Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Talk1 muscl club_v1_2

65 views

Published on

Presenting what the Security Club is about, goals, structure, format, opportunities, benefits, etc.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Talk1 muscl club_v1_2

  1. 1. Version: 1.1 Date: 05/02/2018 Author: Sylvain Martinez CLUB PRESENTATION
  2. 2. 2 CONTENTS 1. Context 2. Format 3. Opportunities 4. Profiles 5. Future
  3. 3. 3 1. CONTEXT: MISSION STATEMENT TO HELP MAURITIAN IT PROFESSIONALS SHARE INFORMATION AND LEARN ABOUT CYBER SECURITY THROUGH AN OPEN PLATFORM AND THE CREATION OF A CYBER SECURITY COMMUNITY.
  4. 4. 4 2. FORMAT: PRINCIPLES • Free for all; • Not a marketing platform; • Regular meetings; • Low or no cost to organize and setup.
  5. 5. 5 2. FORMAT: STRUCTURE • At a central location for most IT professionals: Port Louis or Ebene; • Preference for a neutral place (pub, coffee shop, etc.); • Once a month, end of month. I.e.: 3rd Wednesday of every month; • Website, Facebook, twitter, Linkedin • Slides to be shared on slideshare
  6. 6. 6 2. FORMAT: STRUCTURE • Mix of technical and non technical talks; • Last for 2 hours: • 5 Min: Concept introduction; • 5 Min: Cyber Security News; • 45 Min 1st Talk: • 5 Min Speaker presentation; • 30 Min presentation; • 10 Min Q&A; • 15 Min: Break • 45 Min 1st Talk: • 5 Min Speaker presentation; • 30 Min presentation; • 10 Min Q&A;
  7. 7. 7 2. OPPORTUNITES: ATTENDEES • Free source of knowledge; • Opportunities to ask questions; • Learn and apply practical knowledge at work and at home; • Professional Networking;
  8. 8. 8 2. OPPORTUNITES: SPEAKERS • Provides experience in addressing and presenting to a crowd; • Sharing knowledge and sense of achievement; • Profile Visibility; • Stronger professional network.
  9. 9. 9 2. OPPORTUNITES: HOSTS • We drink your beer!; • Exposure for your venue; • Good Karma.
  10. 10. 10 2. PROFILE: ATTENDEES • Some knowledge of IT; • Some awareness of Cyber Security; • Interest or curious about Cyber Security.
  11. 11. 11 2. PROFILE: SPEAKERS • Good understanding of the topic; • Some years of experience in Cyber Security is required; • Speaking experience preferred but not mandatory • To promote WHITE HAT and not BLACK HAT.
  12. 12. 12 2. PROFILE: ORGANISERS • Governance to be kept at a minimum number of people to start with; • Have some spare time to: • Review talks; • Coordinate with host venue; • Help on the day; • Spread the word;
  13. 13. 13 2. FUTURE: TALKS • WIFI Hacking and how to protect yourself? • What is an IDS? • What is GDPR? • How to best handle passwords and why? • A look at KALI LINUX, a free penetration testing platform? • What is the difference between a Vulnerability Assessment and a Penetration Testing?
  14. 14. 14 2. FUTURE: EXPANSION • More talks per event; • External speakers from the Cyber Security Events Circuits; • Sponsored location; • Sponsored beverages and food;
  15. 15. 15 THANK YOU! Find us on Website: https://www.elysiumsecurity.com/muscl Facebook: http://www.facebook.com/esmuscl Twitter: @es_muscl

×