HOSTED BY

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

OFFICIALLY SUPPORTED BY

3 GUINNESS WORLD RECORDS

10:50 – 16:30
Critical Infrastructure  
11:10 – 11:20
Critical Infrastructure   Moderator Opening Remarks
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

11:20 – 11:40
Critical Infrastructure   Special Address: What is Your Incident Response Plan? As per a industry report cyberattacks targeting critical infrastructure around the world jumped from 20% to 40% in 2022. How are organizations assessing business continuity plans when reacting to these attacks? What are the initiatives to combat malicious activity for both physical & virtual assets? 
Speakers

Karen Evans MD, Cyber Readiness Institute, USA

11:40 – 11:55
Critical Infrastructure   Hello, Mantis just sent you 26 million request per second  Have you met Mantis? This powerful botnet was able to generate the 26M HTTPS requests per second attack using only 5,000 bots. Who is this botnet attacking? How to protect against Mantis and other DDoS attacks, find your answers here.
Speakers

Bader Shaath Senior Solutions Engineer, Enterprise, Cloudflare, UAE

11:55 – 12:10
Critical Infrastructure   Security Validation at the Heart of Exposure Management Surprisingly, the majority of breach-reasons today are NOT vulnerability-related, but rather caused by misconfiguration, application interfaces, supply chain or credential related security gaps. Exposure Management is here to allow a strategy and process for addressing the reduction of risk over the entire attack surface. This presentation will highlight a simple, pragmatic approach to implementing an Exposure Management strategy with minimal incremental investment while focusing on automation and validation.
Speakers

Oren Kaplan Senior Director MEA, Pentera, Israel

12:10 – 12:50
Critical Infrastructure   Panel: Critical Infrastructure Apocalypse Now? Blurring threat attack landscape with digitization increases vulnerability. Imagine millions of homes and businesses are plunged into darkness, communications are cut, banks go offline, hospitals close and air traffic is grounded. With more than 41 billion IoT devices across enterprise and consumer environments expected by 2025, what are the risks of IT/OT convergence? What should our response to those risks be?
Moderator

Ali Khan Risk Advisory – Cyber Partner, Deloitte, UAE

Speakers

Nicholas Charnley Chief information Security Officer, TAQA Group, UAE

Christos Syngelakis Group CISO & DPO, Group Motor Oil, Greece

Lieutenant Colonel Francel Margareth Taborlupa Battalion Commander, 7th Signal Bn, Army Signal Regiment, Philippine Army

Prof. Dr. Rob de Wijk Founder, The Hague Centre for Strategic Studies, Netherlands

12:50 – 13:10
Critical Infrastructure   The evolution of the information security – hunting for fake domains
Speakers

Tural Mammadov Director of CERT.gov.az, Special Communication and Information Security State Service, Azerbaijan

13:10 – 13:25
Critical Infrastructure   A Strategic Approach to Protecting National Digital Assets and Critical Infrastructure  The continued success of digitization initiatives in Middle Eastern countries brings an additional and growing risk of cyberattacks. These attacks can derail the progress of digitization and jeopardize its benefits Every national government in the region strives to create a secure digital environment, but too often, these efforts are fragmented, tactical, and reactive. As a result, government responses often need to catch up to the ever-evolving threat landscape, and defenses put in place are circumvented or exploited.  Middle Eastern governments are the only actors with the power, reach, and resources to develop and advance a genuinely national cybersecurity agenda that ensures alignment of efforts and promotes collaboration and continuous improvement. It is imperative that Middle Eastern governments define a national cybersecurity program, assign high-level responsibility, and launch the program. Therefore, a strategic approach to cybersecurity is needed to build preventive and reactive cybersecurity capabilities that provide the foundation for national cybersecurity and its critical infrastructures.
Speakers

Pranav Bhopatkar Director Cybersecurity EEMEA, Honeywell – Connected Enterprise, UAE

13:25 – 13:45
Critical Infrastructure   Australian Enormous Cyberattacks, Government 2030 Response
Speakers

Khaled Abdulsalam Managing Partner - Cyber Security, iTEAM SYSTEMS, Australia

13:45 – 14:30
Critical Infrastructure   Break
14:30 – 14:45
Critical Infrastructure   How HCO and observability can assist a critical organization or critical infrastructure
Speakers

Moaz Deyab Solutions Engineer, Solarwinds, UAE

14:45 – 15:05
Critical Infrastructure   Protecting critical infrastructure from terrorist cyber-attacks
Speakers

Akvile Giniotiene Head of Cyber and New Technologies, UN Counter-Terrorism Centre (UNCCT), UN Office of Counter-Terrorism (UNOCT), USA

15:05 – 15:25
Critical Infrastructure   Evolving Landscape of Ransomware and Next steps
Speakers

Karanveer Padghane Chief Architect, Enterprise Business Group, Huawei Middle East & Central Asia

15:25 – 15:45
Critical Infrastructure   Live Hack: Hacking into a SCADA system simulation The presentation on hacking into SCADA systems is an exploration of the techniques and tactics used by attackers to breach industrial control systems (ICS). The presentation covers the history of SCADA systems and how they are used to control critical infrastructure, as well as the vulnerabilities and attack vectors that make them susceptible to compromise. The presentation also provides an overview of the tools and techniques used by attackers to exploit SCADA systems, including network scanning, SQL injection, and social engineering. Real-world examples of successful attacks on SCADA systems are discussed, along with the potential consequences of such attacks, including physical damage, environmental hazards, and loss of life. The presentation concludes with a discussion of best practices for securing SCADA systems, including network segmentation, user access controls, and regular security assessments. The goal of the presentation is to raise awareness of the vulnerabilities in SCADA systems and to provide guidance on how to protect these critical infrastructure systems from attack.
Speakers

Shahmeer Amir Founder, Younite, Authiun, Veiliux, Pakistan

15:45 – 16:00
Critical Infrastructure   Fireside Chat: Enhancing Aviation Safety with Cloud Computing and AI As aviation safety regulations become more stringent, the industry must find innovative ways to improve. The use of cloud computing and AI provide efficient solutions to increase safety, lower costs, and continue to innovate in the aviation industry.
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

