Cyber Security Seminar | KPMG | KW

Cyber Security Seminar

KPMG, a leading provider of Audit, Tax & Advisory services, organizes a specialist seminar on cyber security

23 May 2017, 6:00PM - 9:00PM, AST

KPMG is pleased to invite you to our Cyber Security seminar being held in association with the Kuwait Chapter of The International Information System Security Certification Consortium (ISC2).

KPMG, a leading provider of Audit, Tax & Advisory services, organizes a specialist seminar on cyber security in association with the Kuwait Chapter of The International Information System Security Certification Consortium (ISC2). The seminar will be attended by an elite of businesses, individuals and business officers interested in cyber security.

There is already an elevated level of concern among organizations in the region and locally about security breaches that are targeting businesses and organizations to steal sensitive information including banking details, block vital electronic services, tamper with websites or launch electronic attacks against infrastructure and the media.

At the KPMG seminar, Mr. Mohamed Al-Turah, Chief of Information Technology Sector at the Communications and Information Technology Regulatory Authority (“CITRA”) will present “Kuwait’s National Strategy for Cyber Security”, explaining how the Kuwait Government is seeking to formulate a cohesive strategy to address cyber security threats at a national level.

Further, Mr. Atul Gupta, Advisory Practice Partner in KPMG India, will also deliver a lecture in a session entitled “Digitally Connected World – Cyber Security Imperatives”. He will identify limitations of the traditional approach to cyber security and introduce the next generation measures that can be considered to address cyber security threats in a proactive manner.

This seminar assumes particular relevance in light of the “ransomware” attacks that affected 150 countries around the world just over two months ago exploiting vulnerability in the Microsoft Windows operating system. There have been increasing concerns that about the impact of other such disruptive wide scale attacks that would require additional efforts from business and governmental organizations to protect themselves and their various stakeholders.
 

Contacts

Connect with us

 

Request for proposal

 

Submit