Submit Search
Upload
Mr. Khalid Shaikh - emerging trends in managing it security
ā¢
Download as PPT, PDF
ā¢
2 likes
ā¢
767 views
N
nooralmousa
Follow
Technology
Business
Report
Share
Report
Share
1 of 13
Download now
Recommended
Mobile Industry Preparing to Surf the 4G Disruption Wave: Key CTIA Takeaways
Mobile Industry Preparing to Surf the 4G Disruption Wave: Key CTIA Takeaways
guestb993cd99
Ā
Ncomms2255 s1
Ncomms2255 s1
Carlos Bella
Ā
The Evolution of Mobile Information Services
The Evolution of Mobile Information Services
Venu Vasudevan
Ā
CloudBridge and Repeater Specifications Sheet
CloudBridge and Repeater Specifications Sheet
Nuno Alves
Ā
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
nooralmousa
Ā
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
nooralmousa
Ā
Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.
nooralmousa
Ā
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
Ā
Recommended
Mobile Industry Preparing to Surf the 4G Disruption Wave: Key CTIA Takeaways
Mobile Industry Preparing to Surf the 4G Disruption Wave: Key CTIA Takeaways
guestb993cd99
Ā
Ncomms2255 s1
Ncomms2255 s1
Carlos Bella
Ā
The Evolution of Mobile Information Services
The Evolution of Mobile Information Services
Venu Vasudevan
Ā
CloudBridge and Repeater Specifications Sheet
CloudBridge and Repeater Specifications Sheet
Nuno Alves
Ā
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
nooralmousa
Ā
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
nooralmousa
Ā
Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.
nooralmousa
Ā
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
Ā
Examples of Systance's interventions
Examples of Systance's interventions
Bernard JOUVEL
Ā
GIS In Local Government Global Image
GIS In Local Government Global Image
GIS Global Image
Ā
Ppt si-03-eng
Ppt si-03-eng
valbasp
Ā
Appcelerator Mobile Development Platform
Appcelerator Mobile Development Platform
rickross
Ā
09 03
09 03
Sowjanya Palagiri P
Ā
Viii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto Presentazione
guestd1ae161
Ā
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of Things
Kim Escherich
Ā
Efficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a reality
BSP Media Group
Ā
Ramon Montero's Presentation
Ramon Montero's Presentation
guest41c26d
Ā
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Thierry Lestable
Ā
Brochure ascen flow_en_110324
Brochure ascen flow_en_110324
Galen Hsieh
Ā
Introduction To Xener Systems
Introduction To Xener Systems
Guisun Han
Ā
Net blazr at is4cwn
Net blazr at is4cwn
Brough Turner
Ā
Ethernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldona
Puran Pangeni
Ā
Adoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri Lanka
Wasantha Deshapriya
Ā
Document Management In Pharma
Document Management In Pharma
dhiria00
Ā
Digital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran Digital
Heru Sutadi
Ā
Yorkland lcc 2010-r1
Yorkland lcc 2010-r1
Sustainable Resources Management
Ā
Yorkland lcc 2010-r1
Yorkland lcc 2010-r1
Sustainable Resources Management
Ā
600 minutes: Internet of Things
600 minutes: Internet of Things
Kim Escherich
Ā
Mr. Vivek Ramachandran - Advanced Wi-ĀFi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-ĀFi Security Penetration Testing
nooralmousa
Ā
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovations
nooralmousa
Ā
More Related Content
Similar to Mr. Khalid Shaikh - emerging trends in managing it security
Examples of Systance's interventions
Examples of Systance's interventions
Bernard JOUVEL
Ā
GIS In Local Government Global Image
GIS In Local Government Global Image
GIS Global Image
Ā
Ppt si-03-eng
Ppt si-03-eng
valbasp
Ā
Appcelerator Mobile Development Platform
Appcelerator Mobile Development Platform
rickross
Ā
09 03
09 03
Sowjanya Palagiri P
Ā
Viii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto Presentazione
guestd1ae161
Ā
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of Things
Kim Escherich
Ā
Efficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a reality
BSP Media Group
Ā
Ramon Montero's Presentation
Ramon Montero's Presentation
guest41c26d
Ā
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Thierry Lestable
Ā
Brochure ascen flow_en_110324
Brochure ascen flow_en_110324
Galen Hsieh
Ā
Introduction To Xener Systems
Introduction To Xener Systems
Guisun Han
Ā
Net blazr at is4cwn
Net blazr at is4cwn
Brough Turner
Ā
Ethernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldona
Puran Pangeni
Ā
Adoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri Lanka
Wasantha Deshapriya
Ā
Document Management In Pharma
Document Management In Pharma
dhiria00
Ā
Digital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran Digital
Heru Sutadi
Ā
Yorkland lcc 2010-r1
Yorkland lcc 2010-r1
Sustainable Resources Management
Ā
Yorkland lcc 2010-r1
Yorkland lcc 2010-r1
Sustainable Resources Management
Ā
600 minutes: Internet of Things
600 minutes: Internet of Things
Kim Escherich
Ā
Similar to Mr. Khalid Shaikh - emerging trends in managing it security
(20)
Examples of Systance's interventions
Examples of Systance's interventions
Ā
GIS In Local Government Global Image
GIS In Local Government Global Image
Ā
Ppt si-03-eng
Ppt si-03-eng
Ā
Appcelerator Mobile Development Platform
Appcelerator Mobile Development Platform
Ā
09 03
09 03
Ā
Viii Forum Tlc Federico Protto Presentazione
Viii Forum Tlc Federico Protto Presentazione
Ā
