-
MAIN Stage ( Za'abeel Hall 3)15 mins
- GISEC Main Stage
Cybersecurity and cloud computing veteran who introduces a fresh approach to entrenched attitudes on cybersecurity and threat prevention
-
MAIN Stage ( Za'abeel Hall 3)15 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)15 mins
- GISEC Main Stage
Showcasing The Dubai Cyber Security Strategy and Dubai Cyber Index: Enhancing Electronic Infrastructure and Fortifying Dubai’s Lead in Digital Technology
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
This session will cover incident response and threat intelligence findings, highlight the importance of scale to ensuring efficient cyber security response, and share best practices to deal with incid ...
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
Trending ransomware and malware threats in the META region New extortion methods, the rise of Emotet, and Arabic malware Real-life cyber threat examples from the wild and key mitigation steps for the ...
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
Many companies struggle to get their corporate cybersecurity framework off the ground. Many failed. Some failed because of a lack of support coming from the top, while others failed mainly because of ...
-
MAIN Stage ( Za'abeel Hall 3)40 mins
- GISEC Main Stage
Safeguarding the critical national infrastructure - getting and staying ahead Boosting cyber resilience and capacity at a National level Cybersecurity as an enabler for economic growth Collaborating t ...
-
MAIN Stage ( Za'abeel Hall 3)5 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)5 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)30 mins
- GISEC Main Stage
What are the CISO’s main priorities in the pandemic recovery? How can an end user organisation better improve their relationship with third party partners and suppliers and vice versa? What should the ...
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
The era of the “castle and moat” approach to secure digital assets is over. Digital Transformation has ensured that the data center is not the center of the universe for end user organizations. Since ...
-
MAIN Stage ( Za'abeel Hall 3)60 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)10 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
Creating a digital security framework to protect cultural and Expo sites ahead of the 2020 World Expo. Understanding the importance of reputational and IP security for national security
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)60 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
Developing a joint strategy to converge information feeds from both digital and physical assets to provide a holistic customs security environment. Protecting the UAE from every day and asymmetric threats to customs security.
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
In this session, we'll review why a Zero Trust is needed and being largely adopted. We'll define what Zero Trust means and what it's not, and we'll list the 3 Zero Trust principles. Then we'll review ...
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
Many organizations see the move to Cloud as something that creates risk and may make them less secure We believe that moving to Cloud can help organizations improve their security and risk posture, an ...
-
MAIN Stage ( Za'abeel Hall 3)15 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)30 mins
- GISEC Main Stage
What could be the largest ever hack on Twitter, crypto scammers were able to succeed, how? The hackers were able to post tweets using the accounts of major figures including Barack Obama and Joe Biden to promote a fake Bitcoin (BTC) giveaway which has so far swindled over 300 users out of $118,000. How can enterprises improve their approach?
-
MAIN Stage ( Za'abeel Hall 3)25 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)5 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)5 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
What threat intelligence is traditionally thought of as — and what it really is How security intelligence tailored to your teams, workflows, and existing security investments empowers organisations to ...
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
Ransomware and e-Crime activities are ramping up at record speeds, and continue to wreak havoc in thousands of organizations every week. The latest trends in e-Crime and threat actor activity How Rans ...
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)25 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention. Attend this session to learn more about a blueprint of the dark web and the correspondin ...
-
MAIN Stage ( Za'abeel Hall 3)30 mins
- GISEC Main Stage
Most of IOCs shared are trivially changed by attackers, meaning they provide no value to defenders TTPs are not easily actionable However, in the last years Threat Intel allowed developing a series of ...
-
MAIN Stage ( Za'abeel Hall 3)70 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
Cyber-crime is booming as threat actors seek to exploit the increased online dependency and mass migration to remote working triggered by the global health pandemic. Malicious registrations, including ...
-
MAIN Stage ( Za'abeel Hall 3)25 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)35 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)10 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
Security awareness measures, especially phishing simulations, are bad, cause fear among the workforce and undermine trust in management, we often hear today. Is this true?
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
How internet-scale Threat Intelligence Platforms power massive communities of leading cybersecurity solutions and how your organisation can benefit
-
MAIN Stage ( Za'abeel Hall 3)30 mins
- GISEC Main Stage
They have seemingly magical powers that most people can’t comprehend. Where there’s superheroes, there are also supervillains, and in the world we live in, there’s a war of escalation going on. Unprec ...
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
Developing your organization’s risk management strategy to harness effective cyber insurance. Understanding the pitfalls and levels of maturity in the cyber insurance market.
-
MAIN Stage ( Za'abeel Hall 3)30 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)5 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)5 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
Uncovering how Oil and Gas organizations can leverage digital convergence trends to create more value along their transformation journey. Developing the Oil and Gas digital transformation through trustworthiness between the IT and OT worlds
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
How are energy organisations being targeted by PupyRAT malware, and what can you do to detect and track the threat?
-
MAIN Stage ( Za'abeel Hall 3)30 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
Aligning OT security objectives to larger enterprise objectives of digital transformation Challenges to OT security and the best counter measures Improving visibility, control and compliance across yo ...
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
-
MAIN Stage ( Za'abeel Hall 3)20 mins
- GISEC Main Stage
Understanding the inherent challenges integrating IT and OT. Why the shipping and logistics industry must adapt to provide holistic cyber security and integrate its security strategy
-
MAIN Stage ( Za'abeel Hall 3)45 mins
- GISEC Main Stage
What existing security systems will be made redundant with the advent of AI? How can we harness AI to combat AI cyber threats? Do we have to be headed towards a technology singularity where we have no ...
-
MAIN Stage ( Za'abeel Hall 3)30 mins
- GISEC Main Stage