Committed to connecting the world

WTISD

Programme - Day 3

​​​​​​​​​​​​​​​​​Regional Cybersecurity Summit for Africa​​​
​CyberDrill​​​​

Contact: tsbevents@itu.int


​09:30 - 10:00
Keynote: Cyber drills: A tool to develop a proactive and robust security posture or the importance of security simulations
​10:00 - 11:30
Cyber drill experience sharing
Objective: Speakers shared their experiences in conducting cyber drills followed by an interactive discussion with the audience

Moderator: Marcus Adomey, AfricaCERT
​11:30 - 12:00
​Coffee break and Team creation
​12:00 - 13:30
​​Scenario A: Website d​efacement
An adversary group performed a cyber-attack on a bank's website by carrying out unauthorized access and modification of the website of the organisation. The website of the company was defaced and one feature was deactivated but analysis showed that the source code of the website was not altered. The scope of this scenario consisted of finding out: how unauthorized access to the website could have happened, how the website could have been defaced, whether there is any vulnerability related to session/cookie which could have been exploited and how these vulnerabilities could have been addressed.​
​13:30 - 14:30
​Lunch break
​14:30 - 16:00
​Scenario B: DFS security cyber resilience toolkit 
The DFS Cyber Resilience Toolkit facilitates DFS cyber resilience self-assessment and improves the overall digital financial services infrastructure posture by identifying vulnerabilities, assessing peripheral and internal defences, and designating attack scenarios. The toolkit addresses DFS entities, users, and actors that may be part of the telecommunication sector of the DFS ecosystem. Generally, the toolkit promotes a more structural preparation against malicious cyber operations, establishes best practices to fend off unauthorised access attempts, and suggests potential security measures that can be implemented to improve the cybersecurity maturity of the targeted entity. This exercise was designed as an interactive tabletop session, where participants were organized into six groups, each focusing on a distinct aspect of cyber security: Risk management, governance, testing, training & awareness, protection and incident response.
​16:00 - 16:30
​Coffee break
​16:30 - 18:00

Scenario C: Phishing email and malware analysis
In this scenario, participants played the role of cybersecurity analysts tasked with analyzing a phishing email to gather information and identify potential vulnerabilities as well as investigating a suspicious document that may contain hidden malware with the goal of analysing the document to identify and understand the malicious payload.
​18:0​0 
Closing

 ​​