Important Notice: We are committed to providing you with a safe environment to do business, in accordance with all the health & safety guidelines set out by the local authorities. The event will be delivered with strict standards of health & safety precautionary measures including social distancing, contactless transactions and hygiene protocols. Learn More

GISEC Conference Agenda

   

GISEC Conference Agenda

Loading
10:50
  1. Main Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Main Stage
11:00
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • GISEC Main Stage
11:50
  1. 15 mins
    • GISEC Main Stage
12:05
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • GISEC Main Stage
12:25
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage
12:40
  1. Main Stage (Sheikh Saeed Hall)
    80 mins
    • GISEC Main Stage
12:50
  1. Track Room
    10 mins
    • Telecom
13:00
  1. Track Room
    30 mins
    • Telecom

    60% of data breaches are caused by insiders, either malicious or negligent – the number has been on the rise in frequency and cost to businesses.  Cisco, GE, Tesla, Twitter… the examples abound. Yet, insider threat programs account for less than 10% of cyber security budgets. What are insider threats and how can CISOs mitigate them?

13:30
  1. Track Room
    30 mins
    • Telecom

    The complexity of the communication and networking infrastructure is making investigation of cyber-attacks and data theft increasingly difficult and digital clues of illegal activities are often hidden under heaps of data. And while forensics methods cover challenging areas including stored data and filesystem analysis, network forensics, and reverse engineering – they now contend with the rise of antiforensics techniques. An exciting session to peep into the future of cyber forensics.

14:00
  1. Main Stage (Sheikh Saeed Hall)
    40 mins
    • GISEC Main Stage
  2. Track Room
    30 mins
    • Telecom

    According to NSA guidelines , to be fully effective to minimize risk and enable robust and timely responses, Zero Trust principles and concepts must permeate most aspects of the network and its operations ecosystem. Is a full control of all that requests access realistic while remote work force and third parties are increasingly common in the work environment?

14:30
  1. Track Room
    40 mins
    • Telecom

    A look at defensive operations: What are preventive and active measures taken to ensure that an adversary is unable to achieve their objective? This session is about shifting from incident response to detection and response.

14:40
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage
14:55
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • GISEC Main Stage
15:10
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • Finance
    • GISEC Main Stage

    CISOs tend to be mostly in the background for organizations and business look at them as a road blocker. But deservedly, the role of CISO started to get much more prominence, considering the dependency on them to effectively support the technology transformation, as the world is transforming into a digital economy. A secure and stable environment is a primary need to consistently and aggressively adopt the digital channels for various business and economic activities. The pandemic has accelerated this journey. Hence, designing and implementing intelligent, but agile and effective security controls is the key to meet the business and security objectives in a timely and effective manner.

    How can the CISO be a business enabler to support the digital economy?

    • What are the changes in approach required?
    • What lessons learned from handling pandemic security challenges?
    • How to be more agile and positive without compromising security?
    • What are the practical steps to ensure a more resilient but flexible digital platforms?
  2. Track Room
    20 mins
    • Telecom

    Cloud security has evolved along with companies gaining more cloud maturity. The initial concept of cloud has given way to entire new ideas meaning that there is no fixed playbook regarding securing a safe cloud adoption.

    What are the lessons learned in cloud-native security practices and the latest trends?

15:25
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • Finance
    • GISEC Main Stage

    Not only an expectation from customers, protecting data is a legal obligation. And how does one go about retaining their customer’s trust as data movement is an imperative for digital economies? How safe is the cloud? And which cloud? What are the latest advances in data protection and best practices in data privacy? How do CISOs make sure outsourced and managed services follow organisational policies and procedures, as well as related laws and regulations?

15:30
  1. Track Room
    30 mins
    • Telecom

    In 2021, over 27 billion IoT devices are in use around the world. And the number still increases. The uninterrupted data sharing, while creating tremendous value is seeing the emergence of security concerns for telecom operators as IoT is now a commercial must for a lot of industries.

15:55
  1. 55 mins
    • Banking & Finance
    • GISEC Main Stage

    This presentation is a toolkit for developing collective protection and response to cyber-attacks, fraud, and other threats. 

    • How do we defend an entire industry, at national or regional level?  How do we leverage the wisdom of the crowd, build trust, and avoid common pitfalls of information sharing communities over the years? 
    • Whether an informal small sharing group, an industry ISAC, or a fully resourced and staffed formal cyber defence centre, this talk will include discussion of Information resources and good practices for collective defence
    • Working with government and industry stakeholders
    • Resource requirements and expectations management
    • Trust building and information sharing
16:15
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • Finance
    • GISEC Main Stage
16:30
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • Finance
    • GISEC Main Stage
16:45
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • Finance
    • GISEC Main Stage

    Gary Brantley, former CIO for the City of Atlanta and now CTO of Beazer Homes, has developed a tried-and-true strategy to lead the charge and transform an organization, company or business. His secret to success is that understanding the building blocks of organizational resilience lies in adopting a rapid change mindset and developing a seven-step approach. Since 2018, the City of Atlanta has battled two viruses: the largest cyber security attack and COVID-19. After re-strategizing following one of America’s largest cyberattacks and navigating through the current threats of a global pandemic, Gary Brantley has continued to deliver cutting edge technology and services. 

