Related Posts

Rwanda : You cannot protect yourself from internet hackers unless you know how to hack yourself – Urges Senior Security Consultant Charles Watathi

28 March, at 05 : 08 AM Print


Security Consultant Charles Watathi discussing with a Rwandan Policeman at CSA Seminar

Security Consultant Charles Watathi discussing with a Rwandan Policeman at CSA Seminar

Last Friday 23rd March 2012, there was a seminar of information security experts from all over Africa who had gathered to discuss “Banking and Cyber Security Workshop” at Kigali Serena Hotel.

The UK based company, Cyber Security Africa together with the government of Rwanda, IBM and a number of other information security stakeholders had a number of issues to discuss about information security, its law enforcements and tricks of tightening access to data servers.

Charles Watathi, Senior Security Consultant, Eacademy Group Africa illustrated tricks of how popular applications like Adobe, gmail and web browser links can be used to send malicious software that is used to hijack computer privileges from a victim to a hacker.

“To ensure that you have adequately protected your information assets, you must adopt the ‘offensive’ approach. In other words, you must penetrate your networks and assess the security posture for vulnerabilitiesbefore the hackers do.” Explains Watathi


Participants of the CSA seminar in a tour of the information security companies’ exhibitions

Mind Mabhunu, ATM Channel Strategy Manager, Standard Bank of South Africa discussed risk mitigation tactics against ATM threats classified as Vandalism, ATM bombings, Internal Fraud, Card skimming and card trapping, customer mugging, software breach and CIT robberies.

Martin Auger, Territory Sale Manager, Oracle African Operations explained how financial institutions can reduce the risk of internal frauds and unauthorized access to sensitive information.

“At Oracle we provide an efficient way of tracking whatever every worker of a company does and has privileges of, just like the rules that define the chain of command and keys involved in say the governance of an Atomic bomb.” Urges Auger

Several experts in information security systems held up the floor discussing several notions involved in information monitoring and security maintenance.


Community English , , , , , , , , , ,

Leave a Reply

Subscribe Via Email

Enter your email:

Follow Us!


Get every new post delivered to your Inbox

Join other followers