Cybersecurity Speaker Ubaid Jafri - CyberInfluencer --!





Ubaid Jafri, a cybersecurity influencer, helps organization to combat and defeat against the increasing cybersecurity threats and protect their business from massive losses, secure their assets from advance cyber threats.

 

90% of cybersecurity controls failed not because of Technology Gap, but because of Process Gaps.

Get Started UJ's Projects

About UJ


A talented motivational speaker who weaves real-life experiences into a presentation that is both entertaining and rewarding, ubaid provides practical insights into real work situations relevant to many industries. He brings a practical, proactive approach to the digital era inspiring audiences to be present now to be prepared for the future. He weaves his expert knowledge with his inspiring, heroic stories to deliver practical security insights for businesses everywhere.
Mr. Jafri is an M.S in Information Security(MS-IS) and has been in commercial banking and the risk management consultancy industry for over 12 years. In early era of his career he was a known professional for providing security assessment services related to Security of Network & Infrastructure and Dynamic Applications across Pakistan. He has achieved 17+ global renowned Cyber Security Certifications. Dozens of communication and cyber security intrusions, as well as penetration red-team attacks, have been conducted by Mr. Jafri for various organization including utilities, power, Banking & Financial Institutions and others. These “attacks” have uncovered a variety of cybersecurity vulnerabilities including unauthorized access, penetration, sensitive information disclosure, system compromise and hijacking of control. While the committee is unaware of any successful hostile cyber attack on the systems that control the operation of either a power system / banking system / monitoring system, the risks posed by such attacks are sufficiently large to warrant serious consideration. Timely communication of such vulnreabilities have led organizations to secure from massive cyber breaches.
He has also imparted Lectures/Seminars/Conferences/Global Debates on different topics globally in the field of Cyber Security including Compromise Assessment, Cyber Warfares, Mobile Application Security, Ethical Hacking, Cyber Forensic, Cyber Criminology, Cyber Readiness Assessment, and Operational Technology. His 60+ publications are the remarkable contribution in the field of Information Security & Forensic Technology.
He is currently serving as Head of Cyber Defense and Offensive Security in Habib Bank Limited, Prior to joining HBL he was working with FMCG and with a Global Firm KPMG for over 5 years as Senior Manager Cyber Security & Forensic Technology where he had been leading the technical team of Cyber security & Forensics Technology in Pakistan.
He is one of the leading experts who has hands-on experience in the leading technology relevant to Cyber Defense, Offensive Security, Red Teaming, Cyber Analytics, Emerging technologies, Cyber readiness, Internet of things, Digital forensic, Incident Handling & Response, identity and access management, Business continuity management, Data leakage prevention, Security transformation & Integration, Threat intelligence, Security operations center, Compromise Assessment, Security program support and security strategy & Governance.
He worked on portfolio of over 100+ clients to deliver his experience to reputed clients in USA, Netherlands, Pakistan, Oman, Egypt, Sri Lanka, Abu Dhabi, Dubai, Bahrain. He posses honor of being a mentor of renowned information security professionals by providing training and guidance. To the fraternity of information system and security he had contributed through delivering information security related courses in over 10+ universities of Pakistan.
To the fraternity of information system and security he had contributed through delivering information security related courses in over 10+ universities of Pakistan. The specialties regarding the domain of information security can be categorized as below:
  • Data Loss Prevention
  • Network Infrastructure Security Assessment
  • Vulnerability Assessment & Penetration Testing
  • Digital Forensic Investigations
  • I.T Governance & Compliance
  • Security of Cloud Computing
  • I.T Infrastructure Security
  • Information Security Compliance Readiness
  • Business Continuity & Disaster Recovery Planning
  • Digital Transformation & Integration
  • Compromise Assessment

Contribution to the world of Cyber..

  • 20+ articles published over the Internet which includes controls that can be encountered Data Leakage, Securing POS Terminal, Network Architecture in context of Information Security, 7 Layers Security Assessment etc.
  • Highest Marks Achiever in CISCO Examination (2010).

