Agenda
08.00 - 08.50 |
Breakfast & networking break |
08.50 - 09.00 |
Chair's welcome remarks |
09.00 - 09.20 |
►Digital Revolution: The Rise of Cybersecurity H.E. Dr. Mohamed Al Kuwaiti, Head of Cyber Security, UAE Topics covered in this presentation will include:
|
09.20 - 09.40 |
►Disruptive Technologies- Transforming Cyber Security Landscape Ashraf Koheil, Vice President Global Sales, Group-IB
|
09.40 - 10.00 |
►Cyber Security Horizon scan in the UAE Hussein Hassan Shafik, Group CISO, Abu Dhabi Islamic Bank
|
10.00 - 10.20 |
►How Delinea assists in reducing Identity related cybercrimes Omar Samhouri, Senior Sales Engineer, Delinea
|
10.20 - 11.00 |
►Education Seminar 1 Delegates will be able to choose from a range of topics:
|
11.00 - 11.30 |
Networking break |
11.30 - 12.00 |
►Fireside chat: Strengthening Business Resilience Through Proactive Threat Intelligence Benedict Kite, Defence, Security and Cyber Adviser, Kearney
|
12.00 - 12.20 |
►Securing Tomorrow: The Critical Path to Cyber Resilience Dominic Keating, Regional Director, Middle East and Türkiye, Rubrik
|
12.20 - 13.00 |
►Education Seminar 2 Delegates will be able to choose from a range of topics:
|
13.00 - 14.00 |
Lunch & networking break |
14.00 - 14.20 |
►Quantum Computing and the Future of Security: HSBC's Strategy to Combat Emerging Threats Philip Intallura, Group Head of Quantum Technologies, HSBC
|
14.20 - 14.40 |
►Stop Chasing Data: Control It Where It Lives Mohamed Djenane, Senior Director Sales Engineering MEA, Seclore
|
14.40 - 15.00 |
►Rebooting the CISO Role: Embracing Agility and Resilience Olivier Busolini, Group CISO, Mashreq Bank
|
15.00 - 15.40 |
►Education Seminar 3 Delegates will be able to choose from a range of topics:
|
15.40 - 16.00 |
Networking break |
16.00 - 16.30 |
►Panel Discussion: Securing Future Architectures Manit Sahib, Ethical Hacker, Cytadel & Former Head of Penetration Testing & Red Teaming, Bank of England (moderator)
|
16.30 - 16.50 |
►Ransomware 3.0: Weaponizing AI for the Next Generation of Ransomware Attacks Manit Sahib, Ethical Hacker, Cytadel & Former Head of Penetration Testing & Red Teaming, Bank of England
|
16.50 - 17.00 |
Chair's closing remarks |
Education seminars
Vulnerability remediation and patching - The real challenge
Ara Antoun, Chief Operations officer, MEInfoSec
Minas Awakian, Managing Director, MEInfoSEC
Are you truly convinced that your 3rd party application vulnerabilities are detected and remediated in a timely manner? Are you having challenges remediating vulnerabilities discovered in your VA reports(Specifically configuration Vulnerabilities)? Does your VA report include a lot of false positives that repetitively appear in every monthly report? Are you truly convinced that your 3rd party application vulnerabilities are detected and remediated in a timely manner? Join our session and share your thought and challenges with us and we will share with you our best practice.
Attendees will learn:
- A complete and comprehensive VA assessment - partial results have no value
- A Solution which is flexible enough to accommodate your infrastructure needs
- An Excellent support contract, to help you in a timely manner.
Securing Data Flow for the Next Wave of the AI Era
Kousain Raza, Senior Solutions Engineer, Netskope
Kamlesh Luhana, Senior Solutions Engineer, Netskope
Sensitive data movement is often seen as a risk, but restricting it outright can create operational and security challenges. In an era of agentic AI and generative AI, organisations need security frameworks that protect data while ensuring agility. This session explores how modern security platforms enable secure data flow, adapt to diverse use cases, and prepare for the shift to an AI future.
Attendees will learn:
How to enable data flows without introducing escalating security risks
How to choose the right secure access method for each use case
Why security must be adaptive to risk, user behaviour, and AI-driven interactions
The Overlooked Risk: Why DNS is the New Frontline in Cyber Defence
Ahmed Faragallah, Solutions Architect, Infoblox
"The Overlooked Risk: Why DNS is the New Frontline in Cyber Defence" highlights how the Domain Name System (DNS), the essential service that translates network names into IP addresses, has become a critical target and entry point for modern cyber threats. unprotected DNS can undermine the entire security stack. Implementing robust DNS security, including real-time monitoring and threat intelligence integration, elevates DNS from a basic resolver to an active line of early threat detection and prevention.
