{"id":5846,"date":"2018-09-01T06:47:17","date_gmt":"2018-09-01T02:47:17","guid":{"rendered":"https:\/\/ega.rak.ae\/?p=5846"},"modified":"2024-08-16T11:22:29","modified_gmt":"2024-08-16T07:22:29","slug":"information-security-workshops","status":"publish","type":"post","link":"https:\/\/ega.rak.ae\/information-security-workshops\/","title":{"rendered":"Information security workshops"},"content":{"rendered":"<p>In an effort by the eGovernment Authority to enhance the protection of the security of information confidentiality, and to address electronic risks and security threats, the authority began holding training workshops at the level of government agencies in Ras Al Khaimah in the field of information security, which last for a period of 3 months for all categories of employees, with the aim of raising their level of knowledge and providing them with the latest technologies and processes in information security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In an effort by the eGovernment Authority to enhance the protection of the security of information confidentiality, and to address electronic risks and security threats, the authority began holding training workshops at the level of government agencies in Ras Al Khaimah in the field of information security, which last for a period of 3 months for all categories of employees, with the aim of raising their level of knowledge and providing them with the latest technologies and processes in information security.<\/p>\n","protected":false},"author":4,"featured_media":5792,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[47],"tags":[],"class_list":["post-5846","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en-en","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information security workshops - RAK EGA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ega.rak.ae\/information-security-workshops\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information security workshops - RAK EGA\" \/>\n<meta property=\"og:description\" content=\"In an effort by the eGovernment Authority to enhance the protection of the security of information confidentiality, and to address electronic risks and security threats, the authority began holding training workshops at the level of government agencies in Ras Al Khaimah in the field of information security, which last for a period of 3 months for all categories of employees, with the aim of raising their level of knowledge and providing them with the latest technologies and processes in information security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ega.rak.ae\/information-security-workshops\/\" \/>\n<meta property=\"og:site_name\" content=\"RAK EGA\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-01T02:47:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-16T07:22:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1172\" \/>\n\t<meta property=\"og:image:height\" content=\"664\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Assem Shabaan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Assem Shabaan\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/information-security-workshops\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/information-security-workshops\\\/\"},\"author\":{\"name\":\"Assem Shabaan\",\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/#\\\/schema\\\/person\\\/fd64854bed04a77ecb0b4a0b51713e11\"},\"headline\":\"Information security workshops\",\"datePublished\":\"2018-09-01T02:47:17+00:00\",\"dateModified\":\"2024-08-16T07:22:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/information-security-workshops\\\/\"},\"wordCount\":83,\"image\":{\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/information-security-workshops\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ega.rak.ae\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Screen-Shot-2018-12-16-at-1.47.02-PM.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/information-security-workshops\\\/\",\"url\":\"https:\\\/\\\/ega.rak.ae\\\/information-security-workshops\\\/\",\"name\":\"Information security workshops - RAK EGA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/information-security-workshops\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/information-security-workshops\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ega.rak.ae\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Screen-Shot-2018-12-16-at-1.47.02-PM.png\",\"datePublished\":\"2018-09-01T02:47:17+00:00\",\"dateModified\":\"2024-08-16T07:22:29+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/#\\\/schema\\\/person\\\/fd64854bed04a77ecb0b4a0b51713e11\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/information-security-workshops\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ega.rak.ae\\\/information-security-workshops\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/information-security-workshops\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ega.rak.ae\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Screen-Shot-2018-12-16-at-1.47.02-PM.png\",\"contentUrl\":\"https:\\\/\\\/ega.rak.ae\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Screen-Shot-2018-12-16-at-1.47.02-PM.png\",\"width\":1172,\"height\":664},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/information-security-workshops\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ega.rak.ae\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information security workshops\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/#website\",\"url\":\"https:\\\/\\\/ega.rak.ae\\\/\",\"name\":\"EGA RAK Demo\",\"description\":\"RAK EGA\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ega.rak.ae\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ega.rak.ae\\\/#\\\/schema\\\/person\\\/fd64854bed04a77ecb0b4a0b51713e11\",\"name\":\"Assem Shabaan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3cb868b585cecf445190c086acfad0755cb56e6ee59aa9f2dd4e68c606e68ee5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3cb868b585cecf445190c086acfad0755cb56e6ee59aa9f2dd4e68c606e68ee5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3cb868b585cecf445190c086acfad0755cb56e6ee59aa9f2dd4e68c606e68ee5?s=96&d=mm&r=g\",\"caption\":\"Assem Shabaan\"},\"url\":\"https:\\\/\\\/ega.rak.ae\\\/author\\\/assem\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information security workshops - RAK EGA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ega.rak.ae\/information-security-workshops\/","og_locale":"en_US","og_type":"article","og_title":"Information