We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

CS4CA MENA

Search

Clear Expand Collapse

A Strategy to Mitigate Ransomware

Hossam Elshenraki presents a framework to counter increasing ransomware attacks in the Middle East, sharing key lessons from Dubai Police on early detection, active defense and prevention strategies.

Price
Course duration Duration: 20 minutes

AI in the Middle East: Opportunity or Threat?

Rohit Bajpai, Hussain AlKhalsan, Sagar Sethi, Irshad Syed, Dr. Sharique Raza, and Hossam Elshenraki examine AI's dual role in both creating and mitigating cybersecurity challenges in the Middle East.

Price
Course duration Duration: 25 minutes

Bringing DFIR to the Table

Mohsan Tanvir of Magnet Forensics shares actionable tips on aligning DFIR teams with organizational objectives, measuring return on security investment, and demonstrating how digital forensics delivers tangible business value.

Price
Course duration Duration: 20 minutes

Building a 2025-Ready Cyber Strategy on a Budget

Rohit Bajpai, Kiran Kumar, Moayad Al Ghanmi, and Hani Bani Amer explore effective cybersecurity strategies despite financial limitations, leveraging automation and AI to defend against expanding threats.

Price
Course duration Duration: 25 minutes

Building a Human-Centric Approach with Training

Zain Abdurehman discusses comprehensive employee awareness training strategies to strengthen organizations' first line of defense against cyberattacks and change mindsets toward security.

Price
Course duration Duration: 30 minutes

Building Gen AI-Assisted OT Security Operations

Dr. Mohamed Abdur Rahman demonstrates how generative AI can monitor OT operations, detect attacks, block attackers and restore assets to working states, showing how AI-driven tools can fortify OT networks against evolving threats.

Price
Course duration Duration: 30 minutes

Communicating OT Cyber ROI to the Board

Paul Barnes, Malek Abu Tayeh, Asma Habeeb, Dr. Mohamed Abdur Rahman and Jean-Baptiste Abbal discuss presenting risk-based approaches to boards, securing budgets, improving communication and developing compelling business cases for OT security.

Price
Course duration Duration: 45 minutes

Creating a Framework to Secure Our Data

Kiran Kumar of Alpheya examines strategies to protect against data breaches and ransomware in the Middle East, where breach costs reach $8.07 million, using case studies to illustrate effective data protection methods.

Price
Course duration Duration: 25 minutes

Creating a Security Culture Throughout Society

Rahul Banga of GIG Gulf discusses approaches to embed cybersecurity awareness in society's culture, communicate security concepts in layman's language, and create effective human firewalls throughout organizations and society.

Price
Course duration Duration: 20 minutes

Education & Recruitment Challenges in the Middle East

Hessa Almatrooshi of Ajman Free Zone addresses the cyber skills gap, discussing strategies to attract graduates, increase workforce diversity and evaluate whether AI can realistically help address cybersecurity staffing shortages.

Price
Course duration Duration: 15 minutes

Enhancing Cyber Awareness Through Training

Gagandeep Singh examines strategies to boost human firewalls through awareness training, shifting organizational mindsets toward security-oriented approaches, and shares a case study of successful internal culture change.

Price
Course duration Duration: 25 minutes

Ensuring a Human-Centric Approach to Cyber

Asim Ahmad shares successful strategies for transitioning to a security-oriented mindset and implementing cybersecurity culture from the CEO throughout all organizational levels.

Price
Course duration Duration: 20 minutes

Ensuring Data Security With Zero Trust Architecture Model

Dr. Sharique Raza of UAE Financial Institutions UAE explores zero trust principles and regional cybersecurity regulations. Learn practical approaches to align with UAE and Saudi frameworks while strengthening your organization's security posture.

Price
Course duration Duration: 30 minutes

Evergreen OT Security Assurance

Nasser Al-Alawi demonstrates a life cycle-based security assurance approach, exploring best practices for stakeholder engagement, implementing "security walks" and embedding cybersecurity in change management.

Price
Course duration Duration: 20 minutes

Generative AI Fraud & Deepfakes

Rohit Bajpai of Gulf Islamic Investments explores approaches to combat AI-generated fraud and deepfakes in the Middle East, focusing on detection techniques, multi-layered security protocols and organizationwide preparedness.

