Follow on Google News News By Tag Industry News News By Location Country(s) Industry News
Follow on Google News | Cyber security summit DigitalizationBy: exito Some of the most sensitive information related to staging large-scale events is that which we associate with physical and terrorist threats, venue plans, evacuation routes, security systems, and emergency services intelligence. The vast array of people who were involved in organising the games is also important to note; when you take into account the personnel, builders, service providers, and members of the organising body, there are thousands of potential "leak points" in the data. Each person has access to or knowledge of sensitive information, and if they don't handle it appropriately, mega events become an appealing target for cybercriminals. Financial, political, and physical risks are all made feasible by cyber-attacks that steal valuable data or gain unauthorised access to systems. Attacks maybe directed at the hosts or vendors of the event, as well as attendees whose data was gathered and processed during the event planning process. The National Cyber Security Strategy calls for the development of local knowledge and a homegrown startup ecosystem, and the Qatari government is promoting these developments besides collaborating with large global companies. The market predictions, which indicate that Qatar has the fastest-growing market for security services in the area, are likely the most encouraging factor for local entrepreneurs and local branches of international corporations. https://www.exito- End
Account Email Address Account Phone Number Disclaimer Report Abuse
|
|