Has your cybersecurity been compromised?





We respect your privacy, and we hate spam as much as you. Which is why we will never share your email address with anyone.

Enquire Now

EVENTS

We know that great things can be achieved when we come together as a community. This is why we organise a variety of events and conferences across the Middle East. Through these events, we share knowledge, celebrate new technologies and discuss ways to transform the global information security ecosystem.

Past Events

JOURNEY TO THE CENTER OF THE SOC

JOURNEY TO THE CENTER OF THE SOC

DATE: Jan 29 2020 TIME: 9:00 am - 2:00 pm LOCATION: Abu Dhabi
ADDRESS
St. Regis, Abu Dhabi

The Secrets to Avoiding SecOps Pitfalls

Since Palo Alto Networks was founded in 2008, they have been disrupting the Cybersecurity Market and changed what we all expect from a Cybersecurity Platform. You may know that Palo Alto Networks covers Firewalls in all shapes and forms, Endpoint, Cloud and DevOps security and keep innovating and delivering thought leadership in all areas. But did you also know that most advancements in their platforms could be yours to use at zero additional costs and all you need to do is upgrade!

It’s time to integrate automation and machine learning into every step of your security voyage.

Join us for a live, thrill-packed, Journey to the Center of the SOC and PAN OS 9.1 and learn all about:

  • SD-WAN
  • DNS Security
  • SD Security with Dynamic Security Actions
  • And all the greatest hits you should be aware of

With v.9.0 and 9.1 Palo Alto Networks have added more than 100 new security features to their platforms – All yours to have with just a simple upgrade.

Cortex is Palo Alto Networks’ comprehensive product suite for security operations empowering enterprises with the best-in-class detection, investigation, automation and response capabilities. It comprises Cortex XDR(the prevention, detection and response platform), Demisto(security orchestration, automation and response platform), Cortex data lake and Auto Focus to facilitate high-fidelity threat intelligence.

Hope to see you there!

 

Help AG Security Spotlight Forum Jan 2020- Abu Dhabi

Help AG Security Spotlight Forum Jan 2020- Abu Dhabi

DATE: Jan 22 2020 TIME: 9:00 am - 3:00 pm LOCATION: Abu Dhabi
ADDRESS
St. Regis, Abu Dhabi

It gives us great pleasure to invite you for our first Security Spotlight Forum for 2020.

Organizations invest in security solutions, policy programs and people skills in order to increase levels of protection and minimize the risk of cyber incidents. Still, cyber incidents do happen as there is no such thing as 100% guarantee in the area of cybersecurity. Sessions at this forum will be about what happens when a cybersecurity incident does occur.

Cyber Incident Response is about preparing for, handling and learning from Cyber Incidents. Even before you have an Incident, and long after you have dealt with a threat, there is important work to be done. During this forum, Help AG along with our best-of-the-breed partners will unpack what Incident Response looks like, and how you can prepare, handle and learn from the process.

We are looking forward to seeing you for another fact-filled and engaging day with Help AG teams that are at the forefront of incident response together with some of the best vendors in the industry.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Registrations will begin at 08: 30.

09:00 – 10:00 – Help AG

Decrypting Incident Response

In this session, Help AG will detail how organizations need to prepare, not just in terms of technology but also processes and governance to ensure they are ready to tackle any type of cyber incident. Following that, our incident response team will provide real-world insights into how incidents need to be handled, and what is the best way to go about ensuring effective and efficient response, while minimizing exposure and loss for the organization.

10:00 – 10:40 – Munich Re

Cyber insurance: Cyber protection hand-in-hand with IT security

Munich Re, the world leading expert on global & local risk solutions will share its view on economic losses from cybercrime, concerns of relevance for enterprise risk management. They will shed light on cyber insurance as the “final layer of defense”: the risk management tool in case even the best IT security measures are bypassed.

10.40 – 11.10 – BSA

Cybersecurity Through the Eyes of Law

BSA, the leading law firm in the Middle East market, will give an overview around the legal frameworks in place around cyber incidents, and how enterprises can best leverage their legal rights and minimize losses from a cyber incident.

11.10 – 12.00 –Attivo Networks           

Unraveling the Magic of Smart Deception      

Today, CISOs know that breaches do, and will, happen. What’s needed is a way to detect all threats quickly and accelerate response. In this session, we’ll discuss why deception is a new integral component of any successful advanced security posture strategy and the foundation for detection of threats from attackers and malicious insiders. Deception technology provides a threat defense of traps and lures designed to deceive attackers into revealing themselves. Engagement-based attack analysis, forensics, and 3rd party integrations accelerate incident response. Attivo Networks solutions are effective to engage attackers anywhere across the enterprise network covering on-premise, cloud, remote and specialized environments.

12.00 – 12.20      Coffee Break

12.20- 13.00 – SentinelOne

Because Traditional Controls Don’t Work well in the Modern World

Hear from experts on how SentinelOne’s autonomous endpoint security saves you time by using multiple AI engines, providing complete visibility into all activity and IoT assets, and even rolling back threats with a single agent.

Learn how to block the most advanced attacks before they can become a breach or even an incident. SentinelOne’s ActiveEDR provides rich forensic data and can mitigate threats automatically, perform network isolation, and auto-immunize the endpoints against newly discovered threats.

