Conference Day Two: Wednesday, 28 March 2018
8:00 am - 8:50 am Registration, refreshments and networking
8:50 am - 9:00 am Chair’s welcome and opening remarksDr. Mohammad Khaled, IT Compliance and Digital Transformation Specialist,Regulation and Supervision Bureau Major Dr. Hamad Khalifa Al Nuaimi, Head of Telecommunications,Abu Dhabi Police GHQ
9:00 am - 9:20 am Embracing and protecting the critical infrastructure and the digital shift to maximise efficiencyAdam El Adama, CISO,ADNOC Sour Gas
- Understanding the potential of cyber analytics to develop security intelligence for critical infrastructure
- Rethinking the cyber business model with digital strategies
- Using advanced security mechanisms to protect critical infrastructure
Adam El AdamaCISO
ADNOC Sour Gas
9:20 am - 9:40 am Managing cyber risks for a global oil giantMr. Imad Aldhfiri, Supervisor for the Risk Monitoring,Saudi Aramco
- Identifying, analysing and monitoring the information security for a global enterprise
- Understanding a unique process in managing cyber risk undertaken
- Understanding the drivers for an effective information security risk management
Mr. Imad AldhfiriSupervisor for the Risk Monitoring
9:40 am - 10:00 am Cyber Security Challenges and Opportunities: A Closer PreviewDr. Hoda Alkhzaimi, Director - Center for Cyber Security,New York University in Abu Dhabi
10:20 am - 11:00 am Networking break and refreshments
11:00 am - 11:20 am Using Industrial Internet of Things (IIoT) for securing and enhancing remote monitoring of critical assets and processesMr. Andrey Zolotavin, Senior Real-Time System Specialist,Kuwait Oil Company
- Understanding the role of IIoT in data flows, monitoring and controlling
- Reducing traffic and network bandwidth allowing simpler and faster monitoring and detection
- Enhancing data protection using advanced IIoT strategies and solutions
Mr. Andrey ZolotavinSenior Real-Time System Specialist
Kuwait Oil Company
11:20 am - 11:40 am “Think like a hacker to be a hacker”Claude Fachkha, Cyber Security Senior Consultant and Educator,University of Dubai
- Developing information security architecture to build an effective operational resilience across the enterprise
- Enhancing cyber capabilities through intelligent investigation analysis and detection
- Managing and collaborating with vendors and involving them in cyber culture and strategy
Claude FachkhaCyber Security Senior Consultant and Educator
University of Dubai
11:40 am - 12:00 pm Embracing and protecting the up and coming cloud ecosystem for enhanced data protection
- Defining cloud applications policies and compliances in the region
- Assessing the threats that the cloud is vulnerable to and its visibility
- Controlling access and data movement on the cloud for enhanced protection
12:00 pm - 12:20 pm Prayer and coffee break
12:20 pm - 12:40 pm Measuring the success of current ecosystem to ensure future safety and resilienceRahul Purohit, Information Security Expert,Etisalat
- Performing information security risk assessment and periodic information system activity reviews to measure health of the system
- Tracking performance of solutions to help reduce costs and adopt advance technologies
- Assessing employee and system KPIs for future strategies
Rahul PurohitInformation Security Expert
INTERACTIVE GROUP DISCUSSIONS
The following session will feature a series of interactive group discussions set in a roundtable format. During this session each group leader will introduce a concept/case study to the participants followed by an interactive discussion and live feedback.
Interactive group discussions are an excellent opportunity to get straight to the point and ask the questions that you want to know the answers to. The group format also facilitates an excellent opportunity for networking between industry professionals.
Roundtable One12:40 pm - 1:20 pm Reactive versus proactive, reactive and proactive
A sound strategy requires both reactive capabilities and proactive capabilities to enable the prevention and deterrence of cyber attacks. There is a need to include offensive and defensive cyber capabilities to meet ever growing cyber crimes.
Roundtable Two12:40 pm - 1:20 pm Skilled workforce and social engineering Mr. Roland Abi Najem, Independent Cyber Security Consultant,
Awareness and regular trainings of workforce to increase their skillsets is key to control attacks. With a huge shift taking place, younger generations provide a promising future in controlling cyber attacks. Share thoughts on the future of cyber recruitment and the importance of teaching and promoting cyber security young and early.
Mr. Roland Abi NajemIndependent Cyber Security Consultant
Roundtable Three12:40 pm - 1:20 pm Advanced threat intelligence platforms Ali Al Kaf, Senior Specialist - Information Security & Risk Enterprise Technology Services (ETS),Mubadala
With a fast changing environment, and digital technologies reaching new boundaries, technologies, threats and attack mechanisms are advancing rapidly, at a pace like no other. Share your insights on how threat intelligence concept can help organisations to improve risk management and incident response to attacks.
Ali Al KafSenior Specialist - Information Security & Risk Enterprise Technology Services (ETS)
Roundtable Four12:40 pm - 1:20 pm Role of information security in safe and smart cities
It is very important to formulate future smart cities plans by keeping information security as its backbone. With strategies, initiatives and targets set in the region, security remains a top priority to move into a smart and more secure city.
1:20 pm - 1:30 pm Closing remarks by chair
1:30 pm - 2:30 pm Networking lunch
2:30 pm - 2:30 pm Close of conference
The published programme is correct at time of printing. However, given the seniority of our speakers and the nature of their roles, speakers may subsequently substitute or remove themselves from the programme. This is always regrettable, and we will always try to replace the speaker with a speaker with equivalent insight.