SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Cybercrime Challenges
in the Middle East

Special insights from: Mohamed N. El-Guindy, Information Systems Security Association,
Egypt Chapter, Founder and President
Introduction
Advanced communication technologies open the
door to advancement of humanity and crimes as
well. But Legislation and legislators are always
slower than the development of ICTs leaving our
region vulnerable to all types of cyber attacks and
will make cybercrime laws difficult to enforce.
The latest incidents in the region from Stuxnet to
Saudi Aramco attack prove without a doubt that we
are now part of global cyber conflicts.
In this analysis, I will introduce the challenges that
face both legislators and law enforcements in the
region when dealing with cybercrime phenomenon.

1st Challenge – Responsibility
In Middle East countries there is big dilemma
when it comes to cyberspace related laws. When I
investigated available cybercrime legislation in the
region1, I found that there is no one responsible
government department for drafting or dealing with
cyber laws. Many government agencies might be
involved in cyber related laws such as “E-signature,
E-commerce, domain name registration, copyright
and IP, cybercrime, cyber espionage, and cyber
terrorism”. To discuss such laws I can notice
the involvement of more than one government
departments for example “Ministry of Trade,
Ministry of ICT, Ministry of Interior, Central Bank,
Ministry of Justice, and even Intelligence and
Defence departments”.

CY B E R CR IM E C H AL L E N G E S IN T H E M ID D LE EAS T

The problem that any of the above authorities could
claim responsibility of such laws and that will be
big challenge for Middle East governments when
drafting cybercrime law. It’s important to establish
dedicated government department to deal with
cyber laws. The UAE for example appointed special
courts for cybercrime cases.

2nd Challenge – Legislative
Capabilities
Legislation is part of anti-cybercrime strategy
and not the entire solution. The problem is, when
legislators deal with cybercrime issues they will try
to apply normal jurisdictional measures that might
include civil law, criminal law, and regulatory law.
It might work in few cases but will not work in all
cybercrime cases especially crimes that depend on
the Internet. Cyber legislation or related laws are
poor or absent in the region according to my latest
findings. Even current cybercrime laws couldn’t
be considered complete and reliable to tackle
cybercrime especially at prosecution stage which is
considered one of the most complicated steps.
1010101010101010101010101
01010101010101010101010
1010101010101

Evolve and adapt in SCADA, DCS and ICS security

Boo
k an
p
9 Fe ay bef d
o
bru
ary re
to s
20
ave
US$ up to 14

Evolve and adapt in SCADA, DCS and ICS security

23 - 26 March 2014
The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, UAE

650
!

Evolve and adapt in SCADA, DCS and ICS security

23 - 26 March 2014
“Free golf training session
The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, UAE
for the first 30 registered
Benefits of attending
attendees!”

Celebrity speakers:
23 - 26 March 2014
The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, UAE
Bill Cheswick

Celebrity speakers: Creator of the world’s first

network firewall & Author of

Bill Cheswick
Bill Cheswick
Don Codling, Former Cyber
Don Codling, Former Cyber
“Firewalls and Internet Security: Chief, FBI,
Creator of the world’s first
Creator of the world’s first
Security Unit Chief, FBI,
Security Unit
network firewall Repelling the Wily Hacker” States
network firewall & Author of
& Author of
United States
United
“Firewalls and Internet Security:
“Firewalls and Internet Security:
Repelling the Wily Hacker”
Repelling the Wily Hacker”

VIP Keynote speakers:
VIP Keynote

speakers:

Lt. Col. Faisal Mohamed Al
Lt. Col. Faisal Mohamed Al
Dr. Jamal Mohamed Al Hosani
Dr. Jamal Mohamed Al Hosani
Shamari, Chief Information
Shamari, Chief Information
Official Spokesman & Director
Official Spokesman & Director
Security Officer, Abu Dhabi
Security Officer, Abu Dhabi
ICT, National Emergency Crisis Mohamed Al Hosani
ICT, National Emergency Crisis
Dr. Jamal
Police GHQ, UAE
Police GHQ, UAE
& Disaster Management
& Disaster Management
Authority, UAE Official Spokesman & Director
Authority, UAE

