Event registration
Event Timing: 19-21 October 2022 (Morning session 9am - 12pm, Afternoon session 1pm - 5pm)
Event Venue: Tungi Colonnade, 2nd Floor, Main Conference Room
You may reach us at 7401353 or atoimoana@pmo.gov.to
Sign in to Google to save your progress. Learn more
Email *
Name *
Phone Number
Organization *
There are 6 total sessions you may register for. You may register for more than one session if you wish. Please register as soon as possible as there are only limited spaces. Malo.
What sessions will you attend? *
Please remember to click the submit button below once you finalise your selections. You will receive an email confirmation of your registration. Malo!
Sessions Description
Wednesday, 19 October 2022

Data Protection & Privacy - Morning session (9am to 12pm)
Data protection is a crucial part of an organisation’s cybersecurity strategy. This training covers various approaches to data protection and privacy laws and regulations and the global trends in protecting data transfers. It also covers various data types, industry perspectives and standards, and the challenges faced by organisations while safeguarding personal data and privacy.

Protecting National Sovereignty Through Cyber - Afternoon session (1pm to 5pm)
In a global supply chain, nations are more exposed to their critical information being exposed or stolen. Governments must understand how to protect their critical assets, especially their data to ensure it is not leaked, stolen, or viewed by unauthorised entities. This training highlights the importance of cybersecurity and data protection to national sovereignty.

Thursday, 20 October 2022

Managing Network Security Threats - Morning session (9am to 12pm)
Network security is important for both home and business networks. Most physical locations with high-speed internet connections have one or more wireless routers, which could be exploited if not properly secured. A solid network security system helps reduce the risk of data loss and theft. This training helps participants understand the concept of network security and the different types of networks. The types of network layers, network attacks, and various network protections is also covered.

Managing Vendor & Partner Relationships - Afternoon session (1pm to 5pm)
Different types of vendor relationships are addressed in this training, providing participants a better understanding of how organisations can efficiently control costs, mitigate IT security risks, and improve business processes, The training also covers strategies for establishing and improving trust and security, interaction, and management of any third-party vendors.

Friday, 21 October 2022

Introduction To Critical National Information Infrastructure Protection - Morning session (9am to 12pm)
Critical Infrastructure (CI) refers to assets that are essential for the functioning of a society and the economy. This training introduces the common practices related to the protection of Critical National Information Infrastructure, while providing an overview of the classification of all elements related to Critical Infrastructure (CI) from a defence and national security perspective. It also looks at the security of various sectors that are critical for a country’s local economy and infrastructure development.

Encryption for Data in Motion & Data at Rest - Afternoon session (1pm to 5pm)
This training provides participants an overview of best practices for data protection. It covers encryption of data at rest, in motion, and best practices for how to store data within and between various services in ensuring its confidentiality, integrity and availability.
A copy of your responses will be emailed to the address you provided.
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy