Middle East Information Security Summit

Similar documents
[CEH]: Ethical Hacking and Countermeasures

EC Council Certified Ethical Hacker V8

EC-Council. Certified Ethical Hacker. Program Brochure

CEH Version8 Course Outline

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC-Council. Program Brochure. EC-Council. Page 1

LINUX / INFORMATION SECURITY

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Detailed Description about course module wise:

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Certified Ethical Hacker Exam Version Comparison. Version Comparison

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Certified Ethical Hacker (CEH)

CRYPTUS DIPLOMA IN IT SECURITY

The International Certification in IT Security Training Program. fcch. foresec certified computer hacking

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

CYBERTRON NETWORK SOLUTIONS

ASK PC Certified Information Systems Security Expert - CISSE

SONDRA SCHNEIDER JOHN NUNES

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Certified Cyber Security Analyst VS-1160

CS Ethical Hacking Spring 2016

Course Title: Course Description: Course Key Objective: Fee & Duration:

Security aspects of e-tailing. Chapter 7

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Hackers are here. Where are you?

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Bellevue University Cybersecurity Programs & Courses

Ethical Hacking & Cyber Security Workshop

MANAGED SECURITY SERVICES (MSS)

EC-Council Certified Security Analyst (ECSA)

Executive Director Centre for Cyber Victim Counselling /

What legal aspects are needed to address specific ICT related issues?

Introduction to Cyber Security / Information Security

Toll Free: Official Web:

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Workshop Designed & Powered by TCIL IT, Chandigarh

InfoSec Academy Pen Testing & Hacking Track

MANAGED SECURITY SERVICES (MSS)

FSP-201: Ethical Hacking & IT Security

IT and Cyber Security Training Courses

The Information Security Problem

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

FORBIDDEN - Ethical Hacking Workshop Duration

Big 4 Information Security Forum

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

Hackers are here. Where are you?

Bachelor of Information Technology (Network Security)

WCA WEBINAR SERIES: The Case for Cyber Security Training

Ethical Hacking Course Layout

Executive Cyber Security Training. One Day Training Course

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

CYBER SECURITY, A GROWING CIO PRIORITY

Analyze. Secure. Defend. Do you hold ECSA credential?

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Networking: EC Council Network Security Administrator NSA

Professional Penetration Testing Techniques and Vulnerability Assessment ...

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

External Supplier Control Requirements

Certified Cyber Security Analyst VS-1160

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Hosts HARDENING WINDOWS NETWORKS TRAINING

Forensic Certifications

Case Study: Security Implementation for a Convenience Store Retailer

Certified Cyber Security Expert V Web Application Development

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

How To Protect Your Network From Attack From A Hacker On A University Server

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Loophole+ with Ethical Hacking and Penetration Testing

Project Management Professional (PMP ) Exam Preparation

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

6 th kuwait Documentation & Electronic Archiving

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Developing Secure Software in the Age of Advanced Persistent Threats

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

Asia Masters Centre (AMC), No. 816, Level 8, Pavilion KL, 168, Jalan Bukit Bintang, 55100, Kuala Lumpur. Malaysia Tel: Fax:

Protecting critical infrastructure from Cyber-attack

CEH Certified Ethical Hacker More Than 100 Success Secrets: Over 100 Professional Security Testers Most Asked Questions and Resources

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

TUSKEGEE CYBER SECURITY PATH FORWARD

Cyber Security ( Lao PDR )

Transcription:

Middle East Information Security Summit ملتقى الشرق األوسط ألمن المعلومات Speakers Tamer Elbahey Nader Henenin Adel Abdel Moneim Dr. Mohamed El-Guindy Senior Director Security Monitoring & Operations DU - UAE Regional Director Product Security - Advisory Division BlackBerry- UAE General Manager Raya Academy Cyber Security Expert TV Presenter Ahmed Sherif Waleed Yasser Seham Gadallah Amr Yehia Information Security Engineer EG-CER Senior Information Security Officer at ITS Information Security and Quality Assurance Sr. Manager at Raya Data Center Network Security Engineer at Pharos Holding for Financial Investment Sponsors Media Partners Email: info@promediakw.com www.promediakw.com Organized by kuwait Egypt Saudi Arabia Bahrain Tel +965 22462212 Fax +965 22462214 Tel +202 3335 7889 Fax +202 3335 7989 Tel +966 1146 56 040 Fax +966 1146 56 080 Tel +973 7732 3323 Fax +973 7732 1321

