SCAN. Associates Berhad.
|
|
- Amice Patrick
- 8 years ago
- Views:
Transcription
1 Associates Berhad.
2 Talking points 1. Genesis 2. Products & services 3. Support 4. Strengthsth 5. Lessons 2
3 Genesis 1. Originated from University s R&D group on Infosec Government funded d 3. Very niche network security & applications of cryptography 3
4 .../Chronology 4. Only half the students passed 5. Found out they were very active hackers members of world underground 6. Worked mostly at night 4
5 /Chronology was booming IT time 8. Many organizations had very poor security 9. Many servers were defaced 5
6 /Chronology 10. Did everything FOC, useful learning process 11. The favorite reference on restoring servers and guarding networks time to get dispersed d OR stick together 6
7 /Chronology 13. Handicapped on corporate issues 14.Seemed very popular in public sector rhad. N Associates Ber 7
8 /Chronology 13. Incorporated in International Listed 2006 market capitalization ~200Million (Ringgit) 8
9 Products and services 1. Craft client needs, heavy customization 2. Initially i very much a Security boutique 3. Diversified although remaining niche in the area 9
10 Certification Focus on Quality and Capabilities Development to remain a world class company MSC Status Company ISO/IEC Certified ISO 9001 Certified CMMI Level 3, Software Engineering Institute, Carnegie-Mellon USA Awarded various recognitions 1 Track Records and Credentials 5
11 Associates Berhad.
12 Support & partners 1. Government 2. Financial 3. International partners a) Individualsid b) organizations 4. Universities/Research institutes 12
13 Strength & branding 1. Vendor independent 2. Emphasizes indigenousness (initially) i i 3. Professional certifications & continuous learning. 4. Continuous R&D 13
14 /Strength g & branding 5. Take pride in our specialty 6. Emphasizes TRUST 7. Recognized internationally rhad. N Associates Ber 14
15 Professional Certification No Professional Certification No GIAC Certified Incident Handler (SANS) 2 Redhat Certified Engineer (Redhat) 6 GIAC Security Essentials Certification (SANS) 1 Certified Ethical Hacker CEH (EC Council) 10 SAN SEC508 SECURITY 508 : System 2 Open Source Wireless Professional OSWiP 1 Forensics, Investigation & Response (SANS) (ThinkSecure) BS7799 2:2002 Lead Auditor (BSI) 2 Sensecurity Institute Security Practioner SISP (Sensecurity Institute) 3 BS7799 2:2002 Lead Implementor (BSI) 4 Microsoft Certified System Engineer MCSE 1 ISMS Provisioned Auditor (IRCA) 2 Microsoft Certified Professional MCP 1 ISTQB Certified Tester 1 Microsoft Certified System Administrator MCSA 1 QMS Lead Auditor 3 Business Continuity Planner 3 CISSP (ISC2) 14 PRINCE 2 Certified Practitioner 1 CISA (ISACA) 2 ITIL Certified Practitioner 2 CISM (ISACA) 3 Project Management Professional (PMI) 2 Opensource Professional SecurtyTester 1 Payment Card Industry Qualified Security 2 (ISECOM) Assessor (PCI QSA)
