The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by vladimir.mirzoev, 2023-10-22 17:21:26

CyberDemo

HOSTED BY
ORGANISED BY
CYBERSECURITY CENTER
OF THE REPUBLIC OF UZBEKISTAN
3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
A BIG THANK YOU TO OUR SPONSORS
PROUD TO BE SUPPORTED BY
PLATINUM SPONSORS
GOLD SPONSORS
BRONZE SPONSORS
TITLE SPONSOR
KAZAKHSTAN
INFORMATION CYBERSECURITY
COMMITTEE
GEORGIA
DIGITAL GOVERNANCE
AGENCY
INTERNATIONAL
TELECOMMUNICATION UNION
TURKMENISTAN
COMMUNICATION AGENCY
TÜRKMENARAGATNAŞYK
FIRST.ORG
AZERBAIJAN
STATE SERVICE OF SPECIAL
COMMUNICATION &
INFORMATION SECURITY
NATIONAL CYBER PARK
OF UZBEKISTAN
ORGANISATION OF ISLAMIC
COUNTRIES CERT
TSARKA
TÜRKİYE
CYBER SECURITY DEPARTMENT
DIGITAL TRANSFORMATION OFFICE
THE PRESIDENCY OF THE REPUBLIC
OF TÜRKİYE


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
Fortinet Security Fabric
Broad
visibility and protection of the
entire digital attack surface to
better manage risk
Integrated
solution that reduces
management complexity and
shares threat intelligence
Automated
self-healing networks with
AI-driven security for fast and
efficient operations
Copyright © 2023 Fortinet, Inc. All rights reserved.
www.fortinet.com
HWG Sababa
Глобальный поставщик решений в области
кибербезопасности – с локальным
представительством Sababa CA в Узбекистане
Awareness
Pentest
SOC
S SI IE EM M
Tailored
Monitoring
A An nt ti if fr ra au ud d
Solution
I Integration
Endpoint
Protection
[email protected]
HWGSababa_CA_bot
Свяжитесь с нами,
чтобы узнать больше:


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
Fortinet Security Fabric
Broad
visibility and protection of the
entire digital attack surface to
better manage risk
Integrated
solution that reduces
management complexity and
shares threat intelligence
Automated
self-healing networks with
AI-driven security for fast and
efficient operations
Copyright © 2023 Fortinet, Inc. All rights reserved.
www.fortinet.com


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
Hybrid Mesh Firewalls Protect the Expanding
Attack Surfaces of Distributed Sites
Executive Summary
The widespread adoption of new digital innovations has transformed enterprise
networks—adding breakthrough capabilities while at the same time exposing
new vulnerabilities. Network attack surfaces have dramatically expanded with the
rapid proliferation of the mobile workforce, multiple public and private clouds, and
Internet-of-Things (IoT) devices. Enterprise IT teams must now defend corporate
sites that include direct internet access, such as branches and campuses, as well
as on-premises data centers, public clouds, and remote sites to support work
from anywhere (WFA). This makes extended enterprises more difficult to secure.
Fortinet FortiGate Next-Generation Firewalls (NGFWs) are part of a hybrid mesh
firewall (HMF) solution that enables broad, integrated, and automated protection
against emerging threats and increasing network complexity. FortiGate is an
integral part of the Fortinet Security Fabric, an end-to-end security architecture
designed to protect evolving networks.
Distributed Networks Present a Larger Target for Attack
Fortinet NGFWs
n High-performance threat
protection
n Validated security effectiveness
n Protection of mission-critical
applications
n Continuous risk assessment via
security rating and automation
n Integration with the Fortinet
Security Fabric
n Enterprise-class security
management
1
SOLUTION BRIEF
New technologies are causing enterprise networks to expand. This includes the widespread adoption of cloud environments,
geographically distributed offices, and a greater number and variety of endpoint devices. Cyberattack damage will amount to
about $10.5 trillion annually by 2025, a 300% increase from 2015.1
Threat actors are well aware of this vulnerability. They pinpoint the weakest points across this ever-expanding network
surface. They use sophisticated strategies (such as multivector or polymorphic attacks) and automated processes to penetrate
defenses to steal sensitive information or lock down operations in exchange for ransom.
Trying to keep up, network engineering and operations leaders worry about a lack of complete visibility into encrypted
data and control of a network infrastructure that spans applications, data, users, and multiple network edges. At many
organizations, the vast number of disconnected point security products operating in silos across the network only increases
complexity. A recent Panaseer report found that the shift to cloud and remote working has driven a 19% increase over the past
two years in the number of security tools organizations must manage—from 64 to 76.2 This results in a less effective security
posture, as the same report found that 82% of security leaders have been surprised by a security event, incident, or breach
that evaded a control they thought was in place.3
Driving the Evolution in Network Security
Network engineering and operations leaders need greater compatibility across the different security solutions deployed
across the entire organization to improve security effectiveness. They need security that can share threat intelligence in
real time, a high level of reliable network performance, open application programming interfaces (APIs) to coordinate and
automate responses, and simplified security management in a single-pane-of-glass console.
Enterprises need to protect the entire expanding attack surface—from IoT to multiple clouds, and from users to data. This
includes performing secure sockets layer (SSL)/transport layer security (TLS) inspection to detect malware in encrypted flows.
Fortinet FortiGate NGFW solutions address all these needs by taking a more collaborative and integrated approach across
the entire IT infrastructure.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
Fortinet FortiGate NGFWs: Protecting Corporate Sites and Data Centers
FortiGate NGFWs simplify security complexity and provide visibility into applications, users, and networks. Appliances utilize purpose-
built security processing units (SPUs) and threat intelligence services from FortiGuard Labs to deliver top-rated security and high-
performance threat protection (such as intrusion prevention, web filtering, anti-malware, application control) for known attacks. The
unknown attacks are detected and prevented by Fortinet on-premises and cloud-based advanced threat protection solutions.
As part of the broader Fortinet Security Fabric architecture, FortiGate NGFWs leverage automated, policy-based responses
to accelerate time to resolution. When a FortiGate NGFW detects an event, it communicates with the Security Fabric, which
determines what information will be shared across the enterprise. For example, when malware is detected in one part of the
organization, the Security Fabric shares threat intelligence with the rest of the IT infrastructure. In another instance, when a policy is
created for one security solution, the Security Fabric can contextually apply that same policy across other security solutions in the
architecture for consistent and coordinated control.
FortiGate NGFWs allow deployment flexibility to be tailored to the specific security needs of an enterprise that requires either
running one or more security features like SSL/TLS inspection, IPS, and antivirus individually or concurrently with minimal
performance degradation. All deployed FortiGate devices across the organization’s network infrastructure are interconnected via
the Security Fabric. This integration provides comprehensive, real-time protection while simplifying deployment and reducing the
need for multiple touchpoints and policies across the enterprise.
Fortinet NGFW Use Cases
n Reduce complexity. Consolidate products and services, reduce costs, and maximize return on investment (ROI).
n Encrypted cloud access. Achieve transparency and control by inspecting all types of traffic—from clear text to encrypted
(SSL/TLS).
n Visibility and automation. Gain access to network and security events for contextual visibility while simplifying operations
with automated processes.
Industry-Leading Security Effectiveness
Extensive knowledge of the threat landscape and the ability to respond quickly at multiple levels are the foundations for effective
network security. This is why the FortiGuard Threat Intelligence Service—credited with an unprecedented 1,026+ zero-day threat
and vulnerability discoveries4 is a crucial enabler of Fortinet’s world-class NGFW capabilities.
Figure 1: Hybrid Mesh Firewall
2
SOLUTION BRIEF
Hybrid Mesh Firewalls Protect the Expanding Attack Surfaces of Distributed Sites


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
FortiGuard AI-Powered Security Services
The FortiGuard global threat research team collaborates with Fortinet product developers to deliver dynamic security intelligence
services. Security updates are instantaneous—automatically and independently validated by third-party research labs. This
ensures that the threat intelligence is highly accurate and effective.
Fortinet receives consistently high marks in real-world security effectiveness tests, such as those from CyberRatings.org, Virus
Bulletin, and AV-Comparatives, due to our combination of in-house research, information from industry sources, and advanced
machine-learning capabilities.
Simplify Operations with Centralized and Unified Management
The unique single-platform approach of the Fortinet NGFW, which includes flexible deployment options, delivers end-to-
end protection that is easy to buy, deploy, and manage. Centralized security management and visibility consolidate multiple
management consoles into a single pane of glass and unlock automation-driven management. Specifically, a highly intuitive view
of applications, users, devices, threats, cloud service usage, and deep inspection gives network engineering and operations
leaders a better sense of what is happening on their networks. This strategic view allows them to easily create and manage more
granular policies to optimize security and network resources.
Figure 2: FortiGuard Labs 360 degrees of threat intelligence
Figure 3: FortiManager dashboard view
Network leaders can transparently observe traffic and set consolidated policies with granular security controls. Network
management becomes both automation-driven and analytics-powered via a single-pane-of-glass console for logging, reporting,
and central administration.
3
SOLUTION BRIEF
Hybrid Mesh Firewalls Protect the Expanding Attack Surfaces of Distributed Sites


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
Figure 4: Fortinet Security Fabric
4
SOLUTION BRIEF
Hybrid Mesh Firewalls Protect the Expanding Attack Surfaces of Distributed Sites
One Hybrid Mesh Firewall Solution across the Extended Enterprise
As a foundational part of a hybrid mesh firewall, FortiGate NGFWs deliver protection that keeps pace with the accelerating demands
of high-performance enterprise networking. FortiGate NGFWs feature centralized management that unifies protection across
corporate sites such as branches and campuses and on-premises data centers, public clouds, and remote sites for work from
anywhere. Every FortiGate NGFW appliance contains purpose-built security processor technology, which provides extremely high
throughput and exceptionally low latency while delivering industry-leading security effectiveness and consolidation.
The FortiGate NGFW family includes a set of flexible platforms at various price-performance points that can be deployed at
the enterprise edge, data center edge, or branches of a distributed enterprise to provide secure access to multiple clouds.
FortiGate NGFWs can also be deployed within the data center as part of an intent-based segmentation solution. Intent-based
segmentation creates partitions across flat and open networks to reduce the attack surface.
It also applies adaptive access controls that establish continuous trust of users and devices based on user and entity behavior
analytics (UEBA).


