Is your cyber hygiene adequate?

Before you eat food at any restaurant, you mind about the hygiene of the place. This saves you from some diseases. When it comes

Before you eat food at any restaurant, you mind about the hygiene of the place. This saves you from some diseases. When it comes to sending that WhatsApp message, how do you check the hygiene of your connection or device?

If you use any device -mobile phone or laptop – that connects to the Internet, you are vulnerable to cybersecurity risks. You could easily fall victim to phishing or pharming, leading to identity theft.

No one is safe.

To this end, the Institue of Forensics & ICT Security, in partnership with the National Information Technology Authority, has organized a third cybersecurity and risk management conference due on 16th-18th October 2019.

If you have attended the previous #CSRM conferences by IFIS you know what makes them unique is the demos and practical way of delivering a presentation. The conference costs just Ugx. 1,200,000 (the US $350 to attend for all the three days, but you get insights that last a lifetime and will save you a fortune.

The theme of the conference is “Big Data in Cyber Security”.

In 2018, a participant who works at the bank came just to learn about the effective deployment of data analytics and solutions available on the market. The bank was analyzing quotes for an-off a shelf big data software that costs over US $65,000! One-off license fee and annual fees of more than US $10,000.

After the training, he realized that MS Excel, with python and SQL server, is more powerful than any off-the-shelf tool out there! That saved them a fortune.
Do you want to learn skills that will transform your thinking in three days of intense demos about new developments, current technologies and how to use big data in cybersecurity?

Come and see live demos of how hackers do it. The last session on each day features real hacking games. It is fun and very educative. You will never be the same online after the demos. The demos show:

Come and learn how network traffic is intercepted ie. How hackers do man in the middle whereby when you connect on any wifi network say at the airport or in the company, how a hacker could intercept the traffic!

Featuring some of the Institute of Forensics & ICT Security faculty, you will see what you have never seen.

Leave a Reply

Your email address will not be published. Required fields are marked *

Related