ESRM DUBAI

Enterprise Security & Risk Management

17 April 2018

Conrad Dubai (United Arab Emirates)

SOCIAL


LATEST BLOGS


Public WiFi Security Tips and Tools

10th August 2017

As the number of consumers with mobile devices continues to rise, so too does the demand for reliable internet access. Out of necessity, many businesses […]


Nearly 50% of businesses fell victim to a cyber-attack in the last year

20th July 2017

“Once more unto the breach, dear friends, once more!”, Shakespeare wrote in Henry V.


LATEST TWEETS

The LEADING STRATEGY EVENT FOR INFOSEC, CYBER SECURITY & RISK MANAGEMENT
professionals across every major business sector

At a glance

INFORMATION SECURITY REMAINS A CRITICAL CONCERN FOR THE UAE‘S GROWING ECONOMY AND IS FUELLED BY INCREASED AWARENESS OF SECURITY CHALLENGES AS THE COUNTRY TRANSITIONS TOWARDS DIGITAL MODELS OF SERVICE DELIVERY.

ICT spending in the UAE reached an estimated $16 billion in 2016 and topped $200 billion across the Middle East more generally. The ascendancy of emerging tech trends like cloud, mobile, big data and IoT – all of which are key to the Dubai smart city initiative – are enhancing the need for reliable and agile processes that are secure by default. Security is fundamental for the adoption of the most advanced technologies as the UAE looks to diversify its economy, make businesses more efficient, and government more responsive.

Join hundreds of leading InfoSec, cyber security and risk management professionals at Whitehall Media’s prestigious inaugural ESRM Dubai conference to discuss the latest developments and best practices needed to address the most pressing security risks of tomorrow. Our line-up of expert speakers will discuss the cyber risk landscape, opportunities to detect and deter cyber-attacks through appropriate skills and capabilities, and best practice required to protect critical national systems and networks.

This must-attend event offers unrivalled networking opportunities and insights on how to design, implement and embed deliverable action plans that balance risk mitigation with the pursuit of business growth. Through a series of thought-leadership and case-study presentations, the conference will showcase the very best examples of how the public and private sectors are building resilience and utilising technology to solve strategic security issues.

FEATURED TOPICS

  • Active Defence Mechanisms, Tools and Techniques
  • Advanced Persistent Threats/Advanced Evasive Techniques
  • Breach Response Workflow/Planning
  • Building a Secure Cyberspace
  • Building Cyber Skills and Capabilities
  • Business Continuity Management and Contingency Planning
  • BYOD / End-User Device / Application Security
  • Change Management/Programme Management
  • Cloud Security Principles, Practice, Integration
  • Combating Cybercrime
  • Critical Infrastructure and Operational Technology Security
  • Cyber Hygiene and Compliance
  • Cyber Policing / Incidence Detection / Response Management
  • Risk Management Frameworks, Metrics, Strategy
  • Cyber Risk Management and Insurance
  • Data Governance and Protection
  • Data Loss Prevention, Disaster Recovery, Hardware Security
  • Detecting Espionage / Managing Data Theft and Leakage
  • Digital Rights Management
  • Disruptive Technologies – IoT, AI, Machine Learning, Blockchain (Opportunities and Risks)
  • Encryption, firewall technology, anti-virus, Cryptography, Cryptanalysis, Network Security
  • Fraud Detection and Response
  • IaaS, PaaS, SaaS
  • Identity Assurance and Access Management
  • Infrastructure Management and Security
  • Legacy Systems and Continuous Improvement Challenges
  • Mobile Risks and Mitigation
  • Penetration Testing
  • Personnel Security / changing role of HR
  • Securing Critical National Infrastructure
  • Securing Online Transactions
  • Security Classification and Policy Enforcement
  • Social Media Challenges / Risks
  • Supply Chain Security
  • Technical Surveillance Counter Measures
  • Understanding the Risk Landscape and Threat Actors
  • User Awareness and Training
  • Vulnerability Assessment and Management

Featured Speakers

SPONSORS

cpd-membercpd-certified

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking