www.promediakw.com Bahrain Tel +973 7732 3323 Fax +973 7732 1321 Egypt Tel +202 3335 7889 Fax +202 3335 7989 Saudi Arabia Tel +966 1146 56 040 Fax +966 1146 56 080 Organized by Middle East Information Security Summit علوماتن المم وسطى الشرق ا ملتقEmail: [email protected] kuwait Tel +965 22462212 Fax +965 22462214 12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt www.meinfosecurity.com Speakers Tamer Elbahey Senior Director Security Monitoring & Operations DU - UAE Ahmed Sherif Information Security Engineer EG-CER Nader Henenin Regional Director Product Security - Advisory Division BlackBerry- UAE Adel Abdel Moneim General Manager Raya Academy Dr. Mohamed El-Guindy Cyber Security Expert TV Presenter Waleed Yasser Senior Information Security Officer at ITS Seham Gadallah Information Security and Quality Assurance Sr. Manager at Raya Data Center Amr Yehia Network Security Engineer at Pharos Holding for Financial Investment Sponsors Media Partners

The Middle East Info Security Summit 2015

Embed Size (px)

Citation preview

www.promediakw.com

Bahrain

Tel +973 7732 3323Fax +973 7732 1321

Egypt

Tel +202 3335 7889Fax +202 3335 7989

Saudi Arabia

Tel +966 1146 56 040Fax +966 1146 56 080

Organized by

Middle EastInformation Security Summit

ملتقى الشرق األوسط ألمن المعلومات

Email: [email protected]

kuwait

Tel +965 22462212Fax +965 22462214

12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt

w w w . m e i n f o s e c u r i t y . c o m

Speakers

Tamer Elbahey

Senior Director Security Monitoring & Operations DU - UAE

Ahmed Sherif

Information Security Engineer EG-CER

Nader Henenin

Regional DirectorProduct Security - Advisory Division

BlackBerry- UAE

Adel Abdel Moneim

General Manager Raya Academy

Dr. Mohamed El-Guindy

Cyber Security Expert TV Presenter

Waleed Yasser

Senior Information Security Officer at ITS

Seham Gadallah

Information Security and Quality Assurance Sr. Manager at Raya

Data Center

Amr Yehia

Network Security Engineer at Pharos Holding for Financial

Investment

Sponsors Media Partners

Overview

OverviewThe Middle East Info Security Summit, the premier event for info security, risk and IT professionals, will be held on  12 - 13 October 2015  at the Sofitel El Gezirah Hotel, Cairo, Egypt.We’re in a new era in the evolution of computing. The industry has moved from main frames, to client/server and the age of the desktop PC, and have now shifted to an era defined by mobile devices, cloud computing, and social networks. These changes present new risks to our data, privacy and security. Participants will debate these risks, learn fresh approaches and develop innovative strategies and tactics to defeat today’s biggest information security threats.This multi-track event will serve as a forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. The event takes a comprehensive look at the entire spectrum of IT security, business continuity management and risk. Featuring executive panel discussion sessions, insightful case studies and renowned speakers, the event is the best place to gather information to build your IT roadmap, and identify ways to make your business more agile and efficient.The Middle East Info Security Summit fosters opportunities for IT professionals to network, build relationships, and explore new ideas. It brings together IT professionals, developers, decisions and policy makers, governmental officials, experts, consultants, industry leaders, bankers, law enforcement officials, academics, networks security managers, database administrators, IT marketing executives, surveyors, etc. to share their protection experience in IT security and exchange ideas on most emerging technology trends, applications and practices.

www.meinfosecurity.comMiddle East Info Security Summit

12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt 1

Themes

Information SecurityP r o t e c t y o u r s p a c e

www.meinfosecurity.comMiddle East Info Security Summit

12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt

With special emphasis placed on case studies and innovative and trusted security solutions, the event will focus on key security themes such as:• IT Systems & Network Security• Intrusion Detection and Prevention• Cloud Computing Security• E-Crime and E-Forensics • Mobility Security• Security of Ecommerce, Ebusiness and Egovernment• Infrastructure Security• Social Media Threats• Network Intrusion, Detection and Prevention• Information Security Policies & Strategies• Identity Management• Biometrics• CERT & Incident Management• New Cybercrime Threats  • IT Business Continuity, Disaster Recovery Plans• Security Education - Awareness, Training and Certification

2

- Senior Information Risk Owners (SIROs)

Who should attend?

