ArabSecurityConference 2020 Sept. 6, 2020 to Sept. 12, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynote Dr. Bahaa Hasan , Eng. Ashraf Serag , Mr. Mohannad Alkalash , Mr. Usama El-gohary N/A
Oepning Keynote His Talaat N/A
Security Operations Center and Effectiveness Mohannad Alkalash It is becoming increasingly common for organizations to set up Security Operations Centres (SOCs) to ...
Designing Security for Hybrid Multi-Cloud Environments Ibrahim Youssef As public cloud adoption increases, many organizations are shifting towards a hybrid multi-cloud environment. Addressing ...
Humans, the strongest link in our networks Sarka Pekarova Why do we always say that humans are the weakest link and why we should ...
Dark Web - Hackers & Criminals Treasure Mohamed Sherif In this session, I will give brief but essential details about the dark web. This ...
Smart Contract Privacy Protection using AI in Cyber-Physical Systems: Tools, Techniques and Challenges Ramy Aldamati Applications of Blockchain (BC) technology and Cyber-Physical Systems (CPS) are increasing exponentially. However, framing resilient ...
Safeguarding National Interests in The Future Of Cloud Computing Gouthem Karthik The objective of this paper is to understand the challenges faced by cloud service adopters ...
Authentication Protocols for the IoV Network Shahzad Ahmed The world is going towards digital technology because it’s an easy, management, accountable, and reliable ...
Cyber Deterrence: Beyond Cyber Defense Osama Mohamed Hijji We don't know for sure who said "Attack is the best for of defense"; was ...
Trust 5G IOT or Not Vs Defense in Depth Emadeldin Helmy N/A
The challenges of leveraging cyber threat intelligence Amani Ibhrahim Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches. ...
disclose.io - Taking the Internet's Immune System to the Next Level Casey Ellis After 40 years of hard-fought battles, the Internet has finally reached a place where it ...
Digital Transformation Ahmed Mansour 1.What is meant by digital transformation?2.What are the 4 main areas of digital transformation?3.What is ...
Deploying Advanced Defense and Deception Kevin Cardwell ¬¬No product will make us secure, estimates are more than $100 Billion was spent in ...
Privacy Principals in New Egyptian Data Protection Law Dr. Mohamed Hegazy The session will cover the data protection law principals, controllers, and processors obligations in addition ...
"Know your Adversary" How is Threat Intelligence can drive information Security from strategy to offensive? Mounir Kamal There will be some new test concept of using MITRE ATT & CK, Kill Chain ...
Adversary Threat Detection Using Artificial Intelligence and Machine Learning Amin Tora How can artificial intelligence and machine learning help Blue Teams defend against adversaries? This talk ...
Shelfware, threat intelligence, and social engineering - why technology is not the answer Javvad Malik This session is a cumulation of several years of research into security products, defensive strategies ...
What do the current times mean for the Future CyberSecurity Workforce Akash Agarwal Requirements of social distancing have made normal functioning difficult for many individuals, corporations, and industries. ...
Enterprise information security architecture role in fighting the “Infodemic" Mahmoud Aboelhassan "In her recent Facebook post, Under-Secretary-General for Global Communications Melissa Fleming said: “We are not ...
Building Cybersecurity Resilience Strategic Plan Wessam Maher Cybersecurity resilience strategic plans are essential for any organization that searches for maturity. Risk management, ...
Hyperlocal - Putting an Alternative Form of the DNS Root Service into Context Paul Muchene The Domain Name System (DNS) the yellow pages of the Internet that works to translate ...
How to Control your Service Provider Ahmed Fawzy In this session we will discuss the best ways to control the trust security service ...
Proactive Security Approach in the wake of Covid-19 Hisham Ali The COVID-19 pandemic has forced us all to rethink how we do things, both personally ...
The role of cybersecurity in breaking the digital transformation deadlock “THE UNSPOKEN TRUTH“ Mohamed Sadat Data is growing in both value and volume. That is inspiring busi¬nesses to digitally transform, ...
Comparative Analysis of Android Tools and Techniques for Detection of Contemporary Malwares Zia Muhammad Android has become ubiquitous by capturing more than 86% of market share. This rapid growth ...
OT & SCADA security Practices, OT IT integration Mohamed Abdelfattah Critical infrastructure, which is primarily OT/ICS related is undergoing a shift from isolated and air-gapped ...
Child sexual exploitation crimes via the Internet in light of the Corona pandemic Hossam Nabil Elshenraki "Against the backdrop of comprehensive social exclusion measures in the world. This has led to ...
Bringing Security to Board and Executives Table Ayman Zaki The Session is about to tell cyber security story and updates in Board meeting and ...
The Great Hotel Hack: Adventures in attacking hospitality industry Etizaz Mohsin "Ever wondered your presence exposed to an unknown entity even when you are promised for ...
Is freedom really free? Mike Jones Talk about video surveillance, biometrics, warrantless tapping and violations of civil rights.
VoLTE Security Hassan Naguib VoLTE reshapes call services from the traditional circuit-switched telecom telephony to the packet-switched Internet Protocols ...
How to Fulfill the Cybersecurity Skills Gap in Your Organization? Ahmed Anas It is shocking to know that 3.5 Million unfilled cybersecurity jobs by 2021, Lacking of ...
Zero Trust Model of Cybersecurity Ahmed Abdelhamid Data is the most valuable assets to any organization and Trust is the fundamental problem ...