SlideShare a Scribd company logo
Dr. Mohamed N. El-Guindy
Cybersecurity Expert and TV Presenter
Dr. Mohamed N. El-Guindy
Mohamed is a well-known cyber security expert,
technologist, speaker and researcher specialized in
cybercrime, cyber terrorism, and technology. He works as
cybercrime consultant for international organizations.
Mohamed is also the official representative of the Information
Systems Security Association (ISSA International) in Egypt.
With his broad IT and Engineering experience and
qualifications, he is appointed as Chartered Membership
Assessor at the Chartered Institute for IT (BCS) to assess
Chartered Engineers applying in the UK.
“Middle East states need to understand that off the shelf technologies will not solve any
security issue but it might make things worse.”
- Mohamed N. El-Guindy to ITP magazine
Tech Talk TV Show
For the first time in Middle East and in association with Tarek Nour communications, Dr. Mohamed
El-Guindy presents Tech Talk, the weekly technology show on Cairo Centric TV channel.
Airing: Sunday ~ Monday (5:10 PM)
Returns: Tuesday ~ Wednesday (5:30 PM) on +2 Channel
Cairo Centric TV Channel (Al Kahera Wal Nas), Nile Sat (Frequency: 11765 H)
Tech Talk is the first TV program in the Middle East to raise the awareness of technology and its effects on
society. The program episodes provide variety of technical topics in forms of investigative journalism and
thriller. From digital espionage and internet surveillance to 3D printing and reverse engineering the human
brain. From civil society to military applications, technology is affecting our everyday lives and became part
of social, political and economic scene. The main objective of the program is to deliver controversial
technical or scientific topics in an exciting and entertaining presentation to our audience..
Speaking and Research
Mohamed is frequent speaker and contributor in leading conferences and events related to cyber
security in the Middle East. His cybercrime research articles and papers appear in leading journals and
research websites. Mohamed is an authority in the filed of cybercrime study in the Middle East and his
contributions cited in UN reports and university research around the world.
Media and News Interviews
Dr. El-Guindy interviewed by popular newspapers, TV channels and technology magazines in the
Middle East. He speaks about cyber security, cybercrime, cyber terrorism, digital surveillance and
human rights issues.
Publications, Booklets and Study Guides
Dr. Mohamed is the author of variety of books, study guides and IT courses in English and Arabic
which are approved by international reputable organizations.
Courses prepared for IT training which are approved
by IEEE for CEUs and delivered by centers around the
Middle East and in e-learning format on ASK PC
Academy website. For more details:
www.ask-pc.com | www.askpc.net
Arabic booklets developed for Internet
Awareness Project “Saleem Net” in Saudi Arabia.
Saleem Net project created by Gernas Media
group, for more details on the project:
www.saleemnet.com
Articles and Whitepapers
Mohamed is frequently blogging on Middle East cyber security issues, human rights, digital
surveillance and cyber threats. In addition, he publishes whitepapers on critical issues related to
technology and Middle East.
For more information, check the official blog: www.netsafe.me
“Instead of military
actions, today’s
superpowers will write
malicious codes!”
-Mohamed N. El-Guindy
Consulting and Training
Dr. Mohamed El-Guindy is working as cyber security consultant for national and international
organizations. Mohamed is specialized in designing and delivering information security courses for
private and government sectors.
Partial client list
Professional Affiliations
Dr. El-Guindy is committed to the highest standards of information technology and engineering
through his affiliation to the largest and oldest organizations in the field.
- BCS, The Chartered Institute for IT – UK (Fellow , Chartered IT Professional, Chartered Membership Assessor) (FBCS, CITP, CISMP)
- The Engineering Council, UK (Chartered Engineer) (CEng)
- Science Council, UK (Registered Scientist) (Rsci)
- ISSA, Information Systems Security Association (Professional Member)
- IEEE, The Institute of Electrical and Electronics Engineers – USA (Professional Member)
- Institute of Science and Technology, UK (MIScT)
- City and Guilds of London Institute, UK (Professional Membership) (MCGI)
- International Association of Engineers (Professional Member)
- Institute of Leadership and Management, UK (Professional Member) (MInstLM)
- Virtual Forum Against Cybercrime (VFAC) in association with the UNODC and Korean Institute of Criminology (Expert Member)
Professional Training Services
Dr. Mohamed El-Guindy is specialized in developing and delivering courses and training related to
cybersecurity, cybercrime, and cyber intelligence. Most of the training courses are delivered onsite or as
seminars and workshops in five-start hotels around the Middle East.
All courses are approved by International organizations such as IEEE.
- Introduction to Information Security
- Cybercrime for Judges and Prosecutors
- Cybercrime for Law Enforcement
- Cyber Intelligence
- Customized short courses (Social Engineering, Cyber terrorism, OSI)
All courses can be customized to meet the needs of our clients
“Cybercrime is not the only threat in
cyberspace. We are moving forward to new
three-dimensional reality with Cyberwarfare”
-Mohamed N. El-Guindy
Contact Details
If you have any questions or inquiries, please contact Dr. El-Guindy:
www.netsafe.me | www.mohamedelguindy.com | www.ask-pc.com | www.issa-eg.org
elguindy@ask-pc.com | elguindy@ieee.org | elguindy@bcs.org
www.facebook.com/drelguindy | www.facebook.com/techtalkshow
https://plus.google.com/u/0/+MohamedElguindy1
http://eg.linkedin.com/in/elguindy
https://www.youtube.com/user/cairocentric
www.twitter.com/drelguindy

