Has your cybersecurity been compromised?





We respect your privacy, and we hate spam as much as you. Which is why we will never share your email address with anyone.

Enquire Now

EVENTS

We know that great things can be achieved when we come together as a community. This is why we organise a variety of events and conferences across the Middle East. Through these events, we share knowledge, celebrate new technologies and discuss ways to transform the global information security ecosystem.

Past Events

Help AG Security Spotlight Forum Q3-2019- Abu Dhabi

Help AG Security Spotlight Forum Q3-2019- Abu Dhabi

DATE: Sep 24 2019 TIME: 8:30 am - 2:00 pm LOCATION: Abu Dhabi
ADDRESS
The St Regis Abu Dhabi

It gives us great pleasure to invite you for our Q3 Security Spotlight Forum.

There has probably never been a technology area with greater expectations than AI and ML; in cybersecurity this is no different. As with any technology, with such expectations also come hype and market positioning.

Our previous Security Spotlight Forum on AI was hugely popular, and we received great feedback from our clients . This time we are taking it one step further, by covering real life cybersecurity use cases and products, which have AI in the core of their solution. One of the key developments we have observed around AI in cybersecurity is that today it not just prevention and detection that are powered by AI and ML, but also security operations, which is benefiting from automated, intelligent decision making.

We are looking forward to seeing you for another fact-filled day with some of the best vendors in the industry.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Registrations will begin at 08: 30.

09:00 – 10:00 – Opening Remarks by Help AG

10:00 – 10:20 –  AIDirections

What is AI, and what is it not?

As a first in our Security Spotlight Forum we have asked an external partner to assist in bringing knowledge around the general topic of AI.

AIDirections is a UAE based company focusing on consultancy and solutions around the use of Artificial Intelligence; the consultancy includes awareness, AI readiness and AI strategy, the solutions include various application of computer vision and machine intelligence . They are good friend of Help AG as Dr. Angelika Eksteen also serves in an advisory role to Help AG. Dr. Angelika has promised to give us not only a little insight to what AI is but also what it is not and where we currently stand with AI implementations.

10.20 – 11.00 –  Tenable

Predictive Prioritization of Threats

Tenable has come a long way from the days when they provided the world’s most widely used vulnerability scanner called Nessus. They are bringing new predictive analysis features to their Tenable.io and Tenable.sc (Formerly Security Center) which utilize information about your vulnerabilities, advanced data-mining and machine learning to prioritize which vulnerabilities you should really focus on fixing. Their capabilities allow you to circle in on the 3% of vulnerabilities which are most likely to be exploited in the next 28 days, making your vulnerability management process much more efficient.

11.00- 11.40 –  Splunk

Threat Hunting with Machine Learning

In this session, Splunk will delve deep into operationalization of ML to detect domain generating algorithms in your environment. Splunk’s approach to security, is to ingest almost any kind of data from almost any source, in real-time or historical, and then apply cutting edge AI and ML capabilities — predictive analytics, event management and analytics, clustering, adaptive and statistical thresholding, anomaly detection, in order to detect both known and unknown threats. Don’t miss out the demo on Killchain C&C!

11.40- 12.00  –  Coffee Break

12.00- 12.40 –  F5 Networks

Attacks are Advanced, so should your WAF be

The source of most attacks, regardless of type, is automated. DDoS attacks, data breaches, vulnerability scans, credential stuffing, brute force, resource hoarding, and other attack types are almost all automated. Attackers use automation to launch large-scale attacks and probe for vulnerabilities to lower the cost of the attack and make Cyber Crime a lucrative business.

F5 Advanced WAF uses advanced analytics and machine learning to generate dynamic protection against both automated and manually created attacks without administrator intervention and advanced technical capabilities, hence allowing to create better prevention that focuses on behavior instead of protecting against the unpredictable.

If you are already an F5 user and wish to do WAF smarter, or if you are faced with the challenge of protecting publicly facing websites this session is a great introduction to how you can move to attack prevention at scale.

12.40- 13.20 –  Vectra

Network traffic does not lie!

Vectra is the world leader in applying artificial intelligence to detect and respond to cyberattacks in cloud, data center and enterprise infrastructures in real time, while empowering security analysts to perform conclusive incident investigations and AI-assisted threat hunting. The company’s Cognito Network Detection and Response platform applies machine learning to network traffic captured by physical or virtual sensors within the customers’ infrastructures and connects the dots in your communication and data-flows streaming between clients and servers. This helps detect behavioral abnormalities and attacker behaviors utilized by cybercriminals who are otherwise invisible to conventional cybersecurity detection methods.

The solution is built and architected with confidentiality in mind and allows customers to harness the power of AI without offloading data to the cloud or relying on third-party organizations getting access to confidential network information.

13.20- 14.00 –  Carbon Black

Investigation Made Easier: Better Data. Better Decisions.

Endpoint security is going through a massive transformation. Whereas traditional antivirus relies on first knowing that a certain piece of malware exists, and then producing a signature or updating a machine learning model to stop it, the next generation of endpoint security is built to predict and prevent both known and unknown threats using big data and analytics, without having to see a malicious file first.

The key to getting endpoint security right? The data — the best protection comes from the most complete data.

And endpoint data has been at the heart of Carbon Black’s technology ever since their founding.

In this session you will learn how Carbon Black uses endpoint data to integrate and implement AI and ML based platforms to make better predictive analysis of what is happening on your endpoints and turning that into robust prevention.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

Help AG Security Spotlight Forum Q3-2019- Dubai

Help AG Security Spotlight Forum Q3-2019- Dubai

DATE: Sep 23 2019 TIME: 8:30 am - 2:00 pm LOCATION: Dubai
ADDRESS
JW Marriott Marquis Hotel Dubai

It gives us great pleasure to invite you for our Q3 Security Spotlight Forum.

