GISEC Conference Agenda

   

GISEC Conference Agenda

Loading
10:20
  1. Dark Stage (Sheikh Saeed Hall)
    10 mins
10:55
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
11:25
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
11:30
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • GISEC Main Stage

    Joint police operations: Identification of threats and impact regionally and nationally

  2. Country Spotlight Stage (Sheikh Saeed Hall)
    5 mins
    • Israel Discovery Day
  3. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
  4. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage

    Often dubbed a ‘zero trust’ approach, the strategy follows the logic that people, devices, and applications have to prove their identity before being allowed to access resources. It’s only once this identity has been confirmed that they are granted the access they desire.

    The concept of secure identity is gaining traction in other areas as well. From online shopping and interacting with governments to secure digital health records, identity is quickly becoming a key component.

    Identity-based security is particularly important in the post-COVID world. With large numbers of staff expected to work from home for an extended period, if not permanently, the concept of having a secure perimeter simply no longer makes sense.

11:50
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage
11:55
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    25 mins
    • Israel Discovery Day

    CPS attackers are seeking to inflect physical damage and jeopardize safety

    The landscape of cyberwarfare is rapidly changing, with a growing emphasis on the targeting and disruption of physical civilian critical infrastructure, as the physical world increasingly becomes just a group of internet-connected devices, the future is one in which physical security will become one with cyber security. CPS attackers are seeking to inflect physical damage and jeopardize safety. This session will provide a short overview of the domain, the attack surface, CPS systems including Autonomous Vehicles, SCADA systems, Medical devices and Weapon systems.

  2. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
12:00
  1. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage
  2. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
12:05
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • GISEC Main Stage
    In 2020, digital transformation became real. Boards and CEOs are directing companies and CIOs to become digital-first businesses. In this hyper-distributed world, where risk factors are spread over both the physical and cyber world, intelligence is critical. This presentation will describe how this new world requires a new approach to enterprise security that is centered around intelligence and will provide a roadmap for building an intelligence-led security program
12:25
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage

    Achieving shared success in cybersecurity

    The rapid development of digital technologies like the cloud, the Internet of Things (IoT), and artificial intelligence (AI) bring in cybersecurity risks that are increasing at an exponential rate. An all-industry, full-society approach to collaboration is essential to enhancing systematic cybersecurity governance for everyone, where stakeholders such as the governments, industry, cybersecurity professional organizations, and institute of higher learning in the ICT ecosystem should come together and unify cybersecurity standards and best practices so as to build a trusted ecosystem. Join Aloysius in this session as he unveils some of the technologies used to protect customers’ data and efforts to build an open and transparent digital eco-system driven by open standards and technical collaboration.

  2. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
12:30
  1. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
  2. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage

    Indicators of Compromise (IOCs) have their place in cybersecurity, but as cyber threats evolve, they have become ineffective in threat detection. In order to detect the techniques, tactics and procedures (TTPs) of adversaries as well as to fully understand and anticipate threats, we have to go Beyond the IOC with structured intelligence.

12:40
  1. Main Stage (Sheikh Saeed Hall)
    80 mins
    • GISEC Main Stage
  2. Country Spotlight Stage (Sheikh Saeed Hall)
    50 mins
    • Israel Discovery Day
12:55
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
13:00
  1. Al Ain A, Above Hall 3
    30 mins
    • Telecom & 5G Cybersecurity

    In telecommunications, 5G is the fifth-generation technology standard for broadband cellular networks. The substantial increase in speed, coupled with reduced latency that allows instant communication and ability to connect more devices at the same time are critical game changers when it comes to building a foundation infrastructure that will support future smart applications and solutions in any digital transformation projects that attempt to create new outcomes that will benefit people and businesses.

    • However, how do we ensure that a deployment of 5G is secure?
    • How can experts ensure that 5G security risks can be effectively managed in terms of security protocols and standards as well as security assurance mechanisms?
    • How to continuously improve 5G security level from the perspectives of different stakeholders in order to address future needs?

    This presentation will describe our initiatives on building an open and transparent framework under OIC-CERT that will define a common baseline for 5G security across OIC member states.

  2. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage

    A demonstration of some tools used by Hafnuim post exploitation How to detect these and similar tools

  3. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
13:25
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
13:30
  1. Al Ain A, Above Hall 3
    30 mins
    • Telecom & 5G Cybersecurity

    While industries are embracing digital transformation, they are facing increasing cyber security and privacy protection challenges. In the digital intelligent world powered by 5G, business success cannot go without cyber security, trustworthiness, and privacy protection. Huawei has clearly defined cyber security and privacy protection as our top priority. This is in line with our core values of staying customer-centric and creating long-term value for customers, as well as our solemn commitment to society and the end users. This session hopefully will give insight from an industry point of view as well as Huawei’s own perspective the great transformational change that about to take place with 5G when it comes to the 2B market. 5G is a true game changer from not only the operator and network point of view but also how it can transform how businesses run their day to day operations. The dream of AI/ML, automation & digitalization which we have all been planning for with 5G it all can come true! So in this session lets dig a little deeper and understand how 5G can truly help businesses small to large to all transform, how we do & what we do in the era of industry 4.0 powered by 5G. 

  2. Country Spotlight Stage (Sheikh Saeed Hall)
    20 mins
    • Israel Discovery Day

    While new technologies emerge and while IoT is going to lead most of our activities based on 5G/6G and others we should be well protected against vulnerabilities identified by sophisticated technologies - mainly AI. AI is used by both the attackers and defenders and we should be prepared to deal with this new threat/opportunity. 

  3. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage

    We will use our flagship product, PenTera to present an ethical hacking session (demo). In this session, we will demonstrate, how to use the results to improve security. Decision criteria to use PenTera

  4. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
13:50
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    20 mins
    • Israel Discovery Day

    The Growing Threat of Cyber-Attacks on Critical Infrastructure

    Israel is one of the most resource-conservative nations in the world, the nation reuses 87% of its water. Recent widespread cyberattack on Israeli water and sewage facilities used American servers to hack into the facilities. While Israel has one of the most technology-dependent water systems in the world, this cyberattack struck right at the heart of Israel’s survival. Hear from Danny Lacker, how Israel uses it’s powerful combination of defense and attack capabilities while defending critical national infrastructure.

13:55
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
14:00
  1. Al Ain A, Above Hall 3
    30 mins
    • Telecom & 5G Cybersecurity

    In 2021, over 27 billion IoT devices are in use around the world. And the number still increases. The uninterrupted data sharing, while creating tremendous value is seeing the emergence of security concerns for telecom operators as IoT is now a commercial must for a lot of industries.

  2. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
  3. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage
14:10
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    20 mins
    • Israel Discovery Day

    Connecting the dots between the new geopolitical trends, what is the impact on the regional cyber sector? From capacity building to information sharing and joint exercises. Underlining the importance of a cybersecurity framework in the development of smart cities.

14:25
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
14:30
  1. Al Ain A, Above Hall 3
    30 mins
    • Telecom & 5G Cybersecurity

    The impeding commoditisation of broadband connectivity is a major disruptive phenomenon that will impact the status quo, existing markets, lead to the demise of some service providers, cause loss of investments, narrowing of supply chains, potential obsolescence of   national broadband regulatory activities, loss of lucrative licencing income and threaten the sovereignty of many nations, particularly across the global south, in the sphere of broadband governance by late 2021.

  2. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage
  3. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
  4. Country Spotlight Stage (Sheikh Saeed Hall)
    20 mins
    • Israel Discovery Day

    Water facility, supply chain attacks & Covid 19 incidents

    New Risks Call for a Fresh Cyber Defense Methodology, the legacy measures and methodologies are no longer effective and are not good enough for the new cyber-attack sophistication we are experiencing in past years. Consequently, the national cyber defense organizations must evolve and introduce innovative measures and cyber defense methodologies; the sooner, the better

14:40
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage

    The COVID-19 pandemic has acted as a force multiplier for existing cyber threats, while also creating the environment for a new and evolving set of cyber threats. Digital14 evaluated and analysed multiple digital assets within the UAE during 2020, to give a snapshot of the country’s current threat landscape and the actions required to mitigate these threats.

14:50
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    30 mins
    • Israel Discovery Day

    Cyber-Security frameworks tend to focus on the big players (national security bodies, government offices, large companies), while individuals and small businesses are last in the line. Based on ISOC-IL's "Block" initiative experience, we will explore the importance of reaching out cyber-security solutions for the general population.

14:55
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage

    As the attack surface continues to grow and the number of attacks increases, there still remains a gap when it comes to validating the effectiveness and accuracy of the enterprise’s cyber posture. Join this session to learn the best practices for continuous security control validation, how to increase the productivity of the security teams and achieve cybersecurity validation in the enterprise.

  2. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
15:00
  1. Al Ain A, Above Hall 3
    30 mins
    • Telecom & 5G Cybersecurity

    In recent years, it is becoming increasingly apparent that AI-based technologies are inherently insecure. They can be easily manipulated, are vulnerable to privacy leakage issues, susceptible to bias, difficult to explain and have operational behaviors that may change dramatically over time.
    This talk will explore some of such shortcomings, while highlighting state-of-the-art developments and research trends.

