14
ﺗﺤﺖ رﻋﺎﻳﺔ ﺻﺎﺣﺐ اﻟﺴﻤﻮ اﻟﻤﻠﻜﻲKing Khalid University, Abha, Kingdom of Saudi Arabia 26 to 27 March 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) اﻟﻤﺆﺗﻤﺮ اﻟﺪوﻟﻲ ااﻟﺜﺎﻧﻰ ﻟﻤﻜﺎﻓﺤﻪ اﻟﺠﺮاﺋﻢ اﻟﻤﻌﻠﻮﻣﺎﺗﻴﻪ ﺟﺎﻣﻌﺔ اﻟﻤﻠﻚ ﺧﺎﻟﺪ، أﺑﻬﺎ، اﻟﻤﻤﻠﻜﺔ اﻟﻌﺮﺑﻴﺔ اﻟﺴﻌﻮدﻳﺔ2017 ﻣﺎرس27 - 26 1438 ﺟﻤﺎدى اﻷﺧﺮ28 - 27

ﻲﻜﻠﻤﻟا ﻮﻤﺴﻟا ﺐﺣﺎﺻ ﺔﻳﺎﻋر ﺖﺤﺗconf.kku.edu.sa/sites/conf.kku.edu.sa/files/icacc.pdfadditional information, ... virtualization, cloud computing,

  • Upload
    lamhanh

  • View
    219

  • Download
    0

Embed Size (px)

Citation preview

تحت رعاية صاحب السمو الملكي

King Khalid University, Abha,Kingdom of Saudi Arabia26 to 27 March 2017

2nd International Conference on Anti-Cyber Crimes(ICACC) المؤتمر الدولي االثانى لمكافحه الجرائم المعلوماتيه

جامعة الملك خالد، أبها، المملكة العربية السعودية 26 - 27 مارس 2017

27 - 28 جمادى األخر 1438

Technical Co Sponsor

Organizer

تقنيــة المعــلومـــاتInformation Technology

SPONSORS

Silver Partner

Platinum Partners

Exhibit Partners

Cisco (NASDAQ: CSCO) is the worldwide technology leader that has been making the Internet work since 1984. Our people, products, and partners help society securely connect and seize tomorrow's digital opportunity today. Discover more at newsroom.cisco.com and follow us on Twitter at @Cisco.

Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organiza-tions, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.

Forcepoint safeguards users, data and networks against the most determined adversaries, from insider threats to outside attackers, across the threat lifecycle – in the cloud, on the road, in the office. It simplifies compliance and enables better decision-making for more-efficient remediation, empowering organizations to focus on what’s most important to them.

Knowledge Developers Company is focusing on satisfying its customers through providing the high quality services and applications. KDEVS offers multiple products that increases productivity and save time and effort. KDEVS also provides software development services commensurate with the client's need and requirements.

F5 Networks helps the world’s largest enterprises and service providers realize the full value of virtualization, cloud computing, and on-demand IT. F5 solutions help integrate disparate technolo-gies to provide greater control of virtualized infrastructure, improve application delivery and data management, and give users seamless, secure, and accelerated access to applications from their corporate desktops and smart devices. www.f5.com

SCOPE Middle East is an award winning specialty value-added distributor providing advanced network performance and security solutions in the Middle East & North Africa Region. SCOPE ME has business units around Middle East and GCC countries with significant sales channels for Symantec Blue Coat, Kaspersky Lab, NETSCOUT, Brocade Ruckus Wireless, Authentify, Soti, Stormshield, NetApp & HID Global.www.scopeme.com

Middle East

SCOPE®

Ebttikar Technology, a subsidiary of the National Technology Group, is one of the leading ITinfrastructure solutions providers in the Kingdom of Saudi Arabia. Ebttikar Technology provides a full spectrum of IT services that includes consulting, design, implementation, integration, and a whole host of outsourcing services. The company is well positioned to lead the IT service industry in the Middle East by leveraging its strategic partnerships with world-class technology vendors, its solid service infrastructure, and its commitment to the region.

اليوم االول

قاعة عسير

08:00 ص - 12:00 م

الجرائم المعلوماتية وتطبيقاتها بالمحاكمفضيلة الشيخ ماجد بن محمد على الرجيعى

مقارنه نظام مكافحة الجرائم المعلوماتية المحلي باألنظمة والتشريعات اإلقليمية والعالمية

عبداالله سعيد أحمد الشهرانى

الجرائم المعلوماتية واإللكترونية وسبل مواجهتهام. بدر بن مصلح أحمد القحطاني

حمايه أنظمه المعلومات الخاصه بك من التهديد األمني المعلوماتيم. عبدالله بن عائض االسمرى

المخاطر المتزايده للجرائم المعلوماتيهد. عبدالرحمن عبدالله الغامدى

تطور المخاطر والتهديداتالشيخ خالد بن سعيد السريعي

30 دقيقةحلقة نقاش

27 مارس 2017اليوم الثاني26 مارس 2017

الدكتور عبدالعزيز عبدالله الرشودفضيلة الشيخ ماجد بن محمد الرجيعى

عبداالله سعيد أحمد الشهرانىم. بدر بن مصلح أحمد القحطاني

30 دقيقةحلقة نقاش

م. عبدالله بن عائض االسمرىد. عبدالرحمن عبدالله الغامدى الشيخ خالد بن سعيد السريعي

التسجيل 08:00 ص الكلمة الترحيبية يقدمها سعادة وكيل الجامعة 09:00 ص

المتحدث الرئيسي الدكتور عبدالعزيز عبدالله الرشود 09:10 ص استراحة قهوة والتواصل 10:00 ص

حفل االفتتاح 11:00 ص

قاعة عسير

08:00 ص - 12:00 م

التسجيل 08:00 ص المتحدث الرئيسي المحكم القضائي يحيى بن محمد الشهراني 08:30 ص

استراحة قهوة والتواصل 09:20 ص

المسار الرئيسي (باللغة العربية)الجلسه االولى : تطور الجرائم المعلوماتية

12:30 - 2:00 م

رئيس الجلسة : د. ناصر بن منصور طيران

قاعه عسير

الجلسه الثانية : تطور المخاطر والتهديدات03:00 - 04:30 م

رئيس الجلسة : د. فهد بن عبدالله االحمرى

قاعه عسير

نظام الجرائم المعلوماتية وشرح بعض بنودهم. هادي بن علي معشي

الصفات الشخصية والسلوكية لمرتكبي الجرائم المعلوماتيةد. صالح بن عبدالله العقيل

دور هيئة التحقيق واإلدعاء العام في الجرائم المعلوماتيةنايف بن محمد المدرع

المسئوليه االجتماعيه للحد من الجرائم المعلوماتية الناتجة عن سوء استخدام شبكات التواصل االجتماعي وطرق معالجتها

د. فايز بن على أل صالح االسمرى

التداول باإلنترنت خطر يهدد المملكة العربية السعوديةد. غاده محمود ابراهيم عوف

دور الهيئات التعليمية واالعالمية فى نشر ثقافة مواجهة الجرائم المعلوماتية

ياسر بن عبدالله على القاسمي

30 دقيقةحلقة نقاش

م. هادي بن علي معشيد. صالح بن عبدالله العقيل

نايف بن محمد المدرعلؤي العياضي

30 دقيقةحلقة نقاش

د. غاده محمود ابراهيم عوف د. فايز بن على أل صالح االسمرى

ياسر عبدالله على القاسمىخالد الشنقيطي

المسار الرئيسي (باللغة العربية)الجلسه الثالثة: تحليل للجرائم المعلوماتيه وطرق الوقايه منها

9:40 - 11:10 ص

رئيس الجلسة : د. فايز بن علي االسمرى

قاعه عسير

الجلسه الرابعة: التوعية و مستقبل الجرائم المعلوماتية12:00 - 02:30 م

رئيس الجلسة : د. على بن محمد العسيري

قاعه عسير

حفل العشاء سوف يقدم في اليوم األول تمام الساعة 09:00 م في الطابق الخامس للمتحدثين والضيوف المدعوين

الجهود التشريعية الدولية والوطنية واألقليمية لمواجهة الجرائم المعلوماتية الدكتور عبدالعزيز عبدالله الرشود