There has probably never been a technology area with greater expectations than AI and ML; in cybersecurity this is no different. As with any technology, with such expectations also come hype and market positioning.

Our previous Security Spotlight Forum on AI was hugely popular, and we received great feedback from our clients . This time we are taking it one step further, by covering real life cybersecurity use cases and products, which have AI in the core of their solution. One of the key developments we have observed around AI in cybersecurity is that today it not just prevention and detection that are powered by AI and ML, but also security operations, which is benefiting from automated, intelligent decision making.

We are looking forward to seeing you for another fact-filled day with some of the best vendors in the industry.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Registrations will begin at 08: 30.

09:00 – 10:00 – Opening Remarks by Help AG

10:00 – 10:20 –  AIDirections

What is AI, and what is it not?

As a first in our Security Spotlight Forum we have asked an external partner to assist in bringing knowledge around the general topic of AI.

AIDirections is a UAE based company focusing on consultancy and solutions around the use of Artificial Intelligence; the consultancy includes awareness, AI readiness and AI strategy, the solutions include various application of computer vision and machine intelligence . They are good friend of Help AG as Dr. Angelika Eksteen also serves in an advisory role to Help AG. Dr. Angelika has promised to give us not only a little insight to what AI is but also what it is not and where we currently stand with AI implementations.

10.20 – 11.00 –  Tenable

Predictive Prioritization of Threats

Tenable has come a long way from the days when they provided the world’s most widely used vulnerability scanner called Nessus. They are bringing new predictive analysis features to their Tenable.io and Tenable.sc (Formerly Security Center) which utilize information about your vulnerabilities, advanced data-mining and machine learning to prioritize which vulnerabilities you should really focus on fixing. Their capabilities allow you to circle in on the 3% of vulnerabilities which are most likely to be exploited in the next 28 days, making your vulnerability management process much more efficient.

11.00- 11.40 –  Splunk

Threat Hunting with Machine Learning

In this session, Splunk will delve deep into operationalization of ML to detect domain generating algorithms in your environment. Splunk’s approach to security, is to ingest almost any kind of data from almost any source, in real-time or historical, and then apply cutting edge AI and ML capabilities — predictive analytics, event management and analytics, clustering, adaptive and statistical thresholding, anomaly detection, in order to detect both known and unknown threats. Don’t miss out the demo on Killchain C&C!

11.40- 12.00  –  Coffee Break

12.00- 12.40 –  F5 Networks

Attacks are Advanced, so should your WAF be

The source of most attacks, regardless of type, is automated. DDoS attacks, data breaches, vulnerability scans, credential stuffing, brute force, resource hoarding, and other attack types are almost all automated. Attackers use automation to launch large-scale attacks and probe for vulnerabilities to lower the cost of the attack and make Cyber Crime a lucrative business.

F5 Advanced WAF uses advanced analytics and machine learning to generate dynamic protection against both automated and manually created attacks without administrator intervention and advanced technical capabilities, hence allowing to create better prevention that focuses on behavior instead of protecting against the unpredictable.

If you are already an F5 user and wish to do WAF smarter, or if you are faced with the challenge of protecting publicly facing websites this session is a great introduction to how you can move to attack prevention at scale.

12.40- 13.20 –  Vectra

Network traffic does not lie!

Vectra is the world leader in applying artificial intelligence to detect and respond to cyberattacks in cloud, data center and enterprise infrastructures in real time, while empowering security analysts to perform conclusive incident investigations and AI-assisted threat hunting. The company’s Cognito Network Detection and Response platform applies machine learning to network traffic captured by physical or virtual sensors within the customers’ infrastructures and connects the dots in your communication and data-flows streaming between clients and servers. This helps detect behavioral abnormalities and attacker behaviors utilized by cybercriminals who are otherwise invisible to conventional cybersecurity detection methods.

The solution is built and architected with confidentiality in mind and allows customers to harness the power of AI without offloading data to the cloud or relying on third-party organizations getting access to confidential network information.

13.20- 14.00 –  Carbon Black

Investigation Made Easier: Better Data. Better Decisions.

Endpoint security is going through a massive transformation. Whereas traditional antivirus relies on first knowing that a certain piece of malware exists, and then producing a signature or updating a machine learning model to stop it, the next generation of endpoint security is built to predict and prevent both known and unknown threats using big data and analytics, without having to see a malicious file first.

The key to getting endpoint security right? The data — the best protection comes from the most complete data.

And endpoint data has been at the heart of Carbon Black’s technology ever since their founding.

In this session you will learn how Carbon Black uses endpoint data to integrate and implement AI and ML based platforms to make better predictive analysis of what is happening on your endpoints and turning that into robust prevention.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

 

 

Help AG Security Spotlight Forum Q2-2019- Abu Dhabi

Help AG Security Spotlight Forum Q2-2019- Abu Dhabi

DATE: Jun 26 2019 TIME: 8:30 am - 3:00 pm LOCATION: Abu Dhabi
ADDRESS
Shangri-La Hotel, Qaryat al Beri

It gives us great pleasure to invite you for our Q2 Security Spotlight Forum.

This time the theme is integration of platforms, and how cybersecurity is growing smarter and more efficient through the use of integrated platforms and orchestration capabilities. We will also cover how user behavior analytics creates higher fidelity events which are risk-focused instead of the traditional event-based approach. In addition, we will also shine the spotlight on a key, but often overlooked, capability in the creation of any zero-trust architecture which is controlling and managing and governing privileged accounts.

We are looking forward seeing you for another fact-filled day with some of the best vendors in the industry.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


AGENDA: 

Registrations will begin at 08: 30.

9:00 – 10:00 – Opening Remarks by Help AG

10:00 – 10:45- Palo Alto Networks 

The Enterprise Security Company

No one talks and delivers a cybersecurity platform that is more integrated than Palo Alto Networks. Their recent developments in endpoint, network and cloud security deliver not only a single pane of glass for all your security events, but also allow you to automatically enforce and prevent cyber-attacks across all mentioned attack vectors.

10:45 – 11:30 – Demisto

Security Orchestration and Automation at Scale

Demisto was recently acquired by Palo Alto, but is operating as a separate entity within Palo Alto Networks. There is a good reason for this, for when you identify an attack, you will need to orchestrate to other security devices, general IT systems and your analysts. Demisto delivers a SOAR platform recognized for its ability to deliver the glue that interconnects systems and automates and enriches event information – tasks that are often very manual and cumbersome even in the most advanced Cyber Security Operations and SOC environments.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 –Exabeam

Finding the Needle in the Haystack of Security Events

Exabeam is the market leader in User Entity Behavior Analytics. UEBA is often referred to as the next generation of SIEM as it delivers a risk-based approach to your users and events in your network. There is no doubt that the major issue in any SOC and Security Operations is to quantify and classify events and focus on what is required; a risk-based approach does exactly that by focusing on behaviour of an entity or user, hence allowing your analysts and security staff to spend their time much more wisely.

12:30 – 13:15 –Proofpoint

When E-mails, Brand & Your Greatest Assets – People –  have to be Secure

Proofpoint is the market leader in Enterprise Email security offering the most effective security and compliance solutions to respond to cyber-attacks in every channel including email, the web, the cloud, and social media. Their unique People Centric Security approach protects your organisations’ greatest assets and biggest risks-your people. We are celebrating that Proofpoint have opened their Middle Eastern operation by adding them to the Help AG portfolio. Their integration with Palo Alto and other leading cybersecurity platforms means you can benefit even more from your existing investments by utilizing Proofpoint.

13:15 – 14:00 –BeyondTrust

Delivering Identity based Zero-Trust Computing

Nothing should make you more worried than the concern around how your privileged accounts are being utilized. The power you grant in your system administrator accounts can be abused and a simple username and password ending up in the wrong hands can be devastating to any organization. BeyondTrust is the leader in innovative privileged account management solutions, and with the acquisition of Bomgar, Lieberman software and Avecto, the solution also extends to remote-access connections, remote support and all privilege management on endpoints.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

 

Help AG Security Spotlight Forum Q2-2019- Dubai

Help AG Security Spotlight Forum Q2-2019- Dubai

DATE: Jun 25 2019 TIME: 8:30 am - 3:00 pm LOCATION: Dubai
ADDRESS
JW Marriott Marquis Hotel Dubai

It gives us great pleasure to invite you for our Q2 Security Spotlight Forum.

This time the theme is integration of platforms, and how cybersecurity is growing smarter and more efficient through the use of integrated platforms and orchestration capabilities. We will also cover how user behavior analytics creates higher fidelity events which are risk-focused instead of the traditional event-based approach. In addition, we will also shine the spotlight on a key, but often overlooked, capability in the creation of any zero-trust architecture which is controlling and managing and governing privileged accounts.

We are looking forward seeing you for another fact-filled day with some of the best vendors in the industry.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


AGENDA: 

Registrations will begin at 08: 30.

9:00 – 10:00 – Opening Remarks by Help AG

10:00 – 10:45- Palo Alto Networks 

The Enterprise Security Company

No one talks and delivers a cybersecurity platform that is more integrated than Palo Alto Networks. Their recent developments in endpoint, network and cloud security deliver not only a single pane of glass for all your security events, but also allow you to automatically enforce and prevent cyber-attacks across all mentioned attack vectors.

10:45 – 11:30 – Demisto

Security Orchestration and Automation at Scale

Demisto was recently acquired by Palo Alto, but is operating as a separate entity within Palo Alto Networks. There is a good reason for this, for when you identify an attack, you will need to orchestrate to other security devices, general IT systems and your analysts. Demisto delivers a SOAR platform recognized for its ability to deliver the glue that interconnects systems and automates and enriches event information – tasks that are often very manual and cumbersome even in the most advanced Cyber Security Operations and SOC environments.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 –Exabeam

Finding the Needle in the Haystack of Security Events

Exabeam is the market leader in User Entity Behavior Analytics. UEBA is often referred to as the next generation of SIEM as it delivers a risk-based approach to your users and events in your network. There is no doubt that the major issue in any SOC and Security Operations is to quantify and classify events and focus on what is required; a risk-based approach does exactly that by focusing on behaviour of an entity or user, hence allowing your analysts and security staff to spend their time much more wisely.

12:30 – 13:15 –Proofpoint

When E-mails, Brand & Your Greatest Assets – People –  have to be Secure

Proofpoint is the market leader in Enterprise Email security offering the most effective security and compliance solutions to respond to cyber-attacks in every channel including email, the web, the cloud, and social media. Their unique People Centric Security approach protects your organisations’ greatest assets and biggest risks-your people. We are celebrating that Proofpoint have opened their Middle Eastern operation by adding them to the Help AG portfolio. Their integration with Palo Alto and other leading cybersecurity platforms means you can benefit even more from your existing investments by utilizing Proofpoint.

13:15 – 14:00 –BeyondTrust

Delivering Identity based Zero-Trust Computing

Nothing should make you more worried than the concern around how your privileged accounts are being utilized. The power you grant in your system administrator accounts can be abused and a simple username and password ending up in the wrong hands can be devastating to any organization. BeyondTrust is the leader in innovative privileged account management solutions, and with the acquisition of Bomgar, Lieberman software and Avecto, the solution also extends to remote-access connections, remote support and all privilege management on endpoints.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

 

MALWARE ANALYSIS AND REVERSE ENGINEERING TECHNICAL SESSION

MALWARE ANALYSIS AND REVERSE ENGINEERING TECHNICAL SESSION

DATE: Apr 21 2019 TIME: 8:30 am - 2:30 pm LOCATION: Dubai
ADDRESS
Fairmont The Palm, Palm Jumeirah

Want to see malware reverse engineering in practice? See below… this is a technical session by technical experts for technical practitioners! Help AG is organizing the session, in association with Palo Alto Networks.