Speakers

Patrick Moshe Perelsztejn Infrastructures Security & Cyber Manager, EL AL Israel Airlines Ltd, Israel

16:00 – 16:45
Critical Infrastructure   Panel: Cloud Vulnerability & Crucial Security Strategies Rapid adoption of remote working has accelerated the need for cloud-based services, creating security and privacy-related considerations for enterprises. Following industry reports, it is estimated that by 2025, over 85% of organizations will adopt a cloud-first approach. As such, CISOs must ensure cloud security is properly implemented to ensure operational continuity during their cloud migration. This panel will discuss the security and privacy frameworks for managing hybrid cloud infrastructure, explain the potential risks associated with cloud-based systems, and analyze the security measures and protocols that may exist in place to protect these systems. 
Moderator

Jaspal Singh Sawhney Chief Information Security Officer, TATA Communications, India

Speakers

Shahab Siddiqui Global Head of Cyber Security, Petrofac, UAE

Dr. Raed Al-Shaikh EXPEC Information Security Manager, Saudi Aramco, Saudi Arabia

Syed Ubaid Ali Jafri Head of Cyber Defense and Offensive Security Information Security, Habib Bank Limited, Pakistan

Sanil Anand Nadkarni CISO, Cummins

Prasanna Kumar Burri Group Chief Information Officer, Dangote Group [Nigeria]

16:45 – 16:45
Critical Infrastructure   End of Day 1
10:50 – 16:15
Critical Infrastructure  
11:00 – 11:10
Critical Infrastructure   Moderator Opening Remarks
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

11:10 – 11:25
Critical Infrastructure   Special Address: Digitalization of Interconnected Complex and Fragile critical National Information Infrastructure
Speakers

Dato’ Ts. Dr Amirudin Abdul Wahab CEO, Cybersecurity Malaysia

11:25 – 11:40
Critical Infrastructure   Keynote: Towards a Critical Cybersecurity Culture Embedding sustainable cyber-awareness across the organisation.
Speakers

Prof. Dr. Rob de Wijk Founder, The Hague Centre for Strategic Studies, Netherlands

11:40 – 12:10
Critical Infrastructure   Ensuring Cybersecurity Maturity Across the Connected Grid Moving beyond a compliance-based approach towards an integrated outcome-focused model to increase capability, maturity and resilience. Establishing trusted and effective information sharing mechanisms to help drive end-to-end grid security and become more responsive to active threats.
Speakers

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric, UAE

Christos Syngelakis Group CISO & DPO, Group Motor Oil, Greece

Ali Abdulla Hassan Chief of Information Technology, Ministry of Oil and Environment, Bahrain

Suhail Khalid ISR Auditor, DESC, UAE

Dr. Ebrahim Al Alkeem Al Zaabi Assistant Information and Cyber Security Operations Director, ENEC, UAE

Dr. Ernesto Damiani Director, Khalifa University Center for Cyber Physical Systems (C2PS), Khalifa University, UAE

12:10 – 12:30
Critical Infrastructure   Examining the depths of Industrial IoT (IIoT) for CI protection This session will elaborate on the risks and threats caused by using IIoT devices and Ecosystems that might allow process manipulation and harm the data integrity. This Fireside Chat discussion will highlight the needed measures to ensure operation safety and business continuity. 
Moderator

Daniel Ehrenreich Consultant and Lecturer – Cyber Security, Secure Communications and Control Experts, Israel

Speakers

Jaspal Singh Sawhney Global Chief Information Security Officer, TATA Communications, India

12:30 – 12:45
Critical Infrastructure   Invincible Critical Infrastructure: Best Practices for Safeguarding Revenue-Generating Operations
Speakers

Eric Vedel Director,  CISOs Advisory EMEA, Cisco Secure, France

12:45 – 13:00
Critical Infrastructure   Why XDR is the way forward to protect critical infrastructure
Speakers

Hani Nofal VP of Digital Infrastructure Solutions, GBM

Jennifer Lavender Director & Integration Executive Randori, IBM, USA.

13:00 – 13:20
Critical Infrastructure   CYBER AWARENESS SESSION BY MOI UAE •Blue team roadmap
•Incidents response 
•Social engineering 
•how cyber security is important in life
•Different between SOC and CERT
Speakers

Eng. Mariam Eissa Alhammadi Senior Information Security Specialist - MOI, Blue team leader, CERT member, Ministry of Interior, UAE

13:20 – 13:30
Critical Infrastructure   BREAK
13:30 – 14:00
Critical Infrastructure   FIRESIDE CHAT: THE ESSENTIAL ROLE OF PPP''S IN SECURING CRITICAL INFRASTRUCTURE Public-private partnerships are the foundation for effective critical infrastructure security and resilience strategies.
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

Speakers

Karen Evans MD, Cyber Readiness Institute, USA

Christopher Painter President,The Global Forum on Cyber Expertise, USA

14:00 – 14:15
Critical Infrastructure   Deeper Data, Better Protection: How A Middle Eastern Energy Company Harnessed the Potential of OT Asset Data A middle eastern natural gas production company did not have an asset management system in place for their complex OT/ICS and IT infrastructure. By implementing a comprehensive asset management solution, they were able to use hybrid asset data collection methods to quickly discover configurations and vulnerabilities in their large OT environment. This presentation will explain why implementing an OT asset management solution helped this organization achieve comprehensive asset management, configuration change management, detailed and automated compliance reporting and actionable intelligence for threat detection.
Speakers

Greg Valentine SVP, Solutions Engineering, Industrial Defender, USA

14:15 – 14:45
Critical Infrastructure   Panel: Focus - Telecom Cybersecurity To protect the telecom industry from cyber threats, companies must invest in robust and comprehensive security solutions like firewalls, spam filters, encryption, and security protocols. Cybersecurity policies and procedures must be developed and implemented as well, to ensure that best practices are followed and all threats are detected, isolated, and mitigated. There must also be ongoing training and awareness programs to ensure that staff are educated and kept up to date on the latest security trends.
Moderator

