Story image

NEC works with Malaysian Govt agencies on cyber defence training

09 Mar 17

NEC has revealed it has been working with government agencies in Malaysia on cyber defence training scenarios that take a hands-on approach.

The two-day training scenarios in Cyberjaya brought together 20 representatives from the Malaysian Communications and Multimedia Commission (MCMC) and Cyber Security Malaysia (CSM).

The training was also part of a project commissioned by Japan’s Ministry of Internal Affairs and Communications (MIC), which aims to be ‘hands-on pilot training aiming to increase cyber defence capabilities in ASEAN countries’.

NEC was responsible for organising the training, which provided simulations of client ICT infrastructures aimed at enhancing government system administrator abilities.

Those simulations enabled practical training, allowing system administrators to develop comprehensive cyber defence capabilities, NEC says.

"This project is another example of NEC's leading position in the field of cyber-crime prevention. In order to cope with increasingly complex and sophisticated cyber-attacks, it is critically important to cultivate experts who can analyze vulnerability across an organization and respond to cyber incidents quickly and appropriately,” comments Chong Kai Wooi, NEC Malaysia’s managing director.          

In January, Japan’s MIC and Malaysia’s Ministry of Communications and Multimedia (KKMM) signed a joint memorandum of understanding for cooperation in ICT. 

NEC worked with the Embassy of Japan, situated in Malaysia, to provide the defence training for the two government agencies.  NEC says the training was similar to MIC’s “Cyber Defence Exercise with Recurrence (CYDER)”, which was provided in Japan.

That program used a simulated government office network environment with a full cyber attack from onset to resolution. The training provided technical skills and organisational measures for stopping the damage from spreading, including possible staff instruction and information sharing with related institutions.

ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
It's time to rethink your back-up and recovery strategy
"It is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations."
Dropbox strengthens security with raft of new partnerships
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.
Companies swamped by critical vulnerabilities – Tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Don’t let your network outgrow your IT team
"IT professionals spend less than half of their time at work optimising their networks and beefing it up against future security threats."
Three access management trends making waves in APAC
Consumer identity proofing, authentication, and authorisation will top the $37 billion value mark by 2023.