HOSTED BY

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

OFFICIALLY SUPPORTED BY

3 GUINNESS WORLD RECORDS

11:00 – 13:00
GISEC Academy 1 [Workshops]   Cybersecurity Leadership Demystified Synopsis : Explore the future of security in 2024 and beyond, from setting up robust programs to navigating risk management and cyber strategy. Gain insights into leadership, incident response, and protecting critical assets while forging strong collaborations with IT. Uncover real-world case studies and UAE legal insights for a comprehensive understanding.

Key Learnings :

• Stay current on emerging cybersecurity threats beyond 2024.
• Establish a robust security program from scratch.
• Master risk assessment, mitigation, and prioritization strategies.
• Cybersecurity Integration: Integrate cyber initiatives with business objectives for enhanced success.
• Human-Centric Security: Implement effective leadership, team-building, and communication practices for security teams.
Speakers

Dr. Erdal Ozkaya A leading Cybersecurity Professional Australian Charles Stuart University Australia

13:00 – 13:30
GISEC Academy 1 [Workshops]   Networking Get ready to recharge your innovative spirit and power up those connections! It's not just a break, it's your chance to spark collaborations, exchange moonshot ideas, and fuel the future of cybersecurity
13:30 – 14:45
GISEC Academy 1 [Workshops]   Cyber Breach Response Synopsis - Workshop is designed to equip organisations with the essential knowledge and skills to effectively, respond to cyber security incidents. In an age where cyber threats are, prevalent, being prepared for a breach is a necessity.

Key Learning :

* Comprehensive Learning : Open to all organisational roles, from CEO to IT support staff. Everyone in your team needs to comprehend the breach response plan.
* Clear Responsibilities : Regardless of your role, this workshop empowers you to understand your responsibilities and actions during a breach.
* Cultural Shift : Contribute to changing the organisational culture, prioritizing cybersecurity, and preparedness.
* Early Decision-Making: Senior leadership will recognise the significance of making crucial decisions early, even before a breach occurs.
* Efficient Management: Managers will work more effectively as a cohesive unit, ensuring a consistent and repeatable response to cyber breaches.
Speakers

Phil Cracknell CISO for a UK Defence company & Former Cabinet Office Cyber Security Subject Matter Expert. UK Defence company United Kingdom

14:00 – 14:00
GISEC Academy 1 [Workshops]   Close
14:45 – 15:15
GISEC Academy 1 [Workshops]   Networking Step into the networking break - where handshakes meet high-fives and where every conversation ignites a potential partnership.
10:30 – 11:45
GISEC Academy 1 [Workshops]   Hands-On Physical Security Essentials Synopsis: Organizations spend millions of dollars to keep their assets safe with physical access controls, but these are not without flaw. This course is designed to help you assess, strategize, and navigate your way through the complex world of physical access controls from small to large enterprise organizations.

Many organizations rely on a group of people, apart from Infosec, to make decisions about how to restrict access to facilities, assets, and critical operations. Unfortunately, the process for evaluating technology that is implemented at the door is often very different than how Infosec selects vendors, and the criteria for doing so it far less regulated. Electronic physical access technology is highly proprietary, and as a result, the technology functions quite differently than what Infosec professionals are used to, leaving many questions or blind spots in the security coverage.

Key Learning:

This course is all about understanding physical security from a holistic view and methods to defeat many popular access controls. In your journey to the controlled area, you need to access and defeat various hardware locks, access card readers, security sensors, and often the access cards—all of which we will cover and perform hands-on exercises. We will also discuss and demonstrate how blended technical and social engineering attacks can be utilized in defeating access controls. Laptops are not required for this course. Attendees will rotate through various ""stations"" with pre-configured equipment and tools to gain hands-on experience and sharpen their skills.
Speakers

Valerie Thomas Independent Cybersecurity Consultant US

11:45 – 12:15
GISEC Academy 1 [Workshops]   Networking
12:15 – 13:30
GISEC Academy 1 [Workshops]   Exploring Consumer IoT: Basic Hardware Hacking Techniques for Real-World Devices Synopsis:
Embark on an immersive journey into the realm of Consumer IoT in ""Exploring Consumer IoT: Basic Hardware Hacking Techniques for Real-World Devices."" This session offers a hands-on exploration of fundamental hardware hacking techniques applied to everyday IoT devices. Participants will gain practical insights into identifying vulnerabilities and enhancing security measures, empowering them to navigate the complexities of IoT ecosystems with confidence. Join us to unlock the secrets of hardware hacking and fortify your understanding of consumer IoT security.

