Today’s security leaders are examining cybersecurity through a strategic-, business-, and industry-focused lens. Ensuring efficient and effective security across the entire enterprise is a necessity at a time when networks are evaporating, endpoints are proliferating, and relentless adversaries are continually adapting their tactics, techniques, and procedures.
Organizations across the Middle East, Turkey, and Africa (META) region are increasingly looking to enable comprehensive threat detection and response, all while elevating their level of cybersecurity maturity. According to a recent IDC survey, 54% of Saudi CIOs have embedded cybersecurity into the planning, initiation, and assessment phases of all new business initiatives.
As the market matures and regulatory compliance becomes increasingly critical, this event will provide a timely platform for industry experts to highlight transformative technologies, analyze the evolving threat landscape, and examine the increasingly sophisticated nature of cyberattacks that enterprises of the future must consider.
IDC Keynote: Elevating the Security of the Future Enterprise
Uzair Mujtaba
Program Manager — IDC Saudi Arabia
Digital transformation has become a major disruptor of how companies operate today, and its importance is only growing with time. As companies increasingly turn toward technology to drive and innovate their business models, they become more vulnerable to cyberattacks from hackers and other malicious actors who are now innovating their attack vectors in parallel. Recent research has revealed that developing security and resilience excellence — through establishing security operations and enhancing security skills and processes — is the biggest strategic investment planned by 58% of CIOs and CISOs over the coming two years. While striving for greater efficiency, agility, and speed is a major priority, the lack of skills needed to navigate the constantly evolving cybersecurity landscape presents its challenges, and finding the right balance sets apart successful and well thought out cybersecurity strategies.
Cybersecurity remains at the top of every organization’s agenda. This keynote session will explore how public and private sector organizations, both large and small, address today’s most prominent security challenges. It will examine how they are securing the software supply chain, utilizing zero trust approaches, guarding against ransomware and other threats, and ensuring cloud governance and digital sovereignty. Whether transforming digitally in the cloud or operating mixed infrastructure, participants will learn about the latest security strategies to guarantee a safer future.
Ask Question and Stand a Chance to Win e-gift Voucher
9:5510:10
Securing Modern Applications: What You Need to Know Now
Shabir Bhat
Regional Sales Director, Checkmarx
Ask Question and Stand a Chance to Win e-gift Voucher
10:1010:25
Confronting the New Wave of Cyberattacks
Werno Gevers
Regional Manager (Middle East), Mimecast
Have companies begun to take cybersecurity more seriously? The State of Email Security 2022 findings stress the importance of a cyber resilience strategy, layered defenses, cyber awareness training, and the use of AI/ML for protection in the new digital landscape. With the number of publicly reported data breaches soaring past last year’s total, 2021 appears to be the worst year on record for cybersecurity.
Ask Question and Stand a Chance to Win e-gift Voucher
10:2510:40
Proactive Security and Self-Healing Solutions: Enabling the Best Possible User Experiences for the Future of Work
Emad Haffar
Head of Presales (META), Kaspersky Lab
Ask Question and Stand a Chance to Win e-gift Voucher
10:4011:10
Networking Tea & Coffee Break
11:1011:25
Keeping Your Enterprise Business Safe with Security-First Cloud Infrastructure
Dragan Petkovic
Cloud Security Advisor, Oracle EMEA
Cloud security and compliance have always been key concerns for Saudi CISOs and CIOs keen to embark their organizations on a transformation journey to the cloud. Many businesses in the Kingdom have either moved or are planning to move their mission-critical workloads to the cloud for the values it brings, such as high performance and real-time elasticity for enterprise applications.
Hybrid cloud is also a popular option for organizations that have specific requirements for data sovereignty, security, latency, and field deployability. As enterprises continue to adopt new cloud services, they require more sophisticated capabilities to secure their entire cloud footprint. Partnering with a trusted cloud provider can bolster your enterprise's security and compliance posture with the latest defense-in-depth security designs.
Compliance with local regulations is also a key requirement for regulated industries such as the financial services, public, and telecommunications sectors. It imperative for organizations in these sectors to understand how their cloud provider caters for compliance with regulatory frameworks.
