SlideShare a Scribd company logo
1 of 6
Download to read offline
MIDDLE EAST
DATA PROTECTION
MOBILE SECURITY
RISK MANAGEMENT
CLOUD- BASED SECURITY
Middle East Cyber Security Conference &
Exhibition is Co-located with
OFSEC 2015 - Oman Fire, Safety & Security Expo
15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman
For Attending Opper tunities
Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com
www.mecyber.com
Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
www.mecyber.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com
www.mecyber.com
MIDDLE EAST
15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman
Associate Sponsor
Bronze Sponsors
Official Supporting Partner
Gold SponsorStrategic Sponsor
Association Partners
Silver Sponsor
Media Partners
Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
www.mecyber.com
For Attending Opper tunities
Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com
www.mecyber.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com
www.mecyber.com
MIDDLE EAST
15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman
Conference Overview
Middle East countries are pursuing digitization, with the increasing mass adoption of connected digital technologies &
applications by consumers, enterprises, and governments. The region’s digital markets are expanding at an overall compound
annual growth rate of 12 percent and are expected to be worth US$35 billion in 2015. Security is a prevalent concern in the
Middle East, all of our devices are interconnected over the internet or the web by the adoption of Cloud and Mobile technology.
Cyber threats are a global phenomenon and are continually developing in sophistication and impact, despite the advances in
cyber security technologies and practice. The progressing success of digitization initiatives among the countries of the Middle
East widens the scope of growing exposure to the risk of cyber attacks. The assets of Middle East countries and their rapid
adoption of digitization have made the region an attractive target for a wide array of cyber threats. Indeed, governments and
large organizations in almost every vital sector of the region have sustained damage from cyber attacks. National & International
governments in the region are determined to create a secure digital environment, but these initiatives are fragmented, tactical,
and reactive.
The Middle East Cyber Security Summit will discuss the need to have a strategic approach to national cyber security, focussing
on implementation of “CCC” framework — comprehensive in nature, collaborative by intention, and capability-driven. This
Summit will serve Central and Local Government, Critical Infrastructure, Energy and Utilities, Telecommunications and
Network Service Sectors, Oil and Gas Sectors, Finance and Banking Institutions, E-Commerce and Business Sectors,
Technology Industries, Research and Development Organizations, Security and Intelligence Services, Police Services and
Crime Prevention, Transportation, ICT Networks, individual consumers and many more in learning from recent cases and
identifying the transformation necessary to get rid of such consistent global threats where any individual device could cause
an infringement.
Key Benefits
Meet & Network with over 100 of your Industry peers
Ample networking opportunities for participants to exchange
information and ideas
Address mobile and cloud security issues and Develop and sustain
an effective security platform
Learn about cutting edge technologies from leading
speakers and analyst firms
Analyze and control early mitigation of emerging risks
Design a risk management model to reduce risk without
affecting business operations
Opportunity to choose the best approaches and vendor solutions
•	 Chief Information Security Officers
•	 Chief Privacy Officers
•	 Chief Risk Officers / Risk Managers
•	 CIOs and IT senior leadership
•	 Compliance Managers
•	 Cyber Policy: Heads and Influencers
•	 Fraud Managers
•	 Government Officials-IT / OT Authorities
•	 Heads of DCC
•	 Heads of SCADA
•	 Infrastructure Managers
•	 IT Security Managers
•	 Network Security: Engineers
•	 Operational Technology Managers
•	 Security Architects / Enterprise Architects
Who Should Attend:
Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
www.mecyber.com
For Attending Opper tunities
Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com
www.mecyber.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com
www.mecyber.com
Sector 1
Government
Organizations
Sector 2
Financial
Institutions
Energy,
Oil and Gas
Sector 3
Businesses and
Industries
Sector 4
Transport and
Logistics
Sector 5
Focused on addressing the following among many other
objectives to prevent & eliminate cyber threats:
Healthcare and
Pharmaceuticals
Sector 6
Event Highlights
CISO strategies and leadership
Cyber Security
Secure Business Enablement
Identity & Access Management
Mobile & Cloud security
Single Sign-on and identity governance
Operational Technology Risks
Exposure Identification & securing critical national infrastructure.
Agility planning in emergency response time to cybercrime.
Framed Disaster Recovery patterns for continued operations.
Discussing Organizational structure, Operational policies,
Property Protection and Legal measures