> Cmd: register_2_attend;

# Who: Security, Network, Endpoint, Cloud practitioners;

# Why: ‘2 understand malware u need to become malware’

# Delivery: expert; technical; in-depth;

# Outcomes: Know your enemy; Replicate what u learn; Prevent malware at scale;

Agenda:

08:30: Welcome Coffee

09:00-09:20: Introductory session by Help AG

09:20-10:00: How does malware and exploit works?

10:00-10:30: Different stages of malware

10:30-11:00: Coffee networking

11:00-11:40: Malware techniques and difference between Malware and Exploit

11:40-12:00: Obfuscation and Encryption

12:00-13:00: Lunch networking

13:00-13:30: Discussion on real world campaigns

13:30-14:00: Palo Alto Traps

14:00-14:30: Palo Alto XDR

Contact soumya.prajna@helpag.com for any information regarding the event.

(NOTE: Online registrations will be vetted and confirmation will be sent by email/calendar invite from Help AG.)

Help AG Security Spotlight Forum Q1-2019- Abu Dhabi

Help AG Security Spotlight Forum Q1-2019- Abu Dhabi

DATE: Mar 27 2019 TIME: 8:00 am - 3:00 pm LOCATION: Jumeirah at Etihad Towers
ADDRESS
Abu Dhabi

This event will focus on Zero Trust and the evolution of the concept since its definition in 2014.

When the term, Zero Trust, was first coined by Forrester in 2014, most organizations looked at it from the perspective of the network and micro-segmentation. But today, the concept encompasses much more. Cloud, Identity, Threat Intelligence, Privileged Access Management, and Data Protection are all elements of a comprehensive and robust approach to Zero Trust IT.

Nicolai Solling, CTO, Help AG will go through Help AG’s Zero Trust Model, which has been deployed in a number of organizations. Following the Security Spotlight Forum’s format for success, we have asked some of our vendor partners that are delivering the building blocks to Zero Trust to delve deeper and explain how their solutions can help you meet the requirements of Zero Trust. As always, these vendors will keep their presentation open and interactive and will prepare demos of their solutions.

If you have already started your zero-trust journey, or are just starting out, this is a great event which will tell you how the positive impact of the most powerful cybersecurity solutions can be magnified when they are integrated and talking to each other.


AGENDA

09:00 – 09:20:  Registration and Welcome

09:20 – 10:00:   Help AG: Zero Trust, what is it and where can you start

In this session, Nicolai Solling, CTO, Help AG will cover what Zero Trust is, how the concept has evolved and how you can get started or enhance your current deployment of Zero Trust.

10:00 – 10:40:    Symantec: Data Protection On-Premises and in the Cloud

Zero Trust is about ensuring that the right systems, people and applications can access each other in the right way, but protecting data is equally important. In this session, Symantec will explain how they use DLP, CASB and native encryption capabilities to ensure that data can only be accessed by those who it is intended for, both on-premises as well as in the cloud.

10:40 –  11:20:    Fortinet: The Zero Trust Enforcement Point

The firewall is an increasingly important enforcement point of traffic within the network. When integrated with other devices, a firewall can be enhanced by richer context and intelligence and thereby enabled to act as an orchestration device for other devices in order to make the right decision.

11:20  – 12:00:    Coffee break and refreshments

12:00 – 12.40:     Infoblox: How Secure DNS is a clear element of Zero Trust

One of the main reasons we implement Zero Trust in the first place is to avoid cyber-attacks such as the spread of malware and exfiltration of data. As both good and bad network actions start with a DNS request, the security benefits of inspecting DNS can be significant.

In this session, Infoblox will cover how just small changes and investments to your infrastructure can significantly increase your ability to block Command and Control as well as other malicious DNS attacks.

12:40 – 13:20:     Pulse Secure: Identity, the Foundation of Zero Trust

Pulse Secure delivers one of the strongest access control solutions for remote users, network users as well as users connecting to cloud applications. Utilizing identity information as well as the security posture of the devices allows organizations to make clever decisions regarding who should have access to what, and from which device and location. By offering a flexible path to SDP, the company extends its foundation of Zero Trust access for hybrid IT and provides enterprises and service providers unrivaled provisioning simplicity, security posture fortification and lower total cost of ownership.  Also, learn why Help AG is successful in deploying NAC with Pulse Secure in organizations ranging from 10 users to 10,000 users!

13:20 – 14:00:     Skybox Security: Zero Trust Starts with Visibility

Complete and accurate visibility underpins every aspect of the Zero Trust framework. In order to create effective micro perimeters, you have to understand your infrastructure, how well it’s aligned to the goals designed in security policies and where risks lie.

In this session, Skybox Security will discuss how the visibility of the hybrid network and asset layer combine to give you the insight needed to implement and maintain the Zero Trust model.

(P.S. This event is exclusively for security and ICT decision makers in enterprises across the UAE. Online registrations will be vetted and confirmation will be sent by email.) 

Help AG Security Spotlight Forum Q1-2019- Dubai

Help AG Security Spotlight Forum Q1-2019- Dubai

DATE: Mar 26 2019 TIME: 8:30 am - 3:00 pm LOCATION: One&Only Royal Mirage, King Salman Bin Abdulaziz Al Saud St - Dubai
ADDRESS
Dubai

This event will focus on Zero Trust and the evolution of the concept since its definition in 2014.

