IHLs-Industry partnerships play important role in training cyber security professionals and supporting growing cyber security industry

Size: px
Start display at page:

Download "IHLs-Industry partnerships play important role in training cyber security professionals and supporting growing cyber security industry"

Transcription

1 OPENING REMARKS BY DR YAACOB IBRAHIM, MINISTER FOR COMMUNICATIONS AND INFORMATION AND MINISTER IN CHARGE OF CYBER SECURITY AT THE OPENING CEREMONY OF TEMASEK POLYTECHNIC S IT SECURITY AND FORENSICS HUB, 27 JUL 2015, 9.35AM, TEMASEK POLYTECHNIC IHLs-Industry partnerships play important role in training cyber security professionals and supporting growing cyber security industry Distinguished guests Ladies and Gentlemen Good morning. I am pleased to join you today at the opening of Temasek Polytechnic s IT Security and Forensics Hub. 2 As we enjoy greater connectivity and convenience, with more systems going online, we also have to take cyber security very seriously. Our systems are constantly being probed and attacked. Like IT systems anywhere else, they are sometimes compromised. At one end of the spectrum are hacking tools and services available for hire that dramatically lower the barriers to entry into the world of cybercrime. The other end is occupied by sponsored hacker organisations that are well- 1

2 resourced and highly capable. Hacktivists and cyber criminals occupy the space in between with varying degrees of activity and expertise. Developing Singapore s Cyber Security Ecosystem 3 It is therefore important for us to ensure that we have strong defences and are able to respond to attacks. That is why we set up a Cyber Security Agency in April this year to oversee all the national cyber security functions. This includes building up our cybersecurity ecosystem to support the secure usage of technology. There will be a need to produce a sufficient pool of cyber security professionals to support a growing cyber-security industry. Practitioners will also need to constantly upgrade their skills to deal with cyber threats of growing sophistication. 4 This is an area where the Institutes of Higher Learning and the industry play an important role. I am pleased to note that Temasek Polytechnic has contributed to developing our talent pool, by offering two types of Diplomas in Cyber Security and Forensics. It is also collaborating with industry players like IBM, Cisco Systems, EMC, Fujitsu, NCS, RSA, VMWare to provide better training to students and equipping them with industry-relevant skills. 2

3 5 To date, a total of 512 students from Temasek Polytechnic have graduated and received their Diplomas in Cyber and Digital Security and in Digital Forensics since the courses were introduced in 2006 and 2011 respectively. Brandon Lum, a recipient of the Lee Kuan Yew award, was one of these students who spent three illustrious years in Temasek Polytechnic. Most people expected Brandon to enter the Junior College when he scored an aggregate of 7 points at the GCE O Level examinations but he surprised everyone when he decided to follow his passion in technology and enrolled in Temasek Polytechnic s Cyber and Digital Security course. He has not looked back since. An outstanding software applications developer, he earned recognition locally and internationally for his application called Smart Shop which is aimed at enhancing the experience of online shoppers using Open Source and Augmented Reality technologies. He is currently pursuing a degree in Carnegie Mellon University, one of the world s top universities in cyber security studies, and will return to Singapore next year to work with his sponsor IBM. And to think that his mother used to tell him not to spend so much time at the computer! 6 It has been a common refrain that aside from the shortfall in cyber security professionals, very few females are opting to pursue studies in this field. I was heartened to learn that the top student in Temasek Polytechnic s Diploma in Digital Forensics in 2015 is a young lady! I hear she is here today to join us in the launch. Nur Syakirah Bte Mohd Said 3

4 received the IBM Gold Medal, the IDA Excellence Award and the RSA Special Industry Prize and will soon be continuing her studies in Singapore Management University s School of Information Systems Management next month. I hope we will see more female students like her in our institutions. 7 Our universities too, are stepping up education efforts in the area of cyber security. New initiatives include benchmarking cybersecurity specialisations against international standards and introducing new cyber information security degrees at the Bachelors and Masters levels. We have certainly made good progress and I hope to see more institutions come forward to offer these courses. Industry Relevant Cyber Security Skills 8 The opening of Temasek Polytechnic s IT Security and Forensics Hub, in partnership with leading solutions providers from the industry, is timely. At the Hub, senior students will be able to apply their skills and engage with real clients to provide IT services as well as take on projects or work on security analysis. They will be able to work with the technologies that are used in the industry. In addition, they will be mentored by both industry experts and Temasek Polytechnic staff, and pick up fundamental knowledge in IT networking, server management and storage as well as IT security and forensics. I have no doubt that the IT Security and Forensics Hub will contribute towards nurturing more 4

