ESRM DUBAI

Enterprise Security & Risk Management

17 April 2018

Conrad Dubai (United Arab Emirates)

SOCIAL


LATEST BLOGS


Secure Digital Transformation for Dubai Innovation Month

18th January 2018

By J Connolly UAE Innovation Month kicks off in two weeks and as part of the event, organisations will be asking themselves how they can […]


Threat Research – Surveying the Landscape

2nd October 2017

By: Paul John, Senior Security Architect, Secureworks Staying aware of online threats, techniques and markets remains a key part of cyber defence


LATEST TWEETS

PROGRAMME

SESSION One: Mapping and Prioritising the Security and Risk Landscape in the Connected, Digital Enterprise

  • Engaging the C-suite and boardroom
  • Embedding Governance, Risk and Compliance (GRC) into IT estates
  • Managing changing perceptions and ensuring Information Security is seen as a business objective that enables growth
  • Harnessing disruptive technologies – Exploring Opportunities and Risks associated with Mobile, Big Data, IoT, Blockchain, Machine Learning, AI, Cloud Computing
  • Effective risk management strategies and metrics
  • Devising policies and response mechanisms
  • Emerging cyber threat risks, guidance for business strategists and boards
  • Defining risk appetite and allocating Cyber Security resources efficiently

 

10.00
Conference Chair’s Opening Address
10.10
Keynote Address: Defending Against Cyber Risk

Dubai Electronic Security Center (DESC) (invited)

Cyber adversaries in the UAE regions are becoming sophisticated and stealthy, resulting in targeted attacks that often circumvent traditional security controls. New IT initiatives expand the attack surface and make cybersecurity more complex. As a consequence many large organisations are losing ground as they attempt to address IT risk with an army of outdated tools and disparate manual processes.

We explore what CISOs should do, the investment being injected into the InfoSec function across the UAE, and government led initiatives in this area.

10.30
A New Era of Cyber Threats: The Shift to Self Learning, Self Defending Networks

Elizabeth de Freitas, Country Manager, Darktrace

This session will cover –

  • Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats
  • How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time
  • How to achieve 100% visibility of your entire business including cloud, network and IoT environments
  • Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk
  • Real-world examples of subtle, unknown threats that routinely bypass traditional controls
10.50
Managing new Risks: Securing the Fourth Industrial Wave

Mohamed Mousa, Chief Information Security Officer, IKEA Saudi Arabia

Disruptive technologies like the IoT, mobile, cloud, big data and blockchain are expanding the cyber-attack surface. As our personal, professional and social lives become more interconnected – and dependent on cyberspace – we ask what emerging risks lie ahead of us and how we can prepare for them.

11:10
ICT Asset Disposition - Minimizing Risk & Maximizing Value

Stephen Phelan, Managing Director for The Middle East, North Africa and Turkey, Sims Recycling Solutions

This session will discuss:

  • Options to dispose of used corporate ICT assets
  • Data Security Compliance
  • Environmental Compliance
  • Transparency & Reporting
  • Compliance & Obtaining Cash for your Assets
11:25
Questions to the Panel of Speakers
11:35
Refreshment Break Served in the Exhibition Area

SESSION Two: Building Resilience and Mitigating Risks – Sharing lessons learned, new innovations and stratagems for effective risk management

12:05
Securing you Cloud

Mahmoud Yassin, VP, Data Center Management at National Bank of Abu Dhabi

Public cloud solutions have become a problem for managing disparate IT assets. Its use by employees has created information security concerns for many enterprises. We examine the common approaches to solve the challenges around cloud security.

12.25
Securing Endpoints – Anatomy of an Attack

Abbas Sabuwala, Head of Information Security and Support Systems, United Arab Shipping Company

12.45
Case Study: Nakheel

Safdar Zaman, Head of IT Strategy and Governance, Nakheel

13:00
Questions to the Panel of Speakers and Delegates move to the Seminar Rooms
13:15
Networking Lunch Served in the Exhibition Area

SESSION Three: Managing and Implementing a Secure ICT Infrastructure – Sharing best practice on how to analyse vulnerabilities in your ICT infrastructure and eliminate them

14:15
Conference Chair’s Afternoon Address
14:20
Safeguarding the Digital Enterprise - A Pragmatic Approach to Your Security

Ashish Khanna, Information Security Specialist, Dubai Health Authority

As organisations embrace cloud, mobile and new emerging technologies along with apps and IT consumer trends designed to unlock greater productivity, the digital enterprise is proving to be more diverse and connected than ever before.

How can businesses improve resilience against targeted and persistent cyberattacks? What can business executives do to get better returns on cyber security investment? How can security help to move business in new directions?

14.35
How to Prevent a Breach Before It Happens

We consider how organisations can engage in:

  • Measuring organisational risk appetite and adopting an information-centric approach to measuring and managing risk
  • Best practice in securing endpoint computing devices
  • Establishing an acceptable usage policy
  • Trust-based policy controls and technical controls
  • Taking consideration of legal rights and user privacy
  • Creating user-awareness about responsibilities and standards
  • Remote lock/wipe facilities, data recovery methods
14.50
Building an Effective Incident Response Plan

An incident response plan is fundamental to managing data breaches. No organisation can afford to be caught off guard.

We explore:

  • What a robust response plan looks like
  • Key metrics organisations should be mindful of
  • Policy implementation considerations
  • Employee and management level buy-in
  • Best practices in information governance
15.05
Closing Keynote: The importance of cyber security in the modern connected enterprise

Employee and customer data, intellectual property, trade secrets and information relating to bids, mergers, and acquisitions are all tempting targets for a data security breach. With attackers able to go undetected on networks for months, and a significant proportion of cybercrime also undetected, we consider what businesses should do to address vulnerabilities and counter cyber risks to ensure they stay one step ahead of hackers.

15:20
Questions to the Panel of Speakers
15.30
Closing Remarks from the Chair
15:35
Afternoon Networking and Refreshments served in the Exhibition Area
16.15
Conference Closes, Delegates Depart