Dr. Paul de Souza President & Founder, Cyber Security Forum Initiative (CSFI), USA

Speakers

Celia Mantshiyane Chief Information Security Officer, MTN (Mobile Telephone Network), South Africa

Roja Kiran Basukala Deputy Director, Telecommunications Authority & Vice President, Centre for Cyber Security Research and Innovation, Nepal

Walaa SalahEldeen Group Cyber Security Director, Telecom Egypt, Egypt

14:45 – 15:05
Critical Infrastructure   Rethinking Critical Infrastructure Protection through Blockchain By taking advantage of the transparent nature of blockchain, organizations can better safeguard their CI from cyber-attacks. It offers a secure and verifiable data storage layer and provides secure authentication of users, devices, and applications within the infrastructure. Blockchain can be used to facilitate the secure transfer of data between different sites and networks. However, the implementation of this technology comes with its own challenges. Complexity, scalability, cost, regulations and more. 
Speakers

Dr Deepak Kumar Sr. Cyber Intelligence & Digital Forensics Expert, India

15:05 – 15:35
Critical Infrastructure   Panel: Focus - Aviation Security Digital or connected airplanes as well as the airport of things, brings new vulnerabilities to the table. Big Data and Predictive Analytics plays an important role as with aircraft sensors and processors this will add security to the aviation data throughout all the aviation ecosystem, from connectivity,  operations to predictive maintenance.
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

Speakers

Thomas Heuckeroth SVP IT Infrastructure & CyberSecurity, Group CISO, The Emirates Group, UAE

Mohammad Sarhan General Manager - Cybersecurity, General Authority of Civil Aviation, Saudi Arabia

Yuosof Radi Director of Cyber Security, SAL Saudi Logistics Services, Saudi Arabia

15:35 – 15:55
Critical Infrastructure   Ensuring Robustness of AI-ML systems
Speakers

Dr. Ernesto Damiani Director, Khalifa University Center for Cyber Physical Systems (C2PS), Khalifa University, UAE

15:55 – 16:15
Critical Infrastructure   Focus - Maritime Cybersecurity • What pressing challenges do maritime policymakers, industry stakeholders, naval forces and practitioners face in the cyber era?
• How do we effectively secure critical national information infrastructure in today’s maritime domain? 
•What can policymakers, industry and practitioners in national security do about it?
Speakers

Dr. Osei Bonsu Dickson Chief Legal Advisor, Ministry of National Security,Ghana

16:15 – 17:00
Critical Infrastructure   Workshop: City preparedness to terrorist cyber-attacks
Speakers

Akvile Giniotiene Head of Cyber and New Technologies, UN Counter-Terrorism Centre (UNCCT), UN Office of Counter-Terrorism (UNOCT), USA

17:00 – 17:00
Critical Infrastructure   End of Day 2
10:30 – 15:30
Critical Infrastructure  
10:30 – 10:40
Critical Infrastructure   Moderator Opening Remarks
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

10:40 – 11:10
Critical Infrastructure   Fireside Chat: Risks Associated with Emerging Technologies from the Global Law Enforcement Perspective
Moderator

Karen Evans MD, Cyber Readiness Institute, USA

Speakers

Dr Madan Oberoi Executive Director for Technology and Innovation, Interpol, Singapore

11:10 – 11:25
Critical Infrastructure   National Cyber Ecosystem This presentation will shed light on how building a National Cyber Ecosystem offers broader defence capabilities relative to solely depending on Cybersecurity technologies.
Speakers

Fadi Mutlak Risk Advisory – Cyber Partner, Deloitte, UAE

11:25 – 12:00
Critical Infrastructure   Panel: Look into Your OT Environments The challenge across critical infrastructure is, you can’t defend your environments if you don’t know what’s in them, and you can’t proactively detect a threat unless you’re actively looking for it. This session will provide an in-depth overview of the current cyber security threats facing OT environments, identify attack vectors, outline the steps needed to create a resilient OT environment and discuss the importance of including people and processes in any OT security strategy. 
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

Speakers

Dr. Srijith Nair Chief Information Security Officer, Careem, UAE

Ekrem Zoroglu Group Manager, Mercedes-Benz Tech Turkiye, Turkey

Javed Habib Global Head of ICS Cybersecurity – Thermal & Supply Global Business Unit, Engie, UAE

Safal Shrestha, Deputy Director, National Information Technology Center, Ministry of Communication and Information Technology, Nepal

12:00 – 12:15
Critical Infrastructure   Biggest Cyber Threats to Space Systems If the space vehicle''s ability to communicate is subverted, what are the tactics used to attackTelemetry, Tracking & Command (TT&C) systems? Disabling the asset to support its mission, what happens next?
Speakers

Panagiotis Kikiras Head of Unit Technology and Innovation, European Defence Agency, Belgium

12:15 – 12:35
Critical Infrastructure   Exploring the Satellite Vulnerability to Cyberattacks What does this mean for the satellites on orbit used every day for weather predictions, communications, or GPS?
Speakers

Adham Etoom Director of Policy and Compliance, National Cybersecurity Center, Jordan

12:35 – 12:55
Critical Infrastructure   Secured Integration of ICS-OT with IIoT in CI facilities
Speakers

Daniel Ehrenreich Consultant and Lecturer – Cyber Security, Secure Communications and Control Experts, Israel

12:55 – 14:00
Critical Infrastructure   Workshop: Effective ICS/OT Tabletop Exercise Design and Facilitation
Speakers

Michael Hoffman SANS Instructor, Technical Lead Consultant, Dragos, USA

14:00 – 14:20
Critical Infrastructure   Risk Management and Cybersecurity Measures for Space Assets
Speakers

Dr. Aquib Moin Associate Professor at UAE University & CEO at Alhazen Space, UAE

14:20 – 14:40
Critical Infrastructure   Focus - 5G Security Standards Rapid expansion of 5G coverage in 2023 will allow devices to communicate faster. Governments and regulators can be expected to step up efforts to ensure that connected devices comply with latest cybersecurity standards. 
Speakers

Unguec Stephen Kang Ilario Assistant Director for Cybersecurity, National Communication Authority (NCA), South Sudan