  2. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage

    The MABNA Institute, a threat actor which has been associated with the IRGC, continued its global operations against academic and research sector institutions using similar TTPs in 2020 as previous years, with large-scale phishing and credential theft characterizing their operations. This talk will demonstrate how Insikt Group research has further uncovered evidence to suggest that groups which hold no evidence-based association with the MABNA Institute are likely also engaging in almost identical activity.

  3. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs

    The adoption of IaC has risen considerably in recent years as organizations transition to the cloud and seek ways to make the provisioning of infrastructure faster and more scalable. However, with all the benefits of IaC comes a multitude of security, compliance, and configuration risks that developers are struggling to address; error-related issues (e.g. misconfigurations and misdeliveries). IaC is now the second biggest cause of data breaches. Join our live demo session and see how our solution can help to keep your IaC secure.

15:10
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage
15:25
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • GISEC Main Stage

    Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats - wherever they strike. 

    In this session, discover:

    • How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons 
    • What an AI-powered spoofing threat may look like, and why humans will not be able to spot them
    • Why defensive AI technologies are uniquely positioned to fight back 

     

  2. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
15:30
  1. Al Ain A, Above Hall 3
    30 mins
    • Telecom & 5G Cybersecurity

    According to NSA guidelines , to be fully effective to minimize risk and enable robust and timely responses, Zero Trust principles and concepts must permeate most aspects of the network and its operations ecosystem. Is a full control of all that requests access realistic while remote work force and third parties are increasingly common in the work environment?

  2. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
  3. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage
15:45
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • GISEC Main Stage

    Gary Brantley, former CIO for the City of Atlanta and now CTO of Beazer Homes, has developed a tried-and-true strategy to lead the charge and transform an organization, company or business. His secret to success is that understanding the building blocks of organizational resilience lies in adopting a rapid change mindset and developing a seven-step approach. Since 2018, the City of Atlanta has battled two viruses: the largest cyber security attack and COVID-19. After re-strategizing following one of America’s largest cyberattacks and navigating through the current threats of a global pandemic, Gary

    Brantley has continued to deliver cutting-edge technology and services.

15:55
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
16:00
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    10 mins
    • Israel Discovery Day
  2. Dark Stage (Sheikh Saeed Hall)
    10 mins
    • Dark Stage
  3. Al Ain A, Above Hall 3
    10 mins
    • Telecom & 5G Cybersecurity
  4. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
16:05
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • GISEC Main Stage
    • Healthcare

    Roadmap and ultimate guideline to build and implement a tailored Zero Trust system for healthcare in the wake of devastating attacks that are now claiming their first victims. Find out from Zero Trust pioneers how hospitals can achieve a safe digital transformation

16:25
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
16:35
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • GISEC Main Stage
    • Healthcare

    Consumers want personalised customer experience and service therefore they provide data to businesses and brands they trust. What is data ethics? Complying with data protection law is a business priority but beyond compliance, what are the practical implications and benefits of handling ethically customers data?

16:55
  1. Main Stage (Sheikh Saeed Hall)
    5 mins
    • GISEC Main Stage
    • Healthcare
10:15
  1. Main Stage (Sheikh Saeed Hall)
    5 mins
    • GISEC Main Stage
    • Government Stage Hosted By DESC
10:20
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage
    • Government Stage Hosted By DESC

    Cyber-attacks are on the rise with increasing frequency and sophistication, a collective defense approach can provide companies, sectors — even entire nations — a more effective defense against these massive, coordinated cyber attacks

10:35
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • GISEC Main Stage
    • Government Stage Hosted By DESC
    Erecting virtual borders is giving rise to digital protectionism – a big blow to the digital economy. How is growing fragmentation of “internet sovereignty” impacting the security and business community?
10:50
  1. Dark Stage (Sheikh Saeed Hall)
    10 mins
    • Dark Stage
10:55
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage
    • Government Stage Hosted By DESC
  2. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
11:00
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    10 mins
    • Saudi Arabia Focus Day
  2. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
11:10
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    40 mins
    • Saudi Arabia Focus Day

    COVID-19 has caused unprecedented disruptions in markets across the globe with healthcare and education placing themselves at the forefront of digital transformation. As more and more business made the transition to online meant strategic IT investments in cloud and mobility to improve resilience and agility. However, with the expansion of digitalization is the expansion of attack surface. This is compelling technology and security leaders to adapt innovative approaches to cybersecurity. With a pre-COVID daily attack rate of up to 160,000, what has this meant for Saudi Arabia in the past 18 months?

