9:00
|
Registration & Networking
|
9:55
|
Welcome Address
|
|
Nagia El-Emary
Country Director (Egypt) & Senior Consultant (MEA), IDC
|
10:00
|
IDC Keynote: Preparing for a New Era of Cyberthreats
|
|
Nagia El-Emary
Country Director (Egypt) & Senior Consultant (MEA), IDC
|
10:15
|
Cooperative Cyberattacks: Advanced Threats that Destroy Emerging Markets.
|
|
The Middle East and Africa has proven to be one of the fastest transforming regions around the world and one of the most challenging for cybersecurity authorities and decision makers. Attackers have tried and will continue to try elevating threats to MEA over other regions. This session will dive into the recent cyberthreat landscape, describing the new tactics utilized by criminal attack groups in the region and highlighting their top targets and interests. It will also reveal how attackers are adapting to regional changes to boost espionage, conduct robberies, and spread destruction.
Sherif Magdy
Senior Researcher, Global Research & Analysis Team, Kaspersky
|
10:25
|
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
|
10:30
|
Next Generation SOC
|
|
Next-Gen SOC refers to the next generation of Security Operation Centers that employ advanced technologies and methodologies to enhance threat detection and response. These SOCs utilize advanced threat intelligence, automation, and orchestration to streamline security operations. They leverage analytics and visualization techniques to gain deeper insights into security events, employ contextual awareness to integrate information from various sources, and address the challenges of cloud and hybrid environments. Next-Gen SOCs also focus on incident response and collaboration, providing tools for efficient coordination and communication during security incidents. Overall, they aim to improve the proactive and effective management of cybersecurity threats.
Dr. Ahmed Hassan Aly
Cybersecurity Director, Alkan CIT
|
10:40
|
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
|
10:45
|
Panel Discussion: How New Technologies Are Changing the Definition of Digital Trust
|
|
The issue of trust is now everywhere, with the pace of digital transformation increasing across all sectors, hybrid working practices accelerating in response to the pandemic, and supply chain disruptions and geopolitical threats on the rise. Digital trust represents a new era of business agility, powered by digital, cloud, and security transformation. Today, the issue of trust is increasingly being incorporated into new technologies, reshaping how vendors and organizations define it.
Ahmed Wattar
IT Director, Alfa Medical Group(AMG)
Marianne Azer
Board Member, Financial Regulatory Authority (FRA)
Hisham Mohamed
Egypt CISO, Emirates NBD
Wessam Maher
Chief Information Security and Risk Officer, The American University in Cairo
Iman Wafy
Chief Information Officer (CIO), Egyptian General Petroleum Corporation (EGPC)
|
11:25
|
Tea / Coffee & Networking Break
|
12:10
|
Designing an Intelligent Defense against Egypt's Threats of tomorrow
|
|
In today's ever-changing cyber security landscape, it is more important than ever to stay ahead of the curve. Cyber threat intelligence (CTI) is a critical tool for doing this, as it provides organizations with the information they need to identify, assess, and respond to cyber threats. In this presentation, we will discuss the importance of CTI and how it can be used to protect organizations in Egypt. We will also explore some of the latest cyber threats facing Egypt, and how CTI can be used to mitigate these threats. By the end of this presentation, you will have a better understanding of CTI and how it can be used to protect your organization from cyber threats.
Renze Jongman
Cyber Threat Intelligence Specialist, Mandiant
|
12:20
|
Q&A (Ask Questions & Stand a Chance to Win a Raffle)
|
12:25
|
Megatrends and How an Identity-first Approach Equips You for the Future
|
|
Ahmed Wattar
IT Director, Alfa Medical Group(AMG)
|
12:40
|
Panel Discussion: Why Intelligent Network Monitoring and Visibility Truly Matter
|
|
Today, network, application, and security departments are struggling with massive network communication issues, hidden threats, and misconfigurations that are driving a spike in cybersecurity incidents. This session will discuss how the automation of network anomaly detection and response, deep network traffic analysis, and data collection can help to provide better insights into an organization’s current security posture.
Mostafa AbdelGhani
Director General of Cyber Security, South Cairo Electricity Distribution Company (scedc)
Mohamed Kamal
Network & Security Expert (Banking Sector)
Mohamed Bayoumi
Group IT Network and Security Section Head, Alfa Medical Group(AMG)
Mahmoud Raouf
Digital Forensics and Incident Response Division Leader, National Telecommunication Regulatory Authority (NTRA), Egypt
|
13:20
|
Lunch & Networking
|
14:15
|
End of Conference
|