SlideShare a Scribd company logo
1 of 8
Download to read offline
www.promediakw.com
Bahrain
Tel +973 7732 3323
Fax +973 7732 1321
Egypt
Tel +202 3335 7889
Fax +202 3335 7989
Saudi Arabia
Tel +966 1146 56 040
Fax +966 1146 56 080
Organized by
Middle East
Information Security Summit
‫المعلومات‬ ‫ألمن‬ ‫األوسط‬ ‫الشرق‬ ‫ملتقى‬
Email: info@promediakw.com
kuwait
Tel +965 22462212
Fax +965 22462214
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
w w w . m e i n f o s e c u r i t y . c o m
Speakers
Tamer Elbahey
Senior Director
Security Monitoring &
Operations DU - UAE
Ahmed Sherif
Information Security Engineer
EG-CER
Nader Henenin
Regional Director
Product Security - Advisory Division
BlackBerry- UAE
Adel Abdel Moneim
General Manager
Raya Academy
Dr. Mohamed El-Guindy
Cyber Security Expert
TV Presenter
Waleed Yasser
Senior Information Security
Officer at ITS
Seham Gadallah
Information Security and Quality
Assurance Sr. Manager at Raya
Data Center
Amr Yehia
Network Security Engineer at
Pharos Holding for Financial
Investment
Sponsors Media Partners
Overview
Overview
The Middle East Info Security Summit, the premier event for info security, risk and
IT professionals, will be held on  12 - 13 October 2015  at the Sofitel El Gezirah Hotel,
Cairo, Egypt.
We’re in a new era in the evolution of computing. The industry has moved from
main frames, to client/server and the age of the desktop PC, and have now shifted
to an era defined by mobile devices, cloud computing, and social networks. These
changes present new risks to our data, privacy and security. Participants will debate
these risks, learn fresh approaches and develop innovative strategies and tactics to
defeat today’s biggest information security threats.
This multi-track event will serve as a forum for information security researchers,
practitioners, developers, and users to explore cutting-edge ideas and results, and
to exchange techniques, tools, and experiences. The event takes a comprehensive
look at the entire spectrum of IT security, business continuity management and risk.
Featuring executive panel discussion sessions, insightful case studies and renowned
speakers, the event is the best place to gather information to build your IT roadmap,
and identify ways to make your business more agile and efficient.
The Middle East Info Security Summit fosters opportunities for IT professionals to
network, build relationships, and explore new ideas. It brings together IT professionals,
developers, decisions and policy makers, governmental officials, experts, consultants,
industry leaders, bankers, law enforcement officials, academics, networks security
managers, database administrators, IT marketing executives, surveyors, etc. to share
their protection experience in IT security and exchange ideas on most emerging
technology trends, applications and practices.
www.meinfosecurity.com
Middle East Info Security Summit
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
1
Themes
Information Security
P r o t e c t y o u r s p a c e
www.meinfosecurity.com
Middle East Info Security Summit
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
With special emphasis placed on case studies and innovative and
trusted security solutions, the event will focus on key security
themes such as:
• IT Systems & Network Security
• Intrusion Detection and Prevention
• Cloud Computing Security
• E-Crime and E-Forensics 
• Mobility Security
• Security of Ecommerce, Ebusiness and Egovernment
• Infrastructure Security
• Social Media Threats
• Network Intrusion, Detection and Prevention
• Information Security Policies & Strategies
• Identity Management
• Biometrics
• CERT & Incident Management
• New Cybercrime Threats  
• IT Business Continuity, Disaster Recovery Plans
• Security Education - Awareness, Training and Certification
2
- Senior Information Risk Owners (SIROs)
Who should attend?
- Security Course Managers
- Heads of Information Assurance & Security
- Chief Procurement Officers
- VIPs, Heads and Directors of IT Departments
- Quality Control Departments
- Human Resources Managers
- Communication and Disaster Recovery Managers
- Chief Information Officers
- Chief Information Security Officers
- Senior Business Managers Decision Makers
- Researchers
- Technical Specialists
- Chief Security Officers
Why should attend?
- Keep your information that turned to be ever more valuable.
- Learn about the latest specialists techniques in safe information.
- Share your concerns in a wider information security community.
- Make your information system ahead in the market.
- Take the right decision in face of every new information security challenge.
- Know the best products and services came in the information market.
- Assess your current information security strategy and get the most out of your information
security budget.
- Collaborate with your partners in the region who are working in the information market.
Information Security
P r o t e c t y o u r s p a c e
www.meinfosecurity.com
Middle East Info Security Summit
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
3
According to the International Telecommunication Union, there are almost 3 billion online users all
over the world. The Middle East came with 3.7% of the online market users recording the highest
internet use growth in the world. It consequently required highly advanced cyber security solutions
to maintain this continuing market development.
The cyber-attacks are now marked as the second most common form of economic crime in the Middle
East making a market value of Cyber security at $23 billion according to the Cyber Security Export
Market: United Arab Emirates 2014. The security breach costs the world economy more than $445
billion annually, this leads directly to an expected ongoing growth in the market of cyber security
software and services.
The numbers in the information security are now in terms of million; with 1.5 million monitored
cyber-attacks in US in 2013 according to IBM security services 2014 Cyber Security intelligence
index, April 2014, while (the Global State of Information Security Survey: 2015) showed a number of
42.8 million of data breach incidents; showing an increase of 48% in one year only. Security policy is
now an urgent need as part of your assessment policy to keep your information secured.
Your information is your genuine fortune, keep it safe.
Info Security Alert
www.meinfosecurity.com
Middle East Info Security Summit
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
4
Call for Speakers
If you would like the opportunity to participate
in the Middle East Info Security Summit as a
speaker or workshop leader, please contact us at 
speaker@promediakw.com  as soon as possible.
Include the following brief details of your
proposed presentation: title, abstract, a few
sentences of biographical information that relate
you to the topic, and full contact information
(title, address, e-mail, phone & fax) for you and
any co-presenters. All abstracts will be reviewed
by the Organizing/Review Committee and
notification regarding acceptance will be made
in due time.
- Introduction to Ethical Hacking
- Foot printing and Reconnaissance
- Scanning Networks
- Enumeration
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Evading IDS, Firewalls and Honeypots
- Buffer Overflows
- Cryptography
- Penetration Testing
Certified Ethical Hacker (CEH)
10 - 11 October
10 Hours / 5 Hours Per day
A Certified Ethical Hacker (CEH) is a skilled
professional who protects and secures systems
by ethically using the same knowledge and tools
as a malicious hacker. The objective of the ethical