Price
Course duration Duration: 20 minutes

Getting Cybersecurity Fundamentals Right

Moayad Al Ghanmi of the National Bank of Kuwait discusses essential cybersecurity strategies, securing board buy-in, and ensuring fundamentals are solid before implementing new innovations through practical case studies.

Price
Course duration Duration: 30 minutes

Growing Through New Regulations

Vipin Raj shares how Ahalia Hospital adapted its processes to align with cybersecurity regulations, highlighting how regulatory compliance has strengthened organizational maturity and enhanced critical infrastructure protection.

Price
Course duration Duration: 15 minutes

Incident Response for Critical Infrastructure

Gopinath Kishorekumar presents a case study on how an oil and gas organization discovered, mitigated and responded to a cyber breach, sharing lessons to improve incident response frameworks.

Price
Course duration Duration: 30 minutes

Making a Case for Human-Centric Security

Kapil Matta, James Wiles, Hussain AlKhalsan, Biju Hameed and Kausar Mukeri discuss strategies to mitigate human risk factors, improve communication and prevent security team burnout in Middle Eastern organizations.

Price
Course duration Duration: 35 minutes

Managing Suppliers to Reduce Third-Party Risk

Islam Soliman explores essential monitoring tools for third-party access, incident notification mechanisms and the role of zero trust architecture in managing vendor relationships and protecting critical infrastructure.

Price
Course duration Duration: 35 minutes

Mitigating Third-Party Risks to Protect Our Organizations

Noha Moustafa of ALEXBANK explores effective vendor risk management frameworks, strategies to mitigate third-party provider risks, and methods to protect environments from bad actors attempting to access your third parties.

Price
Course duration Duration: 40 minutes

Navigating Third-Party Access Risk to Cyber-Physical Systems

Amr Ahmed examines limitations of traditional remote access solutions in OT environments, presenting more secure approaches with granular, time-limited access controls and agentless security solutions that protect system integrity.

Price
Course duration Duration: 15 minutes

Navigating Third-Party Risk in an Interconnected World

Dr. Fouad Abou Chacra, Vipin Raj, Irshad Mohammed and Paul Barnes discuss lessons from the CrowdStrike outage, strategies for mitigating third-party risks in OT environments and AI's role in developing risk management tools.

Price
Course duration Duration: 20 minutes

Our Framework for Securing Our Supply Chains

Abdulhakeem Al Alawi shares a framework for managing supply chain risk, exploring standardized third-party risk management across supply chain participants, and discussing protection strategies against cyberattacks.

Price
Course duration Duration: 25 minutes

Regulation - Necessity or Hindrance?

Rohit Bajpai, Mohammed Alshahrani, Hessa Almatrooshi, Ahmed Nabil and Zain Abdurehman debate whether regulations enhance security or if internal frameworks are more effective in the Middle Eastern context.

Price
Course duration Duration: 30 minutes

Resolving IT-OT Convergence Conflicts

Biju Hameed shares insights from two decades in the energy and aviation sectors, focusing on effective communication between IT and OT teams, understanding true convergence, and addressing barriers that create an "illusion of understanding."

Price
Course duration Duration: 30 minutes

Securing Electronics Supply Chains: Threats & Solutions

Dr. Basel Halak reveals the scale of hardware-level attacks in globally distributed electronic supply chains, demonstrating how physical unclonable functions with blockchain and AI-based monitoring can create tamper-resistant systems.

Price
Course duration Duration: 25 minutes

Securing Our ICS Systems

Abdulhakeem Al Alawi, Gopinath Kishorekumar, Dr. Ali Ismail Awad, Ahmed Al-Bahdoor and Keith Christie-Smith explore security-by-design approaches, vendor selection, zero trust architecture and easy wins to protect ICS systems.

Price
Course duration Duration: 45 minutes

Unlock GRC Excellence in Industrial Environments

Mostafa Nassar examines why standard GRC platforms fail in industrial settings and provides strategies for developing OT-specific solutions that integrate with IT frameworks while addressing specialized operational needs.

Price
Course duration Duration: 30 minutes

Utilizing Generative AI Through Our Cyber Strategies

Rehan Ul Badar of Abu Dhabi Islamic Bank examines how organizations can leverage generative AI technologies while mitigating the risks they pose as gateways for fraud and sophisticated phishing attacks.

Price
Course duration Duration: 30 minutes

Search

Clear

Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement