Digital Security Workshop

Protecting Feminist Movements in the Digital Age

Begin Workshop →
Digital Security Workshop

Part 1: Threat Landscape

Understanding the Digital Risks

This section establishes the context and urgency for digital security. Here we explore why feminist movements in the MENA region are specific targets.

Adversary Analysis

"We do feminist work. That makes some people angry—governments, religious groups, trolls. And when people are angry, they attack. That's just the reality."

🏛️

State Actors

Surveillance & Censorship

🗣️

Anti-Rights Groups

Trolling & Doxxing

🎭

Opportunistic Hackers

Phishing & Scams

Part 1: Threat Landscape

How They Target Us

The Three Most Common Attacks

📧

Phishing

Deceptive emails designed to steal your password or trick you into clicking malicious links

📖 Plain English:

Phishing = Fake emails that look real, trying to trick you into giving up passwords or clicking malicious links

Protection Tips:

  • Never click links in unexpected emails - Even if they look legitimate
  • Go directly to websites yourself - Type the URL manually or use bookmarks
  • Call/message sender directly - Use a number you already have, not one from the email
  • Check for typos in domain names - "fundation.org" instead of "foundation.org"
  • Use a sandbox environment - A safe space to test whether a link or file is dangerous, ex Windows Sandbox

Part 2: Personal Security Toolkit

Fortifying Individual Defenses

This section is focused on individual empowerment. We will deconstruct common security practices, providing clear, actionable steps to secure your personal accounts and devices, from creating strong passphrases to protecting your finances online.

Part 3: Organizational Security Protocols

Protecting Collective Assets

Security is a team sport. Here, we transition from individual actions to collective responsibility, exploring organizational policies for data management, office security, secure communications, and ensuring a safe digital lifecycle for all team members.

Part 3: Data Management

Safeguarding Sensitive Information

Understanding what data needs protection, implementing secure backups, and managing cloud storage safely to prevent leaks and ensure business continuity.

Part 4: Countering External Threats

Advanced Defense Strategies

With a strong internal foundation, we can now face the outside world. This section provides strategies to defend against external adversaries, focusing on tools like VPNs and preparing for physical device risks.

Part 5: Action Plan & Response

Incident Response Plan

When a security incident happens, every minute counts. Having a clear, documented response plan means you won't waste precious time figuring out what to do.

🚨

Why You Need This Template

This template guides you through immediate actions, damage control, and recovery steps—so when panic sets in, you have a trusted roadmap to follow.

Download and customize this plan for your organization. Print it out and keep it somewhere accessible. When an incident occurs, you'll be ready.

Part 5: Action Plan & Response

From Plan to Practice

Knowledge is only useful when applied. This final section translates learning into immediate, sustainable action. We'll cover three critical tasks to complete today, outline a simple incident response plan, and provide resources for continued support.

Do These 3 Things Today

Resource Guide

Security Tools Cheat Sheets

A comprehensive, printable reference guide for all security tools and guidelines covered in this workshop.

Thank You

Thank You for Participating!

Remember: Digital security is a journey, not a destination.
Stay vigilant, stay connected, and stay safe.