Sunteți pe pagina 1din 17

NextGen Cyber Security

For Finnovation

C|EH & C|CISO Training


TM TM
December 03 - 06, 2017

C E H C CISO
Certified Ethical Hacker Certified Chief Information Security Officer
Business Summit
December 07, 2017

Supporting Partners Strategic Partner Platinum Partner Exhibitor

www.fintechsecuritysummit.com
SUMMIT OVERVIEW

With FinTech becoming a global phenomenon, why should the Middle East be left behind? As Abu Dhabi,
UAE leads the market with innovations in the financial technologies space, we must not forget the
cyber security dynamics involved in this digital transformation.

Globally, VC funding to Fintech companies reached a record of $13.6bn in 2016, up from the $12.6bn
reported the year before. In the wake of these aggressive investments, EC Council brings to you its
“2nd Edition FinTech Security Summit” scheduled for 7th December 2017 in Abu Dhabi, UAE.

While the banking and the financial technologies services undoubtedly form the backbone of any
economy; we must not discount the importance of safeguarding these sectors from the clutches of
the cyber security threats faced by companies globally. A “connected-world” is no longer a far-fetched
dream but a nearing reality. Compliance synergies, disruptive technologies, artificial intelligence, cyber
vulnerabilities, cloud migration are all concepts keeping the banking and financial technology experts
on their toes.

With the 2nd Edition FinTech Security Summit, we bring to you answers and international solutions
to all your cyber security and technologies woes with a power packed gathering over a week with a
C|CISO training between 03 – 06 December 2017 followed by our summit on the 7th December 2017.

Meet and network with over 200 experts from the Middle East and world over to come up to speed with
the dynamic financial technologies market.

TOPICS’ OVERVIEW
• Understanding the road towards digitization and its dynamics
• Decoding the regulatory framework for fintech startups in the region
• Is Artifical intelligence, blockchain and compliance innovation and answer to your expensive
regulatory issues?
• Can RegTech save the financial industry from complicated and expensive regulatory
compliance issues?
• The Role of Cloud in the Modern Enterprise in MENA – Past, Present and Future impact their
internal shortcomings may have on their external vulnerabilities, and vice versa
• Transforming the Middle East financial services sector with Blockchain

www.fintechsecuritysummit.com
CONFIRMED SPEAKERS

Anshul Srivastav
Chief Information Officer and Charles L. McGann, Jr.
Digital Officer COO
Union Insurance, UAE McGann Consulting Group, USA

Hock Lai Chia Saleem Ahmed


President Senior Vice President - Head of
Singapore Fintech Association, Information Technology
Singapore Sharjah Islamic Bank

Mohammad Shaheed Khan


Vice President Abdullah Mutawi
Shariah Compliant Banking Partner
Gulf International Bank, Bahrain Baker Botts, UAE

Ahmed Baig James Greenwood


Co-Founder Chief Technology Officer
CISOCONNECT BankCLEARLY, UAE

Tareq Moustafa Dreiza Malikkhan Kotadia


Partner - Head of IT Advisory Mentor
KPMG The FinLab Pte Ltd, Singapore

Rajesh Kumar
Director Alexander AA
Compliance Risk Control – AME Director, Cyber Intelligence & Fraud
Standard Chartered Bank, UAE Investigations, VISA, UAE

www.fintechsecuritysummit.com
FINTECH SECURITY SUMMIT
SINGAPORE - SNAPSHOT
KEY FACTS & FIGURES

ATTENDEE PROFILE PARTICIPATING NATIONS


Consultants &
Analysts

Directors,
CEO’s, CIOs,
Head, AVPs & CTOs & VPs
Senior Managers

PAST SPONSORS
PRESENTING PARTNER DIAMOND PARTNERS PLATINUM PARTNER

GOLD PARTNERS SILVER PARTNERS BRONZE PARTNER

SESSION PARTNERS EXHIBIT PARTNERS

www.fintechsecuritysummit.com
Reasons why you cannot miss the 2nd Edition FinTech Security Summit:
• Develop your competitive strategy by exploring the long- and short-term trends shaping the future
of technology for the financial industry and their security implications
• Explore how to build new internal efficiencies and improve customer experience with sessions
dedicated to Cloud, Blockchain and Regtech
• Network with your peers, building new connections with the region’s technological pioneers and
leaders
• Power packed agenda with 25+ global speakers addressing the most pressing issues in the financial
technologies market
• Hear about not only innovative technologies but also about the security vulnerabilities faced by
organisations on a daily basis while implementing these technologies

