Cyber Sentinels February 2018

Page 1

SPECIAL SUPPLEMENT BY Year on year, security breaches continue to increase. As the IT leaders fight to keep their cloud deployments safe, the cloud providers focus on introducing new security mechanisms... 14 V O L U M E 0 4 | I S S U E 11 | F E B R U A R Y 2 0 1 8 CLOUD SECURITY THE SAME BUT DIFFERENT

FOLLOW US: Enterprise Channels MEA - Magazine EC_MEA Enterprise Channels MEA www.ec-mea.com For more info, please email to; anushree@gecmediagroup.com, ronak@gecmediagroup.com HAPPY COMPANIES CREATE HAPPY EMPLOYEES YOUR ORGANIZATION NOW AND STAY TUNED TO SEE WHICH COMPANIES EMERGE AS THE ‘HAPPIEST’. CATEGORIES SMBs (0-150 EMPLOYEES) ENTERPRISES (151-5000 EMPLOYEES) LAST DATE FOR NOMINATION: 15TH FEB, 2018 WINNERS WILL BE FELICITATED AT THE CATALYST AWARDS 2018 ON 14TH MARCH 2018 AT BURJ AL ARAB, DUBAI. BROUGHT BY OFFICIAL MEDIA PARTNER Some wait fortoThursdayend! Some wait for Sunday to Begin! NOMINATE 1. GOOGLE 2. NETAPP 3. GBM 4. VEEAM 5. SPIRE SOLUTIONS 6. SOPHOS 7. WEGO MIDDLE EAST 8. PAYFORT 9. STORIT 10. TECHSOURCE WINNERS OF 2017 HAPPY COMPANIES

04 FEBRUARY 2018

While we engaged with the CIOs, CISOs and security managers who attended the event, a majority of them agreed to the fact that, though all the enterprises had a secure printing strategy in place, printing was one of the most casual and not-taken-so-seriously activity for the employees on a daily basis.

EDITORIAL DOES REGULATIONONE FIT ALL? PUBLISHED BY ACCENT INFOMEDIA MEA FZ-LLC PO BOX : 500653, DUBAI, UAE 223, BUILDING 9, DUBAI MEDIA CITY, DUBAI, UAE PHONE : +971 (0) 4368 8523 A PUBLICATION LICENSED BY INTERNATIONAL MEDIA PRODUCTION ZONE, DUBAI, @COPYRIGHTUAE 2013 ACCENT INFOMEDIA. ALL RIGHTS RESERVED. WHILE THE PUBLISHERS HAVE MADE EVERY EFFORT TO ENSURE THE ACCURACY OF ALL INFORMATION IN THIS MAGAZINE, THEY WILL NOT BE HELD RESPONSIBLE FOR ANY ERRORS THEREIN. PRINTED BY AL GHURAIR PRINTING & PUBLISHING LLC. MASAFI COMPOUND, SATWA, P.O.BOX: 5613, DUBAI, UAE INFO MEDIA ANUSHREE DIXIT Assistant anushree@gecmediagroup.comEditor EXECUTIVE DIRECTOR: SANJIB MOHAPATRA FOUNDER AND COO: TUSHAR SAHOO GROUP EDITOR: SANJAY sanjay@gecmediagroup.comMOHAPATRA M: +971 555 119 432 ASSISTANT EDITOR: ANUSHREE RONAKSALESINFO@GECMEDIAGROUP.COMSUBSCRIPTIONSASSISTANTDESIGNER:LEADVISUALIZER:REPORTER:anushree@gecmediagroup.comDIXITDIVSHABHATdivsha@gecmediagroup.comMANASRANJANVISUALIZER:DPRCHOUDHARYAJAYARYADESIGNER:RAHULARYAANDADVERTISINGSAMANTARAYronak@gecmediagroup.com M: + 971 555 120 490 KHYATIkhyati.mistry@gecmediagroup.comMISTRY M: + 971 556 557 191 SOCIAL MARKETING & DIGITAL RICHAPRODUCTIONYASOBANTCOMMUNICATIONMISHRAyasobant@gecmediagroup.com&CIRCULATIONSAMANTARAY + 971 529 943 982 DESIGNED BY

One cannot deny the fact that no area is negligible when it comes to security.

Understanding the key role that security is playing in building the next generation of smart and safe cities and organizations, Cyber Sentinels is all set to unveil the first edition of the GECSS 2018 Global Enterprise Connect Security Symposium on 3rd September 2018. A symposium that will define what next-gen security would look like! Stay tuned. ë

Recently, Enterprise Channels MEA had the oppor tunity to associate and host the HP Anti-counterfeit and print security event in Egypt and Oman. The events, that saw the participation of over 100 and 50 IT decision makers from each country respectively, delved into assessing the print security strategy of enterprises.

How will GDPR impact the Middle East organizations? I am sure we all must have read numerous articles and have been up to date with the Dos and Don’ts of the compliance and how countries outside the UK should comply with it. While the question of what needs to be done can be answered by any website or regulatory body, the decision of what regulations need to be set and what compliance should be met can decided only the CIOs/ CISOs of the respective organizations. There is no oneregulation-fits-all policy when it comes to protecting personal data. It is also important to have authority over the entire data lifecycle— where the data resides, where the data travels, where the data ends up.

COVER STORY CONTENTS Year on year, security breaches continue to increase. As the IT leaders fight to keep their cloud deployments safe, the cloud providers focus on introducing new security mechanisms. CLOUD SECURITY - THE SAME BUT DIFFERENT14 INTERVIEWBEINGA ‘MIRROR’ TO THE VENDORS 12 THREAT SPOOFWAREDECODED 28 INTERVIEWFRAUD-RESISTANTSECURITY 30 SPECIAL GDPRSECURITYFASTENSTORYTHEBELTS.TAKESOFF. 20 05FEBRUARY 2018

ATTACKERSFOOLSDECEPTIONPROVESNETWORKSATTIVO

06 FEBRUARY 2018

RELEASED

Attivo Networks revealed industry validations that its deception effectively fools attackers. Validating deception’s ability to serve as a reliable security control for closing in-network detection gaps, the company has released results of a penetration test conducted by a top computer forensics company that specializes in penetration testing, announced the ThreatInject simulation tool for testing deception resiliency, and embedded deception into the ISSA ConferenceInternationalCapturethe Flag (CTF) event. By creating an authentic synthetic network based on deception, organizations change the asymmetry on attackers by placing high-interaction traps and lures that efficiently reveal an attacker’s presence. To validate the resiliency of deception and stolen credential detection, Attivo Networks released its ThreatInject simulation tool. Credential theft attacks are inherently difficult to detect because perimeter and anti-virus solutions are not designed to detect attacks based on credential use or lateral movement.

Emirates Group Security and Etihad Aviation Group (EAG) have signed a Memorandum of Understand ing (MoU) for cooperation in aviation security. The MoU was signed by Sir Tim Clark, President Emirates Airline, and Tony Douglas, Group Chief Executive Officer of Etihad Aviation Group, in the presence of His Highness Sheikh Ahmed bin Saeed Al Maktoum, Chairman and Chief Executive, Emirates Airline & Group, His Excellency Hamad Abdulla Al Shamsi, Vice Chairman, Etihad Aviation Group and senior representatives from Emirates Group Security, Etihad Aviation Group, at the Emir ates Group Headquarters in Dubai.

The historic agreement, the first between the UAE’s two world-leading aviation groups, signals the importance of closer collaboration in aviation security to effectively exploit joint synergies to enhance efficiency and security for the benefit of both groups’ customers. The cooperation is also in keeping with the spirit of the ‘Year of Zayed’ which celebrates the vision and leadership of the founding father of the UAE.

TAMIM TAUFIQ, HEAD OF NORTON MIDDLE STREETCHANNELEAST

Consumers are confident they’re safe online, but hackers have proven otherwise, stealing AED 3.86 billion from 3.72 million consumers in the UAE in the past year, according to the 2017 Norton Cyber Security Insights Report, released by Norton by Symantec. Within the last year more than half of the country’s adult online population experienced cybercrime, and each victim lost an average of AED 669 and 47.9 hours dealing with the aftermath of cybercrime. “Consumers’ actions revealed a dangerous disconnect: Despite a steady stream of cybercrime sprees reported by media, too many people appear to feel invincible and skip taking even basic precautions to protect themselves,” said Tamim Taufiq, Head of Norton Middle East.

Emirates Group Security and Etihad Aviation Group Join Hands for Aviation Security NORTON CYBER SECURITY INSIGHTS REPORT

2017

The digital transformation in business, trade and industry offers a whole host of opportunities but also throws up new challenges for IT infrastructures. Dealing with complex tasks and huge volumes of data calls for increasingly fast, flexible and efficient IT solutions. DISCOVER THE POSSIBILITIES WITH RITTAL. INNOVATIVE DATA CENTRE ARCHITECTURES INNOVATIVE CLOUD SERVICES EDGE DATA CENTRES SMART PACKAGE OFFERING FOR IoT SOLUTIONS Discover it – the new world of IT solutions. Accent Infomedia_EMEA_GITEX 2017 - Handbook - 220X310mm(bleed) 200x290mm(trim) Balanced Cloud CentreDatacentre-in-a-Box IT Security Room RiMatrix SEdge Data Center Rittal Middle East FZE Tel: +971-4-3416855 I Email: info-it@rittal-middle-east.com I www.rittal.com/uae-en For Enquiries: Visit us at Hall 1 Stand F1-1

SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling prepared attendees by arming them with knowledge and expertise on the same tools and techniques used by cyber criminals. In line with this theme, FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques explored the make-up of modern malware. This deconstruction aided attendees’ ability to derive threat intelligence, respond to information security incidents and fortify defences.Thethird and final course, FOR526: Memory Forensics In-Depth, geared towards digital forensics teams, enabling them to uncover digital evidence and trace critical parameters of breaches.

Scientechnic has been Protec’s partners in the region for over a decade with a varied portfolio of large and medium scale projects. The expe rienced Building Technologies Division (BTD) of Scientechnic supplies, installs and maintains various types of fire protection equipment and technologies for these projects.

08 FEBRUARY 2018

SANS Dubai 2018 featured three six-day long courses, each of which addressed a critical area of incident response.

AKAMAI IDENTIFIED AS A DDOS MITIGATION LEADER

Scientechnic, the flagship company of Easa Saleh Al Gurg Group partnered with Protec, Siemens and Olympia Electronics at Intersec 2018. With the global safety and security market growing by leaps, Scientechnic and its partners Siemens, Protec and Olympia Electronics unveiled new products and intelligently engineered devices covering security, fire and rescue and Scientechnicmore.General Manager, Easa F. Al Gurg said “Intersec has quickly established itself as an international platform for innovative tech nology-driven solutions within the safety and security industry. With Middle East’s homeland security market expecting to witness significant growth and security investment in infrastruc ture on the rise, the need is growing for superior and quality solutions such as those developed in tandem with our Intersec partners.”.

Emirati Conglomerate ESAG Improves Physical Security

SANS SECURITYHOSTEDINSTITUTECYBEREVENT IN DUBAI

Akamai Technologies was among the select companies that Forrester invited to participate in: The Forrester Wave: DDoS Mitigation Solutions, Q4 2017 evaluation. In this evaluation, Akamai was cited as a Leader in DDoS Mitigation Solutions. According to the report, the distributed denial of services (DDoS) mitigation solution market is growing because S&R professionals understand that DDoS attacks are a threat to their digital business. Forrester’s research has found that having a DDoS mitigation solution in place is a best practice to protect internet-facing websites, applications, and infrastructure. “We have been protecting customers from large and sophisticated DDoS attacks for nearly two decades, introduced the first purpose-built DDoS protection solution in the cloud, and have continued to grow the most expansive DDoS mitigation platform in the world that has mitigated some of the largest attacks seen on the Internet – including a record-setting 623 Gbps attack in September 2016,” said Josh Shaul, Vice President of Web Security, Akamai. To help Middle East organizations prepare against inevitable attack, SANS Institute hosted a cyber security training event in Dubai from January 27 to February 1, 2018. The event featured three courses that not only helpe security professionals protect their organizations against attacks, but enable them to proactively mitigate malware threats and breaches in their IT systems.Alissa Torres teaches the FOR526 Memory Forensics class. She says, “There is an arms race between analysts and attack ers. Modern malware and post-exploitation modules increasingly employ self-defence techniques that include more sophisticated rootkit and anti-memory analysis mecha nisms that destroy or subvert volatile data. Examiners must therefore have a deeper understanding of memory internals in order to discern the intentions of attackers or rogue trusted insiders. FOR526 draws on best practices and recommendations from experts in the field to guide DFIR profes sionals through acquisition, validation, and memory analysis with real-world and malware-laden memory images.”