5 cyber security professionals for Singapore and I look forward to seeing more of such initiatives. Conclusion 9 Infocomm developments and innovation will continue at a rapid pace, and this applies to the emergence of new technologies and threats alike. I would like to encourage more students to consider cyber security as a profession, and take up the challenge to secure and safeguard the trustworthiness of our cyber environment. Only with a safe and secure cyber space will we be able to realise, and benefit from, the maximum potential of infocomm technologies. 10 On this note, I congratulate Temasek Polytechnic on the launch of their IT Security and Forensics Hub and I wish all the partners and students every success. 5

SPEECH. Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF

SPEECH. Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF SPEECH Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF SPEECH BY MINISTER OF STATE FOR DEFENCE DR MOHAMAD MALIKI BIN OSMAN, AT THE CYBER DEFENDERS DISCOVERY CAMP AWARDS

More information

SPEECH. Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF

SPEECH. Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF SPEECH Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF SPEECH BY PERMANENT SECRETARY (DEFENCE) MR CHAN YENG KIT, AT THE CYBER DEFENDERS DISCOVERY CAMP AWARDS CEREMONY

More information

Infocomm Security Masterplan 2

Infocomm Security Masterplan 2 INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm

More information

It is my pleasure to join you here today at the Youth. Infocomm Day. I am heartened to see such enthusiasm and

It is my pleasure to join you here today at the Youth. Infocomm Day. I am heartened to see such enthusiasm and SPEECH BY MS SIM ANN, SENIOR PARLIAMENTARY SECRETARY FOR COMMUNICATIONS AND INFORMATION & EDUCATION AT THE YOUTH INFOCOMM DAY ON WEDNESDAY, 7 NOVEMBER 2012, 12.30 PM, AT F1 PIT BUILDING Parents, Teachers

More information

S I N G A P O R E C U S T O M S

S I N G A P O R E C U S T O M S EMBARGOED UNTIL DELIVERY PLEASE CHECK AGAINST DELIVERY S I N G A P O R E C U S T O M S SPEECH BY MRS LIM HWEE HUA, MINISTER OF STATE FOR FINANCE AND TRANSPORT, AT THE LAUNCH OF SECURE TRADE PARTNERSHIP

More information

Information Security Summit 2005

Information Security Summit 2005 Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government

More information

Mr Alan Chan, Chairman, SPH Magazines and CEO, Singapore. Ladies and gentlemen, good evening. Welcome to Her World s

Mr Alan Chan, Chairman, SPH Magazines and CEO, Singapore. Ladies and gentlemen, good evening. Welcome to Her World s Welcome Address by Mr Loh Yew Seng, CEO of SPH Magazines, at Her World s 55 th Anniversary Gala Dinner and the Her World Woman Of The Year 2015 Awards Night, on Friday, 21 August 2015, 7pm, at Shangri-La

More information

FACT SHEET Infocomm Manpower Development Roadmap v2.0

FACT SHEET Infocomm Manpower Development Roadmap v2.0 November 2012 Background FACT SHEET Infocomm Manpower Development Roadmap v2.0 Developments in the infocomm industry globally and within Singapore over the past few years require a strategy change to ensure

More information

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY)

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY) BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY) Bachelor of Engineering with Honours in Information and Communications Technology (Information Security)

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON THE JUDICIARY HEARING ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN EXECUTIVE

More information

CYBER SECURITY STRATEGY AN OVERVIEW

CYBER SECURITY STRATEGY AN OVERVIEW CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without

More information

Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014

Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before the 10 th Annual Community Bankers Symposium Chicago November 7, 2014 Good morning, it s a pleasure to be here today and to have this opportunity

More information

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity. Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND

More information

WCA WEBINAR SERIES: The Case for Cyber Security Training

WCA WEBINAR SERIES: The Case for Cyber Security Training WCA WEBINAR SERIES: The Case for Cyber Security Training PLEASE NOTE: IN ORDER TO HEAR THE AUDIO FOR THIS WEBCAST YOU WILL NEED TO USE YOUR TELEPHONE TO DIAL INTO THE FOLLOWING CONFERENCE LINE: Conference

