SUPERHEROES IN INFORMATION PROFESSIONAL 1015

Size: px
Start display at page:

Download "SUPERHEROES IN INFORMATION PROFESSIONAL 1015"

Transcription

1

2 SUPERHEROES IN INFORMATION PROFESSIONAL 1015 EDITORIAL BOARD EDITOR'S ACKNOWLEDGEMENT CONDESCENDENT Assoc. Prof. Dr. Mohd Sazili Bin Shahibi Assalamualaikum ADVISOR Encik Azmi Bin Abd Rahman First and foremost, I would like to thank to Allah s.w.t. because giving us strength and determine to finish the publication of TINTA about Superheroes in Information Professional. CHIEF EDITOR Akmal Shahmeen Bin Ahamad Sabarudin DEPUTY CHIEF EDITOR Nur Atiqa Binti Saleh SECRETARY Hafawati Husna Binti Mohamed Khairudin Thank you to our lovely advisor, Mr Azmi Bin Abdul Rahman who always tries to make us understand the actual process of publication and amend the mistake arises during the preparation of this task. With his guidance, we are now clearly understood the publication process. I also like to express our greatest appreciate to lecturer from Faculty of Information Management who contribute their article. TREASURER Noor Izzaty Binti Mohd Radzi For my entire group, thank you for all of your work in this TINTA publication which willing to help in writing, editing, designing and etc. With all of your commitment, we could produce the high quality publication of TINTA. DESIGN AND LAYOUT Nadia Fazira Binti Nor Amir Nurul Aida Binti Jamil Sincerely, Akmal Shahmeen Bin Ahmad Sabarudin Chief Editor, EDITORS Fatin Eleena Binti Sha'mar Nor Adaviah Binti Mohd Sabri Norshahida Binti Kalis Nurul Amirah Binti Md Suhaimi Siti Nur Athirah Binti Saiffuddin Zuhri REPORTERS Fatin Syahirah Binti Pawzi Siti Aishah Binti Yahpar TINTA Jun 2015 TINTA has established by Universiti Teknologi Mara, Faculty of Information Management or also known as FPM since TINTA is a medium to highlight FPM students' article as well as lecturers to PUBLISHER Faculty of Information Management UiTM Puncak Perdana publish in TINTA. The theme of TINTA Bil 25, Vol. 2/2015 is Superheroes in Information Professional. ISSN CONTENTS 1 Pa ge

3 PAGE PERIBADI PENGURUS REK0D YANG CEMERLANG Ahmad Azman B. Mohamad Rami BUKU-BUKU YANG PERLU Dl BACA SEBELUM 'MATT Shaharom TM Sulaiman INFORMATION TECHNOLOGY COMPETENCY TO INVIGORATE INNOVATIVE PERFORMANCE IN MALAYSIAN ACADEMIC LIBRARIES Haziah Sa'ari COMPLETE CRITERIA TO BE INFORMATION PROFESSIONAL Akmal Shahmeen B. Ahamad Sabarudin & Naqiuddin B. Abd Haris THE ISSUES IN ACADEMIC LIBRARIES Noor Farahain Bt. Abdul Razak, Nur Aliah Bt. Zainal & Nur Athirah Hanani Bt. Jailani EFFECTIVENESS MALAYSIAN ARCHIVAL INSTITUTIONS NOW AND FUTURE Fatin Eleena Bt. Sha'mar, Nur Atiqa Bt. Saleh & Nurul Aida Bt. Jamil 2 Page

4 HOW TO BE 21 S T CENTURY LIBRARIAN Hafawati Husna Bt. Mohamed Khairudin & Nor Adaviah Bt. Mohd Sabri INFORMATION SECURITY SUPERHEROES Nurul Aishah Bt. Samin & Nurul Amirah Bt. Md Suhaimi LIBRARIANS JOB SATISFACTION Noor Izzati Bt Mohd Radzi, Nurul Nadia Bt. Karim & Wan Nurul Syahida Bt. Wan Kamaruddin Mukri LIBRARIES' EFFORT TO ATTRACT USER Nursyafiqah Bt. Wahid & Siti Aishah Bt.Yahpar THE SURVIVAL OF LIBRARIAN IN NEW ERA Fatin Syahirah Bt. Pawzi & Nor Ashikin Bt. Ngadiron THE FATHER OF LIBRARY Nadia Fazira Bt. Nor Amir & Nur Sarah Syafiqah Bt. Ismail