More Related Content

What's hot

UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
Dr David Probert
 
John Yessis - Telecom and Security
John Yessis - Telecom and Security John Yessis - Telecom and Security
John Yessis - Telecom and Security
John Yessis
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
Dr David Probert
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
secure smart cities
 secure smart cities secure smart cities
secure smart cities
Nasir Bhutta
 
ITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU-T Study Group 17 Introduction
ITU-T Study Group 17 Introduction
ITU
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
zapp0
 
Russian Trade Mission, the art of new business development
Russian Trade Mission, the art of new business developmentRussian Trade Mission, the art of new business development
Russian Trade Mission, the art of new business development
Thijs van Hofwegen
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
APNIC
 
ITU-T Study Group 3 Introduction
ITU-T Study Group 3 IntroductionITU-T Study Group 3 Introduction
ITU-T Study Group 3 Introduction
ITU
 

What's hot (11)

UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 
John Yessis - Telecom and Security
John Yessis - Telecom and Security John Yessis - Telecom and Security
John Yessis - Telecom and Security
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
secure smart cities
 secure smart cities secure smart cities
secure smart cities
 
ITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU-T Study Group 17 Introduction
ITU-T Study Group 17 Introduction
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
 
Russian Trade Mission, the art of new business development
Russian Trade Mission, the art of new business developmentRussian Trade Mission, the art of new business development
Russian Trade Mission, the art of new business development
 
Web profile
Web profileWeb profile
Web profile
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
ITU-T Study Group 3 Introduction
ITU-T Study Group 3 IntroductionITU-T Study Group 3 Introduction
ITU-T Study Group 3 Introduction
 

Viewers also liked

21st Century Threats and Middle East Dilemma
21st Century Threats and Middle East Dilemma 21st Century Threats and Middle East Dilemma
21st Century Threats and Middle East Dilemma
Mohamed N. El-Guindy
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
Mohamed N. El-Guindy
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle East
Mohamed N. El-Guindy
 
Chapter 9 – Introduction to Contracts
Chapter 9 – Introduction to ContractsChapter 9 – Introduction to Contracts
Chapter 9 – Introduction to ContractsUAF_BA330
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec
 
Chapter 9 – Introduction to Contracts
Chapter 9 – Introduction to ContractsChapter 9 – Introduction to Contracts
Chapter 9 – Introduction to Contracts
UAF_BA330
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Contract act.ppt
Contract act.pptContract act.ppt
Contract act.ppt
Aditya Durgude
 
Cyber law
Cyber lawCyber law
Business law contract act
Business law contract actBusiness law contract act
Business law contract actNitin Patil
 
Introduction to Contract Law
Introduction to Contract LawIntroduction to Contract Law
Introduction to Contract Lawtheacademist
 
Study notes contract law
Study notes   contract lawStudy notes   contract law
Study notes contract law
Ramona Vansluytman
 

Viewers also liked (13)

21st Century Threats and Middle East Dilemma
21st Century Threats and Middle East Dilemma 21st Century Threats and Middle East Dilemma
21st Century Threats and Middle East Dilemma
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle East
 
