3. 3
1. CONTEXT: MISSION STATEMENT
TO HELP MAURITIAN IT PROFESSIONALS SHARE
INFORMATION AND LEARN ABOUT CYBER
SECURITY THROUGH AN OPEN PLATFORM AND
THE CREATION OF A CYBER SECURITY
COMMUNITY.
4. 4
2. FORMAT: PRINCIPLES
• Free for all;
• Not a marketing platform;
• Regular meetings;
• Low or no cost to organize and setup.
5. 5
2. FORMAT: STRUCTURE
• At a central location for most IT professionals: Port Louis or
Ebene;
• Preference for a neutral place (pub, coffee shop, etc.);
• Once a month, end of month. I.e.: 3rd Wednesday of every
month;
• Website, Facebook, twitter, Linkedin
• Slides to be shared on slideshare
6. 6
2. FORMAT: STRUCTURE
• Mix of technical and non technical talks;
• Last for 2 hours:
• 5 Min: Concept introduction;
• 5 Min: Cyber Security News;
• 45 Min 1st Talk:
• 5 Min Speaker presentation;
• 30 Min presentation;
• 10 Min Q&A;
• 15 Min: Break
• 45 Min 1st Talk:
• 5 Min Speaker presentation;
• 30 Min presentation;
• 10 Min Q&A;
7. 7
2. OPPORTUNITES: ATTENDEES
• Free source of knowledge;
• Opportunities to ask questions;
• Learn and apply practical knowledge at work and
at home;
• Professional Networking;
8. 8
2. OPPORTUNITES: SPEAKERS
• Provides experience in addressing and
presenting to a crowd;
• Sharing knowledge and sense of achievement;
• Profile Visibility;
• Stronger professional network.
10. 10
2. PROFILE: ATTENDEES
• Some knowledge of IT;
• Some awareness of Cyber Security;
• Interest or curious about Cyber Security.
11. 11
2. PROFILE: SPEAKERS
• Good understanding of the topic;
• Some years of experience in Cyber Security is
required;
• Speaking experience preferred but not
mandatory
• To promote WHITE HAT and not BLACK HAT.
12. 12
2. PROFILE: ORGANISERS
• Governance to be kept at a minimum number of
people to start with;
• Have some spare time to:
• Review talks;
• Coordinate with host venue;
• Help on the day;
• Spread the word;
13. 13
2. FUTURE: TALKS
• WIFI Hacking and how to protect yourself?
• What is an IDS?
• What is GDPR?
• How to best handle passwords and why?
• A look at KALI LINUX, a free penetration testing
platform?
• What is the difference between a Vulnerability
Assessment and a Penetration Testing?
14. 14
2. FUTURE: EXPANSION
• More talks per event;
• External speakers from the Cyber Security Events
Circuits;
• Sponsored location;
• Sponsored beverages and food;
15. 15
THANK YOU!
Find us on
Website: https://www.elysiumsecurity.com/muscl
Facebook: http://www.facebook.com/esmuscl
Twitter: @es_muscl