Periodic Conference in many cities hosted by Trend Micro
CLOUDSEC 2022 is a call out to engage with the future as a verb. From the context of the present, through the looking glass let’s ‘future it’. The idea is not just to ride the wave, but to create our own by comprehending the direction in which the winds of change will blow. Show A year where upcoming strategic technology trends in cloud, security, and digital transformation will be explored, paving the way for implementation. CLOUDSEC 2022 will prepare you for the future digital world order - today.
Upcoming EventsReady to Unfold @ a City Near You!Gear-up as we go back to in-person events. Stay ahead of global trends and get regional insights. Converse, connect and collaborate with industry leaders, experts & visionaries and Future IT, together. Middle EastTo be announced AfricaJohannesburg 2nd Nov Southeast AsiaSingapore 20th Oct Time-travel to 2030 to compete in the ultimate hacking challenge exploring attack scenarios of the future! Get your team ready to work together to secure the world order! 4 forward-looking themesCloud Computing Threats Blockchain Analysis OSNT & Reversing IoT Security Get ready for 24 hours of non-stop competition 19 OctoberOpens at 12AM CST|7AM CET|1PM SGT What Attendees Say"I like the overall experience and also the Global Keynote sessions. I learned a lot! " "The wide pool of knowledge on the panels has provided great insights into the future of cloud" “Topics are relevant and got insights on the latest threats and challenges that leaders in security and organizations currently faces." “I found it fun and challenging. looking forward to next event.” “I get to learn new trends and evolution in IT security integration with networks, Infrastructure, application etc” PRINCIPAL PARTNER
MAJOR SPONSOR
Egypt B214, F5, Smart Village, Km 28 Cairo Alex Desert Rd., Giza, Egypt Phone: (+20) 0102 085 4994 UAE DSO, Dubai Silicon Oasis Free Zone, Techno Hub Dubai, UAE Phone: (+971) 56 95 40 127 USA 2035 Sunset Lake Road, Suite B-2, Delaware, USA Belgium CYBER TALENTS BV Diestbrugstraat 120 A BE 3071 Kortenberg, Belgium 0770.825.346 Quelques pistes de solution pour la catégorie “General Information” de Cyber Talents. Il s’agit de questions de culture gé’. Si vous ne connaissez pas la réponse, le but de cette catégorie est plutôt simple: Just Google it :) Au besoin, visitez ce lien: https://lmgtfy.com/?iie=1&q=how+do+I+use+google+to+search+things? Business GatheringI am a huge cyber security conference that run every year in three places : San Francisco, Singapore and Lately AbuDhabi. Who am I ? No spaces in answering Ref: https://securityintelligence.com/the-pick-of-2017-cybersecurity-conferences/ FounderI have founded two of the most famous Cyber Security conferences across the globe in Las Vegas, USA. I am not The Dark Knight. I am The DarK——–? Ref:
Back to HistoryI am the First Computer Virus ever known . You will find me in your head . My name is ……..? Ref: https://www.thevintagenews.com/2016/09/08/priority-brain-first-computer-virus-created-two-brothers-pakistan-just-wanted-prevent-customers-making-illegal-software-copies/ ContributeI am an Organization that releases the Top 10 Vulnerabilities in Application Security . I am ……? Ref: https://www.veracode.com/directory/owasp-top-10 Pay MeI will lock your machine screen or files till you pay me. Who am i ? Ref: https://www.malwarebytes.com/ransomware/ TrendMicro ConferencePeriodic Conference in many cities hosted by Trend Micro Ref: https://www.cloudsec.com/sg/ Interceptthe attacker intercept information between receiver and sender. what is the attack name ? Ref: https://www.veracode.com/security/man-middle-attack My boxI am a professional pen tester. I do not need to know any information from the customer, I do ….box pen test Ref: https://resources.infosecinstitute.com/what-are-black-box-grey-box-and-white-box-penetration-testing/ Hackers GatheringI am a cyber security conference that run in August every year in Las Vegas. I am the largest gathering for Hackers in the whole world. No Credit cards, no online booking , Only Cash allowed . Who am I ? Ref: https://defcon.org/ GreeksThe art of hiding messages or information inside other image / text or data Ref: https://en.m.wikipedia.org/wiki/Steganography RobotA group or network of machines that are controlled by an attacker to do a certain task Ref: https://en.m.wikipedia.org/wiki/Internet_bot Japanese WarriorI am a linux distrubition with two versions one for Web Penetration Testing and the other for attacking smart grids. What is my smart grid distribution name ? Ref: https://nullcon.net/website/nullcon-2016/training/penetration-testing-smartgrid-and-scada.php SCADAA worm that targeted SCADA Systems Ref: https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet CaptureNetwork analysis tool used to captured packets and present it in readable format Ref: https://en.wikipedia.org/wiki/Wireshark ScanOne of the famous, free port scanner. Who am i ? Ref: https://en.wikipedia.org/wiki/Nmap Crashenter a lot of random trash till the application crash Ref: https://en.wikipedia.org/wiki/Fuzzing Modify CodeChange code from one form to another to prevent attacker from understanding it Ref: https://en.wikipedia.org/wiki/Obfuscation This work is licensed under a Creative Commons Attribution 4.0 International License. |