BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Africa/Nairobi
BEGIN:STANDARD
DTSTART:19420801T001500
TZOFFSETFROM:+0245
TZOFFSETTO:+0300
TZNAME:EAT
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20201202T042413Z
UID:97AD1FDA-82BB-44E6-8BC4-AF491EFF256F
DTSTART;TZID=Africa/Nairobi:20201029T160000
DTEND;TZID=Africa/Nairobi:20201029T170000
DESCRIPTION:Title: Rethinking Cyber Security Onboarding\n\nVenue: Virtual T
 alk\n\nTarget: IEEE Kenya\, East Africa &amp; IEEE R8 YP\n\nDate: 29th October
  2020 | 16:00 EAT\n\nAbstract\n\nMost digital services are available to ev
 eryone and from anywhere\, e.g. University websites\, online banking\, ele
 ctronic commerce\, etc. These services are susceptible to ever-increasing 
 cyber-attacks. An approach to protecting digital services is to deploy pre
 ventative controls such as encryption\, authentication\, and access contro
 l mechanisms\, but unfortunately\, preventative controls alone are inadequ
 ate as the growing number of data breaches have shown. Digital services mu
 st be monitored in order that security breaches &amp; intrusions are detected 
 on time and appropriate responses provided to address the incident. One wa
 y of monitoring digital services\, especially online web services is to on
 board them to a Cyber Security Operations Centre for monitoring.\n\nCybers
 ecurity operations centers (CSOCs) are responsible primarily for managing 
 cyber incidents\, in addition to cyber-attack detection\, security monitor
 ing\, security incident triage\, analysis\, and coordination. To monitor s
 ystems\, networks\, applications\, and services the CSOC must first on-boa
 rd the systems and services onto their security monitoring and incident ma
 nagement platforms. Cyber Onboarding (a.k.a. Onboarding) is a specialist t
 echnical process of setting up and configuring systems and services to pro
 duce appropriate events\, logs\, and metrics that are monitored through th
 e CSOC security monitoring and incident management platform.\n\nIn this ta
 lk\, we will explain the various aspect of CSOC\, the role of Cyber Onboar
 ding\, and most importantly\, how efficient this can be achieve using clou
 d-native and cloud-enabled services.\n\nCo-sponsored by: muriungi254@ieee.
 org\n\nSpeaker(s): Dr. Cyril Onwubiko\, \n\nVirtual: https://events.vtools
 .ieee.org/m/242875
LOCATION:Virtual: https://events.vtools.ieee.org/m/242875
ORGANIZER:yp.kenya@ieee.org
SEQUENCE:6
SUMMARY:&quot;Rethinking Cyber Security Onboarding&quot; By Dr. Cyril Onwubiko
URL;VALUE=URI:https://events.vtools.ieee.org/m/242875
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; Rethinking Cyber S
 ecurity Onboarding&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;Venue:&lt;/strong&gt; Virtual Talk&lt;/p&gt;\n&lt;p&gt;&lt;s
 trong&gt;Target:&lt;/strong&gt; IEEE Kenya\, East Africa &amp;amp\; IEEE R8 YP&lt;/p&gt;\n&lt;p&gt;
 &lt;strong&gt;Date:&lt;/strong&gt; 29th October 2020 | 16:00 EAT&lt;/p&gt;\n&lt;p&gt;&lt;span style=&quot;
 text-decoration: underline\;&quot;&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;\n&lt;p&gt;Mos
 t digital services are available to everyone and from anywhere\, e.g. Univ
 ersity websites\, online banking\, electronic commerce\, etc. These servic
 es are susceptible to ever-increasing cyber-attacks. An approach to protec
 ting digital services is to deploy preventative controls such as encryptio
 n\, authentication\, and access control mechanisms\, but unfortunately\, p
 reventative controls alone are inadequate as the growing number of data br
 eaches have shown. Digital services must be monitored in order that securi
 ty breaches &amp;amp\; intrusions are detected on time and appropriate respons
 es provided to address the incident. One way of monitoring digital service
 s\, especially online web services is to onboard them to a Cyber Security 
 Operations Centre for monitoring.&lt;/p&gt;\n&lt;p&gt;Cybersecurity operations centers
  (CSOCs) are responsible primarily for managing cyber incidents\, in addit
 ion to cyber-attack detection\, security monitoring\, security incident tr
 iage\, analysis\, and coordination. To monitor systems\, networks\, applic
 ations\, and services the CSOC must first on-board the systems and service
 s onto their security monitoring and incident management platforms. Cyber 
 Onboarding (a.k.a. Onboarding) is a specialist technical process of settin
 g up and configuring systems and services to produce appropriate events\, 
 logs\, and metrics that are monitored through the CSOC security monitoring
  and incident management platform.&lt;/p&gt;\n&lt;p&gt;In this talk\, we will explain 
 the various aspect of CSOC\, the role of Cyber Onboarding\, and most impor
 tantly\, how efficient this can be achieve using cloud-native and cloud-en
 abled services.&lt;/p&gt;
END:VEVENT
END:VCALENDAR