When the term, Zero Trust, was first coined by Forrester in 2014, most organizations looked at it from the perspective of the network and micro-segmentation. But today, the concept encompasses much more. Cloud, Identity, Threat Intelligence, Privileged Access Management, and Data Protection are all elements of a comprehensive and robust approach to Zero Trust IT.

Nicolai Solling, CTO, Help AG will go through Help AG’s Zero Trust Model, which has been deployed in a number of organizations. Following the Security Spotlight Forum’s format for success, we have asked some of our vendor partners that are delivering the building blocks to Zero Trust to delve deeper and explain how their solutions can help you meet the requirements of Zero Trust. As always, these vendors will keep their presentation open and interactive and will prepare demos of their solutions.

If you have already started your zero-trust journey, or are just starting out, this is a great event which will tell you how the positive impact of the most powerful cybersecurity solutions can be magnified when they are integrated and talking to each other.


AGENDA

09:00 – 09:20:  Registration and Welcome

09:20 – 10:00:   Help AG: Zero Trust, what is it and where can you start

In this session, Nicolai Solling, CTO, Help AG will cover what Zero Trust is, how the concept has evolved and how you can get started or enhance your current deployment of Zero Trust.

10:00 – 10:40:    Symantec: Data Protection On-Premises and in the Cloud

Zero Trust is about ensuring that the right systems, people and applications can access each other in the right way, but protecting data is equally important. In this session, Symantec will explain how they use DLP, CASB and native encryption capabilities to ensure that data can only be accessed by those who it is intended for, both on-premises as well as in the cloud.

10:40 –  11:20:    Fortinet: The Zero Trust Enforcement Point

The firewall is an increasingly important enforcement point of traffic within the network. When integrated with other devices, a firewall can be enhanced by richer context and intelligence and thereby enabled to act as an orchestration device for other devices in order to make the right decision.

11:20  – 12:00:    Coffee break and refreshments

12:00 – 12.40:     Infoblox: How Secure DNS is a clear element of Zero Trust

One of the main reasons we implement Zero Trust in the first place is to avoid cyber-attacks such as the spread of malware and exfiltration of data. As both good and bad network actions start with a DNS request, the security benefits of inspecting DNS can be significant.

In this session, Infoblox will cover how just small changes and investments to your infrastructure can significantly increase your ability to block Command and Control as well as other malicious DNS attacks.

12:40 – 13:20:     Pulse Secure: Identity, the Foundation of Zero Trust

Pulse Secure delivers one of the strongest access control solutions for remote users, network users as well as users connecting to cloud applications. Utilizing identity information as well as the security posture of the devices allows organizations to make clever decisions regarding who should have access to what, and from which device and location. By offering a flexible path to SDP, the company extends its foundation of Zero Trust access for hybrid IT and provides enterprises and service providers unrivaled provisioning simplicity, security posture fortification and lower total cost of ownership.  Also, learn why Help AG is successful in deploying NAC with Pulse Secure in organizations ranging from 10 users to 10,000 users!

13:20 – 14:00:     Skybox Security: Zero Trust Starts with Visibility

Complete and accurate visibility underpins every aspect of the Zero Trust framework. In order to create effective micro perimeters, you have to understand your infrastructure, how well it’s aligned to the goals designed in security policies and where risks lie.

In this session, Skybox Security will discuss how the visibility of the hybrid network and asset layer combine to give you the insight needed to implement and maintain the Zero Trust model.

(P.S. This event is exclusively for security and ICT decision makers in enterprises across the UAE. Online registrations will be vetted and confirmation will be sent by email.) 

Help AG Security Spotlight Forum Q4 2018- Abu Dhabi

Help AG Security Spotlight Forum Q4 2018- Abu Dhabi

DATE: Nov 27 2018 TIME: 9:00 am - 3:00 pm LOCATION: Shangri-La Hotel
ADDRESS

Shangri-La Hotel
Abu Dhabi
Qaryat Al Beri
United Arab Emirates

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum in Dubai and Abu Dhabi, this time with the theme of doing things smarter.

Over the years security technology has become harder and harder to manage as the problems became more and more complex to deal with.

In this event, we focus on the technologies that hold promise to make our world a little smarter by automating, integrating and benefitting from collective intelligence.To confirm your attendance, please send an email to soumya.prajna@helpag.com.

Looking forward to seeing all of you there to another great day filled with information together with our partners.

 Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


AGENDA: 

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

The SMART SOC

Integration, correlation, and automation have been key elements of Help AG’s MSS since its inauguration in 2016. Simon Willgoss, Head of Managed Security Services will discuss how and what we automate and what our upcoming automation roadmap contains in order to deliver the best MSS in the region.

10:00 – 10:45- Symantec

The power of the packet fuels your investigation and incident response

A good old friend once said that packets don’t lie – This was in the setting of some network troubleshooting – But even in cybersecurity this is as true as ever. Network packets holds a treasure-trove of visibility and being able to map a security event to the actual packet data is simply invaluable. In this session, Symantec will discuss around their Security Analytics platform, and how integrating that to your security platforms will turbo-charge your investigative capabilities.

10:45 – 11:30 – Splunk

The Phantom of the SOC

We all know Splunk as an excellent data analytics platform for both IT, Operational and Security events. In fact, Splunk chews up data like kids consume a packet of Oreo’s.

Did you also know that Splunk recently acquired the market leader in Security Orchestration and Automatic Response (SOAR)? Repetitive tasks typically undertaken by an analyst or an engineer can now be automated increasing consistency, speed, and responsiveness of your incident response.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Help AG

Live Hacking: Fileless attacks – What is it and why is it such a problem to detect?

Mukhammed Khalilov, Manager Security Analysis, and Help AG’s white hat hackers will in this session describe what fileless attacks are and show how technologies such as steganography and undetectable encoding tools are proving difficult to detect even for next-generation endpoint solutions.

Stay tuned for a performance where you will not believe your eyes – Could this be the David Copperfield of Cyber Security?

12:30 – 13:15 – F5 Networks

DevOPS and beyond

DevOPS is fundamentally changing how we think of development life cycles and challenging the traditional thinking of how security can be deployed.

In this session, F5 Networks will first introduce us to the concepts, terminology and important technology associated with DevOPS and cover how F5 Networks support the orchestration and security of a DevOPS application framework.

If you are just starting with DevOPS or thinking of how you integrate security into your DevOPS process this is the perfect session for you.

13:15 – 14:00 – Infoblox

Threat Intel and orchestration of your defense

In this session, Infoblox will present their threat intelligence and the framework that they use to integrate this to firewalls, SIEMs and how SOAR platforms can look up in their platforms.

If you already use Infoblox or looking at adding threat intel to your existing security platforms, this is the session to attend.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

Help AG Security Spotlight Forum Q4 2018 – Dubai

Help AG Security Spotlight Forum Q4 2018 – Dubai

DATE: Nov 26 2018 TIME: 9:00 am - 3:00 pm LOCATION: One & Only Royal Mirage Dubai
ADDRESS

One & Only Royal Mirage
Dubai
Al Sufouh Road
United Arab Emirates

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum in Dubai and Abu Dhabi, this time with the theme of doing things smarter.

Over the years security technology has become harder and harder to manage as the problems became more and more complex to deal with.

In this event, we focus on the technologies that hold promise to make our world a little smarter by automating, integrating and benefitting from collective intelligence.To confirm your attendance, please send an email to soumya.prajna@helpag.com.

Looking forward to seeing all of you there to another great day filled with information together with our partners.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


AGENDA: 

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

The SMART SOC

Integration, correlation, and automation have been key elements of Help AG’s MSS since its inauguration in 2016. Simon Willgoss, Head of Managed Security Services will discuss how and what we automate and what our upcoming automation roadmap contains in order to deliver the best MSS in the region.

10:00 – 10:45- Symantec

The power of the packet fuels your investigation and incident response

A good old friend once said that packets don’t lie – This was in the setting of some network troubleshooting – But even in cybersecurity this is as true as ever. Network packets holds a treasure-trove of visibility and being able to map a security event to the actual packet data is simply invaluable. In this session, Symantec will discuss around their Security Analytics platform, and how integrating that to your security platforms will turbo-charge your investigative capabilities.

10:45 – 11:30 – Splunk

The Phantom of the SOC

We all know Splunk as an excellent data analytics platform for both IT, Operational and Security events. In fact, Splunk chews up data like kids consume a packet of Oreo’s.

Did you also know that Splunk recently acquired the market leader in Security Orchestration and Automatic Response (SOAR)? Repetitive tasks typically undertaken by an analyst or an engineer can now be automated increasing consistency, speed, and responsiveness of your incident response.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Help AG

Live Hacking: Fileless attacks – What is it and why is it such a problem to detect?

Mukhammed Khalilov, Manager Security Analysis, and Help AG’s white hat hackers will in this session describe what fileless attacks are and show how technologies such as steganography and undetectable encoding tools are proving difficult to detect even for next-generation endpoint solutions.

Stay tuned for a performance where you will not believe your eyes – Could this be the David Copperfield of Cyber Security?

12:30 – 13:15 – F5 Networks

DevOPS and beyond

DevOPS is fundamentally changing how we think of development life cycles and challenging the traditional thinking of how security can be deployed.

In this session, F5 Networks will first introduce us to the concepts, terminology and important technology associated with DevOPS and cover how F5 Networks support the orchestration and security of a DevOPS application framework.

If you are just starting with DevOPS or thinking of how you integrate security into your DevOPS process this is the perfect session for you.

13:15 – 14:00 – Infoblox

Threat Intel and orchestration of your defense

In this session, Infoblox will present their threat intelligence and the framework that they use to integrate this to firewalls, SIEMs and how SOAR platforms can look up in their platforms.

If you already use Infoblox or looking at adding threat intel to your existing security platforms, this is the session to attend.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

Help AG Security Spotlight Forum Q3 2018- Abu Dhabi

Help AG Security Spotlight Forum Q3 2018- Abu Dhabi

DATE: Sep 25 2018 TIME: 8:00 am - 3:00 pm LOCATION: Shangri-La Hotel
ADDRESS

Shangri-La Hotel
Qaryat Al Beri
Abu Dhabi
United Arab Emirates

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum that will be held in KSA and UAE and will be based on the theme of ‘Secure Cloud Enablement’.

There are a few paradigm-shifts in the technology world which promise more change than the movement to cloud in whatsoever way, shape or form the cloud is.

Cloud provides IT organizations with a whole new set of technical capabilities and functions. But this also brings with it new security requirements and a whole new set of threats to deal with.It gives us great pleasure to invite you to the upcoming Security Spotlight Forum that will be held in KSA and UAE and will be based on the theme of ‘Secure Cloud Enablement’.

There are a few paradigm-shifts in the technology world which promise more change than the movement to cloud in whatsoever way, shape or form the cloud is.

Cloud provides IT organizations with a whole new set of technical capabilities and functions. But this also brings with it new security requirements and a whole new set of threats to deal with.

Our upcoming Security Spotlight Forum is focused around how you can make the cloud secure by adding the correct solutions, policies, and procedures. If you have already moved to the cloud or if you are planning to move to the cloud this is the perfect event for you.To confirm your attendance, please send an email to  soumya.prajna@helpag.com.

Looking forward to seeing all of you there to another great day filled with information together with our partners.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Why should you attend?

