Connect with us

GISEC

GISEC Global 2025: OPSWAT to Participate as the Diamond Sponsor

Published

on

Sertan Selcuk, the VP for METAP and CIS at OPSWAT, says, the company will highlight how the rise of AI-driven exploits, encrypted attacks, and increasingly complex network environments demands a new approach to cybersecurity

What solutions are you highlighting at GISEC this year?
OPSWAT is participating in GISEC as a Diamond sponsor this year and we are proud to showcase our latest cybersecurity advancements in critical infrastructure protection (CIP). We shall have live demos and sessions, through OPX labs, offering practical insights on safeguarding vital systems and networks. Alongside the Lab, will be OPSWAT’s Nuclear Plant Model Reactor, a display that underscores the company’s expertise in securing sensitive environments like nuclear power plants.

How does GISEC help your company engage with the Middle Eastern cybersecurity market?
Our GISEC participation allows us to demonstrate our steadfast commitment to delivering IT/OT cybersecurity solutions and fostering the cyber talent that the region needs to defend its critical infrastructure and sustain economic progress.

Alongside the product showcase and demos, a couple of senior executives from OPSWAT will be holding sessions. During day two, on the Government Stage, hosted by Dubai Electronic Security Center, OPSWAT Founder and CEO, Benny Czarny, will present “Breaking the Firewall: Revolutionizing Cyber Defense for a Connected World”. He will make the case for a fundamental rethinking of the traditional firewall, highlighting how the rise of AI-driven exploits, encrypted attacks, and increasingly complex network environments demands a new approach to cybersecurity.

Also on day two, on the Critical Infrastructure Stage, OPSWAT’s Director of Products and Solutions, Kris Voorspoels, will take part in a panel discussion on the security crisis facing the Industrial Internet of Things (IIoT) in the regional oil and gas sector.

Finally, aiming to enhance cybersecurity standards across the region in alignment with the goals of the UAE National Cybersecurity Strategy, OPSWAT Academy will offer complimentary CIP certifications, such as File Security Associate (OFSA), Secure Storage Associate (OSSA), Email Security Associate (OESA), Web Traffic Protection Associate (OWPA), and Data Transfer Security Associate (ODSA).

How would you describe the current cybersecurity threat landscape in the Middle East?
The biggest cybersecurity challenge facing many regions will likely be the increasing sophistication of cyberattacks targeting critical infrastructure. As organizations become more interconnected and reliant on digital technologies, attackers are focusing on high-impact targets like power grids, government, defense and financial institutions. These types of attacks can cause widespread disruption and significant damage.

From a defender side, we’re seeing a major shift toward zero-trust architectures, increased investment in OT cybersecurity, and a growing emphasis on securing energy, manufacturing, and transportation.

How do cultural or regulatory differences impact cybersecurity strategies in the Middle East compared to other regions?
Many countries in the region enforce localized regulations that require on-premise or air-gapped solutions, limiting reliance on global cloud services. At OPSWAT, we support these regional needs by offering solutions that ensure compliance with local laws, enable secure on-premise deployments, and provide protection across both IT and OT environments. Additionally, there’s a strong push for developing local cybersecurity talent, driven by government initiatives and national strategies. At OPSWAT Academy, we contribute to workforce development by delivering hands-on training and certifications aligned with regional cybersecurity priorities.

How do your company’s products and services address the specific threats faced by regional businesses?
Our approach to cybersecurity has evolved significantly over the last 12 months. Our solutions are designed to secure both IT and OT environments using patented technologies such as multi-scanning, Deep CDR, and advanced threat intelligence.

We’ve focused on enhancing our ability to detect and mitigate advanced threats, particularly those targeting complex and interconnected systems. We’ve integrated AI-powered threat detection, real-time monitoring, and data sanitization into our solutions to ensure that organizations can respond to threats quickly and effectively. As the cybersecurity landscape continues to shift, we’ve also prioritized automation and machine learning to proactively identify vulnerabilities and block attacks before they impact operations.

Are you partnering with any local entities or governments to enhance regional cybersecurity resilience?
Yes, we actively partner with local entities, government agencies, and critical infrastructure operators across the Middle East to enhance regional cybersecurity resilience. These collaborations focus on securing OT and IT environments, aligning with national cybersecurity frameworks. By working closely with regional stakeholders, we ensure our solutions meet compliance requirements while addressing the unique cybersecurity challenges faced across sectors such as energy, defense, and government.

What advice would you give to regional businesses looking to strengthen their cybersecurity posture in 2025?
My recommendation to organizations investing in cybersecurity today is simple: Prioritize a multi-layered, proactive approach to security. Cyber threats are constantly evolving, and it’s no longer enough to simply have strong defenses in place; you need to anticipate potential risks, continuously monitor your systems, and invest in technologies that can detect and respond to threats in real-time. This means leveraging AI and machine learning to identify vulnerabilities before they’re exploited.

