GISEC Startups

   

GISEC Startups

Cybersecurity products, services and professionals have never been in higher demand than right now as governments and business across the world prioritise these technologies to protect the digital transformation. According to a study by CBInsights and PwC, cybersecurity startups received over $10.7 billion in funding in 2020. Cybersecurity Ventures expect cybercrime to cost the world $10.5 trillion annually by 2025. There remains a huge proportion of unfilled cybersecurity positions today, and the large number of security startups founded in recent years is contributing to the skills gap. Thanks to AI, machine learning and hackers, security startups are receiving significant funding to develop products that can help secure the shift to remote-first businesses, real-time visibility into cyber attacks and protect data as it moves through the cloud and IoT devices.  

GISEC Startups will assemble cybersecurity professionals, startups and investors to discuss how cybersecurity startups can secure businesses today as we move away from technologies widely used during the pandemic, and innovations in new and emerging technologies.

Loading
10:20
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups
10:30
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    There is no absolute security for an ICS in the world of evolving cyberthreats and ever-growing risks. Learn how you can improve your ICS visibility and minimize possible negative impact with CL DATAPK.

10:45
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    From the baseline of real-time Cyber Situational Awareness in million-node networks, Isophene bio-x will show how underlying cyber technologies for diverse data acquisition, automated analysis, and human-computer teaming can be applied to deliver bio-intelligence – for both know and as yet unknown pathogens – at global scale.

11:00
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Through practical and tactical security validation practices, we will demonstrate a new approach to risk-based remediation prioritization and how to shift from legacy security practices to risk-based strategies in order to continuously reduce exposure and increases security awareness that you can leverage to build a risk-based security strategy.

11:15
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Axioma cyber services is a boutique firm that specializes in incident response. Partnered with world renowned Mentalist, Ben Cale, we will demonstrate live Mind Hacking, and talk about how it related to securing your network.

11:30
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    The rising risks of airborne threats through the attack surfaces of WiFi, Bluetooth and IoT devices. Introducing Harmony IoT that monitors, detects and mitigates those threats, and comply with organizational policies and industry regulations.

11:45
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    As the CISO, Head of Security, or CTO of your organization, you’re probably well versed in just how difficult it can be to hire high-caliber cybersecurity talent. As the world makes headway in digital transformation, organisations of all sizes, from all industries are increasingly concerned with cybersecurity risks. Security failures can be detrimental to your business – whether it be compliance violations, reputational damage and economic fallout. Now, more than ever, hiring and retaining top cyber talent is paramount to your business. This session will look at the full cyber talent lifecycles:

    • Why do so many organisations face retention challenges in their cyber teams?
    • What are the main challenges faced when attracting top cyber talent?
    • How can efficiency be maximised in the talent acquisition process?
    • What role does education, training and mentorship have in encouraging next gen into cyber?
12:00
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups
    • A brief history: What is a “Man-in-the-Browser” attack?
    • Browser extensions – the new MITB frontier
    • Bypassing modern browser defense mechanisms
    • Malicious browser extensions’ techniques of evading detection
    • Defending against malicious browser extensions
12:15
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Resilience is not just cyber security. Using examples from real-world deployments, Resilio will show how technologies developed for cyber security have been successfully adapted to create and event-driven infrastructure that provides a single point-of-access to events as they emerge: both across the organisation and from the environment in which it operates.

12:25
  1. Start-up Stage (Sheikh Saeed Hall)
    20 mins
    • GISEC Startups
12:45
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Overlooking cybersecurity in favour of projects that have an immediate impact on business operations inevitably leads to unaddressed vulnerabilities and security misconfigurations in Active Directory. AD is a key component for corporates and nearly all threat actors and APT groups is targeting AD for gaining access to the crown jewels of a company. In this session, we will look at:

    • Active Directory – How is this the essential target for adversaries?
    • The Active Directory threat landscape
    • How APT groups are exploiting common AD features
    • Forestalling adversaries with FSProtect
13:00
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    In the time of social distancing, there has been a significant increase in the need for messaging apps in order to stay connected. The COVID-19 pandemic has only heightened the risks as we are living more of our lives online than ever before. Now is the time to be extra vigilant about digital security – for you and your children – as increased used can mean increased risk. Finally, a ‘verifiable chat application’, Dr. NEE which seeks to reduce these risks to children face when interacting with others via online chatting apps. Protecting them from cyberbullying and exploitation of personal and sensitive data is part of the societal change required. How has OMANEE changed society for the better?

13:15
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    When an incident occurs, your speed of response depends on having the right information available to the right people at the right time. This is as true for line of business operations as it is in the cyber security layer. Carnet Systems will show how big data and analytics can be used to cut through the complexity of available information; allowing you to understand incidents in context and response accordingly.

13:30
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    It doesn’t matter if you’re a CISO, Infrastructure Manager, MSSP or Helpdesk Manager; if the business is small, medium or large – Security automation is not a luxury anymore, it’s a life-saver. In this presentation we will discuss the importance of implementing the right security automation platform, and provide some tips on what you should be careful of, and demonstrate how simple it can be to start automating – with no previous skills required.

