8:00
|
Registration & Networking - Arrive early to claim your exclusive early bird gift
|
9:00
|
Welcome Address
|
|
Hamza Naqshbandi
Associate Vice President, Saudi Arabia and Bahrain
|
9:05
|
IDC Keynote: Shaping Security Strategies for the Digital-First Organization
|
|
In today's age of asymmetric cybersecurity warfare, cybersecurity criminals have the advantage of initiating threats based on their own plans while organizations play defense. This happens every day, seven days a week, in all industries. The CISO leadership role tasked with detecting and mitigating these attacks. This session highlights some strategies CISOs can use to work with the CXO leadership team and board of directors to mitigate threats and keep organizations safe.
Shilpi Handa
Associate Research Director (META), IDC
|
9:20
|
Protecting what’s now and what’s next -Adapt and overcome with Security Resilience
|
|
Fady Younes
Regional Cybersecurity Director, EMEAR SP and MEA, Cisco
|
9:40
|
Securing Your Cloud Environment: Best Practices and Emerging Techniques
|
|
The cloud has proved to be imperative for modern businesses. Yet unsubstantiated security concerns and a limited understanding of cloud security practices are giving rise to unwarranted fears, ultimately leading to missed opportunities for organizations to adopt Cloud and scale at speed. In this session, Bazel Al Sharif, the Chief Business Operations of Bespin Global MEA will uncover how effortless ensuring security and compliance with regulatory frameworks on the public cloud is, and how to benefit from the use of automated tools and techniques to strengthen security posture and reduce risks.
This session will also introduce cloud-native security tools and best practices to mitigate threats, DevSecOps integration to ensure a proactive approach to cloud security, and lastly address all CISO fears by equipping them with the knowledge about cloud-native security services to safeguard their organizations
Bazel El Sharif
Chief Business Officer, Bespin Global
|
10:00
|
The Increased Complexity in the Modern Cyber Security Landscape
|
|
Abdulaziz Alamri
B2B MSS Manager, Sirar by stc
|
10:15
|
Transform the SOC by re-thinking the SIEM
|
|
Frederic Nakhlé
Sr. Director System Engineer Cortex EMEA and LATAM, Palo Alto
|
10:35
|
Tea / Coffee & Networking Break
|
11:05
11:55
|
Platinum Partner Tracks (Parallel Sessions)
|
|
Platinum Track A: Cyber-Protection for Threats: Today and Beyond
11:05 - 11:10
Time for Fitness: Exercise & Energize
11:10 - 11:20
Unveiling the Landscape of ICS/OT Cybersecurity in 2023 and Beyond
Hussam Abu-Rida
Technical Director (MENA), TXOne
11:20 - 11:25
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:25 - 11:35
Next Generation Security Operations for a Hybrid Cloud Environment
Digital Transformation together with Multi-Cloud / Hybrid-Cloud Adoption is one of the top initiatives for almost all enterprises as of today. We welcome you to hear Splunk’s Vision and Strategy for building end to end visibility and control for the Hybrid-Cloud environments and how to run Cyber Security operations seamlessly and efficiently to support Cyber and Business Resiliency for your organizations.
Dimitris Vergos
Area Vice President, Sales Engineering, Splunk
11:35 - 11:40
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:40 - 11:50
Unlocking the Security power of the infrastructure
Join this session to revolutionize your approach to cybersecurity and gain the upper hand against advanced threats. Learn from Regional Security Head Mohammad Abu Jarour as he shares cutting-edge insights on how to harness the power of infrastructure to uncover the automated, scalable and resilient security approach for your multi-cloud environments.
Mohammad Abu Jarour
Security Head – South EMEA, VMware
11:50 - 11:55
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
Platinum Track B: Dynamic Security Strategies for Minimizing Risk
11:05 - 11:10
Time for Fitness: Exercise & Energize
11:10 - 11:20
Navigating Data Privacy Regulations in Saudi Arabia
Sohel Almozaini
Security Technical Leader, IBM
11:20 - 11:25
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:25 - 11:35
How to Become Cyber Resilient
Mohamed Saif
Expert in Cyber Resiliency and Data Protection, Dell Technologies
11:35 - 11:40
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:40 - 11:50
Journey from Data to Digital Sovereignty
Shilpi Handa
Associate Research Director (META), IDC
|
11:55
|
Tea / Coffee & Networking
|
12:30
14:05
|
Gold Partner Tracks (Parallel Sessions)
|
|
Gold Track 1: Building Digital Trust
12:30 - 12:50
History of Hacking: From Mainframes to Ransomware
Ever since the first hackers bypassed software copy protection on Atari 800s and Apple II there has been an arms race back and forth between attackers and defenders; with defenders constantly raising the bar, and attackers jumping over, walking around, or simply removing the bar. With the advent of the internet and our modern connected lives this only intensified- with data leaks, compromises, and ransomware a commonplace headline in today's world. This talk will lift the veil behind the evolution of computer hacking.
Glenn Wilkinson
World Renowned Security Expert & Ethical Hacker
12:49 - 12:50
Start of Track Raffle: Stand a Chance to Win Smart TV - Courtesy Delinea
12:50 - 13:00
How can you stop 71 million requests per second from hitting your application?
The global ecommerce market is expected to total $6.3 trillion in 2023. Given this scale, cybercriminals are targeting online services with a variety of attacks that require multiple layers of defense. This session explores how critical infrastructure can be protected with a wide range of technologies that prevent and mitigate the most devastating attacks.