Attendees will learn:
Understand the anatomy of zero-day DNS threats and how they bypass conventional security layers
Discover how to leverage AI-driven analytics to detect malicious domains in real time
Learn best practices for implementing proactive domain monitoring and threat intelligence
Why Data Security Falls Apart Without Document Security: The Risk You Can’t Afford to Ignore
Hammam Abunaser, Sales Director - MEA, FileOrbis
In today’s evolving digital landscape, organisations face increasing challenges from insider threats, data breaches, and ever-tightening compliance requirements. While investments in cybersecurity—such as firewalls, endpoint protection, and identity management—continue to grow, one area remains insufficiently addressed: unstructured data.
Critical business information is often stored not in structured databases, but in documents—files that are routinely downloaded, shared, and transferred across various platforms, devices, and cloud environments. These actions frequently occur beyond the visibility and control of traditional security mechanisms.
This speaking sesssion will examine the strategic importance of incorporating document-level security into modern cybersecurity frameworks. It will highlight how organisations are implementing embedded access controls, encryption, and audit trails within files to maintain consistent protection, regardless of where the data resides.
Attendees will learn:
Why document security is the missing layer in today’s cybersecurity strategies
Why no amount of perimeter or device protection can make up for its absence
Exploring how forward-thinking organisations are embedding access controls, encryption, and auditability into the files themselves to ensure data remains protected wherever it goes.
State of AI: How Evolving Intelligence in Shaping Cybersecurity
Praneeth Vanteru, Technical Consultant, ManageEngine
Discusses the evolution AI over the past decade and how the current models are gearing to address latest threats.
Attendees will learn:
Evolution of AI over the years
How ManageEngine products incorporated various AI related developments in our products
Our current focus areas related to AI
How we are planning to address Cyber threats using AI
The Impact of AI in Identity Security
Theshan Mudaly, Senior Solutions Engineer, BeyondTrust
Saranraj Balaraman, Partner Solutions Engineer, BeyondTrust
AI is everywhere – transforming the way we work, innovate, and solve problems. While this brings exciting opportunities, it also opens the door to new risks. Cybercriminals are now using AI to make their attacks smarter, faster, and harder to detect. By training AI systems on malware and other malicious tools, they are taking cyberthreats to an entirely new level.
Join Theshan Mudaly, Sr. Solutions Engineer at BeyondTrust, as he explores how AI is impacting Identity Security.
Attendees will learn:
Breaking down how digital identities and privileges are now being targeted in new ways
Sharing how BeyondTrust’s Modern PAM, combined with a Least Privilege strategy, can help organisations defend against these evolving AI-driven threats.
Building the Right Cybersecurity Architecture for a Distributed World in the AI Era
Sameer Basha, Lead Sales Engineer & Evangelist, Check Point Software Tech ME
Modern enterprises operate in highly complex, distributed networks, far from the ideal of cloud-only architecture. The shift to hybrid and distributed workspaces, accelerated by the AI era, has intensified cybersecurity challenges, leaving many architects uncertain about the right approach. Cybersecurity today must defend against diverse threats—cyber warfare, ransomware, data theft, political conflicts, and vulnerabilities in edge devices—while protecting people, information, infrastructure, business operations, and reputation. Against this backdrop, organisations need guidance on building the right cybersecurity architecture, aligning strategy, controls, and monitoring evolving risks.
We will use a practical example of home security analogy that audience can relate to derive the right cyber security architecture for a hybrid hyperconnected world. In essence, the presentation guides organisations toward a Cyber Security architecture that balances decentralisation with centralised oversight, leverages AI-powered threat prevention, continuous monitoring, and unified policies. Enriched with zero trust principles, this approach delivers resilient, adaptive security that mitigates evolving threats, aligns with business needs, and harnesses the opportunities and challenges of the AI era.
Attendees will learn:
State of cyber security in a distributed AI powered world
Embracing the right cyber security architecture
Open Garden and AI Powered threat prevention
Identity century and data driven approach with zero trust philosophy
Pre-emptive Cyber Defence: Finding Adversary Infrastructure Before the Attack
Luke Angus, VP EMEA, Silent Push
Nicholas Roy, Sales Engineer, Silent Push
Cybersecurity teams often struggle with traditional threat intelligence as it can be largely reactive. Feeds can be overwhelming and difficult to operationalise. This leaves security teams playing catch up while adversaries are moving quickly. Silent Push takes a different approach by providing preemptive threat intelligence. Instead of using indicators of compromise (IOCs), the platform provides Indicators of Future Attack (IOFAs) which allows teams to identify attacker infrastructure earlier and before it is used in order to take action faster.
We will look at real world examples where Silent Push uncovered malicious infrastructure tied to different campaigns and criminal networks. These case studies highlight how early detection helps take action sooner by detecting new infrastructure as early as possible. Finally, we'll explore practical use cases and how organisations can leverage preemptive threat intelligence into their existing security stack. In this session, we will demonstrate how pre-emptive threat intelligence enhances detection and response, enabling security teams to act earlier in the threat lifecycle.
Attendees will learn:
How to move from a reactive stance to a proactive defence posture, gaining strategies to stay ahead of evolving threats.
The challenges of traditional threat intelligence and why reactive methods fall short.
How Silent Push enables preemptive detection of adversary infrastructure.
Real-world campaigns and case studies showing Silent Push in action.
- Practical use cases and how organisations can operationalise preemptive intel.
Is AI Generated Code Secure?
Julian Totzek-Hallhuber, Senior Principal Solution Architect, Veracode
As generative AI becomes a mainstream tool for software development, one question is becoming increasingly urgent: Can we trust AI to write secure code? This session presents key findings from the 2025 GenAI Code Security Report, one of the most comprehensive evaluations to date of code security across over 100 large language models. Covering Java, Python, C#, and JavaScript, our research reveals troubling trends, including high failure rates on critical security tasks and no measurable improvement in security performance over time, even as models grow more powerful. This session will help you navigate the real-world security implications of GenAI in your development workflow.
Attendees will learn:
How often AI-generated code introduces vulnerabilities and in which languages
What types of security issues are most common
Why newer, bigger models aren’t necessarily safer
The hidden risks facing your software supply chain
What developers and security teams must do to stay ahead
Desert Dexter: The Hidden Cyber Threat in the Middle East
Ilya Leonov, Regional Director MENA, Positive Technologies
«Desert Dexter» is a social-media-driven malware campaign (since September 2024) across the MENA region that utilises fake news adverts linking to Files.fm/Telegram to deliver a modified AsyncRAT. Approximately 900 potential victims have been observed, with clues indicating a likely Libyan origin.
Attendees will learn:
The playbook: fake-news ads → Files.fm/Telegram → RAR → BAT/JS → PowerShell → reflective loader injecting into aspnet_compiler.exe, plus persistence and Telegram-based data exfil.
Capabilities to hunt: screenshots, system fingerprinting, checks for 2FA/crypto-wallet extensions/apps, and an offline keylogger.
Practical takeaways: IoC lists (Files.fm/Telegram), an infrastructure map, targeted countries, and attribution hints (Arabic code comments, «DEXTER» hostnames).
From Control to Confidence: The New Era of Modern Infrastructure Access
Javeria Malik, Solution Engineer, Sectona
Vishal Thakkar, Director - Customer Success, Sectona
Today’s enterprises operate across a vast and interconnected landscape - from on-premises infrastructure and cloud platforms and third-party networks. While this diversity offers unmatched flexibility, it also introduces complex privileged access challenges that traditional PAM solutions weren’t built to address.
Join Sectona for an exclusive session where we unveil our Modern Infrastructure Access approach - designed to secure every connection, everywhere, without compromising operational efficiency.
Attendees will learn:
- Achieving unified visibility and real-time control over privileged sessions.
- Enforcing least privilege and regulatory compliance seamlessly across diverse infrastructures.
- Securing access for internal teams, remote employees, and third-party users with minimal disruption.
- Eliminating blind spots and mitigating risks in hybrid and multi-cloud setups.
- Explore how Sectona brings diverse user personas together on a single, powerful platform.
Re-imagine Data Privacy and Protection in the AI Era
Khaled Saleh, Regional Sales Manager – MEA Region, OpenText
Salim Menikh, Sales Manager, OpenText
As organisations embrace Artificial Intelligence to drive innovation, efficiency, and growth, the stakes for safeguarding sensitive information have never been higher. AI thrives on data, but the same data can become a vulnerability if not managed responsibly. A modern data privacy and protection framework must go beyond compliance – it should embed trust by design, balancing innovation with ethical responsibility. This means adopting advanced controls like intelligent data classification, AI-driven anomaly detection, encryption at scale, and privacy-preserving computation, all while aligning with evolving global regulations. In the AI era, protecting data is not just about security – it is about enabling sustainable trust, resilience, and long term value creation.