Client Testimonials

“Great event with broad spectrum of delegates actively participating with interesting
questions and good opportunity to network with thought leaders”
Citibank

“Well organised, good topics in presentations, informative discussions. Met many influential
personalities and had a great time networking”
Nepal Rastra Bank

“I am one of the first Batch of CCIOS certified professionals. I have gone through the entire
CCISO program which now directly relates to my current / previous job functions. CCISO
Body of Knowledge will truly prepare me for a role as a leader in InfoSec filed. I am confident
that I will be using almost everything I learned in the CCISO program. I am glad and CCISO is
Great certification program for information security executives.”
Cyber Security Agency, Singapore

“The certification has helped me to have a better view of the CISO or Information Security
Officer work areas that need focus. The information I learned in the class has helped me
improve my security program by expanding in the information of budgeting/ risk/ and auditing
areas that are major concerns in the CISO role”
Bank of America

“I took live in-person training. Compared to the other certifications I have it the CCISO
program is more theoretical. I had more technical background and I really missed the
management’s point of view on the security. From this perspective CCISO, was the right
choice for me to catch up on the management concepts with. I now know how to manage
risk and how to deal with information security better”
Mobile Credit Payment Pte Ltd

“I read the CCISO Body of Knowledge thoroughly to prepare for the exam. I found the exam
somewhat difficult as there were numerous topic areas that are worthy of questions.
Earning the CCISO certification assures my management that I have the required skills
and knowledge. The CCISO program material helps me because I am constantly applying
knowledge to security posture of Organization”
Singtel

“I feel that the summit was an excellent opportunity to share knowledge on various
related topics related to security, blockchain, regtech, IoT etc. The speakers were eminent
personalities in the field”
Fintech Global Group

“By providing access to some of the best cybersecurity minds and practitioners, EC-Council
has succeeded in delivering top-notch education, training and a networking platform in
Singapore”
Standard Chartered

www.fintechsecuritysummit.com
AGENDA

07.45 – 08.30 Registration

08.30 – 08.45 Welcome address by Sean Lim, COO, EC-Council

Keynote
Understanding the road towards digitization and building the necessary
security infrastructure for it
08.45 – 09.15 • Role of accelerator programs
• Testing and developing innovative concepts in a regulatory lenient but
controlled environment
• Fintech self-regulation

Special Address
Decoding the regulatory framework for fintech startups in the region
09.15 – 09.45 • Role of international cooperation
• Favorability of the UAE to become the fintech hub of the MENA region
• National Innovation Strategy - UAE

International Keynote
09.45 – 10.00 Topic to be announced
Hock Lai Chia, President, Singapore Fintech Association, Singapore

Knowing and Managing Legal Risk in Cyber Security


10.00 – 10.20
Abdullah Mutaw, Partner, Baker Botts, UAE

10.20 – 10.35 Reserved for Technical Address

10.35 – 10.55 Coffee & Networking Break

10.55 – 11.10 Reserved for Technical Address

Panel Discussion
Blockchain, Cloud and Artificial Intelligence: Modern Innovations are
Rethinking the Future of Cybersecurity
As the global markets grow in complexity and the threat of sophisticated
cyberattacks escalates the amount of new financial regulation has skyrocketed.
Keeping current with all of these new provisions is a costly and complicated
endeavor — one with no end in sight.
• Using AI and chatbots for better customer service
• From double entry book-keeping to Blockchain ledgers
11.10 – 11.55 • Combating sophisticated cyber attacks

Session Chair
Anshul Srivastav, Chief Information Officer and Digital Officer,
Union Insurance, UAE

Panelist
Charles L. McGann, Jr.
COO, McGann Consulting Group, USA

www.fintechsecuritysummit.com
AGENDA

Panel Discussion
Addressing the cyber security vulnerabilities in the FinTech Era
• Threat environment is more dangerous and complex than ever
• Bolstering your cyber defense and responding to new threats as they
emerge at a significantly lower operational cost
• Aligning Islamic Banking with FinTech

11.55 – 12.40
Session Chair
Ahmed Baig, Co-Founder, CISOCONNECT

Panelist
James Greenwood, Chief Technology Officer, BankCLEARLY
Saleem Ahmed, Senior Vice President - Head of Information Technology,
Sharjah Islamic Bank

Cyber Security in the age of Regtech?


