{"id":6855,"date":"2025-12-24T14:42:32","date_gmt":"2025-12-24T11:42:32","guid":{"rendered":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/?p=6855"},"modified":"2026-04-15T03:19:18","modified_gmt":"2026-04-15T00:19:18","slug":"national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era","status":"publish","type":"post","link":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/","title":{"rendered":"National Workshop Addresses Cybersecurity Challenges in Digital Era"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1331.2px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><div class=\"ds-message _63c77b1\">\n<div class=\"ds-markdown\">\n<h3>Computer Engineering and IT Departments Lead Threat Detection Initiative<\/h3>\n<p class=\"ds-markdown-paragraph\">The\u00a0<strong>Departments of Computer Engineering and Information Technology<\/strong>\u00a0organized a\u00a0<strong>National Workshop on Cybersecurity Challenges and Solutions \u2013 Threat Detection and Prevention in the Digital Era<\/strong>\u00a0on\u00a0<strong>December 8, 2025<\/strong>, at the\u00a0<strong>Campus Main Building Hall<\/strong>.<\/p>\n<p class=\"ds-markdown-paragraph\">The workshop aimed to raise awareness of modern cybersecurity challenges and highlight practical strategies for protecting digital systems and data.<\/p>\n<ul>\n<li>\n<p class=\"ds-markdown-paragraph\"><strong>Mr. Hemin Sardar<\/strong>, Lecturer at Charmo University, delivered a session on cybersecurity risks, emerging technologies, and strategic defense solutions.<\/p>\n<\/li>\n<li>\n<p class=\"ds-markdown-paragraph\"><strong>Assistant Professor Dr. Aso Aladin<\/strong>\u00a0from Tishk International University followed with a presentation on the role of\u00a0<strong>generative artificial intelligence<\/strong>\u00a0in modern cyber threat detection.<\/p>\n<\/li>\n<\/ul>\n<p class=\"ds-markdown-paragraph\">Faculty members, undergraduate and postgraduate students, and IT professionals participated in the event. Through expert-led presentations and interactive discussions, attendees gained valuable insights into current cyber threats and effective prevention techniques. The workshop emphasized the importance of collaboration, awareness, and responsible use of advanced technologies to enhance digital security.<\/p>\n<p class=\"ds-markdown-paragraph\"><strong>Keywords:<\/strong> Cybersecurity, National Workshop, Threat Detection, Artificial Intelligence, Digital Security, Computer Engineering, Information Technology, TIU, Charmo University, Generative AI, Cyber Threats, Prevention Techniques, Digital Systems Protection, Interactive Discussions, Expert-Led Sessions, Collaboration, Awareness<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1331.2px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_6 1_6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:10px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:10px;--awb-spacing-left-large:11.52%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:10px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:10px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-slider-sc\"><div class=\"fusion-flexslider-loading flexslider flexslider-hover-type-none\" data-slideshow_autoplay=\"1\" data-slideshow_smooth_height=\"0\" data-slideshow_speed=\"7000\" style=\"max-width:100%;height:100%;\"><ul class=\"slides\"><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/12\/Copy-of-post.jpg\" class=\"wp-image-12202\" \/><\/span><\/li><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/12\/Copy-of-post-5.jpg\" class=\"wp-image-12198\" \/><\/span><\/li><\/ul><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_6 1_6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:10px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:10px;--awb-spacing-left-large:11.52%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":95,"featured_media":6856,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[191],"tags":[222,283,276,282,224,254,271,274,279,281,277,275,280,272,278,273,266],"class_list":["post-6855","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-university-news","tag-artificial-intelligence","tag-awareness","tag-charmo-university","tag-collaboration","tag-computer-engineering","tag-cyber-threats","tag-cybersecurity","tag-digital-security","tag-digital-systems-protection","tag-expert-led-sessions","tag-generative-ai","tag-information-technology","tag-interactive-discussions","tag-national-workshop","tag-prevention-techniques","tag-threat-detection","tag-tiu"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>National Workshop Addresses Cybersecurity Challenges in Digital Era - TIU<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"National Workshop Addresses Cybersecurity Challenges in Digital Era - TIU\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\" \/>\n<meta property=\"og:site_name\" content=\"TIU\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-24T11:42:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T00:19:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kewan Hama\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:site\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kewan Hama\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\"},\"author\":{\"name\":\"Kewan Hama\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/person\/622e432758fa4800e65c14d95cc7152e\"},\"headline\":\"National Workshop Addresses Cybersecurity Challenges in Digital Era\",\"datePublished\":\"2025-12-24T11:42:32+00:00\",\"dateModified\":\"2026-04-15T00:19:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\"},\"wordCount\":2284,\"publisher\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#organization\"},\"image\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg\",\"keywords\":[\"Artificial Intelligence\",\"Awareness\",\"Charmo University\",\"Collaboration\",\"Computer Engineering\",\"Cyber Threats\",\"Cybersecurity\",\"Digital Security\",\"Digital Systems Protection\",\"Expert-Led Sessions\",\"Generative AI\",\"Information Technology\",\"Interactive Discussions\",\"National Workshop\",\"Prevention Techniques\",\"Threat Detection\",\"TIU\"],\"articleSection\":[\"University News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\",\"url\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\",\"name\":\"National Workshop Addresses Cybersecurity Challenges in Digital Era - TIU\",\"isPartOf\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg\",\"datePublished\":\"2025-12-24T11:42:32+00:00\",\"dateModified\":\"2026-04-15T00:19:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage\",\"url\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg\",\"contentUrl\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"National Workshop Addresses Cybersecurity Challenges in Digital Era\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#website\",\"url\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/\",\"name\":\"TIU\",\"description\":\"Business Management Department\",\"publisher\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#organization\",\"name\":\"Tishk International University\",\"url\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sul.tiu.edu.iq\/education\/elt\/wp-content\/uploads\/2020\/09\/Tishk-International-University-Logo.png\",\"contentUrl\":\"https:\/\/sul.tiu.edu.iq\/education\/elt\/wp-content\/uploads\/2020\/09\/Tishk-International-University-Logo.png\",\"width\":4034,\"height\":3631,\"caption\":\"Tishk International University\"},\"image\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\",\"https:\/\/x.com\/tishkuni\",\"https:\/\/www.instagram.com\/tishk.international.university\/\",\"https:\/\/www.youtube.com\/channel\/UCQRKNIvqcvKLa7DLbWVvR7Q\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/person\/622e432758fa4800e65c14d95cc7152e\",\"name\":\"Kewan Hama\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g\",\"caption\":\"Kewan Hama\"},\"url\":\"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/author\/kewan_hama_web_editor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"National Workshop Addresses Cybersecurity Challenges in Digital Era - TIU","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/","og_locale":"en_US","og_type":"article","og_title":"National Workshop Addresses Cybersecurity Challenges in Digital Era - TIU","og_url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/","og_site_name":"TIU","article_publisher":"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","article_published_time":"2025-12-24T11:42:32+00:00","article_modified_time":"2026-04-15T00:19:18+00:00","og_image":[{"width":800,"height":600,"url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg","type":"image\/jpeg"}],"author":"Kewan Hama","twitter_card":"summary_large_image","twitter_creator":"@tishkuni","twitter_site":"@tishkuni","twitter_misc":{"Written by":"Kewan Hama","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#article","isPartOf":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/"},"author":{"name":"Kewan Hama","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/person\/622e432758fa4800e65c14d95cc7152e"},"headline":"National Workshop Addresses Cybersecurity Challenges in Digital Era","datePublished":"2025-12-24T11:42:32+00:00","dateModified":"2026-04-15T00:19:18+00:00","mainEntityOfPage":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/"},"wordCount":2284,"publisher":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#organization"},"image":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage"},"thumbnailUrl":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg","keywords":["Artificial Intelligence","Awareness","Charmo University","Collaboration","Computer Engineering","Cyber Threats","Cybersecurity","Digital Security","Digital Systems Protection","Expert-Led Sessions","Generative AI","Information Technology","Interactive Discussions","National Workshop","Prevention Techniques","Threat Detection","TIU"],"articleSection":["University News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/","url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/","name":"National Workshop Addresses Cybersecurity Challenges in Digital Era - TIU","isPartOf":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage"},"image":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage"},"thumbnailUrl":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg","datePublished":"2025-12-24T11:42:32+00:00","dateModified":"2026-04-15T00:19:18+00:00","breadcrumb":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage","url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg","contentUrl":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/"},{"@type":"ListItem","position":2,"name":"National Workshop Addresses Cybersecurity Challenges in Digital Era"}]},{"@type":"WebSite","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#website","url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/","name":"TIU","description":"Business Management Department","publisher":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#organization","name":"Tishk International University","url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/logo\/image\/","url":"https:\/\/sul.tiu.edu.iq\/education\/elt\/wp-content\/uploads\/2020\/09\/Tishk-International-University-Logo.png","contentUrl":"https:\/\/sul.tiu.edu.iq\/education\/elt\/wp-content\/uploads\/2020\/09\/Tishk-International-University-Logo.png","width":4034,"height":3631,"caption":"Tishk International University"},"image":{"@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","https:\/\/x.com\/tishkuni","https:\/\/www.instagram.com\/tishk.international.university\/","https:\/\/www.youtube.com\/channel\/UCQRKNIvqcvKLa7DLbWVvR7Q"]},{"@type":"Person","@id":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/#\/schema\/person\/622e432758fa4800e65c14d95cc7152e","name":"Kewan Hama","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g","caption":"Kewan Hama"},"url":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/author\/kewan_hama_web_editor\/"}]}},"_links":{"self":[{"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/posts\/6855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/comments?post=6855"}],"version-history":[{"count":3,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/posts\/6855\/revisions"}],"predecessor-version":[{"id":6928,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/posts\/6855\/revisions\/6928"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/media\/6856"}],"wp:attachment":[{"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/media?parent=6855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/categories?post=6855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/applied-science\/information-technology\/wp-json\/wp\/v2\/tags?post=6855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}