Co-organised by

United Arab Emirates Ministry of Interior

Forums Agenda

Speakers

VIEW ALL

Loading
14:00
  1. 30 mins
    • Techtalks
    Distributed Deception Platforms are a core technology for advanced threat detection, automating investigations, and incident response. Change the game on attackers by closing the detection deficit.
14:30
  1. 120 mins
    • Certified Workshop
    Based on the (ISC)2 CISSP Certification – the Gold Standard in the Information Security Industry -  this workshop will cover the key principles every security professional should understand about the Security & Risk Management, covering aspects of: Security, Risk, Compliance, Law, Regulations, and Business Continuity.
  2. 120 mins
    • Exchange Forum
    Free-to-attend for all visitors
  3. 30 mins
    • Techtalks
    Ransomware - an ugly strain of malware that can creep into your organisation via email and lock down your networks, systems and devices until a ransom is paid – is on the rise.
15:00
  1. 30 mins
    • Techtalks
    Clarification on the term intelligence and its marketed usage vs real meaning with  examples. With a demo of how to apply Intelligence within Cyber Defense.
15:30
  1. 30 mins
    • Techtalks
    GDPR or General Data Protection Regulation (GDPR) is the European Union’s new data protection legislation which would come into effect from 25th May 2018.
10:15
  1. 20 mins
    • Exchange Forum
  2. 20 mins
  3. 120 mins
    • CISO Roundtables
    • Exchange Forum
    Closed-door event subject to eligibility and pre-booking.
    Cybersecurity Landscape, as well as CISOs role, is evolving. The advanced sophisticated attacks by well-organized cyber adversaries are posing unseen challenges to organizations.
  4. 30 mins
    • Techtalks
    With the significant changes in how IT deliver computer power and services into today’s modern IT environments, adding a layer of governance increasingly hard of overstretched security teams.
10:45
  1. 30 mins
    • Techtalks
    Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats How new immune system technologies enable you to pre-empt emerging threats and reduce inciden ...
11:05
  1. 25 mins
    • Exchange Forum
    Best practice in anticipating, preparing for and responding to a cyber breach event
11:50
  1. 10 mins
    • Exchange Forum

    Are Today’s Resiliency, Continuity & Cyber Security Strategies the Dinosaurs of the 21st Century?

12:15
  1. 30 mins
    • Techtalks
    The cyber threat landscape is evolving and over the last year we have seen cyber-attacks wreaking havoc on some of the world’s largest companies and most prominent organisations, costing them data, money, productivity and reputation.
12:30
  1. 30 mins
    • Exchange Forum
12:45
  1. 30 mins
    • Techtalks
    Unlike malware analysis , CDR technology does not determine or detect malware's functionality, but a technology that extract all file components that are approved within the system's definitions and policies and creates a new safe document
14:00
  1. 60 mins
    • Exchange Forum
    Electronic & Cyber recruitment
  2. 30 mins
    • Techtalks
14:30
  1. 30 mins
    • Techtalks
    Rapid growth of complex, coordinated threats is outpacing the ability of many organizations to protect themselves.
15:00
  1. 120 mins
    • Certified Workshop

    Based on the (ISC)2 SSCP Certification – the Gold Standard in the Information Security Industry -  this workshop will cover the key principles every security practitioner should understand about Security Incident Handling, Response, and Recovery, covering aspects of: Foundational Concepts of incident handling, Incident Response, Investigations, Business Continuity, and Disaster Recovery.

  2. 120 mins
    • Exchange Forum
    Free-to-attend for all visitors
  3. 30 mins
    • Techtalks
15:30
  1. 30 mins
    • Techtalks
    Software-Defined Wide Area Networking (SD-WAN) is a revolutionary way to approach the simplification of branch office networking and assure optimal application performance by using centrally controlle ...
16:00
  1. 30 mins
    • Techtalks
    Enterprise Mobility is a significant factor of productivity of companies and organizations.
10:40
  1. 50 mins
    • Exchange Forum
11:30
  1. 60 mins
    • Exchange Forum

    Resiliency, Continuity & Cyber Security Strategies Are Today. The Dinosaurs of 21st Century! Why?

12:15
  1. 30 mins
    • Techtalks
    It is often not about what came in but what has been left behind. With breaches in the news quite so often, post-breach damage mitigation technologies is as important as the pre-execution ones.
13:00
  1. 90 mins
    • CISO Roundtables
    • Exchange Forum
    Closed-door event
    This discussion is hosted by (ISC)2’s EMEA Advisory Council (EAC) to provide an opportunity to discuss the state of security management with peers and share your insights as part of an effort to advance the development of the cybersecurity practice. Notes will be taken and shared with attendees and interested audiences but participants will not be identified. Light refreshments will be served following the session providing an informal opportunity to network and carry on discussions.
14:00
  1. 30 mins
    • Techtalks
    The ever-increasing compliance pressure to set strong safeguards around customer data is dramatically changing the face of cybersecurity landscape and policies.
15:00
  1. 30 mins
    • Techtalks
  2. 60 mins
    • Exchange Forum
    • Global Security Network Session
    The goal of this presentation is to explain the challenges and the lessons learned when implementing the zones & conduits concept from IEC 62443-3-3 within three Critical Infreastructure organizations.
15:30
  1. 30 mins
    • Techtalks
    Cloud managed switch for better convenient network management.

Co-Located & Featured

  • ISNR
  • ME3S
  • EmDi