Welcome!

Containers Expo Blog Authors: Pat Romanski, Elizabeth White, Liz McMillan, Yeshim Deniz, Ravi Rajamiyer

News Feed Item

CyberSecurity Malaysia's Award Winning Firm Host 9th Annual Information Security Symposium

Kuala Lumpur, Nov 20, 2012 - (ACN Newswire) - EC-Council Academy, a leading information security training provider throughout Southeast Asia, is hosting its ninth annual Hacker Halted APAC event today.

"The Hacker Halted APAC series has been a leading and constant source of information for the regional information security community," said Wilson Wong, Managing Director, EC-Council Academy. "The event has been addressing up-to-date and edgy hacker technology and strategies since 2004."

More than 400 regional information security professionals are gathered at the Berjaya Times Square Hotel for this year's event.

The theme for Hacker Halted APAC 2012 is "Unravelling the Enigma of Insecurity", focuses on security issues related to the transition of desktops to mobile devices, cloud computing, and current hacking technologies.

Information security and cyber crimes have remained high on the threat list for organizations, government bodies and consumers. While cyber security awareness has increased, according to Wong, the lack of informed action and strategies has created a large gap open to risks and attacks. A recent survey by Hewlett Packard and the Ponemon Institute shows that there has been a 42% increase of cyber attacks in 2012 compared to 2011.

Cyber crimes have reach a new level of sophistication, according to an ethical hacking whitepaper by Frost & Sullivan.

"There's no doubt that every organization and internet user will be direct or indirect victims of cyber crime and cyber attacks in the near future. Our aim here is to level the playing field so that the good guys will be able to stay ahead of cyber criminals," said Wong.

Wong also stresses on the importance of having an aggressive defence systems and contingency plans to overcome an attack.

Hacker Halted APAC 2012 will feature live hacking and defense sessions throughout the event. A series of technical focused hacker combat workshops featuring latest network penetration techniques, cyber warfare and mobile devices security will also take place during this 4-day event.

Hacker Halted APAC 2012 is endorsed by the Malaysian Ministry of Science, Technology and Innovation (MOSTI) and Multimedia Development Corporation (MDeC).

EC-Council Academy recently won the "Information Security Education & Training Provider of the Year 2012" award by CyberSecurity Malaysia. EC-Council Academy is a training organization that focuses on information security and nothing else.

About EC-Council Academy

EC-Council Academy was established in 2000 and is now recognized as one of the leading providers for global certification programs and services, designed to enable advancement through IT security certifications. Learn more about EC-Council Academy at www.eccouncilacademy.org

Contact information:
Maddy Low
+603 7665 0911
[email protected]

Source: EC-Council Academy

Copyright 2012 ACN Newswire. All rights reserved.

More Stories By ACN Newswire

Copyright 2008 ACN Newswire. All rights reserved. Republication or redistribution of ACN Newswire content is expressly prohibited without the prior written consent of ACN Newswire. ACN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear these words all day every day... lofty goals but how do we make it real? Add to that, that simply put, people don't like change. But what if we could implement and utilize these enterprise tools in a fast and "Non-Disruptive" way, enabling us to glean insights about our business, identify and reduce exposure, risk and liability, and secure business continuity?
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Chris Matthieu is the President & CEO of Computes, inc. He brings 30 years of experience in development and launches of disruptive technologies to create new market opportunities as well as enhance enterprise product portfolios with emerging technologies. His most recent venture was Octoblu, a cross-protocol Internet of Things (IoT) mesh network platform, acquired by Citrix. Prior to co-founding Octoblu, Chris was founder of Nodester, an open-source Node.JS PaaS which was acquired by AppFog and ...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace.
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...