25 - 27 February, 2019
Park Rotana Abu Dhabi, United Arab Emirates

Conference Day One: Monday, 25 February 2019

8:00 am - 8:35 am Registration and Networking

8:35 am - 8:50 am Speed networking

8:50 am - 8:55 am IQPC Welcome Remarks

8:55 am - 9:00 am Visionary Opening address Chairman`s remarks

ADOPTING CLOUD COMPUTING TO YOUR CYBER SECURITY STRATEGY TO PREVENT DATA BREACHES AND DECREASE RISKS
Cloud adoption has reached an all-time high. 81% of organisations now use cloud apps – up from 59% in 2016

9:00 am - 9:20 am INTERNATIONAL TRAILBLAZER - OPENING KEYNOTE: HOW TO CREATE AN EFFECTIVE CLOUD BASED STRATEGY TO FIGHT CYBERATTACKS?

Michele Hanson - CISO, Gatwick Airport, UK
  • Retain and grow your existing customer base by implementing cloud provider security services
  • Cloud encryption as a service to protect cloud files
  • In-cloud malware analysis detections and technique
img

Michele Hanson

CISO
Gatwick Airport, UK

9:20 am - 9:40 am REGIONAL VISIONARY: IS YOUR DATA IN CLOUD PROTECTED AND FORENSICALLY ENABLED?

Dr. Saad Alqahtany - Digital Forensics Investigator, Government Entity, Saudi Arabia
  • Cloud deployment models – private, public and community; and cloud service models – SaaS, PaaS and IaaS
  • How is cloud impacting digital transformation?
  • Cloud forensics - Challenges and solutions
  • Future research in the field of the digital investigation
img

Dr. Saad Alqahtany

Digital Forensics Investigator
Government Entity, Saudi Arabia

9:40 am - 10:20 am THE CISO AND CIO PANEL: DEVELOPING INFORMATION ASSURANCE STANDARDS TO PROTECT UAE`S CRITICAL DATA INFORMATION INFRASTRUCTURE AND IMPROVE NATIONAL CYBER SECURITY

Mohamed Sabah - Group CIO, Dubai Holding UAE
Abdul Jaleel - Chief Specialist, IT Audit, Government Entity, UAE
Ala Ibrahim Asali - CISO Arab National Bank, Saudi Arabia
  • What is the new audit and compliance process?
  • How can data protection and authentication solutions can help with compliance?
  • Data centres as part of the compliance
img

Mohamed Sabah

Group CIO
Dubai Holding UAE

img

Abdul Jaleel

Chief Specialist, IT Audit
Government Entity, UAE

img

Ala Ibrahim Asali

CISO Arab National Bank
Saudi Arabia

INCREASE OF CYBER ATTACKS ON CRITICAL INFRASTRUCTURE
Infrastructure is the new cyber frontline. Cyber-attacks on utilities and other critical infrastructure are not just on the increase, but have transitioned from speculative to indisputable

10:20 am - 10:40 am REGIONAL TRAILBLAZER (RESERVED FOR HOST SPONSOR): PROTECTING CRITICAL INFRASTRUCTURE AGAINST ICT THREAT

  • Massive consequences and impact on citizens and businesses
  • Power and water shut down including a loss of millions of dollars; Interruption of operations, infrastructure damage and customer data theft
  • Addressing the high danger of the cyber attack on nuclear power plants by nation-state threat actors to weaponise their own critical infrastructure against them
  • Middle East cyber resilience successful strategy – The delivery of training, services and solutions across organisations

10:40 am - 11:10 am COFFEE BREAK Swap business-cards and break the ice with your fellow participants to start making those valuable connections

MALWARE AND RANSOMWARE AWARENESS - PROTECTION FROM CONTINUOUS ATTACKS
Various malwares like “Slingshot” , “Shamoon 2” and “Powershell” has been uncovered in the MENA region which attack and infect victims through compromised routers and can run in kernel mode, giving it complete control over victim devices.

  • Leveraging cognitive algorithms to learn & predict new malware behaviours
  • The need for implementation of anti-malware software to protect your data and organisation from future threats
img

Biju Hameed Kayal

Head – Cyber Security & Resilience
Dubai Airports, UAE

img

Michele Hanson

CISO
Gatwick Airport, UK

img

Hani Bani Amer

Senior Manager – Network and Security Operations
Al Hilal Bank, UAE

11:40 am - 12:00 pm HOW TO PREPARE YOURSELF BEFORE A RANSOMWARE OCCURS AND CAUSES THE RISK OF DATA BREACHES AND FINANCIAL LOSSES

Alaa Nasrallah - VP – Head of IT Audit, Arab Bank, Jordan
  • Creating a new innovative security plan against ransomware threats
  • Building data backups to prevent from security and data losses
img

Alaa Nasrallah

VP – Head of IT Audit
Arab Bank, Jordan

CYBERCRIME, DIGITAL ECONOMY AND INVESTMENT IN CYBER PROTECTION
Cybercrime constitutes a threat not only in terms of financial losses, but also on the wider impact on a growing digital economy

12:00 pm - 12:20 pm REGIONAL TRAILBLAZER: CYBERCRIME LEGISLATION IN THE GCC COUNTRIES: FIT FOR PURPOSE?

  • From a legal perspective – The need of having cybercrime laws to which everyone adheres is vital for a safe, trustworthy and secure internet able to drive economic prosperity
  • Most GCC cybercrime frameworks are still an incomplete step – What needs to be done more?
  • The need of GCC to explore feasible and practical options for regional and international anti-cybercrime cooperation - Promoting expertise in the judiciary, and enhancing regional and international cooperation arrangements
  • Cybercrime and its causes – From financial to loss of intellectual property and confidential business information
img

Sultan Altukhaim

Director of Information Security
Capital Market Authority, Saudi Arabia

img

Almuthna Aloqla

Director of Cyber Resilience for ICT Sector
Ministry of Communications and Information Technology, Saudi Arabia

img

Dr. Saad Alqahtany

Digital Forensics Investigator
Government Entity, Saudi Arabia

1:00 pm - 1:20 pm MORPHING CYBER THREATS AND SECURITY ARCHITECTURE - A MECHANISM TO SUPPRESS THE FIRE FIGHTING

Mahmoud Yassin - Head of IT Infrastructure & Security Operation, United Arab Bank, UAE
  • Cyber threat landscape
  • Why last two years is different in cyber attacks
  • Your house structure - Is it ready;
  • Security principles to build the right detect and deter mechanism
img

Mahmoud Yassin

Head of IT Infrastructure & Security Operation
United Arab Bank, UAE

INTERACTIVE DISCUSSION GROUPS

During this part of the conference delegates will be sorted into groups to take part in Interactive Discussions Groups (IDGs) around the below topics.
Upon registering, you must choose your top 3 IDG topics and everyone will rotate between their choices in back-to-back 15 minute intervals.

IoT, Big Data, AI, Blockchain – Are they the future in Safety & Security? Game changers in the cyber world?

Group 6

IDG A

1:20 pm - 2:00 pm Cyber risk in an Internet of Things world
Abdul Jaleel - Chief Specialist, IT Audit, Government Entity, UAE
img

Abdul Jaleel

Chief Specialist, IT Audit
Government Entity, UAE

IDG B

1:20 pm - 2:00 pm Challenges to Cyber Security & How Big Data Analytics Can Help

IDG C

1:20 pm - 2:00 pm AI for cybersecurity is a hot new thing—and a dangerous gamble
Dan Heywood - Technical Director, Virgin Mobile, UAE
Vishal Bhawnani - Manager – Cyber Security Risk Management, Du, UAE
img

Dan Heywood

Technical Director
Virgin Mobile, UAE

img

Vishal Bhawnani

Manager – Cyber Security Risk Management
Du, UAE

IDG D

1:20 pm - 2:00 pm Cybersecurity perspective to Blockchain – a decentralized and reliable way of securing and sharing data

IDG E

1:20 pm - 2:00 pm IoT, AI, and Blockchain will revolutionize business

2:00 pm - 2:10 pm Wrap Up & Closing Remarks

2:10 pm - 2:10 pm LUNCH BREAK & NETWORKING Swap business-cards and break the ice with your fellow participants to start making those valuable connections End of Conference Day One

The published programme is correct at time of printing. However, given the seniority of our speakers and the nature of their roles, speakers may subsequently substitute or remove themselves from the programme. This is always regrettable, and we will always try to replace the speaker with a speaker with equivalent insight.