Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:30 AM
Dark Reading
Dark Reading
Products and Releases

DarkMatters Cyber Network Defence expert, Stephen Brennan, confirmed as keynote presenter at global industry events

Stephen to talk on the 'Security of Everything' in Abu Dhabi, and 'Ghosts in the Shadows' in San Francisco

Abu Dhabi, Dubai, San Francisco – 1 February, 2016 --  DarkMatter, a cyber security firm with global aspirations, confirms the participation of its Senior Vice President of Cyber Network Defence, Stephen Brennan, at multiple high-level industry events during the month of February 2016. These engagements reflect his status as a sought-after industry thought leader.

Stephen, who possesses more than 25 years of international cyber security experience to corporations and governments, is a keynote speaker at the forthcoming IDC Middle East CIO Summit 2016 (http://www.idcmesummit2016.com/) event, which is taking place in Abu Dhabi 17-18 February.

IDC’s flagship CIO Summit Middle East event attracts over 150 leading IT industry specialists. Stephen’s keynote address will delve into The Security of Everything, given that tomorrow’s future digital transformations, governments, converged infrastructure and mobile enterprises are all set to create frictionless environments to enable better and more sustainable lives.

Stephen is also set to address the audience at the highly regarded RSA USA 2016 event (https://www.rsaconference.com/events/us16) taking place in San Francisco at the end of February. He will offer insights on how limited stealth operations allow organisations of all sizes to bolster their risk management programmes by enriching security data with data derived directly from the sources of risk. His presentation at RSA USA is entitled, Ghosts in the Shadows.

RSA developed the RSA Conference in 1991 as a forum for cryptographers to gather and share the latest knowledge and advancements in the area of Internet security, and the event has consistently attracted the world's best and brightest in the field. This has created opportunities for conference attendees to learn about IT security's most important issues through first-hand interactions with peers, luminaries and emerging and established companies.

Commenting on his full conference calendar for February, Stephen said, “From the recently-concluded World Economic Forum in Davos, to the pages of broadsheet newspapers and blogs across the globe, the increased focus on cyber security is palpable. As a cyber security specialist, we feel it is important for DarkMatter to participate in industry events to exchange ideas with peers as well as share some of our own insights, which have been borne from our unique placement and experience as a global provider based in the UAE.”

Stephen joined DarkMatter from Computer Sciences Corporation (CSC) in Australia, where he was Global General Manager and Senior Managing Partner of the company’s Global Cyber security Consulting practice. Stephen is a highly regarded global cyber security specialist, having worked across all facets of cyber security including hardware, software, infrastructure, managed services, incident response, policy, privacy, threat mitigation, compliance, and governance.

He has experience in domains ranging from the Internet of Things to the cloud, apps and Big Data, and his comprehensive industry expertise includes aerospace, defence, energy, materials, manufacturing, retail, health, finance, IT, telecommunications and utilities.

While with CSC, Stephen’s clients included the majority of Fortune 100 and Global 2,000 organisations, where he was instrumental in the creation of the company’s elite StrikeForce, the industry’s first commercial ethical hacking and digital forensics group. He has subsequently worked with global tier one technology and research partners to bring to market solutions for today’s most advanced threats.

Faisal Al Bannai, Chief Executive Officer of DarkMatter said, “Stephen is a standout cyber security expert with vast experience across all domains of cyber security and is a recognised expert in Cyber Network Defence. His experience will be of great value and benefit to customers in this region and beyond. Our vision is to build up knowledge of cyber threats and the capacity to monitor, identify, repel, and plan for them right here in the region, and someone like Stephen will be instrumental in achieving this ambition.”

DarkMatter is already a trusted partner to the UAE Government and is staffed by tier one international cyber experts who develop, manage and deploy the most innovative technologies. Solutions adhere to DarkMatter’s Cyber Security Life-Cycle, which incorporates a four-stage approach involving planning, detection, protection and recovery, and reinforces its secure business solutions.

DarkMatter is leveraging this experience in the wider market as it looks to serve regional and international clients. The company provides a complete portfolio of cyber security solutions and services to organisations that have sophisticated security requirements, from governments and infrastructure operators to large corporations.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-21
** DISPUTED ** Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended fo...
PUBLISHED: 2021-06-21
Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauth...
PUBLISHED: 2021-06-21
Joomla! Core is prone to a session fixation vulnerability. An attacker may leverage this issue to hijack an arbitrary session and gain access to sensitive information, which may help in launching further attacks. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 are vulne...
PUBLISHED: 2021-06-21
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise restricted actions and subsequently retrieve password reset tokens from the database through an already existing SQL injection vector. Joomla! Core versions 1.5.x ranging from 1.5...
PUBLISHED: 2021-06-21
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.