تحت رعاية معالي وزيرة الإتصالات وتكنولوجيا المعلومات السيدة مجد شويكة

About

The Forum aims to provide an occasion and platform for information & knowledge sharing, as well as cooperation between Law Enforcement Authorities in Jordan and the Middle East, and experts from academia and the public-private sector. Identify emerging technologies; engage in lively debate on current issues, network with your peers from different institutions across the Middle East countries. View the latest offerings from the industry's top training & solution providers and live demos.

Companies, organizations and individuals alike are increasingly dependent on digital information. Only when lost or stolen, the value of these data is fully grasped. This goes for the company losing millions of dollars due to a theft of its intellectual property, the individual seeing his or her personal pictures illegally scattered across the Web, as well as the critical infrastructure having the provision of its services interrupted. While our clouds grow ever fatter with sensitive data, highly skilled criminals show increasing proficiency in getting around the virtual fences and safeguards that keep these clouds afloat. With our digital assets continuously under threat, only a solid level of preparation can provide the armor needed so badly.

A multi-disciplinary and holistic approach allows us to achieve an adequate level of readiness, ensuring security throughout the whole information chain. At the same time, the systems need to be prepared to deal with possible breaches and attacks. Such an approach involves the optimization of system resilience as well as the ability to capture the indicators needed to detect incidents and identify perpetrators. An increased level of overall readiness, combined with technological innovation and a clear and coherent legal framework, will help strengthen the capabilities of our organizations and law enforcement, undoubtedly a key component in the overall (digital) security of society.

Objectives

JCSFF-2016 will present the latest developments and thoughts in the field of Cyber Security and Cyber Forensics and will be a unique gathering of cyber Security & Forensics experts from Jordan, Middle East and all over the world. The objective of the conference is to present the challenges, visions and strategies, state-of-the art and perspectives in the area of information and network security, cyber risk management as well as cyber forensics to a wider audience from public (governmental) and private (Banking and ISP’s) sector as well as academia. High ranking government officials, military professionals, GM’s, CISO’s, CEO’s, experts from the police departments, Cybercrime Centers and magistrates from Jordan and every Middle East countries have been invited. Many more professionals dealing with the topic are expected in Amman, which will account for a fruitful exchange of knowledge and expertise. Many more professionals dealing with the topic are expected in Amman, which will account for a fruitful exchange of knowledge and expertise.

The JCSFF-2016 presents several high level international key note speakers, including Chuck Easattom and Joe Megnano. The forum will have sessions run in two domains. The first domain is mainly addressing Cyber Security. Topics range from national and international governmental strategies, company and organizational strategies on cyber security readiness, PCI-DSS implementation and compliance, Cloud secure solutions, Telecommunication attacks and fraud, DDoS protections. The goal is to discuss and inform on practical organizational methods to secure an organization and deal efficiently with cybercrime.

Sessions will be organized in a second domain for experts dealing with combatting, investigating and detecting Cybercrimes and forensically analyzing cyber-attacks. They will be updated on the recent evolutions and available tools for digital forensics, online investigations and cyber intelligence and will be presented with real live cases.

Organizers

Precise Thinking TCT

Precise Thinking TCT

Forum Technical owner
www.tfkeir.com

Speakers

Mr. Chuck Easttom

Mr. Chuck Easttom

Chuck Easttom has been in the IT industry for over 25 years and training for over 15. He has 2 master’s degrees and holds 40 industry certifications. He is the author of 20 computer science books and inventor with 7 patented inventions. He is the Chair of the Board of Information Security and Computer Forensics for the American College of Forensic Examiners and a Diplomat of the American College of Forensic Examiners. He travels around the world teaching computer security and speaking on security related topics. He has conducted compute security training for, a wide range of law enforcement officers, various companies, and a variety of government agencies from around the world.

Agenda

This will be a talk and demonstration of recent zero day attacks as well as how they are developed and used. It will focus on the techniques that allow hackers to find zero day exploits and then use them.

Download Files:
Windows Registry Forensics
Zero Day Exploits
Zero Day Forensics

Back
Mr. Joe Mignano

Mr. Joe Mignano

Joe Mignano leads the Channels division at Logical Operations. In this role, Joe is responsible for bringing Logical Operations certifications to market, working with industry leaders to recognize Logical Operations certifications, and managing the implementation of various strategic partnerships and projects.

Agenda

As we frantically prepare Cyber Professionals to fill the considerable skills gap we have focused on discrete skills such as pen testing, ethical hacking, and forensics. What we have neglected is developing a complete Cyber Professional and worse yet have done very little to prepare IT Professionals who are typically the first level of defence after end-users.
In this session, we will share how it is necessary to take a holistic approach to prepare both Cyber and IT Professionals to analyse threats, secure networks, handle incidents, and utilize other critical security skills to protect your organization. As cyber security moves from a back-office to boardroom concern your role as a Cyber, IT or L&D leader selecting the right training solutions for your Cyber and IT Professionals is becoming more difficult and imperative at the same time. This session will assist you to work through the tangled mass of offerings and prepare your Cyber First Responders to better secure and respond to cyber incidents.

Download Files:
Developing Cyber First Responder

Back
Dr. Nidhal Al-Omari

Dr. Nidhal Al-Omari

Dr. Nidhal is an Assistant Professor at the World Islamic Sciences & Education University (WISE) since 2009 with 29 years of experience in software industry, including more than 12 years in teaching university courses. for various computer science topics such as: object oriented languages, algorithms, requirements engineering, advanced database management, operations research, and digital logic. He also have more than 23 publications on various computer science topics and worked as a Computer Science lecturer, project manager, team leader, IT consultant and developer. Domain experience in multiple software industries including Healthcare software, Inventory Management systems, Point of Sale systems, and various types of insurance systems. Managed multiple projects through the full development life cycle from inception all the way to deployment. Had the opportunity to work on multiple large scale projects such as a full hospital management system for Jordanian Royal Medical Services (Medical City)

Agenda

Today, Java is embedded in more than 3 billion devices such as laptops, data centers, game consoles, super computers, mobile phones, smart cards, and many more. Java is widely adopted because of its platform and architecture independent characteristics that encourage developers and industry alike.
This speech covers Java security features, policies, strengths, and weaknesses. It helps developers understand how to write secure and robust Java applications and provides advanced knowledge in various aspects of secure Java development that can effectively prevent hostile and buggy code. The benefits of secure Java coding practices include saving valuable effort, money, time, and possibly the reputation of organizations using securely coded Java applications.

Download Files:
MoreSecureJavaCode_Orginal_new

Back
Eng. Dema Zaidan

Eng. Dema Zaidan

Eng. Dema holds a Master in Computer & Network Engineering and B.Sc. degree in Computer Engineering degree from the university of Jordan. Currently; she is a Teacher Assistant and Lab Engineer at Al-Zaytoonah University. In the past, Dema was a C sharp & SQL server developer at Sambet – Jordan.
Dema was awarded the second place in Queen Rania National Entrepreneurship Competition (QRNEC) in 2014, she is also a co-author for a journal paper and IEEE member.

Agenda
Mr. Malek Alzweiri

Mr. Malek Alzweiri

Malek A. Al-Zewairi received his Bachelor of Science degree in Computer Information Systems form University of Jordan in 2011. He earned his Master of Science degree in Information Systems Security and Digital Criminology from Princess Sumaya University for Technology in 2014 and he graduated top of his class. While pursuing his master degree, Malek worked full time as Security and Risk Administrator at Orange (Jordan Telecom Group) for two years. He is currently the Head of Information Security Section at the University of Jordan. His research interests are in the areas of Information Security and Privacy in general, Smart Cards/RFID Security Systems, and Cyber Threat Intelligence.

Agenda

Cloud Security & Attack
Cloud Computing has immensely shifted the Information Technology industry during the past decade. It helped both big enterprises and Small and Medium-sized Business (SMBs) alike to operate complex, reliable and highly scalable IT environment with ease at minimal fiscal and operational cost. As with any other paradigm shifting technology, cloud computing profoundly affected the security landscape, but not for the bad, per se. With new threats, security concerns and vulnerabilities emerging with the ever-growing adoption of cloud computing, security specialists were forced to rethink the way they “do” security in order to cope with cloud paradigm. In this speech, the presenter will briefly introduce cloud computing, its origin, service and deployment models. Then, discusses the top security threats facing cloud computing today. Finally, live demo of some cloud solutions will be presented.

Download Files:
Cloud Security

Back
Mr. Nazeeh Khlaifat

Mr. Nazeeh Khlaifat

Nazeih holds a B.A in computer science and master degree in business administrations with 15 years of forensic laboratories and cyber-crimes investigator experience.
He was chief of cyber-crimes section 2002-2009
Who established the cyber-crimes section including forensic equipment and software and training.
He also drafted the first copy of the Jordanian information technology crimes law in 2005 and drafted the first and second copy of Arab Information Technology Crimes Agreement in 2004 & 2007, participated in the investigation of thousands of cyber-crimes cases.
Nazeih served as the Chief of finger print section in 2010-2013 as well as a Handwriting and Counterfeit Expert.

Agenda

The paper will cover Introduction to cyber-crimes, capacity, types, components and the motives of cyber-crimes as well as a summary of the recent ones. The investigation process and the different software tools used in the investigation of cyber-crimes will be discussed. The analysis of credit cards fraud case study will be presented with highlights on the investigation process, tracing the evidence and collection.