hacker is to help an organization take
preventative measures against malicious attacks
by attacking his own system. This ideology stems
from the proven practice of trying to catch a thief
by thinking like a thief. Participants will learn the
latest techniques to scan, test, hack, and secure
systems.
This course is for Information Technology
Security Professionals who wish to prepare for
and pass the EC Council- Certified Ethical
Hacking Exam as well as gain the understanding
and hands-on experience of an Ethical Hacker.
Contents
Workshop
Information Security
P r o t e c t y o u r s p a c e
www.meinfosecurity.com
Middle East Info Security Summit
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
5
‫كنقطة‬ ‫بالقاهرة‬ ‫الجزيرة‬ ‫سوفتيل‬ ‫فندق‬ ‫في‬ 2015 ‫اكتوبر‬ ‫من‬ 13 -12 ‫في‬ ‫المعلومات‬ ‫ألمن‬ ‫االوسط‬ ‫الشرق‬ ‫ملتقى‬ ‫يعقد‬
‫والخدمات‬ ‫المنتجات‬ ‫على‬ ‫والتعرف‬ ،‫جديدة‬ ‫شراكات‬ ‫لبناء‬ ‫منصة‬ ‫الملتقى‬ ‫هذا‬ ‫يعتبر‬ ‫حيث‬ ،‫المعلوماتية‬ ‫عصر‬ ‫ألعضاء‬ ‫التقاء‬
.‫مستهلك‬ ‫او‬ ‫كمقدم‬ ‫سواء‬ ‫للمعلومات‬ ‫كمستخدم‬ ‫المتاحة‬
‫الفكرية‬ ‫الملكية‬ ‫لحماية‬ ‫العمل‬ ‫في‬ ‫اساسي‬ ‫عنصر‬ ‫أصبح‬ ‫فقد‬ ،‫المعلومات‬ ‫أمن‬ ‫هو‬ ‫العمل‬ ‫سوق‬ ‫في‬ ‫اليوم‬ ‫التحدي‬ ‫إن‬
‫سواء‬ ‫العمل‬ ‫من‬ ‫ومتنامي‬ ‫ثابت‬ ‫جزء‬ ‫هو‬ ‫االن‬ ‫المعلومات‬ ‫أمن‬ ‫يعتبر‬ ‫عدة‬ ‫وألسباب‬ ،‫الماضي‬ ‫العقد‬ ‫مدار‬ ‫على‬ ‫باألفراد‬ ‫الخاص‬
‫ما‬ ‫دائما‬ ‫هو‬ ‫المفتوح‬ ‫االلكتروني‬ ‫الفضاء‬ ‫هذا‬ ‫في‬ ‫امنة‬ ‫بك‬ ‫الخاصة‬ ‫المعلومات‬ ‫حفظ‬ ‫عدم‬ ‫إن‬ .‫العام‬ ‫او‬ ‫الخاص‬ ‫القطاع‬ ‫كان‬
.‫ومكلف‬ ‫خطير‬ ‫يكون‬
‫المعلومات‬ ‫ألمن‬ ‫االوسط‬ ‫الشرق‬ ‫ملتقى‬
‫المعلومات‬ ‫أمن‬ ‫لمخاطر‬ ‫األول‬ ‫المدير‬ -
‫والتكنولوجيا‬ ‫للمعلومات‬ ‫التنفيذي‬ ‫الرئيس‬ -
‫المعلومات‬ ‫ألمن‬ ‫التنفيذي‬ ‫الرئيس‬ -
‫القرار‬ ‫وصناع‬ ‫األعمال‬ ‫رجال‬ -
‫المتخصصين‬ ‫الفنيين‬ -
‫االقسام‬ ‫ورؤساء‬ ‫المعلومات‬ ‫أمن‬ ‫دورات‬ ‫مدير‬ -
‫المعلومات‬ ‫وأمن‬ ‫الضمان‬ ‫اقسام‬ ‫رؤساء‬ -
‫المشتريات‬ ‫اقسام‬ ‫رؤساء‬ -
‫مقدمة‬
‫الملتقى‬ ‫موضوعات‬
‫المشاركون‬
‫الشبكات‬ ‫وأمن‬ ‫المعلومات‬ ‫تكنولوجيا‬ ‫نظم‬ -
‫األمنة‬ ‫السحابية‬ ‫الحوسبة‬ -
‫اإللكترونية‬ ‫الجنائية‬ ‫واألدلة‬ ‫اإللكترونية‬ ‫الجريمة‬ -
‫التنقل‬ ‫أمن‬ -
‫اإللكترونية‬ ‫والحكومة‬ ‫اإللكترونية‬ ‫واألعمال‬ ‫اإللكترونية‬ ‫التجارة‬ ‫-أمن‬
‫التحتية‬ ‫البنية‬ ‫أمن‬ -
‫االجتماعي‬ ‫االعالم‬ ‫وسائل‬ ‫تهديد‬ -
‫منها‬ ‫والوقاية‬ ‫عنها‬ ‫والكشف‬ ‫الشبكات‬ ‫اقتحام‬ -
‫المعلومات‬ ‫أمن‬ ‫واستراتيجيات‬ ‫سياسات‬ -
‫الحيوية‬ ‫القياسات‬ ,‫الهوية‬ ‫إدارة‬ -
‫الحوادث‬ ‫وإدارة‬ CERT -
,‫اإللكترونية‬ ‫الجرائم‬ ‫تهديدات‬ -
‫الكوارث‬ ‫من‬ ‫التعافي‬ ‫وخطط‬ ‫المعلومات‬ ‫تكنولوجيا‬ ‫أعمال‬ ‫استمرارية‬ -
.‫الشهادات‬ ‫إصدار‬ ‫و‬ ‫والتدريب‬ ‫والتوعية‬ ‫اإللكترونى‬ ‫األمن‬ ‫تعليم‬ -
www.meinfosecurity.com
Middle East Info Security Summit
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
6
Information Security
Registration FeeRegistration Form1
Cancellations must be made in writing.
1. 75% of the paid amount will be refunded for cancellations
made two months prior to the event.
2. 50% of the paid amount will be refunded for cancellations
made before one month to the event.
