CONTINUE NETWORKING! LOGIN TO BUSINESS CONNECT

Infosecurity Middle East 2018

Co-located

ISNR

Co-organised by

United Arab Emirates Ministry of Interior

Forums Agenda

Speakers

VIEW ALL

Loading
13:00
  1. 90 mins
    • Exchange Forum
    Live Hacking sessions: SQL Injection - one of the most common code injection techniques, Android and WiFi attacks (for a demo and educational purposes only) Presentation: The CompTIA Cyber Security Ca ...
  2. 30 mins
    • Techtalks
13:30
  1. 30 mins
    • Techtalks
    Software-Defined Secure Network (SDSN) provides end-to-end network visibility, allowing enterprises to secure their entire network, both physical and virtual.
14:30
  1. 120 mins
    • Exchange Forum
    Synopsis: Based on the (ISC)2 CISSP Certification – the Gold Standard in the Information Security Industry -  this workshop will cover the key principles every security professional should understand ...
  2. 30 mins
    • Techtalks
15:00
  1. 30 mins
    • Techtalks
    Clarification on the term intelligence and its marketed usage vs real meaning with  examples. With a demo of how to apply Intelligence within Cyber Defense.
15:30
  1. 30 mins
    • Techtalks
    GDPR or General Data Protection Regulation (GDPR) is the European Union’s new data protection legislation which would come into effect from 25th May 2018. This replaces the previous EU Data Protection ...
16:30
  1. 30 mins
    • Techtalks
    Information Security departments are spending increasing amounts, and contributing more resources to standards compliance & security controls, but yet there’s no guarantee of being safe and secure. Is ...
10:15
  1. 20 mins
    • Exchange Forum
    Official Government keynote 
  2. 20 mins
  3. 120 mins
    • Exchange Forum
    • CISO Roundtables
    Closed-door event subject to eligibility and pre-booking.
    Located in Government Buyers Lounge.

     
  4. 30 mins
    • Techtalks
    With the significant changes in how IT deliver computer power and services into today’s modern IT environments, adding a layer of governance increasingly hard of overstretched security teams. Join Abd ...
10:45
  1. 30 mins
    • Techtalks
    Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats How new immune system technologies enable you to pre-empt emerging threats and reduce inciden ...
11:50
  1. 10 mins
    • Exchange Forum

    Are Today’s Resiliency, Continuity & Cyber Security Strategies the Dinosaurs of the 21st Century?

12:15
  1. 30 mins
    • Techtalks
    The cyber threat landscape is evolving and over the last year we have seen cyber-attacks wreaking havoc on some of the world’s largest companies and most prominent organisations, costing them data, mo ...
12:45
  1. 30 mins
    • Techtalks
    Unlike malware analysis , CDR technology does not determine or detect malware's functionality But, a technology that extract all file components that are approved within the system's definitions and p ...
13:00
  1. 60 mins
    • Exchange Forum
13:15
  1. 45 mins
    • Techtalks
14:00
  1. 30 mins
    • Exchange Forum
    Digital Forensics awareness workshops
  2. 30 mins
    • Techtalks
    Enterprise Mobility is a significant factor of productivity of companies and organizations. It’s a component of digital transformation in every enterprise.  The challenge is to provide tools to make w ...
14:30
  1. 30 mins
    • Exchange Forum
    Looking at Infrastructure and the evolving threats that face the Middle East and other countries in sectors such as the Financial Services and Telecommunications industry. This presentation will cover ...
  2. 30 mins
    • Techtalks
    Rapid growth of complex, coordinated threats is outpacing the ability of many organizations to protect themselves. Point products can stop individual elements of an attack, but they don’t work togethe ...
15:00
  1. 120 mins
    • Exchange Forum
    Synopsis: Based on the (ISC)2 SSCP Certification – the Gold Standard in the Information Security Industry -  this workshop will cover the key principles every security practitioner should understand a ...
  2. 30 mins
    • Techtalks
15:30
  1. 30 mins
    • Techtalks
    Software-Defined Wide Area Networking (SD-WAN) is a revolutionary way to approach the simplification of branch office networking and assure optimal application performance by using centrally controlle ...
10:00
  1. 10 mins
    • Techtalks
10:45
  1. 30 mins
    • Techtalks
    • Artificial Intelligence
11:30
  1. 60 mins
    • Exchange Forum

    Resiliency, Continuity & Cyber Security Strategies Are Today. The Dinosaurs of 21st Century! Why?

12:15
  1. 30 mins
    • Techtalks
    It is often not about what came in but what has been left behind. With breaches in the news quite so often, post-breach damage mitigation technologies is as important as the pre-execution ones.
12:45
  1. 30 mins
    • Techtalks
    In order to support digital transformation and comply with the new regulations, organizations absolutely need better visibility and stronger control on their environment. Moreover, the greatest risks ...
13:00
  1. 90 mins
    • Exchange Forum
    • CISO Roundtables
    Closed-door event
    This discussion is hosted by (ISC)2’s EMEA Advisory Council (EAC) to provide an opportunity to discuss the state of security management with peers and share your insights as part of an effort to advance the development of the cybersecurity practice. Notes will be taken and shared with attendees and interested audiences but participants will not be identified. Light refreshments will be served following the session providing an informal opportunity to network and carry on discussions.
13:15
  1. 45 mins
    • Techtalks
14:00
  1. 30 mins
    • Techtalks
    NESA regulations, GDPR, PCI-DSS…The ever-increasing compliance pressure to set strong safeguards around customer data is dramatically changing the face of cybersecurity landscape and policies. For mos ...
15:00
  1. 30 mins
    • Techtalks
  2. 60 mins
    • Exchange Forum
    • Global Security Network Session
    The goal of this presentation is to explain the challenges and the lessons learned when implementing the zones & conduits concept from IEC 62443-3-3 within three Critical Infreastructure organizations ...
15:30
  1. 30 mins
    • Techtalks
    Cloud managed switch for better convenient network management.

Co-Located & Featured

  • ISNR
  • ME3S
  • EmDi