Presentations already confirmed include:
► Communicating with the Board effectively –Security strategy definition 101
Antonio Campos Dionisio, Group CIO and Frank Murray, CISO, Associate Vice President – IT Security, Risk & Business Resilience, MIG Holding
- Understanding your stakeholders. Identify different functions’ business risks, and communicate your message accordingly
- Hacking the boardroom. Gaining executive management buy-in by adopting the model of a hacker
- Defining your priorities. It’s not just about the budget or the underlying technologies. Understand the value for the business instead of “just squeezing money” out of the board
► The Insecurity of Robotics, IoT and Smart devices
Bharat Gautam, Head of Information Security, DAMAC Properties
- The world, and business, is becoming increasingly digitalised.But what are current IoT projects missing at the moment? Does there need to be greater collaboration between innovation and security teams?
- Maturity levels and AI. How do you measure the security levels of an automated business? What risks do you need to take into account?
- The rush towards becoming Smart. Is it too fast? Is there a need for standardisation and regulation when it comes to IoT, AI and machine learning?
► Running the risks and regulations. The insider truth on cyber risk management
Christos Christou, Chief Compliance Officer, Lulu Exchange
- Introduction to AML/CFT Risk Management – the Regulatory Requirements
- Security – what is required from a business perspective and how important is security to the decision to make or buy?
- Cloud vs Hosted Services – what is the business perception and what is the Regulatory Requirement
- How do we manage the AML/CFT Risk and Security in Lulu Financial Group?
► Cyber: the senior management perspective
Balaji Nagabhushan, Group Chief Administrative Officer, Tristar Transport
- What do your senior management and stakeholders want to know about the cybersecurity of your organisation?
- How does cybersecurity fit alonside other functions such as risk, legal and CSR?
- Risk management perspective. How has cybersecurity become a wider part of overall operational risk? Is cyber-risk unique? And should it be measured and valued in the same way as other forms of operational risk?
- Communicating with stakeholders. What do they need to know and how does cybersecurity now arguably affect the market share price and commercial value of an organisation?
► Executive panel discussion
The new inconvenient truths on AI, machine learning and its impact on business
- Adam Lalani, Group Head of IT, Tristar Transport
- Ebrahim AL-Alkeem, Head of Information Security, ENEC
- Brian Byagaba, Senior Manager Information Security, Commercial Bank International
► Getting Smart about threat intelligence
Ebrahim AL-Alkeem, Head of Information Security, ENEC
- How AI impacts and aids threta intelligence
- Case study from ENEC: how they are using AI in the cybersecurity effort?
- How and where to invest in AI and machine learning tools
► Upping the cybersecurity benchmark,. How good is good enough?
Suresh Nair, Chief Information Security Officer, MENAT, GE
- The various challenges of large multi-national corporations vs. SME’s
- Managing third party security. Is the security of your third parties as important as the security of your organisation itself? How do you audit and benchmark the security of your third parties?
- “Minimum baselines and standards” of cybersecurity. How do you decide what is the bare minimum for your business?
- Cyber-risk management. What are the metrics? How do you model and analyse it?
► In it for the long run; building a sustainable solution to cyber security resourcing
Craig McEwen, Global Head of Cyber Operations, Anglo American
- Current state of affairs – Attacks etc
- Current state of affairs – Recruitment figures
- Future touch points – OT (blended or dedicated and a complete lack of existing skill in the OT area)
- Winning the war, not the battle – Apprenticeships, talent development etc
- What should we be looking for – What is easier to train, cyber skill or natural talent/analytical mind etc.
► Making Big data big business. How information security and data governance can work to your commercial advantage
Mike Pitman, CISO, Dunnhumby
- Information security as a commercial competitive advantage
- How your data governance can win or lose you clients
- The CISO as business enabler: working with commercial functions
- ISO 27001 certification: Does this give your clients confidence or a false sense of security?
Anomali - Threat Actor - A Love Story?
Andrew De Lange, Solutions Consultant, Anomali
Do we romanticise cyber threat actors? When a cyber incident strikes, we may love the idea that it is some APT (insert number here) or Fancy/Angry (insert animal here) or some other famous threat actor, perhaps with nation-state abilities. But we may also hate the idea that it might be: these are the most dangerous adversaries. In reality our enemies aren’t even on our radar, because we turn a blind eye to the smaller signals our controls catch for us. But sometimes these are small pieces of a bigger puzzle we need to understand. What you will learn in this seminar:
- Leveraging critical thinking and finding trends in the noise.
- Actor profiling
- The importance of remaining unbiased in your research.
- Collaboration to find the common enemy
Kaspersky Lab - The Ceaseless Evolution of Consumer Transformation
Tim Ayling, Kaspersky Fraud Prevention Lead, Kaspersky Lab
In this presentation, hear about the recent history and the future of technology and consumer patterns and drivers. This session explores the continued proliferation of social media, IoT, cryptocurrency & artificial intelligence and the implications of this technology. The huge rise in cybercrime and fraud highlights the challenges businesses face across all industries.
This session takes a look at what those challenges are, how we can react to them and what we can do better. It covers:
- Changes in our digital lives and how this drives the consumer;
- The value of data in today's world and the implications of this;
- The current state of e-fraud