Nader Henein

Edinburgh, Scotland, United Kingdom Contact Info
5K followers 500+ connections

Join to view profile

About

Throughout my career, I have led the design & implementation of complex, secure, business…

Articles by Nader

See all articles

Activity

Join now to see all activity

Experience & Education

  • Gartner

View Nader’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • UNICEF Graphic

    Fundraiser

    UNICEF

    - Present 11 years 11 months

    Children

    Ran the Royal Parks Half Marathon to raise funds for UNICEF

    http://fundraise.unicef.org.uk/MyPage/Nader-Henein-Running-for-Charity

Publications

  • BlackBerry Rockets into Cybersecurity Consulting Elite

    Inside BlackBerry Business Blog

    In our first year of operation our advanced cyber assurance practice now ranks in the top 10% of all global cybersecurity providers.

    See publication
  • Insecurity of Things

    Inside BlackBerry Business Blog

    Whenever I walk into an electronics store, I am surprised at the sheer number of devices that are prefixed by the word “smart,” which seem to be doubling at an alarming rate. Televisions, egg crates, thermostats, light bulbs, refrigerators—pretty much anything with a power supply seems to have achieved sentience overnight.

    See publication
  • How Customer-Focused Companies Can Comply with the EU’s Latest Privacy Rules

    Inside BlackBerry Business Blog

    After nearly a decade of work, the EU finally passed the General Data Protection Regulation (GDPR) in April. While it doesn’t take effect until May of 2018, smart businesses are starting to look now at how the sweeping new data-privacy mandate will affect them so they’re ready when the risk of heavy fines kicks in.

    See publication
  • Security Guidance for Critical Areas of Mobile Computing

    Cloud Security Alliance

    More than 100 member companies along with the CSA research team jointly worked to develop the 60-page guidance report which provides a comprehensive overview of the mobile security landscape. The report is broken out into three principal sections:

    Other authors
    • Guido Sanchidrian
    • Jane Cosnowsky
    • Alice Decker
    • Pamela Fusco
    See publication
  • Would I lie to you? The Need for Independent Certification

    myBroadband

    ADVISORS, evangelists or consultants. Companies have long tried to repackage the way they deliver their message on security so that it doesn’t sound like a sales pitch.

    But the simple fact is there is no reason why you should gamble the security and future of your organization on the promises of an employee tasked with portraying their product in the best possible light.

    See publication
  • Bring your own Device (BYOD): BlackBerry Balance Technology Helps to Ensure Security and 'Privacy by Design'

    FutureGov - Asia Pacific

    Many aspects of the BlackBerry solution have been built around manageability. With the advent of ‘Bring Your Own Device’ (BYOD) in the enterprise, the need to manage two personas on the same device has become evident. On one hand, enterprise data and applications need to remain secure and separate from personal content. On the other hand, a litany of consumer apps, emails and personal details must remain private from all, including the enterprise.

    See publication
  • There’s an Ostrich in the Room! Dangers of the checkbox mentality

    IBM Institute of Advanced Security - Expert Blogs

    With the increasing number of mobile devices and operating systems on offer, many administrators and SMEs in large companies have been overwhelmed by employee and executive requests to support the latest gadget. With mounting pressure to enable business productivity on personal devices, a less than diligent approach to security may be taken, where, provided that a list of check boxes is ticked, products are integrated into the corporate infrastructure. Every security professional knows that the…

    With the increasing number of mobile devices and operating systems on offer, many administrators and SMEs in large companies have been overwhelmed by employee and executive requests to support the latest gadget. With mounting pressure to enable business productivity on personal devices, a less than diligent approach to security may be taken, where, provided that a list of check boxes is ticked, products are integrated into the corporate infrastructure. Every security professional knows that the devil is most definitely in the details.

    See publication
  • Smartphone Secure Development Guidelines for App Developers

    ENISA

    This document was produced jointly with the OWASP mobile security project. It is also published as an ENISA deliverable in accordance with our work programme 2011. It is written for developers of smartphone apps as a guide to developing secure apps. It may however also be of interest to project managers of smartphone development projects.

    Other authors
    • Vinay Bansal, Cisco Systems
    • Giles Hogben, ENISA
    • Karsten Nohl, Srlabs (on SD/SIM security)
    • Jack Mannino, nVisium Security Inc
    • Christian Papathanasiou, Royal Bank of Scotland
    • Stefan Rueping, Infineon (on SD/SIM security)
    • Beau Woods, Dell Secureworks
    See publication
  • Appstore security: 5 lines of defence against malware

    ENISA

    The booming smartphone industry has a special way of delivering software to end-users: appstores. Popular appstores have hundreds of thousands of apps for anything from online banking to mosquito repellent, and the most popular stores (Apple Appstore, Google Android market) claim billions of app downloads. But appstores have not escaped the attention of cyber attackers. Over the course of 2011 numerous malicious apps were found, across a variety of smartphone models. Using malicious apps…

    The booming smartphone industry has a special way of delivering software to end-users: appstores. Popular appstores have hundreds of thousands of apps for anything from online banking to mosquito repellent, and the most popular stores (Apple Appstore, Google Android market) claim billions of app downloads. But appstores have not escaped the attention of cyber attackers. Over the course of 2011 numerous malicious apps were found, across a variety of smartphone models. Using malicious apps, attackers can easily tap into the vast amount of private data processed on smartphones such as confidential business emails, location data, phone calls, SMS messages and so on. Starting from a threat model for appstores, this paper identifies five lines of defence that must be in place to address malware in appstores: app review, reputation, kill-switches, device security and jails.

    Other authors
    • Marnix Dekker, CISA
    • Giles Hogben
    See publication

Patents

  • Securing data storage of personally identifiable information in a database

    Filed US US20190188409A1

    Systems, methods, and software can be used to secure storage of personally identifiable information. In some aspects, a method includes receiving, by at least one hardware processor, a request to store a data record, wherein the data record comprises personally identifiable information for a person; dividing, by the at least one hardware processor, the data record into at least two data entries, each of the at least two data entry comprising a respective portion of the personally identifiable…

    Systems, methods, and software can be used to secure storage of personally identifiable information. In some aspects, a method includes receiving, by at least one hardware processor, a request to store a data record, wherein the data record comprises personally identifiable information for a person; dividing, by the at least one hardware processor, the data record into at least two data entries, each of the at least two data entry comprising a respective portion of the personally identifiable information; selecting, by the at least one hardware processor, a database cell for each of the at least two data entries to store the respective portion of the personally identifiable information, wherein the database cells for different data entries are in different database tables, different database rows, or different database columns; and storing, by the at least one hardware processor, the at least two data entries in the selected database cells.

    See patent
  • Reducing network security risks in a medical care network

    Filed US US20190130075A1

    Systems, methods, and software can be used to reduce network security risks in a medical care network. In some aspects, a method includes detecting, at a medical equipment monitor located in a network, an electronic device that is connected to the network; determining, by the medical equipment monitor, that the electronic device comprises a medical equipment; associating, by the medical equipment monitor, a security profile with the medical equipment, wherein the security profile includes one…

    Systems, methods, and software can be used to reduce network security risks in a medical care network. In some aspects, a method includes detecting, at a medical equipment monitor located in a network, an electronic device that is connected to the network; determining, by the medical equipment monitor, that the electronic device comprises a medical equipment; associating, by the medical equipment monitor, a security profile with the medical equipment, wherein the security profile includes one or more security parameters; detecting, by the medical equipment monitor, a conflict between a data transmission activity from the medical equipment and at least one security parameter in the security profile; and in response to detecting the conflict, transmitting, from the medical equipment monitor, a notification of the conflict to a medical equipment controller.

    See patent

Honors & Awards

  • Piccaso Privacy Awards - Privacy Writer / Author of the Year

    Piccaso Privacy Awards

    This award will go to a writer who is a thought leader and understands privacy and data protection, demonstrating this through an outstanding book or thought-provoking, well-written articles and interviews that help educate and inform their audience.

  • Financial Times & Inclusive Boards 100 BAME leaders influencing the tech sector

    Financial Times

    Nader Henein has been announced as part of the #IB100 - a list of the top 100 most influential black, Asian and minority ethnic (BAME) leaders in the Tech Sector. Now in its second year, the list has been produced by the Financial Times in partnership with Inclusive Boards.

    The list is published online, and in print in the UK and Europe as part of an FT special report into Diversity in Tech. In 2018, Inclusive Boards research found that 74.5% of Boards in the tech sector had no BAME…

    Nader Henein has been announced as part of the #IB100 - a list of the top 100 most influential black, Asian and minority ethnic (BAME) leaders in the Tech Sector. Now in its second year, the list has been produced by the Financial Times in partnership with Inclusive Boards.

    The list is published online, and in print in the UK and Europe as part of an FT special report into Diversity in Tech. In 2018, Inclusive Boards research found that 74.5% of Boards in the tech sector had no BAME members and that BAME people made up just 8.5% of senior leaders (Directors and Executives) in the sector.

    https://www.ft.com/content/43f7cece-0086-11ea-be59-e49b2a136b8d

  • MD Award

    BlackBerry

    Awarded once a quarter at a global level as an award for strategic achievements towards business targets.

  • STEM Innovation Camp Mentor - Women in Technology

    INJAZ UAE

  • itShows Award

    BlackBerry

    Total of 6 Stars Awarded for multiple successful projects

  • Diversity & Empowerment Leader Award

    Bayt.com

  • Performance Excellence

    Bayt.com

Languages

  • Arabic

    Native or bilingual proficiency

  • French

    Full professional proficiency

  • English

    Native or bilingual proficiency

Organizations

  • Cloud Security Alliance (CSA)

    Chair, Mobile Data Working Group

    - Present

    Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to “promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing”.

  • Security & Counter Terror Expo

    Cyber Security Advisory Board

    - Present

    Security & Counter Terror Expo provides a unique and secure environment for security and counter terrorism experts to come together to see new products, share experience and gain the knowledge needed to address current and emerging security challenges.

  • Mobile Wallets - Asia

    Chair

    - Present

    Working to ensure that our future in digital cash is secure ahead of mass adoption.

  • Information Security Forum (ISF)

    ISF Council (Representing the Middle East)

    - Present
  • Gulf SME Awards

    Judge

    - Present

    A very gratifying experience of working with startups through the SME awards and sitting on a panel of judges to identify new rising stars

  • EEMA

    Board Director

    -

Recommendations received

9 people have recommended Nader

Join now to view

More activity by Nader

View Nader’s full profile

  • See who you know in common
  • Get introduced
  • Contact Nader directly
Join to view full profile

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Nader Henein

Add new skills with these courses