EASA F. AL GURG GENERAL SCIENTECHNICMANAGER,

Costa Boukouvalas, CEO, AgilityGrid said, “Security continues to be a focal point and at a time when video and video analytics are growing in importance, we look forward to some very meaningful discussions to help our existing customers and some potential ones meet their security needs.”

10 FEBRUARY 2018

Sophos made available its Intercept X with malware detection powered by advanced deep learning neural networks. Combined with new active-hacker mitigation, advanced application lockdown, and enhanced ransomware protec tion, this latest release of the next-generation endpoint protection delivers previously unseen levels of detection and prevention. “Predictive protection is the future of IT security. Sophos has taken a huge step forward by bringing deep learning neural networks into the industry leading exploit and ransomware protection of Intercept X,” said Dan Schiappa, Senior Vice President and General Manager of Products at Sophos. “Being able to protect against the next unknown attack instead of waiting for it to arrive will change the way IT operations in every organization can protect their users and assets. Intercept X can bring the most advanced next-generation protection to any organization, regardless of their current strategy.”Newfeatures in Intercept X include: Deep

AgilityGrid was joined by Intransa, at Intersec 2018 to showcase its comprehensive video security solutions across key vertical sectors. AgilityGrid became the official representa tive of US-based Intransa, who dominated AgilityGrid’s stand with its wide range of high performance, enterprise-grade storage, servers, switches and workstations all optimized for video surveillance. There was live demonstrations of its capabilities including a virtual camera simulation with over 500 HD cameras running with innovative video analytics.

Nedaa put spotlight on its current range of innovative solutions and applications that have been designed for today’s smart and safe cities during their participation at Intersec. Nedaa’s participation at this event was an important opportunity to reach out to their target customers by demonstrat ing LTE and 5G use cases of Nedaa private network capabilities to allow different organizations to deploy smart and safe applications and provide an overall better city experience. During the exciting three-day show, Nedaa, in a strong cooperation with Dubai Police, demonstrated a live video streaming to the command and control center that allows real-time monitoring through Nedaa private LTE network for mission criticalMansoorcommunication.BuOsaiba,CEO, Nedaa, said, “Intersec continues to live up to its name as being a strategic platform to showcase the latest innovation and advancements in safety and security. Hosting a pavilion that features our partners will give us the chance to throw the spotlight on our network capabilities and solutions designed for a smart, safe and sustainable city. These are applications and solutions that ensure the integration and unification of sustainable and effective communi cation systems and networks in compli ance with international standards.”

DAN VICE learning model detects known and unknown malware and potentially unwanted applications (PUAs) before they execute, without relying on signatures; The model is less than 20MB and requires infrequent updates.

The latest trends in artificial intel ligence and robotics in policing societies, along with major projects fuelling growth in the Middle East commercial security landscape, were among many talking points, as Intersec concluded its 20th edition in Dubai yesterday. The trade fair for security, safety, and fire protection featured 1,337 exhibitors from 59 countries, while 29,532 visitors from 129 countries stopped by the Dubai International Convention and Exhibition Centre. Sharing centre-stage were dozens of product launches, while live demonstrations of fire protec tion equipment and drones used across a wide range of applications kept thousands of buyers and industry professionals entertained and informed. The Dubai Police is one of Intersec’s long-standing Government Partners, along with the Dubai Civil Defence, Dubai Police Academy, the Security Industry Regulatory Agency (SIRA), and for the first time in 2018, the Dubai Municipality. This year from its exhibition stand, the Dubai Police had a strong focus on Artificial Intelligence (AI) and smarter technologies to keep resi dents, visitors, and communities safe. It also showcased Robocop prototypes and new smart services that are already in place in its fully automated smart police station, which recently opened in September 2017.

SCHIAPPA, SENIOR

PRESIDENT & GENERAL MANAGER OF PRODUCTS, SOPHOS INTRANSA JOINED AGILITYGRID AT INTERSECINTERSEC2018 2018 CONCLUDES IN DUBAI

ATLATESTSHOWCASEDNEDAASOLUTIONSINTERSEC

SOPHOS LAUNCHES NEW VERSION OF INTERCEPT X

What kind of Vendor extension models can customers expect from you? Westcon sales and technical teams are exten sions of the vendor. This is always the way we have worked. By aligning our teams around the vendor sales and technical teams we find we have a symbiotic relationship that reflects well into the channel as our strategy mirrors that of the vendor. I believe this is why the Westcon Security Practice has grown close to 30% in the last fiscal year.

IAN JONES, DIVISIONAL DIRECTOR, WESTCON SECURITY

How did you transform your work force or on-field security experts to match or cater to the rising demands in security? Were there any new recruitment or aggressive training for your local team? Westcon always prides itself on having the best engineers in the market and it’s a key deliverable to ensure those SEs are always challenging them selves and keeping up to date with all relevant technologies. Westcon consistently invests in our engineers and sales staff with internal and external courses to keep those skills sharp.

Have you been instrumental in various channel enablement programs throughout the year? Can the customers and partners look forward to more of such activities or enhancements to the current ones in 2018? The security landscape evolves so quickly that sometimes the vendors strategies do not make it into the channel in a timely manner. This is where Westcon can add some value to our vendors to ensure the channel is very aware and how we can support them especially when targeting end users. We will continue to support our channel partners through 2018 and build towards more success for everyone with a focused approach on messaging and events.

What kind of expansion of growth plans do you envision for the Middle East market in 2018? Are you planning to add on to your resources or portfolio? Well, first and foremost is an aggressive expansion strategy for the whole of Westcon in the Middle East. We will be opening regional offices in a number of countries and this has been something our customers have wanted for some time and this will help us provide a higher level of service to our business partners in those countries. From a security portfolio perspective, as you already aware a major vendor Juniper decided they didn’t want to work with Westcon on an EMEA level. But instead of adding a like for like vendor we have decided to take a slightly different approach and increase our investment in our current portfolio and to work with new vendors where we can look at strategic alliances with our current vendors. We hope to be able to announce some exciting news very soon. ë

“By aligning our teams around the vendor sales and technical teams we find we have a symbiotic relationship that reflects well into the channel as our strategy mirrors that of the vendor.”

