20 de April de 2018

Cisco reforça estratégia de IoT com visibilidade e segurança

Até 2020, 46% dos dispositivos na rede serão do tipo machine to machine (M2M), segundo relatório da Cisco. O mais preocupante, contudo, é que cada novo dispositivo é uma porta de entrada para cibercriminosos, que ficam à espreita em busca de vulnerabilidades. Segundo projeções da fabricante, hackers têm agora a habilidade de infectar 100 mil dispositivos de internet das coisas (IoT) em um período de 24 horas.

Atenta a esse cenário, a Cisco tem trabalhado nos últimos anos para suportar a geração atual e futura de “coisas” conectadas à rede. O mais recentemente movimento da empresa nesse sentido batizado de Intent-Based Networking aconteceu nesta semana durante o Cisco Partner Week, realizado em Nassau, Bahamas.

A estratégia permite que profissionais gerenciem dispositivos conectados à rede de forma escalável. A plataforma identifica, localiza e cria políticas para dispositivos IoT, provendo insights para garantir que operações sejam eficientes.

Segundo Dave West, vice-presidente global de vendas para Enterprise Networks da Cisco, a ideia é oferecer um conjunto de ferramentas aos clientes para melhor visibilidade dos sistemas de IoT, ao mesmo tempo em que melhora a segurança dos dispositivos.

Simplificação

Uma das vedetes da novidade é o acesso definido por software (SDN, na sigla em inglês), uma maneira simplificada e automatizada de gerenciar a rede como uma entidade única. A expansão significa que o acesso definido por software pode fornecer uma política consistente e visibilidade consistente nos vários ambientes dos clientes, permitindo que eles automatizem as operações.

West revelou que os benefícios dessa abordagem incluem simplicidade, segurança e escala. Sachin Gupta, vice-presidente sênior de Product Managament para Enterprise Networking da Cisco, apontou que visibilidade é parte crucial da internet das coisas. “Assim, o Cisco Identity Service Engine reconhece os dispositivos que estão conectados à rede de forma automática, sementando a rede por tipo de dispositivo”, esclareceu.

Jason Gallo, diretor global de Partner Sales Business Developer da Cisco, apontou que, na prática, para os parceiros, essa nova abordagem muda a capacidade de o ecossistema levar serviços para as empresas. “Há mais oportunidades”, sintetizou.

Subscrição

Na jornada Intent-Based Networking, a Cisco optou por mudar o modelo de comercialização dos produtos, apostando em subscrição. No ano passado, a empresa lançou o modelo para o portfólio de switches e wireless. Agora, a companhia ampliou a estratégia e passou a oferecer o mesmo formato para o portfólio de roteadores.

Para Gallo, a oferta de um modelo de assinatura não só dá ao cliente o que ele precisa, como também torna seu relacionamento com os parceiros mais estável e duradouro. “A adição desses novos modelos de consumo e como é possível adaptar a forma como o cliente deseja consumir a tecnologia em um longo período está acontecendo na Cisco e os parceiros precisam ficar em linha. Eles estão realmente animados com esse formato. Temos agora o mesmo conjunto de benefícios em todo o portfólio de roteadores.”

*A jornalista viajou a Nassau, Bahamas, a convite da Cisco

Article source: https://www.itforum365.com.br/mercado/cisco-reforca-estrategia-de-iot-com-visibilidade-e-seguranca/

Novas tecnologias promovem salto dos negócios no ecossistema …

“It’s time to rise.” Foi com essa mensagem que a Cisco deu início ao Cisco Partner Connection Week, evento anual da empresa realizado nesta semana em Nassau, Bahamas, que reúne parceiros de todo o mundo. O mote está em linha com a estratégia da empresa de ajudar seu ecossistema a promover um verdadeiro salto nos negócios.

“Esse é o momento ideal. Empresas estão imersas em complexidade, mas querem extrair mais valor dos investimentos feitos. Temos uma oportunidade única de entregar inovação. Você está pronto?”, provocou Nirav Sheth, vice-presidente de Arquiteturas, Soluções e Engenharia de Global Partner Organization da Cisco.

