CORPORATE PRESENTATION

Size: px
Start display at page:

Download "CORPORATE PRESENTATION"

Transcription

1 CORPORATE PRESENTATION

2 Overview Mauritian company founded in Over 60 years of maturity and experience. Offering a unique end-to-end business model: TECHNOLOGY SECURITY RESILIENCY Certified, competent and experienced workforce. Established and operational Pan African footprint.

3 Pan African Footprint Mauritius & Rodrigues Comoros Seychelles Ethiopia Uganda Kenya Tanzania Angola Rwanda Burundi Kenya Tanzania Comoros Seychelles Zambia Malawi Madagascar Uganda Namibia Botswana Zimbabwe Mozambique Mauritius Rodrigues Rwanda BIRGER. s local offices in 9 territories Lesotho Swaziland Madagascar BIRGER. s African coverage

4 Technology & Solutions Plan Build Support Manage Improve Innovate Pre-Sales and Implementation Education and Training Network Business and Payment Solutions Self Service Systems Trusted Identities & Secured Transactions Physical & Logical Security Enterprise Systems Network Operations Centre Professional Support, Managed & IT Outsourcing Network Integration Security Solutions Cheque & Cash Solutions ATM Interactive Solutions Business Continuity Data Centre Advanced Infrastructure

5 Security CDC Cyber Defence Center CDC Cyber Defence Center SOC MSS Vulnerability Assessment Penetration Testing CST Cyber Security Technology CSS Cyber Security CSC Cyber Security Consulting CSC Cyber Security Consulting CSA Cyber Security Academy Advisory Security Architecture Audit Security/CISO as a Service Training Awareness Forums Research CSA Cyber Security Academy CST Cyber Security Technology Firewall End Point Protection Web Filtering Encryption Security DLP

6 Cyber Defence Centre Customer Managed Security BIRGER. Endpoints LOGS Customer Portal BIRGER. CDC Portal BIRGER. CDC Security Analysts BIRGER. CDC Servers LOGS Symantec LOGS Firewalls LCP Secured Internet Connection Symantec Data Warehouse Correlation & Analysis Global Threat Intelligence

7 Resiliency RSS Resiliency Standby IT System Recovery Disaster Recovery Test Data Replication Solutions Work Area Recovery Rapid Desktop Deployment RNS Resiliency Network Internet Bandwidth Data Replication Lines Point-to-point & WAN Connectivity Voice & Data Redirection RAS Resiliency Advisory Business Impact Analysis Risk Assessment Business Continuity Strategy Business Continuity Plan Development BCM Training Programme Business Continuity & Disaster Recovery RRC Resiliency Recovery Centre Work Area Recovery Facilities Data Centre

8 Education Our future success hinges on local competent professionals. Collaboration with local universities from Mauritius, Madagascar and Rwanda. Practical trainings to our customers in areas related to Technology - Security Resiliency.

9 Our partners

10 Our partners

11 Industrial Expertise Our customers Total business solutions Banking and Financial Telecommunications Retail and Distribution Outsourcing and Contact Center Hospitality Government

12 Industrial Expertise Our customers Total business solutions Banking and Financial Telecommunications Retail and Distribution Outsourcing and Contact Center Hospitality Government

13 Industrial Expertise Our customers Total business solutions Banking and Financial Telecommunications Retail and Distribution Outsourcing and Contact Center Hospitality Government

14 Industrial Expertise Our customers Total business solutions Banking and Financial Telecommunications Retail and Distribution Outsourcing and Contact Center Hospitality Government

15 Industrial Expertise Our customers Total business solutions Banking and Financial Telecommunications Retail and Distribution Outsourcing and Contact Center Hospitality Government

16 Industrial Expertise Our customers Total business solutions Banking and Financial Telecommunications Retail and Distribution Outsourcing and Contact Center Hospitality Government

17 Thank you.

WHO/AFRO SLIPTA UPDATE

WHO/AFRO SLIPTA UPDATE WHO/AFRO SLIPTA UPDATE ASLM2016 Capetown 3 December 2016 Background ASLM SLIPTA SLIPTA Progress Results General Observations Looking ahead SLIPTA 2.0? ADVANCING THE LABORATORY PROFESSION AND NETWORKS IN

More information

Incident Response. We ve had a privacy breach now what?

