In today’s connected world, everyone benefits from advanced cyber defence programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning.
Everyone also benefits from the work of cyber threat researchers, like the team of 250 threat researchers at Talos, who investigate new and emerging threats and cyber-attack strategies. They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open source tools. Their work makes the Internet safer for everyone. On the other hand Mobility in computing is human–computer interaction by which a computer is expected to be transported during normal usage, which allows for transmission of data, voice and video. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc networks and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.
WHO SHOULD ATTEND:
Security professionals, Directors and managers of IT, Educators, Team leaders, project team members, Software and hardware engineers, Network engineers, Network Consultants, Lecturers, IT Professionals, project office staff members, and anyone interested in IT Security from private and public organisations.
Lecture, individual and group exercise, action learning workshop and case studies, and group discussions.