Sei sulla pagina 1di 8

2 & 3 May 2016, Riyadh Marriott Hotel, Riyadh Kingdom of Saudi Arabia

Detect • Protect • Respond

Re s e a r c h e d & D eve l o p e d by C o - o r g a nize d by


MIDDLE EAST
CYBER SECURITY SUMMIT 2016

Silver Sponsor Keynote Partner

Associate Sponsors

Networking Solution Providers

Association Partner Exclusive News Partner Official Media Partner

Media Partners

CrowdReviews
Buyers Guide Based On Client Reviews
CONFERENCE PROGRAMME

Conference Sectors
Overview
The Kingdom of Saudi Arabia’s rapidly growing
economy, high rate of internet usage, mobile
Information Technology (IT)
penetration and highly sophisticated infrastructure
makes the Kingdom an attractive destination for
hackers. The Kingdom of Saudi Arabia is ranked
second globally when it comes to spam attacks
and is leading in the Gulf Region in terms of cyber-
attacks.
Energy & Utilities
The market for Cyber Security exports alone is
Healthcare
estimated to grow to over $ 37.5 billion by 2016
with a growing rate 10% on the investments on
Information Technology (IT) and Software year on
year. Due to the growing public demand, there is a
huge increase in the private cyber security exports Aerospace, Defence
across the energy sector, financial services & Security
Communications
sector, information technology (IT) sector, and
communications sector. Recent cyber-attacks
have created the need to establish a regulatory and
legislative frame-works to support the Kingdoms Banking & Financial
cyber safety. As per the National Information
Security Strategy the Kingdom of Saudi Arabia
has increased cyber security spending and
investment across government agencies and local
governments. The Saudi Arabian cyber security
market is expected to grow to over $3.48 billion by
2019, at a rate of 14.50%. The continuous attacks
on energy sector has led to the high defense
spending in the country.

Hence, Nispana is proud to announce the Cyber


Security Summit which is scheduled to take place
on the 2 & 3 of May 2016 in Riyadh Marriott Hotel,
Riyadh Kingdom of Saudi Arabia. This summit will
feature an array or presentations and interactive
panel sessions from international experts to
address current challenges faced and come up
with strategies to pave the way for a cyber-safe
future. The Cyber Security Summit will present
all the participants with an excellent opportunity
to network with peers, share divergent viewpoints
as well as identify internationally renowned cyber
security solutions that can be used to totally
eradicate cyber-attacks.

+91
+919916954438
9916304951
80 4933 1000
/ +91 9663864466
+91 80 4933pradish.g@nispana.com
1003 mark.white@nispana.com
enquiries@nispana.com www.nispana.com/ksacyber
www.nispana.com/ksacyber
MIDDLE EAST
CYBER SECURITY SUMMIT 2016

Confirmed Speakers

Basel Alomair, Ph.D.


Russell Gann
Founding Director, National Center for Cybersecurity
Consultant CIO, OPM-SANG
Technology (C4C) King Abdulaziz City for Science
Ministry of the National Guard
and Technology (KACST)

Zane Sarraf Dr. Hani Mohammed Al Zaid


Senior IT Consultant Head of IT
Smart city solutions Al Shura Council

Mansour A. Aldajani Sultan AbuKoshaim


CIO and Advisor CIO & Governor’s Advisor
ECRA Saudi Standards Metrology & Quality Organization (SASO)

Dr. Abdulrahman Al-Motrif


Amr Mohamed Gaber
Assistant Professor of Information Technology
Chief Information Security Officer
& Educational Computing, King Saud university
Dubai Media Incorporated
CEO, Saudi Health Information Systems

Abdallah Sinan Mohamed Ruwaid Zumla


Snr. Business Group Lead - Cloud Enterprise Cyber Security Strategist
Microsoft Consultant

Jalal Al-Bokhary Vijay Babber


Enterprise Accounts Manager Senior Sales Engineer
Intel Security Saudi Arabia Gigamon

Ali Fathi Al-Sheikh Ahmed Patrick MacGloin


President ME Cyber Security Lead
ISACA Riyadh Chapter PwC

Nicolai Solling Abdirashid Samater


Chief Technology Officer Information security Advisor
Help AG Ministry of Justice

Faris Abdullah Al-Kharusi


Iman Said Abdillahi Iman
Head of Business Excellence – Real-Time
Senior Security Consultant
Operations & Smart Fields
EBDAA
Petroleum Development Oman

Nazeeruddin Mohammad
Assistant Professor
Prince Mohammad Bin Fahd
University
MIDDLE EAST
CYBER SECURITY SUMMIT 2016

Benefits of Attending
• Examine the probability of impact and incidents within an industrial control system

• Learn to tackle Advanced Persistent Threats (APT) & Advanced Volatile Threats (AVT) for building a robust IT security system

• Tackle backdoor interface vulnerabilities in SCADA, ICS and DCS networks to prevent real time threats

• Prevent cyber espionage and data theft to enhance information security and ensure confidentiality of data

• Learn best practices in incident management and response, cloud computing security, containment, investigations and cyber
forensics for building a strong cyber security framework

• Obtain an overview of the issues and considerations around industrial control systems and cyber security

• Learn how to successfully facilitate a risk-management workshop and critically assess your industrial control systems

• Participate in an interactive, scenario-based cyber-attack simulation to obtain a better understanding of cyber-crime & its
impacts

Networking Opportunities With


• Chief Information Security Officers • Heads of DCC
• Chief Privacy Officers • Heads of SCADA
• Chief Risk Officers / Risk Managers • Infrastructure Managers
• CIOs and IT senior leadership • IT Security Managers
• Compliance Managers • Network Security: Engineers
• Cyber Policy: Heads and Influencers • Operational Technology Managers
• Fraud Managers • Security Architects / Enterprise Architects
• Government Officials-IT / OT Authorities • Head of Information Security

Data & Cloud Security Mobile Security

Risk & Governence Digital Forensics

Zero Day Security for Critical


Vulnerabilities Infrastructure
2nd Annual Middle East Cyber Security Summit
Day 1 2 May 2016, Riyadh Marriott Hotel, Riyadh Kingdom of Saudi Arabia

8:00 Registration 12:00 Malware, Phishing & Mobile Security: Trending


Threats
8:40 Chief Guests Welcome Address & Inaugural
Ceremony • Compliance as a driver to improve and
enhance mobile security
8:50 Conference Chairman’s Welcome Address • Creating expansive, flexible security program
Session: ICT Infrastructure Security • Re looking at authentication, payment
transactions and privacy
9:00 Government Regulations, Policies & Plans for
Kingdom Wide Cyber Security 12:30
Cyber security for military deployed networks
• Technical factors which affects security leaks
• National Information Security Strategy
within deployed data networks
• Government regulations and mandates for
• Classified data sharing networks - Actions
cyber security
required for military operators
• Regional mandates for sharing of critical data
• Level of security once a security leak is
on hackers and changing threats
identified
9:30 Implementation of Secure & resilient Kingdom
wide ICT infrastructure to support the National plans 13:00 Networking Lunch Break

14:00 History and mechanism of a Ransomware attack


• Development of a robust ICT infrastructure
• Updating and hardening of technical • Infection Vector
infrastructure to a state of acceptable resilience • Command control and cryptography
• Cultivating ICT security workforce • Ransom demand extortion of money or
bitcoins
10:00 Implementing a Fail Proof Cyber Security
Program to Safeguard the Kingdom’s Critical Session Theme: Mobile Security
National Infrastructure 14:30 Assessing threats evolving through mobile
• Cyber Security Programs for the Energy & platforms
Utilities Sector • Root of trust and policy enforcement engine
• Government regulations and mandates for • Machine to Machine and near field
cyber security communication
• Regional mandates for sharing of critical data • Ongoing consumer education
15:00 Understanding Mobile Threat Landscape
10:30 Networking Coffee Break
• Security implications of Mobile Banking
11:00 Protecting Telecommunications and network services (connecting via wifi platforms)
services from cybercrime • Mobile malware drive-bys a variation on the
botnets
• Identifying the fragile links and challenges in • Mobile based DDOS and cloning
M2M cyber security.
• The focus on Security risks and responses in 15:30 Hardware Firmware and OS platform security

an evolving telecommunications industry • Carrier infrastructure attacks
which advances in connecting the unconnected • Device firmware attacks
• Borderless infrastructure connectivity • Baseband chipset attacks
increasing the scope of threats
16:00 Panel Discussion: Deep web and black web
Session: Mobile Security marketplace capitalising on zero day flaws to
launch a potential cyber weapon
11:30 Assessing threats evolving through mobile
platforms 16:30 End of Conference Day 1 & Networking coffee
• Root of trust and policy enforcement engine Break
• Machine to Machine and near field communication
• Ongoing consumer education

For At tendin g C ont ac t


A run Kumar | Busines s Head | +91 9 4 8 0 9 9 6 424 | arun.kumar@nispana.com
2nd Annual Middle East Cyber Security Summit
Day 2 3 May 2016, Riyadh Marriott Hotel, Riyadh Kingdom of Saudi Arabia

