The workshops are grouped into three classes, each focusing a different kind of audience:

1. Class A: This class is suitable for participants who are skilled in the field of network security and looking for advancements in cyber security.

2. Class B: This class suits people with IT background and includes discussion on tools related to cyber security.

3. Class C: This class targets general audience and provides awareness on topics of public interest.

Pre-conference activities offer introductory workshops on Tuesday, November 10, 2015. ICACC-2015 will provide all necessary facilities for conference participants.

Workshops Class A

1 – Network Vulnerability Scanning and Assessment
Mr. Taher Adel Salaheldin Mohamed Azab
Mr. Taher Adel Salaheldin Mohamed AzabInformation Security Analyst, Desjardins Technology Group, Montreal, Canada.https://ca.linkedin.com/pub/taher-azab/16/a65/366
Mr. Tran Thai Son
Mr. Tran Thai SonSoftware Security Engineer, Intel, Montreal, Canada. https://ca.linkedin.com/in/tsondt

Bio of Mr. Taher Adel Salaheldin Azab:

Taher is an information security enthusiast and software developer. Masters of applied science in information systems security, currently working as security analyst for Desjardins.

Bio of Mr. Tran Thai Son:

Son has a Master degree in Information Systems Security and is currently working as a software security engineer for Intel. During the past few years, he has been contributing to several projects related to cyber intelligence and cyber forensics. Currently, he is part of the security team of a cross-platform product that provides a safer way to manage online identities. He has been always interested in solving challenges, especially in the information security field, and has participated in many CTF competitions.

Abstract of Workshop:

From this workshop you can learn how to find network and system vulnerabilities before attackers do. For example, AlienVault Unified Security Management™ (USM) provides network vulnerability scanning and reporting built in with all the essential capabilities needed for complete security visibility.

Workshop Objectives:

Asset Discovery, Vulnerability Assessment, Threat Detection, Behavioral Monitoring, and Security Intelligence.

Target Audiences:

IT Professionals. Faculty, Students, Rsearchers, CIOs.

Date: Tuesday, 10 November 2015
Venue: Intercontinental Riyadh
Time: 08:30 – 11:30
Duration: 3 Hours

2 – Develop An Effective Human Security Awareness System
Prof. Fadi Ahmed AlAlool
Prof. Fadi Ahmed AlAloolAmerican University of Sharjah, United Arab Emirates. www.aloul.net

Bio of Presenter:

Dr. Fadi Aloul is a Professor of Computer Science & Engineering and the Director of the HP Institute at the American University of Sharjah (AUS), UAE. He holds a PhD and MS degrees in Computer Science & Engineering from the University of Michigan, Ann Arbor, USA, respectively, and a BS degree in Electrical Engineering summa cum laude from Lawrence Technological University, Michigan, USA. His research and industrial interests are in Cyber Security, Design Automation and Optimization. He is a Certified Information Systems Security Professional (CISSP) and the founder of several cyber security awareness initiatives in UAE including UAE’s Cyber Academy.

Dr. Aloul received a number of awards including the prestigious H.H. Sheikh Khalifa, UAE’s President, Award for Higher Education, Sheikh Rashid’s Award for Outstanding Scientific Achievement, the Abdul Hameed Shoman Award for Young Arab Researchers, the AUS Excellence in Teaching Award and the Semiconductor Research Corporation Fellowship. He has 100+ publications (available at http://www.aloul.net) and 1 US patent. He is a regular invited speaker and panelist across a number of international conferences related to Cyber Security, Technology, Innovation and Education. He was the founder and chair of the UAE IEEE Graduates of Last Decade (GOLD) group, an organization dedicated to advancing technological innovation and excellence for the benefit of humanity.

Abstract of Workshop:

Enterprise security awareness program trains your employees to protect network against security breaches and keeps them security aware through ongoing awareness programs. An active security awareness program can greatly reduce many risks that cannot be addressed through security software and hardware devices. In these cases, it’s the human elements of security that must be addressed which is exactly our products are designed to do.

Workshop Objectives:

  • Why are your users the most attractive target for cybercriminals
  • Latest threats against the human users
  • Effective solutions to increase the awareness
  • Assessing the security awareness level in your organization
  • What are the key factors required to develop a successful security awareness program

Target Audiences:

IT Professionals. Faculty, Students, Rsearchers, CIOs.

Date: Tuesday, 10 November 2015
Venue: Intercontinental Riyadh
Time: 12:30 – 15:30
Duration: 3 Hours

3 – Malware Detection and Analysis
Dr. Sami Zhioua
Dr. Sami ZhiouaAssistant Professor, KFUPM, Saudi Arabia.