  2. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage
    • Government Stage Hosted By DESC

    Privacy and security are always top of mind for IT, but never more so than at this moment when the reality continues to impact how organizations operate today. Remote workforce is becoming a common practice. It is not only perceived as a necessity, but also as an improvement of work-life balance, which could increase flexibility. Unfortunately, at the same time working remotely introduces various risks.
    There are real cybersecurity issues with such an approach and they may expose the company’s sensitive data. If you do not implement best practices to enable remote work and remain secure – you are creating a Hacker Paradise!  Join Paula in partnership with Microsoft during her latest session based on 2020 and 2021 experiences and become familiar with most common threats and solutions to avoid being a part of hacker’s paradise!

11:25
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage
    • Government Stage Hosted By DESC

    Paul will analyze the critical components of American Cyber Operations, focusing on defensive and offensive strategies. He will convey the idea of forward-deployed cyber ops in grey space where national defense cyber policies can be rendered ineffective. New American Cyber Ops paradigms are molding the way conflict in cyberspace is being shaped.

  2. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
11:40
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage
    • Government Stage Hosted By DESC

    This session highlights an alternative view to traditional cybersecurity, Larry will assert that the advantage belongs to cyber teams who turn defenders into hunters; that the advantage belongs to those that leverage the power of AI/ML to detect and stop a malware attack before it actually occurs. That smart, layered defence using AI can actually enable security teams to make decisions faster than the adversaries attacking them.

11:55
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    30 mins
    • Saudi Arabia Focus Day

    As organisations and their partners are increasingly becoming interconnected, cybersecurity risks can endanger all parties involved. And even when your business is protected, you may never be certain your suppliers also have the same methods of protection in place. Last year’s nation-state attack against up to 18,000 customers of networking tools vendor highlight how bad it can be and it just keeps getting worse. How can Saudi organisations fight back in the field? What can be done to mitigate the risk?

  2. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage
    • Government Stage Hosted By DESC

    The right message, right time, right customers is the foundation for data driven marketing. It has been a practice which has evolved as the spectrum of data has increased. Coupled with knowledge from behavioural economics and psychology this helped marketers nudge consumer behaviour into buying more products, using more of a service or increasing retention.

    However, in the cybersecurity realm, the use of data on human attitudes and behaviours is not as widespread as it is in other domains. A similar approach is much needed. 

    Enter Cybersecurity Human Risk Management. This session explores how OutThink helped a large UAE bank go beyond traditional security awareness training (SAT) and rip massive benefits.

  3. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
12:10
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • GISEC Main Stage
    • Government Stage Hosted By DESC

    Hear from former hostage negotiator Matthias Schranner, sharing his experience of dealing with difficult negotiations. Learn his top tactics and strategies to apply when dealing with blackmail and negotiating with hackers.

12:25
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    35 mins
    • Saudi Arabia Focus Day

    As Saudi Arabia gears up to develop and diversify its economy in preparation to meet key milestones set for Vision 2030, multiple initiatives are being launched such as digitalization, artificial intelligence, Internet of Things, and Blockchain. Sophisticated digital infrastructure is essential to this, and requires significant investment into cybersecurity, skills and education, security awareness and regulation. In this session, Spire Solutions will demonstrate and identify the key trends that CISOs, CIOs and CTOs should expect to see in IT, OT, IoT cybersecurity challenges in the Kingdom.

  2. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
12:40
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage
    • Government Stage Hosted By DESC
12:50
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    70 mins
    • Saudi Arabia Focus Day
12:55
  1. Main Stage (Sheikh Saeed Hall)
    35 mins
    • GISEC Main Stage
    • Government Stage Hosted By DESC

    Cyberattacks are happening more frequently and have a more significant impact. At the back of this, the global cyber insurance market is expected to reach $20.4bn by 2025*(*Finaria.). Data can be extracted from the incidents; however, cross-industry sharing of the data and gaining insights from it pose vital challenges. What is the way forward?