  • Stay ahead when it comes to leveraging the maximum benefits from cloud
  • Understand the evolution of cyber security in the cloud era and prepare for the same
  • Learn about the latest innovations from the leaders in the field
  • Gain the first mover advantage over your counterparts

AGENDA: 

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

It’s all about the cloud – Now let us secure it

In this session, Nicolai Solling, CTO at Help AG will share how cloud applications are secured and controlled and what organizations need to consider when they move to the cloud. Our cloud security architecture is greatly inspired by many of the challenges we experienced when we started our own cloud journey. Today Help AG has a cloud-first approach, but only if we can deliver the same or similar security for our users and data.

10:00 – 10:45- Okta

Identity is the key driver of the Security-First approach

Securing your workforce and users, in the cloud, and on the go can be difficult. A recent Enterprise Strategy Group (ESG) survey discovered that for nearly 75% of organizations a username and password was the only barrier between a determined attacker and access to your critical resources.

In this session with Okta, you will learn how Identity is the new perimeter for Cyber Security. This session will cover how the use of adaptive multi-factor authentication (MFA) will benefit your users and admins, how identity protects cloud & on-prem applications, and how to go beyond MFA to manage secure access.

10:45 – 11:30 – Palo Alto Networks

Your Move To The Cloud, Secured

Building seamless, consistent security policies across on-premises and cloud IT environments can be challenging without comprehensive workload visibility. Palo Alto Networks provides organizations with the visibility and automation needed to create and update security policies in your cloud environment in real-time. Learn how you can gain greater control over your applications, automatically create consistent and uniform security policies, and prevent known and unknown threats within application flows.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Thales eSecurity

Hey…Let’s Encrypt

The single biggest inhibitor of utilizing cloud services is the perceived lack of control. With cloud services we trust someone else with our data and expect them to take good care of it – But what if they do not? Thales eSecurity is a leader in encryption management on-premises and in the cloud, and they will present how the key topic of confidentiality and data control can be extended to cloud applications. This way you still own your data…even in the cloud, in rest, in motion and even in the application.

12:30 – 13:15 – Mimecast

Honey, I just got phished

E-mail continues to be one of the most important business communication methods and therefore the single most targeted application for fraud and cyber security related incidents. In this session, our partner Mimecast will talk about the biggest issues in cloud-based e-mail solutions and how they address big issues such as CEO fraud, fraudulent invoices, common spam, and malware as well as availability and recovery of data in the most popular cloud and on-premises e-mail environments.

13:15 – 14:00 – Tenable

I feel so vulnerable

When moving to the cloud you may sometimes think that all of your security concerns are gone. Unfortunately, adopting cloud services does not mean you can forget the good old ABCs of security — vulnerability management being one of them. Tenable is the first and only provider of Cyber Exposure solutions and a leader in vulnerability management. They will talk about some of the most common mis-perceptions around cloud security and how the cloud impacts vulnerability management approaches.

They will also discuss Tenable.io Container Security, which allows you to seamlessly and securely enables DevOps processes by providing visibility into the security of container images.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

Help AG Security Spotlight Forum Q3 2018- Dubai

Help AG Security Spotlight Forum Q3 2018- Dubai

DATE: Sep 24 2018 TIME: 8:00 am - 3:00 pm LOCATION: The Westin Dubai Mina Seyahi Beach Resort & Marina
ADDRESS

The Westin Dubai Mina Seyahi Beach Resort & Marina
Dubai Marina, 213084
United Arab Emirates

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum that will be held in KSA and UAE and will be based on the theme of ‘Secure Cloud Enablement’.

There are a few paradigm-shifts in the technology world which promise more change than the movement to cloud in whatsoever way, shape or form the cloud is.

Cloud provides IT organizations with a whole new set of technical capabilities and functions. But this also brings with it new security requirements and a whole new set of threats to deal with.

Our upcoming Security Spotlight Forum is focused around how you can make the cloud secure by adding the correct solutions, policies, and procedures. If you have already moved to the cloud or if you are planning to move to the cloud this is the perfect event for you.To confirm your attendance, please send an email to soumya.prajna@helpag.com.

Looking forward to seeing all of you there to another great day filled with information together with our partners.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Why should you attend?

  • Stay ahead when it comes to leveraging the maximum benefits from cloud
  • Understand the evolution of cybersecurity in the cloud era and prepare for the same
  • Learn about the latest innovations from the leaders in the field
  • Gain the first mover advantage over your counterparts

AGENDA: 

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

It’s all about the cloud – Now let us secure it

In this session, Nicolai Solling, CTO at Help AG will share how cloud applications are secured and controlled and what organizations need to consider when they move to the cloud. Our cloud security architecture is greatly inspired by many of the challenges we experienced when we started our own cloud journey. Today Help AG has a cloud-first approach, but only if we can deliver the same or similar security for our users and data.

10:00 – 10:45- Okta

Identity is the key driver of the Security-First approach

Securing your workforce and users, in the cloud, and on the go can be difficult. A recent Enterprise Strategy Group (ESG) survey discovered that for nearly 75% of organizations a username and password was the only barrier between a determined attacker and access to your critical resources.

In this session with Okta, you will learn how Identity is the new perimeter for Cyber Security. This session will cover how the use of adaptive multi-factor authentication (MFA) will benefit your users and admins, how identity protects cloud & on-prem applications, and how to go beyond MFA to manage secure access.

10:45 – 11:30 – Palo Alto Networks

Your Move To The Cloud, Secured

Building seamless, consistent security policies across on-premises and cloud IT environments can be challenging without comprehensive workload visibility. Palo Alto Networks provides organizations with the visibility and automation needed to create and update security policies in your cloud environment in real-time. Learn how you can gain greater control over your applications, automatically create consistent and uniform security policies, and prevent known and unknown threats within application flows.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Thales eSecurity

Hey…Let’s Encrypt

The single biggest inhibitor of utilizing cloud services is the perceived lack of control. With cloud services we trust someone else with our data and expect them to take good care of it – But what if they do not? Thales eSecurity is a leader in encryption management on-premises and in the cloud, and they will present how the key topic of confidentiality and data control can be extended to cloud applications. This way you still own your data…even in the cloud, in rest, in motion and even in the application.

