Internet pirate ‘Kevin Mutenk’ deliver a speech during the Gulf Conference on Information Security




Home | News | Security and Protection |
Internet pirate “Kevin Mutenk” deliver a speech during the Gulf Conference on Information Security

Cast Kevin Mutenk, the expert in the field of information security, and one of the most prominent Internet hackers around the world previously, keyword during the Gulf Exhibition and Conference for Information Security, which is organized and hosted by the Dubai World Trade Centre between 3 and 5 June.

And received Mutenk, who is visiting the Middle East for the first time, a world-wide reputation in the digital community, due to innovative methods to show weaknesses in the security of information systems for institutions and major international companies.

As one of the most prominent Internet hackers previously was Mutenk rich material dealt with a lot of news and articles in the international press, also appeared in several TV interviews and radio programs during which the famous explanations related to information security. And enabled previous Mutenk experience Kqrassan-mail from his conversion to consultant offers advice on the best and most efficient in terms of protecting the security of information and meet the increasing cyber crimes in various countries around the world.

And meet under the umbrella of the Gulf Exhibition and Conference for Information Security selected experts in the region and the world who specialize in this vital area, who will work to change the perception about the list a number of ideas that is considered one of the issues faced by institutions in the sensitivity of the area. The conference agenda includes a deep look past include cyber security, present and future, and the threats that loom on the horizon, in addition to a careful reading in some specialized fields at various levels, financing and economic, social and national security point of view purely.

And participate in the elite event of the speakers and delegates from prestigious institutions and companies in this area, during which سيتطرقون to a number of topics related to information security, suggesting effective strategies to address information security threats that affect governments, businesses and individuals.

Says magazine 9998 issued by the Ministry of Interior UAE One of the most sectors targeted attacks Electronic is the banking sector, which had its share of 35% of these attacks, according to a study by the ministry in cooperation with the International Data Corporation “IDC”, while distributed the remaining sectors e-government services, communications and academic institutions.

In a positive sign, signs Search for “Forest & Sullivan’s” advisory, high-volume market hardware and software for information security of about $ 340 million to one billion dollars by the year 2018, an increase of 18.3 percent annually. It is noteworthy that Andy Powell, Lewis, director of the practices of information and communication technology in the “Forest & Sullivan, will be one of the speakers at the conference.

And discusses Kurt Ople, vice president of innovation and virtualization technologies of the next generation the company has specialized in information security, “Lockheed Martin”, orientations cloud computing, and the future prospects of the development of this field is vital, as well as lessons learned from the development of the company to the method “Cyber ​​Agent Cheyne” smart private insurance various aspects of cloud computing.

For its part, offers RTA During the conference, a case study on how to integrate information security management system with information system governance framework. In this context, the Abdulla bastaki, Director of Information Technology Department at the Roads and Transport Authority’s commitment to vaccinate all information relating to customers, shareholders, employees and business operations in the face of all security breaches, by relying on a system based on trust, integrity and availability.

And attracts Conference and Exhibition Gulf of information security elite group of speakers regionally and internationally, such as Ahmed Hassan Mohamed Nur, director of operations, risk and compliance with security-related informational with telecommunications company du du, and Roberto Diniz, head of operational risk management at the Bank of Qatar International Islamic, iMac Martinez, senior adviser and member of the Board of Directors of the private sector in the National Council of the U.S. to the security of information, and Derek أوهالرون, head of the IT industry at the World Economic Forum, Tariq Chaudhry, head of information security in the “British Telecom”, and Muhammad Salim, head of informatics at the Saudi Ministry of Health, and Ayman al-Essa, adviser digital security in the oil fields “ADNOC”, the others.

The list of sponsors Conference and Exhibition Gulf of information security a number of prominent companies, especially the “LG IBM” Diamond Sponsor, and “any of the rings سيكيورتي,” and “HELP AG,” and “Juniper Networks”, patrons Zhbeyen, and “BlackBerry” , and “Kowalaz” and “Zerodaa” patrons Vdaan.

Will address conferees to discuss other major issues facing the region, notably the “repercussions of the security of cloud computing,” and “benefit from the experiences of 2012 and respond to the requirements of 2013”, and “to protect the nation from cyber warfare,” and “the protection of the digital economy,” and “human behavior in sensitive positions, “and” risk management electronic network. ”

The Gulf Conference and Exhibition for the security of information is an extension of the activities of GITEX Technology Week, the biggest event in the sector of information and communication technology in the Middle East. For more information are available at the site mail .
United Arab Emirates Saudi Arabia Qatar Kevin Mutenk the Gulf Conference and Exhibition for Information Security


Tags: , , ,

In: A Technology & Gadgets Asked By: [21487 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »