Your SlideShare is downloading. ×
0
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
ICT Security Workforce Promotion to Professionals
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

ICT Security Workforce Promotion to Professionals

940

Published on

ICT Security Workforce Promotion to Professionals by Assoc.Prof. Dr. Thanachart Numnonda

ICT Security Workforce Promotion to Professionals by Assoc.Prof. Dr. Thanachart Numnonda

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
940
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
25
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. www.cdicconference.com Cyber Defense Initiative Conference 2011 20th – 21st March 2012, Grand Hall, BITEC, Bangna, Bangkok “Is Your Privacy at Risk? Securit and Privacy Chalenges in te Digital Modernit” ICT Security WorkforcePromotion to Professionals Assoc.Prof. Dr. Thanachart Numnonda Director Software Park Thailand
  • 2. ASEAN
  • 3. Source: Free Flow of Services AEC, Ronnarong Phoolpipat
  • 4. Main Objective of AECSource: Free Flow of Services AEC, Ronnarong Phoolpipat
  • 5. ASEAN ICT MasterPlan 2015Source: Ministry of Information Communication & Technology 5
  • 6. Human Capital Development Initiative 5.1: Build CapacitySource: ASEAN ICT Master Plan 2015 6
  • 7. Human Capital Development Initiative 5.2: Developing Skills Upgrading & CertificationsSource: ASEAN ICT Master Plan 2015 7
  • 8. IT Industry Competitiveness 2011Source: EIU2011 8
  • 9. IT Industry Competitiveness 2011Source: EIU2011 9
  • 10. The New Reality for Users Apps & Data Diverse Access Everywhere Points Universal App Windows Catalog and Browser Workflow Legacy Apps Windows SaaS Services Mac Broker Mobile iOS Apps Android Entitlements, Policies and Reporting Data ServicesSource : From Datacenter to Device: Security in the Enterprise 2012 and Beyond : VMWare
  • 11. Cloud Readiness Index 2011Source : Asia Cloud Computing Association: September 2011
  • 12. BSA GlobalCloud Computing ScorecardSource : BSA GlobalCloud Computing Scorecard: Feb 2012
  • 13. BSA GlobalCloud Computing ScorecardSource : BSA GlobalCloud Computing Scorecard: Feb 2012
  • 14. Sony Suspends Thai Web Pages Largest online data breach in U.S. history, shut down some Internet services in Canada, Thailand and Indonesia after detecting unauthorized intrusions. Intruders stole the names and e-mail addresses of about 2,000 customers at Sony Ericsson a site in Thailand may have been modified to help send fraudulent e-mails May 2011Source : Bloomberg May, 2011
  • 15. Quadri-partition of illegal actsSource : Cyberwarfare and its damaging effects on citizens, Stefano Melec
  • 16. IT Security WorkforceSource : Forst & Sullivan Market Survey 2011
  • 17. Top Security Threat ConcernsSource : Forst & Sullivan Market Survey 2011
  • 18. Risk of Mobile DevicesSource : Forst & Sullivan Market Survey 2011
  • 19. New Skill Require by Cloud Computing?Source : Forst & Sullivan Market Survey 2011
  • 20. Growing Need for TrainingSource : Forst & Sullivan Market Survey 2011
  • 21. Source : Chaiyakorn Apiwathanokul
  • 22. 2Number of (ISC) Members
  • 23. MICT, Thailand การจัดตั้งสถาบันพัฒนาบุคลากรเทคโนโลยีสารสนเทศ และการสื่อสาร (องค์กรมหาชน) ICT Workforce Planning ICT Professional Network Security & IT SecuritySource : Forst & Sullivan Market Survey 2011 24
  • 24. Conclusion Consumerization has end-users bringing technology to the enterprise instead of the opposite; information security professionals should work to securely embrace these new technologies instead of acting as roadblocks. Cloud computing and software development are areas of information security thatrequire new skills, not just incremental advances. Certifications will continue to be an important differentiatorSource : Forst & Sullivan Market Survey 2011 25
  • 25. Thank Youthanachart@swpark.or.thtwitter.com/thanachartwww.facebook.com/thanachart www.cdicconference.comwww.swpark.or.thwww.facebook.com/softwareparkthailand 26

×