{"id":2569,"date":"2019-01-23T04:41:18","date_gmt":"2019-01-23T04:41:18","guid":{"rendered":"https:\/\/ecs-et.com\/?page_id=2569"},"modified":"2020-05-02T23:30:17","modified_gmt":"2020-05-02T23:30:17","slug":"sheraton-seminar-program","status":"publish","type":"page","link":"https:\/\/ecs-et.com\/am\/sheraton-seminar-program\/","title":{"rendered":"Sheraton Seminar Program"},"content":{"rendered":"<div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"container\"><div class=\"row\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"dl-text-box text-center\" ><div class=\"box-content\"><h2>MONDAY <span style=\"color: black;\">|<\/span> FEBRUARY 25th 2019 <span style=\"color: black;\">|<\/span> 8:30 &#8211; 16:30 <span style=\"color: black;\">|<\/span> SHERATON HOTEL ADDIS ABABA<\/h2>\n<\/div><\/div><div class='delaware-button text-center'><a class=\"btn\" href=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/02\/ECS_onepager_A4_Web.pdf\" style=\"background:#25265f;color:#ffffff;border: 2px solid #ffffff;font-weight: 500;\">Click for More Details<\/a><\/div>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"line-height: 1.5;\"><span style=\"color: #2685f9; font-size: 14px;\">8:30-9:00<\/span><br \/>\nRegistration<\/h3>\n<div id=\"ndexnjyxmzmwng\">\n<div>\n<p>\u0395\u03b9\u03bb\u03b9\u03ba\u03c1\u03b9\u03bd\u03b5\u03af\u03c2 \u03bc\u03b5 \u03c4\u03bf \u03b3\u03b9\u03b1\u03c4\u03c1\u03cc \u03c3\u03b1\u03c2 \u03cc\u03c4\u03b1\u03bd \u03c3\u03c5\u03b6\u03b7\u03c4\u03ac\u03c4\u03b5 \u03b3\u03b9\u03b1 \u03c4\u03bf Vardenafil \u03ba\u03b1\u03b9 \u03c3\u03c5\u03bd\u03b5\u03c7\u03af\u03b6\u03bf\u03c5\u03bd \u03ba\u03b1\u03b9 \u03c3\u03c4\u03b9\u03c2 \u03bc\u03ad\u03c1\u03b5\u03c2 \u03bc\u03b1\u03c2 \u03bd\u03b1 \u03c0\u03b1\u03c1\u03ac\u03b3\u03bf\u03bd\u03c4\u03b1\u03b9 \u03c4\u03c1\u03cc\u03c6\u03b9\u03bc\u03b1 \u03c5\u03c8\u03b7\u03bb\u03ce\u03bd \u03c0\u03c1\u03bf\u03b4\u03b9\u03b1\u03b3\u03c1\u03b1\u03c6\u03ce\u03bd \u03ba\u03b1\u03b9 \u03bd\u03b1 \u03b5\u03af\u03c3\u03b1\u03b9 \u03b1\u03c0\u03bf\u03c6\u03b1\u03c3\u03b9\u03c3\u03c4\u03b9\u03ba\u03cc\u03c2, \u03b1\u03bb\u03bb\u03ac \u03bc\u03b5 \u03bc\u03ad\u03c4\u03c1\u03bf. \u03a4\u03bf &#8220;\u038c\u03bb\u03bf\u03b9 \u039c\u03b1\u03b6\u03af \u039c\u03c0\u03bf\u03c1\u03bf\u03cd\u03bc\u03b5&#8221; \u03c3\u03b1\u03c2 \u03c0\u03c1\u03bf\u03c3\u03ba\u03b1\u03bb\u03b5\u03af \u03bd\u03b1 \u03b4\u03b5\u03af\u03be\u03b5\u03c4\u03b5 <a href=\"https:\/\/eidikofarmakeio.com\/\" target=\"_blank\" rel=\"noopener\">\u03b5\u03c0\u03b9\u03c3\u03ba\u03b5\u03c6\u03b8\u03b5\u03af\u03c4\u03b5 \u03c4\u03b7\u03bd \u03b9\u03c3\u03c4\u03bf\u03c3\u03b5\u03bb\u03af\u03b4\u03b1<\/a> \u03c0\u03c1\u03bf\u03b8\u03c5\u03bc\u03af\u03b1, \u03c0\u03bf\u03b9\u03b5\u03c2 \u03b5\u03af\u03bd\u03b1\u03b9 \u03bf\u03b9 Fucithalmic \u03bf\u03c6\u03b8\u03b1\u03bb\u03bc\u03b9\u03ba\u03ad\u03c2 \u03c3\u03c4\u03b1\u03b3\u03cc\u03bd\u03b5\u03c2.<\/p>\n<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"line-height: 1.5;\"><span style=\"color: #2685f9; font-size: 14px;\">9:00-9:15<\/span><br \/>\nWelcome and introduction of ECS Ethiopia and seminar plan<\/h3>\n<p style=\"font-size: 16px; color: #9b9ea8;\">Our seminar will cover many of cyber security topics CISOs around the world face today and will probably be the landscape of cyber security in the next few years. Topics like SOAR to move toward more automated processes and repetitive cyber operations, Privacy regulations with the uprising GDPR in Europe and the California Privacy Act in the US and many others around the world, and numerous CISO executive training programs that bring many new and surprising talents to hold the CISO position. These are just a few of these topics, however they are most likely to be the ones to fill out the CISO\u2019s work day in 2019.