The Middle East Info Security Summit, the premier event for info security, risk and IT professionals, will be held on 12 – 13 October 2015 at the Sofitel El Gezirah Hotel, Cairo, Egypt.
http://www.meinfosecurity.com/
Themes:
With special emphasis placed on case studies and innovative and trusted security solutions, the event will focus on key security themes such as:
- IT systems & network security
-Intrusion Detection and Prevention
-Cloud Computing Security
-E-Crime and e-Forensics
-Mobility security
-Security of eCommerce, eBusiness and eGovernment
-Infrastructure Security
-Social Media Threats
-Network intrusion, detection and prevention
-Information security policies & strategies
-Identity Management
-Biometrics
-CERT & Incident Management
-New cybercrime threats
-IT business continuity, disaster recovery plans
-Security Education – Awareness, Training and Certification
For more information about The Middle East Info Summit please visit : http://www.wisegeek.org/
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
The Middle East Info Security Summit 2015
1. www.promediakw.com
Bahrain
Tel +973 7732 3323
Fax +973 7732 1321
Egypt
Tel +202 3335 7889
Fax +202 3335 7989
Saudi Arabia
Tel +966 1146 56 040
Fax +966 1146 56 080
Organized by
Middle East
Information Security Summit
المعلومات ألمن األوسط الشرق ملتقى
Email: info@promediakw.com
kuwait
Tel +965 22462212
Fax +965 22462214
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
w w w . m e i n f o s e c u r i t y . c o m
Speakers
Tamer Elbahey
Senior Director
Security Monitoring &
Operations DU - UAE
Ahmed Sherif
Information Security Engineer
EG-CER
Nader Henenin
Regional Director
Product Security - Advisory Division
BlackBerry- UAE
Adel Abdel Moneim
General Manager
Raya Academy
Dr. Mohamed El-Guindy
Cyber Security Expert
TV Presenter
Waleed Yasser
Senior Information Security
Officer at ITS
Seham Gadallah
Information Security and Quality
Assurance Sr. Manager at Raya
Data Center
Amr Yehia
Network Security Engineer at
Pharos Holding for Financial
Investment
Sponsors Media Partners
2. Overview
Overview
The Middle East Info Security Summit, the premier event for info security, risk and
IT professionals, will be held on 12 - 13 October 2015 at the Sofitel El Gezirah Hotel,
Cairo, Egypt.
We’re in a new era in the evolution of computing. The industry has moved from
main frames, to client/server and the age of the desktop PC, and have now shifted
to an era defined by mobile devices, cloud computing, and social networks. These
changes present new risks to our data, privacy and security. Participants will debate
these risks, learn fresh approaches and develop innovative strategies and tactics to
defeat today’s biggest information security threats.
This multi-track event will serve as a forum for information security researchers,
practitioners, developers, and users to explore cutting-edge ideas and results, and
to exchange techniques, tools, and experiences. The event takes a comprehensive
look at the entire spectrum of IT security, business continuity management and risk.
Featuring executive panel discussion sessions, insightful case studies and renowned
speakers, the event is the best place to gather information to build your IT roadmap,
and identify ways to make your business more agile and efficient.
The Middle East Info Security Summit fosters opportunities for IT professionals to
network, build relationships, and explore new ideas. It brings together IT professionals,
developers, decisions and policy makers, governmental officials, experts, consultants,
industry leaders, bankers, law enforcement officials, academics, networks security
managers, database administrators, IT marketing executives, surveyors, etc. to share
their protection experience in IT security and exchange ideas on most emerging
technology trends, applications and practices.
www.meinfosecurity.com
Middle East Info Security Summit
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
1
3. Themes
Information Security
P r o t e c t y o u r s p a c e
www.meinfosecurity.com
Middle East Info Security Summit
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
With special emphasis placed on case studies and innovative and
trusted security solutions, the event will focus on key security
themes such as:
• IT Systems & Network Security
• Intrusion Detection and Prevention
• Cloud Computing Security
• E-Crime and E-Forensics
• Mobility Security
• Security of Ecommerce, Ebusiness and Egovernment
• Infrastructure Security
• Social Media Threats
• Network Intrusion, Detection and Prevention
• Information Security Policies & Strategies
• Identity Management
• Biometrics
• CERT & Incident Management
• New Cybercrime Threats
• IT Business Continuity, Disaster Recovery Plans
• Security Education - Awareness, Training and Certification
2
4. - Senior Information Risk Owners (SIROs)
Who should attend?
- Security Course Managers
- Heads of Information Assurance & Security
- Chief Procurement Officers
- VIPs, Heads and Directors of IT Departments
- Quality Control Departments
- Human Resources Managers
- Communication and Disaster Recovery Managers
- Chief Information Officers
- Chief Information Security Officers
- Senior Business Managers Decision Makers
- Researchers
- Technical Specialists
- Chief Security Officers
Why should attend?
- Keep your information that turned to be ever more valuable.
- Learn about the latest specialists techniques in safe information.
- Share your concerns in a wider information security community.
