SECURITY

Talking Up Security At Iswec 2012 (Part 1)

7/24/2012 11:33:25 AM

Malaysia keen to be security focal point

The central theme of ISWec 2011 or the InfoSeeurity World Exhibition and Congress was the enhancement of information security against the rapid rise of cyber threats. With more than 200 booths exhibiting at the event, Malaysia has signalled its keen intent to place itself as the focal point in the region for experts and key players from the local and international industry to exchange views and ideas.

Description: Iswec 2012

Iswec 2012

At the launch, YABhg. Datin Paduka Seri Rosmah Mansor notes that Malaysia was becoming a regional hub of choice for information technology in Asia due to its strategic location, excellent infrastructure, skilled and dynamic workforce and supportive government.

"Information assets are critical to every organisation. The security and safeguarding of these assets are paramount to survive and thrive in this highly digital global economy.

The congregation of key industry players in Malaysia at the ISWec 2012 is a reflection of Malaysia's growing role as an information security hub in the Asian region," YABhg. Datin

Paduka Seri Rosmah Mansor says.

Description: YABhg Datin Paduka Seri Rosmah Mansor, wife of the Prime Minister of Malaysia

YABhg Datin Paduka Seri Rosmah Mansor, wife of the Prime Minister of Malaysia

With a reported attendance of over 5,000 local and international Channel players, buyers and trade visitors, this was a good start for a key industry event looking to be a major player in the region. The two-day tradeshow featured 160 leading brands from global industry players. Themed 'Forging New Businesses and Strategic Alliances’, ISWec 2012 serves as a platform to showcase the latest products and technologies in information security while providing delegates with updates on the latest trends and solutions to internal and external information security threats with the focus on effective management of people, processes and technologies.

Description: She says that our younger generation need to be educated about securing their personal information.

She says that our younger generation need to be educated about securing their personal information.

There were also conference sessions featuring keynote speakers allowing a platform to exchange ideas and interact with leading players in the infosecurity arena while having panel-discussions and exciting networking sessions.

Dr. Amirudin Abdul Wahab, Ministry of Science, Technology and Innovation presented the keynote address of ISWec 2012. In his keynote speech, he mentioned that the ICT industry has been entrusted with three objectives. The first objective is to spearhead the development of the ICT industry and indigenous technologies. The second objective is to strengthen the national IT ecosystem through the formulation of policies and effective time management. Lastly, is to support efforts towards making Malaysia a global ICT hub.

He stated that Cyber Security Malaysia has developed the National Cyber Security Policy with the purpose of ensuring that the nation critical national infrastructure is resilient. The Internet has altered the way business is done and we are being exposed of external threats like hacking, identity theft, fraud and spamming. This calls for effective measurement and protection to ensure business stability and it is more important now to detect threats and prevent them in order to protect personal and business information.

Phillip Victor, Director of the Centre for Policy and International Cooperation was next and he talked about ITU-IMPACT's role in bringing together all stakeholders in the fight against cyber threats. ITU is the International Telecommunication Union, whereas IMPACT is a cybersecurity organisation called International Multilateral Partnership Against Cyber Threats.

Description: Phillip Victor, Director of the Centre for Policy and International Cooperation

Phillip Victor, Director of the Centre for Policy and International Cooperation

Victor started off by showing that huge organisations and developed countries are also being hit by cybercrime. No one is being spared from this wave of cyberthreats and it is an ongoing effort to ensure that organisations are continuously updated and people are informed of the kind of threats that are being faced daily. One of the reasons why this is happening was pointed out by IMPACT: many countries do not have national CERTs or computer emergency response teams. That translates to these countries not having even a first line of defence.

Victor says that IMPACT has been helping these countries by introducing legal framework in place. But, cyber attacks are borderless and it is difficult for the laws of one government to prosecute these criminals when they are across borders. He says, “The main problem in this area is that laws are not harmonised; the cyber laws in one country may not be applied in another. There needs to be a very strong coordination among these countries and cvcr/one needs to understand that everybody plays an important role in this entire ecosystem."

He cited the Estonia DDoS (distributed denial of service) attack in 2007 as an example as it took the country two to three weeks to restore communications with the rest of the world. When Estonia detected the attacks, it was from countries which Estonia did not have any political ties with them. This is where, on a global level, cybersecurity needs platforms that can help them resolve these kinds of issue. Victor concludes that people need to look at security as a whole and it doesn't involve only one level but many levels.

Next, David Sykes, Director of Crossbeam Systems South East Asia and Pacific stepped up to discuss about security in cloud computing. He separated the cloud computing into three categories, namely public, private and hybrid.

According to Sykes, cloud computing is having your applications being installed in some place by someone so that it can be accessed from almost anywhere and at any time. Sykes says, from a security point of view, the problem with this is almost everything; when people start to move ahead with these things, overtime, history repeats itself. Security is always second in place.

Description: ISWec 2011

Security has always been in second place and the conference sessions aim to highlight the importance of it

He explains, “What tends to happen is that people tend to get carried away with an opportunity and go ahead to implement it Then businesses will realise that they are dependent on this stuff and wonder if there is enough security for this? Then they need to spend more money on it and the people who develop these applications will say it's not their problem. In quick summary, people need to step back a little bit and start thinking about putting security in right from the start"

Other  
 
Top 10
Review : Sigma 24mm f/1.4 DG HSM Art
Review : Canon EF11-24mm f/4L USM
Review : Creative Sound Blaster Roar 2
Review : Philips Fidelio M2L
Review : Alienware 17 - Dell's Alienware laptops
Review Smartwatch : Wellograph
Review : Xiaomi Redmi 2
Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
VIDEO TUTORIAL
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
Popular Tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8