Has your cybersecurity been compromised?





We respect your privacy, and we hate spam as much as you. Which is why we will never share your email address with anyone.

Enquire Now

EVENTS

We know that great things can be achieved when we come together as a community. This is why we organise a variety of events and conferences across the Middle East. Through these events, we share knowledge, celebrate new technologies and discuss ways to transform the global information security ecosystem.

Past Events

MALWARE ANALYSIS AND REVERSE ENGINEERING TECHNICAL SESSION

MALWARE ANALYSIS AND REVERSE ENGINEERING TECHNICAL SESSION

DATE: Apr 21 2019 TIME: 8:30 am - 2:30 pm LOCATION: Dubai
ADDRESS
Fairmont The Palm, Palm Jumeirah

Want to see malware reverse engineering in practice? See below… this is a technical session by technical experts for technical practitioners! Help AG is organizing the session, in association with Palo Alto Networks.

> Cmd: register_2_attend;

# Who: Security, Network, Endpoint, Cloud practitioners;

# Why: ‘2 understand malware u need to become malware’

# Delivery: expert; technical; in-depth;

# Outcomes: Know your enemy; Replicate what u learn; Prevent malware at scale;

Agenda:

08:30: Welcome Coffee

09:00-09:20: Introductory session by Help AG

09:20-10:00: How does malware and exploit works?

10:00-10:30: Different stages of malware

10:30-11:00: Coffee networking

11:00-11:40: Malware techniques and difference between Malware and Exploit

11:40-12:00: Obfuscation and Encryption

12:00-13:00: Lunch networking

13:00-13:30: Discussion on real world campaigns

13:30-14:00: Palo Alto Traps

14:00-14:30: Palo Alto XDR

Contact soumya.prajna@helpag.com for any information regarding the event.

(NOTE: Online registrations will be vetted and confirmation will be sent by email/calendar invite from Help AG.)

Help AG Security Spotlight Forum Q1-2019- Abu Dhabi

Help AG Security Spotlight Forum Q1-2019- Abu Dhabi

DATE: Mar 27 2019 TIME: 8:00 am - 3:00 pm LOCATION: Jumeirah at Etihad Towers
ADDRESS
Abu Dhabi

This event will focus on Zero Trust and the evolution of the concept since its definition in 2014.

When the term, Zero Trust, was first coined by Forrester in 2014, most organizations looked at it from the perspective of the network and micro-segmentation. But today, the concept encompasses much more. Cloud, Identity, Threat Intelligence, Privileged Access Management, and Data Protection are all elements of a comprehensive and robust approach to Zero Trust IT.

Nicolai Solling, CTO, Help AG will go through Help AG’s Zero Trust Model, which has been deployed in a number of organizations. Following the Security Spotlight Forum’s format for success, we have asked some of our vendor partners that are delivering the building blocks to Zero Trust to delve deeper and explain how their solutions can help you meet the requirements of Zero Trust. As always, these vendors will keep their presentation open and interactive and will prepare demos of their solutions.

If you have already started your zero-trust journey, or are just starting out, this is a great event which will tell you how the positive impact of the most powerful cybersecurity solutions can be magnified when they are integrated and talking to each other.


AGENDA

09:00 – 09:20:  Registration and Welcome

09:20 – 10:00:   Help AG: Zero Trust, what is it and where can you start

In this session, Nicolai Solling, CTO, Help AG will cover what Zero Trust is, how the concept has evolved and how you can get started or enhance your current deployment of Zero Trust.

10:00 – 10:40:    Symantec: Data Protection On-Premises and in the Cloud

Zero Trust is about ensuring that the right systems, people and applications can access each other in the right way, but protecting data is equally important. In this session, Symantec will explain how they use DLP, CASB and native encryption capabilities to ensure that data can only be accessed by those who it is intended for, both on-premises as well as in the cloud.

10:40 –  11:20:    Fortinet: The Zero Trust Enforcement Point

The firewall is an increasingly important enforcement point of traffic within the network. When integrated with other devices, a firewall can be enhanced by richer context and intelligence and thereby enabled to act as an orchestration device for other devices in order to make the right decision.

11:20  – 12:00:    Coffee break and refreshments

12:00 – 12.40:     Infoblox: How Secure DNS is a clear element of Zero Trust

One of the main reasons we implement Zero Trust in the first place is to avoid cyber-attacks such as the spread of malware and exfiltration of data. As both good and bad network actions start with a DNS request, the security benefits of inspecting DNS can be significant.

In this session, Infoblox will cover how just small changes and investments to your infrastructure can significantly increase your ability to block Command and Control as well as other malicious DNS attacks.

12:40 – 13:20:     Pulse Secure: Identity, the Foundation of Zero Trust

Pulse Secure delivers one of the strongest access control solutions for remote users, network users as well as users connecting to cloud applications. Utilizing identity information as well as the security posture of the devices allows organizations to make clever decisions regarding who should have access to what, and from which device and location. By offering a flexible path to SDP, the company extends its foundation of Zero Trust access for hybrid IT and provides enterprises and service providers unrivaled provisioning simplicity, security posture fortification and lower total cost of ownership.  Also, learn why Help AG is successful in deploying NAC with Pulse Secure in organizations ranging from 10 users to 10,000 users!

