Shah Sheikh

Sr. Security Consultant DTS Solution (UAE)

SPEAKER INTERVIEW AVAILABLE
BIOGRAPHY

Specialties: Mobile Network Security – 3GPP (GTP) and LTE (SecGW) TS33.201/301 security architectures and service flow analysis.

Managed Security Service Provider (MSSP) solution architecture design and deployment – SSL VPN and UTM offerings.

Cloud Computing Security Control Design – Multi-tenancy, Virtualization, Elasticity, Encryption Key Management.

SCADA/ICS Security – Secure Architecture and SCADA Security Operations Center

Building a Cyber Security Operations Center

Modern day cyber threats are ever increasing and organizations face a challenge to proactively and continuously monitor security posture across their entire infrastructure whilst keep attackers and threat actors at bay. In this presentation we will cover the fundamental building blocks of building a security operations center that is proactive and act as the line of authority for all your other security entities like incident management, forensics, vulnerability management etc. A reference case study will be presented along with proven implementation methodology.

1. SIEM 2.0 – log collection, aggregation, analytics and correlation
2. Contextual Threat Cases and Situational Awareness
3. SOC 2.0 and its components to form an eco-system.
4. Building Threat Intelligence and Early warning detection system within your command center.
5. Some new concepts – OSINT and SOCMINT and how it helps.
6. SOC Processes, Procedures and Workflows.
7. Execute!

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

David Sancho

Senior Malware Researcher Trend Micro (ES)

Teodor Cimpoesu

Technical Director CERTSIGN

Paul Coggin

Senior Principal Cyber Security Analyst Dynetics Inc (USA)

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

At Orange Business Services, we help our customers transform their industries, reimagine their services, create a positive impact and unleash the power of their data into an amazing and trusted resource.

With the dual expertise as a global operator coupled with the agility of an end-to-end integrator, Orange Business Services is a global network-native, digital services company. From connectivity, smart mobility services and the cloud to artificial intelligence (AI), analytics and cybersecurity, Orange Business Services helps businesses at every stage of their data management. Orange Business Services is represented in Romania by the business division of Orange Romania and helps large companies, SMEs and public authorities to transform their organizations through the use of technology and digital information.

www.orange.ro

MAIN PARTNERS

PARTNERS

HACKING VILLAGE PARTNERS
COMMUNITY & MEDIA PARTNERS