- Security Course Managers- Heads of Information Assurance & Security- Chief Procurement Officers- VIPs, Heads and Directors of IT Departments- Quality Control Departments- Human Resources Managers - Communication and Disaster Recovery Managers

- Chief Information Officers

- Chief Information Security Officers- Senior Business Managers Decision Makers- Researchers- Technical Specialists

- Chief Security Officers

Why should attend?

- Keep your information that turned to be ever more valuable.- Learn about the latest specialists techniques in safe information.- Share your concerns in a wider information security community.- Make your information system ahead in the market.- Take the right decision in face of every new information security challenge.- Know the best products and services came in the information market.- Assess your current information security strategy and get the most out of your information security budget.- Collaborate with your partners in the region who are working in the information market.

Information SecurityP r o t e c t y o u r s p a c e

www.meinfosecurity.comMiddle East Info Security Summit

12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt 3

According to the International Telecommunication Union, there are almost 3 billion online users all over the world. The Middle East came with 3.7% of the online market users recording the highest internet use growth in the world. It consequently required highly advanced cyber security solutions to maintain this continuing market development.

The cyber-attacks are now marked as the second most common form of economic crime in the Middle East making a market value of Cyber security at $23 billion according to the Cyber Security Export Market: United Arab Emirates 2014. The security breach costs the world economy more than $445 billion annually, this leads directly to an expected ongoing growth in the market of cyber security software and services.

The numbers in the information security are now in terms of million; with 1.5 million monitored cyber-attacks in US in 2013 according to IBM security services 2014 Cyber Security intelligence index, April 2014, while (the Global State of Information Security Survey: 2015) showed a number of 42.8 million of data breach incidents; showing an increase of 48% in one year only. Security policy is now an urgent need as part of your assessment policy to keep your information secured.

Your information is your genuine fortune, keep it safe.

Info Security Alert

Network security systems Portable Data Security Safe Cloud Computing Copyrights, Private policies & strategies Design built-in security information systems Custom-made trustworthy cyberspaces Security approaches of the new eWorld Security breach; detection and prevention Social Networks violations The latest cyber-attacks threats Identity Management Prompt cyber-attacks response, recovery threats Biometrics CERT & Incident Management Security Education, Awareness, Training and Certification

www.meinfosecurity.comMiddle East Info Security Summit

12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt 4

Call for Speakers

If you would like the opportunity to participate in the Middle East Info Security Summit as a speaker or workshop leader, please contact us at  [email protected]  as soon as possible. Include the following brief details of your proposed presentation: title, abstract, a few sentences of biographical information that relate you to the topic, and full contact information (title, address, e-mail, phone & fax) for you and any co-presenters. All abstracts will be reviewed by the Organizing/Review Committee and notification regarding acceptance will be made in due time.

- Introduction to Ethical Hacking- Foot printing and Reconnaissance- Scanning Networks- Enumeration- System Hacking- Trojans and Backdoors- Viruses and Worms- Sniffing- Social Engineering- Denial of Service

- Session Hijacking- Hacking Webservers- Hacking Web Applications- SQL Injection- Hacking Wireless Networks- Hacking Mobile Platforms- Evading IDS, Firewalls and Honeypots- Buffer Overflows- Cryptography- Penetration Testing

Certified Ethical Hacker (CEH)10 - 11 October10 Hours / 5 Hours Per dayA Certified Ethical Hacker (CEH) is a skilled professional who protects and secures systems by ethically using the same knowledge and tools as a malicious hacker. The objective of the ethical hacker is to help an organization take preventative measures against malicious attacks by attacking his own system. This ideology stems from the proven practice of trying to catch a thief by thinking like a thief. Participants will learn the latest techniques to scan, test, hack, and secure systems. This course is for Information Technology Security Professionals who wish to prepare for and pass the EC Council- Certified Ethical Hacking Exam as well as gain the understanding and hands-on experience of an Ethical Hacker.

