programme agenda - saudicds.com · saudi electronic university saudi arabia dr. jalal alowibdi...

10
ORGANISED BY CO-LOCATED WITH 13-14 FEBRUARY 2019 RIYADH INTERNATIONAL CONVENTION & EXHIBITION CENTER (RICEC) RIYADH, SAUDI ARABIA PROGRAMME AGENDA POWERED BY LEAD SPONSOR

Upload: dinhtram

Post on 13-Mar-2019

215 views

Category:

Documents


0 download

TRANSCRIPT

ORGANISED BYCO-LOCATED WITH

13-14 FEBRUARY 2019

RIYADH INTERNATIONAL CONVENTION & EXHIBITION CENTER (RICEC)RIYADH, SAUDI ARABIA

PROGRAMME AGENDA

POWERED BYLEAD SPONSOR

CO-LOCATED WITH ORGANISED BY

While technology has transformed the way we do business, it has seeded an unprecedented amount of risk in organizations paving way for hackers to infiltratetheir systems. Emerging markets are becoming a hot bed for the hackers to try their skills, harvest information as well as cause damage – for political, financial,and economic motives.

The Cyber Defence Summit taking place in Riyadh, Saudi Arabia will gather global experts in the cyber arena giving you the latest insights on securing yourorganization’s critical business infrastructures.

SESSION CATEGORIES

KEYNOTES PANEL DISCUSSIONS

FAST TRACK SESSIONS(WORKSHOPS)

PRIVATE MEETINGS

EXHIBITION

RIYADH INTERNATIONAL CONVENTIONS AND EXHIBITIONS CENTER

LEAD SPONSOR POWERED BY

SUMMIT SPONSORS

LEADSPONSOR

PLATINUMSPONSORS

GOLDSPONSORS

SILVERSPONSORS

BRONZESPONSORS

EXHIBITORS

POWERED BY

CO-LOCATED WITH LEAD SPONSORORGANISED BY POWERED BY

STRETEGIC PARTNER

DAY ONE WEDNESDAY, 13 FEBRUARY 2019

08.00 – 09.10REGISTRATION

09.10 – 09.15RECITATION OF THE HOLY QURAN

09.15 – 09.30OPENING KEYNOTECYBER SECURITY POSTURE IN THE ARAB REGION

• ANALYSIS OF THE COMMITMENT FROM COUNTRIES ON CYBERSECURITY AT THE GLOBAL AND REGIONAL LEVEL

• EXAMPLES OF GOOD PRACTICES IN ARAB COUNTRIES

09.30 – 09.45KEYNOTESECURING THE DIGITAL TRANSFORMATION FOR SAUDI VISION 2030

• DIGITAL TRANSFORMATION IN GOVERNMENT INSTITUTIONS• SECURING CRITICAL INFORMATION INFRASTRUCTURES• SECURITY AS A SHARED RESPONSIBILITY S

PE

AK

ER

10.15 – 11.15PANEL DISCUSSIONCOLLECTIVE COLLABORATION TO COMBAT CYBERCRIMES

• HOW GOVERNMENT COLLABORATIONS CAN DRIVE NATIONAL CYBER SECURITY OBJECTIVES

• PUBLIC-PRIVATE PARTNERSHIP IN CYBER SECURITY• NATIONAL OR REGIONAL THREAT INTELLIGENCE PLATFORM

WWW.SAUDICDS.COM

PA

NE

LIS

TS

MR. AMIT MEHTACISO – MIDDLE EAST & AFRICAMASTER CARDUNITED ARAB EMIRATES

PLENARY TRACKMAIN CONFERENCE AREA

MR. MARCO OBISOHEAD OF ICT APPLICATIONS & CYBER SECURITYINTERNATIONAL TELECOMMUNICATION UNION (ITU)SWITZERLAND

10.00 – 10.15KEYNOTETHE RELENTLESS MARCH OF TECHNOLOGY DRIVEN INNOVATION ANDTHE SERIOUS IMPLICATIONS WE’RE WITNESSING

• THE HISTORY AND FUTURE OF CONSUMER PATTERNS AND DRIVERS• THE VALUE OF DATA IN TODAY’S WORLD• THE CURRENT STATE OF E-FRAUD

