CLOUDSEC 2019

PICTURE THIS! See.
Secure. Go Further.

Welcome to CLOUDSEC Cairo 2019.

Picture an organization that can prepare for, withstand, and recover from any cyber security threat—one that's so resilient nothing can hinder its success. Picture how it can easily adapt to increasingly complex and shifting IT environments. Picture how it sees cyber security as a strategy, and has a clear vision of how ever-changing threats and risks should be managed.

Picture that organization as your own.

The computing landscape continues to introduce challenges amidst exciting new technologies, hyper-connectivity, and benefits. Organizations need to see order in chaos, see things from a different perspective, and even step back to see the big picture. Because having visibility through the power of collective and connected intelligence helps build cyber resilience, and allows you to go further and do more.

Now for the first time in Middle East and Africa, we are expanding CLOUDSEC series to be hosted in Cairo, Egypt. Be sure not to miss this leading internet security event!

CLOUDSEC Cairo

Agenda

8:00 - 9:50
Registration
10:00 - 10:30
Opening Remarks -- Picture This!
Cherif Djerboua, AMEA Technical Executive | Trend Micro
We take the audience on a journey into the future. A one that we fully expect to see revealed over the next decade. This session will identify key technological and societal shifts that are changing the ways we act, interact and do business and will attempt to illustrate how these shifts could change attackers’ tools, targets and behaviors. While the motivations remain largely the same, money, intelligence and influence; the ever-accelerating pace of change means that the faster-moving, hyper-connected, artificially intelligent world of the coming decade will seem so much further removed than 2009 already does. Citing concrete examples of an all-too-plausible future we will ask the question “Is your organization up to the challenge?”
10:30 - 11:05
Cloud Security Best Practices
Ahmed Anwar, Security Presales Manager | FiberMisr (Equinox)
This Segment will emphasize on how to build a cloud applying security best practices and describes how is the cloud environment differ from the traditional enterprise which is reflecting on how we secure the cloud and which points we should focus on.
11:05 - 11:40
FinTech Security: Challenges in Security and Compliance
Bahaa Othman, Head of Information Security and Compliance | Fawry
During this segment, we will discuss the key points of:
• Why FinTech is different from Security and Compliance Perspective
• Building Security for Growth and Speed
• Security and Innovation
• Building Security Maturity
• Choosing the right security solution
• Regulating FinTech
• Compliance challenges
• Governance Challenges
11:40 - 12:15
New Perspective in the hybrid cloud
Bilal Baig, Technical Leader | Trend Micro
During this segment, we will discuss how the cloud environment has evolved over the years, from on-premise, virtual machines, hybrid cloud, and to containers and serverless applications in the future. We will also talk about the evolving security trends arising from cloud adoption, including building a DevSecOps workflow. We also hope to share best practices and tips for getting the most of your security investment.
12:15 - 12:45
Coffee Break
12:45 - 13:15
Kubernetes - Run infrastructure 10x Faster, Secure, Reliable and Efficient.
Mohamed Ahmed, Co-founder and CEO | Magalix
Kubernetes is the fastest-growing open-source solution to build enterprise-grade and cloud-native scalable infrastructure. If adopted with the right goals in mind, your team will move 10X faster, with more secure, reliable, and efficient infrastructure. It is still a challenge though for many teams and companies to take that leap of faith and achieve these goals. In this talk, we will quickly introduce Kubernetes and why you should start using it to modernize your applications and infrastructure. I'll walk you through the typical adoption journey (day-0, through day-2), and how you should prepare your organization in each of these phases. We will finally touch on key topics to build agile, reliable and secure Kubernetes managed infrastructure. You don't have to have any prior knowledge about containers or Kubernetes to attend.
13:15 - 13:50
Zero Day Initiative - Examining the Inner Workings of the Bug Bazaar
Brian Gorenc, Director - Zero Day Initiative | Trend Micro
Bug bounty programs are nearly ubiquitous today, but that wasn’t always the case. When the Zero Day Initiative (ZDI) was founded in 2005, bug bounty programs were considered to be a rare and somewhat controversial commodity. Now they are seen as an indispensable means for companies to acquire bug reports. Our initial goals were similar. The ZDI program extended our own research team by leveraging the methodologies, expertise, and time of others around the globe. Imagine adding more than 3,000 independent researchers from around the world to your team. Having the program asymmetrically enhanced our research capabilities through vulnerability acquisition. The program also provided the data needed to protect our customers while the affected vendor worked on a patch. Since that time, the program has awarded more than $15 million USD while ensuring nearly 4,000 0-day exploits were patched by vendors, all of which makes the computing landscape a safer space and makes ZDI the world’s largest vendor-agnostic bug bounty program.

Even if you don’t participate in a bounty program, they impact you and the systems you defend. Over the last decade, mature bug bounty programs have evolved from simply acquiring bug reports to providing real insights into vulnerability and exploit trends. Bug submissions to the available bounty programs had the unintended consequence of effectively crowd-sourcing vulnerability intelligence by showing industry trends and state-of-the-art exploitation methodologies. Bounty programs impact the exploit marketplace while disrupting exploit efforts of advanced threats and persistent actors. When combined with top-tier, in-house researchers, the best programs are capable of predicting the next major attack surface that will become popular based on what bugs are submitted to the program.