IT Innovation @ The Internet of Things
IT Innovation @ The Internet of Things
Ā
Efficient and simple porting processes make one day porting a reality
Efficient and simple porting processes make one day porting a reality
Ā
Ramon Montero's Presentation
Ramon Montero's Presentation
Ā
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Gsc mstf 2011 M2M Smart Energy Management sagemcom
Ā
Brochure ascen flow_en_110324
Brochure ascen flow_en_110324
Ā
Introduction To Xener Systems
Introduction To Xener Systems
Ā
Net blazr at is4cwn
Net blazr at is4cwn
Ā
Ethernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldona
Ā
Adoption of FOSS for eGovernment in Sri Lanka
Adoption of FOSS for eGovernment in Sri Lanka
Ā
Document Management In Pharma
Document Management In Pharma
Ā
Digital Payment in Indonesia - Pembayaran Digital
Digital Payment in Indonesia - Pembayaran Digital
Ā
Yorkland lcc 2010-r1
Yorkland lcc 2010-r1
Ā
Yorkland lcc 2010-r1
Yorkland lcc 2010-r1
Ā
600 minutes: Internet of Things
600 minutes: Internet of Things
Ā
More from nooralmousa
Mr. Vivek Ramachandran - Advanced Wi-ĀFi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-ĀFi Security Penetration Testing
nooralmousa
Ā
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovations
nooralmousa
Ā
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
nooralmousa
Ā
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
nooralmousa
Ā
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
nooralmousa
Ā
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
nooralmousa
Ā
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environments
nooralmousa
Ā
Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for ciso
nooralmousa
Ā
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metrics
nooralmousa
Ā
Khaled al amri using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keys
nooralmousa
Ā
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloud
nooralmousa
Ā
Ghassan farra it security a cio perspective
Ghassan farra it security a cio perspective
nooralmousa
Ā
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
nooralmousa
Ā
More from nooralmousa
(13)
Mr. Vivek Ramachandran - Advanced Wi-ĀFi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-ĀFi Security Penetration Testing
Ā
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovations
Ā
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
Ā
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Ā
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
Ā
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
Ā
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environments
Ā
Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for ciso
Ā
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metrics
Ā
Khaled al amri using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keys
Ā
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Ā
Ghassan farra it security a cio perspective
Ghassan farra it security a cio perspective
Ā
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
Ā
Recently uploaded
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(āļø+971_581248768%)**%*]'#abortion pills for sale in dubai@
Ā
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Ā
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Zilliz
Ā
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Ā
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Ā
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Ā
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Ā
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Ā
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
Ā
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Ā
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Ā
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
Zilliz
Ā
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Ā
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Ā
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Ā
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
apidays
Ā
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Ā
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Ā
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
Ā
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Ā
Recently uploaded
(20)
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Ā
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Ā
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Ā
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Ā
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Ā
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Ā
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Ā
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Ā
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Ā
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Ā
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Ā
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
Ā
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Ā
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Ā
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Ā
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Ā
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Ā
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Ā
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Ā
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Ā
Mr. Khalid Shaikh - emerging trends in managing it security
1.
