The importance of cyber security in
Tanzania is increasing due to country’s rapid development. More and more
businesses and government institutions are conducting their activities online
and, therefore, relying heavily on information technology. Smooth business
activity often depends on a smooth functioning of IT infrastructure:
inoperative applications, such as financial systems, e-mail or any other kind
of database failure may cause many problems, lead to financial loss or even
disrupt the activities of an organization. Rise in mobile money transactions,
increasing importance of data and IT infrastructure's availability also
heighten security concerns.
Furthermore, the scope, dynamics, and
harm to organisations inflicted by cyber attacks have been intensively growing
during the last years. The nature of the threats has changed significantly:
before random attacks were dominant, now - targeted to certain persons or their
groups, organisations. Cyber-crime is getting more industrialised, data leakage
is becoming especially frequent.
As a consequence, international
community is uniting and seeking for cooperation in order to stop cyber-crimes.
European experience is very important for East Africa because manifestations of
similar cyber threats are already present (data leakage, DDoS, resilience
issues) while readiness to withstand them is still very low.
In order to assist organisations in
creating a secure digital environment in Tanzania and whole East African region
as well as maintaining trust of both citizens and foreign investors, ISACA
Tanzania Chapter together with Norway Registers Development AS is organising
intensive three-day training on critical security controls or penetration
testing for information security professionals, information systems
auditors, IT risk professionals and IT enthusiasts.
This event will help to get organizations up to speed in information
security and prepare them to react appropriately and minimize the damage in
case of a security incident. Motivating educational programmes are designed
with a reference to the best security practices, standards of business ethics,
legal regulations and principles of business continuity. Introductory security
courses educate on the current cyber threats, the attack cycle, defence techniques,
risk management, forensic challenges and incident response planning among many
other things. Furthermore, during the event the biggest, industry leading cyber
security vendors will showcase their state-of-art technologies. In addition,
participants will have networking opportunities with colleagues from Tanzania,
Kenya, Uganda and Zambia during unofficial meetings and the Gala Dinner.Participatinginthiseventwill also offeranopportunity to earn 24
CPE hours.
We believe that your participation in this
conference will bring many benefits both to you and to your respective
organisations. Therefore, we are really looking forward to seeing you
there.
Yours Sincerely,
No comments:
Post a Comment