5 INFORMATION SECURITY SUPERHEROES By: NURUL AMIRAH BINTI MD SUHAIMI NURUL AISHAH BINTI SAMIN Faculty of Information Management, Universiti Teknologi MARA Abstract: This paper discussed about the information security careers that describe about the role, responsibility and importance of each career in the organization. The criteria for those who works in this field also being stated. This paper also to investigate the different career in Information Security which has a different roles and responsibility that were related to information system and network system. Other than that, this paper discussed about the agency that involves information security in Malaysia which is Malaysian Communication and Multimedia Commission (MCMC). Keywords: Information Security Architecture, Information System Administrator, Information Security, Network Security Engineer, Data Security Analyst, Information Security Manager, Information System and Network System. Malaysian Communication and Multimedia commission 1. Introduction The use of ICT nowadays has become the main business in the worldwide. In today's world everything were done by using internet it is including the communication process, information searching and sharing, entertainment and also daily business such as buying and selling process, bill payment and money transferring. It is much easier to use internet and save a person time in this busy world. Even though there are many benefits from using the internet, there are also related risks emerged from the rapid developments of ICT that evolved in almost all of the life aspects that later on will become a threat. There are also many cyber-related crimes happened due to the misuse of ICT. Cyber security has become the important thing to the government, local 71 P a g e

6 authorities, public sector and especially in business and financial sector. This is due to the holding of important data and information dealing with their business related field. Data breach, fraud and cyber attack might happened and become cyber threat when users do the online transaction. In order to secure all of these essential data from falling to the wrong hands, there are important person who will in-charge to secure the data which can be called as information security superheroes. 2. Information security superheroes Each of these information security superheroes should have three main criteria which are intelligence, visibility and control. In order for these information security superheroes to handle the network security, it is essential for them to be intelligence so that they can have capability to protect the system from any cyber threats that might occur in the information technology world. This is because the vulnerabilities of the system network require the person in charge of network security to be extraordinary protectors as they are dealing with the information in the organization. Next is the visibility in detecting the malicious intrusion in the system. Information network security should have high awareness in all network activities happened. Visibility can be said as the first thing in securing the information. This is because the individual need to take an immediate action if there are any cyber threats happened to the system. So, to become information network superheroes they should have a very good control. They need to take immediate action and have the ability to give a good solution if there are any problems occur to the system. They should prevent the system from being attack by viruses, malware, hackers and other kind of threat in order to keep the information safe. It is necessary for the good information security superheroes to have all the three intelligence, visibility and control. 72 I P a g e

7 SUPERHEROES IN INFORMATION PROFESSIONAL Roles and responsibility of information security architect Information security architects is the person that in charge to plan and carry out security measures in order to protect the company or organization's computer network and system. Their responsibilities are high due to the increasing number of cyber attacks that may occur to the network and system. They are responsible to develop security measure of data protection from data loss or being modified illegally. The job responsibility of information security architect including system analyzed, development and implementation of security procedure and all of the policies related, access control, malware intrusion detection, virus protection, audit and security engineering. In addition, they are also responsible in monitoring the industry security updates and technologies update in order to improve the security management of the particular organization. It is the job of information security architect to design the security models for the system and network protection. The job demand of information security in the market is high. This is because the use of ICT in the daily business as main and the possibility of cyber threats is high. 4. Roles and responsibility of network security administrator Network security administrator which is known as computer security specialist or network security analyst handles all the aspect that relates to information security in the particular organization. They are responsible to design, implement and maintain all the security infrastructure of the network usage in the particular organization. Network security administrator also responsible to teach and give guidelines to their junior or the other technical staff about the computer security and checking if there is any violation towards information security they should install the software to protect the systems. So, they should take immediate actions if there are any cyber attacks happened towards the systems. If there are any problem regarding the system, network security administrator need to find the solution to it. The most important for the network security administrator 73 I P a g e

