Hatem Ali

Hatem Ali

Global Services & Intelligence Lead, MEA


company overview

FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 10,100 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.

© 2021 FireEye, Inc. All rights reserved. FireEye and Mandiant are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.


Hatem Ali is the regional lead for FireEye Global Services and Intelligence (GSI) division, covering Middle East and Africa. Prior to this role, Hatem held many cyber security technical and sales positions within companies like HPE, RSA, IBM-ISS, and Fortinet.


Hatem has devoted the last 20 years working with organizations across multiple industries on the best practices to become more resilient to cyber risk, traversing areas like security organization and architecture, security operations, threat intelligence, cyber security consulting, governance, risk, and compliance (GRC).


Hatem has a Bachelor’s degree in Computer Science and a Master of Business Administration (MBA) from the American University in Cairo, and cyber security public policy diploma from Harvard, and is a certified ISO 27001 Lead Auditor, and an active CISSP member.

Speech Topic & Synopses
The need for speed: How nimble is your Cyber Strategy ?

Arguably speaking, there was never any point in history where the cyber threat is at the current magnitude and velocity. Between geopolitical cyber campaigns to ransomware monetization, all happening at scale never seen before, how would a cyber defense leader make sure their cyber strategy is complete and agile enough to keep up?