17:15
  1. Main Stage (Sheikh Saeed Hall)
    5 mins
    • GISEC Main Stage
10:30
  1. Main Stage (Sheikh Saeed Hall)
    10 mins
    • Government Stage Hosted By DESC
    • GISEC Main Stage
10:40
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • Government Stage Hosted By DESC
    • GISEC Main Stage

    Cyber-attacks are on the rise with increasing frequency and sophistication, a collective defense approach can provide companies, sectors — even entire nations — a more effective defense against these massive, coordinated cyber attacks

11:00
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • Government Stage Hosted By DESC
    • GISEC Main Stage
    What certifications are global governments implementing to ensure that the service providers for the government are certified? What are the different approaches adopted lately by Israel and Singapore?
11:30
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • Government Stage Hosted By DESC
    • GISEC Main Stage
11:45
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • Government Stage Hosted By DESC
    • GISEC Main Stage
12:00
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • Government Stage Hosted By DESC
    • GISEC Main Stage
    Erecting virtual borders is giving rise to digital protectionism – a big blow to the digital economy. How is growing fragmentation of “internet sovereignty” impacting the security and business community?
12:30
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • Government Stage Hosted By DESC
    • GISEC Main Stage

    This session highlights an alternative view to traditional cyber security, Larry will assert that the advantage belongs to cyber teams who turn  defenders into hunters; that the advantage belongs to those that leverage the power of AI/ML to detect and stop a malware attack, before it actually  occurs.  That smart, layered defense using AI can actually enable security teams to make decisions faster than the adversaries attacking them. 

12:45
  1. 75 mins
    • Government Stage Hosted By DESC
14:00
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • Government Stage Hosted By DESC
    • GISEC Main Stage
    What are the major risks and challenges that are emerging from an increasingly ubiquitous connected world and how should we address these challenges?
15:00
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • Government Stage Hosted By DESC
    • GISEC Main Stage
15:15
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • Government Stage Hosted By DESC
    • GISEC Main Stage
15:30
  1. Main Stage (Sheikh Saeed Hall)
    15 mins
    • Government Stage Hosted By DESC
    • GISEC Main Stage
15:45
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • Government Stage Hosted By DESC
    • GISEC Main Stage
    Cyberattacks are happening more frequently and have a more significant impact. At the back of this, the global cyber insurance market is expected to reach $20.4bn by 2025*(*Finaria.). Data can be extracted from the incidents; however, cross-industry sharing of the data and gaining insights from it pose vital challenges. What is the way forward?
16:15
  1. Main Stage (Sheikh Saeed Hall)
    45 mins
    • Government Stage Hosted By DESC
    • GISEC Main Stage
    The transnational nature of cybercrime makes it critical for governments to collaborate in building a platform and establish intelligence and threat-sharing partnerships that are faster and achievable, preventative and strengthen investigating cybercrimes
10:50
  1. Main Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Main Stage
  2. Track Room
    10 mins
    • Energy
11:00
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • GISEC Main Stage

    4D Approach, “Deter and Divert those on the periphery of Cybercrime, Degrade and Disrupt those committed to Cybercrime”

    This presentation outlines a long neglected aspect in the fight against cybercrime,  the Human Factor. Detailed findings from unique and insightful interviews with technically skilled high profile cyber offenders and how a Cyber Criminal Career Pathway that became the template for Prevention of Cyber Crime.  How extensive experience as a Cyber Crime investigator and Magistrate provided the rationale for the  development of many of the Prevent initiatives and interventions used effectively within the UK Criminal Justice system. Exploring the emergence of Cyber Crime Prevention in, its focus on Cyber Dependent Crime and the operational and societal impact of this alternative strategy on UK and global law enforcement.

  2. Track Room
    40 mins
    • Energy

    For the longest time, the cyber space has been the playing field of private individuals or criminal organisations and in recent years, there has been a surge in state-sponsored cyber attacks dealing with disinformation, IP theft, attacks against corporations…

    Beyond improving network security, how do governments and businesses identify Nation State threat Actors, and how do they defend against them?