Bio of Presenter:

Dr. Sami Zhioua is assistant professor at the Information and Computer Science department of KFUPM, Saudi Arabia. Before, he was a post-doctoral research and teaching fellow at McGill University, Canada. He graduated from Laval University, Canada (Ph.D. 2008 and M.Sc. 2003). His research interests include information security, ethical hacking, anonymity protocols, reinforcement learning and Java virtual machines. He is teaching several cybersecurity related courses and delivering several technical trainings for industry. He is the author of three books and several journal and conference papers.

Abstract of Workshop:

This workshop shows how you can capture, control, and analyze attackers using Honeywall CDROM. Honeywall CDROM is a high-interaction tool for capturing, controlling and analyzing attacks. It creates an architecture that allows you to deploy both low-interaction and high-interaction honeypots, but is designed primarily for high-interaction.

Workshop Objectives:

  • Introduction to Malware Analysis
  • Malware Hiding Places
  • Static Analysis
  • Dynamic Analysis
  • Malicious Document Analysis
  • Malware Challenges

Target Audiences:

IT Professionals. Faculty, Students, Rsearchers.

Date: Tuesday, 10 November 2015
Venue: Intercontinental Riyadh
Time: 16:30 – 19:30
Duration: 3 Hours

Workshops Class B

1 – Mobile Device Forensics
Mr. Florian Lukavsky
Mr. Florian LukavskySEC Consult, Singapore Pte Ltd., Singaporehttps://www.linkedin.com/in/lukavsky

Bio of Presenter:

Florian Lukavsky is MSc in Information Software Eng and currently working as Director at SEC Consult Singapore. Mr. Lukavsky has participated in over 200 projects during his SEC Consult career, including penetration tests, software testing, threat modelling, process assessments, source code reviews, conduction of developer trainings, and audits of internal IT infrastructure including software testing and source code review. During recent incidents Mr. Lukavsky had the opportunity to gain insights into mobile forensics.

Abstract of Workshop:

Mobile devices are an evolving form of computing, used widely for personal and organizational purposes. These compact devices are useful in managing information, such as contact details and appointments, and corresponding electronically. Over time, they accumulate a sizeable amount of information about the owner. When involved in crimes or other incidents, proper tools and techniques are needed to recover evidence from such devices and their associated media. Computer Forensics Tool Testing (CFTT) program. The CFTT tests tools to determine how well they perform core forensics functions such as imaging drives and extracting information from cell phones.

Workshop Objectives:

  • Developing an understanding mobile devices security architechure.
  • Analyzing techniques to forensically preserve, acquire and examine data stored on mobile devices Handling common challenges faced in the field of Digital Mobile forensics.

Target Audiences:

IT Professionals, Law Enforcement Officers, Lawyers, Forensic Experts.

Date: Tuesday, 10 November 2015
Venue: Intercontinental Riyadh
Time: 08:30 – 11:30
Duration: 3 Hours

2 – Intrusion Detection and Prevention Systems
Dr. Magdy Mohamed AbdelMonem Saeb
Dr. Magdy Mohamed AbdelMonem SaebArab Academy of Science, Technology & Maritime Transport, Alexandria, Egypt.www.magdysaeb.net
Dr. Ghita Kouadri Mostefaoui
Dr. Ghita Kouadri MostefaouiUniversity Teaching Fellow, University College London, United Kingdom.http://www0.cs.ucl.ac.uk/staff/gkouadri

Bio of Dr. Magdy Mohamed AbdelMonem Saeb:

Magdy Saeb received the BSEE. School of Engineering, Cairo University, in 1974, the MSEE, and Ph.D. Degrees in Electrical & Computer Engineering, University of California, Irvine, in 1981 and 1985, respectively. He was with Kaiser Aerospace and Electronics, Irvine California, and The Atomic Energy Establishment, Anshas, Egypt. He is a Professor Emeritus in the Department of Computer Engineering, Arab Academy of Science, Technology & Maritime Transport, Alexandria, Egypt; He was on leave working as a Principal Researcher in the Malaysian Institute of Microelectronic Systems (MIMOS) where he obtained five US/International Patents in Cryptography. Now he is the CTO of Great Wall Information Security, Kuala Lumpur, Malaysia. His current research interests include Cryptography, FPGA Implementations of Cryptography and Steganography Data Security Techniques, Encryption Processors, Mobile Agent Security. He has published more than 65 peer-reviewed papers in International Journals and Conferences. www.magdysaeb.net

Bio of Dr. Ghita Kouadri Mostefaoui:

Dr. Ghita Kouadri Mostefaoui is a Teaching Fellow at University College London (UCL). She teaches computer programming and robotics. She obtained her PhD jointly from the University of Fribourg, and Universite Pierre et Marie Curie (Paris VI). Before joining UCL, she worked at Oxford University and at The UK Synchrotron (http://www.diamond.ac.uk/Home.html) where she developed the archiving application for beamlines’ data.