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SOLUTION BRIEF
Hybrid Mesh Firewalls Protect the Expanding Attack Surfaces of Distributed Sites
Copyright © 2023 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product
or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other
conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser
that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any
such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise
revise this publication without notice, and the most current version of the publication shall be applicable.
www.fortinet.com
June 8, 2023 11:49 PM
416367-C-0-EN
1 Bharath Aiyer, Jeffrey Caso, Peter Russell, and Marc Sorel, New survey reveals $2 trillion market opportunity for cybersecurity technology and service providers
McKinsey & Company, October 22, 2022.
2 Panaseer, 2022 Security Leaders Peer Report, January 2022.
3 Ibid.
4 FortiGuard Labs Zero-Day Research, accessed May 31, 2023.
5 CyberRatings.org, Enterprise Firewall Comparative Report, April 24 2023.
Enabling a Broad and Dynamic Defense Strategy for the Long Term
Fortinet NGFWs offer universal platform support for all types of deployments,
giving network leaders exceptional flexibility across the extended enterprise
infrastructure. Managers have the visibility and control they need to counter
attackers with a single network security operating system across the entire
FortiGate family of solutions.
Additionally, all the FortiGate appliances are interconnected via the Fortinet
Security Fabric to automatically distribute contextual security policies and threat
intelligence across an organization. FortiGate devices are industry-leading for
their security capabilities, rated 99.88% effective against cyber exploits and
evasions by CyberRatings.org.5
A single-pane-of-glass dashboard consolidates management views, enhances
visibility, and simplifies security policy implementation, so you can build a HMF
to protect your expanding attack surface across distributed sites, including data
centers, public clouds, and remote locations.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
Securing
your
security
2021
How protective
software is
kept safe from
compromise


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
1
Can Your Security Software Get
Hacked?
All commercial software will have some vulnerabilities which can
be exploited as a means of introducing malware. The nature of
today’s sophisticated software, and the sheer quantity of code
involved, means that it is effectively impossible to guarantee
that a software application of any significant level of complexity
does not include vulnerabilities.
The word ‘vulnerability’ has a specific meaning in this context –
it is any weakness in the software code which can be exploited
by a threat actor in order to introduce malware into the system
running that software, or otherwise put it under threat. Finding
these weaknesses in commercial software is an underworld
business in itself – specific details of vulnerabilities in popular
applications and operating systems are purchased by malefactors
on the dark web for considerable sums. The other arm of this
criminal industry is the manufacture of ‘exploits’ – pieces of
code designed to exploit these individual vulnerabilities and use
them to inject malware into your systems.
Exploiting vulnerabilities in commercial software is how the vast
majority of corporate cyber-attacks, even the most complex
and sophisticated, originate.
From the moment a new version of a popular application, or
operating system, is launched, its originators are in a race with
the cybercriminals to see who can find its vulnerabilities first.
Once a vulnerability is identified, the original manufacturer will
create a new fragment of code eliminating the vulnerability,
which is delivered to the end user within an updated version of
the software, or in a ‘update’ or ‘patch’. This, when installed,
eradicates the vulnerability. This is why it’s important to keep
your computer software updated
That’s all very well with a single computer. But constantly patching
all the software used in a corporate IT environment is a big job.
In fact, it’s an almost impossible one, in view of the number of
updates an IT department may receive each week, and the
difficulty of applying them all without significant disruption to
the business.
Some security software vendors offer solutions to this issue.
Organizations using Kaspersky Endpoint Security Advanced or
Kaspersky Total Security for Business, for example, benefit from
vulnerability & patch management functionality, which helps
identify which software requires patching, and what updates
are most urgent and critical. Automated patching can be set to
apply the prioritized patches at the most appropriate and
convenient times – making IT administrators’ lives much easier.
So – all good. Your security software ensures that vulnerabilities
in the software you use are patched in a timely and efficient
manner.
The most exploited vulnerabilities
Vulnerabilities in Microsoft Office remain the most exploited of
all software. Among the most targeted are the four vulnerabilities
CVE-2017-11882, CVE-2018-0802, CVE-2017-8570 and CVE-2017-
0199 - for all of which patches have long been available from the
vendor.
Securelist, Kaspersky Security Bulletin 2020. Statistics
Hold on though….
If all commercial software inevitably contains vulnerabilities,
does that include the security software itself?
Unfortunately, it does.
Most software manufacturers make serious efforts to integrate
Secure Development Lifecycle (SDL) practices into their R&D
processes, in order to ensure that their products are secure.
And security systems manufacturers, by definition, do this better
than most. But no software vendor can ever claim ‘It’s impossible
for cybercriminals to detect any weaknesses in our products ’.
The best we can do is to get as close to that ideal as is possible.
The alternative – no vendor launching any new software until
they can 100% guarantee that it contains not a single weakness
that could be exploited by attackers – would mean in practice
that no software would ever get launched at all.
The Road to Making
Products Secure
How can we make our products as secure as possible? By bringing
together a number of approaches.
Security from the ground up
A secure product architecture, and a development process
which incorporates risk assessment and analysis at the earliest
stages, both go a long way towards minimizing the potential for
vulnerabilities in the finished software, right from the start.
Testing and elimination during the latter stages of development,
and ongoing post-development vulnerability identification and
eradication, involve R&D, Product Management and Support all
working together to complete the security cycle. At Kaspersky
our SDL is further supported by our Product Security
Champions and input from our Anti-Malware Research team.
Secure
Development
Lifecycle
Security
risk
assessment
Vulnerability
elimination
Testing
for any
vulnerabilities
Security
requirements
analysis
Attack
surface
analysis
Development


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
2
Eliminating vulnerabilities
At Kaspersky, we have a number of ways of finding those
elusive vulnerabilities which somehow manage to survive our
SDL processes, so that we can close them off.
These include:
• Our internal security audits, which include actually attempting
to hijack our own applications and trying to penetrate our
own systems.
• The HackerOne platform. Here, independent researchers,
including ‘white hat’ hackers, can earn a ‘bug bounty’ by providing
data about any vulnerability they can find in our products.
• Our dedicated vulnerability-reporting mailbox and web
page - some reporters may prefer to use these to alert us to
possible vulnerabilities.
Sources of vulnerability intelligence
Responding to vulnerability reports is a whole separate process,
Our Product Security Team (PST) works to confirm any
vulnerability and to assess its severity, while product teams
work to fix the vulnerability within rigorous timescales, correcting
the code that allowed it to exist in the first place . If, as happens,
the vulnerability turns out to be a weak spot inside an operating
system rather than in one of our own products, we take a
different approach – alerting the OS vendor and working with
them to resolve the issue.
White hat hackers
These are highly skilled free-lance security researchers who enjoy
the excitement and challenge of tracking down software
vulnerabilities, but who work ethically to protect users, rather than
marketing their findings on the dark web. We pay a bug bounty for
any genuine vulnerability in our software that white hat hackers
can find and report to us.
Safe from the inside
While exploiting vulnerabilities is by the far the most common way
to attack any system, there are other ways in which attacks
can be launched via popular applications – and that includes
security solutions.
There have, for example, been cases where ‘weaponized’
packages of commercially available security software, adapted
by cybercriminals to enable an attack on the user, have been
offered as downloads. These have generally originated from
dubious download sites, so can easily be avoided by downloading
only from the vendor’s own resources. An attacker could perhaps
manage to corrupt the stored version on the actual vendor’s
site – but this would involve using fake or stolen certificates
that would not allow such operations to last for long.
The real danger lies in a cyber-attacker getting access to
any developers’ own factory, where they could theoretically
introduce portions of malicious code into legitimate software
right from the outset, creating a perfectly disguised attack tool.
But this can’t happen if security is built into all aspects of the
development process, as is the case with Kaspersky. A securely
built environment incorporating code integrity monitoring and
the automated testing of all components as they are developed –
plus regular security assessments of the apps and the infrastructure
itself, and a multitude of other precautions we’d rather keep to
ourselves - all this makes it virtually impossible for any insider
attack to get to first base, let alone to succeed.
Attacked from within
In early 2019, Kaspersky researchers discovered that a live
software update tool, downloaded from the official site of a major
computer hardware manufacturer, had been hacked to install a
malicious backdoor onto customers’ computers. The attackers
had managed to hijack the vendor’s server – the hacked software
even featured the vendor’s legitimate digital certificates!
Source: Securelist.com
Vulnerability in OS that
affects a product
Vulnerability in 3rd party
software that affects a product
Vulnerability report from
HackerOne
Vulnerability found through
internal audit and testing
Vulnerability report from
website
Vulnerability report from
[email protected]
Product Security
Internal vulnerability
report
Product Team
The different sources of vulnerabilities intelligence
that Kaspersky receives


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
3
www.kaspersky.com
2019 AO Kaspersky Lab. All rights reserved.
Registered trademarks and service marks are the property of their
respective owners.
Cyber Threats News: www.securelist.com
IT Security News: business.kaspersky.com
Cybersecurity for SMB: kaspersky.com/business
Cybersecurity for Enterprise: kaspersky.com/enterprise
We are proven. We are independent. We are
transparent. We are committed to building a safer
world, where technology improves our lives. Which
is why we secure it, so everyone everywhere has the
endless opportunities it brings. Bring on cybersecurity
for a safer tomorrow.
Known more at kaspersky.com/transparency
We are proven. We are independent. We are
transparent. We are committed to building a safer
world, where technology improves our lives. Which
is why we secure it, so everyone everywhere has the
endless opportunities it brings. Bring on cybersecurity
for a safer tomorrow.
Known more at kaspersky.com/transparency
Never stopping learning
As we integrate secure practices into our software development
lifecycle, we ensure that every developer and architect is
trained in all aspects of product security. That way, we know that
security will automatically be at the forefront of every design
decision.
DevSecOps: substance
under every syllable
In line with our principles of built-in, continuous and adaptive
security, Kaspersky has been implementing the principle of
Development and Operations connected through Security
(currently known as ‘DevSecOps’) since well before this became a
common buzzword. Our integrated approach to security means
that even in the case of a compromise – and as we have said,
nobody, not even a security vendor, is 100% bulletproof – our
customers would remain entirely safe. This is what lies at the
heart of the world’s most tested and most awarded security.
For more of the latest thinking on corporate cybersecurity and
threat developments, visit Kaspersky’s business blog.
Code analysis
Vulnerability
fixing
Cryptography
and its
significance
Threat
modelling
Secure coding
practices
Overall
applications
security
Areas of security training for Kaspersky developers
and architects.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
We’re only human:
Human error
is the leading
cause of cloud
data breaches
Digital sovereignty issues
around cloud usage loom
large on multiple fronts.
Complex encryption key
management creates security
and operational risks.
Levels of sensitive
data encryption
must be higher.
of respondents chose human error
as the leading cause of cloud
data breaches, well ahead of
exploitation of vulnerabilities, the
second highest selection at 2 1%.
Respondents report multiple key management
systems in use.
of respondents report that 60%
or more of their cloud data is
encrypted. On average, only 45%
of sensitive data is encrypted.
Respondents report high use of cloud provider-
dependent encryption key management,
alongside growing concerns about sovereignty
mandates.
say they have
five or more key
management
systems in place.
say that they control all
of their own encryption
keys in cloud
environments.
55%
83%
62%
22%
14%
ONL Y
are concerned about impacts
of sovereignty on cloud
deployments.
ONL Y
READ
MORE
GLOBAL EDITION
2023 CLOUD
SECURITY STUDY
The Challenges of Data Security and Sovereignty in a Multicloud World


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
Our portfolio of platforms consolidates best-in-class capabilities under a single, unified
cybersecurity solution. Our platforms cover every defense vector with security tools that
share intelligence and work together—from prevention to detection and response—to stop
the most complex threats. Benefits of cybersecurity platforms:
At Palo Alto Networks, we offer the industry’s most advanced cybersecurity platforms and
services. We are trusted by the world’s most valuable enterprises and have been recognized
in 11 Gartner Magic Quadrants and Forrester Waves.
Our offerings include:
Cortex—the platform for the modern SOC
Palo Alto Networks offers the industry’s most comprehensive product
portfolio for security operations, empowering enterprises with best-in-
class detection, investigation, automation, and response capabilities.
Prisma Cloud—the leading platform for cloud security
We secure applications from code to cloud, enabling security and
DevOps teams to collaborate effectively and accelerate secure
cloud-native application development and deployment.
Network Security Platform
Firewall
Intrustion Detection
URL Filtering
Sandbox Detection
DNS Security
IoT Security
Data Loss Prevention
Cloud Access Security Broker
Posture and Health Management
Remote access for Users
SWG
SD-WAN
Subcategory
Network
Security
Platform
Cloud Security Posture Management
Cloud Workload Protection
Identity and Access Management
Code Security
Web Application/API Security
Subcategory Cloud Security Platform
Prisma
Cloud
SIEM
Endpoint and EDR
NTA/UEBA
SOAR
Attack Surface Management
Subcategory Modern SOC Platform
Cortex
XSIAM
Palo Alto Networks Network Security Platform
Secure users, apps, and data anywhere— on-premises, in the cloud,
or hybrid. Get complete Zero Trust network security to see and secure
everything from your headquarters to branch offices and data
centers, as well as your mobile workforce.
Palo Alto Networks Multiplatform
Product Portfolio
Enhance risk posture Simplify implementation Reduce IT and
cyber complexity
Reduce procurement
costs and time
1


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
© 2023 Palo Alto Networks | 3000 Tannery Way, Santa Clara, CA 95054 Support: +1.866.898.9087
www.paloaltonetworks.com
Unit 42 Threat Intelligence and
Incident Response
Unit 42 brings together world-renowned threat researchers
with an elite team of incident responders and security
consultants to create an intelligence-driven, response-ready
organization passionate about helping customers more
proactively manage cyber risk. Our consultants serve as your
trusted advisors to assess and test your security controls
against the right threats, transform your security strategy
with a threat-informed approach, and respond to incidents
in record time.
Incident Response
Cloud Incident Response
APT Investigation
Security Program Design and Review
Cyber Risk Assessments
Compromise Assessment
Attack Surface Assessment
Managed Detection and Response
Subcategory Threat Intelligence and
Incident Response
Managed Threat Hunting
Unit 42
With our platform approach to securing the network, cloud, and security operations,
organizations can be confident that they’ll be able to protect people, applications,
devices, and data simply and effectively, taking advantage of the best cybersecurity
products on the market.
Trusted by these North American organizations
Trusted by the world’s most valuable enterprises
9 of 10
largest manufacturing
companies in the world
10 of 10
of the Fortune 10
7 of 10
largest oil & gas worldwide
9 of 10
largest utilities worldwide


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
O'zbekistondagi onlayn to'lovlar
bozoridagi yetakchilardan biri
Kompaniya xususiy va korporativ mijozlar
uchun yuqori sifatli to'lov yechimlarini
taqdim etadi
+10 000 000ro'yxatdan o'tgan
foydalanuvchilar
Xizmatlarning keng doirasi꞉
Payme GO
Internetsiz tez
va xavfsiz to'lov
QR Pay
QR kod yordamida tovarlar
va xizmatlar uchun to'lov
Joylarda to'lash
Tovarlar va xizmatlar uchun
joyida to'lov
To'lovni saqlash
To'lovlarni saqlash
va takrorlash imkoniyati
Kirim‐chiqim
Shaxsiy moliyaviy menejer
Oflayn to'lovlar
Internetsiz mobil telefon
uchun to'lov
Bir nechta kartalarni
boshqarish imkoniyati P2P


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
www.powerdmarc.com


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
Dear Participants of CSS 2023!
On behalf of Cyber Security Center of Uzbekistan and British company
Dialogue Events we welcome you all in beautiful Tashkent at the Cyber
Security Summit – Central Eurasia, CSS 2023.
We would like to thank you all for accepting our invitation and attending
this event today. CSS 2023 brings together national security centres from
across Central Eurasia, cyber security solution providers and governmental,
commercial & industrial end users to connect, learn and do business.
The theme of the conference is Cyber Security for a Digital Central Eurasia
with a focus on Critical Government and Business Asset Protection. The
aim of the conference is to showcase technologies, promote discussion,
facilitate networking and encourage collaboration.
The audience of senior decision makers, cybersecurity experts and end
users will explore the dynamically evolving global risk landscape and how
cyber security can help the countries of the region to take full advantage
of the socio-economic benefits offered by digitalisation.
More than 250 delegates representing over 140 companies and organisations
from 24 countries take part in the event. The conference is attended by
regulators from more than 10 foreign countries, such as Oman, Uzbekistan,
Azerbaijan, Turkey, Georgia, Japan, Turkmenistan, Kazakhstan and
international organisations such as the International Telecommunication
Union, FIRST, OIC-CERT.
The conference program includes about 40 speakers and includes plenaries,
presentation sessions, exhibition area and panel discussions. Numerous
networking events allow all participants effectively and usefully connect
and create new business relationships.
The organising committee hopes your participation in CSS is successful
and resultful and we welcome you again at CSS 2023.
Dialogue Events
Cybersecurity Center
of the Republic of Uzbekistan


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
PARTICIPATING
COMPANIES


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
AGROBANK,
COMMERCIAL BANK, JSC
43 Mukimi Street, Tashkent,
Republic of Uzbekistan,
100096
+99871-202-80-08
[email protected]
www.agrobank.uz
Joint Stock Commercial Bank “Agrobank” is the largest bank
in the Republic of Uzbekistan with an extensive network of
branches throughout the country.
ALMALYK MMC, JSC
EXECUTIVE OFFICE
53 Amir Temur str., Almalyk,
Tashkent region, 110100,
Republic of Uzbekistan
(+99878) 141-90-99
[email protected]
www.agmk.uz
ALMALYK MINING and METALLURGICAL COMBINE Joint Stock
Company is one of the largest industrial enterprises and
the flagship of non-ferrous metallurgy of the Republic of
Uzbekistan. Commissioned in 1949.
The mining and metallurgical industries in our country are
developing from year to year. Specifically, mining metallurgists
representing more than 40 nationalities are working in the
Almalyk Mining and Metallurgical Complex, the flagship of the
Uzbek non-ferrous metallurgy, combining about 36,000 miners.
JSC “Almalyk MMC” is one of the largest industrial enterprises
of Uzbekistan, which has made a worthy contribution to the
development of economic potential of our country during
its 70-year history and its production capacity is based on
copper-molybdenum, lead-zinc, gold and silver mining situated
in Tashkent, Jizzakh, Namangan and Surkhandarya regions.
ALOQABANK, JSC
53 Amir Temur str.,
Almalyk, 4 Amir Temur
Avenue, Tashkent, Republic of
Uzbekistan
8 71 230-77-77
[email protected]
www.aloqabank.uz
The Joint-Stock Commercial «Aloqabank» is one of the big
banks in Uzbekistan that has been operating since 1994.
Comprehensive Service Centres of the bank cover all regions
of the republic. Today, the Bank’s 88 Comprehensive Service
Centres provide a wide range of banking services to real sector
enterprises, small businesses, private entrepreneurs and
households.
The Bank Mission - integrating cutting-edge digital technologies
to create unparalleled IT solutions that provide simplicity,
convenience and choice of attractive banking products, as well
as transforming the bank into a market leading IT company.
The Bank is a member of:

The Association of Banks of Uzbekistan

The «Uzbek Republican Currency Exchange»

The Republican Stock Exchange «Toshkent»

