We know that great things can be achieved when we come together as a community. This is why we organise a variety of events and conferences across the Middle East. Through these events, we share knowledge, celebrate new technologies and discuss ways to transform the global information security ecosystem.
It gives us great pleasure to invite you to the upcoming Security Spotlight Forum that will be held in KSA and UAE and will be based on the theme of ‘Secure Cloud Enablement’.
There are a few paradigm-shifts in the technology world which promise more change than the movement to cloud in whatsoever way, shape or form the cloud is.
Cloud provides IT organizations with a whole new set of technical capabilities and functions. But this also brings with it new security requirements and a whole new set of threats to deal with.
Our upcoming Security Spotlight Forum is focused around how you can make the cloud secure by adding the correct solutions, policies and procedures. If you have already moved to the cloud or if you are planning to move to the cloud this is the perfect event for you.To confirm your attendance, please send an email to email@example.com.
Looking forward seeing all of you there to another great day filled with information together with our partners.
Chief Executive Officer, Help AG Middle East
Why you should attend?
Registrations will begin at 08: 00.
9:00 – 10:00 – Opening Remarks by Help AG
It’s all about the cloud – Now let us secure it
In this session Nicolai Solling, CTO at Help AG will share how cloud applications are secured and controlled and what organizations need to consider when they move to the cloud. Our cloud security architecture is greatly inspired by many of the challenges we experienced when we started our own cloud journey. Today Help AG has a cloud first approach, but only if we can deliver the same or similar security for our users and data.
10:00 – 10:45- Palo Alto Networks
Your Move To The Cloud, Secured
Building seamless, consistent security policies across on-premises and cloud IT environments can be challenging without comprehensive workload visibility. Palo Alto Networks provides organizations with the visibility and automation needed to create and update security policies in your cloud environment in real-time. Learn how you can gain greater control over your applications, automatically create consistent and uniform security policies, and prevent known and unknown threats within application flows.
10:45 – 11:30 –Thales eSecurity
The single biggest inhibitor of utilizing cloud services is the perceived lack of control. With cloud services we trust someone else with our data and expect them to take good care of it – But what if they do not? Thales eSecurity is a leader in encryption management on-premises and in cloud, and they will present how the key topic of confidentiality and data control can be extended to cloud applications. This way you still own your data…even in the cloud, in rest, in motion and even in the application.
11:30 – 11:45 – Coffee Break
11:45 – 12:30 – Mimecast
Honey, I just got phished
E-mail continues to be one of the most important business communication methods and therefore the single most targeted application for fraud and cyber security related incidents. In this session our partner Mimecast will talk about the biggest issues in cloud-based e-mail solutions and how they address big issues such as CEO fraud, fraudulent invoices, common spam and malware as well as availability and recovery of data in the most popular cloud and on-premises e-mail environments.
12:30 – 13:15 – Tenable
I feel so vulnerable
When moving to the cloud you may sometimes think that all of your security concerns are gone. Unfortunately, adopting cloud services does not mean you can forget the good old ABCs of security — vulnerability management being one of them. Tenable is the first and only provider of Cyber Exposure solutions and a leader in vulnerability management. They will talk about some of the most common mis-perceptions around cloud security and how the cloud impacts vulnerability management approaches.
They will also discuss Tenable.io Container Security, which allows you to seamlessly and securely enables DevOps processes by providing visibility into the security of container images.
13:15 – 14:00 – Lunch
As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands on demonstration.
For any information about the event, contact Soumya Prajna (Soumya.firstname.lastname@example.org ).
(Note: The event is targeted at cyber security decision makers across different verticals. )
Back to Top