09.45 – 10.00KEYNOTEBENEATH THE AI BUZZWORDS: A BALANCED PERSPECTIVE OF AI IN SECURITY

• DO I HAVE MACHINE LEARNING OR ARTIFICIAL INTELLIGENCE OR BOTH?• COMMON MISCONCEPTIONS ABOUT MACHINE LEARNING IN INFORMATION SECURITY• THE REAL BENEFITS OF MACHINE LEARNING IN SECURITY

SP

EA

KE

RS

PE

AK

ER

SP

EA

KE

R

CO-LOCATED WITH LEAD SPONSORORGANISED BY

MR. HANNES KRAUSEHEAD OF POLICY AND ANALYSISESTONIAN INFORMATION SYSTEMS AUTHORITYESTONIA

MR. MUSTAFA ERTENPROJECT COORDINATORUNITED NATIONS OFFICE ON DRUGS AND CRIME (UNODC)UNITED ARAB EMIRATES

MR. BAHER ESMATVICE PRESIDENT – STAKEHOLDER ENGAGEMENTINTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS (ICANN)EGYPTM

OD

ER

ATO

R MR. AVINASH ADVANICEOSPIRE SOLUTIONSUNITED ARAB EMIRATES

POWERED BY

DR. HYRUM ANDERSONCHIEF SCIENTISTENDGAMEUNITED STATES OF AMERICA

DR. MOATAZ BIN ALIVICE PRESIDENT & MANAGING DIRECTOR - MENATREND MICROSAUDI ARABIA

MR. MARCO OBISOHEAD OF ICT APPLICATIONS & CYBER SECURITYINTERNATIONAL TELECOMMUNICATION UNION (ITU)SWITZERLAND

RAMY AL DAMATICYBERSECURITY SOLUTIONS ARCHITECT KASPERSKY LABSUNITED ARAB EMIRATES

13.00 – 13.15KEYNOTECREATING A FREE, FAIR AND SECURE CYBERSPACE – JAPAN’S CYBERSECURITY JOURNEY

• STRENGTHENING INTERNATIONAL COORDINATION • CAPACITY BUILDING MEASURES• PROTECTING PRIVACY

SP

EA

KE

R MR. HIDETOSHI OGAWADIRECTOR – INTERNATIONAL STRATEGYNATIONAL CENTER OF INCIDENT READINESS AND STRATEGY FOR CYBERSECURITY (NISC), JAPAN

12.15 – 13.00PANEL DISCUSSIONHOW PRIVACY HAS CHANGED THE WAY WE COMMUNICATE

• DATA EXPOSURE – KNOWING THE LIMITS• IMPORTANCE OF DIGITAL ETHICS• BIG DATA VS PRIVACY

PA

NE

LIS

TS

MR. ENRIQUE GOMICIAPRINCIPAL RESEARCHERHUNGERSTATION.COMSAUDI ARABIA

MR. SULTAN MORISHEDCHIEF INFORMATION SECURITY OFFICER (CISO)HSBCSAUDI ARABIA

11.15 – 12.15BREAK FOR COFFEE, DHUHR PRAYERS AND ONE-TO-ONE SECURITY CONSULTATIONSPOST BREAK, THE CONFERENCE WOULD CONTINUE IN THE MAIN CONFERENCE ROOM AND CONCURRENT WORKSHOPS WILL TAKE PLACE IN WORKSHOP ROOM 1, ROOML 2 AND ROOM 3.