Day 1

Scientific TrackSession A: Anti-Cyber Crimes Evolution12:30 – 02:00 pmSession Chair: Dr. Dheya Shuja`s Al-othmanySalon 1

1. Signature-based Techniques in Antivirus Products: A SurveyMohammed Alasli, Taher Ahmed Ghaleb

2. Trust Structure in Public Key InfrastructuresRahoof P P, Latha R Nair, Thafasal Ijyas

3. Combating Anonymous Offenders in the Cyberspace: An Overview of the Legal Approach in Malaysia.Nazli Ismail Nawang.

4. A Forensic Acquisition Based upon A Cluster Analysis of Non-Volitile Memory in IaaS.Saad Alqahtany, Nathan Clarke, Steven Furnell and Christoph Reich

5. Comparative Analysis of K-Means Method and Naïve Bayes Method for Brute Force Attack Visualization.Deris Stiawan, Sari Sandra, Esam Alzahrani, Rahmat Budiarto

6. A Comparative Study of Anti-Cybercrime Laws in the Gulf Cooperation Council Countries. Mohammed Altayar

Special Talk on "IEEE Activities and Membership Benefits"03:00 – 03:20 pm

Session Chair: Dr. Sasikumaran Sreedharan.

Session B: Recent trends in Anti-Cyber Crimes Security Issues03:20 – 04:50

Session Chair: Dr. Elrasheed Ismail M Zayid, Dr. Mohammed AltayarSalon 1

1. Preventing And Securing Data From Cyber Crimes Using New Authentication Method Based On Block Cipher Scheme.Prakash Kuppuswamy, Nithya Rekha Sivakumar and Rashida Banu Gul Mohammed

2. Policy Enforcement for Big Data security.Abdullah Alshomrani, Fathy Fathy ,Kamal Jambi

3. A Personalized Mobile Healthcare Framework based on Community Cloud with Formal Verification.Hisham M. Alsaghier, Shaik Shakeel Ahamad, Fahad Ahmad M. Albalwi.

4.Real-time Face Detection and Tracking on Mobile Phones for Criminal Detection.Lamiaa A. Elrefaei, Alaa Alharthi, Huda Alamoudi, Shatha Almutairi ,Fatima Al-Rammah

5. Payload Recognition and Detection of Cross Site Scripting Attack.Deris Stiawan, Tri Wanda Septian, M. Ridwan Zalbina, Moh. Yazid Idris, Ahmad Heryanto, Rahmat Budiarto.

6. Correlation Analysis for Geo-indistinguishabilityBased Continuous LBS Queries.Raed Aldhubhani, Jonathan Cazalas

Dinner Ceremony will be served in the 1st day at the 5th Floor at 09:00 pm for Speakers and Invited Guests

Main TrackSession A: Evolution of Cybercrime12:30 - 2:00 pm

Session Chair: Dr. Nasser Tairan

Aseer Hall

Aseer Hall

08:00 am - 12:00 pm

Applications of Cyber Crimes in CourtsSheikh Majed Mohamed Ali Alrigi'e

Comparison of Domestic Anti-Cyber Crimes Law with Regional & Global Laws & Legislations

AbdulEllah Saeed Ahmed Al Shahrani

Evolution of CybercrimeBadr bin Muslah Al Qahtani

International, Regional and Local Legislative Efforts Against Cybercrimes

Dr. Abdulaziz bin Abdullah Al Rushoud

Panel discussion 30 min

Session B: Risks and Threats3:00 - 4:30 pm

Session Chair: Dr. Fahd Alahmari

Aseer Hall

Protect Your Information Systems Against Cyber Security Threat

Eng. Abdullah Al Asmari

A Growing Terrifying Cybercrime ThreatDr. Abdulrahman bin Abdullah Al Ghamdi

The role of the concerned authorities in fighting cybercrime, and in the application of integrated security strategies and solutions in combating cybercrime

Sheikh Khalid bin Saeed Al Serai'e

Panel discussion 30 min

March 26, 2017

Dr. Abdulaziz bin Abdullah Al RushoudSheikh Majed bin Mohamed Ali Alrigi'eAbdulEllah Saeed Ahmed Al ShahraniBadr bin Muslah Al Qahtani

