Presentations already confirmed include:
► Healthcare Cyber Security: Evolving Threats During and Post-Covid19
Ashish Khanna, Group Information Security Officer, Dubai Health Authority
- How hackers rapidly evolved tactics to exploit the public’s pandemic fears
- The rapid adoption of cybersecurity best practices for keeping pace with evolving threats
- How threats to the health system from nation-states and criminals are a growing concern at a time when the pandemic has increased our reliance on technology
►To Resiliency and Beyond!
Steve Brown, Director, Cybersecurity, Mastercard
- Increasingly complex networks of business relationships are exposing participants to systemic operation risk.
- As a result, our national security, public safety and economic growth are being exposed to major disruption.
- In this session, see how Mastercard is delivering trust through an approach that quantifies, automates and prioritizes risk to build cyber resilience and trust throughout the connected digital economy.
► Closing the security skills gap
Ali Beshara, Head of Information Security and Risk Management, BENEFIT Company – Bahrain
- Identifying the skills first, highlight the SFIA Foundation revised IT skills
- Can all security skills be easily acquired? What is the case in Bahrain?
- Available resources in the market, what works and what are the challenges
- Get into their shoes: A look at security skills gap from the perspective of the candidate and from the employer’s perspective
► How robust compliance can prevent e-Crime
Muhammad Rizwan Khan, General Manager, Al Dhahery Exchange
- Financial crime, identification of key factors that should be reported as suspicious
- Identification of areas where due diligence inquiries need to be made for E-Crimes
- Areas of susceptibility and vulnerability to employee collaboration in E-Crimes
- Establishment of Risk Assessment Model
- Prevention of unauthorized access
- Consumer Data Protection regulation
► Cybersecurity isn't Just Doom and Gloom
Jerome Walter, CISO, Digital Venture, Standard Chartered Bank
- Over the last 10 years, the transformation brought about by Agile development, Cloud technologies and DevOps has created a number of opportunities for security to rethink and implement new cyber hygiene strategies without slowing down the enterprise
- See how the IDEAS architecture framework helps reconcile security and innovation
- Exploring key metrics that help drive better organisational outcomes
- How new practices are emerging to enable continuous verification and collective learnings
► PCI SSC Update
Jeremy King, VP, Regional Head for Europe, PCI Security Standards Council
- PCI DSS V4.0 latest news
- PA-DSS migration to Software Security Framework
- Software Security Framework latest news
- Informational Training
- Work From Home
- Remote Assessments
- PCI at a glance
► Building Cybersecurity Immunity to Ransomware with PAM
James Maude, Lead Cyber Security Researcher, BeyondTrust
- 6 things to know about ransomware
- Realistic security practices you can implement to protect against ransomware
- The role of PAM (privileged access management) in mitigating the risks of ransomware and other cyber threats with a powerful, blended defense
► The Battle of Algorithms: How AI is beating AI at its own game
Max Heinemyer, Director of Threat Hunting, Darktrace
- How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons
- What an AI-powered spoofing threat may look like, and why humans will not be able to spot them
- Why defensive AI technologies are uniquely positioned to fight back
► Risk-Adaptive Data Security for Today’s Hybrid Workforce
Ozgur Danisman, Vice-President of Sales Engineering, EMEA, Forcepoint
- What to prioritise between WHO accesses your business systems and WHAT is stored inside?
- Adapting existing infrastructures for evolving workplace models
- The healthy balance between being compliant and having necessary threat protection technology in place
► How to Increase Incident Response Efficiency With Security Intelligence
Jason Steer, Director of EMEA Presales, Recorded Future
- Learn why incident response teams are overwhelmed with too many events to analyse every day
- Working on the front lines of cyber defence require security intelligence to help cut through the noise and respond quickly to 'real' threats
- Understand why intelligence needs to embedded into your tools and workflows to save time
What does the Special Forces and Cybersecurity have in common?
