DARK STAGE

   

DARK STAGE

   

1-featuredimage

After an overwhelmingly success debut, the GISEC Dark Stage returns again to delve into the darkest pits of the dark web and will feature some of the most exciting and compelling live hacks covering the most controversial and cutting edge topics.

Loading
11:00
  1. 10 mins
    • Dark Stage
11:10
  1. 20 mins
    • Dark Stage
    After gaining a foothold within any of the vehicle's systems, a malicious exploit will look for ways to locate and attack its target which can be exfiltration of data or interference with the performa ...
11:30
  1. 30 mins
    • Dark Stage
    Although it is very hard to hack into a Secure Element directly and steal a cryptographic seed, it’s relatively easy to compromise a general purpose microcontroller and thereby deceive a hardware wall ...
12:00
  1. 30 mins
    • Dark Stage
    The battle between the CIO and CISO and the checks and balances they hold over each other is fast becoming superseded by the need to secure data at source and augment the role of tomorrow’s CIO to inc ...
12:30
  1. 60 mins
    • Dark Stage
13:30
  1. 40 mins
    • Dark Stage
    Cybercriminals employ numerous means to beat biometric authentication measures. One method is spoofing, the industry term for faking biometric identifiers to impersonate legitimate users and gain acce ...
14:10
  1. 30 mins
    • Dark Stage
    From SQL Injections to plain security misconfigurations, website vulnerabilities can be more than a problem for your shop window and an fast become an entry point to internal data. We will explore a c ...
14:40
  1. 30 mins
    • Dark Stage
    There is still a lot of confusion within the public and the media regarding what truly is artificial intelligence (AI), and what truly is machine learning (ML). Often the terms are being used intercha ...
16:10
  1. 5 mins
    • Dark Stage
11:00
  1. 30 mins
    • Dark Stage
    Demonstrating the Power of Gameified Story-Based training to develop your staff instead of tick-box exercises which will be forgotten in weeks
11:30
  1. 30 mins
    • Dark Stage
    Enabling drones to identify people on the ground is important for a variety of applications, such as surveillance, people search, and remote monitoring. Since faces are part of inherent identities of ...
12:00
  1. 30 mins
    • Dark Stage
    From Reconnaissance to Extraction; demonstrating the verbal NLP skills involved in social engineering to make pentesting more successful and realistic. Using social validation, expectations, associati ...
12:30
  1. 60 mins
    • Dark Stage
13:30
  1. 40 mins
    • Dark Stage
    Thinking like a black hat hacker, complete with damaging goals and devious skills and behaviors to balance intelligence and common sense, develop strong technical and organizational skills, impeccable ...
14:10
  1. 30 mins
    • Dark Stage
    Poor container maintenance can expose IT environments to a higher risk of penetration  and unverified container images can be an invitation to malicious actors. Understanding the importance of integra ...
14:40
  1. 30 mins
    • Dark Stage
    From Wifi-Eavesdropping to Session Hijacking; Demonstrating Unexpected Threats to Your Online Services Which Don’t Require Dual-Factor Authentication
15:10
  1. 40 mins
    • Dark Stage
    From Van Eck Phreaking to Faxploits– What Old-School Attacks Should you Still be Worried About?
15:50
  1. 5 mins
    • Dark Stage

Featured Speakers at GISEC

LEARN FROM THE BEST MINDS IN CYBER SECURITY AND TECHNOLOGY

KEY REASONS TO ATTEND

Award winning CISOs

Learn from Global CISOs setting trends at some of the world’s most iconic companies

Major security agencies

Get intelligence briefings on new threats from major international security agencies

Network with 1,000

+ delegates

Enhance your network, meeting with over 1,000+ fellow delegates; making it the largest cyber security and tech conference in MEASA.

Meet 8,500+ InfoSec professionals

Participate in the largest cyber security and IoT event, where over 8,500 of the region’s InfoSec community converge to source new products and stay up to date with the latest developments.

5-featuredimage

ATTENDEES

100+ CIO/CISO/VP of top companies like Telefonica, Saudi Ports, IKEA Group, Amazon Pay India, DHL Express, Dubai Health Authority, Habib Bank Ag, Juma Al Majid Group, Al Maskari Holding, Bank of Jordan, General Motors MENA, Dubai Customs, General Electric MENA, Union National Bank, Majid Al Futtaim Retail – Carrefour, Lulu Group International and many more.

PASSES & PRICING

  • “GISEC is one of the most fantastic, rich, worldwide cybersecurity event, trying to understand revolutionary technology and how it might change the word. It brilliantly illuminates and emphasizes the threats that could profoundly impact the way we handle emerging technology.”
    Dr. Mohamed Benaichouche
    CIO, ARABSAT
  • “This event stood out because of the quality of the network they brought together and the diversity of perspective.”
    Marloes Pomp
    Program Officer, Dutch Government
  • “This year’s event brought a fresh new approach and provided network and security professionals a great opportunity to learn, meet solutions providers and network!”
    Tariq Valani
    Vice President - IT Infrastructure & Operations, Mövenpick Hotels and Resorts Management

Supporters & Partners

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

Dubai Electronic Security Center Logo

dp

OFFICIAL DISTRIBUTION PARTNER

ISPIRE

OFFICIALLY SUPPORTED BY

Telecommunications Regulatory Authority

Official Smart City Partner

Strategic Sponsors & Partners

Strategic Partner

Bluvector_gisec

Strategic Partner

cb

Official Digital Partner

etisalat_gisec

Strategic Partner

  • Recorded-Future---strategic-partner

Platinum & Diamond sponsors

Platinum Sponsor

pp

Diamond Sponsor

fe

Diamond Sponsor

Attivo Networks - GISEC

Silver sponsors

webroot-gisec

RAS-Infotech-GISEC

Industry & Association Partner

Germany Association Partner

TeleTrusT

India Pavilion Partner

Logo

Association Partner

Logo

Exhibitors

VIEW MORE EXHIBITORS
 

Media Partners