Chapter 9 – Introduction to Contracts
Chapter 9 – Introduction to ContractsChapter 9 – Introduction to Contracts
Chapter 9 – Introduction to Contracts
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Chapter 9 – Introduction to Contracts
Chapter 9 – Introduction to ContractsChapter 9 – Introduction to Contracts
Chapter 9 – Introduction to Contracts
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Contract act.ppt
Contract act.pptContract act.ppt
Contract act.ppt
 
Cyber law
Cyber lawCyber law
Cyber law
 
Business law contract act
Business law contract actBusiness law contract act
Business law contract act
 
Contract law
Contract lawContract law
Contract law
 
Introduction to Contract Law
Introduction to Contract LawIntroduction to Contract Law
Introduction to Contract Law
 
Study notes contract law
Study notes   contract lawStudy notes   contract law
Study notes contract law
 

Similar to Mohamed N. El-Guindy

Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
African Cyber Security Summit
 
Cyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdfCyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdf
IgorSamuel12
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
Business Finland
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
sudheerreddy59
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
imtnoida112
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
Rohana K Amarakoon
 
The red book
The red book  The red book
The red book
habiba Elmasry
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
SharifulShishir
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
zayadeen2003
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
Rohana K Amarakoon
 
188
188188
Future of Cyber Security - Dr. Utku Kose
Future of Cyber Security - Dr. Utku KoseFuture of Cyber Security - Dr. Utku Kose
Future of Cyber Security - Dr. Utku Kose
UtkuKose
 
Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Special Session on “Applications of Artificial Intelligence and IoT in Comput...Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Christo Ananth
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
James Nesbitt
 
C-Sec Pro
C-Sec Pro C-Sec Pro
C-Sec Pro
CSSRL PUNE
 
International Journal of Multimedia & Its Applications (IJMA)
International Journal of Multimedia & Its Applications (IJMA)International Journal of Multimedia & Its Applications (IJMA)
International Journal of Multimedia & Its Applications (IJMA)
ijma
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conference
Dale Butler
 

Similar to Mohamed N. El-Guindy (20)

CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Cyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdfCyber-Handbook-Enterprise.pdf
Cyber-Handbook-Enterprise.pdf
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
The red book
The red book  The red book
The red book
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
188
188188
188
 
Future of Cyber Security - Dr. Utku Kose
Future of Cyber Security - Dr. Utku KoseFuture of Cyber Security - Dr. Utku Kose
Future of Cyber Security - Dr. Utku Kose
 
Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Special Session on “Applications of Artificial Intelligence and IoT in Comput...Special Session on “Applications of Artificial Intelligence and IoT in Comput...
Special Session on “Applications of Artificial Intelligence and IoT in Comput...
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
C-Sec Pro
C-Sec Pro C-Sec Pro
C-Sec Pro
 
625 -ESECURITY
625 -ESECURITY625 -ESECURITY
625 -ESECURITY
 
International Journal of Multimedia & Its Applications (IJMA)
International Journal of Multimedia & Its Applications (IJMA)International Journal of Multimedia & Its Applications (IJMA)
International Journal of Multimedia & Its Applications (IJMA)
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conference
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Mohamed N. El-Guindy