Key Learning:
• Understanding Consumer IoT Devices: Gain insight into the architecture and functionality of consumer IoT devices, laying the foundation for effective hardware hacking techniques.
• Basic Hardware Hacking Techniques: Learn fundamental methods for identifying and exploiting vulnerabilities in real-world IoT devices, enhancing your ability to assess device security.
• Practical Application: Acquire hands-on experience through interactive demonstrations and exercises, reinforcing theoretical knowledge with real-world application.
• Security Enhancement: Discover strategies for enhancing security measures on consumer IoT devices, enabling you to mitigate common risks and threats effectively.
• Empowerment: Gain confidence in navigating the complexities of IoT ecosystems and fortifying device security, empowering you to make informed decisions and take proactive steps to protect your digital assets.
Speakers

Bryce Case Jr Hacker, Rapper, Entrepreneur US

13:30 – 14:00
GISEC Academy 1 [Workshops]   Networking
14:00 – 15:15
GISEC Academy 1 [Workshops]   AI In Cybersecurity Synopsis:
GenAI in Cybersecurity delves into the transformative role of generative artificial intelligence (GenAI) in revolutionizing cybersecurity practices. In today's rapidly evolving digital landscape, where cyber threats continue to proliferate in sophistication and scale, traditional cybersecurity measures are often inadequate in detecting and mitigating emerging risks and exploring how GenAI, leveraging advanced machine learning techniques such as generative adversarial networks (GANs) and deep learning algorithms, offers a paradigm shift in bolstering cyber defenses.

Key Learning:
1. Introduction to Ai and History of AI
2. Understanding what is GenAI and what makes it different from Typical AI
3. Learning Different Technologies that Lead to the growth of GenAI and its Valuable capabilities in Cybersecurity field
4. Understanding the Benefits of GenAI in Cybersecurity
5. Gaining knowledge about different threats posed by GenAI in Cybersecurity
6. Highlighting Real Life use cases and scenarios of GenAI in cybersecurity
7. Learning Key ethical considerations and responsible practices when using AI.
Speakers

Aiman Jadiba Head of GenAI in Cybsersecurity EMT Meta UAE

15:15 – 15:15
GISEC Academy 1 [Workshops]   Close
11:00 – 12:15
GISEC Academy 1 [Workshops]   Advanced Cybersecurity Trends and Strategies for 2024 Synopsis: This workshop aims to explore the latest cybersecurity trends, focusing on AI-enhanced security measures, emerging threats, and strategic defense mechanisms. Participants will gain insights into advanced cybersecurity protocols and the role of artificial intelligence in fortifying digital defenses.

Key Learnings:

*Comprehensive understanding of AI's impact on cybersecurity
* Ability to identify and mitigate emerging cyber threats
* Skills to implement AI-enhanced security measures
Speakers

Ahmed Al Zarouni First Vice President Investment Corporation of Dubai (ICD)

12:15 – 12:45
GISEC Academy 1 [Workshops]   Networking
12:45 – 13:30
GISEC Academy 1 [Workshops]   Decoding different Shades of Phishing Attacks Synopsis: With an estimated 3.4 billion spam emails generated daily, phishing is the most prevalent type of cybercrime. The most frequent reason for data breaches is the use of stolen credentials. Internet users in the Millennial and Gen-Z generations are especially susceptible to phishing scams. Phishing is a form of cybercrime in which attackers send unsolicited emails with links to malicious websites or malware in an attempt to trick recipients into downloading it or visiting fake websites. The main method used by phishing attacks to target victims is email. Globally, there have been 16.5 compromised emails for every 100 internet users on average during the past three years. Cybercriminals can buy these compromised databases from dark web black markets and utilize the addresses for spearheading phishing attacks. What precisely constitutes a phishing attack will be illustrated through live demonstrations from the attacker's point of view, including automated bots, use of open relay servers, takeovers of Instagram, YouTube, and Gmail accounts, and other publicly available open source software. Our live demos will provide learners with the expertise to recognize and foil these digital deceptions by showcasing real-world examples.

Key Learning:

Participants will gain heightened awareness and practical skills to recognize and combat diverse phishing attacks. The session offers a comprehensive understanding of the evolving phishing landscape, incorporating real-world scenarios and live demonstrations to illustrate the methods employed by cybercriminals.
Speakers

Sankarraj Subramanian Cybersecurity Expert India

13:30 – 14:00
GISEC Academy 1 [Workshops]   Networking Recharge those batteries and those conversation starters! This networking break isn't just about refueling your body, it's about sparking connections that could change your path
14:00 – 15:15
GISEC Academy 1 [Workshops]   Streamlining the Integration of Data Privacy Synopsis: UAE companies dealing with EU partners or handling EU citizens' data should adhere to Data Privacy regulations such as GDPR. This will ensure smooth international relations and business transactions. In this workshop, the presenter will focus on synergies, addressing compliance challenges, and leveraging various standards to enhance data privacy in the energy sector. The presenters will be open to questions about data privacy and GDPR implementation.

Key Learnings:

* Cultural Shift- Contribute to changing the organisational culture,prioritizing cybersecurity and preparedness.
* Early Decision-Making Senior leadership will recognise the significance of making crucial decisions early, even before a breach occurs.
* Efficient Management Managers will work more effectively as a cohesive unit, ensuring a consistent and repeatable response to cyber breaches.
* Improved Collaboration - Building better collaboration between senior leaders is a key outcome
Speakers

Susanne Bitter Independent Cybersecurity Consultant UK

15:15 – 15:15
GISEC Academy 1 [Workshops]   Close