13.00- 13.40 – Vectra 

AI in Security Operations: What we have learnt so far

Vectra is the world leader in applying artificial intelligence to detect and respond to cyberattacks in cloud, data center and enterprise infrastructures in real time, while empowering security analysts to perform conclusive incident investigations and AI-assisted threat hunting. Time and talent are key factors in preventing a data breach. Learn from peers how AI enabled them to detect hidden threats in cloud and enterprise networks, perform conclusive incident investigations, and respond at previously unattainable speed and efficacy.

13.40 onwards      Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

 

Help AG Security Spotlight Forum Jan 2020- Dubai

Help AG Security Spotlight Forum Jan 2020- Dubai

DATE: Jan 21 2020 TIME: 9:00 am - 3:00 pm LOCATION: Dubai
ADDRESS
The Westin Dubai Mina Seyahi Beach Resort & Marina

It gives us great pleasure to invite you for our first Security Spotlight Forum for 2020.

Organizations invest in security solutions, policy programs and people skills in order to increase levels of protection and minimize the risk of cyber incidents. Still, cyber incidents do happen as there is no such thing as 100% guarantee in the area of cybersecurity. Sessions at this forum will be about what happens when a cybersecurity incident does occur.

Cyber Incident Response is about preparing for, handling and learning from Cyber Incidents. Even before you have an Incident, and long after you have dealt with a threat, there is important work to be done. During this forum, Help AG along with our best-of-the-breed partners will unpack what Incident Response looks like, and how you can prepare, handle and learn from the process.

We are looking forward to seeing you for another fact-filled and engaging day with Help AG teams that are at the forefront of incident response together with some of the best vendors in the industry.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Registrations will begin at 08: 30.

09:00 – 10:00 – Help AG

Decrypting Incident Response

In this session, Help AG will detail how organizations need to prepare, not just in terms of technology but also processes and governance to ensure they are ready to tackle any type of cyber incident. Following that, our incident response team will provide real-world insights into how incidents need to be handled, and what is the best way to go about ensuring effective and efficient response, while minimizing exposure and loss for the organization.

10:00 – 10:40 – Munich Re

Cyber insurance: Cyber protection hand-in-hand with IT security

Munich Re, the world leading expert on global & local risk solutions will share its view on economic losses from cybercrime, concerns of relevance for enterprise risk management. They will shed light on cyber insurance as the “final layer of defense”: the risk management tool in case even the best IT security measures are bypassed.

10.40 – 11.10 – BSA

Cybersecurity Through the Eyes of Law

BSA, the leading law firm in the Middle East market, will give an overview around the legal frameworks in place around cyber incidents, and how enterprises can best leverage their legal rights and minimize losses from a cyber incident.

11.10 – 12.00 –Attivo Networks           

Unraveling the Magic of Smart Deception      

Today, CISOs know that breaches do, and will, happen. What’s needed is a way to detect all threats quickly and accelerate response. In this session, we’ll discuss why deception is a new integral component of any successful advanced security posture strategy and the foundation for detection of threats from attackers and malicious insiders. Deception technology provides a threat defense of traps and lures designed to deceive attackers into revealing themselves. Engagement-based attack analysis, forensics, and 3rd party integrations accelerate incident response. Attivo Networks solutions are effective to engage attackers anywhere across the enterprise network covering on-premise, cloud, remote and specialized environments.

12.00 – 12.20      Coffee Break

12.20- 13.00 – SentinelOne

Because Traditional Controls Don’t Work well in the Modern World

Hear from experts on how SentinelOne’s autonomous endpoint security saves you time by using multiple AI engines, providing complete visibility into all activity and IoT assets, and even rolling back threats with a single agent.

Learn how to block the most advanced attacks before they can become a breach or even an incident. SentinelOne’s ActiveEDR provides rich forensic data and can mitigate threats automatically, perform network isolation, and auto-immunize the endpoints against newly discovered threats.

13.00- 13.40 – Vectra 

AI in Security Operations: What we have learnt so far

Vectra is the world leader in applying artificial intelligence to detect and respond to cyberattacks in cloud, data center and enterprise infrastructures in real time, while empowering security analysts to perform conclusive incident investigations and AI-assisted threat hunting. Time and talent are key factors in preventing a data breach. Learn from peers how AI enabled them to detect hidden threats in cloud and enterprise networks, perform conclusive incident investigations, and respond at previously unattainable speed and efficacy.

13.40 onwards      Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

 

Help AG Security Spotlight Forum Q3-2019- Abu Dhabi

Help AG Security Spotlight Forum Q3-2019- Abu Dhabi

DATE: Sep 24 2019 TIME: 8:30 am - 2:00 pm LOCATION: Abu Dhabi
ADDRESS
The St Regis Abu Dhabi

It gives us great pleasure to invite you for our Q3 Security Spotlight Forum.

There has probably never been a technology area with greater expectations than AI and ML; in cybersecurity this is no different. As with any technology, with such expectations also come hype and market positioning.

Our previous Security Spotlight Forum on AI was hugely popular, and we received great feedback from our clients . This time we are taking it one step further, by covering real life cybersecurity use cases and products, which have AI in the core of their solution. One of the key developments we have observed around AI in cybersecurity is that today it not just prevention and detection that are powered by AI and ML, but also security operations, which is benefiting from automated, intelligent decision making.

We are looking forward to seeing you for another fact-filled day with some of the best vendors in the industry.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Registrations will begin at 08: 30.

09:00 – 10:00 – Opening Remarks by Help AG

10:00 – 10:20 –  AIDirections

What is AI, and what is it not?

As a first in our Security Spotlight Forum we have asked an external partner to assist in bringing knowledge around the general topic of AI.

AIDirections is a UAE based company focusing on consultancy and solutions around the use of Artificial Intelligence; the consultancy includes awareness, AI readiness and AI strategy, the solutions include various application of computer vision and machine intelligence . They are good friend of Help AG as Dr. Angelika Eksteen also serves in an advisory role to Help AG. Dr. Angelika has promised to give us not only a little insight to what AI is but also what it is not and where we currently stand with AI implementations.

10.20 – 11.00 –  Tenable

Predictive Prioritization of Threats

Tenable has come a long way from the days when they provided the world’s most widely used vulnerability scanner called Nessus. They are bringing new predictive analysis features to their Tenable.io and Tenable.sc (Formerly Security Center) which utilize information about your vulnerabilities, advanced data-mining and machine learning to prioritize which vulnerabilities you should really focus on fixing. Their capabilities allow you to circle in on the 3% of vulnerabilities which are most likely to be exploited in the next 28 days, making your vulnerability management process much more efficient.

11.00- 11.40 –  Splunk

Threat Hunting with Machine Learning

In this session, Splunk will delve deep into operationalization of ML to detect domain generating algorithms in your environment. Splunk’s approach to security, is to ingest almost any kind of data from almost any source, in real-time or historical, and then apply cutting edge AI and ML capabilities — predictive analytics, event management and analytics, clustering, adaptive and statistical thresholding, anomaly detection, in order to detect both known and unknown threats. Don’t miss out the demo on Killchain C&C!

11.40- 12.00  –  Coffee Break

12.00- 12.40 –  F5 Networks

Attacks are Advanced, so should your WAF be

The source of most attacks, regardless of type, is automated. DDoS attacks, data breaches, vulnerability scans, credential stuffing, brute force, resource hoarding, and other attack types are almost all automated. Attackers use automation to launch large-scale attacks and probe for vulnerabilities to lower the cost of the attack and make Cyber Crime a lucrative business.

F5 Advanced WAF uses advanced analytics and machine learning to generate dynamic protection against both automated and manually created attacks without administrator intervention and advanced technical capabilities, hence allowing to create better prevention that focuses on behavior instead of protecting against the unpredictable.

If you are already an F5 user and wish to do WAF smarter, or if you are faced with the challenge of protecting publicly facing websites this session is a great introduction to how you can move to attack prevention at scale.

12.40- 13.20 –  Vectra

Network traffic does not lie!

Vectra is the world leader in applying artificial intelligence to detect and respond to cyberattacks in cloud, data center and enterprise infrastructures in real time, while empowering security analysts to perform conclusive incident investigations and AI-assisted threat hunting. The company’s Cognito Network Detection and Response platform applies machine learning to network traffic captured by physical or virtual sensors within the customers’ infrastructures and connects the dots in your communication and data-flows streaming between clients and servers. This helps detect behavioral abnormalities and attacker behaviors utilized by cybercriminals who are otherwise invisible to conventional cybersecurity detection methods.

The solution is built and architected with confidentiality in mind and allows customers to harness the power of AI without offloading data to the cloud or relying on third-party organizations getting access to confidential network information.

13.20- 14.00 –  Carbon Black

Investigation Made Easier: Better Data. Better Decisions.

Endpoint security is going through a massive transformation. Whereas traditional antivirus relies on first knowing that a certain piece of malware exists, and then producing a signature or updating a machine learning model to stop it, the next generation of endpoint security is built to predict and prevent both known and unknown threats using big data and analytics, without having to see a malicious file first.

The key to getting endpoint security right? The data — the best protection comes from the most complete data.

And endpoint data has been at the heart of Carbon Black’s technology ever since their founding.

In this session you will learn how Carbon Black uses endpoint data to integrate and implement AI and ML based platforms to make better predictive analysis of what is happening on your endpoints and turning that into robust prevention.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

Help AG Security Spotlight Forum Q3-2019- Dubai

Help AG Security Spotlight Forum Q3-2019- Dubai

DATE: Sep 23 2019 TIME: 8:30 am - 2:00 pm LOCATION: Dubai
ADDRESS
JW Marriott Marquis Hotel Dubai

It gives us great pleasure to invite you for our Q3 Security Spotlight Forum.

There has probably never been a technology area with greater expectations than AI and ML; in cybersecurity this is no different. As with any technology, with such expectations also come hype and market positioning.

Our previous Security Spotlight Forum on AI was hugely popular, and we received great feedback from our clients . This time we are taking it one step further, by covering real life cybersecurity use cases and products, which have AI in the core of their solution. One of the key developments we have observed around AI in cybersecurity is that today it not just prevention and detection that are powered by AI and ML, but also security operations, which is benefiting from automated, intelligent decision making.

We are looking forward to seeing you for another fact-filled day with some of the best vendors in the industry.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Registrations will begin at 08: 30.

09:00 – 10:00 – Opening Remarks by Help AG

10:00 – 10:20 –  AIDirections

What is AI, and what is it not?

