X

Required New IT Security at & after Covid19

Live Interactive Virtual Workshop,
19th-23rd April 2021

Required New IT Security at & after Covid19

-  Meet the new challenge presented to your organization & gain insights into the latest trends, best practice and essential techniques

OVERVIEW OF THE COURSE

To survive during and after the Covid19 pandemic, industry, government, academia, healthcare, and other sectors have all had to migrate to virtual (online) operations, including work from home and online meetings, using organizational infrastructures that could not safely accommodate them. This has opened huge gaps in IT security that were never expected prior to the Covid19 pandemic.

Responding to this market demand, this course will address all the critical issues in current IT security and management, including IT Security’s evolving role in organization success, work from home/remote, unauthorized data leakage, General Data Protection Regulation’s impact, Ransomware, data back up and restoration, biometrics, forensics, and VPN etc.

Latest current events and case studies will be discussed to make the learning more practical, interactive, and effective.

Understanding different organizations and executives face different challenges with some different learning needs, we will keep the class size small so that we can customize course content to meet your needs. We will use Pre-course Questionnaires etc to understand your learning objectives in advance.

By the time the course ends, you will become comfortable with the current new challenges presented to your organization, and gain insights into the very latest trends, best practices and essential techniques in IT Security. You will get answers to your questions that you can then apply to your own work right away. All these will help bring success to your organization as well as your career development.

Led by World-Class Expert

Dr. Michael Caloyannides

  • Over forty years of experience in Information Security at the highest levels of Industry, Academia and Government
Senior Consultant, NASA, USA
Former Chief Scientist, US Government
Adjunct Professor, John Hopkins University

 

Dr. Caloyannides’ accolades include
  • “Scientist of the Year” awarded when he worked as Senior Scientist for an Agency of the US Government
  • Best Teacher of Johns Hopkins University
  • Advising the US Government on all aspects of Network Security, Forensics and Biometrics
  • Testified in numerous courts as expert witness and won jury verdicts of tens of millions of dollars for his clients in patent infringement lawsuits against giants like ZTE, Apple and Huawei
  • Being referred to as the “Western World’s Pre-eminent Expert”

Course Format
This course will be held in a highly interactive workshop format for a small group. Real events discussion & case studies will be an important part of the workshop.

Workshop Set-up & Facilitation
Registration will be closed 5 days before workshop date for necessary pre-course communication. We will utilize full features of Zoom etc to make the workshop interactive and effective. The entire workshop will be live to facilitate Presentations, Case Studies, and Discussions.

Pre-course Questionnaire
Dr. Caloyannides would like to customize the class based on your specific needs. Pre-Course Questionnaire will be sent to you prior to the workshop to complete. Dr. Caloyannides will analyze them in advance and plan content accordingly.

Level of Presentations
The presentations will be specially designed not to require any technical background as a must. Where the subject matter’s nature is highly technical, all the required introductory background will briefly precede such discussions. The speaker is well known for his ability to explain highly technical concepts in terms that anyone can understand.

Special Post-workshop Complimentary Support
Dr. Caloyannides will be happy to receive and answer enquiry from you (delegates) after the workshop about information security to support your continuous learning at work, free of charge.

PROGRAM TIMETABLE (19th-23rd April 2021)

For GMT+8 time zone, on 19th, 20th, 21st and 22nd, Program starts at 9am and finishes at 1pm; on 23rd, Program starts at 9am and finishes at 4pm.

Registration opens at 8.45am daily. Tea breaks in each morning, lunch break on 23rd only.

For other time zones, kindly adjust accordingly.

For a copy of the FULL AGENDA, please send email to: hayat@neo-edge.com
Or please call us at Tel: +65 6282 7082

This course includes comprehensive 17 Modules. We will customize the actual course content based on participants’ interested areas and specific learning needs. Class size will be kept small for this reason. Pre-Course Questionnaire will be sent to you prior to the workshop to complete. We will analyze them in advance and decide which modules to invest more time in accordingly.

