Cybersecurity Forum on Critical National Infrastructure

On 29 January 2022, the Center for Computer Technology and Networking, Faculty of Computer and Mathematical, UiTM Shah Alam, successfully organized a Cybersecurity Forum with Security Professionals entitled Cybersecurity, Governance & Risk Management for Critical National Infrastructure. This forum was organized to provide exposure and knowledge sharing to students related to issues, risks, and challenges of risk management in cybersecurity in the industry.

The forum had successfully brought together several cybersecurity experts from different backgrounds in the industry. Among the professional speakers who had been invited was Associate Professor Col (R) Dato’ Dr Husin Jazri, the Director of Information Security, Asia Pacific University (APU). Apart from that, Laksamana Muda Dato’ Shamsuddin Ludin, the Director-General of the Defense Cyber and Electronics Division, Malaysian Armed Forces (ATM), was also invited to share his knowledge and experience in addressing risk management issues in cybersecurity from a military perspective. A cybersecurity expert, Ts. Irwan Kunawan Amat Sapuan, the Head of Technology Security, Affin Bank Berhad, also shared his experience discussing cybersecurity issues in banking. Mr Muhammad Muslim Mansor, the Head of Cyber Threats & Incident Management from Celcom Axiata Berhad, is invited to share his experience on the importance of cybersecurity in telecommunication systems.

The discussion of the forum revolved around the security of the Critical National Information Infrastructure (CNII). CNII is critical as its systems and functions are important to the reputation and image of the country. The strength of the country’s economy depends on the confidence of consumers and investors in the security of the Critical National Information Infrastructure, which can determine the country’s growth and can successfully compete in the global market. Maintaining the country’s image by defending national security guarantees sovereignty and independence while maintaining internal security.

It is hoped that this knowledge sharing session can provide more understanding and guidance to scholars and students on how cybersecurity risk management can be applied in the real world of work.