Cyber Security Awareness

Conducted various Cybersecurity Awareness Sessions for Corporates, Students (Schools, Colleges, Universities), Women in Technology, his distinctive contribution has open up new avenues of learning & development in the field of Information and Cybersecurity which are remarkable.

Honored Guest

He has been the Guest of Honor in many educational institutions and security summits of National & International Level.

Leader Board

Ubaid Jafri is on the Leader board published by IT Central Station on Crowdstrike, Imperva Encapsula, Barracuda, Symentec and Cisco.

Forensic Technology Services

Mr. Jafri has recorgnized as a well known cybercrime Examiner and Investigator, he has conducted various forensic Investigation(s) for global clients and Top Banks of Srilanka, Oman, Pakistan

  • Assisted the forensic function in the investigations and other related services that specifically includes maintaining chain of custody for suspected systems, imaging of hard-drives data, indexing and retrieval of data for the keywords searches and other data analysis where needed. Ubaid has been involved in more then 40+ forensic investigations with local and international clients.
  • Conducted live aquisition in corporate environment, Hands on experience in physical and logical imaging & tools such as ProDiscover, Encase, Access Data FTK Data Imager Digital Evidence and Forensics Toolkit, Autopsy, Oxygen Forensic Suit etc.

Public Speaking - Panel Discussions / Conferences / Workshops & Seminars / Webinars

The way Mr. Jafri expresses cybersecurity is very different, he brings real life examples on the stage and delivered his experience in the form of Demonstrations, Simulations, Illustration globally.

Public Speaking Topics

  • A battle against intrusion Cyber Warfare (Black Magic with White Intension) - Keynote Speaker
  • Cyber Warfare - A battle against Corporate & Economic Terrorism - Keynote Speaker
  • Smartphone Threats & Counter Measures - Keynote Speaker
  • Digital/Cyber Forensic & Compromise Assessment Detecting & Defeating Intruders - Keynote Speaker
  • Cyber Security Awareness - Patching Human Layer - Keynote Speaker
  • Cyber Readiness Assessment-Live Simulated Cyber Drill Compromising Digital Identity - Keynote Speaker
  • Digital Forensic & Incident Management - Keynote Speaker
  • Digital Forensics & Cyber Security - Keynote Speaker
  • Defensive vs Offensive Security - Keynote Speaker
  • Combating Against Cyberwars in OT/IIOT Networks - Keynote Speaker
  • Avenues in Stem Education Carriers in Digital Forensics - Keynote Speaker
  • Cyber attacks & risk of bank failures - Solo Speaker
  • Combating Cyberwarfare: A clear & present danger - Panelist
  • Combating against deceptive techniques used by cyber criminals in Rail Networks - Live Demonstration - Solo Speaker
  • Weaponizing Smartphones for Mass Distraction & Destruction - Solo Speaker
  • Supply Chain Attacks: how to prevent and how to manage? - Round Table Session
  • Case Study Industrial Supply Chain Cyber Security - Solo Speaker

UJ's Articles

The section includes latest articles and information about modern cyber threats, malwares, phishing, intrusion, Data leakage, Cybersecurity in cloud, DoS & DDOS, ATM/CDM devices.

Click Here to access UJ's Articles Library.

  • The detailed Encyclopedia helps corporate and individual to get the visibility regarding latest guideliens, Framework, checklist etc.
  • Guidance regarding professional use cases and realistic scenarios which can be utilized in a stunning informational presentation.