The SWIFT International Payment System

The VISA International Payment System

The Fund for Guaranteeing Citizens’ Deposits in Banks

The Uzbekistan Lessors Association


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
ANORTEC LLC
Bogieram str., house 8,
Tashkent city, 100053
Uzbekistan
+998908277667
[email protected]
www.anortec.uz
Anortec LLC is a resident of the IT park of the Republic of
Uzbekistan and operates in the field of information security.
The company’s competencies cover the entire technological
chain from design, development, implementation and technical
support of comprehensive solutions for cybersecurity of
critical infrastructures and organizations; improvement and
modification of software; development and implementation
of automated control systems; information systems audit;
education, training and advanced training of information
security specialists.
The company has extensive international connections and
exclusive partnerships with leading companies and vendors in
the field of cybersecurity, which have leading positions in the
world ratings of Gartner, Forrester, and IDC.
The company, together with partners, has successfully
implemented more than 100 projects in the field of information
security in Europe and Asia.
Advantages of cooperation with Anortec:

a wide range of information security solutions and services,
including audit, testing, implementation, training, technical
support, configuration and modification of systems;

a complete portfolio of solutions, experience and
successfully implemented projects in information security;

the entire line of cybersecurity tools from the world’s best
vendors;

a strong technical team, an established knowledge base,
and its own testing environment for PoC;

full support, protection and assistance to partners in the
implementation of projects;

the possibility of free pilot testing of proposed solutions
and products.
ASAKABANK
100015, Republic of
Uzbekistan, Tashkent,
Mirabad district,
Nukus street, 67
+998 (71) 200 55 22
[email protected]
www.asakabank.uz
Our bank has been maintaining its leading position in the
financial services market for 27 years. The bank was established
on November 7, 1995 by decision of the Cabinet of Ministers of
the Republic of Uzbekistan and is still one of the leading banks
in Uzbekistan in terms of capital and assets. Asakabank is
always recognized by international organizations. In particular,
it has repeatedly been awarded the rating of Best Bank of the
Year in Uzbekistan’ by foreign publishers Euromoney, Global
Finance and The Banker.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
BAKOTECH
Republic of Uzbekistan,
Tashkent, Tarasa Shevchenko
Str., BC New Level
+998 71 2055860
[email protected]
www.bakotech.com
BAKOTECH is an international group of companies, a flagship in
focused Value Added IT Distribution that represents solutions
of leading IT vendors. Positioning itself as a True Value Added
IT distributor BAKOTECH provides professional pre-sales, post-
sales, marketing and technical support for partners and end-
customers.
CHECK POINT
SOFTWARE
TECHNOLOGIES LTD.
5 Shlomo Kaplan Street
Tel Aviv 6789159, Israel
+972-3-753-4599
[email protected]
www.checkpoint.com
Check Point Software Technologies Ltd. (www.checkpoint.
com) is a leading provider of cyber security solutions to
governments and corporate enterprises globally. Its solutions
protect customers from 5th generation cyber-attacks with
an industry leading catch rate of malware, ransomware and
other types of attacks. Check Point offers multilevel security
architecture, “Infinity” Total Protection with Gen V advanced
threat prevention, which defends enterprises’ cloud, network
and mobile device held information. Check Point provides the
most comprehensive and intuitive one point of control security
management system. Check Point protects over 100,000
organizations of all sizes.
CLOUDFLARE
Riverside Building, 6th Floor,
County Hall/The, Belvedere Rd,
London SE1 7PB
020 3514 6970
[email protected]
www.cloudflare.com
Cloudflare is on a mission to help build a better Internet.
Cloudflare’s suite of products protect and accelerate any
Internet application online without adding hardware, installing
software, or changing a line of code. Internet properties powered
by Cloudflare have all web traffic routed through its intelligent
global network, which gets smarter with every request. As a
result, they see significant improvement in performance and
a decrease in spam and other attacks. Cloudflare was named
to Fast Company’s Most Innovative Companies in 2021, and
ranked among Newsweek’s Top 100 Most Loved Workplaces in
2022.
CUSTOMS COMMITTEE
UNDER THE MINISTRY OF
ECONOMY AND FINANCE
OF THE REPUBLIC OF
UZBEKISTAN
Islam Karimov str., 3
Tashkent, Republic of
Uzbekistan
+998 55 502-76-00
[email protected]
new.customs.uz
The main tasks of the customs authorities are as follows:

protection of the rights, freedoms and interests of individuals
and legal entities protected by law;

to protect the economic interests of the Republic of
Uzbekistan and ensure its economic security within its
competence;

implementation of Customs Control and clearance;

collection of customs duties;

exercise control over compliance with customs legislation,
prevent violations of legislation, including smuggling,
identify them and put an end to them;


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
CYBER PARK
Tashkent city, Mirabad district,
Taras Shevchenko street, 20
+998 55 506 00 99
[email protected]
https://cyberpark.uz/
Cyber Park - Innovative It Cluster In Uzbekistan
Cyber Park was created to develop research activities,
production of high-tech products and services in the field of
information technology and cybersecurity, including through
integration with scientific and educational organizations. It also
represents a complex of facilities and equipment for launching
and bringing to market high- tech products and services in the
field of information technology and cybersecurity. Cyber Park
assists in the implementation of innovative startup projects
in the field of information technology. Cyber Park resident
companies are exempt from taxes and payments until January
1, 2028.
CYBERSECURITY CENTER
OF THE REPUBLIC
OF UZBEKISTAN
Tashkent, Mirabad district, st.
Taras Shevchenko, 20
+998 71-203-55-11
[email protected]
www.csec.uz
Formation of SUE “Cybersecurity Center”
The history of SUE “Cybersecurity Center dates back to 2013.
It was created under the name “Information Security Center”.
In 2013, the formation of the Center was carried out in
accordance with the Decree of the President of the Republic of
Uzbekistan dated June 27, 2013
In 2017, the Center for Information Security was transformed
into the Center for Information Security and Assistance in
Ensuring Public Order.
In 2018, under State Inspectorate for Control in the Sphere
of Informatization and Telecommunications of the Republic
Uzbekistan and the Technical Assistance Center were created.
Since 2019 the State Unitary Enterprise “Cyber Security Center”
operates in accordance with the Decree of the President of the
Republic of Uzbekistan.
The tasks of the Center include:

collection, analysis and accumulation of data on
modern threats to information security, development of
recommendations and proposals for the prompt adoption of
effective organizational, software and hardware solutions
to ensure the prevention of acts of illegal penetration
into information systems, resources and databases of
government bodies and organizations;

interaction with operators and providers of
telecommunications networks, law enforcement agencies
in the framework of analysis, identification of violators,
methods and means used to carry out unauthorized or
destructive actions in the information space;


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS

carrying out certification, examination and certification
of hardware and software products, information and
communication technologies, telecommunications
equipment and other technical means at informatization
facilities (with the exception of state secrets);

providing assistance in the development and implementation
of information security policies for information systems and
resources of government agencies and organizations;

development of proposals for improving the regulatory
framework in the field of ensuring information security of
state information systems and resources, as well as the
national segment of the Internet;

timely notification of national Internet users about emerging
threats to information security in the national segment of
the Internet, as well as the provision of consulting services
on information protection.
CYBERPOINT
189B Heydar Aliyev avenue,
Baku city, Azerbaijan
+994 12 526 33 33
[email protected]
www.cyberpoint.az
Cyber Point, a leading MSSP provider in Azerbaijan, offers a
comprehensive service package of cyber security solutions.
Our offerings includes SOC as a Service, Penetration Testing,
Secure Code Review, Adversary Simulation, Digital Forensics,
Cyber Security Awareness Training, Implementation of Cyber
Security Solutions, Security Audits and Cyber Security
Consulting.
We are among the first to innovate in cybersecurity, protecting
your company from emerging threats and ensuring the integrity
of your digital assets.
DELL
TECHNOLOGIES
+998 97 117 16 18
[email protected]
www.delltechnologies.com
This tenet is the core of Dell’s business and vision. Customers
and team members of Dell Technologies are integral to
continuing success as providers of the essential infrastructure
for organizations to transform their digital futures. Driven by
our ambition and the power of technology to drive human
progress. Unwavering in our commitment to equality, trust and
advocacy for one another.
Specialties: Digital Transformation, Security Transformation, IT
Transformation, and Workforce Transformation
Company size is 10,001+ employees
Headquarters: Round Rock, Texas


