In an effort to shed light on issues surrounding cyber security and online privacy, Umniah recently held a conference that brought together numerous representatives from various sectors, during which it announced the capabilities to offer services and solutions geared toward information security through its Security Operations Center (SOC), which complies with the international standards. Umniah CEO Ziad Shatara explained that the offered security services are featured by a comprehensive portfolio and easy-to-enable approach, which cover three major categories: Managed Security Services (MSS), which offers solutions that detect security vulnerabilities, and protect network end-points along with agile responses to potential threats. Secondly, offering enterprises with advanced security solutions, which is not limited to assess the security infrastructure of clients, but further Umniah can build a long-term SOC strategy for enterprises. Finally, facilitate a virtual SOC to each enterprise by outsourcing their SOC functionalities to Umniah, hereby enterprises will get benefits from saving time, cost and efforts, as well as better managing the lack of security expertise in the market. Shatara also noted that, since its launch, Umniah has consistently sought to provide innovative solutions that meet the needs of various sectors, underscoring that the SOC services stem from Umniah commitment to bring cutting-edge technologies to its clients and to raise awareness on the importance of information security in the digital era. Shatara also referenced the increasing number of cyber-crimes and security breaches around the globe, the most recent of which impacted more than 100 countries and 130 systems. He noted that such breaches can have calamitous financial ramifications on an enterprise, and can even negatively impacting the entire business operation performance, inability to serve end-customers, and damaging the brand image. Shatara explained that one of the major challenges facing information security is the very nature of threats, which are rapidly and consistently evolving. Recent examples include massive worldwide data dumps, the spreading misinformation that can negative impact national economies, and the ever-growing number of cybercrimes that threaten vital services like power, water, and financial services, all of which rely on digital technology to operate fully. He also noted that conventional measures for safeguarding information focused on in-house monitoring, which has become ineffective given the rapid changes in the nature of security threats that are making it more feasible for organizations to outsource their information security operations to more equipped third parties. Shatara also stressed on strengthening the information security, which allows organizations to manage risks more effectively and to sustain their online presence. Colonel Sahem Al Jamal, the ICT Consultant for the Minister of Finance, noted that there have been numerous fraudulent wire transfer attempts uncovered by the ministry, with losses totaling almost JOD 720,000. Meanwhile, Arbor Networks engineer Emad Fahmy explained that “a DDoS attack is a targeted attack on a targeted organization from specific individual with a specific motive. It is not random. It is not mass distributed malware or spam. “ Mahdi Naili, an engineer at Frontinet, notes that “if tricking a software is easy, then tricking an unaware employee is a thousand times easier.” Eman El-Rouby, Senior Research Analyst at IDC, said: “Threats will only rise in terms of frequency and complexity and this will require organizations to prioritize security investments and adopt a holistic approach by using next-generation security solutions. This approach will be successful partnering with a proper managed security services provider who can make up for the shortfall in skills and budgets. As IDC, we expect the Managed Security Services market to be one of the fastest growing security services segments.” Scott Manson, Cisco’s Cyber Security Leader for MEA and Turkey, said: “In today’s age of digitization we can see a healthy rise in innovative business models that benefit the way we Live, work and play. However, we need to be mindful that the onboarding and connecting of more and more ‘things’ to IP, means we are increasing the operating space and opportunities for the hackers to cause trouble. Our job collectively as individuals, vendors, consultants and companies is to counteract this increased attack surface with a mixture of; people, process and technology. If we get this balance and these counter measures just right, it will allow new business models and innovation to flourish, without increasing our risk of financial, operational or reputational harm.” Ahmad Abu Amara, the Director of the e-Government Program, said: “it is all about perfection, it is about Improving the performance of traditional government by Re-engineering and automating procedures, it is When digital transformation is done right to provide end to end, Secure, fast and Efficient services, This is what we mean by e-Government.” END
Your thoughts and ideas will help us deliver the best service.