Press Enter to jump to main content

Press Releases

Apr 05 2015

RTA shares Information Security practices with students of Dubai Women’s College, HCT

RTA shares Information Security practices with students of Dubai Women’s College and HCT

The visit was made in the context of RTA’s strategy of communicating with community segments of relevance to its business scope.

“The visit of the delegation is part of RTA’s strategy of sharing accumulated expertise with students of colleges & universities in various fields of common interest in a bid to enhance their qualification, and groom them for taking leading positions in this regard,” said Abdullah Al Bastaki, Director of IT at the RTA. “Information Security is the cornerstone of the information-driven knowledge economy which is primarily focused on ensuring the safety of information; considering a corporate wealth worthy of care and developing the best techniques of protecting it. Needless to say here that the RTA is committed to its social responsibility in this regard towards relevant community segments,” continued Al Bastaki.

The event was kick-started by a visit to RTA Projects Gallery offering students exposure to the current and future projects of the RTA and its effective role in uplifting the infrastructure of the Dubai Emirate. A visual presentation was then made by Ali Al Qassab, Deputy Director of IT and Senior Manager of Information Security at the RTA, who spotlighted key aspects of information security, the need of sensitizing employees about information security, and procedures needed to enhance information protection and confidentiality. He also touched on a number of key other topics including updates on security threats, cyber-attacks, raising the awareness about information security within the RTA, and the key areas of protecting employees from the risks of information security.

The presentation also covered the best techniques adopted in selecting passwords, e-mail security, updates of global cyber espionage, risks of leaking sensitive information, and the social engineering or the so-called art of mind-penetration and how to safeguard against it.

Print icon Mail icon

Engage with Us

We are here for you. Do not hesitate to communicate with us via the following channels:

Listening ...

You are being redirected to an external website

Please wait a moment ...

Content loading ...

Please wait for a moment