Intelligent Buildings can use the skills of the control experts in the process field like the ISA Chapter members. Recent IEC Standard on cybersecurity is applicable to the building automation field.
Achievements and future works of ITU-T Study Group 2 on Operational aspects of service provision and Telecommunications management
Presented at WTSA-16 by Dr Sherif Guinena, Chairman of ITU-T Study Group 2
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
The UK is one of the world’s leading
digital nations. Much of our prosperity
now depends on our ability to secure our
technology, data and networks from the
many threats we face.
Yet cyber attacks are growing more
frequent, sophisticated and damaging when
they succeed. So we are taking decisive
action to protect both our economy and the
privacy of UK citizens.
Our National Cyber Security Strategy sets out
our plan to make Britain confident, capable
and resilient in a fast-moving digital world.
Over the lifetime of this five-year strategy,
we will invest £1.9 billion in defending
our systems and infrastructure, deterring
our adversaries, and developing a wholesociety
capability – from the biggest
companies to the individual citizen.
From the most basic cyber hygiene, to the
most sophisticated deterrence, we need a
comprehensive response.
We will focus on raising the cost of
mounting an attack against anyone in the
UK, both through stronger defences and
better cyber skills. This is no longer just
an issue for the IT department but for the
whole workforce. Cyber skills need to reach
into every profession.
The new National Cyber Security Centre will
provide a hub of world-class, user-friendly
expertise for businesses and individuals, as
well as rapid response to major incidents.
Government has a clear leadership role,
but we will also foster a wider commercial
ecosystem, recognising where industry
can innovate faster than us. This includes
a drive to get the best young minds into
cyber security.
The cyber threat impacts the whole of our
society, so we want to make very clear
that everyone has a part to play in our
national response. It’s why this strategy is
an unprecedented exercise in transparency.
We can no longer afford to have this
discussion behind closed doors.
Ultimately, this is a threat that cannot be
completely eliminated. Digital technology
works because it is open, and that
openness brings with it risk. What we
can do is reduce the threat to a level that
ensures we remain at the vanguard of the
digital revolution. This strategy sets out how.
Intelligent Buildings can use the skills of the control experts in the process field like the ISA Chapter members. Recent IEC Standard on cybersecurity is applicable to the building automation field.
Achievements and future works of ITU-T Study Group 2 on Operational aspects of service provision and Telecommunications management
Presented at WTSA-16 by Dr Sherif Guinena, Chairman of ITU-T Study Group 2
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
The UK is one of the world’s leading
digital nations. Much of our prosperity
now depends on our ability to secure our
technology, data and networks from the
many threats we face.
Yet cyber attacks are growing more
frequent, sophisticated and damaging when
they succeed. So we are taking decisive
action to protect both our economy and the
privacy of UK citizens.
Our National Cyber Security Strategy sets out
our plan to make Britain confident, capable
and resilient in a fast-moving digital world.
Over the lifetime of this five-year strategy,
we will invest £1.9 billion in defending
our systems and infrastructure, deterring
our adversaries, and developing a wholesociety
capability – from the biggest
companies to the individual citizen.
From the most basic cyber hygiene, to the
most sophisticated deterrence, we need a
comprehensive response.
We will focus on raising the cost of
mounting an attack against anyone in the
UK, both through stronger defences and
better cyber skills. This is no longer just
an issue for the IT department but for the
whole workforce. Cyber skills need to reach
into every profession.
The new National Cyber Security Centre will
provide a hub of world-class, user-friendly
expertise for businesses and individuals, as
well as rapid response to major incidents.
Government has a clear leadership role,
but we will also foster a wider commercial
ecosystem, recognising where industry
can innovate faster than us. This includes
a drive to get the best young minds into
cyber security.
The cyber threat impacts the whole of our
society, so we want to make very clear
that everyone has a part to play in our
national response. It’s why this strategy is
an unprecedented exercise in transparency.
We can no longer afford to have this
discussion behind closed doors.
Ultimately, this is a threat that cannot be
completely eliminated. Digital technology
works because it is open, and that
openness brings with it risk. What we
can do is reduce the threat to a level that
ensures we remain at the vanguard of the
digital revolution. This strategy sets out how.
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
Presentation given at the Joint UN/ITU CITEL Cybersecurity Workshop in Salta City, Argentina - Nov 2010. The material discusses Cybersecurity Skills Development and International Partnerships for the Americas.