The 17 Modules are as following:

  1. LATEST CURRENT EVENTS IN IT SECURITY, WHAT IMPLICATIONS
    • The Facebook and Cambridge Analytica cases
    • The BEC $100 million attack
    • Norsk Hydro paid $40 million for Ransomware
    • The Marriott hotel chain hack that compromised 500 Million accounts.
    • The loss of 19.8 million accounts by Commonwealth Bank of Australia/
    • The loss of tens of millions of records by the US Office of Personnel Management that included those of most employees of US Intelligence Agencies
    • The Equifax Credit Bureau Data Breach that compromised 147 Million individuals
    • Singapore General Hospital system hacked
    • SPECTRE and MELTDOWN IT vulnerabilities
    • Other data collectors
    • RANSOMWARE. A continuing serious threat to banks, hospitals, and others. Individuals as well.
    • Cryptojacking (stealing crypto currency like Bitcoins). Case studies
    • Shielded rooms: do they provide the needed security? It depends
    • Internet-voting
    • The Pakistani bank card IT attack
    • The Toyota Australia healthcare group attack.
    • BGP and DNS attacks
    • Facebook’s multibillion dollar fines for lax IT security
    • Japan’s credit card fraud IT attack
    • The “WannaCry” IT attack. Lessons learned. Fixes
    • The IT attacks on the Australian Parliament network
    • The dangers of data-centric IT security
    • Airbus IT hack
    • Boeing Dreamliner IT vulnerabilities
  2. WHY 2021-LEVEL I.T SECURITY IS AN EXISTENTIAL MATTER OF SURVIVAL FOR ORGANIZATIONS NOW
    • Industry, Government and Academia all migrated to Online. The old corporate firewall is ineffective now. Case studies and lessons learned
    • Attacker has an inherent advantage over defender
    • IT security is a constantly moving target; one must anticipate and prepare, or suffer dire losses
    • Substantive security vs. “security theater”. Case studies
    • Many IT “experts” do NOT know about non-software IT attacks (e.g., attacks based on basic Physics)
    • Typical IT security person today can only prevent a recurrence of last year’s attacks, not tomorrow’s attacks, false sense of security. Case studies and lessons learned
    • The IT environment has changed drastically and continues to evolve every hour:
    • New international legal IT Security frameworks that Asian organizations have to comply with to do business abroad
      • The GDPR (European General Data Protection Regulation) impact on all international companies
      • The weakest link: a compromised employee
    • Other hacked and hackable IT-based items. Deadly attacks
    • IT Security vs. Privacy. Where to draw the line?
  3. LEGACY IT SECURITY IS TOTALLY INADEQUATE TODAY AND IN THE FUTURE
    • Different threat perpetrators must be protected from differently:
    • No legacy IT security can protect from the authorized malicious insider. Case studies
    • The IT threat is NOT only “out there” but, worse yet, inside already
    • “We don’t know what we don’t know”. Today’s attacks were not known yesterday.
      • Case studies. Europe’s GDPR, US laws, Zero-day attacks.
      • Lessons learned
    • IT Security of essential vendors of your software, hardware, that you depend
    • Your IT network WILL be successfully attacked. There is no such thing as “impenetrable security”; you need SURVIVABILITY. How to implement survivability. Dos and don’ts.
    • An organization’s network is no longer under the full control of its own network because:
    • Data theft means are nearly undetectable and will be even less detectable tomorrow
      • USB-C “thumb-drives” and totally wireless equivalents are extremely small
      • Vast number of openly available links to transmit information undetected. Remote off-site employees cannot really be monitored
      • Case studies and lessons learned
    • Amazon/Google and others can listen-in to Alexa, Echo, etc
    • Legacy IT “firewalls” are ineffective and give a false sense of security
  4. IT SECURITY ALONE IS LIKE LOCKING DOWN THE FRONT DOOR AND LEAVING ALL OTHER ENTRY POINTS UNSECURED – EMPLOYEES, PERSONNELS, VENDORS ETC
    • Employees tend to look at organization security personnel as adversaries
    • Personnel security (investigations, reinvestigations, protective measures)
    • Special personnel issues: Malicious sysadmin, fired or laid off employees, industrial espionage. Case studies
    • Vendors, contractors and repairmen. Case studies and lessons learned
