The 5 most trusted cyber security companies to watch.
MECSCE 2015 - Brochure
1. MIDDLE EAST
DATA PROTECTION
MOBILE SECURITY
RISK MANAGEMENT
CLOUD- BASED SECURITY
Middle East Cyber Security Conference &
Exhibition is Co-located with
OFSEC 2015 - Oman Fire, Safety & Security Expo
15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman
2. For Attending Opper tunities
Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com
www.mecyber.com
Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
www.mecyber.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com
www.mecyber.com
MIDDLE EAST
15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman
Associate Sponsor
Bronze Sponsors
Official Supporting Partner
Gold SponsorStrategic Sponsor
Association Partners
Silver Sponsor
Media Partners
3. Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
www.mecyber.com
For Attending Opper tunities
Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com
www.mecyber.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com
www.mecyber.com
MIDDLE EAST
15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman
Conference Overview
Middle East countries are pursuing digitization, with the increasing mass adoption of connected digital technologies &
applications by consumers, enterprises, and governments. The region’s digital markets are expanding at an overall compound
annual growth rate of 12 percent and are expected to be worth US$35 billion in 2015. Security is a prevalent concern in the
Middle East, all of our devices are interconnected over the internet or the web by the adoption of Cloud and Mobile technology.
Cyber threats are a global phenomenon and are continually developing in sophistication and impact, despite the advances in
cyber security technologies and practice. The progressing success of digitization initiatives among the countries of the Middle
East widens the scope of growing exposure to the risk of cyber attacks. The assets of Middle East countries and their rapid
adoption of digitization have made the region an attractive target for a wide array of cyber threats. Indeed, governments and
large organizations in almost every vital sector of the region have sustained damage from cyber attacks. National & International
governments in the region are determined to create a secure digital environment, but these initiatives are fragmented, tactical,
and reactive.
The Middle East Cyber Security Summit will discuss the need to have a strategic approach to national cyber security, focussing
on implementation of “CCC” framework — comprehensive in nature, collaborative by intention, and capability-driven. This
Summit will serve Central and Local Government, Critical Infrastructure, Energy and Utilities, Telecommunications and
Network Service Sectors, Oil and Gas Sectors, Finance and Banking Institutions, E-Commerce and Business Sectors,
Technology Industries, Research and Development Organizations, Security and Intelligence Services, Police Services and
Crime Prevention, Transportation, ICT Networks, individual consumers and many more in learning from recent cases and
identifying the transformation necessary to get rid of such consistent global threats where any individual device could cause
an infringement.
Key Benefits
Meet & Network with over 100 of your Industry peers
Ample networking opportunities for participants to exchange
information and ideas
Address mobile and cloud security issues and Develop and sustain
an effective security platform
Learn about cutting edge technologies from leading
speakers and analyst firms
Analyze and control early mitigation of emerging risks
Design a risk management model to reduce risk without
affecting business operations
Opportunity to choose the best approaches and vendor solutions
• Chief Information Security Officers
• Chief Privacy Officers
• Chief Risk Officers / Risk Managers
• CIOs and IT senior leadership
• Compliance Managers
• Cyber Policy: Heads and Influencers
• Fraud Managers
• Government Officials-IT / OT Authorities
• Heads of DCC
• Heads of SCADA
• Infrastructure Managers
• IT Security Managers
• Network Security: Engineers
• Operational Technology Managers
• Security Architects / Enterprise Architects
Who Should Attend:
4. Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
www.mecyber.com
For Attending Opper tunities
Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com
www.mecyber.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com
www.mecyber.com
Sector 1
Government
Organizations
Sector 2
Financial
Institutions
Energy,
Oil and Gas
Sector 3
Businesses and
Industries
Sector 4
Transport and
Logistics
Sector 5
Focused on addressing the following among many other
objectives to prevent & eliminate cyber threats:
Healthcare and
Pharmaceuticals
Sector 6
Event Highlights
CISO strategies and leadership
Cyber Security
Secure Business Enablement
Identity & Access Management
Mobile & Cloud security
Single Sign-on and identity governance
Operational Technology Risks
Exposure Identification & securing critical national infrastructure.
Agility planning in emergency response time to cybercrime.
Framed Disaster Recovery patterns for continued operations.
Discussing Organizational structure, Operational policies,
Property Protection and Legal measures
Discussing the current and future critical infrastructure of
cyber security workforce.
Need for cyber space to consider strategies, practices,
tools, and research.
Capacity building, integrating cyber security risk
management practices.
Technical measures in analyzing losses incurred due to
cyber threats and cybercrimes across all industries.