Discussing the current and future critical infrastructure of
cyber security workforce.
Need for cyber space to consider strategies, practices,
tools, and research.
Capacity building, integrating cyber security risk
management practices.
Technical measures in analyzing losses incurred due to
cyber threats and cybercrimes across all industries.
Securing critical data and operational functions from cyber spies
Identifying the challenges in M2M cyber security.
Expert Speaker Panel
Welcome Address by Special Address by
Fahad S. Al-Hussein
Director, Information Security Administration
Health Informatics and Information Technology,
King Fahad Medical City, Kingdom of Saudi Arabia
Marco Mayer
Cyberspace Expert, International and National Security,
Member of the UN Security Council Roster of Experts, Italy
Maitham Al-Lawati
Head - Risk, Compliance & MSS,
Oman Data Park
Mustapha Huneyd
Head of Corporate Information Security,
Ooredoo Qatar
Michele Colajanni
Director of Interdepartment Research,
Center on Security & Safety CRIS, Italy
Suleiman Al Ghaithy
IT Security Lead
Daleel Petroleum LLC
Broderick Perelli-Harris
EMEA Director
Venafi
Ahmad Hassan MohdNoor
Director - Risk Management & Compliance Operations
Du Telecom, United Arab Emirates
Eng. Badar Ali Al-Salehi
Director General – Oman National CERT
Head of ITU Regional Cyber Security Center
Ayham Yassmineh
Criminal Intelligence Officer
Focal Point for Middle East and North Africa Region
INTERPOL General Secrétariat
Furqan Ahmed Hashmi - PMP, CISSP, CCIE, TOGAF
IT Operations Leader,
Emirates Investment Authority
Senior Representative
Fortinet, Inc
Martin Hayes
Chief Technology Officer
Pinecone Cyber Defence
Roshdi A. Osman
Head of Security Governance
Deputy CISO
Samir Pawaskar
Head - Cyber Security Policy & Standards
Cyber Security Division (Q-CERT), Ministry of
Information & Communications Technology, Qatar
Abdulrahman A. Al-Friah
General Manager,
CERT-SA (CITC), Kingdom of Saudi Arabia
Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
www.mecyber.com
For Attending Opper tunities
Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com
www.mecyber.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com
www.mecyber.com
8:00
14:30
16:00
15:00
15:30
9:00
9:15
9:30
12:00	
10:30	
11:00
11:30	
10:00	
13:00
13:30
14:00
Registration
Networking Coffee Break
Closing Remarks
Inauguration
Chairman’s welcome and Opening Remarks
The Governments initiative in the
comprehensive development of cyber security
to ensure privacy and economic security to all
industries, organizations and citizens
Networking Lunch
Networking Coffee Break
Efficient and constantly updated Cyber Security
beingtheDireneedacrossFinancialInstitutions
Emergency Response Time in the instance
of a Cyber-attack to Enhance Resilience of
the ICT Infrastructure
Implementing the 7 pillars of cyber security:
Securing Organization infrastructure,
Identifying Exposure to Threats,Capacity
Building, Business Compliance,
Cooperative Property Protection, technical
legal measures and Risk Management with
Operational Policies
Panel Discussion
“Disaster Recovery” patterns in the
Instance of a Cyber Attack
Securing critical functionalities in the billion dollar
industry of E-commerce over the digital space
Oil and Gas industries being consistent cyber targets
Securing Digital channels of the Energy Utility Sector
Agenda Day 1 15 September 2015, Muscat, Oman
Middle East Cyber Security Conference & Exibition
•	 Planning a multilayered secure framework for
all online operations with the assistance of well
framed cyber security Policies and Initiatives.	
•	 Protecting the regions critical infrastructure and
important information systems from cyber threats	
•	 Creating a cyber-savvy workforce to monitor
malicious attacks.
•	 Ubiquitous Cyber Security and its effectiveness
•	 Identifying the right framework required for
securing large amounts of data over the Cyber
Space.
•	 Public-private collaboration to strengthen network
defense as vast amount of critical infrastructure is
owned by the private sectors.
•	 Secure and Resilient frameworks in reducing
cyber threats by making businesses more firm             
(Session Moderator will host the Q&A Round with
Delegates and Panel Members)
•	 Using a combination of Digital forensics and other
technologies in securing data in an instance of a
cyber-attack.
•	 Developing test incident response procedures and
coordinating cyber incident response planning across
the entire enterprise.
•	 Establishing Cyber Emergency Response Team
(CERT) to counter consistent attacks.
•	 Integrating and implementing the multi layered
Security measures such as Authentication,
Encryption, Digital signatures and Security
certificates to prevent cyber fraud.
•	 Constant Theft of Millions of peoples Financials,
Privacy, Identity and other Sensitive information
with an outdated cyber security framework.
•	 Secure Strategy in Preventing Billions of dollars
lost to waves of cyber thieves, industrial spies
with attacks increasing on mobile devices which
are used as gateways.
•	 Securing Critical Data from emerging sophisticated
cyber threats to the Oil & Natural Gas
•	 Industry through Cyber Espionage.
•	 Assessing Integration of PCS/SCADA and ICS
with IT for holistic cyber security to improve risks of
