ºÝºÝߣshows by User: ShahSheikh / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: ShahSheikh / Thu, 07 Nov 2019 18:11:54 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: ShahSheikh ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience /slideshow/isaca-2019-amman-chapter-shah-sheikh-cyber-resilience/191422818 isaca2019ammanchaptershahsheikhcyberresilience-191107181154
Cyber Resilience in the Digital Era - ISACA Amman Chapter 2019 Shah Sheikh]]>

Cyber Resilience in the Digital Era - ISACA Amman Chapter 2019 Shah Sheikh]]>
Thu, 07 Nov 2019 18:11:54 GMT /slideshow/isaca-2019-amman-chapter-shah-sheikh-cyber-resilience/191422818 ShahSheikh@slideshare.net(ShahSheikh) ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience ShahSheikh Cyber Resilience in the Digital Era - ISACA Amman Chapter 2019 Shah Sheikh <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/isaca2019ammanchaptershahsheikhcyberresilience-191107181154-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber Resilience in the Digital Era - ISACA Amman Chapter 2019 Shah Sheikh
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience from Shah Sheikh
]]>
960 2 https://cdn.slidesharecdn.com/ss_thumbnails/isaca2019ammanchaptershahsheikhcyberresilience-191107181154-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DTS Solution - Company Presentation /slideshow/dts-solution-company-presentation-144003443/144003443 dtscorporatepresentation-190506192128
DTS Solution - Company Presentation. Cyber Security, Dubai, Abu Dhabi, UAE, ]]>

DTS Solution - Company Presentation. Cyber Security, Dubai, Abu Dhabi, UAE, ]]>
Mon, 06 May 2019 19:21:27 GMT /slideshow/dts-solution-company-presentation-144003443/144003443 ShahSheikh@slideshare.net(ShahSheikh) DTS Solution - Company Presentation ShahSheikh DTS Solution - Company Presentation. Cyber Security, Dubai, Abu Dhabi, UAE, <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dtscorporatepresentation-190506192128-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DTS Solution - Company Presentation. Cyber Security, Dubai, Abu Dhabi, UAE,
DTS Solution - Company Presentation from Shah Sheikh
]]>
550 2 https://cdn.slidesharecdn.com/ss_thumbnails/dtscorporatepresentation-190506192128-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018) /slideshow/cyber-security-101-back-to-basics-hp-secure-print-event-2018/143999401 hpsecurityevent-190506190240
HP Secure Print Event 2018]]>

HP Secure Print Event 2018]]>
Mon, 06 May 2019 19:02:40 GMT /slideshow/cyber-security-101-back-to-basics-hp-secure-print-event-2018/143999401 ShahSheikh@slideshare.net(ShahSheikh) Cyber Security 101 - Back to Basics (HP Secure Print Event 2018) ShahSheikh HP Secure Print Event 2018 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hpsecurityevent-190506190240-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> HP Secure Print Event 2018
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018) from Shah Sheikh
]]>
629 5 https://cdn.slidesharecdn.com/ss_thumbnails/hpsecurityevent-190506190240-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DTS Solution - Company Presentation /slideshow/dts-solution-company-presentation/124419175 dtssolutioncompanypresentationv4-181129191011
DTS Solution - Cyber Security Services Portfolio]]>

DTS Solution - Cyber Security Services Portfolio]]>
Thu, 29 Nov 2018 19:10:11 GMT /slideshow/dts-solution-company-presentation/124419175 ShahSheikh@slideshare.net(ShahSheikh) DTS Solution - Company Presentation ShahSheikh DTS Solution - Cyber Security Services Portfolio <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dtssolutioncompanypresentationv4-181129191011-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DTS Solution - Cyber Security Services Portfolio
DTS Solution - Company Presentation from Shah Sheikh
]]>
12272 3 https://cdn.slidesharecdn.com/ss_thumbnails/dtssolutioncompanypresentationv4-181129191011-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DTS Solution - Red Team - Penetration Testing /slideshow/dts-solution-red-team-penetration-testing/95411463 red-team-180429123000
DTS Solution - Red Team - Penetration Testing]]>