Incident Response. We ve had a privacy breach now what? Incident Response We ve had a privacy breach now what? The threat of information breaches is well known and much discussed. The classification of the breach as a privacy breach may very well introduce

More information

KGRTC was established in 1989 by SADC Energy Ministers to offer specialized training in hydropower and related engineering disciplines.

KGRTC was established in 1989 by SADC Energy Ministers to offer specialized training in hydropower and related engineering disciplines. Formation KGRTC was established in 1989 by SADC Energy Ministers to offer specialized training in hydropower and related engineering disciplines. The Kafue Gorge Training Centre was identified as the site

More information

ITU REGIONAL ECONOMIC & FINANCIAL FORUM OF TELECOMMUNICATIONS/ICT FOR AFRICA INTERNATIONAL ROAMING SADC PERSPECTIVE

ITU REGIONAL ECONOMIC & FINANCIAL FORUM OF TELECOMMUNICATIONS/ICT FOR AFRICA INTERNATIONAL ROAMING SADC PERSPECTIVE ITU REGIONAL ECONOMIC & FINANCIAL FORUM OF TELECOMMUNICATIONS/ICT FOR AFRICA INTERNATIONAL ROAMING SADC PERSPECTIVE Mr Leweng Mphahlele Manager: Economic & Financial Analysis ICASA CONTENTS Vision & Mission

More information

Hybrid Wide-Area Network Application-centric, agile and end-to-end

Hybrid Wide-Area Network Application-centric, agile and end-to-end Hybrid Wide-Area Network Application-centric, agile and end-to-end How do you close the gap between the demands on your network and your capabilities? Wide-area networks, by their nature, connect geographically

More information

Africa Telecoms Trends 2010

Africa Telecoms Trends 2010 Africa Telecoms Trends 2010 Executive Summary: Africa expects Internet revolution 15 September 2010:- Businesses across Africa are expecting a revolution in Internet access, technology and costs as a result

More information

www. continuitymauritius.com Continuitymauritius

www. continuitymauritius.com Continuitymauritius focuses on Business Management and helps clients prepare for any potential threat to their business as a result of unforeseen or sudden disruptions. DISASTER MANAGEMENT The core of the highly skilled and

More information

Presentation to PPC Cost to communicate (2) 7 November 2014

Presentation to PPC Cost to communicate (2) 7 November 2014 Presentation to PPC Cost to communicate (2) 7 November 2014 Contents 1. Reflection: Cost to communicate 2008 2012 (Cape Town 30 November 2012) 2. Cost to communicate 2012 onwards 3. South Africa achievements

More information

MABITSI LEGODI SENIOR MANAGER:BUSINESS DEVELOPMENT

MABITSI LEGODI SENIOR MANAGER:BUSINESS DEVELOPMENT AFRAA 7 TH AVIATION STAKEHOLDER CONVENTION 2018 AN OVERVIEW OF AFRICAN AVIATION INFRASTRUCTURE CURRENT STATUS AND FUTURE TRENDS: AERONAUTICAL TELECOMMUNICATION INFRASTRUCTURE 08-10 APRIL 2018 MABITSI LEGODI

More information

Server Virtualisation Assessment. Service Overview

Server Virtualisation Assessment. Service Overview Server Virtualisation Assessment Service Overview Our Server Virtualisation Assessment helps organisations reduce server total cost of ownership and make informed decisions around capacity planning by

More information

Dimension Data s Managed Intrusion Detection and Prevention Service

Dimension Data s Managed Intrusion Detection and Prevention Service data sheet Dimension Data s Managed Intrusion Detection and Prevention Service A robust security infrastructure is essential to conduct business successfully in a networked world. Firewalls and other barriers