BEING A ‘MIRROR’ TO THE VENDORS

INTERVIEW 12 FEBRUARY 2018

According to Westcon’s Divisional Director, Ian Jones, the VAD’s might comes from its unique capability in being a true extension of the vendor. In an up-close interview with Ian, he tells us how this model has helped Westcon Security practice to grow close in 30% in the last fiscal year. How challenging was the high-end security market for Westcon in 2017? I believe the biggest challenge in 2017 was all around the credit landscape of the region. We all know the projects are there, governments and large enterprises are focused on building out a solid Network Security infrastructure. But with the strain on credit facilities, business partners are constantly looking for flexible finance models to ease their cash flow. These demands of course have a knock on effect where we see a credit bottle neck as it transverses the supply chain.

AWARDS 2018 RECOGNIZING EXCELLENCE CATALYSTS OFFICIAL MEDIA PARTNERBROUGHT BY FOR MORE VISIT gecmediagroup.com CONTACT anushree@gecmediagroup.com, ronak@gecmediagroup.com, divsha@gecmediagroup.com THE INDUSTRY’S BENCHMARK FOR RECOGNIZING INDIVIDUAL TALENT IS BACK! SAVE THE DATE! 14th MARCH, 2018, VENUE: Burj Al Arab Hotel, Dubai NOMINATIONS OPEN FROM 1ST JANUARY 2018 FOLLOW US: Enterprise Channels MEA - Magazine EC_MEA Enterprise Channels MEA www.ec-mea.com

THE SAME BUT SECURITYCLOUDDIFFERENT 14 FEBRUARY 2018

COVERSTORY

Year on year, security breaches continue to increase. As the IT leaders fight to keep their cloud deployments safe, the cloud providers focus on introducing new security mechanisms. But with last year’s string of shocking breaches such as Equifax, Uber which shook the organizations deeply, is it now time to think of a different approach?

According to a recent survey by Gartner, public sector CIO’s are planning to invest more in the cloud, security and analytics this year. Cloud services and infrastruc ture/data centre was ranked in the top 10 by 30% of the government CIO’s compared with 12% in other industries. Concepts such as BYOD, Internet of things are the trends driving the cloud security market. CAN MAKE CLOUD MORE SECURE

15FEBRUARY 2018

n BY: DIVSHA BHAT <DIVSHA@GECMEDIAGROUP.COM> n PHOTO: SHUTTERSTOCK

As blockchain challenges the traditional sense of data protection and management, it has become highly efficient in ensuring data security in the cloud. It creates a transparent, traceable peer-topeer system that is almost impossible to hack.

“Blockchain technology is much more than just crypto, and blockchains will start to revolutionize how we operate as their tremendous capabilities are harnessed with new applications. The financial

BLOCKCHAIN

“NetApp offers Data Fabric solutions to simplify ML/AI efforts – from the edge of the network to the core of the data centre to the cloud”

However, Adrian Davis, Managing Director for the EMEA region at (ISC)2 says “Organisa tions must revise their risk assessments to reflect the changing nature of risks in the cloud and deploy the security technologies that protect their data: not the latest hyped technology. New tech nologies such as Blockchain, machine learning and artificial intelligence will only add value if the security basics – identity and access management, data classification and secure connectivity, for example – are in place.”

“Blockchain could be used to verify video content from multiple sources – such as public mobile phones and law enforcement body-worn cameras – for use within forensic investigations,”

ADRIAN DAVIS, MANAGING DIRECTOR – EMEA, (ISC)2

“Blockchain, ML and AI will only add value if the security basics – identity and access management, data classification and secure connectivity, are in place”

MARTIN WARREN, CLOUD SOLUTIONS MANAGER, NETAPP JOHAN PAULSON, CTO, AXIS COMMUNICATIONS.

16 FEBRUARY 2018

Johan Paulson, Chief Technology Officer of Axis Communications comments “In our industry, given that blockchain enables the authentication of any content, blockchain could be used to verify video content from multiple sources – such as public mobile phones and law enforcement body-worn cameras – for use within forensic investigations. Beyond video data, blockchain could also be used to verify the authenticity of devices connected to the camera network.”

INSIDER THREATS Insider Threat – What does this mean for cloud security? Many breaches are a result of simple human error. In a Harvey Nash/KPMG survey, 4500 CIO’s and technology leaders from around the world indicated that insider threat is the fastest growing security risk of all. Real understanding is the biggest risk from employees in cloud security. The cloud is designed to be simple to manage and operate but that can lead to instance being created by employees who don’t understand the risks. Also, the ability to work remotely has quickly become a benefit offered by most companies. sector is already utilizing blockchain technology for transfer of data, documents and the trust applied to the data is based on the blockchain it runs on,” commented Nicolai Solling, CTO, Help AG.“Cloud-based blockchain ledgers provide the infrastructure for organisations to implement their own ledgers as well as join distributed ledgers. This brings the potential for entire supply chains to all have complete visibility from the beginning to the end of every activity, delivering the kind of transparency that inspires confidence and the resilience to match,” said Brian Chappell, Senior Director, Enterprise & Solution Architec ture, BeyondTrust.

With the advent of Bring Your Own Device (BYOD), employees can find themselves working from any location, without being leashed to the office desk. While this has led to increased efficiency and productivity, it can also introduce security risks. “Information technology has always had to deal with hackers, but remote work using a personal device adds pressure to keep up with the changing cyber security landscape. Staff education is a good way to minimize cloud security threat, and education should focus on best practices for network security. Every employee isn’t going to be information technol ogy savvy, so training should be mandatory” said Scott Manson, Cybersecurity Lead – Middle East

“Security solutions need to keep pace with this digital transformation and be flexible enough to address cloud security challenges that organizations face” and Africa, Cisco. While there is no way to ensure these insider threats never take place, there are methods that can reduce chances of this occurrence like train ing the employees and reminding them about the cyber security risks. But when we reach the limitations of human scale thinking and analysis, is where machine learning shines.

RAY KAFITY, VP – META, ATTIVO NETWORKS.

SCOTT MANSON, CYBERSECURITY LEAD – MIDDLE EAST & AFRICA, CISCO.

THOMAS FISCHER, GLOBAL SECURITY ADVOCATE, DIGITAL GUARDIAN

“Using cloud services for ML will allow organisations to benefit from rapid on demand service provisioning and deprovisioning as the volume of events increases or decreases”

17FEBRUARY 2018

“Staff education is a good way to minimize cloud security threat, and education should focus on best practices for network security”

OVERCOMING CLOUD SECURITY THREATS WITH MACHINE LEARNING Johan Paulson believes that we have now reached a stage where the benefits of machine learning are realized. He says “We have huge sets of data to analyse, the processing power available to do so within reasonable timeframes, sophisticated algorithms, and a weight of use cases to learn from. When some of the most impressive dem onstrations of the application of deep learning have been related to image interpretation, speech recognition, and decision support, the potential for analytics in the safety and security sector are “Itobvious.”isstillearly days, however. Development is currently fast and unpredictable, and the demands on processing power are massive, but the potential for deep learning, which may ultimately lead to autonomous systems, is huge,” he Machineadds.