Ruba Borno, vice-presidente de Iniciativas de Crescimento da Cisco, sucedeu Nirav endossando as mudanças do mercado. “Estamos definitivamente na era digital. Carros autônomos, blockchain e cirurgia robótica já fazem parte da nossa vida. Do ano passado para cá, 400 milhões de pessoas tiveram acesso à web, 14 bilhões de dispositivos passaram a estar conectados na rede e US$ 11 bilhões foram investidos em inteligência artificial”, enumerou.

Nos próximos cinco anos, projeções da empresa mostram uma aceleração da transformação. Serão 27 bilhões de dispositivos conectados, 83% das cargas de trabalho na nuvem e os datas centers ampliarão em 390% sua capacidade de storage. Um cenário complexo? Sem dúvidas, mas que demanda preparação desde já não só na infraestrutura das empresas, como também na cultura.

Na estratégia na Cisco, explicou Ruba, essas tendências estão pautadas em cinco pilares: segurança, reinvenção da rede, multicloud, dados e experiência do usuário. “Essa é uma grande oportunidade para parceiros. São investimentos que estão sendo feito pelas companhias”, comentou ela.

Ruba explicou cada um dos pilares, começando por segurança, mas alguns destaques ficam evidentes. Segundo ela, a Cisco identifica, por dia, 20 bilhões de ameaças e cerca de 70% dos ataques usam tráfico encriptado e as tecnologias da fabricante identificam malwares sempre precisar descriptá-los.

“Um exemplo foi o que aconteceu no Mobile World Congress deste ano. Fomos responsáveis pelo Wi-Fi da feira, que reúne a comunidade global de telecom. Identificamos que 85% do tráfego era encriptado e tivemos 350 eventos de segurança bloqueados”, detalhou, completando que a Cisco usa machine learning para entender o que é um malware e mitigá-lo rapidamente.

Em redes, a executiva contou que a empresa trabalhou nos últimos anos para automatizá-la, levando mais inteligência a ela. Com relação à nuvem, Ruba comentou que a proposta da empresa é garantir a simplificação, ajudando clientes a navegar pelas cloud públicas e privadas com facilidade. “Dos 94% daqueles que usam cloud, apenas 11% acreditam que ela otimiza o trabalho. Por que? Porque o ambiente é complexo”, justificou.

*A jornalista viajou a Nassau (Bahamas) a convite da Cisco

Article source: https://www.itforum365.com.br/mercado/novas-tecnologias-promovem-salto-dos-negocios-no-ecossistema-cisco/

700 formateurs certifiés Cisco pour la formation professionnelle

Lors de l’ouverture des ateliers Cisco sur les technologies émergentes et la sécurité informatique (du 15 au 17 avril courant), le ministre Mohamed Mebarki a mis l’accent sur la volonté des pouvoirs publics de miser gros sur les technologies numériques et la protection des réseaux à travers surtout la formation d’une ressource humaine qualifiée et certifiée aux normes internationales.

Dans cette perspective, le secteur de la formation professionnelle a fait le choix de travailler en étroite relation avec les grandes firmes internationales dans ces domaines, à l’instar de Microsoft et de Cisco Systems, l’un des leaders mondiaux dans le domaine de la transformation numérique de l’IT et des réseaux.

Grâce à une convention de partenariat signée entre les deux parties (Cisco Systems et ministère de la Formation professionnelle) en 2002, un nombre important de personnes a bénéficié de formation de niveau international. «Aujourd’hui, le secteur compte plus de 700 formateurs certifiés Instructeurs Cisco (CCNA1 et CCNA2, CCNA Discovery et CCNA Exploration et CCNA Sécurité). Egalement, le nombre de certifications suivies s’élève à près de 24 000 (plus exactement 23 993).

Nous sommes, par exemple à 2600 participants pour l’année 2017», révèle le ministre en précisant que cet acquis couvre une grande partie des besoins des entreprises en quête de ces qualifications et offre aux personnes certifiées de réelles perspectives d’évolution et de promotion professionnelles. Par ailleurs, «la convention a permis la création de 36 académies Cisco, à l’instar d’un ITC Instructor-Training Center, ou Centre de formation d’instructeur Cisco), réparties à travers le territoire national», se félicite encore M. Mebarki.

«Depuis 2006, ces académies ont permis non seulement le transfert de connaissances dans la partie réseaux (maintenance et installation), mais aussi d’asseoir tout un programme de formation ambitieux et innovant, qui vise principalement la mise à niveau de l’encadrement et l’amélioration de la performance pédagogique par rapport à des standards internationaux», poursuit-il.

