AfricaCERT Handshake Summit 25

Niamey, Niger

July 24-26, 2025

Register
AfricaCERT logo - white
ANSI logo - white
ISERVICES logo - white

Event Overview

The Handshake Digital Fair is a hybrid event (in-person and virtual) organized by AfricaCERT, in partnership with the National Agency for the Information Society of Niger (ANSI Niger).

Inspired by previous editions, it will be held in Niamey, Niger, from July 24-26, 2025. This fair aims to bring together cybersecurity professionals, decision-makers, and digital experts to foster knowledge exchange, skills building, and the implementation of shared strategies.

Accelerated Digital Transformation

The African continent faces significant opportunities as well as challenges in cybersecurity.

The constant evolution of cyber threats requires technical, operational, and strategic cooperation between sector stakeholders and Handshake Summit 25 is will seek to address these threats.

Objectives

Participants can expect presentations and sessions on the following topics:

Knowledge Exchange

Facilitate the exchange of ideas, best practices, and lessons learned in cybersecurity and cyber defense in Africa and the world over

Collaboration

Foster collaboration between incident response and security teams, information security officers, and government officials to improve collective cyber resilience

Capacity Building

Offer training sessions and workshops to enhance the skills of cybersecurity professionals and decision-makers

Policy Development

Discuss and formulate cybersecurity policies that align with international standards and address regional challenges

Networking

Create a networking platform for participants to share experiences and build partnerships in Africa and the world over

AfricaCERT Handshake 2025 logo

Foster Knowledge Exchange

Build Cybersecurity Skills

Implement Shared Strategies

Register

Registration for AfricaCERT Handshake Summit 2025 is 🚧 closed. If you missed out on registering and are interested in participating kindly email ✉ info@handshakesummit.org

Call for Speakers and Trainers

The call for speakers and trainers is open to the global community, with preference given to speakers and trainers with regional experience.

Topics

Incident Management

    • Case studies, lessons learned, incident management guides
    • Security tools, trends, and technologies
    • Attack trends (malware, bots, DDoS, etc.)
    • Malware analysis, antivirus evasion, etc.
    • AI and machine learning applications, AI approaches applied to network attack detection

 Network Monitoring

    • Attack detection, mitigation, and remediation
    • Attack trends (malware, bots, DDoS, etc.)
    • DNS, IPv6, and routing security and best practices

 Application and product security

    • Product security, PSIRT
    • Supply chain cyber resilience
    • CVE

 Open-source tools

    • OSINT
    • Threat intelligence sharing platforms and tools

Standards and frameworks

    • CIS controls
    • Security standards

 Cybersecurity Policy and Strategy

    • Standards and trust-building measures
    • Cybersecurity economics
    • Cybersecurity Funding Models
    • National Strategies
    • Capacity Building
    • Security Awareness

Team Updates

Data Privacy

Social Media Risk Mitigation Best Practices

Disinformation and Misinformation

Guidelines

If you are interested in participating as a speaker, panelist, or trainer, please complete the submission form for consideration.

Applications must be received by June 25, 2025, at 11:59 PM UTC.

Please consider the following guidelines before submitting your proposal:

  • Plenary sessions and panels are limited to 30 or 60 minutes, including Q&A. Multiple speakers will participate in plenary sessions and panels. Individual presentations will be between 10 and 20 minutes. Plenary and panel session topics are detailed above.
  • If you wish to submit a training proposal, you will need to provide an abstract, the training objective, participant requirements, a general overview, and attendance limits upon submission. Trainings can range from 2 to 4 hours per day. Two-day continuing education courses are welcome.
  • Please prepare a short biography (1-2 paragraphs) upon submission.
  • This event will be open to the entire community and may be recorded for public viewing. Training materials and plenary sessions must comply with the TLP:CLEAR standard. For more information on the Traffic Light Protocol, visit https://www.first.org/tlp/
  • No marketing presentations or training that deliberately promotes vendor products.

Suggested Training

  • Industrial Control Systems (ICS) Security
  • Ransomware Incident Response
  • Malware Analysis
  • Threat Intelligence
  • Opensource Tools: IntelMQ, OSINT, Application Security, Zero Trust Networking, DDOS, Data Security, Digital Forensics, Penetration Testing
  • Managed Services and Best Practices for Outsourcing Incident Response
  • Maturity, CSIRTs, SOCs
  • AI in Incident Detection and Response
  • Creative Incident Response Techniques
  • Security in Cloud and Container Environments
  • Automating IT Ingestion and Alerts
  • Digital Forensics
  • Monetizing Cybercrime
  • Operationalizing Threat Intelligence