Eng. Abdullah Al AsmariDr. Abdulrahman bin Abdullah Al GhamdiSheikh Khalid bin Saeed Al Serai'e

08:00 am Registration09:00 am Welcome Address by Vice Rector09:10 am Keynote by Dr. Abdul-Aziz bin Abdullah Al Roshod10:00 am Coffee Break & Networking11:00 am Opening Ceremony

Main TrackSession C: Analysis, Avoidance and Defenceof Cybercrime9:40 - 11:10 am

Session Chair: Dr. Fayez bin Ali Al Asmari

Aseer Hall

Anti-Cyber Crimes LawEng. Hadi bin Ali Muashy

Personal and Behavioral Characteristics of the Cybercrime CommittersDr. Saleh bin Abdullah Al Aqeel

Analysis and Avoidance of CybercrimeNayef bin Mohamed Al Medra'e

Panel discussion 30 min

Session D: Awareness and Future Directions12:30 - 2:00 pm

Session Chair: Dr. Ali bin Mohammed Al-Karawi

Aseer Hall

Social Responsibility to Reduce Crimes Resulting from the Misuse of Social Networking, and Methods of TreatmentsDr. Fayez bin Ali Saleh Al Asmari

Global, Regional and National Legislative Efforts to Combat Cyber CrimesDr. Ghada Mahmoud Ibrahim Aouf

The Role of Educational Institutionas and Media in Spreading the Culture of Compating Cyber CrimesYasser Abdullah Ali Al Qasmi

Panel discussion 30 min

Day 2 March 27, 2017

Scientific TrackSession C: Cyber Crimes Awareness and Practices09:40 – 11:10 am

Session Chair: Dr. Waseem Ahamad, Dr. Sarah Abu Ghazalah

Salon 1

1. Strategic Planning for Information Security -DID Mechanism to befriend the Cyber Criminals to Assure Cyber Freedom.M.K.Jayanthi Kannan

2. Soft Computing Applications in Cyber Crimes.Huda Fatima, Gana Nath Dash , Sateesh Pradhan

3. Forensic Analysis of Cross-Site Scripting Attacks.Muhammad Ali Ismail.

4. Securing Implantable Medical Devices against Cyberspace Attacks.S. Rekhis, N. Boudriga, N. Ellouze

5. Security threat identification using Energy Points.Dr.Paul Rodrigues, Dr.Sasikumarn Sreedharan, Syed Asif Basha, Pc Senthil Mahesh

6. A State of the Art Review of Internet Risks on Children. Norah Alqahtani

Session D: Security and Privacy12:30 – 02:00 pm

Session Chair: Dr. Shaik Shakeel Ahamad, Dr. Adnan AlBar

Salon 1

1. Secure Design of Communication Networks. .Valery Sklyarov , Iouliia Skliarova

2. Privacy Preserving Queries for LBS:Hash Function Secured (HFS).Abdullah Albelaihy , Jonathan Cazalas

3. Evaluating High Performance Computing (HPC) Requirements of Devices on the Smart Grid for Increased Cyber Security.Waseem Ahmed.

4. DNA Cryptography for Preventing Unauthorized Access of EHR.Sreeja CS, Mohammed Misbahuddin, Bindhumadhava B S

5. New Strategy of Probabilistic Flooding with Fuzzy & Rough Sets Techniques.Nithya Rekha Sivakumar, Abdullah Alaraj, Prakash Kuppusamy, Sivakumar Krishnan

6. A Novel Mechanism for Indoor Localization in Wireless Sensor Networks. Fekher Khelifi, Belgacem Bouallegue, Med Lassaad Kaddachi, Mehrez Marzougui Mohamed Atri and J.Subash Chandra Bose

6. Internet of Things :A Study on Security and Privacy Threats. Mohammed Husamuddin, Mohammed Qayyum

Eng. Hadi bin Ali MuashyDr. Saleh bin Abdullah Al AqeelNayef bin Mohamed Al Medra'eLoay Alayadhi

Dr. Fayez bin Ali Saleh Al AsmariDr. Ghada Mahmoud Ibrahim AoufYasser Abdullah Ali Al QasmiKhalid Alshangiti

Aseer Hall08:00 am - 09:30 am

08:00 am Registration & Networking08:30 am Keynote by Yahya bin Mohammed Al Shahrani, Judicial Arbitrator09:20 am Coffee Break & Networking

أبها عاصمة السیاحة العربیة ٢٠١٧ABHA CAPITAL OF ARAB TOURISM 2017

2nd International Conference on

Anti-Cyber Crimes

ICACCKKU, Abha, KSA26 to 27 March 2017

Agenda

Posters

1- Cluster based Zoning of Crime Info.Lalitha Saroja Thota, Suresh Babu Changalasetty, Mohrah Alalyan, Al-Otaibi Awatif Khalid, Fabiha Fathima

2- A Bird's Eye View of Cyber Crimes and Free and Open Source Softwares to Detoxify Cyber Crimes Attacks – an End User Perspective.M.K.Jayanthi Kannan

3- Effective Way to Defend the Hypervisor Attacks in Cloud Computing.Muhammad Shahid Dildar, Nayeem Khan,Johari Bin Abdullah ,Adnan Shahid Khan

4- Data fusion & Visualization Application for Network Forensic Investigation –A Case StudyHuda Fatima, Suneeta Satpathy, Satyasundara Mohapatra, Gana Nath Dash , Sateesh Pradhan

5- Evaluating Robustness of Arabic CAPTCHAs.Suliman A. Alsuhibany, Mohammad Tanvir Parvez, Naseem Alrobah, Fatimah Almohaimeed ,Samar Alduayji

6- Cloud Computing: Technology, Security Issues and Solutions.Naim Ahmad

7- Design and Test of Smart IP-Cam within Reconfigurable Platform.Kais Loukil, Mohamed Wassim Jmal, Tarek Frikha

8- Soft Firewall : Firewall as a Service.Muhammad Ali Ismail

9- Development And Designing Of Fire Fighter Robotics Using Cyber Security.Dr. Subash Chandra Bose Jeganathan

10- Mine detecting robot prototyping.Chammakh Youssef, Mohamed Ben Rached, Najmeddine Abdennour, Tarek Frikha and Mohamed Abid

11- A Queue Enhanced Backoff Algorithm for Wireless Sensor Networks.Imen Bouazzi, Jamila Bhar and Mohamed Atri

12- Opportunistic Sensor Networks: A Survey on Privacy and Secure Routing.Mohammed Salman Arafath and Khaleel Ur Rahman Khan

13- Lane Departure Detection Using Image Processing Techniques.Jamel Baili, Mehrez Marzougui, Ameur Sboui, Samer Lahouar, Mounir Hergli, J.Subash Chandra Bose and Kamel Besbes.

14- Solid state drive data recovery in open source environment.Dr Abdulaziz Aldaej, Dr Mohammad Gulam Ahamad ,Mohammed Yousuf Uddin

15- Application of Wavelet and Particle Swarm Optimization in Steganography.Rajeswari P, Shwetha P ,Purushothaman S

16- An Improved and Efficient Countermeasure against Fault Attacks for AES.Mouna Bedoui, Hassen Mestiri, Belgacem Bouallegue, Mehrez Marzougui, Mohammed Qayyum and Mohsen Machhout

17- Efficient Countermeasure for Reliable KECCAK Architecture against Fault Attacks.Hassen Mestiri, Fatma Kahri, Belgacem Bouallegue, Mehrez Marzougui and Mohsen Machhout

18- A Study on Cybercrime Awareness Test in Sauia Arabia – Alnamas Region.Elrasheed Ismail M Zayid and Nadir Abdelrahman Ahmed Farah

19- Applying Data Mining Techniques in Cyber Crimes.Mohiuddin Khan, Sateesh Pradhan and Huda Fatima

20- Security Issues in SCADA based Industrial Control Systems.Bijoy Babu, Thafasal Ijyas, Muneer P ,Justin Varghese

21- A survey of the current trends of privacy techniques employed in protecting the location privacy of users in LBSs.Abdullah Albelaihy and Jonathan Cazalas