• Intersecting regulation with innovation
12.40 – 13.00 • Mitigating risks using disruptive technologies to combat cyber security, fraud
detection, regulatory reporting, risk data aggregation and stress testing
• Managing compliance challenges and improving data management while
reducing costs

13.00 – 14.00 Pray Break & Luncheon

14.00 – 14.15 Reserved for Technical Address

Panel Discussion
With the importance of cloud computing for growing your business; how
prepared are you to combat the security challenges due to scalability?
• Attitude of the MENA region about cloud adoption – Early adopters have
already started reaping the benefits
14.15 – 15.00 • Increasing employee engagement
• Accelerating faster innovation while creating a truly secure business
environment

Session Chair
Tareq Moustafa Dreiza, Partner - Head of IT Advisory, KMPG

www.fintechsecuritysummit.com
AGENDA

15.00 – 15.15 Reserved for Technical Address

Panel Discussion
With security as the basis, how is the Middle East financial services
sector transforming with Blockchain?
• Resilience against cyber attacks
• Differentiating with technological capabilities
• Innovation from startups in this space
15.15 – 16.00
Session Chair
Malikkhan Kotadia, Mentor, The FinLab Pte Ltd, Singapore

Panelist
Rajesh Kumar, Director, Compliance Risk Control – AME
Standard Chartered Bank, UAE

16.00 – 16.10 Closing Note

16.10 Onwards High Tea & Networking

www.fintechsecuritysummit.com
EXPERTS TO BE INVITED

H.E. Mubarak Rashid Khamis Al Jordan Savvides


Mansouri Head of Information Security, National
Governor, UAE Central Bank Bank of Bahrain (Bahrain)

H.E. Mr. Rasheed Mohammed Al Maraj Hadyah Fathalla


Governor, Central Bank of Bahrain Executive Director, C5 Accelerate
(Bahrain)
Rowland Johnson Internationalisation
Director, CREST (UK) Mohammad Shaheed Khan
Vice President, Shariah Compliant
Ian Khan
Banking, Gulf International Bank
Technology Futurist, Canada
Bruno Fonseca, CISO, AXA Waheed Rathore
Group Chief of Compliance & Anti-Money
Clive Cooke
Laundering, Abu Dhabi Commercial Bank,
Managing Director, R3
UAE
Sael Al Waary
Wai Lum Kwok
Chairman of AFS and Deputy Chief
Executive Director
Executive Officer of Bank ABC
Capital Markets, Abu Dhabi Global
Mr. Khalid Al Rumaihi Market – Financial Services Regulatory
CE, Bahrain Economic Development Authority, UAE
Board (EDB)
Mahmood Hashim Al Kooheji
Susanne Chishti Chief Executive Officer, Mumtalakat
CEO, FINTECH Circle
Adel A. El Labban
Dr. Mario Thaten Chief Executive Officer, Ahli United Bank
Digital Banking Practice Leader,
Farouk Soussa
McKinsey & Company
Chief Economist, Middle East, Citi
David Parker
Shaikh Salman bin Isa Al Khalifa
Executive Director, Bahrain EDB
Executive Director - Banking Operations,
Nathan Cushnie Central Bank of Bahrain
Head of Emerging Products and
Noboru Nakatani
Innovation MENA, Visa
Executive Director, Interpol Global
Parag Jain Complex for Innovation, Singapore
Founder & CEO, ThynkBlynk FinTech
Mohamed Roushdy
Entrepreneur
Technology Advisor, Bank al Bilad
Roshdi Osman
Azzam Jarad
Head of Security Governance and
CTO, Sporter
Deputy CISO, Banque Saudi Fransi
Sebastian Samuel
Brahma V
CIO, AW Rostamani Group
Head of Audit, Bank Muscat
Chandra Shekhar Jajware
Bhavani Suresh
Group Chief Information Officer, Khimji
Vice President, ISACA UAE
Ramdas Group

www.fintechsecuritysummit.com
Ravi Jitani Anshul Shrivastav
Director – Group IT, The Abraaj Group CIO, Union Insurance