As a first in our Security Spotlight Forum we have asked an external partner to assist in bringing knowledge around the general topic of AI.

AIDirections is a UAE based company focusing on consultancy and solutions around the use of Artificial Intelligence; the consultancy includes awareness, AI readiness and AI strategy, the solutions include various application of computer vision and machine intelligence . They are good friend of Help AG as Dr. Angelika Eksteen also serves in an advisory role to Help AG. Dr. Angelika has promised to give us not only a little insight to what AI is but also what it is not and where we currently stand with AI implementations.

10.20 – 11.00 –  Tenable

Predictive Prioritization of Threats

Tenable has come a long way from the days when they provided the world’s most widely used vulnerability scanner called Nessus. They are bringing new predictive analysis features to their Tenable.io and Tenable.sc (Formerly Security Center) which utilize information about your vulnerabilities, advanced data-mining and machine learning to prioritize which vulnerabilities you should really focus on fixing. Their capabilities allow you to circle in on the 3% of vulnerabilities which are most likely to be exploited in the next 28 days, making your vulnerability management process much more efficient.

11.00- 11.40 –  Splunk

Threat Hunting with Machine Learning

In this session, Splunk will delve deep into operationalization of ML to detect domain generating algorithms in your environment. Splunk’s approach to security, is to ingest almost any kind of data from almost any source, in real-time or historical, and then apply cutting edge AI and ML capabilities — predictive analytics, event management and analytics, clustering, adaptive and statistical thresholding, anomaly detection, in order to detect both known and unknown threats. Don’t miss out the demo on Killchain C&C!

11.40- 12.00  –  Coffee Break

12.00- 12.40 –  F5 Networks

Attacks are Advanced, so should your WAF be

The source of most attacks, regardless of type, is automated. DDoS attacks, data breaches, vulnerability scans, credential stuffing, brute force, resource hoarding, and other attack types are almost all automated. Attackers use automation to launch large-scale attacks and probe for vulnerabilities to lower the cost of the attack and make Cyber Crime a lucrative business.

F5 Advanced WAF uses advanced analytics and machine learning to generate dynamic protection against both automated and manually created attacks without administrator intervention and advanced technical capabilities, hence allowing to create better prevention that focuses on behavior instead of protecting against the unpredictable.

If you are already an F5 user and wish to do WAF smarter, or if you are faced with the challenge of protecting publicly facing websites this session is a great introduction to how you can move to attack prevention at scale.

12.40- 13.20 –  Vectra

Network traffic does not lie!

Vectra is the world leader in applying artificial intelligence to detect and respond to cyberattacks in cloud, data center and enterprise infrastructures in real time, while empowering security analysts to perform conclusive incident investigations and AI-assisted threat hunting. The company’s Cognito Network Detection and Response platform applies machine learning to network traffic captured by physical or virtual sensors within the customers’ infrastructures and connects the dots in your communication and data-flows streaming between clients and servers. This helps detect behavioral abnormalities and attacker behaviors utilized by cybercriminals who are otherwise invisible to conventional cybersecurity detection methods.

The solution is built and architected with confidentiality in mind and allows customers to harness the power of AI without offloading data to the cloud or relying on third-party organizations getting access to confidential network information.

13.20- 14.00 –  Carbon Black

Investigation Made Easier: Better Data. Better Decisions.

Endpoint security is going through a massive transformation. Whereas traditional antivirus relies on first knowing that a certain piece of malware exists, and then producing a signature or updating a machine learning model to stop it, the next generation of endpoint security is built to predict and prevent both known and unknown threats using big data and analytics, without having to see a malicious file first.

The key to getting endpoint security right? The data — the best protection comes from the most complete data.

And endpoint data has been at the heart of Carbon Black’s technology ever since their founding.

In this session you will learn how Carbon Black uses endpoint data to integrate and implement AI and ML based platforms to make better predictive analysis of what is happening on your endpoints and turning that into robust prevention.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

 

 

Help AG Security Spotlight Forum Q2-2019- Abu Dhabi

Help AG Security Spotlight Forum Q2-2019- Abu Dhabi

DATE: Jun 26 2019 TIME: 8:30 am - 3:00 pm LOCATION: Abu Dhabi
ADDRESS
Shangri-La Hotel, Qaryat al Beri

It gives us great pleasure to invite you for our Q2 Security Spotlight Forum.

This time the theme is integration of platforms, and how cybersecurity is growing smarter and more efficient through the use of integrated platforms and orchestration capabilities. We will also cover how user behavior analytics creates higher fidelity events which are risk-focused instead of the traditional event-based approach. In addition, we will also shine the spotlight on a key, but often overlooked, capability in the creation of any zero-trust architecture which is controlling and managing and governing privileged accounts.

We are looking forward seeing you for another fact-filled day with some of the best vendors in the industry.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


AGENDA: 

Registrations will begin at 08: 30.

9:00 – 10:00 – Opening Remarks by Help AG

10:00 – 10:45- Palo Alto Networks 

The Enterprise Security Company

No one talks and delivers a cybersecurity platform that is more integrated than Palo Alto Networks. Their recent developments in endpoint, network and cloud security deliver not only a single pane of glass for all your security events, but also allow you to automatically enforce and prevent cyber-attacks across all mentioned attack vectors.

10:45 – 11:30 – Demisto

Security Orchestration and Automation at Scale

Demisto was recently acquired by Palo Alto, but is operating as a separate entity within Palo Alto Networks. There is a good reason for this, for when you identify an attack, you will need to orchestrate to other security devices, general IT systems and your analysts. Demisto delivers a SOAR platform recognized for its ability to deliver the glue that interconnects systems and automates and enriches event information – tasks that are often very manual and cumbersome even in the most advanced Cyber Security Operations and SOC environments.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 –Exabeam

Finding the Needle in the Haystack of Security Events

Exabeam is the market leader in User Entity Behavior Analytics. UEBA is often referred to as the next generation of SIEM as it delivers a risk-based approach to your users and events in your network. There is no doubt that the major issue in any SOC and Security Operations is to quantify and classify events and focus on what is required; a risk-based approach does exactly that by focusing on behaviour of an entity or user, hence allowing your analysts and security staff to spend their time much more wisely.

12:30 – 13:15 –Proofpoint

When E-mails, Brand & Your Greatest Assets – People –  have to be Secure

Proofpoint is the market leader in Enterprise Email security offering the most effective security and compliance solutions to respond to cyber-attacks in every channel including email, the web, the cloud, and social media. Their unique People Centric Security approach protects your organisations’ greatest assets and biggest risks-your people. We are celebrating that Proofpoint have opened their Middle Eastern operation by adding them to the Help AG portfolio. Their integration with Palo Alto and other leading cybersecurity platforms means you can benefit even more from your existing investments by utilizing Proofpoint.

13:15 – 14:00 –BeyondTrust

Delivering Identity based Zero-Trust Computing

Nothing should make you more worried than the concern around how your privileged accounts are being utilized. The power you grant in your system administrator accounts can be abused and a simple username and password ending up in the wrong hands can be devastating to any organization. BeyondTrust is the leader in innovative privileged account management solutions, and with the acquisition of Bomgar, Lieberman software and Avecto, the solution also extends to remote-access connections, remote support and all privilege management on endpoints.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

 

Help AG Security Spotlight Forum Q2-2019- Dubai

Help AG Security Spotlight Forum Q2-2019- Dubai

DATE: Jun 25 2019 TIME: 8:30 am - 3:00 pm LOCATION: Dubai
ADDRESS
JW Marriott Marquis Hotel Dubai

It gives us great pleasure to invite you for our Q2 Security Spotlight Forum.

This time the theme is integration of platforms, and how cybersecurity is growing smarter and more efficient through the use of integrated platforms and orchestration capabilities. We will also cover how user behavior analytics creates higher fidelity events which are risk-focused instead of the traditional event-based approach. In addition, we will also shine the spotlight on a key, but often overlooked, capability in the creation of any zero-trust architecture which is controlling and managing and governing privileged accounts.

We are looking forward seeing you for another fact-filled day with some of the best vendors in the industry.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


AGENDA: 

Registrations will begin at 08: 30.

9:00 – 10:00 – Opening Remarks by Help AG

10:00 – 10:45- Palo Alto Networks 

The Enterprise Security Company

No one talks and delivers a cybersecurity platform that is more integrated than Palo Alto Networks. Their recent developments in endpoint, network and cloud security deliver not only a single pane of glass for all your security events, but also allow you to automatically enforce and prevent cyber-attacks across all mentioned attack vectors.

10:45 – 11:30 – Demisto

Security Orchestration and Automation at Scale

Demisto was recently acquired by Palo Alto, but is operating as a separate entity within Palo Alto Networks. There is a good reason for this, for when you identify an attack, you will need to orchestrate to other security devices, general IT systems and your analysts. Demisto delivers a SOAR platform recognized for its ability to deliver the glue that interconnects systems and automates and enriches event information – tasks that are often very manual and cumbersome even in the most advanced Cyber Security Operations and SOC environments.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 –Exabeam

Finding the Needle in the Haystack of Security Events

Exabeam is the market leader in User Entity Behavior Analytics. UEBA is often referred to as the next generation of SIEM as it delivers a risk-based approach to your users and events in your network. There is no doubt that the major issue in any SOC and Security Operations is to quantify and classify events and focus on what is required; a risk-based approach does exactly that by focusing on behaviour of an entity or user, hence allowing your analysts and security staff to spend their time much more wisely.

12:30 – 13:15 –Proofpoint

When E-mails, Brand & Your Greatest Assets – People –  have to be Secure

Proofpoint is the market leader in Enterprise Email security offering the most effective security and compliance solutions to respond to cyber-attacks in every channel including email, the web, the cloud, and social media. Their unique People Centric Security approach protects your organisations’ greatest assets and biggest risks-your people. We are celebrating that Proofpoint have opened their Middle Eastern operation by adding them to the Help AG portfolio. Their integration with Palo Alto and other leading cybersecurity platforms means you can benefit even more from your existing investments by utilizing Proofpoint.

