03 - 05 December, 2019
Park Rotana Abu Dhabi, United Arab Emirates

Conference Day One: Monday, 25 February 2019

8:00 am - 8:35 am Registration and Networking

8:35 am - 8:50 am Speed networking

8:50 am - 8:55 am IQPC Welcome Remarks

8:55 am - 9:00 am Visionary Opening address Chairman`s remarks

ADOPTING CLOUD COMPUTING TO YOUR CYBER SECURITY STRATEGY TO PREVENT DATA BREACHES AND DECREASE RISKS
Cloud adoption has reached an all-time high. 81% of organisations now use cloud apps – up from 59% in 2016

9:00 am - 9:20 am INTERNATIONAL TRAILBLAZER - OPENING KEYNOTE: HOW TO CREATE AN EFFECTIVE CLOUD BASED STRATEGY TO FIGHT CYBERATTACKS?

  • Retain and grow your existing customer base by implementing cloud provider security services
  • Cloud encryption as a service to protect cloud files
  • In-cloud malware analysis detections and technique

9:20 am - 9:40 am REGIONAL VISIONARY: IS YOUR DATA IN CLOUD PROTECTED AND FORENSICALLY ENABLED?

Dr. Saad Alqahtany - Digital Forensics Investigator, Government Entity, Saudi Arabia
  • Cloud deployment models – private, public and community; and cloud service models – SaaS, PaaS and IaaS
  • How is cloud impacting digital transformation?
  • Cloud forensics - Challenges and solutions
  • Future research in the field of the digital investigation
img

Dr. Saad Alqahtany

Digital Forensics Investigator
Government Entity, Saudi Arabia

9:40 am - 10:20 am THE CISO AND CIO PANEL: DEVELOPING INFORMATION ASSURANCE STANDARDS TO PROTECT UAE`S CRITICAL DATA INFORMATION INFRASTRUCTURE AND IMPROVE NATIONAL CYBER SECURITY

Abdul Jaleel - Chief Specialist, IT Audit, Government Entity, UAE
  • What is the new audit and compliance process?
  • How can data protection and authentication solutions can help with compliance?
  • Data centres as part of the compliance
img

Abdul Jaleel

Chief Specialist, IT Audit
Government Entity, UAE

INCREASE OF CYBER ATTACKS ON CRITICAL INFRASTRUCTURE
Infrastructure is the new cyber frontline. Cyber-attacks on utilities and other critical infrastructure are not just on the increase, but have transitioned from speculative to indisputable

10:20 am - 10:40 am REGIONAL TRAILBLAZER (RESERVED FOR HOST SPONSOR): PROTECTING CRITICAL INFRASTRUCTURE AGAINST ICT THREAT

  • Massive consequences and impact on citizens and businesses
  • Power and water shut down including a loss of millions of dollars; Interruption of operations, infrastructure damage and customer data theft
  • Addressing the high danger of the cyber attack on nuclear power plants by nation-state threat actors to weaponise their own critical infrastructure against them
  • Middle East cyber resilience successful strategy – The delivery of training, services and solutions across organisations

10:40 am - 11:10 am COFFEE BREAK Swap business-cards and break the ice with your fellow participants to start making those valuable connections

MALWARE AND RANSOMWARE AWARENESS - PROTECTION FROM CONTINUOUS ATTACKS
Various malwares like “Slingshot” , “Shamoon 2” and “Powershell” has been uncovered in the MENA region which attack and infect victims through compromised routers and can run in kernel mode, giving it complete control over victim devices.

11:10 am - 11:40 am AI-BASED, SELF-LEARNING SECURITY SYSTEMS AS A CYBER DEFENCE MECHANISM IN THE FUTURE

Hani Bani Amer - Senior Manager – Network and Security Operations, Al Hilal Bank, UAE
  • Leveraging cognitive algorithms to learn & predict new malware behaviours
  • The need for implementation of anti-malware software to protect your data and organisation from future threats
img

Hani Bani Amer

Senior Manager – Network and Security Operations
Al Hilal Bank, UAE

11:40 am - 12:00 pm HOW TO PREPARE YOURSELF BEFORE A RANSOMWARE OCCURS AND CAUSES THE RISK OF DATA BREACHES AND FINANCIAL LOSSES

  • Creating a new innovative security plan against ransomware threats
  • Building data backups to prevent from security and data losses

CYBERCRIME, DIGITAL ECONOMY AND INVESTMENT IN CYBER PROTECTION
Cybercrime constitutes a threat not only in terms of financial losses, but also on the wider impact on a growing digital economy

12:00 pm - 12:20 pm REGIONAL TRAILBLAZER: CYBERCRIME LEGISLATION IN THE GCC COUNTRIES: FIT FOR PURPOSE?