More information

OTT - THREAT OR OPPORTUNITY FOR AFRICAN TELCOS? DR CHRISTOPH STORK

OTT - THREAT OR OPPORTUNITY FOR AFRICAN TELCOS? DR CHRISTOPH STORK OTT - THREAT OR OPPORTUNITY FOR AFRICAN TELCOS? DR CHRISTOPH STORK MOBILE BROADBAND Mobile broadband (2.5G and 3G) and declining smart phone prices have lead to a rapid increase in Internet use Computer

More information

Computech Limited Company Profile 2018

Computech Limited Company Profile 2018 Computech Limited Company Profile 2018 History: Computech Limited is one of East Africa s leading systems integrators Founded in 1987, Computech Limited is a leading East African systems integrator, providing

More information

Jumpstarting Africa s Digital Development:

Jumpstarting Africa s Digital Development: Jumpstarting Africa s Digital Development: Defining the Next Generation Investment Program September 21, 2017 Kinshasa DRC Table of Contents Evolution of the ICT space in Africa Overview of 1 st Generation

More information

Water Loss 2018 From 30% to 7% Eckart Zollner & Stav Abraham

Water Loss 2018 From 30% to 7% Eckart Zollner & Stav Abraham Water Loss 2018 From 30% to 7% Eckart Zollner & Stav Abraham SECURITY & FIRE ENERGY MANUFACTURING I CT JASCO SOLUTIONS TELECOMMUNICATIONS Transmission / Access Networks Plan & Design Services Cable & Connectors

More information

Your Trusted Partner in Europe European Business Reliance Centre

Your Trusted Partner in Europe European Business Reliance Centre Your Trusted Partner in Europe European Business Reliance Centre Fit4Exchange 23 Septembre 2015 ebrc.com 24/09/2015 Public 1 EBRC -European Business Reliance Centre Our vision: To be the Centre of Excellence

More information

Old Mutual International Roaming guide

Old Mutual International Roaming guide Old Mutual International Roaming guide d can be viewed at telkom.co.za. 2015 Telkom SA SOC Limited. s part of a client list of Telkom SA SOC Limited. Telkom Park, 61 Oak Avenue, Centurion, South Africa

More information

Broadband Policy for Africa

Broadband Policy for Africa Broadband Policy for Africa World Bank Group, InfoDev June 19th, 2008 from 2:00 to 3:30 pm Productivity growth Investment Tax revenues Why ICT? Emerging evidence of positive impact at aggregate level,

More information

ITU regional ICT Indicators Workshop for Africa. The ICT Development Index (IDI)

ITU regional ICT Indicators Workshop for Africa. The ICT Development Index (IDI) ITU regional ICT Indicators Workshop for Africa Lilongwe, Malawi 20 21 March 2018 The ICT Development Index (IDI) ICT Data and Statistics Division Telecommunication Development Bureau International Telecommunication

More information

E-Strategies in Africa

E-Strategies in Africa E-Strategies in Africa Makane Faye mfaye@uneca.org United Nations Economic Commission for Africa Contents National E-strategies Lessons learned The WayForward from Global Vision to National Implementation

More information

AUDIO VISUAL SOLUTIONS CORPORATE HOSPITALITY RESIDENTIAL

AUDIO VISUAL SOLUTIONS CORPORATE HOSPITALITY RESIDENTIAL COMPANY OVERVIEW INTRODUCTION Audiotech was established to provide commercial and residential customers in South Africa and internationally with professionally designed integrated audio visual solutions.

