Conference Day Two: Wednesday, 28 March 2018

8:00 AM - 8:50 AM Registration, refreshments and networking

8:50 AM - 9:00 AM Chair’s welcome and opening remarks

9:00 AM - 9:20 AM Embracing and protecting the critical infrastructure and the digital shift to maximise efficiency

Adam El Adama, CISO, ADNOC Sour Gas
  • Understanding the potential of cyber analytics to develop security intelligence for critical infrastructure
  • Rethinking the cyber business model with digital strategies
  • Using advanced security mechanisms to protect critical infrastructure


Adam El Adama

ADNOC Sour Gas

9:20 AM - 9:40 AM Managing cyber risks for a global oil giant

Ahmad Mohawish, Head - Information Security Risk Monitoring, Saudi Aramco
  • Identifying, analysing and monitoring the information security for a global enterprise
  • Understanding a unique process in managing cyber risk undertaken
  • Understanding the drivers for an effective information security risk management


Ahmad Mohawish

Head - Information Security Risk Monitoring
Saudi Aramco

9:40 AM - 10:00 AM Securing smart grids and critical infrastructure

  • Understanding the vulnerabilities in smart grids and plausible areas of concern
  • Developing efficient security practices to secure information and power supply
  • Ensuring maximum resilience and integrity of grid and data using advanced solutions and modules

Reserved for Center for Cyber Security, New York University, Abu Dhabi

10:00 AM - 10:20 AM Avoidance versus recovery: What’s next?

  • Developing comprehensive attack avoidance plans to secure the digital infrastructure
  • Formulating a real-time plan for an attack on ICS, SCADA or a data centre attack
  • Isolating the affected network before widespread and mass coverage of the attack

10:20 AM - 11:00 AM Networking break and refreshments

11:00 AM - 11:20 AM Using Industrial Internet of Things (IIoT) for securing and enhancing remote monitoring of critical assets and processes

Andrey Zolotavin, Senior Real-Time System Specialist, Kuwait Oil Company
  • Understanding the role of IIoT in data flows, monitoring and controlling
  • Reducing traffic and network bandwidth allowing simpler and faster monitoring and detection
  • Enhancing data protection using advanced IIoT strategies and solutions


Andrey Zolotavin

Senior Real-Time System Specialist
Kuwait Oil Company

11:20 AM - 11:40 AM “Think like a hacker to be a hacker”

Claude Fachkha, Cyber Security Senior Consultant and Educator, University of Dubai
  • Developing information security architecture to build an effective operational resilience across the enterprise
  • Enhancing cyber capabilities through intelligent investigation analysis and detection
  • Managing and collaborating with vendors and involving them in cyber culture and strategy


Claude Fachkha

Cyber Security Senior Consultant and Educator
University of Dubai

11:40 AM - 12:00 PM Embracing and protecting the up and coming cloud ecosystem for enhanced data protection

  • Defining cloud applications policies and compliances in the region
  • Assessing the threats that the cloud is vulnerable to and its visibility
  • Controlling access and data movement on the cloud for enhanced protection

12:00 PM - 12:20 PM Prayer and coffee break

12:20 PM - 12:40 PM Measuring the success of current ecosystem to ensure future safety and resilience

Rahul Purohit, Information Security Expert, Etisalat
  • Performing information security risk assessment and periodic information system activity reviews to measure health of the system
  • Tracking performance of solutions to help reduce costs and adopt advance technologies
  • Assessing employee and system KPIs for future strategies


Rahul Purohit

Information Security Expert

The following session will feature a series of interactive group discussions set in a roundtable format. During this session each group leader will introduce a concept/case study to the participants followed by an interactive discussion and live feedback.

Why participate?
Interactive group discussions are an excellent opportunity to get straight to the point and ask the questions that you want to know the answers to. The group format also facilitates an excellent opportunity for networking between industry professionals.

Roundtable One

12:40 PM - 1:20 PM Reactive versus proactive, reactive and proactive

A sound strategy requires both reactive capabilities and proactive capabilities to enable the prevention and deterrence of cyber attacks. There is a need to include offensive and defensive cyber capabilities to meet ever growing cyber crimes.

Roundtable Two

12:40 PM - 1:20 PM Skilled workforce and social engineering

Roland Abi Najem, Independent Cyber Security Consultant,
Awareness and regular trainings of workforce to increase their skillsets is key to control attacks. With a huge shift taking place, younger generations provide a promising future in controlling cyber attacks. Share thoughts on the future of cyber recruitment and the importance of teaching and promoting cyber security young and early.


Roland Abi Najem

Independent Cyber Security Consultant

Roundtable Three

12:40 PM - 1:20 PM Advanced threat intelligence platforms

Ali Al Kaf, Senior Specialist - Information Security & Risk Enterprise Technology Services (ETS), Mubadala
With a fast changing environment, and digital technologies reaching new boundaries, technologies, threats and attack mechanisms are advancing rapidly, at a pace like no other. Share your insights on how threat intelligence concept can help organisations to improve risk management and incident response to attacks.

Ali Al Kaf

Senior Specialist - Information Security & Risk Enterprise Technology Services (ETS)

Roundtable Four

12:40 PM - 1:20 PM Role of information security in safe and smart cities

It is very important to formulate future smart cities plans by keeping information security as its backbone. With strategies, initiatives and targets set in the region, security remains a top priority to move into a smart and more secure city.

1:20 PM - 1:30 PM Closing remarks by chair

1:30 PM - 2:30 PM Networking lunch

2:30 PM - 2:30 PM Close of conference

The published programme is correct at time of printing. However, given the seniority of our speakers and the nature of their roles, speakers may subsequently substitute or remove themselves from the programme. This is always regrettable, and we will always try to replace the speaker with a speaker with equivalent insight.