PICTURE THIS! See.
Secure. Go Further.
Welcome to CLOUDSEC Cairo 2019.
Picture an organization that can prepare for, withstand, and recover from any cyber security threat—one that's so resilient nothing can hinder its success. Picture how it can easily adapt to increasingly complex and shifting IT environments. Picture how it sees cyber security as a strategy, and has a clear vision of how ever-changing threats and risks should be managed.
Picture that organization as your own.
The computing landscape continues to introduce challenges amidst exciting new technologies, hyper-connectivity, and benefits. Organizations need to see order in chaos, see things from a different perspective, and even step back to see the big picture. Because having visibility through the power of collective and connected intelligence helps build cyber resilience, and allows you to go further and do more.
Now for the first time in Middle East and Africa, we are expanding CLOUDSEC series to be hosted in Cairo, Egypt. Be sure not to miss this leading internet security event!
• Why FinTech is different from Security and Compliance Perspective
• Building Security for Growth and Speed
• Security and Innovation
• Building Security Maturity
• Choosing the right security solution
• Regulating FinTech
• Compliance challenges
• Governance Challenges
We will also talk about the evolving security trends arising from cloud adoption, including building a DevSecOps workflow. We also hope to share best practices and tips for getting the most of your security investment.
Even if you don’t participate in a bounty program, they impact you and the systems you defend. Over the last decade, mature bug bounty programs have evolved from simply acquiring bug reports to providing real insights into vulnerability and exploit trends. Bug submissions to the available bounty programs had the unintended consequence of effectively crowd-sourcing vulnerability intelligence by showing industry trends and state-of-the-art exploitation methodologies. Bounty programs impact the exploit marketplace while disrupting exploit efforts of advanced threats and persistent actors. When combined with top-tier, in-house researchers, the best programs are capable of predicting the next major attack surface that will become popular based on what bugs are submitted to the program.
Join ZDI Director Brian Gorenc as he covers the current landscape of bounty programs and the winding, often controversial road that led us here.
Get ready, meet us in the booth, play the game and win a chance to enter our daily lucky draw on Huawei Nova 3 Dual SIM - 128GB, 4GB RAM, 4G LTE
*Note: It’s required to bring your own laptop
In front of Al-Saraya Hall - Level (-4)
21st & 22nd September, 2019