Join this session to learn more on:
• How your organization can better comply with national regulatory frameworks in Saudi Arabia enforced by regulators such as MCIT, NCA, SAMA, and CMA, along with international regulations and standards
• How you can implement and manage consistent security, identity, and access management policies across the hybrid datacenters while maintaining compliance
• How Saudi enterprises and organizations are managing their security and compliance in the cloud
Ask Question and Stand a Chance to Win e-gift Voucher
11:2511:40
Managed Cyber Defense – When Professionals fight Professionals
Safwan Akram
MSS Director, Help AG
Cybercrime has turned into a booming business, with professional attackers leveraging advanced methods to devise and deploy increasingly sophisticated attacks that exploit the exponential digitalization of everything and the growing dependency on IT systems. Such attackers cost the global economy billions of dollars annually. In this context, it is not about if, but when, an incident happens. This session will consequently highlight the importance of a future-forward security operations center transformation. Such a transformation ensures effective incident response in the fight against advanced adversaries and builds resiliency in the cyber age.
Ask Question and Stand a Chance to Win e-gift Voucher
11:4011:55
Streamlining People, Processes, and Technology in the SOC
Roland Daccache
Systems Engineering Manager, MEA, CrowdStrike
Ask Question and Stand a Chance to Win e-gift Voucher
11:5512:10
Incorporating Emerging Technologies into Identity and Access Management
Ask Question and Stand a Chance to Win e-gift Voucher
12:1013:00
Networking Lunch Break
13:0014:00
Track Sessions (Parallel Sessions)
Cloud Security: Risk, Resilience, and Governance
13:00 - 13:15
Managing the Proportionate Growth of Cloud Complexity and the Attack Surface
Tamer Odeh
Regional Director, Middle East, SentinelOne
13:15 - 13:30
Implementing a Holistic Strategy towards Cloud Security
Irene Selia
Head of Global Development, ClearSkies™, Odyssey
13:30 - 13:45
Defense in Concert: Evolving Your SecOps Strategy
Gopan Sivasankaran
General Manager (META), Secureworks
Defense in Concert: Evolving Your SecOps Strategy
Without the right integration between your security
technologies, you cannot gain the necessary context to act against today’s
threats. So, how can you get a holistic view of your security infrastructure?
And how can the right blend of people, processes, strategies, and technologies
help maximize your overall defence? In this session, you will learn how a
“defense-in-concert” approach to security can make all the difference when
outmanoeuvring today’s threat actors. You will understand why additional
security layers do not necessary equate to a stronger defence and discover how
to gain better visibility, context, and collaboration across your IT ecosystem.
Finally, you will examine all the ways to modernize your security operations
and improve threat detection and response.
13:45 - 14:00
Novel strategies to protect against the rise of Ransomware as a Service (RaaS)
Marwan AlHuthail
Enterprise Sales Manager, Saudi Arabia, Veeam Software
Endpoint Security: The Future of Trust
13:00 - 13:15
Elevating the Organization’s Cybersecurity Maturity
Jawad Khalil
Program Manager, Telecoms KSA, IDC
13:15 - 13:30
Elevating Prevention in Your Organization’s Endpoint Security Stack
13:30 - 13:45
Why XDR is a must have security tool for today’s organizations
13:45 - 14:00
The Increased Integration and Bundling of Endpoint Management and Security Technologies
Going Beyond Perimeter-Based Security: Securing the Ever-Expanding Digital Footprint
13:00 - 13:15
Transforming Cybersecurity to be a Value Enabler
Transforming Cybersecurity to be a Value Enabler
As the business evolves to become a digital-ready or digital-first entity, the cybersecurity function must transform from a cost center and inhibitor of progress to a value enabler and facilitator of change by navigating and accelerating cybersecurity transformation through the use of best-of-breed security technology and services
13:15 - 13:30
Identifying and Mitigating the Organization’s Security Gaps
Identifying and Mitigating the Organization’s Security Gaps
In the post-COVID pandemic world, resiliency is the name of the game for many organizations that are prepared to step back for a moment, identify their gaps, identify creative ways of mitigating these gaps, and establish a foundation for the next wave of transformative business initiatives.
13:30 - 13:45
Building Resiliency Against Ransomware and Supply Chain Attacks
Building Resiliency Against Ransomware and Supply Chain Attacks
In the past two years, organizations have invested in and spent most of their time with digital transformation efforts to the detriment of cybersecurity. As cybersecurity takes the front seat along with supply chain risks and regulations, organizations will be able to focus more attention to making themselves more resilient to ransomware and supply chain attacks.