Join ZDI Director Brian Gorenc as he covers the current landscape of bounty programs and the winding, often controversial road that led us here.
13:50 - 14:20
Containers and Serverless Evolution on AWS
Ahmed Youssef, AWS subject matter expert | Fastlane Egypt
In today’s world, working with more of services instead of actual resources is most effective and provide better reliable solution. We are going to be talking about serverless, container and how this can add a significant increase in performance while providing a huge cost optimization.
14:20 - 14:50
Coffee Break
14:50 - 15:25
The Latest Trends in Technology
Andrew George, Threat Research Engineer | Trend Micro
This segment showcases the current and future challenges in adopting new technology in terms of visibility and how to maintain a solid security strategy that makes your organization more and more resilient.
15:25 - 16:25
Executive Panel Discussion: Examining security challenges through the CISO lens

Moderator

Mohamed Samir, Enterprise Business Development Manager | Trend Micro

Panellist

Ahmed Anas , Corporate Information Security Manager | EFG Hermes Holding
Mohamed Wali, Sr. Manager. Technical Security Operation |Orange Egypt
Wessam Maher, Chief Information Security and Risk Officer | The American University in Cairo
Mohamed Soliman, Business Technology Infrastructure Lead | Amoun Pharmaceuticals S.A.E.
16:30 - 16:45
CLOUDSEC Challenge Rewards
16:45 - 17:00
Raffle Draw
17:00
Lunch
Test your InfoSec Knowledge and Receive a completion certificate powered by Trend Micro Education.
InfoSec – 301 Quiz includes questions from different categories like;
• Network Security and Cryptography
• Web Application Security
• Reverse Engineering & Malware Analysis
• Incident Response & Digital Forensics

Get ready, meet us in the booth, answer a minimum of 5 questions in each category and win a chance to enter our daily lucky draw on Huawei Nova 3 Dual SIM - 128GB, 4GB RAM, 4G LTE

*Note: It’s required to bring your own laptop
Find Trend Micro Booth at Intercontinental Cairo City Stars,

In front of Al-Saraya Hall - Level (-4)

21st & 22nd September, 2019

Speakers

Ahmed Anas

Corporate Information Security Manager | EFG Hermes Holding

View Bio

Ahmed Anwar

Security Presales Manager
Fiber Misr (Equinox)

View Bio

Ahmed Youssef

AWS Subject Matter Expert
Fastlane Egypt

View Bio

Andrew George

Threat Research Engineer
Trend Micro

View Bio

Bahaa Othman

Head of Information Security and Compliance
Fawry

View Bio

Bilal Baig

Technical Leader
Trend Micro

View Bio

Brian Gorenc

Director - Zero Day Initiative
Trend Micro

View Bio

Cherif Djerboua

AMEA Technical Executive
Trend Micro

View Bio

Andrew George

Threat Research Engineer
Trend Micro

View Bio

Mohamed Samir

Enterprise Business Development Manager
Trend Micro

Mohamed Soliman

Business Technology Infrastructure Lead
Amoun Pharmaceuticals S.A.E.

Registration

Sponsors

Hosted by:

Supporting Organisation:

Event App

Download CLOUDSEC 2019 app
For Blackberry or Windows Phone, Click here
For feature details, visit Whova

Intercontinental Cairo City Stars

22nd September
Sunday

Intercontinental Cairo City Stars

22nd September Sunday

Conference

Event Speakers

Cherif Djerboua

AMEA Technical Executive | Trend Micro

As Technical Leader for AMEA (Asia Pacific, Mediterranean, Middle East and Africa), Cherif Djerboua acts as the CTO for the region, focusing on technical strategy, innovation and quality assurance.

Cherif joined Trend Micro in the early part of 2017 from Microsoft, where he held numerous consulting, program management and leadership roles. During his 26+ years’ career, he engaged with customers and partners worldwide, including dozens of Fortune 500 companies, to set vision, strategy and execution to achieve business transformation.

Cherif recently relocated from Ottawa, Canada to Dubai, UAE. He holds a Masters in Chemical Engineering and a Bachelor in Environmental Engineering from the University of Constantine and holds several industry certifications.

Conference

Event Speakers

Bahaa Othman

Head of Information Security and Compliance | Fawry

With over 15 years’ experience in Cyber Security focusing on Financial and Critical Infrastructure, Bahaa is Managing Security for Institutions like, Egyptian Exchange, First Abu Dhabi Bank, and Fawry and consulting many other governmental firms.

Bahaa has been a speaker in many Cyber Security conferences and panels and he is delivering security training for very specialized topics. Known as the Technical CISO, who can merge between deep technological architectures and Governance.

Bahaa is Holding BSc. Computer Systems Engineering and Cyber Security Diploma from ITI (the 1st intake ever).