    • Employee-owned equipment (laptops, mobile phones) used to access network. Case studies and lessons learned
    • You cannot have IT security unless you also have physical security for the IT terminals, servers, etc. Legacy physical security is inadequate. Case studies and recommendations
    • Intrusion detection (Motion sensors. IR sensor vulnerabilities, video surveillance shortcomings and countermeasures). How they can all be defeated. Case studies
    • Physical security of employee-owned equipment is resisted by most employees
    • Side-channel leaks and attacks. Boffins.
    • Wireless security (WiFi, 4G, 5G, satellite links, Infrared links)
  5. WORKING FROM HOME/REMOTE IT SECURITY CONCERNS
    • Danger to the organization
      • The organization’s firewall is effectively extended worldwide
      • Some dangers and threats CANNOT be eliminated
    • Danger to the individual worker
      • Psychological. Feeling of being constantly on a “Big Brother is watching” leash.
        • Fine for “worker ants” but intolerable to creative thinkers and contributors
        • Feeling of isolation, loneliness, “not being appreciated”, must be prevented through regular person-to-person meetings (“Zoom”, as a minimum).
    • Different scenarios need different solutions:
      • University students. How to handle exams, cheating, etc.
      • Commercial employer employees. See below.
      • Medical doctors reviewing medical records (X-rays; ab results, etc.)
      • Expert Witness online depositions by opposing counsel.
        • Case study discussion.
    • PROTECTIVE MEASURES
      • Security vs. convenience discussion
      • Security vs. employee privacy discussion
      • Employee laptop must be owned and fully controlled by employer’s IT staff.
      • Expert Witness online depositions by opposing counsel.
        • No employee-owned personal equipment, despite the economic appeal to employers
        • Use of encryption: Full Disk Encryption (FDE) recommended, but employer must have Additional Decryption Key (ADK). If laptop is lost or stolen, then no harm is done.
        • How to maximize the chance of compliance?
  6. RANSOMWARE
    • It is blackmail through the Internet: “Unless you do this (pay up, etc.), I will do that (delete, refuse to decrypt, publicize, etc. your files)”
      • Can be deadly if hospital patient records are stolen and ransomed
      • Can be just a scary nuisance to be ignored
      • In PCs, MACs, and even Smartphones
      • Types of ransomware
    • Ransomware and brief discussion of each
      • PCCyborg
      • GpCode
      • WinLock
      • Reveton
      • CryptoLocker
      • Ryuk
      • Sodinokibi
      • GandCrab (has evolved through several versions)
      • Goodkit Banker (attacked German users)
      • REvil
      • RegretLocker (can encrypt Windows VIRTUAL hard drives
      • Ransomware now sold as a business to would—be attackers
      • LockAndCode S1Ep19
      • Hospital Ransomware
    • Can enter your computer or server through:
      • Social engineering
      • Threatening emails: “I activated your laptop camera and saw you doing… Pay up or else”
      • Attacker can masquerade as legitimate or law enforcement source
      • You do NOT even need to click on a URL or attachment
      • Malvertising (use of online advertising to deliver malicious content). Anyone can do it
      • Malicious span email with a contaminated attachment that appears legitimate
    • Examples of sophisticated ransomware: Spora, WannaCrype (“Wannacry”), Petya. Cerber, Locky, “Bad Rabbit”
    • How to protect from ransomware
      • Importance of regular backups. But that is not a cure-all: The Caltech White Hat Attack
      • The SPNB Bank case study in California
      • Do not pay the ransom UNLESS lives are in imminent danger
      • Ransomware insurance: a business decision
    • An ounce of prevention is worth a pound of cure: Education of users
  7. DETECTING UNAUTHORIZED DATA LEAKAGE, TRANSMITTAL OF DATA TO A COMPETITOR
    • Data leakage has many avenues; extremely hard to detect if someone receives no compensation for his/her misdeeds. Case studies at CIA, NSA
    • Old-fashioned means of data exfiltration
    • Use of VPNs
    • Use of Proxy Servers
    • Use of the Dark Web. What it is and isn’t
    • Use of custom apps in mobile phones
    • Use of assorted social media
    • Use of political-dissenter support networks (UltraSurf, etc.)
    • Use of short-range RF (WiFi, Bluetooth, other)
    • Use of IR or UV short range links