DTS Solution - Red Team - Penetration Testing]]>
Sun, 29 Apr 2018 12:30:00 GMT /slideshow/dts-solution-red-team-penetration-testing/95411463 ShahSheikh@slideshare.net(ShahSheikh) DTS Solution - Red Team - Penetration Testing ShahSheikh DTS Solution - Red Team - Penetration Testing <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/red-team-180429123000-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DTS Solution - Red Team - Penetration Testing
DTS Solution - Red Team - Penetration Testing from Shah Sheikh
]]>
560 3 https://cdn.slidesharecdn.com/ss_thumbnails/red-team-180429123000-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DTS Solution - Cyber Security Services Portfolio /slideshow/dts-solution-cyber-security-services-portfolio/95409180 dtscybersecurityservicesssorrv1-180429112956
DTS Solution - Cyber Security Services Portfolio]]>

DTS Solution - Cyber Security Services Portfolio]]>
Sun, 29 Apr 2018 11:29:56 GMT /slideshow/dts-solution-cyber-security-services-portfolio/95409180 ShahSheikh@slideshare.net(ShahSheikh) DTS Solution - Cyber Security Services Portfolio ShahSheikh DTS Solution - Cyber Security Services Portfolio <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dtscybersecurityservicesssorrv1-180429112956-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio from Shah Sheikh
]]>
3321 5 https://cdn.slidesharecdn.com/ss_thumbnails/dtscybersecurityservicesssorrv1-180429112956-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure.... /slideshow/dts-solution-yehia-mamdouh-release-your-pet-worm-on-your-infrastructure/64542956 release-yourbetwormonyourinfrastructure-160730175817
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....]]>

DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....]]>
Sat, 30 Jul 2016 17:58:17 GMT /slideshow/dts-solution-yehia-mamdouh-release-your-pet-worm-on-your-infrastructure/64542956 ShahSheikh@slideshare.net(ShahSheikh) DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure.... ShahSheikh DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure.... <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/release-yourbetwormonyourinfrastructure-160730175817-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure.... from Shah Sheikh
]]>
1360 13 https://cdn.slidesharecdn.com/ss_thumbnails/release-yourbetwormonyourinfrastructure-160730175817-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 compliance /slideshow/dts-solution-crypto-flow-segmentation-addressing-nesa-iaf-and-iso27001-compliance/64541311 dtscertesworkshopauhcompliancev1-160730160917
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 and ICS Security IEC62443 standards]]>

DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 and ICS Security IEC62443 standards]]>
Sat, 30 Jul 2016 16:09:17 GMT /slideshow/dts-solution-crypto-flow-segmentation-addressing-nesa-iaf-and-iso27001-compliance/64541311 ShahSheikh@slideshare.net(ShahSheikh) DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 compliance ShahSheikh DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 and ICS Security IEC62443 standards <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dtscertesworkshopauhcompliancev1-160730160917-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 and ICS Security IEC62443 standards
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 compliance from Shah Sheikh
]]>
1131 13 https://cdn.slidesharecdn.com/ss_thumbnails/dtscertesworkshopauhcompliancev1-160730160917-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Yehia Mamdouh @ DTS Solution - The Gentleman Thief /slideshow/yehia-mamdouh-the-gentleman-thief/64538252 socialengineer-artofdeceiving-thegentelmanthief-160730125700
Social Engineering - The Gentleman Thief - The Art of Deception]]>

Social Engineering - The Gentleman Thief - The Art of Deception]]>
Sat, 30 Jul 2016 12:57:00 GMT /slideshow/yehia-mamdouh-the-gentleman-thief/64538252 ShahSheikh@slideshare.net(ShahSheikh) Yehia Mamdouh @ DTS Solution - The Gentleman Thief ShahSheikh Social Engineering - The Gentleman Thief - The Art of Deception <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/socialengineer-artofdeceiving-thegentelmanthief-160730125700-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Social Engineering - The Gentleman Thief - The Art of Deception
Yehia Mamdouh @ DTS Solution - The Gentleman Thief from Shah Sheikh
]]>
1031 13 https://cdn.slidesharecdn.com/ss_thumbnails/socialengineer-artofdeceiving-thegentelmanthief-160730125700-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot /slideshow/defcamp-mohamed-bedewi-building-a-weaponized-honeypot/64313075 defcamp15buildingaweaponizedhoneybot-160723154203
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot]]>

DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot]]>
Sat, 23 Jul 2016 15:42:03 GMT /slideshow/defcamp-mohamed-bedewi-building-a-weaponized-honeypot/64313075 ShahSheikh@slideshare.net(ShahSheikh) DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot ShahSheikh DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcamp15buildingaweaponizedhoneybot-160723154203-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot from Shah Sheikh
]]>
849 2 https://cdn.slidesharecdn.com/ss_thumbnails/defcamp15buildingaweaponizedhoneybot-160723154203-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Building a Cyber Security Operations Center for SCADA/ICS Environments /slideshow/building-a-cyber-security-operations-center-for-scadaics-environments/64309353 buildingascadacsocdtsv1-160723125532
Abstract: Modern day cyber threats are ever increasing in sophistication and evasiveness against Process Control Networks. Organizations in the industry are facing a constant challenge to adopt modern techniques to proactively monitor the security posture within the SCADA infrastructure whilst keeping cyber attackers and threat actors at bay. In this presentation we will cover the fundamental building blocks of building a SCADA cyber security operations center with key responsibilities such as Incident Response Management, Vulnerability and Patch Management, Secure-by-design Architecture, Security Logging and Monitoring and how such security domains drive accountability and act as a line of authority across the PCN. ]]>

Abstract: Modern day cyber threats are ever increasing in sophistication and evasiveness against Process Control Networks. Organizations in the industry are facing a constant challenge to adopt modern techniques to proactively monitor the security posture within the SCADA infrastructure whilst keeping cyber attackers and threat actors at bay. In this presentation we will cover the fundamental building blocks of building a SCADA cyber security operations center with key responsibilities such as Incident Response Management, Vulnerability and Patch Management, Secure-by-design Architecture, Security Logging and Monitoring and how such security domains drive accountability and act as a line of authority across the PCN. ]]>
Sat, 23 Jul 2016 12:55:32 GMT /slideshow/building-a-cyber-security-operations-center-for-scadaics-environments/64309353 ShahSheikh@slideshare.net(ShahSheikh) Building a Cyber Security Operations Center for SCADA/ICS Environments ShahSheikh Abstract: Modern day cyber threats are ever increasing in sophistication and evasiveness against Process Control Networks. Organizations in the industry are facing a constant challenge to adopt modern techniques to proactively monitor the security posture within the SCADA infrastructure whilst keeping cyber attackers and threat actors at bay. In this presentation we will cover the fundamental building blocks of building a SCADA cyber security operations center with key responsibilities such as Incident Response Management, Vulnerability and Patch Management, Secure-by-design Architecture, Security Logging and Monitoring and how such security domains drive accountability and act as a line of authority across the PCN. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/buildingascadacsocdtsv1-160723125532-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract: Modern day cyber threats are ever increasing in sophistication and evasiveness against Process Control Networks. Organizations in the industry are facing a constant challenge to adopt modern techniques to proactively monitor the security posture within the SCADA infrastructure whilst keeping cyber attackers and threat actors at bay. In this presentation we will cover the fundamental building blocks of building a SCADA cyber security operations center with key responsibilities such as Incident Response Management, Vulnerability and Patch Management, Secure-by-design Architecture, Security Logging and Monitoring and how such security domains drive accountability and act as a line of authority across the PCN.
Building a Cyber Security Operations Center for SCADA/ICS Environments from Shah Sheikh
]]>
17215 12 https://cdn.slidesharecdn.com/ss_thumbnails/buildingascadacsocdtsv1-160723125532-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi /slideshow/balccon-2015-dts-solution-attacking-the-unknown-by-mohamed-bedewi/64308922 balccon2k15attackingtheunknownv1-160723123350
Anonymization techniques are a double-edged sword invention as they can be used by journalists to communicate more safely with whistle blowers or by malicious users to commit cyber-crimes without getting caught but the problem is that neither party is anonymous nor safe from being exposed. In the presentation Mohamed discussed a tool that he developed "dynamicDetect" to de-anonymize TOR clients and browsers and abstracting the user's original IP address and fingerprint. The tool then uses this information as a launchpad to perform defensive and offensive against that TOR user.]]>