16 Associates Berhad.
17 Associates Berhad.
18 Associates Berhad.
19 Major Track Records MALAYSIA Bank Negara Malaysia Developed epki solution for Bank Negara Malaysia and ALL the banks in Malaysia epki used to secure ALL Electronic Funds Transactions (RENTAS) and Cheque Clearing System Protecting billions of ringgit i per day! SCAN Security Operations Centre (SOC) EPF, Great Eastern, UiTM, CGC (Selected List) Currently, developing Internal SOC for Celcom Security Consultancy Most of the Government Agencies, Banks and major Telco s Most of the technical staff vetted under Tapisan Halus or Kasar for sensitive government projects 1 Track Records and Credentials 10
20 Major Track Records MALAYSIA PRISMA (Pemantauan Rangkaian ICT Sector Awam Malysia) Developed and operates Malaysia Government Security Operation Centre (SOC) named PRISMA with MAMPU since X 7 X 365 Operations 50 Dedicated staff operates the center until now 177 Agencies under PRISMA Monitoring 4.5 Billions Events processed since 2004 Developed the solution using Open Source and COTS product. 7 1 Track Records and Credentials
21 Major Track Records INDONESIA Operates 3 SOCs in Indonesia Major Banks (CIMB Niaga, Danamon) Internal SOC Indosat Mandiri Bank ID SIRTII (Indonesia Security Incident Response Team on Internet Infrastructure) Developed Internet Security Monitoring Centre and Forensic Labs Major Government Agencies POLRI, BNPB Major Telcos 1 Track Records and Credentials 11
22 Major Track Records Middle East Saudi Arabia SCAN MEA. JVCO (49%) Operates 1 SOC for major bank Communications and IT Commission (CITC) Developed National Computer Emergency Response Team for Saudi Arabia Forensic Labs Security Consultancy Saudi Arabia (Jeddah and Riyadh) UAE (Dubai and Abu Dhabi) Sudan, Syria Qatar (Al Jazeera)
23 Development of Standards and Guidelines Government of Malaysia Malaysian Public Sector Management of Information & Communications Technology Security Handbook (MyMIS) Malaysian Public Sector ICT Risk Assessment Methodology (MyRAM) ICT Security Handbook for Saudi Arabia International Standard Organisation (ISO) ISO/IEC JTC 1/SC27 WG1 Working members for ISO/IEC NP Information Technology Deployment and operation of Intrusion Detection System Working members for ISO/IEC NP Guidelines for Information and communication technology disaster recovery services
24 Speaker and trainer for various conference Speaker of Blackhat Security Conference Asia (Singapore) Speaker of RuxCon Security Conference 2004 (Australia) Speaker of XCon Security Conference 2004 (Beijing, China) Speaker of HITB Security Conference 2004 (Malaysia) Speaker of SyScAN 2004 (Singapore) Microsoft Security Conference 2005 (Malaysia) Bellua Cyber Security Asia 2005 E-Secure Conference 2005 (Malaysia) Committee for SyScan 06 CFP Committee for VNSec 07 CFP Trainer at Blackhat Europe and USA Trainer at Hack in the Box Malaysia
25 Awards and Recognition Distinguished Senior IT Security Professional Award for Asia- Pacific from ISC2 USA Frost and Sullivan: Managed Security Service Provider for 2006 and 2007 Cyber Security Malaysia: 2009 Information Security Service Provider of the Year Prof Dato Dr Norbik Innovative Entrepreneur of the Year from Malaysian Malay Chamber of Commerce Ernst & Young final nominees ICT Enterpreneur Track Records and Credentials 6
26 Clients Associates Berhad.
27 Current position 1. HQ in Malaysia, ~200 staff, ~65 certified professionals 2. Offices/partnerships in: a) ASEAN b) Middle east c) Korea 27
28 Lessons 1. Technopreneurs and start ups lack corporate knowledge 2. Innovation is critical ii in all business components. 3. Must learn fast and emulate. 4. Quality is critical 5. Continuous improvement is survival 28
29 THANK YOU 29 Associates Berhad.
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
More informationField of Study Area of Expertise Certification Vendor Course
Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner
More informationASCENDSYS SDN BHD. Company Profile
ASCENDSYS SDN BHD Company Profile Ascendsys Sdn Bhd Company Information Ascendsys Company Profile Ascendsys is information technology services organization that provides niche information technology solutions,
More informationCourse and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages
Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance
More informationInformation Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
More informationInfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
More informationCertification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
More informationInformation Security Principles and Practices
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,
More informationSocial Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
More informationCareer Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88
Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat
More informationNeed to protect your information? Take action with BSI s ISO/IEC 27001.