13:45 - 14:00
OT/IT Continue to Converge and What it Means for your Organization’s Security Strategy
Bridging the Security Skills Gap: Human & AI Threat Intel Working Together
13:00 - 13:15
AI Enhanced security in Intelligent Digital Workspace Ecosystems
AI Enhanced security in Intelligent Digital Workspace Ecosystems
The intelligent digital workspace ecosystem offers an integrated user experience, augmented by cognitive technologies such as artificial intelligence, machine learning, and advanced analytics. It provides a secure, personalized, and federated view of the resources that workers require to do their jobs, including collaborators as well as applications and data, from anywhere via any device. AI is making intelligent digital workspaces fully observable and optimizable by IT and security operations professionals, enabling
secure access while driving improved productivity and a better worker experience.
13:15 - 13:30
Utilizing AI Enhancements for Anomalous Behavior and Threat Detection
Utilizing AI Enhancements for Anomalous Behavior and Threat Detection
The sophistication of cyberattacks is evolving quickly and state sponsored attackers and those leveraging adversarial AI can bypass traditional defenses, blend into the environment and remain undetected as long as necessary to carry out malicious objectives. Detecting these clandestine assaults requires complete visibility, vigilant monitoring, and a complete understanding of what is considered normal behavior in your environment. Today’s security professionals require a combination of traditional signature-based detections as well as AI-informed anomaly tracking and detection to keep up with the threat landscape.
13:30 - 13:45
The Growing Promise of AI-powered Cloud Security Tools
The Growing Promise of AI-powered Cloud Security Tools
In recent years, traffic across all networks and media has increased exponentially. The fundamental idea of leveraging AI for cloud security platforms is that it can analyze network traffic and identify anomalous (and potentially malicious)activity way before a human can, and with much greater scale, speed, and accuracy. The emphasis is on human augmentation and human in the loop for decision making. Strategically, AI can make an accurate risk assessment for a particular company based on huge, detailed data sets and support what-if analysis.
13:45 - 14:00
Ensuring Data Quality and Security with AI
Ensuring Data Quality and Security with AI
Security and privacy are persistent challenges for organizations adopting analytics and AI. How should CIOs and other technology leaders prepare in order to address diverse stakeholder security and privacy concerns and align strategies and capabilities across their organizations.
Cloud Security: Risk, Resilience, and Governance
13:00 - 13:15
Managing the Proportionate Growth of Cloud Complexity and the Attack Surface
13:00 - 13:15
Managing the Proportionate Growth of Cloud Complexity and the Attack Surface
Tamer Odeh
Regional Director, Middle East, SentinelOne
13:15 - 13:30
Implementing a Holistic Strategy towards Cloud Security
13:15 - 13:30
Implementing a Holistic Strategy towards Cloud Security
Irene Selia
Head of Global Development, ClearSkies™, Odyssey
13:30 - 13:45
Defense in Concert: Evolving Your SecOps Strategy
13:30 - 13:45
Defense in Concert: Evolving Your SecOps Strategy
Without the right integration between your security
technologies, you cannot gain the necessary context to act against today’s
threats. So, how can you get a holistic view of your security infrastructure?
And how can the right blend of people, processes, strategies, and technologies
help maximize your overall defence? In this session, you will learn how a
“defense-in-concert” approach to security can make all the difference when
outmanoeuvring today’s threat actors. You will understand why additional
security layers do not necessary equate to a stronger defence and discover how
to gain better visibility, context, and collaboration across your IT ecosystem.
Finally, you will examine all the ways to modernize your security operations
and improve threat detection and response.
Gopan Sivasankaran
General Manager (META), Secureworks
13:45 - 14:00
Novel strategies to protect against the rise of Ransomware as a Service (RaaS)
13:45 - 14:00
Novel strategies to protect against the rise of Ransomware as a Service (RaaS)
Marwan AlHuthail
Enterprise Sales Manager, Saudi Arabia, Veeam Software
Endpoint Security: The Future of Trust
13:00 - 13:15
Elevating the Organization’s Cybersecurity Maturity
13:00 - 13:15
Elevating the Organization’s Cybersecurity Maturity
Jawad Khalil
Program Manager, Telecoms KSA, IDC
13:15 - 13:30
Elevating Prevention in Your Organization’s Endpoint Security Stack
13:30 - 13:45
Why XDR is a must have security tool for today’s organizations
13:45 - 14:00
The Increased Integration and Bundling of Endpoint Management and Security Technologies
Going Beyond Perimeter-Based Security: Securing the Ever-Expanding Digital Footprint
13:00 - 13:15
Transforming Cybersecurity to be a Value Enabler
13:00 - 13:15
Transforming Cybersecurity to be a Value Enabler
As the business evolves to become a digital-ready or digital-first entity, the cybersecurity function must transform from a cost center and inhibitor of progress to a value enabler and facilitator of change by navigating and accelerating cybersecurity transformation through the use of best-of-breed security technology and services
13:15 - 13:30
Identifying and Mitigating the Organization’s Security Gaps
13:15 - 13:30
Identifying and Mitigating the Organization’s Security Gaps
In the post-COVID pandemic world, resiliency is the name of the game for many organizations that are prepared to step back for a moment, identify their gaps, identify creative ways of mitigating these gaps, and establish a foundation for the next wave of transformative business initiatives.