Cette stratégie de partenariat a permis aussi d’entreprendre et de mettre en pratique plusieurs actions dans le domaine des réseaux et des systèmes par la certification des formateurs. Lors de ces ateliers organisés dans le nouvel institut de Bou Ismaïl, les différents intervenants ont mis l’accent sur l’importance et la complexité de la tâche qui incombent aux responsables et professionnels chargés d’assurer la sécurité des données numériques et de la protection des réseaux.

Avec le développement rapide des outils numériques et leur hégémonie, la sécurité informatique est un enjeu capital qui doit être pris en charge par les informaticiens formés et qualifiés, mais c’est un défi que doivent relever tous les secteurs. «Avec le développement de l’internet dans notre pays et le processus de modernisation de nos entreprises, il est clair que les hackers trouveront un terrain propice pour s’adonner à la piraterie.

Plus le taux d’infiltration est grand, plus les hackers redoublent d’attaques», met en garde le président du groupement «CyberSec» et expert en sécurité informatique, Abdelaziz Derdouri. Ce dernier affirme par ailleurs que l’Algérie est classée parmi les pays les plus infectés en virus informatiques. Il motivera cette information par le téléchargement et l’installation fréquents de logiciels et d’applications gratuits.

«D’ailleurs, les statistiques en Algérie font état, selon le conférencier, de l’infection par des virus de 30% des micro-ordinateurs. Aussi, 50% des intrusions dans les réseaux des entreprises algériennes sont internes (téléchargements, e-mails…). Dans le monde, 100 000 virus sont développés chaque jour, mais malheureusement l’on ne peut pas fabriquer autant d’antivirus.

«C’est une bataille perdue d’avance», poursuit-il. Très prolixe en informations, A. Derdouri énumère les différents types de cyberattaques : espionnage diplomatique, industriel, renseignements militaires et vol de données. Cette dernière agression représenterait d’ailleurs quelque 52% des cyberattaques.

Crimes des temps modernes, ces attaques en ligne sont devenues un business très lucratif qui représentait en 2011 l’ahurissante  bagatelle de 388 milliards de dollars dans 24 pays seulement. La délinquance numérique n’est plus cette petite forfaiture commise sur une Toile virtuelle, son danger est désormais réel, surtout lorsque l’attaque cible des réseaux stratégiques comme l’électricité, l’alimentation en eau, les réseaux de communication ou les sites d’hydrocarbures.

«Et lorsque l’on sait que nos secteurs sont interdépendants, on comprend mieux les risques de ces attaques via le Net. D’où l’appellation d’armes d’interruption massives», lance l’intervenant. De son côté, l’avocate en droit des affaires, Me Hind Benmiloud, incite les chefs d’entreprise à sécuriser leur patrimoine.

«Personne n’est à l’abri. Les petites comme les grandes entreprises algériennes dans tous les secteurs d’activités sont concernées et elles doivent toutes être dotées d’un système de prévention contre ce genre de crime économique», a-t-elle expliqué en préconisant l’installation d’un système de cybersécurité, l’adoption d’une charte informatique comprenant l’obligation de la confidentialité pour les employés à titre d’exemple.

Côté législation, l’avocate regrette que les textes actuels nés d’un dispositif légal et d’un programme national de lutte contre ce fléau de 2004 reste insuffisants. Elle dénoncera par ailleurs les lenteurs qui font que les offices de lutte mis en place par les textes en 2009 ne soient toujours pas installés.

En guise de solutions pour protéger les données numériques, les spécialistes plaident pour l’adaptation des lois et la création de centres d’alerte. Il est aussi recommandé d’organiser des exercices de simulation de cyberattaques. «Les enjeux de la cybersécurité sont énormes et le Web devient désormais un vrai champ de bataille dont il faut se prémunir», a conclu Abdelaziz Derdouri. Mais avant toutes ces options, la formation des ressources humaines qualifiées et compétentes reste la véritable clé de voûte de toute cette dynamique de sécurité.

Chose à laquelle le ministère de la Formation professionnelle déclare s’atteler. «L’accès de nos ressources humaines à des parcours reconnus universellement est un indicateur puissant de performance pour notre pays, et gagner la bataille du numérique et de la digitalisation est l’un de nos principaux défis.

