Categories
Current Projects

Central African Republic Technology Entrepreneurship Accelerator

Join CARE Mailing List

The Central African Republic (CAR) Technology Entrepreneurship and ICT Leadership Accelerator for start-up and early stage technology company founders and managers in the Bangui region has the goals of assisting and mentoring early stage company founders and managers to increase their potential for building successful and viable businesses and furthering their overall ICT leadership capacity.   In addition, the Accelerator’s goals include contributing to fostering a culture of entrepreneurship in Bangui and Central African Republic and developing a network of technology entrepreneurs.

Funded by the U.S. Department of State, the project partners are George Mason University, the University of Bangui and recent Humphrey Fellow and Central African Republic technology executive Serge Adouaka. Mr. Adouaka was a Humphrey Fellow in 2018 – 2019 studying at the Maxwell School at Syracuse University and then doing his professional affiliation with us at George Mason and focusing his study on ICT for Development and the Central African Republic.

The initial pilot will be comprised of two classes of 20 to 25 technology related business founders and managers with an initial one to two day kickoff at the University of Bangui and then subsequent weekly virtual engagement over the course of three months during the spring and summer of 2021.   The curricula is based upon best practices in CIO and technology leadership programs and experiences of Africa based technology accelerators.

Marché Banguissois

Start-up aimed at facilitating all industrial, commercial, financial, agricultural, movable and immovable operations.  Launched on Facebook in February 2021, the Banguissois market page was created […]

Satcom Consulting

Service and consulting company in New Information and Communication Technologies. Founded in 2020 by Salim BADAMASSY, information systems engineer, Satcom Consulting is supported by a […]

Ong MAMBOKO

The digital incubator was created in 2015 to offer digital solutions to the Central African population, the government and development partners. It is a physical […]

ISTECH

   iSTech’s Company description   iSTech stands for intelligent Products or services manufacturer / provider, relaying on Science & Technological principles, is a company created in […]

Harvey & Co

A single-member limited liability company, was created in 2015 to fight unemployment and promote digital transformation. It aims to support local companies to outsource certain […]

FORMATECH

Forever Management Technology (FORMATECH – SURL) is a one-person limited liability company. It is specialized in the provision of services, training, studies and realization in […]

GETEX AGRI

GETEX AGRI was created on July 1, 2020 by Ursula Marlène Makoua GERVIL-YAMBALA, passionate and self-taught about agriculture. GETEX AGRI is part of GETEX GROUP […]

SAUVONS LA VIE  – Lucas MOUKPIDIE

 Areas of intervention:   Promote entrepreneurship (income-generating activities)   Promote capacity building of women and youth through vocational training   Promote the protection of human rights […]

MOTIBI 

Company Description, Overview and History  Created in 2019 by several entrepreneurs whose objective is to innovate the agricultural system and meet the need for food […]

Ets BAWA

The company – including its overview / Company history and founders  Founded in 2018 by Bachir MOUSSA BAWA serial entrepreneur, with the aim of providing […]

ALERTES HUMANITAIRES

In the Central African Republic (CAR), successive conflicts have weakened the health system. Health indicators are among the worst in the world. The situation of […]

During the three months the founders and managers will develop plans to strengthen their businesses and further their individual technology leadership abilities.  The program will conclude with a final day of presentations and discussion at the University of Bangui. The weekly engagement during the three months of the program between the launch and the conclusion will be SMS based.

A key element of the Technology Entrepreneurship Accelerator will be 15 - 20 technology business mentors in both the Central African Republic and in the U.S.  The Central African Republic and U.S. mentors will provide insight and guidance to the business founders and managers as well as form a cohort themselves providing for exchange on U.S. and Central African Republic business policy and culture.