13:20 – 14:00:     Skybox Security: Zero Trust Starts with Visibility

Complete and accurate visibility underpins every aspect of the Zero Trust framework. In order to create effective micro perimeters, you have to understand your infrastructure, how well it’s aligned to the goals designed in security policies and where risks lie.

In this session, Skybox Security will discuss how the visibility of the hybrid network and asset layer combine to give you the insight needed to implement and maintain the Zero Trust model.

(P.S. This event is exclusively for security and ICT decision makers in enterprises across the UAE. Online registrations will be vetted and confirmation will be sent by email.) 

Help AG Security Spotlight Forum Q1-2019- Dubai

Help AG Security Spotlight Forum Q1-2019- Dubai

DATE: Mar 26 2019 TIME: 8:30 am - 3:00 pm LOCATION: One&Only Royal Mirage, King Salman Bin Abdulaziz Al Saud St - Dubai
ADDRESS
Dubai

This event will focus on Zero Trust and the evolution of the concept since its definition in 2014.

When the term, Zero Trust, was first coined by Forrester in 2014, most organizations looked at it from the perspective of the network and micro-segmentation. But today, the concept encompasses much more. Cloud, Identity, Threat Intelligence, Privileged Access Management, and Data Protection are all elements of a comprehensive and robust approach to Zero Trust IT.

Nicolai Solling, CTO, Help AG will go through Help AG’s Zero Trust Model, which has been deployed in a number of organizations. Following the Security Spotlight Forum’s format for success, we have asked some of our vendor partners that are delivering the building blocks to Zero Trust to delve deeper and explain how their solutions can help you meet the requirements of Zero Trust. As always, these vendors will keep their presentation open and interactive and will prepare demos of their solutions.

If you have already started your zero-trust journey, or are just starting out, this is a great event which will tell you how the positive impact of the most powerful cybersecurity solutions can be magnified when they are integrated and talking to each other.


AGENDA

09:00 – 09:20:  Registration and Welcome

09:20 – 10:00:   Help AG: Zero Trust, what is it and where can you start

In this session, Nicolai Solling, CTO, Help AG will cover what Zero Trust is, how the concept has evolved and how you can get started or enhance your current deployment of Zero Trust.

10:00 – 10:40:    Symantec: Data Protection On-Premises and in the Cloud

Zero Trust is about ensuring that the right systems, people and applications can access each other in the right way, but protecting data is equally important. In this session, Symantec will explain how they use DLP, CASB and native encryption capabilities to ensure that data can only be accessed by those who it is intended for, both on-premises as well as in the cloud.

10:40 –  11:20:    Fortinet: The Zero Trust Enforcement Point

The firewall is an increasingly important enforcement point of traffic within the network. When integrated with other devices, a firewall can be enhanced by richer context and intelligence and thereby enabled to act as an orchestration device for other devices in order to make the right decision.

11:20  – 12:00:    Coffee break and refreshments

12:00 – 12.40:     Infoblox: How Secure DNS is a clear element of Zero Trust

One of the main reasons we implement Zero Trust in the first place is to avoid cyber-attacks such as the spread of malware and exfiltration of data. As both good and bad network actions start with a DNS request, the security benefits of inspecting DNS can be significant.

In this session, Infoblox will cover how just small changes and investments to your infrastructure can significantly increase your ability to block Command and Control as well as other malicious DNS attacks.

12:40 – 13:20:     Pulse Secure: Identity, the Foundation of Zero Trust

Pulse Secure delivers one of the strongest access control solutions for remote users, network users as well as users connecting to cloud applications. Utilizing identity information as well as the security posture of the devices allows organizations to make clever decisions regarding who should have access to what, and from which device and location. By offering a flexible path to SDP, the company extends its foundation of Zero Trust access for hybrid IT and provides enterprises and service providers unrivaled provisioning simplicity, security posture fortification and lower total cost of ownership.  Also, learn why Help AG is successful in deploying NAC with Pulse Secure in organizations ranging from 10 users to 10,000 users!

13:20 – 14:00:     Skybox Security: Zero Trust Starts with Visibility

Complete and accurate visibility underpins every aspect of the Zero Trust framework. In order to create effective micro perimeters, you have to understand your infrastructure, how well it’s aligned to the goals designed in security policies and where risks lie.

In this session, Skybox Security will discuss how the visibility of the hybrid network and asset layer combine to give you the insight needed to implement and maintain the Zero Trust model.

(P.S. This event is exclusively for security and ICT decision makers in enterprises across the UAE. Online registrations will be vetted and confirmation will be sent by email.) 

Help AG Security Spotlight Forum Q4 2018- Abu Dhabi

Help AG Security Spotlight Forum Q4 2018- Abu Dhabi

DATE: Nov 27 2018 TIME: 9:00 am - 3:00 pm LOCATION: Shangri-La Hotel
ADDRESS

Shangri-La Hotel
Abu Dhabi
Qaryat Al Beri
United Arab Emirates

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum in Dubai and Abu Dhabi, this time with the theme of doing things smarter.

Over the years security technology has become harder and harder to manage as the problems became more and more complex to deal with.

