Middle East Information Security Summit ملتقى الشرق األوسط ألمن المعلومات Speakers Tamer Elbahey Nader Henenin Adel Abdel Moneim Dr. Mohamed El-Guindy Senior Director Security Monitoring & Operations DU - UAE Regional Director Product Security - Advisory Division BlackBerry- UAE General Manager Raya Academy Cyber Security Expert TV Presenter Ahmed Sherif Waleed Yasser Seham Gadallah Amr Yehia Information Security Engineer EG-CER Senior Information Security Officer at ITS Information Security and Quality Assurance Sr. Manager at Raya Data Center Network Security Engineer at Pharos Holding for Financial Investment Sponsors Media Partners Email: info@promediakw.com www.promediakw.com Organized by kuwait Egypt Saudi Arabia Bahrain Tel +965 22462212 Fax +965 22462214 Tel +202 3335 7889 Fax +202 3335 7989 Tel +966 1146 56 040 Fax +966 1146 56 080 Tel +973 7732 3323 Fax +973 7732 1321
Overview Overview The, the premier event for info security, risk and IT professionals, will be held on 12-13 October 2015 at the Sofitel El Gezirah Hotel, Cairo, Egypt. We re in a new era in the evolution of computing. The industry has moved from main frames, to client/server and the age of the desktop PC, and have now shifted to an era defined by mobile devices, cloud computing, and social networks. These changes present new risks to our data, privacy and security. Participants will debate these risks, learn fresh approaches and develop innovative strategies and tactics to defeat today s biggest information security threats. This multi-track event will serve as a forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. The event takes a comprehensive look at the entire spectrum of IT security, business continuity management and risk. Featuring executive panel discussion sessions, insightful case studies and renowned speakers, the event is the best place to gather information to build your IT roadmap, and identify ways to make your business more agile and efficient. The fosters opportunities for IT professionals to network, build relationships, and explore new ideas. It brings together IT professionals, developers, decisions and policy makers, governmental officials, experts, consultants, industry leaders, bankers, law enforcement officials, academics, networks security managers, database administrators, IT marketing executives, surveyors, etc. to share their protection experience in IT security and exchange ideas on most emerging technology trends, applications and practices. 1
Information Security Protect your space Themes With special emphasis placed on case studies and innovative and trusted security solutions, the event will focus on key security themes such as: IT Systems & Network Security Intrusion Detection and Prevention Cloud Computing Security E-Crime and E-Forensics Mobility Security Security of Ecommerce, Ebusiness and Egovernment Infrastructure Security Social Media Threats Network Intrusion, Detection and Prevention Information Security Policies & Strategies Identity Management Biometrics CERT & Incident Management New Cybercrime Threats IT Business Continuity, Disaster Recovery Plans Security Education - Awareness, Training and Certification 12-13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt 2
Information Security Protect your space Who should attend? - Senior Information Risk Owners (SIROs) - Chief Information Officers - Chief Security Officers - Chief Information Security Officers - Senior Business Managers Decision Makers - Researchers - Technical Specialists - Security Course Managers - Heads of Information Assurance & Security - Chief Procurement Officers - VIPs, Heads and Directors of IT Departments - Quality Control Departments - Human Resources Managers - Communication and Disaster Recovery Managers Why should attend? - Keep your information that turned to be ever more valuable. - Learn about the latest specialists techniques in safe information. - Share your concerns in a wider information security community. - Make your information system ahead in the market. - Take the right decision in face of every new information security challenge. - Know the best products and services came in the information market. - Assess your current information security strategy and get the most out of your information security budget. - Collaborate with your partners in the region who are working in the information market. 3
Info Security Alert According to the International Telecommunication Union, there are almost 3 billion online users all over the world. The Middle East came with 3.7% of the online market users recording the highest internet use growth in the world. It consequently required highly advanced cyber security solutions to maintain this continuing market development. The cyber-attacks are now marked as the second most common form of economic crime in the Middle East making a market value of Cyber security at $23 billion according to the Cyber Security Export Market: United Arab Emirates 2014. The security breach costs the world economy more than $445 billion annually, this leads directly to an expected ongoing growth in the market of cyber security software and services. The numbers in the information security are now in terms of million; with 1.5 million monitored cyber-attacks in US in 2013 according to IBM security services 2014 Cyber Security intelligence index, April 2014, while (the Global State of Information Security Survey: 2015) showed a number of 42.8 million of data breach incidents; showing an increase of 48% in one year only. Security policy is now an urgent need as part of your assessment policy to keep your information secured. Your information is your genuine fortune, keep it safe. 4