More information

Careers@Singapore: Cyber Security & Data Analytics October - November 2015

Careers@Singapore: Cyber Security & Data Analytics October - November 2015 Careers@Singapore: Cyber Security & Data Analytics October - November 2015 HOT JOBS Scroll down to see the highlights of all the Career Opportunities. Or visit our job portal at contactsingapore.sg/jobs

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

MIT-SUTD Dual Masters Programme. Explore exciting research possibilities

MIT-SUTD Dual Masters Programme. Explore exciting research possibilities MIT-SUTD Dual Masters Programme Explore exciting research possibilities A NOTE FROM THE ASSOCIATE PROVOST FOR RESEARCH The Dual Masters Programme was established in collaboration with the Massachusetts

More information

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity Expert Reference Series of White Papers Planning a Career Path in Cybersecurity 1-800-COURSES www.globalknowledge.com Planning a Career Path in Cybersecurity James Michael Stewart, CISSP, ISSAP, SSCP,

More information

Civil Service careers made more attractive

Civil Service careers made more attractive EMBARGOED TILL 1800 HOURS, 25 OCT 2007 PRESS RELEASE Civil Service careers made more attractive - More career opportunities with job rotation - Average 8.6% annual salary increase for graduates - Better

More information

Secure by design: taking a strategic approach to cybersecurity

Secure by design: taking a strategic approach to cybersecurity Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk

More information

Bachelor of Information Technology

Bachelor of Information Technology Bachelor of Information Technology [ Network security] Information for International Students www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security] Cybercrime is

More information

Basic Techniques to prevent Identity Theft and Cybercrime

Basic Techniques to prevent Identity Theft and Cybercrime E-Guide Basic Techniques to prevent Identity Theft and Cybercrime When it comes to cybercrime, identity theft techniques often vary from the technical -- computer forensics -- to the old-school -- calling

More information

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Cyber Security. A professional qualification awarded in association with University of Manchester Business School ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security

More information

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

ISACA S CYBERSECURITY NEXUS (CSX) October 2015 ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

Proactive Threat Management using Global Threat Intelligence

Proactive Threat Management using Global Threat Intelligence Proactive Threat Management using Global Threat Intelligence WHITEPAPER Cyber breaches happening throughout the world has given the concept of global threat intelligence. Threat intelligence is the capability

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

CYBERSECURITY: Is Your Business Ready?

CYBERSECURITY: Is Your Business Ready? CYBERSECURITY: Is Your Business Ready? Cybersecurity: Is your business ready? Cyber risk is just like any other corporate risk and it must be managed from the top. An organization will spend time monitoring

More information

NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call

NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call PRESS RELEASE NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call Singapore, 15 October 2014 (Wednesday) The National Research Foundation (NRF), Prime Minister s Office,

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

EY Cyber Security Hacktics Center of Excellence

EY Cyber Security Hacktics Center of Excellence EY Cyber Security Hacktics Center of Excellence The Cyber Crime Underground Page 2 The Darknet Page 3 What can we find there? Hit men Page 4 What can we find there? Drug dealers Page 5 What can we find

More information

Aurora Public Schools. Aurora, Colorado May 27, 2011

Aurora Public Schools. Aurora, Colorado May 27, 2011 Aurora Public Schools Aurora, Colorado May 27, 2011 Providing Students a Choice to be Successful Graduating Class of 2011 Graduating Class of 2011 Graduating Class of 2011 Graduating Class of 2011 Graduating

More information

Security Intelligence

Security Intelligence IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers

More information

Norman T L Chan: Hong Kong as a private banking hub a regulator s vision

Norman T L Chan: Hong Kong as a private banking hub a regulator s vision Norman T L Chan: Hong Kong as a private banking hub a regulator s vision Speech by Mr Norman T L Chan, Chief Executive of the Hong Kong Monetary Authority, at the HKAB HKIB Distinguished Speaker Series

More information

defense through discovery

defense through discovery defense through discovery about krypton krypton is an advisory and consulting services firm, specialized in the domain of information technology (it) and it-related security krypton is a partnership amongst