13:30 - 13:45
Building Resiliency Against Ransomware and Supply Chain Attacks
13:30 - 13:45
Building Resiliency Against Ransomware and Supply Chain Attacks
In the past two years, organizations have invested in and spent most of their time with digital transformation efforts to the detriment of cybersecurity. As cybersecurity takes the front seat along with supply chain risks and regulations, organizations will be able to focus more attention to making themselves more resilient to ransomware and supply chain attacks.
13:45 - 14:00
OT/IT Continue to Converge and What it Means for your Organization’s Security Strategy
Bridging the Security Skills Gap: Human & AI Threat Intel Working Together
13:00 - 13:15
AI Enhanced security in Intelligent Digital Workspace Ecosystems
13:00 - 13:15
AI Enhanced security in Intelligent Digital Workspace Ecosystems
The intelligent digital workspace ecosystem offers an integrated user experience, augmented by cognitive technologies such as artificial intelligence, machine learning, and advanced analytics. It provides a secure, personalized, and federated view of the resources that workers require to do their jobs, including collaborators as well as applications and data, from anywhere via any device. AI is making intelligent digital workspaces fully observable and optimizable by IT and security operations professionals, enabling
secure access while driving improved productivity and a better worker experience.
13:15 - 13:30
Utilizing AI Enhancements for Anomalous Behavior and Threat Detection
13:15 - 13:30
Utilizing AI Enhancements for Anomalous Behavior and Threat Detection
The sophistication of cyberattacks is evolving quickly and state sponsored attackers and those leveraging adversarial AI can bypass traditional defenses, blend into the environment and remain undetected as long as necessary to carry out malicious objectives. Detecting these clandestine assaults requires complete visibility, vigilant monitoring, and a complete understanding of what is considered normal behavior in your environment. Today’s security professionals require a combination of traditional signature-based detections as well as AI-informed anomaly tracking and detection to keep up with the threat landscape.
13:30 - 13:45
The Growing Promise of AI-powered Cloud Security Tools
13:30 - 13:45
The Growing Promise of AI-powered Cloud Security Tools
In recent years, traffic across all networks and media has increased exponentially. The fundamental idea of leveraging AI for cloud security platforms is that it can analyze network traffic and identify anomalous (and potentially malicious)activity way before a human can, and with much greater scale, speed, and accuracy. The emphasis is on human augmentation and human in the loop for decision making. Strategically, AI can make an accurate risk assessment for a particular company based on huge, detailed data sets and support what-if analysis.
13:45 - 14:00
Ensuring Data Quality and Security with AI
13:45 - 14:00
Ensuring Data Quality and Security with AI
Security and privacy are persistent challenges for organizations adopting analytics and AI. How should CIOs and other technology leaders prepare in order to address diverse stakeholder security and privacy concerns and align strategies and capabilities across their organizations.
VMware software powers the world’s complex digital infrastructure. The company’s cloud, app modernization, networking, security, and digital workspace offerings help customers deliver any application on any cloud across any device. Headquartered in Palo Alto, California, VMware is committed to being a force for good, from its breakthrough technology innovations to its global impact. http://www.vmware.com
Platinum Partner
Checkmarx
Checkmarx is constantly pushing the
boundaries of Application Security Testing to make security seamless and simple
for the world’s developers while giving CISOs the confidence and control they
need. As the AppSec testing leader, we provide the industry’s most
comprehensive solutions, giving development and security teams unparalleled
accuracy, coverage, visibility, and guidance to reduce risk across all
components of modern software – including proprietary code, open source, APIs,
and Infrastructure as code. Over 1,675 customers, including 45% of the Fortune
50, trust our security technology, expert research, and global services to
securely optimize development at speed and scale.
Platinum Partner
Mimecast
Mimecast (NASDAQ: MIME) was born in 2003 with a focus on delivering relentless protection. Each day, we take on cyber disruption for our tens of thousands of customers around the globe; always putting them first, and never giving up on tackling their biggest security challenges together. We are the company that built an intentional and scalable design ideology that solves the number one cyberattack vector – email. We continuously invest to thoughtfully integrate brand protection, security awareness training, web security, compliance and other essential capabilities. Mimecast is here to help protect large and small organizations from malicious activity, human error and technology failure; and to lead the movement toward building a more resilient world.
