logo
EAITSM Inc. Members Blog
side
empty_cart_icon Cart is empty
View cart
about_us contact_us useful-links forum
side2
Register     member_login
 
lang Homelink   » Events
Register_03
Register_10
maillist_top
mailinglist
Subscribe
UnSubscribe
maillist_bottom
Training and Exam Providers
header_voting
 
What is the source that referred you to our website today?
Web search
General email message
Members email message
Link from another website
Link from social media page
 
Amazon Kindle Books
ITSM Tenders Service
OBASHI Webinar: How Strong Is Your Imagination when it comes to Hacker Stories?


Event Title: Webinar titled "How Strong Is Your Imagination when it comes to Hacker Stories?" (Arabic)

Organizer: EAITSM Inc.

Location: Online Webinar

Time: Thursday, Nov. 19th, 2015, 11:00 AM - 12:00 PM Egypt time (GMT+2)

Attendees: IT Community Members in Egypt and outside

Speaker:

Hadi-El-Khoury

Hadi El-Khoury is an independent cybersecurity interpreter, advisor and trainer, 15+ years of experience. Telecom Engineer with a Master in Network and Information Systems Security from Telecom ParisTech (Paris-FRANCE). Co-founder of the Information Systems Security Association (ISSA) France Chapter. Winner of the "Pimp My Bonita" BPM Contest (2012). Highly commended for Business Continuity Innovation of the Year sponsored by Abu Dhabi University (2012) OBASHI Ambassador France (2014).

For a more thorough bio (in French), please refer to: http://www.defense.gouv.fr/actualites/communaute-defense/la-cybersecurite-au-caeur-des-relations-franco-libanaises.
 

Abstract:

If you don’t understand and “see” your data flows, you can neither classify data, nor identify data sets that are subject to specific legal or contractual requirements. Indeed, without clarity on data flows, business impact and risk analysis will definitely lack context and prove inaccurate. During my talk, I'll tell you how clarity on data flows and process mapping can be an effective passport to the Executive Committee, whenever you need to gain support and sponsorship for your cybersecurity initiatives. I'll stimulate your imagination by asking you to collectively elaborate hacker stories on a series of projected data flows, using the OBASHI approach.

Registration: Registration is open for free to the public. Please use the form below to register to attend this webinar. (Registration has been closed)

References:

 

 

 

Recording video is available for members only. Please login to watch recording.

 

Not member yet? Apply for membership now for FREE.

 



Follow us


Share this page

© The EAITSM Inc. All Rights Reserved.
The EAITSM Inc. is an affiliate of the OneWayForward Inc.

Terms and conditions | FAQs

Advertise with usSponsorship opportunities | Join us on Patreon