Conference Day One: Tuesday, 27 March 2018

8:00 AM - 8:50 AM Registration, refreshments and networking

8:50 AM - 9:00 AM Chair’s welcome and opening remarks

9:00 AM - 9:20 AM The need for overall collaboration to ensure maximum protection and resilience

Alya Al Marzooqi, Department Manager - Information Security, Borouge
  • Enhancing resilience and protection by a nation wide collaboration
  • Understanding the benefits of collaboration and a joint partnership to identify vulnerabilities, threats and attempts
  • Using information from each other to combat advancing cyber and critical information security threats

Alya Al Marzooqi

Department Manager - Information Security
Borouge

9:20 AM - 9:40 AM Evaluating the monetary and organisational impact of cyber attacks in the energy and utility sector

Ihab Chafic Ali, Change Manager - ITI, DEWA
  • Addressing the growing concerns of cyber attacks and evaluating the costs
  • Understanding the monetary value of breach in systems and the potential value of loss
  • Formulating strategies to collaborate and work together in order to reach excellence in current low budget environments

img

Ihab Chafic Ali

Change Manager - ITI
DEWA

9:40 AM - 10:00 AM Aligning compliance and information security ecosystem with future acceleration initiatives

Mohammad Khaled, IT Compliance and Digital Transformation Specialist, Regulation and Supervision Bureau
  • Formulating security requirements to ensure compliance with laws and regulations
  • Defining stakeholders and their roles to ensure proper alignment
  • Discussing the role of information security with future trends and initiatives

img

Mohammad Khaled

IT Compliance and Digital Transformation Specialist
Regulation and Supervision Bureau

10:00 AM - 11:00 AM Avoiding Internet of Things (IoT) to convert into internet of vulnerabilities

  • Embracing digital eruption whilst ensuring secure systems
  • Formulating digital strategies with security as its backbone
  • Overcoming integration challenges using advanced threat intelligence systems

  • Understanding the importance of personnel training to avoid internal errors and breaches
  • Investing in human capital and routine training to ensure updated workforce
  • Transforming not only the infrastructure but also the mindset and the culture

img

Ayad Daijy

Adviser and Chief Information Officer
Ministry of Environment, Water and Agriculture, Saudi Arabia

11:20 AM - 11:40 AM Ever evolving nature of cyber threats and attacks

  • Developing and updating risk management approaches to combat the evolving nature of ransomware attacks and threats
  • Understanding advanced adversaries including zerodays, crypto-ware and malware
  • Evaluating and formulating analyses and detection programmes on current infrastructure and systems

11:40 AM - 12:00 PM Building a resilient threat intelligence programme

Abdirashid Samater, Cyber Security Advisor, Ministry of Justice, Saudi Arabia
  • Understanding the concept of threat intelligence and how it can lead to security
  • Involving relevant stakeholders and departments to ensure an effective programme
  • Ensuring maximum utilisation of threat intelligence to expand knowledge on the floor

img

Abdirashid Samater

Cyber Security Advisor
Ministry of Justice, Saudi Arabia

12:00 PM - 12:20 PM Prayer and coffee break

12:20 PM - 1:00 PM Open floor debate: A 360o view on the future of cyber security

When it comes to cyber security across industries, there is a gap between research, industrial implementation and the solutions and technologies that are available. There needs to be collaboration or a joint effort in ensuring that research done by institutes and the technologies currently available are making systems and industries safer and more protected. The perspective for security and the purpose of securing systems also vary amongst different stakeholders.

This session will gather representatives from research institutes, practitioners and industry implementers along with one solution provider to debate the future of cyber space and cyber security.

The research institute will showcase their key research findings and areas, and how it can solve industrial challenges
Reserved for Centre of Cyber Security, New York University, Abu Dhabi

The solution provider will showcase their current and upcoming technology which can solve security challenges and can detect, protect and secure systems.

The industrial practitioner will address current industrial challenges and the ideal technology or solution that could ensure maximum protection and resilience of their systems

1:00 PM - 1:15 PM Closing remarks by chair

1:15 PM - 2:15 PM Networking lunch

2:15 PM - 2:15 PM End of conference day one

The published programme is correct at time of printing. However, given the seniority of our speakers and the nature of their roles, speakers may subsequently substitute or remove themselves from the programme. This is always regrettable, and we will always try to replace the speaker with a speaker with equivalent insight.