The Greek Campus
February 14 & 15, 2020
200 Available Seats
Lunch & CoffeeFor free
In 2017 Egypt was one of the top countries affected by the WannaCry Ransomware, and, unfortunately, things have not gotten better. According to Trend Micro, Egypt accounts for more than a third of all ransomware attacks in North Africa. Egypt is an attractive target for ransomware cybercriminals because there are so many new business starting up, but they have limited budget for security. This talk will review the ransomware threats, and discuss ways you can help defend your organization from ransomware, even on a tight budget. It will also provide an overview of resources you can use to better understand the threat and where to focus your limited security budget.Location: Library Hall Biography:
Allan Liska is an intelligence analyst at Recorded Future. Allan has more than 15 years’ experience in information security and has worked as both a blue teamer and a red teamer for the intelligence community and the private sector. Allan has helped countless organizations improve their security posture using more effective and integrated intelligence. Allan is also one of the organizers of Bsides Bordeaux and has presented at security conferences around the world. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the co-author of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.
The ability to block advanced threats improves each year, but we face adversaries who are determined and creative, and their techniques evolve just as quickly. This raises a few questions: When prevention fails, what do we have left to protect our organizations? How can we discover gaps as fast as possible? Having techniques in play to detect and respond to ongoing attacks quickly is as important as prevention. Threat hunting is a critical discipline that more organizations are using to disrupt stealthy attacks before they become mega breaches. It is the active search for “unknown unknowns,” which describes new and novel attack behaviors that aren’t detected by current automated methods of prevention and detection. It is, by nature, a “hands-on-keyboard activity,” driven by humans. Just like hunting in nature, anyone can do it, but the right experience and tools can make you much more effective.Location: Library Hall Biography:
Mohamed Sadat is an Information Security Expert with over 10 years of experiences in financial and IT corporations. He started his career path as a red teamer engaged in many penetration test and security assessments. Then he decided to switch to blue team side continue his career path in incident handling, forensic investigation and threat hunting. His areas of experience also include risk assessment, Business constitute, Threat Modeling, designing and implementing secure infrastructure and Governance, risk and compliance (GRC).
Deception is an evolving effective tool that will improve detection and defense capabilities of an enterprise netwrok. It can be integrated into existing defenses to provide more visibility into the enterprise, share threat intelligence data and feed SIEM with high probability alerts. It is highly accurate and can provide deep insight into enterprise network to detect zero days and advanced APTs. talk will be an overview of deception technology will be presented in this talk and we will learn how to plan, build and deploy a basic deception framework using free and open source tools.Location: Library Hall Biography:
Abdulrahman Al-Nimari is a self motivated renowned cyber security expert and a frequent conference speaker. Al-Nimari spend his time breaking, fixing, teaching, consulting and architecting security stuff. He has more than 25 years experience, with 15 of them in cyber security concentration. He played many roles in different IT and Cyber Security fields in both public and private sectors. His specialties and areas of interests include DFIR, Penetration Testing, Cyber Security consulting and Architecting. Awarded the Arab Cyber Security Social Networks Influencer for 2019.
AI is the simulation of human intelligence processes by machines, especially computer systems. These processes include learning, reasoning, and self-correction. Integrating it with cyber security is beneficial because it improves how security experts analyze, study, and understand cyber-crime. In this talk, we will discuss & explain AI and how to integrate it with cyber security to detect many types of attacks. The talk will cover many applications in cyber security in which we can apply AI to improve those applications. Finally, we will present a demo on how to build your development environment with some scripting examples.Location: Library Hall Biography:
Mohammad Khreesha is a cybersecurity consultant from Jordan with 13+ years of experince. Mohammad deliver workshops, talks, and trainings on cybersecurity in Jordan, UAE, Egypt, Kosovo and other countries. His research interests in digital forensics, malware analysis, web & network security and their integration with AI. He acts as a leader for OWASP Amman chapter and he is the founder of JISCTF which is the first CTF in Jordan with more 150+ yearly participants. He has a YouTube channel in which he publishes training courses and tips in Cybersecurity field to feed the Arabic content on the internet.
The plague of computer security for the last 40 years has been the buffer overflow.This common vulnerability has given rise to a flood of different worms and exploits. In this session we will explore the journey of vulnerability research.Catching crashes with fuzzing, then exploring the interesting topic of brute-forcing and symbolic execution while defeating malwares like hidden logic bombs and nasty IDA graphs.Location: Library Hall Biography:
Electrical Engineering student and ACM ICPC problem solver since 2016. I find my passion in reverse engineering doing malware analysis and exploitation development. True competitions team player, I’ve achieved top ranks in Egyptian CTFs as well as winning CyVentuers : the first cyber security hackathon developing anti-ransomware solution while snatching the 15K dollars funding.
Modern web applications is switching to serverless functions because its simple and cost effective. But serverless functions has its own concerns and vulnerabilities. We will dive into vulnerabilities and attacks and we will review the best practice to deploy serverless functions,specially Aws Lambda function from the offensive and defensive sides.Location: Library Hall Biography:
Developer, security evangelist and CEO & founder of Shieldfy. 13+ years of experience in web development. Worked as a developer, team leader, security consultant at many companies in Egypt, Qatar, UAE and Canada. Founded Shieldfy, a security platform for developers.
This talk is about insecurity of POS and fraud that can you be on. From the classic skimmer, eavesdropping, modification, and installation of third-party software to hardware tampering POS. Talk also covers POS security features, main brands, cybercrime, methodology to POS tamper, impacted models, security countermeasures, PCI DSS, EMV, insecurity of EMV and NFC.Location: Library Hall Biography:
Fan of tech and cybersecurity, ISECOM OSSTMM instructor, trainer for security courses, speaker, researcher. Almost 10 years in the cybersecurity world. During recent years, he has specialized in payment systems EMV, NFC, POS, ATM. Currently, the director of R&D LATAM at Dreamlab Technologies.
Whether people admit or not, we are moving to the cloud. Moving to the cloud requires different set of architecture and mindset. Data is stored, accessed and processed on different platforms and devices. Employees are working anywhere from the world, corporate data is no more under company IT custody. Security professionals need to change their mindset. This session will try to draw the main areas of concern from Security perspective based on MITRE cloud matrix. Demos will be provided on different topics. Come and join a deep technical session with no marketing or time wasting content.Location: Library Hall Biography:
Ahmed Nabil has more than 17 years of experience in the field of Information Technology/Systems, Infrastructure, Project Management, Information Security, Application development/Automation, IT management and holds several professional IT certifications. Ahmed is an industry expert in Information Security and Digital Transformation, public speaker at several international conferences (Microsoft Ignite the Tour, ITCamp Cluj, CISO Africa Summit, Egypt CSCAMP, SharePoint Saturdays, CloudWeekend…..etc.) and author of several articles published in different international security magazines. Ahmed Nabil graduated in 2000 with a BS in Electrical and Control Engineering. He is currently the Global Chief Architect at one of the top Oil and Gas companies in the world. Ahmed was awarded the Microsoft Most Valuable Professional Award in Enterprise security/Cloud and Data Center Management for 7 years in row from 2013 to 2020 for his exceptional knowledge sharing and community leadership in Egypt.
bsidescairo [at] gmail [dot] com