Dr. Erdal Ozkaya
Search
  • Home
  • About Me
  • Home
  • About Me
  • Home
  • Cybersecurity, Free Events, Announcemets
  • E-Crime and Cybersecurity Congress in Dubai (12th- join us Free )

E-Crime and Cybersecurity Congress in Dubai (12th- join us Free )

E-Crime and Cybersecurity Congress Congress Erdal Ozkaya
Erdal2021-07-17T08:29:42-04:00

E-Crime and Cybersecurity Congress in Dubai 10th March 2020

Securing citizens and stakeholders:

Governments and corporations must provide next-generation service with security built in

Technology is radically changing the expectations of consumers and citizens.

In Dubai, the government has stated explicitly that traditional processes need to be continuously updated to ensure efficiency and speed in Government to Consumer (G2C) and Government to Government (G2G) services. As they put it:

“Leveraging emerging technologies such as Blockchain, Artificial Intelligence, along with harnessing Data Science capabilities, we are recreating everyday experiences for residents and visitors of Dubai, making them more personalized, seamless, efficient and impactful.”

But this level of digitalisation needs to be cyber secure.

Governments and their agencies must build security into their new technologies.

Citizens must be kept safe from a wide range of hostile threat actors and unlike other regions across the globe, where monetizable data is the main target for cyber attackers, the Middle East is witnessing a surge in political and strategic hacking. Given the prevalence of state-directed attacks, it is states who are best-placed to defend their populations.

At the same time, the private sector must also redouble its efforts and invest in cloud security and data security as major cloud service providers set up in the region and business pivots to a Cloud-first strategy.

On top of this, the Data Protection Law (DPL) implemented in Bahrain in April 2019, and the likelihood that the UAE will also enact strict data privacy rules by the end of 2020, are forcing MENA organisations to rethink their data security framework.

As a result, MENA enterprise information security and risk management spending will total US$1.7 billion by 2020, an increase of 10.7% from 2019, according to a recent forecast by Gartner.

The 12th e-Crime & Cybersecurity Congress in Dubai will look at the latest in the processes and technologies used to protect data, identity and digital transformation. There will be real-life case studies, strategic talks and technical break-out sessions from the security and privacy teams behind some of the world’s most admired brands, who know, just like you, that security is now more important to business than ever.

For more info : https://akjassociates.com/event/dubai

For more evets :

https://www.erdalozkaya.com/category/free-events/

E-Crime and Cybersecurity Congress Erdal Ozkaya
E-Crime and Cybersecurity Congress Erdal Ozkaya

Good news: the regulators are coming
Mandatory requirements on data privacy are yesterday’s news, but new cybersecurity regulations will finally force Boards to resource security appropriately for the long term

The lack of a formal set of regulations around cybersecurity has always been a challenge for CISOs. Unable to quantify cyber-risk, and lacking a mandatory set of standards, security budgets have tended to rise after incidents and then fall as the memory of problems recedes.

So, it matters that Saudi Arabia’s Communications and Information Technology Commission (CITC) has just announced the implementation of a regulatory framework for service providers in the communications, IT, and postal services sectors.

The framework, in the region’s largest economy, contains a comprehensive set of cybersecurity requirements and controls and seeks to ensure the implementation of adequate cybersecurity measures following the best international practices. It also requires the adoption of a risk management methodology and the fulfilment of all cybersecurity requirements by service providers to enable them to deal with cyber threats effectively.

This initiative mirrors other global developments. An updated EU Cybersecurity Act introduces an EU-wide cybersecurity certification framework for ICT products, services and processes. The UK has announced a new law to make sure virtually all smart devices meet new requirements. And banking regulators in the UK, Europe and US are targeting cybersecurity as part of the broader drive for operational resilience. Middle Eastern regulators are following suit.

This regulation is coming just in time. While many cyber attacks in the Middle East have been connected to political actors, digitalisation and the expansion of the IoT have opened up the region’s companies and public sector entities to a much broader range of potential attackers.

According to Mohamed al-Kuwaiti, head of UAE Government Cyber Security, the Middle East region is facing a “cyber pandemic” as hackers take advantage of Covid-related digital adoption.

Banks, universities and healthcare companies have seen huge increases in attacks, with ransomware and phishing attacks becoming ever more sophisticated. Companies and CISOs must act now.

The e-Crime & Cybersecurity Congress for the Middle East will take place online and will look at how accelerated digitalisation requires a new kind of security. Join our real-life case studies and in-depth technical sessions from the security and privacy teams at some of the world’s most admired brands

