Talking Up Security At Iswec 2012 (Part 1)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Malaysia keen to be security focal point

The central theme of ISWec 2011 or the InfoSeeurity World Exhibition and Congress was the enhancement of information security against the rapid rise of cyber threats. With more than 200 booths exhibiting at the event, Malaysia has signalled its keen intent to place itself as the focal point in the region for experts and key players from the local and international industry to exchange views and ideas.

Description: Iswec 2012

Iswec 2012

At the launch, YABhg. Datin Paduka Seri Rosmah Mansor notes that Malaysia was becoming a regional hub of choice for information technology in Asia due to its strategic location, excellent infrastructure, skilled and dynamic workforce and supportive government.

"Information assets are critical to every organisation. The security and safeguarding of these assets are paramount to survive and thrive in this highly digital global economy.

The congregation of key industry players in Malaysia at the ISWec 2012 is a reflection of Malaysia's growing role as an information security hub in the Asian region," YABhg. Datin

Paduka Seri Rosmah Mansor says.

Description: YABhg Datin Paduka Seri Rosmah Mansor, wife of the Prime Minister of Malaysia

YABhg Datin Paduka Seri Rosmah Mansor, wife of the Prime Minister of Malaysia

With a reported attendance of over 5,000 local and international Channel players, buyers and trade visitors, this was a good start for a key industry event looking to be a major player in the region. The two-day tradeshow featured 160 leading brands from global industry players. Themed 'Forging New Businesses and Strategic Alliances’, ISWec 2012 serves as a platform to showcase the latest products and technologies in information security while providing delegates with updates on the latest trends and solutions to internal and external information security threats with the focus on effective management of people, processes and technologies.

Description: She says that our younger generation need to be educated about securing their personal information.

She says that our younger generation need to be educated about securing their personal information.

There were also conference sessions featuring keynote speakers allowing a platform to exchange ideas and interact with leading players in the infosecurity arena while having panel-discussions and exciting networking sessions.

Dr. Amirudin Abdul Wahab, Ministry of Science, Technology and Innovation presented the keynote address of ISWec 2012. In his keynote speech, he mentioned that the ICT industry has been entrusted with three objectives. The first objective is to spearhead the development of the ICT industry and indigenous technologies. The second objective is to strengthen the national IT ecosystem through the formulation of policies and effective time management. Lastly, is to support efforts towards making Malaysia a global ICT hub.

He stated that Cyber Security Malaysia has developed the National Cyber Security Policy with the purpose of ensuring that the nation critical national infrastructure is resilient. The Internet has altered the way business is done and we are being exposed of external threats like hacking, identity theft, fraud and spamming. This calls for effective measurement and protection to ensure business stability and it is more important now to detect threats and prevent them in order to protect personal and business information.

Phillip Victor, Director of the Centre for Policy and International Cooperation was next and he talked about ITU-IMPACT's role in bringing together all stakeholders in the fight against cyber threats. ITU is the International Telecommunication Union, whereas IMPACT is a cybersecurity organisation called International Multilateral Partnership Against Cyber Threats.

Description: Phillip Victor, Director of the Centre for Policy and International Cooperation

Phillip Victor, Director of the Centre for Policy and International Cooperation

Victor started off by showing that huge organisations and developed countries are also being hit by cybercrime. No one is being spared from this wave of cyberthreats and it is an ongoing effort to ensure that organisations are continuously updated and people are informed of the kind of threats that are being faced daily. One of the reasons why this is happening was pointed out by IMPACT: many countries do not have national CERTs or computer emergency response teams. That translates to these countries not having even a first line of defence.

Victor says that IMPACT has been helping these countries by introducing legal framework in place. But, cyber attacks are borderless and it is difficult for the laws of one government to prosecute these criminals when they are across borders. He says, “The main problem in this area is that laws are not harmonised; the cyber laws in one country may not be applied in another. There needs to be a very strong coordination among these countries and cvcr/one needs to understand that everybody plays an important role in this entire ecosystem."

He cited the Estonia DDoS (distributed denial of service) attack in 2007 as an example as it took the country two to three weeks to restore communications with the rest of the world. When Estonia detected the attacks, it was from countries which Estonia did not have any political ties with them. This is where, on a global level, cybersecurity needs platforms that can help them resolve these kinds of issue. Victor concludes that people need to look at security as a whole and it doesn't involve only one level but many levels.

Next, David Sykes, Director of Crossbeam Systems South East Asia and Pacific stepped up to discuss about security in cloud computing. He separated the cloud computing into three categories, namely public, private and hybrid.

According to Sykes, cloud computing is having your applications being installed in some place by someone so that it can be accessed from almost anywhere and at any time. Sykes says, from a security point of view, the problem with this is almost everything; when people start to move ahead with these things, overtime, history repeats itself. Security is always second in place.

Description: ISWec 2011

Security has always been in second place and the conference sessions aim to highlight the importance of it

He explains, “What tends to happen is that people tend to get carried away with an opportunity and go ahead to implement it Then businesses will realise that they are dependent on this stuff and wonder if there is enough security for this? Then they need to spend more money on it and the people who develop these applications will say it's not their problem. In quick summary, people need to step back a little bit and start thinking about putting security in right from the start"

Top 10
Free Mobile And Desktop Apps For Accessing Restricted Websites
TOYOTA CAMRY 2; 2.5 : Camry now more comely
KIA SORENTO 2.2CRDi : Fuel-sipping slugger
How To Setup, Password Protect & Encrypt Wireless Internet Connection
Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
Backup & Restore Game Progress From Any Game With SaveGameProgress
Generate A Facebook Timeline Cover Using A Free App
New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
- Messages forwarded by Outlook rule go nowhere
- Create and Deploy Windows 7 Image
- How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
- Creating and using an unencrypted cookie in ASP.NET
- Directories
- Poor Performance on Sharepoint 2010 Server
- SBS 2008 ~ The e-mail alias already exists...
- Public to Private IP - DNS Changes
- Send Email from Winform application
- How to create a .mdb file from ms sql server database.......
programming4us programming4us