Scroll to top






Our clients describe us as a product team which creates amazing UI/UX experiences, by crafting top-notch user experience.

Our clients describe us as a product team which creates amazing UI/UX, by crafting top-notch user experience.

We’ve structured our workflow processes were from the funny the century rather.

Work and general inquiries

Assistance hours:
Monday – Friday
6 am to 8 pm EST

541 Melville Ave, Palo Alto,
CA 94301,
United States

We’re a team of creatives who are excited about unique ideas and help fin-tech companies to create amazing identity by crafting top-notch UI/UX.

We use cookies to give you the best experience.

Founded in 1987, Huawei is a leading global provider of information and communications technology (ICT) infrastructure and smart devices. We have more than 197,000 employees, and we operate in more than 170 countries and regions, serving more than three billion people around the world.
Our vision and mission is to bring digital to every person, home and organization for a fully connected, intelligent world. To this end, we will drive ubiquitous connectivity and promote equal access to networks; bring cloud and artificial intelligence to all four corners of the earth to provide superior computing power where you need it, when you need it; build digital platforms to help all industries and organizations become more agile, efficient, and dynamic; redefine user experience with AI, making it more personalized for people in all aspects of their life, whether they’re at home, in the office, or on the go. For more information, please visit at  or follow us on:

About Mandiant, Inc. 
Since 2004, Mandiant® has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.
Join the conversation. Follow them on Twitter, LinkedIn, Facebook, and YouTube.
© 2022 Mandiant, Inc. All rights reserved. Mandiant is a registered trademark of Mandiant, Inc. in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

At Picus Security, we help organizations to continuously validate, measure and enhance the effectiveness of their security controls so that they can more accurately assess risks and strengthen cyber resilience.As the pioneer of Breach and Attack Simulation (BAS), our Complete Security Control Validation Platform is used by security teams worldwide to proactively identify security gaps and obtain actionable insights to address them

For more information, visit our website:

MetricStream is the global SaaS leader of Integrated Risk Management and GRC solutions that empower organizations to thrive on risk by accelerating growth via risk-aware decisions. We connect governance, risk management, and compliance across the extended enterprise. Our ConnectedGRC and three product lines – BusinessGRC, CyberGRC, and ESGRC – are based on a single, scalable platform that supports you wherever you are on your GRC journey. Recognized by top industry analysts as a leader in GRC, MetricStream has been helping customers thrive on risk for more than 20 years.

Defensys is a cybersecurity solutions vendor. Since 2011, the company provides the whole product’s ecosystem that helps companies to withstand modern cyber threats and ensure reliable security management worldwide.

Inspira is a professional services company that specializes in providing leading edge cybersecurity solutions and services to its customers in all industry verticals. Over the years, Inspira has led cybersecurity initiatives with a team of over 1300+ professionals, successfully deploying next-gen solutions for our clients across the globe. Inspira’s security practice has been serving clients for more than 12 years, and we have successfully delivered some of the largest and most complex security initiatives in the banking & financial services industry. Our cybersecurity services span across Cyber Advisory, Cyber Transformation and Cyber Operations.

ESET is the #1 endpoint security partner from EU specializing in cybersecurity for more than 30 years. ESET´s security products are made in Europe and provide security software in over 200 countries and territories worldwide, and its software is localized into more than 30 languages. The company aims to protect human progress globally through the provision of security software and services.

Timings Agenda
08:00 Registration Begins
09:20 Opening Remarks by Conference Director (MS Events)

Building Cybersecurity Capacity: Trends, Mechanisms and Issues.

Dr. Nedal Ababneh, Head of Information Security Engineering Technology Department (ISET)- Abu Dhabi Polytechnic


Ransomware Techniques in 2022: How to Detect Malicious Activity

BAD NEWS: With the rise of Ransomware-as-a-Service, bad attackers are getting super slick at finding unprotected — and under-protected — systems across target environments.
GOOD NEWS: By understanding critical vulnerabilities in your network, you can up your game, too. Once security
gaps are known, proactive threat hunting techniques will help guard you against attacks.

Adam Docrat, Head of Information Technology, Aster Retail GCC


Modernize Your Approach to Cloud and Application Security

Understand how to evolve security practices for the changing cloud landscape. Learn what the risks are—from security blind spots to unmanaged devices. Discover a phased approach to securing your cloud infrastructure

Tilak Ratnayake, Group IT Security Manager, Gulf Agency Company

10:30 How Modern Security Teams Fight Today’s Cloud Cyber Threats. Is your workplace protected?
• Start building a cloud security strategy
• Reduce risk from increasingly sophisticated, modern-day threats
• Secure users and devices both on and off the corporate network with easy-to-scale and easy-to-deploy DNS-layer protection
• Minimize alerts and give back time and resources to your IT teams
Prince Rana, Information Security, Risk, and Governance- Seddiqi Holding

Panel Discussion: Safe or unsafe? Why cloud security is important for business?

Ashraf Esmat Khalil, Head of Solution Architect, Huawei Cloud ME

Umesh Moolchandani, Chief Information Officer, Bin Dasmal Group

Zaheer Mubarak Shaikh, Chief Information Security Officer, Al Maryah Community Bank

Dr. Srijith Nair, InfoSec Director, Careem

Shafiullah Ismail, Vice President – Cyber Security & Architecture. Governance & Risk, Mubadala Capital

Shivani Jariwala, Director in Cloud Security Services- CPX


11:20 Networking and coffee break

Zero Trust Security: What is it and what is in it for you?

  • What is Zero trust? Where did it come from?
  • How does Zero Trust impact your information security posture?
  • When should I adopt the Zero Trust approach and how do I do it?

Dr. Srijith Nair, InfoSec Director, Careem


Protecting Your Network and Data From Breaches.
In-depth discussion about the types of network security solutions to keep the enterprises safe and secured

Dr. Lt. Col Hamad Khalifa Swuidan Al Nuaimi, Head of Telecommunication Division, Information Technology Center Abu Dhabi Police General Headquarters


5G Security Risks
Security services to support your 5G strategy— which includes options like next generation firewalls, secure remote access solutions, secure web gateway, and broader SASE offerings

Imran Shaikh, Chief Technology Officer, Virgin Mobile UAE


Agile and adaptive practices in securing critical environments

  • Creating agile and more secure environments by adopting endpoint security strategies and tools
  • Understanding if current security infrastructure can cater to a digitalized critical infrastructure before investing
    time and money
  • In the age of increased remote access, ensuring control and auditing accesses can minimize insider threats

Shahab Uddin, Group IT Infrastructure & Security Manager, Ittihad International Investment LLC

13:00 Awards
13:20 Lunch and Networking Break