Her research interests include software engineering, security, cloud computing and sentic computing.

Abstract of Workshop:

This workshop will discuss an open source for IDPS. Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS). It has the ability to perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks. Snort performs protocol analysis, content searching, and content matching.

Workshop Objectives:

1. Need to understand your oppoents tactics,

2. Recognizing the gray areas in information security,

3. Realizingg the relation to Ethical hacking,

4. Knowledge of attackers preferred targets,

5. Setting up a Penetration Testing Lab.will be updated soon.

Target Audiences:

People with background in IT.

Date: Tuesday, 10 November 2015
Venue: Intercontinental Riyadh
Time: 12:30 – 15:30
Duration: 3 Hours

3 – Capture the Flag (CTF) Tutorial
Mr. Taher Adel Salaheldin Mohamed Azab
Mr. Taher Adel Salaheldin Mohamed AzabInformation Security Analyst, Desjardins Technology Group, Montreal, Canada.https://ca.linkedin.com/pub/taher-azab/16/a65/366
Mr. Tran Thai Son
Mr. Tran Thai SonSoftware Security Engineer, Intel, Montreal, Canada. https://ca.linkedin.com/in/tsondt

Bio of Mr. Taher Adel Salaheldin Azab:

Taher is an information security enthusiast and software developer. Masters of applied science in information systems security, currently working as security analyst for Desjardins.

Bio of Mr. Tran Thai Son:

Son has a Master degree in Information Systems Security and is currently working as a software security engineer for Intel. During the past few years, he has been contributing to several projects related to cyber intelligence and cyber forensics. Currently, he is part of the security team of a cross-platform product that provides a safer way to manage online identities. He has been always interested in solving challenges, especially in the information security field, and has participated in many CTF competitions.

Abstract of Workshop:

The explosive growth of information technology not only brings new opportunities, but also attracts potential threats. The security of information systems has become crucial. Due to the nature of the field, whoever wishes to pursue an information security career needs as much hands-on experience as possible to be competent. In the information security world, capture the flag (CTF) competitions serve as the bridges that try to fill the gap between theory and practice, to prepare information security apprentices for the real-world problems and also to stimulate the hungry brains.

Workshop Objectives:

The workshop, which consists of two main events, has two objectives:

  1. A training session during which participants are guided, step-by-step, through examples that are closely resembled the challenges in a CTF competition. After this session, participants will be equipped with skills to be utilized in the real contest.
  2. A CTF competition during which participants attempt to solve information security challenges in groups. The top teams will be rewarded.

Target Audiences:

Students, challenge-lovers, anyone who is interested in applied information security.

Date: Tuesday, 10 November 2015
Venue: Intercontinental Riyadh
Time: 16:30 – 19:30
Duration: 3 Hours

Workshops Class C

1 – Biometric Security and its Applications
Dr. Bouridane Ahmed
Dr. Bouridane AhmedNorthumbria University Newcastle, United Kingdomhttps://www.northumbria.ac.uk/about-us/our-staff/b/ahmed-bouridane

Bio of Presenter:

Ahmed Bouridane received an “Ingenieur d’Etat” degree in electronics from “Ecole Nationale Polytechnique” of Algiers (ENPA), Algeria, in 1982, an M.Phil. degree in electrical engineering (VLSI design for signal processing) from the University of Newcastle-Upon-Tyne, U.K., in 1988, and an Ph.D. degree in electrical engineering (computer vision) from the University of Nottingham, U.K., in 1992. From 1992 to 1994, he worked as a Research Developer in telesurveillance and access control applications. In 1994, he joined Queen’s University Belfast, Belfast, U.K., initially as Lecturer in computer architecture and image processing and later on he was promoted to Reader in Computer Science. He is now a full Professor in Image Engineering and Security and leads the Computer and Electronic Security Systems Group at Northumbria University at Newcastle (UK), and his research interests are in imaging for forensics and security, biometrics, homeland security, image/video watermarking, cryptography and mobile and visual computing. He has authored and co-authored more than 250 publications and one research book. Prof. Bouridane is a Senior Member of IEEE.

Abstract of Workshop:

In the fact, the use of biometric measurements is very important in many security and medical applications. The importance of this filed is not only from the theoretical point of view but also from the industrial perspective and practice. This workshop aims to present and discuss various technological, methodological and application issues in these areas such as Biometric Access Control.

