<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <br>
    <div class="moz-forward-container">
      <div class="WordSection1">
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D"><o:p> </o:p></span></p>
        <o:p></o:p>
        <div>
          <div>
            <p class="xmsonormal"
              style="margin-bottom:0in;margin-bottom:.0001pt">Greetings,<o:p></o:p></p>
            <p class="xmsonormal"
              style="margin-bottom:0in;margin-bottom:.0001pt"> <o:p></o:p></p>
            <p class="xmsonormal"
              style="margin-bottom:0in;margin-bottom:.0001pt">You are
              invited to attend presentation entitled “Securing the
              Human Dimension- Strategies and Solutions to secure your
              most important assets”<o:p></o:p></p>
            <p class="xmsonormal"
              style="margin-bottom:0in;margin-bottom:.0001pt"> <o:p></o:p></p>
            <p class="xmsonormal"
              style="margin-bottom:0in;margin-bottom:.0001pt">Speaker:Abhay
              Bhargav, CISSP, CISA, GWAPT, ISO-27001 LA, CPA<br>
              <br>
              Time and date: 6:30pm-8:30 Wednesday 11th December 2013 <o:p></o:p></p>
            <p class="xmsonormal"
              style="margin-bottom:0in;margin-bottom:.0001pt"> <o:p></o:p></p>
            <p class="xmsonormal"
              style="margin-bottom:0in;margin-bottom:.0001pt">Location:
              Bahrain Society of Engineers<o:p></o:p></p>
            <p class="xmsonormal"
              style="margin-bottom:0in;margin-bottom:.0001pt"> <o:p></o:p></p>
            <p class="xmsonormal"
              style="margin-bottom:0in;margin-bottom:.0001pt">All
              attendees will be issued with Certificate of attendance 3
              cpe<o:p></o:p></p>
            <p class="xmsonormal"
              style="margin-bottom:0in;margin-bottom:.0001pt"> <o:p></o:p></p>
            <p class="xmsonormal">About the Topic: <o:p></o:p></p>
            <p class="xmsonormal">Modern threats have constantly
              targeted one critical resource, People. Attackers have
              used innovative and highly sophisticated techniques to
              gain access to enterprise data by exploiting employees of
              the company. Spear-Phishing, Ransomware, Social-Media
              based enumeration and attacks, Mobile threats have
              rendered several organizations defenseless and wanting for
              solutions. We would offer some strategies and solutions to
              counter these threats. We will also show LIVE DEMOs of
              phishing and security traning using web-based tools that
              we45 has developed.<o:p></o:p></p>
            <p class="xmsonormal"> The talk will consist of the
              following: <o:p></o:p></p>
            <ul type="disc">
              <li class="MsoNormal"
                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l1
                level1 lfo3">
                Real-world case studies of recent human security
                breaches.<o:p></o:p></li>
              <li class="MsoNormal"
                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l1
                level1 lfo3">
                Live Demos and Examples of Security attacks against
                employees of an organization<o:p></o:p></li>
              <li class="MsoNormal"
                style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l1
                level1 lfo3">
                Practical Solutions and Technology Frameworks that
                protect against Human Security Flaws<o:p></o:p></li>
            </ul>
            <p class="xmsonormal">About the
              Speaker:                            
                                                             
              <o:p></o:p></p>
            <p class="MsoNormal"
              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Abhay
              Bhargav, CISSP, CISA, GWAPT, ISO-27001 LA, CPA<o:p></o:p></p>
            <p class="MsoNormal"
              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"> <o:p></o:p></p>
            <p class="MsoNormal"
              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Abhay
              Bhargav is the founder and CTO of we45, a focused
              Information Security Solutions Company. He has extensive
              experience with Information Security and Compliance. He
              has performed security assessments for various enterprises
              in various domains like banking, software development,
              retail, telecom and legal. Previously, he was a Qualified
              Security Assessor for the Payment Card Industry and has
              led several security assessments for Payment Card Industry
              Compliance. He is also the co-author of <a
                moz-do-not-send="true"
                href="http://www.crcpress.com/product/isbn/9781439823514">
                <span style="color:windowtext;text-decoration:none">“Secure
                  Java for Web Application Development”</span></a>
              published by CRC Press, New York. He is the author of “PCI
              Compliance: A Definitive Guide” for CRC Press as well.<o:p></o:p></p>
            <p class="MsoNormal"
              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"> <o:p></o:p></p>
            <p class="MsoNormal"
              style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Specific
              Information Security Expertise
              <o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Qualifications<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>CISSP (Certified Information Systems Security
