8:00
|
Registration & Networking
|
9:00
|
Welcome Address
|
|
Shilpi Handa
Associate Research Director (META), IDC
|
9:05
|
IDC Keynote: Shaping Security Strategies for the Digital-First Organization
|
|
In today's age of asymmetric cybersecurity warfare, cybersecurity criminals have the advantage of initiating threats based on their own plans while organizations play defense. This happens every day, seven days a week, in all industries. The CISO leadership role tasked with detecting and mitigating these attacks. This session highlights some strategies CISOs can use to work with the CXO leadership team and board of directors to mitigate threats and keep organizations safe.
Shilpi Handa
Associate Research Director (META), IDC
|
9:20
|
Navigating Increasing Complexity in an Interconnected World
|
|
The pace of change in the cybersecurity landscape continues to accelerate. Yet, most organizations still lack visibility into parts of their attack surface, hindering their efforts to meet security and operational objectives and there putting their businesses at risk. The pandemic and its resulting changes — such as the rise in distributed workforces, the significant spike in IoT devices, and the general acceleration of digital transformation — have had a major impact on IT complexity and security. Today, organizations are increasingly looking to automate their cybersecurity asset management in a bid to plug visibility gaps and improve the effectiveness of their security and compliance efforts.
|
9:40
|
Protecting what’s now and what’s next -Adapt and overcome with Security Resilience
|
|
Fady Younes
Regional Cybersecurity Director, EMEAR SP and MEA, Cisco
|
10:00
|
Designing Security for a Hybrid Multi-Cloud Environment
|
10:15
|
Digital Trust Best Practices
|
10:30
|
Tea / Coffee & Networking Break
|
11:00
12:05
|
Platinum Partner Tracks (Parallel Sessions)
|
|
Platinum Track A: Cyber-Protection for the Threats of Today and Tomorrow: Dynamic Security Strategies for Minimizing Risk
11:00 - 11:05
Time for Fitness: Exercise & Energize
11:05 - 11:15
The Need for Industrial Organizations to Incorporate Centralized Security Management Tools to Bridge the IT/OT Gap
11:15 - 11:20
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:20 - 11:30
Navigating Increasing Complexity in an Interconnected World
11:30 - 11:35
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:35 - 11:45
Addressing the Unique Security Challenges of IoT and 5G Convergence
11:45 - 11:50
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:50 - 12:00
The Challenges of Securing the Immersive Customer Experience
12:00 - 12:05
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
Platinum Track B:Cybersecurity Policies, Regulations, and Compliance
11:00 - 11:05
Time for Fitness: Exercise & Energize
11:05 - 11:15
Building Digital Trust: Identity, Privacy, and Data Security
Digital trust is now essential to future business success and has become a business imperative as organizations accelerate their digital transformation strategies to meet new realities. Identity, privacy, and data security are the foundational pillars for building a trusted enterprise. Going forward, trust programs will need to evolve to incorporate value-based goals such as business ethics and corporate social responsibility, as well as support key business outcomes like transparency, brand reputation, customer loyalty, supply chain integrity, and operational efficiency.
Gopakumar R. Shanmughan
Application Security Engineer Information Systems Department, Vistas Global
11:15 - 11:20
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:20 - 11:30
Identity and Access Management Priorities and Navigating Identity Governance and Administration
11:30 - 11:35
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:35 - 11:45
AI-Based Cyber-Resilience: Deploying with Zero Trust
11:45 - 11:50
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:50 - 12:00
Engendering Trust through Risk Management and Building Digital Resilience
12:00 - 12:05
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
|
12:05
|
Tea / Coffee & Networking
|
12:45
14:15
|
Gold Partner Tracks (Parallel Sessions)
|
|
Gold Track 1: Building Digital Trust
12:45 - 12:50
Be there at the Start of Gold Tracks & Stand a Chance to Win an Apple iWatch
12:50 - 13:00
How can you stop 71 million requests per second from hitting your application?
Bader Shaath
Senior Sales Engineer, Cloudflare
13:00 - 13:05
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:05 - 13:15
Mitigating Cyber Risks in the Middle East: Addressing the Impact of Geopolitical Tensions and Regulatory Requirements
Prateek Bhajanka
Field CISO Director, SentinelOne
13:15 - 13:20
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:20 - 13:30
The Network-Security Nexus: Safeguarding the Future of Seamless Cyber Frontiers
In today's world of remote work, IoT/IIoT, and digital growth on an unprecedented scale, the once separate domains of networking and security are increasingly intertwined. From homes and cafes to advanced factories, campuses, data centers, digital branches, and multi-cloud environments, every network edge confronts unique security challenges. These demand consistent, robust responses to evolving threats. Moreover, it's clear from past experience that technology fails to take flight without an enhanced, user-friendly experience.
This presentation delves into the paradigm shift towards the convergence of networking and security, highlighting its potential to:
Streamline operations via integration and automation.
Harness the power of converged AIOPs/SecOps for predictive analysis and response, ensuring a consistent security posture and improved user experience at every edge.