Anonymization techniques are a double-edged sword invention as they can be used by journalists to communicate more safely with whistle blowers or by malicious users to commit cyber-crimes without getting caught but the problem is that neither party is anonymous nor safe from being exposed. In the presentation Mohamed discussed a tool that he developed "dynamicDetect" to de-anonymize TOR clients and browsers and abstracting the user's original IP address and fingerprint. The tool then uses this information as a launchpad to perform defensive and offensive against that TOR user.]]>
Sat, 23 Jul 2016 12:33:50 GMT /slideshow/balccon-2015-dts-solution-attacking-the-unknown-by-mohamed-bedewi/64308922 ShahSheikh@slideshare.net(ShahSheikh) BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi ShahSheikh Anonymization techniques are a double-edged sword invention as they can be used by journalists to communicate more safely with whistle blowers or by malicious users to commit cyber-crimes without getting caught but the problem is that neither party is anonymous nor safe from being exposed. In the presentation Mohamed discussed a tool that he developed "dynamicDetect" to de-anonymize TOR clients and browsers and abstracting the user's original IP address and fingerprint. The tool then uses this information as a launchpad to perform defensive and offensive against that TOR user. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/balccon2k15attackingtheunknownv1-160723123350-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Anonymization techniques are a double-edged sword invention as they can be used by journalists to communicate more safely with whistle blowers or by malicious users to commit cyber-crimes without getting caught but the problem is that neither party is anonymous nor safe from being exposed. In the presentation Mohamed discussed a tool that he developed &quot;dynamicDetect&quot; to de-anonymize TOR clients and browsers and abstracting the user&#39;s original IP address and fingerprint. The tool then uses this information as a launchpad to perform defensive and offensive against that TOR user.
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi from Shah Sheikh
]]>
784 13 https://cdn.slidesharecdn.com/ss_thumbnails/balccon2k15attackingtheunknownv1-160723123350-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DTS Solution - Hacking ATM Machines - The Italian Job Way /ShahSheikh/dts-solution-hacking-atm-machines-the-italian-job-way dtshackingatmmachinesv1-160723095620
DTS Solution - Hacking ATM Machines - The Italian Job Way]]>

DTS Solution - Hacking ATM Machines - The Italian Job Way]]>
Sat, 23 Jul 2016 09:56:20 GMT /ShahSheikh/dts-solution-hacking-atm-machines-the-italian-job-way ShahSheikh@slideshare.net(ShahSheikh) DTS Solution - Hacking ATM Machines - The Italian Job Way ShahSheikh DTS Solution - Hacking ATM Machines - The Italian Job Way <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dtshackingatmmachinesv1-160723095620-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way from Shah Sheikh
]]>
4213 61 https://cdn.slidesharecdn.com/ss_thumbnails/dtshackingatmmachinesv1-160723095620-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware /slideshow/shah-sheikh-isaca-uae-deep-dive-on-evasive-malware/52451646 deepdiveonevasivemalware-150905143507-lva1-app6892
Shah Sheikh presents @ ISACA UAE CPE Event - Deep Dive on Evasive Malware. ]]>

Shah Sheikh presents @ ISACA UAE CPE Event - Deep Dive on Evasive Malware. ]]>
Sat, 05 Sep 2015 14:35:07 GMT /slideshow/shah-sheikh-isaca-uae-deep-dive-on-evasive-malware/52451646 ShahSheikh@slideshare.net(ShahSheikh) Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware ShahSheikh Shah Sheikh presents @ ISACA UAE CPE Event - Deep Dive on Evasive Malware. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/deepdiveonevasivemalware-150905143507-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Shah Sheikh presents @ ISACA UAE CPE Event - Deep Dive on Evasive Malware.
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware from Shah Sheikh
]]>
1908 9 https://cdn.slidesharecdn.com/ss_thumbnails/deepdiveonevasivemalware-150905143507-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DTS Solution - Outsourcing Outlook Dubai 2015 /slideshow/dts-solution-outsourcing-outlook-dubai-2015/52448832 dtsoutsourceoutlook-150905112854-lva1-app6892
Shah Sheikh presents @ Outsourcing Outlook 2015 – Dubai Outsource Zone / TECOM]]>

