CISO Mag Awards – 2020

CISO Mag Awards 2020
The world is experiencing a paradigm shift in how technology is perceived. The world as we know is at the pinnacle in innovation. Both governments and private entities are actively involved.
There have been many advancements in the area of innovation, but we also faced numerous high-profile cybersecurity breaches and attacks. CISO MAG, a cybersecurity magazine published by EC-Council recognizes the need to honor those who have tirelessly worked to stop these cyberthreats. The CISO MAG Summit and Awards was a game-changer in cyberspace security. The event recognized the leadership, innovation, and sound business strategies of distinguished professionals.
The Middle East Edition of CISO MAG Summit and Awards took place at JW Marriott Marquis, Dubai on October 21, 2019. The event was only for invited guests and featured several sessions that featured cybersecurity leaders and accomplished individuals discussing pressing issues in the field. Among the myriad topics discussed were: A New Era of Cyber Threats: The shift of Self-Learning,Self-Defending Networks; Defense Follows Attack- The Outdated paradigm of cyber security; and The future of AI is Quantum.
Nearly 80 companies submitted 100 nominations for the CISO MAG Summit & Awards. An elite jury panel composed of:

This month, I was part the EC Council’s CISO Magazine with my two awards

Hall of Fame Dr Erdal Okaya
Hall of Fame Award 2021
ceh-hall-of-fame-winner-erdal-ozkaya/
ec-council-ceh-hall-of-fame-2021/

What is Cybersecurity?
Table of Contents

Cybersecurity can be described as the protection of computing systems’ confidentiality, integrity, security, and availability. It is the practice of providing security to networks and systems in order to protect them against cyber attacks.
According the definition of cybersecurity by Comodo, (blog/cyber-security/what-is-cyber-security.php) :cybersecurity is the practice of protecting systems, networks, andprograms from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.
Cyberattacks are on the rise. They target data access, modification, or deletion, as well as money extortion and disruption of normal services. Cybersecurity is a major concern for businesses today, as there has been an increase in the use of information technology to improve efficiency and effectiveness in business operations. The current business environment is so complex that there are many systems, users, networks, and devices.
Cyber criminals target all of these targets and have devised multiple methods to stop them. Cyberattacks are becoming more sophisticated and effective. Cybersecurity is now a necessity rather than a luxury for many businesses. Cybersecurity is made up of multiple layers that cover devices, networks and systems as well as users. These layers are designed to protect these targets from being compromised by attackers. These layers can be grouped into three categories in organizations: people, processes and technology.
People
This category includes users. Users are notoriously weak in the cybersecurity chain. Cyber criminals know this and target users rather than systems during attacks. Users are the perpetrators