CONFERENCE TRACKMAIN CONFERENCE ROOM

TECHNICAL WORKSHOPSWORKSHOP ROOMS

WORKSHOP ROOM 1 WORKSHOP ROOM 2

12.15 – 13.00APPLYING MACHINE LEARNING AND AI IN

CYBER SECURITY

12.15 – 13.00

CLOUD SECURITY

MR. LYNEL D’SOUZAMAJOR ACCOUNTS

EXECUTIVEAKAMAI TECHNOLOGIES

UAE

MR. RIKU VALPASSR. MANAGER –

SECURITY ENGINEERINGFORTINET

SAUDI ARABIA

DAY ONE WEDNESDAY, 13 FEBRUARY 2019

WWW.SAUDICDS.COM

WORKSHOP ROOM 3

12.15 – 13.00AUTOMATED

INVESTIGATION WITH ARTIFICIAL

INTELLIGENCE -ACTIVE EDR.

CO-LOCATED WITH LEAD SPONSORORGANISED BY

ENG. ABDULLAH AL-OMARICHIEF INFORMATION OFFICER (CIO)MOBILYSAUDI ARABIA

DR. WAËL KANOUNHEAD OF CYBER SOLUTIONS THALES MIDDLE EASTUNITED ARAB EMIRATES

POWERED BY

CH

AIR

PE

RS

ON

MR. MOHAMED ELSHAHEDVENDOR MANAGER

EXCLUSIVE NETWORKSSAUDI ARABIA

MR. CHERIF DJERBOUAREGIONAL TECHNICAL LEADERTREND MICROUNITED ARAB EMIRATES

13.30 – 13.45KEYNOTECYBER SECURITY PREDICTIONS: 2019 AND BEYOND

• CORE DATA PROTECTION PRINCIPLES• REDUCING DATA RISK EXPOSURE• WHAT TO EXPECT IN THE COMING YEARS

13.15 – 13.30KEYNOTETHE STATE OF CYBERSECURITY TODAY

• THE INDUSTRY SUFFERS FROM CYBERSECURITY SKILLS SHORTAGE . • WHAT ARE YOU TRYING TO PROTECT ?• HOW TO DELIVER SECURITY EFFICACY AND BUDGET EFFICIENCY ?

13.45 –

END OF DAY ONE

CONFERENCE TRACKMAIN CONFERENCE ROOM

TECHNICAL WORKSHOPSWORKSHOP ROOMS

WORKSHOP ROOM 1 WORKSHOP ROOM 2

DAY ONE WEDNESDAY, 13 FEBRUARY 2019

WORKSHOP ROOM 3

WWW.SAUDICDS.COM

CO-LOCATED WITH LEAD SPONSORORGANISED BY

SP

EA

KE

R MR. JAMIL AQELTECHNOLOGY SALES & SERVICES MANAGERSYMANTECUNITED ARAB EMIRATES

MR. DUNCAN BROWNEMEA CHIEF SECURITY

STRATEGISTFORCEPOINT

UNITED KINGDOM

MR. BAHI HOURDIRECTOR OF SYSTEMS ENGINEERING – META

ATTIVO NETWORKSUNITED ARAB EMIRATES

13.15 – 14.00

EXTENDING BEHAVIORAL INSIGHTS

INTO RISK ADAPTIVE PROTECTION AND

ENFORCEMENT

13.15 – 14.00

ADAPTIVE CYBER DECEPTION FOR EARLY

& ACCURATE THREAT DETECTION AND

AUTOMATED RESPONSE

MR. AYMAN ABUREYALEHCYBERSECURITY AREA SALES MANAGERCISCOUNITED ARAB EMIRATES

SP

EA

KE

R

POWERED BY

MR. HUSSAM ABU-RIDASOLUTIONS ARCHITECT

TREND MICROSAUDI ARABIA

13.15 – 14.00

HYBRID CLOUD SECURITY

09.00 – 10.00REGISTRATION

10.30 - 10.45KEYNOTEDECEPTION, CONFUSION, DIVERSION: ALTERING THE ATTACK SURFACE TO GAIN TACTICAL ADVANTAGE

• THE IMPORTANCE OF TERRAIN• THE MITRE ATTACK FRAMEWORK• ALTERING THE ATTACH SURFACE

SP

EA

KE

R

WWW.SAUDICDS.COM

CO-LOCATED WITH LEAD SPONSORORGANISED BY

DAY TWO THURSDAY, 14 FEBRUARY 2019

PLENARY TRACKMAIN CONFERENCE AREA

DR. ABDUL RAHMANCHIEF SCIENTISTFIDELIS CYBERSECURITYUSA

10.45 - 11.30PANEL DISCUSSIONSECURING THE COMPLEX CITIES OF THE FUTURE

• AI, ML AND BLOCKCHAIN FOR SMART CITIES• FRAMEWORKS AND POLICIES TO REGULATE IOT SECURITY• TO CLOUD OR NOT TO CLOUD?

PA

NE

LIS

TS

MR. HIDETOSHI OGAWADIRECTOR – INTERNATIONAL STRATEGYNATIONAL CENTER OF INCIDENT READINESS AND STRATEGY FOR CYBERSECURITY (NISC), JAPAN

POWERED BY

10.15 – 10.30KEYNOTESECURING IoT : CHALLENGES AND RESOLUTIONS

• ACCELERATING THE THREAT MANAGEMENT WORKFLOW• FEEDING BEHAVIOUR MODELLING IN TO SIEM• AUTOMATION IS THE KEY

MR. BADR AL MUTAIRYCYBER SECURITY SYSTEMS MANAGERADVANCED ELECTRONICS COMPANY LIMITED (AECL)SAUDI ARABIAS

PE

AK

ER

DR. JALAL ALMUHTADICYBERSECURITY CONSULTANTSAUDI FEDERATION FOR CYBERSECURITY, PROGRAMMING AND DRONES (SAFCSP)SAUDI ARABIA

MR. RASHEED ALODAHSALES DIRECTOR – STRATEGIC BUSINESSTREND MICROSAUDI ARABIA

CH

AIR

PE

RS

ON

MR. MAJID MALAIKAAPPLICATION SECURITY SPECIALISTINTERNATIONAL MONETARY FUND (IMF)USA

10.00 – 10.15KEYNOTEWORKING ON THE HUMAN ELEMENT IN CYBER INCIDENTS ACROSS THE GOVERNMENTAL AND ESSENTIAL SERVICES

• IMPORTANCE OF WORKING ON THE HUMAN ELEMENT IN CYBER INCIDENTS• A HUMAN FIREWALL APPROACH• THE IMPORTANCE OF RISK FEEDBACK – BOTH TO ORGANIZATIONS AND USERS