  2. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
13:25
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
13:30
  1. Main Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Main Stage
    • Government Stage Hosted By DESC
  2. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage
  3. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
13:45
  1. Main Stage (Sheikh Saeed Hall)
    5 mins
    • GISEC Main Stage
    • Global Cybersecurity Congress Hosted by UAE Cybersecurity Council
13:50
  1. Main Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Main Stage
    • Global Cybersecurity Congress Hosted by UAE Cybersecurity Council
13:55
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
14:00
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    30 mins
    • Saudi Arabia Focus Day
  2. Main Stage (Sheikh Saeed Hall)
    60 mins
    • GISEC Main Stage
    • Global Cybersecurity Congress Hosted by UAE Cybersecurity Council
    • Adopting bold and long term strategies to utilize and share benefits of collaboration
    • Recognize the role of collaboration + innovation and its impact across all industries and society, as well as its influence for solving some of today’s most pressing and concerting issues
  3. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
  4. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage
    Deep dive into case studies of real life events. In lights of the recent Colonial Pipeline attack - showcasing best practices and addressing the need to advance the convergence of IT and OT in our env ...
14:25
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
14:30
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    45 mins
    • Saudi Arabia Focus Day

    Cyberterrorism attacks against Saudi Arabia are a major risk, and are proving catastrophic to the country by disrupting the critical services of both the government and private sectors. Looking at the most significant cyber-attacks in the history of the country, including Saudi Aramco’s 2019 attack which cost the country $2bn in losses – what is the cause and impact; what techniques are used in causing physical damage and what security measures can prohibit future attacks?

  2. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage

    A demonstration of efficient countermeasures to protect you and your company from cyber criminals

  3. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
14:55
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
15:15
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    15 mins
    • Saudi Arabia Focus Day
15:25
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
15:30
  1. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage

    Intelligence is complicated but not for CARA. Don’t miss the live demo about how CARA can help cybersecurity teams respond to incidents, proactively defend against emerging threats, aIntelligence is complicated but not for CARA. Don’t miss the live demo about how CARA can help cybersecurity teams respond to incidents, proactively defend against emerging threats, and operate at lightning speed leveraging artificial intelligence

  2. X-Labs Stage (Sheikh Saeed Hall)
    20 mins
    • X Labs
15:55
  1. X-Labs Stage (Sheikh Saeed Hall)
    5 mins
    • X Labs
    (Seated participants get a chance to win)
16:00
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • GISEC Main Stage
    • Global Cybersecurity Congress Hosted by UAE Cybersecurity Council
    • Building trust & peace
    • Initiate Confidence Building
    • Creating Cyber understanding
    • The Roadmap to building confidence, trust, peace & prosperity
    • Cyber warfare: A serious threat to peace and global security
  2. Dark Stage (Sheikh Saeed Hall)
    30 mins
    • Dark Stage
    Since 2018, targeted ransomware attacks increased significantly – becoming one of the most significant and monitored risks to organizations across all geographies, business sectors and sizes. This gav ...
16:30
  1. Dark Stage (Sheikh Saeed Hall)
    10 mins
    • Dark Stage
17:00
  1. Main Stage (Sheikh Saeed Hall)
    5 mins
    • GISEC Main Stage
    • Global Cybersecurity Congress Hosted by UAE Cybersecurity Council
10:20
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups
10:30
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Inspire
  2. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    There is no absolute security for an ICS in the world of evolving cyberthreats and ever-growing risks. Learn how you can improve your ICS visibility and minimize possible negative impact with CL DATAPK.

10:40
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    45 mins
    • GISEC Inspire
    • Highlight the overarching challenges women face in the cyber world – And how best to navigate
    • Discuss the societal and cultural expectations, interpretations, and what needs to be changed
    • What support and visibility is required – What does this support look like, and who are the main protagonists for delivery
    • What role does government, regulators/policy-makers have in driving change
10:45
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    From the baseline of real-time Cyber Situational Awareness in million-node networks, Isophene bio-x will show how underlying cyber technologies for diverse data acquisition, automated analysis, and human-computer teaming can be applied to deliver bio-intelligence – for both know and as yet unknown pathogens – at global scale.

10:50
  1. Al Ain F, Above Hall 4
    10 mins
    • Energy & Utilities
  2. Main Stage (Sheikh Saeed Hall)
    10 mins
    • Banking & Finance
    • GISEC Main Stage
11:00
  1. Al Ain F, Above Hall 4
    26 mins
    • Energy & Utilities

    For the longest time, the cyber space has been the playing field of private individuals or criminal organisations and in recent years, there has been a surge in state-sponsored cyber attacks dealing with disinformation, IP theft, attacks against corporations…

    Beyond improving network security, how do governments and businesses identify Nation State threat Actors, and how do they defend against them?

  2. Main Stage (Sheikh Saeed Hall)
    30 mins
    • Banking & Finance
    • GISEC Main Stage
  3. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Through practical and tactical security validation practices, we will demonstrate a new approach to risk-based remediation prioritization and how to shift from legacy security practices to risk-based strategies in order to continuously reduce exposure and increases security awareness that you can leverage to build a risk-based security strategy.