8 is they need to keep up-to-date with the current technologies that are rapidly improved day by day. 5. Role and responsibilities of network security engineer The new the technologies such as network system are become more challenges in this era. The organizations should have hired this career to secure the network system in the organization or institution. Book of the Network security Auditing stated that security engineer are person who control the selected of the security architecture (Jackson, 2010). In generally network security engineer are responsible in aspect of the networking system that are need to plan, implement audit, optimize and troubleshoot network security of the product. Means that, this career also were contributes to design, integration and installation of hardware and software. The network security engineer is responsible on analyzing and troubleshoot related on information system. The examples of the responsibility of the network security engineer to install, support and manage the system network of the organization.in addition, they will evaluate the problem or the weakness in term host, server and network where it stated in magazine Network World in 1998.Furthermore, they need a skill which is soft skill and hard skill. The example of soft skill is communication with the client or staff in the organization and hard skills are need to knowledge in network system, programming and PC maintenance. The organizations are involve with the network system should have a network security engineer that will control, manage or handle of the system and also secure the information in from exposed to unauthorized person. 74 P a g e

9 SUPERHEROES IN INFORMATION PROFESSIONAL 10^3 6. Role and responsibilities of data security analyst Data security analyst is another specialist in information security who was responsible in maintaining the security and integrity of data. Another responsibility of data security are in creating and maintaining a system of the organization and ensure the information and computer network are not expose to other unwanted person or modified in accidently. Means that, data analyst are needed to ensure the network have sufficient security to avoid unauthorized access the information. In addition the data analyst are should have a knowledge regarding the aspect of information security in the organization or company. The main career of the data security analyst is to measure the effectiveness of the security of the company. This person are need to know how and measure effectiveness of the security system for the company either suitable or not, this is to avoid unnecessary thing which might happen. Besides that, data securities analysts are needed to ensure the security system are current and up to date the software or hardware that related to the company. All regarding in security information in the company either physical and internet security should be plan and documented by the data security analyst. Thus, data security analysts usually work in business administration as information technology professional in communication security system. 7. Role and responsibilities of information security manager In the organization, Information security manager are responsible in information security management by providing the line management of the organization, strategic direction for the function of the system and liaising with other manager in the organization. For example the information security manager will liaison with Human Resource, Information technology and all department in the organization regarding to system. One of the responsibilities of the Information Security Manager are protecting the organization network, computer's and avoid the data threats such as the,computer 75 I P a g e

10 virus or attack from cyber criminals or crime.information security manager will responsible to all regarding system in the organization, if anything happens, they will solve it. Other responsibilities of this career are to promote security to organization; implement the security initiative provides the daily security administration of the organization such as access control. (Tipton, 2006).These person have perform routine security activities of the system in the organization and to control the technologies that will be use in the organization. 8. Malaysian Communication and Multimedia Commission (MCMC) In Malaysia, there is an agency that was related to communication and media also related to the information security and also the network security.malaysian Communication and Multimedia Commission (MCMC) are the regulatory body for communication and multimedia in Malaysia that are responsible for information security in the Malaysia. The Malaysian Communication and Multimedia Commission was established under the Communication and Multimedia Commission Act (1998) and the Communication and Multimedia Act (1998). The primary role of MCMC is to implement and promote the Government national policy objective for the communication and multimedia sector. The MCMC also in charge in overseeing the new regulatory framework for the converging industries, telecommunication, broadcasting and online activities. The information security in Malaysia is part of the Malaysian Communication and Multimedia because one of the policies is "to ensure the security and network reliability and integrity". Therefore the MCMC is responsible related to information security and also the network in Malaysia. 76 P a g e

11 9. Conclusion In conclusion, information security is very important in organization because the information is needed to be secure and protected by the people that have a qualification in the field of information system and network system. The organization will face the challenges where the increasing of duplication of the digital data, increasing of unauthorized access or cybercriminal, and increasing of distributed data sources by organization.in addition, the organization will have a problem if they provide and store the data in the internetwork computer based system. In order to solve and avoid these kind of challenges, the organization need to employ qualified person regarding to information system and network in the organization These qualified person will develop, manage, implement and maintaining the security system in the organization. Therefore, the information security superhero, or called as the person responsible in information security should have in organization especially for the organization that use the computer based system and network system in their business transaction. 77 P a g e

12 REFERENCES Hearst Newspaper (2015) "The Job Description for an Information Security Manager". Retrieved from Info Sec Attitude (n.d) "Security analyst". Retrieve from jobs/security-analyst, html. Malaysian Communications and Multimedia Commission (2015)."History and responsibility of Malaysian Communications and Multimedia Commission".Retrieve from Philips,Jeff (1998) " Network security engineer", Network World: the Newsweekly of enterprise network computing. Vol. 15, No. 10 pp.56 Tipton,Harold.F (2006) "Information Security Management Team ", Information Security Handbook pp 9. Weldon, D. (2014). IT's hottest jobs: Information security architect. Newton: Questex Media Group LCC. Retrieved from Iibrary.uitm.edu.my/docview/ ? accountid= P a g e

13 LIST OF TINTA'S CONTRIBUTORS TINTA (Lecturers) SHAHAROM TM SULAIMAN AHMAD AZMAN BIN MOHAMAD RAMLI HAZIAH BINTI SA'ARI (Students) AKMAL SHAHMEEN BIN AHAMAD SABARUDIN NOOR IZZATI BINTI MOHD RADZI SITI NUR ATHIRAH BT SAIFFUDDIN ZUHRI NURUL AMIRAH BINTI MD SUHAIMI NURULAIDABT. JAMIL NUR SAHIDA BT KALIS SITI AISHAH BINTI YAHPAR FATIN ELEENA BINTI SHA'MAR NOR ADAVIAH BT MOHD SABRI NADIA FAZIRA BINTI NOR AMIR FATIN SYAHIRAH BT PAWZI HAFAWATI HUSNA BT. MOHAMED KHAIRUDIN NUR ATIQA BT SALEH OTHER CONTRIBUTORS ASLAM BIN KAMARUDIN NUR SARAH SYAFIQAH BINTI ISMAIL NOR ASHIKIN BINTI NGADIRON NAQIUDDIN BIN ABD HARIS NURUL NADIA BINTI KARIM WAN NURUL SYAHIDA BINTI WAN KAMARUDDIN MUKRI NURUL AISHAH BINTI SAMIN NOOR FARAHAIN BINTI ABDUL RAZAK NUR ALIAH BINTI ZAINAL syida P a g e

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE Devi Annamalai Security, Trust and Governance MCMC 28th August 2007 Hanoi. Vietnam BACKGROUND MCMC is a statutory body established under the Malaysian Communications

More information

Information Security Challenges: A Malaysian Context

Information Security Challenges: A Malaysian Context Information Security Challenges: A Malaysian Context Adnan Rizal Haris@Harib, Suhaimi Sarijan and Norhayati Hussin Faculty of Information Management Universiti Teknologi MARA, Puncak Perdana Campus 40150

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

Qualification Specification. Level 2 Award in Cyber Security Awareness For Business

Qualification Specification. Level 2 Award in Cyber Security Awareness For Business Qualification Specification Level 2 Award in Cyber Security Awareness For Business ProQual 2016 Contents Page Introduction 3 Qualification profile 3 Centre requirements 4 Support for candidates 4 Assessment

More information

NERC Staff Organization Chart

NERC Staff Organization Chart NERC Staff Organization Chart President and CEO Administrative Associate Director to the Office of the CEO Associate Director, Member Relations and MRC Secretary Senior Vice President and Chief Reliability

More information

The University of Queensland

The University of Queensland UQ Cyber Security Strategy 2017-2020 NAME: UQ Cyber Security Strategy DATE: 21/07/2017 RELEASE:0.2 Final AUTHOR: OWNER: CLIENT: Marc Blum Chief Information Officer Strategic Information Technology Council

