Important Notice: We are committed to providing you with a safe environment to do business, in accordance with all the health & safety guidelines set out by the local authorities. The event will be delivered with strict standards of health & safety precautionary measures including social distancing, contactless transactions and hygiene protocols. Learn More

Telecom

   

Telecom

Loading
12:50
  1. Track Room
    10 mins
    • Telecom
13:00
  1. Track Room
    30 mins
    • Telecom
13:30
  1. Track Room
    30 mins
    • Telecom

    The complexity of the communication and networking infrastructure is making investigation of cyber-attacks and data theft increasingly difficult and digital clues of illegal activities are often hidden under heaps of data. And while forensics methods cover challenging areas including stored data and filesystem analysis, network forensics, and reverse engineering – they now contend with the rise of antiforensics techniques. An exciting session to peep into the future of cyber forensics.

14:00
  1. Track Room
    30 mins
    • Telecom

    According to NSA guidelines , to be fully effective to minimize risk and enable robust and timely responses, Zero Trust principles and concepts must permeate most aspects of the network and its operations ecosystem. Is a full control of all that requests access realistic while remote work force and third parties are increasingly common in the work environment?

14:30
  1. Track Room
    40 mins
    • Telecom

      The impeding commoditisation of broadband connectivity is a major disruptive phenomenon that will impact the status quo, existing markets, lead to the demise of some service providers, cause loss of investments, narrowing of supply chains, potential obsolescence of   national broadband regulatory activities, loss of lucrative licencing income and threaten the sovereignty of many nations, particularly across the global south, in the sphere of broadband governance by late 2021.

15:10
  1. Track Room
    20 mins
    • Telecom

    Cloud security has evolved along with companies gaining more cloud maturity. The initial concept of cloud has given way to entire new ideas meaning that there is no fixed playbook regarding securing a safe cloud adoption.

    What are the lessons learned in cloud-native security practices and the latest trends?

15:30
  1. Track Room
    30 mins
    • Telecom

    In 2021, over 27 billion IoT devices are in use around the world. And the number still increases. The uninterrupted data sharing, while creating tremendous value is seeing the emergence of security concerns for telecom operators as IoT is now a commercial must for a lot of industries.

Supporters & Partners

OFFICIALLY SUPPORTED BY

UAE Cyber Security Council

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

Dubai Electronic Security Center Logo

dp

OFFICIAL DISTRIBUTION PARTNER

ISPIRE

OFFICIALLY SUPPORTED BY

Telecommunications Regulatory Authority

Official Smart City Partner

Strategic Sponsors & Partners

Strategic Partner

huawei

Strategic Partner

  • Recorded Future

Platinum sponsors

digital14


PCYSYS

Secret Briefing Partner

rafael

Diamond sponsors

threat quotient

Attivo Networks - GISEC

XM Cyber - GISEC

Silver sponsors

bluvector

checkmarx-gisec

Darktrace-gisec

Recruitment Partner

cander-gisec

Training Partner

sans institute

Industry & Association Partner

Germany Association Partner

TeleTrusT

Supporting Association

CSFI

Supporting Association

ISC2

Supporting Association

OIC

Supporting Association

Russoft

Supporting Association

CSI Mumbai

India Pavilion Partner

Logo

Association Partner

techUJLogo

Knowledge Partner

Frost Logo

Association Partner

CyberWales

Exhibitors

 

Media Partners