


Event Overview
The Handshake Digital Fair is a hybrid event (in-person and virtual) organized by AfricaCERT, in partnership with the National Agency for the Information Society of Niger (ANSI Niger).
Inspired by previous editions, it will be held in Niamey, Niger, from July 24-26, 2025. This fair aims to bring together cybersecurity professionals, decision-makers, and digital experts to foster knowledge exchange, skills building, and the implementation of shared strategies.
Accelerated Digital Transformation
The African continent faces significant opportunities as well as challenges in cybersecurity.
The constant evolution of cyber threats requires technical, operational, and strategic cooperation between sector stakeholders and Handshake Summit 25 is will seek to address these threats.
Objectives
Participants can expect presentations and sessions on the following topics:
Knowledge Exchange
Facilitate the exchange of ideas, best practices, and lessons learned in cybersecurity and cyber defense in Africa and the world over
Collaboration
Foster collaboration between incident response and security teams, information security officers, and government officials to improve collective cyber resilience
Capacity Building
Offer training sessions and workshops to enhance the skills of cybersecurity professionals and decision-makers
Policy Development
Discuss and formulate cybersecurity policies that align with international standards and address regional challenges
Networking
Create a networking platform for participants to share experiences and build partnerships in Africa and the world over

Foster Knowledge Exchange
Build Cybersecurity Skills
Implement Shared Strategies
Register
Registration for AfricaCERT Handshake Summit 2025 is 🚧 closed. If you missed out on registering and are interested in participating kindly email ✉ info@handshakesummit.org
Call for Speakers and Trainers
The call for speakers and trainers is open to the global community, with preference given to speakers and trainers with regional experience.
Topics
Incident Management
-
- Case studies, lessons learned, incident management guides
- Security tools, trends, and technologies
- Attack trends (malware, bots, DDoS, etc.)
- Malware analysis, antivirus evasion, etc.
- AI and machine learning applications, AI approaches applied to network attack detection
Network Monitoring
-
- Attack detection, mitigation, and remediation
- Attack trends (malware, bots, DDoS, etc.)
- DNS, IPv6, and routing security and best practices
Application and product security
-
- Product security, PSIRT
- Supply chain cyber resilience
- CVE
Open-source tools
-
- OSINT
- Threat intelligence sharing platforms and tools
Standards and frameworks
-
- CIS controls
- Security standards
Cybersecurity Policy and Strategy
-
- Standards and trust-building measures
- Cybersecurity economics
- Cybersecurity Funding Models
- National Strategies
- Capacity Building
- Security Awareness
Team Updates
Data Privacy
Social Media Risk Mitigation Best Practices
Disinformation and Misinformation
Guidelines
If you are interested in participating as a speaker, panelist, or trainer, please complete the submission form for consideration.
Applications must be received by June 25, 2025, at 11:59 PM UTC.
Please consider the following guidelines before submitting your proposal:
- Plenary sessions and panels are limited to 30 or 60 minutes, including Q&A. Multiple speakers will participate in plenary sessions and panels. Individual presentations will be between 10 and 20 minutes. Plenary and panel session topics are detailed above.
- If you wish to submit a training proposal, you will need to provide an abstract, the training objective, participant requirements, a general overview, and attendance limits upon submission. Trainings can range from 2 to 4 hours per day. Two-day continuing education courses are welcome.
- Please prepare a short biography (1-2 paragraphs) upon submission.
- This event will be open to the entire community and may be recorded for public viewing. Training materials and plenary sessions must comply with the TLP:CLEAR standard. For more information on the Traffic Light Protocol, visit https://www.first.org/tlp/
- No marketing presentations or training that deliberately promotes vendor products.
Suggested Training
- Industrial Control Systems (ICS) Security
- Ransomware Incident Response
- Malware Analysis
- Threat Intelligence
- Opensource Tools: IntelMQ, OSINT, Application Security, Zero Trust Networking, DDOS, Data Security, Digital Forensics, Penetration Testing
- Managed Services and Best Practices for Outsourcing Incident Response
- Maturity, CSIRTs, SOCs
- AI in Incident Detection and Response
- Creative Incident Response Techniques
- Security in Cloud and Container Environments
- Automating IT Ingestion and Alerts
- Digital Forensics
- Monetizing Cybercrime
- Operationalizing Threat Intelligence