ICT, National Emergency Crisis

& Disaster
Exclusive presentations from: Management
Authority, UAE

Mohamed Al Sawafi, Head of IT Services, GASCO, UAE
Mohamed Al Sawafi, Head of IT Services, GASCO, UAE
Reimer Brouwer, Head of IT Security, ADCO, UAE
Reimer Brouwer, Head of IT Security, ADCO, UAE
Mohammed Ikrami, IT Security Officer, Fertil, UAE
Mohammed Ikrami, IT Security Officer, Fertil, UAE
Andrey Zolotavin, Senior Real Time Systems Engineer, KOC, Kuwait
Andrey Zolotavin, Senior Real Time Systems Engineer, KOC, Kuwait
Habeebu Rehman, Sr. Supervisor IT Security, Petrorabigh, Saudi Arabia
Habeebu Rehman, Sr. Supervisor IT Security, Petrorabigh, Saudi Arabia
Abdullah Al-Akhawand, Sr. IT Engineer, KGOC, Kuwait
Abdullah Al-Akhawand, Sr. IT Engineer, KGOC, Kuwait
Moazzem Hossain, Operations Planning and Studies Department Manager, ADDC, UAE
Moazzem Hossain, Operations Planning and Studies Department Manager, ADDC, UAE
Mohamed Al Sawafi, Head of IT Services, GASCO, UAE
Mahmoud Yassin, Lead Systems and Security Data Center Group, NBAD, UAE,
Mahmoud Yassin, Lead Systems and Security Data Center Group, NBAD, UAE,
Ali Rebaei, World’s Top 51 Big Data Influencer, Expert and Consultant, UAE
Ali Rebaei, World’s Top 51 Big Data Influencer, Expert and Consultant, UAE
Reimer Brouwer, Head of IT Security, ADCO, UAE
Gilles Loridon, CEO, Global Security Networks, UAE
Gilles Loridon, CEO, Global Security Networks, UAE

Exclusive presentations from:

Don Codling, Former Cyber
Security Unit Chief, FBI,
United States

Identify emerging cyber threats
Understand the need to protect
Identify emerging cyber threats and evolving landscape in the energy and utilities industries
Identify emerging cyber threats and evolving landscape in the energy and utilities industries
Determine best security practice
Understand the need to protect critical infrastructure and its impact on energy economics
Understand the need to protect critical infrastructure and its impact on energy economics
Determine best security practices for ICS/SCADA systems
Determine best security practices for ICS/SCADA systems
Learn to protect real time system
Learn to protect real time systems from cyber attacks
Learn to protect real time systems from cyber attacks
Know how to protect cloud comp
Know how to protect cloud computing networks
Know how to protect cloud computing networks
Tackle backdoor interface vulnerabilities in SCADA systems
Tackle backdoor interface vulnerabilities in SCADA systems
Tackle backdoor interface vulner
Understand cyber defence strategies and their subsequent implementation
Understand cyber defence strategies and their subsequent implementation
Interact and network with industry experts from leading national and Understand cyber defence strate
Interact and network with industry experts from leading national and international oil
international oil
companies, IT security solution providers, as well as banks, power and telecom companies
companies, IT security solution providers, as well as banks, power and telecom companies
Interact and network with indust
Lt. Col. Faisal Mohamed Al
Associate sponsors:
Associate sponsors:
Exhibitor:
Exhibitor:
companies, IT security solution p
Shamari, Chief Information
Security Officer, Abu Dhabi
Police GHQ, UAE
Associate sponsors:
Benefits of attending:

For more information or to
register Tel: +971 4 364 2975
Supported by:
Supported by:

Media partners:
Media partners:

Researched and
Researched and
developed by:
developed by:

Email: enquiry@iqpc.ae
www.cybersecurityme.com

Mohammed Ikrami, IT Security Officer, Fertil, UAE
Andrey Zolotavin, Senior Real Time Systems Engineer, KOC, Kuwait
For more information or to register - Tel: +971 Arabia
Habeebu Rehman, Sr. Supervisor IT Security, Petrorabigh, Saudi 4 364 2975 Fax: +971 4 363 1938
Email: enquiry@iqpc.ae
Abdullah Al-Akhawand, Sr. IT Engineer, KGOC, Kuwait www.cybersecurityme.com
Moazzem Hossain, Operations Planning and Studies Department Manager, ADDC, UAE
CYB NBAD, UAE,
Mahmoud Yassin, Lead Systems and Security Data Center Group, ERCRIME CH ALLEN GES IN T HE MIDDLE EAST
Ali Rebaei, World’s Top 51 Big Data Influencer, Expert and Consultant, UAE
Gilles Loridon, CEO, Global Security Networks, UAE

And many more…
And many more…

And many more…

Med
The following MENA countries have either
dedicated cybercrime law or special system to deal
with cybercrime:
	

UAE: Federal Law No.2 of 2006

	

Saudi Arabia: Cybercrime System (2007)

	

Oman: Cybercrime Law (2011)

	
	

Syria: Cybercrime and Communication on 	
the Internet (2012)

	

Jordan: Cybercrime temporary law (2010)

I suggest that governments learn from Council
of Europe and try to ratify CoE cybercrime treaty.
They don’t need to copy and paste, they need
to understand first then apply the procedures
and draft dedicated cyber laws that meet their
requirements and according to the Universal
Declaration of Human Rights.

