A place to demonstrate the art of the possible

0 20
Welcome to the new 218 cyber warriors who joined us last week.&nb...

Welcome to the new 218 cyber warriors who joined us last week. Each week, we'll be sharing insights from the MEA community. Read exclusive interviews with industry experts and key findings from the #BHMEA stages.

Keep up with our weekly newsletters on LinkedIn — subscribe here.

A place to demonstrate the art of the possible

Discover how the world’s leading cybersecurity leaders think – and what they think about. Exclusive interviews and insights, in your inbox every week. 

This week we’re focused on…

MEA. Yes, we know – that’s us. 

#BHMEA24 is so close now, we can almost hear the new conversations and connections that will happen when the global cybersecurity community gets together in Riyadh.

Our incredible lineup of speakers will be taking to the keynote stage from November 26, to share their research and experience. So we wanted to take a moment to get excited with you – and let five of those speakers do the talking about why this event is such an important fixture in their diaries. 

What will your time at BHMEA do for you? 

1. Demonstrate the art of the possible

Brett Winterford (Chief Security Officer, APJ at Okta) said:

“ allows us to demonstrate the art of the possible to the people that matter. Beyond that, the value lies in ’s hacker roots. It fosters an atmosphere of curiosity about how various technologies work, and how they might be abused or used in unintended ways.”

2. Address social imbalances in cybersecurity

Ramy Houssaini (Chief Cyber & Technology Risk Officer, & Group Privacy Officer, at BNP Paribas) said: 

“ events facilitate critical networking and collaboration among industry leaders, which can drive innovation and improve cybersecurity practices across organisations.” 

In relation to his work on ending cyber poverty, he added:

“Specifically, events like MEA are crucial in addressing social imbalances in cybersecurity by facilitating knowledge sharing, improving resource access, and fostering a more inclusive cyber community. By highlighting the cybersecurity challenges faced by less-resourced regions, MEA can draw global attention and support. This increased visibility can lead to greater funding, innovation, and collective efforts to close the cybersecurity gap.” 

3. Exchange knowledge in an unbiased environment 

Max Imbiel (CISO at Bitpanda) said:

“Events like MEA are highly valuable for us security professionals, learners, beginners and leaders – because they provide us with this dynamic and unbiased environment where we can talk, exchange, share and learn from and with each other. I highly value events like this and encourage everyone to join them to their best capability.”

4. Stay ahead of threats and give your customers peace of mind

Philip Martin (CSO at Coinbase) said: 

These events “are invaluable because they foster essential collaboration and information sharing within the cybersecurity community. 

“Our security team is constantly advancing Coinbase’s security measures to stay ahead of threats and provide peace of mind to consumers. These events provide an opportunity for us to learn from others, while also sharing our own insights and techniques as a leader in safeguarding one of the largest holdings of cryptocurrency worldwide. 

“The networking and exchange of ideas that occurs at MEA is crucial in driving innovation. It helps enterprises and governments stay ahead of emerging threats, and ultimately, create a safer digital environment for everyone.”

5. Focus on your professional development in cybersecurity 

Awwab Arif (CISO at Bank of Hope) said:

“Networking and continuous learning are crucial for the development of a CISO. Engaging with peers, vendors, and partners is essential to remain informed, exchange knowledge, and learn from past experiences to avoid repeating mistakes.”

Not yet registered? Don’t worry – there’s still time 

It’s not too late to secure your place at MEA 2024. Register now and refresh your perspective on the field of cybersecurity. 

We can’t wait to see you there.

Do you have an idea for a topic you'd like us to cover? We're eager to hear it! Drop us a message and share your thoughts. Our next newsletter is scheduled for 25 September 2024.

Catch you next week,Steve DurningExhibition Director

Join us at MEA 2024 to grow your network, expand your knowledge, and build your business.

REGISTER NOW
你可能想看:

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

Completely separable two-dimensional vector graph encryption domain robust reversible watermark algorithm (Part 1)

How to use truffleHog to search for high-entropy strings and sensitive data in Git repositories to protect the security of code repositories

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

About the related technologies and implementations associated with tracing the source of posts by PDD employees

DEF CON Conference: White-hat hackers demonstrated the remote control of a retired satellite

In-depth Analysis and Practice: Analysis of Apache Commons SCXML Remote Code Execution Vulnerability and POC EXP Construction

最后修改时间:
admin
上一篇 2025年03月22日 06:23
下一篇 2025年03月22日 06:45

评论已关闭