The world is struggling with the Corona virus Outbreak, people are compelled to shelter in place and the economy is affected. The public and the private sector, including financial companies, are deeply hindered. In this current situation, companies’ survival is intricately linked to their resilience and readiness to provide secure alternatives for their employees to remotely work from home.
Workers need to connect to their workplace, perform and resume their work, they solicit increasingly collaboration platforms to meet online, team up with each other and fulfill their duties. Some companies decided to embrace the cloud services, some are reshaping their infrastructure to cope with this new situation. Other companies decided to rely on public applications to communicate and share sensitive information without any level of protection such as encryption or even exposed their facilities (i.e. email servers) to the internet without any protection for the sake of business continuity.
On completion of this workshop participants will be able to:
- Understand the alternative for remote working
- Understand the threats exposing remote workers and companies
- Understand the risks associated with collaboration tools
- Understand the best practices and controls to protect companies’ infrastructure and users’ devices and data.
- How to choose and harden safe conferencing and collaboration tools
Who should attend this workshop?
- Business users and managers engaging in teleworking, especially teleworking employing personally owned devices such as smartphones and home computers.
- IT managers
- Operational Risk
- Information Security Officers
- IT auditors
- This course requires basic knowledge of telework tools.
Session 1 (Duration 2 hours & half): Introduction, opportunities, threats and risks
- Opportunities and benefits
- Challenges and requirements
- Threats and risks
- Requirements to protect companies’ infrastructure and data
- Policy and procedures
Session 2 (Duration 2 hours & half): Teleworking
- On premise Vs. Cloud solutions
- Data privacy
- UYOD (Use Your Own Device)
- Enterprise Mobility Management (EMM)
Session 3 (Duration 2 hours & half): Security and hardening of collaboration services tools
- Criteria to consider when Selecting a Collaboration Service
- Using collaboration tools securely
- Comparison of available tools in the market
- Vulnerabilities associated to collaboration tools
- Practical example on how to securely use ZOOM application
Mr. Jean-Michel Kawkabani,
Head of Information Security Department at Byblos Bank Group – Lebanon.
- He is a Certified Information Systems Auditor (CISA) from ISACA and a Lecturer at University Saint Joseph-ESIB and Ecole Nationale D’Administration (ENA) Lebanon.
- Prior to his current position, Jean Michel was respectively the Head of IT Audit and the Head of MIS at Byblos Bank Group. He graduated from the French engineering school Ecole Nationale de la Statistique et de L’Analyse de L’Information (ENSAI) and holds also a degree in Economics from Saint Joseph University Lebanon.
- Jean Michel has been an Information Systems professional for more than 20 years including 17 years of Information Security and IT Audit in the financial industry. He delivered several MIS, Design, programming and Information Security courses in Universities across the country. He has a long experience with risk and Vulnerability assessment and is a QUALYS Certified Specialist.
- His current focus, in addition to his responsibility at Byblos Bank is around Digital Forensics, Artificial Intelligence, intelligence tech.
For more information and registration kindly send an email to: email@example.com