3rd Challenge – Technical
Capabilities
From my experience with law enforcement
agencies in the region, I can tell that there is
big dilemma when it comes to the procedural
measures of cybercrime-related investigations.
There is also a problem to maintain the integrity of
the digital evidence during an investigation as it is
always important in a criminal case, but the nature
of the evidence in cybercrime makes that job far
more difficult. Police officers can easily damage
the digital evidence in cybercrime cases by using
normal methods of seizure and arrest.
CY B E R CR IM E C H AL L E N G E S IN T H E M ID D LE EAS T

Law enforcement officers face big challenge before
arresting the suspect, they will need to reveal
where- and who- the criminal is. Since cybercrime
is a transnational crime, the chances of tracking
down suspects could be very hard if not impossible.
However, attempts to better track online identity
raise serious issues for privacy advocates and
result in political backlash which is something
normal in the Middle East. I understand that it will
be big challenge for law enforcement officers as
they might consider activists as cybercriminals
when reporting cybercrime.
I suggest that special procedural measure should
be mentioned in any cyber law especially when
dealing with digital evidence. Law enforcement
should be trained on latest technologies related to
cybercrime investigation.

4th Challenge – Organizational
Structure
One of the big challenges in the region is
overlapping especially when dealing with
cybercrime cases. Cybercrime require highly
developed organizational structures to be in place.
Without clear competences it will be difficult to
carry out complex investigations that require
assistance of different legal as well as technical
experts. In the Middle East there is inconsistency
and lack of collaboration between many actors to
tackle Cybercrime. One of the well-know example
is the collaboration between Computer Emergency
Response Teams (CERTs) and Law Enforcement
Agencies. At present CERTs “if found” and law
enforcement agencies work mainly on their own in
the fight against cybercrime.
Collaboration between different actors should
be addressed in cybercrime legislation in order
to improve organizational structure to combat
cybercrime.

5th Challenge – Education
One of the most important elements in combating
cybercrime is education and awareness.
Unfortunately there is no effective strategy or
plan to improve capacity building and security
education in the region. There are few awareness
campaigns in Oman, Saudi Arabia, Qatar and UAE.
Cybercrime legislation is not the only solution to
fight cybercrime. It is part of bigger cyber security
strategy which also requires improved education
and awareness campaigns.
Governments should improve their capacity
building and education of their employees and
citizens to better tackle cybercrime.

		Source:
		
Mohamed N. El-Guindy
		
Information Systems Security 	
		
Association, Egypt Chapter, 	
		
Founder and President
		http://netsafe.me/
		

Mohamed is a well-known Cybercrime Expert in the
Middle East and works as a consultant for national
and international organizations. He is the CEO of
ASK PC Academy also serving as the president for
ISSA (Egypt chapter). He is an IT specialist with a
broad experience, worked in the field of Information
Technology for over a decade.
Mohamed is a Technical Speaker in International
events and workshops related to Cybercrime
and Information Security. He is the author of
various IT and Security courses in both Arabic
and English which approved by IEEE. Next to this
he is a Member of IEEE, IEEE Computer Society,
Professional Member of the British Computer
Society, Chartered IT Professional from BCS,
BCS Chartered Membership Assessor, Chartered
Engineer (Engineering Council-UK), MCGI Senior
Award holder from City & Guilds of London Institute,
Member of ISSA (Information Systems Security
Association), and other International Engineering
and Technology Associations.
Mohamed is listed in Marquis Who’s Who by
invitation and received many nominations and
awards from big names in the IT industry.

October 13, 2012

CYB ERCRIME CH ALLEN GES IN T HE MIDDLE EAST
Evolve and adapt in SCADA, DCS and ICS security
www.cybersecurityme.com

“
f
a

23 - 26 March 2014
The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, UAE
Celebrity speakers:
Bill Cheswick
Creator of the world’s first
network firewall & Author of
“Firewalls and Internet Security:
Repelling the Wily Hacker”

Benefits of attending:
Don Codling, Former Cyber
Security Unit Chief, FBI,
United States

VIP Keynote speakers:
Dr. Jamal Mohamed Al Hosani
Official Spokesman & Director
ICT, National Emergency Crisis
& Disaster Management
Authority, UAE

Exclusive presentations from:
Mohamed Al Sawafi, Head of IT Services, GASCO, UAE

Lt. Col. Faisal Mohamed Al
Shamari, Chief Information
Security Officer, Abu Dhabi
Police GHQ, UAE

Identify emerging cyber threats and e
Understand the need to protect critic
Determine best security practices for
Learn to protect real time systems fro
Know how to protect cloud computin
Tackle backdoor interface vulnerabilit
Understand cyber defence strategies
Interact and network with industry ex
companies, IT security solution provid
Associate sponsors:

Weitere ähnliche Inhalte

Was ist angesagt?

21st Century Threats and Middle East Dilemma
21st Century Threats and Middle East Dilemma 21st Century Threats and Middle East Dilemma
21st Century Threats and Middle East Dilemma Mohamed N. El-Guindy
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Business Days
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Fakrul Alam
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Business Days
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceDr David Probert
 

Was ist angesagt? (20)

21st Century Threats and Middle East Dilemma
21st Century Threats and Middle East Dilemma 21st Century Threats and Middle East Dilemma
21st Century Threats and Middle East Dilemma
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 

Andere mochten auch

Humantraff
HumantraffHumantraff
Humantraffdwig00
 
Human Trafficking in the Middle East
Human Trafficking in the Middle EastHuman Trafficking in the Middle East
Human Trafficking in the Middle EastBilhami
 
Middle East Punishment Ppt2
Middle East Punishment Ppt2Middle East Punishment Ppt2
Middle East Punishment Ppt2mountianview
 
Could You Get Justice In The Middle Ages
Could You Get Justice In The Middle AgesCould You Get Justice In The Middle Ages
Could You Get Justice In The Middle AgesDHUMPHREYS
 
02. آگهی نامه نمونه - قالب بندی مطالعات و نتایج تحقیق
02. آگهی نامه نمونه - قالب بندی مطالعات و نتایج تحقیق02. آگهی نامه نمونه - قالب بندی مطالعات و نتایج تحقیق
02. آگهی نامه نمونه - قالب بندی مطالعات و نتایج تحقیقShahram Honarmayeh
 
Black & Veatch Energy Market Perspective: 2015 Outlook
Black & Veatch Energy Market Perspective: 2015 OutlookBlack & Veatch Energy Market Perspective: 2015 Outlook
Black & Veatch Energy Market Perspective: 2015 OutlookBlack & Veatch
 
Human Trafficking And Globalization
Human Trafficking And GlobalizationHuman Trafficking And Globalization
Human Trafficking And Globalizationmulvey.laura
 
INTERPOL and Environmental Crimes
INTERPOL and Environmental CrimesINTERPOL and Environmental Crimes
INTERPOL and Environmental CrimesUNEP OzonAction
 
Cobertura de eventos en flimper
Cobertura de eventos en flimperCobertura de eventos en flimper
Cobertura de eventos en flimperFlimper
 
Dirección Estratégica
Dirección Estratégica Dirección Estratégica
Dirección Estratégica Umad
 
The Wordies Awards 2014_ The Top Cafés in Vietnam - Word Vietnam
The Wordies Awards 2014_ The Top Cafés in Vietnam - Word VietnamThe Wordies Awards 2014_ The Top Cafés in Vietnam - Word Vietnam
The Wordies Awards 2014_ The Top Cafés in Vietnam - Word VietnamCHRIS NGO
 
Pan American Development Foundation Haiti..Adarsh Kumar Jain
Pan American Development Foundation Haiti..Adarsh Kumar JainPan American Development Foundation Haiti..Adarsh Kumar Jain
Pan American Development Foundation Haiti..Adarsh Kumar JainAdarsh K. Jain
 
1.la prehistoria y la edad antigua
1.la prehistoria y la edad antigua 1.la prehistoria y la edad antigua
1.la prehistoria y la edad antigua arraldi
 
Comunicado de prensa 1 mayo ok
Comunicado de prensa 1 mayo okComunicado de prensa 1 mayo ok
Comunicado de prensa 1 mayo okMelel Xojobal
 
Risc electric cca
Risc electric ccaRisc electric cca
Risc electric ccaUTTGi
 
Nuevo libro "EXPORTACIÓN 2.0" de Rafa Olano. Entrevista a Luis Galán www.loft...
Nuevo libro "EXPORTACIÓN 2.0" de Rafa Olano. Entrevista a Luis Galán www.loft...Nuevo libro "EXPORTACIÓN 2.0" de Rafa Olano. Entrevista a Luis Galán www.loft...
Nuevo libro "EXPORTACIÓN 2.0" de Rafa Olano. Entrevista a Luis Galán www.loft...Trusted Shops
 