Need to protect your information? Take action with BSI s ISO/IEC 27001. Put sensitive customer and company information in the safe hands of ISO/IEC 27001. You simply can t be too careful when it comes
More informationMANAGEMENT DEVELOPMENT COURSES
(FULL VIEW) MANAGEMENT DEVELOPMENT COURSES MANAGEMENT DEVELOPMENT COURSES LEADERSHIP DEVELOPMENT Developing Leadership Competencies 4 4 days 230,000 1-4 13-16 26-29 6-9 Critical Thinking: Tools for Problem
More informationISO/IEC 20000: 2011 IT Service Management. Tying together all your IT processes Product Guide
ISO/IEC 20000: 2011 IT Service Management Tying together all your IT processes Product Guide What is ISO/IEC 20000 IT Service Management? ISO/IEC 20000 is the first internationally recognized standard
More informationInformation Security Certifications
HERVÉ SCHAUER CONSULTANTS Cabinet de Consultants en Sécurité Informatique depuis 1989 Spécialisé sur Unix, Windows, TCP/IP et Internet Information Security Certifications Persons / Organizations ENISA
More informationBMS Consulting Cyber Security and IT Technology Team
BMS Consulting Cyber Security and IT Technology Team Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the
More informationSecurity Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com
More informationChoosing Ascentor as your cyber security partner. Secure your information Strengthen your business
Secure your information Strengthen your business Choosing Ascentor as your cyber security partner www.ascentor.co.uk Ascentor Ltd 5 Wheatstone Court, Davy Way Waterwells Business Park Quedgeley, Gloucester
More informationVal-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning
Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.
More informationVal-EdTM. Valiant Technologies Education & Training Services. Workshop on Change Management. All Trademarks and Copyrights recognized.
Val-EdTM Valiant Technologies Education & Training Services Workshop on Change Management All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting
More informationSecurity Consulting. Services Overview
Services Overview Dimension Data is a global technology services company, assisting its customers in planning, building and supporting their IT infrastructures. Dimension Data combines its expertise in
More informationInformation Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza
Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank
More informationDIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES
G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..
More informationCorporate Presentation
Corporate Presentation XcellHost Cloud Services India Dubai Singapore Experience High Touch Support Reliable Secure Speed Scalable Manageable Value XcellHost About Us Founded in 1999. Global Reach Personal
More informationSPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
More informationState of South Carolina InfoSec and Privacy Career Path Model
State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available
More informationGlobal Knowledge Cybersecurity Training
Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,
More informationFedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
More informationFedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
More informationNetwork Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7
1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network
More informationMETANET and Interoute Zurich Data Centre Corporate Security & Risk Group Version 1.0 ; 4 April
Data Centre Quality and Security Enterprise Security Management METANET and Interoute Zurich Data Centre Corporate Security & Risk Group Version 1.0 ; 4 April Corporate Security & Risk Group (CSRG) Interoute
More informationKevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor
IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there
More informationProject Management Managing successful PCI DSS project
Project Management Managing successful PCI DSS project INTRODUCTION PCI-DSS is Payment Card Industry Data Security Standard, one of the fastest growing compliance currently affecting banks, payment service
More informationGlobal Knowledge Cybersecurity Training
Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,
More informationTechnology Approved Certifications
Date Approved Designation Certificate Name Points Microsoft Systems Engineering 04/16/2002 MCSE Microsoft Certified Systems Engineer 280 06/14/2007 MCSE: WIN 2003 Microsoft Certified Systems Engineer:
More informationExecutive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
More informationAgenda. Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE
Agenda Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE INTRACOM Group Core Companies MARKET POSITION A leading regional telecommunications systems manufacturer and solutions
More informationCareer Analysis into Cyber Security: New & Evolving Occupations
Alderbridge Specialists in Info Security Specialist Recruitment Knowledge for e-skills UK s Cyber Security Learning Pathways Programme Career Analysis into Cyber Security: New & Evolving Occupations e-skills
