20th - 21st NOV 2017 Sheraton Hotel, Oman
|
|
- Constance Bond
- 6 years ago
- Views:
Transcription
1 The 6th Regional Cybersecurity Summit اﻟﻤﺆﺗﻤﺮ ا ﻗﻠﻴﻤﻲ اﻟﺴﺎدس ﻟ ﻣﻦ اﻟﺴﻴﺒﺮاﻧﻲ Towards Efficient Cyber Resilience 20th - 21st NOV 2017 Official Host Organizer Endorsed by Sheraton Hotel, November 2017 Sheraton Hotel, Muscat, Platinum Sponsor Gold Sponsor Researched & Event Managed by
2 350+ DELEGATES 30+ SPEAKERS 75+ COUNTRIES 25+ REGIONAL & GLOBAL CERT's Event Overview: Cyber threats are constantly evolving and threatening to affect global organizations in their day to day activities. In a view of tackling such threats, the cost of implementing IT security solutions has significantly increased and expected to reach USD 101 billion in 2018 globally (Gartner). Middle East and North Africa (MENA) spending on cyber security technology and services is on pace to reach $13.43 billion by 2019, with an expected CAGR of 13.7% for the period By 2019, 30% of large enterprises will increase their security consulting services spending as they transition into digital business. With the advent of digitization among the countries of the Middle East and growing exposure to the risk of cyber-attacks, governments in the middle east have now directed their focus more on cybersecurity, releasing cybersecurity frameworks and mandating country-specific regulatory policies emphasizing on the need to have efficient monitoring and detection in place. Considering cyber resilience as the key, and continuing the success of the previous editions, ITA is hosting The 6th Annual Regional Cybersecurity Summit in collaboration with White Paper Summits (WPS) and Nispana Innovative Platforms. The 6th edition will cover a range of topics, highlighting the current trends and future threats, which are affecting the organizations & business effectiveness. RCS Summit will bring over 350+ attendees from across the Middle East to form new partnerships, discuss new policies and identify latest technologies to combat cyber threats. The premium 2-day summit will also, host and engage the most promising and emerging regional & global firms, from critical national Infrastructure sectors including: Energy & Utilities, Defense & Aviation, Financial Institutions, Hospitality, Healthcare, Manufacturing and Government Institutions. The event format will feature Keynote Presentations, Case Studies, Panel Discussions and Technology Showcase & Demos. We look forward to meeting you at the 6th Regional Cybersecurity Summit SPONSORS & EXHIBITORS 20+ PRESS & MEDIA
3 Who will you meet MDs / Chairman's & CEOs CIOs / CISOs & CTOs VPs / Directors / Heads of IT and Cybersecurity Cybersecurity Experts Delegate Demographics Energy & Utilities 10% Banks & Financial Institutions 10% Telecom 10% Healthcare 10% Retail 8% Government 15% Aviation 10% Manufacturing 8% ICT Companies 15% Academia 5% Regional CERT's 20%
4 Who Should Attend Energy and Utilities Banks & Financial Institutions Telecom Government Healthcare Retail Aviation Manufacturing Technology Firms ICT Companies Academia
5 Event Features Explore the latest innovations for the integration of security and safety technologies Understand the global Cybersecurity market condition Learn about the current trends of Cybersecurity Meet and network with the top global Cybersecurity experts Implement changes that will help secure region s major infrastructure 75% 60% 63% 75% of all data breaches are accomplished within days of the attack 60% of attackers are able to compromise an organization within minutes 63% of enterprises don t learn about breaches until months after data has been compromised
6 Steering Committee Eng. Badar Al Salehi Director General, National Cert Head ITU Regional Cyber Security Center Eng. Ebrahim Al Haddad Regional Director Arab Regional Office International Telecommunication Union (ITU) Egypt Dr. Sherif Hashem Vice President, Cybersecurity National Telecom Regulatory Authority Chairman Executive Bureau of the Egyptian Supreme Cybersecurity Council Egypt Mr. Mohamed Naoufel Frikha Director General The National Agency for Computer Security Tunis Cert Tunis Technical Committee Ms. Aziza Al Rashdi Director Of Cybersecurity Professional Services, National Cert Eng. Waleed Zakarya Executive Director Eg Cert Egypt Mr. Hamid Sediq Manager Qatar Cert Qatar Dr. Nadher Al-Safwani Cybersecurity Consultant Information Technology Authority ITU Arab Regional Cybersecurity Center Kanupriya Singh Director of Production White Paper Summits (WPS)
7 Speaker Panel Dr. Salim Al Ruzaiqi, CEO Information Technology Authority Eng. Ebrahim Alhaddad Regional Director International Telecommunication Union SA. Donald William Freese Deputy Assistant Director Federal Bureau of Investigation (FBI) USA Mr. Moosa Al Farei Chief Editor Atheer Dr. Serge Droz Vice President, OS-CERT Board Director Forum of Incident Response and Security Teams (FIRST) Switzerland Mr. Nick Vora Senior Vice President Enterprise Security and Processing MEA Mastercard Worldwide UAE Ms. Cherie Pardue CIO American Hospital Dubai UAE Dr.Almerindo Graziano CEO SILENSEC UK Eng. Badar Al Salehi Director General National Cert Head ITU Regional Cyber Security Center Dr. Sherif Hashem Vice President, Cybersecurity National Telecom Regulatory Authority Chairman Executive Bureau of the Egyptian Supreme Cybersecurity Council Egypt Mr. Christophe Durand Head of Strategy & Outreach Digital Investigative Support Cybercrime Directorate INTERPOL Global Complex For Innovation Singapore Dr. Basel Alomair Founding Director National Center for Cybersecurity Technologies King Abdulaziz City for Science & Technology Kingdom of Saudi Arabia Dr. Zahri Yunos Chief Operating Officer CyberSecurity Malaysia Malaysia Ms. Astrid Hansen VP - Head of Technology Risk, MENA Barclays Bank UAE Mr. Francois Rivasseau Head of Security Policy Division European External Action Service (EEAS) Belgium Mr.Muntaser Bdair Authorized (ISC)² Instructor (ISC)² USA
8 20 th November 2017 Sheraton Hotel, Muscat Agenda DAY 1 08:00 Registration & Refreshments 08:55 Welcome Note 09:00 Welcome Address by Information Technology Authority (ITA) Dr. Salim Al Ruzaiqi, CEO, Information Technology Authority, 09:05 Welcome Address by International Telecommunication Union Eng.EbrahimAlhaddad, Regional Director, Arab Regional Office 09:10 The Summit Chairperson opening Eng. Badar Al Salehi, Director General, National CERT, Head of ITU Arab Regional Cyber Security Center 9:20 Keynote: Understanding the Key Elements Contributing Towards Building a Cyber Safe Nation 9:40 Solution Provider Presentation, please contact Mausam Ali Khan at Mausam@wpsummits.com 10:00 VIP Exit Networking & Coffee Break 10:30 How to collectively improve the attribution process? Introduction of INTERPOL Global Cybercrime strategy Mitigating the digital risk by tackling the cyber threat Mr. Christophe Durand, Head of Cyber Strategy, Strategy & Outreach Cyber Innovation and Outreach Directorate, INTERPOL Global Complex for Innovation, Singapore 10:50 Global and Regional Collaboration is Key to Cyber Resilience The Cyber underground today is an organized service economy The only way to keep the upper hand is by collaboration What ingredients makes collaboration successful Dr. Serge Droz, Vice President, OS-CERT Board Director Forum of Incident Response and Security Teams (FIRST) 11:05 The EU Perception of the Threats The EU responses Perspectives of cooperation between EU and third countries EU approaches to Cybersecurity Dr. Francois Rivasseau, Head of Security Policy Division, European External Action Service (EEAS), Belgium 11:25 Interactive Panel Discussion:Building a Robust Cyber Response and Resilience Strategy Discussing and evaluating the current GCC state of cyber resilience to benchmark their own organisation's resilience Public-private sector partnership and coordination Importance role for media in cybersecurity 12:00 Presentation by: GBM 12:20 Networking & Coffee Break 12:50 Empowering National Vision to Tackle Cyber Threats and Fight Cybercrime Developing a national Cybersecurity strategy Ensuring effective steps taken by the stakeholders to address cybercrime in GCC Describing policies & regulations deployed by the region towards securing their countries assets Addressing investments to combat Cybersecurity threats Dr.Sherif Hashem Vice President, Cybersecurity National Telecom Regulatory Authority Chairman Executive Bureau of the Egyptian Supreme Cybersecurity Council, Egypt