More information

Written by Webmaster2 Wednesday, 16 February :02 - Last Updated Wednesday, 03 August :40

Written by Webmaster2 Wednesday, 16 February :02 - Last Updated Wednesday, 03 August :40 (L.O) are assigned to promote good rapport between the library and faculties. They undertake responsibilities such as library skills training;engaged in collection assessments and make recommendations

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Version 1 Version: 1 Dated: 21 May 2018 Document Owner: Head of IT Security and Compliance Document History and Reviews Version Date Revision Author Summary of Changes

More information

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation

More information

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established PERSON SPECIFICATION Area: Crime and Intelligence Directorate Job Title: Cyber PROTECT Officer Weekly Hours: Section: CAID Scale: Grade 6 Version: 1.2 Post No: GI080 Status: Established Version Date: 37

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today Security Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today Staff Augmentation, Executive Staffing, Flex Staffing Achieving our main goal

More information

NEWS RELEASE FOR IMMEDIATE RELEASE. A Community Effort to Keep Our Women and Children #CyberSafe

NEWS RELEASE FOR IMMEDIATE RELEASE. A Community Effort to Keep Our Women and Children #CyberSafe NEWS RELEASE FOR IMMEDIATE RELEASE A Community Effort to Keep Our Women and Children #CyberSafe CyberSafe Seminar organized by NCWO & CyberSecurity Malaysia in an effort to raise awareness on the pressing

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Apex Information Security Policy

Apex Information Security Policy Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose

More information

THE GROWTH OF SMARTPHONE USAGE AMONG STUDENT

THE GROWTH OF SMARTPHONE USAGE AMONG STUDENT THE GROWTH OF SMARTPHONE USAGE AMONG STUDENT Nurul Farhana Ab. Rahman and Mohd Sazili Shahibi Faculty of Information Management, Universiti Teknologi MARA (UiTM) Puncak Perdana Campus, UiTM Selangor, Malaysia

More information

MANAGING SECURITY THREATS IN THE NEW CONNECTED WORLD THROUGH FORENSIC READINESS

MANAGING SECURITY THREATS IN THE NEW CONNECTED WORLD THROUGH FORENSIC READINESS MANAGING SECURITY THREATS IN THE NEW CONNECTED WORLD THROUGH FORENSIC READINESS Mohamad Firham Efendy Bin Md Senan Specialist, Digital Forensics Department CyberSecurity Malaysia firham@cybersecurity.my

More information

NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL

NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL SKILLS SHORTAGE BRIEFING PAPER CONNECT PROMOTE ADVANCE @NZTechIA PREPARED BY THE NEW ZEALAND TECHNOLOGY INDUSTRY ASSOCIATION Published: November 2016

More information

CONTEMPORARY CYBER ATTACK TRENDS AND CHALLENGES DR SHASHWAT RAIZADA

CONTEMPORARY CYBER ATTACK TRENDS AND CHALLENGES DR SHASHWAT RAIZADA CONTEMPORARY CYBER ATTACK TRENDS AND CHALLENGES DR SHASHWAT RAIZADA RECENT TRENDS IN CYBER ATTACKS Cyber Security Threats From Requests to Ransom Notes Source: www.ripandscam.com Source https://en.wikipedia.org/wiki/wannacry_ransomware_attack

More information

Express Monitoring 2019

Express Monitoring 2019 Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Caribbean Cyber Security: Not Only Government s Responsibility

Caribbean Cyber Security: Not Only Government s Responsibility Caribbean Cyber Security: Not Only Government s Responsibility AWARENESS AND VIGILANCE IS EVERYBODY S RESPONSIBILITY Preseted at: ICT Symposium Antigua and Barbuda March 2017 Caribbean Cyber Security Events

More information

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Internet Applications among Malaysian Youth: Access, Adoption and Value