Dans ce cadre, nous développons au niveau de nos établissements des formations à tous les niveaux en audiovisuel (en arts graphiques, en informatique), tels que l’administration de data centers, le développement d’applications multiplateformes, cloud et virtualisation ; (en télécommunication), l’installation de réseaux de télécommunication, le câblage et la maintenance de réseaux… 30 wilayas assurent également le programme Cisco Networking académies», fait valoir Mohamed Mebarki.

Article source: http://www.elwatan.com/hebdo/etudiant/700-formateurs-certifies-cisco-pour-la-formation-professionnelle-18-04-2018-366518_264.php

Cisco casts an eye over IoT protocol landscape: Everything the light …

Cisco has pitched its intent-based networking capabilities as a way to get control over the Internet of Things.

There are good reasons to try and automate the network behaviour of IoT devices: as Cisco’s enterprise networking marketing vice president Prashan Shenoy told The Register’s networking desk, the ratio of IT personnel to Things, now one human to 100 devices, could hit 1:100,000 over the next few years.

And there’s a characteristic of the IoT market that Cisco’s perfectly placed to address: it’s a jungle of proprietary protocols that often aren’t mutually intelligible. In a world that had DECnet, Novell NetWare’s SPX/IPX, Banyan Vines, AppleTalk, SNA and more, Cisco’s ability to route anything over the Internet stack was the foundation of its 1990s-era dominance.

Shenoy said there’s no need to replace the disparate IoT protocols out there; the aim, rather, is to handle every protocol, to “feed information into Cisco’s infrastructure”.

That infrastructure has three themes: to handle the devices themselves, intent-based networking (IBN) identifies, locates, and sets policy for IoT devices; to rescue admins from the vast number of devices, IBN provides scalable operations across all network systems; and it offers realtime machine learning and analytics to manage network issues in real time.


Cisco shrinks Tetration for ESX and SaaS

READ MORE

Shenoy said the most immediate impact of the advent of IoT on enterprise networks comes from the newly-introduced diversity of device types, with two impacts: first, stuff like HVAC systems, lighting, or healthcare devices are showing up on networks managed by IT systems; and that brings with it a new population of personnel responsible for devices.

The building systems (HVAC or lighting) are managed by facility personnel; the wheelchair or heart-rate monitors are managed by nurses; and neither of these populations are oriented to IT management.

In product terms this stands on three legs:

  • Shenoy explained that ISE – the Identity Services Engine – has been enhanced to apply policy control to all IoT devices (which is why support for protocols like CIP, PROFINET, Modbus, and BACNet is so important);
  • The Software-Defined Access (SD Access) solution introduced last year has been extended for IoT devices, covering environments like distribution centres and the like;
  • Analytics provide the operational insights to keep everything going. Cisco’s WiFi infrastructure is central to this strategy, since it gathers IoT device location to help the cloud-based software “understand the assets the line of business manages”, he said.

The Identity Services Engine has more than 600 new device categories, Shenoy explained, recognising devices based on their profile and protocols. That profile is then married with policies (with coverage of compliance and vulnerabilities), which is pushed to targets such as the firewall, to manage access control; and DNA Center to control who needs to use a device.

On the analytical side, Shenoy said, the IoT imposes new requirements on the IT manager, because unlike a database server, IoT devices can be life-or-death (for example in healthcare).

Even short of extreme scenarios, hospital nurses have a lot of their time diverted by asset management tasks like finding a wheelchair for a patient.

Having the analytical system watch the assets in real time, and raise an alert if a business rule is broken, can relieve that workload – for example, by alerting the right person if a wheelchair leaves the hospital.

In a manufacturing setting, he said, a machine raises an alarm if it’s vibrating too much, but that’s a local operation; with an integrated IoT system, that alarm can be pushed to the right person, even if they’re not out on the factory floor.

Switches, WiFi for IoT IBN

The IoT strategy is supported by two networking product launches: additions to the Catalyst 9000 series; and the Aironet 4800 W-Fi access point.

There are two Catalyst 9500 switches in the launch: a high-density 25 Gbps Ethernet switch for the enterprise core and a single rack unit 25/40/100 Gbps unit.

