ESRM DUBAI

Enterprise Security & Risk Management

11 October 2017

Conrad Dubai (United Arab Emirates)

SOCIAL


LATEST BLOGS


UAE Population Pose High Risk to the Safety of Their Data

18th September 2017

Research by Kaspersky Lab has found that the UAE is failing to protect their data properly. Even though the ever growing population recognises the danger […]


Public WiFi Security Tips and Tools

10th August 2017

As the number of consumers with mobile devices continues to rise, so too does the demand for reliable internet access. Out of necessity, many businesses […]


LATEST TWEETS

The LEADING STRATEGY EVENT FOR INFOSEC, CYBER SECURITY & RISK MANAGEMENT
professionals across every major business sector

At a glance

INFORMATION SECURITY REMAINS A CRITICAL CONCERN FOR THE UAE‘S GROWING ECONOMY AND IS FUELLED BY INCREASED AWARENESS OF SECURITY CHALLENGES AS THE COUNTRY TRANSITIONS TOWARDS DIGITAL MODELS OF SERVICE DELIVERY.

ICT spending in the UAE reached an estimated $16 billion in 2016 and topped $200 billion across the Middle East more generally. The ascendancy of emerging tech trends like cloud, mobile, big data and IoT – all of which are key to the Dubai smart city initiative – are enhancing the need for reliable and agile processes that are secure by default. Security is fundamental for the adoption of the most advanced technologies as the UAE looks to diversify its economy, make businesses more efficient, and government more responsive.

Join hundreds of leading InfoSec, cyber security and risk management professionals at Whitehall Media’s prestigious inaugural ESRM Dubai conference to discuss the latest developments and best practices needed to address the most pressing security risks of tomorrow. Our line-up of expert speakers will discuss the cyber risk landscape, opportunities to detect and deter cyber-attacks through appropriate skills and capabilities, and best practice required to protect critical national systems and networks.

This must-attend event offers unrivalled networking opportunities and insights on how to design, implement and embed deliverable action plans that balance risk mitigation with the pursuit of business growth. Through a series of thought-leadership and case-study presentations, the conference will showcase the very best examples of how the public and private sectors are building resilience and utilising technology to solve strategic security issues.

FEATURED TOPICS

  • Active Defence Mechanisms, Tools and Techniques
  • Advanced Persistent Threats/Advanced Evasive Techniques
  • Breach Response Workflow/Planning
  • Building a Secure Cyberspace
  • Building Cyber Skills and Capabilities
  • Business Continuity Management and Contingency Planning
  • BYOD / End-User Device / Application Security
  • Change Management/Programme Management
  • Cloud Security Principles, Practice, Integration
  • Combating Cybercrime
  • Critical Infrastructure and Operational Technology Security
  • Cyber Hygiene and Compliance
  • Cyber Policing / Incidence Detection / Response Management
  • Risk Management Frameworks, Metrics, Strategy
  • Cyber Risk Management and Insurance
  • Data Governance and Protection
  • Data Loss Prevention, Disaster Recovery, Hardware Security
  • Detecting Espionage / Managing Data Theft and Leakage
  • Digital Rights Management
  • Disruptive Technologies – IoT, AI, Machine Learning, Blockchain (Opportunities and Risks)
  • Encryption, firewall technology, anti-virus, Cryptography, Cryptanalysis, Network Security
  • Fraud Detection and Response
  • IaaS, PaaS, SaaS
  • Identity Assurance and Access Management
  • Infrastructure Management and Security
  • Legacy Systems and Continuous Improvement Challenges
  • Mobile Risks and Mitigation
  • Penetration Testing
  • Personnel Security / changing role of HR
  • Securing Critical National Infrastructure
  • Securing Online Transactions
  • Security Classification and Policy Enforcement
  • Social Media Challenges / Risks
  • Supply Chain Security
  • Technical Surveillance Counter Measures
  • Understanding the Risk Landscape and Threat Actors
  • User Awareness and Training
  • Vulnerability Assessment and Management

Featured Speakers

SPONSORS

cpd-membercpd-certified

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking