ORGANISED BYCO-LOCATED WITH
13-14 FEBRUARY 2019
RIYADH INTERNATIONAL CONVENTION & EXHIBITION CENTER (RICEC)RIYADH, SAUDI ARABIA
PROGRAMME AGENDA
POWERED BYLEAD SPONSOR
CO-LOCATED WITH ORGANISED BY
While technology has transformed the way we do business, it has seeded an unprecedented amount of risk in organizations paving way for hackers to infiltratetheir systems. Emerging markets are becoming a hot bed for the hackers to try their skills, harvest information as well as cause damage – for political, financial,and economic motives.
The Cyber Defence Summit taking place in Riyadh, Saudi Arabia will gather global experts in the cyber arena giving you the latest insights on securing yourorganization’s critical business infrastructures.
SESSION CATEGORIES
KEYNOTES PANEL DISCUSSIONS
FAST TRACK SESSIONS(WORKSHOPS)
PRIVATE MEETINGS
EXHIBITION
RIYADH INTERNATIONAL CONVENTIONS AND EXHIBITIONS CENTER
LEAD SPONSOR POWERED BY
SUMMIT SPONSORS
LEADSPONSOR
PLATINUMSPONSORS
GOLDSPONSORS
SILVERSPONSORS
BRONZESPONSORS
EXHIBITORS
POWERED BY
CO-LOCATED WITH LEAD SPONSORORGANISED BY POWERED BY
STRETEGIC PARTNER
DAY ONE WEDNESDAY, 13 FEBRUARY 2019
08.00 – 09.10REGISTRATION
09.10 – 09.15RECITATION OF THE HOLY QURAN
09.15 – 09.30OPENING KEYNOTECYBER SECURITY POSTURE IN THE ARAB REGION
• ANALYSIS OF THE COMMITMENT FROM COUNTRIES ON CYBERSECURITY AT THE GLOBAL AND REGIONAL LEVEL
• EXAMPLES OF GOOD PRACTICES IN ARAB COUNTRIES
09.30 – 09.45KEYNOTESECURING THE DIGITAL TRANSFORMATION FOR SAUDI VISION 2030
• DIGITAL TRANSFORMATION IN GOVERNMENT INSTITUTIONS• SECURING CRITICAL INFORMATION INFRASTRUCTURES• SECURITY AS A SHARED RESPONSIBILITY S
PE
AK
ER
10.15 – 11.15PANEL DISCUSSIONCOLLECTIVE COLLABORATION TO COMBAT CYBERCRIMES
• HOW GOVERNMENT COLLABORATIONS CAN DRIVE NATIONAL CYBER SECURITY OBJECTIVES
• PUBLIC-PRIVATE PARTNERSHIP IN CYBER SECURITY• NATIONAL OR REGIONAL THREAT INTELLIGENCE PLATFORM
WWW.SAUDICDS.COM
PA
NE
LIS
TS
MR. AMIT MEHTACISO – MIDDLE EAST & AFRICAMASTER CARDUNITED ARAB EMIRATES
PLENARY TRACKMAIN CONFERENCE AREA
MR. MARCO OBISOHEAD OF ICT APPLICATIONS & CYBER SECURITYINTERNATIONAL TELECOMMUNICATION UNION (ITU)SWITZERLAND
10.00 – 10.15KEYNOTETHE RELENTLESS MARCH OF TECHNOLOGY DRIVEN INNOVATION ANDTHE SERIOUS IMPLICATIONS WE’RE WITNESSING
• THE HISTORY AND FUTURE OF CONSUMER PATTERNS AND DRIVERS• THE VALUE OF DATA IN TODAY’S WORLD• THE CURRENT STATE OF E-FRAUD
09.45 – 10.00KEYNOTEBENEATH THE AI BUZZWORDS: A BALANCED PERSPECTIVE OF AI IN SECURITY
• DO I HAVE MACHINE LEARNING OR ARTIFICIAL INTELLIGENCE OR BOTH?• COMMON MISCONCEPTIONS ABOUT MACHINE LEARNING IN INFORMATION SECURITY• THE REAL BENEFITS OF MACHINE LEARNING IN SECURITY
SP
EA
KE
RS
PE
AK
ER
SP
EA
KE
R
CO-LOCATED WITH LEAD SPONSORORGANISED BY
MR. HANNES KRAUSEHEAD OF POLICY AND ANALYSISESTONIAN INFORMATION SYSTEMS AUTHORITYESTONIA
MR. MUSTAFA ERTENPROJECT COORDINATORUNITED NATIONS OFFICE ON DRUGS AND CRIME (UNODC)UNITED ARAB EMIRATES
MR. BAHER ESMATVICE PRESIDENT – STAKEHOLDER ENGAGEMENTINTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS (ICANN)EGYPTM
OD
ER
ATO
R MR. AVINASH ADVANICEOSPIRE SOLUTIONSUNITED ARAB EMIRATES
POWERED BY
DR. HYRUM ANDERSONCHIEF SCIENTISTENDGAMEUNITED STATES OF AMERICA
DR. MOATAZ BIN ALIVICE PRESIDENT & MANAGING DIRECTOR - MENATREND MICROSAUDI ARABIA
MR. MARCO OBISOHEAD OF ICT APPLICATIONS & CYBER SECURITYINTERNATIONAL TELECOMMUNICATION UNION (ITU)SWITZERLAND
RAMY AL DAMATICYBERSECURITY SOLUTIONS ARCHITECT KASPERSKY LABSUNITED ARAB EMIRATES
13.00 – 13.15KEYNOTECREATING A FREE, FAIR AND SECURE CYBERSPACE – JAPAN’S CYBERSECURITY JOURNEY
• STRENGTHENING INTERNATIONAL COORDINATION • CAPACITY BUILDING MEASURES• PROTECTING PRIVACY
SP
EA
KE
R MR. HIDETOSHI OGAWADIRECTOR – INTERNATIONAL STRATEGYNATIONAL CENTER OF INCIDENT READINESS AND STRATEGY FOR CYBERSECURITY (NISC), JAPAN
12.15 – 13.00PANEL DISCUSSIONHOW PRIVACY HAS CHANGED THE WAY WE COMMUNICATE
• DATA EXPOSURE – KNOWING THE LIMITS• IMPORTANCE OF DIGITAL ETHICS• BIG DATA VS PRIVACY
PA
NE
LIS
TS
MR. ENRIQUE GOMICIAPRINCIPAL RESEARCHERHUNGERSTATION.COMSAUDI ARABIA
MR. SULTAN MORISHEDCHIEF INFORMATION SECURITY OFFICER (CISO)HSBCSAUDI ARABIA
11.15 – 12.15BREAK FOR COFFEE, DHUHR PRAYERS AND ONE-TO-ONE SECURITY CONSULTATIONSPOST BREAK, THE CONFERENCE WOULD CONTINUE IN THE MAIN CONFERENCE ROOM AND CONCURRENT WORKSHOPS WILL TAKE PLACE IN WORKSHOP ROOM 1, ROOML 2 AND ROOM 3.
CONFERENCE TRACKMAIN CONFERENCE ROOM
TECHNICAL WORKSHOPSWORKSHOP ROOMS
WORKSHOP ROOM 1 WORKSHOP ROOM 2
12.15 – 13.00APPLYING MACHINE LEARNING AND AI IN
CYBER SECURITY
12.15 – 13.00
CLOUD SECURITY
MR. LYNEL D’SOUZAMAJOR ACCOUNTS
EXECUTIVEAKAMAI TECHNOLOGIES
UAE
MR. RIKU VALPASSR. MANAGER –
SECURITY ENGINEERINGFORTINET
SAUDI ARABIA
DAY ONE WEDNESDAY, 13 FEBRUARY 2019
WWW.SAUDICDS.COM
WORKSHOP ROOM 3
12.15 – 13.00AUTOMATED
INVESTIGATION WITH ARTIFICIAL
INTELLIGENCE -ACTIVE EDR.
CO-LOCATED WITH LEAD SPONSORORGANISED BY
ENG. ABDULLAH AL-OMARICHIEF INFORMATION OFFICER (CIO)MOBILYSAUDI ARABIA
DR. WAËL KANOUNHEAD OF CYBER SOLUTIONS THALES MIDDLE EASTUNITED ARAB EMIRATES
POWERED BY
CH
AIR
PE
RS
ON
MR. MOHAMED ELSHAHEDVENDOR MANAGER
EXCLUSIVE NETWORKSSAUDI ARABIA
MR. CHERIF DJERBOUAREGIONAL TECHNICAL LEADERTREND MICROUNITED ARAB EMIRATES
13.30 – 13.45KEYNOTECYBER SECURITY PREDICTIONS: 2019 AND BEYOND
• CORE DATA PROTECTION PRINCIPLES• REDUCING DATA RISK EXPOSURE• WHAT TO EXPECT IN THE COMING YEARS
13.15 – 13.30KEYNOTETHE STATE OF CYBERSECURITY TODAY
• THE INDUSTRY SUFFERS FROM CYBERSECURITY SKILLS SHORTAGE . • WHAT ARE YOU TRYING TO PROTECT ?• HOW TO DELIVER SECURITY EFFICACY AND BUDGET EFFICIENCY ?
13.45 –
END OF DAY ONE
CONFERENCE TRACKMAIN CONFERENCE ROOM
TECHNICAL WORKSHOPSWORKSHOP ROOMS
WORKSHOP ROOM 1 WORKSHOP ROOM 2
DAY ONE WEDNESDAY, 13 FEBRUARY 2019
WORKSHOP ROOM 3
WWW.SAUDICDS.COM
CO-LOCATED WITH LEAD SPONSORORGANISED BY
SP
EA
KE
R MR. JAMIL AQELTECHNOLOGY SALES & SERVICES MANAGERSYMANTECUNITED ARAB EMIRATES
MR. DUNCAN BROWNEMEA CHIEF SECURITY
STRATEGISTFORCEPOINT
UNITED KINGDOM
MR. BAHI HOURDIRECTOR OF SYSTEMS ENGINEERING – META
ATTIVO NETWORKSUNITED ARAB EMIRATES
13.15 – 14.00
EXTENDING BEHAVIORAL INSIGHTS
INTO RISK ADAPTIVE PROTECTION AND
ENFORCEMENT
13.15 – 14.00
ADAPTIVE CYBER DECEPTION FOR EARLY
& ACCURATE THREAT DETECTION AND
AUTOMATED RESPONSE
MR. AYMAN ABUREYALEHCYBERSECURITY AREA SALES MANAGERCISCOUNITED ARAB EMIRATES
SP
EA
KE
R
POWERED BY
MR. HUSSAM ABU-RIDASOLUTIONS ARCHITECT
TREND MICROSAUDI ARABIA
13.15 – 14.00
HYBRID CLOUD SECURITY
09.00 – 10.00REGISTRATION
10.30 - 10.45KEYNOTEDECEPTION, CONFUSION, DIVERSION: ALTERING THE ATTACK SURFACE TO GAIN TACTICAL ADVANTAGE
• THE IMPORTANCE OF TERRAIN• THE MITRE ATTACK FRAMEWORK• ALTERING THE ATTACH SURFACE
SP
EA
KE
R
WWW.SAUDICDS.COM
CO-LOCATED WITH LEAD SPONSORORGANISED BY
DAY TWO THURSDAY, 14 FEBRUARY 2019
PLENARY TRACKMAIN CONFERENCE AREA
DR. ABDUL RAHMANCHIEF SCIENTISTFIDELIS CYBERSECURITYUSA
10.45 - 11.30PANEL DISCUSSIONSECURING THE COMPLEX CITIES OF THE FUTURE
• AI, ML AND BLOCKCHAIN FOR SMART CITIES• FRAMEWORKS AND POLICIES TO REGULATE IOT SECURITY• TO CLOUD OR NOT TO CLOUD?
