Check back time to time to receive the latest updates
Our Trainings
Cyber Training.
Cyber security trains an organization's employees on how to protect the organization. In addition, the panelists provided ideas on how an organization can gain informational and financial benefits through cyber technology. Representatives of 30 companies attended the seminar.
Digital Security Standing Committee was held at BASIS Auditorium. Shahzeb Ibn Hussain, Managing Director of Data Park BD Limited, read the main article in the seminar. Apart from this, BugsBD Limited Managing Director Delwar Alam gave a speech.
Seminar on Cybersecurity
The term ‘Cybersecurity posture and policy guidelines’ is considered a ‘living document’, and it is mainly the practice of protecting systems, networks, and programs from digital attacks. Bangladesh’s cyber security policies became well known internationally in 2016 when the country’s central bank was the subject of one of the largest digital bank heists to date, where about US$101 million was stolen from the Bangladesh Bank’s account with the New York Federal Reserve Bank by hackers (The Daily Star, 2016). read more
A significant number of BASIS member companies were also present at the seminar. Participants actively participated in the question-answer session and clarified their concerns.
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.
IT Security Training
Cybersecurity is a growing concern in today's digital world. Protecting company’s data and sensitive information has never been more important. Data breaches and cyber-attacks are on the rise, costing individuals and businesses millions of dollars every year. Don't wait until it's too late. Invest in your cybersecurity knowledge and skills today.
~ Building and maintaining a secure network.
~ Protecting cardholder data .
~ Maintaining a vulnerability management program.
~ Implementing strong access control measures
~ Regularly monitoring and testing networ .ks
~ Maintaining an information security policy .
~ Introduction as to what is information security and security in general.
~ Security Policy .
~ Risk Assessment and Treatment
~ Implementing strong access control measures .
~ and more (find out more in the tabs below)
Human Resources Security: prior to employment, during employment, and termination or change of employment Physical and Environmental Security: secure areas and equipment security.
~ Operational procedures and responsibilities.
~ Third party service delivery management .
~ System planning and acceptance
~ Protection against malicious ad mobile code.
~ Back-up
~ Network security management
~ Media handling
~ Exchange of information
~ Electronic commerce services
~ Monitoring.
~ Business requirement for access control .
~ User access management and responsibilities .
~ Network access control.
~ Operating system access control.
~ Application and information access control
~ Mobile computing and teleworking
~ Security requirements of information systems
~ Cryptographic controls.
~ Security of system files.
~ Security in development and support processes.
~ Technical vulnerability management .
~ Information Security
Incident Management
~ Reporting information security events and weaknesses
~ Management of information security incidents and improvements.
~ Business Continuity
Management
~ Information security aspects of business continuity management .
~ Compliance
~ Compliance with legal requirements
~ Compliance with security policies and standards, and technical
compliance
~ Information systems audit considerations