John Yessis is a sales director at EUS Networks. John Yessis is a professional in the telecom field. John Yessis specializes in providing Voice over IP (VoIP) systems and cloud technologies.
Achievements and future works of ITU-T Study Group 17 on Security
Presented at WTSA-16 by Mr Heung-Youl Youm, Vice-chairman, on behalf of Mr Arkadiy Kremer, Chairman of ITU-T Study Group 17
Methods and techniques for monitoring, surveillance and profiling of cyberspace activities are available to state actors and criminal operators as well as to skilled individuals.
Civilian individuals without extensive knowledge and exposure to counter-intelligence techniques and Operations Security (OPSEC) protocols are vulnerable and helpless against these privacy breaches. This represents significant gap between actors and their victims – gap that can be bridged only through education.
The primary objective of this workshop oriented activity is to educate people operating in above-average risk situations in cyberspace and to bridge the unfair gap between them and malicious actors. Secondary objective aims at understanding how cyber security can be taught to non-security minded people in efficient way.
Russian Trade Mission, the art of new business developmentThijs van Hofwegen
an outline of the cyber security developments in Europe and The Netherlands specifically for the Russian Trade Mission at Amsterdam. Followed by an outline steps and tricks to enter a new market like Europe.
Achievements and future works of ITU-T Study Group 3 on Tariff and accounting principles including related telecommunication economic and policy issues
Presented at WTSA-16 by Mr Seiichi Tsugawa, Chairman of ITU-T Study Group 3
This whitepaper discusses the 21st century cyber threats and its effect on Middle East countries in the upcoming years.
The paper also takes look at latest malware, hardware Trojans and cyber surveillance affecting the region. By the end of the year 2010 and the beginning of 2011, we entered into a new era of cyber threats and cyber activities. Advanced malware which might bypass Antivirus software are now easily developed using automated Crimeware that don’t need any programming or professional skills. This will introduce new generation of sophisticated attacks conducted by script-kiddies. Beside other hardware problems and cyber surveillance everywhere, I see that we need to think twice on how we implement and use advanced technology in our daily lives!
ICTs investments in MENA countries are overtaking the rest of the world but they didn’t improve their cyber legislation systems. Cybercrime in the region is rising alarmingly and there no efforts to tackle this phenomenon. Lack of legislative and technical capabilities are common factors in most Middle East countries along with poor security awareness and education. I’m delighted to introduce my latest research to address these latest cybercrime issues in the region. This research includes extensive study for Internet penetration in MENA, country by country assessment, legal frameworks, and challenges facing legislators in the region.
Research Article published in the 3rd Annual Cyber Security for Energy & Utilities.
23 - 26 March 2014 - The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, United Arab Emirates
Powerpoint from textbook Business Law - the ethical, global, and e-commerce environment to accompany BA 330 course at the University of Alaska Fairbanks.
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
Presentation given at the Joint UN/ITU CITEL Cybersecurity Workshop in Salta City, Argentina - Nov 2010. The material discusses Cybersecurity Skills Development and International Partnerships for the Americas.
John Yessis is a sales director at EUS Networks. John Yessis is a professional in the telecom field. John Yessis specializes in providing Voice over IP (VoIP) systems and cloud technologies.
Achievements and future works of ITU-T Study Group 17 on Security
Presented at WTSA-16 by Mr Heung-Youl Youm, Vice-chairman, on behalf of Mr Arkadiy Kremer, Chairman of ITU-T Study Group 17
Methods and techniques for monitoring, surveillance and profiling of cyberspace activities are available to state actors and criminal operators as well as to skilled individuals.
Civilian individuals without extensive knowledge and exposure to counter-intelligence techniques and Operations Security (OPSEC) protocols are vulnerable and helpless against these privacy breaches. This represents significant gap between actors and their victims – gap that can be bridged only through education.
The primary objective of this workshop oriented activity is to educate people operating in above-average risk situations in cyberspace and to bridge the unfair gap between them and malicious actors. Secondary objective aims at understanding how cyber security can be taught to non-security minded people in efficient way.
Russian Trade Mission, the art of new business developmentThijs van Hofwegen
an outline of the cyber security developments in Europe and The Netherlands specifically for the Russian Trade Mission at Amsterdam. Followed by an outline steps and tricks to enter a new market like Europe.
Achievements and future works of ITU-T Study Group 3 on Tariff and accounting principles including related telecommunication economic and policy issues
Presented at WTSA-16 by Mr Seiichi Tsugawa, Chairman of ITU-T Study Group 3
This whitepaper discusses the 21st century cyber threats and its effect on Middle East countries in the upcoming years.
