Has your cybersecurity been compromised?





We respect your privacy, and we hate spam as much as you. Which is why we will never share your email address with anyone.

Enquire Now

EVENTS

We know that great things can be achieved when we come together as a community. This is why we organise a variety of events and conferences across the Middle East. Through these events, we share knowledge, celebrate new technologies and discuss ways to transform the global information security ecosystem.

Help AG Security Spotlight Forum Q2-2019- Abu Dhabi

It gives us great pleasure to invite you for our Q2 Security Spotlight Forum.

This time the theme is integration of platforms, and how cybersecurity is growing smarter and more efficient through the use of integrated platforms and orchestration capabilities. We will also cover how user behavior analytics creates higher fidelity events which are risk-focused instead of the traditional event-based approach. In addition, we will also shine the spotlight on a key, but often overlooked, capability in the creation of any zero-trust architecture which is controlling and managing and governing privileged accounts.

We are looking forward seeing you for another fact-filled day with some of the best vendors in the industry.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


AGENDA: 

Registrations will begin at 08: 30.

9:00 – 10:00 – Opening Remarks by Help AG

10:00 – 10:45- Palo Alto Networks 

The Enterprise Security Company

No one talks and delivers a cybersecurity platform that is more integrated than Palo Alto Networks. Their recent developments in endpoint, network and cloud security deliver not only a single pane of glass for all your security events, but also allow you to automatically enforce and prevent cyber-attacks across all mentioned attack vectors.

10:45 – 11:30 – Demisto

Security Orchestration and Automation at Scale

Demisto was recently acquired by Palo Alto, but is operating as a separate entity within Palo Alto Networks. There is a good reason for this, for when you identify an attack, you will need to orchestrate to other security devices, general IT systems and your analysts. Demisto delivers a SOAR platform recognized for its ability to deliver the glue that interconnects systems and automates and enriches event information – tasks that are often very manual and cumbersome even in the most advanced Cyber Security Operations and SOC environments.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 –Exabeam

Finding the Needle in the Haystack of Security Events

Exabeam is the market leader in User Entity Behavior Analytics. UEBA is often referred to as the next generation of SIEM as it delivers a risk-based approach to your users and events in your network. There is no doubt that the major issue in any SOC and Security Operations is to quantify and classify events and focus on what is required; a risk-based approach does exactly that by focusing on behaviour of an entity or user, hence allowing your analysts and security staff to spend their time much more wisely.

12:30 – 13:15 –Proofpoint

When E-mails, Brand & Your Greatest Assets – People –  have to be Secure

Proofpoint is the market leader in Enterprise Email security offering the most effective security and compliance solutions to respond to cyber-attacks in every channel including email, the web, the cloud, and social media. Their unique People Centric Security approach protects your organisations’ greatest assets and biggest risks-your people. We are celebrating that Proofpoint have opened their Middle Eastern operation by adding them to the Help AG portfolio. Their integration with Palo Alto and other leading cybersecurity platforms means you can benefit even more from your existing investments by utilizing Proofpoint.

13:15 – 14:00 –BeyondTrust

Delivering Identity based Zero-Trust Computing

Nothing should make you more worried than the concern around how your privileged accounts are being utilized. The power you grant in your system administrator accounts can be abused and a simple username and password ending up in the wrong hands can be devastating to any organization. BeyondTrust is the leader in innovative privileged account management solutions, and with the acquisition of Bomgar, Lieberman software and Avecto, the solution also extends to remote-access connections, remote support and all privilege management on endpoints.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

 

Back to Top