TAQNIA Cyber to host IT security workshop

In depth program will train public and private sector cyber security professionals

Tags: Banking and financeKoenig Solutions (www.koenig-solutions.com/)Saudi ArabiaTAQNIA Cyber (www.taqniacyber.com/)
  • E-Mail
TAQNIA Cyber to host IT security workshop The training will help IT professionals to defend against advanced cyber attacks, says Aditya Girish.
By  Mark Sutton Published  May 22, 2016

Government-owned IT security specialist TAQNIA Cyber is set to host a two-day security workshop to give security professionals from the public and private sector the skills to tackle the cyber threats facing Saudi Arabia.

In partnership with IT training provider Koenig Solutions, TAQNIA will host the IT DNA Security Workshop 2016 on 23-24th May, at the King Abdulaziz City for Science and Technology (KACST).

The workshop is targeted at cyber security experts for banks, financial institutions, government entities, law firms, healthcare centres, utility and transportation providers. The event will include training sessions on areas including penetration testing and vulnerability assessment, fraud detection and IT forensics.

"Every organisation in Saudi Arabia must now have a realistic plan in place, in order to protect its vital data," said Abdulaziz Al Sabih, director of Technology & Business Development, TAQNIA Cyber. "We believe that education and training will play a pivotal role in creating cyber warriors. This program provides a crucial opportunity for professionals to learn the very latest techniques for countering criminal IT fraud, which has become highly prevalent in the region."

The program is expected to provide attendees with a 'deep-dive' to master critical IT security challenges, under the supervision and tutelage of industry experts from Koenig. The goal of this program is to prepare security professionals such as penetration testers and network security administrators to use advanced hacking techniques and to learn how to identify and prevent threats before they impact their organisation. Participants will learn how to use key forensic investigative techniques and spot potential problems through facilitated activities like sharing, exercises, group discussions and case studies - giving them more insight on how to identify intellectual property theft and fraudulent activities resulting from unauthorised access to sensitive information and misuse of sensitive data.

"We are confident that cyber security professionals from the private sector, senior executives from government entities and students from leading universities, will be walking away with a better understanding and knowledge of offensive security strategies and techniques, industry best practices, how to develop a secure baseline and how to harden enterprise architecture from the most advanced attacks. Koenig will continue to remain committed towards countering and addressing growing concerns on criminal IT fraud by providing world-class training modules to today's IT professionals in Saudi Arabia," added Aditya Girish, territory manager - Middle East, Koenig Solutions.

The workshop will feature talks, panel discussions and round tables led by specialists who have the most up-to-date information about the current challenges that the KSA and the rest of the region faces today. The event will also serve as a strategic platform to highlight critical analytical techniques and methodologies adopted by the industry in uncovering various types of IT and Intellectual Property Fraud prevention solutions. The workshops will also showcase the workflow of these general techniques, including the significant role that litigation support plays in fraud investigation and the move to reduce collateral organisation damage.

Other topics to be discussed during the two-day workshop include: vulnerability assessment & penetration testing; digital security & forensics; bypassing security defences; secret penetration testing techniques; information security threat landscape; demo advance information gathering with Linux; spying and owning system with rat / key logger; data recovery and evidence gathering; malware analysis process; best practices for antivirus handling; pre attack strategies of hacking; advance vulnerability scanning techniques by ethical hacker: demo vulnerability scanning with Nessus, and OpenVAS scanner; website security bypass and computer forensics and best practices.

For registration, please visit www.itdnasecurity.com

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code