Telegram Group & Telegram Channel
πŸ‚ ΠœΡ‹ Π½Π° MENA ISC

Помимо ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½ΠΎΠ³ΠΎ Ρ‚Ρ€Π΅Π½ΠΈΠ½Π³Π° Cyber Polygon 2024, Π½Π° ΠΊΠΎΠ½Ρ„Π΅Ρ€Π΅Π½Ρ†ΠΈΠΈ MENA ISC ΠΌΡ‹ прСдставляСм стСнд Cyber Polygon ΠΈ выступлСния Π½Π°ΡˆΠΈΡ… экспСртов Π² Π΄Π΅Π»ΠΎΠ²ΠΎΠΉ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ΅.

πŸ”ΉΠ‘Ρ‚Π΅Π½Π΄

Π—Π΄Π΅ΡΡŒ ΠΌΡ‹ ΠΏΠΎΠ΄Ρ€ΠΎΠ±Π½Π΅Π΅ рассказываСм ΠΎ Ρ‚Ρ€Π΅Π½ΠΈΠ½Π³Π΅ ΠΈ дСлимся ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠ΅ΠΉ ΠΎ самых Π°ΠΊΡ‚ΠΈΠ²Π½Ρ‹Ρ… ΠΊΠΈΠ±Π΅Ρ€Π³Ρ€ΡƒΠΏΠΏΠΈΡ€ΠΎΠ²ΠΊΠ°Ρ… Π² странах GCC.

Π’Π°ΠΊΠΆΠ΅ посСтитСли ΠΌΠΎΠ³ΡƒΡ‚ ΡƒΡ‡Π°ΡΡ‚Π²ΠΎΠ²Π°Ρ‚ΡŒ Π² ΠΈΠ½Ρ‚Π΅Ρ€Π°ΠΊΡ‚ΠΈΠ²Π°Ρ…:
β€” ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Ρ‚ΡŒ соврСмСнный SOC Π² Ρ„ΠΎΡ€ΠΌΠ°Ρ‚Π΅ VR,
β€” ΠΏΡ€ΠΎΠ²Π΅Ρ€ΠΈΡ‚ΡŒ сСбя Π½Π° ΡƒΡΡ‚ΠΎΠΉΡ‡ΠΈΠ²ΠΎΡΡ‚ΡŒ ΠΊ ΠΊΠΈΠ±Π΅Ρ€ΠΌΠΎΡˆΠ΅Π½Π½ΠΈΡ‡Π΅ΡΡ‚Π²Ρƒ,
β€” Ρ€Π°ΡΡΠ»Π΅Π΄ΠΎΠ²Π°Ρ‚ΡŒ ΠΈΠ½Ρ†ΠΈΠ΄Π΅Π½Ρ‚ Π½Π° Π½Π΅Ρ„Ρ‚Π΅ΠΏΠ΅Ρ€Π΅Ρ€Π°Π±Π°Ρ‚Ρ‹Π²Π°ΡŽΡ‰Π΅ΠΌ Π·Π°Π²ΠΎΠ΄Π΅.

πŸ”ΉΠ’Ρ€Π΅ΠΊ Thought Leadership

β€” ΠžΡ‚ΠΊΡ€Ρ‹Π²Π°ΡŽΡ‰Π°Ρ плСнарная сСссия A Tip of an Iceberg: What to Expect from the AI-driven Digital Future?
Π’ обсуТдСнии ΠΏΡ€ΠΈΠ½ΠΈΠΌΠ°Π΅Ρ‚ участиС Π”ΠΌΠΈΡ‚Ρ€ΠΈΠΉ Π‘Π°ΠΌΠ°Ρ€Ρ†Π΅Π², Π΄ΠΈΡ€Π΅ΠΊΡ‚ΠΎΡ€ Π³Ρ€ΡƒΠΏΠΏΡ‹ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΉ BI.ZONE. БСссия ΠΎΡ€Π³Π°Π½ΠΈΠ·ΠΎΠ²Π°Π½Π° Π² партнСрствС с Cyber Polygon.

