NEWS / INsig2 ltd. on next Cyber Defense East Africa 2014
News archive

11.09.2014

INsig2 ltd. on next Cyber Defense East Africa 2014

The conference will be held from 16th till 19th of September in Arusha, Tanzania.

The CDEA2014 conference is being organized by a multinational, multicultural team who contributes to the preparation of international cyber security methodologies and development of global cyber security body of knowledge while working with ISACA, Council on Cyber Security, National CERTs and national security services (e-crime and abuse handling automation). The team also actively contributes to the development of multiple national cyber security frameworks, academic research and has developed its own platform for monitoring national critical infrastructure with federated cyber-defense model and has its own Cyber security Incident Response Team (NRD CIRT).

Director of INsig2 ltd., Goran Oparnica will hold a lecture on “Legal aspects of digital forensics” and “Importance of education & professional certification in digital forensics”. The goal of the lecture is to raise the awareness of importance of continuous education digital forensics since new attack methods and tools are developed every day.

The conference is organized by Norway Registers Development East Africa limited (NRD EA) (formerly 360° Smart Consulting Ltd.) who works in the field of security for digital environments as a local branch of a Norwegian company, Norway Registers Development AS. The company takes the best of Norwegian IT sector know-how and combines it with the knowledge of Tanzanian business environment and its needs. NRD EA provides tailor-made professional services that include but are not limited to cyber defense, IT infrastructure and resilience, IS governance and IT governance services. In addition, NRD EA is actively involved in the improvement of the business climate in the East African Community. Furthermore, the company assists other organizations investing in East Africa in the creation, development, maintenance and security of their information technology infrastructure.

For more information please visit: www.cybersecurity.co.tz