3. NO REFUND for cancellations made less than one month to
the event.
Cancellations4
The registration fee includes full conference package with:
1. Opening Cermony
2. Conference Proceedings
3. Admission to all the technical Sessions
4. Conference Folder
5. Certificate of Attendance
6. Daily Lunch & Coffee Breaks
Accommodations are NOT included in the
registration fee.
The conference fee includes
There will be 10% discount on registration of more
than 5 delegates from one organization.
Group Discounts5
Name
Job Title
Address
Organization
Country:
Postal code:
Fax:
Email:
Signature
City:
P.O. Box:
Telephone:
Mobile:
Date:
‫االسم‬
‫المنصب‬
‫العنوان‬
‫الجهة‬ /‫الشركة‬
‫الدولة‬
‫البريدى‬ ‫الرمز‬
‫فاكس‬
‫االلكترونى‬ ‫البريد‬
‫التوقيع‬
‫المدينة‬
.‫ص.ب‬
‫هاتف‬
‫المحمول‬ ‫الهاتف‬
‫التاريخ‬
‫المشاركة‬
Participation
‫المعلومات‬ ‫ألمن‬ ‫االوسط‬ ‫الشرق‬ ‫مؤتمر‬ ‫حضور‬
Conference Attendance
12 -13 October 2015
‫األخالقى‬ ‫اإللكترونى‬ ‫االختراق‬ :‫ورشة‬ ‫حضور‬
‫المعلومات‬ ‫ألمن‬ ‫االوسط‬ ‫الشرق‬ ‫مؤتمر‬ ‫حضور‬
‫العمل‬ ‫ورشة‬ +
Workshop: Certified Ethical Hacker
10 – 11 October 2015
Workshop + Conference Attendance
10 – 13 October 2015
‫المصريين‬
Egyptian
‫المصريين‬ ‫غير‬
Non-Egyptian
3
$ 300
$ 200
$ 400
P r o t e c t y o u r s p a c e
www.meinfosecurity.com
Middle East Info Security Summit
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
Payment Options2
+201063126348Direct contact:
Online “www.meinfosecurity.com”
Bank Transfer
Cash
$ 1000
$ 500
$ 1300
Fax it
+202 335 7989Egypt:
Kuwait:+965 22462214

More Related Content

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Featured

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

The Middle East Info Security Summit 2015

  • 1. www.promediakw.com Bahrain Tel +973 7732 3323 Fax +973 7732 1321 Egypt Tel +202 3335 7889 Fax +202 3335 7989 Saudi Arabia Tel +966 1146 56 040 Fax +966 1146 56 080 Organized by Middle East Information Security Summit ‫المعلومات‬ ‫ألمن‬ ‫األوسط‬ ‫الشرق‬ ‫ملتقى‬ Email: info@promediakw.com kuwait Tel +965 22462212 Fax +965 22462214 12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt w w w . m e i n f o s e c u r i t y . c o m Speakers Tamer Elbahey Senior Director Security Monitoring & Operations DU - UAE Ahmed Sherif Information Security Engineer EG-CER Nader Henenin Regional Director Product Security - Advisory Division BlackBerry- UAE Adel Abdel Moneim General Manager Raya Academy Dr. Mohamed El-Guindy Cyber Security Expert TV Presenter Waleed Yasser Senior Information Security Officer at ITS Seham Gadallah Information Security and Quality Assurance Sr. Manager at Raya Data Center Amr Yehia Network Security Engineer at Pharos Holding for Financial Investment Sponsors Media Partners
  • 2. Overview Overview The Middle East Info Security Summit, the premier event for info security, risk and IT professionals, will be held on  12 - 13 October 2015  at the Sofitel El Gezirah Hotel, Cairo, Egypt. We’re in a new era in the evolution of computing. The industry has moved from main frames, to client/server and the age of the desktop PC, and have now shifted to an era defined by mobile devices, cloud computing, and social networks. These changes present new risks to our data, privacy and security. Participants will debate these risks, learn fresh approaches and develop innovative strategies and tactics to defeat today’s biggest information security threats. This multi-track event will serve as a forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. The