Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Ramy AlDamati

CTO , Founder at ( CTO @ GloryThink Group ) & ( Founder @ TrustyCrypto )

Dubai, United Arab Emirates

Founder | CTO | Influencer | Leader | Executive | CyberSecurity, Blockchain, AI, FinTech Advisory, Speaker & Trainer

Ramy AlDamati is a Cybersecurity & Blockchain expert holding master’s degrees in Information Security from the University of Hertfordshire. He has 17 years’ experience in the field with a strong focus on smart and resource-efficient systems. During those years, he has worked in multiple International CyberSecurity vendors like ( PaloAlto Network, FireEye & Kaspersky Lab ). Presently, he works as Chief Technology Officer at GloryThink Group and is involved in several research collaborations with international Blockchain & Financial Entities or ACADEMIC partners.

Experienced Chief Technology Officer with a demonstrated history of working in the information technology and services industry. Skilled in Negotiation, Business Planning, IT Service Management, Pre-sales, and Start-ups. Strong Techno-business development professional.

a Founder for (TrustyCrypto) an Ecosystm to make cypro world safe and secured.

Mixed Experience in CyberSecurity & Emerging Technology, engaged in many positions for mentoring, selling, business growth, research and many area.

Delivered multiple Training (English and Arabic) in AI, Bitcoin, Blockchain, Cryptocurrency, Distributed Ledger Technology, ICO, STO, Blockchain Protection & Cybersecurity, or many other topics for this domain.

He was able to deliver them in both languages (AR & EN) for many local and international organizations to help to raise awareness to all levels of people.

Available For: Authoring, Consulting, Influencing, Speaking
Travels From: Dubai
Speaking Topics: AI,Big Data,Blockchain,Business Strategy,Cryptocurrency,Cybersecurity,Digital Disruption,Digital Transformation,Edtech,Emerging Technology, Entreprene

Speaking Fee $250

Ramy AlDamatiPoints
Academic180
Author34
Influencer11
Speaker20
Entrepreneur180
Total425

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Enterprise
Business Unit: Business Development & Training
Theatre: Middle East, Turkey & Africa - META Region
Media Experience: 16 Years
Last Media Training: 05/09/2020
Last Media Interview: 01/09/2020

Areas of Expertise

5G
AI
Big Data
Blockchain 61.74
Cryptocurrency 65
Customer Experience
Cybersecurity 65.84
Design Thinking
Digital Disruption
Digital Transformation 30.60
Edtech 62.07
Emerging Technology 51.99
Entrepreneurship 33.62
Fintech 33.35
Future of Work
Innovation
IoT
Leadership 31.37
Management 32.79
Public Relations
Risk Management 30.73
Sales
Social
Startups 36.09
Cloud 30.82
Privacy 30.44
Business Strategy 31
Business Continuity 32.98

Industry Experience

Financial Services & Banking
High Tech & Electronics
Higher Education & Research
Telecommunications

Please signin or signup to view publication section.

Publications

18 Academic Certifications
Cisco Routing and Switching Sales Certification
Cisco
July 20, 2011

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

Cisco Security Sales Specialist
Cisco
July 08, 2011

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

ISACA Certificate
ISACA
January 26, 2010

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

CompTIA Security+
Comptia
January 17, 2010

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

CompTIA Project+
Comptia
January 13, 2010

See publication

Tags: Emerging Technology, Management, Edtech

Computer Hacking Forensic Investigator Certification - v3
The International Council of Electronic Commerce Consultants (EC-Council)
January 05, 2010
Achieving the CHFI - Computer Hacking Forensic Investigator certification validates that you have the knowledge and skills to detect hacking attacks, to properly obtain evidence needed to report the crime and prosecute the cybercriminal, and to conduct an analysis that enables you to prevent future attacks.

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

CEH: Certified Ethical Hacker v6
EC-Council
January 05, 2010
Certified Ethical Hacker is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems,

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

ITIL Foundation v3
Exin
December 26, 2009
ITIL Foundation is a certification based on ITIL practices for IT Service Management.

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

Juniper Networks Certification Program (JNCP) - JNCIA
Juniper Networks
December 24, 2009

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

Business Continuity (BS25999) Program Cert
Mobily - KSA
August 19, 2009

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

ArcSight Certified Security Analyst (ASCA)
HP Arcsight
June 17, 2008

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

Riverbed Certified Solutions Associate (RCSA)
Riverbed Tech
March 12, 2008

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

CCNP (Cisco Certified Network Professional )
Cisco
September 29, 2006
Cisco Certified Network Professional (CCNP) Routing and Switching certification validates the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks and work collaboratively with specialists on advanced security, voice, wireless and video solutions.