More information

Interpreting the FFIEC Cybersecurity Assessment Tool

Interpreting the FFIEC Cybersecurity Assessment Tool Interpreting the FFIEC Cybersecurity Assessment Tool Wayne H. Trout, CISA, CRISC, CBCA, CBRA, CBRITP NCUA Supervisor, Critical Infrastructure and Cybersecurity What We ll Cover Cyber risk management Cybersecurity

More information

BUSINESS CONTINUITY MANAGEMENT

BUSINESS CONTINUITY MANAGEMENT BUSINESS CONTINUITY MANAGEMENT 64 th RBAP National Convention & General Membership Meeting 29 30 May 2017 PRESENTATION OUTLINE 2015 Disasters in Numbers 2016 & 2017 Top Business Risks What is BCM? Supervisory

More information

Software-defined Networking Development Model

Software-defined Networking Development Model Software-defined Networking Development Model Explore your roadmap to network programmability with a consulting engagement that assesses your readiness for software-defined networking Business demands

More information

UNDP CIRDA Workshop Partnering With Mobile Telephone Companies

UNDP CIRDA Workshop Partnering With Mobile Telephone Companies UNDP CIRDA Workshop Partnering With Mobile Telephone Companies David Kuguru Africa GAM, Key Accounts Vodafone Global Enterprise Africa +254.72.639.4611 dkuguru@safaricom.co.ke Kampala, Uganda 03 Mar, 2015

More information

Transforming networks and services for communications service providers

Transforming networks and services for communications service providers Transforming networks and services for communications service providers Do you need more agility to keep pace with new challengers in your market? The change is happening right now The growing number of

More information

SWIFT Payments market infrastructures. Christina Hutchinson Director SWIFT South Latam Region November, 2009

SWIFT Payments market infrastructures. Christina Hutchinson Director SWIFT South Latam Region November, 2009 SWIFT Payments market infrastructures Christina Hutchinson Director SWIFT South Latam Region November, 2009 About SWIFT A co-operative organisation serving the financial industry A provider of highly secure

More information

to Enhance Your Cyber Security Needs

to Enhance Your Cyber Security Needs Our Service to Enhance Your Cyber Security Needs Since the business critical systems by its nature are ON all of the time and the increasingly connected world makes you open your organization to everything

More information

Consulting services for cybersecurity

Consulting services for cybersecurity Consulting services for cybersecurity Secure every step of the way At Dimension Data you, our client, are central to everything we do. We look at cybersecurity from your point of view. Cybersecurity lifecycle

More information

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTRODUCTION AGENDA 01. Overview of Cloud Services 02. Cloud Computing Compliance Framework 03. Cloud Adoption and Enhancing

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

Enabling the data journey

Enabling the data journey Enabling the data journey Orange Business Services strategy to support the digital transformation of its customers Aliette Mousnier-Lompré Vice President, Global Enterprise Networks 500MB 62GB in 2025

More information

Healthcare Security Success Story

Healthcare Security Success Story Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Healthcare Security Success Story

More information

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 Global Response Centre (GRC) & CIRT Lite Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009 IMPACT Service offerings Global Response Centre CIRT Lite Need for GRC Access

More information

Launching of a Project for the Certification of Aerodromes in the ESAF Region (Nairobi, Kenya, 22 August 2016 )

Launching of a Project for the Certification of Aerodromes in the ESAF Region (Nairobi, Kenya, 22 August 2016 ) Launching of a Project for the Certification of Aerodromes in the ESAF Region (Nairobi, Kenya, 22 August 2016 ) Presentation, Assistance and Benefits of the AFI Plan Aerodrome certification Project Barry

More information

International gateway liberalization

International gateway liberalization International gateway liberalization WSIS Facilitation Meeting on Action Line C6 ITU Headquarters, Geneva, 20 Infrastructure sharing: extending ICT access to all Vaiva Lazauskaite vaiva.lazauskaite@itu.int

More information

FREEDOM IN SUB SAHARAN AFRICA 2009 A SURVEY OF POLITICAL RIGHTS AND CIVIL LIBERTIES

FREEDOM IN SUB SAHARAN AFRICA 2009 A SURVEY OF POLITICAL RIGHTS AND CIVIL LIBERTIES FREEDOM IN SUB SAHARAN AFRICA 009 A SURVEY OF POLITICAL RIGHTS AND CIVIL LIBERTIES Freedom in Sub-Saharan Africa 009: A Survey of Political Rights and Civil Liberties Progress and Setbacks for Freedom

