SESSION One: Mapping and Prioritising the Security and Risk Landscape in the Connected, Digital Enterprise
- Engaging the C-suite and boardroom
- Embedding Governance, Risk and Compliance (GRC) into IT estates
- Managing changing perceptions and ensuring Information Security is seen as a business objective that enables growth
- Harnessing disruptive technologies – Exploring Opportunities and Risks associated with Mobile, Big Data, IoT, Blockchain, Machine Learning, AI, Cloud Computing
- Effective risk management strategies and metrics
- Devising policies and response mechanisms
- Emerging cyber threat risks, guidance for business strategists and boards
- Defining risk appetite and allocating Cyber Security resources efficiently
Conference Chair’s Opening Address
Keynote Address: Defending Against Cyber Risk
Dubai Electronic Security Center (DESC) (invited)
Cyber adversaries in the UAE regions are becoming sophisticated and stealthy, resulting in targeted attacks that often circumvent traditional security controls. New IT initiatives expand the attack surface and make cybersecurity more complex. As a consequence many large organisations are losing ground as they attempt to address IT risk with an army of outdated tools and disparate manual processes.
We explore what CISOs should do, the investment being injected into the InfoSec function across the UAE, and government led initiatives in this area.
The Dark Web and Threat Intelligence
Dubai Airport (invited)
The Dark Web has become synonymous with all manner of cyber-crime activities from malware and data leakage through to the publishing of account credentials and hacking. This session covers what the dark, deep, and surface web really are and why they matter to your business.
Managing new Risks: Securing the Fourth Industrial Wave
Emirates Identity Authority (invited)
Disruptive technologies like the IoT, mobile, cloud, big data and blockchain are expanding the cyber-attack surface. As our personal, professional and social lives become more interconnected – and dependent on cyberspace – we ask what emerging risks lie ahead of us and how we can prepare for them.
Smart Cities and Cyber Security
Smart Dubai (invited)
The digital future promised by smart cities offers enormous benefits and prospects for social and economic growth. But with this connectivity and efficiency, new forms of cyber threats emerge . Governments have to ensure that their critical infrastructure – like utilities and health services – are immune from cyber-attacks. We explore initiatives designed to make the smart city agenda safe.
Insuring Against Ransomware and Cyber Extortion
UAE Exchange (invited)
There are significant consequences attached to cyber breaches. These include among other things the loss of customer data, financial costs, penalties from regulators, disruption of services and reputational damage. What can be done to mitigate the fallout of any breach? What is cyber insurance, what is and isn’t covered?
Why Current Security Techniques are failing
Traditional security approaches are failing to proactively identify and block adversary activity. Most security tools address part of the cyber kill-chain. This session looks at:
- Continuous breach prevention techniques
- Real-time intelligence and monitoring
- Machine learning and automated security
Questions to the Panel of Speakers
Refreshment Break Served in the Exhibition Area
SESSION Two: Building Resilience and Mitigating Risks – Sharing lessons learned, new innovations and stratagems for effective risk management
Securing you Cloud
Public cloud solutions have become a problem for managing disparate IT assets. Its use by employees has created information security concerns for many enterprises. We examine the common approaches to solve the challenges around cloud security.
Securing Endpoints – Mitigating Mobile Risks
The always on, always connected enterprise where sensitive data can be accessed anywhere at any time presents both opportunities and risks. Organisations can no longer afford to operate without endpoint protection. We explore the risks of mobility and how, when effectively secured, it can unlock savings and efficiencies for large enterprises.
Questions to the Panel of Speakers and Delegates move to the Seminar Rooms
Networking Lunch Served in the Exhibition Area
SESSION Three: Managing and Implementing a Secure ICT Infrastructure – Sharing best practice on how to analyse vulnerabilities in your ICT infrastructure and eliminate them
Conference Chair’s Afternoon Address
Safeguarding the Digital Enterprise
As organisations embrace cloud, mobile and new emerging technologies along with apps and IT consumer trends designed to unlock greater productivity, the digital enterprise is proving to be more diverse and connected than ever before.
How can businesses improve resilience against targeted and persistent cyberattacks? What can business executives do to get better returns on cyber security investment? How can security help to move business in new directions?
How to Prevent a Breach Before It Happens
We consider how organisations can engage in:
- Measuring organisational risk appetite and adopting an information-centric approach to measuring and managing risk
- Best practice in securing endpoint computing devices
- Establishing an acceptable usage policy
- Trust-based policy controls and technical controls
- Taking consideration of legal rights and user privacy
- Creating user-awareness about responsibilities and standards
- Remote lock/wipe facilities, data recovery methods
Building an Effective Incident Response Plan
An incident response plan is fundamental to managing data breaches. No organisation can afford to be caught off guard.
- What a robust response plan looks like
- Key metrics organisations should be mindful of
- Policy implementation considerations
- Employee and management level buy-in
- Best practices in information governance
Closing Keynote: The importance of cyber security in the modern connected enterprise
Employee and customer data, intellectual property, trade secrets and information relating to bids, mergers, and acquisitions are all tempting targets for a data security breach. With attackers able to go undetected on networks for months, and a significant proportion of cybercrime also undetected, we consider what businesses should do to address vulnerabilities and counter cyber risks to ensure they stay one step ahead of hackers.