On the Wi-Fi side, the Aironet 4800 focuses on manageability: its connection back to DNA Center uses “dedicated radio whose sole job is to look for security issues androgue devices”.

The access point can capture 240 anomaly types in real time to send to the analytical engine, Shenoy said. ®

Sponsored:
Unleash the potential of all-flash storage in your Data Center with Huawei

Article source: https://www.theregister.co.uk/2018/04/18/cisco_intent_based_networking_for_internet_of_things/

Moro é ‘cisco no olho’ e "instrumento" para perseguir o PT, diz Dirceu

247 - O ex-ministro José Dirceu, que aguarda em liberdade o julgamento do último recurso pelo Tribunal Regional Federal da 4.ª Região (TRF-4), marcado para quinta-feira, 19, afirmou que Sérgio Moro é um “cisco” e atua como um “instrumento” para fazer perseguição política ao PT. Dirceu, que foi condenado a 30,9 anos de reclusão, pediu que os membros e a militância do partido não se preocupassem com ele, mas com a liberdade do ex-presidente Luiz Inácio Lula da Silva.

“Meus companheiros de cela muitas vezes, pela inocência, se desesperaram, e eu falei: ‘Está vendo esse cisco?’ É o Moro’. Ele não é nada, é um instrumento. O aparato policial judicial é um aparato de perseguição política. Não é só de criminalizar o PT, há setores que estão percebendo isso”, disse Dirceu.

“Todo lugar é uma trincheira. Onde eu estiver, vou estar numa trincheira, mas sou como um de vocês: eu estou preocupado com Lula, não comigo. Vocês podem ver que eu me cuidei. Eu sou um soldado, temos que libertar o Lula. Temos que enfrentá-los e não baixar a cabeça. Eles têm que ter certeza de que vamos ressurgir das cinzas. Temos que ser implacáveis com eles. Eles não deixaram a gente governar, por que vamos deixar eles governar?”, completou.

“Nosso principal inimigo é o sistema financeiro bancário, o rentismo e a Rede Globo. Vocês sabem que eu gosto de uma aliança, mas vamos precisar rever a forma petista de governar. A questão é como governar sem aderir à receita neoliberal. Os desafios são muitos, mas eu sou otimista. Nós precisamos tirar lições do que aconteceu no País”, destacou.

 

Economize em suas compras usando Cupons de Desconto

S21sec e Cisco juntam-se para debater Regulamento Geral de …

A S21sec e a Cisco juntam-se para a realização de um evento, no próximo dia 20 de Abril, no Hotel Fénix em Lisboa, que terá especial incidência no debate sobre a entrada em vigor do Regulamento Geral de Protecção de Dados (RGPD). O evento é de entrada livre, mas exige inscrição prévia obrigatória.

Além das estratégias corporativas para a cibersegurança, neste evento é, também, apresentada «a visão conjunta de como a protecção de dados pode e deve estar integrada numa plataforma de comunicações intuitiva e dotada de serviços de segurança abrangentes, não sendo apenas um problema resolúvel com gestão de informação e controlos administrativos».

Da mesma forma, no decorrer de 2018, a S21sec e a Cisco preparam-se para conduzir um conjunto de eventos que «desafiarão as empresas a ponderar sobre questões centrais para o desempenho corporativo».

«Com uma forte e inovadora aposta nos diversos domínios da segurança de informação, a Cisco detém hoje um portefólio abrangente e integrado, conferindo aos seus clientes competências únicas em protecção de dados. Ao nos associarmos à S21sec, juntamos peças complementares que permitem trazer ao mercado ofertas que endereçam estes desafios de forma abrangente, e reforçamos a atenção que este tema merece por parte das empresas nacionais», referiu Sofia Tenreiro, Directora Geral da Cisco Portugal.

«A S21sec é um pure player de serviços que, com mais de 240 pessoas na península ibérica, gere a cibersegurança dos seus clientes a partir de um centro de operações de segurança transnacional. Através desta colaboração com a Cisco Portugal tencionamos alertar os nossos clientes e parceiros para a implementação cuidadosa de estratégias capazes de diminuir o impacto no negócio deste regulamento», afirmou João Barreto Fernandes, Vice-president of Strategic Marketing, S21sec.

Via S21sec, Cisco.