vulnerability in all operational technology.
•	 Attaining the apt Firewall Design for a SCADA and
DCS Network to prevent attacks from effecting
Operational Capabilities.
•	 An expected 70% increase in spending on Cyber
security for smart grid industrial control systems
by 2022 through advanced modern grid security
preventing sophisticated cyber-attack attempts.
•	 The impacts of cyber-attacks on Smart Grids
integrated with SCADA networks and how to
prevent such cyber threats.
•	 Comprehensive framework that organizations can
use to develop effective cyber security strategies
tailored to their particular combinations of IT/OT
convergence.
•	 Cyber breaches affecting and targeting the
Financial Institutions of the Middle East hence
the requirement to have a multi-layered anti-fraud
strategy in place, starting with pre transaction
verification through to account protection,
assurance and recovery.
•	 Preventive measures to cyber threats which can
result in Denial of Service (DOS), information
theft, the manipulation of mission critical and
safety systems
•	 Discussing Cyber Forensics Trends and
Developments within financial networks in Oman.
•	 Promoting inter-regional collaboration in
cybercrime investigations to attain swift and
better results.
•	 Oman’s Perspective on the rapidly evolving
global ICT Policies and Strategies in bolstering
cyber security
•	 For Effective “Incident Response” there is a need
to raise situational awareness of a cyber-threat or
an incident and quickly act upon that information
to maintain critical prerequisites.
MIDDLE EAST
15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman
Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
www.mecyber.com
For Attending Opper tunities
Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com
www.mecyber.com
8:50
9:00
12:00	
10:00	
10:30
09:30	
11:30
13:00
13:30
14:00
Registration, refreshments and networking
14:30 Closing Remarks
Chairman’s welcome and Opening Remarks
Protecting Telecommunications and network
services from cybercrime as it connects the
Globe
Panel Discussion
Networking Lunch
Coffee Networking Break
Protecting intellectual property within
Pharmaceutical industries
Securing automated transportation and
Logistics in highly critical operations
ICT Security solutions connecting services
within existing cities and upcoming Smart Cities
Enterprise Protection Mechanisms across
various Global Business Groups and Industries
Coffee Networking Break
Hacking the system
•	 Identifying the fragile links and challenges in
M2M cyber security.
•	 The focus on Security risks and responses
in an evolving telecommunications
industry which advances in connecting the
unconnected.
•	 Addressing Cyber security threats such as
Advanced Persistent Threats (APT), spam,
malware, Phishing, mobile botnets, software
security threats such as integrity violations,
manipulations or backdoors, and risks
resulting from cloud computing.
•	 Challenges and Opportunities at a period of
greater interconnectivity than ever. Cybercrime is
causing supply chain disruptions with exposures
in businesses increasing risks and causing
damages.
•	 Defense strategies which can be integrated in
arresting malicious and disruptive attacks on
the operation networks of logistical command
centers.
•	 Solutions in protecting your network, IT, OT and
also your data against any future cyber-attacks.
•	 Importance in the integration of network security
in interoperable services
•	 Securing “National Communications and
Information Technology Plan” (NCITP).
•	 Securing the ICT framework integrated in
enhanced daily life of residents, businesses and
industries in smart cities.
•	 Securing Critical Data and Big Data Analytics with
state of the art Identity Management Technologies.
•	 Creating a multi layered firewall to stay secure from
malicious cyber activity and malware as there has
been intellectual property losses worth trillions of
dollars.
•	 Data Breach through Cyber spies in corporate
espionage, with attacks increasing and channeled
through BYOD’s.
•	 Discussing loop holes within the security
framework exposing an organization to intended
attacks.
•	 Constant and consistent evolvement of cyber-
attacks requiring continuously updated cyber
security measures
•	 Bringing about public awareness among
individuals and business communities in securing
the cyber ecosystem
•	 Corporate espionage giving rise to cybercrime to
gain access to critical research data and a larger
portion of the industry’s revenue
•	 Performing a Security Risk Assessment in
penetration testing of all Critical Data stored over
revolutionary servers or the cloud.
•	 Encrypting all research and values before data
transmission occurs to protect important drug
formulations, research plans and results.
Agenda Day 2 16 September 2015, Muscat, Oman
Middle East Cyber Security Conference & Exibition
8:00 11:00
MIDDLE EAST
15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman
•	 Assessing the most feasible Roadmap in
developing ICT & Cloud based Provinces
(Session Moderator will host the Q&A Round with
Delegates and Panel Members)
Organizing PartnerResearched & Developed by
Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com
Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com
www.mecyber.com

