Prior to his current post in IBM MEA, Tamer served as the IBM Canada Security Services CTO and was responsible for leading the delivery of complex managed security services to Canada’s largest governments, financial institutions, telecommunications corporations, and other industries. Additionally Tamer was responsible for IBM Canada’s security architecture and strategy group which provided the innovation and vision that drove customer solutions. Dr. Tamer Aboualy is an active security practitioner and has presented multiple times at ISACA, VISA, the Canadian Bankers Association, and government security events around the world. He holds multiple security patents and education includes a Ph.D in Information Systems, Masters of Science in Telecommunications and Networks Management, and Bachelors of Information Systems.
Speech Topic & Synopses
The second era of the commercial Internet has seen threats progress from simple nuisances, to threats that significantly disrupt and impact businesses, governments and global economies. Saudi Arabia and the GCC are not immune to the changing threat landscape, in fact research indicates that Saudi Arabia is specifically the target of sophisticated advanced threats. Multiple security trend research reports indicate that the GCC and Saudi Arabia have more then double the global average of malware on computers. Saudi Arabia has also been consistently the most spammed country in the world, and Qatar also emerged as one of the most spammed countries. Interestingly enough due to a lack of monitoring, for a point in time Saudi Arabia was also the country sending the most SPAM. This session will cover the progression of internet threats from a global perspective, and also examine the threats that are local to the GCC (including Saudi Arabia) based on multiple research sources, including the findings of the IBM X-Force® 2012 Trend & Risk Report which was released on March 28th, 2013. The IBM X-Force report announces the full year 2012 findings of key highlights that were researched by IBM X-Force. From a global perspective one of the differentiators that we observed across various attacker efforts was that by targeting vulnerabilities in cross-platform frameworks, and building on a solid foundation of tried-and-true attack techniques, attackers are achieving a greater return on exploit development in 2012.