SCAN. Associates Berhad.

Size: px
Start display at page:

Download "SCAN. Associates Berhad."

Transcription

1 Associates Berhad.

2 Talking points 1. Genesis 2. Products & services 3. Support 4. Strengthsth 5. Lessons 2

3 Genesis 1. Originated from University s R&D group on Infosec Government funded d 3. Very niche network security & applications of cryptography 3

4 .../Chronology 4. Only half the students passed 5. Found out they were very active hackers members of world underground 6. Worked mostly at night 4

5 /Chronology was booming IT time 8. Many organizations had very poor security 9. Many servers were defaced 5

6 /Chronology 10. Did everything FOC, useful learning process 11. The favorite reference on restoring servers and guarding networks time to get dispersed d OR stick together 6

7 /Chronology 13. Handicapped on corporate issues 14.Seemed very popular in public sector rhad. N Associates Ber 7

8 /Chronology 13. Incorporated in International Listed 2006 market capitalization ~200Million (Ringgit) 8

9 Products and services 1. Craft client needs, heavy customization 2. Initially i very much a Security boutique 3. Diversified although remaining niche in the area 9

10 Certification Focus on Quality and Capabilities Development to remain a world class company MSC Status Company ISO/IEC Certified ISO 9001 Certified CMMI Level 3, Software Engineering Institute, Carnegie-Mellon USA Awarded various recognitions 1 Track Records and Credentials 5

11 Associates Berhad.

12 Support & partners 1. Government 2. Financial 3. International partners a) Individualsid b) organizations 4. Universities/Research institutes 12

13 Strength & branding 1. Vendor independent 2. Emphasizes indigenousness (initially) i i 3. Professional certifications & continuous learning. 4. Continuous R&D 13

14 /Strength g & branding 5. Take pride in our specialty 6. Emphasizes TRUST 7. Recognized internationally rhad. N Associates Ber 14

15 Professional Certification No Professional Certification No GIAC Certified Incident Handler (SANS) 2 Redhat Certified Engineer (Redhat) 6 GIAC Security Essentials Certification (SANS) 1 Certified Ethical Hacker CEH (EC Council) 10 SAN SEC508 SECURITY 508 : System 2 Open Source Wireless Professional OSWiP 1 Forensics, Investigation & Response (SANS) (ThinkSecure) BS7799 2:2002 Lead Auditor (BSI) 2 Sensecurity Institute Security Practioner SISP (Sensecurity Institute) 3 BS7799 2:2002 Lead Implementor (BSI) 4 Microsoft Certified System Engineer MCSE 1 ISMS Provisioned Auditor (IRCA) 2 Microsoft Certified Professional MCP 1 ISTQB Certified Tester 1 Microsoft Certified System Administrator MCSA 1 QMS Lead Auditor 3 Business Continuity Planner 3 CISSP (ISC2) 14 PRINCE 2 Certified Practitioner 1 CISA (ISACA) 2 ITIL Certified Practitioner 2 CISM (ISACA) 3 Project Management Professional (PMI) 2 Opensource Professional SecurtyTester 1 Payment Card Industry Qualified Security 2 (ISECOM) Assessor (PCI QSA)

16 Associates Berhad.

17 Associates Berhad.

18 Associates Berhad.

19 Major Track Records MALAYSIA Bank Negara Malaysia Developed epki solution for Bank Negara Malaysia and ALL the banks in Malaysia epki used to secure ALL Electronic Funds Transactions (RENTAS) and Cheque Clearing System Protecting billions of ringgit i per day! SCAN Security Operations Centre (SOC) EPF, Great Eastern, UiTM, CGC (Selected List) Currently, developing Internal SOC for Celcom Security Consultancy Most of the Government Agencies, Banks and major Telco s Most of the technical staff vetted under Tapisan Halus or Kasar for sensitive government projects 1 Track Records and Credentials 10