Additionally, ensure comprehensive training for your employees to prevent human error and reinforce a security-conscious culture. By implementing robust, proactive, and adaptable security measures, organizations can significantly enhance their ability to prevent, detect, and respond to cyber threats, ultimately safeguarding their assets and ensuring long-term resilience in an ever-evolving threat landscape.

Cyber Security

Positive Technologies Reports 80% of Middle East Cyberattacks Compromise Confidential Data

Published

on

A new study by cybersecurity firm Positive Technologies has shed light on the evolving cyber threat landscape in the Middle East, revealing that a staggering 80% of successful cyberattacks in the region lead to the breach of confidential information. The research, examining the impact of digital transformation, organized cybercrime, and the underground market, highlights the increasing exposure of Middle Eastern nations to sophisticated cyber threats.

The study found that one in three successful cyberattacks were attributed to Advanced Persistent Threat (APT) groups, which predominantly target government institutions and critical infrastructure. While the rapid adoption of new IT solutions is driving efficiency, it simultaneously expands the attack surface for malicious actors.

Cybercriminals in the region heavily utilize social engineering tactics (61% of cases) and malware (51%), often employing a combination of both. Remote Access Trojans (RATs) emerged as a primary weapon in 27% of malware-based attacks, indicating a common objective of gaining long-term access to compromised systems.

The analysis revealed that credentials and trade secrets (29% each) were the most sought-after data, followed by personal information (20%). This stolen data is frequently leveraged for blackmail or sold on the dark web. Beyond data theft, 38% of attacks resulted in the disruption of core business operations, posing significant risks to critical sectors like healthcare, transportation, and government services.

APT groups are identified as the most formidable threat actors due to their substantial resources and advanced technical capabilities. In 2024, they accounted for 32% of recorded attacks, with a clear focus on government and critical infrastructure. Their activities often extend beyond traditional cybercrime, encompassing cyberespionage and even cyberwarfare aimed at undermining trust and demonstrating digital dominance.

Dark web analysis further revealed that government organizations were the most frequently mentioned targets (34%), followed by the industrial sector (20%). Hacktivist activity was also prominent, with ideologically motivated actors often sharing stolen databases freely, exacerbating the cybercrime landscape.

The United Arab Emirates, Saudi Arabia, Israel, and Qatar, all leaders in digital transformation, were the most frequently cited countries on the dark web in connection with stolen data. Experts suggest that the prevalence of advertisements for selling data from these nations underscores the challenges of securing rapidly expanding digital environments, which cybercriminals are quick to exploit.

Positive Technologies analyst Alexey Lukash said, “In the near future, we expect cyberthreats in the Middle East to grow both in scale and sophistication. As digital transformation efforts expand, so does the attack surface, creating more opportunities for hackers of all skill levels. Governments in the region need to focus on protecting critical infrastructure, financial institutions, and government systems. The consequences of successful attacks in these areas could have far-reaching implications for national security and sovereignty.”

To help organizations build stronger defenses against cyberthreats, Positive Technologies recommends implementing modern security measures. These include vulnerability management systems to automate asset management, as well as identify, prioritize, and remediate vulnerabilities. Positive Technologies also suggests using network traffic analysis tools to monitor network activity and detect cyberattacks. Another critical layer of protection involves securing applications. Such solutions are designed to identify vulnerabilities in applications, detect suspicious activity, and take immediate action to prevent attacks.

Positive Technologies emphasizes the need for a comprehensive, result-driven approach to cybersecurity. This strategy is designed to prevent attackers from disrupting critical business processes. Scalable and flexible, it can be tailored to individual organizations, entire industries, or even large-scale digital ecosystems like nations or international alliances. The goal is to deliver clear, measurable results in cybersecurity—not just to meet compliance standards or rely on isolated technical fixes.

Continue Reading

GISEC

ManageEngine @ GISEC Global 2025: AI, Quantum Computing, and Ransomware Form Part of Cybersecurity Outlook for 2025

Published

on

As AI-powered attacks and quantum computing reshape the cyber threat landscape, organizations must rethink traditional defense strategies. In an exclusive interview, Sujoy Banerjee, Associate Director at ManageEngine, reveals how businesses can prepare for 2025’s most critical threats—from AI-generated phishing scams to quantum-decrypted ransomware (more…)

Continue Reading

GISEC

Positive Technologies @ GISEC Global 2025: Demonstrating Cutting-Edge Cyber Threats and AI Defense Strategies

Published

on

At GISEC Global 2025, Positive Technologies showcased live demonstrations of sophisticated hacking techniques while emphasising the growing role of AI in both cyber attacks and defense. In an exclusive interview with Security Review, Ilya Leonov, the Regional Director at Positive Technologies revealed insights about the Middle East’s evolving threat landscape, their work with regional governments, and why investing in human expertise remains critical despite advancing technologies (more…)

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.