Information security in focus
Dubai, November 3, 2007
A conference to be held in the UAE will focus on law enforcement officials; role in fighting cyber terrorism
Etisalat Academy and Sharjah Police are the organisers of the 5th Middle East IT Security Conference (MEITSEC 2007) which is held under the patronage of Sheikh Dr Sultan bin Mohammad Al Qasimi, Member of the Supreme Council and Ruler of Sharjah.
The conference will be held from November 12 to 13 and training and workshops continuing on November 14 and 15 at the American University in Sharjah.
Etisalat Academy general manager Dr Doaa Faris said: “The Middle East IT Security Conference is a unique local event attended by local and international professionals, researchers, and specialists every year since it was first launched in 2001.
“The conference represents a great opportunity to look over the latest developments of this critical profession that has become part of most people’s daily lives.”
He added: “The conference will highlight the latest IT security information policies and will present new information about findings from the years 2006-2007.
“Several sessions have been arranged dedicated to discuss mobile phone issues, similar to the sessions held last years to discuss hacking which raised a debate on a regional and a local level within the academic and technical sectors.”
MEITSEC is widely regarded as one of the region's most prestigious information security events.
The conference will shed light on the ever-changing data security landscape.
It is important for organizations involved in the design, development and deployment of information security solutions, for legislative and law enforcement institutions, finance and insurance establishments, and all security-conscious organizations.
The conference will bring together Information Security CEOs, directors of IT, network security and business continuity managers, security analysts, and many other respectable telecom professionals.
MEITSEC will also include discussions on identity theft, hacking, e-forensics, secure online services, perimeter defense, digital espionage, encryption, cyber crime and many other information security-related topics.