×
Security Platform
Data & App Security
Network Security
Security Operation & Response
User Security
Infrastructure Security
Policy & Compliance Management
Security Threat Advisory
Looking Glass
FireEye
Governance Risk and Compliance
Governance / Risk / Compliance
Strategic Consulting
ADSIC
FISMA
ISO 20000 ITSM
ISO 22301 BCMS
ISO 27001 ISMS
PCI DSS
Information Security Review
Training
ISO-9001
ISO-22301
ISO-27001
Company
About us
Support
Achievements
Articles
Careers
Vendors
Customers
MD - Presentations in Events
Corporate Social Responsibility
Events
Trade Shows
Webinars
×
Data & App Security
Database Security & Protection
Data Encryption & Control
Enterprise Digital Rights Management
Data Vulnerability Assessment
Application Protection
Vulnerability Assessment & Penetration Testing
Web Application Firewall
Data Governance
Network Security
Network Access Control
Next Generation Firewall
Email Security
Network IPS
Web Gateway
Next Generation APT
Next Generation DDoS Mitigation
Smart DDI
Security Operation & Response
Governance Risk & Compliance
Cyber Security
Transaction Monitoring
Compromised Card Monitoring
Incident Response & Orchestration
Encrypted Calls and Messaging
Travel Risk Management & Crisis Avoidance
Anti Phishing Services
User Security
Identity Management
Single Sign On
Two Factor Authentication
Privileged User Password Management
Insider Threat Management
Endpoint Security Management
Endpoint Detection & Remediation
Employee Monitoring Tool
Infrastructure Security
Virtual Security
SCADA Security
Mobile Device Management
Public Key Infrastructure Certificates
Policy & Compliance Management
NETconsent Compliance Suite
File Integrity Monitoring, Network Configuration, and Compliance
Toggle navigation
Home
Careers
Blog
Contact
Resources
VDI Comparison
Training
ISO-9001
ISO-22301
ISO-27001
Events
Trade Shows
Webinars
Company
About us
Support
Achievements
Articles
Careers
Vendors
Customers
MD - Presentations in Events
Corporate Social Responsibility
Services
Security Threat Advisory
Looking Glass
FireEye
Governance Risk and Compliance
Governance / Risk / Compliance
Strategic Consulting
ADSIC
FISMA
ISO 20000 ITSM
ISO 22301 BCMS
ISO 27001 ISMS
PCI DSS
Information Security Review
Solutions
Data & App Security
Database Security & Protection
Data Encryption & Control
Enterprise Digital Rights Management
Data Vulnerability Assessment
Application Protection
Vulnerability Assessment & Penetration Testing
Web Application Firewall
Data Governance
Network Security
Network Access Control
Next Generation Firewall
Email Security
Network IPS
Web Gateway
Next Generation APT
Next Generation DDoS Mitigation
Smart DDI
Security Operation & Response
Governance Risk & Compliance
Cyber Security
Transaction Monitoring
Compromised Card Monitoring
Incident Response & Orchestration
Encrypted Calls and Messaging
Travel Risk Management & Crisis Avoidance
Anti Phishing Services
User Security
Identity Management
Single Sign On
Two Factor Authentication
Privileged User Password Management
Insider Threat Management
Endpoint Security Management
Endpoint Detection & Remediation
Employee Monitoring Tool
Infrastructure Security
Virtual Security
SCADA Security
Mobile Device Management
Public Key Infrastructure Certificates
Policy & Compliance Management
NETconsent Compliance Suite
File Integrity Monitoring, Network Configuration, and Compliance
Home
JUDE - Speaking Presentations
JUDE - Media Interview
Big BFSI Future Tech Show
in conversation with Jude Pereira
Nanjgel Solutions at the
UAE Security Expo - GISEC 2014
JUDE - Speaking Presentations
Video
Photos
Sides
MENA CISO SUMMIT
18th - 19th April, 2018
Video
Photos
Sides
Enterprise Security Summit 360 - 2017
8th May 2017
Video
Photos
Sides
CISO Platform Annual Summit - Goa
20th- 21st October, 2016
Video
Photos
Sides
BFSI India Conclave
26-27 May 2016
Video
Photos
Sides
Enterprise Security Roadshow 360
15,16 - 18 May 2016
Video
Photos
Sides
Security Strategist Event - Doha
October 2014
Big BFSI Future Tech Show & Awards
×
Video
Photos
Sides
Security Strategist Event - Dubai
October 2014
Video
Photos
Sides
Security Strategist Event
May 2013
Video
Photos
Sides
IBM Software Distribution
February 2013
Video
Photos
Sides
The Evolution of Insider Threats
March 2012
Security Strategist - CPI
2016
Presentation PDF file
Data Center Security Automation
2015
Presentation PDF file