BSidesCairo 2020 Feb. 15, 2020 to Feb. 15, 2020, Cairo, Egypt
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
KEYNOTE: Ransomware and Egypt: The Threat and How to Protect Your Organization | Allan Liska | In 2017 Egypt was one of the top countries affected by the WannaCry Ransomware, and, ... | |
Hunt Evil | Mohamed Sadat | The ability to block advanced threats improves each year, but we face adversaries who are ... | |
Using Free and Open Source Deception Tools to Protect your Enterprise and Enrich Your CTI | Abdulrahman Al-nimari | Deception is an evolving effective tool that will improve detection and defense capabilities of an ... | |
The Good, the Bad, and the Ugly in Integrating AI with Cyber Security | Mohammad Khreesha | AI is the simulation of human intelligence processes by machines, especially computer systems. These processes ... | |
Brute-Forcing Mighty Dark Castles | Nidal Fikri | The plague of computer security for the last 40 years has been the buffer overflow.This ... | |
Dive into the serverless security | Eslam Salem | Modern web applications is switching to serverless functions because its simple and cost effective. But ... | |
Point of Sales: Hacking and crime | Javier Perez | This talk is about insecurity of POS and fraud that can you be on. From ... | |
Moving to the cloud – Different security challenge | Ahmed Nabil | Whether people admit or not, we are moving to the cloud. Moving to the cloud ... |