20 Major Track Records MALAYSIA PRISMA (Pemantauan Rangkaian ICT Sector Awam Malysia) Developed and operates Malaysia Government Security Operation Centre (SOC) named PRISMA with MAMPU since X 7 X 365 Operations 50 Dedicated staff operates the center until now 177 Agencies under PRISMA Monitoring 4.5 Billions Events processed since 2004 Developed the solution using Open Source and COTS product. 7 1 Track Records and Credentials

21 Major Track Records INDONESIA Operates 3 SOCs in Indonesia Major Banks (CIMB Niaga, Danamon) Internal SOC Indosat Mandiri Bank ID SIRTII (Indonesia Security Incident Response Team on Internet Infrastructure) Developed Internet Security Monitoring Centre and Forensic Labs Major Government Agencies POLRI, BNPB Major Telcos 1 Track Records and Credentials 11

22 Major Track Records Middle East Saudi Arabia SCAN MEA. JVCO (49%) Operates 1 SOC for major bank Communications and IT Commission (CITC) Developed National Computer Emergency Response Team for Saudi Arabia Forensic Labs Security Consultancy Saudi Arabia (Jeddah and Riyadh) UAE (Dubai and Abu Dhabi) Sudan, Syria Qatar (Al Jazeera)

23 Development of Standards and Guidelines Government of Malaysia Malaysian Public Sector Management of Information & Communications Technology Security Handbook (MyMIS) Malaysian Public Sector ICT Risk Assessment Methodology (MyRAM) ICT Security Handbook for Saudi Arabia International Standard Organisation (ISO) ISO/IEC JTC 1/SC27 WG1 Working members for ISO/IEC NP Information Technology Deployment and operation of Intrusion Detection System Working members for ISO/IEC NP Guidelines for Information and communication technology disaster recovery services

24 Speaker and trainer for various conference Speaker of Blackhat Security Conference Asia (Singapore) Speaker of RuxCon Security Conference 2004 (Australia) Speaker of XCon Security Conference 2004 (Beijing, China) Speaker of HITB Security Conference 2004 (Malaysia) Speaker of SyScAN 2004 (Singapore) Microsoft Security Conference 2005 (Malaysia) Bellua Cyber Security Asia 2005 E-Secure Conference 2005 (Malaysia) Committee for SyScan 06 CFP Committee for VNSec 07 CFP Trainer at Blackhat Europe and USA Trainer at Hack in the Box Malaysia

25 Awards and Recognition Distinguished Senior IT Security Professional Award for Asia- Pacific from ISC2 USA Frost and Sullivan: Managed Security Service Provider for 2006 and 2007 Cyber Security Malaysia: 2009 Information Security Service Provider of the Year Prof Dato Dr Norbik Innovative Entrepreneur of the Year from Malaysian Malay Chamber of Commerce Ernst & Young final nominees ICT Enterpreneur Track Records and Credentials 6

26 Clients Associates Berhad.

27 Current position 1. HQ in Malaysia, ~200 staff, ~65 certified professionals 2. Offices/partnerships in: a) ASEAN b) Middle east c) Korea 27

28 Lessons 1. Technopreneurs and start ups lack corporate knowledge 2. Innovation is critical ii in all business components. 3. Must learn fast and emulate. 4. Quality is critical 5. Continuous improvement is survival 28

29 THANK YOU 29 Associates Berhad.

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

Field of Study Area of Expertise Certification Vendor Course

Field of Study Area of Expertise Certification Vendor Course Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner

More information

ASCENDSYS SDN BHD. Company Profile

ASCENDSYS SDN BHD. Company Profile ASCENDSYS SDN BHD Company Profile Ascendsys Sdn Bhd Company Information Ascendsys Company Profile Ascendsys is information technology services organization that provides niche information technology solutions,

More information

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

Information Security Principles and Practices

Information Security Principles and Practices Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

Need to protect your information? Take action with BSI s ISO/IEC 27001.

