Accessibility Tools

Skip to main content

Alaa Elsagier - Page 3 of 4

Author: Alaa Elsagier

Signing a cooperation agreement with Edah Aljadid

We are very pleased to sign a memorandum of cooperation and understanding with Edah Aljadid, which aims to create a cooperative environment that contributes to achieving sustainable development of technical and human capabilities.

This memorandum includes many aspects specialized in organizing training courses and workshops and is concerned with the most important modern technologies and the development of human cadres constantly towards learning everything new in this world and organizing dialogues and fruitful discussion sessions within Ehad Aljadid Center to attract all those interested in technology and provide a suitable and appropriate ground.

We look forward to working together and always pushing the wheel of development for the better.

Signing a cooperation agreement with Octagon

We are pleased to announce the signing of a cooperation agreement between Octagon and Libyan Technology Foundation (formerly the Libyan Organization for Information and Communication Technology), in the field of translation services of all kinds. The ceremony took place during the proceedings National Technology Day 2024.

We contribute through our partnerships in building bridges of cooperation between various sectors and institutions in Libya, aiming to raise the level of translation services and enhance cultural exchange.

Rebranding of the Libyan Information Technology and Telecommunication Organization and Change of Name to “Libyan Technology Foundation”

Important Announcement:

Tripoli, May 12, 2024: We are pleased to announce the rebranding and official name change of the Libyan Information Technology and Telecommunication Organization to the Libyan Technology Foundation (LTF). This change reflects our commitment to better serve the Libyan people and advance the country’s digital development.

New Name, New Vision:

LTF is committed to fostering innovation and entrepreneurship in the field of information and communication technology (ICT). We believe that ICT has the power to transform Libya’s economy and society.

Our Goals:

  • Support ICT innovation and entrepreneurship
  • Provide ICT education and training
  • Strengthen cooperation between ICT stakeholders

We invite all our partners and customers to use the new name LITF in all official correspondence and marketing materials.

The conclusion of the second “capacity building” training of the Libyan Audit Bureau

The Libyan Information Technology and Telecommunication Organization concluded on Sunday, May 5, 2024, the second training of the “Capacity Building” project of the Libyan Audit Bureau, as part of its tireless endeavor to develop the capabilities of the Libyan Audit Bureau‘s employees in various technical fields.

The four-day training dealt with the topic of “Cybersecurity Audit”, where Mr. Khaled Embarek gave a full explanation of the mechanisms of auditing cybersecurity and the following topics were discussed:

  • Cybersecurity compliance: Cybersecurity compliance requirements for organizations have been explained, including international standards and best practices.
  • Risk Management: Participants were introduced to the concept of cybersecurity risk management, and how to assess and mitigate risks.
  • Skills of preparing the inspector to examine the security policies of the auditors: The skills of preparing the auditors to examine the security policies of the auditor and make recommendations were explained.

The participants showed great interest in the subject, as they expressed their great benefit from the information and experiences that were provided during the training.

These trainings are part of the efforts of the organization aimed at enhancing the capabilities of national cadres in various aspects of technology and raising awareness of the importance of protecting information and systems from electronic risks.

Our organization obtains the first cyber risk insurance policy in Libya

With pride, after the Libyan Organization for Information Technology and Telecommunications obtained the certificate of compliance from the National Information Security and Safety Authority on April 15, 2024, after conforming to the national standards for information security and safety. The Libyan Organization for Information Technology and Telecommunications obtains an insurance policy against cyber risks, from Albaraka Insurance the first of its kind in Libya.

This achievement is the culmination of a year-long effort by the organization’s team, with the advisory support of many partners and supporters.

The insurance policy bears the number 00001 and is the first in the field of cybersecurity in Libya.

Obtaining this certificate and document is conclusive evidence of our commitment to the highest standards of cybersecurity, and our relentless endeavor to protect our data and business continuity from any cyber risks in accordance with the obligations and standards contained in the policy.

We thank all those who contributed to achieving this great achievement, including partners, supporters, the organization’s team and the Al Baraka Insurance Company team.

Together towards a secure digital future!

#Libyan_organization_for_IT_and_telecommunication #cybersecurity #insurance_policy

Training on the regulatory aspects of electronic payments … Capacity Building

Regulatory aspects of electronic payments: a resounding success for a training session at The Libyan Information Technology and Telecommunication Organization

The session aimed to enhance the trainees’ competence in the field of electronic payment control, and provide them with the necessary skills and standards to apply best practices in this field. The session also focused on raising the trainees’ ability to analyze and solve problems related to the application of electronic payments, in order to ensure the safety and effectiveness of this modern financial system.

The session received great interaction from the participants, who expressed their thanks and appreciation to the experts for the valuable information they provided, and to The Libyan Information Technology and Telecommunication Organization for organizing this training session.

During this session, several important topics were addressed, including:

  • The concept of electronic payments and their types
  • Regulatory systems for electronic payments
  • The risks of electronic payments and how to reduce them
  • Best Practices in Controlling Electronic Payments
  • The role of the Libyan Audit Bureau in controlling electronic payments
  • The session also addressed some of the challenges facing the implementation of electronic payments in Libya, such as:
    • Lack of awareness of the importance of electronic payments
    • Poor technical infrastructure
    • Lack of trust in electronic payment systems

Partnership between the organization and the Internet community Libya ISOC Libya

New Collaboration | We put our hand in the hands of ISOC Libya to march towards a better Internet!