The paper also takes look at latest malware, hardware Trojans and cyber surveillance affecting the region. By the end of the year 2010 and the beginning of 2011, we entered into a new era of cyber threats and cyber activities. Advanced malware which might bypass Antivirus software are now easily developed using automated Crimeware that don’t need any programming or professional skills. This will introduce new generation of sophisticated attacks conducted by script-kiddies. Beside other hardware problems and cyber surveillance everywhere, I see that we need to think twice on how we implement and use advanced technology in our daily lives!
ICTs investments in MENA countries are overtaking the rest of the world but they didn’t improve their cyber legislation systems. Cybercrime in the region is rising alarmingly and there no efforts to tackle this phenomenon. Lack of legislative and technical capabilities are common factors in most Middle East countries along with poor security awareness and education. I’m delighted to introduce my latest research to address these latest cybercrime issues in the region. This research includes extensive study for Internet penetration in MENA, country by country assessment, legal frameworks, and challenges facing legislators in the region.
Research Article published in the 3rd Annual Cyber Security for Energy & Utilities.
23 - 26 March 2014 - The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, United Arab Emirates
Powerpoint from textbook Business Law - the ethical, global, and e-commerce environment to accompany BA 330 course at the University of Alaska Fairbanks.
Check out these study notes which I found online and which I think will be very useful to you. I have made hard copies which I will give to you at the next lecture.
Cyber Security is a crucial and rising part of concern in the present age with a rapid increase in the graph of digitization. And with an increase in the activities in cyberspace, there is also an increase in the cyber-crimes. Handling the huge volumes of data with security has become an inevitable need of the hour. Antivirus software, Firewalls, and other technological solutions help to secure this data but are not sufficient enough to prevent the cybercrooks from destructing the network and stealing confidential information. This paper mainly focuses on the issues and challenges faced by cybersecurity. It also discusses the risks, cybersecurity techniques to curb cyber-crime, cyber ethics, and cyber trends.
Special Session on “Applications of Artificial Intelligence and IoT in Comput...Christo Ananth
Christo Ananth, Special Session on “Applications of Artificial Intelligence and IoT in Computer Science and Engineering”, 6th International Conference on Computer Science and Application Engineering, CSAE 2022,Nanjing, China, 21-23 October, 2022.
Industrial Control Cyber Security Europe 2015 James Nesbitt
The Industrial Control Cybersecurity conference consists of presentations and debate from some of the energy industry’s leading end users from Operational and IT backgrounds, Government influencers, leading cybersecurity authorities and some of the world’s most influential solution providers.
Key topics of discussion will pivot on convergence of operational and information technology transformation, design, implementation, integration and risks associated with enterprise facing architecture.
Further review includes the development of policy, operational and cultural considerations, maturity models, public and private information sharing and the adoption of cybersecurity controls.
2015 will provide further insight into how industry can further develop organisational priorities, effective methodologies, benchmark return on investment for cybersecurity procurement, supplier relationships and how to effectively deploy defense in-depth strategies.
We will introduce discussion on the latest attacks and hear from those who are responsible for identifying them. The conference will further address penetration testing, the art of detection and threat monitoring, incident response and recovery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Mohamed N. El-Guindy
1. Dr. Mohamed N. El-Guindy
Cybersecurity Expert and TV Presenter
2. Dr. Mohamed N. El-Guindy
Mohamed is a well-known cyber security expert,
technologist, speaker and researcher specialized in
cybercrime, cyber terrorism, and technology. He works as
cybercrime consultant for international organizations.
Mohamed is also the official representative of the Information
Systems Security Association (ISSA International) in Egypt.
With his broad IT and Engineering experience and
qualifications, he is appointed as Chartered Membership
Assessor at the Chartered Institute for IT (BCS) to assess
Chartered Engineers applying in the UK.
“Middle East states need to understand that off the shelf technologies will not solve any
security issue but it might make things worse.”
- Mohamed N. El-Guindy to ITP magazine
3. Tech Talk TV Show
For the first time in Middle East and in association with Tarek Nour communications, Dr. Mohamed
El-Guindy presents Tech Talk, the weekly technology show on Cairo Centric TV channel.
