How do ethical hackers test IoT security?
Learn how an ethical hacker might work to evaluate your organisation’s IoT security with penetration testing.
Read MoreWhat is the hot topic of the year in the current cyber landscape?
Increased Cyber threats due to geopolitical situations.
How do you react to constantly changing threats in the market?
Being Vigilant, proactive measure to detect and quick response to mitigate.
What are some of your favorite "new" technologies or tools?
AI driven solutions to help solve legacy and emerging security problems for developers.
What are some of the key components to succeeding as a CISO in today’s business environment?
Understanding business needs enabling business to grow while offering needed security measures. Balancing regulatory and security activities.
What are the three things that you as CISO look at first to assess an organization’s cybersecurity readiness?
Cyber security detection and protection mechanisms, governance and subject matter experts in various areas of security domain.
You are set to the stage at Black Hat MEA this November, what can our audience expect from your session, and what are you most excited about?
Simple or complex, automated or human centric efforts for delivering secure applications. Excited to interact and learn from other speakers on their security tools and practices.
Join the newsletter to receive the latest updates in your inbox.
Learn how an ethical hacker might work to evaluate your organisation’s IoT security with penetration testing.
Read MoreCryptocurrency firms are under pressure from threat actors, and must evaluate their crypto security protocols and training programs in 2025.
Read MoreLearn how cybersecurity professionals use reverse engineering in threat detection, malware analysis, and more – to develop stronger cyber defences.
Read More