Need to protect your information? Take action with BSI s ISO/IEC 27001. Need to protect your information? Take action with BSI s ISO/IEC 27001. Put sensitive customer and company information in the safe hands of ISO/IEC 27001. You simply can t be too careful when it comes

More information

MANAGEMENT DEVELOPMENT COURSES

MANAGEMENT DEVELOPMENT COURSES (FULL VIEW) MANAGEMENT DEVELOPMENT COURSES MANAGEMENT DEVELOPMENT COURSES LEADERSHIP DEVELOPMENT Developing Leadership Competencies 4 4 days 230,000 1-4 13-16 26-29 6-9 Critical Thinking: Tools for Problem

More information

ISO/IEC 20000: 2011 IT Service Management. Tying together all your IT processes Product Guide

ISO/IEC 20000: 2011 IT Service Management. Tying together all your IT processes Product Guide ISO/IEC 20000: 2011 IT Service Management Tying together all your IT processes Product Guide What is ISO/IEC 20000 IT Service Management? ISO/IEC 20000 is the first internationally recognized standard

More information

Information Security Certifications

Information Security Certifications HERVÉ SCHAUER CONSULTANTS Cabinet de Consultants en Sécurité Informatique depuis 1989 Spécialisé sur Unix, Windows, TCP/IP et Internet Information Security Certifications Persons / Organizations ENISA

More information

BMS Consulting Cyber Security and IT Technology Team

BMS Consulting Cyber Security and IT Technology Team BMS Consulting Cyber Security and IT Technology Team Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

Choosing Ascentor as your cyber security partner. Secure your information Strengthen your business

Choosing Ascentor as your cyber security partner. Secure your information Strengthen your business Secure your information Strengthen your business Choosing Ascentor as your cyber security partner www.ascentor.co.uk Ascentor Ltd 5 Wheatstone Court, Davy Way Waterwells Business Park Quedgeley, Gloucester

More information

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.

More information

Val-EdTM. Valiant Technologies Education & Training Services. Workshop on Change Management. All Trademarks and Copyrights recognized.

Val-EdTM. Valiant Technologies Education & Training Services. Workshop on Change Management. All Trademarks and Copyrights recognized. Val-EdTM Valiant Technologies Education & Training Services Workshop on Change Management All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting

More information

Security Consulting. Services Overview

Security Consulting. Services Overview Services Overview Dimension Data is a global technology services company, assisting its customers in planning, building and supporting their IT infrastructures. Dimension Data combines its expertise in

More information

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank

More information

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..

More information

Corporate Presentation

Corporate Presentation Corporate Presentation XcellHost Cloud Services India Dubai Singapore Experience High Touch Support Reliable Secure Speed Scalable Manageable Value XcellHost About Us Founded in 1999. Global Reach Personal

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

State of South Carolina InfoSec and Privacy Career Path Model

State of South Carolina InfoSec and Privacy Career Path Model State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available

More information

Global Knowledge Cybersecurity Training

Global Knowledge Cybersecurity Training Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7 1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network

More information

METANET and Interoute Zurich Data Centre Corporate Security & Risk Group Version 1.0 ; 4 April

METANET and Interoute Zurich Data Centre Corporate Security & Risk Group Version 1.0 ; 4 April Data Centre Quality and Security Enterprise Security Management METANET and Interoute Zurich Data Centre Corporate Security & Risk Group Version 1.0 ; 4 April Corporate Security & Risk Group (CSRG) Interoute

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

Project Management Managing successful PCI DSS project

Project Management Managing successful PCI DSS project Project Management Managing successful PCI DSS project INTRODUCTION PCI-DSS is Payment Card Industry Data Security Standard, one of the fastest growing compliance currently affecting banks, payment service

More information

Global Knowledge Cybersecurity Training

Global Knowledge Cybersecurity Training Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,

More information

Technology Approved Certifications

Technology Approved Certifications Date Approved Designation Certificate Name Points Microsoft Systems Engineering 04/16/2002 MCSE Microsoft Certified Systems Engineer 280 06/14/2007 MCSE: WIN 2003 Microsoft Certified Systems Engineer:

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

Agenda. Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE

Agenda. Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE Agenda Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE INTRACOM Group Core Companies MARKET POSITION A leading regional telecommunications systems manufacturer and solutions

