
The presentation will present a visibility which leverage predictic analytics for various organizations. The model works on gathering and integrating data from relevant data sources and shows a predictive output against each vendor which utilizes the following dataset that includes but not limited to: 1. Vendor Data: historical data on vendor performance, compliance records and past security incidents, 2. Threat Intelligence: information on emerging threats, vulnreabilities and attack vectors that could impact third-party services. 3. Internal Data: insights from internal systems and networks that interact with third-party services, including any security incidents or anomalies. 4. External Data: publicly available information about third parties, such as news, reports, social media mentions, and financial health incidators.
Event Organizer /Venu: SCCS /Radisson Blue, Dubai
Lead multiple security teams of around 100+ Cybersecurity Professionals including Infrastructure Security, PCI/DSS, Application Security, Digital Transformation, IS Governance, Red Teaming, SOC in information security Division, key expertise extracted from these areas are: - SOC Maturity; - SIEM and SOAR Integration; - GDPR Global; - Digital Forensic - Cybersecurity Maturity Model; - Cyber Drills; - Compromise Assessment; - Incident Response & Handling; - Exploits & Malware Writing1. Vendor Data: historical data on vendor performance, compliance records and past security incidents, 2. Threat Intelligence: information on emerging threats, vulnreabilities and attack vectors that could impact third-party services. 3. Internal Data: insights from internal systems and networks that interact with third-party services, including any security incidents or anomalies. 4. External Data: publicly available information about third parties, such as news, reports, social media mentions, and financial health incidators.
Event Organizer: Customized Training Solutions Pte. Ltd.
Interesting session by Syed Ubaid Ali Jafri sharing attacks using AI such as voice cloning, deepfake videos and advanced phishing most importantly how to handle, protect and counter against them. The demonstration represents how an attack can be taken place by collecting some voice samples. The lifelike nature of these deepfake voices, enhanced by text-to-speech (TTS) and voice conversion (VC) technologies, makes it challenging for targets to detect the deception.
Event Organizer:
In the face of advancing artificial intelligence (AI), cybercriminals have leveraged deepfake audio to execute sophisticated phishing attacks, By collecting voice samples from public sources such as interviews and social media, criminals use advanced AI algorithms, including neural networks and speech synthesis models, to clone voices. These generative adversarial networks (GANs) produce realistic audio, which is then employed to impersonate trusted individuals during phishing calls. These attacks have impacted various organization in terms of financial losses. The demonstration represents how an attack can be taken place by collecting some voice samples. The lifelike nature of these deepfake voices, enhanced by text-to-speech (TTS) and voice conversion (VC) technologies, makes it challenging for targets to detect the deception.
Event Organizer /Venu: Singapore Tech Week /Sands Expo & Convention Centre, Singapore
Watch The CxO Talk with Mr. Syed Ubaid Ali Jafri, Head of Cyber Defense & Offensive Security, Habib Bank Limited by Ayesha Malik, Content Lead CxO Global Forum
Event Organizer: CxO Talk
The presentation will present a visibility which leverage predictic analytics for various organizations. The model works on gathering and integrating data from relevant data sources and shows a predictive output against each vendor which utilizes the following dataset that includes but not limited to: 1. Vendor Data: historical data on vendor performance, compliance records and past security incidents, 2. Threat Intelligence: information on emerging threats, vulnreabilities and attack vectors that could impact third-party services. 3. Internal Data: insights from internal systems and networks that interact with third-party services, including any security incidents or anomalies. 4. External Data: publicly available information about third parties, such as news, reports, social media mentions, and financial health incidators.
Event Organizer /Venu: Teiss Talk /Radisson Blue, Dubai
Lead multiple security teams of around 100+ Cybersecurity Professionals including Infrastructure Security, PCI/DSS, Application Security, Digital Transformation, IS Governance, Red Teaming, SOC in information security Division, key expertise extracted from these areas are: - SOC Maturity; - SIEM and SOAR Integration; - GDPR Global; - Digital Forensic - Cybersecurity Maturity Model; - Cyber Drills; - Compromise Assessment; - Incident Response & Handling; - Exploits & Malware Writing1. Vendor Data: historical data on vendor performance, compliance records and past security incidents, 2. Threat Intelligence: information on emerging threats, vulnreabilities and attack vectors that could impact third-party services. 3. Internal Data: insights from internal systems and networks that interact with third-party services, including any security incidents or anomalies. 4. External Data: publicly available information about third parties, such as news, reports, social media mentions, and financial health incidators.
Event Organizer: Customized Training Solutions Pte. Ltd.
Interesting session by Syed Ubaid Ali Jafri sharing attacks using AI such as voice cloning, deepfake videos and advanced phishing most importantly how to handle, protect and counter against them. The demonstration represents how an attack can be taken place by collecting some voice samples. The lifelike nature of these deepfake voices, enhanced by text-to-speech (TTS) and voice conversion (VC) technologies, makes it challenging for targets to detect the deception.
Event Organizer:
In the face of advancing artificial intelligence (AI), cybercriminals have leveraged deepfake audio to execute sophisticated phishing attacks, By collecting voice samples from public sources such as interviews and social media, criminals use advanced AI algorithms, including neural networks and speech synthesis models, to clone voices. These generative adversarial networks (GANs) produce realistic audio, which is then employed to impersonate trusted individuals during phishing calls. These attacks have impacted various organization in terms of financial losses. The demonstration represents how an attack can be taken place by collecting some voice samples. The lifelike nature of these deepfake voices, enhanced by text-to-speech (TTS) and voice conversion (VC) technologies, makes it challenging for targets to detect the deception.
Event Organizer /Venu: Singapore Tech Week /Sands Expo & Convention Centre, Singapore
Watch The CxO Talk with Mr. Syed Ubaid Ali Jafri, Head of Cyber Defense & Offensive Security, Habib Bank Limited by Ayesha Malik, Content Lead CxO Global Forum
Event Organizer: CxO Talk
Traditional wars, once fought with physical weapons and military forces, have evolved into cyber warfare, where nations target each other's digital infrastructure. In modern cyber warfare, attacks focus on disrupting critical systems such as government networks, financial institutions, and power grids through hacking, malware, and denial-of-service attacks. Unlike traditional combat, these attacks can be launched remotely, often anonymously, making attribution difficult. This shift reflects the increasing importance of technology and information in national security.
Event Organizer: Aaj Pakistan
"Exploring current landscape of Digital Frauds. Assessing Insider Threat using Threat Intelligence. Real-life example of Insider threat Role of Security operations center in Addressing digital frauds Establishing & displaying KPI's of Digital Threat. Implementing incident response framework. Fraud Detection through third party integrations."
Event Organizer /Venu: Learning & Resource Center /Marriott Hotel Karachi
Ensuring your risk management framework meets your organization’s needs
Event Organizer: White Conference
Presenting demonstration of Automated audit simualation.
Event Organizer /Venu: Black Hat Asia 2024 /Marina Bay Sand, Singapore
Fake Personality Creation: Introduce the concept of creating fake personalities using AI, where not only the voice but also the language and tone can be generated. Explore how AI can be used to generate text, tweets, or social media posts in a way that mimics a specific personality. Deepfakes and Voice Cloning: Draw parallels between voice cloning and other forms of deepfake technology. Discuss how these technologies can be combined to create more convincing and sophisticated fake content. User Awareness and Education: Emphasize the importance of user awareness and education in recognizing and dealing with AI-generated content. Discuss strategies for educating the public on how to discern between authentic and artificially generated voices and personalities.
Event Organizer /Venu: Warsaw IT Days /Warsaw, Poland
"•Ensuring your risk management framework meets your organisation’s needs •Ransomware, legacy devices and remote access - risk trends for OT •Why you should prioritise risks based on the likelihood of exploitation as well as impact"
Event Organizer: Teiss Talk
Traditional wars, once fought with physical weapons and military forces, have evolved into cyber warfare, where nations target each other's digital infrastructure. In modern cyber warfare, attacks focus on disrupting critical systems such as government networks, financial institutions, and power grids through hacking, malware, and denial-of-service attacks. Unlike traditional combat, these attacks can be launched remotely, often anonymously, making attribution difficult. This shift reflects the increasing importance of technology and information in national security.
Event Organizer: Aaj Pakistan
"Exploring current landscape of Digital Frauds. Assessing Insider Threat using Threat Intelligence. Real-life example of Insider threat Role of Security operations center in Addressing digital frauds Establishing & displaying KPI's of Digital Threat. Implementing incident response framework. Fraud Detection through third party integrations."
Event Organizer /Venu: Learning & Resource Center /Marriott Hotel Karachi
Ensuring your risk management framework meets your organization’s needs
Event Organizer: White Conference
Presenting demonstration of Automated audit simualation.
Event Organizer /Venu: Black Hat Asia 2024 /Marina Bay Sand, Singapore
Fake Personality Creation: Introduce the concept of creating fake personalities using AI, where not only the voice but also the language and tone can be generated. Explore how AI can be used to generate text, tweets, or social media posts in a way that mimics a specific personality. Deepfakes and Voice Cloning: Draw parallels between voice cloning and other forms of deepfake technology. Discuss how these technologies can be combined to create more convincing and sophisticated fake content. User Awareness and Education: Emphasize the importance of user awareness and education in recognizing and dealing with AI-generated content. Discuss strategies for educating the public on how to discern between authentic and artificially generated voices and personalities.
Event Organizer /Venu: Warsaw IT Days /Warsaw, Poland
"•Ensuring your risk management framework meets your organisation’s needs •Ransomware, legacy devices and remote access - risk trends for OT •Why you should prioritise risks based on the likelihood of exploitation as well as impact"
Event Organizer: Teiss Talk
Presenting demonstration of Automated audit simualation.
Event Organizer /Venu: Blackhat MEA 2023 /Riyadh, Saudia
Presenting demonstration on a case study related to compromised insider working in an organization. What controls can be used to identify an insider threat.
Event Organizer /Venu: SCCS 2023 /Dubai World Trade Centre- Dubai
"1. I want to begin by you giving a lay of the land about the banking regulations in Pakistan? 2. From my understanding; you need to comply with 30 PCI DSS controls - which is more than double the standard. Talk me through this? 3. I’m aware you are in 19 countries - within those countries there are different regulations. How do you manage this effectively? 3a. What would you say is that hardest part about managing all of these locations? 4. What about governance? How do you govern all of these countries and their bespoke regulations? 4a. How do you ensure people are doing the right thing across these multiple different locations? 5. Are there any plans on how you can make the management of these banking regulations easier and more efficient?"
Event Organizer /Venu: Podcast with Karissa a. breen /Sydney, Australia
A panel session focuses on discussion of AI in cyber defense.
Event Organizer /Venu: ITCN Asia /Karachi, Pakistan
The workshop focuses on "Combating against digital fraud" to gain essential skills and knowledge in managing Security operations centre and fighting digital fraud. Learn about various fraud techniques, attack vectors and emerging trends.
Event Organizer /Venu: Learning & Resource Center /Karachi, Pakistan
"Which data do you need to estimate financial loss from a breach? Which risks should CISOs prioritise in a cyber security assessment? Demonstrating the impact of your cyber security spend on mitigating cyber risk"
Event Organizer /Venu: Teiss Talk /England, Whales
"Live Hack # You Are Now Blocked from Your Bank Account Watch as a hacker employs AI and machine learning tools to launch a daring attack, exploiting vulnerabilities that traditional security measures cannot detect. Witness how cutting-edge technologies enable the hacker to bypass defences and steal sensitive data, highlighting the need for innovative cybersecurity solutions."
Event Organizer /Venu: GITEX Africa 2023 /Marrakech, Morroco
Presenting demonstration of Automated audit simualation.
Event Organizer /Venu: Blackhat MEA 2023 /Riyadh, Saudia
Presenting demonstration on a case study related to compromised insider working in an organization. What controls can be used to identify an insider threat.
Event Organizer /Venu: SCCS 2023 /Dubai World Trade Centre- Dubai
"1. I want to begin by you giving a lay of the land about the banking regulations in Pakistan? 2. From my understanding; you need to comply with 30 PCI DSS controls - which is more than double the standard. Talk me through this? 3. I’m aware you are in 19 countries - within those countries there are different regulations. How do you manage this effectively? 3a. What would you say is that hardest part about managing all of these locations? 4. What about governance? How do you govern all of these countries and their bespoke regulations? 4a. How do you ensure people are doing the right thing across these multiple different locations? 5. Are there any plans on how you can make the management of these banking regulations easier and more efficient?"
Event Organizer /Venu: Podcast with Karissa a. breen /Sydney, Australia
A panel session focuses on discussion of AI in cyber defense.
Event Organizer /Venu: ITCN Asia /Karachi, Pakistan
The workshop focuses on "Combating against digital fraud" to gain essential skills and knowledge in managing Security operations centre and fighting digital fraud. Learn about various fraud techniques, attack vectors and emerging trends.
Event Organizer /Venu: Learning & Resource Center /Karachi, Pakistan
"Which data do you need to estimate financial loss from a breach? Which risks should CISOs prioritise in a cyber security assessment? Demonstrating the impact of your cyber security spend on mitigating cyber risk"
Event Organizer /Venu: Teiss Talk /England, Whales
"Live Hack # You Are Now Blocked from Your Bank Account Watch as a hacker employs AI and machine learning tools to launch a daring attack, exploiting vulnerabilities that traditional security measures cannot detect. Witness how cutting-edge technologies enable the hacker to bypass defences and steal sensitive data, highlighting the need for innovative cybersecurity solutions."
Event Organizer /Venu: GITEX Africa 2023 /Marrakech, Morroco
TOP 10 Threats predicted in 2023 may reduce the threat landscape and allow adversaries to map the risk profile. The session helps an organization minimize the threat landscape from overall risk exposure.
Event Organizer /Venu: GRIMMCON 0x8 /New York, America
A solo session on industrial cyber attack on supply chain.
Event Organizer /Venu: SCCS 2023 /Barcelona,Spain
A round table session regarding Third party supply chain attack and a case study against industial controls limitation and impact on the organization in case of failures.
Event Organizer /Venu: SCCS 2023 /Barcelona,Spain
Ttechnical demonstrative session in which multiple use cases will be presented in order to get the visibility on how a data leakage solution can be bypassed.
Event Organizer /Venu: GISEC 2023 /Dubai World Trade Centre- Dubai
"The session will cover how the digastric change impacted smartphones user privacy lead by live demonstration and simulation. Explaining on how a smartphone can be used for Mass distraction and destruction purpose. Indicating the top cyberthreats appeared to be impacting users in 2022 including Nuisanceware, Stalkerware, and Mobile whaling using tricky one-click attack. Audience will gain more insight knowledge about securing and assessing their smartphone against notorious applications and unintentional data leakage. The session will cover the following aspect: 1. Top mobile security threats and challenging for business – Key threats indicating serious impact on the business by exfiltrating data using different method; 2. Plotting a Mobile threat landscape – Presenting key threats landscape indicating by threat actors and vectors;"
Event Organizer /Venu: Cloud & Cybersecurity Expo London /Excel - London
Solo session on Information security training & awareness to Technical & Non technical staff of HBL and communicate key risk impacting banking sectors.
Event Organizer /Venu: Habib Bank Limited /HBL Plaza Auditorium - Karachi
TOP 10 Threats predicted in 2023 may reduce the threat landscape and allow adversaries to map the risk profile. The session helps an organization minimize the threat landscape from overall risk exposure.
Event Organizer /Venu: GRIMMCON 0x8 /New York, America
A solo session on industrial cyber attack on supply chain.
Event Organizer /Venu: SCCS 2023 /Barcelona,Spain
A round table session regarding Third party supply chain attack and a case study against industial controls limitation and impact on the organization in case of failures.
Event Organizer /Venu: SCCS 2023 /Barcelona,Spain
Ttechnical demonstrative session in which multiple use cases will be presented in order to get the visibility on how a data leakage solution can be bypassed.
Event Organizer /Venu: GISEC 2023 /Dubai World Trade Centre- Dubai
"The session will cover how the digastric change impacted smartphones user privacy lead by live demonstration and simulation. Explaining on how a smartphone can be used for Mass distraction and destruction purpose. Indicating the top cyberthreats appeared to be impacting users in 2022 including Nuisanceware, Stalkerware, and Mobile whaling using tricky one-click attack. Audience will gain more insight knowledge about securing and assessing their smartphone against notorious applications and unintentional data leakage. The session will cover the following aspect: 1. Top mobile security threats and challenging for business – Key threats indicating serious impact on the business by exfiltrating data using different method; 2. Plotting a Mobile threat landscape – Presenting key threats landscape indicating by threat actors and vectors;"
Event Organizer /Venu: Cloud & Cybersecurity Expo London /Excel - London
Solo session on Information security training & awareness to Technical & Non technical staff of HBL and communicate key risk impacting banking sectors.
Event Organizer /Venu: Habib Bank Limited /HBL Plaza Auditorium - Karachi