Shah Sheikh presents @ Outsourcing Outlook 2015 – Dubai Outsource Zone / TECOM]]>
Sat, 05 Sep 2015 11:28:54 GMT /slideshow/dts-solution-outsourcing-outlook-dubai-2015/52448832 ShahSheikh@slideshare.net(ShahSheikh) DTS Solution - Outsourcing Outlook Dubai 2015 ShahSheikh Shah Sheikh presents @ Outsourcing Outlook 2015 – Dubai Outsource Zone / TECOM <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dtsoutsourceoutlook-150905112854-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Shah Sheikh presents @ Outsourcing Outlook 2015 – Dubai Outsource Zone / TECOM
DTS Solution - Outsourcing Outlook Dubai 2015 from Shah Sheikh
]]>
1120 10 https://cdn.slidesharecdn.com/ss_thumbnails/dtsoutsourceoutlook-150905112854-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution /slideshow/gisec-2015-your-network-in-the-eyes-of-a-hacker-dts-solution/52423482 gisecyournetworkintheeyesofahackerv1-150904135511-lva1-app6892
Mohamed Bedewi, Offense Security Division Head and Sr. Penetration Testing Consultant at DTS presented also during one of the security sessions titled - "Your Network in the Eyes of a Hacker – The 0ff3ns!v3 Version" which raised a few eyebrows to say the least. The presentation slides can be found here….]]>

Mohamed Bedewi, Offense Security Division Head and Sr. Penetration Testing Consultant at DTS presented also during one of the security sessions titled - "Your Network in the Eyes of a Hacker – The 0ff3ns!v3 Version" which raised a few eyebrows to say the least. The presentation slides can be found here….]]>
Fri, 04 Sep 2015 13:55:11 GMT /slideshow/gisec-2015-your-network-in-the-eyes-of-a-hacker-dts-solution/52423482 ShahSheikh@slideshare.net(ShahSheikh) GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution ShahSheikh Mohamed Bedewi, Offense Security Division Head and Sr. Penetration Testing Consultant at DTS presented also during one of the security sessions titled - "Your Network in the Eyes of a Hacker – The 0ff3ns!v3 Version" which raised a few eyebrows to say the least. The presentation slides can be found here…. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/gisecyournetworkintheeyesofahackerv1-150904135511-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Mohamed Bedewi, Offense Security Division Head and Sr. Penetration Testing Consultant at DTS presented also during one of the security sessions titled - &quot;Your Network in the Eyes of a Hacker – The 0ff3ns!v3 Version&quot; which raised a few eyebrows to say the least. The presentation slides can be found here….
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution from Shah Sheikh
]]>
1211 19 https://cdn.slidesharecdn.com/ss_thumbnails/gisecyournetworkintheeyesofahackerv1-150904135511-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a Penetration Tester /slideshow/dts-solution-isaca-uae-chapter-isafe-2014-ru-pwned-living-a-life-as-a-penetration-tester/42273646 dtsisacaisafe2014v1-141202132044-conversion-gate02
DTS Solution - ISACA UAE Chapter - ISAFE 2014 Event - RU PWNED - Living a Life as a Penetration Tester]]>

DTS Solution - ISACA UAE Chapter - ISAFE 2014 Event - RU PWNED - Living a Life as a Penetration Tester]]>
Tue, 02 Dec 2014 13:20:44 GMT /slideshow/dts-solution-isaca-uae-chapter-isafe-2014-ru-pwned-living-a-life-as-a-penetration-tester/42273646 ShahSheikh@slideshare.net(ShahSheikh) DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a Penetration Tester ShahSheikh DTS Solution - ISACA UAE Chapter - ISAFE 2014 Event - RU PWNED - Living a Life as a Penetration Tester <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dtsisacaisafe2014v1-141202132044-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DTS Solution - ISACA UAE Chapter - ISAFE 2014 Event - RU PWNED - Living a Life as a Penetration Tester
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a Penetration Tester from Shah Sheikh
]]>
2569 15 https://cdn.slidesharecdn.com/ss_thumbnails/dtsisacaisafe2014v1-141202132044-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DTS Solution - Wireless Security Protocols / PenTesting /slideshow/dts-solution-wireless-security-protocols/42262607 dtssolution-wirelesssecurityprotocols-141202091134-conversion-gate02
DTS Solution presents wireless security protocols and attack vectors to break into the wireless security protocols.]]>