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

CCNA (Cisco Certified Network Associate)
Cisco
August 29, 2006
CCNA (Cisco Certified Network Associate) is an information technology (IT) certification from Cisco Systems. CCNA certification is an associate-level Cisco Career certification. ... Passing the ICND1 exam grants the candidate the Cisco Certified Entry Networking Technician (CCENT) certification.

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

PMP Certificate
Project Management Institute - PMI
March 20, 2005

See publication

Tags: Emerging Technology, Management, Edtech

Microsoft Certified Solutions Expert (MCSE)
Microsoft
September 21, 2000

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

Microsoft Certified Solutions Associate (MCSA)
Microsoft
July 01, 2000

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

Microsoft Certified Professional (MCP)
Microsoft
March 01, 2000

See publication

Tags: Cybersecurity, Emerging Technology, Edtech

1 Advisory Board Membership
Technical Advisory Board Member
GSDC - Global Skill Development Council
May 01, 2018
The Technical Advisory Board plays an important role in helping to shape the skill requirements for emerging technologies & to provide a customer centric solution.

This includes offering "enterprise-grade" professional skill development for IT executives, business leaders and technology experts. The Technical Advisory Board represents Industries well known Experts, Architects & Leaders.

See publication

Tags: Blockchain, Cybersecurity, Emerging Technology

4 Article/Blogs
Expert Advice On How To Handle Cyber Attacks
Forbes Middle East
June 10, 2019
At the Kaspersky Lab Cyber Security weekend held in South Africa in April, we spoke to Ramy AlDamati, Enterprise Security Expert for META, Kaspersky Lab. He shared his tips on how to tackle online security threats and how to remain safe in the fast-growing digital age.

See publication

Tags: Blockchain, Cybersecurity, Emerging Technology

Share. Tweet. Protect. Repeat. - social media, the safe way
linkedin
June 24, 2016
Social media is part of our lives. And many times, when you think about social media, you tend to think of Facebook, Twitter and LinkedIn .

See publication

Tags: Cybersecurity, Emerging Technology, Privacy

Keep cyber criminals out of your inbox for good. Here’s how
linkedin
June 24, 2016
Just like me, you probably have various social media accounts, banking accounts and we often subscribe to many sites and online services.

See publication

Tags: Cybersecurity, Privacy

Are you protected from cyber attacks delivered via Wi-fi?
linkedin
June 17, 2016
Before we follow the steps that should be taken to increase protection for a home wireless network, I would like to give you some valuable insights on how to defend your privacy on public wireless networks.

See publication

Tags: Cybersecurity, Privacy

1 Corporate Partner
Member in Government Blockchain Association - GBA
Government Blockchain Association
January 13, 2016

See publication

Tags: Blockchain, Fintech, Leadership

2 Founders
Founder
TrustyCrypto
June 23, 2020
“If opportunity doesn't knock, build a door.”

Few Years back I decided to enter the Emerging Technologies Domain and was having big believe that Each New Innovation will need a CyberSecurity, so this is my DOOR (“TrustyCrypto”) that I built for big opportunity in Cryptocurrency Domain mainly and in Blockchain as well.

“TrustyCrypto” is joint venture between Non-Techie Crypto Investors with big faith in the need of CyberSecurity in this domain & Experts in the domain to build a “Multi-Tier complete Ecosystem to make the Crypto World Safe & Trusty”

“TrustyCrypto” ecosystem will play a major role in multiple areas:

• People,
• Knowledge,
• Process,
• Tools &
• Services.

To support Crypto & Blockchain CyberSecurity, we make it for the:

• Investors,
• Startups & Vendors,
• Strategics,
• Advisory or Experts,
• International Agencies,
• CyberSecurity investigators or Researchers,
• Government or Regulatory entities,
• Educational Institutions or Universities.

“TrustyCrypto” is FOR YOU and FROM YOU, and as Steve Jobs said : “Great things in business are never done by one person. They’re done by a team of people.” We are welcoming anyone to join us and “Take a Bite of the Apple “

Finally thanks for the project supporter and investors, let’s start our journey & Welcome You to “TrustyCrypto” ️

See publication

Tags: Blockchain, Cryptocurrency, Cybersecurity

Founder
TheBlockchainers.Club
June 05, 2016
The Blockchainers Club is A professional network and community for all peoples work in Blockchain, Cryptocurrency & ICO/STO/IEO Domain & would like to share their knowledge or promote their services.

