TAQNIA Cyber to host IT security workshop...TAQNIA will host the IT DNA Security Workshop 2016 on...
Transcript of TAQNIA Cyber to host IT security workshop...TAQNIA will host the IT DNA Security Workshop 2016 on...
TAQNIA Cyber to host IT security workshopIn depth program will train public and private sector cyber security professionals
Government-owned IT security specialist TAQNIA Cyber is
set to host a two-day security workshop to give security
professionals from the public and private sector the skills
to tackle the cyber threats facing Saudi Arabia.
In partnership with IT training provider Koenig Solutions,
TAQNIA will host the IT DNA Security Workshop 2016 on
23-24th May, at the King Abdulaziz City for Science and
Technology (KACST).
The workshop is targeted at cyber security experts for
banks, financial institutions, government entities, law
firms, healthcare centres, utility and transportation providers. The event will include training sessions on areas including penetration testing and vulnerability assessment, fraud detection and IT forensics.
"Every organisation in Saudi Arabia must now have a realistic plan in place, in order to protect its vital data,"
said Abdulaziz Al Sabih, director of Technology & Business Development, TAQNIA Cyber. "We believe that
education and training will play a pivotal role in creating cyber warriors. This program provides a crucial
opportunity for professionals to learn the very latest techniques for countering criminal IT fraud, which has
become highly prevalent in the region."
The program is expected to provide attendees with a 'deep-dive' to master critical IT security challenges, under
the supervision and tutelage of industry experts from Koenig. The goal of this program is to prepare security
professionals such as penetration testers and network security administrators to use advanced hacking
techniques and to learn how to identify and prevent threats before they impact their organisation. Participants
will learn how to use key forensic investigative techniques and spot potential problems through facilitated
activities like sharing, exercises, group discussions and case studies - giving them more insight on how to
identify intellectual property theft and fraudulent activities resulting from unauthorised access to sensitive
information and misuse of sensitive data.
"We are confident that cyber security professionals from the private sector, senior executives from government
entities and students from leading universities, will be walking away with a better understanding and
knowledge of offensive security strategies and techniques, industry best practices, how to develop a secure
baseline and how to harden enterprise architecture from the most advanced attacks. Koenig will continue to
remain committed towards countering and addressing growing concerns on criminal IT fraud by providing
world-class training modules to today's IT professionals in Saudi Arabia," added Aditya Girish, territory manager
- Middle East, Koenig Solutions.
The workshop will feature talks, panel discussions and round tables led by specialists who have the most up-to-
date information about the current challenges that the KSA and the rest of the region faces today. The event
will also serve as a strategic platform to highlight critical analytical techniques and methodologies adopted by
the industry in uncovering various types of IT and Intellectual Property Fraud prevention solutions. The
workshops will also showcase the workflow of these general techniques, including the significant role that
litigation support plays in fraud investigation and the move to reduce collateral organisation damage.
The training will help IT professionals to defend against
advanced cyber attacks, says Aditya Girish
Other topics to be discussed during the two-day workshop include: vulnerability assessment & penetration
testing; digital security & forensics; bypassing security defences; secret penetration testing techniques;
information security threat landscape; demo advance information gathering with Linux; spying and owning
system with rat / key logger; data recovery and evidence gathering; malware analysis process; best practices for
antivirus handling; pre attack strategies of hacking; advance vulnerability scanning techniques by ethical hacker:
demo vulnerability scanning with Nessus, and OpenVAS scanner; website security bypass and computer
forensics and best practices.