TechCamp Namibia 2018

TechCamp 2018

TechCamp Namibia is a working workshop sponsored and organized by the United States State Department under the Bureau of International Information Programs focusing on cybersecurity and cybercrimes issues where participants are expected to contribute in the discussions and creating necessary resolutions and blueprints for further works. The workshop was divided into five parallel tracks namely Citizen Protection, Policy Issues, Law Enforcement Issues, Industry Growth and Cybersecurity Education. Each track was assisted by two experts, from International and Regional countries. The theme for this TechCamp is “Cybersecurity for everyone”.

Namibia University of Science and Technology is the highest ranked university in Namibia and also has cyber security degrees at bachelors and masters level. They hosted this TechCamp supported by the US Embassy in Namibia and the US State Department. The program brought together participants from across Africa and trainers from all over the world.

Summary of TechCamp Namibia:

Day 1:

There were welcome remarks from the Chief of Staff at the US /Namibia Embassy. The host from Namibia University of Science & Technology (NUST), introduced our working area/tasks they were divided into 4 areas:

  1. Policy
  2. Education
  3. Law enforcement
  4. Citizen Protection
  5. Industry/Private Sector


The US State Department highlighted that there would be Possible Funding for solutions suggested during the TechCamp and there would also be opportunity to connect with experts in cybersecurity


I joined the Education group on Day One

Our main talking points were about cybersecurity within the education Sector. It was a multi participant led discussion on the following topics:

  1. What’s Going on in cybersecurity
  2. Security Awareness
    1. Laws in security
  3. Tools for Cyber Awareness
  4. Who is Responsible for the Data?
    1. Privacy of data In the Cloud
  5. How do we protect our networks?
  6. Educational Portal
  7. How to protect education networks
  8. How do we educate the people in terms of cybersecurity?


Several initiative where discussed such as the Google Safe and the Namibia Child Online Safety Project, which was later proposed that HIT might want to partner with UNICEF in the project. I am in the process of contacting relevant authorities on the matter.

Day 2:

Dr Anika Peters, the Dean of the School of Computing gave an address on the local overview of Cybersecurity in Namibia and how the gestation period for policy framework took 10 years. This led to the delay in the Cybersecurity law being approved.

I attended the Threat Intelligence Session.

The trainer John Haley, Cybersecurity Director from Capitol One Bank in the USA, advocated for applying a proactive approach to Cyber Defence.


Key points from the Threat Intelligence Session:

Alert Development – Get Data and create alerts and threat hunting


Threat Hunting – proactively collecting Data from many sources

  1. Every endpoint
  2. Every network flow
  3. Every persons computer
  4. Data Lakes


Correlation of data from multiple data sources is key to paint a picture of who what where, how and who. Cyber Intelligence is key to fuel threat detection to fuel Tactics Techniques and Procedures, Campaigns and Actors.

Tools for collecting data

  • Snowflake threat intelligence
  • Log Aggregation Tools – Splunk , Elastic Search
  • Purple Ring
  • Variato
  • DTex
  • Infoblocks
  • MISP
  • ISEC



Cyber Intelligence Sources

  • Internet Storm Center – SANS
  • Dark Reading –
  • Black Hills InfoSec


Duties of the Center for Machine Learning within Capitol One

  • Analyse Data for InfoSec
  • Automation of Cyber Operations


Day 3:

We had to collectively come up with specific challenges to tackle as part of the Threat Intelligence Team. We came up with the following objectives and solutions.


  1. Create Threat Intelligence team for information sharing and gathering, and threat hunting.
    1. Industry Level
    2. National Level
    3. Regional Level – SADC
  2. Implementation of various strategies of Information Gathering
    1. Creating public vulnerability database
    2. Honeypots
    3. Surveys
    4. Stakeholders reporting incidents
  3. Information Sharing
    1. Creation industry/ sector information domes
    2. Setup of cross platform information sharing infrastructure


  1. Industry specific baseline survey on Cybersecurity and threat management
  2. Presentation of Findings and Recommendations – Proposal for creation of sector certs to stakeholders.
  3. Establishment of MOUs and standard operational procedures to share information.
  4. Creation of Industry wide CIRT
  5. Implementation of strategies from information gathering
    1. Threat Intelligence Portal
    2. Creating public vulnerability database
    3. Honeypots
    4. Surveys
    5. Stakeholders reporting incidents
  6. Implementation Continuous Programs
    1. Workshops
    2. Awareness
    3. Cyber Security Competitions
    4. Workshops
  7. Create a Cyber Security Framework and Standards

I was elected to present our solution to the gathering on behalf of the threat intelligence team.

Day 4:

Two representatives from the threat intelligence team presented the solutions we had proposed to the Namibian Parliament.

Leave a Reply

Your email address will not be published. Required fields are marked *