More Related Content

What's hot

Webinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystWebinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystTuan Yang
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big businessF-Secure Corporation
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
Cyber Essentials and BSI standards - managing the business risk
Cyber Essentials and BSI standards - managing the business riskCyber Essentials and BSI standards - managing the business risk
Cyber Essentials and BSI standards - managing the business riskJisc
 
The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...Redazione InnovaPuglia
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaCyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaDr David Probert
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
Managed Service Provider Miami | Wheelhouse IT - Contact Us Today! (954) 474-...
Managed Service Provider Miami | Wheelhouse IT - Contact Us Today! (954) 474-...Managed Service Provider Miami | Wheelhouse IT - Contact Us Today! (954) 474-...
Managed Service Provider Miami | Wheelhouse IT - Contact Us Today! (954) 474-...ManagedServiceProvid
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 
Whitepaper: Security in the Network Environment
Whitepaper: Security in the Network EnvironmentWhitepaper: Security in the Network Environment
Whitepaper: Security in the Network EnvironmentEES Africa (Pty) Ltd
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape... Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...NetCom Learning
 
Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceXenith Document Systems Ltd
 

What's hot (20)

ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015
 
Webinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystWebinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence Analyst
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
Cyber Essentials and BSI standards - managing the business risk
Cyber Essentials and BSI standards - managing the business riskCyber Essentials and BSI standards - managing the business risk
Cyber Essentials and BSI standards - managing the business risk
 
The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...
 