Article source: https://www.pcguia.pt/2018/04/s21sec-e-cisco-juntam-se-para-debater-regulamento-geral-de-proteccao-de-dados/

No More Meltdowns: Cisco and Microsoft Will Use Intel’s Silicon …

Jessica Lyons Hardcastle

SAN FRANCISCO — At an Intel event on Monday night, Meltdown and Spectre remained the bugs-that-must-not-be-named, with Intel VP Rick Echevarria only calling them the “vulnerabilities disclosed in January.”

These chip design flaws, however, set the stage for Intel’s silicon-level security technology it announced at the start of RSA Conference 2018. The new Threat Detection Technology — which will be used in Cisco and Microsoft products — embeds security into the chips, according to the chipmaker.

Related Articles

Google Kaniko Tool Wrenches on Container Privilege Concern
Google Kaniko Tool Wrenches on Container Privilege Concern
Winners and Losers After ZTE Is Banned From Buying U.S. Components
Winners and Losers After ZTE Is Banned From Buying U.S. Components
Microsofts Smith Calls for Digital Geneva Convention, Launches Cybersecurity Tech Accord
Microsoft’s Smith Calls for Digital Geneva Convention, Launches Cybersecurity Tech Accord
Mirantis Launches Moonshot Based on Netflix-Developed Spinnaker
Mirantis Launches Moonshot Based on Netflix-Developed Spinnaker
The Russians Are Targeting Internet Routers for Cyber Attacks, Says Joint U.S., U.K. Alert
The Russians Are Targeting Internet Routers for Cyberattacks, Says Joint U.S., U.K. Alert

“Intel Threat Detection Technology is a set of silicon capabilities to help the ecosystem do a better job at detecting a new class of threats,” said Echevarria, vice president in the software and services group and general manager of the platforms security division at Intel.

Intel announced two of these capabilities on Monday. The first is accelerated memory scanning.

Current malware scanning that runs on CPUs can detect memory-based attacks, but they also tend to slow processing power. Intel’s new technology offloads virus scanning to its integrated graphics processors, which the company says enables more scanning while reducing performance and power impact.

“We’re seeing CPU utilization go from 20 percent to 2 by offloading memory scanning to Intel integrated graphics processors,” Echevarria said.

Microsoft will integrate accelerated memory scanning into its Microsoft Windows Defender Advanced Threat Protection’s (ATP) antivirus capability, which is available now.

Cisco Tetration Integration

The second capability is advanced platform telemetry, and it will be integration into Cisco’s Tetration analytics platform. This feature combines platform telemetry with machine learning algorithms to improve threat detection. “But in addition to improving detection, it also reduces the number of false positives and improves performance,” Echevarria said.

Roland Acra, SVP and GM, data center business group at Cisco, said the partners don’t have a ship date for the Tetration integration. It’s “in the works,” he said, adding that the technology will help Cisco customers prevent future CPU flaws.

“Some of the signals that Intel produces are associated not so much with a vulnerability, but with an actual exploit, like Spectre and Meltdown, for example,” Acra explained. “So really the issue is that for every million servers that could be exploited because they have the vulnerability, there’s one that actually has the exploit.”

The Intel platform telemetry combined with Tetration’s analytics will allow companies to only upgrade infected servers, as opposed to upgrading all servers that could potentially be infected. “That’s too much work and people don’t have time for that,” he said. “It is really to reduce the work to the ones that are actually being exploited.”

Security Essentials

Also at the event Echevarria announced something called Intel Security Essentials, which he said ensures a consistent set of root-of-trust hardware security capabilities across Intel Core, Intel Xeon, and Intel Atom processors. These include secure boot and hardware protection, and are part of the hardware-based security improvements promised by CEO Brian Krzanich last month to prevent future attacks like Sprectre and Meltdown.

The company also remains committed to helping fix the shortage of cybersecurity professionals, Echevarria said. To that end Intel partnered with Purdue University to co-develop and launch its Design for Security Badge program for students and professionals.

“Our commitment to product innovation for security as well as our participation in this ecosystem is built on three pillars: reinforcing the root of trust, silicon innovation, and industry collaborations beyond technology,” he said.

Photo: Intel VP Rick Echevarria talks chip security at an RSA Conference 2018 event. 

Article source: https://www.sdxcentral.com/articles/news/no-more-meltdowns-cisco-and-microsoft-will-use-intels-silicon-level-security/2018/04/

"Moro é um cisco, não é nada", afirma José Dirceu, prestes a voltar …

JÁ É ASSINANTE?