    • Use of TOR, WhatsApp, Signal, Telegram apps
    • Detecting a suspected employee’s use of an identified PC
    • Incentivizing fellow employees to report alerting conduct. Do’s and don’ts
    • The security problems with having a department printer
  8. ESSENTIAL TECHNOLOGY ASSIST TO IT SECURITY. Do’s and Don’ts
    • Biometrics (fingerprints, voiceprints, palm-prints, retinal scans, iris scans, facial recognition, gait, signature, handwriting, writing style. others)
      • No “one-size-fits-all”: Is biometrics desired to use to:
      • Description of each and assessment.
      • Biometrics goes back thousands of years
      • How different biometrics work
      • Case studies of impressive successes of large-scale biometrics
      • Societal aversion to biometric identifiers
    • Two-factor authentication. Not a cure-all: Reddit was hacked
    • Benefits of integrating multiple biometric technologies
    • Locks, alarms, sensors motion sensors. How they can be fooled. Countermeasures
  9. COMPUTER AND MOBILE PHONE FORENSICS
    • For computers: what it is and how it is done and when
      • Beware of self-appointed “forensics experts”
      • Widespread use of “Encase”, worldwide
      • FTK (for Unix computers)
      • USB “thumb-drives” for “on the spot” quick forensics
      • Broadly available software tools
      • Keystroke interception and countermeasures
      • “Deleting” does not delete. “Formatting” disk does not usually delete
      • Totally different protocol needed for assisting in prosecution than for other reasons (intelligence collection, administrative reasons, etc.)
      • Counter-computer-forensics that defeat computer forensics (software, hardware, other). Case studies and lessons learned
      • Police forensics on computers and cellphones. Countermeasures
      • “Data in RAM is safe after computer has been turned off”: Not quite
      • Effective countermeasures
      • Legal defense from frivolous accusations based on computer forensics
    • For Mobile Phones
      • Vast number of models over the years, each requiring a custom hardwire interface to do forensics on that model.
      •  Countermeasures
  10. NETWORK FORENSICS. How not to do it
    • You cannot do forensics on a network that you don’t know where it extends to. An organization’s network is no longer under the full control of its own network because:
    • Must decide up front if your intent is to:
    • You must anticipate a network attacked and be prepared for it
    • Most attacks will come from someone else’s network, likely in a foreign country, and you will get no cooperation from that other network’s staff
    • Methods of detection
    • First responder protocol
    • Some Intrusion Detection Tools
    • Freezing the scene in order of volatility: save most perishable data first
    • Case studies and lessons learned
  11. ENCRYPTION
    • Must decide upfront:
    • Types, different purposes. When to use what. (File encryption vs. link encryption vs. disk partition encryption, vs. Full Disk Encryption).
    • “Snake Oil” encryption
    • Superencryption (encryption on top of other encryptions)
    • Key distribution problems in legacy encryption
    • Legalities vary by country and within a country
      • The Crypto wars between end users and governments. Case studies
    • Additional Decryption Key (ADK), Master Key, other
    • What if employee refuses to surrender his/her key after leaving the organization?
    • What encryption does NOT protect from and is worse than no encryption at all. Case studies
    • Symmetric vs. Public Key Encryption
    • Commercial algorithms’ assessment (DES, 3DES, AES, hybrids, etc.)
    • A mathematically provable unbreakable encryption
    • Digital digests and their exploitable weaknesses
    • Encryption is illegal in some countries and attracts undesired attention in most countries anyway. Steganography and other workarounds
    • Non-cryptanalytic threats to encrypted files. THIS IS SERIOUS
      • Hidden cameras aimed at screen or keyboard
      • Keystroke- and screen-loggers
      • RF emanations of all electronic data processing equipment. Range
      • Poorly chosen encryption keys
      • False sense of security from PKI implementations
      • Case studies and lessons learned
  12. VPNs
    • General
      • What VPNs are and what they are not
      • Why use VPNs
      • They are not panacea. They protect from a lot but introduce one new serious threat
