Has your cybersecurity been compromised?





We respect your privacy, and we hate spam as much as you. Which is why we will never share your email address with anyone.

Enquire Now

EVENTS

We know that great things can be achieved when we come together as a community. This is why we organise a variety of events and conferences across the Middle East. Through these events, we share knowledge, celebrate new technologies and discuss ways to transform the global information security ecosystem.

Help AG Security Spotlight Forum Q3 2018- Abu Dhabi

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum that will be held in KSA and UAE and will be based on the theme of ‘Secure Cloud Enablement’.

There are a few paradigm-shifts in the technology world which promise more change than the movement to cloud in whatsoever way, shape or form the cloud is.

Cloud provides IT organizations with a whole new set of technical capabilities and functions. But this also brings with it new security requirements and a whole new set of threats to deal with.It gives us great pleasure to invite you to the upcoming Security Spotlight Forum that will be held in KSA and UAE and will be based on the theme of ‘Secure Cloud Enablement’.

There are a few paradigm-shifts in the technology world which promise more change than the movement to cloud in whatsoever way, shape or form the cloud is.

Cloud provides IT organizations with a whole new set of technical capabilities and functions. But this also brings with it new security requirements and a whole new set of threats to deal with.

Our upcoming Security Spotlight Forum is focused around how you can make the cloud secure by adding the correct solutions, policies, and procedures. If you have already moved to the cloud or if you are planning to move to the cloud this is the perfect event for you.To confirm your attendance, please send an email to  soumya.prajna@helpag.com.

Looking forward to seeing all of you there to another great day filled with information together with our partners.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Why should you attend?

  • Stay ahead when it comes to leveraging the maximum benefits from cloud
  • Understand the evolution of cyber security in the cloud era and prepare for the same
  • Learn about the latest innovations from the leaders in the field
  • Gain the first mover advantage over your counterparts

AGENDA: 

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

It’s all about the cloud – Now let us secure it

In this session, Nicolai Solling, CTO at Help AG will share how cloud applications are secured and controlled and what organizations need to consider when they move to the cloud. Our cloud security architecture is greatly inspired by many of the challenges we experienced when we started our own cloud journey. Today Help AG has a cloud-first approach, but only if we can deliver the same or similar security for our users and data.

10:00 – 10:45- Okta

Identity is the key driver of the Security-First approach

Securing your workforce and users, in the cloud, and on the go can be difficult. A recent Enterprise Strategy Group (ESG) survey discovered that for nearly 75% of organizations a username and password was the only barrier between a determined attacker and access to your critical resources.

In this session with Okta, you will learn how Identity is the new perimeter for Cyber Security. This session will cover how the use of adaptive multi-factor authentication (MFA) will benefit your users and admins, how identity protects cloud & on-prem applications, and how to go beyond MFA to manage secure access.

10:45 – 11:30 – Palo Alto Networks

Your Move To The Cloud, Secured

Building seamless, consistent security policies across on-premises and cloud IT environments can be challenging without comprehensive workload visibility. Palo Alto Networks provides organizations with the visibility and automation needed to create and update security policies in your cloud environment in real-time. Learn how you can gain greater control over your applications, automatically create consistent and uniform security policies, and prevent known and unknown threats within application flows.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Thales eSecurity

Hey…Let’s Encrypt

The single biggest inhibitor of utilizing cloud services is the perceived lack of control. With cloud services we trust someone else with our data and expect them to take good care of it – But what if they do not? Thales eSecurity is a leader in encryption management on-premises and in the cloud, and they will present how the key topic of confidentiality and data control can be extended to cloud applications. This way you still own your data…even in the cloud, in rest, in motion and even in the application.

12:30 – 13:15 – Mimecast

Honey, I just got phished

E-mail continues to be one of the most important business communication methods and therefore the single most targeted application for fraud and cyber security related incidents. In this session, our partner Mimecast will talk about the biggest issues in cloud-based e-mail solutions and how they address big issues such as CEO fraud, fraudulent invoices, common spam, and malware as well as availability and recovery of data in the most popular cloud and on-premises e-mail environments.

13:15 – 14:00 – Tenable

I feel so vulnerable

When moving to the cloud you may sometimes think that all of your security concerns are gone. Unfortunately, adopting cloud services does not mean you can forget the good old ABCs of security — vulnerability management being one of them. Tenable is the first and only provider of Cyber Exposure solutions and a leader in vulnerability management. They will talk about some of the most common mis-perceptions around cloud security and how the cloud impacts vulnerability management approaches.

They will also discuss Tenable.io Container Security, which allows you to seamlessly and securely enables DevOps processes by providing visibility into the security of container images.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

Back to Top