Overview Overview The, the premier event for info security, risk and IT professionals, will be held on 12-13 October 2015 at the Sofitel El Gezirah Hotel, Cairo, Egypt. We re in a new era in the evolution of computing. The industry has moved from main frames, to client/server and the age of the desktop PC, and have now shifted to an era defined by mobile devices, cloud computing, and social networks. These changes present new risks to our data, privacy and security. Participants will debate these risks, learn fresh approaches and develop innovative strategies and tactics to defeat today s biggest information security threats. This multi-track event will serve as a forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. The event takes a comprehensive look at the entire spectrum of IT security, business continuity management and risk. Featuring executive panel discussion sessions, insightful case studies and renowned speakers, the event is the best place to gather information to build your IT roadmap, and identify ways to make your business more agile and efficient. The fosters opportunities for IT professionals to network, build relationships, and explore new ideas. It brings together IT professionals, developers, decisions and policy makers, governmental officials, experts, consultants, industry leaders, bankers, law enforcement officials, academics, networks security managers, database administrators, IT marketing executives, surveyors, etc. to share their protection experience in IT security and exchange ideas on most emerging technology trends, applications and practices. 1

Information Security Protect your space Themes With special emphasis placed on case studies and innovative and trusted security solutions, the event will focus on key security themes such as: IT Systems & Network Security Intrusion Detection and Prevention Cloud Computing Security E-Crime and E-Forensics Mobility Security Security of Ecommerce, Ebusiness and Egovernment Infrastructure Security Social Media Threats Network Intrusion, Detection and Prevention Information Security Policies & Strategies Identity Management Biometrics CERT & Incident Management New Cybercrime Threats IT Business Continuity, Disaster Recovery Plans Security Education - Awareness, Training and Certification 12-13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt 2

Information Security Protect your space Who should attend? - Senior Information Risk Owners (SIROs) - Chief Information Officers - Chief Security Officers - Chief Information Security Officers - Senior Business Managers Decision Makers - Researchers - Technical Specialists - Security Course Managers - Heads of Information Assurance & Security - Chief Procurement Officers - VIPs, Heads and Directors of IT Departments - Quality Control Departments - Human Resources Managers - Communication and Disaster Recovery Managers Why should attend? - Keep your information that turned to be ever more valuable. - Learn about the latest specialists techniques in safe information. - Share your concerns in a wider information security community. - Make your information system ahead in the market. - Take the right decision in face of every new information security challenge. - Know the best products and services came in the information market. - Assess your current information security strategy and get the most out of your information security budget. - Collaborate with your partners in the region who are working in the information market. 3

Info Security Alert According to the International Telecommunication Union, there are almost 3 billion online users all over the world. The Middle East came with 3.7% of the online market users recording the highest internet use growth in the world. It consequently required highly advanced cyber security solutions to maintain this continuing market development. The cyber-attacks are now marked as the second most common form of economic crime in the Middle East making a market value of Cyber security at $23 billion according to the Cyber Security Export Market: United Arab Emirates 2014. The security breach costs the world economy more than $445 billion annually, this leads directly to an expected ongoing growth in the market of cyber security software and services. The numbers in the information security are now in terms of million; with 1.5 million monitored cyber-attacks in US in 2013 according to IBM security services 2014 Cyber Security intelligence index, April 2014, while (the Global State of Information Security Survey: 2015) showed a number of 42.8 million of data breach incidents; showing an increase of 48% in one year only. Security policy is now an urgent need as part of your assessment policy to keep your information secured. Your information is your genuine fortune, keep it safe. 4

Information Security Protect your space Workshop Call for Speakers Certified Ethical Hacker (CEH) 10-11 October 10 Hours / 5 Hours Per day A Certified Ethical Hacker (CEH) is a skilled professional who protects and secures systems by ethically using the same knowledge and tools as a malicious hacker. The objective of the ethical hacker is to help an organization take preventative measures against malicious attacks by attacking his own system. This ideology stems from the proven practice of trying to catch a thief by thinking like a thief. Participants will learn the latest techniques to scan, test, hack, and secure systems. This course is for Information Technology Security Professionals who wish to prepare for and pass the EC Council- Certified Ethical Hacking Exam as well as gain the understanding and hands-on experience of an Ethical Hacker. If you would like the opportunity to participate in the as a speaker or workshop leader, please contact us at speaker@promediakw.com as soon as possible. Include the following brief details of your proposed presentation: title, abstract, a few sentences of biographical information that relate you to the topic, and full contact information (title, address, e-mail, phone & fax) for you and any co-presenters. All abstracts will be reviewed by the Organizing/Review Committee and notification regarding acceptance will be made in due time. Contents - Introduction to Ethical Hacking - Foot printing and Reconnaissance - Scanning Networks - Enumeration - System Hacking - Trojans and Backdoors - Viruses and Worms - Sniffing - Social Engineering - Denial of Service 12-13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt - Session Hijacking - Hacking Webservers - Hacking Web Applications - SQL Injection - Hacking Wireless Networks - Hacking Mobile Platforms - Evading IDS, Firewalls and Honeypots - Buffer Overflows - Cryptography - Penetration Testing 5