  • 1. Dr. Mohamed N. El-Guindy Cybersecurity Expert and TV Presenter
  • 2. Dr. Mohamed N. El-Guindy Mohamed is a well-known cyber security expert, technologist, speaker and researcher specialized in cybercrime, cyber terrorism, and technology. He works as cybercrime consultant for international organizations. Mohamed is also the official representative of the Information Systems Security Association (ISSA International) in Egypt. With his broad IT and Engineering experience and qualifications, he is appointed as Chartered Membership Assessor at the Chartered Institute for IT (BCS) to assess Chartered Engineers applying in the UK. “Middle East states need to understand that off the shelf technologies will not solve any security issue but it might make things worse.” - Mohamed N. El-Guindy to ITP magazine
  • 3. Tech Talk TV Show For the first time in Middle East and in association with Tarek Nour communications, Dr. Mohamed El-Guindy presents Tech Talk, the weekly technology show on Cairo Centric TV channel. Airing: Sunday ~ Monday (5:10 PM) Returns: Tuesday ~ Wednesday (5:30 PM) on +2 Channel Cairo Centric TV Channel (Al Kahera Wal Nas), Nile Sat (Frequency: 11765 H) Tech Talk is the first TV program in the Middle East to raise the awareness of technology and its effects on society. The program episodes provide variety of technical topics in forms of investigative journalism and thriller. From digital espionage and internet surveillance to 3D printing and reverse engineering the human brain. From civil society to military applications, technology is affecting our everyday lives and became part of social, political and economic scene. The main objective of the program is to deliver controversial technical or scientific topics in an exciting and entertaining presentation to our audience..
  • 4. Speaking and Research Mohamed is frequent speaker and contributor in leading conferences and events related to cyber security in the Middle East. His cybercrime research articles and papers appear in leading journals and research websites. Mohamed is an authority in the filed of cybercrime study in the Middle East and his contributions cited in UN reports and university research around the world.
  • 5. Media and News Interviews Dr. El-Guindy interviewed by popular newspapers, TV channels and technology magazines in the Middle East. He speaks about cyber security, cybercrime, cyber terrorism, digital surveillance and human rights issues.
  • 6. Publications, Booklets and Study Guides Dr. Mohamed is the author of variety of books, study guides and IT courses in English and Arabic which are approved by international reputable organizations. Courses prepared for IT training which are approved by IEEE for CEUs and delivered by centers around the Middle East and in e-learning format on ASK PC Academy website. For more details: www.ask-pc.com | www.askpc.net Arabic booklets developed for Internet Awareness Project “Saleem Net” in Saudi Arabia. Saleem Net project created by Gernas Media group, for more details on the project: www.saleemnet.com
  • 7. Articles and Whitepapers Mohamed is frequently blogging on Middle East cyber security issues, human rights, digital surveillance and cyber threats. In addition, he publishes whitepapers on critical issues related to technology and Middle East. For more information, check the official blog: www.netsafe.me “Instead of military actions, today’s superpowers will write malicious codes!” -Mohamed N. El-Guindy
  • 8. Consulting and Training Dr. Mohamed El-Guindy is working as cyber security consultant for national and international organizations. Mohamed is specialized in designing and delivering information security courses for private and government sectors. Partial client list
  • 9. Professional Affiliations Dr. El-Guindy is committed to the highest standards of information technology and engineering through his affiliation to the largest and oldest organizations in the field. - BCS, The Chartered Institute for IT – UK (Fellow , Chartered IT Professional, Chartered Membership Assessor) (FBCS, CITP, CISMP) - The Engineering Council, UK (Chartered Engineer) (CEng) - Science Council, UK (Registered Scientist) (Rsci) - ISSA, Information Systems Security Association (Professional Member) - IEEE, The Institute of Electrical and Electronics Engineers – USA (Professional Member) - Institute of Science and Technology, UK (MIScT) - City and Guilds of London Institute, UK (Professional Membership) (MCGI) - International Association of Engineers (Professional Member) - Institute of Leadership and Management, UK (Professional Member) (MInstLM) - Virtual Forum Against Cybercrime (VFAC) in association with the UNODC and Korean Institute of Criminology (Expert Member)
  • 10. Professional Training Services Dr. Mohamed El-Guindy is specialized in developing and delivering courses and training related to cybersecurity, cybercrime, and cyber intelligence. Most of the training courses are delivered onsite or as seminars and workshops in five-start hotels around the Middle East. All courses are approved by International organizations such as IEEE. - Introduction to Information Security - Cybercrime for Judges and Prosecutors - Cybercrime for Law Enforcement - Cyber Intelligence - Customized short courses (Social Engineering, Cyber terrorism, OSI) All courses can be customized to meet the needs of our clients “Cybercrime is not the only threat in cyberspace. We are moving forward to new three-dimensional reality with Cyberwarfare” -Mohamed N. El-Guindy
  • 11. Contact Details If you have any questions or inquiries, please contact Dr. El-Guindy: www.netsafe.me | www.mohamedelguindy.com | www.ask-pc.com | www.issa-eg.org elguindy@ask-pc.com | elguindy@ieee.org | elguindy@bcs.org www.facebook.com/drelguindy | www.facebook.com/techtalkshow https://plus.google.com/u/0/+MohamedElguindy1 http://eg.linkedin.com/in/elguindy https://www.youtube.com/user/cairocentric www.twitter.com/drelguindy