ecrime 2014 Sept. 10, 2014 to Sept. 10, 2014, corniche,abu dhabi

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome to the e-Crime Congress Simon Moores , Nicolai Solling N/A
Banking malware – the new era: how are the fraudsters still getting in? Marco M. Morana The evolution of the cyber threat landscape: shifting towards sophisticated cybercrime and associated malware impacting ...
Developing a risk-based business case for application security Andrew Lawton Using risk analysis to gain business buy-in and program funding How to quantify the potential ...
Advancing your organisation's information security posture Sameer Al Jishi Conducting appropriate security review exercises and making use of the findings to drive programmes forward ...
The breach assumption - not if but when! Harry Sverdlove As attackers have become more sophisticated and targeted, compromise is inevitable Why we must evolve ...
Session summary Simon Moores , Nicolai Solling , Director Services , Helpag Middle East N/A
Demonstration How to protect yourself at each of the 3 stages of fraud Jeremy Boorer N/A
Getting the hacker’s eye view through continuous monitoring from the cloud Bassam Khoreich N/A
Handling Security Incidents “IR Deep Dive” Ahmed Ali N/A
Revolutionizing DDoS and Web attack Prevention: a heuristic approach to fight against the toughest online enemies Haitham Saif N/A
Keynote session Sunder Krishnan Sunder will by flying in from Mumbai to discuss risk management strategies. Sunder is the ...
Why security awareness fails and what you can do about it Jim Hansen Why employees are an integral part of your organisation's security posture Why traditional security awareness ...
The Modern CISO - standing out from the crowd Hadi Hosn What has caused the changing complexities in the role of the CISO and what new ...
Don't put your head in the sandbox Kalle Bjorn Why companies often think deploying “sandboxing" technology will stop Advanced Persistent Threats Exploring why this ...
Announcement by SABSA Maurice Smit N/A
Using global threat visibility to boost your day-to-day operation Maurits Lucas N/A
Web Security and “the cloud” What is this mystical cloud and how can you validate the many service offerings and make an informed choice? Aftab Afzal N/A
How can we secure information assets if breaches are inevitable? Nathan Attoe N/A
Working with encrypted evidence: challenges and solutions Vladimir Katalov N/A
Responding to Advanced and Evolving Cyber Threats Trevor Kennedy N/A
Case study How Intrum Justitia carried out a pragmatic, but effective group wide information security risk assessment Tony Hibbert Risk assessments: Surely there has to be an easier way ... Intrum Justitia Case Study: ...
The three layers of cyber intelligence Maurits Lucas How operational processes use actionable information delivered in real-time Translating tactical intelligence to real-time threat ...
Online and Mobile Banking Threats, detecting and preventing risks Ashraf Abdelazim N/A
Managing information security and technology risk in a global marketplace Simon Moores , Neil Haskins , Ram Narayanan , Abdul Jaleel N/A
Web fraud - how can you protect your internet online services against it? Alfredo Vistola Many security implementations are ineffective at protecting against modern Trojans, learn more on fraudsters main ...