2023 Sponsors

2024 Principal Keynote


2024 Strategic Sponsors

BeyondTrust is the global cybersecurity leader protecting all paths to privilege. Our identity-centric approach goes beyond securing privileges and access, empowering organizations with the most effective solution to manage the entire identity attack surface and neutralize threats, whether from external attacks or insiders.

BeyondTrust is leading the charge in transforming identity security to prevent breaches and limit the blast radius of attacks, while creating a superior customer experience and operational efficiencies. We are trusted by 20,000 customers, including 75 of the Fortune 100, and our global ecosystem of partners.

Learn more at www.beyondtrust.com. 
 

 


Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions.

 

 

 

 


Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous Innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world. www.TrendMicro.com.   


2024 Education seminar sponsors

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.

 


Entrust keeps the world moving safely by enabling trusted identities, payments and data protection. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, accessing e-government services or logging into corporate networks. Entrust offers an unmatched breadth of digital security and credential issuance solutions at the very heart of all these interactions. With more than 2,500 colleagues, a network of global partners, and customers in over 150 countries, it’s no wonder the world’s most entrusted organizations trust us.


Green Method is a leading specialist Information Security Services provider in the UAE. Green Method was established in the UAE in 2008.
 
Over the years, Green Method has assisted various clients in Banking & Financial Services, Government, Utilities, Hospitality, Transportation, Retail and large & medium enterprises in multiple services offerings and has built an extensive clientele in the region.
 
Green Method provides a wide range of Consulting Services, Testing Services, Training and Solutions in this domain. Green Method recently launched Managed Security Services in Dubai through its subsidiary Green Sentries.
 
Green Method had been pioneering the cause of evangelizing the information security best practices in the country and has executed a number large and small turnkey projects for some of the leading organizations here. Green Method had been in the forefront in assisting the organizations to be aligned with the evolving security standards.
Green Method has shown exemplary efficiency in enhancing the security posture of the organizations, and that too within their stringent budgets, resulting in continuous, repeated engagements. Our prestigious list of customers includes some of the major names in the region in the financial, government and other sectors.
Green Method partners with the world majors in the domain. Our Partner Veracode provides the world’s leading Application Risk Management Platform and has been ranked # 20 among the Forbes list of promising companies. Green Method has several other partnerships with leading providers like Mimecast, Wombat, Groundlabs, that has helped achieve the significant growth witnessed in the recent years.


Gulf IT is your trusted Value Add Distributor in cybersecurity, ensuring comprehensive protection across cloud, on-site, and hybrid environments. As the exclusive distributor of over 20 leading cybersecurity technologies in the Gulf region, we empower vendors and resellers with state-of-the-art tools to secure every aspect of your attack surface. With Gulf IT, stay ahead of threats and safeguard your entire digital infrastructure.


ManageEngine is a division of Zoho Corporation that offers comprehensive on-premises and cloud-native IT and security operations management solutions for global organizations and managed service providers. Established and emerging enterprises—including nine of every 10 Fortune 100 organizations—rely on ManageEngine's real-time IT management tools to ensure the optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. ManageEngine has 18 data centers, 20 offices and 200+ channel partners worldwide to help organizations tightly align their business to IT. For more information, please visit the company site, follow the company blog and get connected on LinkedIn, Facebook, Instagram and X (formerly Twitter).


ME Infosec provides Information Security services and all related solutions to organizations in the Middle East. Our goal is to help organizations achieve a higher level of security. We think out of the box, thus understanding how hackers operate, and identify an effective way to secure any infrastructure, creating simple and effective processes.
For more information: https://www.meinfosec.com/


Seclore is a leading provider of data-centric security solutions designed to protect sensitive information wherever it travels. With the rise of digital transformation and increasing data breaches, organizations are recognizing the importance of safeguarding their data beyond traditional perimeter defenses. Seclore addresses this need by focusing on securing the data itself, rather than merely the systems that store or transmit it.

Data-centric security is a paradigm shift in information protection. Traditional security measures, such as firewalls and access controls, focus on safeguarding the network and endpoints. However, these measures often fall short when data leaves the secure confines of an organization. This is where Seclore’s innovative approach comes into play. By embedding security directly into the data, Seclore ensures that sensitive information remains protected regardless of where it travels or how it is shared.

