ArabSecurityConference 2020 Sept. 6, 2020 to Sept. 12, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Opening Keynote | Dr. Bahaa Hasan , Eng. Ashraf Serag , Mr. Mohannad Alkalash , Mr. Usama El-gohary | N/A | |
Oepning Keynote | His Talaat | N/A | |
Security Operations Center and Effectiveness | Mohannad Alkalash | It is becoming increasingly common for organizations to set up Security Operations Centres (SOCs) to ... | |
Designing Security for Hybrid Multi-Cloud Environments | Ibrahim Youssef | As public cloud adoption increases, many organizations are shifting towards a hybrid multi-cloud environment. Addressing ... | |
Humans, the strongest link in our networks | Sarka Pekarova | Why do we always say that humans are the weakest link and why we should ... | |
Dark Web - Hackers & Criminals Treasure | Mohamed Sherif | In this session, I will give brief but essential details about the dark web. This ... | |
Smart Contract Privacy Protection using AI in Cyber-Physical Systems: Tools, Techniques and Challenges | Ramy Aldamati | Applications of Blockchain (BC) technology and Cyber-Physical Systems (CPS) are increasing exponentially. However, framing resilient ... | |
Safeguarding National Interests in The Future Of Cloud Computing | Gouthem Karthik | The objective of this paper is to understand the challenges faced by cloud service adopters ... | |
Authentication Protocols for the IoV Network | Shahzad Ahmed | The world is going towards digital technology because it’s an easy, management, accountable, and reliable ... | |
Cyber Deterrence: Beyond Cyber Defense | Osama Mohamed Hijji | We don't know for sure who said "Attack is the best for of defense"; was ... | |
Trust 5G IOT or Not Vs Defense in Depth | Emadeldin Helmy | N/A | |
The challenges of leveraging cyber threat intelligence | Amani Ibhrahim | Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches. ... | |
disclose.io - Taking the Internet's Immune System to the Next Level | Casey Ellis | After 40 years of hard-fought battles, the Internet has finally reached a place where it ... | |
Digital Transformation | Ahmed Mansour | 1.What is meant by digital transformation?2.What are the 4 main areas of digital transformation?3.What is ... | |
Deploying Advanced Defense and Deception | Kevin Cardwell | ¬¬No product will make us secure, estimates are more than $100 Billion was spent in ... | |
Privacy Principals in New Egyptian Data Protection Law | Dr. Mohamed Hegazy | The session will cover the data protection law principals, controllers, and processors obligations in addition ... | |
"Know your Adversary" How is Threat Intelligence can drive information Security from strategy to offensive? | Mounir Kamal | There will be some new test concept of using MITRE ATT & CK, Kill Chain ... | |
Adversary Threat Detection Using Artificial Intelligence and Machine Learning | Amin Tora | How can artificial intelligence and machine learning help Blue Teams defend against adversaries? This talk ... | |
Shelfware, threat intelligence, and social engineering - why technology is not the answer | Javvad Malik | This session is a cumulation of several years of research into security products, defensive strategies ... | |
What do the current times mean for the Future CyberSecurity Workforce | Akash Agarwal | Requirements of social distancing have made normal functioning difficult for many individuals, corporations, and industries. ... | |
Enterprise information security architecture role in fighting the “Infodemic" | Mahmoud Aboelhassan | "In her recent Facebook post, Under-Secretary-General for Global Communications Melissa Fleming said: “We are not ... | |
Building Cybersecurity Resilience Strategic Plan | Wessam Maher | Cybersecurity resilience strategic plans are essential for any organization that searches for maturity. Risk management, ... | |
Hyperlocal - Putting an Alternative Form of the DNS Root Service into Context | Paul Muchene | The Domain Name System (DNS) the yellow pages of the Internet that works to translate ... | |
How to Control your Service Provider | Ahmed Fawzy | In this session we will discuss the best ways to control the trust security service ... | |
Proactive Security Approach in the wake of Covid-19 | Hisham Ali | The COVID-19 pandemic has forced us all to rethink how we do things, both personally ... | |
The role of cybersecurity in breaking the digital transformation deadlock “THE UNSPOKEN TRUTH“ | Mohamed Sadat | Data is growing in both value and volume. That is inspiring busi¬nesses to digitally transform, ... | |
Comparative Analysis of Android Tools and Techniques for Detection of Contemporary Malwares | Zia Muhammad | Android has become ubiquitous by capturing more than 86% of market share. This rapid growth ... | |
OT & SCADA security Practices, OT IT integration | Mohamed Abdelfattah | Critical infrastructure, which is primarily OT/ICS related is undergoing a shift from isolated and air-gapped ... | |
Child sexual exploitation crimes via the Internet in light of the Corona pandemic | Hossam Nabil Elshenraki | "Against the backdrop of comprehensive social exclusion measures in the world. This has led to ... | |
Bringing Security to Board and Executives Table | Ayman Zaki | The Session is about to tell cyber security story and updates in Board meeting and ... | |
The Great Hotel Hack: Adventures in attacking hospitality industry | Etizaz Mohsin | "Ever wondered your presence exposed to an unknown entity even when you are promised for ... | |
Is freedom really free? | Mike Jones | Talk about video surveillance, biometrics, warrantless tapping and violations of civil rights. | |
VoLTE Security | Hassan Naguib | VoLTE reshapes call services from the traditional circuit-switched telecom telephony to the packet-switched Internet Protocols ... | |
How to Fulfill the Cybersecurity Skills Gap in Your Organization? | Ahmed Anas | It is shocking to know that 3.5 Million unfilled cybersecurity jobs by 2021, Lacking of ... | |
Zero Trust Model of Cybersecurity | Ahmed Abdelhamid | Data is the most valuable assets to any organization and Trust is the fundamental problem ... |