Emerging Trends in
Managing IT Security May 2012 Presentation by: Khalid Shaikh ā Practice Head for IT Security and Privacy Services
2.
Changing Business Needs
1980 2000 2010 and beyond Internet Public Telephone Evolution Transformation Digital Set Top Customers Telephone, Third Telephone, Internet Third Internet Parties & Third Parties Parties & Third Parties Internet Third Internet Router Router Satellite dish Parties Lightpath ` ` Internet Internet Satellite dish Satellite dish Frame Optimum Cable Modem Relay Online Customers Optimum Oracle Online Optimum Untrusted Lightpath Corporate Cable Modem Corporate Cable Modem Customers Online Backbone Customers Backbone Customers Backbone Other Businesses and/or New Businesses Voice Voice Network Satellite dish Network Satellite dish Router Router Cable Frame Internet Relay Terminal Server PBX PBX Rainbow Media Lightpath Lightpath Digital Digital Set Top Set Top Customers Internet Employees & Customers Customers Third Parties Lightpath Public Satellite dish Lightpath Public Customers Telephone Customers Telephone 2 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
3.
Emerging Technologies 3
Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
4.
Trends in IT
Security Attack TREND 1 : Industrial Threats TREND 2 : Threats Within: Embedded Hardware TREND 3 : Hacktivism TREND 4 : Web Threatsā¦. TREND 5 : Mobile Threats 4 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
5.
Recent Events 5
Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
6.
Motives of Attack
ā¢ Industrial Espionage ā¢ Financial ā¢ Military ā¢ Ideological ā¢ Politics ā¢ Prestige 6 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
7.
Attack Tools are
Freely Available 7 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
8.
Security Never Sleeps
ā¢ Increasing sophistications of attacks ā¢ Protect data and information ā¢ Keeping up-to-date with security incidents and solutions ā¢ Keeping the IT infrastructure in compliance with the IT Security Policy of the organization ā¢ Keeping up-to-date with the changes to legal and regulatory requirements ā¢ Reacting effectively and timely to security violations ā¢ Effectively managing threats to data security ā¢ Complexity of managing a broad portfolio of security tools/solutions ā¢ Mobile clients and unmanaged devices ā¢ Periodically conducting security awareness trainings to users within the organization 8 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
9.
Holistic Approach in
Managing IT Security Information Security Vision and Strategy Business Initiatives Threats Senior Management Commitment Best/Acceptable Practice Training and Awareness Enterprise Architecture Legislation Strategy Vulnerability & Risk Assessment Security Policy Security Architecture and Technical Standards Administrative and End-User Guidelines, Practices and Procedures Enforcement Monitoring Recovery Process Process Process Information Security Management 9 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
10.
Holistic Approach in
Managing IT Security 10 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
11.
Prediction ā Persistence
ā Patience - Preparedness 11 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
12.
If You Have
Further Questions: Please visit us at Booth Number 8 and 9. Khalid Shaikh Phone: (965) ā 66225122 Senior Manager ā Technology khalid.shaikh@protivitiglobal.com.kw Risk Services Powerful Insights. Proven Delivery.ā¢ 12 Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
13.
13
Ā© 2012 Protiviti Member Firm Kuwait W.L.L PUBLIC: 4th Kuwait Info Security Conference
Download now