More information

ASEAN Federation of Forwarders Association Report on SLA Training & Development

ASEAN Federation of Forwarders Association Report on SLA Training & Development ASEAN Federation of Forwarders Association Report on SLA Training & Development 11 to 13 November 2009 1. Overview of SLA s LEAD Projects 2. SLA SPUR Funded Courses 3. SLA NTUC LHub WSQ and ESS Courses

More information

FACT SHEET. Singapore: A Global Node for Digital Media and Entertainment

FACT SHEET. Singapore: A Global Node for Digital Media and Entertainment INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg June 2008 FACT SHEET Singapore: A Global Node for

More information

Careers in Cyber Operations. Defence Signals Directorate

Careers in Cyber Operations. Defence Signals Directorate Careers in Cyber Operations Defence Signals Directorate 1 In a game where our adversaries operate with no rules and unknown boundary lines, you will be exploring the possibilities and inventing the seemingly

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

CYBER-ATTACKS THE GLOBAL RESPONSE

CYBER-ATTACKS THE GLOBAL RESPONSE R E P R I N T CYBER-ATTACKS THE GLOBAL RESPONSE REPRINTED FROM: Risk, Governance & Compliance for Financial Institutions 2015 RISK GOVERNANCE & COMPLIANCE for F I N A N C I A L INSTITUTIONS 2 0 1 5 Visit

More information

Talented People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK

Talented People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK Talented People to Secure Our Future Judy Baker, Director Cyber Security Challenge UK A story Starts in the US, Comes to the UK Outcome: more and better cyber security talent in US and UK businesses The

More information

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Cyber Security CESG Certified Training // 2 Contents 3

More information

UNDERGRADUATE PROGRAMME SPECIFICATION

UNDERGRADUATE PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: Intermediate Awards: Mode of Study: Computer Networks and Security Staffordshire University Faculty

More information

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Cyber Security. A professional qualification awarded in association with University of Manchester Business School ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security

More information

Kelly Nicholson. Summary

Kelly Nicholson. Summary Kelly Nicholson knichol5@ycp.edu Summary Kelly Nicholson is a diligent and motivated professional with over six years of experience in the Security field. She prides herself on her communication and technical

More information

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response. MAJOR FINANCIAL SERVICES LEADER Top 5 Global Bank Selects Resolution1 for Cyber Incident Response. Automation and remote endpoint remediation reduce incident response (IR) times from 10 days to 5 hours.

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

Cisco Cyber Security. Professional Courses. About. Course Outline

Cisco Cyber Security. Professional Courses. About. Course Outline Cisco Cyber Security Professional Courses About This course introduces the importance of cybersecurity and current trends, eight modules with presentations and panel discussions that feature industry experts.

More information

A New Paradigm in Cloud Computing

A New Paradigm in Cloud Computing FACT SHEET (May 2013) A New Paradigm in Cloud Computing The Infocomm Development Authority of Singapore (IDA) notes that there is a paradigm shift in computing, where businesses and end-users will be accessing

More information

After Teaching Himself To Code, Coding Lab's Yu Jian Is Paving The Way For Youths In S'pore

After Teaching Himself To Code, Coding Lab's Yu Jian Is Paving The Way For Youths In S'pore After Teaching Himself To Code, Coding Lab's Yu Jian Is Paving The Way For Youths In S'pore PUBLISHED ON DECEMBER 16, 2015 BY DELFINA UTOMO Black Eyed Peas frontman Will.i.am learned how to code. Basketball

More information

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together.

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together. CYBERSECURITY Global cybersecurity capabilities for a digital transformation with confidence Delivering Transformation. Together. Sopra Steria, a European leader in digital transformation, has one of the

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

Key Findings of 1999 Infocomm Manpower and Skills Survey

Key Findings of 1999 Infocomm Manpower and Skills Survey 1 SURVEY BACKGROUND 1.1 Survey Objectives Before the formation of IDA, the NCB conducted the IT Manpower & Skills Inventory Survey biennially. This 1999 Infocomm Manpower & Skills Survey is the first joint

More information

Cyber Security Operations Specialist

Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd ST Electronics (Info-Security) Page 1 Cyber Security Operations Essentials: Live cyber security training to build Detection, Response

