2nd Annual GCC ICS Cyber Security Forum

9, 10 & 11 April 2017, Dubai – UAE

Overview

Since attack and infection on the organization’s technology infrastructure are getting advanced and complex, stakes are no longer limited to virtual world, it can lead to significant losses in revenue, user productivity, customer relationships and market reputations.

This conference is designed to arm you with the pertinent and mission critical information on SCADA and industrial control systems which will help you to create tactics, techniques & procedures to improve the security of ICS System.

The ICS Cyber Security forum is the event where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions. The ICS Cyber Security forum, Dubai is the must attend event which brings together cyber security expert and control system to meet a common goal, securing the control systems.

Key Takeaways 

  • Gaining insight from both local and international cyber Security leaders
  • Addressing current Cyber Security challenges within organization
  • Empowering front-line cyber security managers to effectively engage employees of all levels
  • Instituting a security culture without effecting operational flexibility
  • Analyzing global Cyber threat landscape
  • Creating a robust cyber defense strategy
  • Exploring Case studies on latest cyber-attack and how it changes the narrative

 Visitor Profile 

Professionals belonging to the following profile find it useful and advantageous to be in 2nd Annual GCC ICS Cyber Security Forum 2017:

  • Automation & Process Control Engineering
  • System Designers & Engineers
  • Network Engineers
  • Head of Corporate Security
  • Industrial Security Director
  • Senior Security Consultants
  • Security Advisors
  • VP
  • CIO
  • IT Applications Manager
  • IT Security Specialist
  • Head of SCADA
  • Head of IT

Organizing Company: Immensoft Business Intelligence (IMNBI)

Event Name2nd Annual GCC ICS Cyber Security Forum 2017

Start date of the event: 0904-2017

End date of the event: 1104-2017

Event Country: UAE  

Event City: Dubai

Event URL:http://www.icssecurityforum.com/

Contact person’s name: Aqeel Ahmed 

Contact person’s email: aqeel@imnbi.com

Contact No: +971 527466844

 

Showcase your business to a government and private sector buying audience. Exhibit at 2nd Annual GCC ICS Cyber Security Forum 2017 and position your business and your offering to an active government and private sector buying audience.

(64)

Share

Over million Yahoo/Gmail accounts for sale on the dark web

Following the news that over 1 million decrypted Gmail and Yahoo accounts have been listed for sale on the dark web, below are some thoughts from Lee Munson, security researcher at Comparitech.com:

“In an ideal world, the fact that someone is selling stolen credentials, pilfered during data breaches from years gone by, should not be any cause for concern because everyone potentially affected would have already reacted in an appropriate manner.

“In reality, however, a great many people may have been put at risk, largely because they haven’t changed passwords that they have reused across several other accounts.

“Given the fact that records are exchanging hands for less than a penny each that poses a great danger.

“If anyone is concerned that their data may be caught up in this, they can check their email address on https://haveibeenpwned.com which will give them the perfect starting point, detailing every account that may have been compromised.

“Next, they should change their passwords on every affected site, choosing a different one for each. Then, they should change their passwords on every other account under their control if they match, less a hacker should find an easy way into them as well.

“Lastly, anyone affected by a breach who has left it this long to respond should prepare for next time, taking simple steps such as installing a password manager and security software, as well as taking some basic security precautions.”

 

(141)

Share