King Abdullah II School of Information Technology - The University of Jordan - Organizing and Hosting the Cybersecurity and Cyberforensics Conference

Schools Acheivements

Organizing and Hosting the Cybersecurity and Cyberforensics Conference

Local and international researchers and practitioners from academia, industry and government attended at the University of Jordan (UJ) on Tuesday and Wednesday, August 2 and 3, the 1st International Cyber-security and Cyber Forensics Conference (CCC 2016).
The conference, organized by King Abdullah II School of Information Technology (KASIT), was inaugurated by Prof. Azmi Mahafzah, UJ President.
According to KASIT Dean and chairman of the preparatory committee, Prof. Azzam Sleit, the event meant to discuss cross-cutting themes in cyberspace security, in addition to building a unified vision concerning the proper solutions to challenges facing researchers in this area.
At the opening, Slait called for the conference to assess progress relating to policy development as well as addressing areas of collaboration and partnerships with private sector and academia in areas such as training and capacity development, civic education and awareness and research and development amongst others.
Dr. Ja'far Alqatawna, Technical Chairman of the Conference, said the conference sought to identify problems in cyber security and cyber forensic, and propose solutions and countermeasures to the most pressing cybercrimes.
With nearly 200 participants from Britain, Australia, Algeria, Saudi Arabia, United States, United Arab Emirates, and Jordan, the conference was organized with the support of a number of local and international companies specialized in this field.
The Conference made important recommendations aimed at developing solutions against this world-wide phenomenon, focusing on the need of putting measures in place against cyber-attacks, cyber terrorism and cyber warfare.
Expanding the traditional notions of security to address the non – traditional security threats, the conference called for developing a comprehensive approach to security.
Delegates also called for working with universities and other research institutes to build the cybersecurity pipeline through competitive scholarship, fellowship, and internship programs to attract top talents and develop systems that have command and control in our hands.
Authors of selected papers will also be invited to prepare extended papers of their work for publication in the International Journal of Electronic Security and Digital Forensics.