9 20 th November 2017 Sheraton Hotel, Muscat Agenda DAY 1 13:10 Solution Provider Presentation, please contact Mausam Ali Khan at Mausam@wpsummits.com 13:30 Solution Provider Presentation, please contact Mausam Ali Khan at Mausam@wpsummits.com 13:50 Cyber Middle East Index What is security level of the country? Which sectors are the most exposed and which organizations within each sector? What type of threats are most relevant? Has there been any improvement from last year? How quickly and easily could a threat actor answer those questions Dr. Almerindo Graziano, CEO, SILENSEC, UK 14:10 Interactive Panel Discussion: Media as a Tool for Cyberwarfare Moderator : Mr. Moosa Al Farei, Chief Editor, Atheer, 14:50 Lunch and End of Conference Day 1
10 21 st November 2017 Sheraton Hotel, Muscat Agenda DAY 2 08:00 Registration & Refreshments 08:55 Welcome Note 09:05 Cybersecurity Related to Technology Outsourcing in Banking Entering collaborative technology models in banking, what does this mean from a Cybersecurity perspective? How should we treat data privacy and security concerns? What about regulation? Who is leading the regulative environments for banks worldwide and what is to come? Ms. Astrid Hansen, VP - Head of Technology Risk, MENA Barclays, UAE 09:25 Solution Provider Presentation, please contact Mausam Ali Khan at Mausam@psummits.com 09:45 Improving Cyber Hygiene to Prevent Attacks Creating a well-rounded, current Cybersecurity approach Working against the evolving cyber threat landscape High demand for medical records in the black market Internet enables medical device is under threat radar Ms. Cherie Pardue, CIO, American Hospital Dubai, UAE 10:05 Interactive Panel Discussion: Active Role of Women Leaders in Cybersecurity Why involvement of women in Cybersecurity really matter? Prioritizing the need of threat risk assessment in the region Panellists: Ms. Astrid Hansen, VP - Head of Technology Risk, MENA Barclays, UAE Ms. Cherie Pardue, CIO, American Hospital Dubai, UAE 10:40 Networking & Coffee Break 11:10 Mind the gap: The recruitment challenge in cyber & information security Mr. Muntaser Bdair, Authorized (ISC)² Instructor, (ISC)² 11:30 The Evolving and Expanding Nature of Cyber Threats Changes in Fraud Attacks and Responses with the proliferation of connected devices (Internet of Things) Importance of Balancing Security and Convenience or how do you stop people from writing down their password? Utilizing Artificial Intelligence & Machine Learning to detect and prevent fraud in systems The critical importance of Tokenization in for banks, merchants and others Mr. Nick Vora, Senior Vice President, Enterprise Security and Processing, MEA, Mastercard Worldwide, UAE 11:50 Solution Provider Presentation, please contact Mausam Ali Khan at Mausam@wpsummits.com 12:10 Creating the Need for More Cybersecurity Experts Understanding the importance of experiencedcybersecurity experts in the organizations Emphasizing the importance of re-education ofemployees within the organization Understanding the process of hiring the right cybersecurity expert Dr. ZahriYunos, Chief Operating Officer, Cybersecurity Malaysia, Malaysia
11 21 st November 2017 Agenda Sheraton Hotel, Muscat DAY 2 12:30 Networking & Coffee Break 13:00 Solution Provider Presentation, please contact Mausam Ali Khan at Mausam@wpsummits.com 13:20 The Future of Encryption How do we secure our data? Encryption: from handwriting to digital age Encryption and the cloud, quantum computing, and IoT Dr. Basel Alomair, Founding Director, National Center for Cybersecurity Technologies-King Abdulaziz City for Science and Technology, Kingdom of Saudi Arabia 13:40 Interactive Panel Discussion: Steps to Increase Cyber Resiliency Importance of incorporating a cyber risk management framework Developing a cyber incident response plan & ensuring regulators are notified where applicable Understanding the need to work with policy makers and regulators 14:15 Closing Remarks from the Chairperson 14:20 Lunch and End of Conference Iman Mahmoud Odeh Ahmed Senior Business Development Specialist Arab Regional Cyber Security Center Tel: Iman.mahmoud@ita.gov.om For more information, please contact: Satish Anand Conference Director Mobile: (India) Tel: +91 (80) satish.a@nispana.com Mausam Khan Sales Director Mobile: mausam@wpsummits.com
Venue. Sheraton Oman Hotel. P. O. Box 3260, Ruwi 112 Muscat, Sultanate of Oman Tel: Website:
