EG-CERT was established in April 2009 as part of the National Telecom Regulatory Authority (NTRA). EG-CERT is charged with providing computer and information security incident response, support, defense and analysis against cyber attacks and collaboration with governmental, financial entities and any other critical information infrastructure sectors EG-CERT also provides early warning against malware spreading and massive cyber attacks against Egypt’s telecom infrastructure. EG-CERT consists of four main departments, which are Incident Handling,Cyber forensics,Malware Analysis and Penetration Testing.
INCIDENT HANDLING & BUSINESS CONTINUITY
This service includes taking appropriate action against the cyber threats and mitigating their effects and harms through full analysis of the data and feeds that we get.
- To preserve the integrity of digital artifacts to be presented as evidence to the responsible entities.
- To recover, analyze, and identify the evidence to estimate the potential impact of the malicious activity on the victim.
- To assess the intent and identity of the perpetrator.
- To conduct the Cyber Forensics process in short time with the highest quality of analysis and reporting.
- To provide expertise in detecting and analyzing malicious software (malware).
- The Reverse engineering process is used to identify, analyze, and extract information from the collected malware. We conduct research using artificial intelligence techniques to automatically detect and identify the malware and exploits.
CYBER ATTACKS MONITORING & EARLY WARNINGS
This service includes taking all the measures possible to be ready for any incidents or threats to the Egyptian information infrastructure.
To handle the incidents and the attacks targeting the Egyptian critical information infrastructure and mitigate the cyber threats, involves being as ready as we can be and that requires being up to date with the latest threats and trends in the field of cyber security and constantly increasing our technical capabilities.
CRITICAL INFORMATION INFRASTRUCTURE PROTECTION & EMERGENCY PLANS
This service is concerned with the protection of the information assets in critical sectors. To serve this purpose, the department studies the needs of specific sectors and their cyber security maturity levels. The studies lead to the development of cybersecurity strategies, frameworks and tools by working closely with our partners.
Vulnerability Assessment is a fundamental component of effective cybersecurity, aimed at identifying and mitigating potential weaknesses in an organization’s digital infrastructure. This proactive approach involves the systematic analysis of software, hardware, and network components to uncover security vulnerabilities and misconfigurations. By conducting thorough assessments, government agencies can understand their exposure to potential threats and prioritize remediation efforts.
Egypt-CERT offers specialized Vulnerability Assessment services tailored to the unique needs of government entities. Our experienced team employs advanced scanning tools and methodologies to uncover vulnerabilities that could be exploited by cyber adversaries. By collaborating with Egypt-CERT for Vulnerability Assessment, government bodies can gain a comprehensive view of their security landscape, make informed decisions to address risks, and fortify their defences against emerging cyber threats.
Penetration testing, often referred to as ethical hacking, is a critical cybersecurity practice employed by organizations to evaluate the resilience of their digital systems and networks. By simulating real-world cyberattacks, penetration testing identifies vulnerabilities, weak points, and potential entryways that malicious actors could exploit. Through rigorous testing and analysis, this proactive approach enables government agencies and businesses to discover and rectify security gaps before they can be leveraged for unauthorized access or data breaches. Egypt-CERT offers specialized penetration testing services, helping government entities bolster their cyber defences, protect sensitive information, and fortify their digital infrastructure against evolving threats.
Red Teaming is a strategic cybersecurity practice that goes beyond traditional testing methodologies. It involves a comprehensive evaluation of an organization’s security posture by emulating advanced cyber adversaries. This proactive approach involves a skilled team, known as the ‘Red Team,’ simulating sophisticated cyberattacks to identify potential vulnerabilities and gaps in an organization’s defenses. By mimicking real-world threats, Red Teaming provides valuable insights into an entity’s ability to detect, respond, and recover from complex cyber incidents.
At Egypt-CERT, we offer specialized Red Teaming services to government bodies. Our expert teams employ cutting-edge techniques to emulate advanced cyber threats, enabling government agencies to uncover hidden weaknesses, enhance incident response capabilities, and refine their overall cybersecurity strategy. By collaborating with Egypt-CERT’s Red Team, government entities can bolster their resilience and ensure the utmost protection of critical systems and sensitive information.