Program Overview

Agenda is subject to change.

Tuesday, December 2nd

Training Day 1: Track 1Training Day 1: Track 2Training Day 1: Track 3
09:00 – 10:45
 DJ

Investigating Ransomware through Windows Artifacts and Event Log Correlation

Chireh Mohamed Abdi, Yacin Djibril Waberi (DJ-CERT, DJ)

 MA

Hands-on Threat Hunting and Detection Engineering using CTI Insights

Adama Sitou Assiongbon (Individual Contributor, MA)

TLP:GREEN
 US

Hands-On Network Threat Detection Training for Critical Infrastructure using Security Onion

Ezeckiel Dadjo (Iservices CSIRT); Howard Mukanda (Senior Red Team Engineer and AfricaCERT Volunteer, US); Luc Semassa (Iservices CSIRT )

TLP:CLEAR
10:45 – 11:00

Coffee Break

11:00 – 13:00
 DJ

Investigating Ransomware through Windows Artifacts and Event Log Correlation

Chireh Mohamed Abdi, Yacin Djibril Waberi (DJ-CERT, DJ)

 MA

Hands-on Threat Hunting and Detection Engineering using CTI Insights

Adama Sitou Assiongbon (Individual Contributor, MA)

TLP:GREEN
 US

Hands-On Network Threat Detection Training for Critical Infrastructure using Security Onion

Ezeckiel Dadjo (Iservices CSIRT); Howard Mukanda (Senior Red Team Engineer and AfricaCERT Volunteer, US); Luc Semassa (Iservices CSIRT )

TLP:CLEAR
13:00 – 14:00

Lunch Break

14:00 – 16:00
 PL

Interpreting and Visualizing Shadowserver threat data using IntelMQ + ELK Dashboard

Piotr Kijewski (Shadowserver, PL)

 GH

Practical Digital Forensics in the African Context. Tools, Workflows, and Infrastructure Gaps

Dunstan Guba (Wisconsin International University College, GH); Maxwell Selorm Amuzu (Wisconsin International University College)

TLP:CLEAR
 US

Hands-On Network Threat Detection Training for Critical Infrastructure using Security Onion

Ezeckiel Dadjo (Iservices CSIRT); Howard Mukanda (Senior Red Team Engineer and AfricaCERT Volunteer, US); Luc Semassa (Iservices CSIRT )

TLP:CLEAR
16:15 – 18:00
 PL

Interpreting and Visualizing Shadowserver threat data using IntelMQ + ELK Dashboard

Piotr Kijewski (Shadowserver, PL)

 GH

Practical Digital Forensics in the African Context. Tools, Workflows, and Infrastructure Gaps

Dunstan Guba (Wisconsin International University College, GH); Maxwell Selorm Amuzu (Wisconsin International University College)

TLP:CLEAR
 US

Hands-On Network Threat Detection Training for Critical Infrastructure using Security Onion

Ezeckiel Dadjo (Iservices CSIRT); Howard Mukanda (Senior Red Team Engineer and AfricaCERT Volunteer, US); Luc Semassa (Iservices CSIRT )

TLP:CLEAR

Wednesday, December 3rd

Training Day 2: Track 1Training Day 2: Track 2Training Day 2: Track 3
09:00 – 10:45
 LS

Automating CSIRT Workflows with RTIR, MISP, and Taranis-NG

Amos Mibey ; Luka Mafereka (National CSIRT of Lesotho, LS)

 LB

Strategic Policy Review for National Cybersecurity Readiness in the Age of Accelerating Technologies

Linda Oueidat (Presidency of the Council of Ministers, LB)

TLP:CLEAR
 US

Hands-On Network Threat Detection Training for Critical Infrastructure using Security Onion

Ezeckiel Dadjo (Iservices CSIRT); Howard Mukanda (Senior Red Team Engineer and AfricaCERT Volunteer, US); Luc Semassa (Iservices CSIRT )

TLP:CLEAR
11:00 – 13:00
 LS

Automating CSIRT Workflows with RTIR, MISP, and Taranis-NG

Amos Mibey ; Luka Mafereka (National CSIRT of Lesotho, LS)

 LB

Strategic Policy Review for National Cybersecurity Readiness in the Age of Accelerating Technologies

Linda Oueidat (Presidency of the Council of Ministers, LB)

TLP:CLEAR
 US

Hands-On Network Threat Detection Training for Critical Infrastructure using Security Onion

Ezeckiel Dadjo (Iservices CSIRT); Howard Mukanda (Senior Red Team Engineer and AfricaCERT Volunteer, US); Luc Semassa (Iservices CSIRT )

TLP:CLEAR
13:00 – 14:00

Lunch Break

14:00 – 16:00
 FR

Enhancing CSIRT Capability through the SIM3 Maturity Model

Olivier Caleff (FR)

 BD

Enhancing Incident Response and Endpoint Investigation Using Open Source Tools

Mukul Ahmed (BGD e-GOV CIRT, BD)

