(ACCnews) CRDF Global და ამერიკის საელჩო საქართველოში გიწვევენ სამ-დღიან ვორკშოპზე, რომელიც საქართველოსა და სომხეთის კვლევით დაწესებულებებში კიბერდანაშაულის აღკვეთის გზებს ეხება. კერძოდ, მონაწილეები შეისწავლიან თუ როგორ დაიცვან თავი კრიმინალებისგან, რომლებსაც კვლევების ან სხვა სენსიტიური ინფორმაციის უკანონოდ მოპოვება სურთ.
დამატებით, CRDF Global , კვალიფიციიურ ინსტიტუტებს, რომელთა წარმომადგენლებიც მიიღებენ მონაწილეობას ვორკშოპში, შესთავაზებს კიბერ-უსაფრთხოების პროგრამის მცირე გრანტებს.
Speakers
Dr. Eric J. Novotny – President of the Faculty and Hurst Memorial Senior Professorial Lecturer at the American University, Washington, DC, and founding director of the graduate program in cybersecurity.
Ms. Simin Kargar – Doctoral Candidate at the School of Advanced International Studies (SAIS) at John Hopkins University, and expert in digital threat analysis.
Mr. Amir Rashidi – Director of Digital Rights and Security at the Miaan Group, and expert in identifying adversarial groups and methods.
Day 1 – Workshop Introduction and Objectives
2. Technologically-sensitive Assets
3. Threats and Threat Actors
4. Cybersecurity Policies
Day 2 – Topics: Threats, Assets
10:00 AM-2:00 PM
Main goal—capacity-building to protect information assets in a research setting
Objectives—Understand the problem; understand the threats; recognize vulnerabilities; learn how to assess cyber maturity; target specific ways to mitigate risk
Introduction—how to think about cybersecurity—a framework
Conflicting terms and definitions—sort these out
Threats and threat actors—intentions, motivations, TTPs
Threats and threat actors—intentions, motivations, TTPs, continued
Real life examples from guest speakers
How to identify and categorize intellectual property
How to specific the value of information assets
Ways of modelling or conceptualizing controls over assets
TTX—Garrulus University, Part 1
Divide into small groups; read through and understand the scenario
Groups have to assess what may have happened and how to respond and recover
Groups will report their findings and recommendations
10:00 AM-1:30 PM
Recap of goals and objectives of the workshop
Recap of lessons learned from TTX, Part 1
Roadmap for Day 3
How to assess risk
How to do security assessments and audits
Introduction to the cybersecurity assessment tool
Using the NIST framework with the cybersecurity assessment tool
How to set priorities
How to realize economies and optimal allocation of resources
2:00 PM-4:30 PM
TTX—Garrulus University, Part 2
Divide into same groups as Part 1; read and understand the scenario
Groups must assess what to recommend and how to implement the plan
Groups will report their findings and recommendations
Open discussion of topics of interest to the attendees
Summary and wrap-up REGISTRATION >>