14:40 – 15:00
Critical Infrastructure   Cyber-attacks exploitations in nuclear power generation plants for discovering hidden vulnerabilities
Speakers

Dr. Abdullah A.I. Alnajem Licensed Nuclear Cybersecurity Professional, Saudi Arabia

15:00 – 15:20
Critical Infrastructure   Strengthening partnerships between government and private sector for CI protection
Speakers

Abdul-Hakeem Ajijola Chair, African Union Cyber Security Expert Group, Nigeria

15:20 – 15:20
Critical Infrastructure   End of Day 3
11:00 – 11:00
CRITICAL INFRASTRUCTURE   Moderator Opening Remarks CRITICAL INFRASTRUCTURE STAGE
Moderator

Rebecca McLaughlin-Eastham TV Anchor

11:00 – 11:20
CRITICAL INFRASTRUCTURE   Special Address CRITICAL INFRASTRUCTURE STAGE Greater the Power, Greater the Security

Creating a strong cyber-defence for digital assets in Critical Infrastructure facilities, what role is AI playing?
Speakers

Dr. Ebrahim Al Alkeem Digital Transformation - Cyber Security - Artificial Intelligence Director Government of Abu Dhabi UAE

11:20 – 11:30
CRITICAL INFRASTRUCTURE   Special Address CRITICAL INFRASTRUCTURE STAGE Special Address AI-powered Ransomware Attacks: Are we ready to counterattack the attack? 
Speakers

H.E. Dr. Mohamed Al-Kuwaiti Head of Cybersecurity UAE Government

11:30 – 11:45
CRITICAL INFRASTRUCTURE   A More Secure Option for the Cloud Era: The Unmatched Security of Cloud-Native Systems. CRITICAL INFRASTRUCTURE STAGE
Speakers

Eagle Wan Chief Security Expert of Enterprise Digitalization and Cloud Transformation Huawei China

11:45 – 12:25
CRITICAL INFRASTRUCTURE   OT Cybersecurity Panel CRITICAL INFRASTRUCTURE STAGE Unleashing AI and ML: Elevating Offensive and Defensive Tactics in OT Cybersecurity

The digital transformation journey within the oil and gas sector brings significant cybersecurity challenges to the fore. In our upcoming session, we delve into innovative models that merge IT and OT alongside network, endpoint, and cybersecurity management solutions. Explore strategic methodologies for effectively integrating people, processes, and technology, aiming to enhance the cybersecurity posture of organizations. Gain insights from the panel of experts from the Oil & Gas Industry as they share their views on fortifying your cybersecurity defenses in the face of evolving digital threats.
Moderator

Rebecca McLaughlin-Eastham TV Anchor

Speakers

Ahmed Al Saleh OT Cybersecurity Lead Saudi Aramco

Dr. Reem AlShammari CyberSecurity and Technology Thought Leader Energy Sector Kuwait

Christopher Anthony Director, Critical Information Infrastructure Division Cyber Security Agency Singapore

Hussain Altyabe Head of Governance and Cyber Security Bapco Upstream Bahrain

Abdulhakeem Al Alawi Head Information Security and Risk Management Oman LNG L.L.C

Sara Al Kindi Cyber Defense Head Petroleum Development Oman

Dr. Shaheela Banu Akbar Sheriff Information Security & Compliance Officer Oil & Gas Industry Kuwait

12:25 – 12:40
CRITICAL INFRASTRUCTURE   "Synergy in Security: Collaborative Strategies for Industrial Cyber Defense CRITICAL INFRASTRUCTURE STAGE Collaborative approaches to industrial cyber defense require a synergistic integration of human expertise and technological solutions that can help protect against cyber threats. People play crucial roles in decision-making, training, and incident response, while technologies like network segmentation, access control, threat detection and intelligence, and advanced analytical tools support these efforts. Adopting industry standards, fostering public-private partnerships, and leveraging advanced cybersecurity technologies enhance this synergy. The effectiveness of industrial cyber defense hinges on a balanced integration of human skills and technological solutions, ensuring a comprehensive and adaptable cybersecurity posture.
Speakers

Pranav Bhopatkar Director Cybersecurity, High Growth Regions, Honeywell UAE

12:40 – 13:00
CRITICAL INFRASTRUCTURE   TRUE STORY CRITICAL INFRASTRUCTURE STAGE Cyber Incident Response on India’s Largest Integrated Power Company
In October of 2023, Tata Power faced a cyber-attack affecting some IT systems. This further leads to the unauthorized release of sensitive information. In response to the same, we will learn about the attack and measures implemented by Tata Power and Learnings.
Speakers

Mihir Joshi Group Chief Cyber Security and Information Officer Tata Power India

13:00 – 13:15
CRITICAL INFRASTRUCTURE   Case Study Insights CRITICAL INFRASTRUCTURE STAGE Integrating OT Data into Your CISO''s Security Blueprint

In today''s interconnected world, Operational Technology (OT) plays a critical role in various industries, including manufacturing, energy, transportation, and healthcare. However, the convergence of OT with Information Technology (IT) infrastructure introduces unique cybersecurity challenges that require innovative solutions. This presentation explores strategies for effectively integrating OT information into your Chief Information Security Officer''s (CISO) security program. It begins by outlining the distinct characteristics of OT systems and their vulnerabilities, emphasizing the need for tailored security measures.
Speakers

Marty Edwards Deputy CTO, OT/IoT Tenable US

13:15 – 13:30
CRITICAL INFRASTRUCTURE   Building an Elite Cyber Defense Team Virtually Is No Easy Feat CRITICAL INFRASTRUCTURE STAGE Enhancing OT cyber incident response skills poses a challenge, necessitating a shift from traditional physical setups to virtual environments. This change addresses the rising vulnerabilities from IT and OT convergence, aiming to cut down on time and costs. Our session will explore the virtual replication of OT networks and components to boost IR teams' capabilities in defending critical infrastructure. We'll discuss developing detection, investigation, and response skills using top IT and OT security tools for virtual investigations. Join to learn strategies for preparing your team for OT cyber incidents efficiently.
Speakers

