Cyber Defense in an Era Cyberwarfare

dr-bahaa-hassan

Dr. Bahaa Hasan

Chairman & Founder of Arab Security Conference

22nd - 23rd of September, 2024

Dr. Bahaa Hasan, the esteemed Chairman & Founder of the Arab Security Conference, recognizes the unprecedented challenges that 2024 is bringing to the world of cybersecurity. With cyber wars now as destructive as civil wars, and the rapid pace of digital transformation demanding ever more flexible management strategies, businesses are struggling to keep up. The rise of remote work and the need to bridge private and public cloud environments have extended the responsibilities of information security teams, often leading to high-profile security lapses. Gartner has predicted that 60% of digital businesses will suffer major service failures by 2024 due to the inability of security teams to manage digital risk effectively.

UNDER THE AUSPICES

photo-with-frame5-03-1

Eng. Mohamed Salah

Egypt's Minister of state for Military Production
6FA1157C-84E2-4E6A-9FE8-E19C9C0E377D

Major General. Khairy Barakat

Head of the central agency for public mobilization and statistics
BD278757-38DC-4A2B-9EBD-4C27A51A71F1

M. G.Eng Mokhtar AbdelLatif

Chairman of the arab organization for Industiralization
A4CDBF38-8FD1-4FBD-85D3-81175F21B908

Dr. Mohamed Shamroukh

CEO of NTRA

Conference Technical Domains

The Mission Of The Conference

  • Keep you up-to-date with security solutions and threats

  • Enrich your security awareness through technical discussions
  • Sharpen your skills through our War Game competition
  • Improve networking by connecting security professionals & organizations

The Vision Of The Conference

  • To create secure societies

The Conference Features

    • Keynote speakers, sessions & technical workshops that dive deep into the new insights & understanding of cutting-edge technological developments reshaping the world of information systems & Cybersecurity.

HONORED GUESTS

Who Can Attend ?

Why Attend?!

Tickets

Early Bird Ticket

 

Students – $15
 
Professional – $35
 
Corporate & Non-Egyptians – $60
 
Prices / 2 Days
Ends on the 24th of June 2025

Regular Ticket

 

Students – $20
 
Professional – $45
 
Corporate & Non-Egyptians – $75
 
Prices / 2 Days
Start on the 24th of June 2025
Ends on the 7th of August 2025

Late Owl Ticket

 

Students – $25
 
Professional – $55
 
Corporate & Non-Egyptians – $100
 
Prices / 2 Days
Start on the 7th of August 2025
Ends on the 4th of September 2025

Arab Security Conference
was founded in 2017 to raise awareness about Cybersecurity in the Arab world. Since that time, it has annually brought together leaders from industry, government, academics & security researchers.

Advisory Committee

Agenda

KEYNOTE SPEAKERS

04EED532-8619-46DA-A5A7-2EDBD74E91C5

Dr. Bahaa Hasan

Chairman & Founder at Arab Security Conference
1C448F9D-8DA7-405B-A172-4811A01A2EDD

Dr. Amr Talaat

Egypt's Minister of Communications and Information Technology
9227FDF2-113B-4A39-8021-FCE1CD1BE18F

Dr. Mohamed Shamroukh

CEO of NTRA
F5013418-544C-4298-B920-00A403E866A9

Dr. Sherif Hazem

Sub-Governor Cyber Security of Central Bank Of Egypt
B84F82B5-475E-42E6-8CF4-759B90C01D55

Beshoy Wasfy

Information Security Services Senior Director at Cyshield
FEF94EE1-C142-437E-837C-FDD9D916DEBF

Ahmed Bahaa

VP at iSec
B666C165-FA5C-4A7D-AF73-17F906024E1E

Dr. Haitham Hamza

SECC Chairman at ITIDA

SPEAKERS | Managerial Session

mohamed-qandil
Information Security GRC Teamleader at iSec

Mohamed Qandil

SESSION TITLE: AI Governance and Compliance
Portfolio Image

Ramy Refaat | Digital transformation channels deputy manger at National Bank of Egypt

SESSION TITLE: Unmask the Phishers

Portfolio Image

Amr Osman | Senior Client Delivery Manager at SAP

SESSION TITLE: Fortifying ERP Systems in the Cloud: Cutting-Edge Security Strategies and Threat Defense

Portfolio Image

Prof. Ahmed Taha | Cyber Security Professor at International University of Applied Science (IU), Germany Senior Security Consultant at Unifonic, Egypt

SESSION TITLE: Securing the Cloud: Best Practices, Threats, and Strategies

Portfolio Image

Babar Khan Akhunzada | Chief Strategist at SecurityWall

SESSION TITLE: Offensive Cyber Operations in Asymmetric Warfare: The Israel-Gaza Case Study

Portfolio Image

David Anton | Chief Risk and Compliance Officer at Taly for Digital Payments

SESSION TITLE: Fortifying the Future: Mastering Cyber Resilience in the C-Suite

Portfolio Image

Bassel Kablawi | CISO at Yana Banking Services (YBS)

SESSION TITLE: Blockchain and Digital Identity: Revolutionizing KYC in the Financial Sector

Portfolio Image

Bahaa Farouk | Chief Digital Transformation Officer at Suez Canal Bank

SESSION TITLE: ML Impacts on Improving Cybersecurity

Portfolio Image

Abdulrahman Al-Nimari | VP, Cyber Security at Confidential

SESSION TITLE: Quantum Computing Impact On Encryption Algorithmss

Portfolio Image

Dr. Sherif Galal | COO at front Shields for Cyber security (KSA)

SESSION TITLE: The impact of BCS. strategy on info. sec.