More informationITIL Vs. LAYER - Search Engine Marketing System
Nuove tendenze : Standard e relative Certificazioni ICT AIEA - Sessione di Studio Milano 07.06.2013 Today s AGENDA Green Mill Solutions Company Facts Overview Scope Main Areas for IT & Business Alignment
More informationBoost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE
2016 Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE Instructional Design Boost elearning Interactive IT Training Boost elearning's Interactive IT Training provides
More informationPaul Vlissidis Group Technical Director NCC Group plc paulv@nccgroup.com
Managing IT Fraud Using Ethical Hacking Paul Vlissidis Group Technical Director NCC Group plc paulv@nccgroup.com Agenda Introductions Context for Ethical Hacking Effective use of ethical hacking in fraud
More informationSC7-ISO20000 Alignment issues Aligning ITIL to existing ISO JTC1- SC7 Software Engineering Standards
SC7-ISO20000 Alignment issues Aligning ITIL to existing ISO JTC1- SC7 Software Engineering Standards Dr. A.April ETS University Table of Contents Objectives Audience Current clash An ITIL overview ISO
More informationInfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
More informationInfoSec Academy Pen Testing & Hacking Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
More informationPresented by Frederick J. Santarsiere
http://cinoltd.com/ Presented by Frederick J. Santarsiere CHFI, CISSP, CISM, CISA, CEH, CEI, CAP, SSCP Sec+, Net+, A+, MCSA, MCSE, MCITP, MCT CCENT, CCNA, CCNA Wireless, CCNA Voice CISCO SMBEN, SMBAM,
More informationDigi Device Cloud: Security You Can Trust
Digi Device Cloud: Security You Can Trust Abstract Historically, security has oftentimes been an afterthought or a bolt-on to any engineering product. In today s markets, however, security is taking a
More informationLegislative Council Panel on Information Technology and Broadcasting. Information Security
For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest
More informationGuideline to Determine Information Security Professionals Requirements for the CNII Agencies / Organisations
Date: 27/05/2013 Guideline to Determine Information Security Professionals Requirements for the CNII Agencies / Organisations 1 Contact Information For further clarification, please contact CyberSecurity
More informationChristopher Findlay University of Adelaide. Hussain G. Rammal University of South Australia
Australia-EU trade in Services: the case of Australian architecture firms Christopher Findlay University of Adelaide Hussain G. Rammal University of South Australia The study is funded as part of the research
More informationThe International School Consultancy
The International School Consultancy Independent, unrivalled market intelligence on the world s international schools p2 The International School Consultancy ISC is the leading provider of data and market
More informationof Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744
6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal
More informationNeed a system to deliver consistent, efficient and reliable IT services? Use an ISO/IEC 20000 compliant management system.
Need a system to deliver consistent, efficient and reliable IT services? Use an ISO/IEC 20000 compliant management system. ISO/IEC 20000 your first choice for IT service management. BSI is the business
More informationThe following chart indicates the Career Academy courses eligible for transfer credit by challenge exam.
American Business & Technology University currently provides for transfer credit from Career Academy courses completed within the last three years by challenge exam. A student may not transfer more than
More informationDatabase Security and Auditing
Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit
More informationANNEX TABLES Table 1. Revenue by ICT Type Revenue * Share to Total Revenues Growth Rate ICT Type 2004 2005 2004 2005 (in percent)
ANNEX TABLES Table 1. Revenue by Revenue * Share to Revenues 2004 2005 2004 2005 Contact Centers 32,904.1 54,295.1 44.4 49.4 65.0 Medical Transcription 236.7 466.2 0.3 0.4 97.0 Animation 694.2 939.1 0.9
More informationSecurityMetrics. history products expertise team awards
SecurityMetrics history products expertise team awards Our company [history] Who we are and where we came from Proud moments in SecurityMetrics History 2000 - Founded by Brad Caldwell 2001 - First bank
More informationATM Security Training Middle East Riyadh, Saudi Arabia 23 rd & 24 th February 2013
ATM Security Training Middle East Riyadh, Saudi Arabia There are now over 2 million ATM s in use globally according to the ATM Industry Association and a recent report by RBR estimates that there will
More informationISO 27001:2005 & ISO 9001:2008
ISO 27001:2005 & ISO 9001:2008 September 2011 1 Main Topics SFA ISO Certificates ISO 27000 Series used in the organization ISO 27001:2005 - Benefits for the organization ISO 9001:2008 - Benefits for the
More informationDon t let your SIeM become your Nightmare!