Workshop Objectives:

To give a detailed review digital media security technology, to discuss and evaluate state of the art biometric security and its application to security applications, to discuss how data hiding can be used to combat cybercrime and how general public should not become target of cyber crime.

Target Audiences:

General Audience, Researchers and practioners including forensic scientists.

Date: Tuesday, 10 November 2015
Venue: Intercontinental Riyadh
Time: 08:30 – 11:30
Duration: 3 Hours

2 – Cybercrime – Seizing and Securing Digital Evidence
Dr. Mohamed Mohamed Saleh Elalfy
Dr. Mohamed Mohamed Saleh Elalfy Ministry of Justice, Egypt

Bio of Presenter:

  • Counsellor in Higher Courts of Appeal Egypt
  • Chairman of Egyptian association for Electronic Arbitration
  • Chairman of Egyptian association for prevention information and internet crimes
  • Instructor in Egyptian and Arabian judicial institutes
  • Expert in Legal organizing of cyberspace at ESCWA

Abstract of Workshop:

This workshop provides law enforcement professionals with the knowledge and skills necessary to respond to an electronic crime scene and to safely and methodically collect and preserve items of evidentiary value that may be used in court proceedings. At the end attendees will have the knowledge of:

  • Recognize various types of electronic media and hardware used for storing electronic data. Items include computers, thumb drives, media cards, PDAs, etc.
  • Steps involved in orchestrating a digital evidence-based seizure and the legalities that surround it.
  • How to identify, preserve, collect, search, package, document and transfer digital evidence.

Workshop Objectives:

  • Criminal Digital evidence and Authentic Evidential
  • Electronic Investigation,inquiry
  • Legitimacy of the judicial officer to tracking the digital evidence
  • Introduction to Arabian legislation to prevent information crimes
  • UN rules “ESCWA” for authoritative digital evidence
  • Introduction to Arabian Convention for prevention information crimes and Digital evidence

Target Audiences:

  • Policemen
  • Legal departments in government and private sectors
  •  Lawyers
  •  Information security departments
  • Members of the investigation and prosecution and parquet
  • Judges
  • هيئة الامر بالمعروف
  • E-government department’s staff
  • Legal departments staff in banks

Date: Tuesday, 10 November 2015
Venue: Intercontinental Riyadh
Time: 12:30 – 15:30
Duration: 3 Hours

3 – Social Networking : The Latest Security Issues and How to Manage Them
Dr. Laith Abdulaziz Alsulaiman
Dr. Laith Abdulaziz AlsulaimanCollege of Computer and Information Sciences- Al Imam Mohammad Ibn Saud Islamic University, Saudi Arabia.https://sa.linkedin.com/pub/laith-alsulaiman/3/7a8/b6

Bio of Presenter:

Laith Alsulaiman has more than 15 years of ICT and higher education experience in various large impact initiatives. Laith holds a PhD in Computer Science from Old Dominion University, USA and is currently an assistant professor at the college of computer and information science at Al Imam Mohammad Ibn Saud Islamic University with research interest in Cloud Computing and Security.

Laith co-founded BusinessClouds, a startup company that delivers solutions to small and medium business. Prior BusinessClouds, he worked as an IT advisor with Saudi Electronic University and lead a team of consultants, vendors, and staff to define, design, build, and operate the first accredited eLearning university in Saudi Arabia. Laith Also was a managing consultant of Information security and infrastructure practice at Devoteam consulting and lead strategic engagements in providing advisory services at the board level which includes ICT regulations, eServices enablement strategies, ISO27001, Disaster recovery planning, and infrastructure transformation for major clients in Saudi Arabia.

Abstract of Workshop:

As the explosion in use of social networking sites continues, so too does the increase in risks brought about by cyber criminals trying to take advantage of users. In this webcast, attendees learnt about the potential risks social networking brings to individuals and enterprises, including targeted attacks, phishing, exploitation of accounts, and spread of malware. Furthermore, this workshop will discuss how to address the security risks so that you may use social networking more securely and minimize the potential of becoming a victim of an incident. Primarily, it will provide the knowledge of easy to use tools for securing emails, pictures, files and folders that audience can integrate into the day to day computer use.

Workshop Objectives:

• Create awareness on SN main security risks and issues.
• Show best practices on how to manage security, and privacy issues associated to SN.
• Provide guidelines for parents on how to provide a safer SN experience to their children.

Target Audiences:

General public.

Date: Tuesday, 10 November 2015
Venue: Intercontinental Riyadh
Time: 16:30 – 19:30
Duration: 3 Hours

For further information, please contact the Conference Office at icacc@ccis.imamu.edu.sa.