Marketing en la red en bibliotecas (1)
Marketing en la red en bibliotecas (1)Marketing en la red en bibliotecas (1)
Marketing en la red en bibliotecas (1)Ruth Zazo
 

Andere mochten auch (20)

Humantraff
HumantraffHumantraff
Humantraff
 
Human Trafficking in the Middle East
Human Trafficking in the Middle EastHuman Trafficking in the Middle East
Human Trafficking in the Middle East
 
Middle East Punishment Ppt2
Middle East Punishment Ppt2Middle East Punishment Ppt2
Middle East Punishment Ppt2
 
Could You Get Justice In The Middle Ages
Could You Get Justice In The Middle AgesCould You Get Justice In The Middle Ages
Could You Get Justice In The Middle Ages
 
02. آگهی نامه نمونه - قالب بندی مطالعات و نتایج تحقیق
02. آگهی نامه نمونه - قالب بندی مطالعات و نتایج تحقیق02. آگهی نامه نمونه - قالب بندی مطالعات و نتایج تحقیق
02. آگهی نامه نمونه - قالب بندی مطالعات و نتایج تحقیق
 
Black & Veatch Energy Market Perspective: 2015 Outlook
Black & Veatch Energy Market Perspective: 2015 OutlookBlack & Veatch Energy Market Perspective: 2015 Outlook
Black & Veatch Energy Market Perspective: 2015 Outlook
 
Interpol
InterpolInterpol
Interpol
 
Black Market | Eonomics
Black Market | EonomicsBlack Market | Eonomics
Black Market | Eonomics
 
Human Trafficking And Globalization
Human Trafficking And GlobalizationHuman Trafficking And Globalization
Human Trafficking And Globalization
 
INTERPOL and Environmental Crimes
INTERPOL and Environmental CrimesINTERPOL and Environmental Crimes
INTERPOL and Environmental Crimes
 
Cobertura de eventos en flimper
Cobertura de eventos en flimperCobertura de eventos en flimper
Cobertura de eventos en flimper
 
Dirección Estratégica
Dirección Estratégica Dirección Estratégica
Dirección Estratégica
 
The Wordies Awards 2014_ The Top Cafés in Vietnam - Word Vietnam
The Wordies Awards 2014_ The Top Cafés in Vietnam - Word VietnamThe Wordies Awards 2014_ The Top Cafés in Vietnam - Word Vietnam
The Wordies Awards 2014_ The Top Cafés in Vietnam - Word Vietnam
 
Pan American Development Foundation Haiti..Adarsh Kumar Jain
Pan American Development Foundation Haiti..Adarsh Kumar JainPan American Development Foundation Haiti..Adarsh Kumar Jain
Pan American Development Foundation Haiti..Adarsh Kumar Jain
 
1.la prehistoria y la edad antigua
1.la prehistoria y la edad antigua 1.la prehistoria y la edad antigua
1.la prehistoria y la edad antigua
 
Comunicado de prensa 1 mayo ok
Comunicado de prensa 1 mayo okComunicado de prensa 1 mayo ok
Comunicado de prensa 1 mayo ok
 
Risc electric cca
Risc electric ccaRisc electric cca
Risc electric cca
 
Nuevo libro "EXPORTACIÓN 2.0" de Rafa Olano. Entrevista a Luis Galán www.loft...
Nuevo libro "EXPORTACIÓN 2.0" de Rafa Olano. Entrevista a Luis Galán www.loft...Nuevo libro "EXPORTACIÓN 2.0" de Rafa Olano. Entrevista a Luis Galán www.loft...
Nuevo libro "EXPORTACIÓN 2.0" de Rafa Olano. Entrevista a Luis Galán www.loft...
 
Marketing en la red en bibliotecas (1)
Marketing en la red en bibliotecas (1)Marketing en la red en bibliotecas (1)
Marketing en la red en bibliotecas (1)
 
Ficha técnica
Ficha técnicaFicha técnica
Ficha técnica
 

Ähnlich wie Cyber Crime Challenges in the Middle East

SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Complianceijtsrd
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber VulnerableThe eCore Group
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Mohamed N. El-Guindy
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
Cybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesCybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesMohamed Amine Belarbi
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfJayaMalaR6
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....zayadeen2003
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 

Ähnlich wie Cyber Crime Challenges in the Middle East (20)

SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesCybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & Opportunities
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
presCyberNISC2015
presCyberNISC2015presCyberNISC2015
presCyberNISC2015
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 

Kürzlich hochgeladen

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Kürzlich hochgeladen (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Cyber Crime Challenges in the Middle East

  • 1. Cybercrime Challenges in the Middle East Special insights from: Mohamed N. El-Guindy, Information Systems Security Association, Egypt Chapter, Founder and President
  • 2. Introduction Advanced communication technologies open the door to advancement of humanity and crimes as well. But Legislation and legislators are always slower than the development of ICTs leaving our region vulnerable to all types of cyber attacks and will make cybercrime laws difficult to enforce. The latest incidents in the region from Stuxnet to Saudi Aramco attack prove without a doubt that we are now part of global cyber conflicts. In this analysis, I will introduce the challenges that face both legislators and law enforcements in the region when dealing with cybercrime phenomenon. 1st Challenge – Responsibility In Middle East countries there is big dilemma when it comes to cyberspace related laws. When I investigated available cybercrime legislation in the region1, I found that there is no one responsible government department for drafting or dealing with cyber laws. Many government agencies might be involved in cyber related laws such as “E-signature, E-commerce, domain name registration, copyright and IP, cybercrime, cyber espionage, and cyber terrorism”. To discuss such laws I can notice the involvement of more than one government departments for example “Ministry of Trade, Ministry of ICT, Ministry of Interior, Central Bank, Ministry of Justice, and even Intelligence and Defence departments”. CY B E R CR IM E C H AL L E N G E S IN T H E M ID D LE EAS T The problem that any of the above authorities could claim responsibility of such laws and that will be big challenge for Middle East governments when drafting cybercrime law. It’s important to establish dedicated government department to deal with cyber laws. The UAE for example appointed special courts for cybercrime cases. 2nd Challenge – Legislative Capabilities Legislation is part of anti-cybercrime strategy and not the entire solution. The problem is, when legislators deal with cybercrime issues they will try to apply normal jurisdictional measures that might include civil law, criminal law, and regulatory law. It might work in few cases but will not work in all cybercrime cases especially crimes that depend on the Internet. Cyber legislation or related laws are poor or absent in the region according to my latest findings. Even current cybercrime laws couldn’t be considered complete and reliable to tackle cybercrime especially at prosecution stage which is considered one of the most complicated steps.
  • 3. 1010101010101010101010101 01010101010101010101010 1010101010101 Evolve and adapt in SCADA, DCS and ICS security Boo k an p 9 Fe ay bef d o bru ary re to s 20 ave US$ up to 14 Evolve and adapt in SCADA, DCS and ICS security 23 - 26 March 2014 The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, UAE 650 ! Evolve and adapt in SCADA, DCS and ICS security 23 - 26 March 2014 “Free golf training session The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, UAE for the first 30 registered Benefits of attending attendees!” Celebrity speakers: 23 - 26 March 2014 The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, UAE Bill Cheswick Celebrity speakers: Creator of the world’s first network firewall & Author of Bill Cheswick Bill Cheswick Don Codling, Former Cyber Don Codling, Former Cyber “Firewalls and Internet Security: Chief, FBI, Creator of the world’s first Creator of the world’s first Security Unit Chief, FBI, Security Unit network firewall Repelling the Wily Hacker” States network firewall & Author of & Author of United States United “Firewalls and Internet Security: “Firewalls and Internet Security: Repelling the Wily Hacker” Repelling the Wily Hacker” VIP Keynote speakers: VIP Keynote speakers: Lt. Col. Faisal Mohamed Al Lt. Col. Faisal Mohamed Al Dr. Jamal Mohamed Al Hosani Dr. Jamal Mohamed Al Hosani Shamari, Chief Information Shamari, Chief Information Official Spokesman & Director Official Spokesman & Director Security Officer, Abu Dhabi Security Officer, Abu Dhabi ICT, National Emergency Crisis Mohamed Al Hosani ICT, National Emergency Crisis Dr. Jamal Police GHQ, UAE Police GHQ, UAE & Disaster Management & Disaster Management Authority, UAE Official Spokesman & Director Authority, UAE ICT, National Emergency Crisis & Disaster Exclusive presentations from: Management Authority, UAE Mohamed Al Sawafi, Head of IT Services, GASCO, UAE Mohamed Al Sawafi, Head