Today, the Internet has become an integral part of modern societies with over 2.4 billion users connected in the world. This has in turn created a new realm for malicious users to perpetrate fraud, theft and forgery and transmit illegitimate content just as it happens in the traditional offline setup.
Government agencies, business organizations and individuals are nowadays depending on the Internet to fulfill their obligations and business objectives. With the sophistication cyber attacks, availability of user-friendly attack tools, loopholes in legal frameworks, organized online crimes, vulnerabilities in hardware and software systems, cyber security continues to be the greatest concern.
This intensive 5-day course discusses the safeguards that should be taken to ensure that government agencies, business organizations and end users benefit from the full advantages of Internet. The course also prepares participants for security related certifications like CISA, CISM, CISSP among others.
Information Security management is poised with numerous challenges that deter it from achieving the core objectives namely:
- Authenticity which allows trustful operations by guaranteeing that the handler of information is whoever s/he claims to be.
- Confidentiality which is understood in the sense that only authorized users can access the information, thus avoiding this information being spread among users who do not have the proper rights.
- Availability which refers to being able to access information whenever necessary, thus guaranteeing that the services offered can be used when needed.
- Integrity is the quality which shows that the information has not been modified by third parties, and ensures its correctness and completeness.
A new study reveals that boardroom executives are still unaware of cyber threats, much to the chagrin of those working in information security. Information security requires a clear understanding of relevant technological issues and of the social/organizational issues, as well as the relationships between them. This workshop covers these concerns by:
- Offering modules that cover security technologies, incident response and digital investigations, network security implementations as well as information security from a management perspective.
- Providing a curriculum that is relevant to the changing needs of the Information Security industries and professions.
- Adopting the philosophy that security has to be baked in to the business – and not just at a cyber level. Security is a business issue, and has to include how people operate; how information is used (including via telephone, paper and any other way).
AFRALTI has organized Cyber Security & Risk Analysis workshop from 11th – 15th August 2014. More details as follows:
AFRALTI Member States USD950
Non-AFRALTI Member States: USD1,140