Portfolio Image

Mohamed Helmy | CISO at Misr Digital Innovation (MDI)

SESSION TITLE: Benefits and Threats from AI & ML on Financial Institutions - A Cyber Security perspective

Portfolio Image

Dr. Mohamed Noseir | CISO (Chief Information Security Officer) at Instabug, inc.

SESSION TITLE: Embrace attacks evolution: Assessing multi-vector threats for telecom landscapes and embedding RASP technologies for safeguarding

Portfolio Image

Mohamed Hamdi | Cyber Security Manager at ABC bank

SESSION TITLE: MITRE attack tactics and practical related cyber defenses

Portfolio Image

Diyar Saadi Ali | Computer Offensive Security at SpectorBlock

SESSION TITLE: Cyber Warfare: The Invisible Battlefield

Portfolio Image

Mohamed Qandil | Information Security GRC Teamleader at iSec

SESSION TITLE: AI Governance and Compliance

Portfolio Image

Ahmed Afifi | GRC Manager at Spark

SESSION TITLE: Critical Infrastructure Security & Compliance

Portfolio Image

Maged Roshdy | Manager, Information and Technology Security Management at The American University in Cairo

SESSION TITLE: Cloud Security from a global Prospective - Weaponizing Cloud Equipments

Portfolio Image

Hisham Mir | CTO at SecurityWall

SESSION TITLE: Offensive Cyber Operations in Asymmetric Warfare: The Israel-Gaza Case Study

Portfolio Image

Hesham Abdelfattah | Senior Cybersecurity Consultant at SkillSoft

SESSION TITLE: The New Era of Warfare: Understanding the Dynamics and Implications of Cyber Warfare

Portfolio Image

khaled Alaa Battah | GRC & Architecture Expert at Etisalat

SESSION TITLE: Building a Cybersecurity Fortress: Risk Assessment & Threat Modeling

Portfolio Image

Mahmoud Abdelsalam Raya | Cybersecurity GRC Team Leader at Cyshield

SESSION TITLE: Behind the Curtain: Understanding the Risk-Threat Dilemma

SPEAKERS | Technical Workshop

Portfolio Image

Islam Mostafa | Senior Digital Forensics Engineer at EG-CERT

SESSION TITLE: Digital forensics on steroids: how to combat cybercrime and leverage DF investigations with OSINT

Portfolio Image

Eslam Mezar | Data Privacy & Information Security Lawyer at Mezar Law Office

SESSION TITLE: Privacy Management in The Banking Sector

Portfolio Image

Hassan Naguib | Senior Manager Cybersecurity Engineering at Orange Egypt

SESSION TITLE: MoTIF: A Standardized Approach to Mobile Threat Intelligence

Portfolio Image

Amr Yehia | OT/ICS Cybersecurity Architecture Expert at Sirar by STC

SESSION TITLE: AI unleash a new era of OT cybersecurity threats

Portfolio Image

Muhammad Gamal | Cyber Security Senior Consultant at Elm

SESSION TITLE: Middle East Threat Landscape : From 7th October and Beyond

Portfolio Image

Mohammad Khreesha | Senior Cybersecurity Director at Scopesky Communications, Jordan

SESSION TITLE: The Art of Maldocs Hunting : A detection of common techniques used in Malicious Documents

Portfolio Image

zhassulan zhussupov | Malware Researcher at MSSP Research LAB

SESSION TITLE: Database leaks: from hospital patients personal to bank card numbers, from Shodan to Dark Web markets.

Portfolio Image

Ahmed Hassan | Cyber Security Engineer & Penetration Tester at Condignum GmbH

SESSION TITLE: How to identify CVEs in Open Source Projects/Applications? Lets hack!

Portfolio Image

Ahmed Hesham | Cybersecurity Specialist at iSec

SESSION TITLE: iOS Security Deep Dive

Portfolio Image

Antwan Momtaz | Cybersecurity R&D Engineer at SIEMENS DISW

SESSION TITLE: Beyond Static Analysis: Harnessing Fuzzing for Robust Code

Portfolio Image

Hassan Saad | Cyber Security Expert at Etisalat Egypt

SESSION TITLE: Mastering Attack Surface Discovery: Building Custom Toolkit

Portfolio Image

Hazem Hisham | Sr. Red Team Operator at Cyshield

SESSION TITLE: Advanced Malware Techniques Gambit

"Be part of a highly specialized event in the Cybersecurity community."

MEGA SPONSOR

STRATEGIC PARTNER

STRATEGIC SPONSOR

GOLD SPONSOR

SILVER SPONSOR

ARAB SECURITY CYBER WARGAMES SPONSORS

ORGANIZED BY