Belal Ali | Strategy Implementation | Best Researcher Award

Belal Ali | Strategy Implementation | Best Researcher Award

Palo Alto Networks, Kuwait

Professional Profiles:

Google Scholar Profile

Linkedin Profile

Early Academic Pursuits: 

Belal Al-Sheikh Ali's academic journey began with a focus on networking and security. He obtained certifications such as HP Master ASE - Network Infrastructure and IBM ISS Certified Technical Advisor, showcasing early dedication to building a strong foundation in the field.

Professional Endeavors:

His professional trajectory demonstrates a wealth of experience and leadership in the realm of network and security. Noteworthy roles include his time at Huawei as the Network and Security Solutions Lead Architect and at Palo Alto Networks as an SE specializing in SASE and Zero-Trust. His stint at Cirrus Networks as a Pre-sales Network and Security Architect involved designing intricate enterprise networks, SD-WANs, and security technologies. Here, he showcased his ability to translate business requirements into technical solutions and lead complex efforts for business transformation.

Contributions and Research Focus:

As a Research Ph.D. Candidate at RMIT University, His delved into the intricacies of "Efficient Trust-Aware Authentication and Task Offloading in Multi-access Edge Computing Using a Dual Fuzzy Method based Zero Trust Security Framework." His research publications underscore his commitment to advancing the field, particularly in areas like multi-access edge computing, blockchain, and zero-trust security.

Accolades and Recognition:

His technical qualifications, including CCIE, PCNSE, and CISSP, have garnered recognition in the industry. His expertise in designing complex enterprise NetSec solutions positions him as a sought-after professional in the cybersecurity domain.

Impact and Influence:

His roles as a Technical Adviser, Solutions Advocate, and Public Speaker reflect his impact in driving change and championing new ideas in cybersecurity. He actively contributes to sales engineering, solutions consulting initiatives, and public speaking engagements, spreading insights and fostering collaboration.

Legacy and Future Contributions:

His legacy lies in his dedication to cutting-edge concepts like Zero-Trust and SASE. His passion for these cybersecurity solutions, coupled with his ability to deliver impactful presentations and lead technical discussions, positions him as a thought leader. As he continues his journey, His aims to make meaningful contributions to the field while balancing his roles as a husband and father.

Notable Publications:

Multi-access edge computing architecture, data security and privacy: A review
B Ali, MA Gregory, S Li
83, 2021

A maturity framework for zero-trust security in multiaccess edge computing
B Ali, S Hijjawi, LH Campbell, MA Gregory, S Li
15, 2022

Uplifting healthcare cyber resilience with a multi-access edge computing zero-trust security model
B Ali, MA Gregory, S Li
15, 2021

Trust‐aware task load balancing in multi‐access edge computing based on blockchain and a zero trust security capability framework
B Ali, MA Gregory, S Li
2, 2023

Zero Trust Security Framework for 5G MEC Applications: Evaluating UE Dynamic Network Behaviour
B Ali, MA Gregory, S Li, OA Dib
2023

Efficient trust-aware authentication and task offloading in Multi-access Edge Computing using a dual fuzzy method based Zero Trust Security framework
BA ALI
2023