More information

Career Analysis into Cyber Security: New & Evolving Occupations

Career Analysis into Cyber Security: New & Evolving Occupations Alderbridge Specialists in Info Security Specialist Recruitment Knowledge for e-skills UK s Cyber Security Learning Pathways Programme Career Analysis into Cyber Security: New & Evolving Occupations e-skills

More information

ITIL Vs. LAYER - Search Engine Marketing System

ITIL Vs. LAYER - Search Engine Marketing System Nuove tendenze : Standard e relative Certificazioni ICT AIEA - Sessione di Studio Milano 07.06.2013 Today s AGENDA Green Mill Solutions Company Facts Overview Scope Main Areas for IT & Business Alignment

More information

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE 2016 Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE Instructional Design Boost elearning Interactive IT Training Boost elearning's Interactive IT Training provides

More information

Paul Vlissidis Group Technical Director NCC Group plc paulv@nccgroup.com

Paul Vlissidis Group Technical Director NCC Group plc paulv@nccgroup.com Managing IT Fraud Using Ethical Hacking Paul Vlissidis Group Technical Director NCC Group plc paulv@nccgroup.com Agenda Introductions Context for Ethical Hacking Effective use of ethical hacking in fraud

More information

SC7-ISO20000 Alignment issues Aligning ITIL to existing ISO JTC1- SC7 Software Engineering Standards

SC7-ISO20000 Alignment issues Aligning ITIL to existing ISO JTC1- SC7 Software Engineering Standards SC7-ISO20000 Alignment issues Aligning ITIL to existing ISO JTC1- SC7 Software Engineering Standards Dr. A.April ETS University Table of Contents Objectives Audience Current clash An ITIL overview ISO

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

InfoSec Academy Pen Testing & Hacking Track

InfoSec Academy Pen Testing & Hacking Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Presented by Frederick J. Santarsiere

Presented by Frederick J. Santarsiere http://cinoltd.com/ Presented by Frederick J. Santarsiere CHFI, CISSP, CISM, CISA, CEH, CEI, CAP, SSCP Sec+, Net+, A+, MCSA, MCSE, MCITP, MCT CCENT, CCNA, CCNA Wireless, CCNA Voice CISCO SMBEN, SMBAM,

More information

Digi Device Cloud: Security You Can Trust

Digi Device Cloud: Security You Can Trust Digi Device Cloud: Security You Can Trust Abstract Historically, security has oftentimes been an afterthought or a bolt-on to any engineering product. In today s markets, however, security is taking a

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Guideline to Determine Information Security Professionals Requirements for the CNII Agencies / Organisations

Guideline to Determine Information Security Professionals Requirements for the CNII Agencies / Organisations Date: 27/05/2013 Guideline to Determine Information Security Professionals Requirements for the CNII Agencies / Organisations 1 Contact Information For further clarification, please contact CyberSecurity

More information

Christopher Findlay University of Adelaide. Hussain G. Rammal University of South Australia

Christopher Findlay University of Adelaide. Hussain G. Rammal University of South Australia Australia-EU trade in Services: the case of Australian architecture firms Christopher Findlay University of Adelaide Hussain G. Rammal University of South Australia The study is funded as part of the research

More information

The International School Consultancy

The International School Consultancy The International School Consultancy Independent, unrivalled market intelligence on the world s international schools p2 The International School Consultancy ISC is the leading provider of data and market

More information

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal

More information

Need a system to deliver consistent, efficient and reliable IT services? Use an ISO/IEC 20000 compliant management system.

Need a system to deliver consistent, efficient and reliable IT services? Use an ISO/IEC 20000 compliant management system. Need a system to deliver consistent, efficient and reliable IT services? Use an ISO/IEC 20000 compliant management system. ISO/IEC 20000 your first choice for IT service management. BSI is the business

More information

The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam.

