Agenda
1
08:00 -
08:50
Registration & refreshments 
08:50 -
09:00
Welcome to the e-Crime Congress by Dr Simon Moores 
09:00 -
09:20
►How to Communicate with the Business Using Risk Appetite
 
Andrew Martin, Director IT Risk, I&S & Europe, Royal Bank of Canada
  • What is Risk Appetite
  • Setting and Monitoring Risk Appetite 
  • Defining Key Risk Indicators 
  • Reporting on appetite to senior leaders
09:20 -
09:40
How will the Internet of Things impact Security

Tabrez Surve, Senior Security Solutions Specialist, F5
  • New Threats, Constraints, and Challenges 
  • Building Security In from the Bottom Up 
  • The End-to-End Security Solution 
09:40 -
10:00
►Internet of Things

Abdulmajid Said, Chief Specialist, Roads and Transport Authority - Government of Dubai
  • Internet of Things, a myth or reality
  • Big Data and Internet of Things
  • Security/Privacy Challenges in the Internet of Things 
  • A synopsis of a model security framework for Internet of Things (Government Policies and regulations)
10:00 -
10:20
The Security Issues That Deserve a Logo
 
Gavin Millard, Technical Director, EMEA, Tenable Network Security in collaboration with Paramount
  • Do some security issues really deserve a logo to catch attention?
  • How can we address the difficulty in communicating security to the business?
  • Why mastering the attack path is critical in reducing the risk of data loss
10:20 -
11:00
 Education seminar session 1  Delegates will be able to choose from a range of seminars: 
 
Challenges of Cyber Crimes Investigations
Ahmed Ali, Head of Technical, Contego Solutions

Intrusion vs. Breach: How Security Analytics & Automated Response Can Improve Your Chances of Avoiding a Breach
Ross Brewer, Vice President & Managing Director International Markets, LogRhythm 
 
PCI DSS Track
Christopher Strand, Senior Director of Compliance, Bit9
Mandeep Sandhu, Technical Director EMEA, Bit9
 
The management of your organisation's security policies
Domenico Dominoni, Director SEEMEA, Tufin Technologies
 
The ugly truth of Web-Application Security
Nicolai Solling, Director of Technology Services, Help AG
 
11:00 -
11:30
Networking break & refreshments 
11:30 -
11:50
Effective Corporate IT Governance: Fundamental Rules for Data Security
 
Mohammad Ashour, Head of Internal Audit & Compliance, Al Masraf Bank 
  • This topic will focus on building effective Corporate IT Governance focusing on the most neglected fundamental rules of Data Security.
  • Management implements information security components, such as policies and technical security measures with which employees interact and that include in their working procedures but totally not appreciating the essence and whole idea why such policies and security measures existed in the company. As such, Employees develop certain perceptions and unconsciously exhibit behavior, i.e. the ignoring or non-reporting of security incidents or sharing of passwords, which could either contribute or be a threat to the securing of information assets.
  • To introduce an acceptable level of information security culture, the organization must govern information security effectively by implementing emphasizing the fundamental security components. 
  • This topic evaluates approaches towards information security governance frameworks in order to arrive at a complete list of information security components 
11:50 -
12:10
►Defending against Cyber threats in complex environments
 
Dee Richartz, Senior Product Manager, Verisign Security Services
  • Considerations for security and governance across multiple deployment environments 
  • Identifying new tools and techniques to secure availability of applications in hybrid cloud environments
  • How to ensure application reachability and access regardless of where applications may reside
  • Advanced, cloud based malware protection
12:10 -
12:30
Collaboration security - keeping your data and applications safe in the cloud
 
Andy Heather, VP Sales EMEA, HP Security Voltage
  • Making attacks irrelevant by securing your most sensitive data at rest, in transit or in use
  • Determining which data in the cloud needs to be protected, and how to treat that sensitive data through secure end-to-end collaboration
  • Developing an innovative approach to the entire data lifecycle, providing ease of use with ironclad data security and the importance of visibility, governance, and control
12:30 -
12:50
 Executive panel discussion  Managing information security and technology risk in a global marketplace