              Professional) from ISC2<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>CISA (Certified Information Systems Auditor) -
              ISACA<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>GWAPT (GIAC Web Application Penetration Tester) -
              SANS Institute<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>ISO-27001 LA (Lead Auditor)<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>CPA (Certified Public Accountant) USA, State of
              Delaware<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Led over 300 Security Assessments in over 18
              countries all over the world<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Published International Author of the successful
              International Information Security book ‘Secure Java: For
              Web Application Development’ - CRC Press USA<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Quoted in several leading news-channels and news
              dailies as a subject matter expert on Information Security<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Speaker at prestigious Information Security forums
              like OWASP, ISACA and Oracle OpenWorld and JavaOne, as
              well as Industry events of NASSCOM and CII<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Subject matter expert on Payment Card Industry
              Security Standards - The world’s most stringent Security
              Requirements.<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Intensive Knowledge and Research Capabilities for
              Vulnerability Assessment and Penetration Testing. Led
              Assessments for Fortune 500 companies<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Performed over 40 application security code reviews
              for applications in Java,
              <a moz-do-not-send="true" href="http://ASP.NET">ASP.NET</a>,
              PHP, Python and proprietary programming languages and
              platforms.
              <o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Expertise in Web Application Security and Network
              Security. Performed White-box and Black-box testing
              assessments for industry verticals like Retail, Banking,
              Credit Card Processing, Software Development,
              Manufacturing and Healthcare<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Developed novel Threat Modeling Frameworks for Web
              Application Security, which has been published in leading
              Information Security Journals<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Performed Intensive Security Assessments for
              Government entities all over the country<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Specific Web Application Security Expertise: <o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Vulnerability Assessment Penetration Testing with
              leading frameworks like SANS, OWASP and Penetration
              Testing Framework<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Extensive Expertise with Web Application
              Penetration Testing for Java, ASP, PHP, Python and
              Coldfusion Applications<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Expertise with Cloud Application Security
              Assessment and Web services Security<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Ability to write specific tools to perform specific
              Web Application Security Assessments<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Expertise in managing Business Logic testing for
              Web Applications<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Expertise with Web Application Security Exploit
              frameworks like AttackAPI<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Specific Network and OS Security Expertise:<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Vulnerability Assessment Penetration Testing with
              leading frameworks like SANS, OSSTMM and Penetration
              Testing Framework<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Experience with Vulnerability Assessment and
              Penetration Testing of Network Devices and Servers in
              complex IT Infrastructure involving over 400 public
              interfaces.<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Extensive Experience with Attack Frameworks like
              Metasploit and Attack API.<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:27.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Combination of skills to perform White-box and
              Black-box assessments of Network Infrastructure and Server
              Configurations.
              <o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Lead Trainer for Public workshops of Payment Card
              Industry Standards and Risk Assessment Frameworks like
              OCTAVE and NIST SP-800-30<o:p></o:p></p>
            <p class="MsoNormal"
style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;margin-left:9.0pt"><span
                style="font-size:10.0pt;font-family:Symbol">·</span><span
                style="font-size:7.0pt">  
              </span>Consulting and Training expertise with Risk
              Assessment and Management Frameworks like OCTAVE and NIST
              SP-800-30<o:p></o:p></p>
            <br>
            <br>
            Link for registering to the event<br>
            <br>
             <br>
            <br>
            <a class="moz-txt-link-freetext" href="http://bit.ly/18gfibd">http://bit.ly/18gfibd</a><br>
            <br>
             <br>
          </div>
        </div>
      </div>
    </div>
    <br>
  </body>
</html>