13:15 – 14:00 –BeyondTrust

Delivering Identity based Zero-Trust Computing

Nothing should make you more worried than the concern around how your privileged accounts are being utilized. The power you grant in your system administrator accounts can be abused and a simple username and password ending up in the wrong hands can be devastating to any organization. BeyondTrust is the leader in innovative privileged account management solutions, and with the acquisition of Bomgar, Lieberman software and Avecto, the solution also extends to remote-access connections, remote support and all privilege management on endpoints.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

 

MALWARE ANALYSIS AND REVERSE ENGINEERING TECHNICAL SESSION

MALWARE ANALYSIS AND REVERSE ENGINEERING TECHNICAL SESSION

DATE: Apr 21 2019 TIME: 8:30 am - 2:30 pm LOCATION: Dubai
ADDRESS
Fairmont The Palm, Palm Jumeirah

Want to see malware reverse engineering in practice? See below… this is a technical session by technical experts for technical practitioners! Help AG is organizing the session, in association with Palo Alto Networks.

> Cmd: register_2_attend;

# Who: Security, Network, Endpoint, Cloud practitioners;

# Why: ‘2 understand malware u need to become malware’

# Delivery: expert; technical; in-depth;

# Outcomes: Know your enemy; Replicate what u learn; Prevent malware at scale;

Agenda:

08:30: Welcome Coffee

09:00-09:20: Introductory session by Help AG

09:20-10:00: How does malware and exploit works?

10:00-10:30: Different stages of malware

10:30-11:00: Coffee networking

11:00-11:40: Malware techniques and difference between Malware and Exploit

11:40-12:00: Obfuscation and Encryption

12:00-13:00: Lunch networking

13:00-13:30: Discussion on real world campaigns

13:30-14:00: Palo Alto Traps

14:00-14:30: Palo Alto XDR

Contact soumya.prajna@helpag.com for any information regarding the event.

(NOTE: Online registrations will be vetted and confirmation will be sent by email/calendar invite from Help AG.)

Help AG Security Spotlight Forum Q1-2019- Abu Dhabi

Help AG Security Spotlight Forum Q1-2019- Abu Dhabi

DATE: Mar 27 2019 TIME: 8:00 am - 3:00 pm LOCATION: Jumeirah at Etihad Towers
ADDRESS
Abu Dhabi

This event will focus on Zero Trust and the evolution of the concept since its definition in 2014.

When the term, Zero Trust, was first coined by Forrester in 2014, most organizations looked at it from the perspective of the network and micro-segmentation. But today, the concept encompasses much more. Cloud, Identity, Threat Intelligence, Privileged Access Management, and Data Protection are all elements of a comprehensive and robust approach to Zero Trust IT.

Nicolai Solling, CTO, Help AG will go through Help AG’s Zero Trust Model, which has been deployed in a number of organizations. Following the Security Spotlight Forum’s format for success, we have asked some of our vendor partners that are delivering the building blocks to Zero Trust to delve deeper and explain how their solutions can help you meet the requirements of Zero Trust. As always, these vendors will keep their presentation open and interactive and will prepare demos of their solutions.

If you have already started your zero-trust journey, or are just starting out, this is a great event which will tell you how the positive impact of the most powerful cybersecurity solutions can be magnified when they are integrated and talking to each other.


AGENDA

09:00 – 09:20:  Registration and Welcome

09:20 – 10:00:   Help AG: Zero Trust, what is it and where can you start

In this session, Nicolai Solling, CTO, Help AG will cover what Zero Trust is, how the concept has evolved and how you can get started or enhance your current deployment of Zero Trust.

10:00 – 10:40:    Symantec: Data Protection On-Premises and in the Cloud

Zero Trust is about ensuring that the right systems, people and applications can access each other in the right way, but protecting data is equally important. In this session, Symantec will explain how they use DLP, CASB and native encryption capabilities to ensure that data can only be accessed by those who it is intended for, both on-premises as well as in the cloud.

10:40 –  11:20:    Fortinet: The Zero Trust Enforcement Point

The firewall is an increasingly important enforcement point of traffic within the network. When integrated with other devices, a firewall can be enhanced by richer context and intelligence and thereby enabled to act as an orchestration device for other devices in order to make the right decision.

11:20  – 12:00:    Coffee break and refreshments

12:00 – 12.40:     Infoblox: How Secure DNS is a clear element of Zero Trust

One of the main reasons we implement Zero Trust in the first place is to avoid cyber-attacks such as the spread of malware and exfiltration of data. As both good and bad network actions start with a DNS request, the security benefits of inspecting DNS can be significant.

In this session, Infoblox will cover how just small changes and investments to your infrastructure can significantly increase your ability to block Command and Control as well as other malicious DNS attacks.

12:40 – 13:20:     Pulse Secure: Identity, the Foundation of Zero Trust

Pulse Secure delivers one of the strongest access control solutions for remote users, network users as well as users connecting to cloud applications. Utilizing identity information as well as the security posture of the devices allows organizations to make clever decisions regarding who should have access to what, and from which device and location. By offering a flexible path to SDP, the company extends its foundation of Zero Trust access for hybrid IT and provides enterprises and service providers unrivaled provisioning simplicity, security posture fortification and lower total cost of ownership.  Also, learn why Help AG is successful in deploying NAC with Pulse Secure in organizations ranging from 10 users to 10,000 users!

13:20 – 14:00:     Skybox Security: Zero Trust Starts with Visibility

Complete and accurate visibility underpins every aspect of the Zero Trust framework. In order to create effective micro perimeters, you have to understand your infrastructure, how well it’s aligned to the goals designed in security policies and where risks lie.

In this session, Skybox Security will discuss how the visibility of the hybrid network and asset layer combine to give you the insight needed to implement and maintain the Zero Trust model.