Don t let your SIeM become your Nightmare! Herwig Köck, Thomas Bleier What is SIEM? Combining Security Components Intrusion Detection Endpoint Security Service Logs Asset Management Packets Protocols IP-Adresses
More informationAchieving Governance, Risk and Compliance Requirements with HISP Certification Course
Achieving Governance, Risk and Compliance Requirements with HISP Certification Course in corporation with A unique information security and regulatory compliance certification course that provides IT security
More informationCompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)
CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted
More informationInformation Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
More informationSecurity Assessment and Compliance Services
Security Assessment and Compliance Services Despite the best efforts of IT security teams, hackers and malicious code continue to find their way into corporate networks. Adding to the pressure is the fact
More informationHP Cyber Security Control Cyber Insight & Defence
HP Cyber Security Control Cyber Insight & Defence Security awareness at board level Security leadership is under immense pressure Cyber threat Extended supply chain Financial loss Reputation damage Cost
More information167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationJOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile
JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise
More informationCourse Schedule. All in one place. Your guide to mapping your training-plan for the second half of 2015 with confidence...
July - December 201 Course Schedule All in one place Your guide to mapping your training-plan for the second half of 201 with confidence... www.globalknowledge.com.sa www.globalknowledge.com.eg www.globalknowledge.ae
More informationCut Costs vs. Smart Buy. Cloud Services For Real
Cut Costs vs. Smart Buy Cloud Services For Real Catalin Paunescu June 26 th, 2013 AGENDA It s all about Do we need IT? How much? How? It s all about It s all about... BEFORE and AFTER It s all about CUTTING
More informationSecurity Testing. Claire L. Lohr, CSQE, CSDP, CTAL clohr@computer.org. F. Scot Anderson, CISSP scot@securixx.comcom. April 7, 2009 V 1.
Standards Based Security Testing Claire L. Lohr, CSQE, CSDP, CTAL clohr@computer.org F. Scot Anderson, CISSP scot@securixx.comcom 1 Topics Why use standards? Secure systems component parts (1st level taxonomy)
More informationDelivering solutions How Egypt s companies are helping to deliver IT solutions and support
egypton.com Delivering solutions How Egypt s companies are helping to deliver IT solutions and support A key role in regional success Egyptian IT companies are playing a major part in delivering IT solutions
More information167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationINFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook
INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING forebrook Forebrook offers a range of information security, governance, IT systems and infrastructure related
More informationHow White Hat Hackers Operate. Andreas Falkenberg, Senior Security Consultant, SEC Consult Deutschland Unternehmensberatung GmbH
How White Hat Hackers Operate Andreas Falkenberg, Senior Security Consultant, SEC Consult Deutschl Unternehmensberatung GmbH About me Andreas Falkenberg, M.Sc. a.falkenberg@sec-consult.com Security Consultant
More informationIntroduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO
More informationTraining Catalogue. Ace Service Training Catalogue Ver 7.0. Ace Services
Catalogue 1 Ace Services TRAINING CATALOGUE Contents Introduction... 3 areas... 3 About the Trainer... 4 Integrated Risk Management... 5 Information Risk Management... 6 Business Continuity Management...
More informationforesightconsulting.com.au
Mr. James Kavanagh National Security Officer Microsoft Australia Level 4, 6 National Circuit, Barton, ACT 2600 02 March 2015 Microsoft Office 365 IRAP Assessment Letter of Compliance Dear Mr. Kavanagh,
More informationIT Security Management 100 Success Secrets
IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management
More informationCurriculum Vitae. Personal information. VASILEIADIS Nikolaos. Work experience. Surname / First name
Curriculum Vitae Personal information Surname / First name Addresses VASILEIADIS Nikolaos Home: Koumoundourou 32, 15341,, Greece Work: Yakinthou 3C, 15343,, Greece Telephones Home: +30 210 6084531 Work:
More informationCURRICULUM VITAE. Kodzo Gadzekpo ADOMEY
CURRICULUM VITAE Kodzo Gadzekpo ADOMEY University of Ghana Computing Systems University of Ghana, Legon +233-203574626 +233-243574626 madomey@hotmail.com madomey@ug.edu.gh OBJECTIVE To secure the post
More informationSecurity Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP
Security Certifications Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP Wie ben ik? Jordy Kersten 26 jaar Communicatie Systemen HAN Arhnem Informatiekunde RU Nijmegen Security Consultant
More informationFlexible Cloud Services to Compete
white paper Service Providers Need Flexible Cloud Services to Compete Enterprise Customers Demand Flexible Cloud Solutions When the concept of cloud services first came about, there was a great deal of
More informationPAS 99 Integrated Management. Make your management systems work in harmony Product Guide
PAS 99 Integrated Management. Make your management systems work in harmony Product Guide What is PAS 99? PAS 99 is a Publicly Available Specifi cation of common for management systems, which can be used
More information2014 Training Programs
2014 Training Programs Courses & Workshops Course Title Dates Venue Fees(BHD) 1- IT Security Workshop 16-18 March 5 Star Hotel 600 2- IT GRC Workshop 13-14 April 5 Star Hotel 400 3- COBIT 5 Foundation
More informationThe Value of Information Security Certifications
The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials
More informationTom VAN DEN EYNDE CISSP, CISA, CISM
Tom VAN DEN EYNDE CISSP, CISA, CISM Personal information First Name Tom Last Name Van den Eynde E-mail: tom@vandeneynde.net Phone: +32 - (0)495 91 20 62 Address: Meerminnenstraat 34, 2800 Birthday: May
More informationSecurity 2014 www.globalknowledge.com.sa www.globalknowledge.ae www.globalknowledge.com.eg
Security 2014 www.globalknowledge.com.sa www.globalknowledge.ae www.globalknowledge.com.eg About Founded in 1995, is the largest privately held provider of training, enterprise learning services, and software
More informationISO 9001:2015 QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR
Knowledge RECOGNITION Skills retention Further excellence behaviour Ability COMPETENCE QUALIFICATION ISO 9001 Training services SGS ACADEMY www.sgs.com sgs academy transforming people and businesses As
More informationCyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
More informationIntroduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA
Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International
More informationINFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA
INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA By THAIB MUSTAFA, CHAIRMAN TECHNICAL COMMITTEE FOR INFORMATION SECURITY (TC/G/5) INDUSTRY STANDARDS COMMITTEE FOR INFORMATION TECHNOLOGY, COMMUNICATION
More informationDesigning a High Availability Messaging Solution using Microsoft Exchange Server 2007
Microsoft Training Program Designing a High Availability Messaging Solution using Microsoft Exchange Server 2007 Timing Duration Location Language Course Price Per Person Flexible 16 hours IDEL LAB RAMALLAH
More informationPublic Training Calendar
06 PHILLIPS LEARNING ACADEMY Public Training Calendar Our Programme Categories at a Glance MANAGEMENT DEVELOPMENT Course Title LEADERSHIP DEVELOPMENT Developing Leadership Competencies Critical Thinking:
More informationHow To Protect Your It Infrastructure
Proactive Real-Time Monitoring and Risk Management Managed Security Services NCS Group Offices Australia Bahrain Brunei China Dubai Hong Kong SAR Korea Malaysia Philippines Singapore Sri Lanka Understanding
More informationHow To Get A Top Paying Certification
A Global Knowledge Special Report 15 Top-Paying Certifications for 2015 1-800-COURSES www.globalknowledge.com 15 Top-Paying Certifications for 2015 John Hales, Global Knowledge VMware, SDN, and SoftLayer
More informationInformation Security and Risk Management
Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management
More informationGet Qualified. Approved Courses. http://support.maltaenterprise.com/getqulaified
Get Qualified Approved Courses http://support.maltaenterprise.com/getqulaified List of Training Providers BPP Professional Education Malta Limited 3 Computer Domain 3 EIE (European Institute of Education)
More informationProfil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:
More informationDoD Directive (DoDD) 8570 & GIAC Certification
DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance
More informationNEXT GENERATION APPLICATION SECURITY
NEXT GENERATION APPLICATION SECURITY EN A BOOMING MARKET Application security market at a turning point. Jacques Sebag, CEO 99% of web applications are vulnerable 1 13 breaches per application on average
More informationIRAP Policy and Procedures up to date as of 16 September 2014.
Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and
More informationTo Be A Leader and A Premier Educational Hub in the Promotion of Afforable and Quality E-Learning in Asia
Executive Bachelor of Business (General Management) To Be A Leader and A Premier Educational Hub in the Promotion of Afforable and Quality E-Learning in Asia THE 1 UNIVERSITY 1 st ASIAN 31 COUNTRIES MULTINATIONAL
More information