More information

IBM Security Services Overview

IBM Security Services Overview Services Overview Massimo Nardone Senior Lead IT Security Architect Global Technology Services, IBM Internet Security Systems massimo.nardone@fi.ibm.com THE VEHICLE THE SKILL THE SOLUTION Today s Business

More information

White Paper. How to Write an MSSP RFP

White Paper. How to Write an MSSP RFP White Paper How to Write an MSSP RFP https://www.solutionary.com (866) 333-2133 Contents 3 Introduction 3 Why a Managed Security Services Provider? 5 Major Items to Consider Before Writing an RFP 5 Current

More information

Dimension Data Cloud Services

Dimension Data Cloud Services Cloud Services Cloud Services Today, organisations of all sizes are facing challenges unlike any they ve experienced before. Globalisation and economic pressures are changing the business landscape, increasing

More information

Mind your Business We manage your IT

Mind your Business We manage your IT ASP Mind your Business We manage your IT Because we believe that great service comes from heart, we are driven by passion to excel. MANAGE HOSTING SOLUTIONS Transform your business with our diverse hosting

More information

Building a Resilient Security Posture for Effective Breach Prevention

Building a Resilient Security Posture for Effective Breach Prevention SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.

More information

Interoperability the key to success. Presented by Franco Pucci, Director of the STS Association; Engineering Director of Conlog Durban, South Africa

Interoperability the key to success. Presented by Franco Pucci, Director of the STS Association; Engineering Director of Conlog Durban, South Africa Interoperability the key to success Presented by Franco Pucci, Director of the STS Association; Engineering Director of Conlog Durban, South Africa What is interoperability TOKEN TOKEN TOKEN The ability

More information

Safe Harbor Statement

Safe Harbor Statement Demand More. Do More. With AT&T Business Solutions Anders Juhlin Sales Centre Vice President Nordic Countries AT&T Business Solutions AT&T, AT&T logo and other marks contained herein are trademarks of

More information

Ex Africa semper aliquid nova A new national operator in South Africa. Dr Angus Hay Chief Technology Officer Transtel.

Ex Africa semper aliquid nova A new national operator in South Africa. Dr Angus Hay Chief Technology Officer Transtel. Ex Africa semper aliquid nova A new national operator in South Africa Dr Angus Hay Chief Technology Officer Transtel Transtel overview Annual revenue of around R 800m (75% internal to Transnet, 25% external)

More information

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson Delivering Integrated Cyber Defense for the Generation Darren Thomson Vice President & CTO, EMEA Region Symantec In 2009 there were 2,361,414 new piece of malware created. In 2015 that number was 430,555,582

More information

NEPAD s Impact on the Growth of ICT: Broadband Infrastructure Network ready for roll-out

NEPAD s Impact on the Growth of ICT: Broadband Infrastructure Network ready for roll-out NEPAD s Impact on the Growth of ICT: Broadband Infrastructure Network ready for roll-out Presentation to the IT News Africa Innovation Dinner Johannesburg, October 27, 2010 By Dr. Edmund Katiti, Policy

More information

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template RFP/RFI Questions for Managed Security Services Sample MSSP RFP Template Table of Contents Request for Proposal Template Overview 1 Introduction... 1 How to Use this Document... 1 Suggested RFP Outline

More information

The Power of the SE4All Action Agenda and Investment Prospectus

The Power of the SE4All Action Agenda and Investment Prospectus The Power of the SE4All Action Agenda and Investment Prospectus Dr. Daniel-Alexander Schroth SE4All Africa Hub Coordinator ECOWAS Sustainable Energy Policy & Investment High Level Forum SESSION 1 The ECOWAS