22- A Novel Illumination-Invariant Lane Detection System.Yassin Kortli, Mehrez Marzougui, Belgacem Bouallegue, Subash Chandra Bose, Paul Rodrigues and Mohamed Atri

23- Spam Filtering Email Classification (SFECM) using Gain and Graph Mining Algorithm.M. K. Chae, Abeer Alsadoon, P.W.C. Prasad and Sasikumaran Sreedharan

24- "A Comprehensive Survey: Quantum Cryptography".Mohammed Moizuddin, Dr.Joy Winston, Mohammed Qayyum

EBTTIKAR

to worry less and innovate more

“Are we secure? Are we innovating?” Good questions. At Cisco we know that the more effective and simple your security solutions are, the more you can push the boundaries of what is possible. See why there’s never been a better time to use security to spark

your next great idea at cisco.com/neverbetter

©2016 Cisco and/or its affiliates. All rights reserved.

Dr. Alghamdi earned his PhD in Computer sciences from MACS (the school of Mathematical and Computer Sciences) at Heriot Watt University, Edinburgh, Scotland, United Kingdom. He also earned his master degree in Computer Scienc-es from the same school and department.He is faculty member of CCIT ( College of Computing and Information Technology) at Shaqra University. He worked as a the head of the Computer Dept at the College of Sciences and Arts, then, he worked as the Dean of CCIT (College of Computing and Information Technology). After that, he was appointed as the Dean of the deanship of IT and eLearn-ing. Currently, Dr. Alghamdi is a faculty member of CCIT, the Head of Computer Sciences Dept, and the Vice Dean for Development and Quality.

Dr. Ghada Mahmud Ibrahim Ouf is the assistant professor of graphic design at Helwan University. Previously, she was a member of the faculty of architecture and digital design at the university. She has an extensive background in the educational domain, having served as coordinator of the home economics department and faculty of architecture and digital design at the University of Dar Al Uloom. She also coordinated tests for the faculty of architecture and digital design for girls. She wrote her dissertation in May 2010 and has designed numerous logos, posters, and interactive multimedia programs over the course of his career.

Mr. Hadi Ali Maashi serves as deputy director general of technology and operations at the Saudi e-Government Program. He is also a steering committee member of the King Salman Human Resources Development Program, a member of the supervisory committee of the Saudi government’s Shared Services initiative, and a member of the Single Sign-On and Digital ID Committee in the Saudi Ministry of Interior. He is currently working on three national initiatives within the Digitization Ministerial Committee headed by Ministry of Economy and Planning (Cloud Comput-ing, SSO, and Shared Services). He has participated in many consultancy projects for the public and private sectors, and contributed to the early evolution of internet services in Saudi Arabia.

Dr. Abdulrahman AlghamdiCIO, Shaqra University

Dr. Ghada Mahmud Ibrahim OufAssistant Professor of Graphic Design, Faculty of Fine Arts – Helwan University

SPEAKER PROFILES

Loay AlayadhiSecurity Consulting System Engineer, Cisco Systems.

He provides consulting in several areas of security including Firewalls, IDS/IPS, VPN, Networking, infrastructure and Load Balancers. Loay has 15 years’ experience in Information Technology (IT), including 8 years as a security consult-ing on various projects in Service Provider Enterprise and others. Has eight years of dedicated experience in Network Security and has expertise in several security disciplines.

Dr. Saleh Abdullah Al-Aqeel is a professor of criminology at Majmaah University in Saudi Arabia. He has a great interest in crime and delinquency, particularly as it relates to young people and women. He has published numerous articles in Arab and international journals, and is a certified instructor at the General Organization for Technical and Technical Education.

Dr. Saleh Abdullah Al-AqeelProfessor of Criminology – Majmaah University

Dr. Abdulaziz bin Abdullah Al Rushoud is an assistant professor at the College of Law at Al Majma'a University. He is also an advisor and general supervisor to the office of the director of Al Majma'a University and a member of several university committees and boards. He has specialized training in the prevention of human trafficking and smuggling and has been accredited by the International Organization for Migration. He routinely develops, implements, and participates in seminars, workshops, and symposiums.

Dr. Abdulaziz bin Abdullah Al RushoudAssistant Professor, College of Law – Al Majma’a University

Hadi Ali MaashiDeputy Director General, Technology and Operations – Saudi e-Government Program (Yesser)

SPEAKER PROFILES

Dr. Fayez Bin Ali A`alSaleh Al Asmari heads the education office of the General Directorate of Education in Saudi Arabia’s Aseer region. He is also a lecturer at King Khalid University. Prior to this role, he was the assistant of educational affairs at the Abha Educational Office. He also previously served as head of the social science department at the General Directorate of Education in the Aseer region. He has published numerous research articles and papers over the course of his career and developed studies to develop critical thinking in education.

Dr. Fayez Bin Ali A`alSaleh Al Asmari Head of Education Office - General Directorate of Education, Aseer region

Mr. Khalid Alshangiti is the CEO of Ebttikar Technologies, the leading ICT solutions provider in Saudi Arabia. In this role, he is responsible for leading a force of over 1,500 IT professionals. He is an IT veteran and entrepreneur with over 25 years of experience in the ICT field, and has held numerous C-level positions in leading public and private sector organi-zations in Saudi Arabia over the course of his career. Prior to joining Ebttikar, he acted as director and advisor to the CEO for strategy and business development at Saudi National Water Company.

Khalid AlshangitiCEO – Ebttikar Technologies

Mr. Abdullah Ayed Alasmari serves as manager of the information sharing department at the National Cyber Security Center (NCSC). Prior to joining NCSC, he worked at Saudi Aramco as an information security specialist where he reviewed and improved industrial control security measures. He has worked for over 18 years in the networking and cybersecurity field, and holds numerous technical certifications from Cisco, Juniper, Aruba, CWNP, and Microsoft. He has also received several prestigious awards, including the Saudi Aramco Executive and Board Committee Certificate of Appreciation.

Eng. Abdullah Ayed Alasmari Information Sharing Manager – National Cyber Security Center (NCSC)

Mr. Yasser Abdullah Ali Al Qasimi is currently the director of the National Preventive Program for Students and chairman of the Advisory Council for School Leadership. He is also a member and chairman of many educational committees and a certified professional coach at the Saudi Ministry of Education.

Yasser Abdullah Ali Al QasimiDirector – National Preventive Program for Students

Yahya bin Mohammed Al ShahraniJudicial Arbitrator and Former Lawyer

SPEAKER PROFILES

Mr. Nayef Bin Mohammed Al Mudarrae heads the cybercrimes bureau at the Saudi Bureau of Investigation and Prosecution. In this position, he helps the organization proceed with its investigations, carry out public prosecutions, increase societal awareness of cybercrime activity, and share developments with IT industry stakeholders.

Nayef Bin Mohammed Al MudarraeHead of Cybercrimes Bureau – Bureau of Investigation and Prosecution

Mr. Abdulelah Said Ahmed Al Shahrani is a member of the law department at Shariah College, King Khaled University. He is also a founder and member of the Office of Expertise for Legal and Legal Consultancy and Studies. In addition, he is an arbitration consultant for the International Arbitration Commission and a certified trainer at the General Organization for Technical and Vocational Training. He is interested in administrative justice and research, and provides courses on the rights and duties of the public employees and workers. He also routinely gives legal advice.

Bader bin Musleh Al-Qahtani is chief computer engineer for Saudi Arabia's Royal Court. He has previously held senior IT positions within the Department of Culture and Education, the Armed Forces, General Staff Headquarters, and the Ministry of Defense and Aviation. He has attended more than 45 specialized administrative and technical courses and been the recipient of numerous certificates of recognition and appreciation. He also holds memberships of the Saudi Association of Engineers, the Saudi Association of Civil Engineers, the Saudi Scientific Society of Medical Engineering, and the Saudi Society of Industrial Engineering and Systems Engineering.

Abdulelah Said Ahmed Al ShahraniLaw Department Faculty Member – Shariah College, King Khalid University

Mr. Khaled Saeed Mfarah Al Sareie is the head of the cybercrimes unit at the Commission for the Promotion of Virtue and Prevention of Vice in the Asir Region of Saudi Arabia. He has worked for the commission for 10 years and has held numerous positions at the organization. He has also participated in several Sharia and technical courses over the length of his career.