(P.S. This event is exclusively for security and ICT decision makers in enterprises across the UAE. Online registrations will be vetted and confirmation will be sent by email.) 

Help AG Security Spotlight Forum Q1-2019- Dubai

Help AG Security Spotlight Forum Q1-2019- Dubai

DATE: Mar 26 2019 TIME: 8:30 am - 3:00 pm LOCATION: One&Only Royal Mirage, King Salman Bin Abdulaziz Al Saud St - Dubai
ADDRESS
Dubai

This event will focus on Zero Trust and the evolution of the concept since its definition in 2014.

When the term, Zero Trust, was first coined by Forrester in 2014, most organizations looked at it from the perspective of the network and micro-segmentation. But today, the concept encompasses much more. Cloud, Identity, Threat Intelligence, Privileged Access Management, and Data Protection are all elements of a comprehensive and robust approach to Zero Trust IT.

Nicolai Solling, CTO, Help AG will go through Help AG’s Zero Trust Model, which has been deployed in a number of organizations. Following the Security Spotlight Forum’s format for success, we have asked some of our vendor partners that are delivering the building blocks to Zero Trust to delve deeper and explain how their solutions can help you meet the requirements of Zero Trust. As always, these vendors will keep their presentation open and interactive and will prepare demos of their solutions.

If you have already started your zero-trust journey, or are just starting out, this is a great event which will tell you how the positive impact of the most powerful cybersecurity solutions can be magnified when they are integrated and talking to each other.


AGENDA

09:00 – 09:20:  Registration and Welcome

09:20 – 10:00:   Help AG: Zero Trust, what is it and where can you start

In this session, Nicolai Solling, CTO, Help AG will cover what Zero Trust is, how the concept has evolved and how you can get started or enhance your current deployment of Zero Trust.

10:00 – 10:40:    Symantec: Data Protection On-Premises and in the Cloud

Zero Trust is about ensuring that the right systems, people and applications can access each other in the right way, but protecting data is equally important. In this session, Symantec will explain how they use DLP, CASB and native encryption capabilities to ensure that data can only be accessed by those who it is intended for, both on-premises as well as in the cloud.

10:40 –  11:20:    Fortinet: The Zero Trust Enforcement Point

The firewall is an increasingly important enforcement point of traffic within the network. When integrated with other devices, a firewall can be enhanced by richer context and intelligence and thereby enabled to act as an orchestration device for other devices in order to make the right decision.

11:20  – 12:00:    Coffee break and refreshments

12:00 – 12.40:     Infoblox: How Secure DNS is a clear element of Zero Trust

One of the main reasons we implement Zero Trust in the first place is to avoid cyber-attacks such as the spread of malware and exfiltration of data. As both good and bad network actions start with a DNS request, the security benefits of inspecting DNS can be significant.

In this session, Infoblox will cover how just small changes and investments to your infrastructure can significantly increase your ability to block Command and Control as well as other malicious DNS attacks.

12:40 – 13:20:     Pulse Secure: Identity, the Foundation of Zero Trust

Pulse Secure delivers one of the strongest access control solutions for remote users, network users as well as users connecting to cloud applications. Utilizing identity information as well as the security posture of the devices allows organizations to make clever decisions regarding who should have access to what, and from which device and location. By offering a flexible path to SDP, the company extends its foundation of Zero Trust access for hybrid IT and provides enterprises and service providers unrivaled provisioning simplicity, security posture fortification and lower total cost of ownership.  Also, learn why Help AG is successful in deploying NAC with Pulse Secure in organizations ranging from 10 users to 10,000 users!

13:20 – 14:00:     Skybox Security: Zero Trust Starts with Visibility

Complete and accurate visibility underpins every aspect of the Zero Trust framework. In order to create effective micro perimeters, you have to understand your infrastructure, how well it’s aligned to the goals designed in security policies and where risks lie.

In this session, Skybox Security will discuss how the visibility of the hybrid network and asset layer combine to give you the insight needed to implement and maintain the Zero Trust model.

(P.S. This event is exclusively for security and ICT decision makers in enterprises across the UAE. Online registrations will be vetted and confirmation will be sent by email.) 

Help AG Security Spotlight Forum Q4 2018- Abu Dhabi

Help AG Security Spotlight Forum Q4 2018- Abu Dhabi

DATE: Nov 27 2018 TIME: 9:00 am - 3:00 pm LOCATION: Shangri-La Hotel
ADDRESS

Shangri-La Hotel
Abu Dhabi
Qaryat Al Beri
United Arab Emirates

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum in Dubai and Abu Dhabi, this time with the theme of doing things smarter.

Over the years security technology has become harder and harder to manage as the problems became more and more complex to deal with.

In this event, we focus on the technologies that hold promise to make our world a little smarter by automating, integrating and benefitting from collective intelligence.To confirm your attendance, please send an email to soumya.prajna@helpag.com.

Looking forward to seeing all of you there to another great day filled with information together with our partners.

 Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


AGENDA: 

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

The SMART SOC

Integration, correlation, and automation have been key elements of Help AG’s MSS since its inauguration in 2016. Simon Willgoss, Head of Managed Security Services will discuss how and what we automate and what our upcoming automation roadmap contains in order to deliver the best MSS in the region.

