Story image

NEC & Japan Govt take cyber defence training to ASEAN administration

27 Oct 17

NEC is providing cybersecurity training for ASEAN administrative staff, thanks to Japan’s Ministry of Internal Affairs and Communications’ ASEAN-Japan Cybersecurity Cooperation Hub project.

The project was launched at the Japan-ASEAN Telecommunications and IT Ministers Meeting in November last year through the Japan-ASEAN Integration Fund 2.0, which aims to strengthen human resource development in the ASEAN region.

The first day of training was held yesterday, and will continue today in Manila, Philippines in conjunction with the Department of Information and Communications Technology.

The training is described as being similar to Japan’s Ministry of Internal Affairs and Communications’ Cyber Defence Exercise with Recurrence (CYDER) program, which has been in action since 2013.

The event will provide 40 participants with first hand training that enables them to experience and effectively respond to cyber attacks.

NEC says that the importance of protecting information is clear, particularly in the face of cyber attacks that can cause extensive damage on a global scale.

The company says it is helping to improve early detection and effective handling of cyber threats against ASEAN through the intensive training program.

NEC also supports the Cyber South East Asia Games (Cyber SEA Games), which is a competition for young engineers and students across ASEAN to effectively handle cyber attacks.

“Going forward, NEC will continue building relationships with government agencies and enterprises throughout the world in order to cultivate the necessary skills for protecting the safety and security of computing environments,” the company states.

Earlier this year NEC revealed a partnership with INTERPOL to help organise the Digital Security Challenge, a four-day training session that taught participants about digital forensic analysis in the case of a ransomware attack.

“Cybercrime investigations are becoming increasingly complicated and this challenge replicated some of the twists and turns encountered by investigators every day,” commented Noboru Nakatani, Executive director of the INTERPOL Global Complex for Innovation (IGCI).

"NEC began cooperating with INTERPOL in cybersecurity measures in 2012, and we are conducting a variety of activities to confront the cyberattacks that are becoming increasingly complicated and sophisticated. We look forward to continuing our support for INTERPOL training of police and contributing to the achievement of strong global security,” added NEC’s senior vice president Masakazu Yamashina.

NEC has also worked with Malaysian government agencies to provide cyber defence training.

Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).