SP

EA

KE

R

MR. HANNES KRAUSEHEAD OF POLICY AND ANALYSISESTONIAN INFORMATION SYSTEMS AUTHORITYESTONIA

MR. DAVID HARVILICZCO-FOUNDER AND COOFINITE STATEUSA

13.30 - 13.45KEYNOTETHE EXECUTIVE’S BREACH RESPONSE PREPAREDNESS

• INCREASING REGULATIONS• PRIORITIZING RISKS• SECURITY IS NOT JUST FOR THE IT DEPARTMENT

12.30 – 13.30PANEL DISCUSSIONWHY WE TEND TO FORGET THE BASICS – AN INSIGHT ON R&D IN CYBER SECURITY AND CRYPTOGRAPHY

• THE ROLE OF ACADEMIA IN CYBER SECURITY• THE MATHEMATICS OF CYBER SECURITY• ADDRESSING THE SKILLSET GAP

12.30 – 13.15

WWW.SAUDICDS.COM

CO-LOCATED WITH LEAD SPONSORORGANISED BY

CONFERENCE TRACKMAIN CONFERENCE ROOM

TECHNICAL WORKSHOPSWORKSHOP ROOMS

WORKSHOP ROOM 1 WORKSHOP ROOM 2

DAY TWO THURSDAY, 14 FEBRUARY 2019

WORKSHOP ROOM 3

CH

AIR

PE

RS

ON

DR. ABDULAZIZ ALBESHERDEAN – COLLEGE OF COMPUTING AND INFORMATICSSAUDI ELECTRONIC UNIVERSITYSAUDI ARABIA

DR. JALAL ALOWIBDICHIEF INFORMATION OFFICER (CIO)UNIVERSITY OF JEDDAHSAUDI ARABIA

MR. HADI JAAFARAWIMANAGING DIRECTORQUALYS MIDDLE EASTUNITED ARAB EMIRATES

MR. FAISAL HUMAIDHEAD OF INFORMATION SECURITY & RISKACWA POWERSAUDI ARABIA

POWERED BY

MR. SIDDHARTHA MURTHINTY

CHIEF SOLUTIONS ARCHITECH

SPIRE SOLUTIONSUNITED ARAB EMIRATES

MR. ABDULRAHMAN ALDALBAHI

REGIONAL SALES MANAGER - KSA

LOGRHYTHMSAUDI ARABIA

SP

EA

KE

R

MR. KHALED ALATEEQCYBERSECURITY CONSULTANTFIREEYESAUDI ARABIA

MR. CHRIS GREENVP - META

MALWAREBYTESUNITED ARAB EMIRATES

12.30 – 13.15LEVERAGE AUTOMATION TO MANAGE, DETECT & SECURE

RISK

MR. BADER AL ROQIDIRECTOR – NETWORK & SECURITY OPERATIONSMINISTRY OF FINANCESAUDI ARABIA

PA

NE

LIS

TS

11.30 – 12.30BREAK FOR COFFEE, DHUHR PRAYERS AND ONE-TO-ONE SECURITY CONSULTATIONSPOST BREAK, THE CONFERENCE WOULD CONTINUE IN THE MAIN CONFERENCE ROOM AND CONCURRENT WORKSHOPS WILL TAKE PLACE IN WORKSHOP ROOM 1, ROOML 2, AND ROOM 3.

12.30 – 13.15GLOBAL THREAT

LANDSCAPE, THE ASSUMPTION OF BREACH, HOW TO PROTECT, DETECT

AND RESPOND

WWW.SAUDICDS.COM

CO-LOCATED WITH LEAD SPONSORORGANISED BY

CONFERENCE TRACKMAIN CONFERENCE ROOM

TECHNICAL WORKSHOPSWORKSHOP ROOMS

WORKSHOP ROOM 1 WORKSHOP ROOM 2

DAY TWO THURSDAY, 14 FEBRUARY 2019

WORKSHOP ROOM 3

14.00 -

END OF SUMMIT

13.30 – 14.15ENHANCE YOUR FOUNDATIONAL

CONTROLS WITH THEMITRE ATTACKFRAMEWORK

13.30 – 14.15NEW ERA FOR

VULNERABILITY MANAGEMENT

REQUIREMENTS

MR. SHALIK ABOOSENIOR SALES ENGINEER

TRIPWIREUNITED ARAB EMIRATES

POWERED BY

MR. AMJAD KHADERSENIOR PRE-SALES

CONSULTANTTENABLE

SAUDI ARABIA

MR. ANGUS MACCORMICKDIRECTOR - SALES

AVANTIS LABSUNITED ARAB EMIRATES

SP

EA

KE

R

MR. MOHAMED RAMZISENIOR PRESALES ENGINEERIXIASAUDI ARABIA

13.45 – 14.00KEYNOTESTRENGTHENING YOUR DEFENCES AGAINST CYBER ATTACKS

• THE GROWING WEAK-SPOT : SUPPLY CHAIN• KEEPING AN EYE FOR VULNERABILITIES• THE EVOLUTION OF NETWORK-BASED

RANSOMWARES WORMS

13.30 – 14.15NEXT-GEN MANAGED SECURITY SERVICES

For Sponsorships:

Jamie [email protected]

For Speaking opportunities:

Praveen [email protected]

For Media enquiries:

Chukky [email protected]

Disclaimer. This document is for promotional purposes only and sROOM not be considered contractually binding. The content of the event, its dates, venue, agenda or speakers may be subject to change during the course of the event’s preparation.