Information Security Protect your space Workshop Call for Speakers Certified Ethical Hacker (CEH) 10-11 October 10 Hours / 5 Hours Per day A Certified Ethical Hacker (CEH) is a skilled professional who protects and secures systems by ethically using the same knowledge and tools as a malicious hacker. The objective of the ethical hacker is to help an organization take preventative measures against malicious attacks by attacking his own system. This ideology stems from the proven practice of trying to catch a thief by thinking like a thief. Participants will learn the latest techniques to scan, test, hack, and secure systems. This course is for Information Technology Security Professionals who wish to prepare for and pass the EC Council- Certified Ethical Hacking Exam as well as gain the understanding and hands-on experience of an Ethical Hacker. If you would like the opportunity to participate in the as a speaker or workshop leader, please contact us at speaker@promediakw.com as soon as possible. Include the following brief details of your proposed presentation: title, abstract, a few sentences of biographical information that relate you to the topic, and full contact information (title, address, e-mail, phone & fax) for you and any co-presenters. All abstracts will be reviewed by the Organizing/Review Committee and notification regarding acceptance will be made in due time. Contents - Introduction to Ethical Hacking - Foot printing and Reconnaissance - Scanning Networks - Enumeration - System Hacking - Trojans and Backdoors - Viruses and Worms - Sniffing - Social Engineering - Denial of Service 12-13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt - Session Hijacking - Hacking Webservers - Hacking Web Applications - SQL Injection - Hacking Wireless Networks - Hacking Mobile Platforms - Evading IDS, Firewalls and Honeypots - Buffer Overflows - Cryptography - Penetration Testing 5
ملتقى الشرق االوسط ألمن المعلومات مقدمة يعقد ملتقى الشرق االوسط ألمن المعلومات في 13-12 من اكتوبر 2015 في فندق سوفتيل الجزيرة بالقاهرة كنقطة التقاء ألعضاء عصر المعلوماتية حيث يعتبر هذا الملتقى منصة لبناء شراكات جديدة والتعرف على المنتجات والخدمات المتاحة كمستخدم للمعلومات سواء كمقدم او مستهلك. إن التحدي اليوم في سوق العمل هو أمن المعلومات فقد أصبح عنصر اساسي في العمل لحماية الملكية الفكرية الخاص باألفراد على مدار العقد الماضي وألسباب عدة يعتبر أمن المعلومات االن هو جزء ثابت ومتنامي من العمل سواء كان القطاع الخاص او العام. إن عدم حفظ المعلومات الخاصة بك امنة في هذا الفضاء االلكتروني المفتوح هو دائما ما يكون خطير ومكلف. موضوعات الملتقى - نظم تكنولوجيا المعلومات وأمن الشبكات - اقتحام الشبكات والكشف عنها والوقاية منها - الجريمة اإللكترونية واألدلة الجنائية اإللكترونية - إدارة الهوية, القياسات الحيوية - أمن التجارة اإللكترونية واألعمال اإللكترونية والحكومة اإللكترونية - تهديدات الجرائم اإللكترونية, - تهديد وسائل االعالم االجتماعي - تعليم األمن اإللكترونى والتوعية والتدريب و إصدار الشهادات. - سياسات واستراتيجيات أمن المعلومات - الحوسبة السحابية األمنة CERT - وإدارة الحوادث - أمن التنقل - استمرارية أعمال تكنولوجيا المعلومات وخطط التعافي من الكوارث - أمن البنية التحتية المشاركون - الفنيين المتخصصين - المدير األول لمخاطر أمن المعلومات - الرئيس التنفيذي للمعلومات والتكنولوجيا - مدير دورات أمن المعلومات ورؤساء االقسام - رجال األعمال وصناع القرار - رؤساء اقسام المشتريات - الرئيس التنفيذي ألمن المعلومات - رؤساء اقسام الضمان وأمن المعلومات 6 Sofitel Cairo El Gezirah Hotel-Egypt 12-13 October 2015
Information Security Protect your space 1 Registration Form 3 Registration Fee Name Job Title Organization المشاركة المصريين Egyptian $ 300 غير المصريين Non-Egyptian $ 1000 االسم المنصب الشركة/ الجهة Participation حضور مؤتمر الشرق االوسط ألمن المعلومات Conference Attendance 12-13 October 2015 Address Country: العنوان الدولة $ 500 $ 200 حضور ورشة: االختراق اإللكترونى األخالقى Workshop: Certified Ethical Hacker 10 11 October 2015 City: P.O. Box: المدينة ص.ب. $ 1300 $ 400 حضور مؤتمر الشرق االوسط ألمن المعلومات + ورشة العمل Workshop + Conference Attendance 10 13 October 2015 Postal code: الرمز البريدى The conference fee includes Telephone: Fax: Mobile: Email: Date: Signature 2 Payment Options هاتف فاكس الهاتف المحمول البريد االلكترونى التاريخ التوقيع Online Bank Transfer Cash Fax it Egypt: +202 335 7989 Kuwait:+965 22462214 The registration fee includes full conference package with: 1. Opening Cermony 2. Conference Proceedings 3. Admission to all the technical Sessions 4. Conference Folder 5. Certificate of Attendance 6. Daily Lunch & Coffee Breaks Accommodations are NOT included in the registration fee. 4 Cancellations Cancellations must be made in writing. 1. 75% of the paid amount will be refunded for cancellations made two months prior to the event. 2. 50% of the paid amount will be refunded for cancellations made before one month to the event. 3. NO REFUND for cancellations made less than one month to the event. 5 Group Discounts There will be 10% discount on registration of more than 5 delegates from one organization. Direct contact: +201063126348