{"id":11645,"date":"2018-11-26T13:46:15","date_gmt":"2018-11-26T13:46:15","guid":{"rendered":"http:\/\/bulletins.bfconsulting.com\/?p=11645"},"modified":"2018-11-26T13:46:15","modified_gmt":"2018-11-26T13:46:15","slug":"kaz-hack-stan-2018-outlines-changing-digital-landscape-in-kazakhstan","status":"publish","type":"post","link":"https:\/\/bulletins.bfconsulting.com\/en\/kaz-hack-stan-2018-outlines-changing-digital-landscape-in-kazakhstan\/","title":{"rendered":"Kaz&#8217;Hack&#8217;Stan 2018 outlines changing digital landscape in Kazakhstan"},"content":{"rendered":"<p>In October 2018, Almaty hosted the second annual Kaz&#8217;Hack&#8217;Stan Conference. The Conference, devoted to practical issues in the field of information security, included panel discussions, example cases from information security experts and booths designed allow users to enhance their practical skills. During the panel discussions, speakers discussed current issues related to information security as well as protecting information and communication infrastructure and issues related to state regulations. Specific topics included: \u2018Protecting Critical Infrastructure\u2019, \u2018Telecom Signaling Network Security\u2019, \u2018Dynamic Mobile Application Analysis\u2019 and \u2018Smart Contacts Security Audits\u2019. Throughout the panel discussions, experts repeatedly mentioned the changing information security landscape in Kazakhstan, especially new state measures that outline uniform requirements, provide legislative norms regarding data protection and increase public awareness about cybersecurity. The experts also noted that, while state programs such as \u2018Digital Kazakhstan\u2019 and \u2018Cybershield of Kazakhstan\u2019 are important, the lack of qualified personnel in the country represents a significant issue needing to be overcome if the country is to move forward in transitioning to a responsible digital state.<\/p>\n<div class=\"rpbt_shortcode\">\n\n<div id='rpbt-related-gallery-1' class='gallery related-gallery related-galleryid-11645 gallery-columns-3 gallery-size-thumbnail'><figure class='gallery-item' role='group' aria-label='Infographic: top 20 reasons startups fail'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/infographic-top-20-reasons-startups-fail\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2019\/02\/00-chart-3-768x1920-1-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-12198\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-12198'>\n\t\t\t\tInfographic: top 20 reasons startups fail\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='Death of traditional employer-employee relationships'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/death-of-traditional-employer-employee-relationships\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2019\/04\/4703-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-12561\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-12561'>\n\t\t\t\tDeath of traditional employer-employee relationships\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='Azerbaijan developing national cybersecurity strategy'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/azerbaijan-developing-national-cybersecurity-strategy\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/10\/azerbaijan-developing-national-cybersecurity-strategy-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-11163\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-11163'>\n\t\t\t\tAzerbaijan developing national cybersecurity strategy\n\t\t\t\t<\/figcaption><\/figure>\n\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>In October 2018, Almaty hosted the second annual Kaz&#8217;Hack&#8217;Stan Conference. The Conference, devoted to practical issues in the field of information security, included panel discussions, example cases from information security experts and booths designed allow users to enhance their practical skills. During the panel discussions, speakers discussed current issues related to information security as well &hellip;<\/p>\n","protected":false},"author":5,"featured_media":11735,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,76],"tags":[184,193,75],"_links":{"self":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11645"}],"collection":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=11645"}],"version-history":[{"count":4,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11645\/revisions"}],"predecessor-version":[{"id":11736,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11645\/revisions\/11736"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media\/11735"}],"wp:attachment":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=11645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/categories?post=11645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/tags?post=11645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}