Presentations

CYBER SECURITY LESSONS LEARNED FROM MASSIVE DATA BREACH AND CYBER ATTACKS IN THE MIDDLE EAST

CYBER SECURITY LESSONS LEARNED FROM MASSIVE DATA BREACH AND CYBER ATTACKS IN THE MIDDLE EAST

Download an exclusive industry report on Cyber Security: Lessons learned from massive data breach and cyber attacks in the Middle East

Learnings to take away from this report are:

Statistics on the current situation in the Middle East

Types of cybercrimes

Strategies to mitigate the affect of cyber attacks and breaches

SPEX Cyber Security Challenges, Focuses 2019

SPEX Cyber Security Challenges, Focuses 2019

Download the exclusive report that combines both quantitative and qualitative data for a look at the global and Middle East region views on these pressing questions and more:

• What is the most dangerous threat vector?

• What is the one area of cyber security that needs to change the most in 2019?

• Will mobile devices pose a greater threat in 2019?


• Where will cyber dollars be allocated in the New Year?

Strategising cyber defense in the era of digital storm

Strategising cyber defense in the era of digital storm

Download this presentation now by Adeel Ashraf, Director of ICT at Abunayyan Holding, to gain insight on how you can identify risk areas and manage them successfully

Understanding the threat landscape and protecting your industry control systems

Understanding the threat landscape and protecting your industry control systems

A presentation by Dr. Omar Al Ibrahim, GREM, CISSP, Security Consultant & Researcher, at omProtect LLC.

SPEX CYBER SECURITY LESSONS LEARNED FROM MASSIVE DATA BREACH AND CYBER ATTACKS IN THE MIDDLE EAST

SPEX CYBER SECURITY LESSONS LEARNED FROM MASSIVE DATA BREACH AND CYBER ATTACKS IN THE MIDDLE EAST

Download an exclusive industry report on Cyber Security: Lessons learned from massive data breach and cyber attacks in the Middle East

The 2018 Global Password Security Report

The 2018 Global Password Security Report

Download  the 2018 Global Password Security report that evaluates the complexities of passwords and the risks associated with it. 

§  Password security depending on your company size

§  Which industry is getting password security right?

§  The state of multifactor authentication

§  The state of password sharing

§  How to become a top performer?