Additional Content Download
2018 Past Attendee Snapshot
Find out the calibre of attendees who attended our Cyber Security event series!
CYBER SECURITY LESSONS LEARNED FROM MASSIVE DATA BREACH AND CYBER ATTACKS IN THE MIDDLE EAST
Download an exclusive industry report on Cyber Security: Lessons learned from massive data breach and cyber attacks in the Middle East
Learnings to take away from this report are:
• Statistics on the current situation in the Middle East
• Types of cybercrimes
• Strategies to mitigate the affect of cyber attacks and breaches
Cyber Security Challenges, Focuses 2019
• Where will cyber dollars be allocated in the New Year?
SPEX Cyber Security Challenges, Focuses 2019
• Where will cyber dollars be allocated in the New Year?
Strategising cyber defense in the era of digital storm
Download this presentation now by Adeel Ashraf, Director of ICT at Abunayyan Holding, to gain insight on how you can identify risk areas and manage them successfully
Understanding the threat landscape and protecting your industry control systems
A presentation by Dr. Omar Al Ibrahim, GREM, CISSP, Security Consultant & Researcher, at omProtect LLC.
Cyber Security in Energy & Utilities: Threats, challenges and solutions
Download this report now to gain insight into the current cybercrime threat landscape affecting the energy and utilities industry to discover the latest threat types and their high-profile instances, as well as key emerging cybersecurity solutions and strategies including AI and cognitive technologies, training tactics and leveraging big data.
Dynamic deception for industrial automation and control systems
SPEX CYBER SECURITY LESSONS LEARNED FROM MASSIVE DATA BREACH AND CYBER ATTACKS IN THE MIDDLE EAST
Download an exclusive industry report on Cyber Security: Lessons learned from massive data breach and cyber attacks in the Middle East
The 2018 Global Password Security Report
Download the 2018 Global Password Security report that evaluates the complexities of passwords and the risks associated with it.
§ Password security depending on your company size
§ Which industry is getting password security right?
§ The state of multifactor authentication
§ The state of password sharing
§ How to become a top performer?
5 REASONS IoT Security IS BECOMING A PRIORITY
Download
it now and learn
about:
·
How does patching cadence
and expert-level knowledge of device firmware play into an organization’s
security posture?
·
How will data collection on IoT devices drip into the swirling tides of
privacy regulation?
·
Today’s concern - whether security practitioners can get a handle of
these connected devices;
·
The guide for enterprises
through the IoT security process – or understand its utility;
·
Another CISO task: not
only monitoring the rogue wave that is IoT, but also governance principles
behind it;
·
How to fortify your defense - what can security professionals do to
rein in their connected products?