1. Spotlight: Security
  2. Latest
  3. Newsletters
  4. Resources
  5. Buyer's Guides
  6. Events

About

  • About Us
  • Advertise
  • Contact Us
  • Editorial Ethics Policy
  • Foundry Careers
  • Reprints
  • Newsletters
  • Contribute to CIO

Policies

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright Notice
  • Member Preferences
  • About AdChoices
  • Your California Privacy Rights

Our Network

  • Computerworld
  • CSO
  • InfoWorld
  • Network World

More

  • Awards
  • Blogs
  • BrandHubs
  • BrandPosts
  • CXO Outlook
  • DEMO
  • Enterprise Buyer’s Guides
  • Events
  • Podcasts
  • Videos
  • Analytics
  • Artificial Intelligence
  • Generative AI
  • Business Operations
  • Careers
  • Cloud Computing
  • Data Center
  • Data Management
  • Emerging Technology
  • Enterprise Applications
  • Industry
  • IT Leadership
  • Digital Transformation
  • IT Strategy
  • IT Management
  • Innovation
  • Diversity and Inclusion
  • IT Operations
  • Project Management
  • Networking
  • Security
  • Software Development
  • Vendors and Providers
  • Enterprise Buyer’s Guides

Africa

  • Africa

Americas

  • Canada
  • United States

Asia

  • ASEAN
  • India
  • Middle East
  • 日本 (Japan)
  • 대한민국(Korea)

Europe

  • España (Spain)
  • Ireland
  • Italia (Italy)
  • Netherlands
  • United Kingdom
  • Deutschland (Germany)

Oceania

  • Australia
  • New Zealand
Popular Topics
  • IT Leadership
  • Digital Transformation
  • Innovation
  • Data Analytics & AI
  • Enterprise Applications
  • Diversity and Inclusion
  • Spotlight: Security
  • Latest
  • Newsletters
  • Resources
  • Buyer's Guides
  • Events

Topics

  • Analytics
  • Artificial Intelligence
  • Generative AI
  • Business Operations
  • Careers
  • Cloud Computing
  • Data Center
  • Data Management
  • Emerging Technology
  • Enterprise Applications
  • Industry
  • IT Leadership
  • Digital Transformation
  • IT Strategy
  • IT Management
  • Innovation
  • Diversity and Inclusion
  • IT Operations
  • Project Management
  • Networking
  • Security
  • Software Development
  • Vendors and Providers
  • Enterprise Buyer’s Guides

About

  • About Us
  • Advertise
  • Contact Us
  • Editorial Ethics Policy
  • Foundry Careers
  • Reprints
  • Newsletters
  • Contribute to CIO

Policies

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright Notice
  • Member Preferences
  • About AdChoices
  • Your California Privacy Rights

Our Network

  • Computerworld
  • CSO
  • InfoWorld
  • Network World

More

  • Awards
  • Blogs
  • BrandHubs
  • BrandPosts
  • CXO Outlook
  • DEMO
  • Enterprise Buyer’s Guides
  • Events
  • Podcasts
  • Videos
  1. Home
  2. Videos
  3. CIO Middle East Conversations
  4. Women in Cybersecurity Middle East
CIO Middle East Conversations

Women in Cybersecurity Middle East

Go to Podcast
Episode 51 Women in Cybersecurity Middle East
Mar 4, 202429 mins
CIO Leadership Live

Overview

Meet the co-founders of the initiative Women in Cyber Security Middle East (WiCSME).

Register Now

In this series

Ep.49

CIO Leadership Live Middle East with Dr. Joseph George, Chief Technology Officer at Smart Salem

Feb 12, 2024 23 mins
CIO Leadership Live
Ep.50

Leadership Advice: What are the best tips for becoming a CIO?

Feb 29, 2024 2 mins
CIO Leadership Live
Ep.52

How female IT leaders work to empower other women in the tech field

Mar 6, 2024 5 mins
IT Leadership
Ep.53

Best tips for young women who want to start a tech career

Mar 6, 2024 1 min
IT Leadership
SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.
Please enter a valid email address

Show me more

news

Dreamforce 2024: Latest news and insights

By Dan Muse and CIO staff
Oct 22, 20257 mins
Salesforce.comVendors and Providers
Image
brandpost Sponsored by Illumio

Zero Trust founder on containment: A better way to stop ransomware and shadow IT

By Paul Desmond
Oct 22, 20254 mins
Access ControlIdentity and Access ManagementZero Trust
Image
brandpost Sponsored by Illumio

How using Zero Trust and security graphs helps address compliance mandates

By Paul Desmond
Oct 22, 20254 mins
Access ControlIdentity and Access ManagementZero Trust
Image
podcast

Hyland CTO Tim McIntire on AI-powered content intelligence

Oct 15, 202520 mins
CIO Leadership Live
Image
podcast

Why hackers are now targeting VPNs and routers | What IT Leaders Want, Ep. 12

Oct 7, 202540 mins
Cloud SecurityNetwork SecuritySecurity
Image
podcast Sponsored by Colt Technology Services

Episode 2: Unlocking the Value

By Kathleen Hall
Oct 6, 202513 mins
Generative AI
Image
video

How Vertesia’s AI Assistant puts enterprise agents safely into every employee’s hands

Oct 22, 202516 mins
Artificial IntelligenceEnterpriseGenerative AI
Image
video

Accelerating enterprise-grade AI development with Vellum's Workflow SDK

Oct 15, 20259 mins
Artificial IntelligenceChatbotsNo Code and Low Code
Image
video

Hyland CTO Tim McIntire on AI-powered content intelligence

Oct 15, 202520 mins
CIO Leadership Live
Image
SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.
Please enter a valid email address

Sponsored Links

  • CIO Think Tank Roadmap Report: Information management in the age of AI
  • Reimagine tomorrow. Become a future-ready, AI-powered enterprise with EY Consulting.
  • Fuel innovation with unified content, process and application intelligence.
  • Solve your most complex IT challenges with solutions that simplify your modernization journey.
About
  • About Us
  • Advertise
  • Contact Us
  • Editorial Ethics Policy
  • Foundry Careers
  • Reprints
  • Newsletters
  • BrandHubs
  • BrandPosts
Policies
  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright Notice
  • Member Preferences
  • About AdChoices
  • Your California Privacy Rights
  • Privacy Settings
Our Network
  • Computerworld
  • CSO
  • Infoworld
  • Network World
  • Facebook
  • X
  • YouTube
  • Google News
  • LinkedIn
© 2025 FoundryCo, Inc. All Rights Reserved.