13:45
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups
    • The product security threat landscape, risks, and business challenges facing device manufacturers and asset owners
    • Implementing product security throughout the software development lifecycle (SDLC) and software supply chain
    • How our automated product security platform saves time, effort, money and friction for Dev and security teams while delivering the most secure products
14:00
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups
    • Overview of key emerging cyber risks in industrial networks
    • Challenges in implementing cyber security controls in the production lines
    • Using breach simulation for data-driven risk assessment in industrial networks
    • A customer use-case for implementing OT Cyber
    • Lessons learned from customer field deployments for successful OT Cyber deployment
14:15
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Securing your cloud environment using a cloud native product running in your environment will ensure not only that you get the most suited and effective solution, but will also help you save your cloud consumption costs. Learn how Reblaze’s unified cloud-native web security is designed to work seamlessly with all major cloud providers.

14:30
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Purpose-build for securing Active Directory, Semperis delivers first-of-its-kind solutions to address the entire lifecycle of a directory attack – from finding and fixing security vulnerabilities, intercepting privilege escalation and persistence, and quickly responding to ransomware and other data integrity emergencies.

14:45
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    If you’re like most organizations, you are heavily invested in the right set of security tools to help you keep ahead of rapidly evolving threats and compliance requirements. However, managing those tools is incredibly complex and time-consuming. How are you able to see coverage gaps with the security tools you are using? How do you know if the tools you have implemented are actually doing what you and your customers think they should be doing? What you need is a single solution that continuously monitors and reports on your security controls that can be easily managed from a single interface, integrates with your cybersecurity tools, and maps to the standards and frameworks that matter to your business.

    Join Shimon Becker, VP Product and Co-Founder Cyber Observer, to gain insight into how Cyber Observer with Continuous Controls Monitoring (CCM) empowers you to establish a measurable benchmark of cyber hygiene, continuously close critical security gaps, and advance your cybersecurity posture.

15:00
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    The OT Security Company for over 15 years, Waterfall Security Solutions continues to innovate solutions for today’s challenges. Join us to learn about today’s threats to critical infrastructure and industrial automation, as well as modern solutions to enable the enterprise.

15:15
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Firewall appliances, with last major innovation from some 13 years ago, are inadequate for modern data centers and hybrid clouds. The concept of a box – physical or virtual – contradicts the way applications and data centers are built and managed today. A new product category is emerging, of software-based, distributed and platform-agnostic micro-segmentation solutions. In this presentation, Dror Sal'ee will cover the main considerations for micro-segmentation solutions, to simplify project implementation, reduce time-to-policy and enhance resulting security.

15:30
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Oren Elimelech, Founder and CEO of CyberTeam360 brings his 25+ years of security and IT experience, with real life stories on Cyber Incidents and attack vectors which were observed during DFIR activity. Oren will provide you with five insights that will definitely reduce your exposure to Cyber Incidents and help you better prepare for your next Cyber Incident.

15:45
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups
16:00
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    In this session, Matthew Platten CISSP, will showcase the most common Phishing attacks methodology, and explain how this can easily be defeated by implementing either a Cloud base or within your infrastructure:

    • Strong Online Threat assessment
    • Mobile Protection
    • Risk Based Authentication
    • Transaction Monitoring Framework
16:15
  1. Start-up Stage (Sheikh Saeed Hall)
    10 mins
    • GISEC Startups

    Mobile threat space intensifies and challenges the benefits of mobility by imposing a risk of stealing money and altering business courses. In this session, you will gain invaluable insights on (1) modern mobile cyberattacks; (2) combating mobility state-of-mine, and (3) how to deploy defense controls fusion to protect mobile communications.

Supporters & Partners

OFFICIALLY SUPPORTED BY

UAE Cyber Security Council

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

Dubai Electronic Security Center Logo

dp

OFFICIAL DISTRIBUTION PARTNER

ISPIRE

OFFICIALLY SUPPORTED BY

Telecommunications Regulatory Authority

Official Smart City Partner

Strategic Sponsors & Partners

Strategic Partner

huawei

Strategic Partner

  • Recorded Future

Platinum sponsors

digital14

Microsoft

PCYSYS

Hiperdist

Diamond sponsors

threat quotient

Attivo Networks - GISEC

XM Cyber - GISEC

Secret Briefing Partner

Rafael - GISEC

XM Cyber - GISEC

Silver sponsors

armis

bluvector

checkmarx-gisec

Darktrace-gisec

SpearTip

Recruitment Partner

cander-gisec

Training Partner

sans institute

Industry & Association Partner

Germany Association Partner

TeleTrusT

Supporting Association

CSFI

Supporting Association

ISC2

Supporting Association

OIC

Supporting Association

Russoft

Supporting Association

CSI Mumbai

India Pavilion Partner

Logo

Association Partner

techUJLogo

Knowledge Partner

Frost Logo

Association Partner

CyberWales

Exhibitors

 

Media Partners