Skip to main content

Cyber Security

Information security analysts work to protect an organization’s computer systems networks, to prevent hackers from accessing and/or stealing sensitive information and data.

Why is this skill important?

In recent years there has been an explosive growth in online business transactions, the Internet of Things (IoT) and cloud computing. Simultaneously, IT has become an official and unofficial political tool, as well as a means of new types of warfare. Many countries now deliver essential services online, to the extent that citizens without access to IT may become isolated and disadvantaged. This growing collective and individual dependency on IT places a significant obligation on IT service providers to safeguard their systems and users from intentional and unintentional breaches to the security of data and whole systems. As a result, the importance of the Cyber Security Professional cannot be overstated.

A Cyber Security Professional works to protect an organization’s computer systems networks, to ensure their robustness and prevent hackers from accessing and/or stealing sensitive information and data. The role typically involves configuring firewalls, IPS/IDS, server roles/services and web security solutions to protect confidential information.

A Cyber Security Professional also monitors security breaches and investigates violations. They may conduct penetration testing by simulating attacks to search for vulnerabilities in their networks before they can be exploited for malicious reasons. Their forensic tasks include gathering, preserving, processing, analysing, and presenting computer-related evidence to mitigate networks’ vulnerability to criminal, fraud, and other hostile activities. They have a range of tactics, techniques, and procedures, using a full range of investigative tools and processes.

A Cyber Security Professional usually also supports organizations’ disaster recovery plans, which describes the steps and procedures to restore proper function of an organization’s IT systems and networks after a disaster or attack. These are of paramount importance, financially, reputationally, and for the continuation of essential services. Plans normally include preventative measures such as regular backing up of and transfer of data to an offsite location.

In a fast-moving sector, Cyber Security Professionals must stay one step ahead of potential cyber-attackers. They must keep up with the latest methods attackers used to infiltrate computer systems, as well as with the new security technologies that can help organizations to counter these threats with robust systems and measures.

Location

Goyang, Korea

13—16 October 2022

Competitors

Vusala Alakbarova
Azerbaijan

Ben Armstrong
Australia

Shun Yi AU
Hong Kong, China

Dean Brennan
Ireland

Jason Chua
Singapore

Christopher Fitzsimons
Australia

Mufeed Hamzakutty
India

Darragh Healy
Ireland

AmirFarzam Hosseini
Iran

SHENG-CHUAN HUANG
Chinese Taipei

Amir Mohammad Jahangirzad
Iran

Jihye Jegal
Korea

Luke Jowett
United Kingdom

MIN-JUI KAO
Chinese Taipei

Oliver Kikas
Estonia

Seul Lee
Korea

Kai Xian Lim
Singapore

Sanan Najafov
Azerbaijan

Sai Putravu
United Kingdom

Srihari Ruttala
India

Roomet Sütt
Estonia

Somphon SY
France

Corentin TOUGAY
France

Wai Yee TSANG
Hong Kong, China