In this event, we focus on the technologies that hold promise to make our world a little smarter by automating, integrating and benefitting from collective intelligence.To confirm your attendance, please send an email to soumya.prajna@helpag.com.

Looking forward to seeing all of you there to another great day filled with information together with our partners.

 Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


AGENDA: 

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

The SMART SOC

Integration, correlation, and automation have been key elements of Help AG’s MSS since its inauguration in 2016. Simon Willgoss, Head of Managed Security Services will discuss how and what we automate and what our upcoming automation roadmap contains in order to deliver the best MSS in the region.

10:00 – 10:45- Symantec

The power of the packet fuels your investigation and incident response

A good old friend once said that packets don’t lie – This was in the setting of some network troubleshooting – But even in cybersecurity this is as true as ever. Network packets holds a treasure-trove of visibility and being able to map a security event to the actual packet data is simply invaluable. In this session, Symantec will discuss around their Security Analytics platform, and how integrating that to your security platforms will turbo-charge your investigative capabilities.

10:45 – 11:30 – Splunk

The Phantom of the SOC

We all know Splunk as an excellent data analytics platform for both IT, Operational and Security events. In fact, Splunk chews up data like kids consume a packet of Oreo’s.

Did you also know that Splunk recently acquired the market leader in Security Orchestration and Automatic Response (SOAR)? Repetitive tasks typically undertaken by an analyst or an engineer can now be automated increasing consistency, speed, and responsiveness of your incident response.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Help AG

Live Hacking: Fileless attacks – What is it and why is it such a problem to detect?

Mukhammed Khalilov, Manager Security Analysis, and Help AG’s white hat hackers will in this session describe what fileless attacks are and show how technologies such as steganography and undetectable encoding tools are proving difficult to detect even for next-generation endpoint solutions.

Stay tuned for a performance where you will not believe your eyes – Could this be the David Copperfield of Cyber Security?

12:30 – 13:15 – F5 Networks

DevOPS and beyond

DevOPS is fundamentally changing how we think of development life cycles and challenging the traditional thinking of how security can be deployed.

In this session, F5 Networks will first introduce us to the concepts, terminology and important technology associated with DevOPS and cover how F5 Networks support the orchestration and security of a DevOPS application framework.

If you are just starting with DevOPS or thinking of how you integrate security into your DevOPS process this is the perfect session for you.

13:15 – 14:00 – Infoblox

Threat Intel and orchestration of your defense

In this session, Infoblox will present their threat intelligence and the framework that they use to integrate this to firewalls, SIEMs and how SOAR platforms can look up in their platforms.

If you already use Infoblox or looking at adding threat intel to your existing security platforms, this is the session to attend.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

Help AG Security Spotlight Forum Q4 2018 – Dubai

Help AG Security Spotlight Forum Q4 2018 – Dubai

DATE: Nov 26 2018 TIME: 9:00 am - 3:00 pm LOCATION: One & Only Royal Mirage Dubai
ADDRESS

One & Only Royal Mirage
Dubai
Al Sufouh Road
United Arab Emirates

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum in Dubai and Abu Dhabi, this time with the theme of doing things smarter.

Over the years security technology has become harder and harder to manage as the problems became more and more complex to deal with.

In this event, we focus on the technologies that hold promise to make our world a little smarter by automating, integrating and benefitting from collective intelligence.To confirm your attendance, please send an email to soumya.prajna@helpag.com.

Looking forward to seeing all of you there to another great day filled with information together with our partners.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


AGENDA: 

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

The SMART SOC

Integration, correlation, and automation have been key elements of Help AG’s MSS since its inauguration in 2016. Simon Willgoss, Head of Managed Security Services will discuss how and what we automate and what our upcoming automation roadmap contains in order to deliver the best MSS in the region.

10:00 – 10:45- Symantec

The power of the packet fuels your investigation and incident response

A good old friend once said that packets don’t lie – This was in the setting of some network troubleshooting – But even in cybersecurity this is as true as ever. Network packets holds a treasure-trove of visibility and being able to map a security event to the actual packet data is simply invaluable. In this session, Symantec will discuss around their Security Analytics platform, and how integrating that to your security platforms will turbo-charge your investigative capabilities.

10:45 – 11:30 – Splunk

The Phantom of the SOC

We all know Splunk as an excellent data analytics platform for both IT, Operational and Security events. In fact, Splunk chews up data like kids consume a packet of Oreo’s.

Did you also know that Splunk recently acquired the market leader in Security Orchestration and Automatic Response (SOAR)? Repetitive tasks typically undertaken by an analyst or an engineer can now be automated increasing consistency, speed, and responsiveness of your incident response.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Help AG

Live Hacking: Fileless attacks – What is it and why is it such a problem to detect?

Mukhammed Khalilov, Manager Security Analysis, and Help AG’s white hat hackers will in this session describe what fileless attacks are and show how technologies such as steganography and undetectable encoding tools are proving difficult to detect even for next-generation endpoint solutions.

Stay tuned for a performance where you will not believe your eyes – Could this be the David Copperfield of Cyber Security?

12:30 – 13:15 – F5 Networks

DevOPS and beyond

DevOPS is fundamentally changing how we think of development life cycles and challenging the traditional thinking of how security can be deployed.

