We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

CS4CA MENA

Search

Clear Expand Collapse

A Strategy to Mitigate Ransomware - A Dubai Police Case Study

Hossam Elshenraki presents a framework to counter increasing ransomware attacks in the Middle East, sharing key lessons from Dubai Police on early detection, active defense and prevention strategies.

Price
Course duration Duration: 20 minutes

AI: Does It Offer More Opportunities or Threats for Middle East Organizations?

Rohit Bajpai, Hussain AlKhalsan, Sagar Sethi, Irshad Syed, Dr. Sharique Raza, and Hossam Elshenraki examine AI's dual role in both creating and mitigating cybersecurity challenges in the Middle East.

Price
Course duration Duration: 25 minutes

Bridging the OT-IT Gap: Unlock GRC Excellence in Industrial Environments

Mostafa Nassar examines why standard GRC platforms fail in industrial settings and provides strategies for developing OT-specific solutions that integrate with IT frameworks while addressing specialized operational needs.

Price
Course duration Duration: 30 minutes

Bringing DFIR to the Table: Aligning Digital Forensics With Cybersecurity Strategies

Mohsan Tanvir of Magnet Forensics shares actionable tips on aligning DFIR teams with organizational objectives, measuring return on security investment, and demonstrating how digital forensics delivers tangible business value.

Price
Course duration Duration: 20 minutes

Building Gen AI-Assisted OT Security Operations: Design Challenges for Successful Deployment

Dr. Mohamed Abdur Rahman demonstrates how generative AI can monitor OT operations, detect attacks, block attackers and restore assets to working states, showing how AI-driven tools can fortify OT networks against evolving threats.

Price
Course duration Duration: 30 minutes

Changing the Mindset: Developing a Human-Centric Approach Through Training and Education

Zain Abdurehman discusses comprehensive employee awareness training strategies to strengthen organizations' first line of defense against cyberattacks and change mindsets toward security.

Price
Course duration Duration: 30 minutes

Creating a Framework to Secure Our Data

Kiran Kumar of Alpheya examines strategies to protect against data breaches and ransomware in the Middle East, where breach costs reach $8.07 million, using case studies to illustrate effective data protection methods.

Price
Course duration Duration: 25 minutes

Creating a Security Culture Throughout Society

Rahul Banga of GIG Gulf discusses approaches to embed cybersecurity awareness in society's culture, communicate security concepts in layman's language, and create effective human firewalls throughout organizations and society.

Price
Course duration Duration: 20 minutes

End-User Case Study: Ensuring Data Security With Zero Trust Architecture Model

Dr. Sharique Raza of UAE Financial Institutions UAE explores zero trust principles and regional cybersecurity regulations. Learn practical approaches to align with UAE and Saudi frameworks while strengthening your organization's security posture.

Price
Course duration Duration: 30 minutes

Ensuring a Human-Centric Approach to Cyber - Tips and Techniques

Asim Ahmad shares successful strategies for transitioning to a security-oriented mindset and implementing cybersecurity culture from the CEO throughout all organizational levels.

Price
Course duration Duration: 20 minutes

Ensuring Data Security With Zero Trust Architecture Model

Sharique Raza, senior security architect at Financial Institutions UAE, explores the shift from implicit trust to zero trust architecture, detailing the five key pillars of zero trust implementation.

Price
Course duration Duration: 30 minutes

Evergreen OT Security Assurance: A Sustainable Approach to OT Cybersecurity Risk Management

Nasser Al-Alawi demonstrates a life cycle-based security assurance approach, exploring best practices for stakeholder engagement, implementing "security walks" and embedding cybersecurity in change management.

Price
Course duration Duration: 20 minutes

Generative AI Fraud and Deepfakes - Prevention and Detection

Rohit Bajpai of Gulf Islamic Investments explores approaches to combat AI-generated fraud and deepfakes in the Middle East, focusing on detection techniques, multi-layered security protocols and organizationwide preparedness.

Price
Course duration Duration: 20 minutes

How Adopting New Regulations Helped Us to Grow Our Maturity - An Ahalia Hospital Case Study

Vipin Raj shares how Ahalia Hospital adapted its processes to align with cybersecurity regulations, highlighting how regulatory compliance has strengthened organizational maturity and enhanced critical infrastructure protection.

Price
Course duration Duration: 15 minutes

How Can We Build a Cyber Strategy Fit for 2025 While Overcoming Financial Constraints?

Rohit Bajpai, Kiran Kumar, Moayad Al Ghanmi, and Hani Bani Amer explore effective cybersecurity strategies despite financial limitations, leveraging automation and AI to defend against expanding threats.

Price
Course duration Duration: 25 minutes

How Can We Ensure We Get the Fundamentals of Cybersecurity Right

Moayad Al Ghanmi of the National Bank of Kuwait discusses essential cybersecurity strategies, securing board buy-in, and ensuring fundamentals are solid before implementing new innovations through practical case studies.

