Conference Day One: Tuesday, 27 March 2018

8:00 AM - 8:50 AM Registration, refreshments and networking

Mohammad Khaled

Mohammad Khaled

IT Compliance and Digital Transformation Specialist
Regulation and Supervision Bureau
Maj. Hamad Khalifa Al Nuaimi

Maj. Hamad Khalifa Al Nuaimi

Head of Telecommunications
Abu Dhabi Police GHQ

9:10 AM - 9:30 AM Keynote session:Securing technologies to move towards a Futuristic Utility

Matar Suhail Salem AlMehairi, Chief Innovation Officer, DEWA

Matar Suhail Salem AlMehairi

Matar Suhail Salem AlMehairi

Chief Innovation Officer

9:30 AM - 9:50 AM The need for overall collaboration to ensure maximum protection and resilience

Alya Al Marzooqi, Department Manager - Information Security, Borouge
  • Enhancing resilience and protection by a nation wide collaboration
  • Understanding the benefits of collaboration and a joint partnership to identify vulnerabilities, threats and attempts
  • Using information from each other to combat advancing cyber and critical information security threats

Alya Al Marzooqi

Department Manager - Information Security

9:50 AM - 10:10 AM The Importance of Red Team and Purple Team in The IT Infrastructure of Energy Enterprises

Nawwaf S. Alabdulhadi , Senior IT Security Specialist, Saudi Aramco

Nawwaf S. Alabdulhadi

Nawwaf S. Alabdulhadi

Senior IT Security Specialist
Saudi Aramco

10:10 AM - 10:40 AM Aligning compliance and information security ecosystem with future acceleration initiatives

Mohammad Khaled, IT Compliance and Digital Transformation Specialist, Regulation and Supervision Bureau
  • Formulating security requirements to ensure compliance with laws and regulations
  • Defining stakeholders and their roles to ensure proper alignment
  • Discussing the role of information security with future trends and initiatives

Mohammad Khaled

Mohammad Khaled

IT Compliance and Digital Transformation Specialist
Regulation and Supervision Bureau

10:40 AM - 11:00 AM Avoiding Internet of Things (IoT) to convert into internet of vulnerabilities

  • Embracing digital eruption whilst ensuring secure systems
  • Formulating digital strategies with security as its backbone
  • Overcoming integration challenges using advanced threat intelligence systems

Sponsored by: Hewlett Packard Enterprise

11:00 AM - 11:30 AM Networking and refreshments break

  • Understanding the importance of personnel training to avoid internal errors and breaches
  • Investing in human capital and routine training to ensure updated workforce
  • Transforming not only the infrastructure but also the mindset and the culture

Ayad Daijy

Ayad Daijy

Adviser and Chief Information Officer
Ministry of Environment, Water and Agriculture, Saudi Arabia

12:00 PM - 12:20 PM Securing the Future of Industrial Control System Operations; Use Cases and Recommendations

Sponsored by: Nozomi Networks

12:20 PM - 12:50 PM Building a resilient threat intelligence programme

Abdirashid Samater, Cyber Security Advisor, Ministry of Justice, Saudi Arabia
  • Understanding the concept of threat intelligence and how it can lead to security
  • Involving relevant stakeholders and departments to ensure an effective programme
  • Ensuring maximum utilisation of threat intelligence to expand knowledge on the floor

Abdirashid Samater

Abdirashid Samater

Cyber Security Advisor
Ministry of Justice, Saudi Arabia

12:50 PM - 1:10 PM Prayer and coffee break

1:10 PM - 2:00 PM Open floor debate: A 360o view on the future of cyber security

When it comes to cyber security across industries, there is a gap between research, industrial implementation and the solutions and technologies that are available. There needs to be collaboration or a joint effort in ensuring that research done by institutes and the technologies currently available are making systems and industries safer and more protected. The perspective for security and the purpose of securing systems also vary amongst different stakeholders.

This session will gather representatives from research institutes, practitioners and industry implementers along with one solution provider to debate the future of cyber space and cyber security.

The research institute will showcase their key research findings and areas, and how it can solve industrial challenges
Reserved for Centre of Cyber Security, New York University, Abu Dhabi

The solution provider will showcase their current and upcoming technology which can solve security challenges and can detect, protect and secure systems.

The industrial practitioner will address current industrial challenges and the ideal technology or solution that could ensure maximum protection and resilience of their systems

2:00 PM - 2:10 PM Closing remarks by chair

2:10 PM - 3:10 PM Networking lunch

2:15 PM - 2:15 PM End of conference day one

The published programme is correct at time of printing. However, given the seniority of our speakers and the nature of their roles, speakers may subsequently substitute or remove themselves from the programme. This is always regrettable, and we will always try to replace the speaker with a speaker with equivalent insight.