Agenda

Presentations already confirmed include:


► Cyber security – regulation, resiliency, risk

Martin Leo, Head of Technology Business Controls, State Street Bank 

  • Regulatory landscape and change in the years
  • How resiliency is becoming the dominant theme with regulator
  • What role does risk (management) play in the midst of regulation and compliance

► ‘Will’ vs. ‘Skill’: are we using the wrong tactics to recruit for our Information Security team?

Goher Mohammad, Head of Information Security, L&Q Group

  • There is a cybersecurity skills shortage which is still not shrinking, as hiring managers and leaders we need to tackle the gap between demand and supply of cybersecurity professionals.
  • Traditional methods of hiring need challenging, how to adopt an agile and flexible approach. 
  • Get yourself noticed! What are cybersecurity hiring managers looking for in a new recruit?
  • Positive results: lessons learnt from L&Q Group on building and retaining talent within your security team

► Securing Mobile Workplaces

Mohamad Mahjoub, CISO Middle East, Veolia

  • Deploying secure yet easy to use collaborative tools
  • Bringing agility to operations
  • Redesigning the way of working
  • Being cost effective, environmentally friendly, and secure

► Executive panel discussion

Digitalisation: Delivering the best, securely

  • Sumit Puri, Chief Technology Officer, Evercare Group
  • Bilal Ahmad, Head - Information Security, Union Coop
  • Ismail Jani, Information Security and Compliance Manager, Engineering Office

► Challenging the 'traditional mindset' in the Cyber Defence Centre 

Ziauddin (Zia) Ansari, Head of Cyber Defense Center, Abu Dhabi Islamic Bank

  • Adopting a people focused approach: establishing the right skill-set, effective training and communicating with the C-suite and Board.
  • Tighten up your processes! Implementing a successful risk management strategy to successfully avoid and respond to attacks.
  • Improving your functions with advanced technology.
  • What’s next? Roadmaps for the future of the Cyber Defence Centre

 How do I implement a ‘Zero Trust’ security policy throughout your organization?

Islam Soliman, Presales Manager Middle East, Pulse Secure 

Our dynamic world of mobile and cloud computing requires advancing secure access capabilities based on continuous verification and authorization. How can you improve managing and governing user access ? Pulse Secure will show how you can implement a single access policy to your data, regardless of where it is located, from wherever the person is accessing it from on whatever device.

Key Takeaways : 

  • A look at the evolution of
  • How to achieve total user and endpoint visibility, and up-scaling device security
  • How you can enable IoT identification in a secure way and set relevant profiles

 


► Executive panel discussion

Compliance and risk mitigation in the changing regulatory landscape: Financial Services Perspective

  • Aizaz Zaidi, Head of Operational Risk and Transformation, Al Masraf Bank
  • Christos Christou, Chief Compliance Officer, Lulu Exchange
  • Gita Butzlaff, Head of Compliance & MLRO, Beehive P2P
  • Muhammad Rizwan Khan, Head of Compliance, Al Dahab Exchange

► Hacked! Security Beyond the Hype

Rajiv Raghunarayan, Senior Vice President of Products and Marketing, Cyberinc 

The worldwide spending on information security products and services exceeds more than $100B annually, growing at ~10%. Complexity is growing even faster. And breaches feel like a daily affair. As we continue our digitalization journey and as more “things” start getting connected, securing businesses and individuals becomes increasingly paramount.

Drawing insights from past breaches as well as conversations with IT security and data privacy leaders, this session looks past the marketing jargonry, to identify solutions that can transform security defenses, making it nimbler and simpler.

What you will learn in this seminar:

  • Understanding our attack surface
  • What are our key learnings from past breaches and how should that inform our future
  • What is our path forward in getting ahead of the attackers and the attacks

► AI in Security Operations: What we have learnt so far…

Ammar Enaya, Regional Manager Middle East/Turkey, Vectra AI

Time and talent are key factors in preventing a data breach. Learn from peers how AI enabled them to:

  • Detect hidden threats in cloud and enterprise networks
  • Perform conclusive incident investigations
  • Respond at previously unattainable speed and efficacy

► Attacks are moving at computer-speed – how will your teams respond fast enough?

James Connolly, Expert in application of AI, Darktrace 

  • The rise of machine-speed and worm-able attacks 
  • Autonomous Response: how cyber AI responds surgically to fast attacks across the entire digital infrastructure 
  • Using AI to ensure your network security works in tandem with your email security
  • Real-world case studies where zero-days and insider threats were interrupted within seconds
  • How to prepare for offensive AI attacks 

► APIs – The Next Frontier in Cybercrime 

Ameya Talwalkar, Chief Product Officer, Cequence Security

  • Explosive growth in API usage exposes organization to significant cyber security risks
  • Visibility – the first step in understanding and cataloguing the API security risk
  • Exposure – what types of attacks are each of the APIs susceptible to
  • Protection – which of the many API security products is best suited for your needs

► The Shifting Front Line of Fraud

Dan Woods, VP Shape Intelligence Center, Shape Security

  • Attack Evolution - navigate the attack-roadmap as it has progressed from the commodification of credential stuffing and ATO schemes to some of the most complex and cutting-edge examples of manual fraud and dark web marketplaces. 
  • Countermeasure Efficacy - discover how cybercriminals retool to easily circumvent traditional countermeasures such as WAFs and other trusted fraud tools CAPTCHA, and even fraud tools -  and what can be done to stop them. 
  • Inverting Friction - understand how organisations can protect their customers and brand without compromising user experience or collecting PII.