of IT Services, GASCO, UAE Reimer Brouwer, Head of IT Security, ADCO, UAE Reimer Brouwer, Head of IT Security, ADCO, UAE Mohammed Ikrami, IT Security Officer, Fertil, UAE Mohammed Ikrami, IT Security Officer, Fertil, UAE Andrey Zolotavin, Senior Real Time Systems Engineer, KOC, Kuwait Andrey Zolotavin, Senior Real Time Systems Engineer, KOC, Kuwait Habeebu Rehman, Sr. Supervisor IT Security, Petrorabigh, Saudi Arabia Habeebu Rehman, Sr. Supervisor IT Security, Petrorabigh, Saudi Arabia Abdullah Al-Akhawand, Sr. IT Engineer, KGOC, Kuwait Abdullah Al-Akhawand, Sr. IT Engineer, KGOC, Kuwait Moazzem Hossain, Operations Planning and Studies Department Manager, ADDC, UAE Moazzem Hossain, Operations Planning and Studies Department Manager, ADDC, UAE Mohamed Al Sawafi, Head of IT Services, GASCO, UAE Mahmoud Yassin, Lead Systems and Security Data Center Group, NBAD, UAE, Mahmoud Yassin, Lead Systems and Security Data Center Group, NBAD, UAE, Ali Rebaei, World’s Top 51 Big Data Influencer, Expert and Consultant, UAE Ali Rebaei, World’s Top 51 Big Data Influencer, Expert and Consultant, UAE Reimer Brouwer, Head of IT Security, ADCO, UAE Gilles Loridon, CEO, Global Security Networks, UAE Gilles Loridon, CEO, Global Security Networks, UAE Exclusive presentations from: Don Codling, Former Cyber Security Unit Chief, FBI, United States Identify emerging cyber threats Understand the need to protect Identify emerging cyber threats and evolving landscape in the energy and utilities industries Identify emerging cyber threats and evolving landscape in the energy and utilities industries Determine best security practice Understand the need to protect critical infrastructure and its impact on energy economics Understand the need to protect critical infrastructure and its impact on energy economics Determine best security practices for ICS/SCADA systems Determine best security practices for ICS/SCADA systems Learn to protect real time system Learn to protect real time systems from cyber attacks Learn to protect real time systems from cyber attacks Know how to protect cloud comp Know how to protect cloud computing networks Know how to protect cloud computing networks Tackle backdoor interface vulnerabilities in SCADA systems Tackle backdoor interface vulnerabilities in SCADA systems Tackle backdoor interface vulner Understand cyber defence strategies and their subsequent implementation Understand cyber defence strategies and their subsequent implementation Interact and network with industry experts from leading national and Understand cyber defence strate Interact and network with industry experts from leading national and international oil international oil companies, IT security solution providers, as well as banks, power and telecom companies companies, IT security solution providers, as well as banks, power and telecom companies Interact and network with indust Lt. Col. Faisal Mohamed Al Associate sponsors: Associate sponsors: Exhibitor: Exhibitor: companies, IT security solution p Shamari, Chief Information Security Officer, Abu Dhabi Police GHQ, UAE Associate sponsors: Benefits of attending: For more information or to register Tel: +971 4 364 2975 Supported by: Supported by: Media partners: Media partners: Researched and Researched and developed by: developed by: Email: enquiry@iqpc.ae www.cybersecurityme.com Mohammed Ikrami, IT Security Officer, Fertil, UAE Andrey Zolotavin, Senior Real Time Systems Engineer, KOC, Kuwait For more information or to register - Tel: +971 Arabia Habeebu Rehman, Sr. Supervisor IT Security, Petrorabigh, Saudi 4 364 2975 Fax: +971 4 363 1938 Email: enquiry@iqpc.ae Abdullah Al-Akhawand, Sr. IT Engineer, KGOC, Kuwait www.cybersecurityme.com Moazzem Hossain, Operations Planning and Studies Department Manager, ADDC, UAE CYB NBAD, UAE, Mahmoud Yassin, Lead Systems and Security Data Center Group, ERCRIME CH ALLEN GES IN T HE MIDDLE EAST Ali Rebaei, World’s Top 51 Big Data Influencer, Expert and Consultant, UAE Gilles Loridon, CEO, Global Security Networks, UAE And many more… And many more… And many more… Med
  • 4. The following MENA countries have either dedicated cybercrime law or special system to deal with cybercrime: UAE: Federal Law No.2 of 2006 Saudi Arabia: Cybercrime System (2007) Oman: Cybercrime Law (2011) Syria: Cybercrime and Communication on the Internet (2012) Jordan: Cybercrime temporary law (2010) I suggest that governments learn from Council of Europe and try to ratify CoE cybercrime treaty. They don’t need to copy and paste, they need to understand first then apply the procedures and draft dedicated cyber laws that meet their requirements and according to the Universal Declaration of Human Rights. 