Title | The Second Tongil Group Data Processing Personnel Security Seminar | |||
---|---|---|---|---|
Date | 2015-07-17 | Hit | 4866 | |
File | 20150708163031_230.jpg [135kb] |
At 10 am on July 3, 2015, a total of 33 people, including 18 Tongil Group data processing personnel and 15 outside enterprises and lecturers, gathered to discuss and share about security education, cases on security infrastructure and the latest IT trends in the meeting room on the 13th floor of the Dowon Building.
At the opening ceremony, the Secretary General of the foundation Sun-Pyo Hong gave the encouraging remarks. She mentioned cases of data breach at the Korea Hydro & Nuclear Power Company and credit card data leaks, stated that we in the enterprise society are currently in an information war and asked that we protect confidential technologies, as well as customer's information, which comprise our intangible assets. She also asked the data processing personnel to raise their sense of value through self-development and thereby raise the value of the organization.
Following the opening ceremony, the security education commenced. Manager Kyeong-Sam Kim of the foundation's IT team, led the education sessions with the topic "Latest IT Trends and the Threat of Internet of Things." He spoke about recent security threats, and gave explanations and countermeasures on cases of hacking on the Internet of Things equipment, such as smart TV, robot vacuum cleaners and smart cars, that are often used in everyday life.
During the second education session of the morning, manager Jong-Hyun Im of the foundation's IT team gave a presentation on the topic "Efficient Software License Management," and spoke about the current control situation of the illegal software and countermeasures.
Afterwards, nine presentations and lectures were given, including cases from Il Sang Oceanic Development on data recovery through backup solution, cases on improving Yong Pyong Resort's server, two case presentations from affiliate companies, two presentations from domestic lecturers (latest IT trends, hacking of Internet of Things and the countermeasures, efficient software license management) and five lectures by outside lecturers on how to increase the security standards of each company.
The security education lecture by the outside lecturers gathered the opinions of data processing personnel from each company, and especially focused on education pertaining to the centralization of documents on each individual's PC security, ransom ware virus causes and countermeasures, recent cyber security threat trends and safe file management, so that they can be helpful to each of the companies. |
Tag | , , |
---|