\"

Conference Day One: Monday, 11 September 2017

8:00 AM - 8:50 AM Registration, refreshments and networking


img

Muhammad Sajith

Head of ICT, Infrastructure & Operations
Emirates Global Aluminum, UAE

9:00 AM - 9:30 AM OPENING KEYNOTE SPEECH: Establishing realistic security controls and detection processes within your organisation to improve cyber resilience

Lt. Col. Dr. Engr. Ibrahim Humaid Almayahi, Deputy Director of eAuditing and Information Security Department, Ministry of Interior, UAE
  • Understanding your organisations capabilities to implement the best security and detection unit for the company
  • Defining the role of all stakeholders within the organisations to ensure standardisation across all levels
  • Outlining the best cyber resilience plan for your organisation

img

Lt. Col. Dr. Engr. Ibrahim Humaid Almayahi

Deputy Director of eAuditing and Information Security Department
Ministry of Interior, UAE

9:30 AM - 10:00 AM Strategising cyber defense in the era of digital storm

Adeel Ashraf, Director of ICT, Abunayyan Holding, Saudi Arabia
  • Digital storm and disruptive technologies – Opportunities versus threats
  • Strategising the cyber defense - Make cyber security everyone’s business
  • Drive awareness and engagements at all levels including internal, external as well as cross-border stakeholders
  • Improve cooperation and communicate between GCC nations against the threats in the region
  • Prevent, protect, detect, monitor and respond to cyber threats – Countering the digital storm

img

Adeel Ashraf

Director of ICT
Abunayyan Holding, Saudi Arabia
  • Efficiently cooperating and communicating between GCC nations to stay well-informed of the targets and threats existing in the region
  • Awareness driven by top management to focus on all aspects of security to avoid blind spots in early detection
  • Developing the right processes to manage all security platforms that will create an effective response system

img

Donald Codling

DHS ICS CERT and US-CERT, Past Chairman Strategic Alliance Cyber Crime Working Group, Excel Services Corporation SMECritical Infrastructure Protection and INL Programs, US
U.S. Department of States Anti-Terrorism Assistance and INL Programs, US

10:30 AM - 11:00 AM Networking break and refreshments

11:00 AM - 11:30 AM Bridging the gap between OT and IT security to mitigate operational risks

  • Early detection of threats to operational systems to enhance preparedness
  • Deploying a set of controls to mitigate cyber attacks
  • Building a real-time incident response plan to eradicate malicious files, software and other harmful threats

11:30 AM - 12:00 PM Practical experience in managing information security risk

Ahmad Mohawish, Division Head of IS Risk Management, Saudi Aramco, Saudi Arabia
  • Managing information security risks for a global energy enterprise
  • Aligning risk management efforts within the business model to ensure that a risk-aware culture is adopted
  • Enabling risk-based decision making through risk identification, development of a risk register and effective risk management

img

Ahmad Mohawish

Division Head of IS Risk Management
Saudi Aramco, Saudi Arabia

12:00 PM - 12:30 PM Implement a harmonised OT/IT strategy that will allow for security and data to be managed centrally

Muhammad Sajith, Head of ICT, Infrastructure & Operations, Emirates Global Aluminum, UAE
  • Demonstrating the strategic, organisational and technological benefits of implementation in a step-by-step manner
  • Employing a change management system that can navigate both ends of the OT/IT convergence
  • Establishing a unified system that will reduce costs and risks while enhancing performance and gains in flexibility

img

Muhammad Sajith

Head of ICT, Infrastructure & Operations
Emirates Global Aluminum, UAE

12:30 PM - 1:30 PM Networking lunch

1:30 PM - 2:00 PM Adopting data diodes to ensure safe one-way transfer between networks of different security levels

  • Efficient transfer of information without risks of interference
  • Firewalls vs. data diode: Establish the best system for your organisation
  • Create a physically impermeable system to transfer information from one domain to another

2:00 PM - 2:30 PM Advanced security technology: Adopting the right innovative solutions for your organisation

Furqan Hashmi, Head of IT Security and Operations, Emirates Investment Authority, UAE
  • Locating the strength and weaknesses of each system to understand where to deploy specific technology
  • Managing information security vendors and involving them in business continuity and IT disaster recovery plans to mitigate risks
  • Threat hunting and intelligence at network and endpoint level

img

Furqan Hashmi

Head of IT Security and Operations
Emirates Investment Authority, UAE

2:30 PM - 3:00 PM CASE STUDY: The critical infrastructure cyber security management

Adam El Adama, CISO, Al Hosn Gas, UAE
  • Constructing secure infrastructure that is less susceptible to external threats
  • Incorporating proactive cyber security processes with the company’s business objectives
  • Conducting assessments to test the efficiency of all internal systems to comply with the agreed cyber security framework

img

Adam El Adama

CISO
Al Hosn Gas, UAE

3:00 PM - 4:00 PM Interactive roundtable sessions

The following session will feature a series of interactive group discussions set in a roundtable format each for 15 minutes. There will be a maximum of 4-6 group leaders who will introduce a concept/case study to the participants followed by an interactive discussion and live feedback.
Why participate?
Interactive group discussions are an excellent opportunity to get straight to the point and ask the questions that you want to know the answers to. The group format also facilitates an excellent opportunity for networking between industry professionals.

ROUNDTABLE A

3:00 PM - 4:00 PM Preventing cyber attacks on SCADA systems by deploying data diodes


ROUNDTABLE B

3:00 PM - 4:00 PM Detecting cyber risks by locating the best mechanisms for operating in a decentralised and digitalised energy system

Muhammad Sajith, Head of ICT, Infrastructure & Operations, Emirates Global Aluminum, UAE

img

Muhammad Sajith

Head of ICT, Infrastructure & Operations
Emirates Global Aluminum, UAE

img

Donald Codling

DHS ICS CERT and US-CERT, Past Chairman Strategic Alliance Cyber Crime Working Group, Excel Services Corporation SMECritical Infrastructure Protection and INL Programs, US
U.S. Department of States Anti-Terrorism Assistance and INL Programs, US

ROUNDTABLE D

3:00 PM - 4:00 PM Improving cyber resilience by creating efficient real-time incident response plans

4:00 PM - 4:10 PM Closing remarks by Chairman

4:10 PM - 4:10 PM End of conference day one

The published programme is correct at time of printing. However, given the seniority of our speakers and the nature of their roles, speakers may subsequently substitute or remove themselves from the programme. This is always regrettable, and we will always try to replace the speaker with a speaker with equivalent insight. For the most up-to-date programme, please visit the event website.