SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Version: 1.1
Date: 05/02/2018
Author: Sylvain Martinez
CLUB PRESENTATION
2
CONTENTS
1. Context
2. Format
3. Opportunities
4. Profiles
5. Future
3
1. CONTEXT: MISSION STATEMENT
TO HELP MAURITIAN IT PROFESSIONALS SHARE
INFORMATION AND LEARN ABOUT CYBER
SECURITY THROUGH AN OPEN PLATFORM AND
THE CREATION OF A CYBER SECURITY
COMMUNITY.
4
2. FORMAT: PRINCIPLES
• Free for all;
• Not a marketing platform;
• Regular meetings;
• Low or no cost to organize and setup.
5
2. FORMAT: STRUCTURE
• At a central location for most IT professionals: Port Louis or
Ebene;
• Preference for a neutral place (pub, coffee shop, etc.);
• Once a month, end of month. I.e.: 3rd Wednesday of every
month;
• Website, Facebook, twitter, Linkedin
• Slides to be shared on slideshare
6
2. FORMAT: STRUCTURE
• Mix of technical and non technical talks;
• Last for 2 hours:
• 5 Min: Concept introduction;
• 5 Min: Cyber Security News;
• 45 Min 1st Talk:
• 5 Min Speaker presentation;
• 30 Min presentation;
• 10 Min Q&A;
• 15 Min: Break
• 45 Min 1st Talk:
• 5 Min Speaker presentation;
• 30 Min presentation;
• 10 Min Q&A;
7
2. OPPORTUNITES: ATTENDEES
• Free source of knowledge;
• Opportunities to ask questions;
• Learn and apply practical knowledge at work and
at home;
• Professional Networking;
8
2. OPPORTUNITES: SPEAKERS
• Provides experience in addressing and
presenting to a crowd;
• Sharing knowledge and sense of achievement;
• Profile Visibility;
• Stronger professional network.
9
2. OPPORTUNITES: HOSTS
• We drink your beer!;
• Exposure for your venue;
• Good Karma.
10
2. PROFILE: ATTENDEES
• Some knowledge of IT;
• Some awareness of Cyber Security;
• Interest or curious about Cyber Security.
11
2. PROFILE: SPEAKERS
• Good understanding of the topic;
• Some years of experience in Cyber Security is
required;
• Speaking experience preferred but not
mandatory
• To promote WHITE HAT and not BLACK HAT.
12
2. PROFILE: ORGANISERS
• Governance to be kept at a minimum number of
people to start with;
• Have some spare time to:
• Review talks;
• Coordinate with host venue;
• Help on the day;
• Spread the word;
13
2. FUTURE: TALKS
• WIFI Hacking and how to protect yourself?
• What is an IDS?
• What is GDPR?
• How to best handle passwords and why?
• A look at KALI LINUX, a free penetration testing
platform?
• What is the difference between a Vulnerability
Assessment and a Penetration Testing?
14
2. FUTURE: EXPANSION
• More talks per event;
• External speakers from the Cyber Security Events
Circuits;
• Sponsored location;
• Sponsored beverages and food;
15
THANK YOU!
Find us on
Website: https://www.elysiumsecurity.com/muscl
Facebook: http://www.facebook.com/esmuscl
Twitter: @es_muscl

Contenu connexe

Similaire à Talk1 muscl club_v1_2

Social networking
Social networkingSocial networking
Social networking
Esha
 
Break free of the training room: Webinars for Early Childhood Education Profe...
Break free of the training room: Webinars for Early Childhood Education Profe...Break free of the training room: Webinars for Early Childhood Education Profe...
Break free of the training room: Webinars for Early Childhood Education Profe...
Engagement Strategies, LLC
 

Similaire à Talk1 muscl club_v1_2 (20)

Mobile Entrepreneur Seminar
Mobile Entrepreneur SeminarMobile Entrepreneur Seminar
Mobile Entrepreneur Seminar
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Top Social Media & Productivity Management Tools - October 2011
Top Social Media & Productivity Management Tools - October 2011Top Social Media & Productivity Management Tools - October 2011
Top Social Media & Productivity Management Tools - October 2011
 
Social networking
Social networkingSocial networking
Social networking
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 
milSuite and Open Source
milSuite and Open SourcemilSuite and Open Source
milSuite and Open Source
 
The Very Best Intranets and Digital Workplaces of 2017
The Very Best Intranets and Digital Workplaces of 2017The Very Best Intranets and Digital Workplaces of 2017
The Very Best Intranets and Digital Workplaces of 2017
 
Nonprofit Homepage Design Slam - 10 tips for Effective Homepage Design
Nonprofit Homepage Design Slam - 10 tips for Effective Homepage DesignNonprofit Homepage Design Slam - 10 tips for Effective Homepage Design
Nonprofit Homepage Design Slam - 10 tips for Effective Homepage Design
 
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
 
A Webinar about Webinars with Mike Lewis (@bostonmike) and Rachel Levy (@bost...
A Webinar about Webinars with Mike Lewis (@bostonmike) and Rachel Levy (@bost...A Webinar about Webinars with Mike Lewis (@bostonmike) and Rachel Levy (@bost...
A Webinar about Webinars with Mike Lewis (@bostonmike) and Rachel Levy (@bost...
 
Webinar About Webinars: 6 P's of Successful Webinars
Webinar About Webinars: 6 P's of Successful WebinarsWebinar About Webinars: 6 P's of Successful Webinars
Webinar About Webinars: 6 P's of Successful Webinars
 
Break free of the training room: Webinars for Early Childhood Education Profe...
Break free of the training room: Webinars for Early Childhood Education Profe...Break free of the training room: Webinars for Early Childhood Education Profe...
Break free of the training room: Webinars for Early Childhood Education Profe...
 