DTS Solution presents wireless security protocols and attack vectors to break into the wireless security protocols.]]>
Tue, 02 Dec 2014 09:11:34 GMT /slideshow/dts-solution-wireless-security-protocols/42262607 ShahSheikh@slideshare.net(ShahSheikh) DTS Solution - Wireless Security Protocols / PenTesting ShahSheikh DTS Solution presents wireless security protocols and attack vectors to break into the wireless security protocols. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dtssolution-wirelesssecurityprotocols-141202091134-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DTS Solution presents wireless security protocols and attack vectors to break into the wireless security protocols.
DTS Solution - Wireless Security Protocols / PenTesting from Shah Sheikh
]]>
2814 5 https://cdn.slidesharecdn.com/ss_thumbnails/dtssolution-wirelesssecurityprotocols-141202091134-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Call.... /slideshow/national-oil-company-conference-2014-evolving-cyber-security-a-wake-up-call/35427340 nationaloilcompaniesconference2014-cybersecurity-140603065035-phpapp01
Shah Sheikh - Presentation at the National Oil Conference 2014 in Dubai organized by Marsh. Evolving Cyber Security - A Wake Up Call.....]]>

Shah Sheikh - Presentation at the National Oil Conference 2014 in Dubai organized by Marsh. Evolving Cyber Security - A Wake Up Call.....]]>
Tue, 03 Jun 2014 06:50:34 GMT /slideshow/national-oil-company-conference-2014-evolving-cyber-security-a-wake-up-call/35427340 ShahSheikh@slideshare.net(ShahSheikh) National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Call.... ShahSheikh Shah Sheikh - Presentation at the National Oil Conference 2014 in Dubai organized by Marsh. Evolving Cyber Security - A Wake Up Call..... <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nationaloilcompaniesconference2014-cybersecurity-140603065035-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Shah Sheikh - Presentation at the National Oil Conference 2014 in Dubai organized by Marsh. Evolving Cyber Security - A Wake Up Call.....
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Call.... from Shah Sheikh
]]>
6598 8 https://cdn.slidesharecdn.com/ss_thumbnails/nationaloilcompaniesconference2014-cybersecurity-140603065035-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh /slideshow/isaca-journal-publication-does-your-cloud-have-a-secure-lining/34305995 onlinedoesyourcloudhaveasecurelining-shahsheikh-140505152159-phpapp01
ISACA Journal Publication Volume 5 written by Shah Sheikh - published in Q4 2013. Based on the Cloud Security Alliance Framework whitepaper titled "Does your Cloud have a Secure Lining?"]]>

ISACA Journal Publication Volume 5 written by Shah Sheikh - published in Q4 2013. Based on the Cloud Security Alliance Framework whitepaper titled "Does your Cloud have a Secure Lining?"]]>
Mon, 05 May 2014 15:21:59 GMT /slideshow/isaca-journal-publication-does-your-cloud-have-a-secure-lining/34305995 ShahSheikh@slideshare.net(ShahSheikh) ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh ShahSheikh ISACA Journal Publication Volume 5 written by Shah Sheikh - published in Q4 2013. Based on the Cloud Security Alliance Framework whitepaper titled "Does your Cloud have a Secure Lining?" <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/onlinedoesyourcloudhaveasecurelining-shahsheikh-140505152159-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ISACA Journal Publication Volume 5 written by Shah Sheikh - published in Q4 2013. Based on the Cloud Security Alliance Framework whitepaper titled &quot;Does your Cloud have a Secure Lining?&quot;
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh from Shah Sheikh
]]>
824 4 https://cdn.slidesharecdn.com/ss_thumbnails/onlinedoesyourcloudhaveasecurelining-shahsheikh-140505152159-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-ShahSheikh-48x48.jpg?cb=1621313509 SR. CYBERSECURITY CONSULTANT & ADVISOR / CO-FOUNDER MEng CISSP CISA CISM CRISC CCSK CPSA (CREST UK) GICSP Certified SCADA Security Architect HiSP ToSP www.dts-solution.com https://cdn.slidesharecdn.com/ss_thumbnails/isaca2019ammanchaptershahsheikhcyberresilience-191107181154-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/isaca-2019-amman-chapter-shah-sheikh-cyber-resilience/191422818 ISACA 2019 Amman Chapt... https://cdn.slidesharecdn.com/ss_thumbnails/dtscorporatepresentation-190506192128-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/dts-solution-company-presentation-144003443/144003443 DTS Solution - Company... https://cdn.slidesharecdn.com/ss_thumbnails/hpsecurityevent-190506190240-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cyber-security-101-back-to-basics-hp-secure-print-event-2018/143999401 Cyber Security 101 - B...