Cyber Warfare in the Gulf: A Peek to the World of Cybersecurity
Cyber Warfare in the Gulf: A Peek to the World of Cybersecurity // Cyber Warfare in the Gulf: A Peek to the World of Cybersecurity //
COMPANIES
level/floor
3 hours
Duration
A total of .3 hours
academic hours
By Order
Course Opening Date
According to Order
Days & Hours
- About the course
- Study Divisions
- Lecturers
- Media
- More Courses
01
About the Seminar
In collaboration with Sorp
A unique thought-provoking seminar introducing what you need to know to protect your organization. Learn from our Israeli experts manning the frontline of cybersecurity warfare.
For the first time, after setting our footprints in the UAE by collaborating with SORP, we are delighted to introduce our introductory seminar led by our Israeli Experts.
This unique, thought-provoking seminar is designed for people with an interest in the world of information security. The seminar will focus on three vital and fascinating topics: Iran as an offensive security power; When things go wrong: Do’s and Don’ts; SIEM/SOC as a Service.
This seminar is suitable for anyone with an interest in cybersecurity: C-level managers, general employers, IT and Cyber Professionals and the general public. No previous knowledge is required!
Read more03
Target Audience
This seminar is suitable for anyone with an interest in cybersecurity: C-level managers, general employers, IT and Cyber Professionals and the general public. No previous knowledge is required.
Read more05
This unique, thought-provoking seminar is designed for people with an interest in the world of information security. The seminar will focus on three vital and fascinating topics in cybersecurity.
- What forces are shaping the agenda of cyber offensive power states?
- What are the motivations and abilities these countries have?
- What countries are particularly targeted by these powers?
- What technological advancements facilitated offensive abilities?
- Is it ever going to be too late to deal with these threats?
- What can and can’t we do to protects ourselves?
- Alertness and preparedness for a potential incidence (routine protocols, precaution and eliminative measures, etc.)
- What are the first signs that a cyberattack is happening in your organisation?
- What are the very first steps that your people must do to understand what is happening?
- Steps in detecting an incidence and initial analysis of the situation.
- When and how does an incidence is declared as a ‘cybersecurity incidence’?
- Steps to assessing, containing, and reducing the threat.
- Frequency of reporting and evaluating the situation.
- Communication channels with internal and external role holders (administration, management, juniors and general employees, costumers, media, authorities etc.)
- The interplay between internal and external departments (legal, spokesperson, finance, consumer services, partner, cybersecurity professionals and non-cyber security personnel)
- Damage assessment
- BCP/DRP initiation
- Closure, documentation, and organisational learning processes
- What is MMSP, and how does it work?
- Is outsourcing my monitoring services safe for my organisation? Does it put my information in danger?
- Will it solve all of my worries and problems? Is my organisation immune?
- A practical illustration: See Secure’s approach, methodology and services.
- How to set up a SIEM/SOC centre?
LECTURERES
Nadav Nachmias, Adv., MBA, CISSP
Cyber Warfare in the Gulf: A Peek to the World of Cybersecurity
As an International (ISC)2 Instructor for CISSP, Nadav serves as the Pedagogical Manager of the college and head of CISO Program with a wealth of experience in Cybersecurity counselling for critical sectors for Technology Architecture and Methodological aspects.
Ami Zarfati, OSCP, CCE, CISO
Cyber Warfare in the Gulf: A Peek to the World of Cybersecurity
A senior cybersecurity professional with a focus on Malware Analysis, SOC, Incident Response, Forensic and Cyber threat intelligence. Ami has a rich experience in designing, training and implementing SIEM-SOC centers in large-scale and sensitive organisations and state agencies. Currently, Ami manages the cybersecurity monitoring center at Ben-Gurion Airport. He is a senior lecturer in our CISO program.
Itzik Moshe
Cyber Warfare in the Gulf: A Peek to the World of Cybersecurity
Head of Hacking Defined Experts programme, Itzik is an experienced cybersecurity researcher and penetration tester. In his 20 years of experience, Itzik has worked with governmental, military and intelligence agencies both nationally and internationally.
Cyber Warfare in the Gulf
Cyber Warfare in the Gulf