Day 1 – 23th of November 2012:
Keynote : Social Networking in Cyber Intelligence
By Jeff Bardin (Served in the USAF and the US Army National Guard as an officer).

IS Egypt Hacked?.
By Omar Sherin (member of the OWASP foundation leader’s board)

Program or be programmed!
By Osama Kamal (A Threat Intelligence Manager)

Business attacks
By Ehab Hussein & Sofiane Talmat (Two security professionals)

Download coming soon!
Minute of Fame.
By Different Project Owners
Download coming soon!
Day 2 – 24th of November 2012:
Panel Discussion: The New Emerging Threat: Mobile Malware, Vulnerabilities and Risks.
By Nader Henein & Mahmoud Nasr & Hassan Mourad



Download coming soon!
Egyptian CERT mission and vision.
By Walid Zakareya (Egyptian CERT manager)

Cloud Security – Fighting the beast on a new level.
By Wessam Maher (IT Security Engineer & acting as the IT security manager)

Hacktivism: The online disobedience!
By Ahmed Ashmawy (information security consultant)

Is Egypt Ready for a cyber warfare?.
By Ebrahim Hegazy (A Web Penetration Tester)

Computer Incident Response Planning, A Practical Approach.
By Tamer Mohamed (Security Consultant)

Open/closed source software and national infosec strategies.
By Mahmoud Tawfik & Amr Shaltoot


Day 1 – 23th of November 2012:
A Bug Hunter´s Approach to Zero day.
By Carlos Mario (senior security researcher for IOActive)

Download coming soon!
HTExploit – Bypassing your htaccess and beyond.
By Matias Katz (A Penetration Tester)

Download coming soon!
DVSSL – Damn Vulnerable SSL “Preserve Confidentiality and Loss Availability”.
By Ahmed Atef Selim (An Information Security Consultant)

Vulnerability From The Future.
By Mohamed Bedewi (A Web Penetration Tester and Network Defense Architect)

Day 2 – 24th of November 2012:
DDOS attacks – Mitigation and countermeasures of large scale attacks.
By Mohamed Rabie ( Experienced Security Consultant)

Download
Pwnage Ultimatum: A Real World Pen Test Scenario.
By Ahmed Saafan (Senior information security engineer)

Download
Java Web Application Security and Frameworks Built-in Defensible Techniques.
By Mohamed Alfateh (specialized in Security Auditing and Java /J2EE application security)

Download coming soon!
Web Application Worms
By Mostafa Siraj (An application security expert)

Digital Forensics Concepts & Techniques (Catch Cyber Criminals)
By Adel Abdel Moneim (General Manager of Raya Academy)

Download coming soon!
About
Cairo Security Camp is an annual event targeting the Information Security Community of the Middle East and North Africa (MENA Region). IT Professionals and security practitioners from throughout the region are invited to attend. Cairo Security Camp 2012 is the first Information Security Conference organized by an Arab Country.
Place: Smart Village, Cairo, EGYPT.
Date: 23th of November & 24th of November 2012.
Organizers: BlueKaizen.org and Security Kaizen Magazine.
CTF Competition:
Pre-qualification CTF started on 8th of November, it based on 4 levels that CTF players must complete within a time frame of 3 days.
The challenges will be divided into several types of challenges as follows:
1 Web
2 Exploitation
3 Reversing
4 bonus round
The top 10 players (teams) will be eligible to enter the final round at Cairo Security Camp at smart village and win valuable prizes.
Sponsors
Do you need to promote your product or services?
Do you need to reach Security Experts and Security Professionals?
Let it be known through sponsoring Cairo Security Camp or Security Kaizen Magazine.
Cairo Security Camp is the first annual conference organized by an Arab Country. Our conference covers all aspects of Information Security both technical and managerial aspects. In addition to being the first, Cairo Security Camp 2012 will proudly be hosting a variety of experienced speakers from very renown companies and organization To request for a sponsorship prospectus or find out more about sponsorship opportunities.
Please contact:
mahitab.afify (at) bluekaizen (dot) org