Managing Entry Identities and Authorities• National Programming Contest 2016 - 1st and 2nd Place Winners Two student teams won the first and second place in the national programming contest among the students of computer and information colleges in the Kingdom | With the significant acceleration of digital transformation, the rates of cyber attacks and the risks of data breaches have increased, making the Kingdom keener to provide a secure environment for data and digital operations through a robust security system |
---|---|
The competition was held during the 1st National Computing Colleges Conference which was held from 17 to 18 February 2016, at King Abdulaziz University in Jeddah | Survey of domain name registries• This procedure enabled workers and employees to perform their work remotely without the need to come to the workplace, so a list of cybersecurity controls for remote work has been launched:• 18 main controls and 26 subsidiary controls for subscribers |
Monitoring Cybersecurity and managing incidents You can view the details of the controls through the.
You will also understand the basic controls and policies highlighted in the Basic Cybersecurity Controls Handbook, and the national programs and initiatives including the Saudi Federation for Cybersecurity and the launch of the National Academy of Cybersecurity launched by the Ministry of Communications and Information Technology | It is divided into four main components:• Under the honorary chairmanship of Dr Issa Al Bastaki, President of Dubai University |
---|---|
It works to empower entities to:• Third-party Cybersecurity and cloud computing• The objective is to ensure information security, protection of public interest, morals, protection of rights of the legitimate use of computers and information networks, and protection of the national economy | Cybersecurity controls to work remotely According to the various preventive precautions taken by the Kingdom's government to confront Coronavirus, national authorities' reliance is increasing regarding means of information and communication technology through cyberspace |
Cybersecurity for industrial control systems Control details can be found in the.
2