8:00 Registration 11:15 Coffee Networking Break

9:00 Chairman’s Welcome Remark’s 12:00 Recovering Cyber Security for SCADA Networks
• Effective configuration processes
Session Theme: Risk Management & Governance • Crisis preparation: Securing of industrial
& Law Enforcement and Digital evidences & Cyber networks
Investigations • Looking closely into the monitoring systems:
Protocols needed for system administrators
9:15 Cyber security governance and risks for
financial institutions 12:30 Using Big Data Analytics to defend cyber
security threats
• Desired outcomes of information security
governance • Next generation Security architecture
• Knowledge and protection of information assets • Connected platforms and big data
• Benefits of information security governance • Next generation firewall
• Process integration
12:35 Panel Discussion: “Is the next world war a
9:45 Information security frameworks components Cyber war?”
for financial institutions
• Compliance audits of third parties that handle 1:00 Networking Lunch Break
customer data
• Dedicated response team for any cyber 2:00 Protecting Telecommunications & network
breaches services from cybercrime as it connects the globe
• Implementation of Threat Assessments and
• Identifying the fragile links and challenges in
regulatory requirements to build a strong
M2M cyber security.
network to combat attacks
• The focus on Security risks and responses in
10:15 Confronting Cybercrime: Underlining the an evolving telecommunications industry which
challenges advances in connecting the unconnected
• Failures in reporting crime by organization 2:30 Cyber Security from an Middle East Perspective
• Behavioural analysis of cyber criminals and its
• Constructing Solid Legal foundations
importance
• PPP in cybersecurity
• Cyber Crime creating damages far beyond
• Increase awareness regarding cyber threats
networks
and risks
10:45 Looking closely into cloud networks and
3:00 Cyber security and privacy for open data in
connections
smart cities
• Intrusion detection and prevention systems
• Synergy between ICT vendors and energy
(IDS/IPS)
suppliers
• Traffic screening which stand strong to
• Cyber resilience to rapidly recover from
Distributed Denial-of-Service attacks
disruption
• Incident reporting and incident handling
• Ensuring continuity of critical services
(network Logging)
3:30 End of Conference & Networking coffee Break

Re s e a r c h e d & D eve l o p e d by

I n d i a O f f i c e: S i va nik # 270, 2n d Fl o o r, 14t h C r o s s, I n di r a n a g a r 2n d S t a g e, B e n g a lur u - 5 6 0 0 3 8


D u b a i O f f i c e: Em i r ate s Towe r s, Leve l 41, S h e ik h Z aye d Ro ad, P.O B ox 313 0 3 . D ubai - UA E
USA O f f i c e: N i s p a n a I nn ovat i ve Pl at f o r m s I n c , 1619 2 C o ast a l H i g hway, Lewe s, D E19 9 5 8 , U S A
MIDDLE EAST
CYBER SECURITY SUMMIT 2016

Contract & Registration Form Please complete this form and fax back to +91804 933 1003
or email to registrations@nispana.com

Please debit my:


Ms Mrs Mr
Visa Master Dinner’s Club
Full name: ___________________________________
Card billing address: _____________________________
Job title: ____________________________________ Street: _____________________________________
Email: ______________________________________ City: _________________ Zip code: ________________
Ms Mrs Mr Card holder’s name: _____________________________
Full name: ___________________________________
Job title: ____________________________________ Card holder’s signature: __________________________
Card number:
Email: ______________________________________

Ms Mrs Mr
CVV/CVC Number:
Full name: ___________________________________ Last 3 digits on the back of your card

Job title: ____________________________________ Valid from: Expiry date:


Email: ______________________________________
I agree to Nispana’s terms and conditions and to
Nispana debiting my card.
Organization: ________________________________
Address: _____________________________________
Authorization:
___________________________________________
___________________________________________ Signatory must be authorized on behalf of
City: __________________ Zip code: _______________ contracting organization
Phone: _________________ Fax: __________________
Name: ______________________________________ Name: ____________________________________
Date: _____________________________________
Mobile: _____________________________________
Signature: _________________________________
Email: ______________________________________ (booking is invalid without a signature)
Nature of business: _____________________________
Website: ____________________________________
Delegate Registration Fee
USD 1499 Per Delegate
Terms and Conditions:
Nispana requires the full payment within 5 days from receipt of invoice. Total Delegates: Total Amount:
Nispana reserves the right to refuse entry to any customer who has not paid
their invoice. A Credit card guarantee may be requested if full payment has
_________________________________
(a) Payment is required within 5 working days
not been received. All bookings carry a 50% liability after the booking has
(b) Amount above is applicable only for one person
been made. There will be no refunds for cancellations received on or after
one month before the start of the Workshop. If you decide to cancel after
this date the full invoice remains payable.

Nispana reserves the right to change the content, timing, speakers or venue Fee includes:
should circumstances require. The event may be postponed or cancelled due Documentation Pack, Course Sessions, Lunches & Refreshments
to acts of terrorism, war extreme weather conditions, industrial action, acts
Fee does not include travel, hotel accommodation, transfers or insurance.
of God or any event beyond the control of Nispana. If such a situation arises
Hotel Accommodation: Overnight accommodation is not included in
we will endeavor to reschedule the event. However Nispana cannot be held
the registration fee. A reduced rate will be available at the raining Hotel.
responsible for any cost, damage or expenses which may be incurred by
Booking form will be sent out right after the venue will be confirmed, but
the customer as a consequence of the event being postponed or cancelled.
not later than one month prior to the event.

+91 9916304951
80 4933 1000 +91 80 4933 1003
mark.white@nispana.com
enquiries@nispana.com www.nispana.com/ksacyber

Potrebbero piacerti anche