β€” ПанСльная дискуссия Hyper Power in Cybersecurity. How to Resist the Challenges of Turbulent Cyber
Π’ Ρ€ΠΎΠ»ΠΈ ΠΌΠΎΠ΄Π΅Ρ€Π°Ρ‚ΠΎΡ€Π° выступаСт АлСксандр Π’ΡƒΡˆΠΊΠ°Π½ΠΎΠ², Π΄ΠΈΡ€Π΅ΠΊΡ‚ΠΎΡ€ ΠΏΠΎ Ρ€Π°Π±ΠΎΡ‚Π΅ с ΠΊΠ»ΡŽΡ‡Π΅Π²Ρ‹ΠΌΠΈ ΠΊΠ»ΠΈΠ΅Π½Ρ‚Π°ΠΌΠΈ.

β€” ПанСльная дискуссия Architecting Hyper Resilient Cyber Defense in Hybrid and Multi-Cloud Environments
ΠžΡ‚ нас выступит Π’Π΅ΠΉΠΌΡƒΡ€ Π₯Π΅ΠΈΡ€Ρ…Π°Π±Π°Ρ€ΠΎΠ², Π΄ΠΈΡ€Π΅ΠΊΡ‚ΠΎΡ€ Π΄Π΅ΠΏΠ°Ρ€Ρ‚Π°ΠΌΠ΅Π½Ρ‚Π° ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³Π°, рСагирования ΠΈ исслСдования ΠΊΠΈΠ±Π΅Ρ€ΡƒΠ³Ρ€ΠΎΠ·.

β€” Cyber training: the key to building strong cybersecurity
Π”ΠΌΠΈΡ‚Ρ€ΠΈΠΉ Π‘Π°ΠΌΠ°Ρ€Ρ†Π΅Π², ΠœΡƒΡΠ»ΠΈΠΌ ΠœΠ΅Π΄ΠΆΠ»ΡƒΠΌΠΎΠ², Π΄ΠΈΡ€Π΅ΠΊΡ‚ΠΎΡ€ ΠΏΠΎ ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Π°ΠΌ ΠΈ тСхнологиям BI.ZONE.

β€” The how: key trends in targeted attacks in the region
ОлСг Π‘ΠΊΡƒΠ»ΠΊΠΈΠ½, Ρ€ΡƒΠΊΠΎΠ²ΠΎΠ΄ΠΈΡ‚Π΅Π»ΡŒ BI.ZONE Threat Intelligence.

πŸ”ΉΠ’Π΅Ρ…Π½ΠΈΡ‡Π΅ΡΠΊΠΈΠ΅ Π²ΠΎΡ€ΠΊΡˆΠΎΠΏΡ‹

β€” Hunting For The Most Interesting Attack Techniques Relevant For The GCC Region
Π’Π΅ΠΉΠΌΡƒΡ€ Π₯Π΅ΠΈΡ€Ρ…Π°Π±Π°Ρ€ΠΎΠ².

β€” Digital Tools In Preventing Social Engineering
Π‘Π΅ΠΌΡ‘Π½ Π‘Π΅Π»ΡŒΠΊΠΎΠ²ΠΈΡ‡, экспСртный прСсСйл ΠΏΠΎ ΠΏΡ€ΠΎΡ‚ΠΈΠ²ΠΎΠ΄Π΅ΠΉΡΡ‚Π²ΠΈΡŽ ΠΌΠΎΡˆΠ΅Π½Π½ΠΈΡ‡Π΅ΡΡ‚Π²Ρƒ BI.ZONE.

ΠŸΠΎΠ΄Ρ€ΠΎΠ±Π½Π΅Π΅ с ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠΎΠΉ мСроприятия ΠΌΠΎΠΆΠ½ΠΎ ΠΎΠ·Π½Π°ΠΊΠΎΠΌΠΈΡ‚ΡŒΡΡ Π½Π° сайтС.
Please open Telegram to view this post
VIEW IN TELEGRAM



group-telegram.com/bizone_channel/1408
Create:
Last Update:

πŸ‚ ΠœΡ‹ Π½Π° MENA ISC

Помимо ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½ΠΎΠ³ΠΎ Ρ‚Ρ€Π΅Π½ΠΈΠ½Π³Π° Cyber Polygon 2024, Π½Π° ΠΊΠΎΠ½Ρ„Π΅Ρ€Π΅Π½Ρ†ΠΈΠΈ MENA ISC ΠΌΡ‹ прСдставляСм стСнд Cyber Polygon ΠΈ выступлСния Π½Π°ΡˆΠΈΡ… экспСртов Π² Π΄Π΅Π»ΠΎΠ²ΠΎΠΉ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ΅.

πŸ”ΉΠ‘Ρ‚Π΅Π½Π΄

Π—Π΄Π΅ΡΡŒ ΠΌΡ‹ ΠΏΠΎΠ΄Ρ€ΠΎΠ±Π½Π΅Π΅ рассказываСм ΠΎ Ρ‚Ρ€Π΅Π½ΠΈΠ½Π³Π΅ ΠΈ дСлимся ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠ΅ΠΉ ΠΎ самых Π°ΠΊΡ‚ΠΈΠ²Π½Ρ‹Ρ… ΠΊΠΈΠ±Π΅Ρ€Π³Ρ€ΡƒΠΏΠΏΠΈΡ€ΠΎΠ²ΠΊΠ°Ρ… Π² странах GCC.

Π’Π°ΠΊΠΆΠ΅ посСтитСли ΠΌΠΎΠ³ΡƒΡ‚ ΡƒΡ‡Π°ΡΡ‚Π²ΠΎΠ²Π°Ρ‚ΡŒ Π² ΠΈΠ½Ρ‚Π΅Ρ€Π°ΠΊΡ‚ΠΈΠ²Π°Ρ…:
β€” ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Ρ‚ΡŒ соврСмСнный SOC Π² Ρ„ΠΎΡ€ΠΌΠ°Ρ‚Π΅ VR,
β€” ΠΏΡ€ΠΎΠ²Π΅Ρ€ΠΈΡ‚ΡŒ сСбя Π½Π° ΡƒΡΡ‚ΠΎΠΉΡ‡ΠΈΠ²ΠΎΡΡ‚ΡŒ ΠΊ ΠΊΠΈΠ±Π΅Ρ€ΠΌΠΎΡˆΠ΅Π½Π½ΠΈΡ‡Π΅ΡΡ‚Π²Ρƒ,
β€” Ρ€Π°ΡΡΠ»Π΅Π΄ΠΎΠ²Π°Ρ‚ΡŒ ΠΈΠ½Ρ†ΠΈΠ΄Π΅Π½Ρ‚ Π½Π° Π½Π΅Ρ„Ρ‚Π΅ΠΏΠ΅Ρ€Π΅Ρ€Π°Π±Π°Ρ‚Ρ‹Π²Π°ΡŽΡ‰Π΅ΠΌ Π·Π°Π²ΠΎΠ΄Π΅.

πŸ”ΉΠ’Ρ€Π΅ΠΊ Thought Leadership

β€” ΠžΡ‚ΠΊΡ€Ρ‹Π²Π°ΡŽΡ‰Π°Ρ плСнарная сСссия A Tip of an Iceberg: What to Expect from the AI-driven Digital Future?
Π’ обсуТдСнии ΠΏΡ€ΠΈΠ½ΠΈΠΌΠ°Π΅Ρ‚ участиС Π”ΠΌΠΈΡ‚Ρ€ΠΈΠΉ Π‘Π°ΠΌΠ°Ρ€Ρ†Π΅Π², Π΄ΠΈΡ€Π΅ΠΊΡ‚ΠΎΡ€ Π³Ρ€ΡƒΠΏΠΏΡ‹ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΉ BI.ZONE. БСссия ΠΎΡ€Π³Π°Π½ΠΈΠ·ΠΎΠ²Π°Π½Π° Π² партнСрствС с Cyber Polygon.

β€” ПанСльная дискуссия Hyper Power in Cybersecurity. How to Resist the Challenges of Turbulent Cyber
Π’ Ρ€ΠΎΠ»ΠΈ ΠΌΠΎΠ΄Π΅Ρ€Π°Ρ‚ΠΎΡ€Π° выступаСт АлСксандр Π’ΡƒΡˆΠΊΠ°Π½ΠΎΠ², Π΄ΠΈΡ€Π΅ΠΊΡ‚ΠΎΡ€ ΠΏΠΎ Ρ€Π°Π±ΠΎΡ‚Π΅ с ΠΊΠ»ΡŽΡ‡Π΅Π²Ρ‹ΠΌΠΈ ΠΊΠ»ΠΈΠ΅Π½Ρ‚Π°ΠΌΠΈ.