  4. X-Labs Stage (Sheikh Saeed Hall)
    10 mins
    • Public Cyber Awareness
11:15
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Axioma cyber services is a boutique firm that specializes in incident response. Partnered with world renowned Mentalist, Ben Cale, we will demonstrate live Mind Hacking, and talk about how it related to securing your network.

11:30
  1. Al Ain F, Above Hall 4
    15 mins
    • Energy & Utilities

    OT is the new cyber battleground with critical infrastructure targets, high value impact and low maturity providing a fertile breeding ground for cyber attackers. Digital14 cyber experts share its extensive domain knowledge and energy-specific standards that can establish the UAE as an OT Center of Excellence.

  2. Main Stage (Sheikh Saeed Hall)
    20 mins
    • Banking & Finance
    • GISEC Main Stage
  3. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    The rising risks of airborne threats through the attack surfaces of WiFi, Bluetooth and IoT devices. Introducing Harmony IoT that monitors, detects and mitigates those threats, and comply with organizational policies and industry regulations.

11:45
  1. Al Ain F, Above Hall 4
    40 mins
    • Energy & Utilities
  2. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    As the CISO, Head of Security, or CTO of your organization, you’re probably well versed in just how difficult it can be to hire high-caliber cybersecurity talent. As the world makes headway in digital transformation, organisations of all sizes, from all industries are increasingly concerned with cybersecurity risks. Security failures can be detrimental to your business – whether it be compliance violations, reputational damage and economic fallout. Now, more than ever, hiring and retaining top cyber talent is paramount to your business. This session will look at the full cyber talent lifecycles:

    • Why do so many organisations face retention challenges in their cyber teams?
    • What are the main challenges faced when attracting top cyber talent?
    • How can efficiency be maximised in the talent acquisition process?
    • What role does education, training and mentorship have in encouraging next gen into cyber?
11:50
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • Banking & Finance
    • GISEC Main Stage

    Ramakrishna will share unique perspectives following the cyberattack that can help the industry better prepare and protect in the future

12:00
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups
    • A brief history: What is a “Man-in-the-Browser” attack?
    • Browser extensions – the new MITB frontier
    • Bypassing modern browser defense mechanisms
    • Malicious browser extensions’ techniques of evading detection
    • Defending against malicious browser extensions
12:05
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    40 mins
    • GISEC Inspire
    • How has the pandemic impacted the nature of work and workplace within the cybersecurity space specifically?
    • Forms of discrimination and provide actionable advice / practical strategies when faced with discrimination / resistance
    • The role of co-operation, education, mentorship and training in attracting and retaining women in the field
    • How can employers adapt policy, flexibility to embrace diversity and inclusion for women in the workplace
12:15
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Resilience is not just cyber security. Using examples from real-world deployments, Resilio will show how technologies developed for cyber security have been successfully adapted to create and event-driven infrastructure that provides a single point-of-access to events as they emerge: both across the organisation and from the environment in which it operates.

12:20
  1. Main Stage (Sheikh Saeed Hall)
    70 mins
    • Banking & Finance
    • GISEC Main Stage
12:25
  1. Start-up Stage (Sheikh Saeed Hall)
    20 mins
    • GISEC Startups
  2. Al Ain F, Above Hall 4
    20 mins
    • Energy & Utilities
12:45
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Inspire
  2. Al Ain F, Above Hall 4
    45 mins
    • Energy & Utilities
  3. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Overlooking cybersecurity in favour of projects that have an immediate impact on business operations inevitably leads to unaddressed vulnerabilities and security misconfigurations in Active Directory. AD is a key component for corporates and nearly all threat actors and APT groups is targeting AD for gaining access to the crown jewels of a company. In this session, we will look at:

    • Active Directory – How is this the essential target for adversaries?
    • The Active Directory threat landscape
    • How APT groups are exploiting common AD features
    • Forestalling adversaries with FSProtect
13:00
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    In the time of social distancing, there has been a significant increase in the need for messaging apps in order to stay connected. The COVID-19 pandemic has only heightened the risks as we are living more of our lives online than ever before. Now is the time to be extra vigilant about digital security – for you and your children – as increased used can mean increased risk. Finally, a ‘verifiable chat application’, Dr. NEE which seeks to reduce these risks to children face when interacting with others via online chatting apps. Protecting them from cyberbullying and exploitation of personal and sensitive data is part of the societal change required. How has OMANEE changed society for the better?

