GCC organisations have been among the world's most rapid adopters of cybersecurity solutions in the face of the growing threat. One recent research report predicts that the GCC cybersecurity market will reach over $10.4 billion by the end of 2022.
Both public and private sectors continue to innovate. A new cyber security strategy for Dubai has just been launched by the UAE’s Vice President and Prime Minister Dubai’s ruler Sheikh Mohammed bin Rashid Al Maktoum as he also opened the Dubai Electronic Security Centre, which will deal with electronic security threats, cyberattacks and all forms of cybercrime.
These initiatives commit Dubai to focusing on securing the cyber-smart nation, establishing a cyber space that is “free, fair and secure”, continuing to focus on protecting the confidentiality, credibility, availability and privacy of data, improving cyber-resilience and consolidating national and international collaboration. The next phase of the strategy will witness a “number of effective initiatives” that will contribute to providing a secure cyberspace.
In the private sector too companies continue to upgrade their defences. , the UAE Banks Federation has just launched the Middle East's first threat intelligence sharing platform for banks to counter a "sharp uptick" in cyber attack threats in the region. Initially, 13 banks of UBF will share cyber intelligence in a new UBF-ISAC, but later the platform will be extended to other banks and perhaps other sectors.
•The pros and cons of security as a managed service
•Maintaining control and visibility over Cloud data and applications
•Cloud vulnerability management
•Who is in charge of your Cloud?
•How many websites do you have? Auditing web presence and applications
•Advanced web attacks and exploitation
•Secure web application development
•Stopping SQL injection and XSS attacks once and for all
•Maintaining security and compliance versus meeting snapshots
•Advanced network scanning and monitoring
•Automated mapping of security reports to key standards
•How to automate and engineer out as many human decision points as possible
•Automated incident response – is AI the answer?
•Automating asset discovery and network intelligence
•Automated identity management
•Avoiding obvious configuration, patch and other errors
•Identifying and valuing critical assets
•Ensuring plans are fit for real-world deployment
•Best-practice incident response
•Securing an infinite attack surface
•Public versus private responsibility
•Where the Smart city meets the private enterprise: threat or opportunity?