to the local and Global Standards and Regulations. • These Regulatory bodies have a way of enforcing entities to maintain due Care and Due Diligence in carrying out their duties. • Examples of such Regulatory bodies are the ISO(International Standard Organisations) group, that of Cyber Security is tagged ISO 27001 for Information Security Management System, NIST(National Institute of Standards and Technology), that of E-mail Cyber Security is NIST-45 and that of Risk is NIST-30. • We also have other bodies such as Economic and Financial Crimes Commission (EFCC), Central Bank of Nigeria(CBN), Nigerian Financial Intelligence Unit(NFIU), Payment Card Industry Data Security Standards (PCIDSS), Health Insurance Portability and Accountability ACT(HIPAA )and others. HIPAA is more applied in the USA. • Businesses and Governments should not just aim at the Certifications but ensure that each of the frameworks are duly applied, enforced and well maintained. • Most of the frameworks are integrated and customised to suit the Business processes and thus, make enforcement seamless.
  • 7. Cyber Security Awareness Month 2017: In Conclusion...... Cont’d • Always remember that the human wing is the weakest link in any organisation. It is a good practice to promote both local and abroad trainings for Users. • Authentication loop hole is another area that grants easy and unauthorised access to the bad guys. It is a good practice to enforce the Multi factor authentication technique, Manage Passwords effectively, use the Single-Sign-On techniques to reduce the administrative bottle necks. • It is important to ensure Segregation of Duties, Principle of Least privilege(User can only access resources required to do the job and nothing more) and Need To Know(User can only utilise the level of knowledge required). Logs and Monitoring tools must apply, preferably SIEM(Security Information and Events Monitoring). • Standards such as Open Web Application Security Project (OWASP) and Open Source Security Testing Methodology (OSSTM) should apply on Software and Applications as well as Integrated Code testing techniques such as Fuzzy should apply. • Layered Security, Defence-in-depth and End Point Security, the way to go! • Always run tools to test level of Penetrations, intrusion detections and preventions. • Run Vulnerability scans on daily basis as new vulnerabilities emerge daily. • Always run Patches, Updates, Anti-Malwares, Monitoring, Encrypt data in motion and at rest, embrace full disk encryption for your lap tops and others. • Always STOP, THINK and CONNECT.
  • 8. Subsequent Series on Cyber Security: Watch out/Contact Us • Kindly watch-out for more Articles, Posts and Publications on Cyber Security especially as the Threats emerge. • Also follow us on the various Media Linkedin, Facebook and Twitter. • You can as well contact us for your training/prep on your Cyber Security Certification Exams such as CISSP(Certified Information Systems Security Professional), CISM(Certified Information Security Manager), CISA(Certified Information Systems Audit) and CEH (Certified Ethical Hacker). • Also contact us for your holistic and Resilient Cyber Security Solutions and Training , Penetration Testing, Big Data Security and Systems Audit. • We handle both Corporate and Individual Trainings. • Thanks again for being part of the Cyber Security Awareness Month, we appreciate you. • We hope this helps a great deal!
  • 9. Thank You! See you in the subsequent Series Chinatu Uzuegbu CISSP, CISM, CISA, CEH,OCA, ITIL, MCSE, MCDBA, MSc.(Liverpool) Senior Cyber Security Consultant RoseTech CyberCrime Solutions Ltd info@rtechcybercrimesolutions.com chinatuuzuegbu@gmail.com +2348037815577 Membership: ISACA, ISACA Lagos, ISC2, CSEAN,