Securing critical data and operational functions from cyber spies
Identifying the challenges in M2M cyber security.
Expert Speaker Panel
Welcome Address by Special Address by
Fahad S. Al-Hussein
Director, Information Security Administration
Health Informatics and Information Technology,
King Fahad Medical City, Kingdom of Saudi Arabia
Marco Mayer
Cyberspace Expert, International and National Security,
Member of the UN Security Council Roster of Experts, Italy
Maitham Al-Lawati
Head - Risk, Compliance & MSS,
Oman Data Park
Mustapha Huneyd
Head of Corporate Information Security,
Ooredoo Qatar
Michele Colajanni
Director of Interdepartment Research,
Center on Security & Safety CRIS, Italy
Suleiman Al Ghaithy
IT Security Lead
Daleel Petroleum LLC
Broderick Perelli-Harris
EMEA Director
Venafi
Ahmad Hassan MohdNoor
Director - Risk Management & Compliance Operations
Du Telecom, United Arab Emirates
Eng. Badar Ali Al-Salehi
Director General – Oman National CERT
Head of ITU Regional Cyber Security Center
Ayham Yassmineh
Criminal Intelligence Officer
Focal Point for Middle East and North Africa Region
INTERPOL General Secrétariat
Furqan Ahmed Hashmi - PMP, CISSP, CCIE, TOGAF
IT Operations Leader,
Emirates Investment Authority
Senior Representative
Fortinet, Inc
Martin Hayes
Chief Technology Officer
Pinecone Cyber Defence
Roshdi A. Osman
Head of Security Governance
Deputy CISO
Samir Pawaskar
Head - Cyber Security Policy & Standards
Cyber Security Division (Q-CERT), Ministry of
Information & Communications Technology, Qatar
Abdulrahman A. Al-Friah
General Manager,
CERT-SA (CITC), Kingdom of Saudi Arabia
5. Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
www.mecyber.com
For Attending Opper tunities
Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com
www.mecyber.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com
www.mecyber.com
8:00
14:30
16:00
15:00
15:30
9:00
9:15
9:30
12:00
10:30
11:00
11:30
10:00
13:00
13:30
14:00
Registration
Networking Coffee Break
Closing Remarks
Inauguration
Chairman’s welcome and Opening Remarks
The Governments initiative in the
comprehensive development of cyber security
to ensure privacy and economic security to all
industries, organizations and citizens
Networking Lunch
Networking Coffee Break
Efficient and constantly updated Cyber Security
beingtheDireneedacrossFinancialInstitutions
Emergency Response Time in the instance
of a Cyber-attack to Enhance Resilience of
the ICT Infrastructure
Implementing the 7 pillars of cyber security:
Securing Organization infrastructure,
Identifying Exposure to Threats,Capacity
Building, Business Compliance,
Cooperative Property Protection, technical
legal measures and Risk Management with
Operational Policies
Panel Discussion
“Disaster Recovery” patterns in the
Instance of a Cyber Attack
Securing critical functionalities in the billion dollar
industry of E-commerce over the digital space
Oil and Gas industries being consistent cyber targets
Securing Digital channels of the Energy Utility Sector
Agenda Day 1 15 September 2015, Muscat, Oman
Middle East Cyber Security Conference & Exibition
• Planning a multilayered secure framework for
all online operations with the assistance of well
framed cyber security Policies and Initiatives.
• Protecting the regions critical infrastructure and
important information systems from cyber threats
• Creating a cyber-savvy workforce to monitor
malicious attacks.
• Ubiquitous Cyber Security and its effectiveness
• Identifying the right framework required for
securing large amounts of data over the Cyber
Space.
• Public-private collaboration to strengthen network
defense as vast amount of critical infrastructure is
owned by the private sectors.
• Secure and Resilient frameworks in reducing
cyber threats by making businesses more firm
(Session Moderator will host the Q&A Round with
Delegates and Panel Members)
• Using a combination of Digital forensics and other
technologies in securing data in an instance of a
cyber-attack.
• Developing test incident response procedures and
coordinating cyber incident response planning across
the entire enterprise.
• Establishing Cyber Emergency Response Team
(CERT) to counter consistent attacks.
• Integrating and implementing the multi layered
Security measures such as Authentication,
Encryption, Digital signatures and Security
certificates to prevent cyber fraud.
• Constant Theft of Millions of peoples Financials,
Privacy, Identity and other Sensitive information
with an outdated cyber security framework.
• Secure Strategy in Preventing Billions of dollars
lost to waves of cyber thieves, industrial spies
with attacks increasing on mobile devices which
are used as gateways.
