Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

0

Share

Download to read offline

Talk1 muscl club_v1_2

Download to read offline

Presenting what the Security Club is about, goals, structure, format, opportunities, benefits, etc.

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • Be the first to like this

Talk1 muscl club_v1_2

  1. 1. Version: 1.1 Date: 05/02/2018 Author: Sylvain Martinez CLUB PRESENTATION
  2. 2. 2 CONTENTS 1. Context 2. Format 3. Opportunities 4. Profiles 5. Future
  3. 3. 3 1. CONTEXT: MISSION STATEMENT TO HELP MAURITIAN IT PROFESSIONALS SHARE INFORMATION AND LEARN ABOUT CYBER SECURITY THROUGH AN OPEN PLATFORM AND THE CREATION OF A CYBER SECURITY COMMUNITY.
  4. 4. 4 2. FORMAT: PRINCIPLES • Free for all; • Not a marketing platform; • Regular meetings; • Low or no cost to organize and setup.
  5. 5. 5 2. FORMAT: STRUCTURE • At a central location for most IT professionals: Port Louis or Ebene; • Preference for a neutral place (pub, coffee shop, etc.); • Once a month, end of month. I.e.: 3rd Wednesday of every month; • Website, Facebook, twitter, Linkedin • Slides to be shared on slideshare
  6. 6. 6 2. FORMAT: STRUCTURE • Mix of technical and non technical talks; • Last for 2 hours: • 5 Min: Concept introduction; • 5 Min: Cyber Security News; • 45 Min 1st Talk: • 5 Min Speaker presentation; • 30 Min presentation; • 10 Min Q&A; • 15 Min: Break • 45 Min 1st Talk: • 5 Min Speaker presentation; • 30 Min presentation; • 10 Min Q&A;
  7. 7. 7 2. OPPORTUNITES: ATTENDEES • Free source of knowledge; • Opportunities to ask questions; • Learn and apply practical knowledge at work and at home; • Professional Networking;
  8. 8. 8 2. OPPORTUNITES: SPEAKERS • Provides experience in addressing and presenting to a crowd; • Sharing knowledge and sense of achievement; • Profile Visibility; • Stronger professional network.
  9. 9. 9 2. OPPORTUNITES: HOSTS • We drink your beer!; • Exposure for your venue; • Good Karma.
  10. 10. 10 2. PROFILE: ATTENDEES • Some knowledge of IT; • Some awareness of Cyber Security; • Interest or curious about Cyber Security.
  11. 11. 11 2. PROFILE: SPEAKERS • Good understanding of the topic; • Some years of experience in Cyber Security is required; • Speaking experience preferred but not mandatory • To promote WHITE HAT and not BLACK HAT.
  12. 12. 12 2. PROFILE: ORGANISERS • Governance to be kept at a minimum number of people to start with; • Have some spare time to: • Review talks; • Coordinate with host venue; • Help on the day; • Spread the word;
  13. 13. 13 2. FUTURE: TALKS • WIFI Hacking and how to protect yourself? • What is an IDS? • What is GDPR? • How to best handle passwords and why? • A look at KALI LINUX, a free penetration testing platform? • What is the difference between a Vulnerability Assessment and a Penetration Testing?
  14. 14. 14 2. FUTURE: EXPANSION • More talks per event; • External speakers from the Cyber Security Events Circuits; • Sponsored location; • Sponsored beverages and food;
  15. 15. 15 THANK YOU! Find us on Website: https://www.elysiumsecurity.com/muscl Facebook: http://www.facebook.com/esmuscl Twitter: @es_muscl

Presenting what the Security Club is about, goals, structure, format, opportunities, benefits, etc.

Views

Total views

115

On Slideshare

0

From embeds

0

Number of embeds

0

Actions

Downloads

1

Shares

0

Comments

0

Likes

0

×