- Make your information system ahead in the market.
- Take the right decision in face of every new information security challenge.
- Know the best products and services came in the information market.
- Assess your current information security strategy and get the most out of your information
security budget.
- Collaborate with your partners in the region who are working in the information market.
Information Security
P r o t e c t y o u r s p a c e
www.meinfosecurity.com
Middle East Info Security Summit
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
3
5. According to the International Telecommunication Union, there are almost 3 billion online users all
over the world. The Middle East came with 3.7% of the online market users recording the highest
internet use growth in the world. It consequently required highly advanced cyber security solutions
to maintain this continuing market development.
The cyber-attacks are now marked as the second most common form of economic crime in the Middle
East making a market value of Cyber security at $23 billion according to the Cyber Security Export
Market: United Arab Emirates 2014. The security breach costs the world economy more than $445
billion annually, this leads directly to an expected ongoing growth in the market of cyber security
software and services.
The numbers in the information security are now in terms of million; with 1.5 million monitored
cyber-attacks in US in 2013 according to IBM security services 2014 Cyber Security intelligence
index, April 2014, while (the Global State of Information Security Survey: 2015) showed a number of
42.8 million of data breach incidents; showing an increase of 48% in one year only. Security policy is
now an urgent need as part of your assessment policy to keep your information secured.
Your information is your genuine fortune, keep it safe.
Info Security Alert
www.meinfosecurity.com
Middle East Info Security Summit
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
4
6. Call for Speakers
If you would like the opportunity to participate
in the Middle East Info Security Summit as a
speaker or workshop leader, please contact us at
speaker@promediakw.com as soon as possible.
Include the following brief details of your
proposed presentation: title, abstract, a few
sentences of biographical information that relate
you to the topic, and full contact information
(title, address, e-mail, phone & fax) for you and
any co-presenters. All abstracts will be reviewed
by the Organizing/Review Committee and
notification regarding acceptance will be made
in due time.
- Introduction to Ethical Hacking
- Foot printing and Reconnaissance
- Scanning Networks
- Enumeration
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Evading IDS, Firewalls and Honeypots
- Buffer Overflows
- Cryptography
- Penetration Testing
Certified Ethical Hacker (CEH)
10 - 11 October
10 Hours / 5 Hours Per day
A Certified Ethical Hacker (CEH) is a skilled
professional who protects and secures systems
by ethically using the same knowledge and tools
as a malicious hacker. The objective of the ethical
hacker is to help an organization take
preventative measures against malicious attacks
by attacking his own system. This ideology stems
from the proven practice of trying to catch a thief
by thinking like a thief. Participants will learn the
latest techniques to scan, test, hack, and secure
systems.
This course is for Information Technology
Security Professionals who wish to prepare for
and pass the EC Council- Certified Ethical
Hacking Exam as well as gain the understanding
and hands-on experience of an Ethical Hacker.
Contents
Workshop
Information Security
P r o t e c t y o u r s p a c e
www.meinfosecurity.com
Middle East Info Security Summit
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
5
8. Information Security
Registration FeeRegistration Form1
Cancellations must be made in writing.
1. 75% of the paid amount will be refunded for cancellations
made two months prior to the event.
2. 50% of the paid amount will be refunded for cancellations
made before one month to the event.
3. NO REFUND for cancellations made less than one month to
the event.
Cancellations4
The registration fee includes full conference package with:
1. Opening Cermony
2. Conference Proceedings
3. Admission to all the technical Sessions
4. Conference Folder
5. Certificate of Attendance
6. Daily Lunch & Coffee Breaks
Accommodations are NOT included in the
registration fee.
The conference fee includes
There will be 10% discount on registration of more
than 5 delegates from one organization.
Group Discounts5
Name
Job Title
Address
Organization
Country:
Postal code:
Fax:
Email:
Signature
City:
P.O. Box:
Telephone:
Mobile:
Date:
االسم
المنصب
العنوان
الجهة /الشركة
الدولة
البريدى الرمز
فاكس
االلكترونى البريد
التوقيع
المدينة
.ص.ب
هاتف
المحمول الهاتف
التاريخ
المشاركة
Participation
المعلومات ألمن االوسط الشرق مؤتمر حضور
Conference Attendance
12 -13 October 2015
األخالقى اإللكترونى االختراق :ورشة حضور
المعلومات ألمن االوسط الشرق مؤتمر حضور
العمل ورشة +
Workshop: Certified Ethical Hacker
10 – 11 October 2015
Workshop + Conference Attendance
10 – 13 October 2015
المصريين
Egyptian
المصريين غير
Non-Egyptian
3
$ 300
$ 200
$ 400
P r o t e c t y o u r s p a c e
www.meinfosecurity.com
Middle East Info Security Summit
12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt
Payment Options2
+201063126348Direct contact:
Online “www.meinfosecurity.com”
Bank Transfer
Cash
$ 1000
$ 500
$ 1300
Fax it
+202 335 7989Egypt:
Kuwait:+965 22462214