11:30
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • GISEC Main Stage
  2. Track Room
    20 mins
    • Energy
11:50
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • GISEC Main Stage

    Roadmap and ultimate guideline to build and implement a tailored Zero Trust system for healthcare in the wake of devastating attacks that are now claiming their first victims. Find out from Zero Trust pioneers how hospitals can achieve a safe digital transformation

  2. 30 mins
    • Energy
12:20
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • GISEC Main Stage

    While the FBI stated to healthcare providers that their industry is not as resilient to cyber intrusions as retail and financial industries, healthcare entities are increasingly in the crosshairs of attackers who seek to cause business disruption, how are healthcare systems tapping the power of intelligence to prevent impending threats.

  2. Track Room
    40 mins
    • Energy
12:40
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • GISEC Main Stage
13:00
  1. Main Stage (Sheikh Saeed Hall)
    60 mins
    • GISEC Main Stage
  2. Track Room
    40 mins
    • Energy
13:40
  1. Track Room
    20 mins
    • Energy

    Let us find out how UEBA identify anomalous activity and pattern deviations through Machine Learning. Find answers to the question What is normal? to trigger automated risk response. UEBA arguably provides some of the most effective approach to manage and monitor user and entity centric risks in environments where third parties and remote access are increasingly common.

14:00
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • Healthcare
    • GISEC Main Stage

    According to Gartner more than 25 percent of cyberattacks in healthcare delivery organizations involve connected and digitally monitored implantable medical devices. Those are estimated to average over six vulnerabilities each. As ransomware attacks are on the rise, and hospitals already stressed by a global pandemic are choice targets for attackers – how can cyber security professionals keep patients safe when the first death by ransomware in history was already recorded.

  2. Track Room
    20 mins
    • Energy

    As emerging technologies are revolutionizing protection dynamics for both IT and OT in critical infrastructure, the ability to protect against malware, provide detection, and mitigation in environments where automated information exchanges are happening is paramount. What mechanisms can be utilized to protect the integrity and improve the overall security of IIoT.

14:20
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • Healthcare
    • GISEC Main Stage

    Consumers want personalised customer experience and service therefore they provide data to businesses and brands they trust. What is data ethics? Complying with data protection law is a business priority but beyond compliance, what are the practical implications and benefits of handling ethically customers data?

  2. Track Room
    30 mins
    • Energy

    Technology, processes, people – the challenges of building a strong Security Operations Centre in the midstream and gas sector.

14:50
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • Healthcare
    • GISEC Main Stage

    In the context of the COVID pandemic, telehealth has been instrumental for hospitals and clinics but virtual consultations have also made considerable room for cyber risk.The darkweb has seen an increase upwards of 140% of telehealth-related keywords in the last year. How are healthcare and cyber professionals minimizing the risk for organizations and patients?

  2. Track Room
    20 mins
    • Energy

    Plant managers and IT technicians traditionally occupy different parts of the organization. But as connected technology brings new industrial devices online, both sides must work together to mitigate cyber threats across the expanding attack surface.

15:10
  1. Main Stage (Sheikh Saeed Hall)
    30 mins
    • Healthcare
    • GISEC Main Stage

    You could not pick a more exposed and vulnerable industry then a nation’s healthcare system, changing conversations and concepts from CISO to a business enabler

  2. Track Room
    20 mins
    • Energy

    While educating employees to monitor for malicious or anomalous activity is important, organisations cannot solely rely on staff awareness to strengthen security. Companies must also defend against the multitude of insider threats.

15:30
  1. Track Room
    5 mins
    • Energy
15:40
  1. Main Stage (Sheikh Saeed Hall)
    20 mins
    • Healthcare
    • GISEC Main Stage

    Cloud security has evolved along with companies gaining more cloud maturity. The initial concept of cloud has given way to entire new ideas meaning that there is no fixed playbook regarding securing a safe cloud adoption.

    What are the lessons learned in cloud-native security practices and the latest trends?

16:00
  1. Main Stage (Sheikh Saeed Hall)
    5 mins
    • GISEC Main Stage

Supporters & Partners

OFFICIALLY SUPPORTED BY

UAE Cyber Security Council

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

Dubai Electronic Security Center Logo

dp

OFFICIAL DISTRIBUTION PARTNER

ISPIRE

OFFICIALLY SUPPORTED BY

Telecommunications Regulatory Authority

Official Smart City Partner

Strategic Sponsors & Partners

Strategic Partner

huawei

Strategic Partner

  • Recorded-Future---strategic-partner

Platinum sponsors

digital14

Secret Briefing Partner

rafael

Diamond sponsors

threat quotient

Attivo Networks - GISEC

XM Cyber - GISEC

Silver sponsors

bluvector

checkmarx-gisec

Darktrace-gisec

Recruitment Partner

cander-gisec

Industry & Association Partner

Germany Association Partner

TeleTrusT

Supporting Association

ISC2

Supporting Association

Russoft

Supporting Association

CSI Mumbai

India Pavilion Partner

Logo

Association Partner

techUJLogo

Knowledge Partner

Frost Logo

Association Partner

CyberWales

Exhibitors

 

Media Partners