Bmit meet theexperts_2013
Bmit meet theexperts_2013Bmit meet theexperts_2013
Bmit meet theexperts_2013
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaCyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Managed Service Provider Miami | Wheelhouse IT - Contact Us Today! (954) 474-...
Managed Service Provider Miami | Wheelhouse IT - Contact Us Today! (954) 474-...Managed Service Provider Miami | Wheelhouse IT - Contact Us Today! (954) 474-...
Managed Service Provider Miami | Wheelhouse IT - Contact Us Today! (954) 474-...
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Whitepaper: Security in the Network Environment
Whitepaper: Security in the Network EnvironmentWhitepaper: Security in the Network Environment
Whitepaper: Security in the Network Environment
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape... Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 
Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – Finance
 

Similar to MECSCE 2015 - Brochure

Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Rhys A. Mossom
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014Chin Wan Lim
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 James Nesbitt
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxLearnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxCompanySeceon
 
Top Cyber News Magazine Christiane Wuillamie OBE
Top Cyber News Magazine Christiane Wuillamie OBETop Cyber News Magazine Christiane Wuillamie OBE
Top Cyber News Magazine Christiane Wuillamie OBETopCyberNewsMAGAZINE
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
 
Harshad Katikar Raya Al Mohammed The Annual IT for Government Dubai Summit 2012
Harshad Katikar Raya Al Mohammed The Annual IT for Government Dubai Summit 2012 Harshad Katikar Raya Al Mohammed The Annual IT for Government Dubai Summit 2012
Harshad Katikar Raya Al Mohammed The Annual IT for Government Dubai Summit 2012 GenericPR
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceDale Butler
 
Critical Success Factors for IOT
Critical Success Factors for IOTCritical Success Factors for IOT
Critical Success Factors for IOTDr. Mazlan Abbas
 
E-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityE-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityLucy Nicholas
 
SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016Dale Butler
 
SMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conferenceSMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conferenceDale Butler
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 

Similar to MECSCE 2015 - Brochure (20)

Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxLearnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
 
Top Cyber News Magazine Christiane Wuillamie OBE
Top Cyber News Magazine Christiane Wuillamie OBETop Cyber News Magazine Christiane Wuillamie OBE
Top Cyber News Magazine Christiane Wuillamie OBE
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
Harshad Katikar Raya Al Mohammed The Annual IT for Government Dubai Summit 2012
Harshad Katikar Raya Al Mohammed The Annual IT for Government Dubai Summit 2012 Harshad Katikar Raya Al Mohammed The Annual IT for Government Dubai Summit 2012
Harshad Katikar Raya Al Mohammed The Annual IT for Government Dubai Summit 2012
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
 
Critical Success Factors for IOT
Critical Success Factors for IOTCritical Success Factors for IOT
Critical Success Factors for IOT
 
E-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityE-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_Security
 
SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016
 
SMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conferenceSMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conference
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 