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

Botswana telecommunications limp a decade after policy changes

Botswana telecommunications limp a decade after policy changes Botswana telecommunications limp a decade after policy changes Botswana s mobile operators have become comfortable in their respective market segments at the cost of competition. At 59% internet penetration,

More information

Topic : The Need for Collaboration Between the Industry, Academia and other ICT Players AFRALTI Experience

Topic : The Need for Collaboration Between the Industry, Academia and other ICT Players AFRALTI Experience Topic : The Need for Collaboration Between the Industry, Academia and other ICT Players AFRALTI Experience Presenter: Jonathan P. Mwakijele, BSc, MCM, MSc Head of Training, Consultancy and Research Unit,

More information

2017 B2B PARTNER PROGRAM FOR MIDDLE EAST, TURKEY AND AFRICA (META)

2017 B2B PARTNER PROGRAM FOR MIDDLE EAST, TURKEY AND AFRICA (META) 2017 B2B PARTNER PROGRAM FOR MIDDLE EAST, TURKEY AND AFRICA (META) 1. B2B Partner Program for Channel partners... 2-1 1.1 Why Partner with Kaspersky Lab?... 2-1 1.2 Opportunities for Partners... 2-1 2.

More information

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015 Cybersecurity Capacity Building @ ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015 The importance of Cybersecurity From industrial age to information societies - Increasing dependence on the availability

More information

Presentation to PPC Cost to communicate (3) 21 September 2016

Presentation to PPC Cost to communicate (3) 21 September 2016 Presentation to PPC Cost to communicate (3) 21 September 2016 Contents 1. Price transformation journey continues 2. SADC roaming initiatives Price transformation journey continues Our 5 pillar strategy

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary

More information

Minutes of the Board Meeting

Minutes of the Board Meeting Minutes of the Board Meeting Date 30 August 2017 Online Web: https://www.gotomeet.me/sata_meetings Mobile App: download and install gotomeeting from appstore (apple phone) or playstore (android phone),

More information

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades.

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. Corporate Profile Company Profile IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. As a resource partner, we offer personalized and professional

More information

Africa Off-Grid Photovoltaic Market Analysis

Africa Off-Grid Photovoltaic Market Analysis We help your innovations reach their markets Africa Off-Grid Photovoltaic Market Analysis The experts of clean energy markets December 2014 http://www.infinergia.com/ Tel : +334 76 96 00 68 Email: reports@infinergia.com

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration

More information

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY : THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION

More information

OIE Sub-Regional Training Seminar on Veterinary Legislation Botswana National Veterinary Laboratory, Sebele, Gaborone (Botswana)

OIE Sub-Regional Training Seminar on Veterinary Legislation Botswana National Veterinary Laboratory, Sebele, Gaborone (Botswana) Dr. Patrick Bastiaensen OIE Sub-Regional Representation Southern Africa Dr. Marie Edan OIE Regional Activities Department Performance of Veterinary Services Outcomes of PVS missions conducted in SADC Member

More information

FRM TRAINING Our National Industrial Training Authority registration Number is NITA/TRN/1261.

FRM TRAINING Our National Industrial Training Authority registration Number is NITA/TRN/1261. FRM TRAINING The demand for financial risk managers has never been higher than now since the global financial crisis of 2007-2009. The interconnectedness of global financial system and the rapid evolution

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

Managed Network Services. Managing your network to enable your digital business

Managed Network Services. Managing your network to enable your digital business Managed Network Services Managing your network to enable your digital business Your network more efficient today, more effective tomorrow How can you optimise cost and performance today, and help your

More information

COMPANY PROFILE. Specializations. Advanced Security Advanced Unified Communications

COMPANY PROFILE. Specializations. Advanced Security Advanced Unified Communications COMPANY PROFILE Specializations Advanced Security Advanced Unified Communications 311 Park Avenue, Sharae Faisal, Karachi 75400 Karachi, Pakistan Phone: +92 213 4311908-9 Fax: +92 213 4536571 Email: sales@ftechpk.com

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this

More information

Why Business Model Changes for Higher Education Require New IT Infrastructure Strategies

Why Business Model Changes for Higher Education Require New IT Infrastructure Strategies Education Why Business Model Changes for Higher Education Require New IT Infrastructure Strategies Changes to the business models for higher education can have a significant impact on IT infrastructures.

