SlideShare a Scribd company logo
The Power To Secure
Introduction
Jorge Sebastiao
COO
Infosec Issues
Mobile Malware up
1,200% Q1 2012
Motivation 2012
Global Attacks
Complexity
Importance of Critical
Infrastructures
Our approach to Security
is too complex
A Vision
“To build the largest information security
services & solutions company
in the MENA region”
5
A Team
Dr. Taher
Elgamal
CEO
Jorge Sebastiao
COODr. Sherif El
Kassas
CTO
Sherif Shaltout
Director of Service
Delivery
General Badr
Khairy
VP of BD
Rania El Rouby
Director of Technical
Sales
Hesham Amin
CFO
Anwar Al Kindi
Director of HR
Training
Business Overview
First Information Security
Managed
Security
Services
&
Security
Metrics
Solutions
&
Services
Advanced
Training
Incidence
Response
&
Forensics
&
Disaster
Recovery
Managed Security Services
Managed
Security
Services
Monitor & IR
• Monitoring and threat
management
• Aggregation of logs
• Anomaly detection
• alerts
Perimeter
Protection
• Managed Firewall,
UTM, IPS, Anti-
Malware, etc.
In cloud MSS
• Clean pipes
• Anti-malware, etc
• Antifraud
DOS/DDOS
mitigation
End-user/device
management
Solutions & Services
• Risk assessment
• Vulnerability assessment
• Penetration testing
Security
assessment
• Architecture, solution selection
• Compliance gap analysis
• Secure application development
Roadmap
and
compliance
• Incident management
• Response services
• Forensics and support services
Incident
handling
• Integration
• Customization
• Localization
Solutions
We build Infosec knowledge
Information Security Awareness Program
Securing
the
weakest
link
Create
knowledge
to change
behavior
Information Security Fundamentals
Threats and
Risks
Controls
Specialized Information Security
Training (role based)
Security
Assessment
Secure
Coding
Forensics
Forensic Laboratories Deployment
Incident
Response
Evidence
Acquisition
Evidence
Preservation
Media
Recovery
Mobile Devices
Forensics
Email
Investigations
Password
Recovery
Network
Forensics
Browser
Investigations
Multimedia
Forensics
Optical Media
Forensics
Malware
Analysis
Internet
Investigations
eDiscovery Mac Forensics
Wireless
Forensics
CCTV &
Video
Forensics
Encryption
Attacks
Smart Phone
Forensics
Core Forensic Laboratory
Advanced Infosec
• Forensics
• Security Metrics
• SDLC & Code Security
• Cloud Security
• Customized Encryption
• Transformational Security
• Big Data Analytics
• CERT
• Cyber warfare
• Total Integrated Security
• Homeland Security
Its all about time…
TBS- Time Based Security
Protection
DetectionResponse
SECURITY
P>D+R
Anti-virus
VPN, Quantum
Firewall, IPS
Access Control
Grid Time Response
Patch Mgmt
Incidence Response
Disaster Recovery
Vulnerability Testing
SIEM, Correlation
Quantum
CCTV, Access Control
Total Integrated security
Total Integrated Security
Physical
Security
Management
Information
Security
Management
Telecom
Security
Management
People, Process &
Technology
Technology
Process
People
A5 - Process
Business Risk
Controls
Maturity
Defense in depth
Business Continuity Management
Business Impact Analysis
Risk Analysis
Recovery Strategy
Group Plans
and Procedures
Business Continuity Planning Initiation
Risk
Reduction
Implement
Standby Facilities
Create Planning Organization
Testing
PROCESS
Change Management Education Testing Review
Policy ScopeResourcesOrganization
BCM
Ongoing
Process
BCM
Project
BCM
Ongoing
Crisis Management Response
steps
DetectionAssessment
DecisionResponse
Recovery
Preparation to
Prevent
Open Platform for
Safety and Security
Incident
1
2
3
4
5
6
Command and
Control
Mission-Critical
Network
Sensing and
Actuation
Notifying Entity &
Authority
Mobilization of
Forces
Incident
Collaboration
Notification to
Authority
Sensing
Mobilized
Force
Incident
Corroboration
Command
Control
Actuation
Completion
Record
Best Practices
Security Metrics
Key Performance Indicators
CoBiT, Compliance
ITIL
ISO20000
ISMS
ISO27001
BCMS
ISO22301
Time Based Security
Securing Voice and SMS
Securing Applications &
Emails, Contacts,…
Securing mobile
collaboration
Transformational Value
FIS Unique Value
Security
Metrics
&
Managed
Security
Services
&
Encryption
Arabization
&
Localization
&
Training
Best
Practices
&
Infosec
Maturity
Standards
Incidence
Response
&
Forensics
&
BCP
Disaster
Recovery
Transformational Security
Transform
Access Architect
We leverage references
Finance Government Telecom
Partners Strategic
Partners
29
FIS Saudi
Kingdom Tower
P.O Box: 230888
Riyadh 11321 – KSA
Tel: +966 1 211 8041
Fax: +966 1 211 8001
FIS Egypt
7 Ibn Gobier St., El Orouba-
Heliopolis, Cairo - Egypt
Tel: +202 2418 8252
Fax: +202 2417 1278
FIS UAE
P.O.Box: 37148
Abu Dhabi – UAE
Tel: +971 2 658 1050
Fax: +971 2 658 1070
FIS Oman
P.O.Box: 196
Muscat - Oman
Tel: +968 24707727
Fax: +968 24797709
FIS UAE
World Trade Center
P.O.Box: 9677
Dubai – UAE
Tel: +971 4 332 2555
Fax: +971 4 332 8777
FIS Qatar
P.O.Box: 3735
Doha - Qatar
Tel: +974 4877193
Fax: +974 4877206
Regional Presence
The Power To Secure
Q&A
Jorge Sebastiao
COO
http://linkedin.com/in/sebastiao