Informe seu usuário e senha cadastrados e acesse nossos conteúdos exclusivos

login em GaúchaZH

Article source: https://gauchazh.clicrbs.com.br/politica/noticia/2018/04/moro-e-um-cisco-nao-e-nada-afirma-jose-dirceu-prestes-a-voltar-para-a-prisao-cjg33127n007d01qjwn64zpnl.html

Cybersécurité et technologies innovantes : Former pour prendre en …

Le séminaire sur la cybersécurité et les technologies innovantes a clôturé ses travaux, hier à Bousmaïl, wilaya de Tipasa, en partenariat avec CISCO ACADEMIE, géant mondial du numérique et des solutions informatiques, à travers des ateliers de formation. Lors de cette manifestation, plus de 110 informaticiens, techniciens et ingénieurs de différents départements ministériels, des gendarmes et policiers ont reçu leur certification au système SDN (Sofwaredefined Networking). Une certification qui vise l’obtention d’une meilleure programmabilité, un contrôle centralisé et une orchestration des ressources réseaux, ainsi que leur virtualisation. Ce programme permettra la certification des instructeurs CISCO du secteur qui pourront, à leur tour, dispenser la formation aux stagiaires au sein des académies CISCO, implantées au niveau des instituts nationaux spécialisés au nombre de 36 académies NET ACAD. Au cours de son discours en ouverture du séminaire, Mohamed Mebarki, ministre de la Formation et de l’Enseignement professionnels, a affirmé que «l’Algérie se prépare activement pour la formation des ressources humaines capables de prendre en charge ces mutations, et s’atteler au développement économique universel». À ce titre, les objectifs de cet atelier de formation, dit-il, «sont importants et s’inscrivent dans la stratégie du gouvernement algérien à mettre en œuvre une politique nationale de développement d’une économie numérique et d’une stratégie de cybersécurité qui l’accompagne». Le ministre a affirmé que l’Algérie « est de plus en plus exposée aux cyberattaques et infections malicieuses des systèmes d’informations et des données», ajoutant que «les risques de cyberattaques sont de plus en plus fréquents, la cadence des tentatives d’intrusion, perpétrées à l’encontre des institutions et des organismes publics et privés, risque de devenir soutenue». M. Mebarki considère cependant que la lutte contre la cybercriminalité commence d’abord par la formation des professionnels et l’initiation des usagers, par rapport aux risques encourus et aux attitudes à adopter. Ce dernier s’est dit convaincu de la pertinence de cet évènement, qui, selon lui, apportera une contribution certaine à  la mise en œuvre d’une stratégie nationale de cyberdéfense.

Le secteur a été précurseur en établissant un partenariat avec le géant CISCO en 2002

Le ministre a rappelé, à cette occasion, que le secteur de la formation professionnelle a été précurseur en Algérie à avoir conclu en 2002 une convention de partenariat avec Cisco Systems. Ce partenariat a fait que le secteur compte aujourd’hui plus de 700 formateurs certifiés Instructeurs Cisco (CCNA1 et CCNA2, CCNA Discovery et CCNA Exploration et CCNA Sécurité). Le ministre mettra en avant les nouvelles technologies de l’information qui sont devenues un élément clé de compétitivité et occupent une place de plus en plus prépondérante dans la stratégie des entreprises. Dans ce contexte, d’ailleurs, le ministre constatera que «les gains de productivité obtenus par les secteurs utilisateurs des TIC sont très importants, étant donné l’incorporation d’effets qualité aux produits». Sur un autre plan, si pour un pays, il n’est, certes, pas nécessaire d’être producteur de TIC pour bénéficier de leurs effets favorables, mais rester uniquement utilisateur, conduit à une relation de dépendance.
«C’est aussi dans ce cadre que nous avons entrepris, avec l’appui de partenaires nationaux et étrangers, la mise en place d’un Centre d’Excellence dédié aux TIC et aux métiers de la téléphonie, appelé à être un pôle de rayonnement local, national et régional, dans les TIC et les métiers de la téléphonie», a-t-il affirmé, ajoutant que «ce centre d’excellence a pour objectif de propulser les technologies de l’information et de la communication et les métiers de la téléphonie, notamment par la formation et la mise à disposition du marché de l’emploi, de compétences spécialisées en vue d’accroître durablement le taux de croissance de notre économie, dans le cadre du nouveau modèle de croissance économique, hors hydrocarbures». Le ministre affirme enfin que le secteur de la formation et de l’enseignement professionnels poursuivra sa quête d’acquisition et de capitalisation d’expertises innovantes, et consolidera sa stratégie de certification universelle, comme garant de la qualité des enseignements et des qualifications transmises aux apprenants. Lors de ce séminaire, les spécialistes participants se sont interrogés, dès lors, sur les solutions pouvant stopper les cyberattaques. Les spécialistes plaident d’abord pour l’adaptation des lois sur la cybersécurité, et la création ensuite des centres d’alerte. L’autre option à préconiser consiste à organiser des exercices de simulation de cyber-attaques pour atténuer les effets et l’organisation des campagnes de sensibilisation. «Les enjeux de la cybersécurité sont énormes, et le Web devient désormais un vrai champ de bataille dont il faut se prémunir», a conclu l’expert Abdelaziz Derdouri.
Mohamed Mendaci
 