Distributed Scrum: Dangerous Waters-Be Prepared!
Distributed Scrum: Dangerous Waters-Be Prepared!Distributed Scrum: Dangerous Waters-Be Prepared!
Distributed Scrum: Dangerous Waters-Be Prepared!
 
Hamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content AccessHamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content Access
 
Improving Nonprofit Impact Through Technology
Improving Nonprofit Impact Through TechnologyImproving Nonprofit Impact Through Technology
Improving Nonprofit Impact Through Technology
 
Webinar on webinars
Webinar on webinarsWebinar on webinars
Webinar on webinars
 
Crush it ebook
Crush it ebookCrush it ebook
Crush it ebook
 
Crush It Key Points E-Book
Crush It Key Points E-BookCrush It Key Points E-Book
Crush It Key Points E-Book
 
Uniting Communities_Town Hall Videoconference Presentation.pptx
Uniting Communities_Town Hall Videoconference Presentation.pptxUniting Communities_Town Hall Videoconference Presentation.pptx
Uniting Communities_Town Hall Videoconference Presentation.pptx
 
Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022
 

Plus de Sylvain Martinez

Plus de Sylvain Martinez (20)

PROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITY
 
INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHYINTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
VIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLES
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEW
 
OFFENSIVE IDS
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDS
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
ARE YOU RED TEAM READY?
ARE YOU RED TEAM READY?ARE YOU RED TEAM READY?
ARE YOU RED TEAM READY?
 
GDPR SECURITY ISSUES
GDPR SECURITY ISSUESGDPR SECURITY ISSUES
GDPR SECURITY ISSUES
 
Mobile Security Assessment
Mobile Security AssessmentMobile Security Assessment
Mobile Security Assessment
 
The Art of CTF
The Art of CTFThe Art of CTF
The Art of CTF
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
 
Risk on Crypto Currencies
Risk on Crypto CurrenciesRisk on Crypto Currencies
Risk on Crypto Currencies
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
 
Talk1 esc7 muscl-gdpr_debate_v1_2
Talk1 esc7 muscl-gdpr_debate_v1_2Talk1 esc7 muscl-gdpr_debate_v1_2
Talk1 esc7 muscl-gdpr_debate_v1_2
 
Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Talk1 muscl club_v1_2

  • 1. Version: 1.1 Date: 05/02/2018 Author: Sylvain Martinez CLUB PRESENTATION
  • 2. 2 CONTENTS 1. Context 2. Format 3. Opportunities 4. Profiles 5. Future
  • 3. 3 1. CONTEXT: MISSION STATEMENT TO HELP MAURITIAN IT PROFESSIONALS SHARE INFORMATION AND LEARN ABOUT CYBER SECURITY THROUGH AN OPEN PLATFORM AND THE CREATION OF A CYBER SECURITY COMMUNITY.
  • 4. 4 2. FORMAT: PRINCIPLES • Free for all; • Not a marketing platform; • Regular meetings; • Low or no cost to organize and setup.
  • 5. 5 2. FORMAT: STRUCTURE • At a central location for most IT professionals: Port Louis or Ebene; • Preference for a neutral place (pub, coffee shop, etc.); • Once a month, end of month. I.e.: 3rd Wednesday of every month; • Website, Facebook, twitter, Linkedin • Slides to be shared on slideshare
  • 6. 6 2. FORMAT: STRUCTURE • Mix of technical and non technical talks; • Last for 2 hours: • 5 Min: Concept introduction; • 5 Min: Cyber Security News; • 45 Min 1st Talk: • 5 Min Speaker presentation; • 30 Min presentation; • 10 Min Q&A; • 15 Min: Break • 45 Min 1st Talk: • 5 Min Speaker presentation; • 30 Min presentation; • 10 Min Q&A;
  • 7. 7 2. OPPORTUNITES: ATTENDEES • Free source of knowledge; • Opportunities to ask questions; • Learn and apply practical knowledge at work and at home; • Professional Networking;
  • 8. 8 2. OPPORTUNITES: SPEAKERS • Provides experience in addressing and presenting to a crowd; • Sharing knowledge and sense of achievement; • Profile Visibility; • Stronger professional network.
  • 9. 9 2. OPPORTUNITES: HOSTS • We drink your beer!; • Exposure for your venue; • Good Karma.
  • 10. 10 2. PROFILE: ATTENDEES • Some knowledge of IT; • Some awareness of Cyber Security; • Interest or curious about Cyber Security.
  • 11. 11 2. PROFILE: SPEAKERS • Good understanding of the topic; • Some years of experience in Cyber Security is required; • Speaking experience preferred but not mandatory • To promote WHITE HAT and not BLACK HAT.
  • 12. 12 2. PROFILE: ORGANISERS • Governance to be kept at a minimum number of people to start with; • Have some spare time to: • Review talks; • Coordinate with host venue; • Help on the day; • Spread the word;
  • 13. 13 2. FUTURE: TALKS • WIFI Hacking and how to protect yourself? • What is an IDS? • What is GDPR? • How to best handle passwords and why? • A look at KALI LINUX, a free penetration testing platform? • What is the difference between a Vulnerability Assessment and a Penetration Testing?
  • 14. 14 2. FUTURE: EXPANSION • More talks per event; • External speakers from the Cyber Security Events Circuits; • Sponsored location; • Sponsored beverages and food;
  • 15. 15 THANK YOU! Find us on Website: https://www.elysiumsecurity.com/muscl Facebook: http://www.facebook.com/esmuscl Twitter: @es_muscl