The Libyan Information and Communication Technology Organization is pleased to announce its partnership with the Internet community – ISOC Libya

This partnership aims to continue celebrating technology in Libya, share our resources to enhance our initiatives, and jointly work on capacity building projects to increase the number of people working on cyber issues.

Join us on the journey of making the internet a better and more inclusive place for everyone in Libya. Your support and participation motivates us to do more, and to be closer to tangible success!

Stay tuned for updates on our joint ventures and how you can be part of these developments.

Copilot pro joins the Microsoft 365 family of the organization

Welcome to Copilot Pro, the latest app to join the Microsoft 365 family in our app pack! ✅

Today Copilot Pro has been activated in our digital environment! It is an application launched by Microsoft as a tool that uses artificial intelligence to simplify and improve text writing.

This application came as a means used in preparing reports, correspondence, documents and code, to speed up the completion of tasks, make texts more accurate and clear, translate texts, and reduce the risk of errors.

With this new addition, we aspire as usual to enhance work efficiency, and to use the power of technology in the smallest detail

Information Security Compliance Certificate: Summary of the strategy and steps that enabled us to achieve the goal

Did you know that our National Information Security Compliance Certification was no coincidence? 🤔

Certainly, it will not be hidden from you that our acquisition of it was not born of the moment, but rather the fruit of tireless efforts and thoughtful plans that extended for months, we are pleased to reveal the most prominent stations today:

🔹 Environment:

  • A working group consisting of 5 permanent employees, 55 members and experts.

🔹 Target:

  • Forming a policy based on the guiding policy of the National Authority for Information Security and Safety in line with the materials, equipment, works, projects and members of the organization.

🔹 Goal:

Protect your Microsoft 365 environment comprehensively, including:

  • Email.
  • Digital assets.
  • Store backups.
  • Data security.
  • Data Leakage Prevention (DLP).
  • Information security operations.
Information Security Compliance Certificate: Summary of the strategy and steps that enabled us to achieve the goal

🔹 Cyber Security Strategy:

🔸 1. Basic Infrastructure:

  • Security of endpoints:

Use advanced solutions to ensure devices are protected from cyber threats.

  • Network Security:

Use advanced technologies to protect the network from hacks and cyberattacks.

  • Data Security:

Implement strict data protection measures from loss and unauthorized access.

🔸 2. User Security:

  • Identity and Access Management:

Implement strict policies to control access to data and systems.

  • Security Awareness and Training:

Continuous awareness of employees on the best practices of cybersecurity.

  • Data classification and protection:

Classify data according to its sensitivity and apply appropriate protection measures.

🔸 3. Additional security measures:

  • Device Management:

Implement strict policies to manage devices used at work.

  • Network monitoring and vulnerability management:

Continuously monitor the network to detect any threats or security vulnerabilities.

  • Incident Response:

Having a specialized team ready to deal with any security incidents that may occur.

🔸 4. Continuous improvement:

  • Review and update the cybersecurity strategy regularly.
  • Conduct periodic penetration tests and security reviews.
  • Keep abreast of the latest security trends and best practices.

🔹 Notes considered:

  • Design this strategy to be adaptable to specific needs and level of risk.
  • Use best practices in all areas.
  • Use a variety of solutions from Microsoft and other third parties.
  • Strong focus on user training and safety awareness.
  • Effectively monitor and manage the network to detect and respond to threats.
  • Continuously update your cybersecurity strategy to improve protection.

Thus, the organization met high information security standards, and put in place a strong bulwark that protects its information from lurking threats.

We are pleased to leave the summary of the strategy in your hands today, hoping to be a guide for the rest of the institutions in building their digital fortress, to be closer to a better ✨ technical future

You can view the certificate of compliance through the following link:

Obtaining Libya’s first national information security compliance certificate

A new building block in the edifice of the technical future | Libya’s First National Certificate of Compliance for Information Security!

With the efforts of our team, and the support of our partners, we are pleased to announce today that we have received the certificate of compliance with the Information Security and Safety Policies from the National Authority for Information Security and Safety – NISSA LIBYA.

This certificate, which is awarded for the first time to a national institution, puts it as a new building block, and a new achievement in the edifice of the safe technical future that we seek to build, and inspires us to continue working hard and to be a role model for all Libyan institutions.

We thank the National Authority for Information Security and Safety for the high professionalism in auditing, reviewing all policies and verifying our commitment to completing this stage of our journey.

We appreciate the times that have gone into and the tireless efforts of the WHO team to set up a secure technical system that meets the highest standards.

We appreciate the endless support of our partners in various aspects, their serious stand with us, and their belief in our mission, until we reached this point today, and let us launch with enthusiasm towards greater goals, and ambitions to transcend reality. Let’s build a secure Libya digitally!

Monday, 15/4/2024

The link to the news on the National Information Security and Safety Authority’s website:Nissa.gov.ly

NISSA LIBYA

Microsoft

Libyan Spider

Giga Ltd

Tazamun Tech

Albaraka Insurance

Holol Tech

الحداثة العالمية للاتصالات وتقنية المعلومات