We know that great things can be achieved when we come together as a community. This is why we organise a variety of events and conferences across the Middle East. Through these events, we share knowledge, celebrate new technologies and discuss ways to transform the global information security ecosystem.
It gives us great pleasure to invite you for our Q2 Security Spotlight Forum.
This time the theme is integration of platforms, and how cybersecurity is growing smarter and more efficient through the use of integrated platforms and orchestration capabilities. We will also cover how user behavior analytics creates higher fidelity events which are risk-focused instead of the traditional event-based approach. In addition, we will also shine the spotlight on a key, but often overlooked, capability in the creation of any zero-trust architecture which is controlling and managing and governing privileged accounts.
We are looking forward seeing you for another fact-filled day with some of the best vendors in the industry.
Chief Executive Officer, Help AG Middle East
Registrations will begin at 08: 30.
9:00 – 10:00 – Opening Remarks by Help AG
10:00 – 10:45- Palo Alto Networks
The Enterprise Security Company
No one talks and delivers a cybersecurity platform that is more integrated than Palo Alto Networks. Their recent developments in endpoint, network and cloud security deliver not only a single pane of glass for all your security events, but also allow you to automatically enforce and prevent cyber-attacks across all mentioned attack vectors.
10:45 – 11:30 – Demisto
Security Orchestration and Automation at Scale
Demisto was recently acquired by Palo Alto, but is operating as a separate entity within Palo Alto Networks. There is a good reason for this, for when you identify an attack, you will need to orchestrate to other security devices, general IT systems and your analysts. Demisto delivers a SOAR platform recognized for its ability to deliver the glue that interconnects systems and automates and enriches event information – tasks that are often very manual and cumbersome even in the most advanced Cyber Security Operations and SOC environments.
11:30 – 11:45 – Coffee Break
11:45 – 12:30 –Exabeam
Finding the Needle in the Haystack of Security Events
Exabeam is the market leader in User Entity Behavior Analytics. UEBA is often referred to as the next generation of SIEM as it delivers a risk-based approach to your users and events in your network. There is no doubt that the major issue in any SOC and Security Operations is to quantify and classify events and focus on what is required; a risk-based approach does exactly that by focusing on behaviour of an entity or user, hence allowing your analysts and security staff to spend their time much more wisely.
12:30 – 13:15 –Proofpoint
When E-mails, Brand & Your Greatest Assets – People – have to be Secure
Proofpoint is the market leader in Enterprise Email security offering the most effective security and compliance solutions to respond to cyber-attacks in every channel including email, the web, the cloud, and social media. Their unique People Centric Security approach protects your organisations’ greatest assets and biggest risks-your people. We are celebrating that Proofpoint have opened their Middle Eastern operation by adding them to the Help AG portfolio. Their integration with Palo Alto and other leading cybersecurity platforms means you can benefit even more from your existing investments by utilizing Proofpoint.
13:15 – 14:00 –BeyondTrust
Delivering Identity based Zero-Trust Computing
Nothing should make you more worried than the concern around how your privileged accounts are being utilized. The power you grant in your system administrator accounts can be abused and a simple username and password ending up in the wrong hands can be devastating to any organization. BeyondTrust is the leader in innovative privileged account management solutions, and with the acquisition of Bomgar, Lieberman software and Avecto, the solution also extends to remote-access connections, remote support and all privilege management on endpoints.
14:00 – 15:00 – Lunch
As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.
For any information about the event, contact Soumya Prajna (Soumya.firstname.lastname@example.org ).
(Note: The event is targeted at cybersecurity decision makers across different verticals. )
Back to Top