Learning enhances enterprise security through better analysis of threats and improved response to attacks. It will provide the ability to establish patterns that will help to manage the volume of data that security analysts will need to process. Thomas Fischer, Global Security Advocate for Digital Guardian

BRIAN CHAPPELL, SENIOR DIRECTOR, ENTERPRISE & SOLUTION BEYONDTRUSTARCHITECTURE,

However, since machine learning is a relatively new field, the right infrastructure choices sup porting this principle are not always obvious. This is the reason why NetApp offers Data Fabric solu tions and services to accelerate and simplify ML/ AI efforts – from the edge of the network to the core of the data centre to the cloud says Martin Warren, Cloud Solutions Manager, NetApp. He adds “NetApp has partnered with Splunk to ana lyze machine-generated data, including system log files to identify security violations, anomalies, and more. This partnership coupled with reliable NetApp solutions is designed to bring about robust enterprise security both on the premises and in the cloud.”

NICOLAI SOLLING, CTO, HELP AG

“Blockchains will start to revolutionize how we operate as their tremendous capabilities are harnessed with new applications”

“Cloud-based blockchain ledgers provide the infrastructure for organisations to implement their own ledgers as well as join distributed ledgers”

Cloud $3.5solutionssecuritytoreachbillionby2021predictsForrester $3.5bn 18 FEBRUARY 2018

FINALLY As cloud becomes the norm, enterprises will be looking for tools and services that help to secure their cloud infrastructure. General Data Protection Regulation (GDPR) will be one of the security activities for cloud services. When the GDPR rules apply, the organizations as well as cloud service providers will share equal liability. This will have the providers racing to determine how best to make sure that the sensitive data of their customers is well secured within the bounds of the GDPR. Given this scenario, how will the GDPR affect cloud computing in the coming years? Let us read in the words of Anushree Dixit on the next page. ë

says - “Using cloud services for Machine Learning will allow organisations to benefit from rapid on demand service provisioning and deprovisioning as the volume of events increases or decreases. Most importantly, it also allows organisations to subscribe to a SaaS type service providing access to continuous updates to the Machine Learn ing engine. It also opens the door to shared or aggregate ML models trained over very large data sets, increasing the performance and accuracy.”

IMPACT OF TRANSFORMATIONDIGITAL

According to reports, 43% of the executives consider security as the first challenge to address when implementing digital transformation. We cannot be digital without being protected. Knowing how to keep up with the changes in a positive way is a competitive advantage for any enterprise. Ray Kafity, Vice President for Middle East, Turkey and Africa at Attivo Networks says “According to Gartner, organisations in the Middle East and North Africa (MENA) are expected to spend almost $2 billion by 2020 on public cloud services. Organizations are increasingly embarking on digital transformation initiatives to aid in streamlining operations and expanding their efficiencies. In parallel, Security solutions need to keep pace with this digital transformation and be flexible enough to address cloud security challenges that organizations face, regardless of whether vulnerabilities are in the cloud or via cloud-connected apps.”

On May 25, 2018, the General Data Protection Regulation (GDPR) will be put into effect. With 2 months in the pockets, organizations are under tremendous pressure to comply with one of the toughest regulation in the world.

For all those who believe that GDPR is strictly a new security regulation, let us put it this way. GDPR is more of a cultural change— change in the way an organization behaves, employees behave and how the organization and the employees behave with their partners; a cultural change in understanding how where the data is stored, what data is stored and who has the governance over the date. According to The Veritas 2017 GDPR Report, 88 percent of organizations around the world plan to drive employee GDPR behavioral changes through training, rewards, penalties and contracts. Almost half (47 percent) of businesses will go so far as to add mandatory GDPR policy adherences into employment agreements. Failure to adhere to contractual guidelines could have significant implications. Nearly half (41 percent) of respondents also plan to implement employee disciplinary procedures if GDPR policies are violated. A quarter of businesses (25 percent) would consider witholding benefits—includ ing bonuses—from employees found to be non-compliant. At the same time, 34 percent say they will reward employees for complying with GDPR policies, as those employees are helping to promote proper data governance within their organizations, which can lead to better business outcomes. “In only a matter ANUSHREE

DIXIT <ANUSHREE @GECMEDIAGROUP.COM> n PHOTO: SHUTTERSTOCK FASTEN THE SECURITY BELTS. GDPR TAKES OFF.

n BY:

22 FEBRUARY 2018

Enterprises around the world are preparing to comply with GDPR, one of the toughest data privacy regulations in the world, when it takes effect on May 25, 2018. Commvault’s new data privacy application can address many GDPR compliance challenges, enabling enterprises to better understand what personal data they have, respond to customer requests and meet GDPR obligations regarding the collection, storage and handling of personal data. “Commvault’s new information governance for data privacy applica tion helps enterprises develop action plans and data policies to meet the requirements of GDPR and other data privacy regulations automatically, consistently and at scale, while also proving to regulators that they have met their compliance obligations,” says N. Robert Hammer, chairman, president and CEO of Commvault. What would go through a drastic change is the meaning of ‘Personal date’. Extending itself to encompass genetic and biometric data, the new GDPR will require will require additional and detailed transparency for all the data that is being processed.TarekAbbas, Systems Engineering Director, Emerging Markets, Palo Alto Networks, “The General Data Protection Regulation (GDPR) is now a few months away, and with hundreds of Middle East companies doing business in Europe and handling European data, this region will need to comply. Already companies are under a good amount of pressure to review, change, and test systems to make sure their organizations have the visibility they need, and that robust controls and processes in place.”

NEIL MURRAY, CHIEF TECHNOLOGY OFFICER AT MIMECAST of months, the deadline for GDPR compliance will be upon us: 25th May 2018,” said Johnny Karam, vice president emerging markeT, Veritas. “As the deadline approaches, it is imperative that employees understand the importance of protect ing company data to ensure that their business doesn’t face the extensive fines and reputational damage associated with non-compliance.

“The EU may choose to make an example out of one of the first companies it penalizes, sending a message that GDPR is to be taken seriously.”

