SCAN. Associates Berhad.



Similar documents
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Field of Study Area of Expertise Certification Vendor Course

ASCENDSYS SDN BHD. Company Profile

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Information Security Specialist Training on the Basis of ISO/IEC 27002

InfoSec Academy Application & Secure Code Track

Certification and Training

Information Security Principles and Practices

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

MANAGEMENT DEVELOPMENT COURSES

ISO/IEC 20000: 2011 IT Service Management. Tying together all your IT processes Product Guide

Information Security Certifications

BMS Consulting Cyber Security and IT Technology Team

Security Transcends Technology

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Security Consulting. Services Overview

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

Corporate Presentation

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

State of South Carolina InfoSec and Privacy Career Path Model

Global Knowledge Cybersecurity Training

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Project Management Managing successful PCI DSS project

Technology Approved Certifications

Executive Cyber Security Training. One Day Training Course

Career Analysis into Cyber Security: New & Evolving Occupations

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Paul Vlissidis Group Technical Director NCC Group plc

SC7-ISO20000 Alignment issues Aligning ITIL to existing ISO JTC1- SC7 Software Engineering Standards

InfoSec Academy Forensics Track

InfoSec Academy Pen Testing & Hacking Track

Presented by Frederick J. Santarsiere

Digi Device Cloud: Security You Can Trust

Guideline to Determine Information Security Professionals Requirements for the CNII Agencies / Organisations

Christopher Findlay University of Adelaide. Hussain G. Rammal University of South Australia

The International School Consultancy

of Highly Effective Security Professionals By Sondra Schneider CEO Security University

Need a system to deliver consistent, efficient and reliable IT services? Use an ISO/IEC compliant management system.

The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam.

Database Security and Auditing

ANNEX TABLES Table 1. Revenue by ICT Type Revenue * Share to Total Revenues Growth Rate ICT Type (in percent)

ATM Security Training Middle East Riyadh, Saudi Arabia 23 rd & 24 th February 2013

ISO 27001:2005 & ISO 9001:2008

Don t let your SIeM become your Nightmare!

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

Information Security ISO Standards. Feb 11, Glen Bruce Director, Enterprise Risk Security & Privacy

HP Cyber Security Control Cyber Insight & Defence

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile

Course Schedule. All in one place. Your guide to mapping your training-plan for the second half of 2015 with confidence...

Security Testing. Claire L. Lohr, CSQE, CSDP, CTAL F. Scot Anderson, CISSP April 7, 2009 V 1.

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook

How White Hat Hackers Operate. Andreas Falkenberg, Senior Security Consultant, SEC Consult Deutschland Unternehmensberatung GmbH

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

Training Catalogue. Ace Service Training Catalogue Ver 7.0. Ace Services

foresightconsulting.com.au

IT Security Management 100 Success Secrets

Curriculum Vitae. Personal information. VASILEIADIS Nikolaos. Work experience. Surname / First name

CURRICULUM VITAE. Kodzo Gadzekpo ADOMEY

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Flexible Cloud Services to Compete

PAS 99 Integrated Management. Make your management systems work in harmony Product Guide

The Value of Information Security Certifications

Tom VAN DEN EYNDE CISSP, CISA, CISM

ISO 9001:2015 QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA

Public Training Calendar

How To Protect Your It Infrastructure

Information Security and Risk Management

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

DoD Directive (DoDD) 8570 & GIAC Certification

IRAP Policy and Procedures up to date as of 16 September 2014.

To Be A Leader and A Premier Educational Hub in the Promotion of Afforable and Quality E-Learning in Asia

Transcription:

Associates Berhad.

Talking points 1. Genesis 2. Products & services 3. Support 4. Strengthsth 5. Lessons 2

Genesis 1. Originated from University s R&D group on Infosec 95 2. Government funded d 3. Very niche network security & applications of cryptography 3

.../Chronology 4. Only half the students passed 5. Found out they were very active hackers members of world underground 6. Worked mostly at night 4

/Chronology 7. 1995 was booming IT time 8. Many organizations had very poor security 9. Many servers were defaced 5

/Chronology 10. Did everything FOC, useful learning process 11. The favorite reference on restoring servers and guarding networks 12. 1998 time to get dispersed d OR stick together 6

/Chronology 13. Handicapped on corporate issues 14.Seemed very popular in public sector rhad. N Associates Ber 7

/Chronology 13. Incorporated in 2000 14. International 2004 15. Listed 2006 market capitalization ~200Million (Ringgit) 8

Products and services 1. Craft client needs, heavy customization 2. Initially i very much a Security boutique 3. Diversified although remaining niche in the area 9

Certification Focus on Quality and Capabilities Development to remain a world class company MSC Status Company ISO/IEC 27001 Certified ISO 9001 Certified CMMI Level 3, Software Engineering Institute, Carnegie-Mellon USA Awarded various recognitions 1 Track Records and Credentials 5

Associates Berhad.

Support & partners 1. Government 2. Financial 3. International partners a) Individualsid b) organizations 4. Universities/Research institutes 12

Strength & branding 1. Vendor independent 2. Emphasizes indigenousness (initially) i i 3. Professional certifications & continuous learning. 4. Continuous R&D 13

/Strength g & branding 5. Take pride in our specialty 6. Emphasizes TRUST 7. Recognized internationally rhad. N Associates Ber 14

Professional Certification No Professional Certification No GIAC Certified Incident Handler (SANS) 2 Redhat Certified Engineer (Redhat) 6 GIAC Security Essentials Certification (SANS) 1 Certified Ethical Hacker CEH (EC Council) 10 SAN SEC508 SECURITY 508 : System 2 Open Source Wireless Professional OSWiP 1 Forensics, Investigation & Response (SANS) (ThinkSecure) BS7799 2:2002 Lead Auditor (BSI) 2 Sensecurity Institute Security Practioner SISP (Sensecurity Institute) 3 BS7799 2:2002 Lead Implementor (BSI) 4 Microsoft Certified System Engineer MCSE 1 ISMS Provisioned Auditor (IRCA) 2 Microsoft Certified Professional MCP 1 ISTQB Certified Tester 1 Microsoft Certified System Administrator MCSA 1 QMS Lead Auditor 3 Business Continuity Planner 3 CISSP (ISC2) 14 PRINCE 2 Certified Practitioner 1 CISA (ISACA) 2 ITIL Certified Practitioner 2 CISM (ISACA) 3 Project Management Professional (PMI) 2 Opensource Professional SecurtyTester 1 Payment Card Industry Qualified Security 2 (ISECOM) Assessor (PCI QSA)

Associates Berhad.

Associates Berhad.

Associates Berhad.

Major Track Records MALAYSIA Bank Negara Malaysia Developed epki solution for Bank Negara Malaysia and ALL the banks in Malaysia epki used to secure ALL Electronic Funds Transactions (RENTAS) and Cheque Clearing System Protecting billions of ringgit i per day! SCAN Security Operations Centre (SOC) EPF, Great Eastern, UiTM, CGC (Selected List) Currently, developing Internal SOC for Celcom Security Consultancy Most of the Government Agencies, Banks and major Telco s Most of the technical staff vetted under Tapisan Halus or Kasar for sensitive government projects 1 Track Records and Credentials 10

Major Track Records MALAYSIA PRISMA (Pemantauan Rangkaian ICT Sector Awam Malysia) Developed and operates Malaysia Government Security Operation Centre (SOC) named PRISMA with MAMPU since 2003 24 X 7 X 365 Operations 50 Dedicated staff operates the center until now 177 Agencies under PRISMA Monitoring 4.5 Billions Events processed since 2004 Developed the solution using Open Source and COTS product. 7 1 Track Records and Credentials

Major Track Records INDONESIA Operates 3 SOCs in Indonesia Major Banks (CIMB Niaga, Danamon) Internal SOC Indosat Mandiri Bank ID SIRTII (Indonesia Security Incident Response Team on Internet Infrastructure) Developed Internet Security Monitoring Centre and Forensic Labs Major Government Agencies POLRI, BNPB Major Telcos 1 Track Records and Credentials 11

Major Track Records Middle East Saudi Arabia SCAN MEA. JVCO (49%) Operates 1 SOC for major bank Communications and IT Commission (CITC) Developed National Computer Emergency Response Team for Saudi Arabia Forensic Labs Security Consultancy Saudi Arabia (Jeddah and Riyadh) UAE (Dubai and Abu Dhabi) Sudan, Syria Qatar (Al Jazeera)

Development of Standards and Guidelines Government of Malaysia Malaysian Public Sector Management of Information & Communications Technology Security Handbook (MyMIS) Malaysian Public Sector ICT Risk Assessment Methodology (MyRAM) ICT Security Handbook for Saudi Arabia International Standard Organisation (ISO) ISO/IEC JTC 1/SC27 WG1 Working members for ISO/IEC NP 18043 Information Technology Deployment and operation of Intrusion Detection System Working members for ISO/IEC NP 24762 Guidelines for Information and communication technology disaster recovery services

Speaker and trainer for various conference Speaker of Blackhat Security Conference Asia 2003. (Singapore) Speaker of RuxCon Security Conference 2004 (Australia) Speaker of XCon Security Conference 2004 (Beijing, China) Speaker of HITB Security Conference 2004 (Malaysia) Speaker of SyScAN 2004 (Singapore) Microsoft Security Conference 2005 (Malaysia) Bellua Cyber Security Asia 2005 E-Secure Conference 2005 (Malaysia) Committee for SyScan 06 CFP Committee for VNSec 07 CFP Trainer at Blackhat Europe and USA 2006-2009 Trainer at Hack in the Box Malaysia 2006-2009

Awards and Recognition Distinguished Senior IT Security Professional Award for Asia- Pacific from ISC2 USA Frost and Sullivan: Managed Security Service Provider for 2006 and 2007 Cyber Security Malaysia: 2009 Information Security Service Provider of the Year Prof Dato Dr Norbik Innovative Entrepreneur of the Year from Malaysian Malay Chamber of Commerce Ernst & Young final nominees ICT Enterpreneur 2007 1 Track Records and Credentials 6

Clients Associates Berhad.

Current position 1. HQ in Malaysia, ~200 staff, ~65 certified professionals 2. Offices/partnerships in: a) ASEAN b) Middle east c) Korea 27

Lessons 1. Technopreneurs and start ups lack corporate knowledge 2. Innovation is critical ii in all business components. 3. Must learn fast and emulate. 4. Quality is critical 5. Continuous improvement is survival 28

THANK YOU 29 Associates Berhad.