About
Articles by Nader
-
Concerned about AI Risk? – Check for this clause in your contracts
Concerned about AI Risk? – Check for this clause in your contracts
By Nader Henein
-
US Regulatory Fragmentation, first Privacy, now AI
US Regulatory Fragmentation, first Privacy, now AI
By Nader Henein
Activity
-
It is with great sadness and very little surprise that we acknowledge the death of the American Privacy Rights Act (APRA). Realistically speaking…
It is with great sadness and very little surprise that we acknowledge the death of the American Privacy Rights Act (APRA). Realistically speaking…
Shared by Nader Henein
-
Happy July, supposedly it’s summer everywhere else in the northern hemisphere though where I live in Scotland does not seem to have received the…
Happy July, supposedly it’s summer everywhere else in the northern hemisphere though where I live in Scotland does not seem to have received the…
Shared by Nader Henein
-
One of my favorite people and still a force to be reckoned with.
One of my favorite people and still a force to be reckoned with.
Shared by Nader Henein
Experience & Education
Licenses & Certifications
-
-
-
-
-
-
-
-
-
-
-
-
Certified Information Privacy Professional / Europe (CIPP/E)
IAPP - International Association of Privacy Professionals
Issued Expires -
-
Volunteer Experience
-
Fundraiser
UNICEF
- Present 11 years 11 months
Children
Ran the Royal Parks Half Marathon to raise funds for UNICEF
http://fundraise.unicef.org.uk/MyPage/Nader-Henein-Running-for-Charity
Publications
-
BlackBerry Rockets into Cybersecurity Consulting Elite
Inside BlackBerry Business Blog
In our first year of operation our advanced cyber assurance practice now ranks in the top 10% of all global cybersecurity providers.
-
Insecurity of Things
Inside BlackBerry Business Blog
Whenever I walk into an electronics store, I am surprised at the sheer number of devices that are prefixed by the word “smart,” which seem to be doubling at an alarming rate. Televisions, egg crates, thermostats, light bulbs, refrigerators—pretty much anything with a power supply seems to have achieved sentience overnight.
-
How Customer-Focused Companies Can Comply with the EU’s Latest Privacy Rules
Inside BlackBerry Business Blog
After nearly a decade of work, the EU finally passed the General Data Protection Regulation (GDPR) in April. While it doesn’t take effect until May of 2018, smart businesses are starting to look now at how the sweeping new data-privacy mandate will affect them so they’re ready when the risk of heavy fines kicks in.
-
Security Guidance for Critical Areas of Mobile Computing
Cloud Security Alliance
More than 100 member companies along with the CSA research team jointly worked to develop the 60-page guidance report which provides a comprehensive overview of the mobile security landscape. The report is broken out into three principal sections:
Other authors -
-
Would I lie to you? The Need for Independent Certification
myBroadband
ADVISORS, evangelists or consultants. Companies have long tried to repackage the way they deliver their message on security so that it doesn’t sound like a sales pitch.
But the simple fact is there is no reason why you should gamble the security and future of your organization on the promises of an employee tasked with portraying their product in the best possible light. -
Bring your own Device (BYOD): BlackBerry Balance Technology Helps to Ensure Security and 'Privacy by Design'
FutureGov - Asia Pacific
Many aspects of the BlackBerry solution have been built around manageability. With the advent of ‘Bring Your Own Device’ (BYOD) in the enterprise, the need to manage two personas on the same device has become evident. On one hand, enterprise data and applications need to remain secure and separate from personal content. On the other hand, a litany of consumer apps, emails and personal details must remain private from all, including the enterprise.
-
There’s an Ostrich in the Room! Dangers of the checkbox mentality
IBM Institute of Advanced Security - Expert Blogs
With the increasing number of mobile devices and operating systems on offer, many administrators and SMEs in large companies have been overwhelmed by employee and executive requests to support the latest gadget. With mounting pressure to enable business productivity on personal devices, a less than diligent approach to security may be taken, where, provided that a list of check boxes is ticked, products are integrated into the corporate infrastructure. Every security professional knows that the…
With the increasing number of mobile devices and operating systems on offer, many administrators and SMEs in large companies have been overwhelmed by employee and executive requests to support the latest gadget. With mounting pressure to enable business productivity on personal devices, a less than diligent approach to security may be taken, where, provided that a list of check boxes is ticked, products are integrated into the corporate infrastructure. Every security professional knows that the devil is most definitely in the details.
-
Smartphone Secure Development Guidelines for App Developers
ENISA
This document was produced jointly with the OWASP mobile security project. It is also published as an ENISA deliverable in accordance with our work programme 2011. It is written for developers of smartphone apps as a guide to developing secure apps. It may however also be of interest to project managers of smartphone development projects.
Other authors -
-
Appstore security: 5 lines of defence against malware
ENISA
The booming smartphone industry has a special way of delivering software to end-users: appstores. Popular appstores have hundreds of thousands of apps for anything from online banking to mosquito repellent, and the most popular stores (Apple Appstore, Google Android market) claim billions of app downloads. But appstores have not escaped the attention of cyber attackers. Over the course of 2011 numerous malicious apps were found, across a variety of smartphone models. Using malicious apps…
The booming smartphone industry has a special way of delivering software to end-users: appstores. Popular appstores have hundreds of thousands of apps for anything from online banking to mosquito repellent, and the most popular stores (Apple Appstore, Google Android market) claim billions of app downloads. But appstores have not escaped the attention of cyber attackers. Over the course of 2011 numerous malicious apps were found, across a variety of smartphone models. Using malicious apps, attackers can easily tap into the vast amount of private data processed on smartphones such as confidential business emails, location data, phone calls, SMS messages and so on. Starting from a threat model for appstores, this paper identifies five lines of defence that must be in place to address malware in appstores: app review, reputation, kill-switches, device security and jails.
Other authors -
Patents
-
Securing data storage of personally identifiable information in a database
Filed US US20190188409A1
Systems, methods, and software can be used to secure storage of personally identifiable information. In some aspects, a method includes receiving, by at least one hardware processor, a request to store a data record, wherein the data record comprises personally identifiable information for a person; dividing, by the at least one hardware processor, the data record into at least two data entries, each of the at least two data entry comprising a respective portion of the personally identifiable…
Systems, methods, and software can be used to secure storage of personally identifiable information. In some aspects, a method includes receiving, by at least one hardware processor, a request to store a data record, wherein the data record comprises personally identifiable information for a person; dividing, by the at least one hardware processor, the data record into at least two data entries, each of the at least two data entry comprising a respective portion of the personally identifiable information; selecting, by the at least one hardware processor, a database cell for each of the at least two data entries to store the respective portion of the personally identifiable information, wherein the database cells for different data entries are in different database tables, different database rows, or different database columns; and storing, by the at least one hardware processor, the at least two data entries in the selected database cells.
-
Reducing network security risks in a medical care network
Filed US US20190130075A1
Systems, methods, and software can be used to reduce network security risks in a medical care network. In some aspects, a method includes detecting, at a medical equipment monitor located in a network, an electronic device that is connected to the network; determining, by the medical equipment monitor, that the electronic device comprises a medical equipment; associating, by the medical equipment monitor, a security profile with the medical equipment, wherein the security profile includes one…
Systems, methods, and software can be used to reduce network security risks in a medical care network. In some aspects, a method includes detecting, at a medical equipment monitor located in a network, an electronic device that is connected to the network; determining, by the medical equipment monitor, that the electronic device comprises a medical equipment; associating, by the medical equipment monitor, a security profile with the medical equipment, wherein the security profile includes one or more security parameters; detecting, by the medical equipment monitor, a conflict between a data transmission activity from the medical equipment and at least one security parameter in the security profile; and in response to detecting the conflict, transmitting, from the medical equipment monitor, a notification of the conflict to a medical equipment controller.
Honors & Awards
-
Piccaso Privacy Awards - Privacy Writer / Author of the Year
Piccaso Privacy Awards
This award will go to a writer who is a thought leader and understands privacy and data protection, demonstrating this through an outstanding book or thought-provoking, well-written articles and interviews that help educate and inform their audience.