In this session, F5 Networks will first introduce us to the concepts, terminology and important technology associated with DevOPS and cover how F5 Networks support the orchestration and security of a DevOPS application framework.

If you are just starting with DevOPS or thinking of how you integrate security into your DevOPS process this is the perfect session for you.

13:15 – 14:00 – Infoblox

Threat Intel and orchestration of your defense

In this session, Infoblox will present their threat intelligence and the framework that they use to integrate this to firewalls, SIEMs and how SOAR platforms can look up in their platforms.

If you already use Infoblox or looking at adding threat intel to your existing security platforms, this is the session to attend.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

Help AG Security Spotlight Forum Q3 2018- Abu Dhabi

Help AG Security Spotlight Forum Q3 2018- Abu Dhabi

DATE: Sep 25 2018 TIME: 8:00 am - 3:00 pm LOCATION: Shangri-La Hotel
ADDRESS

Shangri-La Hotel
Qaryat Al Beri
Abu Dhabi
United Arab Emirates

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum that will be held in KSA and UAE and will be based on the theme of ‘Secure Cloud Enablement’.

There are a few paradigm-shifts in the technology world which promise more change than the movement to cloud in whatsoever way, shape or form the cloud is.

Cloud provides IT organizations with a whole new set of technical capabilities and functions. But this also brings with it new security requirements and a whole new set of threats to deal with.It gives us great pleasure to invite you to the upcoming Security Spotlight Forum that will be held in KSA and UAE and will be based on the theme of ‘Secure Cloud Enablement’.

There are a few paradigm-shifts in the technology world which promise more change than the movement to cloud in whatsoever way, shape or form the cloud is.

Cloud provides IT organizations with a whole new set of technical capabilities and functions. But this also brings with it new security requirements and a whole new set of threats to deal with.

Our upcoming Security Spotlight Forum is focused around how you can make the cloud secure by adding the correct solutions, policies, and procedures. If you have already moved to the cloud or if you are planning to move to the cloud this is the perfect event for you.To confirm your attendance, please send an email to  soumya.prajna@helpag.com.

Looking forward to seeing all of you there to another great day filled with information together with our partners.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Why should you attend?

  • Stay ahead when it comes to leveraging the maximum benefits from cloud
  • Understand the evolution of cyber security in the cloud era and prepare for the same
  • Learn about the latest innovations from the leaders in the field
  • Gain the first mover advantage over your counterparts

AGENDA: 

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

It’s all about the cloud – Now let us secure it

In this session, Nicolai Solling, CTO at Help AG will share how cloud applications are secured and controlled and what organizations need to consider when they move to the cloud. Our cloud security architecture is greatly inspired by many of the challenges we experienced when we started our own cloud journey. Today Help AG has a cloud-first approach, but only if we can deliver the same or similar security for our users and data.

10:00 – 10:45- Okta

Identity is the key driver of the Security-First approach

Securing your workforce and users, in the cloud, and on the go can be difficult. A recent Enterprise Strategy Group (ESG) survey discovered that for nearly 75% of organizations a username and password was the only barrier between a determined attacker and access to your critical resources.

In this session with Okta, you will learn how Identity is the new perimeter for Cyber Security. This session will cover how the use of adaptive multi-factor authentication (MFA) will benefit your users and admins, how identity protects cloud & on-prem applications, and how to go beyond MFA to manage secure access.

10:45 – 11:30 – Palo Alto Networks

Your Move To The Cloud, Secured

Building seamless, consistent security policies across on-premises and cloud IT environments can be challenging without comprehensive workload visibility. Palo Alto Networks provides organizations with the visibility and automation needed to create and update security policies in your cloud environment in real-time. Learn how you can gain greater control over your applications, automatically create consistent and uniform security policies, and prevent known and unknown threats within application flows.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Thales eSecurity

Hey…Let’s Encrypt

The single biggest inhibitor of utilizing cloud services is the perceived lack of control. With cloud services we trust someone else with our data and expect them to take good care of it – But what if they do not? Thales eSecurity is a leader in encryption management on-premises and in the cloud, and they will present how the key topic of confidentiality and data control can be extended to cloud applications. This way you still own your data…even in the cloud, in rest, in motion and even in the application.

12:30 – 13:15 – Mimecast

Honey, I just got phished

E-mail continues to be one of the most important business communication methods and therefore the single most targeted application for fraud and cyber security related incidents. In this session, our partner Mimecast will talk about the biggest issues in cloud-based e-mail solutions and how they address big issues such as CEO fraud, fraudulent invoices, common spam, and malware as well as availability and recovery of data in the most popular cloud and on-premises e-mail environments.

13:15 – 14:00 – Tenable

I feel so vulnerable

When moving to the cloud you may sometimes think that all of your security concerns are gone. Unfortunately, adopting cloud services does not mean you can forget the good old ABCs of security — vulnerability management being one of them. Tenable is the first and only provider of Cyber Exposure solutions and a leader in vulnerability management. They will talk about some of the most common mis-perceptions around cloud security and how the cloud impacts vulnerability management approaches.