The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam. American Business & Technology University currently provides for transfer credit from Career Academy courses completed within the last three years by challenge exam. A student may not transfer more than

More information

Database Security and Auditing

Database Security and Auditing Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit

More information

ANNEX TABLES Table 1. Revenue by ICT Type Revenue * Share to Total Revenues Growth Rate ICT Type 2004 2005 2004 2005 (in percent)

ANNEX TABLES Table 1. Revenue by ICT Type Revenue * Share to Total Revenues Growth Rate ICT Type 2004 2005 2004 2005 (in percent) ANNEX TABLES Table 1. Revenue by Revenue * Share to Revenues 2004 2005 2004 2005 Contact Centers 32,904.1 54,295.1 44.4 49.4 65.0 Medical Transcription 236.7 466.2 0.3 0.4 97.0 Animation 694.2 939.1 0.9

More information

SecurityMetrics. history products expertise team awards

SecurityMetrics. history products expertise team awards SecurityMetrics history products expertise team awards Our company [history] Who we are and where we came from Proud moments in SecurityMetrics History 2000 - Founded by Brad Caldwell 2001 - First bank

More information

ATM Security Training Middle East Riyadh, Saudi Arabia 23 rd & 24 th February 2013

ATM Security Training Middle East Riyadh, Saudi Arabia 23 rd & 24 th February 2013 ATM Security Training Middle East Riyadh, Saudi Arabia There are now over 2 million ATM s in use globally according to the ATM Industry Association and a recent report by RBR estimates that there will

More information

ISO 27001:2005 & ISO 9001:2008

ISO 27001:2005 & ISO 9001:2008 ISO 27001:2005 & ISO 9001:2008 September 2011 1 Main Topics SFA ISO Certificates ISO 27000 Series used in the organization ISO 27001:2005 - Benefits for the organization ISO 9001:2008 - Benefits for the

More information

Don t let your SIeM become your Nightmare!

Don t let your SIeM become your Nightmare! Don t let your SIeM become your Nightmare! Herwig Köck, Thomas Bleier What is SIEM? Combining Security Components Intrusion Detection Endpoint Security Service Logs Asset Management Packets Protocols IP-Adresses

More information

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course Achieving Governance, Risk and Compliance Requirements with HISP Certification Course in corporation with A unique information security and regulatory compliance certification course that provides IT security

More information

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy

Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management

More information

Security Assessment and Compliance Services

Security Assessment and Compliance Services Security Assessment and Compliance Services Despite the best efforts of IT security teams, hackers and malicious code continue to find their way into corporate networks. Adding to the pressure is the fact

More information

HP Cyber Security Control Cyber Insight & Defence

HP Cyber Security Control Cyber Insight & Defence HP Cyber Security Control Cyber Insight & Defence Security awareness at board level Security leadership is under immense pressure Cyber threat Extended supply chain Financial loss Reputation damage Cost

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise

More information

Course Schedule. All in one place. Your guide to mapping your training-plan for the second half of 2015 with confidence...

Course Schedule. All in one place. Your guide to mapping your training-plan for the second half of 2015 with confidence... July - December 201 Course Schedule All in one place Your guide to mapping your training-plan for the second half of 201 with confidence... www.globalknowledge.com.sa www.globalknowledge.com.eg www.globalknowledge.ae

More information

Cut Costs vs. Smart Buy. Cloud Services For Real

Cut Costs vs. Smart Buy. Cloud Services For Real Cut Costs vs. Smart Buy Cloud Services For Real Catalin Paunescu June 26 th, 2013 AGENDA It s all about Do we need IT? How much? How? It s all about It s all about... BEFORE and AFTER It s all about CUTTING

More information

Security Testing. Claire L. Lohr, CSQE, CSDP, CTAL clohr@computer.org. F. Scot Anderson, CISSP scot@securixx.comcom. April 7, 2009 V 1.