ملتقى الشرق االوسط ألمن المعلومات مقدمة يعقد ملتقى الشرق االوسط ألمن المعلومات في 13-12 من اكتوبر 2015 في فندق سوفتيل الجزيرة بالقاهرة كنقطة التقاء ألعضاء عصر المعلوماتية حيث يعتبر هذا الملتقى منصة لبناء شراكات جديدة والتعرف على المنتجات والخدمات المتاحة كمستخدم للمعلومات سواء كمقدم او مستهلك. إن التحدي اليوم في سوق العمل هو أمن المعلومات فقد أصبح عنصر اساسي في العمل لحماية الملكية الفكرية الخاص باألفراد على مدار العقد الماضي وألسباب عدة يعتبر أمن المعلومات االن هو جزء ثابت ومتنامي من العمل سواء كان القطاع الخاص او العام. إن عدم حفظ المعلومات الخاصة بك امنة في هذا الفضاء االلكتروني المفتوح هو دائما ما يكون خطير ومكلف. موضوعات الملتقى - نظم تكنولوجيا المعلومات وأمن الشبكات - اقتحام الشبكات والكشف عنها والوقاية منها - الجريمة اإللكترونية واألدلة الجنائية اإللكترونية - إدارة الهوية, القياسات الحيوية - أمن التجارة اإللكترونية واألعمال اإللكترونية والحكومة اإللكترونية - تهديدات الجرائم اإللكترونية, - تهديد وسائل االعالم االجتماعي - تعليم األمن اإللكترونى والتوعية والتدريب و إصدار الشهادات. - سياسات واستراتيجيات أمن المعلومات - الحوسبة السحابية األمنة CERT - وإدارة الحوادث - أمن التنقل - استمرارية أعمال تكنولوجيا المعلومات وخطط التعافي من الكوارث - أمن البنية التحتية المشاركون - الفنيين المتخصصين - المدير األول لمخاطر أمن المعلومات - الرئيس التنفيذي للمعلومات والتكنولوجيا - مدير دورات أمن المعلومات ورؤساء االقسام - رجال األعمال وصناع القرار - رؤساء اقسام المشتريات - الرئيس التنفيذي ألمن المعلومات - رؤساء اقسام الضمان وأمن المعلومات 6 Sofitel Cairo El Gezirah Hotel-Egypt 12-13 October 2015

Information Security Protect your space 1 Registration Form 3 Registration Fee Name Job Title Organization المشاركة المصريين Egyptian $ 300 غير المصريين Non-Egyptian $ 1000 االسم المنصب الشركة/ الجهة Participation حضور مؤتمر الشرق االوسط ألمن المعلومات Conference Attendance 12-13 October 2015 Address Country: العنوان الدولة $ 500 $ 200 حضور ورشة: االختراق اإللكترونى األخالقى Workshop: Certified Ethical Hacker 10 11 October 2015 City: P.O. Box: المدينة ص.ب. $ 1300 $ 400 حضور مؤتمر الشرق االوسط ألمن المعلومات + ورشة العمل Workshop + Conference Attendance 10 13 October 2015 Postal code: الرمز البريدى The conference fee includes Telephone: Fax: Mobile: Email: Date: Signature 2 Payment Options هاتف فاكس الهاتف المحمول البريد االلكترونى التاريخ التوقيع Online Bank Transfer Cash Fax it Egypt: +202 335 7989 Kuwait:+965 22462214 The registration fee includes full conference package with: 1. Opening Cermony 2. Conference Proceedings 3. Admission to all the technical Sessions 4. Conference Folder 5. Certificate of Attendance 6. Daily Lunch & Coffee Breaks Accommodations are NOT included in the registration fee. 4 Cancellations Cancellations must be made in writing. 1. 75% of the paid amount will be refunded for cancellations made two months prior to the event. 2. 50% of the paid amount will be refunded for cancellations made before one month to the event. 3. NO REFUND for cancellations made less than one month to the event. 5 Group Discounts There will be 10% discount on registration of more than 5 delegates from one organization. Direct contact: +201063126348