Nick Wetton Chief Revenue Officer Cyberbit

13:30 – 13:45
CRITICAL INFRASTRUCTURE   The true story of a 1# Million Dollar Hacker CRITICAL INFRASTRUCTURE STAGE
Moderator

Rebecca McLaughlin-Eastham TV Anchor

Speakers

Santiago Lopez Millionaire Hacker Argentina

13:45 – 14:00
CRITICAL INFRASTRUCTURE   Building an Exposure Management Program for Better Ransomware Readiness CRITICAL INFRASTRUCTURE STAGE Ransomware continues to be a threat to enterprises globally, however, there’s no need to accept it as fate. Through case studies, we will demonstrate the effectiveness of Security Validation in proactively testing your attack surface. Join Jay Mar-Tang, Field CISO at Pentera, as he highlights the tangible benefits of adopting a strategic Exposure Management framework for reducing ransomware risk. Walk away with a blueprint for proactively testing and validating the effectiveness of your existing security investments.
Speakers

Jason Mar-Tang AVP Field CISO Pentera USA

14:00 – 14:35
CRITICAL INFRASTRUCTURE   Energy & Utilities Cyber Leaders AI Panel CRITICAL INFRASTRUCTURE STAGE AI in Cybersecurity: So What's in Store for Energy and Utilities Companies?

Enhancing cybersecurity for energy/utilities: Tackling APTs, DDoS, IIoT, OT Security with AI, ensuring regulatory compliance, and strengthening organizational cybersecurity programs.
Moderator

Mohammed Zumla Independent Consultant Head Cyber Security and Resilience UK

Speakers

Cem Dursun CISO Enerjisa Enerji Turkey

Sara Al Kindi Cyber Defense Head Petroleum Development Oman

Babar Haq CTO-IT Huawei Middle East & Central Asia

Frank Van Caenegem VP Cybersecurity, CISO EMEA Schneider Electric France

Marty Edwards Deputy CTO, OT/IoT Tenable US

14:35 – 14:50
CRITICAL INFRASTRUCTURE   Pioneering Cybersecurity Innovations Across Key Industries CRITICAL INFRASTRUCTURE STAGE Dr. Giannis will share his insights on Talos - an elite group of security experts devoted to providing superior protection to customers with our products and services. The Talos team is focused on driving actionable intelligence through determined defenders that have the scale and capability to effect greater change in the threat landscape. To better leverage more intel, you have to have greater visibility to collect that intel. Basically, to stop more threats, you have to see more threat activity. Talos researchers, analysts, and engineers work around the clock, around the globe, in many languages to ensure our customers are always and consistently covered with up-to-the-minute intelligence-backed defensive content. Dr. Giannis will share examples and use cases from the Manufacturing, Transportation, Aviation, and Defense and Energy sectors – along with an Emergency response case study. 
Speakers

Giannis Tziakouris Senior Incident Response Architect Cisco Talos UAE

14:50 – 15:10
CRITICAL INFRASTRUCTURE   Fireside Chat CRITICAL INFRASTRUCTURE STAGE Assessing the Cybersecurity Risk in the Renewable Energy Landscape

In pursuit of fulfilling their SDGs, nations are increasingly turning to renewable energy sources. This shift has fueled growth in energy generation through wind, solar, hydro, geothermal, and other renewable means. The global market for renewable energy is projected to reach approximately US$ 2182.99 billion by 2032, expanding at a CAGR of 8.50% from 2023 to 2032. However, the burgeoning appeal of the renewable energy sector has also attracted a surge in cyber attacks, resulting in substantial financial losses for numerous organizations. Engage in a conversation with top CISOs, CTOs, and CIOs from the renewable energy industry as they share their expertise on best practices and strategies for safeguarding their organizations against such digital threats.
Moderator

Shahab Siddiqui Global Head of Cyber Security Petrofac UAE

Speakers

Khaled Al Teneiji Cyber Security Head ENOC UAE

Noura Al Sulaimani Director of Digital & Technology Services Masdar-Abu Dhabi Future Energy Company UAE

15:10 – 15:25
CRITICAL INFRASTRUCTURE   Fortifying the Future: DESC Cybersecurity Policies and Certifications CRITICAL INFRASTRUCTURE STAGE  
Speakers

Ayesha Almarzooqi Permits Section Head Dubai Electronic Security Center (DESC)

15:25 – 15:50
CRITICAL INFRASTRUCTURE   UTILITY INFOSEC LEADERS PANEL CRITICAL INFRASTRUCTURE STAGE The Growing Interconnectivity: Cyber Resilience of the Power Grid

The cyber resilience of power grids is paramount in safeguarding critical infrastructure. According to a 2022 report, there were 608 reported cyber incidents targeting the energy sector, with a 22% increase from the previous year. These incidents resulted in an estimated $23 billion in economic losses. Regarding specific threats, ransomware attacks on power utilities rose by 50%, emphasizing the urgent need for robust cybersecurity measures. The power grid's increasing interconnectivity, with an average of 13,000 devices per substation, heightens vulnerability. However, proactive measures, such as investment in Artificial Intelligence for threat detection, have shown promise in enhancing resilience. What ongoing efforts are essential to mitigate risks and fortify the cyber defenses of power grids to ensure reliable energy supply and national security?
Moderator

Ayad (Ed) Sleiman CISO Advisor King Abdullah University of Science and Technology Saudi Arabia

Speakers

Nick Charnley CISO TAQA UAE

Cem Dursun CISO Enerjisa Enerji Turkey

Mihir Joshi Group Chief Cyber Security and Information Officer Tata Power India

15:50 – 16:50
CRITICAL INFRASTRUCTURE   CRITICAL INFRASTRUCTURE CONFERENCE ROUNDTABLES CRITICAL INFRASTRUCTURE STAGE
ROUNDTABLE 1
Digital Fortification of Your Manufacturing Empire

The benefit of digital fortification are:
• Operational Efficiency: Streamlined processes and real-time insights.
• Cost Reduction: Optimization of resources and improved supply chain management.
• Competitive Advantage: Staying ahead in a rapidly evolving industry landscape.