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
DIGITAL GOVERNANCE
AGENCY
22 Gorgasali St.,
Tbilisi 0114, Georgia
+995 32 294 41 20 (4010)
[email protected]
www.dga.gov.ge
The Digital Governance Agency (DGA) operates within an
information and communication technology ecosystem,
fostering digital trust-based governance. It aims to provide
secure, efficient, one-stop access to state electronic services,
promoting interoperability among state entities and the private
sector for secure data exchange. DGA’s main objectives include
advancing digital governance, implementing information
security policies, and leveraging modern technology in state
operations. Agency’s functions are categorized into three
areas: ensuring digital governance within the Ministry of Justice
of Georgia, advancing digital governance in the public service
sector, and enhancing information and cyber security in the
private sector.
DIGITAL
TRANSFORMATION
OFFICE (DTO)
OF THE PRESIDENCY
OF THE REPUBLIC
OF TÜRKIYE
T.C. Cumhurbaşkanlığı
Çankaya Yerleşkesi
Ziaur Rahman Cad.
06550 Çankaya/Ankara/
Türkiye
+90 312 969 3900
+90 312 969 3901
[email protected]
[email protected]
https://cbddo.gov.tr/en/
The transition to the Presidential Government System in
2018 has contributed to emphasizing the critical importance
of digital transformation in Türkiye. In this regard, the Digital
Transformation Office (DTO) of the Presidency of the Republic
of Türkiye was established by Presidential Decree No. 1 dated
July 10, 2018 in order to collect the fragmented activities
regarding digital transformation, cyber security, national
technologies, big data and artificial intelligence (AI) under a
single roof in line with advancing technologies, social demands
and the reform trends in the public sector.
DTO adopts the vision of “Digital Türkiye” which aims for
globally competitiveness with national digital technologies.
The vision is a whole-of-government concept including digital
economy and society that motivates vast array of stakeholder
collaborations and integrations.
The presence of a leadership in digital transformation is as
important as having the right vision and strategy in order to
achieve a successful digital transformation. In this context, the
Presidential Decree No. 48 dated October 24, 2019, delineates
the duties and organizational structure of the DTO and defines
the Head of the DTO also as the Government Chief Digital
Officer (CDO).
ENTRUST
1187 Park Pl, Shakopee, MN
55379. USA
+44776942115
[email protected]
www.entrust.com
Entrust keeps the world moving safely by enabling trusted
experiences for identities, payments, and digital infrastructure.
We offer an unmatched breadth of solutions that are critical to
enabling trust for multi-cloud deployments, mobile identities,
hybrid work, machine identity, electronic signatures, encryption,
and more. With more than 2,800 colleagues, a network of global
partners, and customers in over 150 countries, it’s no wonder
the world’s most entrusted organizations trust us.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
EXPERT PRO
Republic of Uzbekistan,
Tashkent,
Amir Temur str., 46 A
+998 78 147 00 37
[email protected]
www.expertpro.uz
Reliable IT service provider since 2013.
Expert Pro is a reliable provider of IT services for business and
state organizations, successfully operating in the Uzbek market
since 2013. Our company pays special attention to professional
development of new competencies. Expert Pro employees
are constantly improving their skills by learning technologies
based on leading IT vendors in order to share the knowledge
with Customer employees. The competence of our specialists
is annually confirmed by international high-level certificates
of the world’s leading IT companies: HPE, Cisco, Dell, Lenovo,
IBM, Oracle, Microsoft, VMware, Naumen, Terrasoft, Directum,
Fortinet, Checkpoint and others.
FIDO-BIZNES, LTD
100017, Republic of Uzbekistan,
Tashkent, Yunusabad district,
“Kashgar” Block, Center-4,
house number 12a
+998 78 160-65-50
[email protected]
www.fido-biznes.uz
The ‘’FIDO-BIZNES’’ company was founded in 1993. Today the
company is one of the largest developers and suppliers of
information systems and technology solutions in the market of
Uzbekistan. Now in the company around 300 employees work at
a fixed basis.
The goal of FIDO-BIZNES is to produce the best information
systems based on advanced technologies that simplify
customer business management.
“FIDO-BIZNES” helps Clients to be highly efficient and
competitive through the use of modern, and most importantly,
inexpensive information technologies; It provides employees
with the opportunity of self-realization and learning new things
in a steadily developing, technological, leading company, in
which it is prestigious to work and build a career; Helps to the
Government build the IT industry.
There are specialists who were trained and certified on DBMS
Oracle, Oracle E-Business Suite, IBM, DB2 DBMS.
The ‘’FIDO-BIZNES’ is a partner of the companies Oracle, IBM,
SAP, Microsoft, NetApp, VisionLabs, Salesforce (Tableau),
Huawei, Hikvision, SWIFT, Apple, OSM Analytics, Luxms BI,
Macroscop, Micro Focus VERTICA.
FORTINET, INC.
899 Kifer Road
Sunnyvale, CA 94086, USA
+998 91 004-40-08
[email protected]
www.fortinet.com
Fortinet, the global leader in cybersecurity, provides the
industry’s largest portfolio of network and cybersecurity
solutions on the most innovative, highest-performing network
security platform. Our mission is to secure and simplify IT
infrastructures while protecting them against today’s most
advanced cyber threats, including malware, ransomware,
and phishing attacks. Our AI-enhanced solutions include
firewalls, intrusion prevention systems, endpoint protection,
and email security; cloud and application journey solutions;
and work-from-anywhere technologies that extend security
and enhance connectivity to remote locations and workers.
Fortinet customers include large enterprises, government
agencies, and service providers across all industries, including
manufacturing, healthcare, financial services, and education.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
GREEN LIGHT ITS
21a, Shevchenko Street
Gross Plaza Business Center,
201, Tashkent, Uzbekistan
+998 71 2038881
[email protected]
www.greenlightits.com
Green Light ITS is an international IT company and system
integrator with offices in Central Asia, Middle East and Europe.
Green Light ITS has a proven track record of delivering
innovative and reliable IT solutions, establishing itself as a
trusted partner for businesses across various industries.
The company’s expertise lies in integrating technologies and
robust infrastructure to help clients optimize their operations
and achieve their business objectives. Green Light ITS provides
information security for companies and optimizes business
processes with the help of innovative technologies.
Green Light ITS specializes in: IT Security, Data Centers,
Enterprise Networks, Unified Communications.
HAAD IT CENTER LLC
Tashkent shahar, Shayxontohur
tumani, Abdulla Qodiriy 5N
+998930458811
[email protected]
www.haad.uz
HAAD IT CENTER LLC is engaged in training students in IT
programming and cyber security.
HUDUDGAZTAMINOT, JSC
Tashkent, Republic of
Uzbekistan Muqimi 98
712811668
[email protected]
[email protected]
www.hududgaz.uz
JSC “Hududgazta’minot” was created by the Decree of the
President of the Republic of Uzbekistan dated July 9, 2019 No.
DP-4388 “On measures to ensure sustainable energy supply
to the economy and the population, financial recovery and
management of the oil and gas industry.”
According to the decree, the company has the following
functions:

operation of gas distribution networks and related equipment
in accordance with the requirements of safe operation;