UJ's Projects

Click Here to access Ubaid Jafri Projects Library which includes both technical and non technical projects for Corporate and Students, for Comprehensive Project portfolio to redirect you to the detailed projects of Digital Forensic, Ethical Hacking, Data Leakage, Audit etc.& Designed and developed on different programming languages, some of the famous and recorgnized projects are mentioned below

Automated Network Management System

An automated networked based system which identifies the outdated ptches in the client machines, Assess the fault occured in the client machines and Automatically scan client machines for os and application realated vulnerabilities

Project HoneyNet

A Project designed on Linux kernal with customized scripts and enhaced Intrusion detection system, System has the capability to create, manage and replicates different profiles of operating system in order to record the pattern used by Malicious intruder

WordPress Security Scanner

A tool designed on Asp.net with customized script used by the wordpress in order to identify the default, weak, unmanaged security flaws in the wordpress site. The scanner scans the wordpress site by simply entering the URL of the website, generates the report which includes (Risk, Impact, Severity, and Recommendations)

Internal & External Network Security Auditor

A tool specifically designed to assess the (Internal and External) vulnerabilities of system, the tool has the capability to perform penetration testing by taking permission, It also takes the inventory of the system which includes (Services details, Installed Programs, open ports and default protocols

Digital Investigator

A Digital forensic tool developed on C#.Net, specifically designed to track the Users activity by providing the timestamps (Date range). Tool has the capability to create a visual graph of the user activities perform on that certain period of time for example (Login, Application Launch, data Saved, external Drive Plugged in, Recent open files etc.

System Performance & Security Enhancer

A Small Tool Developed on C#.Net Platform, ability to enhance the performance of the system by modifying the registry keys, disabling unnecessary ports, services, protocols, and update the registry key by creating DWORD which increase bandwidth utilization, clear RAM memory spaces

Checking Unofficial Presence Over the Internet

A tools developed in C#.Net Platform, specifically designed to identify an organization unofficial presence over the internet which includes (Unofficial Web pages, Social media Pages, Jobs Publications, Articles negatively shared on internet)etc. The application can also identify the fake websites developed by misusing the name of the organization.

Mobile Application Security Assessor

A Tool Designed & Developed on C#.Net Platform, The tool can conduct an individual assessment of Mobile Application (.Apk) files in order to assess the security of mobile application, the tool has the capability to perform the following task (Reverse Engineering, Lack of Binary Protection, Cloning, Sensitive Link Disclosure,

Publications | Cyber & Information Security

There are multiple publications of Ubaid Jafri hosted on the Internet, following are some of the list of publications related to cybersecurity & Digital Forensic & Information Security.

Controls To Ensure Data Leakage Prevention

Network and security devices that provide control mechanism for Data Leakage Prevention can encounter malfunction due to improper configuration and/or unavailability of functionality. Lack of co-ordination between professionals from Information Systems, IT Security, Data Security, Risk Management,Network Operations and Forensics which possess risk to organisation to understand the risk treatment against Data Leakage by understanding the data available in organisation and mediums of data transfer in environment which may include the mediums on computing devices, visual,networking devices and data entry & extraction tools.

Read more

Reducing the difference of IT DR and Cyber drills

Every IT DR Drill may not falls under the category of cyber drill scenario. whereas every cyber drill scenario is IT DR Scenario, whereas in order to get ready before any other attack strike in an organization, cyber drills are become the necessary requirement. considering the difference of cyber drills and business continuity plan drills.

Read more

Requirement for creating a Penetration Testing Lab

A document is designed to make a Penetration test LAB in order to simulate the vulnerabilities in the testing environment and to execute the vulnerability assessment & penetration testing from the LAB by providing the Static IP to the Client, ensuring that the test is being performed from a valid/legitimate link.

Read more
24

No. of Published Articles

101

Researches & Projects

9

International Affiliation

18

Awards & Achievements

National / International Trainings & Seminars Glimpses

Cyber Warfare

Cyber Warfare - A Battle against Intrusion

GITEX - 2022

Gulf Information Technology Expo - 2022

GITEX - 2022

Gulf Information Technology Expo - 2022

GITEX - 2022

Gulf Information Technology Expo - 2022

GITEX - 2022

Gulf Information Technology Expo - 2022

GITEX - 2022

Gulf Information Technology Expo - 2022

Third Party SCCS

How to Combat against Threat Actor & Vectors in ICT/OT Network

GITEX - 2022

Gulf Information Technology Expo - 2022

GITEX - 2022

Gulf Information Technology Expo - 2022

GISEC - 2023

Gulf Information Security Expo - 2023

GITEX - 2022

Gulf Information Technology Expo - 2022

TEISS Talk 2023

How much Will your next breach cost?