Price
Course duration Duration: 30 minutes

How We Can Best Navigate Third-Party Risk in the Context of Increasing Interconnectedness

Dr. Fouad Abou Chacra, Vipin Raj, Irshad Mohammed and Paul Barnes discuss lessons from the CrowdStrike outage, strategies for mitigating third-party risks in OT environments and AI's role in developing risk management tools.

Price
Course duration Duration: 20 minutes

How We Can Communicate With Our Boards and Ensure ROI on Our OT Cyber Programs

Paul Barnes, Malek Abu Tayeh, Asma Habeeb, Dr. Mohamed Abdur Rahman and Jean-Baptiste Abbal discuss presenting risk-based approaches to boards, securing budgets, improving communication and developing compelling business cases for OT security.

Price
Course duration Duration: 45

Making a Case for Human-Centric Security - What Can You Do?

Kapil Matta, James Wiles, Hussain AlKhalsan, Biju Hameed and Kausar Mukeri discuss strategies to mitigate human risk factors, improve communication and prevent security team burnout in Middle Eastern organizations.

Price
Course duration Duration: 35 minutes

Managing Conflict and Communication Challenges in IT-OT Convergence

Biju Hameed shares insights from two decades in the energy and aviation sectors, focusing on effective communication between IT and OT teams, understanding true convergence, and addressing barriers that create an "illusion of understanding."

Price
Course duration Duration: 30 minutes

Managing Our Suppliers to Mitigate Against Third-Party Risk

Islam Soliman explores essential monitoring tools for third-party access, incident notification mechanisms and the role of zero trust architecture in managing vendor relationships and protecting critical infrastructure.

Price
Course duration Duration: 35 minutes

Mitigating Third-Party Risks to Protect Our Organizations

Noha Moustafa of ALEXBANK explores effective vendor risk management frameworks, strategies to mitigate third-party provider risks, and methods to protect environments from bad actors attempting to access your third parties.

Price
Course duration Duration: 40 minutes

Navigating Third-Party Access Risk to Cyber-Physical Systems

Amr Ahmed examines limitations of traditional remote access solutions in OT environments, presenting more secure approaches with granular, time-limited access controls and agentless security solutions that protect system integrity.

Price
Course duration Duration: 15 minutes

Oil and Gas Case Study: Incident Response Framework for Critical Infrastructure Organizations

Gopinath Kishorekumar presents a case study on how an oil and gas organization discovered, mitigated and responded to a cyber breach, sharing lessons to improve incident response frameworks.

Price
Course duration Duration: 30 minutes

Our Framework for Securing Our Supply Chains

Abdulhakeem Al Alawi shares a framework for managing supply chain risk, exploring standardized third-party risk management across supply chain participants, and discussing protection strategies against cyberattacks.

Price
Course duration Duration: 25 minutes

Overcoming Education and Recruitment Challenges Throughout the Middle East

Hessa Almatrooshi of Ajman Free Zone addresses the cyber skills gap, discussing strategies to attract graduates, increase workforce diversity and evaluate whether AI can realistically help address cybersecurity staffing shortages.

Price
Course duration Duration: 15 minutes

Regulation - Necessity or Hindrance?

Rohit Bajpai, Mohammed Alshahrani, Hessa Almatrooshi, Ahmed Nabil and Zain Abdurehman debate whether regulations enhance security or if internal frameworks are more effective in the Middle Eastern context.

Price
Course duration Duration: 30 minutes

Securing Our ICS Systems - Techniques to Stay Secure and Prevent Downtime

Abdulhakeem Al Alawi, Gopinath Kishorekumar, Dr. Ali Ismail Awad, Ahmed Al-Bahdoor and Keith Christie-Smith explore security-by-design approaches, vendor selection, zero trust architecture and easy wins to protect ICS systems.

Price
Course duration Duration: 45 minutes

Supply Chain Security of Electronics Systems: Threats, Mitigations and Emerging Regulations

Dr. Basel Halak reveals the scale of hardware-level attacks in globally distributed electronic supply chains, demonstrating how physical unclonable functions with blockchain and AI-based monitoring can create tamper-resistant systems.

Price
Course duration Duration: 25 minutes

Utilizing Generative AI Through Our Cyber Strategies

Rehan Ul Badar of Abu Dhabi Islamic Bank examines how organizations can leverage generative AI technologies while mitigating the risks they pose as gateways for fraud and sophisticated phishing attacks.

Price
Course duration Duration: 30 minutes

Utilizing Training and Education to Ensure Cyber Awareness in Our Organizations

Gagandeep Singh examines strategies to boost human firewalls through awareness training, shifting organizational mindsets toward security-oriented approaches, and shares a case study of successful internal culture change.

Price
Course duration Duration: 25 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement