Additional Content Download

2018 Past Attendee Snapshot

Find out the calibre of attendees who attended our Cyber Security event series!

CYBER SECURITY LESSONS LEARNED FROM MASSIVE DATA BREACH AND CYBER ATTACKS IN THE MIDDLE EAST

Download an exclusive industry report on Cyber Security: Lessons learned from massive data breach and cyber attacks in the Middle East

Learnings to take away from this report are:

Statistics on the current situation in the Middle East

Types of cybercrimes

Strategies to mitigate the affect of cyber attacks and breaches

Cyber Security Challenges, Focuses 2019

Download the exclusive report that combines both quantitative and qualitative data for a look at the global and Middle East region views on these pressing questions and more:

• What is the most dangerous threat vector?

• What is the one area of cyber security that needs to change the most in 2019?

• Will mobile devices pose a greater threat in 2019?


• Where will cyber dollars be allocated in the New Year?

SPEX Cyber Security Challenges, Focuses 2019

Download the exclusive report that combines both quantitative and qualitative data for a look at the global and Middle East region views on these pressing questions and more:

• What is the most dangerous threat vector?

• What is the one area of cyber security that needs to change the most in 2019?

• Will mobile devices pose a greater threat in 2019?


• Where will cyber dollars be allocated in the New Year?

Strategising cyber defense in the era of digital storm

Download this presentation now by Adeel Ashraf, Director of ICT at Abunayyan Holding, to gain insight on how you can identify risk areas and manage them successfully

Understanding the threat landscape and protecting your industry control systems

A presentation by Dr. Omar Al Ibrahim, GREM, CISSP, Security Consultant & Researcher, at omProtect LLC.

Cyber Security in Energy & Utilities: Threats, challenges and solutions

Download this report now to gain insight into the current cybercrime threat landscape affecting the energy and utilities industry to discover the latest threat types and their high-profile instances, as well as key emerging cybersecurity solutions and strategies including AI and cognitive technologies, training tactics and leveraging big data.

Dynamic deception for industrial automation and control systems

Download this whitepaper by Attivo Networks and gain insights into how you can build a comprehensive security strategy for the real-time, actionable detection of a cyber attack

SPEX CYBER SECURITY LESSONS LEARNED FROM MASSIVE DATA BREACH AND CYBER ATTACKS IN THE MIDDLE EAST

Download an exclusive industry report on Cyber Security: Lessons learned from massive data breach and cyber attacks in the Middle East

The 2018 Global Password Security Report

Download  the 2018 Global Password Security report that evaluates the complexities of passwords and the risks associated with it. 

§  Password security depending on your company size

§  Which industry is getting password security right?

§  The state of multifactor authentication

§  The state of password sharing

§  How to become a top performer?

 

5 REASONS IoT Security IS BECOMING A PRIORITY

Download it now and learn about:

 

·         How does patching cadence and expert-level knowledge of device firmware play into an organization’s security posture?

·         How will data collection on IoT devices drip into the swirling tides of privacy regulation?

·         Today’s concern - whether security practitioners can get a handle of these connected devices;

·         The guide for enterprises through the IoT security process – or understand its utility;

·         Another CISO task: not only monitoring the rogue wave that is IoT, but also governance principles behind it;

·         How to fortify your defense - what can security professionals do to rein in their connected products?