“As the deadline approaches, it is imperative that employ ees understand the impor tance of protecting company data to ensure that their business doesn’t face the extensive fines.”

GORDON LOVE, VICE PRESIDENT – EMEA EMERGING REGION, SYMANTEC

Brendan O’Connor, Security CTO at Ser viceNow says that the GDPR will provide a legal framework to strengthen and unify data protection and distribution for individuals within the European Union (EU). “While the regulation will protect EU citizens, it will impact organiza tions worldwide – every company that serves a customer or employee in the EU – and businesses can be held responsible for the way they process, store, and protect personal data. The maximum penalty is a fine of 20 million Euros, or 4% of

JOHNNY KARAM VP EMERGING MARKET VERITAS

NOWHERE TO HIDE Though many organizations and security leaders have been emphasizing on the concept of security as a shared responsibility, we never saw a serious decision coming along. Well, the regulations just got tighter. Starting 25 May onwards, any organization conducting business in Europe must notify regulators within 72 hours of a data breach impacting employees or customers. While this would not only enable other companies to tighten the fences, it will also facilitate transparency in dealing with security breaches as such. Under GDPR, it will be especially important for companies to understand and comply with data protection regulations. Over time, this will undoubtedly boost data security practices and be a catalyst for positive change in relation to cybersecurity the region.

David Maclean, F5 Networks Systems Engineer says that The General Data Protection Regula tions (GDPR) means there is nowhere to hide. Organisations must describe the nature of the breach, the number of data sets compromised, contact information of directors responsible and any mitigative measures. Potential fines could be up to be 4% of global revenues or €20 million, whichever is greater. Businesses should already be deep into a risk-based preparatory strategy, including implementing secure procedures and controls to protect sensitive information. They should also temper their apprehensions. It will be disruptive but, if handled correctly, invaluable market differentiation can be gleaned through trumpeting best-in-class compliance and data management practice.

“With the impending GDPR deadline quickly approaching, admins will require a process that can quickly and accu rately scan through archive data.”

According to Mimecast, GDPR requires organizations put in place necessary measures to mitigate risks to the personal data that they handle. Among other provisions, the GDPR will require organizations – quickly and without compensation – to respond to EU residents’ queries about how their personal data is used, and to purge their data upon request. The robust filter ing, tagging, and annotation features of the Case Review App, coupled with the fast search and e-discovery performance of Mimecast Archiving, help legal and compliance professionals simplify and streamline management of these queries and “Withrequests.the impending GDPR deadline quickly approaching, admins will require a process that can quickly and accurately scan through archive data. Email first-pass review is a vital component of eDiscovery, but often admins are competing against tight deadlines and other priorities. Cast ing too wide a net for searches leads to massive amounts of data that is often redundant or obso lete,” said Neil Murray, chief technology officer at Mimecast. “The Mimecast Case Review App can streamline this process, improving e-discovery effectiveness while also reducing legal costs.”

The GDPR is clearly extraterritorial and encompasses countries outside the EU. It will be applicable to all the entities that have some kind of establishment or involvement in the EU and those who are processing personal data in that perimeter. The legal and regulatory requirements associated with data protection differ across the Middle East, hence there is no hard and fast rules or a one-rule-applies-to-all phenomenon here. Let us leave the conversation here by saying that the best thing to do now is to buckle up with the right kind of assessment and audit tools and see what are the necessary steps that organiza tions have to take in order to comply with the regulation.Anearly bird would definitely catch the worm, but being early is not enough. The bird has to be wise enough to look in the right place. ë

“It will be disruptive but, if handled correctly, invaluable market differentiation can be gleaned through trumpeting best-in-class compliance and data management practice.”

23FEBRUARY 2018 to store, use and share sensitive data outside their managed environment with external users or cloud apps. Greater protection is ensured because data access is limited to authorized viewers, reducing the risk of unwanted exposure. This Information Centric Security approach helps ensure safe collaboration and helps to enable compliance for stringent regulations such as GDPR. The release of Symantec DLP 15 extends this capability through enhanced integration with cloud access security broker, data classification, user-entity behavioral analytics and informationcentric encryption to support a wider range of communication channels.

DAVID MACLEAN, F5 NETWORKSENGINEERSYSTEMS

“Consider how you apply and maintain an adaptive cybersecurity ecosystem that is automated to work at the same speed as the attacker.”

“The EU may choose to make an example out of one of the first companies it penalizes, sending a message that GDPR is to be taken seriously.”

Do’s global annual revenue, whichever is greater. The EU may choose to make an example out of one of the first companies it penalizes, sending a message that GDPR is to be taken seriously,” says Brendan.Gordon Love, Vice President – EMEA Emerg ing Region, Symantec, Symantec’s Information Centric Security solution allows organizations

“Commvault’s new information governance for data privacy applications helps enterprises develop action plans to meet the require ments of GDPR.”

N. ROBERT HAMMER, CHAIRMAN, PRESIDENT & CEO COMMVAULT

BRENDAN O’CONNOR, SECURITY CTO AT SERVICENOW

TAREK ABBAS, SYSTEMS ENGINEERING DIREC TOR, EMERGING MARKETS, PALO ALTO NETWORKS

FINALLY

24 FEBRUARY 2018

We all must have heard about the Love bug virus— a cute little love letter, back in 2000, that landed in the inboxes of millions of people and destroyed data with a self-replicating computer worm. Little could be done to meet the aftermath. Well, it was way back in 2000—two decades back when threat awareness or the awareness to cope with it was limited. Earlier, technology companies bought errors and omissions (E&O) insurance that later begin to include coverages for software product creating downtimes, unauthorized access to a client system, data demolition, or a trojan.

BY: ANUSHREE DIXIT <ANUSHREE@GECMEDIAGROUP.COM>

Though cyber insurance, or cyber liability, is not an answer to the increasing cyber attacks, it is definitely a strong factor in your business decision making. There has been an acceleration in the conversations and implementations around IoT and other emerging technologies like ML, AI, VR etc, hence it is very obvious that the landscape is highly vulnerable.

INSURANCE OR ASSURANCE

“Organisations in the ME region as well as elsewhere have a big responsibility with their IT services today. Whether it is a way to control financial risks in addition to managing the technol ogy services; there should be a complete seriousness

THE RISK

From the swing in premiums for alike policies to the lack of standardization in the cyber insurance market, we can very well say that the cyber insurance market in the Middle East is still at a very embryonic stage.

According to an executive opinion survey carried out by the WEF in 2017, the top concern for UAE executives moving into 2018 is the potential for a cyberattack, followed by an asset bubble, energy price shock, terrorist attack, deflation risk, or data fraud and theft.

Mike Lloyd, CTO, RedSeal says, “Insurance providers find a ready market of organizations who want cyber policies – indeed, often buyers want more coverage than insurance companies are comfortable selling. This will change as more data is collected – insurance markets are very effective, but they must necessarily move slowly when dealing with new and rapidly changing risks.”

Cyber insurance it still in its initial phases, at least in the Middle East region, despite the fact that the concept has been in conversation since a decade.

25FEBRUARY 2018

n PHOTO: SHUTTERSTOCK

The rate at which Internet of Things (IoT) devices are being deployed across the region in government, business and the private sphere is breathtaking. But the world has yet to come to terms with the new types of vulnerabilities IoT devices present through the inherent security weaknesses that are created by the way they are designed and brought to market.

I am sure that an average of 60-70% of you who are reading this piece now have already researched, planned or already purchased a cyber insurance for your company. If you have not done any of the above then maybe it is time to have a strong grip on your organization’s steering wheel. As it has been repeatedly said, it is not about ‘if’ you will get attacked, but ‘when’. But in today’s world, there is something more important than ‘when’— It is ‘what-after-that’.

n

Most organizations start out dismissive of cyber insurance, saying “we self-insure”. This was the attitude several years ago. However, as more and more organizations suffer larger and larger losses (and as CEOs and other executives lose compensa tion, or worse, their jobs due to public breaches), this attitude fades away.

COVERING IMPORTANTWHAT’S

A report by specialist insurer Allianz Global Corporate & Specialty (AGCS) in 2015 found that cyber insurance premiums would grow globally from $2 billion (Dh7.3 billion) per annum, to over $20 billion by 2025, a compound annual growth rate of over 20 percent.

MIKE LLOYD, CTO, REDSEAL “Veeam’s Availability Report indicates that many organiza tions admit there is a gap between their capabilities and the organisation’s expectations in Availability and organisations are working diligently to close that gap.”

26 FEBRUARY 2018 provided to the risk of cyber attack and data loss.

While reading more about the insurance and cov erages, one can find out that in addition to “third party” coverage (e.g., network security liability, privacy liability, and electronic media liability), cyber liability covers:Notification costs, Forensic investigation costs, Business interruption, Data restoration, Regulatory proceedings coverage etc. As cyber threats grow in diversity and sophis tication, endpoint security is a pressing concern, now more than ever. Today, AV-based software offers less effective protection for organisations, requiring IT teams to adopt more advanced solutions. “As a result to the increasing demand for next generation security solutions, we are now the exclusive distributor in the Middle East for endpoint protection specialists SentinelOne,” says Nathan Clements, Managing Director, Exclusive Networks. Cyber-attacks today are increasingly targeting multiple vectors to cause maximum disruption and destruction. “Senti nelOne’s Next-Generation Endpoint Protection defends every endpoint against multiple attacks, from traditional malware-based infection and memory-based exploitation, to script-based attacks and live attackers, throughout every stage in the threat lifecycle. It unifies prevention, detec tion, and response in a single platform driven by sophisticated machine learning and intelligent automation, enabling IT to predict malicious behavior across major threat vectors, exploits, script-based, and file-less attacks in real-time,” addsAccordingClements.to Mike, the biggest problem in cyber security today is the inability to make proper business decisions about risk. In a domain like manufacturing quality, there is plenty of data for a formal ROI decision – does technique X improve quality by Y amount? “In security, such measurements are still a dream, primarily because most breaches and financial losses are still private matters that companies can and do under-report.

FINALLY Just like somebody said; having a car insurance does not mean that you would go driving on all the wrong lanes and break all the signals, having a cyber insurance does not mean that you will dodge away the security protocols. Cyber insurance providers will also need to set a certain standard or rules when it comes to expecting the organizations to adhere to certain set security norms. ë

The awareness is raising, organizations are taking the concept of insurance more seriously and more questions are being asked and there is a very determinant inclination towards minimizing costs and the cost as well.

RICK VANOVER, DIRECTOR OF TECHNICAL PROD UCT MARKETING & EVANGELISM FOR VEEAM SOFTWARE

“Today, AV-based software offers less effective protection for organisations, requiring IT teams to adopt more solutions.”advanced

NATHAN CLEMENTS, MANAGING DIRECTOR, EXCLUSIVE NETWORKS

“Cyber insurance brings some benefits to both the company who takes out a cyber policy, and the insurer who can hope to make a profit.”

Cyber insurance brings some benefits to both the company who takes out a cyber policy, and the insurer who can hope to make a profit. However, the biggest benefit comes from the data – how much are companies really losing, year after year? How effective are specific techniques and policies? What is the modern equivalent of the non-smoker’s discount in a health insurance plan? Answers to these will only come from the insurance market.”

Veeam’s Availability Report indicates that many organizations admit there is a gap between their capabilities and the organisation’s expectations in Availability and organisations are working diligently to close that gap,” says Rick Vanover, director of Technical Product Marketing & Evangelism for Veeam Software.

INDIAGHANAEGYPTCHINACANADABOTSWANABAHRAINAZERBAIJANAUSTRALIA NEPALNEWMOROCCOMAURITIUSMALAYSIAKENYAKAZAKHSTANIRELANDINDONESIAZEALAND SOUTHSRISINGAPORESCOTLANDSAUDIRUSSIAOMANNIGERIANETHERLANDARABIALANKAAFRICA ZIMBABWEUSUNITEDUAETURKEYTHAILANDSWITZERLANDKINGDOM PARTICIPATINGCOUNTRIES 34 QUALIFYINGROUNDS 50 C-LEVEL EXECUTIVES 3,700

28 FEBRUARY 2018

Since core SMTP fails to offer authentication, emails are vulnerable to attacks.

l Packet filtering should be implemented so that all the packets are filtered and scanned. Use spoof detection software Do not reply to any e-mail asking for account details Avoid trust relationships Use secure encryption protocols

January 2017 – The Davidson County School was the victim of an email spoofing attack by an individual pretending to be their Superintendent. A request was made for all 2016 Davidson County Board of Education Employee W-2 information. Unfortunately, copies of all 2016 employee W2 forms were provided before they discovered that the request was made from a fraudulent account by someone using the name of their Superintendent. ë

HOW TO SPOOFING?RECOGNIZE

WHAT IS SPOOFING? Spoofing is a malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver. One of the most common spoofs is email spoofing.

SPOOFWARE

29FEBRUARY 2018

Domain Name System (DNS) Spoof ing – In this type of attack, the user is forced to navigate to a fake website disguised to look like a real one with the intention of stealing credentials of the users. For instance, if a DNS record is spoofed, then the attacker can manage to redirect the traffic that relied on the correct DNS record to visit a false website that the hacker has created to resemble the real site or a different site completely.

TYPES OF SPOOFING

HOW TO SPOOFING?AVOID

The hacker also knows that if the recipient receives spoofed email that appears to be from a known source, it is likely to be opened. A spoofed email may also contain threats like trojans and viruses and these programs can cause computer damage by allowing unexpected activities such as deletion of files.

l

l

Address Resolution Protocol (ARP) Spoofing – This type of spoofing is a technique in which an attacker sends falsified ARP messages over a local area network. This attack can enable hackers to intercept data frames on a network, modify the traffic or even stop data in transit. Often the attack is used as an opening for other attacks, such as DoS, man in the middle, or session hijacking attacks.

l

Internet Protocol (IP) Spoofing – An IP spoofing attack is the creation of IP packets with a false source IP address for the purpose of hiding the identity of the sender. The most popular type of IP spoofing attack is the Denial of Service attack which shut down the targeted servers. In a DOS attack, an attacker sends a packet to the target host with a forged IP address. The host sends an acknowledgement and waits for the response. The unanswered queries remain in the buffer of the targeted device when there is no response. The buffer will overflow and the network device will crash when enough spoofed queries are sent.

October 2017 – In Kuala Lumpur, the mobile phone numbers of two staff members of the federal oppositions anti kleptocracy rally were allegedly spoofed to threaten the public in mass messages. The duo had fallen victim to a “spoof ing attack” where the attacker used an unknown source that is disguised as the victim’s identity to sabotage the victim.

Spoofed emails might request personal information and also may appear to be from an unknown source. Such emails request the recipient to reply with an account number for verification. The hacker uses this account number for identity theft purposes such as accessing the victim’s bank account. For instance, sending an email to the finance team that appears to be from the Chief Financial Officer requesting the transfer of significant funds.

February 2017 – The University of Michigan was alerted of several racist and anti-Semitic e-mails sent to e-mail groups within the College of Engineering. The University of Michigan Police Department and the FBI conducted a joint criminal investigation into the incident. The content of the e-mails was condemned by the university in general and by President specifi cally. It was determined that the e-mails were “spoofed.”

l

SPOOFING IN NEWS

Solutions Portfolio

TROY Group, Inc. is a world wide leader of personalized, on demand, layered security for printed documents, adding protection and confidence since 1963.With beginnings in the Mag netic Ink Character Recognition (MICR) industry, TROY has become the leader in secure, check printing solutions. TROY offers AssurePay check printing software, MICR Printers and specialized MICR inks and toners for tamper-resistant pay ments. TROY customers include 8 of the top 10 U.S. banks, along with financial institutions in 70+ countries, key government accounts and distributors worldwide.SecureDocs software and TROY SecureUV Printers, featuring both overt and covert inks, delivers a total protective solution to prevent forgery, falsification, and alteration of sensitive documents. This total solution empowers government officials and organiza tions to create smart, fraud-resistant security at the point of issue. When augmented with digital authentication, smart serializations, and covert & overt features, printed information because tamperresistant and difficult to replicate even by the most sophisticated fraudsters. Go to Market In the U.S., we sell direct to many customers, but we also have a great partnership with HP and many distributors and resellers. Combined, we have over 400 partners, distributors and resellers, of which 250+ are outside of the U.S. Outside of the U.S. market, we rely heavily on partners to make introductions and bring TROY solutions to the client. We strategi cally choose partners who are already recognized and trusted in their region, and who can make the introductions we need to help secure sensitive information locally. In many cases, we’re dealing with governments and universities where introductions are much needed.

REGIONAL

sensitiveprotectiveSecureDocsforprintedSeeingSECURITYRESISTANTanunmetneedindocumentsecurity,largerthanprotectingpayments,TROYbegandevelopingsoftwareandprintersuseinhighsecurityapplications.TROY’SstrengthliesinitssoftwareandSecureUVPrintersthatdeliveratotalsolutiontopreventforgery,falsification,andalterationofdocuments.

INTERVIEW 30 FEBRUARY 2018

FRAUD-

MARK BOND, MANAGER EMEA, TROY GROUP

How do you plan to expand your reach in the Middle East/GCC in 2018? What kind of intricate campaigns would you be carrying out? In 2018, we will continue to work with governments, financial institutions and universities across the Middle East. We see the need to help protect sensitive information from misuse in a more secure and convenient way. ë

In the arena of secure document printing and issuance, what are the existing hurdles or gaps that you are filling in as a solution provider? What is new is the approach to protecting personal information through layered document security. Advancements in printer technology, overt and covert inks, as well as innovative software help to secure and track personal information designed to aid in the growth of humanity and combat identity and document fraud. This technology needs to be two things: more secure and more convenient. Our focus is to add an additional layer of security at the point of issue, in the personalization, to prevent pre-printed base-stationery being stolen and personalized by criminals and fraudsters.Wealways want to be a one-stop-shop for our clients. In addition, our digital authentication feature in SecureDocs enables offline verification of documents via the smartphone app. Digital security elements support verification and audit tracability, yet cannot be duplicated.

BROUGHT BY UNVEILS RECOGNIZING THE LEADERS OF THE DIGITAL REVOLUTION 14.05.2018 IT’ s TIME TO RAISE THE BENCHMARK AND THE MARK

FOLLOW US: Enterprise Channels MEA - Magazine EC_MEA Enterprise Channels MEA www.ec-mea.com For more visit <gecmediagroup.com> CONTACT: anushree@gecmediagroup.com, ronak@gecmediagroup.com, divsha@gecmediagroup.com OFFICIAL MEDIA PARTNERBROUGHT BY REGISTER SUMMITNOW 2018 DECODING THE FUTURE FUTURE IT DIGITAL LANDSCAPE OF 5 COUNTRIES PROVOKINGTHOUGHT-7TRACKS 15 RSPEAKERSENOWNED EXECUTIVESC150+LEVEL 14th MARCH, 2018 BURJ AL ARAB HOTEL, DUBAI

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.