However, with digitization, we tend to introduce security Risk as well. Through this wound table we will try to understand:
• How to Make IT-OT Convergence Smooth
• Why IT and OT convergence has been tough historically
• Common IT and OT security challenges
• How IT and OT security teams can work together to have a common security framework
Roundtable Leader: Avinash Tiwari, Chief Information Security Officer (CISO), Pidilite Industries Limited, India
Core Panel: Prabhat Pathak, IT Director – Cyber Security and Technology, Retail Sports and Manufacturing  
Core Panel: Mohammed H. AlAbbadi, Group CISO, Fertiglobe PLC, UAE  

 
ROUNDTABLE 2
Integration of IT & OT Security
The merging of Information Technology (IT) and Operational Technology (OT) security is now essential for a comprehensive cybersecurity strategy. As OT becomes more standardized, IT-based cyber-attacks are on the rise. How is the industry enhancing the efficiency of threat detection and response? 
Roundtable Leader: Ahmed Al Saleh, OT Cybersecurity Lead, Saudi Aramco
Core Panel: Dr. Shaheela Banu Akbar Sheriff, Information Security & Compliance Officer, Oil & Gas Industry,
Core Panel: KuwaitAbdulhakeem Al Alawi, Information Security Manager (CISO), Oman LNG L.L.C.
 
ROUNDTABLE 3
Supply Chain Security – The Weakest Link in CI
Dependence on external suppliers is crucial in the Critical Infrastructure (CI) sector for the provision of their services. Each supplier linked to the Critical Infrastructure represents a potential access point for cyber attackers. To counteract threats from supply chain attacks, what strategies should the industry adopt? Additionally, what specific procedures and safeguards should be implemented to ensure the security of this essential infrastructure?
Roundtable Leader: Dimitri van Zantvliet, Cybersecurity Director / CISO, Dutch Railways
Core Panel: Stuart Frost, Head of Enterprise Security & Risk Management, UK Government 
Core Panel: Ciprian Spiridon, CTO, mumzworld, UAE 
Core Panel: Anthea Kruger, General Manager - Cyber Defence, MTN 
 
ROUNDTABLE 4
PPP to address threats associated with emerging technologies
• Emerging technologies (AI, ML, quantum) and their expected threats
• The impact of these threats on the existing cybersecurity tools and capabilities
• The role of policy makers to deal with these threats, the importance engaging industry leaders.
• How can the private sector be key player in influencing security threats?
• Next steps? How to go above and beyond to create new opportunities.
Roundtable Leader: Abdulrahman Al Musfir, Regional Cybersecurity Officer, MEA, Schneider Electric, Saudi Arabia
Core Panel: Eugenia Aba Moses, Intelligence Analyst Officer, National Signals Bureau, Ghana
Speakers

Avinash Tiwari Chief Information Security Officer (CISO) Pidilite Industries Limited India

Prabhat Pathak IT Director – Cyber Security and Technology Retail Sports and Manufacturing

Ahmed Al Saleh OT Cybersecurity Lead Saudi Aramco

Dimitri van Zantvliet Cybersecurity Director / CISO Dutch Railways Netherlands

Abdulrahman Al Musfir Regional Cybersecurity Officer, MEA Schneider Electric Saudi Arabia

16:50 – 16:50
CRITICAL INFRASTRUCTURE   Closing Remarks CRITICAL INFRASTRUCTURE STAGE
Moderator

Rebecca McLaughlin-Eastham TV Anchor

11:00 – 11:00
DEFENCE   Moderator Opening Remarks GISEC MAINSTAGE
Moderator

Rebecca McLaughlin-Eastham TV Anchor

12:35 – 12:50
DEFENCE   Spotlight Session: Cybersecurity Transformation GISEC MAINSTAGE
Speakers

Mariam Alhammadi Head of CSOC Ministry of Interior United Arab Emirates

12:50 – 13:05
DEFENCE   Cyber Wars – How the Empire Strikes Back GISEC MAINSTAGE Cyber in Defence – a look at the current attacks and the future of attacks with a specific focus on the defence sector and the mitigations nations need to be looking at in order to protect forces both at home and overseas as the sophistication of cyber attacks develops. Using real world examples of old and new types of attacks and how they impact organisations we will look at what the future holds.
Speakers

Katie Diacon Cyber Partner Deloitte ME

13:05 – 13:20
DEFENCE   Neutralizing threat actors armed with future zero-day exploits GISEC MAINSTAGE Sophisticated threat actors, whether affiliated with cybercrime or state-sponsored, are opportunistic. Organisations from healthcare to retail are falling victim and this opportunistic modus operandi is absolutely impacting and exploiting security-conscious sectors such as finance and energy. Join me as we examine past zero-days, the threat actors behind them and, using intelligence and threat modelling techniques to identify patterns. Can organisations defend against the unknown and can they put in place defences against future zero-day attacks?
Speakers

Matthew Haynes Director - International Development Sekoia UK

10:30 – 10:30
CRITICAL INFRASTRUCTURE   Moderator Opening Remarks CRITICAL INFRASTRUCTURE STAGE
Moderator

Rebecca McLaughlin-Eastham TV Anchor

10:30 – 11:10
CRITICAL INFRASTRUCTURE   CISO PANEL: AI in CI CRITICAL INFRASTRUCTURE STAGE Securing Critical Infrastructure in the Age of Artificial Intelligence

Given the rising cyber threats, securing critical infrastructure in the age of artificial intelligence (AI) is imperative. The World Economic Forum reported a 67% increase in cyber-attacks on critical infrastructure. AI's integration has introduced both innovative Defence mechanisms and sophisticated attack vectors. 60% of critical infrastructure providers globally acknowledged facing AI-driven cyber threats. Governments and enterprises are investing heavily in AI-driven cybersecurity solutions, with a global spending of $42 billion in 2023. Effective collaboration between the public and private sectors is crucial to fortify Defences and mitigate the evolving risks associated with AI in critical infrastructure.
Moderator

