image
Keterangan Program

PERIMETER DEFENSE APPROACH IS NO LONGER RELEVANT TO STAY AHEAD OF CYBERSECURITY THREATS. ZERO TRUST ARCHITECTURE - WHERE WE TRUST NOBODY UNTIL PROVEN OTHERWISE - WOULD BE THE SAFEST AND BEST APPROACH TO ADDRESS HIDDEN THREATS FROM IOT, BYOD AND NOW, BYOC (BRING YOUR OWN CLOUD). QUESTIONS TO ASK YOURSELF AS A CISO/IT HEAD/IT MANAGER/ICT SECURITY MANAGER/PEGAWAI TEKNOLOGI MAKLUMAT : DO YOU HAVE VISIBILITY OF YOUR NETWORK 24/7? REAL TIME? COULD YOU IDENTIFY - WHO IS ACCESSING YOUR NETWORK? - WHAT DEVICE IS ACCESSING INTO YOUR NETWORK? - WHERE IS THE THREAT COMING FROM? - WHEN DID THE DEVICE, THREATS ENTERED INTO THE NETWORK? JOIN US AND LEARN WHAT ZERO TRUST IS ALL ABOUT.


PENCERAMAH

image

EN. SUHADI JAMIL

CHIEF TECHNICAL EXPERT
16 Years of technical and hands on experience on Cybersecurity solutions working closely with global technical experts from Dubai, Korea, USA, London and Romania. His experience span across Endpoint Protection, Data Leakage Protections, Secure Collaborations, Artificial Intelligence SIEM, Threat Hunting, Forensic State Analysis, Network Access Control and Desktop Management. He has lead a team in delivering key projects to two Malaysian telecommunication companies, local banks and several critical government agencies.

Anjuran

INSTITUT TADBIRAN AWAM NEGARA KAMPUS UTAMA BUKIT KIARA
JABATAN PERKHIDMATAN AWAM (JPA)
JABATAN PERDANA MENTERI


Tarikh/ Masa

13-02-2020 / 8:30 Pagi

Hingga

13-02-2020 / 4:30 Petang

Bertempat

MAKMAL ICT 1, ARAS 2, BANGUNAN I-IMATEC, INTAN BUKIT KIARA Lihat peta

Bayaran

Percuma

Brochure

-Tiada-

Aturcara

muat turun

QR Code

KATEGORI
Bengkel | ICT
TERMA & SYARAT
-Tiada-