10:00 – 10:45- Symantec

The power of the packet fuels your investigation and incident response

A good old friend once said that packets don’t lie – This was in the setting of some network troubleshooting – But even in cybersecurity this is as true as ever. Network packets holds a treasure-trove of visibility and being able to map a security event to the actual packet data is simply invaluable. In this session, Symantec will discuss around their Security Analytics platform, and how integrating that to your security platforms will turbo-charge your investigative capabilities.

10:45 – 11:30 – Splunk

The Phantom of the SOC

We all know Splunk as an excellent data analytics platform for both IT, Operational and Security events. In fact, Splunk chews up data like kids consume a packet of Oreo’s.

Did you also know that Splunk recently acquired the market leader in Security Orchestration and Automatic Response (SOAR)? Repetitive tasks typically undertaken by an analyst or an engineer can now be automated increasing consistency, speed, and responsiveness of your incident response.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Help AG

Live Hacking: Fileless attacks – What is it and why is it such a problem to detect?

Mukhammed Khalilov, Manager Security Analysis, and Help AG’s white hat hackers will in this session describe what fileless attacks are and show how technologies such as steganography and undetectable encoding tools are proving difficult to detect even for next-generation endpoint solutions.

Stay tuned for a performance where you will not believe your eyes – Could this be the David Copperfield of Cyber Security?

12:30 – 13:15 – F5 Networks

DevOPS and beyond

DevOPS is fundamentally changing how we think of development life cycles and challenging the traditional thinking of how security can be deployed.

In this session, F5 Networks will first introduce us to the concepts, terminology and important technology associated with DevOPS and cover how F5 Networks support the orchestration and security of a DevOPS application framework.

If you are just starting with DevOPS or thinking of how you integrate security into your DevOPS process this is the perfect session for you.

13:15 – 14:00 – Infoblox

Threat Intel and orchestration of your defense

In this session, Infoblox will present their threat intelligence and the framework that they use to integrate this to firewalls, SIEMs and how SOAR platforms can look up in their platforms.

If you already use Infoblox or looking at adding threat intel to your existing security platforms, this is the session to attend.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

Help AG Security Spotlight Forum Q4 2018 – Dubai

Help AG Security Spotlight Forum Q4 2018 – Dubai

DATE: Nov 26 2018 TIME: 9:00 am - 3:00 pm LOCATION: One & Only Royal Mirage Dubai
ADDRESS

One & Only Royal Mirage
Dubai
Al Sufouh Road
United Arab Emirates

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum in Dubai and Abu Dhabi, this time with the theme of doing things smarter.

Over the years security technology has become harder and harder to manage as the problems became more and more complex to deal with.

In this event, we focus on the technologies that hold promise to make our world a little smarter by automating, integrating and benefitting from collective intelligence.To confirm your attendance, please send an email to soumya.prajna@helpag.com.

Looking forward to seeing all of you there to another great day filled with information together with our partners.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


AGENDA: 

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

The SMART SOC

Integration, correlation, and automation have been key elements of Help AG’s MSS since its inauguration in 2016. Simon Willgoss, Head of Managed Security Services will discuss how and what we automate and what our upcoming automation roadmap contains in order to deliver the best MSS in the region.

10:00 – 10:45- Symantec

The power of the packet fuels your investigation and incident response

A good old friend once said that packets don’t lie – This was in the setting of some network troubleshooting – But even in cybersecurity this is as true as ever. Network packets holds a treasure-trove of visibility and being able to map a security event to the actual packet data is simply invaluable. In this session, Symantec will discuss around their Security Analytics platform, and how integrating that to your security platforms will turbo-charge your investigative capabilities.

10:45 – 11:30 – Splunk

The Phantom of the SOC

We all know Splunk as an excellent data analytics platform for both IT, Operational and Security events. In fact, Splunk chews up data like kids consume a packet of Oreo’s.

Did you also know that Splunk recently acquired the market leader in Security Orchestration and Automatic Response (SOAR)? Repetitive tasks typically undertaken by an analyst or an engineer can now be automated increasing consistency, speed, and responsiveness of your incident response.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Help AG

Live Hacking: Fileless attacks – What is it and why is it such a problem to detect?

Mukhammed Khalilov, Manager Security Analysis, and Help AG’s white hat hackers will in this session describe what fileless attacks are and show how technologies such as steganography and undetectable encoding tools are proving difficult to detect even for next-generation endpoint solutions.

Stay tuned for a performance where you will not believe your eyes – Could this be the David Copperfield of Cyber Security?

12:30 – 13:15 – F5 Networks

DevOPS and beyond

DevOPS is fundamentally changing how we think of development life cycles and challenging the traditional thinking of how security can be deployed.

In this session, F5 Networks will first introduce us to the concepts, terminology and important technology associated with DevOPS and cover how F5 Networks support the orchestration and security of a DevOPS application framework.

If you are just starting with DevOPS or thinking of how you integrate security into your DevOPS process this is the perfect session for you.

13:15 – 14:00 – Infoblox

Threat Intel and orchestration of your defense

In this session, Infoblox will present their threat intelligence and the framework that they use to integrate this to firewalls, SIEMs and how SOAR platforms can look up in their platforms.

If you already use Infoblox or looking at adding threat intel to your existing security platforms, this is the session to attend.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

Load more

Ready to secure your information infrastructure and assets?

Learn More

Our story, our services and the mission that guides us forth.

Learn More

Back to Top