13:10
  1. X-Labs Stage (Sheikh Saeed Hall)
    30 mins
    • Public Cyber Awareness
13:15
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    When an incident occurs, your speed of response depends on having the right information available to the right people at the right time. This is as true for line of business operations as it is in the cyber security layer. Carnet Systems will show how big data and analytics can be used to cut through the complexity of available information; allowing you to understand incidents in context and response accordingly.

13:25
  1. Country Spotlight Stage (Sheikh Saeed Hall)
    5 mins
    • Africa Focus Day
13:30
  1. Al Ain F, Above Hall 4
    30 mins
    • Energy & Utilities
  2. Main Stage (Sheikh Saeed Hall)
    14 mins
    • Banking & Finance
    • GISEC Main Stage

    Errors in infrastructure configuration are now regarded as the second biggest cause of data breaches. In this session, we will discuss common types of IaC misconfiguration, and demonstrate a free, open-source security tool that you can build into your development pipeline to help protect your infrastructure from compromise.

  3. Country Spotlight Stage (Sheikh Saeed Hall)
    20 mins
    • Africa Focus Day
  4. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    It doesn’t matter if you’re a CISO, Infrastructure Manager, MSSP or Helpdesk Manager; if the business is small, medium or large – Security automation is not a luxury anymore, it’s a life-saver. In this presentation we will discuss the importance of implementing the right security automation platform, and provide some tips on what you should be careful of, and demonstrate how simple it can be to start automating – with no previous skills required.

13:45
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups
    • The product security threat landscape, risks, and business challenges facing device manufacturers and asset owners
    • Implementing product security throughout the software development lifecycle (SDLC) and software supply chain
    • How our automated product security platform saves time, effort, money and friction for Dev and security teams while delivering the most secure products
  2. X-Labs Stage (Sheikh Saeed Hall)
    60 mins
    • Public Cyber Awareness
14:00
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups
    • Overview of key emerging cyber risks in industrial networks
    • Challenges in implementing cyber security controls in the production lines
    • Using breach simulation for data-driven risk assessment in industrial networks
    • A customer use-case for implementing OT Cyber
    • Lessons learned from customer field deployments for successful OT Cyber deployment
  2. Al Ain F, Above Hall 4
    20 mins
    • Energy & Utilities
14:15
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • Banking & Finance
    • GISEC Main Stage
    Overview of how cybersecurity works within a cryptocurrency exchange platform, what are the challenges and objectives; he will also provide an overview of how cryptocurrencies wallets/ security works, what are the different types of wallets that are existing and their benefits from a security perspective.
  2. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Securing your cloud environment using a cloud native product running in your environment will ensure not only that you get the most suited and effective solution, but will also help you save your cloud consumption costs. Learn how Reblaze’s unified cloud-native web security is designed to work seamlessly with all major cloud providers.

14:20
  1. Al Ain F, Above Hall 4
    20 mins
    • Energy & Utilities

    As emerging technologies are revolutionizing protection dynamics for both IT and OT in critical infrastructure, the ability to protect against malware, provide detection, and mitigation in environments where automated information exchanges are happening is paramount. What mechanisms can be utilized to protect the integrity and improve the overall security of IIoT.

14:30
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • Banking & Finance
    • GISEC Main Stage

    CISOs tend to be mostly in the background for organizations and business look at them as a road blocker. But deservedly, the role of CISO started to get much more prominence, considering the dependency on them to effectively support the technology transformation, as the world is transforming into a digital economy. A secure and stable environment is a primary need to consistently and aggressively adopt the digital channels for various business and economic activities. The pandemic has accelerated this journey. Hence, designing and implementing intelligent, but agile and effective security controls is the key to meet the business and security objectives in a timely and effective manner.

    How can the CISO be a business enabler to support the digital economy?

    • What are the changes in approach required?
    • What lessons learned from handling pandemic security challenges?
    • How to be more agile and positive without compromising security?
    • What are the practical steps to ensure a more resilient but flexible digital platforms?
  2. Country Spotlight Stage (Sheikh Saeed Hall)
    5 mins
    • Africa Focus Day
  3. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Purpose-build for securing Active Directory, Semperis delivers first-of-its-kind solutions to address the entire lifecycle of a directory attack – from finding and fixing security vulnerabilities, intercepting privilege escalation and persistence, and quickly responding to ransomware and other data integrity emergencies.

14:40
  1. Al Ain F, Above Hall 4
    20 mins
    • Energy & Utilities

    Let us find out how UEBA identify anomalous activity and pattern deviations through Machine Learning. Find answers to the question What is normal? to trigger automated risk response. UEBA arguably provides some of the most effective approach to manage and monitor user and entity centric risks in environments where third parties and remote access are increasingly common.