More information

Testing the Security of your Applications

Testing the Security of your Applications Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are

More information

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days) Course introduction It is vital to ensure that your business is protected against the threats of fraud and cyber crime and that operational risk processes are in place. This three-day course provides an

More information

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity Nine recommendations for alternative funds battling cyber crime kpmg.ca/cybersecurity Cyber criminals steal user names and passwords and use it to conduct financial trading activity illicitly. Hackers

More information

Brochure More information from http://www.researchandmarkets.com/reports/3493712/

Brochure More information from http://www.researchandmarkets.com/reports/3493712/ Brochure More information from http://www.researchandmarkets.com/reports/3493712/ Security Analytics Market by Application (Network Security, Application Security, Data and Information Security, Endpoint

More information

Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud

Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud Securing Internet Payments across Europe Guidelines for Detecting and Preventing Fraud Table of Contents Executive Summary Protecting Internet Payments: A Top Priority for All Stakeholders European Central

More information

IBM in Singapore An Overview. IBM in Singapore An Overview

IBM in Singapore An Overview. IBM in Singapore An Overview IBM in Singapore An Overview IBM in Singapore An Overview IBM in Singapore An Overview 2 60 years of making Singapore work better IBM has always had a strong heritage of making substantive contributions

More information

7 Steps to Protect Your Company from a Data Breach

7 Steps to Protect Your Company from a Data Breach 7 Steps to Protect Your Company from a Data Breach August 11, 2015 Michael Pinna and Stuart Nussbaum Millions of government personnel files were recently compromised as part of a malicious hacking of the

More information

BACHELOR OF ACCOUNTANCY

BACHELOR OF ACCOUNTANCY BACHELOR OF ACCOUNTANCY g tin un co ac AND MUCH MORE Message from the Dean The accountancy scene in Singapore is transforming and developing towards becoming a leading global hub for accountancy services

More information

The Risk of Hosting in. Canada. An ebook by

The Risk of Hosting in. Canada. An ebook by The Risk of Hosting in Canada An ebook by Index Introduction...1 Financial Risks...3 Legal Risks...5 Security Risks...8 Technical Risks...10 Conclusion...12 Contact...12 Introduction Hosting your applications

More information

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking

More information

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 It s a pleasure to be with you back home in Boston. I was here just six weeks ago

More information

81% of participants believe the government should share more threat intelligence with the private sector.

81% of participants believe the government should share more threat intelligence with the private sector. Threat Intelligence Sharing & the Government s Role in It Results of a Survey at InfoSec 2015 Section 1 1.1 Executive summary The last few years has seen a rise in awareness regarding security breaches

More information

Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity

Cybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities

More information

Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)

Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts) International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 837-841 International Research Publication House http://www.irphouse.com Enhancing Cloud Security

More information

White Paper on Cloud Computing

White Paper on Cloud Computing Our business is to support your business White Paper on Cloud Computing Cloud computing enables convenient internet access to a shared resource of computing elements (e.g. networks, servers, storage, applications,

More information

Vendor Risk Management Financial Organizations

Vendor Risk Management Financial Organizations Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current

More information

ACCREDITATION OF PRIOR LEARNING (APL)

ACCREDITATION OF PRIOR LEARNING (APL) ACCREDITATION OF PRIOR LEARNING (APL) Eligibility APL is the recognition of previously acquired learning which can be mapped against particular learning outcomes of units within a programme. APL may be

More information

Australian Government Cyber Security Review

Australian Government Cyber Security Review Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

Securing the Connected World. Cyber@BGU

Securing the Connected World. Cyber@BGU Securing the Connected World Cyber@BGU 1 Being Cyber Safe February 2015 Produced by the Department of Publications and Media Relations, BGU Photos: Dani Machlis I Design: www.image2u.co.il We have become

More information

SMART. SIMPLE. SECURITY THAT FITS YOUR BUSINESS.

