For Latest Jobs in Pakistan & UAE Visit www.amdani.pk
The Cloud Security Alliance (CSA) Global Thursday announced that it was going to hold an international summit on software certification in Pakistan next year.
Dr. Irfan-ul-Haq, President CSA Pakistan, while shedding light on cloud computing and the CSA contributions towards software security, said that the Alliance, since its establishment in 2014 is making efforts to boost the culture of cloud technology in Pakistan. He said the CSA Global is likely to hold an international summit in Islamabad in 2017 on software certification.
This he stated while addressing a daylong workshop on “Secure Software Development” organized by the Higher Education Commission (HEC) in collaboration with Cloud Security Alliance (CSA), Pakistan Software Houses Association (PASHA), and PIEAS.
Dr. Arshad Ali, Executive Director HEC, highlighted the significance of software security and the security of other Information Technology (IT) systems and stressed the need for holding such workshops in universities for IT students. HEC will continue to support such activities for the betterment of students, he added.
The workshop, attended by people from academia and IT research and development institutions, covered various dimensions of software security, web application security, control of cyber attacks, and principles of secure application designs. Some real life security case studies were also presented during the activity.
Israr Khan, resource person of the workshop, said that amid the fast growth of IT sector, software security has become need of the hour. He said that proper upgradation of the modern software security systems is necessary to protect data on IT networks. He briefed the participants about different types of security threats, reasons to mind them, motivation of hackers, and methods of their mitigation.
Dr. Muhammad Aslam, Rector PIEAS appreciated HEC and other entities for holding the workshop as it brought the academia and representatives of IT sector to a single platform to discuss the prevailing software security threats.
Comments
Post a Comment