Dimitri van Zantvliet Cybersecurity Director / CISO Dutch Railways Netherlands

Speakers

Dr. Ebrahim Al Alkeem Digital Transformation - Cyber Security - Artificial Intelligence Director Government of Abu Dhabi UAE

Abdulrahman Alnaim Upstream Information Security Manager Saudi Aramco Saudi Arabia

Khaled Al Teneiji Cyber Security Head ENOC UAE

Saqib Chaudhry Chief Information Officer Johns Hopkins Aramco Healthcare (JHAH) Saudi Arabia

Avinash Tiwari Chief Information Security Officer (CISO) Pidilite Industries Limited India

Fiona Taaffe CIO Dubai Aerospace Enterprise UAE

11:10 – 11:25
CRITICAL INFRASTRUCTURE   Spotlight Session: Cyber Node Initiative CRITICAL INFRASTRUCTURE STAGE
Speakers

Moaza Majed Project Manager DESC - Dubai Cyber Innovation Park (DCIPark)

11:25 – 11:55
CRITICAL INFRASTRUCTURE   Telco Cyber Chief's Panel Zero Trust & Gen AI innovation: Reinventing Communication Safeguards CRITICAL INFRASTRUCTURE STAGE The paradigm shift towards Zero Trust is evident, with 65% of telecom enterprises planning to implement or expand such security frameworks by 2024. Zero Trust Security is gaining prominence in telecommunications to fortify communication networks against cyber threats. Leveraging GenAI innovation revolutionizes communications, enhancing efficiency and reshaping customer experiences in the industry. Lets hear from the Global Telco Cyber Chiefs.
Moderator

Thokozani Chimbe Director of Legal Services Malawi Communications Regulatory Authority

Speakers

Eng. Belal Hafnawi Technology and Digital Transformation Leader (Commissioner) Telecommunications Regulatory Commission Jordan

Celia Mantshiyane Chief Information Security Officer MTN South Africa South Africa

Isam Omran ICT Head of Digital Platform Services du UAE

11:55 – 12:10
CRITICAL INFRASTRUCTURE   Targeting Your OT Vulnerabilities Before Attackers Do CRITICAL INFRASTRUCTURE STAGE  Amid rising cyber threats to critical infrastructure, this presentation highlights the importance of managing cyber risks in your ICS/OT environment. It covers how an oil & gas company efficiently managed vulnerabilities by improving visibility of OT assets and detecting risks such as unauthorized logins and unapproved software. Learn key strategies for securing your operations against diverse and complex challenges. Join to enhance your cybersecurity measures.
Speakers

Greg Valentine SVP Solutions Engineering Industrial Defender US

12:10 – 12:25
CRITICAL INFRASTRUCTURE   Unlocking Cyber Defense: How Top Healthcare Providers Boost Security & Drive ROI CRITICAL INFRASTRUCTURE STAGE Hear how healthcare delivery organizations are addressing the challenges they have managing their traditionally unmanaged assets (IoMT, IoT, BMS, and OT assets).
Moderator

Keith Christie-Smith Sales Director META, Claroty UAE

Speakers

Abhinav Kumar Srivastava AVP Information Security NMC UAE

12:25 – 12:45
CRITICAL INFRASTRUCTURE   TRUE STORY CRITICAL INFRASTRUCTURE STAGE Dutch National Railway: Three Cybersecurity Drivers and a 780,000 Customers Data Leak

Keeping your cybersecurity posture in check is one thing. But managing third and fourth-party risks is another. In a quintessential example of a supply chain attack, the Dutch National Railways warned approximately 780,000 travelers about a potential compromise of their personal information. This situation arose when a market research firm they employed fell victim to a cyberattack. The National Railways engaged this firm to conduct market research and distribute surveys, highlighting the interconnected risks in modern supply chains.
Speakers

Dimitri van Zantvliet Cybersecurity Director / CISO Dutch Railways Netherlands

12:45 – 13:00
CRITICAL INFRASTRUCTURE   Frontline Defense: The Cyber Revolution Protecting Critical Infrastructure CRITICAL INFRASTRUCTURE STAGE
Speakers

Muhammad Rehan Director – Product & Channel Development Spire Solutions UAE

13:00 – 13:15
CRITICAL INFRASTRUCTURE   Synergy in Security: Collaborative Strategies for Industrial Cyber Defense CRITICAL INFRASTRUCTURE STAGE As ICSS become more connected, they also become more exposed to threats. High-consequence events resulting from cyberattacks can adversely affect organizations operations continuity, efficiency and safety and even have the potential to cause devastation to communities and economy. Such high-consequence events are key factors for organizations looking to protect their industrial networks or Operational Technology (OT).
Speakers

Mohammed Shoukat Ali General Manager Yokogawa Saudi Arabia

13:15 – 13:35
CRITICAL INFRASTRUCTURE   SPOTLIGHT SAUDI ARAMCO AI USE CASE CRITICAL INFRASTRUCTURE STAGE Machine vs Machine: AI''s Role in the Digital Battlefield

This session zeroes in on the pivotal role of AI in cybersecurity for the tech industry, serving as both a complex challenge and a transformative tool. We'll delve into AI's power to automate routine tasks, unleashing human potential on more intricate problems and its ability to predict and swiftly adapt to emerging threats. This talk is more than an overview; it's an invitation to rethink how we leverage AI's capabilities to keep our digital landscapes one step ahead of cyber risks.
Speakers

Abdulrahman Alnaim Upstream Information Security Manager Saudi Aramco Saudi Arabia

13:35 – 13:55
CRITICAL INFRASTRUCTURE   TRUE STORY CRITICAL INFRASTRUCTURE STAGE A case-file analysis on the ransomware attack on the Philippine Health Insurance Corporation (PhilHealth) 

The case file seeks to present the breach report on the ransomware attack on the Philippine Government Health Insurance Corporation, it seeks to outline the point of detection and the subsequent actions taken to recover and address the situation as well as the aftermath of the incident and the policy recommendations gleaned from the experience.
Speakers

Marc Padilla Assistant Schools Division Superintendent Department of Education Philippines