Basab Banerjee Bruno Fonseca


Director IT, Dubai Gold & Commodities Chief Information Security Officer, AXA
Exchange (DGCX) Insurance, UAE

Yasser Zeineldin Fady Sleiman


CEO, eHosting DataFort Chief Information Officer, Waha Capital,
UAE
Khalid Owaida
Senior Vice President, Sanjay Khanna
IT & Administration, KAMCO Investment CIO, Rakbank
Company
Michael Imeson
Dr. Jassim Haji Contributing Editor, The Banker
Director of IT, Gulf Air
Neal Cross
Andrew Fawcett Chief Innovation Officer, DBS Bank,
Senior Counsel, Al Tamimi & Company Singapore

Abou Mustafa James King


Vice President – Enterprise Managed Middle East Banking Editor - The Banker,
Services & datamena at du Financial Times Group

www.fintechsecuritysummit.com
PAST EVENTS

www.fintechsecuritysummit.com
INDUSTRY SECTORS

BFSI Information Fintech Digital


Technology, Companies
TES

BFSI App and Telecom IT Start-ups


Online Transaction
companies

AUDIENCE MIX:
Experts from the banking and fintech community
MDs/ CEOs/ Founders Innovation/ Digital Transformation/ IoT
from the Middle East and globally:

Chief Security Architect/ Chief VP/SVP/AVP – Information Technology/


MDs/ CEOs/ Founders Enterprise Infrastructure
Risk Management

Directors – Innovation/ Digital


Chief Security Architect/ Chief Fintech Officer Digital Banking/
Transformation/ IoT Digital Forensics/
Regulatory compliance

Regional Head/ Head – Information Technology/


Chief Information Office Enterprise Infrastucture/ Digital Banking/ Digital
Forensics/ Regulatory
Infosec compliance/
Specialist/ Cyber Security
Infosec Architect

Chief Technology Officer Cyber Security/ Threat Leader

Investors/ Venture Capitalists/


Mentors
Chief Information Security Officer Chief Compliance Officers

Information Technology/ Risk


Management
Chief Security officer Heads/Directors of Regulatory Affairs

www.fintechsecuritysummit.com
Workshop Overview
The C|CISO Training Workshop is a premium Training
Get Certified
& Certification program for aspiring Chief Information
TM

C CISO
Security Officers that wish to penetrate the inner
sanctum of Information Security Management and
Leadership. During the C|CISO Training Workshop,
participants will be challenged to develop a business
continuity plan for a company in a given industry and Certified Chief Information Security Officer
situation, use metrics to communicate cyber risk for

TRAINING WORKSHOP
different audiences, and describe how to align a given
security program with the goals of the business in which
it resides, among many other exercises. The challenges
03rd - 06th December, 2017
are aimed at helping aspiring leaders develop business
acumen, practice on their managerial skills and further UAE
hone their technical expertise by diving deep into how
security should be injected into the procurement process
and how a CISO should manage budgets and assets. The 5 Domains
Domain 1: Governance (Policy, Legal & Compliance)
Course Outline Domain 2: IS Management Controls and Auditing
Management
Duration: 4 DAYS Domain 3: Management – Projects and Operations
Certification: C|CISO Certified Chief Information (Projects, Technology & Operations)
Security Officer Domain 4: Information Security Core Competencies
On-site exam proctoring Domain 5: Strategic Planning & Finance.
(1 year exam voucher-redeem option)