MECSCE 2015 - Brochure

  • 1. MIDDLE EAST DATA PROTECTION MOBILE SECURITY RISK MANAGEMENT CLOUD- BASED SECURITY Middle East Cyber Security Conference & Exhibition is Co-located with OFSEC 2015 - Oman Fire, Safety & Security Expo 15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman
  • 2. For Attending Opper tunities Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com www.mecyber.com Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com www.mecyber.com Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com www.mecyber.com MIDDLE EAST 15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman Associate Sponsor Bronze Sponsors Official Supporting Partner Gold SponsorStrategic Sponsor Association Partners Silver Sponsor Media Partners
  • 3. Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com www.mecyber.com For Attending Opper tunities Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com www.mecyber.com Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com www.mecyber.com MIDDLE EAST 15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman Conference Overview Middle East countries are pursuing digitization, with the increasing mass adoption of connected digital technologies & applications by consumers, enterprises, and governments. The region’s digital markets are expanding at an overall compound annual growth rate of 12 percent and are expected to be worth US$35 billion in 2015. Security is a prevalent concern in the Middle East, all of our devices are interconnected over the internet or the web by the adoption of Cloud and Mobile technology. Cyber threats are a global phenomenon and are continually developing in sophistication and impact, despite the advances in cyber security technologies and practice. The progressing success of digitization initiatives among the countries of the Middle East widens the scope of growing exposure to the risk of cyber attacks. The assets of Middle East countries and their rapid adoption of digitization have made the region an attractive target for a wide array of cyber threats. Indeed, governments and large organizations in almost every vital sector of the region have sustained damage from cyber attacks. National & International governments in the region are determined to create a secure digital environment, but these initiatives are fragmented, tactical, and reactive. The Middle East Cyber Security Summit will discuss the need to have a strategic approach to national cyber security, focussing on implementation of “CCC” framework — comprehensive in nature, collaborative by intention, and capability-driven. This Summit will serve Central and Local Government, Critical Infrastructure, Energy and Utilities, Telecommunications and Network Service Sectors, Oil and Gas Sectors, Finance and Banking Institutions, E-Commerce and Business Sectors, Technology Industries, Research and Development Organizations, Security and Intelligence Services, Police Services and Crime Prevention, Transportation, ICT Networks, individual consumers and many more in learning from recent cases and identifying the transformation necessary to get rid of such consistent global threats where any individual device could cause an infringement. Key Benefits Meet & Network with over 100 of your Industry peers Ample networking opportunities for participants to exchange information and ideas Address mobile and cloud security issues and Develop and sustain an effective security platform Learn about cutting edge technologies from leading speakers and analyst firms Analyze and control early mitigation of emerging risks Design a risk management model to reduce risk without affecting business operations Opportunity to choose the best approaches and vendor solutions • Chief Information Security Officers • Chief Privacy Officers • Chief Risk Officers / Risk Managers • CIOs and IT senior leadership • Compliance Managers • Cyber Policy: Heads and Influencers • Fraud Managers • Government Officials-IT / OT Authorities • Heads of DCC • Heads of SCADA • Infrastructure Managers • IT Security Managers • Network Security: Engineers • Operational Technology Managers • Security Architects / Enterprise Architects Who Should Attend:
  • 4. Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com www.mecyber.com For Attending Opper tunities Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com www.mecyber.com Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com www.mecyber.com Sector 1 Government Organizations Sector 2 Financial Institutions Energy, Oil and Gas Sector 3 Businesses and Industries Sector 4 Transport and Logistics Sector 5 Focused on addressing the following among many other objectives to prevent & eliminate cyber threats: Healthcare and Pharmaceuticals Sector 6 Event Highlights CISO strategies and leadership Cyber Security Secure Business Enablement Identity & Access Management Mobile & Cloud security Single Sign-on and identity governance Operational Technology Risks Exposure Identification & securing critical national infrastructure. Agility planning in emergency response time to cybercrime. Framed Disaster Recovery patterns for continued operations. Discussing Organizational structure, Operational policies, Property Protection and Legal measures Discussing the current and future critical infrastructure