14:45
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    If you’re like most organizations, you are heavily invested in the right set of security tools to help you keep ahead of rapidly evolving threats and compliance requirements. However, managing those tools is incredibly complex and time-consuming. How are you able to see coverage gaps with the security tools you are using? How do you know if the tools you have implemented are actually doing what you and your customers think they should be doing? What you need is a single solution that continuously monitors and reports on your security controls that can be easily managed from a single interface, integrates with your cybersecurity tools, and maps to the standards and frameworks that matter to your business.

    Join Shimon Becker, VP Product and Co-Founder Cyber Observer, to gain insight into how Cyber Observer with Continuous Controls Monitoring (CCM) empowers you to establish a measurable benchmark of cyber hygiene, continuously close critical security gaps, and advance your cybersecurity posture.

14:50
  1. Main Stage (Sheikh Saeed Hall)
    40 mins
    • Banking & Finance
    • GISEC Main Stage

    Not only an expectation from customers, protecting data is a legal obligation. And how does one go about retaining their customer’s trust as data movement is an imperative for digital economies? How safe is the cloud? And which cloud? What are the latest advances in data protection and best practices in data privacy? How do CISOs make sure outsourced and managed services follow organisational policies and procedures, as well as related laws and regulations?

15:00
  1. Al Ain F, Above Hall 4
    20 mins
    • Energy & Utilities
  2. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    The OT Security Company for over 15 years, Waterfall Security Solutions continues to innovate solutions for today’s challenges. Join us to learn about today’s threats to critical infrastructure and industrial automation, as well as modern solutions to enable the enterprise.

15:15
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Firewall appliances, with last major innovation from some 13 years ago, are inadequate for modern data centers and hybrid clouds. The concept of a box – physical or virtual – contradicts the way applications and data centers are built and managed today. A new product category is emerging, of software-based, distributed and platform-agnostic micro-segmentation solutions. In this presentation, Dror Sal'ee will cover the main considerations for micro-segmentation solutions, to simplify project implementation, reduce time-to-policy and enhance resulting security.

15:30
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Oren Elimelech, Founder and CEO of CyberTeam360 brings his 25+ years of security and IT experience, with real life stories on Cyber Incidents and attack vectors which were observed during DFIR activity. Oren will provide you with five insights that will definitely reduce your exposure to Cyber Incidents and help you better prepare for your next Cyber Incident.

  2. Main Stage (Sheikh Saeed Hall)
    5 mins
    • Banking & Finance
    • GISEC Main Stage
15:40
  1. Al Ain F, Above Hall 4
    5 mins
    • Energy & Utilities
15:45
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups
16:00
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    In this session, Matthew Platten CISSP, will showcase the most common Phishing attacks methodology, and explain how this can easily be defeated by implementing either a Cloud base or within your infrastructure:

    • Strong Online Threat assessment
    • Mobile Protection
    • Risk Based Authentication
    • Transaction Monitoring Framework
16:15
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Mobile threat space intensifies and challenges the benefits of mobility by imposing a risk of stealing money and altering business courses. In this session, you will gain invaluable insights on (1) modern mobile cyberattacks; (2) combating mobility state-of-mine, and (3) how to deploy defense controls fusion to protect mobile communications.

Supporters & Partners

OFFICIALLY SUPPORTED BY

UAE Cyber Security Council

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

Dubai Electronic Security Center Logo

dp

OFFICIAL DISTRIBUTION PARTNER

ISPIRE

OFFICIALLY SUPPORTED BY

Telecommunications Regulatory Authority

Official Smart City Partner

Strategic Sponsors & Partners

Strategic Partner

huawei

Strategic Partner

  • Recorded Future

Platinum sponsors

digital14

Microsoft

PCYSYS

Hiperdist

Diamond sponsors

threat quotient

Attivo Networks - GISEC

XM Cyber - GISEC

Secret Briefing Partner

Rafael - GISEC

XM Cyber - GISEC

Silver sponsors

armis

bluvector

checkmarx-gisec

Darktrace-gisec

SpearTip

Recruitment Partner

cander-gisec

Training Partner

sans institute

Industry & Association Partner

Germany Association Partner

TeleTrusT

Supporting Association

CSFI

Supporting Association

ISC2

Supporting Association

OIC

Supporting Association

Russoft

Supporting Association

CSI Mumbai

India Pavilion Partner

Logo

Association Partner

techUJLogo

Knowledge Partner

Frost Logo

Association Partner

CyberWales

Exhibitors

 

Media Partners