The Certified CISO (C|CISO) course has certified leading The Exam
information security professionals around the world and
is the first of its kind training and certification program The C|CISO Exam was developed by practicing CISOs
aimed at producing top-level Information Security and based on the real-world scenarios professionals
Leaders. The CCISO does not focus solely on technical from across industries have faced while securing some
knowledge but on the application of information security of the most prestigious organizations in the world.
management principles from an executive management The C|CISO Exam is available at Pearson VUE testing
point of view. The program was developed by seasoned centers around the world. Applicant’s knowledge in all
CISOs for current and aspiring CISOs. five of the C|CISO Domains will be tested on the exam
that focuses on scenario-based questions and requires
C|CISO Material assumes a high-level understanding of applicants to apply their real-world experience in order
technical topics and doesn’t spend much time on strictly to answer successfully. To that end, in order to qualify
technical information, but rather on the application of to sit for the C|CISO Exam after taking the CCISO
technical knowledge to an information security class, applicants have at least 5 years of information
executive’s day-to-day work. The C|CISO aims to bridge security experience in 3 or more of the CCISO Domains.
the gap between the executive management knowledge Any student lacking this experience may take the EC-
that CISOs need and the technical knowledge that many Council Information Security Management exam and
aspiring CISOs have. This can be a crucial gap as a earn the EISM certification. In order to sit for the C|CISO
practitioner endeavors to move from mid-management exam and earn the certification, candidates must meet
to upper, executive management roles. Much of this the basic C|CISO requirements. Candidates who do not
is traditionally learned as on the job training, but the yet meet the C|CISO requirements but are interested
C|CISO Training Program can be the key to a successful in information security management can pursue the
transition to the highest ranks of information security EC-Council Information Security Management (EISM)
management. certification.

www.fintechsecuritysummit.com
OUR EXPERT TRAINER

Charles L. McGann, Jr.


COO, McGann Consulting Group – Cybersecurity Consultant

Charles L. (Chuck) McGann, Jr., is nationally recognized information security professional recently
establishing McGann Consulting Group (MCG), focusing on small to mid-sized organizations providing
guidance in solidifying Cybersecurity programs and compliance requirements. McGann is also engaged
with the EC-Council to facilitate the Certified Chief Information Security Officer program – brining years
of firsthand knowledge and experiences to the attendees as he focuses on educating the class in
challenges they will face and how their certification will provide a validation of excellence - from Policy
and Procedures creation and review through Incident Response and Threat Mitigation.

Formally the Chief Security Strategist at Salient CRGT, a government contractor providing IT and Security
services to DOD, Army, USPS, VA among other agencies. In his current role of Chief Cyber Strategist,
McGann focused on leveraging existing Salient CRGT capabilities among the Federal Civilian agencies
as well as reviewing emerging vendors for possible partnerships engaged in increasing agency support
needs. His experience is helping solidify the strategic initiatives roadmap for Cyber and Intel Solutions.

Chuck is the former Corporate Information Security Officer for the United States Postal Service (USPS).
In this capacity, he had the responsibility of securing an intranet that is one of the largest maintained by
any organization in the world, with over 200,000 workstations; over 45,000 retail terminals; more than
16,000 servers and over 220,000 Mobile Delivery Devices. The USPS infrastructure encompasses over
600 business applications that support all aspects of business operations as well as movement of the
mail.

In his 28 years with the Postal Service, Chuck held numerous positions, Including: Manager, Information
Systems, Acting Postmaster, Business Systems Analyst, Business Project Leader, Distributed Systems
Security Specialist, Manager, Information Security and Incident Response Team Manager.

Chuck holds an MBA from Strayer University, a Bachelor’s degree from the University of Massachusetts,
and two Associate’s degrees from Springfield Technical Community College. He is a certified information
systems security professional (CISSP), a certified information security manager (CISM) and holds a
certification for information assurance methodology (IAM) from the National Security Agency (NSA).

He is the former Co-Chair of the (ISC)2 Government Advisory Board on Cyber Security, and served as
a Government Information Security Leadership Awards Judge for the last three years and chaired the
Federal CISO for CISO’s quarterly meetings. He is also a former member of the Symantec Government
Education Advisory Board, and the RedSeal Customer Advisory Board, Over his distinguished career
has received numerous awards and recognition. He belongs to various national, regional, and local
organizations such as the Government Technology Research Alliances’ group, FBI InfraGard, National
Security Agency (NSA), and Information System Audit and Control Association (ISACA) to name a few.

www.fintechsecuritysummit.com
TM

C EH
Certified Ethical Hacker

CERTIFIED ETHICAL HACKER


TRAINING PROGRAM
December 03rd-06th, 2017

Most Advanced Hacking Course


The Certified Ethical Hacker program is the pinnacle of the most desired information security training
program any information security professional will ever want to be in. To master the hacking technologies,
you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools
and techniques used by hackers and information security professionals alike to break into an organization.
As we put it, “To beat a hacker, you need to think like a hacker”.
This course will immerse you into the Hacker Mindset so that you will be able to defend against future
attacks. The security mindset in any organization must not be limited to the silos of a certain vendor,
technologies or pieces of equipment.
This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic
process. Here, you will be exposed to an entirely different way of achieving optimal information security
posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will
be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking
in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access,
and covering your tracks.

