We know that great things can be achieved when we come together as a community. This is why we organise a variety of events and conferences across the Middle East. Through these events, we share knowledge, celebrate new technologies and discuss ways to transform the global information security ecosystem.
It gives us great pleasure to invite you to the upcoming Security Spotlight Forum to be held in Abu Dhabi on 26 June 2018.
Artificial Intelligence and Machine Learning are changing and optimizing many aspects of life – Cyber Security is no different, where many of the enhancements in platforms are powered by advanced technologies and applying computing power to advanced security questions.
In this Security Spotlight Forum you will get an under-the-hood sneak peek of how our vendor platforms are utilizing to make their platforms even smarter.To confirm your attendance, please send an email to email@example.com.
We look forward to seeing you.
Chief Executive Officer, Help AG Middle East
Why you should attend?
Registrations will begin at 08: 00.
9:00 – 10:00 – Opening Remarks by Help AG
Practical Implementations of AI and use-cases in Cyber Security
Nicolai Solling, CTO at Help AG and Dr. Aleksandar Valjarevic, Head of Solution Architecture, Help AG will go over some of the most common applications of artificial intelligence, where we are seeing the major use-cases in security both for us as the leading Managed Security Services provider in the region as well as for our clients.
10:00 – 10:45- Infoblox
Both good and bad network flows start with a DNS request – Machine Learning Powers the detection
Infoblox is the leader in DNS and IPAM Security. The algorithms powering their DNS signature sets and exfiltration protection capabilities on their platforms are utilizing AI and machine learning to make automated security decisions for you.
10:45 – 11:30 – F5 Networks
Securing Multi-Cloud Infrastructure with Machine Learning & AI using F5 Advanced WAF
F5 is using machine learning in a number of applications in their platform, but specifically with the Advanced WAF platform they are bringing this technology to the clients to identify web-attacks before they have an impact.
Today security decisions are increasingly decided by automated algorithms and behavioural assessment of clients, hereby allowing us to not just detect the known, but also unknown attacks.
11:30 – 11:45 – Coffee Break
11:45 – 12:30 – Fortinet
The platform is the product and it is powered by ML and AI
Analysts often highlight that the modern cyber security solutions are much more than just the hardware and software they run on. True protection comes from a platform, which is powered by threat intelligence and behavioural analytics. In some way you can say that the platform is becoming increasingly a key to achieve efficient protection.
In this session Fortinet will present how they use AI and Machine Learning both in the cloud as well as on-premises to power their detection and prevention capabilities.
12:30 – 13:15 – Symantec
AI and Machine Learning make threat detection smart – In network and on the endpoint
From endpoint to event management Symantec utilizes AI and machine learning to identify new attacks even when clients are disconnected. Understand and learn more about how AI is powering not just detection but also classification of events from your Symantec infrastructure.
13:15 – 14:00 – Splunk
Data speaks to you…Machine Learning makes you understand
Splunk is all about big data and AI is just the next step of quickly making sense of all the bits and bytes being indexed and queried. With the Splunk UBA AI and machine learning is brought directly on-premises for clients and allow organizations to make better decisions on which events to focus your analyst time on.
14:00 – 15:00 – Lunch
As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands on demonstration.
For any information about the event, contact Soumya Prajna (Soumya.firstname.lastname@example.org ).
(Note: The event is targeted at cyber security decision makers across different verticals. )
Back to Top