About this newsletter

SACC-CCSIT-IAU is a digital newsletter provides an effective electronic communication channel for cybersecurity experts and the public. It raises awareness about cyberattacks and how to stay safe in the cyber world. It also publishes current news about cybersecurity, the achievements of cybersecurity students at the College of Computer Science and Information Technology, and recent research publications for faculty and students.

 

 

News & Past Events

Aramco Collaborated with IAU to Conduct a Two-Days Cybersecurity Workshop: The information Protection Department (IPD) collaborates with the College of Computer & Information Technology (CCIT) to faciliate a 2-days cybersecurity workshop about the “Quantum Era & Post-Quantum Cryptography”. IPD employees Abdulelah S. Alghamdi and Abdullah T. Alessa from Cryptography Solutions joined forces with the college to deliver these sessions. The 1st session is dedicated to exploring the advancements in quantum computing technology, whereas the 2nd day delves into the cybersecurity implications of the post-quantum era, while those sessions are part of the curriculum and integral to the students’ forthcoming examinations. One of the cybersecurity chair objectives is to bridge the gap between academia and the industry, it emphasizes the initiative’s influence on academic programs and introduces real-word business challenges to university students. The Aramco Cybersecurity Chair initiative’s partnership with IAU is designed to foster ongoing community engagement that transcends corporate confines, focusing on nurturing future graduates who will enter the industry.



Aramco Information Protection Department Director to Participate in the 6th National Conference for Computer Colleges: Under the patronage of his excellency professor Dr. Abdullah Al-Rubaish, President of Imam Abdulrahman bin Faisal University. The College of Computer & Information Technology is hosting the 6th National Conference for Computer Colleges on May 8-9, 2024. Aramco Information Protection Department (IPD) Director, Omar Y. Al-Thukair is participating in a panel discussion title “The role of computing colleges in fostering education quality for human development”, where he will be shedding lights about the cybersecurity chair’s efforts into enhancing curriculums, and how can the private sector contributes into elevating the academic programs through the participation as a member of advisory committee.



D&IT Hosted Demonstration Session of Yokogawa SCADA Systems for IAU Senior Students: As part of IPD’s Cybersecurity Chair ongoing efforts to make an impact in OT Cybersecurity domain, IPD in collaboration with Yokogawa, has successfully conducted a demonstration session to enrich the knowledge of Imam Abdulrahman University (IAU) senior students about Supervisory Control and Data Acquisition (SCADA) system and the cyber threats related to it. The session was attended by two groups of IAU students who are conducting cybersecurity capstone projects related to anomaly and intrusion detection within SCADA environment. The session introduced to students the current industrial challenges that they need to consider as part of their capstone projects and emphasized in the need for their innovation to play a pivotal role in combating OT cyber threats.

Abstract: In the rapidly evolving landscape of technology, a groundbreaking synergy between advanced artificial intelligence and cybersecurity is emerging, paving new avenues for innovation and protection. As we find ourselves on the cusp of a new digital epoch, the advent of generative AI has risen as a foundational pillar of innovation, instigating profound changes across myriad industries. This raises a critical inquiry: What precisely is generative AI, and why is its role so vital, especially in the realm of cybersecurity? Generative AI is a specialized subset of artificial intelligence technologies with the capability to produce content ranging from text and images to code and beyond. It harnesses extensive datasets to discern patterns, structures, and the core essence of the input, enabling it to generate new, original outputs that closely replicate the learned material. This process extends beyond mere creation—it encompasses understanding, predicting, and innovating. In an era where data reigns supreme, generative AI introduces an unprecedented level of intelligence and flexibility. The significance of generative AI extends well beyond its novelty; it signifies a shift in the paradigms of problem-solving, creativity, and decision-making. Within the cybersecurity domain, this shift presents both opportunities and challenges. Cyber threats are becoming increasingly sophisticated and unpredictable at an alarming rate. While traditional cybersecurity measures remain indispensable, there is a pressing need for these systems to evolve in order to effectively counter these advanced threats. Herein lies the potential of generative AI to revolutionize cybersecurity strategies. The integration of generative AI into cybersecurity systems is imperative, not merely optional. It possesses the ability to simulate cyber-attacks, foresee potential threat vectors, and forge stronger defense mechanisms. Additionally, it can facilitate the automation of responses to security incidents, significantly reducing the time from detection to resolution. Nonetheless, leveraging this technology necessitates a thorough comprehension of its capabilities, limitations, and the ethical considerations it entails. Throughout this conference, we will delve into the core principles of generative AI, its pivotal role in the digital world, and, most importantly, how it can be utilized to reinforce our cybersecurity infrastructures. Our exploration will encompass the technical nuances, practical applications, and forward-looking perspectives on a future where cybersecurity is not merely reactive but is predictive and adaptive, courtesy of the power of generative AI. We invite you to join us on this exhilarating journey as we navigate towards shaping the future of cybersecurity in an AI-dominated era.

 

 

Top Cybersecurity News from Around the world 

Story Image

Proof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability.

Story Image

Hackers exploited WordPress Popup Builder plugin flaw to compromise 3,300 sites.

Story Image

Dropbox Abused in New Phishing, Malspam Scam to Steal SaaS Logins.

Story Image

Magnet Goblin Hacker Group Leveraging 1-Day Exploits to Deploy Nerbian RAT.

 

Articles Written by IAU Students

1

By Sarah Albassam, Khadijah Alamoudi, and Razan Sharaf. 

Steganography: The Art of Hiding Data

Over the years, it has been difficult to deliver messages only to the intended recipient as the messages were at risk of being stolen or read by unauthorized people. 

I'm an image

 

 

 

 

 
Twitter YouTube LinkedIn

Copyright © 2022  Saudi Aramco Cybersecurity Chair at IAU, All rights reserved.

Dammam 31451
Kingdom of Saudi Arabia

Tel: + 966 13 333-2003