-
Financial Times & Inclusive Boards 100 BAME leaders influencing the tech sector
Financial Times
Nader Henein has been announced as part of the #IB100 - a list of the top 100 most influential black, Asian and minority ethnic (BAME) leaders in the Tech Sector. Now in its second year, the list has been produced by the Financial Times in partnership with Inclusive Boards.
The list is published online, and in print in the UK and Europe as part of an FT special report into Diversity in Tech. In 2018, Inclusive Boards research found that 74.5% of Boards in the tech sector had no BAME…Nader Henein has been announced as part of the #IB100 - a list of the top 100 most influential black, Asian and minority ethnic (BAME) leaders in the Tech Sector. Now in its second year, the list has been produced by the Financial Times in partnership with Inclusive Boards.
The list is published online, and in print in the UK and Europe as part of an FT special report into Diversity in Tech. In 2018, Inclusive Boards research found that 74.5% of Boards in the tech sector had no BAME members and that BAME people made up just 8.5% of senior leaders (Directors and Executives) in the sector.
https://www.ft.com/content/43f7cece-0086-11ea-be59-e49b2a136b8d -
MD Award
BlackBerry
Awarded once a quarter at a global level as an award for strategic achievements towards business targets.
-
STEM Innovation Camp Mentor - Women in Technology
INJAZ UAE
-
itShows Award
BlackBerry
Total of 6 Stars Awarded for multiple successful projects
-
Diversity & Empowerment Leader Award
Bayt.com
-
Performance Excellence
Bayt.com
Languages
-
Arabic
Native or bilingual proficiency
-
French
Full professional proficiency
-
English
Native or bilingual proficiency
Organizations
-
Cloud Security Alliance (CSA)
Chair, Mobile Data Working Group
- PresentCloud Security Alliance (CSA) is a not-for-profit organization with a mission to “promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing”.
-
Security & Counter Terror Expo
Cyber Security Advisory Board
- PresentSecurity & Counter Terror Expo provides a unique and secure environment for security and counter terrorism experts to come together to see new products, share experience and gain the knowledge needed to address current and emerging security challenges.
-
Mobile Wallets - Asia
Chair
- PresentWorking to ensure that our future in digital cash is secure ahead of mass adoption.
-
Information Security Forum (ISF)
ISF Council (Representing the Middle East)
- Present -
Gulf SME Awards
Judge
- PresentA very gratifying experience of working with startups through the SME awards and sitting on a panel of judges to identify new rising stars
-
EEMA
Board Director
-
Recommendations received
-
LinkedIn User
9 people have recommended Nader
Join now to viewMore activity by Nader
-
Building the agenda for the Gartner IT Symposium in Barcelona is a labor of love I take to heart and here is one more reason to book your place with…
Building the agenda for the Gartner IT Symposium in Barcelona is a labor of love I take to heart and here is one more reason to book your place with…
Shared by Nader Henein
-
Though I do not expect most organizations to have prohibited AI systems, the size of the fines imposed by the AI Act will mean that someone is going…
Though I do not expect most organizations to have prohibited AI systems, the size of the fines imposed by the AI Act will mean that someone is going…
Shared by Nader Henein
-
Attending the #CPDP2024 has left me with mixed feelings 🤔. 👍 It's incredible to witness almost all panels discussing the EU AI Act (check out the…
Attending the #CPDP2024 has left me with mixed feelings 🤔. 👍 It's incredible to witness almost all panels discussing the EU AI Act (check out the…
Liked by Nader Henein
-
My latest for ComputerWeekly.com: why enterprises need to put their #data on a solid foundation before they attempt AI projects. With viewpoints…
My latest for ComputerWeekly.com: why enterprises need to put their #data on a solid foundation before they attempt AI projects. With viewpoints…
Liked by Nader Henein
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Nader Henein
-
Nader Henein
Partner
-
Nader Henein
Vice President at Seti First Travel
-
Nader Henein
Physical Therapist at Fairview Rehab & Nursing Home
-
Nader Henein
--
5 others named Nader Henein are on LinkedIn
See others named Nader Henein