They will also discuss Tenable.io Container Security, which allows you to seamlessly and securely enables DevOps processes by providing visibility into the security of container images.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

Help AG Security Spotlight Forum Q3 2018- Dubai

Help AG Security Spotlight Forum Q3 2018- Dubai

DATE: Sep 24 2018 TIME: 8:00 am - 3:00 pm LOCATION: The Westin Dubai Mina Seyahi Beach Resort & Marina
ADDRESS

The Westin Dubai Mina Seyahi Beach Resort & Marina
Dubai Marina, 213084
United Arab Emirates

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum that will be held in KSA and UAE and will be based on the theme of ‘Secure Cloud Enablement’.

There are a few paradigm-shifts in the technology world which promise more change than the movement to cloud in whatsoever way, shape or form the cloud is.

Cloud provides IT organizations with a whole new set of technical capabilities and functions. But this also brings with it new security requirements and a whole new set of threats to deal with.

Our upcoming Security Spotlight Forum is focused around how you can make the cloud secure by adding the correct solutions, policies, and procedures. If you have already moved to the cloud or if you are planning to move to the cloud this is the perfect event for you.To confirm your attendance, please send an email to soumya.prajna@helpag.com.

Looking forward to seeing all of you there to another great day filled with information together with our partners.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Why should you attend?

  • Stay ahead when it comes to leveraging the maximum benefits from cloud
  • Understand the evolution of cybersecurity in the cloud era and prepare for the same
  • Learn about the latest innovations from the leaders in the field
  • Gain the first mover advantage over your counterparts

AGENDA: 

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

It’s all about the cloud – Now let us secure it

In this session, Nicolai Solling, CTO at Help AG will share how cloud applications are secured and controlled and what organizations need to consider when they move to the cloud. Our cloud security architecture is greatly inspired by many of the challenges we experienced when we started our own cloud journey. Today Help AG has a cloud-first approach, but only if we can deliver the same or similar security for our users and data.

10:00 – 10:45- Okta

Identity is the key driver of the Security-First approach

Securing your workforce and users, in the cloud, and on the go can be difficult. A recent Enterprise Strategy Group (ESG) survey discovered that for nearly 75% of organizations a username and password was the only barrier between a determined attacker and access to your critical resources.

In this session with Okta, you will learn how Identity is the new perimeter for Cyber Security. This session will cover how the use of adaptive multi-factor authentication (MFA) will benefit your users and admins, how identity protects cloud & on-prem applications, and how to go beyond MFA to manage secure access.

10:45 – 11:30 – Palo Alto Networks

Your Move To The Cloud, Secured

Building seamless, consistent security policies across on-premises and cloud IT environments can be challenging without comprehensive workload visibility. Palo Alto Networks provides organizations with the visibility and automation needed to create and update security policies in your cloud environment in real-time. Learn how you can gain greater control over your applications, automatically create consistent and uniform security policies, and prevent known and unknown threats within application flows.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Thales eSecurity

Hey…Let’s Encrypt

The single biggest inhibitor of utilizing cloud services is the perceived lack of control. With cloud services we trust someone else with our data and expect them to take good care of it – But what if they do not? Thales eSecurity is a leader in encryption management on-premises and in the cloud, and they will present how the key topic of confidentiality and data control can be extended to cloud applications. This way you still own your data…even in the cloud, in rest, in motion and even in the application.

12:30 – 13:15 – Mimecast

Honey, I just got phished

E-mail continues to be one of the most important business communication methods and therefore the single most targeted application for fraud and cyber security related incidents. In this session, our partner Mimecast will talk about the biggest issues in cloud-based e-mail solutions and how they address big issues such as CEO fraud, fraudulent invoices, common spam, and malware as well as availability and recovery of data in the most popular cloud and on-premises e-mail environments.

13:15 – 14:00 – Tenable

I feel so vulnerable

When moving to the cloud you may sometimes think that all of your security concerns are gone. Unfortunately, adopting cloud services does not mean you can forget the good old ABCs of security — vulnerability management being one of them. Tenable is the first and only provider of Cyber Exposure solutions and a leader in vulnerability management. They will talk about some of the most common mis-perceptions around cloud security and how the cloud impacts vulnerability management approaches.

They will also discuss Tenable.io Container Security, which allows you to seamlessly and securely enables DevOps processes by providing visibility into the security of container images.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

Help AG Security Spotlight Forum Q3 2018- Riyadh

Help AG Security Spotlight Forum Q3 2018- Riyadh

DATE: Sep 17 2018 TIME: 8:00 am - 2:00 pm LOCATION: Burj Rafal Hotel Kempinski Riyadh
ADDRESS

Burj Rafal Hotel Kempinski
Riyadh
Saudi Arabia

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum that will be held in KSA and UAE and will be based on the theme of ‘Secure Cloud Enablement’.

There are a few paradigm-shifts in the technology world which promise more change than the movement to cloud in whatsoever way, shape or form the cloud is.

Cloud provides IT organizations with a whole new set of technical capabilities and functions. But this also brings with it new security requirements and a whole new set of threats to deal with.

Our upcoming Security Spotlight Forum is focused around how you can make the cloud secure by adding the correct solutions, policies and procedures. If you have already moved to the cloud or if you are planning to move to the cloud this is the perfect event for you.To confirm your attendance, please send an email to soumya.prajna@helpag.com.

Looking forward seeing all of you there to another great day filled with information together with our partners.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Why you should attend?