of cyber security workforce. Need for cyber space to consider strategies, practices, tools, and research. Capacity building, integrating cyber security risk management practices. Technical measures in analyzing losses incurred due to cyber threats and cybercrimes across all industries. Securing critical data and operational functions from cyber spies Identifying the challenges in M2M cyber security. Expert Speaker Panel Welcome Address by Special Address by Fahad S. Al-Hussein Director, Information Security Administration Health Informatics and Information Technology, King Fahad Medical City, Kingdom of Saudi Arabia Marco Mayer Cyberspace Expert, International and National Security, Member of the UN Security Council Roster of Experts, Italy Maitham Al-Lawati Head - Risk, Compliance & MSS, Oman Data Park Mustapha Huneyd Head of Corporate Information Security, Ooredoo Qatar Michele Colajanni Director of Interdepartment Research, Center on Security & Safety CRIS, Italy Suleiman Al Ghaithy IT Security Lead Daleel Petroleum LLC Broderick Perelli-Harris EMEA Director Venafi Ahmad Hassan MohdNoor Director - Risk Management & Compliance Operations Du Telecom, United Arab Emirates Eng. Badar Ali Al-Salehi Director General – Oman National CERT Head of ITU Regional Cyber Security Center Ayham Yassmineh Criminal Intelligence Officer Focal Point for Middle East and North Africa Region INTERPOL General Secrétariat Furqan Ahmed Hashmi - PMP, CISSP, CCIE, TOGAF IT Operations Leader, Emirates Investment Authority Senior Representative Fortinet, Inc Martin Hayes Chief Technology Officer Pinecone Cyber Defence Roshdi A. Osman Head of Security Governance Deputy CISO Samir Pawaskar Head - Cyber Security Policy & Standards Cyber Security Division (Q-CERT), Ministry of Information & Communications Technology, Qatar Abdulrahman A. Al-Friah General Manager, CERT-SA (CITC), Kingdom of Saudi Arabia
  • 5. Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com www.mecyber.com For Attending Opper tunities Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com www.mecyber.com Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com www.mecyber.com 8:00 14:30 16:00 15:00 15:30 9:00 9:15 9:30 12:00 10:30 11:00 11:30 10:00 13:00 13:30 14:00 Registration Networking Coffee Break Closing Remarks Inauguration Chairman’s welcome and Opening Remarks The Governments initiative in the comprehensive development of cyber security to ensure privacy and economic security to all industries, organizations and citizens Networking Lunch Networking Coffee Break Efficient and constantly updated Cyber Security beingtheDireneedacrossFinancialInstitutions Emergency Response Time in the instance of a Cyber-attack to Enhance Resilience of the ICT Infrastructure Implementing the 7 pillars of cyber security: Securing Organization infrastructure, Identifying Exposure to Threats,Capacity Building, Business Compliance, Cooperative Property Protection, technical legal measures and Risk Management with Operational Policies Panel Discussion “Disaster Recovery” patterns in the Instance of a Cyber Attack Securing critical functionalities in the billion dollar industry of E-commerce over the digital space Oil and Gas industries being consistent cyber targets Securing Digital channels of the Energy Utility Sector Agenda Day 1 15 September 2015, Muscat, Oman Middle East Cyber Security Conference & Exibition • Planning a multilayered secure framework for all online operations with the assistance of well framed cyber security Policies and Initiatives. • Protecting the regions critical infrastructure and important information systems from cyber threats • Creating a cyber-savvy workforce to monitor malicious attacks. • Ubiquitous Cyber Security and its effectiveness • Identifying the right framework required for securing large amounts of data over the Cyber Space. • Public-private collaboration to strengthen network defense as vast amount of critical infrastructure is owned by the private sectors. • Secure and Resilient frameworks in reducing cyber threats by making businesses more firm (Session Moderator will host the Q&A Round with Delegates and Panel Members) • Using a combination of Digital forensics and other technologies in securing data in an instance of a cyber-attack. • Developing test incident response procedures and coordinating cyber incident response planning across the entire enterprise. • Establishing Cyber Emergency Response Team (CERT) to counter consistent attacks. • Integrating and implementing the multi layered Security measures such as Authentication, Encryption, Digital signatures and Security certificates to prevent cyber fraud. • Constant Theft of Millions of peoples Financials, Privacy, Identity and other Sensitive information with an outdated cyber security framework. • Secure Strategy in Preventing Billions of dollars lost to waves of cyber thieves, industrial spies with attacks increasing on mobile devices which are used as gateways. • Securing Critical Data from emerging sophisticated cyber threats to the Oil & Natural Gas • Industry through Cyber Espionage. • Assessing Integration of PCS/SCADA and ICS with IT for holistic cyber security to improve risks of vulnerability in all operational technology. • Attaining the apt Firewall Design for a SCADA