More information

Hutchison Global Communications (HGC) NetHope and InsideNGO Member Exclusive Africa ISP Bandwidth Aggregation Buying Program

Hutchison Global Communications (HGC) NetHope and InsideNGO Member Exclusive Africa ISP Bandwidth Aggregation Buying Program Hutchison Global Communications (HGC) NetHope and InsideNGO Member Exclusive Africa ISP Bandwidth Aggregation Buying Program What is the HGC ISP Bandwidth Aggregation Program? ISP Bandwidth Aggregation

More information

Technology Lifecycle Management Assessment. Know your network - achieve business agility

Technology Lifecycle Management Assessment. Know your network - achieve business agility Technology Lifecycle Management Assessment Know your network - achieve business agility Your network is the platform on which you build the success of your organisation. In addition to connecting your

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

PLEASE NOTE: firms may submit one set of research questionnaires covering both China and Hong Kong or separate sets for each jurisdiction

PLEASE NOTE: firms may submit one set of research questionnaires covering both China and Hong Kong or separate sets for each jurisdiction Americas Argentina (Banking and finance; Capital markets; M&A; Project development) Bahamas (Financial and corporate) Barbados (Financial and corporate) Bermuda (Financial and corporate) Bolivia (Financial

More information

Cyber Diligence. EY Deals Forum Ian McCaw EY Transaction Advisory Services

Cyber Diligence. EY Deals Forum Ian McCaw EY Transaction Advisory Services Cyber Diligence EY Deals Forum 2018 Ian McCaw EY Transaction Advisory Services Finance & Commercial Diligence 2 B COMPANY: Power Life INDUSTRY: ENERGY REVENUE: 192m EBITDA: 875k (35% growth in 5 years)

More information

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Securing the Empowered Branch with Cisco Network Admission Control. September 2007 Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations

More information

Synergies between mobile phone and energy access. April 2014

Synergies between mobile phone and energy access. April 2014 Synergies between mobile phone and energy access April 2014 The GSMA represents the interests of mobile operators worldwide. Spanning 219 countries, the GSMA unites nearly 800 of the world s mobile operators,

More information

How to measure the real ROI of virtualisation

How to measure the real ROI of virtualisation white paper white paper how to measure the real ROI of virtualisation How to measure the real ROI of virtualisation By Edwinder Singh, Practice Head for Professional Services, Data Centre Solutions, Dimension

More information

Campus IT Modernization OPERATIONAL CONTINUITY FLEXIBLE TECHNOLOGY MODERNIZED SYSTEMS

Campus IT Modernization OPERATIONAL CONTINUITY FLEXIBLE TECHNOLOGY MODERNIZED SYSTEMS Campus IT Modernization OPERATIONAL CONTINUITY FLEXIBLE TECHNOLOGY MODERNIZED SYSTEMS Managing the Complexity of IT Modernization Constructing and modernizing a new campus is a complex undertaking, requiring

More information

Telecommunication Services - Understanding classification and scheduling

Telecommunication Services - Understanding classification and scheduling Telecommunication Services - Understanding classification and scheduling A D V A N C E D S C H E D U L I N G W O R K S H O P F O R S A D C M E M B E R S T A T E S W I N D H O E K, N A M I B I A 23-2 6

More information

RUAG Cyber Security Understand Cyber. Protect Values.