Internet Applications among Malaysian Youth: Access, Adoption and Value Internet Applications among Malaysian Youth: Access, Adoption and Value Assoc. Prof. Datin Dr. Norizan Abdul Razak norjef @pkrisc.cc.ukm.my E-Community Research Center Faculty of Social Sciences and Humanities

More information

NERC Staff Organization Chart 2015 Budget

NERC Staff Organization Chart 2015 Budget NERC Staff Organization Chart President and CEO (Dept. 2100) Executive Assistant (Dept. 2100) Associate Director, Member Relations and MRC Secretary (Dept. 2100) Senior Vice President and Chief Reliability

More information

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK Building resilience: 10 Steps to Cyber Security 1. Information Risk Management Regime 2. Secure

More information

Gujarat Forensic Sciences University

Gujarat Forensic Sciences University Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat

More information

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE Information Technology Services Administrative Regulation ITS-AR-1506 INFORMATION SECURITY-SECURITY INCIDENT RESPONSE 1.0 Purpose and Scope The purpose of the Security Response Administrative Regulation

More information

MALAYSIA S APPROACH IN CAPACITY BUILDING. Dr Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia 24 March 2017

MALAYSIA S APPROACH IN CAPACITY BUILDING. Dr Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia 24 March 2017 MALAYSIA S APPROACH IN CAPACITY BUILDING Dr Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia 24 March 2017 Copyright 2017 CyberSecurity Malaysia ASEAN s JOURNEY TOWARDS DIGITAL TRANSFORMATION

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

AN ANALYSIS OF CYBER CRIME AND INTERNET SECURITY

AN ANALYSIS OF CYBER CRIME AND INTERNET SECURITY WORLD JOURNAL OF PHARMACY AND PHARMACEUTICAL SCIENCES Shoba. SJIF Impact Factor 6.647 Volume 6, Issue 5, 304-308 Review Article ISSN 2278 4357 AN ANALYSIS OF CYBER CRIME AND INTERNET SECURITY *Prof. V.

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

Position Description For ICT Systems Officer Information, Technology and Communication Department Hobart

Position Description For ICT Systems Officer Information, Technology and Communication Department Hobart Position Description For ICT Systems Officer Information, Technology and Communication Department Hobart Programme: ICT Services Location: Hobart based with travel throughout Tasmania Reports To: ICT Manager

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

CCNA Cybersecurity Operations. Program Overview

CCNA Cybersecurity Operations. Program Overview Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are:

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are: Qualification Title: OCR Level 3 Cambridge Technical Diploma in IT Qualification Number: 601/7101/7 Overview This qualification is designed for you if you re 16 years old or over and prefer to study IT

More information

PERSONAL PARTICULARS

PERSONAL PARTICULARS PERSONAL PARTICULARS Name : Nur Hasanah Binti Zamari Date of Birth : 19 th October 1990 IC Number : 901019-08-5306 Gender : Female Marital Status : Single Age : 28 years old Place of birth : Perak Darul

More information

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced

More information

MIS5206-Section Protecting Information Assets-Exam 1

MIS5206-Section Protecting Information Assets-Exam 1 Your Name Date 1. Which of the following contains general approaches that also provide the necessary flexibility in the event of unforeseen circumstances? a. Policies b. Standards c. Procedures d. Guidelines

More information

POSITION DESCRIPTION

POSITION DESCRIPTION Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose

More information

What is ISO ISMS? Business Beam

What is ISO ISMS? Business Beam 1 Business Beam Contents 2 Your Information is your Asset! The need for Information Security? About ISO 27001 ISMS Benefits of ISO 27001 ISMS 3 Your information is your asset! Information is an Asset 4

More information

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved. FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who

More information

CA Security Management

CA Security Management CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate

More information

The Information Technology Program (ITS) Contents What is Information Technology?... 2

The Information Technology Program (ITS) Contents What is Information Technology?... 2 The Information Technology Program (ITS) Contents What is Information Technology?... 2 Program Objectives... 2 ITS Program Major... 3 Web Design & Development Sequence... 3 The Senior Sequence... 3 ITS

More information

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019 NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate

More information

Control System Security for Social Infrastructure

Control System Security for Social Infrastructure 277 Hitachi Review Vol. 63 (201), No. 5 Featured Articles Control System Security for Social Infrastructure Toshihiko Nakano, Ph.D. Katsuhito Shimizu Tsutomu Yamada Tadashi Kaji, Dr. Info. OVERVIEW: The

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41

More information

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to

More information

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0 P.O. Box 212 Philip D. Murphy, Governor 300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ 08625-0212 www.tech.nj.gov STATE OF NEW JERSEY TECHNOLOGY CIRCULAR Enterprise Information

More information

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support Workshop IT Star 2016 IT Security Professional Positioning and Monitoring: e-cfplus support Roberto Bellini AICA-Milan October, 28 th 2016 agenda 1. e-cf standard and the enriched e-cfplus System 2. IT

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

IOS SAFETY APPLICATION FOR UITM

IOS SAFETY APPLICATION FOR UITM Journal of Engineering Science and Technology Special Issue on ICE & ICIE 2015, April (2016) 97-105 School of Engineering, Taylor s University IOS SAFETY APPLICATION FOR UITM MOHAMAD FAHMI HUSSIN*, W AHMAD

More information

CYBER SECURITY TRAINING

CYBER SECURITY TRAINING CYBER Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat.

More information

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd Incident Response Tony Drewitt Head of Consultancy IT Governance Ltd www.itgovernance.co.uk IT Governance Ltd: GRC One-Stop-Shop Thought Leaders Specialist publisher Implementation toolkits ATO Consultants

More information

CITADEL INFORMATION GROUP, INC.

CITADEL INFORMATION GROUP, INC. CITADEL INFORMATION GROUP, INC. The Role of the Information Security Assessment in a SAS 99 Audit Stan Stahl, Ph.D. President Citadel Information Group, Inc. The auditor has a responsibility to plan and

More information

V{ xy Éy à{x Vtu Çxà Éy ` Ç áàxüá

V{ xy Éy à{x Vtu Çxà Éy ` Ç áàxüá BUENOS AIRES, July 28, 2011 In the view of the Record CUDAP: EXP-JGM: 0005475/2011 of the Registry of the Presidency of the Cabinet of Ministers ( Decree nr. 438/92) and the Resolution ex SFP Nr. 81/ 14

More information

Security-as-a-Service: The Future of Security Management

Security-as-a-Service: The Future of Security Management Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

10 Cybersecurity Questions for Bank CEOs and the Board of Directors 4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors

More information

Effective Partnerships: Security and Privacy in Smart Cities

Effective Partnerships: Security and Privacy in Smart Cities SESSION ID: SEC-R03 Effective Partnerships: Security and Privacy in Smart Cities Mr. Robert (Bob) Butler Chief Security Advisor IO Data Centers LLC Dr. Irv Lachow Principal Cyber Researcher The MITRE Corporation

More information

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response STAY ONE STEP AHEAD OF THE CRIMINAL MIND F-Secure Rapid Detection & Response INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone

More information

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements UK Permanent Salary Index ember 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation

More information

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Introduction The 6,331 credit unions in the United States face a unique challenge when it comes to cybersecurity.

More information

NERC Staff Organization Chart Budget

NERC Staff Organization Chart Budget NERC Staff Organization Chart 2013 2014 President and CEO (Dept. 2100) Executive Assistant (Dept. 2100) Senior Vice President and Chief Operating Officer (Dept. 2100) Senior Vice President General Counsel

More information

Position Title: IT Security Specialist

Position Title: IT Security Specialist Position Title: IT Security Specialist SASRIA SOC LIMITED Sasria, a state-owned company, is the only short-term insurer in South Africa that provides affordable voluntary cover against special risks such

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT) DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE

More information

Mobile Application Buying Ticket For LRT

Mobile Application Buying Ticket For LRT 1 UTM Computing Proceedings Innovation in Computing Technology and Applications Volume: 2 Year: 2017 ISBN: 978-967-0194-95-0 Mobile Application Buying Ticket For LRT 1 2 Nurul Amirah Atikah Binti Muhammad