        • Terminate VPN at firewall or inside the private network? Pros and Cons
      • Expectations:
        • Authentication
        • Access Control
        • Confidentiality (from whom?)
        • Data integrity
        • Any effect on throughout speed?
    • PPFP. Not as secure as IPSec
      • No key management
    • L2F/I2TP. Pros and Cons
    • SOCKS5
      • Split Channel IT security threat; Fixes
    • NAT issues in IPv4
      • How NAT boxers work
      • Some laughable legal concerns
  13. WIRELESS IT THREATS TO SECURITY
    • What is your reason for using wireless?
      • As a rarely used backup in case of landline failures?
      • Wi-Fi to cut costs of wiring a building for data communications?
      • When travelling?
    • Interception
      • Of sensitive data
      • Of personal data (medical, contacts lists)
      • Of organizational login information so as to login an unauthorized user later
      • Countermeasures and their respective operational and legal implications:
    • Jamming
      • Jam when, why, for how long and from how far away?
      • Legalities
      • Jam what?
      • Nobody can jam all frequencies
      • Basic physics prevents anyone from jamming an entire large geographical area
      • A primer on RF propagation
  14. ELECTRONIC ANONYMITY. An ill-posed request
    • Important when travelling with your organization’s confidential data
      • Case studies of robust industrial espionage
      • Countermeasures
    • Anonymity from whom?
      • For a single act or for a long time? How long? Where?
      • What assumptions about adversary? Case studies and lessons learned
    • Mobile phone anonymity
      • No; swapping SIMs does NOT give anonymity
      • IMEI issues
      • Geolocation pattern issues. Case studies and lessons learned
      • Mobile phone’s advertising unique identifier
      • Usage-based compromise of anonymity. Case studies
    • PC use anonymity: Mission impossible unless…
      • SSL/TLS does not anonymize you
      • VPNs do not anonymize you
      • “Wiping” your computer is ineffective unless…
      • What are you up against determines what you must do. Are you up against:
    • Personal conduct anonymity. Near impossible unless…
      • Credit and debit card usage leaves a clear and identifying trail
      • Loyalty cards (frequency flyer, frequent buyer, etc.)
      • Personal habits and tell-tale patterns of preferences
  15. VULNERABILITIES OF CORPORATE AND ORGANIZATIONAL USE OF MOBILE PHONES
    • 2G, 3G, 4G/LTE, 5G Primer. Mobile phones are extremely busy communicating with nearest cellular towers even when mobile phones appear to be “doing nothing”
    • MIMO antennas, BSRs, data rates
    • Police use of fake cellular towers to intercept. (“Stingray”)
    • Remote activation of targeted mobile phones’ microphones and cameras
    •  “The Athens Affair”, publicized successful cellular network attack on a national mobile phone network. Lessons learned
    • Commercial availability of “cryptophones”
      • Dutch police bust cryptophone operation
      • Weaknesses of popular cryptoapps in iPhones and Android phones for “end-to-end encryption”: WhatsApp, Signal, Telegram, Threema, native iMessages, other
    • Protective countermeasures
      • Must not be alerting in and by themselves
      • Must be explainable
      • Must be effective
      • Inevitably, they will be inconvenient
  16. CARD-ACCESS SYSTEMS INSCURITY (IT Server room access, parking lot access, hotel room access, ATM Access, etc.)
    • How IT attacks on ATMs are done
      • Card theft
      • Copying access cards:
      • Burglary
      • Transaction Reversal
      • Brute force removal
      • “Skimming” devices and countermeasures
      • Shoulder surfing
      • Using a fake pin pad overlay and countermeasures
      • PIN interception and countermeasures. Fake PIN pad overlay.
        • Thermal imaging technology
        • Transaction Reversal and countermeasures
        • ATM Burglary
    • Countermeasures of varying effectiveness
      • Sensors, INK dye
      • Physical and electronic locks
      • Preventing fake-PIN overlay
      • Video monitoring (discussion)
      • Means for detecting skimming
    • ATM defrauding a customer Case Study
    • The threat is NOT only financial but:
      • Creation incriminating fake “evidence” against you
      • Case studies. How to defend
  17. OFFICIAL RECOMMENDED IT SECURITY PRACTICES (ALL OPEN-SOURCE)
    • NIST Recommendations
    • NSA Recommendations
    • Speaker’s recommendations

