Important Notice: We are committed to providing you with a safe environment to do business, in accordance with all the health & safety guidelines set out by the local authorities. The event will be delivered with strict standards of health & safety precautionary measures including social distancing, contactless transactions and hygiene protocols. Learn More

Energy & Utilities

   

Energy & Utilities

Loading
10:50
  1. Track Room
    10 mins
    • Energy & Utilities
11:00
  1. Track Room
    26 mins
    • Energy & Utilities

    For the longest time, the cyber space has been the playing field of private individuals or criminal organisations and in recent years, there has been a surge in state-sponsored cyber attacks dealing with disinformation, IP theft, attacks against corporations…

    Beyond improving network security, how do governments and businesses identify Nation State threat Actors, and how do they defend against them?

11:30
  1. Track Room
    15 mins
    • Energy & Utilities
12:25
  1. Track Room
    20 mins
    • Energy & Utilities

    Let us find out how UEBA identify anomalous activity and pattern deviations through Machine Learning. Find answers to the question What is normal? to trigger automated risk response. UEBA arguably provides some of the most effective approach to manage and monitor user and entity centric risks in environments where third parties and remote access are increasingly common.

12:45
  1. Track Room
    45 mins
    • Energy & Utilities
14:00
  1. Track Room
    20 mins
    • Energy & Utilities

    As emerging technologies are revolutionizing protection dynamics for both IT and OT in critical infrastructure, the ability to protect against malware, provide detection, and mitigation in environments where automated information exchanges are happening is paramount. What mechanisms can be utilized to protect the integrity and improve the overall security of IIoT.

14:20
  1. Track Room
    20 mins
    • Energy & Utilities

    Plant managers and IT technicians traditionally occupy different parts of the organization. But as connected technology brings new industrial devices online, both sides must work together to mitigate cyber threats across the expanding attack surface.

14:40
  1. Track Room
    30 mins
    • Energy & Utilities

    While educating employees to monitor for malicious or anomalous activity is important, organisations cannot solely rely on staff awareness to strengthen security. Companies must also defend against the multitude of insider threats.

15:10
  1. Track Room
    5 mins
    • Energy & Utilities

Supporters & Partners

OFFICIALLY SUPPORTED BY

UAE Cyber Security Council

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

Dubai Electronic Security Center Logo

dp

OFFICIAL DISTRIBUTION PARTNER

ISPIRE

OFFICIALLY SUPPORTED BY

Telecommunications Regulatory Authority

Official Smart City Partner

Strategic Sponsors & Partners

Strategic Partner

huawei

Strategic Partner

  • Recorded Future

Platinum sponsors

digital14


PCYSYS

Secret Briefing Partner

rafael

Diamond sponsors

threat quotient

Attivo Networks - GISEC

XM Cyber - GISEC

Silver sponsors

bluvector

checkmarx-gisec

Darktrace-gisec

Recruitment Partner

cander-gisec

Training Partner

sans institute

Industry & Association Partner

Germany Association Partner

TeleTrusT

Supporting Association

CSFI

Supporting Association

ISC2

Supporting Association

OIC

Supporting Association

Russoft

Supporting Association

CSI Mumbai

India Pavilion Partner

Logo

Association Partner

techUJLogo

Knowledge Partner

Frost Logo

Association Partner

CyberWales

Exhibitors

 

Media Partners