More information

Syllabus: AIT Information Systems Infrastructure Lifecycle Management

Syllabus: AIT Information Systems Infrastructure Lifecycle Management Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management Term: Fall 2014 Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School of Engineering

More information

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018 STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request

More information

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference Benefits to the Stakeholders A Collaborative and Win-Win Strategy Lal Dias Chief Executive Officer Sri Lanka CERT CC Cyber attacks

More information

22 BEVIS MARKS, LONDON, EC3A 7JB

22 BEVIS MARKS, LONDON, EC3A 7JB The Benefits of Outsourcing Network Security. Why more organisations are choosing to outsourcing their network security to maintain data safety and integrity. 2016 revision. Contents Introduction... 3

More information

National Cybersecurity preparation to deal with Cyber Attacks

National Cybersecurity preparation to deal with Cyber Attacks National Cybersecurity preparation to deal with Cyber Attacks Dr. Chaichana Mitrpant Assistant Executive Director, Electronic Transactions Development Agency (ETDA) 1 Over all Internet usage in Thailand

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

OA Cyber Security Plan FY 2018 (Abridged)

OA Cyber Security Plan FY 2018 (Abridged) OA Cyber Security Plan FY 2018 (Abridged) 1 Table of Contents Vision... 3 Goals, Strategies, and Tactics... 5 Goal #1: Create a Culture that Fosters the Adoption of Cyber Security Best Practices... 5 1.1

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

JOB DESCRIPTION. ICT Network Manager. Varndean JOB TITLE: SECTION: PURPOSE OF JOB

JOB DESCRIPTION. ICT Network Manager. Varndean JOB TITLE: SECTION: PURPOSE OF JOB JOB DESCRIPTION JOB TITLE: SECTION: ICT Network Manager Varndean PURPOSE OF JOB To take overall responsibility for the management and development of the network infrastructure within a secondary school,

More information

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90 th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither

More information

Protecting information across government

Protecting information across government Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Hitachi Review Vol. 65 (2016), No. 8 337 Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure Toshihiko Nakano, Ph.D. Takeshi Onodera Tadashi Kamiwaki

More information

E-guide Getting your CISSP Certification

E-guide Getting your CISSP Certification Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International

More information

Information Technology

Information Technology Information Technology 2017-2018 Well connected. Right here 2 Contents weltec.ac.nz/it Introductory NZ Certificate in Information Technology Essentials 6 NZ Diploma in Information Technology (Technical

More information

Management Frameworks

Management Frameworks Chapter I Internal Fujitsu Group Information Security Independent of the chief information officer (CIO), the Fujitsu Group has appointed a chief information security officer (CISO) under the authority

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats SELLING YOUR ORGANIZATION ON APPLICATION SECURITY Navigating a new era of cyberthreats Selling Your Organization on Application Security 01 It's no secret that cyberattacks place organizations large and

More information

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model Abhijit Vitthal Sathe Modern Institute of Business Management, Shivajinagar, Pune 411 005 abhijit_sathe@hotmail.com

More information

Conceptualizing User Satisfaction toward a Library Quality at Malaysia Nuclear Agency Library

Conceptualizing User Satisfaction toward a Library Quality at Malaysia Nuclear Agency Library Conceptualizing User Satisfaction toward a Library Quality at Malaysia Nuclear Agency Library Nurul Nadia Badrol Amin Faculty of Information Management, University Teknologi MARA (UiTM) Selangor MALAYSIA

More information

Cybersecurity, safety and resilience - Airline perspective

Cybersecurity, safety and resilience - Airline perspective Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

A CFO s Guide to Cyber Security in the Coming Year

A CFO s Guide to Cyber Security in the Coming Year CYBER SECURITY A CFO s Guide to Cyber Security in the Coming Year LEVERAGE TECHNOLOGY AND YOUR FINANCIAL INSTITUTION TO BUILD BETTER DEFENSES www.cfo.com www.huntington.com A CFO s Guide to Cyber Security

More information