PA
NE
LIS
TS
MR. HIDETOSHI OGAWADIRECTOR – INTERNATIONAL STRATEGYNATIONAL CENTER OF INCIDENT READINESS AND STRATEGY FOR CYBERSECURITY (NISC), JAPAN
POWERED BY
10.15 – 10.30KEYNOTESECURING IoT : CHALLENGES AND RESOLUTIONS
• ACCELERATING THE THREAT MANAGEMENT WORKFLOW• FEEDING BEHAVIOUR MODELLING IN TO SIEM• AUTOMATION IS THE KEY
MR. BADR AL MUTAIRYCYBER SECURITY SYSTEMS MANAGERADVANCED ELECTRONICS COMPANY LIMITED (AECL)SAUDI ARABIAS
PE
AK
ER
DR. JALAL ALMUHTADICYBERSECURITY CONSULTANTSAUDI FEDERATION FOR CYBERSECURITY, PROGRAMMING AND DRONES (SAFCSP)SAUDI ARABIA
MR. RASHEED ALODAHSALES DIRECTOR – STRATEGIC BUSINESSTREND MICROSAUDI ARABIA
CH
AIR
PE
RS
ON
MR. MAJID MALAIKAAPPLICATION SECURITY SPECIALISTINTERNATIONAL MONETARY FUND (IMF)USA
10.00 – 10.15KEYNOTEWORKING ON THE HUMAN ELEMENT IN CYBER INCIDENTS ACROSS THE GOVERNMENTAL AND ESSENTIAL SERVICES
• IMPORTANCE OF WORKING ON THE HUMAN ELEMENT IN CYBER INCIDENTS• A HUMAN FIREWALL APPROACH• THE IMPORTANCE OF RISK FEEDBACK – BOTH TO ORGANIZATIONS AND USERS
SP
EA
KE
R
MR. HANNES KRAUSEHEAD OF POLICY AND ANALYSISESTONIAN INFORMATION SYSTEMS AUTHORITYESTONIA
MR. DAVID HARVILICZCO-FOUNDER AND COOFINITE STATEUSA
13.30 - 13.45KEYNOTETHE EXECUTIVE’S BREACH RESPONSE PREPAREDNESS
• INCREASING REGULATIONS• PRIORITIZING RISKS• SECURITY IS NOT JUST FOR THE IT DEPARTMENT
12.30 – 13.30PANEL DISCUSSIONWHY WE TEND TO FORGET THE BASICS – AN INSIGHT ON R&D IN CYBER SECURITY AND CRYPTOGRAPHY
• THE ROLE OF ACADEMIA IN CYBER SECURITY• THE MATHEMATICS OF CYBER SECURITY• ADDRESSING THE SKILLSET GAP
12.30 – 13.15
WWW.SAUDICDS.COM
CO-LOCATED WITH LEAD SPONSORORGANISED BY
CONFERENCE TRACKMAIN CONFERENCE ROOM
TECHNICAL WORKSHOPSWORKSHOP ROOMS
WORKSHOP ROOM 1 WORKSHOP ROOM 2
DAY TWO THURSDAY, 14 FEBRUARY 2019
WORKSHOP ROOM 3
CH
AIR
PE
RS
ON
DR. ABDULAZIZ ALBESHERDEAN – COLLEGE OF COMPUTING AND INFORMATICSSAUDI ELECTRONIC UNIVERSITYSAUDI ARABIA
DR. JALAL ALOWIBDICHIEF INFORMATION OFFICER (CIO)UNIVERSITY OF JEDDAHSAUDI ARABIA
MR. HADI JAAFARAWIMANAGING DIRECTORQUALYS MIDDLE EASTUNITED ARAB EMIRATES
MR. FAISAL HUMAIDHEAD OF INFORMATION SECURITY & RISKACWA POWERSAUDI ARABIA
