Personal Information
Organization / Workplace
Dubai United Arab Emirates
Occupation
CTO, Advisor, Executive Board Member
Website
link.bar/jorge
About
International Speaker, ecosystems, startups in innovation: AI, Web3, XR, Gaming, Cloud, Sustainable, Blockchain, Tokenization, CyberSecurity, IoT, 5G, Robotics.
Tags
jorge sebastiao
4jorge
cyber security
conference
cyber attack
security
speech
keynote
security awareness
infosec
blockchain
artificial intelligence
ai
dubai
big data
information security
physical security
cyberwar
cloud computing
managed services
drp
recovery
disaster
bcp
continuity
business
cyber defense
iot
critical infrastructure
risk management
datamatix
iso27001
its
services
crypto wallet
crypto exchange
traffic management
innovation
emirates security
transportation
vulnerability
middle east
bahrain
ict strategy
business continuity
gitex
bs25999
planning
planningbcp
outsourcing
global blockchain organization
gbo
enterprise blockchain
trescon
huawei
algeria
future
human capital
machine learning
international
emirates
emirates airlines
agility
cyber security asia
cymass
framework
crypto
social media
forensics
disaster recovery
infowarcon
sla
administer
apply
assess
awareness
architect
first information security
fis
cyprus
time based security
conferences
stuxnet
ics security
cloud security
risk
gcc
security cyberwar
cybercrime
egovernment
international turnkey systems
managed
digital exchange
licensing
asset tokenization
asset management
real estate
medical records
vaccine
contact tracing
trust
digital transformation
corona
covid 19
robotics
technology
istanbul
digital currency
crypto currency
scalability
blockchain 5.0
aerospace
pakistan
smart city
ukraine
use case
smart traffic
5g
cyber threats
speaker
limassol
jobs
hr
vesknik kipro
eurokerdos
social engineering
privacy
data leak
autability
isca
isca18
3d printing
education and training
training
human resources
saint petersburg
russia
roads and transport authority
rta
enterprise intelligence
ei
united nations
un
internet governance forum
internet marketing
geneva
analytics
switzerland
igf2018
igf
exhibition
oil and gas
abu dhabi
adipec
gps
gps security
airlines
melbourne
australia
university
victoria university
ioe
threat management
assessment
methodology
a6
emirates airlaines
mass gadering
airport security
airport
bahrain information technology society
bits
it strategy
the open group
ict transformation
it transformation
enterprise architecture
togaf
security analytics
meetict
scada
heksi
inforwar
elliptic curves
cryptography
asymetric cryptography
aes
encryption
security operations center
strategy plan
cloud services
remoted managed services
forensic services
mobile foreensics
video forensics
cctv forensics
forensic
crisis management
crisis
information se
heists
banking
case study
mss
idc
mobile security
mobile computing
tbs
ng dc
green dc
new generation data centers
green data center
green computing
eservices
infowar
olympic games
hack in paris
flame
duqu
info warfare
gitex emerging markets cloud computing
egcc egovernment services emerging markets
cso
2010
security management
did you know
transformation
countermeasures
email
phishing
personal security
identity theft
compliance
governance1
certifications
iso27xxx
defenses
risks
cost
presentation
banktech asia
international turnkey solutions
ict
sebastiao
jorge
See more
- Presentations
- Documents
- Infographics
Cisco OpenSOC
James Sirota
•
9 years ago
Email Marketing The Worst Mistakes You Can Make
Abhishek Shah
•
9 years ago
Becoming Masters of our (ITSM) Domain – A Case Study Webinar
Samanage
•
9 years ago
Operational Resilience: Can they see it; test it; prove it?
Global Risk Forum GRFDavos
•
13 years ago
Defcon 22-tess-schrodinger-raxacoricofallapatorius-with-love
Priyanka Aash
•
9 years ago
The Anatomy of Comment Spam
Imperva
•
9 years ago
Edward Snowden Data-Breach
Deepak Kumar (D3)
•
9 years ago
Infowarcon 2014 ME Cyber wars v13
Jorge Sebastiao
•
9 years ago
ISO 22301 Business Continuity Management
Ramiro Cid
•
10 years ago
Introduction to IOS Application Penetration Testing
Ammar WK
•
10 years ago
Web Applications Under Attack: Why Network Security Solutions Leave You Exposed
Imperva
•
10 years ago
Is Your Business Safe From Malware And Targeted Attacks
Imperva
•
10 years ago
A4 to A10 of security V3.1
Jorge Sebastiao
•
10 years ago
Mobile changes everything, no one is safe
Jorge Sebastiao
•
11 years ago
Time based security for cloud computing
Jorge Sebastiao
•
11 years ago
Green & new gen dc conf-v121
Jorge Sebastiao
•
11 years ago
18th gcc eGov eServ cloud compv31
Jorge Sebastiao
•
11 years ago
Weapons of max destruction v41
Jorge Sebastiao
•
11 years ago
Gitex journey to the cloud
Jorge Sebastiao
•
12 years ago
Cyber war or business as usual
EnclaveSecurity
•
12 years ago