Mona Al-Hamoudi (Abu Dhabi)
On the sidelines of the activities of the International Defense Exhibition “IDEX 2023”, the “Trends” Center for Research and Consultation, in cooperation with the Cyber Security Council, organized a discussion session entitled “Cyber Risks in the Age of Artificial Intelligence … Trends and Ways of Confrontation”, moderated by Hamad Al Kaabi, Editor-in-Chief of Al-Ittihad Newspaper, with participation Dr. Mohamed Al-Kuwaiti, Chairman of the Cyber Security Council of the UAE Government, and Dr. Mohamed Al-Ali, CEO of “Trends” for research and consulting.
At the beginning of the session, Hamad Al Kaabi stressed the importance of the unique global event that is being held in the UAE, which is the “IDEX” exhibition, which in its current edition celebrates the 30th anniversary of its organization.
He explained that the integrated system of the UAE reflects its advanced global position and its pioneering role in the field of cybersecurity, which made it occupy high positions in global indicators, as the country possesses an advanced digital infrastructure that contributes to preserving the cybersecurity space, in addition to launching many initiatives and strategies in This field, in which the role of the media is important to convey awareness and full culture about the concept of cybersecurity, praising the role of the Cyber Security Council, and its keenness to cooperate with strategic partners and international organizations in order to face common global challenges and develop innovative solutions.
Dr. Muhammad Al-Kuwaiti, Chairman of the Cyber Security Council of the UAE Government, explained that cyber security is any virtual transaction of data in the “Internet” world, in the computer, and in the mobile phone, i.e. in any non-physical systems, and communication and communication with them is done through the available means. ongoing. In another definition, it is our daily life, which is closely linked and relies heavily on digital transformation, pointing out that digital transformation has become an approach in all aspects of life, including education, health, devices and systems to access data and information in easier and smoother ways. He said, “With the directives of the wise leadership, the country has witnessed a major digital transformation in all sectors, and the thing we have added in this transformation is that it is safe, with the presence of an early detection system that works to monitor threats that may affect these sectors.”
He added: “Security is considered the basis of any of the main ingredients that come after creativity, innovation, prosperity or development, which must be based on security, safety and stability, and this is no different in cybersecurity for creativity in developing any system, as a safe environment must be provided.” For societies from any intrusions, threats or leaks that may affect the environment that the UAE wants to make an innovative, creative and prosperous environment, and at the same time a safe, supportive and enabling environment to work and achieve its goals that it seeks. He said, “The vision is clear. When the wise leadership announced the digital transformation, and that all transactions be cleared by mobile phone, there was great interest in ensuring that these services are secured and trusted in the main safe ways.”
He stated that the government of artificial intelligence in 2071 is to be a government with easy and smooth artificial intelligence, and all transactions are done without a request for services and renewals, which is what the UAE aims to be an artificial intelligence government.
Regarding the question of how a person can be aware that his mobile phone has not been hacked, Dr. Muhammad Al-Kuwaiti explained that there are many indications that the phone has been hacked, and the device must be updated with the latest update in the system, in addition to updating applications to avoid gaps, in addition to the presence of new applications. It has not been downloaded to the phone, the data subscription package expires faster, and the phone battery runs out quickly, noting that the best way to ensure that the phone is not hacked is through the communications service that will be provided soon, and will check the phone for loopholes or insecure internet addresses. The other way is to download reliable virus scanning applications.
Research and studies
In the field of research and studies, Dr. Muhammad Al-Ali, CEO of “Trends” for research and consulting, said: “The era in which we live is characterized by the existence of multiple and interlocking patterns of threats and uncertainty imposed by the rapid global changes, especially in the field of knowledge revolution, the global spread of mobile computing, and the information explosion.” And the amazing development in the means of communication, and the intensity and complexity of these changes increased by the massive entry of artificial intelligence in most aspects of life; Which introduced modern concepts and technologies that facilitated much of what was difficult, and shortened time and efforts. Some estimates indicate that the world will witness a growth in gross domestic product driven by artificial intelligence at a value of $ 15.7 trillion by 2030. However, artificial intelligence has produced challenges and risks that may equal or sometimes exceed the positives that resulted from it.
He added, “Among the risks that artificial intelligence is expected to enhance or feed in the future, is the access of individuals and private companies, and perhaps some ideological and terrorist groups, to artificial intelligence technologies. Countries and governments may lose their dominant position on the joints of their electronic and cyberspace, and lead to a kind of (decentralization (Cyber force), with all the challenges that this may entail for national governments in the future, and we can also witness virtual battlefields between forms of artificial intelligence, which will undoubtedly seek to disable each other and infect systems of analysis and automatic control with misinformation and malicious code; This will reinforce the need for increased security to protect state systems and institutions.
On how to deal with risks and others that may result from artificial intelligence, Dr. Muhammad Al-Ali mentioned some important steps, most notably; Enhancing national capabilities in the field of cybersecurity and artificial intelligence systems, so that our countries are producers of such systems and not only users of them. This includes the development of educational curricula and training programs, up to the technical industries that produce artificial intelligence systems, and the promotion of awareness of cyber risks in the public opinion as a whole. The walls separating the public and private sectors, to enhance the benefit of countries from the private sector, and redefining state security to include cybersecurity.
Dr. Al-Kuwaiti mentioned that the UAE has achieved, during the past three years, many achievements in the field of cybersecurity, and has occupied advanced positions in this field, and has become an international center for innovation and creativity in the field of advanced technologies to confront current and future cyberattacks, as the UAE has moved from the 47th place In the global cybersecurity index issued by the International Telecommunication Union of the United Nations, it ranked fifth in the world, noting that there is another evaluation at the end of the year in which the UAE is expected to reach the first place in the world, in light of the efforts and cooperation of many agencies in the country. He stressed that the UAE’s attainment of the first positions in the field of cybersecurity and strong cyber insurance with digital transformation did not come from a vacuum, but rather began with a cyber monitoring system, i.e. an early warning system that monitors threats, loopholes and intrusions targeting the main infrastructure, such as banks, electricity, water, and oil. Gas, transportation, health, education and communications, which are the most targeted.
#symposium #sidelines #IDEX #activities #experts #identify #trends #cyber #risks