security workshops - RAK EGA","og_description":"In an effort by the eGovernment Authority to enhance the protection of the security of information confidentiality, and to address electronic risks and security threats, the authority began holding training workshops at the level of government agencies in Ras Al Khaimah in the field of information security, which last for a period of 3 months for all categories of employees, with the aim of raising their level of knowledge and providing them with the latest technologies and processes in information security.","og_url":"https:\/\/ega.rak.ae\/information-security-workshops\/","og_site_name":"RAK EGA","article_published_time":"2018-09-01T02:47:17+00:00","article_modified_time":"2024-08-16T07:22:29+00:00","og_image":[{"width":1172,"height":664,"url":"https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM.png","type":"image\/png"}],"author":"Assem Shabaan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Assem Shabaan"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ega.rak.ae\/information-security-workshops\/#article","isPartOf":{"@id":"https:\/\/ega.rak.ae\/information-security-workshops\/"},"author":{"name":"Assem Shabaan","@id":"https:\/\/ega.rak.ae\/#\/schema\/person\/fd64854bed04a77ecb0b4a0b51713e11"},"headline":"Information security workshops","datePublished":"2018-09-01T02:47:17+00:00","dateModified":"2024-08-16T07:22:29+00:00","mainEntityOfPage":{"@id":"https:\/\/ega.rak.ae\/information-security-workshops\/"},"wordCount":83,"image":{"@id":"https:\/\/ega.rak.ae\/information-security-workshops\/#primaryimage"},"thumbnailUrl":"https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM.png","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/ega.rak.ae\/information-security-workshops\/","url":"https:\/\/ega.rak.ae\/information-security-workshops\/","name":"Information security workshops - RAK EGA","isPartOf":{"@id":"https:\/\/ega.rak.ae\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ega.rak.ae\/information-security-workshops\/#primaryimage"},"image":{"@id":"https:\/\/ega.rak.ae\/information-security-workshops\/#primaryimage"},"thumbnailUrl":"https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM.png","datePublished":"2018-09-01T02:47:17+00:00","dateModified":"2024-08-16T07:22:29+00:00","author":{"@id":"https:\/\/ega.rak.ae\/#\/schema\/person\/fd64854bed04a77ecb0b4a0b51713e11"},"breadcrumb":{"@id":"https:\/\/ega.rak.ae\/information-security-workshops\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ega.rak.ae\/information-security-workshops\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ega.rak.ae\/information-security-workshops\/#primaryimage","url":"https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM.png","contentUrl":"https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM.png","width":1172,"height":664},{"@type":"BreadcrumbList","@id":"https:\/\/ega.rak.ae\/information-security-workshops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ega.rak.ae\/"},{"@type":"ListItem","position":2,"name":"Information security workshops"}]},{"@type":"WebSite","@id":"https:\/\/ega.rak.ae\/#website","url":"https:\/\/ega.rak.ae\/","name":"EGA RAK Demo","description":"RAK EGA","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ega.rak.ae\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ega.rak.ae\/#\/schema\/person\/fd64854bed04a77ecb0b4a0b51713e11","name":"Assem Shabaan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3cb868b585cecf445190c086acfad0755cb56e6ee59aa9f2dd4e68c606e68ee5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3cb868b585cecf445190c086acfad0755cb56e6ee59aa9f2dd4e68c606e68ee5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3cb868b585cecf445190c086acfad0755cb56e6ee59aa9f2dd4e68c606e68ee5?s=96&d=mm&r=g","caption":"Assem Shabaan"},"url":"https:\/\/ega.rak.ae\/author\/assem\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM.png",1172,664,false],"landscape":["https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM.png",1172,664,false],"portraits":["https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM.png",1172,664,false],"thumbnail":["https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM-150x150.png",150,150,true],"medium":["https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM-300x170.png",300,170,true],"large":["https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM-1024x580.png",1024,580,true],"1536x1536":["https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM.png",1172,664,false],"2048x2048":["https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM.png",1172,664,false],"ocean-thumb-m":["https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM-600x600.png",600,600,true],"ocean-thumb-ml":["https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM-800x450.png",800,450,true],"ocean-thumb-l":["https:\/\/ega.rak.ae\/wp-content\/uploads\/2024\/06\/Screen-Shot-2018-12-16-at-1.47.02-PM.png",1172,664,false]},"rttpg_author":{"display_name":"Assem Shabaan","author_link":"https:\/\/ega.rak.ae\/author\/assem\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/ega.rak.ae\/category\/home\/media-center-en-en\/news-en-en\/\" rel=\"category tag\">News<\/a>","rttpg_excerpt":"In an effort by the eGovernment Authority to enhance the protection of the security of information confidentiality, and to address electronic risks and security threats, the authority began holding training workshops at the level of government agencies in Ras Al Khaimah in the field of information security, which last for a period of 3 months&hellip;","_links":{"self":[{"href":"https:\/\/ega.rak.ae\/itsmethemario\/wp\/v2\/posts\/5846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ega.rak.ae\/itsmethemario\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ega.rak.ae\/itsmethemario\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ega.rak.ae\/itsmethemario\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ega.rak.ae\/itsmethemario\/wp\/v2\/comments?post=5846"}],"version-history":[{"count":0,"href":"https:\/\/ega.rak.ae\/itsmethemario\/wp\/v2\/posts\/5846\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ega.rak.ae\/itsmethemario\/wp\/v2\/media\/5792"}],"wp:attachment":[{"href":"https:\/\/ega.rak.ae\/itsmethemario\/wp\/v2\/media?parent=5846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ega.rak.ae\/itsmethemario\/wp\/v2\/categories?post=5846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ega.rak.ae\/itsmethemario\/wp\/v2\/tags?post=5846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}