Platinum Partner
Platinum Partner
Oracle
At Oracle, our mission is to help people see data in new ways, discover insights, unlock endless possibilities. For more than four decades, Oracle has delivered innovation upon which entire industries have been built.
The Oracle Cloud offers a complete suite of integrated applications for Sales, Service, Marketing, Human Resources, Finance, Supply Chain and Manufacturing, plus Highly Automated and Secure Generation 2 Infrastructure featuring the Oracle Autonomous Database. For more information about Oracle, please visit us at www.oracle.com .
Platinum Partner
Help AG
Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security services and solutions that address their diverse requirements, enabling them to evolve securely with a competitive edge.
Platinum Partner
CrowdStrike
CrowdStrike is the leader in cloud-delivered endpoint protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver real-time protection and actionable intelligence from Day One. It seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 [x-apple-data-detectors] managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed.
CrowdStrike Falcon protects customers against all cyber attack types, using sophisticated signatureless AI and Indicator-of-Attack (IoA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates 1 trillion security events a week from across the globe to immediately prevent and detect threats.
There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.
Gold Partner
SentinelOne
SentinelOne is the only cybersecurity solution encompassing AI-powered prevention, detection, response and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous XDR platform. With SentinelOne, organizations gain full transparency into everything happening across the network at machine speed – to defeat every attack, at every stage of the threat lifecycle. To learn more visit www.sentinelone.com or follow us at @SentinelOne, on LinkedIn or Facebook.
Gold Partner
SecureWorks and Redington
About
Secureworks
Secureworks
(NASDAQ: SCWX) is a global cybersecurity leader that protects customer progress
with Secureworks® Taegis™, a cloud-native security analytics platform built on
20+ years of real-world threat intelligence and research, improving customers’
ability to detect advanced threats, streamline and collaborate on
investigations, and automate the right actions.
Redington Value is the Value-Added Distribution
division of Redington Gulf, the largest distributor of IT products in Middle
East and Africa. Redington Value helps its partners in the channel deliver the
most optimal IT solution to their customers in Middle East and Africa. These
solutions span across technology domains such as Networking, Voice, Servers,
Storage, Software, Security and Infrastructure and emerging technology brackets
such as Hyper convergence, Cloud Computing and Big Data Analytics. With over 60
vendor relationships in various parts of Middle East and Africa we ensure that
all the requirements of the channel are met under one-roof.
Odyssey empowers you to build a Cyber Resilient organization through a holistic approach to effectively anticipate, respond and swiftly recover to the evolving threat landscape. For more than two decades, we continuously evolve our Cloud & Information Security solutions to support our clients around the globe in accelerating the rate at which they respond to destructive threats.
Gold Partner
Veeam
Veeam® is the leader in backup, recovery and data management solutions that deliver Modern Data Protection. We provide a single platform for cloud, virtual, SaaS, Kubernetes and physical environments. Our customers are confident their apps and data are protected and always available with the most simple, flexible, reliable and powerful platform in the industry. Veeam protects over 400,000 customers worldwide, including more than 82% of the Fortune 500 and over 60% of the Global 2,000. Veeam’s global ecosystem includes 35,000+ technology partners, resellers and service providers, and alliance partners and has offices in more than 30 countries. To learn more, visit https://www.veeam.com or follow Veeam on LinkedIn @veeam-software and Twitter @veeam.
Gold Partner
Juniper Networks - ME
At Juniper Networks, we believe the network is the single greatest vehicle for knowledge, understanding, and human advancement that the world has ever known. Every day, Juniper Networks is helping our customers build the best networks on the planet. Every innovation we envision, every technology we create is informed by our desire to help solve our customers’ toughest challenges so they can compete and thrive today and into the future.
Gold Partner
Rubrik
Ransomware-Attacken können jeden, jederzeit treffen. Wer Lösegeld, Ausfälle und Stress vermeiden will, muss schnell reagieren und braucht zwei Dinge: einen starken Recovery-Plan und sichere Backups. Rubrik ist Marktführer im Bereich Cloud Data Management und hilft Unternehmen auf immer mehr Rechenzentren und Clouds verteilte Daten optimal zu nutzen. Dazu bietet Rubrik eine richtlinienbasierte Plattform, mit der Backup & Recovery, Data Governance, Compliance und Cloud-Mobilität einfach und sicher realisierbar sind.
International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,200 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.