Day 1 – 15th of December 2017:
Cybercrime – A Middle-East and North Africa (MENA) regional perspective
By CHERIF DJERBOUA (AMEA Regional Technical Leader, Trend Micro).

This session will explore the cybercriminal ecosystem in this region and beyond and the threat landscape that may target MENA organizations big and small, either in the private or public sector.
Cybersecurity – an enabler to help organizations with digital transformation.
By ISLAM EL-SHAFIE (Regional Security & Compliance consultant, Microsoft)

The Digital transformation that is underway in most organizations will change the nature of their security tactics, organizations will have to shift their approaches and adopt modern & intelligent protection, detection & response components that can cater to the rapidly growing threat landscape.
Diffusing A Bomb With Reverse Engineering – Workshop
By FADY OTHMAN (Information Security Consultant at ZINAD IT)

A while ago I stumbled upon an online reverse engineering challenge, I downloaded the challenge and from the beginning it caught my attention. I started reversing and I realized that it was a well designed challenge that is perfect to teach reverse engineering. after solving the challenge I was disappointed when I looked online to see how other people solved it because it was solved in a way that teaches them too little.
In this workshop I will “diffuse” the “bomb” using multiple methods and multiple tools (hopefully IDA, GDB, EDB, Radare2) to make the most of it and trying to teach something new on the way.
Kiwis approach to GRA
By AHMED ELASHMAWY (Senior consultant at Axenic Ltd)

Governance, Risk, and compliance (GRC), are commonly seen as a tick box exercise for organizations and techies in security.
However, Kiwis have nailed their Governance, Risk and Assurance (GRA) model within government agencies, as well as, a lot of private sector organizations. Over the past few months, I have come across a number of US, European and Australian professionals who expressed how impressed they were with New Zealand GRA approach.
In this session, I will share with the audience how various aspects of information security all hang together in New Zealand.
Defending Application by putting them under the Proactive SOC spotlight. – Workshop
By MOHAMED ALFATEH (Sr. Consultant in ZISS team (ZINAD Information Security Services))

Most companies are trying to shift their Security Operations Center (SOC) from a reactive to a proactive posture. Putting the application layer under a proactive monitoring and analysis is a critical activity to anticipates and pre-empts incidents to prevent their occurrence. In this talk we will discuss different techniques to proactively anticipate web threats and act upon anticipation proactively rather than passively. During the session, we will show how you could use OWASP AppSensor to feed data into SOC and to respond to analysis results. The session will introduce number of corresponding SIEM use cases that could be implemented in deferent SIEM technologies.
From IT to TI: Practically applying Threat Intelligence in your IT environment.
By BAHAA OTHMAN (IT Security Manager, the Egyptian Exchange)

In this talk, we will try to answer some of the questions that a lot of users asks about threat intelligence, why it will be the next big thing in Security industry?How to apply the concept practically in the organization? What are the skills needed for Threat Hunting? What are the market capabilities? What do these keywords mean and how it applies to IT (IOC, TTP, YARA, STIX). We will also cover Threat Models: CKC, ATT&CK, STRID and how to Use CTI for SOC Use case design.
Lock Picking Intro Session.
By AHMED ELASHMAWY (Senior consultant at Axenic Ltd)

This is an introductory session on Lockpicking that will allow CSCAMP2017|8th year attendees new to that activity understand how locks work, types of locks, Tools and the importance of understanding lock picking.
Day1 Lock Picking Village.
By AHMED ELASHMAWY (Senior consultant at Axenic Ltd)

Physical security is essential for maintaining systems security. If you gain physical access to servers, network equipment or racks hosting appliances, then all other security controls can be rendered useless. Red teams around the world test physical security alongside with digital security. For the first time in Egypt, CSCAMP 2017 introduces lock picking practices for security professionals. Join us in the Hacking Village and enjoy the interesting and challenging lock sport. We will provide you with a set of basic tools, a couple of transparent training locks and a variety of padlocks, cylinder locks, and knob locks to play with.
Day 1 : Ask The Experts.
By AHMED NABIL (IT Manager | Security, Networking, System Engineering)