13:55 – 14:15
CRITICAL INFRASTRUCTURE   SPOTLIGHT CRITICAL INFRASTRUCTURE STAGE Unleashing the Power of AI to Enhance Critical Infrastructure Security
How AI & ML can improve cybersecurity in Critical Infrastructure, Including the Energy and Finance Industries
Speakers

Dr. Eman El-Sheikh Associate VP, Center for Cybersecurity University of West Florida US

14:15 – 14:35
CRITICAL INFRASTRUCTURE   TRUE STORY CRITICAL INFRASTRUCTURE STAGE Insights: Cruise Ship Ransomware Incident

What happens when a cruise ship suffers a ransomware incident on its OT systems, causing massive disturbance of its essential systems? Human error, combined with multiple factors, can lead to the failure of the ship’s automation and navigation systems, limiting the ability to sail the ship and continue the cruise. Does the ship return to port? How do we get the ship back to an operational state? And how can we prevent this from happening again? Find out here.
Speakers

Christopher Stein Lead Engineer, Maritime Cybersecurity Royal Caribbean Group Denmark

14:35 – 15:00
CRITICAL INFRASTRUCTURE   AFRICA CYBERSECURITY LEADERS PANEL (Powered by Gitex Africa) CRITICAL INFRASTRUCTURE STAGE Securing Africa''s Digital Future

As Africa embraces digitalization, prioritizing data protection, collaboration with cybersecurity organizations, and fostering awareness can ensure a secure digital future. Promoting collaboration among businesses, governments, and cybersecurity organizations to bridge skills gap, enhance data protection, and boost awareness.
Moderator

Orhan Osmani Head a.i. Cybersecurity Division ITU Switzerland

Speakers

Dr. Osei Bonsu Dickson Technical Advisor Securities and Exchange Commission Ghana

Celia Mantshiyane Chief Information Security Officer MTN South Africa South Africa

Thokozani Chimbe Director of Legal Services Malawi Communications Regulatory Authority

15:00 – 16:00
CRITICAL INFRASTRUCTURE   CRITICAL INFRASTRUCTURE CONFERENCE ROUNDTABLES CRITICAL INFRASTRUCTURE STAGE ROUNDTABLE 5
Exploring Cyber Threats in the Aerospace and Aviation Sectors

This roundtable delves into the evolving landscape of cyber threats within the aerospace and aviation sector. It explains and examines targeted attacks, vulnerabilities, and preventive measures crucial for industry professionals to safeguard critical systems and maintain air travel security.

Roundtable Leader: Dr. Deepak Kumar (D3), Sr. Cyber Intelligence & Digital Forensics Expert, India
Roundtable Co-Lead: Andy Bien, Chief Digital Officer Global Aviation, Huawei
Roundtable Co-Lead: Faisal Ameer Malik, Chief Technical Officer, Enterprise Business Group, Huawei Middle East & Central Asia
Core Panel:
Biju Hameed, Head - Technology Infrastructure Operations, Dubai Airports, UAE
Thomas Heuckeroth, SVP IT Infrastructure & CyberSecurity, Emirates Group
Phil Cracknell, CISO for a UK Defence company & Former Cabinet Office Cyber Security Subject Matter Expert
Dr. Shri Kulkarni, Defense Security Advisor & Strategist – North America, Canada


ROUNDTABLE 6
A Primer On Artificial Intelligence And Cybersecurity

In simple terms, artificial intelligence acts as a powerful catalyst and enabler for cybersecurity in our connected ecosystem.
As discussed, we would like to keep the presentation in line with the theme for the event, which is: A BOLD NEW FUTURE WITH AI-DRIVEN CYBER RESILIENCE
Roundtable Leader:
Chuck Brooks, Globally recognized thought leader and evangelist for Cybersecurity

Core Panel:
Anthea Kruger, General Manager - Cyber Defence, MTN
Dr. Ebrahim Al Alkeem, Digital Transformation - Cyber Security - Artificial Intelligence Director, Government of Abu Dhabi, UAE
Dr. Eman El-Sheikh, Associate VP, Center for Cybersecurity, University of West Florida, US
Dimitri van Zantvliet, Cybersecurity Director / CISO, Dutch Railways, Netherlands"

ROUNDTABLE 7
Planning and implementing an effective Cyber Incident Response Plan for Healthcare

Why do healthcare organizations need to look into a Comprehensive Incident Response Plan?
When an incident occurs, what are the best strategies to mitigate its impact, find the source of the problem, and react? 
Roundtable Leader:
Saqib Chaudhry, Chief Information Officer, Johns Hopkins Aramco Healthcare (JHAH), Saudi Arabia

Core Panel:
Abhinav Kumar Srivastava, AVP Information Security, NMC, UAE

Speakers

Dr. Deepak Kumar Sr. Cyber Intelligence & Digital Forensics Expert India

Andy Bien Chief Digital Officer Global Aviation Huawei China

Faisal Ameer Malik Chief Technical Officer, Enterprise Business Group Huawei Middle East & Central Asia

Biju Hameed Head - Technology Infrastructure Operations Dubai Airports UAE

Thomas Heuckeroth SVP IT Infrastructure & CyberSecurity, Group CISO The Emirates Group UAE

Phil Cracknell CISO for a UK Defence company & Former Cabinet Office Cyber Security Subject Matter Expert. UK Defence company United Kingdom

Dr. Shri Kulkarni Defense Security Advisor & Strategist North America, Canada

Chuck Brooks Globally recognized thought leader and evangelist for Cybersecurity United States of America

Anthea Kruger General Manager Cyber Defence, MTN

Dr. Ebrahim Al Alkeem Digital Transformation - Cyber Security - Artificial Intelligence Director Government of Abu Dhabi UAE

Dr. Eman El-Sheikh Associate VP, Center for Cybersecurity University of West Florida US

Dimitri van Zantvliet Cybersecurity Director / CISO Dutch Railways Netherlands

Saqib Chaudhry Chief Information Officer Johns Hopkins Aramco Healthcare (JHAH) Saudi Arabia

Abhinav Kumar Srivastava AVP Information Security NMC UAE

16:25 – 16:25
CRITICAL INFRASTRUCTURE   Closing Remarks GISEC MAINSTAGE