You are on page 1of 4

Venue Birchwood Hotel & Conference Centre - Dates 18th-22nd February 2019

WHOWILL ATTEND
Target Audience
IT professionals, security professionals,
auditors, site administrators, general
management and anyone tasked with
Cyber Security Specialist Masterclass managing and protecting the integrity of
the network infrastructure. This also
includes anyone already familiar and
involved with IT/cyber/digital security and
seeking to build on their fundamental
principles of security.

Target Competencies
Information security management
Vulnerability assessment and management
Applying cyber securitysolutions
Developing IT policies and procedures
Cyber forensics Ethical hacking
and Black Hat hacking

This course will provide participants with in-depth knowledge and practical
skills to plan, deliver and monitor IT/cyber security to internal and external ORGANISATIONS THAT
clients encompassing a complete, conjoined set of disciplines in the areas of
IT policies, Security-Operational-Run-Book, security/penetration testing, WILL BENEFIT:
ethical hacking and black hat hacking.
Government Ministries
It will also cover WiFi security, Website security, human factors, cyber Department & Parastatals
forensics, cyber security team management, Secure Operations Center (SOC)
and Computer Security Incident Response Team (CSIRT) infrastructures. Private EquityFirms

As part of the course, participants will conduct a risk assessment of two Hedge Funds
different deployments based on the ISO27001 to identify any direct, or
indirect threats, security exposures, or potentials for vulnerabilities.
Large Corporations
Participants will also respond to an example security incident and identify Venture Capital Firms
the best practices which could be applied to secure their own organization,
and associated assets. All participants will be given copies of Run Books to Banks & Investment Banks
deal with cyber extortions, Distributed Denial of Service (DDoS/DoS) and
forensic investigations. Technology Law Firms
Course Methodology In-house Legal Information
The course will include practical sessions, videos as well as live examples Counsels
[e.g. Virus] and demonstrations of white and black hat hacking tools. All
participants will also be provided with the latest research papers and articles. Corporate Insolvency Firms
As part of the course, participants will conduct a risk assessment of two Development Restructuring
different deployments based on the ISO27001 to identify any direct, or indirect Firms
threats, security exposures, or potentials for vulnerabilities. Participants will
also respond to an example security incident and identify the best practices Auditors
which could be applied to secure their own organization, and associated
assets.
Venue Birchwood Hotel & Conference Centre - Dates 18th-22nd February 2019
Course Objectives
 By the end of the course, participants will be able to:
 Apply information security standards to their organization and its
critical assets
 Identify the threats presented by viruses, malware, active code, and
About In-house
Active Persistent Threats (APT) and consider the different mitigating
options We can come and help you save
 Formulate and manage effective cyber security teams, and apply the up 50% on in-house training. We
Computer Security Incident Response Team (CSIRT) framework, tools can also tailor make our programs
and capabilities to deliver cost effective and robust solutions to protect
the organization to suit your training requirements
 Use Neuro Linguistic Programing (NLP) to deliver messages that will
change the way employees work and think about security
 Examine the area of wireless security protocols, their security
attributes, and their potential insecurities within the organization, and
in public spaces
 Illustrate how penetration testing and ethical hacking enhance
organizational security
 Evaluate and apply two of the most important aspects in the modern
day of cyber-adversity: Open Source Intelligence (OSINT) and cyber
threat intelligence
Course Topics
Adapting to evolving standards
Information security standards (e.g. PCI-DSS/ISO27001)
Documented tools:
Choose option with Gadget
ISO/IEC 27001
PAS 555
Control Objectives for Information and Related Technology
(COBIT)
Future standards
ISO/IEC 2018
EU privacy regulations
Local and international government stipulations implicating
access to private data
Principles of IT security
Enterprise security
External defenses
Web filtering
Intruder Prevention Systems (IPS) We Also Present the following
Intruder Detection Systems (IDS) Workshops
Firewalls
Secure code Advanced Office Management &
Administration Skills | Performance
Software Development Lifecycles (SDL) Excellence & Leadership Skills| Advanced
Potential insecurities within developed applications Records Management & Archives |
WiFi security protocols and attributes Developing & Implementing a World class
Voice over IP (VoIP) security Electronic Records Management Systems
Governance Risk and Compliance (GRC) |Business Writing Skills &
Communication Skills| Emotional
Security Incident Event Management (SEIM) applications Intelligence & Leadership Skills| Project
Cloud security Management |Event Coordination,
Third party security and compliance Protocol & Travel Management | Real
Value Fleet Management
Venue Birchwood Hotel & Conference Centre - Dates 18th-22nd February 2019
Adopting cyber security measures
Employee perception on security through Neuro Linguistic Programing (NLP)
Security education and awareness: techniques, systems, and methodologies
Penetration testing
Ethical hacking
Options to mitigate viruses, malware, active code threats and Active Persistent Threats
(APT)
The Computer Incident Response Team (CSIRT) frameworks, tools and capabilities
Incident first response: proven methodologies, tools, and systems
The science of applying robust digital forensics: applicable law, capabilities, and
methodologies
Supervisory Controls and Data Acquisition (SCADA); security requirements, processes and
methodologies
Abuse images: complying with local and international law
Building cyber security teams
Creation and management of a Secure Operations Center (SOC)
Development of the Corporate Security Organization Framework
Formulation and deployment of a Computer Security Incident Response Team (CSIRT)
Bespoke Security Incident and Event System (SIEM) for the operational deployment
Risks associated with I/O Security (e.g. USBs, CDs, other forms of media)
Risks of Active Code Injection, and mitigation techniques
Advanced cyber risks and tools
Cyber crime and the darknet/darkweb: the world of the hackers/hacktivists
The underground of cyber criminality
Social engineering as a tool to test operational resilience
Open Source Intelligence (OSINT)
Cyber threat intelligence
Open source and commercial security tools
The operational use of encryption
Virtual private networks
To Register, call Hamilton Consultancy on +27 11 049 9925 or email completed form to
gladness@hamiltonconsultancy.co.za
Cyber Security Specialist Masterclass Registration Form
18th -22nd February 2019 – Birchwood Hotel Johannesburg, South Africa, Johannesburg

