25 - 27 February, 2019
Park Rotana Abu Dhabi, United Arab Emirates

Post- Conference Workshop: Wednesday, 27 February 2019

WORKSHOP A: CYBER WAR GAMING

8:30 am - 9:00 am Registration and Networking

9:00 am - 10:30 am WORKSHOP A: CYBER WAR GAMING

Michele Hanson - CISO, Gatwick Airport, UK
As society has become increasingly transformed through Internet-based communication and data exchange, cyber threats have increased in both sophistication and frequency. In many organisations, executives know that cyber incidents can lead to high-profile losses, rampant media exposure, and damage to client, customer, or investor confidence. Business leaders have begun to acknowledge that, despite strong security controls, cyber incidents will occur. How heavily they impact an organisation’s reputation, bottom line, and market standing depends, in part, on how well-prepared the organisation is to analyse and contain an incident as it unfolds, respond decisively, and manage the aftermath.

Attend this workshop to:
  • Establish how cyber threat war-gaming can help decrease the impact of cyber incidents
  • Learn how Use Cyber War Games to Improve Incident Response
  • Understand that response playbook is not enough

WORKSHOP LEADER:
img

Michele Hanson

CISO
Gatwick Airport, UK

WORKSHOP B: PREVENTING DATA LEAKAGE AND CYBER SECURITY LOSS TO DEVELOP A DLP STRATEGY

10:30 am - 11:00 am Coffee break

11:00 am - 12:30 pm WORKSHOP B: PREVENTING DATA LEAKAGE AND CYBER SECURITY LOSS TO DEVELOP A DLP

Cyber attacks have been growing since their inception and quite so frequently in the past two years. Even though IT systems are now centralised and have a standard benchmark in place, the need for an effective data leakage protection (DLP) is more than ever before. Assessing the potential risks and identifying potential data leakage black dots is a very important aspect in the overall cyber security program. Data leakage and cyber security loss is potentially a cyber-disaster-in-waiting as packets of data loss could potentially be packets of highly sensitive and confidential information sent across to hackers thus providing an opportunity for state-sponsored terrorism.

Attend this workshop to:
  • Design, plan and effectively implement a comprehensive DLP program
  • Learn how to develop policies to protect content, context and physical storage devices
  • Understand how to incorporate people, technologies and processes to develop a comprehensive DLP strategy

WORKSHOP C: DEVELOPING AN EFFECTIVE RISK MANAGEMENT PROGRAM FOR ENHANCED CYBER SECURITY

12:30 pm - 1:00 pm Coffee Break

1:00 pm - 2:00 pm WORKSHOP C: DEVELOPING AN EFFECTIVE RISK MANAGEMENT PROGRAM FOR ENHANCED CYBER SECURITY

Risk mitigation is one of the top priorities for energy and utility companies as the number of risks continues to grow in an evolving cyber security landscape. Developing a comprehensive plan that takes into account, the risk assessments, mitigation procedures, governance frameworks and challenges and the ability to respond to attacks is the need of the hour.

Attend this workshop to:
  • Review different risk management frameworks used globally across different industries
  • Discuss which framework suits your organisation the best and customise the framework keeping in mind IT audit limitations
  • Ensure risk management plans deliver on information security and assurance and showcase ROI to senior management post implementation

2:00 pm - 2:00 pm Lunch

The published programme is correct at time of printing. However, given the seniority of our speakers and the nature of their roles, speakers may subsequently substitute or remove themselves from the programme. This is always regrettable, and we will always try to replace the speaker with a speaker with equivalent insight.