Energy & Utilities

   

Energy & Utilities

As the energy and utilities industries are digitalising their assets globally, they have become exposed to cyber threats more than ever before. The Middle East region has always been a strategic target of cyber-attacks and 50% of these attacks are on the energy industry. How threat intel can help you protect your critical infrastructure IT and OT network from threats?  

Loading
11:00
  1. Al Ain F, Above Hall 4
    26 mins
    • Energy & Utilities

    For the longest time, the cyber space has been the playing field of private individuals or criminal organisations and in recent years, there has been a surge in state-sponsored cyber attacks dealing with disinformation, IP theft, attacks against corporations…

    Beyond improving network security, how do governments and businesses identify Nation State threat Actors, and how do they defend against them?

11:30
  1. Al Ain F, Above Hall 4
    15 mins
    • Energy & Utilities

    OT is the new cyber battleground with critical infrastructure targets, high value impact and low maturity providing a fertile breeding ground for cyber attackers. Digital14 cyber experts share its extensive domain knowledge and energy-specific standards that can establish the UAE as an OT Center of Excellence.

12:45
  1. Al Ain F, Above Hall 4
    45 mins
    • Energy & Utilities
14:20
  1. Al Ain F, Above Hall 4
    20 mins
    • Energy & Utilities

    As emerging technologies are revolutionizing protection dynamics for both IT and OT in critical infrastructure, the ability to protect against malware, provide detection, and mitigation in environments where automated information exchanges are happening is paramount. What mechanisms can be utilized to protect the integrity and improve the overall security of IIoT.

14:40
  1. Al Ain F, Above Hall 4
    20 mins
    • Energy & Utilities

    Let us find out how UEBA identify anomalous activity and pattern deviations through Machine Learning. Find answers to the question What is normal? to trigger automated risk response. UEBA arguably provides some of the most effective approach to manage and monitor user and entity centric risks in environments where third parties and remote access are increasingly common.

15:00
  1. Al Ain F, Above Hall 4
    20 mins
    • Energy & Utilities
15:40
  1. Al Ain F, Above Hall 4
    5 mins
    • Energy & Utilities

Supporters & Partners

OFFICIALLY SUPPORTED BY

UAE Cyber Security Council

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

Dubai Electronic Security Center Logo

dp

OFFICIAL DISTRIBUTION PARTNER

ISPIRE

OFFICIALLY SUPPORTED BY

Telecommunications Regulatory Authority

Official Smart City Partner

Strategic Sponsors & Partners

Strategic Partner

huawei

Strategic Partner

  • Recorded Future

Platinum sponsors

digital14

Microsoft

PCYSYS

Hiperdist

Diamond sponsors

threat quotient

Attivo Networks - GISEC

XM Cyber - GISEC

Secret Briefing Partner

Rafael - GISEC

XM Cyber - GISEC

Silver sponsors

armis

bluvector

checkmarx-gisec

Darktrace-gisec

SpearTip

Recruitment Partner

cander-gisec

Training Partner

sans institute

Industry & Association Partner

Germany Association Partner

TeleTrusT

Supporting Association

CSFI

Supporting Association

ISC2

Supporting Association

OIC

Supporting Association

Russoft

Supporting Association

CSI Mumbai

India Pavilion Partner

Logo

Association Partner

techUJLogo

Knowledge Partner

Frost Logo

Association Partner

CyberWales

Exhibitors

 

Media Partners