  • Stay ahead when it comes to leveraging the maximum benefits from cloud
  • Understand the evolution of cybersecurity in the cloud era and prepare for the same
  • Learn about the latest innovations from the leaders in the field
  • Gain the first mover advantage over your counterparts

AGENDA: 

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

It’s all about the cloud – Now let us secure it

In this session Nicolai Solling, CTO at Help AG will share how cloud applications are secured and controlled and what organizations need to consider when they move to the cloud. Our cloud security architecture is greatly inspired by many of the challenges we experienced when we started our own cloud journey. Today Help AG has a cloud first approach, but only if we can deliver the same or similar security for our users and data.

10:00 – 10:45- Palo Alto Networks

Your Move To The Cloud, Secured

Building seamless, consistent security policies across on-premises and cloud IT environments can be challenging without comprehensive workload visibility. Palo Alto Networks provides organizations with the visibility and automation needed to create and update security policies in your cloud environment in real-time. Learn how you can gain greater control over your applications, automatically create consistent and uniform security policies, and prevent known and unknown threats within application flows.

10:45 – 11:30 –Thales eSecurity

Hey…Let’s Encrypt

The single biggest inhibitor of utilizing cloud services is the perceived lack of control. With cloud services we trust someone else with our data and expect them to take good care of it – But what if they do not? Thales eSecurity is a leader in encryption management on-premises and in cloud, and they will present how the key topic of confidentiality and data control can be extended to cloud applications. This way you still own your data…even in the cloud, in rest, in motion and even in the application.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Mimecast

Honey, I just got phished

E-mail continues to be one of the most important business communication methods and therefore the single most targeted application for fraud and cyber security related incidents. In this session our partner Mimecast will talk about the biggest issues in cloud-based e-mail solutions and how they address big issues such as CEO fraud, fraudulent invoices, common spam and malware as well as availability and recovery of data in the most popular cloud and on-premises e-mail environments.

12:30 – 13:15 – Tenable

I feel so vulnerable

When moving to the cloud you may sometimes think that all of your security concerns are gone. Unfortunately, adopting cloud services does not mean you can forget the good old ABCs of security — vulnerability management being one of them. Tenable is the first and only provider of Cyber Exposure solutions and a leader in vulnerability management. They will talk about some of the most common mis-perceptions around cloud security and how the cloud impacts vulnerability management approaches.

They will also discuss Tenable.io Container Security, which allows you to seamlessly and securely enables DevOps processes by providing visibility into the security of container images.

13:15 – 14:00 –  Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cyber security decision makers across different verticals. )

Help AG Security Spotlight Forum Q2 2018- Abu Dhabi

Help AG Security Spotlight Forum Q2 2018- Abu Dhabi

DATE: Jun 26 2018 TIME: 8:00 am - 3:00 pm LOCATION: Jumeirah at Etihad Towers
ADDRESS

Jumeirah at Etihad Towers
West Corniche
Abu Dhabi 111929
United Arab Emirates

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum to be held in Abu Dhabi on 26 June 2018.

Artificial Intelligence and Machine Learning are changing and optimizing many aspects of life – Cyber Security is no different, where many of the enhancements in platforms are powered by advanced technologies and applying computing power to advanced security questions.

In this Security Spotlight Forum you will get an under-the-hood sneak peek of how our vendor platforms are utilizing to make their platforms even smarter.To confirm your attendance, please send an email to soumya.prajna@helpag.com.

We look forward to seeing you.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Why you should attend?

  • To distinguish between the hype and reality of AI and machine learning
  • Understand the implications of AI & ML in cybersecurity
  • Stay ahead of threat actors who are already using AI for smarter attacks
  • Learn about the latest innovations from the leaders in the field
  • Gain the first mover advantage over your counterparts

AGENDA:

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

Practical Implementations of AI and use-cases in Cyber Security

Nicolai Solling, CTO at Help AG and Dr. Aleksandar Valjarevic, Head of Solution Architecture, Help AG will go over some of the most common applications of artificial intelligence, where we are seeing the major use-cases in security both for us as the leading Managed Security Services provider in the region as well as for our clients.

10:00 – 10:45- Infoblox

Both good and bad network flows start with a DNS request – Machine Learning Powers the detection

Infoblox is the leader in DNS and IPAM Security. The algorithms powering their DNS signature sets and exfiltration protection capabilities on their platforms are utilizing AI and machine learning to make automated security decisions for you.

10:45 – 11:30 – F5 Networks

Securing Multi-Cloud Infrastructure with Machine Learning & AI using F5 Advanced WAF

F5 is using machine learning in a number of applications in their platform, but specifically with the Advanced WAF platform they are bringing this technology to the clients to identify web-attacks before they have an impact.

Today security decisions are increasingly decided by automated algorithms and behavioural assessment of clients, hereby allowing us to not just detect the known, but also unknown attacks.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Fortinet

The platform is the product and it is powered by ML and AI

Analysts often highlight that the modern cyber security solutions are much more than just the hardware and software they run on. True protection comes from a platform, which is powered by threat intelligence and behavioural analytics. In some way you can say that the platform is becoming increasingly a key to achieve efficient protection.