    • As companies ramp up digital business models it is crucial that they build security in from the start
    • Given the pace at which change is happening, this is a big ask – even before COVID-19 many companies prioritised speed over security
    • What can cybersecurity teams do to change this? Is this a CIO vs CISO battle?
  • Are criminals winning the ransomware war?
    • Ransomware test every part of your infrastructure, from awareness to endpoint protection to patching to phishing defences
    • Some attacks are sophisticated, but most rely on traditional methods and vectors
    • So why is it so hard to beat them? Is AI or zero trust or something else the answer?
  • Securing digital currencies
    • The move towards cashless payment methods during the crisis has been extreme, and looks like it may be irreversible
    • Many more governments are now looking at developing their own digital currencies
    • How do we go about securing a world in which most – perhaps all – payments are digital?
    • Building-in security: from DevOps to SecDevOps?
      • As companies ramp up digital business models it is crucial that they build security in from the start
      • Given the pace at which change is happening, this is a big ask – even before COVID-19 many companies prioritised speed over security
      • What can cybersecurity teams do to change this? Is this a CIO vs CISO battle?
    • Are criminals winning the ransomware war?
      • Ransomware test every part of your infrastructure, from awareness to endpoint protection to patching to phishing defences
      • Some attacks are sophisticated, but most rely on traditional methods and vectors
      • So why is it so hard to beat them? Is AI or zero trust or something else the answer?
    • Securing digital currencies
      • The move towards cashless payment methods during the crisis has been extreme, and looks like it may be irreversible
      • Many more governments are now looking at developing their own digital currencies
      • How do we go about securing a world in which most – perhaps all – payments are digital?
    • Securing the citizen
      • The COVID era demands unprecendented levels of citizen engagement
      • The systems required to provide safety create a huge data security and privacy challenge for both governments and employers
      • Are compromises inevitable? How can this critical data best be kept safe?
    • Moving to Cloud Native?
      • Applications have become increasingly complex, with users demanding more and more
      • They expect rapid responsiveness, innovative features, and zero downtime
      • Performance problems are no longer acceptable – they’ll easily move to your competitor
      • Should you go Cloud Native?
    • Building-in security: from DevOps to SecDevOps?
      • As companies ramp up digital business models it is crucial that they build security in from the start
      • Given the pace at which change is happening, this is a big ask – even before COVID-19 many companies prioritised speed over security
      • What can cybersecurity teams do to change this? Is this a CIO vs CISO battle?
    • Are criminals winning the ransomware war?
      • Ransomware test every part of your infrastructure, from awareness to endpoint protection to patching to phishing defences
      • Some attacks are sophisticated, but most rely on traditional methods and vectors
      • So why is it so hard to beat them? Is AI or zero trust or something else the answer?
    • Securing digital currencies
      • The move towards cashless payment methods during the crisis has been extreme, and looks like it may be irreversible
      • Many more governments are now looking at developing their own digital currencies
      • How do we go about securing a world in which most – perhaps all – payments are digital?
    • Securing the citizen
      • The COVID era demands unprecendented levels of citizen engagement
      • The systems required to provide safety create a huge data security and privacy challenge for both governments and employers
      • Are compromises inevitable? How can this critical data best be kept safe?
    • Moving to Cloud Native?
      • Applications have become increasingly complex, with users demanding more and more
      • They expect rapid responsiveness, innovative features, and zero downtime
      • Performance problems are no longer acceptable – they’ll easily move to your competitor
      • Should you go Cloud Native?
    • Re-engineering the SOC: from logs to automated XDR
      • Does anybody really look at all their logs?
      • Data and alert overload have been the Achilles Heel of the SOC team and they constitute a broader failing in many security architectures
      • What companies need is systems that can process this data into actionable insights. But how?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

Free Internet Security Threat Report

Free Internet Security Threat Report by Symantec 2019

Free Internet Security Threat Report Formjacking. Targeted Attacks. Living off the Land. Coming for Your Business. Symantec’s 2019 Internet Security Threat Report... read more

Australias cybersecurity in spotlight at Wagga conference

Australias cybersecurity  Hackers using Wannacry malware, national security, and business challenges are hot topics for cybersecurity experts from around Australia and... read more
Innovation in Banking and Financial Services speaker Dr Erdal Ozkaya

Innovation in Banking and Financial Services Virtual 2021 – Free Event

Innovation in Banking and Financial Services Virtual Event  It gives us immense pleasure to announce our first round of speakers for... read more
CISO

CISOs End to End Security Operations – ( Part 2) Powerful Tips

CISOs End to End Security Operations This is the second part of the article, you can read the first part from... read more
EDR

Endpoint Detection Response –

Endpoint Detection Response Endpoint Detection Response is a powerful event analysis tool that provides real-time monitoring and detection of malicious events... read more
Hiring

Come and join my Team at SCB -Great Opportunity 2019

Come and join my Team at SCB To Apply Via LinkedIn : The Role Responsibilities ICS 1st Line Risk Manager, AME will execute a... read more
Free Event

Cyber Threats and Breach Protection – Free Webinars 2022

Cyber Threats and Breach Protection Cybersecurity Ventures expects global cybercrime to reach $10.5 by 2025 - up from $3 trillion in... read more
Book signing Kuwait

Book signing Kuwait – Thank you for joining <3

Book signing Kuwait What a week ! In the last 3 days I was travelling all the way from Algeria to... read more
Administering Windows Server 2012 Erdal Ozkaya

New Book : Administering Windows Server 2012 ,New Book

New Book : Administering Windows Server 2012 And finally the new Microsoft Official Curriculum (MOC) , book is ready, which I... read more
State-of-Play for Middle East Cybersecurity Leader : Dr Erdal Ozkaya

Middle East Cybersecurity Leaders State-of-Play – register 4 Free

Middle East Cybersecurity Leaders State-of-Play for Middle East Cybersecurity Leaders The cyber threat landscape and economic composition of the Middle East are... read more

Categories

  • About Dr Erdal Ozkaya (298)
    • Awards (96)
    • Erdal in the news (118)
    • Feedback (90)
    • My Books (54)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (302)
  • Artificial Intelligence AI (10)
  • Certification (52)
  • Cloud Computing (72)
  • Cybersecurity (322)
  • Cybersecurity Leadership (52)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (156)
  • General (133)
  • How to …? (63)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (33)
    • Free E-Books (13)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Erdal on Siber Güvenlik Saldiri ve Savunma Stratejileri – NEW B00K

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.