There is the potential for conflict-driven, Geopolitical tensions bringing adverse focus on the regions as a whole – and here the other danger of the Cyber Threat may not arrive with a focus on monetary interests, but is more likely to be politically motivated by deep-seated conviction toward a cause.

You'll Learn:

  • To outline the persistent threat within the region(s).

  • To draw focus on the various states of threats, unique to the overall Middle East born out of multiple, diverse geopolitical challenges – ongoing regional conflict, and the always present external threats.

  • The need to fully qualify the credentials of external consultants – who have in several cases, sold false credentials into the area.

  • The availability of security solutions that are outside of their own security sales channels of what can be a captive audience.

  • Low cost, High Gain toolsets which are unknown to the region(s).

  • Interesting stories: smart buildings with poor electrical capabilities, falsified credentials of a CISO, discoveries of actual cyber threats, and many more.

  • Visual examples of real-time current threats being run within the region. how to discover your own vulnerabilities and how to monitor such vulnerabilities in real-time.

  • Examples of what real-word cyber insecurity looks like first-hand.

  • The need to accommodate Incident Response and Investigations with real-time solutions.

  • Acquisition and Management of incidents, case information and intelligence.

  • plus much more.
    • 1648638546-d8390995e8dd030f
      PROFESSOR JOHN WALKER
      Si OSINT, INVESTIGATIONS AND WITH 30+ YEARS EXPERIENCE
      Professor John Walker is the Principle at Shadow-Intelligence (Si), partnering with PALISCOPE, BreachAware, iStorage and Belkasoft. He is a Visiting Professor at the School of Science and Technology, Nottingham, Trent University (NTU) and holds the appointment of Editor in Chief for the International Journal of Cyber Forensics and Advanced Threat Investigations (CFATI). For the last decade he has delivered training courses in the Middle, and Far East to Commercial, Industrial, the Financial Services Sector, and Military Agencies, including the UAE, US, Pakistan, Saudi Arabia, Malaysia (KL), Singapore, Argentina, and Sao Paulo

      He served in the Royal Air Force 22 years’, specialising in Counterintelligence, working with UK Agencies such as GCHQ/CESG, and others in the fields of SIGINT, COMINT and Satellite Communications, holding appointments such as System ITSO for a CIA SCIF.

      In the commercials sectors of IT/Cyber he has worked for/with Logica, Bae, T5, GM, Experian, Betfair, Palace of Westminster, House of Lords/Commons, TSol (Treasury Solicitors) and provided Consultancy to the Saudi Arabian MOD, TRA (Telecommunications Authority (Dubai) and the Military Academy of Malaysia (KL) on SOC, CSIRT, Digital Forensics and OSINT. Within the last 5 years he has focused on Geopolitics, with global expertise around the UAE and Russia, Anti-Terrorist Operations (ATO), Cyber-Warfare, Dezinformatsiya (Disinformation) and Maskirovka (Military Deception).
    • 1648638158-bd9917964492e8c8
      HABIB KHAN
      MODERATOR AND INFORMATION SECURITY PARTNER WITH 22+ YEARS EXPERIENCE
      Habib has over 22 years’ information security experience helping protect organisations across the and build their resilience. Habib’s career includes security leadership roles in five blue chip organisations across the Telecoms, Financial Services, Defence and Aviation sectors. As a consultant he has worked with and advised many leading CISO's, CTO’s, CIOs and CEOs. His consultancy experience spans an even wider range of sectors including Energy, Insurance, Manufacturing, Retail, Hospitality, Professional Services, Global Broadcast Media, Transport, Health and Pharma. Habib currently also holds several consulting partner roles.

      A CISM with Platinum level ISACA status and a certified ISO 27001 Lead Implementer who has led several blue-chip organisations to achieve ISO 27001 certification. Demonstrable experience of frameworks including NIST, CIS, SCF, COBIT and SoGP. Habib is also one of the few consultants who is experienced in utilising ISF Tools (Benchmark, IRAM2, Maturity Model, SCAF, SCIRAP etc). An experienced public speaker he has presented and moderated panels at global conferences and in his spare time is a mentor to several people in various stages of their careers.