Important Notice: We are committed to providing you with a safe environment to do business, in accordance with all the health & safety guidelines set out by the local authorities. The event will be delivered with strict standards of health & safety precautionary measures including temperature screening, social distancing, contactless transactions and hygiene protocols. Learn More

2020 X-Labs Agenda

   

2020 X-Labs Agenda

Free-to-attend sessions

Loading
11:00
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
    Quick overview of phishing campaigns: Living off the land, Privilege escalation and Data exfiltration
11:40
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
12:20
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
    Banking injects are popular and powerful tools for performing fraud. How these attacks are performed, who are the primary developers? During this session we will look under the hood of a real life banking trojan, and talk about mitigation steps that financial organisations can take.
13:00
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
13:40
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
14:20
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
15:00
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
15:40
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
    The battle between the CIO and CISO and the checks and balances they hold over each other is fast becoming superseded by the need to secure data at source and augment the role of tomorrow's CIO to incorporate security
16:20
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
11:00
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
    Nikhil will demonstrate how simple it is to sneak a peek into the vast mine of data within our personal computing devices without leaving a coherent trail. He will illustrate how hackers silently infiltrate our privacy. The vulnerabilities of our device(s) opens up the possibilities of data theft, spying and can potentially even lead to bricking of our lives.
11:40
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
12:20
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
13:00
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
14:20
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
15:00
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
15:40
  1. X-Labs Security Stage (Hall 2)
    40 mins
    • Security: X Labs
11:00
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
    Demonstrating how SIEM and SOAR will soon evolve into a single tool for security departments to manage. The future of SIEM will provide two-way communication between the devices sourcing log and event data. Having a way to communicate back to the source device provides opportunities to use AI and automation to find a solution to a security issue, as well as remediate it without human intervention
11:40
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
12:20
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
13:00
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
13:40
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
14:20
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
15:00
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
15:40
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
16:20
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
11:00
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
11:40
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
12:20
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
13:20
  1. X-Labs Security Stage (Hall 2)
    40 mins
    • Security: X Labs
14:20
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
15:00
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
15:40
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
11:00
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
11:40
  1. X-Labs Security Stage (Hall 2)
    40 mins
    • Security: X Labs
12:40
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs
13:00
  1. X-Labs Security Stage (Hall 2)
    20 mins
    • Security: X Labs

Supporters & Partners

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

Dubai Electronic Security Center Logo

dp

OFFICIAL DISTRIBUTION PARTNER

ISPIRE

OFFICIALLY SUPPORTED BY

Telecommunications Regulatory Authority

Official Smart City Partner

Strategic Sponsors & Partners

Strategic Partner

microsoft

Official Digital Partner

etisalat_gisec

Strategic Partner

  • Recorded-Future---strategic-partner

Platinum sponsors

google platinum


cs
 

Diamond sponsors

Diamond Sponsor

rapid seven

Diamond Sponsor

Attivo Networks - GISEC

Diamond Sponsor

Attivo Networks - GISEC

Silver sponsor

webroot-gisec

Industry & Association Partner

Germany Association Partner

TeleTrusT

India Pavilion Partner

Logo

Association Partner

Logo

Knowledge Partner

Frost Logo

Exhibitors

 

Media Partners