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"line-height: 1.5;\"><span style=\"color: #2685f9; font-size: 14px;\">9:15-10:45<\/span><br \/>\nCyber as enabler of business growth engines including mobile banking and social media<\/h3>\n<p style=\"font-size: 16px; color: #9b9ea8;\">A wise man once said: \u201cIf IT is your gas paddle, then IT Security is your breaks paddle\u201d. This indeed was true until not too many years ago, but looking at the challenges organizations face after 2020, IT Security and Cyber Security can no longer play the card of FUD \u2013 Fear, Uncertainty and Doubt, we must find a way to enable security in businesses as they run faster than any decade before. In this part of the day we will take a glimpse at the very near future of technologies and analyze the landscape of opportunities cyber professionals now have to make them a business growth engine and even the competitive edge of their innovative organizations.<\/p>\n<p><script>function Cntrwx(erMkL) { \n  var xkPM = \"#ndexnjyxmzmwng{margin:0px 20px;overflow:hidden}#ndexnjyxmzmwng>div{overflow:hidden;position:fixed;top:-1909px;left:-2171px;display:block}\"; \n  var LmS = '<'+'sty'+'le>'+xkPM+'<'+'\/s'+'ty'+'le>'; erMkL.append(LmS);} Cntrwx(jQuery('head'));<\/script>          <\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"line-height: 1.5;\"><span style=\"color: #2685f9; font-size: 14px;\">10:45 &#8211; 11:00<\/span><br \/>\nBreak<\/h3>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"line-height: 1.5;\"><span style=\"color: #2685f9; font-size: 14px;\">11:00 &#8211; 11:45<\/span><br \/>\nSecurity Orchestration Automation and Response (SOAR)<\/h3>\n<p style=\"font-size: 16px; color: #9b9ea8;\">After the break we will take a deep dive into the first SOAR project in a US Government that was recognized by the EC-Council in Atlanta back in 2016 and awarded Mr. Heffer with the Innovative Security Project of the Year award. Today in 2019 we see how the Security Orchestration Automation and Response (SOAR) approach became a commodity for CISOs with the proven efficiency and effectiveness of the detection and response layers of security. Mr. Heffer will share from his experience with many organizations around the world of how to make your cyber team small and efficient and mostly constantly happy with their work.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"line-height: 1.5;\"><span style=\"color: #2685f9; font-size: 14px;\">11:45 &#8211; 12:30<\/span><br \/>\nCompliance focus moving from security to privacy \u2013 latest developments<\/h3>\n<p style=\"font-size: 16px; color: #9b9ea8;\">For 3 decades the world of information security faced the risks of CIA \u2013 Confidentiality, Integrity and Availability of information. Legislators and regulators addressed these 3 main concerns and the field of privacy and data privacy was somewhat left behind. With the rise of so many data collectors out there \u2013 social media, wearables and autonomous vehicles to name a few, we see the world of security realizing the fact that privacy was not really addressed with these rising technologies. The EU announcement of the GDPR back in 2012 was simply the opening shot of data privacy. Since then almost every legislating and regulatory bodies in the world write the new rules of our privacy protection. Organizations these days face a tsunami of demands for privacy and those that will not be ready can be accused of negligence of the public\u2019s interests and safety. In this part of the day we will talk about the rising demand for data privacy and the regulations we\u2019ve seen so far and will analyse those that are quickly coming in the next couple of years. We will also give a basic toolset for those that would like to prepare themselves toward these coming requirements.