  • From a legal perspective – The need of having cybercrime laws to which everyone adheres is vital for a safe, trustworthy and secure internet able to drive economic prosperity
  • Most GCC cybercrime frameworks are still an incomplete step – What needs to be done more?

12:20 pm - 1:00 pm REGIONAL TRAILBLAZER PANEL: CYBERCRIME AS AN ESCALATING THREAT TO THE ECONOMIES OF THE GULF COOPERATION COUNCIL (GCC), AND TO THEIR PLANS FOR DIGITAL TRANSFORMATION

Sultan Altukhaim - Director of Information Security, Capital Market Authority, Saudi Arabia
Dr. Saad Alqahtany - Digital Forensics Investigator, Government Entity, Saudi Arabia
  • The need of GCC to explore feasible and practical options for regional and international anti-cybercrime cooperation - Promoting expertise in the judiciary, and enhancing regional and international cooperation arrangements
  • Cybercrime and its causes – From financial to loss of intellectual property and confidential business information
img

Sultan Altukhaim

Director of Information Security
Capital Market Authority, Saudi Arabia

img

Dr. Saad Alqahtany

Digital Forensics Investigator
Government Entity, Saudi Arabia

1:00 pm - 1:20 pm MORPHING CYBER THREATS AND SECURITY ARCHITECTURE - A MECHANISM TO SUPPRESS THE FIRE FIGHTING

Mahmoud Yassin - Head of IT Infrastructure & Security Operation, United Arab Bank, UAE
  • Cyber threat landscape
  • Why last two years is different in cyber attacks
  • Your house structure - Is it ready;
  • Security principles to build the right detect and deter mechanism
img

Mahmoud Yassin

Head of IT Infrastructure & Security Operation
United Arab Bank, UAE

INTERACTIVE DISCUSSION GROUPS

During this part of the conference delegates will be sorted into groups to take part in Interactive Discussions Groups (IDGs) around the below topics.
Upon registering, you must choose your top 3 IDG topics and everyone will rotate between their choices in back-to-back 15 minute intervals.

IoT, Big Data, AI, Blockchain – Are they the future in Safety & Security? Game changers in the cyber world?

Group 6

IDG A

1:20 pm - 2:00 pm Cyber risk in an Internet of Things world
Abdul Jaleel - Chief Specialist, IT Audit, Government Entity, UAE
img

Abdul Jaleel

Chief Specialist, IT Audit
Government Entity, UAE

IDG B

1:20 pm - 2:00 pm Challenges to Cyber Security & How Big Data Analytics Can Help

IDG C

1:20 pm - 2:00 pm AI for cybersecurity is a hot new thing—and a dangerous gamble
Dan Heywood - Technical Director, Virgin Mobile, UAE
Vishal Bhawnani - Manager – Cyber Security Risk Management, Du, UAE
img

Dan Heywood

Technical Director
Virgin Mobile, UAE

img

Vishal Bhawnani

Manager – Cyber Security Risk Management
Du, UAE

IDG D

1:20 pm - 2:00 pm Cybersecurity perspective to Blockchain – a decentralized and reliable way of securing and sharing data

IDG E

1:20 pm - 2:00 pm IoT, AI, and Blockchain will revolutionize business

2:00 pm - 2:10 pm Wrap Up & Closing Remarks

2:10 pm - 2:10 pm LUNCH BREAK & NETWORKING Swap business-cards and break the ice with your fellow participants to start making those valuable connections End of Conference Day One

The published programme is correct at time of printing. However, given the seniority of our speakers and the nature of their roles, speakers may subsequently substitute or remove themselves from the programme. This is always regrettable, and we will always try to replace the speaker with a speaker with equivalent insight.