GITEX - 2022

Gulf Information Technology Expo - 2022

Digital Fraud

Combating against Digital Fraud

Digital Fraud

Combating against Digital Fraud

Hands-on WorkShop

Information Security Workshop - Karachi

Hands-on WorkShop

Information Security Workshop - Karachi

Hands-on Workshop

Information Security Workshop - Karachi

Workshop

Information Security Workshop

Cyber Warfare - Karachi

A battle against Intrusion

Cyber Warfare - Lahore

A battle against Intrusion

Cyber Warfare - Lahore

A battle against Intrusion

Compromise Assessment

Cyber Forensic & Compromise Assessment - Karachi

Compromise Assessment

Cyber Forensic & Compromise Assessment - Karachi

Compromise Assessment

Cyber Forensic & Compromise Assessment - Karachi

Compromise Assessment

Cyber Forensic & Compromise Assessment - Karachi

Compromise Assessment

Cyber Forensic & Compromise Assessment

Compromise Assessment

Cyber Forensic & Compromise Assessment - Karachi

Compromise Assessment

Cyber Forensic & Compromise Assessment - Karachi

Cyber Readiness Assessment

Live Simulated Cyber Drills

Cyber Drill Exercise

CAPS - Emulated a live Drill on Cyber-attack Against Payment Systems

Cyber Drill Exercise

CAPS - Emulated a live Drill on Cyber-attack Against Payment Systems

Cyber Readiness Assessment

Live Simulated Cyber Drills

Cyber Readiness Assessment

Live Simulated Cyber Drills

Digital Forensic Workshop

Hands-on Workshop on Digital Forensic

Digital Forensic & Cyber

Hands-on Workshop on Digital Forensic

Combating against Cyberwars in OT/IOT Networks

Combating organizations against Cyber threats in OT/IOT Networks

Combating against Cyberwars in OT/IOT Networks

Combating organizations against Cyber threats in OT/IOT Networks

Avenues in STEM Education

Career Path for students in the field of Digital Forensic

Cybersecurity & Data Privacy

Online Webinar on - Cybersecurity & Data Privacy

Rail Live 2022 - Malaga

Combating against deceptive techniques used by cyber criminals in Rail Networks - Live Demonstration

   

Testimonials

Volunteer Participants

Meet participants who wishes to contribute in the field of Information & Cyber Security.

Walter White

Chief Executive Officer

Sarah Jhonson

Product Manager

William Anderson

CTO

Amanda Jepson

Accountant

Global Affiliation

Ubaid jafri has been affiliated with global renowned IT Security communities and Forums.

Nature

Book Ubaid For Your Next Cybersecurity Conference.

Ubaid is ready to help you defeat the cyber threat and aware audience with his Live Demonstration skills.

Contact Ubaid Jafri

Book Mr. Jafri for Public Speaking / Panel Discussions / Conferences / Workshops / Seminars and Webinars

Contact Details

  • Educational Institutions Ubaid Jafri Encourages student empowerment and emphasis cybersecurity for students to build their bright career, no cost has been charged on Motivation of students & empowering them in Cybersecurity.

  • Women Empowerment Ubaid encourages Women Empowerment and emphasis Women to be part of cybersecurity as a career, no cost has been charged on Women Motivation & Empowerment.

  • WhatsApp: +380 507 574993 Send Direct What'sApp
  • LinkedIn: Linkedin.com/ubaidjafri
  • Email Address: advise@ubaidjafri.com
  • Blogspot: Link to Blogspot
  • Discord:
Your message has been sent. Thank you!