ESRM DUBAI

Enterprise Security & Risk Management

17 April 2018

Conrad Dubai (United Arab Emirates)

SOCIAL


LATEST BLOGS


Threat Research – Surveying the Landscape

2nd October 2017

By: Paul John, Senior Security Architect, Secureworks Staying aware of online threats, techniques and markets remains a key part of cyber defence


UAE Population Pose High Risk to the Safety of Their Data

18th September 2017

Research by Kaspersky Lab has found that the UAE is failing to protect their data properly. Even though the ever growing population recognises the danger […]


LATEST TWEETS

THE LEADING STRATEGY EVENT FOR INFOSEC, CYBER SECURITY & RISK MANAGEMENT
professionals across every major business sector

At a glance

INFORMATION SECURITY REMAINS A CRITICAL CONCERN FOR THE UAE’S GROWING ECONOMY AND IS FUELLED BY INCREASED AWARENESS OF SECURITY CHALLENGES AS THE COUNTRY TRANSITIONS TOWARDS DIGITAL MODELS OF SERVICE DELIVERY.

ICT spending in the UAE reached an estimated $16 billion in 2016 and topped $200 billion across the Middle East and North Africa (MENA) more generally. The ascendancy of emerging tech trends like cloud, mobile, AI, big data, blockchain and IoT – all of which are key to the Smart Dubai initiative – are enhancing the need for reliable and agile processes that are secure by default. Security is fundamental for the adoption of the most advanced technologies as the UAE looks to diversify its economy, make businesses more efficient, and government more responsive.

Join hundreds of leading InfoSec, cyber security and risk management professionals at Whitehall Media’s prestigious 2nd ESRM Dubai conference to discuss the latest developments and best practices needed to address the most pressing security risks of tomorrow. Our line-up of expert speakers will discuss the cyber risk landscape, opportunities to detect and deter cyber-attacks through appropriate skills and capabilities, and the best practices to protect critical national systems and networks.

This must-attend event offers unrivalled networking opportunities and insights on how to design, implement and embed deliverable action plans that balance risk mitigation with the pursuit of business growth. Through a series of thought-leadership and case-study presentations, the conference will showcase the very best examples of how the public and private sectors are building resilience and utilising technology to solve strategic security issues.

FEATURED TOPICS

  • Active Defence Mechanisms, Tools and Techniques
  • Advanced Persistent Threats/Advanced Evasive Techniques
  • Blockchain and Cyber Security
  • Breach Response Workflow/Planning
  • Building a Secure Cyberspace
  • Building Cyber Skills and Capabilities
  • Business Continuity Management and Contingency Planning
  • End-User Devices / Application / Mobile Security
  • Change Management/Programme Management
  • Cloud Security Principles, Practice, Integration
  • Combatting Cybercrime
  • Creating a Cyber-Aware Workforce
  • Critical Infrastructure and Operational Technology Security
  • Cyber Hygiene and Compliance
  • Cyber Policing / Incidence Detection / Response Management
  • Cyber Risk Management and Insurance
  • Data Governance and Protection
  • Data Loss Prevention, Disaster Recovery, Hardware Security
  • Detecting Espionage / Managing Data Theft and Leakage
  • Digital Rights Management
  • Disruptive Technologies – IoT, AI, Machine Learning, Blockchain (Opportunities and Risks)
  • Emergency Planning
  • Encryption, firewall technology, anti-virus, Cryptography, Cryptanalysis, Network Security
  • Fraud Detection and Response
  • IaaS, PaaS, SaaS
  • Identity Assurance and Access Management
  • Infrastructure Management and Security
  • Legacy Systems and Continuous Improvement Challenges
  • Mobile Risks and Mitigation
  • Network Securty and Monitoring
  • Penetration Testing
  • Personnel Security / changing role of HR
  • Risk Management Frameworks, Metrics, Strategy
  • Securing Critical National Infrastructure
  • Securing Online Transactions
  • Securing Electronic Payment Systems
  • Security Classification and Policy Enforcement
  • Social Media Challenges / Risks
  • Supply Chain Security
  • Technical Surveillance Counter Measures
  • Understanding the Risk Landscape and Threat Actors
  • User Awareness and Training
  • Vulnerability Assessment and Management

Previous Speakers

SPONSORS

cpd-membercpd-certified

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking