Agenda
08:20 - 09:20 |
Breakfast & Networking Break |
09:20 - 09:30 |
Chairmans Welcome |
09:30 - 10:00 |
►Opening Keynote: Building a Resilient Cybersecurity Culture His Excellency Dr. Mohamed Al Kuwaiti, Head of Cybersecurity, United Arab Emirates Government
|
10:00 - 10:20 |
►The New Age Cyber Threats: Leveraging AI to Improve Cybersecurity First Lieutenant Nasser Al Neyadi, Head of Information Security Department, Ministry of Interior
|
10:20 - 10:40 |
►Shifting the State of Cyber Risk from Guesstimation Towards Causation Bilal Baig, Technical Director, MMEA, Trend Micro
|
10:40 - 11:20 |
►Education Seminars Session 1 Delegates will be able to choose from the following education seminars:
|
11:20 - 11:50 |
Networking Break |
11:50 - 12:20 |
►Panel discussion: CISO daily challenges: Simon Brady, Event Chairman, AKJ Associates (Moderator)
|
12:20 - 12:40 |
►Understanding AI’s Impact on Securing Privileged Identities Michael Byrnes, Director, Solutions Engineering META, BeyondTrust
|
12:40 - 13:00 |
►Embracing Crypto Agility: Future-Proofing Security in the UAE Mamdouh Al-Gendy, Senior Technology Consultant, Entrust Crypto agility is an essential strategy for maintaining robust security in an evolving threat landscape. Learn how to future-proof your organization's security infrastructure, ensuring resilience against both current and future cyber threats. Discover best practices and real-world case studies on how to support your journey towards crypto agility and post-quantum cryptography. Attendees will learn:
|
13:00 - 13:40 |
►Education Seminars Session 2 Delegates will be able to choose from the following education seminars:
|
13:40 - 14:40 |
Lunch & Networking Break |
14:40 - 15:00 |
►Enhancing Cybersecurity through Effective Cyber Governance and Regulation Anoop Kumar, Head of Information Security Governance Risk and Compliance, Gulf News, Al Nisr Publishing
|
15:00 - 15:20 |
►Cyber Threat Intelligence – Strategic, Operational, and Tactical … take your cyber defense and resiliency to the next level Hafeez Rehman, Group Manager, Security Consultant Team, Kaspersky
|
15:20 - 15:40 |
►Fireside Chat — A CISOs view: IPOs, ESG, and Regulatory Landscape Simon Brady, Event Chairman, AKJ Associates
|
15:40 - 16:00 |
Networking Break |
16:00 - 16:30 |
►Panel discussion: Embracing AI: a double-edged sword Simon Brady, Event Chairman, AKJ Associates (Moderator)
|
17:10 - 17:30 |
► LIVE DEMONSTRATION: Weaponising AI: The Deep Fake Central Banking Heist Manit Sahib, Ethical Hacker, The Global Fund
|
16:50 - 17:00 |
► Time for security to grow up Simon Brady, Editor, AKJ Associates
|
Education seminars
The real risk - Why patching is still a challenge.
Ara Antoun, Chief Operations officer, MEInfoSec
Patch management is a critical aspect of maintaining the security and functionality of software systems. However, it comes with a range of challenges that can make the process complex and difficult. Third-party applications are a significant vector for potential infections. The challenge today is how to minimize the risk and remediate the vulnerabilities. Effective patch management tools are essential for ensuring security, stability and continuity in an organization's digital infrastructure. It also requires a balanced approach combining timely response with careful prioritization. Darksight resolves this issue and makes the patch management process more efficient.
- 3rd party applications the root cause of infections
- Regional top vulnerable applications and their impact
- Challenges of patching and examples
- DarkSight - Identification and remediation.
From Data to Done: Remediating the app risk that matters most, with the least amount of effort.
John Smith, EMEA CTO, Veracode
Security teams today are grappling with a host of challenges that hinder their ability to manage their security risk posture effectively. From infrastructure and security tool sprawl, teams are missing a total view of risk, drowning in alert fatigue making it difficult to know how to prioritize and remediate at the pace business requires.
Attendees will learn:
- Automated root cause analysis to tackle the most urgent and impactful application and cloud security issues
- To ensure your organisation stays ahead of potential threats.
- To unify findings across development, build, deployment, and production tools
- Provide comprehensive risk visibility from code-to-cloud and boost remediation velocity by 10x.
- Prioritize solutions based on the reduction of asset and identity risk
- Cut remediation time by 75%
A Harmless Breach - Is it the Future of Cybersecurity?
Mohamed Djenane, Sr. Director Sales Engineering MENA/APAC, Seclore
Data breach now average $8 million in damages. But what if your data could stay secured even when compromised or exfiltrated? We often think of data breaches as inevitably catastrophic. But a new data-centric model questions this assumption and outlines a path toward a future where breaches become harmless.
Attendees will learn:
- Transform Your Cybersecurity Approach: Discover how data-centric security model can render data breaches harmless, even when compromised.
- Gain Competitive Advantage: Hear real-world success stories of companies that have turned breaches into harmless events, giving them an edge in the market.
- Stay Ahead of Trends: Get insights into future cybersecurity trends and prepare your organization for the evolving threat landscape.
Vault and beyond: A life cycle approach to AI-powered Privileged Access Management
Meenakshisundaram Ramakrishna Sahadevan, Product marketing analyst, ManageEngine
Traditional PAM implementations often place a firm focus on the solution itself, neglecting the broader context of privileged access management. However, it is important to adopt a holistic approach that encompasses the entire life cycle of privileged users, right from onboarding to offboarding.
By integrating AI-driven insights from across enterprise IT solutions, organizations can incorporate privileged access management best practices using AI-powered insights to mitigate risks and improve operational efficiency.
Attendees will learn:
- The limitations of a traditional approach to privileged access management.
- How an integrated approach can help leverage AI insights throughout the privileged access lifecycle from across enterprise IT solutions.
- Tangible benefits and the way ahead.
The Business Model of Modern Cybercrime: A New Look or Why the Black Market Will Never Disappear?!
Alexey Lukatsky, Managing Director, Positive Technologies
- Modern cybercrime operates like any market or business, but it is illegal.
- We should analyze cybercriminals through the lens of economic principles.
- The business model of any enterprise, including cybercrime, consists of nine key components: key activities, key resources, partner networks, value propositions, customers, channels, customer relationships, cost structure, and revenue streams (with many examples of cybercrime products, services, and offers, particularly in the MENA region).
- We can predict emerging cybercrime businesses by understanding these components.
- To effectively combat cybercrime, we must understand its business model and how we can disrupt it.
QR Codes in a Post Pandemic World
Gary Pollock, Solutions Engineering Manager, CyberArk
QR codes were all but dead until smartphone companies started incorporating QR code scanners into their mobile phones back in 2017. Enter the COVID19 pandemic and the rise of the contactless economy, and the QR code is making a massive comeback. From advertising and restaurant menus to healthcare and agriculture – the use cases for QR codes are infinite.
QR codes are accessible, easy to produce and seemingly, here to stay. They’re also a perfect way for cyber criminals to snag your employee’s personal information.
Attendees will learn:
- Examples of 3 simulated QR code attacks
- Tactics, Techniques, and Procedures (TTPs) used by QR code attackers
- Ways to protect yourself and your employees
- Implications for enterprise security teams and controls to have in place to prevent privilege escalation and lateral movement within the IT estate