12:30 – 13:15 – Mimecast

Honey, I just got phished

E-mail continues to be one of the most important business communication methods and therefore the single most targeted application for fraud and cyber security related incidents. In this session, our partner Mimecast will talk about the biggest issues in cloud-based e-mail solutions and how they address big issues such as CEO fraud, fraudulent invoices, common spam, and malware as well as availability and recovery of data in the most popular cloud and on-premises e-mail environments.

13:15 – 14:00 – Tenable

I feel so vulnerable

When moving to the cloud you may sometimes think that all of your security concerns are gone. Unfortunately, adopting cloud services does not mean you can forget the good old ABCs of security — vulnerability management being one of them. Tenable is the first and only provider of Cyber Exposure solutions and a leader in vulnerability management. They will talk about some of the most common mis-perceptions around cloud security and how the cloud impacts vulnerability management approaches.

They will also discuss Tenable.io Container Security, which allows you to seamlessly and securely enables DevOps processes by providing visibility into the security of container images.

14:00 – 15:00 – Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands-on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cybersecurity decision makers across different verticals. )

Help AG Security Spotlight Forum Q3 2018- Riyadh

Help AG Security Spotlight Forum Q3 2018- Riyadh

DATE: Sep 17 2018 TIME: 8:00 am - 2:00 pm LOCATION: Burj Rafal Hotel Kempinski Riyadh
ADDRESS

Burj Rafal Hotel Kempinski
Riyadh
Saudi Arabia

It gives us great pleasure to invite you to the upcoming Security Spotlight Forum that will be held in KSA and UAE and will be based on the theme of ‘Secure Cloud Enablement’.

There are a few paradigm-shifts in the technology world which promise more change than the movement to cloud in whatsoever way, shape or form the cloud is.

Cloud provides IT organizations with a whole new set of technical capabilities and functions. But this also brings with it new security requirements and a whole new set of threats to deal with.

Our upcoming Security Spotlight Forum is focused around how you can make the cloud secure by adding the correct solutions, policies and procedures. If you have already moved to the cloud or if you are planning to move to the cloud this is the perfect event for you.To confirm your attendance, please send an email to soumya.prajna@helpag.com.

Looking forward seeing all of you there to another great day filled with information together with our partners.

Best Regards,

Stephan Berner

Chief Executive Officer, Help AG Middle East


Why you should attend?

  • Stay ahead when it comes to leveraging the maximum benefits from cloud
  • Understand the evolution of cybersecurity in the cloud era and prepare for the same
  • Learn about the latest innovations from the leaders in the field
  • Gain the first mover advantage over your counterparts

AGENDA: 

Registrations will begin at 08: 00.

9:00 – 10:00 – Opening Remarks by Help AG

It’s all about the cloud – Now let us secure it

In this session Nicolai Solling, CTO at Help AG will share how cloud applications are secured and controlled and what organizations need to consider when they move to the cloud. Our cloud security architecture is greatly inspired by many of the challenges we experienced when we started our own cloud journey. Today Help AG has a cloud first approach, but only if we can deliver the same or similar security for our users and data.

10:00 – 10:45- Palo Alto Networks

Your Move To The Cloud, Secured

Building seamless, consistent security policies across on-premises and cloud IT environments can be challenging without comprehensive workload visibility. Palo Alto Networks provides organizations with the visibility and automation needed to create and update security policies in your cloud environment in real-time. Learn how you can gain greater control over your applications, automatically create consistent and uniform security policies, and prevent known and unknown threats within application flows.

10:45 – 11:30 –Thales eSecurity

Hey…Let’s Encrypt

The single biggest inhibitor of utilizing cloud services is the perceived lack of control. With cloud services we trust someone else with our data and expect them to take good care of it – But what if they do not? Thales eSecurity is a leader in encryption management on-premises and in cloud, and they will present how the key topic of confidentiality and data control can be extended to cloud applications. This way you still own your data…even in the cloud, in rest, in motion and even in the application.

11:30 – 11:45 – Coffee Break

11:45 – 12:30 – Mimecast

Honey, I just got phished

E-mail continues to be one of the most important business communication methods and therefore the single most targeted application for fraud and cyber security related incidents. In this session our partner Mimecast will talk about the biggest issues in cloud-based e-mail solutions and how they address big issues such as CEO fraud, fraudulent invoices, common spam and malware as well as availability and recovery of data in the most popular cloud and on-premises e-mail environments.

12:30 – 13:15 – Tenable

I feel so vulnerable

When moving to the cloud you may sometimes think that all of your security concerns are gone. Unfortunately, adopting cloud services does not mean you can forget the good old ABCs of security — vulnerability management being one of them. Tenable is the first and only provider of Cyber Exposure solutions and a leader in vulnerability management. They will talk about some of the most common mis-perceptions around cloud security and how the cloud impacts vulnerability management approaches.

They will also discuss Tenable.io Container Security, which allows you to seamlessly and securely enables DevOps processes by providing visibility into the security of container images.

13:15 – 14:00 –  Lunch

As always, our event is highly interactive, questions are endorsed and the vendors have promised to bring their best game in technical presentations and hands on demonstration.

For any information about the event, contact  Soumya Prajna  (Soumya.prajna@helpag.com ). 

(Note: The event is targeted at cyber security decision makers across different verticals. )

Load more

Ready to secure your information infrastructure and assets?

Learn More

Our story, our services and the mission that guides us forth.

Learn More

Back to Top