image
Keterangan Program

IN THE MODERN INTERCONNECTED WORLD, WE RELY HEAVILY ON TECHNOLOGY.
WE USE VARIOUS SOFTWARE SOLUTIONS AND APPLICATIONS TO PERFORM OUR DAILY BUSINESS TASKS.
WE USE DESKTOP, WEB AND MOBILE APPLICATIONS TO HELP US BUILD OUR BUSINESS BRANDING, ACHIEVE OUR BUSINESS GOALS, INCREASE ACCESSIBILITY AND IMPROVE CUSTOMER SERVICE EXPERIENCE.
WITH ADVANCEMENTS IN TECHNOLOGY, HACKERS ARE BECOMING MORE SKILLED AT FINDING HOLES AND CRACKS IN CORPORATE SECURITY SYSTEMS AND CAN GAIN ACCESS TO PROTECTED FILES AND DATA, POSING A SIGNIFICANT CYBERSECURITY THREAT.
THEY WILL BE MORE CREATIVE TO ANALYZE SYSTEM AND APPLICATIONS UPSIDE DOWN AND INSIDE OUT LOOKING FOR EVEN THE SMALLEST WEAK SPOTS THAT THEY CAN ABUSE FOR THEIR PURPOSES.
THAT CAN BE JUST A SINGLE VULNERABLE LINE OF CODE IN THE APPLICATION TO COMPROMISE APPLICATION, SYSTEM AND DATA.
THE BEST WAY TO ENSURE THAT OUR APPLICATIONS ARE FREE FROM SECURITY VULNERABILITIES IS TO PERFORM A COMPREHENSIVE AUDIT OF APPLICATION SOURCE CODE CALLED SOURCE CODE SECURITY ANALYSIS (SAST).
SAST IS A CONVENIENT WAY TO CHECK OUR APPLICATION SOURCE CODE FOR VULNERABILITIES AND SECURITY FLAWS THAT COULD PRESENT A RISK FOR YOUR BUSINESS.


PENCERAMAH

image

ENCIK NURFITRI ALI BIN SALEH

SENIOR SECURITY CONSULTANT
• Diploma in IT and Computer Science • Certifies Deny All Specialist • Microsoft Certified Partner for Designing Security for Microsoft Networks • Microsoft Certified Partner for Planning, Implementing and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure • Certified IXIA – Introduction to txload • Guest Speaker for IT Security Awareness

Anjuran

INSTITUT TADBIRAN AWAM NEGARA KAMPUS UTAMA BUKIT KIARA
JABATAN PERKHIDMATAN AWAM (JPA)
JABATAN PERDANA MENTERI


Tarikh/ Masa

24-06-2019 / 9:30 Pagi

Hingga

24-06-2019 / 1:00 Petang

Bertempat

SPEAKER'S CORNER,I-IMATEC, INTAN BUKIT KIARA

Bayaran

Percuma

Brochure

-Tiada-

Aturcara

muat turun

QR Code

KATEGORI
Seminar | ICT
TERMA & SYARAT
-Tiada-