Grab this chance and get the opportunity to have a one to one discussion with a Security expert in a specific cyber security field. Prepare all your top of mind questions and share your experience to better improve our community. Each user will have maximum of 10 minutes with one of the experts on different tables. Discussions are served based on First In First Out.
Experts will cover variable topics between :
Cyber Security Career Advice, Malware Analysis, Capture the Flag Competitions, Digital Forensics, Working in International Companies, Security Management, Pen Testing, Secure Coding, Others.
Panel Discussion: What’s new with OWASP Top 10. | Workshop
By AHMED SAAFAN, HASSAN MOURAD, MOHAMED ALFATEH, and FADY OTHMAN
OWASP released a major update to the OWASP top 10 project. In this session we will look at what is new in the 2017 version. We will discuss the major changes to the top 10 list and whether or not such changes brings better value to application security.
Understanding the threat landscape targeting the enterprise.
By ADHAM MOHAMAD (Cyber Security Architect, CyShield)

We all want to provide a secure environment for our business. We also know that implementing security solutions and having scheduled security checks can increase the cyber armor of the company, yet all of this can be circumvented with a tiny misconfiguration, lack of a policy or a zero day. It`s all about understanding the risk in order to choose the proper mitigation and alarming technique.
In this talk we will get a quick grasp at the recent attacks targeting major organizations and talk about some recent attack methods and how the current security mechanisms fall behind in an attempt to understand why the traditional security mechanisms tend to fail.
Day1 Closing Note: A Closer Look into Lawful Interception Platforms and Cyber Espionage in the Middle East.
By DR. AHMED SHOSHA (Senior Threat Researcher at FireEye)

Many have heard about Hacking Team and Gamma, the infamous spyware sellers to governments, those companies are only the tip of a black iceberg. In this session, we will shed the light on the players in the Lawful Interception market in the Middle East and their malware products.
In addition, we will discuss the threat intel research to identify, detect and track the abusive usage of those spyware platforms in cyber espionage campaigns.
Gala Dinner & Entertainment Night.
We are delighted to invite all attendees, speakers and sponsors to CSCAMP2017 | 8th year Gala Dinner . Don’t miss this fantastic evening full of entertainment, amazing food and a friendly atmosphere.
Spaces are limited to this awesome annual event, so don’t delay.
Professional and Corporate tickets will be able to access the Gala Dinner For free. Academic tickets will need to add an extra 100 EGP.
Day 2 – 16th of December 2017:
Exploiting cloud synchronisation to hack IoTs
By ALEX “JAY” BALAN | Chief Security Researcher, Bitdefender

Most hacks against IoT require either proximity or some other form of direct access (port forwarding/UPnP). But what if devices could be hacked to full remote code execution and root access without direct access and from the other side of the world ? And what if the number of devices susceptible to this attack could be large enough to be the next big IoT botnet ?
In this talk we’ll describe the methods and tools used in IoT vulnerability research and our findings on a very popular smart plug: breaking their so-called encryption to capture sensitive data, remote control of the plug and full remote code execution by exploiting the mobile app <-> cloud <-> smart plug synchronisation protocols. All this while the plug is “safely” in a home, behind NAT.
Arab Regional CTF Competition.
By CYBERTALENTS

For the first time in Egypt, Arab Regional Cybersecurity Capture the Flag Competition will be organized by CyberTalents with Trend Micro as a strategic partner and hosted by Cairo Security Camp on Saturday, 16 December.
In 2017, CyberTalents organized three National CTFs in Egypt, UAE and Oman. The Winning Teams will travel to compete in Arab Regional CTF to win Arab Champions Trophy.
Hacking API the right way.
By ESLAM SALEM | CEO & Co-founder @ Shieldfy

APIs have been used by every web/mobile/desktop application to communicate with each other. We will go through the techniques used to find the weaknesses, exploit it and also the countermeasures used by developers.
What’s your security strategy to support digital transformation?
By CHERIF DJERBOUA | AMEA Regional Technical Leader, Trend Micro.

This talk will expand on the keynote session on day1 and will focus on the latest trends in cybersecurity and information security. We will discuss some of the best-practices on how to tackle the growing threats detailed in the keynote and how to select the right security strategy to support digital transformation.
JavaScript obfuscation, a stealthy approach for infection.
By AMR ELKHAWAS | Security Consultant, Orange Business Services

We will talk about JavaScript malware and how it can easily be used to infect people unwillingly through normal browsing, how obfuscation is used to hide from of the shelf virus scanners and threat scanners in browsers, I will also explain how to reverse engineer obfuscated malware manually and do a either a recorded demonstration or a live one.
Repeat: Lock Picking Intro Session.
By AHMED ELASHMAWY | Senior consultant at Axenic Ltd

This is an introductory session on Lockpicking that will allow CSCAMP2017|8th year attendees new to that activity understand how locks work, types of locks, Tools and the importance of understanding lock picking.
Day 2 Lock Picking Village.
By AHMED ELASHMAWY | Senior consultant at Axenic Ltd

Physical security is essential for maintaining systems security. If you gain physical access to servers, network equipment or racks hosting appliances, then all other security controls can be rendered useless. Red teams around the world test physical security alongside with digital security. For the first time in Egypt, CSCAMP 2017 introduces lock picking practices for security professionals. Join us in the Hacking Village and enjoy the interesting and challenging lock sport. We will provide you with a set of basic tools, a couple of transparent training locks and a variety of padlocks, cylinder locks, and knob locks to play with.
Day 2 : Ask the Experts.
By AHMED NABIL | Founder & CEO of Shieldfy

Grab this chance and get the opportunity to have a one to one discussion with a Security expert in a specific cyber security field. Prepare all your top of mind questions and share your experience to better improve our community. Each user will have maximum of 10 minutes with one of the experts on different tables. Discussions are served based on First In First Out.Experts will cover variable topics between :
Cyber Security Career Advice, Malware Analysis, Capture the Flag Competitions, Digital Forensics, Working in International Companies, Security Management, Pen Testing, Secure Coding, Others.
KRACK all the Things.
By ANWAR MOHAMED | Cyber Security Engineer, CyShield

Everything with Wi-Fi has a newly discovered security flaw, another widespread vulnerability affecting practically everyone and everything that uses Wi-Fi was revealed, allowing hackers to decrypt and potentially look at everything people are doing online. The disclosed vulnerability is in the WPA2 encryption protocol. Most devices and routers currently rely on WPA2 to encrypt your WiFi traffic, so chances are you’re affected. This vulnerability affects the Wi-Fi protocol itself—not specific products or implementations, moreover, if a hacker gains access through this type of attack, that person would have a front row seat to everything on your network.
KRACK (short for, uh, Key Reinstallation AttaCK) targets the third step in a four-way authentication “handshake” performed when your Wi-Fi client device attempts to connect to a protected Wi-Fi network. The encryption key can be resent multiple times during step three, and if attackers collect and replay those retransmissions in particular ways, Wi-Fi security encryption can be broken. In this talk w’ll get deep into this serious vulnerability revealing its complications and advised mitigations.
CASB: Enterprise grade visibility, control & protection for your cloud apps.
By ISLAM EL-SHAFIE | Regional Security & Compliance consultant, Microsoft

Deep dive into Cloud App Security, exploring different scenarios and use cases where CAS becomes vital and demonstrating the solution capabilities/ features.
Countering the evolving cyber security challenge with Fortinet Security Fabric.
By AMIR EL DEMERDASH | Senior Presales Engineer

The adoption of a digital business model is requiring networks to evolve rapidly, requiring applications, data, and services to flow faster across an increasingly diverse landscape of users, domains, and devices As a result, today’s networks and their related security are also increasingly borderless. IoT and cloud applications, services, and infrastructure now require organizations to worry about an attack surface that may not even be visible to IT.
Fuzzing at The Edge of your Network.
By LOAY ABDELRAZEK | Cyber Security Researcher

With the evolution of mobile generations to provide an enhanced technology and speeds the introduction and deployment of 4G and 5G will definitely be a factor in the steep increase of the exploding number of IoT devices.
With the support of GSM connectivity on those devices and the need to provide more coverage at home/office, this introduces a new threat..femtocells.With its location at the edge of the device’s network and the mobile operator network, this provides a common threat point for both.
In this talk, we will talk about how to use fuzzing of the GTP protocol used for 4G/5G communication in order to compromise the widely exposed femtocells and what the remediations that should be taken.
Spy On The Spy.
By MUSTAFA SAAD | Cyber Security Researcher

Mobile commercial spyware, also referred to as mobile Remote Access Tools (mRATs), poses an increasing threat to both Smart phone users and corporate enterprises. mRATs are readily available, easy to install, and frequently marketed as completely undetectable.
Most of these tools are announced online to individuals, who are interested in catching cheating spouses, child monitoring, employees monitoring, or even spying on targeted persons. This is a serious problem for organizations as it increases the chance of corporate data loss including intellectual property, network credentials, privileged communications, and employee locations.
On the other hand, the personal usage of such tools puts the individual smart phones user’s privacy at risk because they allow the attackers to spy on victim’s phone calls and SMSs, activate the camera and microphone, obtain all photos, videos, notes, calendar events, and history of installed chat and social media applications , as well as monitor his or her location. These tools are sold on a subscription basis where the attackers purchases the mRAT for a period of time and the vendors deliver to them a command and control web application to monitor their victims in real time and store all intercepted data in their backend database servers.
In this presentation, I will show that many of these commercial spy backend servers are completely insecure and i have no difficulties in breaking into them. I investigated about seven different commercial spy backend servers and the results were catastrophic. I was able to access more than 320 thousands attacker’s credentials all over the world and 3.4 terabytes of sensitive victim’s records which stored in these servers. These huge records contained all sorts of victim’s sensitive data: phone calls logs and recordings, sent and received SMSs, contacts, internet history, photos, audio- and video-records, calendar events, locations, chat and social media history, credit card data and money transaction records, etc. Some hacked attackers credentials gave me a full control over the victim’s cell phone ambient recording and live capturing his or her front and rear camera.
Focus Group: Security Management Problems.
By AHMED SAAFAN | The director of development and information security at zlabs

The information security management focus group is a simple way to run a productive meeting among security professionals to discuss and get conclusions on complex high level security problems problems that most of us face in an fast shifting industry. The idea is to share the collective wisdom and experience of the audience whom has a vast and diverse backgrounds, to solve the most prevalent painful problems of the focus group. We learn from the best and share with the best. It a powerful way to get ahead of problems by taking experience from people who have similar problems and a good way to share your knowledge and enrich the local community. We come with passions and ideas that we want to share with each other or complex problems that we want to know what others are doing about. We connect with each other and create a community around topics that we’re passionate about.
The group begins with nothing more than a roomful of great people and some paper and pens. And the magic begins! We create an agenda of topics or problems that are relevant to most of the audience. It’s simple: write the name of your idea on a piece of paper, announce it to your friends, and put it on the agenda. After grooming and grouping, we end up with a full agenda of interesting topics and problems to discuss. We convene our sessions, sharing and creating new knowledge, and connecting with each other. We make new connections and invent new ideas.
Bring on your passion, ideas and problems!
Fire Chat: Bitcoin Business Challenges & Opportunities.
By AHMED ELASHMAWY | Senior consultant at Axenic Ltd
By OMAR ABDELRASOUL | Co-founder, Bitcoin Egypt

Following the news of the first bitcoin exchange launching in Egypt last August, Central Bank of Egypt issued a statement that no entities have been authorized to trade bitcoin in the country.CBE clearly announced that cryptocurrencies are not recognized in financial and banking transactions.
Although Bitcoins value is increasing rapidly ( 17,000 USD/bitcoin), putting regulations is mandatory to protect people’s money especially after the latest hack of NiceHash, the largest crypto-mining marketplace.
In this session, we are having a fire chat with omar abdelrasoul co-founder of Bitcoin Egypt platform to know more about the challenges to legalize his startup and the opportunities he sees in Egypt to launch the first bitcoin exchange in Egypt.
About
Cairo Security Camp is an annual event targeting the Information Security Community of the Middle East and North Africa (MENA Region). IT Professionals and security practitioners from throughout the region are invited to attend. The Conference purpose is to gather, in one place, everyone interested in helping to improve and enrich the Information Security field in the MENA region. Our Goal is to raise the level of information security field in the MENA region, hoping that one day we live up to international standards.
About BlueKaizen
Bluekaizen is a fast growing company that focus on cyber security education either for students, professionals or Management level. Either for individual or organization. We provide educations via training, conferences, webinars, magazines, cyber security summer camps, Assessments, cyber exercises & games and much more.
Place: Cairo, EGYPT.
Date: 15th of December for Training – 16th, 19th of December 2017 for the conference.
Organizers: BlueKaizen.org and Security Kaizen Magazine.
Sponsors
Do you need to promote your product or services?
Do you need to reach Security Experts and Security Professionals?
Let it be known through sponsoring Cairo Security Camp or Security Kaizen Magazine.
Cairo Security Camp is the first annual conference organized by an Arab Country. Our conference covers all aspects of Information Security both technical and managerial aspects. In addition to being the first, Cairo Security Camp 2012 will proudly be hosting a variety of experienced speakers from very renown companies and organization To request for a sponsorship prospectus or find out more about sponsorship opportunities.
Please contact:
mahitab.afify (at) bluekaizen (dot) org