One of the main purposes of the Club is to build a strong community made of professionals and students inside the Blockchain, Cryptocurrency & ICO/STO/IEO Domain industry.

We will Lunch our Site Soon.

Stay tuned & follow us on our Social Media

- Linkedin : Linkedin.com/company/247blockchainers
- Twitter : Twitter.com/247blockchainer
- Facebook : Facebook.com/247blockchainers
- Instagram : Instagram.com/247blockchainers

See publication

Tags: Blockchain, Cryptocurrency, Startups

14 Industry Awards
The 5th National Cybersecurity Drill - Oman
Oman CERT - ITA
September 11, 2019

See publication

Tags: Cybersecurity, Digital Transformation, Risk Management

Certificate of appreciation to attend and speak in 10th Info Security Conference 2018
kuwaitdx
May 09, 2018
Certificate of appreciation to attend and speak in 10th Info Security Conference 2018

See publication

Tags: Cybersecurity, Emerging Technology, Entrepreneurship

ARAMCO ISA Workshop 2018
ARAMCO KSA
April 12, 2018
ARAMCO ISA Workshop 2018

See publication

Tags: Cybersecurity, Emerging Technology, Entrepreneurship

Info Security Top Ambassador 2018 (ISNR AUH)
UAE Government
March 07, 2018
Info Security Top Ambassador 2018

See publication

Tags: Cybersecurity, Emerging Technology, Entrepreneurship

ARAMCO ISA Workshop 2017
ARAMCO KSA
November 23, 2017
ARAMCO ISA Workshop 2017

See publication

Tags: Cybersecurity, Emerging Technology, Entrepreneurship

MENA InfoSec Conference 2017
VitruPort
November 21, 2017
MENA InfoSec Conference 2017

See publication

Tags: Cybersecurity, Emerging Technology, Entrepreneurship

KIPS eGov Champion 2017
IGA Bahrain Government
April 10, 2017
KIPS eGov Champion 2017

See publication

Tags: Cybersecurity, Emerging Technology, Entrepreneurship

Company Teamwork
FireEye
July 31, 2015

See publication

Tags: Cybersecurity, Leadership, Business Strategy

Building a Great Partner Community
FireEye
July 30, 2015

See publication

Tags: Cybersecurity, Leadership, Business Strategy

EMEA SE Award Q12015 - Above & Beyond
FireEye
May 12, 2015

See publication

Tags: Cybersecurity, Leadership, Business Strategy

Flare award : EMEA SE High Achievement
FireEye
May 12, 2015

See publication

Tags: Cybersecurity, Leadership, Business Strategy

3rd Forum Innovation & Entrepreneurship 2018
University of Bahrain
December 31, 1969
3rd Forum Innovation & Entrepreneurship @ Bahrain University

See publication

Tags: Cybersecurity, Emerging Technology, Entrepreneurship

Kaspersky CyberSecurity Weekend 2019
Kaspersky Lab
December 31, 1969
Kaspersky CyberSecurity Weekend 2019

See publication

Tags: Cybersecurity, Emerging Technology, Entrepreneurship

KIACS 2019 ( 4th Cybersecurity Conference )
KIACS
December 31, 1969
KIACS 2019 ( 4th Cybersecurity Conference ) - Certificate of Appreciations

See publication

Tags: Cybersecurity, Emerging Technology, Entrepreneurship

4 Keynotes
BSides Dubai 2018: Blockchain: The New Line Of Defense - Ramy AlDamati
Hack In The Box Security Conference
December 25, 2018
BSides Dubai 2018: Blockchain: The New Line Of Defense - Ramy AlDamati

See publication

Tags: Blockchain, Cybersecurity, Edtech

Kaspersky 3. Siber Güvenlik Zirvesi - Ankara - 15.05.2018
Siber Güvenlik Zirvesi & Kaspersky Lab Tukey
May 15, 2018
Siber güvenlik ve siber tehditlerin önüne geçmenin önemininin tartıştığımız Kaspersky 3. Siber Güvenlik Zirvesi, BTK Merkez Yerleşkesi’nde gerçekleşti. BTK Başkanı Sayın Dr. Ömer Fatih Sayan Bey'in açılış konuşmasıyla başlayan etkinliğin kaydını izleyebilirsiniz.


32:52 - 57:45 = Kaspersky Lab Siber Güvenlik Çözümleri Mimarı Ramy AlDamati - Yeni Nesil Siber Güvenlik Uygulanaları (İngilizce)

See publication

Tags: Blockchain, Cybersecurity, Leadership

Digital Banking and Security Conference , Baku, Azerbizan
FA International Trade Events
May 14, 2018
Digital Banking and Security Conference , Baku, Azerbizan

See publication

Tags: Blockchain, Cryptocurrency, Digital Transformation

Cloud & Security Summit 2017 Keynote Speaker
Ingram Micro Cyber Security
January 23, 2017
Cloud & Security Summit 2017 Keynote Speaker : Ramy AlDamati, Cyber Security Solutions Architect at Kaspersky Lab, explored the types of Cyber Security solutions your customers really need in his Keynote session at the Cloud & Security Summit held in Abu Dhabi, 2017.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

1 Media Interview
Securing the Crypto Economy
intelligentcio
November 04, 2019
The Blockchain industry and cryptocurrency market have been rapidly developing and now constitutes a significant share of the global economy. In fact, as Ramy Al Damati, Enterprise Security Expert for Middle East, Turkey and Africa at Kaspersky tells us, Blockchain-based technology is becoming increasingly popular and is being used to solve a wide range of tasks and becoming a key element in establishing business processes.

See publication

Tags: Cryptocurrency, Cybersecurity, Leadership

8 Videos
My Interview with AlHurrah TV - Subject on the Nuclear Power Plant Cyber Attacks
Ramy AlDamati - YouTube Channel
May 07, 2020

See publication

Tags: Cybersecurity, Business Strategy, Business Continuity

My Interview with AlHurrah TV - Subject on remote work & VPN pros & cons - May 8, 2020
Ramy AlDamati - YouTube Channel
May 07, 2020

See publication

Tags: Cybersecurity, Leadership, Business Continuity

Day 3 : CyberSecurity for Blockchain - Free Online Course with Cooperation with ISACA Amman Chapter
Ramy AlDamati - YouTube Channel
May 03, 2020

See publication

Tags: Blockchain, Cybersecurity, Emerging Technology

Day 2 : CyberSecurity for Blockchain - Free Online Course with Cooperation with ISACA Amman Chapter
Ramy AlDamati - YouTube Channel
April 29, 2020

See publication

Tags: Blockchain, Cybersecurity, Emerging Technology

Day 1 : CyberSecurity for Blockchain - Free Online Course with Cooperation with ISACA Amman Chapter
Ramy AlDamati - YouTube Channel
April 28, 2020

See publication

Tags: Blockchain, Cybersecurity, Emerging Technology

Webinar on Blockchain Introduction & The Future of Business
Ramy AlDamati - YouTube Channel
March 01, 2020

See publication

Tags: Blockchain, Cybersecurity, Emerging Technology

Forbes Middle East Interview : Expert Advice On How To Handle Cyber Attacks
Ramy AlDamati - YouTube Channel
February 16, 2020

See publication

Tags: Cybersecurity, Management, Leadership

Blockchain & Bitcoin Training course in Arabic دورة بلوكشين وبيتكوين بالعربي
Ramy AlDamati - YouTube Channel
February 16, 2020

See publication

Tags: Cryptocurrency, Cybersecurity, Emerging Technology

1 Webinar
BrightTALK Session Ramy AlDamati & Pavel : To Blockchain or Not to Blockchain Terra Incognita for Enterprises
Ramy AlDamati - YouTube Channel
August 30, 2019
A session on www.brighttalk.com

Are you currently developing a project based on distributed ledger? Or simply interested in the technology?

We will give you a recap of how blockchain technology has become as an integral part of the business process in enterprises. We’ll talk about use cases where distributed ledgers deliver their best value and we’ll also take a look at threat landscape and corresponding cybersecurity measures tailored for blockchain-based systems and provide recommendations on how to make your project secure.

• About blockchain and distributed ledgers
• The importance of DLT in numbers
• Use cases enterprise customers implement in DLT
• Threat landscape and why cybersecurity is important for DLTs
• Introducing Kaspersky Enterprise Blockchain Security
• Q&A

See publication

Tags: Blockchain, Cybersecurity, Emerging Technology

Radar

1 Technology
Blockchain

Date : July 29, 2020

Blockchain Tech

See Radar

Blog

3 Article/Blogs
These Tips Will Bolster Your Cybersecurity Efforts
Thinkers360
June 29, 2020
(1) Develop a forward-looking Cybersecurity Methodology : focused on expanding efforts to stay ahead of current threats versus maintaining a program that is merely compliant, or one that has been successful in the past.

(2) Establish strategies to #Access and #Analyze the latest Threat Intelligence : to help prioritize information security budgets and enhance internal technologies.

(3) Ensure the correct Employee Skillsets are in place : Changes in cybersecurity may require you to train existing employees on desired skillsets or bring on new talent. Keep in mind that hiring for employees with specific security skillsets can be extremely competitive, so you may want to have a plan in place for attracting data and analytics experts.

(4) Capitalize on Cyber Threat Intelligence (CTI) resources and advanced detection technologies : to predict how certain threats or attacks are evolving and what perceived vulnerabilities are being targeted.

See blog

Tags: Cybersecurity, Emerging Technology, Entrepreneurship

How we can tackle the growing cybersecurity skills gaps ?
Thinkers360
June 29, 2020

1. We need hands-on training for people currently working in IT. Interested IT personnel should be selected and trained in cybersecurity. This can include a mentoring or apprenticeship programme within an organization, funding hands-on training in an accredited educational or industrial setting, or creating a consortium of organizations willing to work together to cross-train security professionals.

2. We also need to update our formal educational process and encourage more diversity among candidates. Students should be exposed to security issues at an early age. Those students that show promise should be encouraged to enter educational programmes that emphasize or specialize in cybersecurity. Special attention needs to be paid to encouraging women and minorities to participate in these programmes as they are significantly underrepresented in the cybersecurity industry and represent a very real solution to closing the cyber skills gap at scale.

3. Finally, we need to accelerate our adoption of automation and machine learning. Cybercriminals have been closing the time between a successful breach and exfiltrating data or planting a malicious tool. Based on the current state of the cyber skills shortage, we can no longer rely on humans to detect and respond to these threats fast enough. Automation and machine learning will allow security defences to respond in real time.

See blog

Tags: Cybersecurity, Emerging Technology, Entrepreneurship

Why Too many organizations make critical mistakes when embarking on large-scale digital transformation for their organization ?
Thinkers360
June 08, 2020
Many fail to develop a strategic, proactive, and threat-based cybersecurity program and under-investing in the following five (5) key elements of cybersecurity:

(1) Provide cybersecurity education/training for all members of the organization from the top to the bottom.

(2) Hire the right people to lead the organization’s cybersecurity and data privacy strategic planning and implementation from the start.

(3) Engage independent firms to conduct periodic cybersecurity diagnostic testing, including: computer vulnerability scanning, penetration testing, email system cyber-attack assessments, spear-phishing campaigns, and dark web analysis, to understand the organization’s cyber vulnerabilities and threats.

(4) Ensure continuous 24/7/365 information monitoring, intrusion detection, and rapid cyber incident response services either internally or via outsourced Managed Security Services Providers (MSSP).

(5) Implement and test appropriate information resilience plans and procedures via cyber incident response plans, cyber business continuity plans, and disaster recovery plans.

The key to success is to begin all digital transformation projects with cybersecurity in mind. By engaging with cybersecurity experts from the start of a project, or new business venture, an organization can ask the right questions then develop a proactive and threat-based cybersecurity program. Remember, in the digital age an organization can only achieve information integrity and data privacy through effective cybersecurity.

See blog

Tags: Cybersecurity, Digital Transformation, Edtech

Opportunities

1 Article
Authoring a various article on Industry 4.0 / AI / IoT / Cybersecurity / Digital Transformation / Blockchain / Cryptocurrency

Location: Virtual    Date Available: May 31st, 2020    Fees: 150$

Submission Date: May 22nd, 2020    Service Type: Service Offered

I'm offering to author articles on these topics Industry 4.0 / AI / IoT / Cybersecurity / Digital Transformation / Blockchain / Cryptocurrency.

And I can do so in English and Arabic

Respond to this opportunity

1 Business
Innovative Business & Digital Transformation Advising & Consulting

Location: Virtual , Worldwide    Date Available: May 31st, 2020    Fees: Hourly, Retainer, Project base

Submission Date: May 22nd, 2020    Service Type: Service Offered

As a Business & Digital Transformation advisor, my mission is to help you leverage Digital Transformation for your organization.

- Business Transformation (BT) Strategy & Road map
- BT Strategy Implementation
- Technology Strategy
- Data Strategy
- Innovation Strategy
- Customer Experience and Loyalty
- Business Models
- Revenue Models
- Innovation for Mature Products and Services
- Disruptive Innovation
- Organizational Transformation

Respond to this opportunity

Contact Ramy AlDamati

Media Kit

Share Profile

Contact Info

  Profile

Ramy AlDamati