and DCS Network to prevent attacks from effecting Operational Capabilities. • An expected 70% increase in spending on Cyber security for smart grid industrial control systems by 2022 through advanced modern grid security preventing sophisticated cyber-attack attempts. • The impacts of cyber-attacks on Smart Grids integrated with SCADA networks and how to prevent such cyber threats. • Comprehensive framework that organizations can use to develop effective cyber security strategies tailored to their particular combinations of IT/OT convergence. • Cyber breaches affecting and targeting the Financial Institutions of the Middle East hence the requirement to have a multi-layered anti-fraud strategy in place, starting with pre transaction verification through to account protection, assurance and recovery. • Preventive measures to cyber threats which can result in Denial of Service (DOS), information theft, the manipulation of mission critical and safety systems • Discussing Cyber Forensics Trends and Developments within financial networks in Oman. • Promoting inter-regional collaboration in cybercrime investigations to attain swift and better results. • Oman’s Perspective on the rapidly evolving global ICT Policies and Strategies in bolstering cyber security • For Effective “Incident Response” there is a need to raise situational awareness of a cyber-threat or an incident and quickly act upon that information to maintain critical prerequisites. MIDDLE EAST 15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman
  • 6. Soumeelee Bose | Conference Production Head | +91 7760480524 | soumeelee.bose@nispana.com Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com www.mecyber.com For Attending Opper tunities Agnal Cyril | Business Head | +91 9986026030 | agnal.cyril@nispana.com www.mecyber.com 8:50 9:00 12:00 10:00 10:30 09:30 11:30 13:00 13:30 14:00 Registration, refreshments and networking 14:30 Closing Remarks Chairman’s welcome and Opening Remarks Protecting Telecommunications and network services from cybercrime as it connects the Globe Panel Discussion Networking Lunch Coffee Networking Break Protecting intellectual property within Pharmaceutical industries Securing automated transportation and Logistics in highly critical operations ICT Security solutions connecting services within existing cities and upcoming Smart Cities Enterprise Protection Mechanisms across various Global Business Groups and Industries Coffee Networking Break Hacking the system • Identifying the fragile links and challenges in M2M cyber security. • The focus on Security risks and responses in an evolving telecommunications industry which advances in connecting the unconnected. • Addressing Cyber security threats such as Advanced Persistent Threats (APT), spam, malware, Phishing, mobile botnets, software security threats such as integrity violations, manipulations or backdoors, and risks resulting from cloud computing. • Challenges and Opportunities at a period of greater interconnectivity than ever. Cybercrime is causing supply chain disruptions with exposures in businesses increasing risks and causing damages. • Defense strategies which can be integrated in arresting malicious and disruptive attacks on the operation networks of logistical command centers. • Solutions in protecting your network, IT, OT and also your data against any future cyber-attacks. • Importance in the integration of network security in interoperable services • Securing “National Communications and Information Technology Plan” (NCITP). • Securing the ICT framework integrated in enhanced daily life of residents, businesses and industries in smart cities. • Securing Critical Data and Big Data Analytics with state of the art Identity Management Technologies. • Creating a multi layered firewall to stay secure from malicious cyber activity and malware as there has been intellectual property losses worth trillions of dollars. • Data Breach through Cyber spies in corporate espionage, with attacks increasing and channeled through BYOD’s. • Discussing loop holes within the security framework exposing an organization to intended attacks. • Constant and consistent evolvement of cyber- attacks requiring continuously updated cyber security measures • Bringing about public awareness among individuals and business communities in securing the cyber ecosystem • Corporate espionage giving rise to cybercrime to gain access to critical research data and a larger portion of the industry’s revenue • Performing a Security Risk Assessment in penetration testing of all Critical Data stored over revolutionary servers or the cloud. • Encrypting all research and values before data transmission occurs to protect important drug formulations, research plans and results. Agenda Day 2 16 September 2015, Muscat, Oman Middle East Cyber Security Conference & Exibition 8:00 11:00 MIDDLE EAST 15 & 16 September 2015, Golden Tulip Seeb Hotel, Muscat, Oman • Assessing the most feasible Roadmap in developing ICT & Cloud based Provinces (Session Moderator will host the Q&A Round with Delegates and Panel Members) Organizing PartnerResearched & Developed by Lin Pinto | Project Manager | +968 91729516 | sales@muscat- expo.com Jagadish Kumar | Sales Director | +91 9880442379 | jagadish.kumar@nispana.com www.mecyber.com