Sunteți pe pagina 1din 3

Cybersecurity Awareness

Workshop – RM 1288.00
6th November 2019 Empire Hotel Subang Jaya

Program Overview
Technology has made it increasingly easy to store, access, maintain, share &
alter information or data anytime, anywhere. This seamless flexibility is bound
to come with risks of the data falling into unwanted hands. Proper awareness
will can help negate the most common methods used by hackers to gain access
to your data.

Objective
Candidates can expect to gain knowledge and understanding in the following
upon successful completion of the education and examination components
related to this certification.
• Understand the meaning of information
• Understand the key importance of cybersecurity
• Learn the basic methods of cybersecurity
• Be cautious with information stored on electronic devices
• Be able to take appropriate security measures when using information over
electronic devices

Target Audience:
• Everyone with access to electronic devices

UNDERSTAND THE MAIN IMPORTANCE OF CYBERSECURITY

Organised By:
Cybersecurity Awareness
Workshop – RM 1288.00
6th November 2019 Empire Hotel Subang Jaya

Workshop Outline
Module 1 – Information security risks • Section 2.4 – Physical security outside the
• Introduction to Information & importance of workplace Outlines some of the information
information security concepts security risks that can be encountered when
• Network fundamentals working outside the workplace, for example
• Section 1.2 – What is information security? working from home or travelling to other
Introduces the concept of information security in locations.
practical terms with reference to the everyday • Section 2.5 – Risks of carrying electronic
workplace environment. devices Explains some of the particular risks
• Section 1.3 – Why is information security that are associated with carrying electronic
important? Gives an overview of the importance of devices such as smartphones.
information security awareness.
• Section 1.4 – Consequences of security breaches Module 3 – Computer and network security
Provides examples of some of the negative • Section 3.1 – Welcome Provides a brief
outcomes that can result from information security orientation to the topics covered in the
breaches. module.
• Section 1.5 – The essential role you play Highlights • Section 3.2 – Your computer and network
the importance of everyone in the workplace policies Emphasises the importance of
doing their part to support information security following the proper workplace policies and
policies and procedures. procedures, even if the reasons for them are
not understood.
Module 2 – Physical security • Section 3.3 – Understanding information
• Section 2.1 – Welcome Provides a brief orientation technologies Gives a non-technical explanation
to the topics covered in the module. of key terms related to computers and
• Section 2.2 – Physical security in the workplace computer networks.
Explains what is meant by physical security with • Section 3.4 – Reporting incidents or concerns
examples relevant to the workplace environment. Highlights the importance of reporting
• Section 2.3 – Security-conscious work habits computer and network security issues and
Highlights the importance of developing good responding quickly.
work habits that help to maintain physical security.

I World Technology Sdn Bhd ( 776839-H )


: C-0-5 Block C , Megan Avenue II, Jalan Yap Kwan Seng , 50450 , Kuala Lumpur
Website : www.i-world-technology.com
Tel: 03-27100038
Cybersecurity Awareness
Workshop – RM 1288.00
6th November 2019 Empire Hotel Subang Jaya

Workshop Outline Trainer Profile


Module 4 – Communications security GAJENDRABALASINGHAM
• Section 4.1 – Welcome Provides a brief orientation
Gajendra Balasingham is a ISO /PRINCE2/ ITIL
to the topics covered in the module
Expert trainer who has been a project lead and
• Section 4.2 – Communications security Introduces project manager for various regional projects in
the concept of communications security with Multi-national and local companies. He is an
examples of what it covers. accomplished ITIL/ ISO Project Consultant and
• Section 4.3 – The risks of email Highlights the risks trainer who graduated in Bachelor Degree in
that can be posed by email use, such as malicious Computer Science from Coventry University U.K.
attachments, misleading links, and phishing Gajen has consulted various organizations to
attacks. achieve ISO 20000 and ISO 27001 standards
• Section 4.4 – Communicating outside the including MNC and GLC clients Gajen has
workplace Looks at some information security risks diverse Industry knowledge in Telco, Logistics,
to be aware of when communicating outside the Banking, IT Support service, Sales and Service
workplace (for example, working from home or in desk. In his working career for past 15 years he
public places). has been actively involved in turn key projects
in the range from 5 Million USD to 50 Million
Module 5 – Personnel security USD.
• Section 5.1 – Welcome Provides a brief orientation His last role focused on DIGITAL
to the topics covered in the module. Transformation for a Regional Bank cutting
• Section 5.2 – What is personnel security across various departments. He has close to
Introduces the concept of personnel security and 10 years experience in digital transformation
outlines four main areas of risk associated with it. projects across industries of Banking,
• Section 5.3 – Social engineering Explains the Logistics and Services.
concept of social engineering and how it can be
used to breach information security. Registration
• Section 5.4 – Security procedures Makes the point
https://forms.gle/WTs8V2obsBm2rcdR7
that a significant proportion of security breaches
are caused by personnel failing to follow correct
procedures. Contact Details
• Section 5.5 – Deliberate acts Highlights the fact
that there is a risk posed by personnel deliberately SharmilaVella–0122663775
acting in ways that breach security, and that
everyone should be alert to this risk. RaajKumar –0162145440

I World Technology Sdn Bhd ( 776839-H )


C-0-5 Block C , Megan Avenue II, Jalan Yap Kwan Seng , 50450 , Kuala Lumpur
Website : www.i-world-technology.com
Tel: 03-27100038

S-ar putea să vă placă și