NEPRA today hosted a one day workshop on “Cyber Incident Response Management” at NEPRA Tower in collaboration with Techaccess with an aim to create awareness amongst the public sector organizations for cyber incident response management. The workshop was led and addressed by Chairman NEPRA, Mr. Tauseef H. Farooqi, followed by cybersecurity experts Mr. Maasimiliano Romoe, Chief Business Development Officer, CY4GATE and Mr. Tariq Malik CTO, Techaccess. The workshop was attended by a large number of Power and Public Sector IT Professionals.
The Chairman NEPRA, Mr. Tauseef H. Farooqi in his welcoming address highlighted the importance of the workshop. He remarked that cyber incident response is different from general IT security as it requires a more hands-on role. We need threat hunters who are at least one step up from hackers which essentially requires proactive approach instead of reactive approach. Regulators are certainly not the first line of defense, but the leadership and vision they articulate in a strategy are essential first steps to safeguarding the critical infrastructure from cybersecurity threats. A strategy builds on a collaboration, therefore public and private partnership is a key element in operating and protecting these critical infrastructure.
Mr. Tariq Malik gave a brief introduction on 5th Generation warfare and different types of nation state attacker tools. Generally, 96% of attacks are of short duration and there is lack of realization in organizations that we are under attack. He briefed the participants about the factors that contribute to the successful attack; how to avoid it and what key steps to perform when the organization is under cyber-attack. He shared the recommendations for public sector executives to adopt to avoid advanced persistent threats. Mr. Andrea Pompili briefed the participants about how to move from Cyber Security to Cyber Resiliency by combining the important factors. He explained in detail the impact identification techniques and importance of Automated Threat Identification techniques. Later on hands on workshop was conducted to cover three different attacks scenarios and step by step approach to deal with these cyber-attack scenarios.
The workshop concluded after detailed Questions & Answers session of the participants with the Chairman and the Speakers.
















