Story image

NEC works with Malaysian Govt agencies on cyber defence training

09 Mar 17

NEC has revealed it has been working with government agencies in Malaysia on cyber defence training scenarios that take a hands-on approach.

The two-day training scenarios in Cyberjaya brought together 20 representatives from the Malaysian Communications and Multimedia Commission (MCMC) and Cyber Security Malaysia (CSM).

The training was also part of a project commissioned by Japan’s Ministry of Internal Affairs and Communications (MIC), which aims to be ‘hands-on pilot training aiming to increase cyber defence capabilities in ASEAN countries’.

NEC was responsible for organising the training, which provided simulations of client ICT infrastructures aimed at enhancing government system administrator abilities.

Those simulations enabled practical training, allowing system administrators to develop comprehensive cyber defence capabilities, NEC says.

"This project is another example of NEC's leading position in the field of cyber-crime prevention. In order to cope with increasingly complex and sophisticated cyber-attacks, it is critically important to cultivate experts who can analyze vulnerability across an organization and respond to cyber incidents quickly and appropriately,” comments Chong Kai Wooi, NEC Malaysia’s managing director.          

In January, Japan’s MIC and Malaysia’s Ministry of Communications and Multimedia (KKMM) signed a joint memorandum of understanding for cooperation in ICT. 

NEC worked with the Embassy of Japan, situated in Malaysia, to provide the defence training for the two government agencies.  NEC says the training was similar to MIC’s “Cyber Defence Exercise with Recurrence (CYDER)”, which was provided in Japan.

That program used a simulated government office network environment with a full cyber attack from onset to resolution. The training provided technical skills and organisational measures for stopping the damage from spreading, including possible staff instruction and information sharing with related institutions.

Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.
Carbon Black: What does cybersecurity have in store for 2019?
Tom Kellerman has shared five insights for the year ahead, including a particularly bold one.
Hands-on review: The Ekster Wallet protects your cards against RFID attacks
For some time now, I’ve been protecting my credit cards with tinfoil. The tinfoil hat does attract a lot of comments, but thanks to Ekster, those days are now happily behind me.