Underground Hacking Tools


The hacking tools and techniques in each of these five phases are provided in detail in an encyclopedic
approach to help you identify when an attack has been used against your own targets. Why then is this
training called the Certified Ethical Hacker Course? This is because by using the same techniques as the
bad guys, you can assess the security posture of an organization with the same approach these malicious
hackers use, identify weaknesses and fix the problems before they are identified by the enemy, causing
what could potentially be a catastrophic damage to your respective organization.

About the Program


This is the worlds most advanced certified ethical hacking course with 18 of the most current security
domains any individual will ever want to know when they are planning to beef up the information security
posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies,
commonly used by hackers.
Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you
“live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking
tools to immerse you into the hacker world.
As “a picture tells a thousand words”, our developers have all this and more for you in over 1685 graphically
rich, specially designed slides to help you grasp complex security concepts in depth which will be presented
to you in a 4 day hands on class by our Certified EC-Council Instructor.
Course Outline
1. Introduction to Ethical 7. Sniffing 14. Hacking Wireless Networks
Hacking
8. Social Engineering 15. Hacking Mobile Platforms
2. Footprinting and
9. Denial-of-Service 16. Evading IDS, Firewalls, and
Reconnaissance
Honeypots
10. Session Hijacking
3. Scanning Networks
17. Cloud Computing
11. Hacking Web Servers
4. Enumeration
18. Cryptography
12. Hacking Web Applications
5. System Hacking
13. SQL Injection
6. Malware Threats

What is New in CEH Version 9 Course


• Focus on New Attack Vectors
• Emphasis on Cloud Computing Technology
• CEHv9 focuses on various threats and hacking attacks to the emerging cloud computing technology
• Covers wide-ranging countermeasures to combat cloud computing attacks
• Provides a detailed pen testing methodology for cloud systems to identify threats in advance
• Emphasis on Mobile Platforms and Tablet Computers
• CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and
covers countermeasures to secure mobile infrastructure
• Coverage of latest development in mobile and web technologies
• New Vulnerabilities Are Addressed
• Heartbleed CVE-2014-0160
• Heartbleed makes the SSL layer used by millions of websites and thousands of cloud providers
vulnerable.
• Detailed coverage and labs in Module 18: Cryptography.
• Shellshock CVE-2014-6271
• Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such
as Linux and OS X.
• Detailed coverage and labs in Module 11: Hacking Webservers
• Poodle CVE-2014-3566
• POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a
service, allowing them to control your account without needing your password.
• Case study in Module 18: Cryptography
• Hacking Using Mobile Phones
• CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing,
DDoS attack, etc.) using mobile phones
• Courseware covers latest mobile hacking tools in all the modules
• Coverage of latest Trojan, Virus, Backdoors
• Courseware covers Information Security Controls and Information
• Security Laws and Standards
• Labs on Hacking Mobile Platforms and Cloud Computing
• More than 40 percent new labs are added from Version 8
• More than 1500 new/updated tools
• CEHv9 program focuses on addressing security issues to the latest operating systems like Windows 8.1
• It also focuses on addressing the existing threats to operating environments dominated by Windows 7,
Windows 8, and other operating systems (backward compatibility)

The goal of this course is to help you master an ethical hacking methodology that can be used in a
penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are
highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!

Accredited & Recognized by

www.eccouncil.org/programs/certified-ethical-hacker-ceh
Get Involved
Speaking Opportunities
Jyoti Punjabi
Mobile: +91-99636-54422
Email: jyoti.punjabi@eccouncil.org

Alliances & Delegate Sponsorship & Exhibiting


Registrations Opportunities
Meghana Vyas Basant Das
Mobile: +91-84240-61022 Mobile: +91-96526-14411
Email: meghana.vyas@eccouncil.org Email: basant.das@eccouncil.org

www.fintechsecuritysummit.com

S-ar putea să vă placă și