Bader Shaath
Senior Sales Engineer, Cloudflare
13:00 - 13:05
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:05 - 13:15
Roadmap to Cyber Resilience
Ozair Rashid
Senior Solutions Engineer, (META), SentinelOne
13:15 - 13:20
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:20 - 13:30
The Future of Online Crime: How ChatGPT is Changing the Rules of the Game
Nour Fateen
Director, Sales Engineering, Recorded Future
13:30 - 13:35
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:35 - 14:00
Panel Discussion: How New Technologies Are Changing the Definition of Digital Trust
The issue of trust is now everywhere, with the pace of digital transformation increasing across all sectors, hybrid working practices accelerating in response to the pandemic, and supply chain disruptions and geopolitical threats on the rise. Digital trust represents a new era of business agility, powered by digital, cloud, and security transformation. Today, the issue of trust is increasingly being incorporated into new technologies, reshaping how vendors and organizations define it.
Eng. Khalid Alfaheid
CISO, Ministry of Environment, Water, and Agriculture (MEWA)
Wael Ahmed Fattouh
CISO, Bank Al Jazira
Dr. Nasser Alamri
Cybersecurity Executive Director, Institute of Public Administration (IPA)
Uzair Mujtaba
Sr Program Manager, IDC
Eng.Adly Al-Sharif
CISO, National Events Center (NEC)
Gold Track 2: Addressing the Security Challenges
12:30 - 12:50
History of Hacking: From Mainframes to Ransomware
Ever since the first hackers bypassed software copy protection on Atari 800s and Apple II there has been an arms race back and forth between attackers and defenders; with defenders constantly raising the bar, and attackers jumping over, walking around, or simply removing the bar. With the advent of the internet and our modern connected lives this only intensified- with data leaks, compromises, and ransomware a commonplace headline in today's world. This talk will lift the veil behind the evolution of computer hacking.
Glenn Wilkinson
World Renowned Security Expert & Ethical Hacker
12:49 - 12:50
Start of Tracks Raffle: Stand a Chance to Win Smart TV
12:50 - 13:00
Below The Surface - Using Attack Surface Management to Drive Change
Attack surface management has become one of the hottest terms in security, but what exactly is it? And how are CISOs using it to reduce shadow IT and drive change inside their organizations? This session explores how attack surface management can prepare a team for unknown threats and highlights why discovering an attacker’s perspective is critical in risk management. It also identifies the technologies that can be leveraged to integrate an attacker’s perspective into a security program.
Haythm Al Shehab
Senior Security Specialist, Randori, an IBM Company
13:00 - 13:05
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:05 - 13:15
How to be Cyber Resilient
Feras Alqaisi
Head of Presales, Kaspersky
13:15 - 13:20
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:20 - 13:30
Unified SASE & Zero Trust Everywhere
Amr Ahmed Mahmoud Mohamed Masoud
Senior Systems Engineer, Versa Networks
13:30 - 13:35
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:35 - 14:00
Panel Discussion: Enabling Cybersecurity Resilience to Keep Up with Rapid Digitalization and a Shifting Threat Landscape
With the pace of change in the threat landscape showing no signs of slowing down and new threats continuing to emerge, organizations require models that reliably ensure the security and resilience of core systems and infrastructure while remaining sufficiently agile to meet future-ready service expectations. This panel will discuss the biggest threats security professionals should be on the lookout for and explain how to stay one step ahead of the attackers by strengthening security using technologies such as artificial intelligence and machine learning.
Anas Mosa
IT Director, Public Investment Fund–Projects
Fahad Alqarni
Cybersecurity Manager at Government entity
Shilpi Handa
Associate Research Director, IDC
Gold Track 3: Automating Security Operations
12:30 - 12:50
History of Hacking: From Mainframes to Ransomware
Ever since the first hackers bypassed software copy protection on Atari 800s and Apple II there has been an arms race back and forth between attackers and defenders; with defenders constantly raising the bar, and attackers jumping over, walking around, or simply removing the bar. With the advent of the internet and our modern connected lives this only intensified- with data leaks, compromises, and ransomware a commonplace headline in today's world. This talk will lift the veil behind the evolution of computer hacking.
Glenn Wilkinson
World Renowned Security Expert & Ethical Hacker
12:49 - 12:50
Start of Tracks Raffle: Stand a Chance to Win Smart TV
12:50 - 13:00
Power of Low-Code Security Automation
What separates high-performing cybersecurity teams from everyone else? It is largely their ability to quickly uncover, understand, and remediate threats. In this context, enter low-code security automation. This powerful and extensible technology can unlock the potential of security teams with machine-speed decision making. But just what can organizations do with low-code security automation, and how can it help take security teams from good to great?
Sami Hasanain
Senior SE, Swimlane
13:00 - 13:05
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:05 - 13:15
“See Threats, Stop Breaches” How using AI helps Erase the Unknown
Yazan Hammoudah
Director, Security Engineering, Vectra AI
13:15 - 13:20
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:20 - 14:00
Panel Discussion: Why Intelligent Network Monitoring and Visibility Truly Matter
Today, network, application, and security departments are struggling with massive network communication issues, hidden threats, and misconfigurations that are driving a spike in cybersecurity incidents. This session will discuss how the automation of network anomaly detection and response, deep network traffic analysis, and data collection can help to provide better insights into an organization’s current security posture.
Bader Alkhaldi
OT Cybersecurity Project Manager, Saudi Aramco
Mohammed AlShehri
CISO, Al-Amthal Financing Company
Weam Munshi
Chief Information Security Officer (CISO), Buruj Cooperative Insurance Company
Shahin Hashim
Associate Research Director, Enterprise Infrastructure and Datacenters Practice, IDC Middle East, Turkey, and Africa (META)
|
14:05
|
Mega Raffle (iPhone 14)
|
14:10
|
Lunch & Networking
|
14:55
|
End of Conference
|