Back to Events

Help AG Security Spotlight Forum – Managed Cyber Defense

  • UAE

Summary

IT organizations are requested to support digital transformation at a rate, pace and reach never experienced before. However, digital transformation can also disrupt your business to a yet unseen level as your reliance on IT increases. One area that is posing the greatest threat to IT availability is the failure to have proper cybersecurity capabilities and attackers are setting their targets on organizations and industry verticals with great dependency on IT.

The sophistication and persistence of attackers continues to grow, and in-house security teams are struggling to keep pace – making Managed Security Services and a next-gen CSOC the need of the hour. In this Security Spotlight Forum, we shed light on some of the services organizations should consider as they embark on digital transformation, and the threats they face as they navigate agile connectivity and a great customer experience.

title

Agenda

09:00 – 10:00
Help AG

Decrypting Incident Response

Today, CISOs know that breaches do, and will, happen. What’s needed is a way to detect all threats quickly and accelerate response. In this session, we’ll discuss why deception is a new integral component of any successful advanced security posture strategy and the foundation for detection of threats from attackers and malicious insiders. Deception technology provides a threat defense of traps and lures designed to deceive attackers into revealing themselves. Engagement-based attack analysis, forensics, and 3rd party integrations accelerate incident response. Attivo Networks solutions are effective to engage attackers anywhere across the enterprise network covering on-premise, cloud, remote and specialized environments.
Stephan Berner
Chief Executive Officer
10:40 – 11:10
Munich Re

Cyber insurance: Cyber protection hand-in-hand with IT security

Today, CISOs know that breaches do, and will, happen. What’s needed is a way to detect all threats quickly and accelerate response. In this session, we’ll discuss why deception is a new integral component of any successful advanced security posture strategy and the foundation for detection of threats from attackers and malicious insiders. Deception technology provides a threat defense of traps and lures designed to deceive attackers into revealing themselves. Engagement-based attack analysis, forensics, and 3rd party integrations accelerate incident response. Attivo Networks solutions are effective to engage attackers anywhere across the enterprise network covering on-premise, cloud, remote and specialized environments.
Mikael Åkerfeldt
Lead product designer at new relic opeth
11:10 – 12:00

Cybersecurity Through the Eyes of Law

Today, CISOs know that breaches do, and will, happen. What’s needed is a way to detect all threats quickly and accelerate response. In this session, we’ll discuss why deception is a new integral component of any successful advanced security posture strategy and the foundation for detection of threats from attackers and malicious insiders. Deception technology provides a threat defense of traps and lures designed to deceive attackers into revealing themselves. Engagement-based attack analysis, forensics, and 3rd party integrations accelerate incident response. Attivo Networks solutions are effective to engage attackers anywhere across the enterprise network covering on-premise, cloud, remote and specialized environments.
Lucas Coelho
VP of Design at Roam Digital
11:10 – 12:00

Cybersecurity Through the Eyes of Law

Today, CISOs know that breaches do, and will, happen. What’s needed is a way to detect all threats quickly and accelerate response. In this session, we’ll discuss why deception is a new integral component of any successful advanced security posture strategy and the foundation for detection of threats from attackers and malicious insiders. Deception technology provides a threat defense of traps and lures designed to deceive attackers into revealing themselves. Engagement-based attack analysis, forensics, and 3rd party integrations accelerate incident response. Attivo Networks solutions are effective to engage attackers anywhere across the enterprise network covering on-premise, cloud, remote and specialized environments.
Lucas Coelho
VP of Design at Roam Digital
13:40 – 14:40
Tenable

Predictive Prioritization of Threats

Today, CISOs know that breaches do, and will, happen. What’s needed is a way to detect all threats quickly and accelerate response. In this session, we’ll discuss why deception is a new integral component of any successful advanced security posture strategy and the foundation for detection of threats from attackers and malicious insiders. Deception technology provides a threat defense of traps and lures designed to deceive attackers into revealing themselves. Engagement-based attack analysis, forensics, and 3rd party integrations accelerate incident response. Attivo Networks solutions are effective to engage attackers anywhere across the enterprise network covering on-premise, cloud, remote and specialized environments.
Lucas Coelho
VP of Design at Roam Digital

Speakers

title
Max Siedentopf
Chief vice officer at cosmic computation laboratory
title
Lucas Coelho
VP of Design at Roam Digital
title
Stephan Berner
Chief Executive Officer
title
Mikael Åkerfeldt
Lead product designer at new relic opeth
title
Kasper Mathias Svendsen
Head of design at lunar
title

Max Siedentopf

Chief vice officer at cosmic computation laboratory
title

Lucas Coelho

VP of Design at Roam Digital
title

Stephan Berner

Chief Executive Officer
title

Mikael Åkerfeldt

Lead product designer at new relic opeth
title

Kasper Mathias Svendsen

Head of design at lunar
How did it go

How did it go

Set in the far future amidst a sprawling feudal interstellar empire where planetary dynasties are controlled by noble houses that owe an allegiance to the imperial House Corrino, Dune tells the story of young Paul Atreides (the heir apparent to Duke Leto Atreides and heir of House Atreides) as he and his family accept control of the desert planet Arrakis, the only source of the "spice" melange, the most important and valuable substance in the universe.

Video report

title
title
title

Similar Events

Black Hat MEA Offline
  • KSA
  • Riyadh

Black Hat MEA

Black Hat is a premier cyber safety event globally and is rapidly building momentum in bringing Saudi Arabia and the wider GCC's cybersecurity community together through Black Hat MEA. The event brings together global CISOs from front page companies, ethical hackers, Black Hat trainers, and over 30,000 visitors. The festive vibe and amazing design of the event sets a new standard for the infosec community, taking it light years away from the norm and puts it on the edge. The event acts as a major capacity-building platform, bringing to the region elite level infosec professionals to train people and help ensure that the great goals of Saudi Vision 2030 remain secure and safe from criminal and hostile cyber threats.

GISEC Global 2023 Offline
  • Dubai
  • UAE

GISEC Global 2023

The super connector show for the worldwide cybersecurity community is back! Visit Help AG, the region's trusted cybersecurity advisor at GISEC Global to talk to our experts from the 14th to 16th of March and uncover how the region’s largest #MSS team can empower you to protect against the different types of attacks and how you can mitigate them before they impact your organization.

Help AG Security Spotlight Forum – Identity and Data Protection Offline
  • KSA
  • UAE

Help AG Security Spotlight Forum – Identity and Data Protection

Join Help AG and our partners Microsoft, CyberArk and Thales to understand the significant gaps in enterprise cybersecurity, advanced and automated capabilities available today for optimal protection, as well as how you can strike the right balance between productivity and security when focusing on identity and data protection.

Help AG Security Spotlight Forum – Managed Cyber Defense

Help AG Security Spotlight Forum – Managed Cyber Defense

Tell us more about you. We’ll get in touch right away.

    Help AG Security Spotlight Forum – Managed Cyber Defense

    Help AG Security Spotlight Forum – Managed Cyber Defense

    Please leave your details to watch the video

      title
      Upcoming event

      Black Hat MEA

      Black Hat is a premier cyber safety event globally...

      • KSA
      • Riyadh
      Help AG's Focus Cybersecurity is the crucial component of successful digital transformation and needs to be built in from day zero and beyond. To thrive in the hyper connected era ...