__________________________________________________________________________

Accélérateur d’entrepreneuriat technologique et leadership des TIC en République centrafricaine

L’accélérateur d'entrepreneuriat technologique et de leadership des TIC en République centrafricaine (RCA) pour les fondateurs et les dirigeants d'entreprises technologiques en début de carrière dans la région de Bangui a pour objectif d’aider et d’encadrer ces fondateurs et dirigeants d’entreprises afin d’accroître leur potentiel de création d’entreprises prospères et viables, de renforcer leur capacité globale de leadership en matière des TIC. En outre, les objectifs de l’accélérateur consistent à contribuer à la promotion d’une culture de l’esprit d’entreprise à Bangui et en République centrafricaine et à développer un réseau d’entrepreneurs technologiques.

Financé par le Département d’État des États-Unis, les partenaires de ce projet sont l’Université George Mason, l’Université de Bangui et le récent boursier Humphrey de la République centrafricaine et cadre de la technologie Serge Adouaka. M. Adouaka a été boursier Humphrey en 2018 – 2019, étudiant à l’école Maxwell de l’Université de Syracuse, puis a fait son affiliation professionnelle avec nous à George Mason en concentrant son étude sur les TIC pour le développement et la République centrafricaine.

Le projet pilote initial sera composé de deux classes de 20 à 25 fondateurs et dirigeants d’entreprises liées à la technologie avec un premier coup d’envoi d’un à deux jours au sein de l’Université de Bangui, puis un engagement virtuel hebdomadaire ultérieur sur une période de trois mois. Les programmes d’études sont basés sur les meilleures pratiques des responsables et leader en informatique et les expériences des accélérateurs technologiques basés en Afrique.

Au cours de ces trois mois, les fondateurs et dirigeants développeront des plans pour renforcer leurs entreprises et développer leurs capacités individuelles de leadership technologique. Le programme se terminera par une dernière journée de présentations et de discussions à l'Université de Bangui. L'engagement hebdomadaire pendant les trois mois du programme entre le lancement et la conclusion sera basé sur le potentiel technologique du SMS.

L’élément clé de l'accélérateur d'entrepreneuriat technologique sera constitué de 15 à 20 mentors en business technologique de la République centrafricaine et des États-Unis. Les mentors de la République centrafricaine et des États-Unis fourniront des informations essentielles et conseils aux fondateurs et dirigeants des entreprises. Aussi bien, ils formeront eux-mêmes une cohorte permettant d'échanger sur la politique et la culture commerciales des États-Unis et de la République centrafricaine.

Categories
Current Projects Research Projects

Cybersecurity on Enterprise Risk and Mobile Security

Join CARE Mailing List

This NSA granted curriculum development project focuses on two security areas: Enterprise Risk and Mobile Security.

Motivation and Background
With the rapidly increasing role of technology in society and the  increasing cybersecurity threat,  industry and government have a great need to scale cybersecurity leadership and governance.  In turn, there is a great need for educators to scale cybersecurity leadership and governance education and training.

Design
The courses are multidisciplinary, covering leadership and management, technical and engineering and policy.

 

Course I: Enterprise Risk Management and Cybersecurity Governance

The course provides an introduction and overview of the changing nature of cybersecurity risk management and cybersecurity governance.

Main Topics

  • Technology Innovation, Adoption and the Changing Nature of Cybersecurity Risk
  • Enterprise Risk Management, Cybersecurity Governance and Cybersecurity Strategy
  • Legal and Compliance Landscape
  • Roles of Boards and CISOs
  • Benchmarking, Information Asset Classification and Developing a Consensus of Cybersecurity Risks
  • Developing a Cybersecurity Strategy and Risk Mitigation Program
  • Enterprise Risk and Cybersecurity Frameworks
  • Role and Considerations for Cybersecurity Insurance

Learning Outcomes

  • Describe the cybersecurity risks resulting from new and rapidly developing technologies such as IoT, Cloud and mobile and analyze and describe the changing nature of the cybersecurity threat
  • Explain the complementary roles of enterprise risk management, cybersecurity governance and cybersecurity strategy
  • Discuss the evolving role of Boards and executive committees in enterprise risk management and cybersecurity and the evolving role of the CISO
  • Analyze cybersecurity governance in recent major cybersecurity compromises such as OPM
  • Apply cybersecurity lifecycle and the elements of identify, protect, detect, respond and recover
  • Outline the process and considerations for developing a cybersecurity strategy and risk mitigation program including benchmarking and information asset classification

Course II: Mobile Cybersecurity Management

This course provides an introduction and overview of the rapidly changing enterprise mobility environment, associated cybersecurity risks and approaches for developing a mobile cybersecurity strategy.