In this session Fortinet will present how they use AI and Machine Learning both in the cloud as well as on-premises to power their detection and prevention capabilities.

12:30 – 13:15 – Symantec

AI and Machine Learning make threat detection smart – In network and on the endpoint

From endpoint to event management Symantec utilizes AI and machine learning to identify new attacks even when clients are disconnected. Understand and learn more about how AI is powering not just detection but also classification of events from your Symantec infrastructure.

13:15 – 14:00 – Splunk

Data speaks to you…Machine Learning makes you understand

Splunk is all about big data and AI is just the next step of quickly making sense of all the bits and bytes being indexed and queried. With the Splunk UBA AI and machine learning is brought directly on-premises for clients and allow organizations to make better decisions on which events to focus your analyst time on.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands on demonstration.

For any information about the event, contact Soumya Prajna (Soumya.prajna@helpag.com ).

(Note: The event is targeted at cyber security decision makers across different verticals. )

Help AG Security Spotlight Forum Q2 2018- Dubai

Help AG Security Spotlight Forum Q2 2018- Dubai

DATE: Jun 25 2018 TIME: 8:00 am - 3:00 pm LOCATION: The Westin Dubai Mina Seyahi Beach Resort & Marina
ADDRESS

The Westin Dubai Mina Seyahi Beach Resort & Marina
Dubai Marina, 213084
United Arab Emirates

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum to be held in Dubai on 25 June 2018.

Artificial Intelligence and Machine Learning are changing and optimizing many aspects of life – Cyber Security is no different, where many of the enhancements in platforms are powered by advanced technologies and applying computing power to advanced security questions.

In this Security Spotlight Forum you will get an under-the-hood sneak peek of how our vendor platforms are utilizing to make their platforms even smarter. To confirm your attendance, please send an email to soumya.prajna@helpag.com.

We look forward to seeing you.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Why you should attend?

  • To distinguish between the hype and reality of AI and machine learning
  • Understand the implications of AI & ML in cyber security
  • Stay ahead of threat actors who are already using AI for smarter attacks
  • Learn about the latest innovations from the leaders in the field
  • Gain the first mover advantage over your counterparts

AGENDA:

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

Practical Implementations of AI and use-cases in Cyber Security

Nicolai Solling, CTO at Help AG and Dr. Aleksandar Valjarevic, Head of Solution Architecture, Help AG will go over some of the most common applications of artificial intelligence, where we are seeing the major use-cases in security both for us as the leading Managed Security Services provider in the region as well as for our clients.

10:00 – 10:45- Infoblox

Both good and bad network flows start with a DNS request – Machine Learning Powers the detection

Infoblox is the leader in DNS and IPAM Security. The algorithms powering their DNS signature sets and exfiltration protection capabilities on their platforms are utilizing AI and machine learning to make automated security decisions for you.

10:45 – 11:30 – F5 Networks

Securing Multi-Cloud Infrastructure with Machine Learning & AI using F5 Advanced WAF

F5 is using machine learning in a number of applications in their platform, but specifically with the Advanced WAF platform they are bringing this technology to the clients to identify web-attacks before they have an impact.

Today security decisions are increasingly decided by automated algorithms and behavioural assessment of clients, hereby allowing us to not just detect the known, but also unknown attacks.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Fortinet

The platform is the product and it is powered by ML and AI

Analysts often highlight that the modern cyber security solutions are much more than just the hardware and software they run on. True protection comes from a platform, which is powered by threat intelligence and behavioural analytics. In some way you can say that the platform is becoming increasingly a key to achieve efficient protection.

In this session Fortinet will present how they use AI and Machine Learning both in the cloud as well as on-premises to power their detection and prevention capabilities.

12:30 – 13:15 – Symantec

AI and Machine Learning make threat detection smart – In network and on the endpoint

From endpoint to event management Symantec utilizes AI and machine learning to identify new attacks even when clients are disconnected. Understand and learn more about how AI is powering not just detection but also classification of events from your Symantec infrastructure.

13:15 – 14:00 – Splunk

Data speaks to you…Machine Learning makes you understand

Splunk is all about big data and AI is just the next step of quickly making sense of all the bits and bytes being indexed and queried. With the Splunk UBA AI and machine learning is brought directly on-premises for clients and allow organizations to make better decisions on which events to focus your analyst time on.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands on demonstration.

For any information about the event, contact Soumya Prajna (Soumya.prajna@helpag.com ).

(Note: The event is targeted at cyber security decision makers across different verticals. )

2017 BCS ICT CONFERENCE

2017 BCS ICT CONFERENCE

DATE: Oct 29 2017 TIME: 8:00 am - 4:00 pm LOCATION: Anantara Eastern Mangroves Hotel
ADDRESS

Anantara Eastern Mangroves Hotel
Sheikh Zayed Street
Abu Dhabi
128555 United Arab Emirates

UNDER THE PATRONAGE OF

Sheikh Nahayan Mabarak Al Nahyan

UAE Minister of Culture & Knowledge Development

2017 BCS ICT

CONFERENCE

 

 

Innovation: Technologies for the Future

More details coming soon.