3rd Challenge – Technical Capabilities From my experience with law enforcement agencies in the region, I can tell that there is big dilemma when it comes to the procedural measures of cybercrime-related investigations. There is also a problem to maintain the integrity of the digital evidence during an investigation as it is always important in a criminal case, but the nature of the evidence in cybercrime makes that job far more difficult. Police officers can easily damage the digital evidence in cybercrime cases by using normal methods of seizure and arrest. CY B E R CR IM E C H AL L E N G E S IN T H E M ID D LE EAS T Law enforcement officers face big challenge before arresting the suspect, they will need to reveal where- and who- the criminal is. Since cybercrime is a transnational crime, the chances of tracking down suspects could be very hard if not impossible. However, attempts to better track online identity raise serious issues for privacy advocates and result in political backlash which is something normal in the Middle East. I understand that it will be big challenge for law enforcement officers as they might consider activists as cybercriminals when reporting cybercrime. I suggest that special procedural measure should be mentioned in any cyber law especially when dealing with digital evidence. Law enforcement should be trained on latest technologies related to cybercrime investigation. 4th Challenge – Organizational Structure One of the big challenges in the region is overlapping especially when dealing with cybercrime cases. Cybercrime require highly developed organizational structures to be in place. Without clear competences it will be difficult to carry out complex investigations that require assistance of different legal as well as technical experts. In the Middle East there is inconsistency and lack of collaboration between many actors to tackle Cybercrime. One of the well-know example is the collaboration between Computer Emergency Response Teams (CERTs) and Law Enforcement Agencies. At present CERTs “if found” and law enforcement agencies work mainly on their own in the fight against cybercrime.
  • 5. Collaboration between different actors should be addressed in cybercrime legislation in order to improve organizational structure to combat cybercrime. 5th Challenge – Education One of the most important elements in combating cybercrime is education and awareness. Unfortunately there is no effective strategy or plan to improve capacity building and security education in the region. There are few awareness campaigns in Oman, Saudi Arabia, Qatar and UAE. Cybercrime legislation is not the only solution to fight cybercrime. It is part of bigger cyber security strategy which also requires improved education and awareness campaigns. Governments should improve their capacity building and education of their employees and citizens to better tackle cybercrime. Source: Mohamed N. El-Guindy Information Systems Security Association, Egypt Chapter, Founder and President http://netsafe.me/ Mohamed is a well-known Cybercrime Expert in the Middle East and works as a consultant for national and international organizations. He is the CEO of ASK PC Academy also serving as the president for ISSA (Egypt chapter). He is an IT specialist with a broad experience, worked in the field of Information Technology for over a decade. Mohamed is a Technical Speaker in International events and workshops related to Cybercrime and Information Security. He is the author of various IT and Security courses in both Arabic and English which approved by IEEE. Next to this he is a Member of IEEE, IEEE Computer Society, Professional Member of the British Computer Society, Chartered IT Professional from BCS, BCS Chartered Membership Assessor, Chartered Engineer (Engineering Council-UK), MCGI Senior Award holder from City & Guilds of London Institute, Member of ISSA (Information Systems Security Association), and other International Engineering and Technology Associations. Mohamed is listed in Marquis Who’s Who by invitation and received many nominations and awards from big names in the IT industry. October 13, 2012 CYB ERCRIME CH ALLEN GES IN T HE MIDDLE EAST
  • 6. Evolve and adapt in SCADA, DCS and ICS security www.cybersecurityme.com “ f a 23 - 26 March 2014 The Westin Abu Dhabi Golf Resort & Spa, Abu Dhabi, UAE Celebrity speakers: Bill Cheswick Creator of the world’s first network firewall & Author of “Firewalls and Internet Security: Repelling the Wily Hacker” Benefits of attending: Don Codling, Former Cyber Security Unit Chief, FBI, United States VIP Keynote speakers: Dr. Jamal Mohamed Al Hosani Official Spokesman & Director ICT, National Emergency Crisis & Disaster Management Authority, UAE Exclusive presentations from: Mohamed Al Sawafi, Head of IT Services, GASCO, UAE Lt. Col. Faisal Mohamed Al Shamari, Chief Information Security Officer, Abu Dhabi Police GHQ, UAE Identify emerging cyber threats and e Understand the need to protect critic Determine best security practices for Learn to protect real time systems fro Know how to protect cloud computin Tackle backdoor interface vulnerabilit Understand cyber defence strategies Interact and network with industry ex companies, IT security solution provid Associate sponsors: