SlideShare a Scribd company logo
Version: 1.1
Date: 05/02/2018
Author: Sylvain Martinez
CLUB PRESENTATION
2
CONTENTS
1. Context
2. Format
3. Opportunities
4. Profiles
5. Future
3
1. CONTEXT: MISSION STATEMENT
TO HELP MAURITIAN IT PROFESSIONALS SHARE
INFORMATION AND LEARN ABOUT CYBER
SECURITY THROUGH AN OPEN PLATFORM AND
THE CREATION OF A CYBER SECURITY
COMMUNITY.
4
2. FORMAT: PRINCIPLES
• Free for all;
• Not a marketing platform;
• Regular meetings;
• Low or no cost to organize and setup.
5
2. FORMAT: STRUCTURE
• At a central location for most IT professionals: Port Louis or
Ebene;
• Preference for a neutral place (pub, coffee shop, etc.);
• Once a month, end of month. I.e.: 3rd Wednesday of every
month;
• Website, Facebook, twitter, Linkedin
• Slides to be shared on slideshare
6
2. FORMAT: STRUCTURE
• Mix of technical and non technical talks;
• Last for 2 hours:
• 5 Min: Concept introduction;
• 5 Min: Cyber Security News;
• 45 Min 1st Talk:
• 5 Min Speaker presentation;
• 30 Min presentation;
• 10 Min Q&A;
• 15 Min: Break
• 45 Min 1st Talk:
• 5 Min Speaker presentation;
• 30 Min presentation;
• 10 Min Q&A;
7
2. OPPORTUNITES: ATTENDEES
• Free source of knowledge;
• Opportunities to ask questions;
• Learn and apply practical knowledge at work and
at home;
• Professional Networking;
8
2. OPPORTUNITES: SPEAKERS
• Provides experience in addressing and
presenting to a crowd;
• Sharing knowledge and sense of achievement;
• Profile Visibility;
• Stronger professional network.
9
2. OPPORTUNITES: HOSTS
• We drink your beer!;
• Exposure for your venue;
• Good Karma.
10
2. PROFILE: ATTENDEES
• Some knowledge of IT;
• Some awareness of Cyber Security;
• Interest or curious about Cyber Security.
11
2. PROFILE: SPEAKERS
• Good understanding of the topic;
• Some years of experience in Cyber Security is
required;
• Speaking experience preferred but not
mandatory
• To promote WHITE HAT and not BLACK HAT.
12
2. PROFILE: ORGANISERS
• Governance to be kept at a minimum number of
people to start with;
• Have some spare time to:
• Review talks;
• Coordinate with host venue;
• Help on the day;
• Spread the word;
13
2. FUTURE: TALKS
• WIFI Hacking and how to protect yourself?
• What is an IDS?
• What is GDPR?
• How to best handle passwords and why?
• A look at KALI LINUX, a free penetration testing
platform?
• What is the difference between a Vulnerability
Assessment and a Penetration Testing?
14
2. FUTURE: EXPANSION
• More talks per event;
• External speakers from the Cyber Security Events
Circuits;
• Sponsored location;
• Sponsored beverages and food;
15
THANK YOU!
Find us on
Website: https://www.elysiumsecurity.com/muscl
Facebook: http://www.facebook.com/esmuscl
Twitter: @es_muscl

More Related Content

Talk1 muscl club_v1_2

  • 1. Version: 1.1 Date: 05/02/2018 Author: Sylvain Martinez CLUB PRESENTATION
  • 2. 2 CONTENTS 1. Context 2. Format 3. Opportunities 4. Profiles 5. Future
  • 3. 3 1. CONTEXT: MISSION STATEMENT TO HELP MAURITIAN IT PROFESSIONALS SHARE INFORMATION AND LEARN ABOUT CYBER SECURITY THROUGH AN OPEN PLATFORM AND THE CREATION OF A CYBER SECURITY COMMUNITY.
  • 4. 4 2. FORMAT: PRINCIPLES • Free for all; • Not a marketing platform; • Regular meetings; • Low or no cost to organize and setup.
  • 5. 5 2. FORMAT: STRUCTURE • At a central location for most IT professionals: Port Louis or Ebene; • Preference for a neutral place (pub, coffee shop, etc.); • Once a month, end of month. I.e.: 3rd Wednesday of every month; • Website, Facebook, twitter, Linkedin • Slides to be shared on slideshare
  • 6. 6 2. FORMAT: STRUCTURE • Mix of technical and non technical talks; • Last for 2 hours: • 5 Min: Concept introduction; • 5 Min: Cyber Security News; • 45 Min 1st Talk: • 5 Min Speaker presentation; • 30 Min presentation; • 10 Min Q&A; • 15 Min: Break • 45 Min 1st Talk: • 5 Min Speaker presentation; • 30 Min presentation; • 10 Min Q&A;
  • 7. 7 2. OPPORTUNITES: ATTENDEES • Free source of knowledge; • Opportunities to ask questions; • Learn and apply practical knowledge at work and at home; • Professional Networking;
  • 8. 8 2. OPPORTUNITES: SPEAKERS • Provides experience in addressing and presenting to a crowd; • Sharing knowledge and sense of achievement; • Profile Visibility; • Stronger professional network.
  • 9. 9 2. OPPORTUNITES: HOSTS • We drink your beer!; • Exposure for your venue; • Good Karma.
  • 10. 10 2. PROFILE: ATTENDEES • Some knowledge of IT; • Some awareness of Cyber Security; • Interest or curious about Cyber Security.
  • 11. 11 2. PROFILE: SPEAKERS • Good understanding of the topic; • Some years of experience in Cyber Security is required; • Speaking experience preferred but not mandatory • To promote WHITE HAT and not BLACK HAT.
  • 12. 12 2. PROFILE: ORGANISERS • Governance to be kept at a minimum number of people to start with; • Have some spare time to: • Review talks; • Coordinate with host venue; • Help on the day; • Spread the word;
  • 13. 13 2. FUTURE: TALKS • WIFI Hacking and how to protect yourself? • What is an IDS? • What is GDPR? • How to best handle passwords and why? • A look at KALI LINUX, a free penetration testing platform? • What is the difference between a Vulnerability Assessment and a Penetration Testing?
  • 14. 14 2. FUTURE: EXPANSION • More talks per event; • External speakers from the Cyber Security Events Circuits; • Sponsored location; • Sponsored beverages and food;
  • 15. 15 THANK YOU! Find us on Website: https://www.elysiumsecurity.com/muscl Facebook: http://www.facebook.com/esmuscl Twitter: @es_muscl