RUAG Cyber Security Understand Cyber. Protect Values. RUAG Cyber Security Understand Cyber. Protect Values. Your Cyber Security maturity depends on your awareness and the appropriate behaviour of every single user. RUAG Cyber Security empowers and efficiently

More information

Low Internet penetration despite 90% 3G Coverage in Lesotho

Low Internet penetration despite 90% 3G Coverage in Lesotho Low Internet penetration despite 90% 3G Coverage in Lesotho Lesotho is ranked 35th out of 49 African countries in both of RIA s 1GB data and voice/sms baskets in Q2 2017. Despite 90% 3G coverage, 70% of

More information

NEPAD ICT BROADBAND INFRASTRUCTURE PROGRAMME

NEPAD ICT BROADBAND INFRASTRUCTURE PROGRAMME NEPAD ICT BROADBAND INFRASTRUCTURE PROGRAMME Presentation at the Public & Private Sectors Partnership Forum: Promoting Infrastructure Sharing and Low Cost Solutions for Africa Dr. Edmund Katiti, Policy

More information

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore

More information

Must Have Items for Your Cybersecurity or IT Budget in 2018

Must Have Items for Your Cybersecurity or IT Budget in 2018 Must Have Items for Your Cybersecurity or IT Budget in 2018 CBAO Regional Meeting Dan Desko (Senior Manager, IT Risk Advisory) Matt Dunn (Senior Security Analyst, IT Risk Advisory) Who is Schneider Downs?

More information

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery. Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property

More information

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting Addressing Vulnerabilities By Integrating Your Incident Response Plans Brian Coates Enaxis Consulting Contents Enaxis Introduction Presenter Bio: Brian Coates Incident Response / Incident Management in

More information

Implementation Strategy for Cybersecurity Workshop ITU 2016

Implementation Strategy for Cybersecurity Workshop ITU 2016 Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential

More information

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE Technical Note GLOBAL RESPONSE CENTRE INTRODUCTION IMPACT s Global Response (GRC) acts as the foremost cyber threat resource centre for the global. It provides emergency response to facilitate identification

More information

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved. FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who

More information

Spreading the ICT Gospel With Cisco Network Academy Program

Spreading the ICT Gospel With Cisco Network Academy Program Spreading the ICT Gospel With Cisco Network Academy Program 1. Introduction By Shahab Meshki Educators and policymakers agree that student learning occurs best when highquality curriculum, instruction,

More information

Information Technology Information Sharing and Analysis Center. First Symposium Barcelona, Spain Feb. 2, 2011

Information Technology Information Sharing and Analysis Center. First Symposium Barcelona, Spain Feb. 2, 2011 Information Technology Information Sharing and Analysis Center First Symposium Barcelona, Spain Feb. 2, 2011 About Us Non Profit, US Corporation established in 2000 and operational in 2001 Fully funded

More information

Taking Mobile to Rural Africa

Taking Mobile to Rural Africa September 2010 Taking Mobile to Rural Africa The Vital Role of Hybrid Satellite Microwave Backhaul www.analysysmason.com www.intelsat.com Contents Introduction...3 Mobile Services: The New Growth Engine

More information

Managed Security Services. I.T. Security Specialists. Managed Security Services 1

Managed Security Services. I.T. Security Specialists. Managed Security Services 1 Managed Security Services I.T. Security Specialists Managed Security Services 1 Caretower s Service Elements 24x7 Management The Managed Security Services are delivered through our Security Operations

More information

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Unit 46: Network Security Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with opportunities to manage, support and implement a secure network infrastructure

More information

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print

More information

Create the ideal conditions for your network to grow.

Create the ideal conditions for your network to grow. Create the ideal conditions for your network to grow. Create the ideal conditions for your network to grow. SBC PremierSERV SM Network Integration and Managed Services. Flexible, end-to-end solutions

More information

SOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE

SOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE SOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE SECURE AIRBORNE CONNECTIVITY: OVERVIEW Gogo Business Aviation realizes the ever-pressing need to be vigilant in staying ahead of potential

More information

Singtel Investor Day Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018

Singtel Investor Day Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018 Singtel Investor Day 2018 Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018 Singtel Group Enterprise at a glance #1 International IPVPN in APeJ #1 EVPN and Eline in APeJ

More information