More Related Content

PPT
Esguf Profile Short V34
PPTX
Cyber Security in the Digital Age: A Survey and its Analysis
PDF
The Measure of Success: Security Metrics to Tell Your Story
PPT
Cyber crime with privention
PDF
The Real Costs of SIEM vs. Managed Security Service
PDF
Security Operations and Response
PDF
Transform Your Security Operations with Security Automation and Orchestration
PPT
Securing Call Center Recordings Webinar 4 16 09
Esguf Profile Short V34
Cyber Security in the Digital Age: A Survey and its Analysis
The Measure of Success: Security Metrics to Tell Your Story
Cyber crime with privention
The Real Costs of SIEM vs. Managed Security Service
Security Operations and Response
Transform Your Security Operations with Security Automation and Orchestration
Securing Call Center Recordings Webinar 4 16 09

What's hot (19)

PPTX
Information security governance
PDF
An Intro to Resolver's InfoSec Application (RiskVision)
PDF
Iso 27001 2005- by netpeckers consulting
PPTX
Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...
PPTX
CyberSecurity Strategy For Defendable ROI
PDF
The importance of information security risk management
PDF
Integrating-Cyber-Security-for-Increased-Effectiveness
PDF
Security Program Guidance and Establishing a Culture of Security
PDF
"Thinking diffrent" about your information security strategy
PPTX
The Benefits of Security From a Managed Services Provider
PPTX
MCGlobalTech Service Presentation
PDF
Scammed: Defend Against Social Engineering
PDF
What CIOs Need To Tell Their Boards About Cyber Security
PPTX
Security Orchestration, Automation & Incident Response
PPT
The CISO in 2020: Prepare for the Unexpected
PPTX
CRI Cyber Board Briefing
PPTX
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
PPTX
Tanium Overview
PDF
Security Framework for Digital Risk Managment
Information security governance
An Intro to Resolver's InfoSec Application (RiskVision)
Iso 27001 2005- by netpeckers consulting
Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...
CyberSecurity Strategy For Defendable ROI
The importance of information security risk management
Integrating-Cyber-Security-for-Increased-Effectiveness
Security Program Guidance and Establishing a Culture of Security
"Thinking diffrent" about your information security strategy
The Benefits of Security From a Managed Services Provider
MCGlobalTech Service Presentation
Scammed: Defend Against Social Engineering
What CIOs Need To Tell Their Boards About Cyber Security
Security Orchestration, Automation & Incident Response
The CISO in 2020: Prepare for the Unexpected
CRI Cyber Board Briefing
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
Tanium Overview
Security Framework for Digital Risk Managment
Ad

Similar to FIS Profile Summary V7.3 (20)

PPT
ITS Datamatix Gitex Conference 2009 New ICT Security V2
PPT
Integrating Physical And Logical Security
PDF
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
PPTX
IBM Security Strategy
PDF
IBM Security Strategy Overview
PPTX
Manning Information Security Strategy
PPTX
Key metrics and process in cyber security case scenario
PPTX
Key metrics and process in cyber security case scenario
PDF
Infocon Bangladesh 2016
PDF
Security Transformation Services
PPTX
Enterprise incident response 2017
PPTX
Information Security Cost Effective Managed Services
PPT
II Security At Microsoft
PPT
Isa Prog Need L
PPTX
Cyber Risks Implementation on an IP MPLS Network
PDF
10 Security Essentials Every CxO Should Know
PPT
Smart security solutions for SMBs
PPT
Assuring Reliable and Secure IT Services
PPT
SOC presentation- Building a Security Operations Center
PPTX
Information Systems Policy
ITS Datamatix Gitex Conference 2009 New ICT Security V2
Integrating Physical And Logical Security
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
IBM Security Strategy
IBM Security Strategy Overview
Manning Information Security Strategy
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
Infocon Bangladesh 2016
Security Transformation Services
Enterprise incident response 2017
Information Security Cost Effective Managed Services
II Security At Microsoft
Isa Prog Need L
Cyber Risks Implementation on an IP MPLS Network
10 Security Essentials Every CxO Should Know
Smart security solutions for SMBs
Assuring Reliable and Secure IT Services
SOC presentation- Building a Security Operations Center
Information Systems Policy
Ad

More from Jorge Sebastiao (20)

PPTX
Real estate tokenization and blockchain
PPTX
Blockchain and covid19 v3
PPTX
Top tech shapping startups
PPTX
Blockchain and security v3
PPTX
The road to blockchain 5.0
PPTX
Cyber Warfare 4TH edition
PPTX
How AI is Disrupting Traffic Management in Smart City
PPTX
Ai and traffic management application v1.0
PPTX
Practical analytics hands-on to cloud & IoT cyber threats
PPTX
Dz hackevent 2019 Middle East Cyberwars V3
PPTX
AI HR and Future Jobs Version 2.1
PPTX
Cyber fear obstacles to info sharing-Version 2
PPTX
Blockchain & cyber security Algeria Version 1.1
PPTX
Datamatix GCC HR future jobs Version 1.3
PPTX
Cyber security crypto blockchain Version 3.2
PPTX
RTA AI for traffic management version 1.4
PPTX
IGF2017 Data is new oil - UN Internet Governance Forum
PPTX
ADIPEC physical and Infosec for Oil and Gas
PPTX
AVSEC are you flying cybersafe?
PPTX
Are we ready for IoT? VU Version 7
Real estate tokenization and blockchain
Blockchain and covid19 v3
Top tech shapping startups
Blockchain and security v3
The road to blockchain 5.0
Cyber Warfare 4TH edition
How AI is Disrupting Traffic Management in Smart City
Ai and traffic management application v1.0
Practical analytics hands-on to cloud & IoT cyber threats
Dz hackevent 2019 Middle East Cyberwars V3
AI HR and Future Jobs Version 2.1
Cyber fear obstacles to info sharing-Version 2
Blockchain & cyber security Algeria Version 1.1
Datamatix GCC HR future jobs Version 1.3
Cyber security crypto blockchain Version 3.2
RTA AI for traffic management version 1.4
IGF2017 Data is new oil - UN Internet Governance Forum
ADIPEC physical and Infosec for Oil and Gas
AVSEC are you flying cybersafe?
Are we ready for IoT? VU Version 7

Recently uploaded (20)

PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Unit 1 Cost Accounting - Cost sheet
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PDF
A Brief Introduction About Julia Allison
PDF
Nidhal Samdaie CV - International Business Consultant
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PPT
Chapter four Project-Preparation material
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
DOCX
Business Management - unit 1 and 2
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PPTX
5 Stages of group development guide.pptx
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PPTX
Probability Distribution, binomial distribution, poisson distribution
Chapter 5_Foreign Exchange Market in .pdf
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Unit 1 Cost Accounting - Cost sheet
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
unit 1 COST ACCOUNTING AND COST SHEET
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
A Brief Introduction About Julia Allison
Nidhal Samdaie CV - International Business Consultant
340036916-American-Literature-Literary-Period-Overview.ppt
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Roadmap Map-digital Banking feature MB,IB,AB
Chapter four Project-Preparation material
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
Ôn tập tiếng anh trong kinh doanh nâng cao
Business Management - unit 1 and 2
Power and position in leadershipDOC-20250808-WA0011..pdf
5 Stages of group development guide.pptx
Lecture (1)-Introduction.pptx business communication
Reconciliation AND MEMORANDUM RECONCILATION
Probability Distribution, binomial distribution, poisson distribution

FIS Profile Summary V7.3