event takes a comprehensive look at the entire spectrum of IT security, business continuity management and risk. Featuring executive panel discussion sessions, insightful case studies and renowned speakers, the event is the best place to gather information to build your IT roadmap, and identify ways to make your business more agile and efficient. The Middle East Info Security Summit fosters opportunities for IT professionals to network, build relationships, and explore new ideas. It brings together IT professionals, developers, decisions and policy makers, governmental officials, experts, consultants, industry leaders, bankers, law enforcement officials, academics, networks security managers, database administrators, IT marketing executives, surveyors, etc. to share their protection experience in IT security and exchange ideas on most emerging technology trends, applications and practices. www.meinfosecurity.com Middle East Info Security Summit 12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt 1
  • 3. Themes Information Security P r o t e c t y o u r s p a c e www.meinfosecurity.com Middle East Info Security Summit 12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt With special emphasis placed on case studies and innovative and trusted security solutions, the event will focus on key security themes such as: • IT Systems & Network Security • Intrusion Detection and Prevention • Cloud Computing Security • E-Crime and E-Forensics  • Mobility Security • Security of Ecommerce, Ebusiness and Egovernment • Infrastructure Security • Social Media Threats • Network Intrusion, Detection and Prevention • Information Security Policies & Strategies • Identity Management • Biometrics • CERT & Incident Management • New Cybercrime Threats   • IT Business Continuity, Disaster Recovery Plans • Security Education - Awareness, Training and Certification 2
  • 4. - Senior Information Risk Owners (SIROs) Who should attend? - Security Course Managers - Heads of Information Assurance & Security - Chief Procurement Officers - VIPs, Heads and Directors of IT Departments - Quality Control Departments - Human Resources Managers - Communication and Disaster Recovery Managers - Chief Information Officers - Chief Information Security Officers - Senior Business Managers Decision Makers - Researchers - Technical Specialists - Chief Security Officers Why should attend? - Keep your information that turned to be ever more valuable. - Learn about the latest specialists techniques in safe information. - Share your concerns in a wider information security community. - Make your information system ahead in the market. - Take the right decision in face of every new information security challenge. - Know the best products and services came in the information market. - Assess your current information security strategy and get the most out of your information security budget. - Collaborate with your partners in the region who are working in the information market. Information Security P r o t e c t y o u r s p a c e www.meinfosecurity.com Middle East Info Security Summit 12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt 3
  • 5. According to the International Telecommunication Union, there are almost 3 billion online users all over the world. The Middle East came with 3.7% of the online market users recording the highest internet use growth in the world. It consequently required highly advanced cyber security solutions to maintain this continuing market development. The cyber-attacks are now marked as the second most common form of economic crime in the Middle East making a market value of Cyber security at $23 billion according to the Cyber Security Export Market: United Arab Emirates 2014. The security breach costs the world economy more than $445 billion annually, this leads directly to an expected ongoing growth in the market of cyber security software and services. The numbers in the information security are now in terms of million; with 1.5 million monitored cyber-attacks in US in 2013 according to IBM security services 2014 Cyber Security intelligence index, April 2014, while (the Global State of Information Security Survey: 2015) showed a number of 42.8 million of data breach incidents; showing an increase of 48% in one year only. Security policy is now an urgent need as part of your assessment policy to keep your information secured. Your information is your genuine fortune, keep it safe. Info Security Alert www.meinfosecurity.com Middle East Info Security Summit 12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt 4
  • 6. Call for Speakers If you would like the opportunity to participate in the Middle East Info Security Summit as a speaker or workshop leader, please contact us at  speaker@promediakw.com  as soon as possible. Include the following brief details of your proposed presentation: title, abstract, a few sentences of biographical information that relate you to the topic, and full contact information (title, address, e-mail, phone & fax) for you and any co-presenters. All abstracts will be reviewed by the Organizing/Review Committee and notification regarding acceptance will be made in due time. - Introduction to Ethical Hacking - Foot printing and Reconnaissance - Scanning Networks - Enumeration - System Hacking - Trojans and Backdoors - Viruses and Worms - Sniffing - Social Engineering - Denial of Service - Session Hijacking - Hacking Webservers - Hacking Web Applications - SQL Injection - Hacking Wireless Networks - Hacking Mobile Platforms - Evading IDS, Firewalls and Honeypots - Buffer Overflows - Cryptography - Penetration Testing Certified Ethical Hacker (CEH) 10 - 11 October 10 Hours / 5 Hours Per day A Certified Ethical Hacker (CEH) is a skilled professional who protects and secures systems by ethically using the same knowledge and tools as a malicious hacker. The objective of the ethical hacker is to help an organization take preventative measures against malicious attacks by attacking his own system. This ideology stems from the proven practice of trying to catch a thief by thinking like a thief. Participants will learn the latest techniques to scan, test, hack, and secure systems. This course is for Information Technology Security Professionals who wish to prepare for and pass the EC Council- Certified Ethical Hacking Exam as well as gain the understanding and hands-on experience of an Ethical Hacker. Contents Workshop Information Security P r o t e c t y o u r s p a c e www.meinfosecurity.com Middle East Info Security Summit 12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt 5
  • 7. ‫كنقطة‬ ‫بالقاهرة‬ ‫الجزيرة‬ ‫سوفتيل‬ ‫فندق‬ ‫في‬ 2015 ‫اكتوبر‬ ‫من‬ 13 -12 ‫في‬ ‫المعلومات‬ ‫ألمن‬ ‫االوسط‬ ‫الشرق‬ ‫ملتقى‬ ‫يعقد‬ ‫والخدمات‬ ‫المنتجات‬ ‫على‬ ‫والتعرف‬ ،‫جديدة‬ ‫شراكات‬ ‫لبناء‬ ‫منصة‬ ‫الملتقى‬ ‫هذا‬ ‫يعتبر‬ ‫حيث‬ ،‫المعلوماتية‬ ‫عصر‬ ‫ألعضاء‬ ‫التقاء‬ .‫مستهلك‬ ‫او‬ ‫كمقدم‬ ‫سواء‬ ‫للمعلومات‬ ‫كمستخدم‬ ‫المتاحة‬ ‫الفكرية‬ ‫الملكية‬ ‫لحماية‬ ‫العمل‬ ‫في‬ ‫اساسي‬ ‫عنصر‬ ‫أصبح‬ ‫فقد‬ ،‫المعلومات‬ ‫أمن‬ ‫هو‬ ‫العمل‬ ‫سوق‬ ‫في‬ ‫اليوم‬ ‫التحدي‬ ‫إن‬ ‫سواء‬ ‫العمل‬ ‫من‬ ‫ومتنامي‬ ‫ثابت‬ ‫جزء‬ ‫هو‬ ‫االن‬ ‫المعلومات‬ ‫أمن‬ ‫يعتبر‬ ‫عدة‬ ‫وألسباب‬ ،‫الماضي‬ ‫العقد‬ ‫مدار‬ ‫على‬ ‫باألفراد‬ ‫الخاص‬ ‫ما‬ ‫دائما‬ ‫هو‬ ‫المفتوح‬ ‫االلكتروني‬ ‫الفضاء‬ ‫هذا‬ ‫في‬ ‫امنة‬ ‫بك‬ ‫الخاصة‬ ‫المعلومات‬ ‫حفظ‬ ‫عدم‬ ‫إن‬ .‫العام‬ ‫او‬ ‫الخاص‬ ‫القطاع‬ ‫كان‬ .‫ومكلف‬ ‫خطير‬ ‫يكون‬ ‫المعلومات‬ ‫ألمن‬ ‫االوسط‬ ‫الشرق‬ ‫ملتقى‬ ‫المعلومات‬ ‫أمن‬ ‫لمخاطر‬ ‫األول‬ ‫المدير‬ - ‫والتكنولوجيا‬ ‫للمعلومات‬ ‫التنفيذي‬ ‫الرئيس‬ - ‫المعلومات‬ ‫ألمن‬ ‫التنفيذي‬ ‫الرئيس‬ - ‫القرار‬ ‫وصناع‬ ‫األعمال‬ ‫رجال‬ - ‫المتخصصين‬ ‫الفنيين‬ - ‫االقسام‬ ‫ورؤساء‬ ‫المعلومات‬ ‫أمن‬ ‫دورات‬ ‫مدير‬ - ‫المعلومات‬ ‫وأمن‬ ‫الضمان‬ ‫اقسام‬ ‫رؤساء‬ - ‫المشتريات‬ ‫اقسام‬ ‫رؤساء‬ - ‫مقدمة‬ ‫الملتقى‬ ‫موضوعات‬ ‫المشاركون‬ ‫الشبكات‬ ‫وأمن‬ ‫المعلومات‬ ‫تكنولوجيا‬ ‫نظم‬ - ‫األمنة‬ ‫السحابية‬ ‫الحوسبة‬ - ‫اإللكترونية‬ ‫الجنائية‬ ‫واألدلة‬ ‫اإللكترونية‬ ‫الجريمة‬ - ‫التنقل‬ ‫أمن‬ - ‫اإللكترونية‬ ‫والحكومة‬ ‫اإللكترونية‬ ‫واألعمال‬ ‫اإللكترونية‬ ‫التجارة‬ ‫-أمن‬ ‫التحتية‬ ‫البنية‬ ‫أمن‬ - ‫االجتماعي‬ ‫االعالم‬ ‫وسائل‬ ‫تهديد‬ - ‫منها‬ ‫والوقاية‬ ‫عنها‬ ‫والكشف‬ ‫الشبكات‬ ‫اقتحام‬ - ‫المعلومات‬ ‫أمن‬ ‫واستراتيجيات‬ ‫سياسات‬ - ‫الحيوية‬ ‫القياسات‬ ,‫الهوية‬ ‫إدارة‬ - ‫الحوادث‬ ‫وإدارة‬ CERT - ,‫اإللكترونية‬ ‫الجرائم‬ ‫تهديدات‬ - ‫الكوارث‬ ‫من‬ ‫التعافي‬ ‫وخطط‬ ‫المعلومات‬ ‫تكنولوجيا‬ ‫أعمال‬ ‫استمرارية‬ - .‫الشهادات‬ ‫إصدار‬ ‫و‬ ‫والتدريب‬ ‫والتوعية‬ ‫اإللكترونى‬ ‫األمن‬ ‫تعليم‬ - www.meinfosecurity.com Middle East Info Security Summit 12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt 6
  • 8. Information Security Registration FeeRegistration Form1 Cancellations must be made in writing. 1. 75% of the paid amount will be refunded for cancellations made two months prior to the event. 2. 50% of the paid amount will be refunded for cancellations made before one month to the event. 3. NO REFUND for cancellations made less than one month to the event. Cancellations4 The registration fee includes full conference package with: 1. Opening Cermony 2. Conference Proceedings 3. Admission to all the technical Sessions 4. Conference Folder 5. Certificate of Attendance 6. Daily Lunch & Coffee Breaks Accommodations are NOT included in the registration fee. The conference fee includes There will be 10% discount on registration of more than 5 delegates from one organization. Group Discounts5 Name Job Title Address Organization Country: Postal code: Fax: Email: Signature City: P.O. Box: Telephone: Mobile: Date: ‫االسم‬ ‫المنصب‬ ‫العنوان‬ ‫الجهة‬ /‫الشركة‬ ‫الدولة‬ ‫البريدى‬ ‫الرمز‬ ‫فاكس‬ ‫االلكترونى‬ ‫البريد‬ ‫التوقيع‬ ‫المدينة‬ .‫ص.ب‬ ‫هاتف‬ ‫المحمول‬ ‫الهاتف‬ ‫التاريخ‬ ‫المشاركة‬ Participation ‫المعلومات‬ ‫ألمن‬ ‫االوسط‬ ‫الشرق‬ ‫مؤتمر‬ ‫حضور‬ Conference Attendance 12 -13 October 2015 ‫األخالقى‬ ‫اإللكترونى‬ ‫االختراق‬ :‫ورشة‬ ‫حضور‬ ‫المعلومات‬ ‫ألمن‬ ‫االوسط‬ ‫الشرق‬ ‫مؤتمر‬ ‫حضور‬ ‫العمل‬ ‫ورشة‬ + Workshop: Certified Ethical Hacker 10 – 11 October 2015 Workshop + Conference Attendance 10 – 13 October 2015 ‫المصريين‬ Egyptian ‫المصريين‬ ‫غير‬ Non-Egyptian 3 $ 300 $ 200 $ 400 P r o t e c t y o u r s p a c e www.meinfosecurity.com Middle East Info Security Summit 12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt Payment Options2 +201063126348Direct contact: Online “www.meinfosecurity.com” Bank Transfer Cash $ 1000 $ 500 $ 1300 Fax it +202 335 7989Egypt: Kuwait:+965 22462214