We know that great things can be achieved when we come together as a community. This is why we organise a variety of events and conferences across the Middle East. Through these events, we share knowledge, celebrate new technologies and discuss ways to transform the global information security ecosystem.
It gives us great pleasure to invite you for our first Security Spotlight Forum for 2020.
Organizations invest in security solutions, policy programs and people skills in order to increase levels of protection and minimize the risk of cyber incidents. Still, cyber incidents do happen as there is no such thing as 100% guarantee in the area of cybersecurity. Sessions at this forum will be about what happens when a cybersecurity incident does occur.
Cyber Incident Response is about preparing for, handling and learning from Cyber Incidents. Even before you have an Incident, and long after you have dealt with a threat, there is important work to be done. During this forum, Help AG along with our best-of-the-breed partners will unpack what Incident Response looks like, and how you can prepare, handle and learn from the process.
We are looking forward to seeing you for another fact-filled and engaging day with Help AG teams that are at the forefront of incident response together with some of the best vendors in the industry.
Chief Executive Officer, Help AG Middle East
Registrations will begin at 08: 30.
09:00 – 10:00 – Help AG
Decrypting Incident Response
In this session, Help AG will detail how organizations need to prepare, not just in terms of technology but also processes and governance to ensure they are ready to tackle any type of cyber incident. Following that, our incident response team will provide real-world insights into how incidents need to be handled, and what is the best way to go about ensuring effective and efficient response, while minimizing exposure and loss for the organization.
10:00 – 10:40 – Munich Re
Cyber insurance: Cyber protection hand-in-hand with IT security
Munich Re, the world leading expert on global & local risk solutions will share its view on economic losses from cybercrime, concerns of relevance for enterprise risk management. They will shed light on cyber insurance as the “final layer of defense”: the risk management tool in case even the best IT security measures are bypassed.
10.40 – 11.10 – BSA
Cybersecurity Through the Eyes of Law
BSA, the leading law firm in the Middle East market, will give an overview around the legal frameworks in place around cyber incidents, and how enterprises can best leverage their legal rights and minimize losses from a cyber incident.
11.10 – 12.00 –Attivo Networks
Unraveling the Magic of Smart Deception
Today, CISOs know that breaches do, and will, happen. What’s needed is a way to detect all threats quickly and accelerate response. In this session, we’ll discuss why deception is a new integral component of any successful advanced security posture strategy and the foundation for detection of threats from attackers and malicious insiders. Deception technology provides a threat defense of traps and lures designed to deceive attackers into revealing themselves. Engagement-based attack analysis, forensics, and 3rd party integrations accelerate incident response. Attivo Networks solutions are effective to engage attackers anywhere across the enterprise network covering on-premise, cloud, remote and specialized environments.
12.00 – 12.20 Coffee Break
12.20- 13.00 – SentinelOne
Because Traditional Controls Don’t Work well in the Modern World
Hear from experts on how SentinelOne’s autonomous endpoint security saves you time by using multiple AI engines, providing complete visibility into all activity and IoT assets, and even rolling back threats with a single agent.
Learn how to block the most advanced attacks before they can become a breach or even an incident. SentinelOne’s ActiveEDR provides rich forensic data and can mitigate threats automatically, perform network isolation, and auto-immunize the endpoints against newly discovered threats.
13.00- 13.40 – Vectra
AI in Security Operations: What we have learnt so far
13.40 onwards Lunch
As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.
For any information about the event, contact Soumya Prajna (Soumya.firstname.lastname@example.org ).
(Note: The event is targeted at cybersecurity decision makers across different verticals. )
Back to Top