• Events
    • IGNITE
    • ENIGMA
  • About
    • Our Organization
    • Partner With Us
    • Our Sponsers
  • Team
  • Watch
    • Talks
    • Speakers
    • Blog
  • Gallery
  • Contact-Us
    logo tedxsha black
    logo tedxsha white
    • Events
      • IGNITE
      • ENIGMA
    • About
      • Our Organization
      • Partner With Us
      • Our Sponsers
    • Team
    • Watch
      • Talks
      • Speakers
      • Blog
    • Gallery
    • Contact-Us
    Become A Member
    To avoid attacks: Think like a hacker
    2021/2/16

    In this talk, Mohamed Gamal explains what cybersecurity is, how security systems are being attacked, how security vulnerabilities are being hacked, showing how to fix it, and how to defend your data against hacker threats. Also, he analyzes how attack groups think, and the impact of the increase in cyber-piracy attacks on many sensitive institutions in any country that causes serious damage related to information, money, and lives. Mohamed Gamal is a Cyber Security Consultant in Secure Networks resident in KSA, has a +5 years' experience in cybersecurity especially offensive security specialized in penetration testing, leading red teaming operations and cyber threat intelligence. He has worked as a Dark web threat intelligence researcher for many companies and wrote about +10 reports about dark web investigations for state-sponsored attacks and data leakage.


    ABOUT THE SPEAKER
    • image speaker mohamed-gamal
      Mohamed Gamal . Cyper Security Consultant
      Mohamed Gamal is a Cyber Security Consultant in SecureNetworks resident in KSA, has a +5 years experience in cyber security especially offensive security specialized in penetration testing, leading red teaming operations and cyber threat intelligence. He has worked as a Dark web threat intelligence researcher for many companies and wrote about +10 reports about dark web investigations for state sponsored attacks and data leakage. and now he is working as an offensive security team leader in SecureNetworks conducting many types of security assessments like network , web , mobile , iot , ICS , wireless and physical penetration testing.

    • Watch Next

      • image speaker abdelrahman-elgammal
        What if I am the one who control the world?
        2021/2/16
      • image speaker omar-bahaa
        The phases of the human life cycle
        2021/2/16
      • image speaker moamen-maher
        Chasing your dream is not an option
        2021/5/28
      • image speaker heba-hassan
        Escaping the trap of social stereotypes
        2021/2/16
      • image speaker amr-sabry
        Seeing life from movies perspective
        2021/2/16
    • Connect with Us


    • logo tedxsha white

      el shorouk university,Shorouk Department, Cairo Governorate 11837

    • Our Links

      • Our Events
      • Our Blog
      • Our Talks
      • Our Speakers
      • Our Sponsers
      • Contact-US

    • Want to join our team?

      • Join Now

      Numper Of Page Views?

      Numper Views page
    © Copyright All Right Reserved To TEDxSHA Made With Ahmed Waled