 

 

For a copy of the FULL AGENDA, please send email to: hayat@neo-edge.com
Or please call us at Tel: +65 6282 7082

About The Expert Trainer

 

Dr. Michael Caloyannides

  • Over forty years of experience in Information Security at the highest levels of Industry, Academia and Government
Senior Consultant, NASA, USA
Former Chief Scientist, US Government
Adjunct Professor, John Hopkins University

Dr. Caloyannides has over forty years of experience in Information Security at the highest levels of Industry, Academia and Government. He is a world-class expert in both information technology and telecommunication world. He excels in a number of areas including covert communication that others don’t.

Academia: He holds a PhD from Caltech in Electrical Engineering and Applied Mathematics. He is Adjunct Professor for Johns Hopkins University, where he teaches numerous classes in information technology and information security. He received “Teaching Excellence Award” in Johns Hopkins University.

He was also adjunct faculty for George Washington University, where he taught classes in Information Assurance, and earlier, for George Mason University and California State University.

Industry & Government: Before his current role, CTO of Caloyannides Consulting, LLC., he had worked at top technical and management level such as Head of Infosec Department at Boeing Aircraft, Rockwell International and Mitre Corp. etc.

For fourteen years he worked as Senior Scientist for a part of the US Government, where he was awarded the Scientist of the Year award in addition to five separate Certificates for Exceptional Accomplishment. He has also been a consultant to NASA/NIAC where he has been evaluating proposals relating to deep space exploration.

Independently, Dr. Caloyannides has also consulted

  • on the information security aspects of the new Boeing 787 DreamLiner.
  • on Social Security System for Philippines Government, National ID Card and Baghdad Residency Credential for Iraq Government and Nuclear Research Center for Greek Government
  • for a number of other leading international and US organizations including Defense Advanced Research Projects Agency (DARPA), National Science Foundation, Sprint, Samsung, Intracom Inc., Northrop Grumman, Oldcastle Prefab, Steptoe and Johnson etc.
  • as an Expert Witness in patent litigation cases on topics related to telecommunications and information security involving giants like ZTE, Huawei and Apple. He is presently retained in several ongoing such cases.

Publications and Presentations: Dr. Caloyannides has published two books on computer forensics, one in its second edition, and has contributed chapters on information security in other books. He has published numerous technical papers in professional journals, including monthly articles during the first two years of “Security and Privacy”, a publication of the Computer Society of the IEEE (Institute of Electrical and Electronics Engineers) where he is now an associate editor.

He has given countless invited presentations around the world including in Singapore, Indonesia, Thailand, Dubai and Greece, and is particularly aware of Infosec issues in Asian countries.

He has given an invited presentation on information security at NASA’s Jet Propulsion Laboratory, as well as a globally webcast presentation on Forensics for the National Science Foundation. He has also given a presentation on forensics to the US federal judges in Alexandria, Virginia, and some ten presentations on Infosec to military audiences at the US Armed Forces Electronics and Communications Association.

For a copy of the FULL AGENDA, please send email to: hayat@neo-edge.com
Or please call us at Tel: +65 6282 7082

This course is specifically designed to meet the needs of a broad spectrum of professionals, both non-technical and technical, who now have to deal with online operations, including Senior Executive, Head of Department and Technical Manager in the corporate world, government, police, and intelligence agencies whose duties include information assurance management of sensitive information, in banking, healthcare, and practically all other sectors. You will learn to integrate digitalization into key business initiatives and benchmark your organization’s security and efficiency levels to achieve sustainable development.

For example, in addition to corporate clients, most of who have experienced a seismic shift in their operations because of Covid19, this unique course will also be of great benefit to banking officials who need to know and fix the weaknesses of their networks and procedures, to know and prevent the new plague of ransomware, and to prevent compromised employees from exploiting the vast amount of funds now transferred online.

The course is also intended for auditors, law enforcement and intelligence professionals who need to know the latest techniques used by their targets of interest to hide data either at rest (in computers and other digital devices, both physically at rest and while traveling) or in transit (while communicating with their cohorts); also, for lawyers who need to be aware of ways to defend their clients from unjust accusations based on mistakenly assessed forensically obtained evidence.

Equally important, this course is also intended for the individuals and entrepreneurs who are under increasing existential threat of theft of their intellectual property that is the basis of their livelihood.

 

For a copy of the FULL AGENDA, please send email to: hayat@neo-edge.com
Or please call us at Tel: +65 6282 7082

Benchmark with the world’s best!

This course will address all the critical issues in current IT security and management, including IT Security’s evolving role in organization success, work from home/remote, unauthorized data leakage, General Data Protection Regulation’s impact, Ransomware, data back up and restoration, biometrics, forensics, and VPN etc.

You will learn to integrate digitalization into key business initiatives and benchmark your organization’s security and efficiency levels to achieve sustainable development.

Latest current events and case studies will be discussed to make the learning more practical, interactive, and effective.

Understanding different organizations and executives face different challenges with some different learning needs, we will keep the class size small so that we can customize course content to meet your needs. We will use Pre-course Questionnaires etc to understand your learning objectives in advance.

By the time the course ends, you will become comfortable with the current new challenges presented to your organization, and gain insights into the very latest trends, best practices and essential techniques in IT Security. You will get answers to your questions that you can then apply to your own work right away. All these will help bring success to your organization as well as your career development.

Course Format
This course will be held in a highly interactive workshop format for a small group. Real events discussion & case studies will be an important part of the workshop.

Workshop Set-up & Facilitation
Registration will be closed 5 days before workshop date for necessary pre-course communication. We will utilize full features of Zoom etc to make the workshop interactive and effective. The entire workshop will be live to facilitate Presentations, Case Studies, and Discussions.

Pre-course Questionnaire
Dr. Caloyannides would like to customize the class based on your specific needs. Pre-Course Questionnaire will be sent to you prior to the workshop to complete. Dr. Caloyannides will analyze them in advance and plan content accordingly.

Level of Presentations
The presentations will be specially designed not to require any technical background as a must. Where the subject matter’s nature is highly technical, all the required introductory background will briefly precede such discussions. The speaker is well known for his ability to explain highly technical concepts in terms that anyone can understand.

Certificate of Attendance
Upon the successful completion of this course, you will receive an e-Certificate of Attendance bearing the signatures of both Dr. Caloyannides and the Course Organizer. This Certificate will testify your endeavor and serve towards your professional advancement.

Special Post-workshop Complimentary Support
Dr. Caloyannides will be happy to receive and answer enquiry from you (delegates) after the workshop about information security to support your continuous learning at work, free of charge.

 

For a copy of the FULL AGENDA, please send email to: hayat@neo-edge.com
Or please call us at Tel: +65 6282 7082

Knowledge Partner

Oxford Business Group (OBG) is a global publishing, research and consultancy firm, which publishes economic intelligence on the markets of Latin America, the Middle East, Asia, and Africa.

OBG offers comprehensive analysis of macroeconomic and sectoral developments, including banking, capital markets, energy, infrastructure, industry and insurance.

OBG’s acclaimed economic and business reports are the leading source of local and regional intelligence, while OBG’s online economic briefings provide up-to-date in-depth analysis. OBG’s consultancy arm offers tailor-made market intelligence and advice to firms operating in these markets and those looking to enter them.

Event Endorser

MCLI was established in 2004 by infrastructure investors, users and service providers on the Maputo Corridor to address constraints hindering freight movement and to market the viability of the corridor for regional trade. Its partnership of public and private sector members and proactive role has resulted in visibility, credibility and acknowledgement as a model corridor management institution.

Resulting from investment in key infrastructure, the corridor has been a powerful instrument of regional and economic integration; with over $5billion invested in the region since its inception, resultant capital flow has provided sustained economic growth on the corridor in recent years.

Inherent to MCLI’s success is its leveraging of relationships at the highest level to pursue its vision of a cost effective, reliable logistics route. www.mcli.co.za

Media Partners

MySecurity Media
www.mysecuritymedia.com
A dedicated media provider for security and technology professionals, as well as end-users across multiple channels. Stay updated by downloading the MySecurity Media app now!

MySecurity Marketplace
www.mysecuritymarketplace.com
Connecting security and technology professionals to the latest events, education and technology across a global security domain.

Video & Podcast

The MySecurity TV Channel delivers news, interviews, events and topical videos to 2,000+ subscribers on subjects across the security and technology domains and for all MySecurity Media channels.

Commenced in November 2017, the Cyber Security Weekly Podcast has surpassed 180 interviews and provides regular updates, news, trends and events. Market reach is to 150+ countries, with top countries being USA, UK, Canada, Australia, Singapore, Germany, India, Netherlands and France. Each episode achieves 2,500+ to 3,500+ downloads subject to topic interest.

Cyber Risk Leaders

A dedicated channel for Boards, C-Suite Executives and Cyber Risk Leaders to highlight cyber threats as a key business issue.

Chief IT

We cover the Channel Partner ecosystem with a natural focus on Cloud Computing, Big Data, Internet of Things and fast emerging technologies.

Asia Pacific Security Magazine

The Asia Pacific Security Magazine maintains a strong focus on regional events and trends. Published since 2010, the APSM has developed a global reputation for quality content and is distributed across all digital channels.

ASEAN Tech & Sec

Technology and Security channel focused on Southeast Asia and the 10 ASEAN member nations.

Australian Cyber Security Magazine

The Australian Cyber Security Magazine covers the broad domain of cybersecurity with news, updates and contributed articles from leading security professionals from across the world. The Editorial importantly sets the scene for a challenging threat landscape, with continued reports of serious data breaches. Enjoy the read!

Australian Security Magazine

The Australian Security Magazine is the country’s leading government and corporate security magazine. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all security professionals.

 

For a copy of the FULL AGENDA, please send email to: hayat@neo-edge.com
Or please call us at Tel: +65 6282 7082

Venue: Online Virtual Workshop, Your Computer

 

For a copy of the FULL AGENDA, please send email to: hayat@neo-edge.com
Or please call us at Tel: +65 6282 7082


Delegates Details  
1.
 
 
2.
 
 
3.
 
 
   
Company Details
   
   


(By email promotion, online publicizing or referring etc; please specify in the box)
   
* Denotes mandatory field
# We understand that we need to pay delegate fee for attending this event.