Help AG Security Spotlight Forum Q4 2017 – Abu Dhabi

Help AG Security Spotlight Forum Q4 2017 – Abu Dhabi

DATE: Oct 24 2017 TIME: 9:00 am - 3:00 pm LOCATION: Jumeirah Etihad Towers Hotel
ADDRESS

Jumeirah Etihad Towers Hotel
Abu Dhabi
United Arab Emirates

It gives us immense pleasure to invite you to our Security Spotlight Forum.

Looking at the events in 2017 Cyber Security issues continues to be the single most important problem to handle in modern organization.

Security Spotlight Forum brings some innovations around how we organize the event in the sense that we are building a theme based agenda, allowing you to focus your time better.

The topic of this Security Spotlight Forum is Visibility.To confirm your attendance, please send an email to Jenalyn.Dimaculangan@helpag.com

The whole Help AG team is really looking forward welcoming you and spending some informative hours with you.

As always we will make sure that you are well cared for and that there is a prize for one lucky winner who have participated the full day.

Best Regards,

Stephan Berner

Managing Director, Help AG Middle East


AGENDA:

9:00 – 10:00 – Opening Remarks

By Nicolai Solling – Director of Technology Services, Help AG
Today visibility is the cornerstone of good Cyber Security defenses and we are working with some of our most prominent vendor partners to bring you a relevant and interesting agenda on how you can do things differently, more efficiently and benefit more from both existing and upcoming security investments. Nicolai Solling, CTO at Help AG will shed some light on the importance of visibility and the innovations we have seen in this space in the recent times.

10:00 – 10:45- SkyBox Security

SkyBox Security is the leading Security Device Management vendor in the market. They assist you in optimizing your firewall policies, not only from a rules perspective but also how you apply the protection mechanisms of your cyber security infrastructure to the vulnerabilities you have in your IT environment.

They receive information from your vulnerability scanners, build a representation of where you are vulnerable and also recommends policy changes to mitigate the vulnerability.

Would it not be nice if intelligent management of your Firewalls, Proxies and other L7 devices could allow you to plan and schedule your patch management cycle better? This is what they do. Moreover, Skybox provides a threat intelligence management system that consolidates multiple threat intelligence feeds, then performs threat analysis to determine potential impacts automatically. In minutes, you’ll be able to respond to emerging threats.

Skybox Security is also part of Help AG’s Managed Services Offering, where we take over the hassle for you of operating and running the solution while you still benefit from the great insights it delivers.

10:45 – 11:30 – vArmour

vArmour is one of the leading next-generation security platforms for virtual and physical compute environments. They deliver a solution which allows you to create micro-segmentation of your datacenter for both your virtual servers, but also your physical environment and creating a single enforcement and visibility fabric. Some of you may already have started thinking of micro-segmentation or even started on the journey. What you will find is that the key issue in micro-segmentation is not just the infrastructure, architecture and creating the correct visibility, but actually figuring out the policy to enforce between servers. In this area vArmour enables you to quickly architect policies and functions.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Attivo Networks

Attivo Networks is one of the leading vendors in the rapidly evolving area of internal deception technologies. Most Cyber Security investments are focused around preventing the attack in the first place, but yet we see time after time that this approach was not successful. Attivo takes a different approach by focusing on detecting the attackers inside the network. Through their unique technology they place traps on endpoints and within the network and then engage in a cat-and-mouse game with the attacker, hereby allowing early detection of malicious activity but we also gain valuable information of the attackers in the process. Attivo Networks is part of the Help AG Managed Services offering, which we handle the hassle of setting up the solution and monitoring events and you simply have to lean back and wait for the call that something is happening – We of course hope that never happens!

12:30 – 13:15 – Cisco Systems

Cisco Systems needs no real further introduction, but did you know that Cisco delivers one of the most comprehensive and capable visibility solution for your infrastructure, network and endpoint? By deploying Cisco Stealthwatch you utilize your existing network and security infrastructure from Cisco, Palo Alto Network, Fortinet and many other vendors and baseline the normal behavior of every single host. This means that if your IP phones suddenly start to connect to your SMB shares or other services they did not use to utilize you will immediately be informed. On your endpoints you can get visibility down to which process on a machine created a malicious activity and even the user using the application – Again a great way of identifying malware behavior or maybe you just want to know which version of applications your users are utilizing. The StealthWatch solution integrates into PxGrid, which allows us to take automatic remediation actions in solutions such as Cisco ISE or other PxGrid enabled solution.

13:15 – 14:00 – SPLUNK

SPLUNK is in the business of creating visibility of any kind of machine based data. Within Cyber Security operations making sense of the data that all your systems are generation is imperative, but you may also be interested in how you create visibility of the IT operations and response times for your critical applications or business processes. The flexibility of SPLUNK means you create a platform which can index any data source and we will then help you make sense of it.

The use-cases we generate for our clients are almost only limited by imagination, but how about integrating data from your physical access control system in your building with logs from your remote access solution? Should anyone inside the building really be connecting over a VPN connection to the corporate network? This and much more is available with SPLUNK. Help AG built our MSS environment on SPLUNK and we are today the largest and most competent SPLUNK partner in the region.

14:00 – 15:00 – Lunch

Load more

Ready to secure your information infrastructure and assets?

Learn More

Our story, our services and the mission that guides us forth.

Learn More

Back to Top