POWERED BY
MR. SIDDHARTHA MURTHINTY
CHIEF SOLUTIONS ARCHITECH
SPIRE SOLUTIONSUNITED ARAB EMIRATES
MR. ABDULRAHMAN ALDALBAHI
REGIONAL SALES MANAGER - KSA
LOGRHYTHMSAUDI ARABIA
SP
EA
KE
R
MR. KHALED ALATEEQCYBERSECURITY CONSULTANTFIREEYESAUDI ARABIA
MR. CHRIS GREENVP - META
MALWAREBYTESUNITED ARAB EMIRATES
12.30 – 13.15LEVERAGE AUTOMATION TO MANAGE, DETECT & SECURE
RISK
MR. BADER AL ROQIDIRECTOR – NETWORK & SECURITY OPERATIONSMINISTRY OF FINANCESAUDI ARABIA
PA
NE
LIS
TS
11.30 – 12.30BREAK FOR COFFEE, DHUHR PRAYERS AND ONE-TO-ONE SECURITY CONSULTATIONSPOST BREAK, THE CONFERENCE WOULD CONTINUE IN THE MAIN CONFERENCE ROOM AND CONCURRENT WORKSHOPS WILL TAKE PLACE IN WORKSHOP ROOM 1, ROOML 2, AND ROOM 3.
12.30 – 13.15GLOBAL THREAT
LANDSCAPE, THE ASSUMPTION OF BREACH, HOW TO PROTECT, DETECT
AND RESPOND
WWW.SAUDICDS.COM
CO-LOCATED WITH LEAD SPONSORORGANISED BY
CONFERENCE TRACKMAIN CONFERENCE ROOM
TECHNICAL WORKSHOPSWORKSHOP ROOMS
WORKSHOP ROOM 1 WORKSHOP ROOM 2
DAY TWO THURSDAY, 14 FEBRUARY 2019
WORKSHOP ROOM 3
14.00 -
END OF SUMMIT
13.30 – 14.15ENHANCE YOUR FOUNDATIONAL
CONTROLS WITH THEMITRE ATTACKFRAMEWORK
13.30 – 14.15NEW ERA FOR
VULNERABILITY MANAGEMENT
REQUIREMENTS
MR. SHALIK ABOOSENIOR SALES ENGINEER
TRIPWIREUNITED ARAB EMIRATES
POWERED BY
MR. AMJAD KHADERSENIOR PRE-SALES
CONSULTANTTENABLE
SAUDI ARABIA
MR. ANGUS MACCORMICKDIRECTOR - SALES
AVANTIS LABSUNITED ARAB EMIRATES
SP
EA
KE
R
MR. MOHAMED RAMZISENIOR PRESALES ENGINEERIXIASAUDI ARABIA
13.45 – 14.00KEYNOTESTRENGTHENING YOUR DEFENCES AGAINST CYBER ATTACKS
• THE GROWING WEAK-SPOT : SUPPLY CHAIN• KEEPING AN EYE FOR VULNERABILITIES• THE EVOLUTION OF NETWORK-BASED
RANSOMWARES WORMS
13.30 – 14.15NEXT-GEN MANAGED SECURITY SERVICES
For Sponsorships:
Jamie [email protected]
For Speaking opportunities:
Praveen [email protected]
For Media enquiries:
Chukky [email protected]
Disclaimer. This document is for promotional purposes only and sROOM not be considered contractually binding. The content of the event, its dates, venue, agenda or speakers may be subject to change during the course of the event’s preparation.