TLP:CLEAR
 US

Hands-On Network Threat Detection Training for Critical Infrastructure using Security Onion

Ezeckiel Dadjo (Iservices CSIRT); Howard Mukanda (Senior Red Team Engineer and AfricaCERT Volunteer, US); Luc Semassa (Iservices CSIRT )

TLP:CLEAR
16:00 – 16:15

Coffee Break

16:15 – 18:00
 MU

Setting Up of the National Honeypot

Dr. Kaleem Ahmed Usmani (CERT-MU, MU); Sachindra Reechaye (National CERT of Mauritius, MU)

 BD

Enhancing Incident Response and Endpoint Investigation Using Open Source Tools

Mukul Ahmed (BGD e-GOV CIRT, BD)

TLP:CLEAR
 ZA

OT Cyber Risks Reduction: What Leaders Need to Know

Michelle Govender (Octarity, ZA)

Thursday, December 4th

FIRST Plenary Sessions: Room 1FIRST Plenary Sessions: Room 2
09:00 – 09:30

Registration

09:30 – 10:30

Opening Ceremonies

10:30 – 10:45

Group Photo

10:45 – 11:15
 NG

Sovereign by Design: Advancing Africa's Data Security Governance and Cyber Resilience

Abdul-Hakeem Ajijola (Individual Contributor, NG)

TLP:CLEAR
11:15 – 11:45

Coffee Break

11:45 – 12:15
 MU

Norms, CBMs and Role of Incident Responders

Hakim Ajiola; Dr. Kaleem Ahmed Usmani (CERT-MU, MU)

 ZA

Strategic Playbook for Safeguarding the National Critical Infrastructure

Sithembile Songo (Individual Contributor, ZA)

12:15 – 12:45
 RE

Starting the Local CSIRT on the Island of Réunion

Charli Hoarau (Réunion THD, RE)

TLP:CLEAR

Explainable Machine Learning Based Security and Privacy Protection Framework for Internet of Medical Things Systems

Si-ahmed Ayoub

12:45 – 13:45

Lunch

13:45 – 14:15
 TN

From Local Awareness to Global Cooperation: Tunisia's Path toward Cybersecurity Excellence

Hasna Tlili (National Agency for Cybersecurity, TN)

TLP:CLEAR
 MU

MauHNET- the Mauritian Perspective of Honeypot systems + Network Monitoring: Attack Detection, Mitigation, and Remediation

Sachindra Reechaye (National CERT of Mauritius, MU)

TLP:CLEAR
14:15 – 14:45
 AL

AI Powered Threat Detection: Opportunities and Risks for National CSIRTS

Olgerta Prendi (National Cyber Security Authority of Albania, AL)

TLP:CLEAR

Product Security

14:45 – 15:15
 GH

Mastering Incident Handling Metrics: The Goal, Question, Metric (GQM) Framework

Stephen Cudjoe-Seshie (Cyber Security Authority, GH)

The Future of Security Begins with Identity

15:15 – 15:45

Coffee Break

15:45 – 16:15
 DZ

Conformity Assessment Meets Cybersecurity: Building a Common Language Between Auditors and Analysts

Taher Amine Elhouari (OWASP Algiers / CSA Algeria / CAS Algeria / EKSec Group / AfricaCERT, DZ)

TLP:CLEAR

Sharing our CVD Journey: Insights and Lessons

15:45 – 16:45

16:15 – 16:45

Cyber Security Policy and Strategy

16:45 – 17:15
 MA

Operationalizing Threat Intelligence in African SOCs: From Intelligence to Detection

Adama Sitou Assiongbon (Individual Contributor, MA)

TLP:GREEN

Identity and Sustainable Development: Building Secure National Identity and Access Management Program

17:15 – 17:45
 LB

Securing Multi-Axis Critical Infrastructure in the Age of AI: From High-Vulnerability States to Global Resilience

Linda Oueidat (Presidency of the Council of Ministers, LB)

TLP:CLEAR

Supply Chain Cyber Resilience, Threat Intelligence Sharing Platforms and Tools & Team Updates

17:45 – 18:00

Closing Remarks

Friday, December 5th

AfricaCERT Closed Meeting
09:15 – 09:45

Welcome Remarks

09:45 – 10:15
 US

Ransomware in Progress: What to Do Right Now: Ransomware Active Attack Course of Action

Brian Scriber (CableLabs, US); Tony Tauber (Comcast, US)

TLP:AMBER
10:15 – 10:45

Coffee Break

10:45 – 11:45
 US

Ransomware in Progress: What to Do Right Now: Ransomware Active Attack Course of Action

Brian Scriber (CableLabs, US); Tony Tauber (Comcast, US)

TLP:AMBER
11:45 – 12:15

Threat Actor Engagement OR Multi-Disciplinary Cyber IR

12:15 – 13:15

Lunch

13:15 – 14:45

AfricaCERT Closed Meeting

14:45 – 15:15

Coffee Break

15:15 – 16:45

AfricaCERT Closed Meeting

16:45 – 17:15

Closing Remarks