• Securing Critical Data from emerging sophisticated
cyber threats to the Oil & Natural Gas
• Industry through Cyber Espionage.
• Assessing Integration of PCS/SCADA and ICS
with IT for holistic cyber security to improve risks of
vulnerability in all operational technology.
• Attaining the apt Firewall Design for a SCADA and
DCS Network to prevent attacks from effecting
Operational Capabilities.
• An expected 70% increase in spending on Cyber
security for smart grid industrial control systems
by 2022 through advanced modern grid security
preventing sophisticated cyber-attack attempts.
• The impacts of cyber-attacks on Smart Grids
integrated with SCADA networks and how to
prevent such cyber threats.
• Comprehensive framework that organizations can
use to develop effective cyber security strategies
tailored to their particular combinations of IT/OT
convergence.
• Cyber breaches affecting and targeting the
Financial Institutions of the Middle East hence
the requirement to have a multi-layered anti-fraud
strategy in place, starting with pre transaction
verification through to account protection,
assurance and recovery.
• Preventive measures to cyber threats which can
result in Denial of Service (DOS), information
theft, the manipulation of mission critical and
safety systems
• Discussing Cyber Forensics Trends and
Developments within financial networks in Oman.
• Promoting inter-regional collaboration in
cybercrime investigations to attain swift and
better results.
• Oman’s Perspective on the rapidly evolving
global ICT Policies and Strategies in bolstering
cyber security
• For Effective “Incident Response” there is a need
to raise situational awareness of a cyber-threat or
an incident and quickly act upon that information
to maintain critical prerequisites.
MIDDLE EAST
15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman
6. Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
www.mecyber.com
For Attending Opper tunities
Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com
www.mecyber.com
8:50
9:00
12:00
10:00
10:30
09:30
11:30
13:00
13:30
14:00
Registration, refreshments and networking
14:30 Closing Remarks
Chairman’s welcome and Opening Remarks
Protecting Telecommunications and network
services from cybercrime as it connects the
Globe
Panel Discussion
Networking Lunch
Coffee Networking Break
Protecting intellectual property within
Pharmaceutical industries
Securing automated transportation and
Logistics in highly critical operations
ICT Security solutions connecting services
within existing cities and upcoming Smart Cities
Enterprise Protection Mechanisms across
various Global Business Groups and Industries
Coffee Networking Break
Hacking the system
• Identifying the fragile links and challenges in
M2M cyber security.
• The focus on Security risks and responses
in an evolving telecommunications
industry which advances in connecting the
unconnected.
• Addressing Cyber security threats such as
Advanced Persistent Threats (APT), spam,
malware, Phishing, mobile botnets, software
security threats such as integrity violations,
manipulations or backdoors, and risks
resulting from cloud computing.
• Challenges and Opportunities at a period of
greater interconnectivity than ever. Cybercrime is
causing supply chain disruptions with exposures
in businesses increasing risks and causing
damages.
• Defense strategies which can be integrated in
arresting malicious and disruptive attacks on
the operation networks of logistical command
centers.
• Solutions in protecting your network, IT, OT and
also your data against any future cyber-attacks.
• Importance in the integration of network security
in interoperable services
• Securing “National Communications and
Information Technology Plan” (NCITP).
• Securing the ICT framework integrated in
enhanced daily life of residents, businesses and
industries in smart cities.
• Securing Critical Data and Big Data Analytics with
state of the art Identity Management Technologies.
• Creating a multi layered firewall to stay secure from
malicious cyber activity and malware as there has
been intellectual property losses worth trillions of
dollars.
• Data Breach through Cyber spies in corporate
espionage, with attacks increasing and channeled
through BYOD’s.
• Discussing loop holes within the security
framework exposing an organization to intended
attacks.
• Constant and consistent evolvement of cyber-
attacks requiring continuously updated cyber
security measures
• Bringing about public awareness among
individuals and business communities in securing
the cyber ecosystem
• Corporate espionage giving rise to cybercrime to
gain access to critical research data and a larger
portion of the industry’s revenue
• Performing a Security Risk Assessment in
penetration testing of all Critical Data stored over
revolutionary servers or the cloud.
• Encrypting all research and values before data
transmission occurs to protect important drug
formulations, research plans and results.
Agenda Day 2 16 September 2015, Muscat, Oman
Middle East Cyber Security Conference & Exibition
8:00 11:00
MIDDLE EAST
15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman
• Assessing the most feasible Roadmap in
developing ICT & Cloud based Provinces
(Session Moderator will host the Q&A Round with
Delegates and Panel Members)
Organizing PartnerResearched & Developed by
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com
www.mecyber.com