TERMS AND CONDITIONS OF REGISTRATION


Authorizing signatory for this booking may sign only Payment Method:
on allocation of budgets. Bank Transfer or cheque payments to be made payable to:
PLEASE FAX BACK FOR ATTENTION (name of sales Account name: Hamilton Consultancy Pty Ltd
person):................................................................................
Name:………………………………………………….............. Bank: First National Bank South Africa
Position:…………………………………………………........... Account no: 62608111960
Direct ………………...…….....Fax……...………...…............ Branch: RANDBURG
Email:………………………………………………….............. Branch code: 254-005
Swift Code FIRNZ AJJ
Account type: Business Cheque
Authorisation Signature .......................... Date: ..................
Hotel Accommodation:
We authorise the following delegate(s) to attend:
Overnight accommodation is not included in the conference fee.
To reserve a room please apply directly to the venue where this
Organisation:………………..................................……….…………
event is taking place or contact Memory for assistance .
Address:……………………………...................................…………
City……………………………Postcode….................................….. Confirmation Details:
Tel………………………....……Fax….....…........…..............….......
Please contact us before the event if for any reason you have
Your organisation vat Reg No.....................................................
not received written acknowledgement of your registration
1. Name:………………........………..Position…...............……........
Cancellation Policy:
In order to guarantee your place, our offices must receive
Email:...……………………………........Cell:………..............………
payment prior to the event. Hamilton Consultancy reserves the
right to refuse admission for non-payment.
2. Name:………………........………..Position…...............……........
All cancellations must be received in writing. No telephonic
Email:...……………………………........Cell:………..............……… cancellations will be accepted.
Should you be unable to attend the event, a service charge of
3. Name:………………........………..Position…...............……........ 25% will be levied in respect of written notification of cancellation
received at this office within 7 days of registering. There after the
Email:...……………………………........Cell:………..............……… full amount is payable. Refunds are inadmissible however;
substitute delegates are welcome at any time. We also credit the
full amount towards another programme with pleasure.
Payment Date: …………………………………………………..….
Your Order Number: ……………………………………………….
Indemnity:
Speakers, venue and topics are confirmed at the time of going to
Method of Payment: (Please Tick the Applicable one)
press. Changes and/or cancellations might be made due to
E.F.T At Venue Direct Bank Deposit
circumstances beyond Hamilton Consultancy’s control.
Examples of unavoidable aspects include: acts of terrorism,
Name & Signature of the Person Authorising Finance:
extreme weather conditions, industrial action etc. During such
…………………………………………………………………………..
instance, Hamilton Consultancy shall endeavour to reschedule
Contact Details: ……………………………………………………….
the event. Failure which Hamilton Consultancy will furnish the
client with a credit voucher valid for the next 12 months and to
the equivalent amount as this events’ with which the client can
attend any event organised by Hamilton Consultancy.
PRICE FOR 5 DAYS WORKSHOP: USD 2 499
OUR COMMON BOND:
PRICE ROR 5 DAYS WORKSHOP WITH GADGET: USD 2 999
Our aims and key driving force is to provide a global platform for
the exchange of intelligence between solution providers and
Book for 6 Officials and 1 will attend for free
solution seekers via the formation of strategic alliances with
Associations, Media Partners and Eminent Speakers; who are all
What’s included!
committed to our shared mission, enhanced by the
Instruction by an expert facilitator
empowerment of our people to maintain excellence.
Small interactive classes
Specialized manual and workshop materials For more information contact +27 11 049 9925
Personalized certificate of completion

You might also like