Amr El-Hatter, Regional Sales Manager, EMEA, FireMon
A special forces team is a well-oiled machine. Their extensive training ensures that when faced with risk, they know exactly what to do and when. They are programmed to identify and assess every single risk and ensure that their response complies with their superior’s clearly defined orders and commands. So what is the secret to their success? Join us as we explore why automation is fundamental to the success of every single organisation globally, including yours.
This session will cover;
- The challenges facing Middle Eastern organisations right now from new regulations through to skill gap shortages
- How Automation is used by enterprises and Special Forces alike to overcome risk and compliance challenges
- A special Forces mindset – why your security approach should mirror their thinking
- Real life examples of how Automation transformed a number of businesses
Encryption strategies to protect customer and enterprise data against insider and outsider attacks
Hamid Qureshi, Territory Sales Manager, Middle East and Africa, Entrust
Cyber-attacks targeting organizations continue to increase in both volume and sophistication. Security-conscious enterprises need to prepare for threats that emanate from external cybercriminals as well as employee errors and malicious insiders. While detection, threat intelligence and other techniques have come into vogue in recent years, encryption continues to play a foundational role in protecting sensitive customer data and enterprise assets.
Join this session to learn:
- The role that encryption plays in defending sensitive data
- The strategies for implementing strong encryption with a HSM as a root of trust
- Real-world case studies to address challenges
Threat Detection and Response
Amjad Khader - Regional Sales Manager, Saudi Arabia & Mostafa Soliman, Senior Consultant, System Engineering - iMETA, LogRhythm
Detecting malware, network intrusion, social engineering, and anomalous user behavior are just a few of today’s threat challenges. In this session, discover how LogRhythm uses hybrid analytics to detect threats by identifying and monitoring actors and their actions.
The LogRhythm team will provide an overview of hybrid analytics, including:
- How machine learning (ML) and rule-based detection work hand-in-hand to detect known and unknown threats
- How hybrid analytics use threat intelligence and identity data to help speed incident response
- How integrations with endpoint detection and response (EDR) and firewalls expand visibility
In addition, you'll learn how network detection and response (NDR) integrates with your security information and event management (SIEM).
It’s time to confront your VPN
Kurt Glazemakers, CTO, AppGate
Legacy business VPN remote access solutions weren’t designed to handle the security challenges of today’s distributed workforce and escalating threat landscapes. Zero Trust Network Access (ZTNA) is the new industry standard for secure access to anything, from anywhere, by anyone. Join this session to find out how you can easily migrate your business from VPN to ZTNA:
- Best practises for moving from VPN to ZTNA
- Explore a variety of use cases that can be addressed by ZTNA
- How replacing VPN can strengthen security and reduce your attack surface
Secure access to the data and infrastructure: Active Directory security and management
Mark Richmond, Senior Solutions Engineer EMEA, Stealthbits
While most organizations focus on analyzing and controlling access to the data and resources Active Directory is facilitating access to, they often lack visibility into the security of AD itself and the myriad of tactics, techniques, and procedures attackers have developed to compromise this beating heart of any organization’s IT infrastructure.
Active Directory is secure and efficient when it’s clean, understood, configured properly, monitored closely, and controlled tightly.
In our session you can learn, how to:
- Inventory all objects, policies, & configurations to obtain a complete view of your AD footprint.
- Analyze relationships between objects, permissions, access rights, and toxic conditions to prioritize risks and remediation efforts
- Clean up stale and unneeded objects to limit risk and unnecessary exposure while alleviating administrative burden
- Monitor changes to critical objects signifying attacker attempts to compromise credentials and circumvent security controls in order to achieve persistence.
- Protect critical objects from unauthorized change or access, remediate vulnerabilities, prevent credential abuse & privilege escalation.
Edge of tomorrow: is Cyber Resilience a fairytale?
Hatem Ali, Global Services and Intelligence Lead, MEA, FireEye
Criminality has been part of human experience since the dawn of existence, and it gets transformed as we evolve as a species. Technology today is a foundation for civilization development, but is also an opportunity for cyber criminals.
- In this session we shall review the state of cyber security
- Outline how criminals are using our growing dependency on digital infrastructure against us
- Try to envision what tomorrow could look like when it comes to advancing a cyber defense mission
Big Game Hunting in the Middle East
Maurits Lucas, Director of Intelligence Solutions, Intel471
In a little over a year, the number of breaches has more than tripled. And the Middle East is no exception, far from it actually! "Big game hunting" ransomware attacks are a threat which is top of mind for many CISOs who are determined to protect their organisation from falling victim to this threat. The question is how?
In this session we will look at the broad range of products and services in the underground that have sprung up to facilitate and scale up this type of attack. Because the deployment of ransomware is actually the last step in a multi-stage process.
To effectively protect the organisation against attack, it is key to understand these steps and services so you can stop an incident from becoming a full blown crisis.
What attendees will learn
- How stolen credentials and vulnerabilities play a key role in ransomware attacks
- The role of access brokers and affiliates
- The surprising role of Iranian actors in selling access to company networks
- Why the underground is hiring business analysts to help with attacks
- Measures you can take that make a difference
Zero-Trust and SASE: a natural partnership
Tom McVey, Solution Architect, Menlo Security
A SASE approach shifts security to the cloud – closer to apps, users and data – but it will not fulfil its promise without a fundamental change to an organisation’s detect-and-remediate controls. In order to outsmart threats and liberate users, cybersecurity teams are seeking to fundamentally change the way they protect the enterprise from malicious threats on the Internet.
- SASE – modernising detection and response
- New visibility at speed and scale
- Isolation – eliminating phishing and ransomware while driving productivity
- How to combine Zero-Trust and SASE to transform end-user protection
Leveraging IAM for Effective and Efficient Threat Mitigation
Lonnie Benavides, Head of Infrastructure and Application Security, OneLogin.
There’s no question that the current cybersecurity landscape is constantly shifting and evolving as new threats and security solutions emerge. Increased cyber attacks and distributed workforces have created new challenges that require innovative solutions.
Faced with the challenge of managing identities and securing access to data and applications from a growing number of endpoints, what are the fundamental controls organizations need to maintain business continuity and secure their remote and hybrid workforce?
Hear from Lonnie Benavides – Head of Infrastructure and Application Security, Onelogin – for a discussion on practical information and advice regarding the utilization of identity and access management solutions to effectively mitigate modern cyber threats to your business.
- Understanding the key fundamentals of a strong cloud security posture
- Why passwords alone are not enough
- Best practices for building a cybersecurity strategy at scale
The Dynamic Shift in the Digital World - Focus on IT Security
Mr A Karthik, Chief Technical Evangelist, ManageEngine
In today’s world, the security threat is at an all-time high. Unregulated endpoints is a serious concern faced by IT admins and organizations all over the world. To evade any security breach, your organization must deploy modern-day solutions to your IT infrastructure.
To optimize your IT security, it is essential to automate your day-to-day IT activities and utilize the latest digital transformation trends such as ML, AI, IAM, etc., for improved security management. At ManageEngine’s webinar, we’ll explore topics to ensure better endpoint and network security with new digital transformations for seamless business continuity.
The seminar will highlight the following:
- Introduction to the shift in digitalization.
- Infographics related to IT Security and other Technology trends
- How do you overcome the security threats to stay higher up in the ladder?
Is something missing from your email security architecture?
Kamel Tamimi, Director of Engineering, META/APAC, Cofense
Tune in to gain insight into the latest best-practice security architecture, the inadequacy of traditional solutions, the costs of inadequacy in a modern cyber stack, and what to do about it.
The (so called) secure email gateways that businesses depend upon to filter out malicious email are simply failing, as polymorphic attacks and social engineering increase. These traditional solutions are proving - on a daily basis - inadequate to prevent breaches.
New security layers are needed - and thankfully, Cofense is able to provide the answer.
- An Adaptive Security Architecture, and why you need one
- The true costs of an incomplete cyber stack
- Why prevention is not enough
- Real life attacks - a walk through some real attacks
- How to do effective phishing detection and response