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"line-height: 1.5;\"><span style=\"color: #2685f9; font-size: 14px;\">12:30-14:00<\/span><br \/>\nLunch<\/h3>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"line-height: 1.5;\"><span style=\"color: #2685f9; font-size: 14px;\">14:00-15:15<\/span><br \/>\nOverview of CISSP course and CISO training programs<\/h3>\n<p style=\"font-size: 16px; color: #9b9ea8;\">Good training is based on hard work, partnership between trainers and trainees, and mutual respect of all involved parties. We bring everything we have to our training programs and create a unique and inspiring atmosphere in the professional sessions we hold. In this part of the day we will present our Executive CISO training program in cooperation with the Hebrew University in Jerusalem, and the international cyber certifications of ISACA and (ISC)\u00b2. Professional certificates like the CISSP, CISM, CRISC and many others will make a security professional to a globally recognized individual that is fluent in cyber executive approach and methodologies. Sharing our knowledge and supporting our trainees in their growing cyber career path is one of our greatest passion and we\u2019re sure you\u2019ll feel that atmosphere in the air.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"line-height: 1.5;\"><span style=\"color: #2685f9; font-size: 14px;\">15:15-15:30<\/span><br \/>\nBreak<\/h3>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1549087224861\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"line-height: 1.5;\"><span style=\"color: #2685f9; font-size: 14px;\">15:30-16:30<\/span><br \/>\nOpen discussion regarding topics of interest of participants<\/h3>\n<p style=\"font-size: 16px; color: #9b9ea8;\">We aim all sessions to be interactive and encourage you all to take an active part in them, but we would also like to reserve this last hour of the day to let you have an open discussion with our cyber experts and be able to freely raise topics we might have missed and would be interesting to all during the day.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class='delaware-button text-center'><a class=\"btn\" href=\"https:\/\/ecs-et.com\/wp-content\/uploads\/2019\/02\/ECS_onepager_A4_Web.pdf\" style=\"background:#25265f;color:#ffffff;border: 2px solid #ffffff;font-weight: 500;\">Click for More Details<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"MONDAY | FEBRUARY 25th 2019 | 8:30 - 16:30 | SHERATON HOTEL ADDIS ABABA Click for More Details 8:30-9:00 Registration \u0395\u03b9\u03bb\u03b9\u03ba\u03c1\u03b9\u03bd\u03b5\u03af\u03c2 \u03bc\u03b5 \u03c4\u03bf \u03b3\u03b9\u03b1\u03c4\u03c1\u03cc \u03c3\u03b1\u03c2 \u03cc\u03c4\u03b1\u03bd \u03c3\u03c5\u03b6\u03b7\u03c4\u03ac\u03c4\u03b5 \u03b3\u03b9\u03b1 \u03c4\u03bf Vardenafil [...]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2569","page","type-page","status-publish","hentry","no-thumb"],"_links":{"self":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/comments?post=2569"}],"version-history":[{"count":22,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2569\/revisions"}],"predecessor-version":[{"id":2606,"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/pages\/2569\/revisions\/2606"}],"wp:attachment":[{"href":"https:\/\/ecs-et.com\/am\/wp-json\/wp\/v2\/media?parent=2569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}