β€” ПанСльная дискуссия Architecting Hyper Resilient Cyber Defense in Hybrid and Multi-Cloud Environments
ΠžΡ‚ нас выступит Π’Π΅ΠΉΠΌΡƒΡ€ Π₯Π΅ΠΈΡ€Ρ…Π°Π±Π°Ρ€ΠΎΠ², Π΄ΠΈΡ€Π΅ΠΊΡ‚ΠΎΡ€ Π΄Π΅ΠΏΠ°Ρ€Ρ‚Π°ΠΌΠ΅Π½Ρ‚Π° ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³Π°, рСагирования ΠΈ исслСдования ΠΊΠΈΠ±Π΅Ρ€ΡƒΠ³Ρ€ΠΎΠ·.

β€” Cyber training: the key to building strong cybersecurity
Π”ΠΌΠΈΡ‚Ρ€ΠΈΠΉ Π‘Π°ΠΌΠ°Ρ€Ρ†Π΅Π², ΠœΡƒΡΠ»ΠΈΠΌ ΠœΠ΅Π΄ΠΆΠ»ΡƒΠΌΠΎΠ², Π΄ΠΈΡ€Π΅ΠΊΡ‚ΠΎΡ€ ΠΏΠΎ ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Π°ΠΌ ΠΈ тСхнологиям BI.ZONE.

β€” The how: key trends in targeted attacks in the region
ОлСг Π‘ΠΊΡƒΠ»ΠΊΠΈΠ½, Ρ€ΡƒΠΊΠΎΠ²ΠΎΠ΄ΠΈΡ‚Π΅Π»ΡŒ BI.ZONE Threat Intelligence.

πŸ”ΉΠ’Π΅Ρ…Π½ΠΈΡ‡Π΅ΡΠΊΠΈΠ΅ Π²ΠΎΡ€ΠΊΡˆΠΎΠΏΡ‹

β€” Hunting For The Most Interesting Attack Techniques Relevant For The GCC Region
Π’Π΅ΠΉΠΌΡƒΡ€ Π₯Π΅ΠΈΡ€Ρ…Π°Π±Π°Ρ€ΠΎΠ².

β€” Digital Tools In Preventing Social Engineering
Π‘Π΅ΠΌΡ‘Π½ Π‘Π΅Π»ΡŒΠΊΠΎΠ²ΠΈΡ‡, экспСртный прСсСйл ΠΏΠΎ ΠΏΡ€ΠΎΡ‚ΠΈΠ²ΠΎΠ΄Π΅ΠΉΡΡ‚Π²ΠΈΡŽ ΠΌΠΎΡˆΠ΅Π½Π½ΠΈΡ‡Π΅ΡΡ‚Π²Ρƒ BI.ZONE.

ΠŸΠΎΠ΄Ρ€ΠΎΠ±Π½Π΅Π΅ с ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠΎΠΉ мСроприятия ΠΌΠΎΠΆΠ½ΠΎ ΠΎΠ·Π½Π°ΠΊΠΎΠΌΠΈΡ‚ΡŒΡΡ Π½Π° сайтС.

BY BI.ZONE








Share with your friend now:
group-telegram.com/bizone_channel/1408

View MORE
Open in Telegram


Telegram | DID YOU KNOW?

Date: |

Telegram has gained a reputation as the β€œsecure” communications app in the post-Soviet states, but whenever you make choices about your digital security, it’s important to start by asking yourself, β€œWhat exactly am I securing? And who am I securing it from?” These questions should inform your decisions about whether you are using the right tool or platform for your digital security needs. Telegram is certainly not the most secure messaging app on the market right now. Its security model requires users to place a great deal of trust in Telegram’s ability to protect user data. For some users, this may be good enough for now. For others, it may be wiser to move to a different platform for certain kinds of high-risk communications. The fake Zelenskiy account reached 20,000 followers on Telegram before it was shut down, a remedial action that experts say is all too rare. In a statement, the regulator said the search and seizure operation was carried out against seven individuals and one corporate entity at multiple locations in Ahmedabad and Bhavnagar in Gujarat, Neemuch in Madhya Pradesh, Delhi, and Mumbai. Channels are not fully encrypted, end-to-end. All communications on a Telegram channel can be seen by anyone on the channel and are also visible to Telegram. Telegram may be asked by a government to hand over the communications from a channel. Telegram has a history of standing up to Russian government requests for data, but how comfortable you are relying on that history to predict future behavior is up to you. Because Telegram has this data, it may also be stolen by hackers or leaked by an internal employee. "He has kind of an old-school cyber-libertarian world view where technology is there to set you free," MarΓ©chal said.
from jp


Telegram BI.ZONE
FROM American