Airing: Sunday ~ Monday (5:10 PM)
Returns: Tuesday ~ Wednesday (5:30 PM) on +2 Channel
Cairo Centric TV Channel (Al Kahera Wal Nas), Nile Sat (Frequency: 11765 H)
Tech Talk is the first TV program in the Middle East to raise the awareness of technology and its effects on
society. The program episodes provide variety of technical topics in forms of investigative journalism and
thriller. From digital espionage and internet surveillance to 3D printing and reverse engineering the human
brain. From civil society to military applications, technology is affecting our everyday lives and became part
of social, political and economic scene. The main objective of the program is to deliver controversial
technical or scientific topics in an exciting and entertaining presentation to our audience..
4. Speaking and Research
Mohamed is frequent speaker and contributor in leading conferences and events related to cyber
security in the Middle East. His cybercrime research articles and papers appear in leading journals and
research websites. Mohamed is an authority in the filed of cybercrime study in the Middle East and his
contributions cited in UN reports and university research around the world.
5. Media and News Interviews
Dr. El-Guindy interviewed by popular newspapers, TV channels and technology magazines in the
Middle East. He speaks about cyber security, cybercrime, cyber terrorism, digital surveillance and
human rights issues.
6. Publications, Booklets and Study Guides
Dr. Mohamed is the author of variety of books, study guides and IT courses in English and Arabic
which are approved by international reputable organizations.
Courses prepared for IT training which are approved
by IEEE for CEUs and delivered by centers around the
Middle East and in e-learning format on ASK PC
Academy website. For more details:
www.ask-pc.com | www.askpc.net
Arabic booklets developed for Internet
Awareness Project “Saleem Net” in Saudi Arabia.
Saleem Net project created by Gernas Media
group, for more details on the project:
www.saleemnet.com
7. Articles and Whitepapers
Mohamed is frequently blogging on Middle East cyber security issues, human rights, digital
surveillance and cyber threats. In addition, he publishes whitepapers on critical issues related to
technology and Middle East.
For more information, check the official blog: www.netsafe.me
“Instead of military
actions, today’s
superpowers will write
malicious codes!”
-Mohamed N. El-Guindy
8. Consulting and Training
Dr. Mohamed El-Guindy is working as cyber security consultant for national and international
organizations. Mohamed is specialized in designing and delivering information security courses for
private and government sectors.
Partial client list
9. Professional Affiliations
Dr. El-Guindy is committed to the highest standards of information technology and engineering
through his affiliation to the largest and oldest organizations in the field.
- BCS, The Chartered Institute for IT – UK (Fellow , Chartered IT Professional, Chartered Membership Assessor) (FBCS, CITP, CISMP)
- The Engineering Council, UK (Chartered Engineer) (CEng)
- Science Council, UK (Registered Scientist) (Rsci)
- ISSA, Information Systems Security Association (Professional Member)
- IEEE, The Institute of Electrical and Electronics Engineers – USA (Professional Member)
- Institute of Science and Technology, UK (MIScT)
- City and Guilds of London Institute, UK (Professional Membership) (MCGI)
- International Association of Engineers (Professional Member)
- Institute of Leadership and Management, UK (Professional Member) (MInstLM)
- Virtual Forum Against Cybercrime (VFAC) in association with the UNODC and Korean Institute of Criminology (Expert Member)
10. Professional Training Services
Dr. Mohamed El-Guindy is specialized in developing and delivering courses and training related to
cybersecurity, cybercrime, and cyber intelligence. Most of the training courses are delivered onsite or as
seminars and workshops in five-start hotels around the Middle East.
All courses are approved by International organizations such as IEEE.
- Introduction to Information Security
- Cybercrime for Judges and Prosecutors
- Cybercrime for Law Enforcement
- Cyber Intelligence
- Customized short courses (Social Engineering, Cyber terrorism, OSI)
All courses can be customized to meet the needs of our clients
“Cybercrime is not the only threat in
cyberspace. We are moving forward to new
three-dimensional reality with Cyberwarfare”
-Mohamed N. El-Guindy
11. Contact Details
If you have any questions or inquiries, please contact Dr. El-Guindy:
www.netsafe.me | www.mohamedelguindy.com | www.ask-pc.com | www.issa-eg.org
elguindy@ask-pc.com | elguindy@ieee.org | elguindy@bcs.org
www.facebook.com/drelguindy | www.facebook.com/techtalkshow
https://plus.google.com/u/0/+MohamedElguindy1
http://eg.linkedin.com/in/elguindy
https://www.youtube.com/user/cairocentric
www.twitter.com/drelguindy