Rajesh David, Director, Information Security & Architecture, GE Capital 
Mohammed Motassim Khan, Head of Information Security, Commercial Bank International
Mohammad Ashour, Head of Internal Audit & Compliance, Al Masraf Bank
Neil Thacker, Information Security & Strategy Officer EMEA, Websense
12:50 -
13:30
 Education seminar session 2  Delegates will be able to choose from a range of seminars:
 
Intrusion vs. Breach: How Security Analytics & Automated Response Can Improve Your Chances of Avoiding a Breach
Ross Brewer, Vice President & Managing Director International Markets, LogRhythm 
 
Next-Gen Vulnerability Management and Compliance with Cloud Agents
Faeq Abu-Khair, Technical Account Manager, Qualys
Hadi Jaafarawi, Managing Director, Middle East, Qualys
Walid Natour, Technical Account Manager - Presales, Qualys
 
Network security and understanding your organisation's IT infrastructure
Tanios Ibrahim Zabeneh, Channel Systems Engineer, Fortinet
Kalle Bjorn, Director, Systems Engineering, Fortinet
 
Using Data De-Identification to Enable Business Agility while Protecting Data Assets
Brendan Rizzo, Technical Director, EMEA of HP Security Voltage 
 
 
13:30 -
14:30
Lunch & networking break 
14:30 -
14:50
 ►APAC perspective: Effective implementation of PCI DSS Program

Harshal Mehta, Director -  Information Security, Carlson Wagonlit Travel
  • Understanding how to effectively reduce scope
  • The trends and challenges of PCI DSS implementation
  • Case studies- APAC PCI DSS Success Story
14:50 -
15:10
​►Defending against phishing; preparing and using human defences
 
Andy Sceats, Managing Director, International Sales, PhishMe
  • Understanding why staff are such a critical element of your security posture
  • Highlighting attack techniques and how to implement effective methods to improve employee behaviour towards targeted phishing attacks
  • How to reduce human susceptibility and turn employees into operative human sensors
15:10 -
15:30
►The Cyber Threat Landscape
 
Alain Kallas, Middle East Managing Principal, Dell SecureWorks
  • Analysing the latest intelligence in the cyber threat landscape
  • Understanding the difference between both targeted and commodity threats, and how the threat landscape is changing 
  • What are the motives of threat actors, and what could make your organisation a target? 
  • A pragmatic approach to what you can do to protect your critical information assets and reduce risk
15:30 -
16:10
 Education seminar session 3  Delegates will be able to choose from a range of seminars:   
 
Anatomy of an Attack and Mitigating the data breach threat through proactive security controls
Christopher Strand, Senior Director of Compliance, Bit9
Mandeep Sandhu, Technical Director EMEA, Bit9
 
Next-Gen Vulnerability Management and Compliance with Cloud Agents
Hadi Jaafarawi, Managing Director, Middle East, Qualys
Walid Natour, Technical Account Manager - Presales, Qualys
 
Do DDoS and Web attacks keep you awake at night?
Yaser Al Mashad, Security Solutions Specialist, F5
 
16:10 -
16:30
Networking break & refreshments  
16:30 -
16:50
► IOT, IOE, Smart cities and... Security
 
Amin Mohamad Hasbini, Senior Security Researcher, Kaspersky
  • Understanding the major threats that affect smart cities satisfaction and stability, coming from unsafe IOT/IOE products and services
  • Technological challenges for businesses and vendors when migrating towards the “Smartness” concept
  • The importance of information security through threat intelligence
16:50 -
17:10
A business approach to security architecture
 
Maurice R.P. Smit, Trainer & Consultant, SABSA 
  • Understanding how to implement a security culture within your organisation
  • How to make security a business enabler
  • Bring Demonstrable Value to Your Security Program
17:10 -
17:30
 ►Presenting to the Board 
 
Rajesh David, Director, Information Security & Architecture, GE Capital 
  • Delivering a successful Presentation: It’s Brain Science not Rocket Science
  • Data or No Data, That is the Question
  • The CISO as a Strategist
  • Presentation Dos and Don’t’s
  • Where do you start
  • Tips and Tricks from inside the room
  • Q & A
17:30 -
17:30
Conference close