Fortinet invites you to join us as we decode the future of this convergence, explore its implications, and delve into the transformative role of emerging technologies, such as AI and ML, in shaping a safer and more secure cyber-physical landscape.
Melih KIRKGOZ
CTO Office, Director Solutions Architecture-Strategic Accounts, International Emerging, Fortinet
13:30 - 13:35
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:35 - 13:45
Identity and Access Management Priorities and Navigating Identity Governance and Administration
13:45 - 13:50
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:50 - 14:15
Panel Discussion: How New Technologies Are Changing the Definition of Digital Trust
The issue of trust is now everywhere, with the pace of digital transformation increasing across all sectors, hybrid working practices accelerating in response to the pandemic, and supply chain disruptions and geopolitical threats on the rise. Digital trust represents a new era of business agility, powered by digital, cloud, and security transformation. Today, the issue of trust is increasingly being incorporated into new technologies, reshaping how vendors and organizations define it.
Imran Chowdhury
Global Head of Data Protection & Governance, Aljazeera Media Network
Ewald Muller
Managing Director, Supervision and Authorisation, Qatar Financial Centre Regulatory Authority
Arnab Mukherjee
Business Continuity Manager, Corporate Security, Vodafone Qatar P.Q.S.C.
Gold Track 2: Automating Security Operations
12:45 - 12:50
Be there at the Start of Gold Tracks & Stand a Chance to Win an Apple iWatch
12:50 - 13:00
Below The Surface - Using Attack Surface Management to Drive Change
Attack surface management has become one of the hottest terms in security, but what exactly is it? And how are CISOs using it to reduce shadow IT and drive change inside their organizations? This session explores how attack surface management can prepare a team for unknown threats and highlights why discovering an attacker’s perspective is critical in risk management. It also identifies the technologies that can be leveraged to integrate an attacker’s perspective into a security program.
Haythm Al Shehab
Senior Security Specialist, Randori, an IBM Company
13:00 - 13:05
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:05 - 13:15
Strategic, Operational, and Tactical … intelligence for better-informed decisions.
Amin Shokri
Senior Security Consultant, Kaspersky
13:15 - 13:20
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:20 - 13:30
Security Projects Must Become a Business Goal
13:30 - 13:35
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:35 - 13:45
How to Address Supply Chain Risk by Driving Greater Resilience and Trust across their Supplier Ecosystems
13:45 - 13:50
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:50 - 14:15
Panel Discussion: Why Intelligent Network Monitoring and Visibility Truly Matter
Today, network, application, and security departments are struggling with massive network communication issues, hidden threats, and misconfigurations that are driving a spike in cybersecurity incidents. This session will discuss how the automation of network anomaly detection and response, deep network traffic analysis, and data collection can help to provide better insights into an organization’s current security posture.
Firas Georges Khalil
IT Director, Baladna Food Industries
Abdul Sathar
IT Project Manager, Q Company
Vladimir Kanyshev
CISO, CQUR Bank LLC
Gold Track 3: Addressing the Security Challenges
12:45 - 12:50
Be there at the Start of Gold Tracks & Stand a Chance to Win an Apple iWatch
12:50 - 13:00
Power of Low-Code Security Automation
What separates high-performing cybersecurity teams from everyone else? It is largely their ability to quickly uncover, understand, and remediate threats. In this context, enter low-code security automation. This powerful and extensible technology can unlock the potential of security teams with machine-speed decision making. But just what can organizations do with low-code security automation, and how can it help take security teams from good to great?
Abdelnaser Eid
Sales Engineering Manager, Swimlane
13:00 - 13:05
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:05 - 13:15
Credential-Based Attacks: What Are They and How Can We Fight Them?
Attackers no longer break in; they simply log in! Most public breaches in the last few years all lead to credentials one way or another. Even with multifactor authentication in place, some of the biggest organizations in the world continue to fall victim to such attacks, and yet very little attention is given to credential usage monitoring. This session will explore how machine learning and behavioral analytics can empower organizations to monitor for stolen credentials and help prevent compromises at scale for those (not unlikely) days when prevention controls fail.
Rami Gherbal
Principal Sales Engineer, Exabeam
13:15 - 13:20
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:20 - 13:30
AI-based Cyber Resilience - Deployment with Zero Trust
13:30 - 13:35
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:35 - 13:45
Challenge the Rules of Security - Transform the Threat Surface to Proactive Control
13:45 - 13:50
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:50 - 14:15
Panel Discussion: Enabling Cybersecurity Resilience to Keep Up with Rapid Digitalization and a Shifting Threat Landscape
With the pace of change in the threat landscape showing no signs of slowing down and new threats continuing to emerge, organizations require models that reliably ensure the security and resilience of core systems and infrastructure while remaining sufficiently agile to meet future-ready service expectations. This panel will discuss the biggest threats security professionals should be on the lookout for and explain how to stay one step ahead of the attackers by strengthening security using technologies such as artificial intelligence and machine learning.
|
14:15
|
Lunch & Networking
|
15:00
|
Mega Raffle (iPhone 14) — Complete the online feedback form to enter
|
15:05
|
End of Conference
|