
February 24, 2017
An academic event constituting the first stage of the USOM-SOME Information Security Training was held on Friday, February 24, 2017, at the headquarters of the Information Technologies and Communication Authority in Ankara. The program, carried out in collaboration with Boğaziçi University Management Information Systems Cybersecurity Studies Center, attracted great interest.
SAYAN: USOM'S TRAININGS WILL CONTINUE
Speaking at the training, BTK President Dr. Ömer Fatih Sayan emphasized that USOM will continue such and similar events in the coming days. Sayan highlighted that significant studies are being conducted within BTK regarding both the coordination of SOMEs and actions to be taken in sudden situations.
BTK Information Technologies Department Head Gökhan Evren, who also spoke at the training, mentioned BTK's activities in the field of cybersecurity and emphasized that progress will continue rapidly with trainings in this area.
Assoc. Prof. Dr. Bilgin Metin, manager of Boğaziçi University Management Information Systems Department BÜSİBER, who participated in the training and works in the fields of information security, information technology governance, and communication systems, spoke about the global importance of cybersecurity and the services they provide in his introductory speech.
CYBER WORLD HAS FOUND AN IMPORTANT PLACE FOR ITSELF
Referring to the cyber security emergency action plan for the public sector, Bilgin Metin emphasized the intensification of cyber wars on global and national scales, drawing attention to the fact that protection is as important as threats for security. Stating that the cyber world has found an important place for itself in a shrinking world due to globalization, Metin touched upon the claim that Russia changed the election result through cyber methods in the recent US presidential elections. Bilgin Metin explained that cyber attacks carry the risk of even affecting the fate of countries and that Turkey must also protect itself and draw a strong course in this field.
PLAN, CONTROL, PROTECT!
Stating that planning and control come first among the measures taken against threats, Bilgin Metin conveyed that the protection mechanism in information security is examined under subheadings such as cryptography, secure networks, access control, security devices, system hardening, application security, and data protection in the training.
In the training, questions such as: Should external devices be allowed access to any institution's system? Does such access cause a security vulnerability? Can applications loaded onto a reliable system pose any risk? What should an institution's data backup strategy be? were discussed. Additionally, topics such as how to obtain documentation on information security and how audits should be conducted were detailed.
In the two-day training, presentations will also be made on topics such as establishing an information security management system, applying information security controls in IT systems, and supplier relations.