Purchase, supply, storage and sale of liquefied gas to the
population and social facilities.
ICANN (INTERNET
CORPORATION FOR
ASSIGNED NAMES AND
NUMBERS)
Los Angeles, California, USA
12025 Waterfront Drive,
Suite 300, Los Angeles, CA
90094-2536, USA
+1 310 301 5800
+1 310 823 8649
www.icann.org
ICANN’s mission is to help ensure a stable, secure, and unified
global Internet. To reach another person on the Internet, you
need to type an address – a name or a number – into your
computer or other device. That address must be unique,
so computers know where to find each other. ICANN helps
coordinate and support these unique identifiers across the
world. ICANN was formed in 1998 as a not-for-profit public-
benefit corporation with a community of participants from all
over the world.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
INNOVATIVE
DEVELOPMENT AGENCY
Republic of Uzbekistan,
Tashkent, Almazor district,
University street, 7
+998930061100f
[email protected]
www.mininnovation.uz
Innovative development agency
INSIGHT SOLUTIONS
21 T.Shevchenko str.
Tashkent, Republic of
Uzbekistan
+998911353005
[email protected]
www.insightsi.com
INSIGHT SOLUTIONS is one of the leading IT integrators in the
market of Uzbekistan. From the beginning of its activity our
company specializes in the promotion of modern technologies
and solutions from leading manufacturers, allowing our
customers to optimize their internal work and concentrate on
their core business. Due to continuous striving for development,
our company was able to implement successful projects in
finance, government agencies and retail.
INTERNATIONAL
STRATEGIC CENTER
FOR AGRI FOOD
DEVELOPMENT UNDER
THE MINISTRY OF
AGRICULTURE
Tashkent, Labzak str, 1A
2415144
[email protected]
www.Iscad.uz
The government of Uzbekistan has taken a significant step
towards supporting the reform of the agri-food sector and
implementing the Strategy for the Development of Agriculture
for 2020-2030. This is evident through the establishment of
the International Strategic Center for Agri-Food Development
(ISCAD) under the Ministry of Agriculture (MoA) of the Republic
of Uzbekistan.
The ISCAD has been established by virtue of the Decree of the
President of the Republic of Uzbekistan No. PD-58, which was
issued on December 22, 2021. The center has been created to
improve the system of reform research, strategic planning, and
management in the food and agriculture sector. It plays a vital
role in supporting future strategies and sector development
plans.
IPOTEKABANK OTP
GROUP
100000, Tashkent,
Republic of Uzbekistan
Shakhrisabz Street, 30
+998 (78) 150-11-22
[email protected]
www.Ipotekabank.uz
Mission of Ipoteka-Bank is to create maximum economic value
for bank shareholders and clients. High quality client service
and leadership in the selected markets have top priority for
the success of the bank in the future. When providing its
clients with services, Ipoteka-Bank is committed to comply
with the highest standards of professionalism, introduction of
innovation, openness to new ideas, use of imagination, as well
as the implementation of persistent and consistent activity.
Ipoteka-Bank intends to continue to provide high quality
services in order for relations of the bank with its clients to be
long-term and close.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
JPCERT/CC
JAPAN COMPUTER
EMERGENCY RESPONSE
TEAM COORDINATION
CENTER
8F Tozan Bldg, 4-4-2
Nihonbashi-Honcho, Chuo-ku,
Tokyo, 103-0023, Japan
+81-3-6271-8901
[email protected]
www.jpcert.or.jp/english/
JPCERT/CC is the first CSIRT (Computer Security Incident
Response Team) established in Japan. The organization
coordinates with network service providers, security vendors,
government agencies, as well as the industry associations. As
such, it acts as a “CSIRT of CSIRTs” in the Japanese community.
In the Asia Pacific region, JPCERT/CC helped form APCERT (Asia
Pacific Computer Emergency Response Team) and provides
a secretariat function for APCERT. Globally, as a member of
the Forum of Incident Response and Security Teams (FIRST),
JPCERT/CC cooperates with the trusted CSIRTs worldwide.
KASPERSKY LAB KZ, LLP
Kazybek bi str. 20A, Almaty,
Republic of Kazakhstan
+7 771 503 26 98
Aykanysh.Imanalieva@
kaspersky.com
www.kaspersky.com
Kaspersky is a global cybersecurity company founded in 1997.
Kaspersky’s deep threat intelligence and security expertise
is constantly transforming into innovative security solutions
and services to protect businesses, critical infrastructure,
governments and consumers around the globe. The company’s
comprehensive security portfolio includes leading endpoint
protection and a number of specialized security solutions and
services to fight sophisticated and evolving digital threats. Over
400 million users are protected by Kaspersky technologies
and we help 250,000 corporate clients protect what matters
most to them.
MILLISEC
TECHNOLOGIES
Uzbekistan, Tashkent
Tashkent City, Mirabad district,
st. Afrosiab, h. 8A, Floor 7,
Room 3
+998916787799
[email protected]
https://millisec.uz
Millisec Technologies: Your Trusted Cybersecurity Partner
In today’s fast-paced digital landscape, cybersecurity is
paramount. MILLISEC TECHNOLOGIES, a Uzbek cybersecurity
firm, has made it our mission to protect businesses and
organizations from the relentless onslaught of digital threats.
With a strategic focus on penetration testing, cybersecurity
consulting, and Red Teaming services, we are committed to
enhancing the security and resilience of your digital assets.
Our Mission
At MILLISEC TECHNOLOGIES, our mission is clear: to provide
comprehensive, cutting-edge cybersecurity solutions that
empower our clients to defend against cyberattacks and
secure their most sensitive data. We understand that the threat
landscape is ever-evolving, and we strive to stay at the forefront
of technological advancements, helping our customers stay
one step ahead of cybercriminals.
What We Offer
Penetration Testing: Our team of expert ethical hackers
simulates real-world cyberattacks to identify vulnerabilities
in your systems, networks, and applications. We provide in-
depth reports and actionable recommendations to fortify your
defenses and mitigate risks effectively.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
MILLISEC
TECHNOLOGIES
Cybersecurity Consulting: Partner with us to develop robust
cybersecurity strategies tailored to your unique needs. Our
seasoned consultants collaborate closely with your team,
ensuring the implementation of best practices and compliance
with industry standards.
Red Teaming Services: Our Red Team experts conduct advanced
assessments to rigorously challenge your security measures.
By simulating sophisticated adversaries and employing the
latest tactics, techniques, and procedures, we help you uncover
weaknesses and enhance your overall security posture.
Why Choose MILLISEC TECHNOLOGIES?
Expertise: We specialize in what we do best – cybersecurity.
With a focus on penetration testing and Red Teaming, our team
comprises top-notch ethical hackers and consultants who
bring a wealth of knowledge and experience to the table.
Cutting-Edge Solutions: Cyber threats are constantly evolving.
We embrace innovation and technology, ensuring that our clients
have access to the latest and most effective cybersecurity
solutions.
Customization: We understand that one size does not fit all in
cybersecurity. Our services are tailored to meet your specific
needs, whether you’re a small business or a large enterprise.
Results-Oriented: We don’t just identify vulnerabilities; we
provide actionable recommendations and work with you to
implement solutions that drive results and enhance your
security posture.
Compliance and Security: We are dedicated to helping you not
only meet but exceed industry compliance standards, ensuring
that your organization’s data is secure and compliant.
At MILLISEC TECHNOLOGIES, we take the security of your digital
assets seriously. We invite you to explore our comprehensive
cybersecurity solutions and join the ranks of satisfied clients
who trust us to protect their digital future. Partner with us,
and together, we can fortify your defenses and face the ever-
changing cyber landscape with confidence.
MINISTRY OF
ECONOMY AND FINANCE
OF THE REPUBLIC OF
UZBEKISTAN – IT CENTER
Republic of Uzbekistan,
Tashkent, Istiklol street,29
+99871 2020712 (710)
[email protected]
www.imv.uz
The Ministry develops priorities for the socio-economic
development of the country in the medium and long term,
in the budget, tax and customs-tariff spheres, as well as in
the financial market, insurance, citizens’ rights, pension
provision, accounting and financial reporting, financing of
budget organizations and budget recipients, setting prices for
goods and services of monopolistic enterprises, implementing
the functions of ensuring the achievement of strategic
macroeconomic indicators and parameters of the State budget
of the Republic of Uzbekistan is the executing authority.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
MINISTRY OF
EMPLOYMENT AND
POVERTY REDUCTION
OF THE REPUBLIC OF
UZBEKISTAN
51, Istiqbol str.,
Tashkent, Republic of
Uzbekistan
+998 (71) 203-01-41
[email protected]
www.mehnat.uz
The main tasks of the Ministry are defined as the development
of the state order for the creation of new jobs, coordination
of the implementation of territorial and sectoral employment
programmes, measures to ensure the employment of graduates
of higher and secondary specialised and professional educational
institutions, monitoring the timely payment of benefits and
material assistance to low-income families and others;
Development of specific levers and mechanisms for poverty
reduction, development of criteria and methodology for
assessing the level of poverty and the normative basis for
minimum standards of social security, taking into account
foreign experience;
Work on the qualitative development of the labour market and
its structure, analysis and improvement of labour migration
processes, and distribution of labour resources;
Development and implementation of human capital development
programmes;
MOBILLINE
Hotel Uzbekistan
Musakhanova 45,
Tashkent, Uzbekistan
+998901885050
[email protected]
www.mbline.uz
Specializing in a comprehensive range of services, our
esteemed company excels in the provision of cutting-edge
telecommunication technologies, software and hardware
engineering, as well as offering expert auditing solutions.
Leaning into our unwavering dedication to safeguarding digital
assets, we also deliver top-notch cybersecurity measures
and are renowned for our exceptional sales of HSM devices.
Garnering a global presence, we proudly collaborate with
renowned international partners like Entrust and 3K, while
locally, we have formed invaluable alliances with industry
giants such as Beeline and Uzbektelekom within our country.
NATIONAL
ELECTRIC GRID
OF UZBEKISTAN, JSC
Osiyo 42
Tashkent, Republic of
Uzbekistan
+998 (71) 236-60-35
[email protected]
www.uzbekistonmet.uz
The joint-stock company «National Electric Grid of Uzbekistan»
was established in accordance with the Decree of the President
of the Republic of Uzbekistan dated March 27, 2019 No. PP-
4249 «On the Strategy for the Further Development and
Reformation of the Electric Power Industry in the Republic of
Uzbekistan». «National Electric Grid of Uzbekistan» JSC is part
of the Ministry of Energy of the Republic of Uzbekistan.
The main activities of the company are the operation and
development of the main electric networks of the Republic of
Uzbekistan, the supply of electricity through the main electric
networks and the implementation of interstate transit, cooperation
with electric power systems of neighboring states. Currently, the
JSC «National Power Electric Grid of Uzbekistan» includes 14
regional backbone electric networks, a central relay protection
and automation service and functional branches that provide
other services. On the balance sheet of the joint-stock company
there are 84 substations of 220-500 kV, more than 11 650 km of
overhead power transmission lines with voltage of 220-500 kV.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
NAVOIYAZOT, JSC
Republic of Uzbekistan,
Navoi region, Navoi city
+99897 795 40 15
+998 90 325 04 02
[email protected]
[email protected]
www.navoiyazot.uz
JSC “Navoiyazot” is one of the leading chemical enterprises of
the Republic of Uzbekistan.
JSC “Navoiyazot” is an enterprise, the life and history of which
is inextricably linked with the life and history of Uzbekistan.
Thousands of people flock to his entrance every day. These
are people of various professions, but they are united by one
business, one love for this business, from a leader to a simple
worker.
Today JSC “Navoiyazot” is a dynamically developing diversified
industrial and production complex, which, having the status of
an international partner, carries out a program for the production
of mineral fertilizers, chemical reagents and other low-tonnage
chemical products.
NAVOI MINING
AND METALLURGICAL
COMPANY (JSC NMMC)
27, Navoi Street, 210100
Navoi, The Republic of
Uzbekistan
8 79 227 71 64
[email protected]
www.ngmk.uz

The London Bullion Market Association (LBMA) awarded
Navoi mining and metallurgical combinat the certificate
confirming the successful completion of the next tests for
full compliance with market requirements.

There was launched the first mill unit on the Hydrometallurgical
Plant No6 - the Complex for the extraction and processing
of gold ores at the Pistali deposit, located on the territory
of Nurata district of Navoi region.

Kitco (Canada) reported the world’s top 10 largest gold mines
in 2022. According to this list, the Muruntau mine became
one of the world leaders in gold mining last year.

On the eve of the Day of mining and metallurgical industry’s
employees of the Republic of Uzbekistan, the crushing and
screening complex No1 was launched at the Muruntau chalk-
stone deposit.

JSC Navoi Mining and Metallurgical Company, having
scored 76.2 points, showed one of the highest performance
indicators and took 5th place in the Openness Index 2022,
aimed at assessing the effectiveness and efficiency of
the work done on openness in government agencies and
organizations. In the context of joint-stock companies of this
index, Navoi Mining and Metallurgical Company took the 1st
place among 22 large industrial enterprises and companies.

In accordance with the decree of the President of the
Republic of Uzbekistan dated March 6th, 2023, the machinist
of the Forge and press unit of Navoi Machine-Building Plant
of JSC NMMC Zulfiya Akhmedova was awarded the order
“Mehnat shuhrati”.

JSC Navoi Mining and Metallurgical Company participated
in PDAC (the Prospectors and Developers Association of
Canada), the World’s Premier Mineral Exploration & Mining
Convention, which occurred in Toronto between the 6-8th
March.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS

on February 21th, a new modern smelting furnace for 25 tons
was launched in the Foundry unit of Navoi Machine-Building
Plant.

There was launched a unified situational production control
center at the Central Mining Administration. The main task
of this center, which is located at Hydrometallurgical plant
No2, is to fully control, analyze and manage the processes
of geological exploration, ore mining, transportation and
processing at hydrometallurgical plants.

On January 6th, the first explosion took place at the Pistali
deposit, located on the territory of Nurata district of Navoi
region.
NOKIA SOLUTIONS
AND NETWORKS
KAZAKHSTAN LLP
Kazakhstan, 050059, Almaty,
Al-Farabi av. 17/1, Nurly Tau
Business Center - 5B, Office 18
+7 (727) 259-94-66
[email protected]
www.nokia.com/networks/
security-portfolio/
We focus on the security of entire networks. For communications
service providers (CSPs) and Enterprises, building trust
demands end-to-end optimization of their security operations,
from devices and access sites to cloud edge and the network
core. That requires a combination of insight, scalability, and
adaptiveness: the three sides of what we at Nokia call the
“triangle of trust”.
We take cybercrime seriously and go to battle for our customers
with a wide range of end-to-end security products.
ONESEC
Republic of Uzbekistan,
Tashkent,
Sh. Rustaveli st., 53B
+998 88 158 55 33
[email protected]
www.onesec.uz
Onesec company providWes a full range of security services
for information systems, servers, websites, local and corporate
networks in Uzbekistan. The company has more than 15 years
of practical experience, numerous successful projects and
satisfied customers in both the public and private sectors.
OSIYO SISTEMALARI, LLC
(ASIA SYSTEMS)
79A, Nukus st,
Tashkent, Uzbekistan
+ 998 93 183 18 06
+ 998 90 910 23 65
[email protected]
https://asia-systems.uz
Supply of hardware security modules produced by Thales
e-Security for processing solutions in international payment
systems.
Authorized partner of Thales in the Republic of Uzbekistan


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
O‘ZMILLIYBANK AJ
NATIONAL BANK FOR
FOREIGN ECONOMIC
AFFAIRS OF THE REPUBLIC
OF UZBEKISTAN, JSC
100084, Republic of
Uzbekistan, Tashkent, Amir
Temur Avenue, 101
+998 78 147-15-04
[email protected]
[email protected]
www.nbu.uz
The mission and scope of NBU JSC include:

active lending to large investment projects in priority sectors
of the economy with the involvement of foreign credit lines,
resources in international capital markets, funds of foreign
investors;

introduction of innovative financial products to improve the
quality and terms of service;

banking services to small businesses and private
entrepreneurship, as well as financial advice and information
support in foreign economic activity;

development of retail banking services for people,
introduction of new banking services, including services by
means of information and communication technologies.
PALO ALTO NETWORKS
21a, Shevchenko Street,
Gross Plaza Business Center,
201, Tashkent, Uzbekistan
+998 71 2038881
[email protected]
www.paloaltonetworks.com
Palo Alto Networks, the global cybersecurity leader, is shaping
the cloud-centric future with technology that is transforming
the way people and organizations operate. Our mission is to
be the cybersecurity partner of choice, protecting our digital
way of life. We help address the world’s greatest security
challenges with continuous innovation that seizes the latest
breakthroughs in artificial intelligence, analytics, automation,
and orchestration. By delivering an integrated platform and
empowering a growing ecosystem of partners, we are at the
forefront of protecting tens of thousands of organizations
across clouds, networks, and mobile devices. Our vision is a
world where each day is safer and more secure than the one
before. For more information, visit www.paloaltonetworks.com.
PAYME
Fidokor Street, 10B
Mirabad, Tashkent,
100015, Uzbekistan
1350
[email protected]
www.payme.uz
PAYME is one of the leaders in the market of online payments
in Uzbekistan. The company provides high-quality payment
solutions for private and corporate clients. The number of
registered mobile application users exceeds 11 million and
continues to grow every day.
Today Payme provides users with a wide range of services,
including Payme GO (fast and secure payments), QR payments,
Pay by location (paying for goods and services on the spot),
Saved payments (saved payment can be duplicated next time),
Payment monitoring (personal financial manager), P2P, Offline
payments, Share payment (created check can be sent via any
messenger), and multiple card management capabilities.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
PAYMENTSCENTER
Room 9, 1/F, Kam Fai Building,
128-132 Yee Kuk Street,
Sham Shui Po, Kln, Hong Kong
+905517475015
[email protected]
www.payments.center
PaymentsCenter is an International Payment Service Provider
for a wide range of e-commerce clients. Our mission is to
provide our clients with the most efficient processing services
possible, allowing them to focus on what matters most: growing
their business. Our commitment to excellence is evident in
everything we do, from our easy-to-use payment solutions to
our unparalleled customer support.
At PaymentsCenter, we understand that every business has
unique needs when it comes to payment processing. That’s
why we offer a wide range of payment solutions to ensure that
our clients can find the right fit for their business.
We know that building strong partnerships is key to success
in any industry, which is why we offer an exclusive partnership
program to each of our valued partners.
POWERDMARC
651 N Broad St, Suite 206
Middletown, 19709 Delaware,
United States of America
+1 217 6507167
[email protected]
www.powerdmarc.com
PowerDMARC stops hackers from sending emails from the
organization’s own domain name! It is an email authentication
platform that helps protect domain names and emails against
spoofing, impersonation, ransomware, and other forms of
abuse.
PowerDMARC provides a suite of DNS security protocols
such as DMARC, SPF, DKIM, BIMI, MTA-STS, and TLS-RPT.
PowerDMARC supports over 1000 customers from Fortune
100 companies, to governments that span across 45 countries
along with more than 500+ channel partners/resellers.
PowerDMARC platform is MSP/MSSP ready and is SOC2 Type
2, ISO 27001 Certified and GDPR compliant.
PROW CIS, LLC
1, 128/2 Kichik Beshyogoch str,
100015 Tashkent,
Republic of Uzbekistan
+998909149757
[email protected]
www.prowme.com
PROW is at the forefront of the technology and digital
revolution with a focus and mastery in the cybersecurity,
information security and data management realms. At PROW,
we offer a wide array of solutions that encompass consultancy
and advisory services, design and deployment distribution of
info management based on big data platforms, systems and
training implementations and much more. We are adamant
about partnering up with the best in the business to deliver the
latest, state of the art technologies and innovative solutions.
We are your 24/7 vigilante and rapid response agents against
all forms of attacks, top-notch expertise and cutting-edge
solutions, offering your desired peace of mind and tranquillity.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
QISHLOQ QURILISH BANK
A.Navoiy 18 A, Tashkent,
Republic of Uzbekistan
+998911810191
[email protected]
www.qishloqqurilishbank.uz
Qishloq qurilish Bank is a credit-financial institution; is
mainly engaged in collecting temporary free funds, lending
to enterprises and those in need of money, making cashless
settlements, issuing money and various valuable securities,
performing operations related to gold and foreign currencies,
and other activities.
RAKASTA LLC
Republic of Uzbekistan,
Tashkent, Yunusabad district,
C-6 70, Nasyrova str.
+99890 900-13-60
a.abduraimov@compliance-
control.uz
www.rakasta.uz
www.compliance-control.ru
Rakasta LLC is an international leader in security consulting
for the FinTech and banking industry. Today our professional
team conducts comprehensive audits in accordance with
international security standards (PCI DSS, SWIFT CSP, ISO27,
SOC2, GDPR, etc.) and provides advanced information security
services as professional SaaS provider (SOC, SIEM, vulnerability
management, FIM, SDLC, mobile and web apps penetration
testing, etc.).
For more than 11 years our team has successfully performed
more than 1000 PCI DSS certifications in more than 35 countries
around the world for leading banks, payment providers, biggest
processing and data centers.
REGIONAL ELECTRIC
NETWORKS, JSC
Republic of Uzbekistan,
Tashkent, 100000, st. Osiyo, 8
+99878 1501154
[email protected]
www.het.uz
Joint Stock Company “Regional Electric Networks” was
created in accordance with the Decree of the President of
the Republic of Uzbekistan dated March 27, 2019 No. PP-4249
“On the strategy for further development and reform of the
electric power industry of the Republic of Uzbekistan”, the
main functions of which are the management of enterprises of
territorial electric networks, distributing and selling electrical
energy to end consumers.
The structure of Regional Electric Networks JSC includes 12
regional branches and 2 enterprises of territorial (regional)
electric networks (Bukhara PTES JSC and Fergana PTES JSC),
operating 0.4-6-10-35-110 kV power networks , as well as as
part of their development, new construction, reconstruction,
major and current repairs, as well as 3 branches (Branch “Center
for Automation of Electricity Sales”, Branch “Development of
State and Contractual Services”, Branch “Center for Public
Procurement”).


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
REGIONAL ELECTRIC
NETWORKS, JSC
ELECTRIC IT SALES
AUTOMATION CENTER
BRANCH
6th house, A. Temur street,
Mirabad district,
Tashkent, Republic of
Uzbekistan
71 233-01-28
[email protected]
www.het.uz
JOINT STOCK COMPANY “REGIONAL ELECTRIC NETWORKS”.
According to the decision of the President of the Republic of
Uzbekistan dated March 27, 2019 “On the strategy of further
development and reform of the electric energy network in the
Republic of Uzbekistan” No. PQ-4249 The joint-stock company
“Territorial Electric Networks” was established, which manages
the enterprises of power grids.
Electricity transmitted from 1,788 35-110 kV substations under
the control of 211 district and city power supply enterprises
within 12 regional branches of the society and 2 regional
enterprises (“Bukhara HETK” and “Fergana HETK” JSCs)
95,789 It is delivered to domestic and legal consumers of the
Republic of Uzbekistan through a transformer station and 270.3
thousand km long power transmission lines.
The full name of the branch: “Electricity Sales Automation
Center” branch, abbreviated: “EESA Center” branch. In Russian:
Branch “Tsentr avtomatizatsii realizatsii elektricheskoy energii”
Abbreviated: Branch “Tsentr AREE”.
Legal address: Tashkent city, Yunusabad district, Asia street, 8.
Postal address: 6th house, A. Temur street, Mirabad district,
Tashkent city.
MAIN DUTIES

Ensures execution of assignments and instructions of the
Oliy Majlis, the President of the Republic of Uzbekistan and
the Cabinet of Ministers;

Coordinates the automated system of accounting for
electricity consumption through modern electronic meters
installed on all types of consumers in the territory of the
Republic;

Provides technical conditions for the introduction and
coordination of the automated system of modern electronic
meters in the field of energy, participates in the development
of project documents with relevant organizations;

“Regional Electric Networks” JSC system enterprises and
regional branches organize and manage the activities of the
database of the republican unified center for data collection
and processing;

Introduces, improves and ensures implementation of Billing
system and Central AMI System (CAS) software complexes
in the community;

monitors the synchronous operation of the CAS software
complex and the Billing system, as well as the statuses of
counters and concentrators;


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
SABABA SECURITY
CENTRAL ASIA
23 Tarasa Schevchenko,
Tashkent, Republic of Uzbekistan
+998 91 010 40 30
[email protected]
www.sababasecurity.com
Sababa Security is a European cybersecurity services provider
with local presence in Central Asia. Our focus is to introduce and
deliver copmplex and efficient services to a local customers via
strong and experienced local technical team. Our key portfolio
elements are Managed SOC, SIEM integration, Peneteration
Testing, External Threats Monitoring and Transactional Anti
Fraud. On top of that, we help our customers to scout, pilot and
implement varioous cyberesecurty tools via vendor-agnostic
approach.
SAPRAMTECH
Republic of Uzbekistan,
Tashkent,
Amir Temur st., IBC 107B
+998 90 320-53-84
[email protected]
www.sapramtech.uz
Sapramtech is a fast-growing provider of solutions and
services in the field of digital transformation and cyber
security. Founded in 2020 by a team of experts with decades
of experience, the company enables, simplifies and accelerates
the digital transformation of its clients’ businesses by
connecting organizations across all industries with best-in-
class information technology providers, as well as delivering
proprietary services and solutions.
SOTERYAN
Uzbekistan: Tashkent city,
Mirzo-Ulugbek district,
Mustakillik Avenue 6
Netherlands: Tweede Jacob
van Campenstraat 118-H,
Amsterdam
Netherlands: +31 653647263
Uzbekistan: +998 97 7253491
[email protected]
www.soteryan.com
Soteryan Kryptos is Breach Intelligence Software and Services
company. We are a collective of world class cybersecurity
professionals with a wide range of backgrounds including
breach intelligence software development, threat intelligence
and modeling, incident response, machine learning, risk
management, cyber security architecture and security
operation center monitoring that help our clients transform
from passive cyber to Active Cyber Defence.
Our Breach Intelligence SaaS platform has assisted
governments and organizations of all sizes manage multiple
threat vectors through real time breach analytics enabled by
Artificial Intelligence.
Soteryan was founded in 2016 by Patrick Hart (previously
Partner at Accenture and IBM) and Anosh Thakkar (previously
Partner at McKinsey, CDO of Shell, CTO of Philips). We are
headquarted in Amsterdam, Netherlands, with offices in
Tashkent, Uzbekistan, Delaware, USA, Frankfurt, Germany and
Tokyo, Japan.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
TASHKENT UNIVERSITY
OF INFORMATION
TECHNOLOGIES NAMED
AFTER MUHAMMAD
AL-KHWARIZMI
Republic of Uzbekistan,
Tashkent 100084,
Amir Temur Avenue 108
+998 71 238 64 15
[email protected]
https://tuit.uz/en/site/index
Tashkent University of Information Technologies named
after Muhammad al-Khwarizmi (TUIT) is known as the leading
technical university in training specialists in the field of
information and communication technologies in the Republic of
Uzbekistan. Today, TUIT is a modern type of university that has
high scientific potential, variety of education communications
systems, developed network of international relations, a high
level of training specialists. TUIT pledges to play an active role
in its initiatives, conferences, and research collaborations.
Moreover, TUIT is eager to share our expertise, resources, and
enthusiasm with fellow members, contributing to the collective
efforts aimed at promoting sustainable development, cultural
exchange, and global connectivity.
TECHPRO DC LTD.
Legal Address:
73a Langley Park Road,
Sutton, SM2 5HA, UK
Tashkent Office:
88A, Amir Temur Avenue,
Tashkent 100084, Uzbekistan
+998 90 1870039
[email protected]
www.techprodc.com
Techpro DC is one of the largest broad-line IT-distributors
in Transcaucasia (Azerbaijan, Georgia) and Central Asia
countries (Uzbekistan, Turkmenistan and Tajikistan). Techpro
DC supplies products of world’s leading manufacturers as HP
Inc., Lenovo, Vertiv, Opentext, Radware, Synopsys, SecHard,
DNS Sense, Packet Light, QNAP and etc. The Company’s dealer
network numbers more than 300 partners from Transcaucasia
(Azerbaijan, Georgia) and Central Asia countries (Uzbekistan,
Turkmenistan and Tajikistan) countries. Principles of responsible
approach to work, trust and strong relationships with partners
in the market contributes to the fact that we always take part
in various tenders in the field of IT and hand over huge projects.
One of the advantages of Techpro DC is its warehouses in
Azerbaijan, Georgia and in Uzbekistan. Highly skilled personnel,
modern technique and solutions, professional and responsible
approach to the clients’ requirements, high quality of the
services offered are the main features distinguishing Techpro
DC among others.
THALES
6 rue de la Verrerie
92190 Meudon, France
+33249890503
[email protected]
https://cpl.thalesgroup.com/
Today’s businesses and governments depend on the cloud,
data and software to deliver trusted digital services. That is
why the most recognized brands and organizations around the
world rely on Thales to help them protect sensitive information
and software wherever it is created, stored or accessed – from
the cloud and data centers to devices and across networks. As
the global leader in data security and software licensing, our
solutions enable organizations to move to the cloud securely,
achieve compliance with confidence, create more value from
their software and deliver seamless digital experiences for
millions of consumers every day.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
TRELLIX
[email protected]
https://trellix.bakotech.com/cis
Trellix is an American cybersecurity solutions provider formed
from the merger of McAfee and FireEye. It offers an XDR
platform with access to more than 1,000 own and 3rd-party
security technologies. The vendor’s portfolio of solutions
includes endpoint and EDR protection, data protection, email,
network and cloud security, SIEM, Threat Intelligence, and
more, enabling analysts to better understand threat context
and control by taking proactive measures to better protect a
company’s infrastructure.
TREND MICRO
trendmicro_eurasia@
trendmicro.com
www.trendmicro.com/ru_ru/
business/
Trend Micro, a global cybersecurity leader, helps make the
world safe for exchanging digital information. Fueled by
decades of security expertise, global threat research, and
continuous innovation, Trend Micro’s cybersecurity platform
protects hundreds of thousands of organizations and
millions of individuals across clouds, networks, devices, and
endpoints. As a leader in cloud and enterprise cybersecurity,
the platform delivers a powerful range of advanced threat
defense techniques optimized for environments like AWS,
Microsoft, and Google, and central visibility for better, faster
detection and response. With 7,000 employees across 65
countries, Trend Micro enables organizations to simplify and
secure their connected world.
TSARKA
Astana, 17e, Syganak Str.,
block B5-B6, office 123-124
+77172478413
[email protected]
www.cybersec.kz
TSARKA – Cybersecurity leader in Central Asia and first Private
CERT in Central Asia.
UZBEKISTON TEMIR
YULLARI
Tashkent; St. Shevchenko, 7
+998951400268
[email protected]
www.railway.uz
Information and computing center of Uzbekiston railways


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
UZBEKNEFTEGAZ, JSC
100047, Tashkent city,
Mirabad district,
Istikbol street, 16
+99871 207-27-72 (2021)
+99899-858-94-98
[email protected]
[email protected]
www.ung.uz
Uzbekneftegaz JSC began its activities in 1992 as the only
oil and gas company in the Republic of Uzbekistan. The
main objectives of Uzbekneftegaz JSC are exploration,
production and processing of hydrocarbons, including natural
gas, improvement of accounting and control of oil and gas
production and processing, production of products with high
added value to meet the needs of economic sectors and the
country’s population, export of technological products, as well
as ensuring the profitability of the company.
To achieve its objectives, Uzbekneftegaz JSC widely introduces
modern information and communication technologies (ICT)
into its activities. Introduction of ICT into activities JSC
“Uzbekneftegaz” is accompanied by solving problems of
ensuring information security.
Information security is considered from the perspective
of maintaining confidentiality, integrity and availability of
information, as well as ensuring the continuous and uninterrupted
functioning of operated and implemented information systems
and resources JSC “Uzbekneftegaz”.
Information security is achieved through the introduction and
implementation of a set of measures, technical means, software,
practices, procedures and organizational structures. A set of
information security measures must ensure the protection of
information (data) JSC “Uzbekneftegaz” and its supporting
information and communication infrastructure from a wide
range of threats in order to ensure the continuous operation of
Uzbekneftegaz JSC, minimize damage from the implementation
of threats, to predict and prevent their impact, to maintain
business reputation and to comply with legal requirements.
UZCARD
COMMON REPUBLICAN
PROCESSING CENTRE,
LLC
78, Abullah Kadiri str.,
Shaykhantakhur district,
Tashkent, Republic of
Uzbekistan, 100011
+998 (71) 200-28-28
[email protected]
www.uzcard.uz
UZCARD (LLC “Common republican processing centre”) -
the leading national payment operator of the Republic of
Uzbekistan - provides acquiring activities, processing of
electronic payments, and performs the function of a safe
payment system for connected banks, payment organizations
and other participants in the non-cash payment market for
more than 18 years.
UZCARD users can pay for goods and services through POS
terminals, make transactions at ATMs and self-service kiosks, as
well as make electronic payments through mobile applications
and Internet banking systems throughout the country.
UZCARD is committed for providing secure and convenient
payment solutions to its customers by implementing the latest
technologies in the card security sphere.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
UZSUVTAMINOT, JSC
Bogishamol street, 152
55-503-1255
[email protected]
uzsuv.uz
“Uzsuvtaminot” Joint Stock Company (hereinafter referred to
as the “JSC”) was established in accordance with the Decree of
the President of the Republic of Uzbekistan dated November 26,
2019 No. DP-5883 “On measures to improve the management
of water resources of the Republic of Uzbekistan to increase
the level and improve the quality of drinking water for the
population” and the order of the State Assets Management
Agency was formed in accordance with by order No.- 3k-PO
dated March 9, 2020 as a Joint-stock company.
The charter of JSC is registered in the Center of public services
of the Yunusobod district of Tashkent on March 11, 2020 under
the number 827035. The main directions of activity are further
improvement of water supply and sewerage systems and
rational use of drinking water, organization of LLC participation
in construction, reconstruction of water supply and sewerage
facilities, timely elimination of accidents and provision of other
services not provided for by legislation, and provision of other
services established by law.
Composition of shareholders:
The state assets management agency of the Republic of
Uzbekistan-100 percent.


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
Speakers are listed in alphabetical
order according to the surname


3-4 OCTOBER 2023
TASHKENT, UZBEKISTAN
www.cybersecuritycentraleurasia.com
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
3-
TA
www
SPEAKERS’
BIOGRAPHIES
PARTICIPATING
COMPANIES
WELCOME
LETTER
THANK YOU
SPONSORS
SHERZOD
SHERMATOV
MINISTER
DIGITAL TECHNOLOGIES
OF THE REPUBLIC OF UZBEKISTAN
Year of birth: 1977
Place of birth: Tashkent
Nationality: Uzbek
Education:
Tashkent State Technical University
Yale University (USA)
Professional Experience:
2000-2002 - Various posts in Ministry of Finance, Cabinet of Ministers of the
Republic of Uzbekistan
2004-2005 - Coordinator of the project “Digital Development Initiative” of the
United Nations and the Government of the Republic of Uzbekistan
2004-2005 - Senior, Chief Specialist, Information and Analytical Department for
Information Systems and Telecommunications, Cabinet of Ministers of the Republic
of Uzbekistan
2005-2005 - Assistant to the First Deputy Prime Minister of the Republic of
Uzbekistan
2005-2008 - Various posts in the several ICT projects implemented by UNDP
2008-2010 - Chief, Information and Analytical Department for Information Systems
and Telecommunications, Cabinet of Ministers of the Republic of Uzbekistan
2010-2012 - Various posts in the Presidential Administration
2012-2014 - Deputy Chairman of the State Committee for Communications,
Information and Telecommunication Technologies of the Republic of Uzbekistan
2014-2016 - Rector of Inha University in Tashkent
In January 2023 was appointed as Minister Digital technologies of the Republic of
Uzbekistan
MINISTRY OF DIGITAL
TECHNOLOGIES OF THE
REPUBLIC OF UZBEKISTAN


Click to View FlipBook Version