SMART. SIMPLE. SECURITY THAT FITS YOUR BUSINESS. SMART. SIMPLE. SECURITY THAT FITS YOUR BUSINESS. RESELLER BROCHURE Take Advantage of Today s Dynamic Security Market The security landscape has dramatically shifted. New device types, new computing models,

More information

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar April 25, 2013 Welcome to the NICCS Webinar! Thank you for joining us today. During this presentation, you will: Learn about the

More information

Your Excellency, Distinguished Guests, Ladies and Gentlemen,

Your Excellency, Distinguished Guests, Ladies and Gentlemen, Your Excellency, Distinguished Guests, Ladies and Gentlemen, Thank you, Rachel and Aparna for your gracious introduction and for organising this important forum on International Women s Day -- Breaking

More information

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap

National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap FOR IMMEDIATE RELEASE National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap Closing the Cyber Talent Gap and Educating the Workforce of the Future

More information

SPEECH BY THE DIRECTOR-GENERAL OF THE DEPARTMENT OF HEALTH MS MP MATSOSO AT THE SAFECARE CONFERENCE..CAPE TOWN

SPEECH BY THE DIRECTOR-GENERAL OF THE DEPARTMENT OF HEALTH MS MP MATSOSO AT THE SAFECARE CONFERENCE..CAPE TOWN SPEECH BY THE DIRECTOR-GENERAL OF THE DEPARTMENT OF HEALTH MS MP MATSOSO AT THE SAFECARE CONFERENCE..CAPE TOWN Programme Director Colleagues from provincial health departments represented here Dr Carmen

More information

National Association of State Chief Information Officers

National Association of State Chief Information Officers National Association of State Chief Information Officers Nominations for 2002 Recognition Awards for Outstanding Achievement in the Field of Information Technology Nomination Form Title of Nomination:

More information

Mr Ren Xian Liang, Vice-Minister of Cyberspace Administration of China (CAC),

Mr Ren Xian Liang, Vice-Minister of Cyberspace Administration of China (CAC), Welcome remarks by Mr Chua Taik Him Acting Chief Executive Officer International Enterprise (IE) Singapore At the China-Singapore Digital Economy Forum (Tuesday), 0930Hrs Pan Pacific Hotel Mr S Iswaran,

More information

Information Security in the undergraduate curriculum

Information Security in the undergraduate curriculum Information Security in the undergraduate curriculum Chris Mitchell Royal Holloway, University of London www.isg.rhul.ac.uk/~cjm 1 Background I Some years ago, computer hacking was mainly done for fun.

More information

Programme. 8.30am. 10.40am

Programme. 8.30am. 10.40am 8.30am 9.00am 9.15am 9.35am 9.40am 8.30am 10.10am 10.40am 11.10am 11.35am 12.00pm 12.25pm 1.40pm 2.05pm 2.30pm 2.55pm 3.25pm 3.50pm 4.15pm Programme Registration Welcome Address Mr Lau Thiam Beng Deputy

More information

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee. New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone

More information

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What

More information

The Value of Automated Penetration Testing White Paper

The Value of Automated Penetration Testing White Paper The Value of Automated Penetration Testing White Paper Overview As an information security and the security manager of the company, I am well aware of the difficulties of enterprises and organizations

More information

Are your people playing an effective role in your cyber resilience?

Are your people playing an effective role in your cyber resilience? Are your people playing an effective role in your cyber resilience? 01 Cyber attacks are now business as usual for organizations around the world. Organizations have typically trusted in technology to

More information

Government + Enterprise + Innovation + Strategy

Government + Enterprise + Innovation + Strategy Government + Enterprise + Innovation + Strategy Australia as Lead Regional Player in Cyber War Greg Rudd CEO Crest Australia Digital Disruption What does this mean for cyber security? Digital Changes Everything

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information Management This course aims to provide

More information

Simplify Your Network Security with All-In-One Unified Threat Management

Simplify Your Network Security with All-In-One Unified Threat Management Singtel Business Product Factsheet Brochure Managed Defense Unified Services Management Simplify Your Network Security with All-In-One Unified Management Singtel Managed Unified Management (UTM) Services,

More information

CEOs AND CYBER DEFENSE: THE NEW REALITY. Top executives need to be the main drivers of effective data protection for their companies

CEOs AND CYBER DEFENSE: THE NEW REALITY. Top executives need to be the main drivers of effective data protection for their companies SPECIAL ADVERTISING SECTION businessweek.com/adsections S1 CEOs AND CYBER DEFENSE: THE NEW REALITY Top executives need to be the main drivers of effective data protection for their companies It wasn t

More information