Article source: http://www.elmoudjahid.com/fr/actualites/122624

Cybersecurity Bachelor’s Degree Now Offered at Herzing University

MENOMONEE FALLS, Wis., April 17, 2018 /PRNewswire/ – Herzing University today announced the launch of a new Bachelor of Science in Cybersecurity program that will be offered online as well as at campuses in Madison, WI and Atlanta, GA. Enrollment is open and classes will start May 7, 2018.

Herzing University (PRNewsfoto/Herzing University)

Job opportunities for information security analysts have been strong for years and are expected to hit almost 30 percent growth through 2026, according to the Bureau of Labor Statistics.

“Every day, it seems, we hear about another cybersecurity emergency at a business or organization, and we know employers need help combating these threats,” said Chris LaBounty, system division chair of technology at Herzing University. “Our faculty have real-world experience and our hand-on training – whether on campus or online – prepares our students for just about anything they might encounter after graduation.”

In the program, students learn how to help organizations protect their networks and systems while complying with information security regulations and mitigating risks. Students learn:

  • The fundamentals of information technology, networks and software
  • Specialized cybersecurity skills in ethical hacking, network security, computer forensics, applied cryptography and more.

In addition, Herzing offers a feature only a few other schools can match – its information technology programs include coursework that prepare students for valuable industry certifications and it covers these exams in the cost of tuition:

  • CCNA Routing Switching
  • CompTIA Security+
  • Microsoft Certified Professional (MCP)

“Employers look at these certifications as a sign of advanced skills,” LaBounty said. “We’re proud to offer this benefit as a way to help our graduates become more marketable.”

Full-time and part-time options are available, in addition to a dual-credit opportunity that enables students to earn up to 12 credits toward their MBA while completing their technology-related bachelor’s degree.

Fueled by employer demand, Herzing is also expanding its technology-related bachelor’s degrees with Computer Programming and Computer Networking this May. Additionally, the university has added a new Data Analytics Concentration to its IT offerings.

For more information about Herzing’s information technology programs, please visit www.herzing.edu/technology-degree-programs.     

About Herzing University
Herzing University is an accredited, private nonprofit institution with 10 campuses across seven states, a continuing education division and an online division. Founded in Milwaukee in 1965, more than 30,000 students have graduated from the University’s career-focused and flexible master’s, bachelor’s, and associate degree, diploma and continuing education programs. Fields of study span nursing, healthcare, technology, business and public safety. From 2013 through 2018, U.S. News World Report has continually recognized Herzing University as having some of the best online programs nationally. Herzing University is accredited by the Higher Learning Commission; www.hlcommission.org or (800) 621-7440. More information about Herzing University is available at www.herzing.edu.

Contact:
Candice Hudson
312-661-1050
rel=”nofollow”chudson@cbdmarketing.com 

 

Cision View original content with multimedia:http://www.prnewswire.com/news-releases/cybersecurity-bachelors-degree-now-offered-at-herzing-university-300630940.html

SOURCE Herzing University

Article source: http://markets.businessinsider.com/news/stocks/cybersecurity-bachelor-s-degree-now-offered-at-herzing-university-1021435134