Khaled Saeed Mfarah Al SareieHead of Combating Cybercrimes Unit in the Commission for the Promotion of Virtueand Prevention of Vice at 'Asir Region.

Bader bin Musleh Al QahtaniChief Computer Engineer – The Royal Court

Sheikh Majed Mohamed Ali Alrigi'eHead of Criminal Court, Jeddah

Bachelor of Shariah, Imam University. He obtained a master degree in political policy from the Higher Institute of Judgement. He was a former part time faculty member in Najran University during his duty as a Head of the Public Court of Najran.

PRESENTATION ROOM: ASEER

REGISTRATION DESK : Table 1 STAG

E

1

ENTRANCE FROM HOTEL LOBBY

Conference Area

Exhibit Area

BACK

DRO

P

ENTRANCE FROM THE PARKING

PRESENTATIO

N RO

OM

ASEER 1

AV CO

NSO

LE

EXHIBIT ROOM: Al-Nakhel

LUNCH : Resturatnt at the Lobby Level

2

Coffee break table

1Table

Partnership LevelCompany Name

1PlatinumEbttikar (3mx2m)Cisco (3mx2m) 2Platinum

3Exhibit F5 (2mx2m)

4Exhibit Forcepoint (2mx2m)

5Exhibit Scopeme (2mx2m)

6Exhibit K-Devs (2mx2m)

2nd International Conference on Anti-Cybercrime(ICACC) المؤتمر الدولي االثانى لمكافحه الجرائم المعلوماتيه

About King Khalid University

King Khalid University (KKU) is a public Saudi university founded in 1999, following the merger of Al Imam University’s Abha branch with King Saud University’s Abha branch. The merger created a unified multi-campus university with an academic orientation that emphasizes the arts, sciences, engineering, and health science disciplines. Since its founding in 1999 KKU has grown significantly . Today, there are over 64,489 students pursuing undergraduate and graduate degrees offered across 29 campuses and served by 3,459 employees, in addition to over 3,570 faculty members. Through its vision and mission, KKU aims to distinguish itself as a recognized provider of academic excellence and leader in the uses of information technology. Recently, KKU has made significant progress on both fronts as evidenced by the successful implementation of its e-learning strategy. Today, KKU is continuing this progress by engaging in an e-transaction assessment; a step aligned with its efforts to position itself as a leading institute in the delivery of user-focused, secure electronic services.

عن جامعة الملك خالد

جامعة الملك خالد هي إحدى الجامعات الحكومية التي تأسست عام 1999 بعد دمج فرع جامعة اإلمام محمد بن سعود اإلسالمية مع فرع جامعة الملك سعود. نتج عن هذا االندماج جامعه لها فروع منتشره فى أنحاء المنطقه ،جامعه ذات توجه أكاديمى يركز على الفنون، العلوم، الهندسة، وتخصصات العلوم

الصحية.أكثر من يوجد فاليوم، نمو متزايد وملحوظ. 1999وهى فى عام خالد في الملك تأسيس جامعة منذ 29 حرم جامعي ويقوم على العليا المقدمة في الجامعية والدراسات يتابعون دراستهم 64489 طالب

خدمتهم 3459 موظف، أضافه الى اكثر من 3570 عضوهيئة تدريس.برنامج تقديم طريق عن غيرها عن التميز إلى ورسالتها، رؤيتها خالل من خالد، الملك جامعه تسعى أكاديمي متميز ومعترف به، أضافه الى الرياده في مجال تقنية المعلومات. في اآلونة األخيرة، أحرزت جامعة الملك خالد تقدمًا كبيرًا على الصعيدين االمر الذى يعتبر دليل على التنفيذ الناجح إلستراتيجية

التعلم اإللكتروني.اليوم، جامعة الملك خالد تواصل هذا التقدم من خالل المشاركة في تقييم التعامالت اإللكترونية، وهي خطوة تتماشى مع الجهود التي تبذلها الجامعه لتتبؤ مكانه المؤسسة الرائدة في تقديم خدمات إلكترونية

آمنة تضع نصب عينها المستخدم.