Cyber Warfare in the Gulf: A Peek to the World of Cybersecurity

Cyber Warfare in the Gulf: A Peek to the World of Cybersecurity // Cyber Warfare in the Gulf: A Peek to the World of Cybersecurity //

COMPANIES

level/floor

3 hours

Duration

A total of .3 hours

academic hours

By Order

Course Opening Date

According to Order

Days & Hours

  • About the course
  • Study Divisions
  • Lecturers
  • Media
  • More Courses

01

About the Seminar

In collaboration with Sorp
A unique thought-provoking seminar introducing what you need to know to protect your organization. Learn from our Israeli experts manning the frontline of cybersecurity warfare.

For the first time, after setting our footprints in the UAE by collaborating with SORP, we are delighted to introduce our introductory seminar led by our Israeli Experts. 

 

This unique, thought-provoking seminar is designed for people with an interest in the world of information security. The seminar will focus on three vital and fascinating topics: Iran as an offensive security power; When things go wrong: Do’s and Don’ts; SIEM/SOC as a Service.

 

This seminar is suitable for anyone with an interest in cybersecurity: C-level managers, general employers, IT and Cyber Professionals and the general public. No previous knowledge is required!

Read more

02

Program Format

Zoom lectures

Read more

03

Target Audience

This seminar is suitable for anyone with an interest in cybersecurity: C-level managers, general employers, IT and Cyber Professionals and the general public. No previous knowledge is required.

Read more

04

Entry Requirements:

None. Good conduct of the English language is expected.

Read more

05

Study Divisions

This unique, thought-provoking seminar is designed for people with an interest in the world of information security. The seminar will focus on three vital and fascinating topics in cybersecurity.

  • What forces are shaping the agenda of cyber offensive power states?
  • What are the motivations and abilities these countries have?
  • What countries are particularly targeted by these powers?
  • What technological advancements facilitated offensive abilities?
  • Is it ever going to be too late to deal with these threats?
  • What can and can’t we do to protects ourselves?
  • Alertness and preparedness for a potential incidence (routine protocols, precaution and eliminative measures, etc.)
  • What are the first signs that a cyberattack is happening in your organisation?
  • What are the very first steps that your people must do to understand what is happening?
  • Steps in detecting an incidence and initial analysis of the situation.
  • When and how does an incidence is declared as a ‘cybersecurity incidence’?
  • Steps to assessing, containing, and reducing the threat.
  • Frequency of reporting and evaluating the situation.
  • Communication channels with internal and external role holders (administration, management, juniors and general employees, costumers, media, authorities etc.)
  • The interplay between internal and external departments (legal, spokesperson, finance, consumer services, partner, cybersecurity professionals and non-cyber security personnel)
  • Damage assessment
  • BCP/DRP initiation
  • Closure, documentation, and organisational learning processes
  • What is MMSP, and how does it work?
  • Is outsourcing my monitoring services safe for my organisation? Does it put my information in danger?
  • Will it solve all of my worries and problems? Is my organisation immune?
  • A practical illustration: See Secure’s approach, methodology and services.
  • How to set up a SIEM/SOC centre?

LECTURERES

Cyber Warfare in the Gulf

Cyber Warfare in the Gulf

Build a custom course for you

Leave details and we will get back to you as soon as possible
אנא מלאו את טופס - Build a custom course for you