Security Testing. Claire L. Lohr, CSQE, CSDP, CTAL clohr@computer.org. F. Scot Anderson, CISSP scot@securixx.comcom. April 7, 2009 V 1. Standards Based Security Testing Claire L. Lohr, CSQE, CSDP, CTAL clohr@computer.org F. Scot Anderson, CISSP scot@securixx.comcom 1 Topics Why use standards? Secure systems component parts (1st level taxonomy)

More information

Delivering solutions How Egypt s companies are helping to deliver IT solutions and support

Delivering solutions How Egypt s companies are helping to deliver IT solutions and support egypton.com Delivering solutions How Egypt s companies are helping to deliver IT solutions and support A key role in regional success Egyptian IT companies are playing a major part in delivering IT solutions

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING forebrook Forebrook offers a range of information security, governance, IT systems and infrastructure related

More information

How White Hat Hackers Operate. Andreas Falkenberg, Senior Security Consultant, SEC Consult Deutschland Unternehmensberatung GmbH

How White Hat Hackers Operate. Andreas Falkenberg, Senior Security Consultant, SEC Consult Deutschland Unternehmensberatung GmbH How White Hat Hackers Operate Andreas Falkenberg, Senior Security Consultant, SEC Consult Deutschl Unternehmensberatung GmbH About me Andreas Falkenberg, M.Sc. a.falkenberg@sec-consult.com Security Consultant

More information

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO

More information

Training Catalogue. Ace Service Training Catalogue Ver 7.0. Ace Services

Training Catalogue. Ace Service Training Catalogue Ver 7.0. Ace Services Catalogue 1 Ace Services TRAINING CATALOGUE Contents Introduction... 3 areas... 3 About the Trainer... 4 Integrated Risk Management... 5 Information Risk Management... 6 Business Continuity Management...

More information

foresightconsulting.com.au

foresightconsulting.com.au Mr. James Kavanagh National Security Officer Microsoft Australia Level 4, 6 National Circuit, Barton, ACT 2600 02 March 2015 Microsoft Office 365 IRAP Assessment Letter of Compliance Dear Mr. Kavanagh,

More information

IT Security Management 100 Success Secrets

IT Security Management 100 Success Secrets IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management

More information

Curriculum Vitae. Personal information. VASILEIADIS Nikolaos. Work experience. Surname / First name

Curriculum Vitae. Personal information. VASILEIADIS Nikolaos. Work experience. Surname / First name Curriculum Vitae Personal information Surname / First name Addresses VASILEIADIS Nikolaos Home: Koumoundourou 32, 15341,, Greece Work: Yakinthou 3C, 15343,, Greece Telephones Home: +30 210 6084531 Work:

More information

CURRICULUM VITAE. Kodzo Gadzekpo ADOMEY

CURRICULUM VITAE. Kodzo Gadzekpo ADOMEY CURRICULUM VITAE Kodzo Gadzekpo ADOMEY University of Ghana Computing Systems University of Ghana, Legon +233-203574626 +233-243574626 madomey@hotmail.com madomey@ug.edu.gh OBJECTIVE To secure the post

More information

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP Security Certifications Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP Wie ben ik? Jordy Kersten 26 jaar Communicatie Systemen HAN Arhnem Informatiekunde RU Nijmegen Security Consultant

More information

Flexible Cloud Services to Compete

Flexible Cloud Services to Compete white paper Service Providers Need Flexible Cloud Services to Compete Enterprise Customers Demand Flexible Cloud Solutions When the concept of cloud services first came about, there was a great deal of

More information

PAS 99 Integrated Management. Make your management systems work in harmony Product Guide

PAS 99 Integrated Management. Make your management systems work in harmony Product Guide PAS 99 Integrated Management. Make your management systems work in harmony Product Guide What is PAS 99? PAS 99 is a Publicly Available Specifi cation of common for management systems, which can be used

More information

2014 Training Programs

2014 Training Programs 2014 Training Programs Courses & Workshops Course Title Dates Venue Fees(BHD) 1- IT Security Workshop 16-18 March 5 Star Hotel 600 2- IT GRC Workshop 13-14 April 5 Star Hotel 400 3- COBIT 5 Foundation

More information

The Value of Information Security Certifications

The Value of Information Security Certifications The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials

More information

Tom VAN DEN EYNDE CISSP, CISA, CISM

Tom VAN DEN EYNDE CISSP, CISA, CISM Tom VAN DEN EYNDE CISSP, CISA, CISM Personal information First Name Tom Last Name Van den Eynde E-mail: tom@vandeneynde.net Phone: +32 - (0)495 91 20 62 Address: Meerminnenstraat 34, 2800 Birthday: May

More information

Security 2014 www.globalknowledge.com.sa www.globalknowledge.ae www.globalknowledge.com.eg

Security 2014 www.globalknowledge.com.sa www.globalknowledge.ae www.globalknowledge.com.eg Security 2014 www.globalknowledge.com.sa www.globalknowledge.ae www.globalknowledge.com.eg About Founded in 1995, is the largest privately held provider of training, enterprise learning services, and software

More information

ISO 9001:2015 QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR

ISO 9001:2015 QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR Knowledge RECOGNITION Skills retention Further excellence behaviour Ability COMPETENCE QUALIFICATION ISO 9001 Training services SGS ACADEMY www.sgs.com sgs academy transforming people and businesses As

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International

More information

INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA

INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA By THAIB MUSTAFA, CHAIRMAN TECHNICAL COMMITTEE FOR INFORMATION SECURITY (TC/G/5) INDUSTRY STANDARDS COMMITTEE FOR INFORMATION TECHNOLOGY, COMMUNICATION

More information

Designing a High Availability Messaging Solution using Microsoft Exchange Server 2007

Designing a High Availability Messaging Solution using Microsoft Exchange Server 2007 Microsoft Training Program Designing a High Availability Messaging Solution using Microsoft Exchange Server 2007 Timing Duration Location Language Course Price Per Person Flexible 16 hours IDEL LAB RAMALLAH

More information

Public Training Calendar

Public Training Calendar 06 PHILLIPS LEARNING ACADEMY Public Training Calendar Our Programme Categories at a Glance MANAGEMENT DEVELOPMENT Course Title LEADERSHIP DEVELOPMENT Developing Leadership Competencies Critical Thinking:

More information

How To Protect Your It Infrastructure

How To Protect Your It Infrastructure Proactive Real-Time Monitoring and Risk Management Managed Security Services NCS Group Offices Australia Bahrain Brunei China Dubai Hong Kong SAR Korea Malaysia Philippines Singapore Sri Lanka Understanding

More information

How To Get A Top Paying Certification

How To Get A Top Paying Certification A Global Knowledge Special Report 15 Top-Paying Certifications for 2015 1-800-COURSES www.globalknowledge.com 15 Top-Paying Certifications for 2015 John Hales, Global Knowledge VMware, SDN, and SoftLayer

More information

Information Security and Risk Management

Information Security and Risk Management Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management

More information

Get Qualified. Approved Courses. http://support.maltaenterprise.com/getqulaified

Get Qualified. Approved Courses. http://support.maltaenterprise.com/getqulaified Get Qualified Approved Courses http://support.maltaenterprise.com/getqulaified List of Training Providers BPP Professional Education Malta Limited 3 Computer Domain 3 EIE (European Institute of Education)

More information

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup. Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance

More information

NEXT GENERATION APPLICATION SECURITY

NEXT GENERATION APPLICATION SECURITY NEXT GENERATION APPLICATION SECURITY EN A BOOMING MARKET Application security market at a turning point. Jacques Sebag, CEO 99% of web applications are vulnerable 1 13 breaches per application on average

More information

IRAP Policy and Procedures up to date as of 16 September 2014.

IRAP Policy and Procedures up to date as of 16 September 2014. Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and

More information

To Be A Leader and A Premier Educational Hub in the Promotion of Afforable and Quality E-Learning in Asia

To Be A Leader and A Premier Educational Hub in the Promotion of Afforable and Quality E-Learning in Asia Executive Bachelor of Business (General Management) To Be A Leader and A Premier Educational Hub in the Promotion of Afforable and Quality E-Learning in Asia THE 1 UNIVERSITY 1 st ASIAN 31 COUNTRIES MULTINATIONAL

More information