Main Topics

  • Mobility and Organization Strategy
  • The Changing Landscape of Mobile Technologies -from Smart Phones and Tablets to IoT
  • Mobile Policies and BYOD
  • Leadership and Governance for Mobile Security
  • Rapidly Evolving Mobile Device Management Technologies
  • Mobile Life Cycle Management
  • Cybersecurity Risk Framework and Mobile

Learning Outcomes

  • Understand the evolving nature and capability of mobile technologies
  • Understand mobile security risk including endpoint, network and process/policy
  • Evaluate mobile cybersecurity policy and BYOD alternatives in light of organization’s cyber strategy
  • Understand and evaluate new mobile device management technologies
  • Understand and apply the mobile device life cycle to mobile strategy
  • Outline the process and considerations and apply to developing a mobile cybersecurity strategy

 

Contacts

Dr. J.P. Auffret

jauffret@gmu.edu

703-993-5641                            

Categories
Current Projects Research Projects

City/County Cybersecurity Partnership

Join CARE Mailing List

The objective of this NSF-funded project (NSF Award #1623653) is to develop and provide focused and context specific cybersecurity leadership education and training for city and county governments.

Categories
Current Projects Research Projects

Extreme DDoS Defense (XD3)

Join CARE Mailing List

The threat of distributed denial of service (DDoS) attacks has been well-recognized in the data networking world for two decades. Such attacks are orchestrated by sets of networked hosts that collectively act to disrupt or deny access to information, communications or computing capabilities, generally by exhausting critical resources such as bandwidth, processor capacity or memory of targeted resources. The nature of DDoS attacks can span a wide range. Botnet-induced volumetric attacks, which can generate hundreds of gigabits per second of malicious traffic, are perhaps the best-known form of DDoS. However, low-volume DDoS attacks can be even more pernicious and problematic from a defensive standpoint. Such attacks target specific applications, protocols or state-machine behaviors while relying on traffic sparseness (or seemingly innocuous message transmission) to evade traditional intrusion-detection techniques.

The current art in DDoS defense generally relies on combinations of network-based filtering, traffic diversion and ”scrubbing” or replication of stored data (or the logical points of connectivity used to access the data) to dilute volumetric attacks and/or to provide diverse access for legitimate users. In general, these existing approaches fall well short of desired capabilities in terms of response times, the ability to identify and to thwart low-volume DDoS, the ability to stop DDoS within encrypted traffic and the need to defend real-time transactional services such as those associated with cloud computing and military command and control.

DARPA’s Extreme DDoS Defense (XD3) program will focus on three broad areas of opportunity to improve resilience against DDoS attacks. The program aims to thwart DDoS attacks by: (1) dispersing cyber assets (physically and/or logically) to complicate adversarial targeting; (2) disguising the characteristics and behaviors of those assets through networked maneuver to confuse or deceive the adversary; and (3) using adaptive mitigation techniques on endpoints (e.g., mission-critical servers) to blunt the effects of attacks that succeed in penetrating other defensive measures. This research program will include formulation of new algorithms, demonstrations and field exercises with software prototypes, development of performance metrics to assess effectiveness and integration of systems across the three aforementioned areas to maximize overall defensive capabilities.

Categories
Current Projects Research Projects

LADS Project

Join CARE Mailing List

The main goal of the project is to enhance the cyber security of digital devices, such as Embedded and Mission‐Specific Devices (EMSD), by developing a monitor capable of detecting attackers by analyzing involuntary analog emissions across a variety of modalities, including power consumption, electromagnetic, and acoustic emissions.