|
Gold Track 1: Building Digital Trust
11:30 - 11:35
Entertainment Act
11:35 - 11:40
Be there at the Start of Gold Tracks & Stand a Chance to Win an Apple iWatch
11:40 - 11:50
How can you stop 71 million requests per second from hitting your application?
Bader Shaath
Senior Sales Engineer, Cloudflare
11:50 - 11:55
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:55 - 12:05
Navigating Top Cyber Risks And Regulatory Requirements
Prateek Bhajanka
Field CISO Director, SentinelOne
12:05 - 12:10
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
12:10 - 12:20
The Network-Security Nexus: Safeguarding the Future of Seamless Cyber Frontiers
In today's world of remote work, IoT/IIoT, and digital growth on an unprecedented scale, the once separate domains of networking and security are increasingly intertwined. From homes and cafes to advanced factories, campuses, data centers, digital branches, and multi-cloud environments, every network edge confronts unique security challenges. These demand consistent, robust responses to evolving threats. Moreover, it's clear from past experience that technology fails to take flight without an enhanced, user-friendly experience.
This presentation delves into the paradigm shift towards the convergence of networking and security, highlighting its potential to:
Streamline operations via integration and automation.
Harness the power of converged AIOPs/SecOps for predictive analysis and response, ensuring a consistent security posture and improved user experience at every edge.
Fortinet invites you to join us as we decode the future of this convergence, explore its implications, and delve into the transformative role of emerging technologies, such as AI and ML, in shaping a safer and more secure cyber-physical landscape.
Melih KIRKGOZ
CTO Office, Director Solutions Architecture-Strategic Accounts, International Emerging, Fortinet
12:20 - 12:25
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
12:25 - 12:35
The New Reality for Security: See More Secure More
Mihriban Kahveci
Solution Engineering Manager, VMware
12:35 - 12:40
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
12:40 - 13:10
Panel Discussion: How New Technologies Are Changing the Definition of Digital Trust
The issue of trust is now everywhere, with the pace of digital transformation increasing across all sectors, hybrid working practices accelerating in response to the pandemic, and supply chain disruptions and geopolitical threats on the rise. Digital trust represents a new era of business agility, powered by digital, cloud, and security transformation. Today, the issue of trust is increasingly being incorporated into new technologies, reshaping how vendors and organizations define it.
Imran Chowdhury
Global Head of Data Protection & Governance, Aljazeera Media Network
Ewald Muller
Managing Director, Supervision and Authorisation, Qatar Financial Centre Regulatory Authority
Arnab Mukherjee
Business Continuity Manager, Corporate Security, Vodafone Qatar P.Q.S.C.
Chung Kwan San (Alex)
Senior Manager - Cybersecurity, Milaha
Gold Track 2: Automating Security Operations
11:30 - 11:35
Entertainment Act
11:35 - 11:40
Be there at the Start of Gold Tracks & Stand a Chance to Win an Apple iWatch
11:40 - 11:50
Below The Surface - Using Attack Surface Management to Drive Change
Attack surface management has become one of the hottest terms in security, but what exactly is it? And how are CISOs using it to reduce shadow IT and drive change inside their organizations? This session explores how attack surface management can prepare a team for unknown threats and highlights why discovering an attacker’s perspective is critical in risk management. It also identifies the technologies that can be leveraged to integrate an attacker’s perspective into a security program.
Haythm Al Shehab
Senior Security Specialist, Randori, an IBM Company
11:50 - 11:55
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:55 - 12:05
Strategic, Operational, and Tactical … intelligence for better-informed decisions.
Amin Shokri
Senior Security Consultant, Kaspersky
12:05 - 12:10
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
12:10 - 12:20
The Top Threats Targeting Your Brand: From Domain Abuse to Dark Web Exposures
Nour Fateen
Director, Sales Engineering, Recorded Future
12:20 - 12:25
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
12:25 - 12:35
A Secure Cloud Infrastructure Starts with Server Security
Ali Kaddoura
Commercial Manager Middle East, Turkey & Africa, AMD
12:35 - 12:40
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
12:40 - 13:10
Panel Discussion: Why Intelligent Network Monitoring and Visibility Truly Matter
Today, network, application, and security departments are struggling with massive network communication issues, hidden threats, and misconfigurations that are driving a spike in cybersecurity incidents. This session will discuss how the automation of network anomaly detection and response, deep network traffic analysis, and data collection can help to provide better insights into an organization’s current security posture.
Firas Georges Khalil
IT Director, Baladna Food Industries
Abdul Sathar
IT Project Manager, Q Company
Vladimir Kanyshev
CISO, CQUR Bank LLC
Gold Track 3: Addressing the Security Challenges
11:30 - 11:35
Entertainment Act
11:35 - 11:40
Be there at the Start of Gold Tracks & Stand a Chance to Win an Apple iWatch
11:40 - 11:50
Power of Low-Code Security Automation
What separates high-performing cybersecurity teams from everyone else? It is largely their ability to quickly uncover, understand, and remediate threats. In this context, enter low-code security automation. This powerful and extensible technology can unlock the potential of security teams with machine-speed decision making. But just what can organizations do with low-code security automation, and how can it help take security teams from good to great?
Abdelnaser Eid
Sales Engineering Manager, Swimlane
11:50 - 11:55
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:55 - 12:05
Credential-Based Attacks: What Are They and How Can We Fight Them?
Attackers no longer break in; they simply log in! Most public breaches in the last few years all lead to credentials one way or another. Even with multifactor authentication in place, some of the biggest organizations in the world continue to fall victim to such attacks, and yet very little attention is given to credential usage monitoring. This session will explore how machine learning and behavioral analytics can empower organizations to monitor for stolen credentials and help prevent compromises at scale for those (not unlikely) days when prevention controls fail.
Rami Gherbal
Principal Sales Engineer, Exabeam
12:05 - 12:10
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
12:10 - 12:20
Today’s Cyberthreat Landscape & the Cloud Security Advantage
Hatem Ali
Regional Sales Manager, Mandiant
12:20 - 12:25
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
12:25 - 12:35
Measure and Reduce Cyber Risk Using Effective Remediation Strategies
Ashraf AlSaleh
Presales Technical Manager, Qualys
12:35 - 12:40
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
12:40 - 12:55
Cyber Security Maturity Journey
Parwez Mohammad
Chief Information Security Officer (CISO), Public Works Authority
12:55 - 13:10
Practical Approach to Managing Risks
in Higher Education:
A Case Study of Qatar University
Ozel Hurmuzlu
Senior Enterprise Risk Management Analyst, Qatar University
|