Download Files:
Arab Electronic Cyber Crime Legistlations
CYBER CRIMES INVESTIGATION

Back
Mr. Hikmat Kanaan

Mr. Hikmat Kanaan

Expert in Azure, EMS and Office 365 Expert deployed multiple Solution and Provide Training across the Globe on MS technologies. Working with MS technologies since 1993, designing and implementing Windows NT 4 and then AD domains and forest, included support for Multi branch/multi location enterprise networks, building Cisco networks and designing security solutions. In addition to designing, implementing and support various installation of MS exchange server 5.5/2000/2003/2007 and Microsoft ISA/TMG servers. Awarded Microsoft MVP award for 2009/2010 in Directory Services. Certified since 1997 holding MCSA, MCSE, MCITP, MCT , ITIL , CCDA ,and CCNP;

Agenda

Using Cloud services is becoming a very hot topic within the few years since it overs agility, scalability and High availability for critical business application. The Cloud can host LOB Application or SaaS application for different vendors. Microsoft is a leading Cloud provider that has different Cloud solutions such as SaaS/PaaS/IaaS that provide many advantages over on premise solutions, in this session we will be discussing the security measures provided by lead vendors such as Microsoft for their Cloud based solutions.

Download Files:
Microsoft Cloud Security

Back
Mr. Ghassan Nawaf AbuShihab

Mr. Ghassan Nawaf AbuShihab

Mr. Ghassan holds a Computer Science BSc. Degree from the University of Jordan and currently working as an ITIL Expert/ Asst. Executive Manager- Payment Systems Oversight at the Central Bank of Jordan for the last 20 years.
In the past he held many positions at the Payments Systems & Domestic Banking Operations Dept., Jo-National Payment Council-working group and Asst. Executive Manager- Payment Systems Oversight. He has been an expert in the domain of PCI-DDS implementation, audit and certification.

Agenda
Asma Salem

Asma Salem

Asma holds a Master Degree in Computer Engineering and Networks from the University of Jordan. She is working as Senior Infrastructure Microsoft System Engineer at NITC. In the past she held many positions such as Web & Data Base Administrator, who was responsible for the Servers & systems Security.

Agenda

Moderators

Mahmoud Kamel

Mahmoud is a BSc. graduate of Computer Information Systems and currently holds the position of Operations Manager at Precise Thinking TCT in Amman. With more than 15 years of experience in IT and Information Security fields; Mahmoud is professional in managing many information security & forensics training and consulting projects in the region who maintains many industrial certifications such as: E|CIH, SCADA, CCTV and Network+.


Agenda

Under the patronage of her excellency the Minister of Information & Communications Technology - Jordan (18-19 Oct. 2016)
08:30 – 09:00 AM Registration and Breakfast
09:00 to 10:30 AM


10:30 to 10:45
Mr. Chuck Easttom
Analysis of Zero Day Exploits

Coffee break
10:45 – 11:45 AM


11:45 – 12:00 PM
Mr. Joe Mignano
Developing Cyber First Responders

Coffee break
Coffee break
02:00 – 02:45 PM


02:45 – 03:30 PM


03:30 – 03:45 PM
Mr. Malek Alzwairi
Cloud Security & Attack

Mr. Hikmat Kanaan
Microsoft Secured Cloud Solutions

Coffee break
03:45 – 04:30 PM


04:30 – 05:00 PM
Mr. Nazieh Khlaifat
Cyber Crimes Investigation - Credit Card fraud case study

Panel discussions and questions


Tuesday 18th of October, 2016
09:00 – 10:30 AM


10:30 – 10:45 AM
Mr. Chuck Easttom
Forensic Techniques to detect Zero Day Exploits

Coffee break
10:45 – 11:45 AM


11:45 – 12:00 AM

12:00 – 01:00 PM


01:00 – 02:00 PM
Mr. Ghassan Abu Shahab
PCI-DSS, implementation & audit

Coffee break

Eng. Dema Zaidan
Distributed Denial of Service (DDoS ) Attacks Protection Measures

Networking lunch and salah
02:00 – 02:45 PM


02:45 – 03:30 PM


03:30 – 03:45 PM
Asma Salem
Hacking Internet of Things (IoT) demo

Dr. Nidhal Al-Omari
Secure Coding in Java

Coffee break
03:45 – 04:30 PM Nazieh Khlaifat
Arab Electronic Crimes Legislations
04:30 – 05:00 PM Panel discussions and questions

Location

  • Venue: Holiday Inn (5-star Hotel)
  • Accommodation
  • Travel Information

Mahmoud Kamel, Operations Manager
C|IH, Network+, CCTV & SCADA
Precise Thinking TCT

 Site : www.tfkeir.com
 Email: mkamel@tfkeir.com

 Cell: +962 79154 8440
 Cell: +962 77224 6640