Seclore’s data-centric security solutions are built on the principles of encryption, identity and access management, and real-time tracking. Encryption ensures that only authorized users can access the data, rendering it useless to unauthorized parties. Identity and access management controls who can access the data and what actions they can perform, providing granular control over sensitive information. Real-time tracking allows organizations to monitor how their data is being used, offering insights into potential security threats and enabling quick responses to any unauthorized activities.

One of the key benefits of Seclore’s approach is its ability to extend security beyond organizational boundaries. In today’s collaborative business environment, data is frequently shared with partners, vendors, and remote employees. Seclore ensures that even when data is shared externally, it remains under the control of the originating organization. This not only mitigates the risk of data breaches but also helps organizations comply with stringent data protection regulations.

In summary, Seclore’s data-centric security solutions provide a robust and comprehensive approach to protecting sensitive information in an increasingly complex digital landscape. By focusing on the data itself, Seclore ensures that organizations can maintain control and security over their most valuable assets, no matter where they go.


Veracode is a global leader in Application Risk Management for the AI era. Powered by trillions of lines of code scans and a proprietary AI-assisted remediation engine, the Veracode platform is trusted by organizations worldwide to build and maintain secure software from code creation to cloud deployment. Thousands of the world’s leading development and security teams use Veracode every second of every day to get accurate, actionable visibility of exploitable risk, achieve real-time vulnerability remediation, and reduce their security debt at scale. Veracode is a multi-award-winning company offering capabilities to secure the entire software development life cycle, including Veracode Fix, Static Analysis, Dynamic Analysis, Software Composition Analysis, Container Security, Application Security Posture Management, and Penetration Testing.


Learn more at www.veracode.com, on the Veracode blog, and on LinkedIn and Twitter.


Copyright © 2024 Veracode, Inc. All rights reserved. Veracode is a registered trademark of Veracode, Inc. in the United States and may be registered in certain other jurisdictions. All other product names, brands or logos belong to their respective holders. All other trademarks cited herein are property of their respective owners.


2024 Networking Sponsors

iZOOlogic is dedicated to providing niche Threat Intelligence and Digital Risk Protection solutions.The iZOOlogic platform is an integrated suite of services allowing real time intelligence into the online threat landscape and provides a seamless 24x7x365 Global Incident Response. iZOOlogic provides Threat Advisory Services, Threat Intelligence, Domain Name Management, Brand Protection, Anti-Phishing, Infrastructure and Application Threat and Vulnerability Monitoring, DNS Intelligence, Dark Web Monitoring, Data Loss Recovery Services, Financial Malware and Trojan Monitoring, Web App Protection, DMARC Managed Services, Digital Asset Management, Vendor Risk Assessment and Threat Management solutions. iZOOlogic is headquartered and maintains a GSOC in the City of London, UK, with operations in California, USA and Melbourne, Australia, and protects corporate and government clients across the world.
 
iZOOlogic business outcomes:

  • Reduce fraud losses from online abuse, phishing and malware;
  • Maintain integrity and assurance of eChannel services;
  • Identify and mitigate compromised Accounts in real time;
  • Prevent cybercriminals from hijacking the corporate brand;
  • Reduce and mitigate reputational risk;
  • Disrupt the cybercriminal ecosystem.

iZOOlogic Info Security outcomes:

  • Real time monitoring and pro-active detection of phishing and abuse;
  • End point protection from phishing and malware;
  • Real time data feed and intelligence of compromised accounts;
  • Identify end users and transactions compromised by malware;
  • Security incident and event management;
  • Web based portal with alerts and reports;
  • 24x7x365 Global Security Incident Response.

 
iZOOlogic solutions:

  • Security as a Service—Subscription based Services;
  • Industry leading SLA’s;
  • Proprietary and dedicated platform, Turn Key;
  • Global Threat Intelligence Platform—intelliZOO;
  • iZOOlabs Incident Management Portal;
  • 24x7x365 Security Operation Centre & Malware Lab.