Conference

Event Speakers

Brian Gorenc

Director - Zero Day Initiative | Trend Micro

Gorenc leads the Zero Day Initiative (ZDI) program, which represents the world’s largest vendor-agnostic bug bounty program. His focus includes analyzing and performing root-cause analysis on hundreds of zero-day vulnerabilities submitted by ZDI researchers from around the world.

The ZDI works to expose and remediate weaknesses in the world’s most popular software. Brian is also responsible for organizing the ever-popular Pwn2Own hacking competitions.

Conference

Event Speakers

Andrew George

Threat Research Engineer | Trend Micro

As Threat Research Engineer, Andrew George focuses on the study and analysis of modern threat landscape with the technologies needed as part of the threat response process.

Andrew joined Trend Micro in 2017 as Systems Engineer where he leads the engineering team towards establishing professional, consultative and supportive relationships with Trend Micro customers and partners.

Andrew is recently relocated from Egypt to Canada. He is recognized for his vision and knowledge in developing future growth in the IT industry, cloud and container security. He holds a bachelor degree in communication engineering and several Security Certificates.

Conference

Event Speakers

Ahmed Youssef

AWS Subject Matter Expert | Fastlane Egypt

Ahmed Youssef is an AWS cloud subject matter expert at Fastlane Egypt and an AWS authorized instructor, where he is responsible of handling: Training, Couching, Conducting workshops and cloud Consulting. Providing high available and complex Solution Architectures according to customer needs and applying Technical knowledge in providing Automation Solutions on AWS for different environments

Conference

Event Speakers

Mohamed Ahmed

Co-founder & CEO | Magalix

Mohamed Ahmed is co-founder and CEO of Magalix. He is on a mission with his fellow Magalixers to add intelligence to cloud-infrastructure to be self-healing using machine learning. Mohamed got his Ph.D. in high-performance computing from UCONN. He is a proud alumnus of Amazon Web Services (AWS) and Microsoft Azure. Mohamed also held numerous leadership position at different companies focusing on helping teams to operate 10x faster with the right focus. Mohamed has 13 publications in operating systems extensibility and high-performance computing.

Conference

Event Speakers

Brian Gorenc

Director - Zero Day Initiative | Trend Micro

Gorenc leads the Zero Day Initiative (ZDI) program, which represents the world’s largest vendor-agnostic bug bounty program. His focus includes analyzing and performing root-cause analysis on hundreds of zero-day vulnerabilities submitted by ZDI researchers from around the world.

The ZDI works to expose and remediate weaknesses in the world’s most popular software. Brian is also responsible for organizing the ever-popular Pwn2Own hacking competitions.

Conference

Event Speakers

Bilal Baig

Technical Leader | Trend Micro

Bilal Baig is the Technical Director for Trend Micro Middle East and North Africa (MENA). In his role he is managing and developing Trend Micro high performance technical team across the region into delivering security solutions to enterprise and government sector. He is well versed in virtualization technologies, cloud security solutions, endpoint security, Public Key Infrastructure and acts as a solutions specialist for cloud and data center security for MENA region, providing subject matter expertise for major projects.

Mr. Baig has over 15 years of experience in Information Security, with a track record of success. He has worked on projects across 5 continents. Mr. Bilal holds an Engineering Degree from Carleton University, in Ottawa, Canada. He is currently based in Dubai, UAE.

Conference

Event Speakers

Ahmed Anas

Corporate Information Security Manager | EFG Hermes Holding

Ahmed Anas is a cyber-security professional who built and led teams of cyber security experts towards delivering mega projects in the MENA region with impressive results, with extensive experience in designing and implementing security infrastructure and applications. Ahmed has been engaged in many penetration testing and red teaming projects. His areas of experience also include risk assessment and GRC, incident handling and response, SOC implementation and forensics investigation. Ahmed earned his master’s degree in Computer Science from Cairo University with a thesis in the field of cyber security, the candidate is a SANS GIAC Web Application Penetration Tester, EC|CEH certified and IBM Certified Specialist – Rational AppScan Security Edition.

Conference

Event Speakers

Ahmed Anwar

Security Presales Manager
Fiber Misr (Equinox)

Ahmed Anwar is security pre-sales manager at Fiber Misr (Equinox), with over 17 years of experience in different security technologies, Ahmed is leading the security presales and architecting activities across different market verticals (Government, Telecom and Enterprise) in addition to acting as a trusted advisor for many of enterprises and government firms in Egypt.

Ahmed holds a Bachelor degree of Communication & Electronics Engineering.

Conference

Event Speakers

Mohamed Soliman

Business Technology Infrastructure Lead | Amoun Pharmaceuticals S.A.E.

Gorenc leads the Zero Day Initiative (ZDI) program, which represents the world’s largest vendor-agnostic bug bounty program. His focus includes analyzing and performing root-cause analysis on hundreds of zero-day vulnerabilities submitted by ZDI researchers from around the world.

The ZDI works to expose and remediate weaknesses in the world’s most popular software. Brian is also responsible for organizing the ever-popular Pwn2Own hacking competitions.