EAITSM Inc. Members Blog
empty_cart_icon Cart is empty
View cart
about_us contact_us useful-links forum
Register     member_login
lang Homelink   » Events
Training and Exam Providers
Which of the following patterns of events is preferred and easier to attend for you?
Online virtual several hours multi-session conference
Several standalone webinars for around one hour on different dates, for example monthly
Physical full day conferences in actual places that require physical presence
Not able to attend events in real time, and preferring to watch recordings
Amazon Kindle Books
ITSM Tenders Service
Join Membership Now for Free
OBASHI Webinar: How Strong Is Your Imagination when it comes to Hacker Stories?

Event Title: Webinar titled "How Strong Is Your Imagination when it comes to Hacker Stories?" (Arabic)

Organizer: EAITSM Inc.

Location: Online Webinar

Time: Thursday, Nov. 19th, 2015, 11:00 AM - 12:00 PM Egypt time (GMT+2)

Attendees: IT Community Members in Egypt and outside


Hadi El-Khoury is an independent cybersecurity interpreter, advisor and trainer, 15+ years of experience. Telecom Engineer with a Master in Network and Information Systems Security from Telecom ParisTech (Paris-FRANCE). Co-founder of the Information Systems Security Association (ISSA) France Chapter. Winner of the "Pimp My Bonita" BPM Contest (2012). Highly commended for Business Continuity Innovation of the Year sponsored by Abu Dhabi University (2012) OBASHI Ambassador France (2014).

For a more thorough bio (in French), please refer to: http://www.defense.gouv.fr/actualites/communaute-defense/la-cybersecurite-au-caeur-des-relations-franco-libanaises.


If you don’t understand and “see” your data flows, you can neither classify data, nor identify data sets that are subject to specific legal or contractual requirements. Indeed, without clarity on data flows, business impact and risk analysis will definitely lack context and prove inaccurate. During my talk, I'll tell you how clarity on data flows and process mapping can be an effective passport to the Executive Committee, whenever you need to gain support and sponsorship for your cybersecurity initiatives. I'll stimulate your imagination by asking you to collectively elaborate hacker stories on a series of projected data flows, using the OBASHI approach.

Registration: Registration is open for free to the public. Please use the form below to register to attend this webinar. (Registration has been closed)




Follow us

Share this page

© The EAITSM Inc. All Rights Reserved.
The EAITSM Inc. is an affiliate of the OneWayForward Inc.

Terms and conditions | FAQs

Advertise with usSponsorship opportunities | Join us on Patreon