Contents

Workshop

Information SecurityP r o t e c t y o u r s p a c e

www.meinfosecurity.comMiddle East Info Security Summit

12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt 5

13 من اكتوبر 2015 في فندق سوفتيل الجزيرة بالقاهرة كنقطة يعقد ملتقى الشرق االوسط ألمن المعلومات في 12- التقاء ألعضاء عصر المعلوماتية، حيث يعتبر هذا الملتقى منصة لبناء شراكات جديدة، والتعرف على المنتجات والخدمات

المتاحة كمستخدم للمعلومات سواء كمقدم او مستهلك.

إن التحدي اليوم في سوق العمل هو أمن المعلومات، فقد أصبح عنصر اساسي في العمل لحماية الملكية الفكرية الخاص باألفراد على مدار العقد الماضي، وألسباب عدة يعتبر أمن المعلومات االن هو جزء ثابت ومتنامي من العمل سواء إن عدم حفظ المعلومات الخاصة بك امنة في هذا الفضاء االلكتروني المفتوح هو دائما ما كان القطاع الخاص او العام.

يكون خطير ومكلف.

ملتقى الشرق االوسط ألمن المعلومات

المدير األول لمخاطر أمن المعلومات - الرئيس التنفيذي للمعلومات والتكنولوجيا -

الرئيس التنفيذي ألمن المعلومات - رجال األعمال وصناع القرار -

الفنيين المتخصصين - مدير دورات أمن المعلومات ورؤساء االقسام -

رؤساء اقسام الضمان وأمن المعلومات - رؤساء اقسام المشتريات -

مقدمة

موضوعات الملتقى

المشاركون

- نظم تكنولوجيا المعلومات وأمن الشبكات- الحوسبة السحابية األمنة

- الجريمة اإللكترونية واألدلة الجنائية اإللكترونية- أمن التنقل

-أمن التجارة اإللكترونية واألعمال اإللكترونية والحكومة اإللكترونية- أمن البنية التحتية

- تهديد وسائل االعالم االجتماعي

- اقتحام الشبكات والكشف عنها والوقاية منها- سياسات واستراتيجيات أمن المعلومات

- إدارة الهوية, القياسات الحيوية- CERT وإدارة الحوادث

- تهديدات الجرائم اإللكترونية,

- استمرارية أعمال تكنولوجيا المعلومات وخطط التعافي من الكوارث- تعليم األمن اإللكترونى والتوعية والتدريب و إصدار الشهادات.

www.meinfosecurity.comMiddle East Info Security Summit

12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt 6

Information Security

Registration FeeRegistration Form1

Cancellations must be made in writing. 1. 75% of the paid amount will be refunded for cancellations made two months prior to the event.2. 50% of the paid amount will be refunded for cancellations made before one month to the event.3. NO REFUND for cancellations made less than one month to the event.

Cancellations4

The registration fee includes full conference package with:1. Opening Cermony2. Conference Proceedings3. Admission to all the technical Sessions4. Conference Folder5. Certificate of Attendance6. Daily Lunch & Coffee BreaksAccommodations are NOT included in the registration fee.

The conference fee includes

There will be 10% discount on registration of more than 5 delegates from one organization.

Group Discounts5

Name

Job Title

Address

Organization

Country:

Postal code:

Fax:

Email:

Signature

City:

P.O. Box:

Telephone:

Mobile:

Date:

االسم

المنصب

العنوان

الجهة الشركة/

الدولة

الرمز البريدى

فاكس

البريد االلكترونى

التوقيع

المدينة

ص.ب.

هاتف

الهاتف المحمول

التاريخ

المشاركةParticipation

حضور مؤتمر الشرق االوسط ألمن المعلومات Conference Attendance 12 -13 October 2015

حضور ورشة: االختراق اإللكترونى األخالقى

حضور مؤتمر الشرق االوسط ألمن المعلومات + ورشة العمل

Workshop: Certified Ethical Hacker10 – 11 October 2015

Workshop + Conference Attendance 10 – 13 October 2015

المصريينEgyptian

غير المصريينNon-Egyptian

3

$ 300

$ 200

$ 400

P r o t e c t y o u r s p a c e

www.meinfosecurity.comMiddle East Info Security Summit

12 - 13 October 2015 Sofitel Cairo El Gezirah Hotel-Egypt

Payment Options2

+201063126348Direct contact:

Online “www.meinfosecurity.com” Bank Transfer Cash

$ 1000

$ 500

$ 1300

Fax it+202 335 7989Egypt:

Kuwait: +965 22462214