Has your cybersecurity been compromised?





We respect your privacy, and we hate spam as much as you. Which is why we will never share your email address with anyone.

Enquire Now

EVENTS

We know that great things can be achieved when we come together as a community. This is why we organise a variety of events and conferences across the Middle East. Through these events, we share knowledge, celebrate new technologies and discuss ways to transform the global information security ecosystem.

Help AG Security Spotlight Forum Jan 2020- Dubai

It gives us great pleasure to invite you for our first Security Spotlight Forum for 2020.

Organizations invest in security solutions, policy programs and people skills in order to increase levels of protection and minimize the risk of cyber incidents. Still, cyber incidents do happen as there is no such thing as 100% guarantee in the area of cybersecurity. Sessions at this forum will be about what happens when a cybersecurity incident does occur.

Cyber Incident Response is about preparing for, handling and learning from Cyber Incidents. Even before you have an Incident, and long after you have dealt with a threat, there is important work to be done. During this forum, Help AG along with our best-of-the-breed partners will unpack what Incident Response looks like, and how you can prepare, handle and learn from the process.

We are looking forward to seeing you for another fact-filled and engaging day with Help AG teams that are at the forefront of incident response together with some of the best vendors in the industry.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Registrations will begin at 08: 30.

09:00 – 10:00 – Help AG

Decrypting Incident Response

In this session, Help AG will detail how organizations need to prepare, not just in terms of technology but also processes and governance to ensure they are ready to tackle any type of cyber incident. Following that, our incident response team will provide real-world insights into how incidents need to be handled, and what is the best way to go about ensuring effective and efficient response, while minimizing exposure and loss for the organization.

10:00 – 10:40 – Munich Re

Cyber insurance: Cyber protection hand-in-hand with IT security

Munich Re, the world leading expert on global & local risk solutions will share its view on economic losses from cybercrime, concerns of relevance for enterprise risk management. They will shed light on cyber insurance as the “final layer of defense”: the risk management tool in case even the best IT security measures are bypassed.

10.40 – 11.10 – BSA

Cybersecurity Through the Eyes of Law

BSA, the leading law firm in the Middle East market, will give an overview around the legal frameworks in place around cyber incidents, and how enterprises can best leverage their legal rights and minimize losses from a cyber incident.

11.10 – 12.00 –Attivo Networks           

Unraveling the Magic of Smart Deception      

Today, CISOs know that breaches do, and will, happen. What’s needed is a way to detect all threats quickly and accelerate response. In this session, we’ll discuss why deception is a new integral component of any successful advanced security posture strategy and the foundation for detection of threats from attackers and malicious insiders. Deception technology provides a threat defense of traps and lures designed to deceive attackers into revealing themselves. Engagement-based attack analysis, forensics, and 3rd party integrations accelerate incident response. Attivo Networks solutions are effective to engage attackers anywhere across the enterprise network covering on-premise, cloud, remote and specialized environments.

12.00 – 12.20      Coffee Break

12.20- 13.00 – SentinelOne

Because Traditional Controls Don’t Work well in the Modern World

Hear from experts on how SentinelOne’s autonomous endpoint security saves you time by using multiple AI engines, providing complete visibility into all activity and IoT assets, and even rolling back threats with a single agent.

Learn how to block the most advanced attacks before they can become a breach or even an incident. SentinelOne’s ActiveEDR provides rich forensic data and can mitigate threats automatically, perform network isolation, and auto-immunize the endpoints against newly discovered threats.

13.00- 13.40 – Vectra 

AI in Security Operations: What we have learnt so far

Vectra is the world leader in applying artificial intelligence to detect and respond to cyberattacks in cloud, data center and enterprise infrastructures in real time, while empowering security analysts to perform conclusive incident investigations and AI-assisted threat hunting. Time and talent are key factors in preventing a data breach. Learn from peers how AI enabled them to detect hidden threats in cloud and enterprise networks, perform conclusive incident investigations, and respond at previously unattainable speed and efficacy.

13.40 onwards      Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

 

Back to Top