Venue Sheraton Oman Hotel Sheraton Oman Hotel P. O. Box 3260, Ruwi 112 Muscat, Sultanate of Oman Tel: +968 2237 7777 Website: http://www.sheratonoman.com For reservations, please contact: Ms. Mary Antonette
More informationPARTICIPANTS VISITORS. Importance of SEF 2017 to. Importance of SEF 2017 to. Registration fees can be obtained through the following link:
The organizing of the Saudi Electricity Forum 2017 (SEF 2017), under the patronage and support of the Ministry of Energy, Industry and Mineral Resources, comes as one of the most important events in the
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationPROTECT International Exhibition and Conference on Security & Safety. March 12 13, 2018 at New World Makati Hotel, Manila, Philippines
International Exhibition and Conference on Security & Safety E-BROCHURE Doing Business Amidst New Threats, Series 13 In cooperation with the Anti-Terrorism Council WHAT IS PROTECT? Organized in 2005 in
More informationCyber Security: Are digital doors still open?
Cyber Security: Are digital doors still open? Introduction Security is becoming a rapidly evolving and complex issue that various organizations are contending with today. It continues to be one of the
More informationEVENT BROCHURE SECURITY WORLD APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY.
EVENT BROCHURE www.security.org.vn SECURITY WORLD 2017 4 APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY Ministry of Public Security Authority of Cyber Security - MPS Authority of Information
More informationSPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG
SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationIntroduction. ISNR Abu Dhabi 2020 Program. Participation & Partnership Opportunities
Event brochure Introduction ISNR Abu Dhabi 2020 Program Participation & Partnership Opportunities ISNR ABU DHABI 2018 was under the Patronage of H.H Sheikh Hazza bin Zayed Al Nahyan, Deputy Chairman of
More informationCYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore
6 th annual CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore Organised By: Event Schedule Tuesday 20 th March 2018 Full Day Workshop
More informationDiscussion on MS contribution to the WP2018
Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several
More informationThe UK s National Cyber Security Strategy
The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationLeasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands
Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life s conference provides the ideal setting for the industry to come together to discuss its progress
More informationCybersecurity and the Board of Directors
Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education
More information25-27 February 2019 The Ritz-Carlton Bahrain Manama, Bahrain
25-27 February 2019 The Ritz-Carlton Bahrain Manama, Bahrain Under the Patronage of His Excellency, Lieutenant General, Sheikh Rashid bin Abdullah Al Khalifa, Minister of Interior, Kingdom of Bahrain Sponsorship
More informationDecember 5-6,
December 5-6, 2019 The Hyatt Hyatt Regency, Regency, Baltimore Baltimore Inner Inner Harbor, Harbor, MD MD The www.cybermarylandconference.com www.cybermarylandconference.com CyberMaryland @CyberMaryland
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)
COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion
More informationEU policy on Network and Information Security & Critical Information Infrastructures Protection
EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and
More informationINDUSTRY 4.0 Summit 2018
EVENT BROCHURE 12th 13th July 2018 JW Marriott Hotel Hanoi INDUSTRY 4.0 Summit 2018 HOSTED & ORGANIZED BY EVENT OVERVIEW Industry 4.0 Summit 2018 hosted by the Government of the Socialist Republic of Viet
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More informationThe African Internet Governance Forum AfIGF December 2017 Hyatt Regency Hotel, Sharm El-Sheikh, Egypt
The African Internet Governance Forum AfIGF 2017 4 6 December 2017 Hyatt Regency Hotel, Sharm El-Sheikh, Egypt Draft Outcome Document: Recommendations Background of AfIGF The African Internet Governance
More informationWelcome to the Second Annual Intelligence & National Security Forum
Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence
More informationINDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS
SEPTEMBER 2017 INDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS INDIA UAE Over the years UAE is India s 3rd largest trade partner globally UAE is the second largest export destination of
More informationITU- Arab Regional Cyber Security Center s Activities & Regional Threats landscape
ITU- Arab Regional Cyber Security Center s Activities & Regional Threats landscape ENG. BADAR ALI ALSALEHI HEAD OF ITU-ARAB REGIONALCYBER SECURITY CENTER DG OF OMAN NATIONAL CERT Dar es Salaam November
More informationCyber Security in Europe
Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing
More informationThe First Annual Privacy & Data Protection SOUTH AFRICA 2016
The First Annual Privacy & Data Protection SOUTH AFRICA 2016 TransAtlantic Events 2016 Conference Series "POPI, The new horizon for South Africa: linking GDPR, The Cloud, Social Media and Information Security."
More informationRegional Cybersecurity Week
Regional Cybersecurity Week The 6 th Regional Cyber Drill Official Host Organizer Endorsed by 21-25 October 2018 Jumeirah Messilah Beach Hotel & Spa, Kuwait www.rcssummit.com www.arcc.om Event Researched
More informationNational Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director
National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best
More informationRICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc.
RICK RAMPOLLA ITDM Security Operations, Publix Super Markets Inc. Intelligence shared through the R-CISC has played a key role in our efforts to combat cyber threats. We can directly correlate the value
More informationData privacy and cloud security
Data privacy and cloud security Abstract The use of cloud computing is rapidly evolving in many Arab & African countries due to its costefficiency and flexibility. This technology holds the potential to
More informationCybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution
More informationCybersecurity & Digital Privacy in the Energy sector
ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European
More informationRESOLUTION 130 (REV. BUSAN, 2014)
RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More informationITU Forum on Smart Sustainable Cities Abu Dhabi-UAE, 3-4 May 2015
Brief Description: ITU Forum on Smart Sustainable Cities Abu Dhabi-UAE, 3-4 May 2015 DRAFT AGENDA This forum is being organized as part of the implementation of the Regional Initiative on the "Use of telecommunications/icts
More informationCyber Security in Smart Commercial Buildings 2017 to 2021
Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationEnhancing the cyber security &
Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationNational Cyber Security and Cyber Terrorism Summit
Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing
More informationSecurity for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More information4A Healthcare Data Security & Privacy
4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits
More informationISACA West Florida Chapter - Cybersecurity Event
ISACA West Florida Chapter - Cybersecurity Event Presented by Sri Sridharan Managing Director & Chief Operating Officer Florida Center for Cybersecurity CURRENT TRENDS Top Cybersecurity Trends of 2015
More informationFTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.
FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who
More informationPresented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0
Cyber Security and Inside Threats: Turning Policies into Practices Presented by Ingrid Fredeen and Pamela Passman Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Presented By Ingrid Fredeen, J.D.
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,
More informationCommitted to connecting the world
ITU-T: Standardization Sector Produces standards covering all fields of telecommunications on a worldwide basis and defines tariff and accounting principles for international telecommunication services
More informationCRCC Information for Distinguished Regional Guests. Updated 4/13/15
CRCC 2015 Information for Distinguished Regional Guests Updated 4/13/15 Central Region Communications Conference (CRCC) Summary 12 Partner Nations Invited 2 Recurring U.S. Central Command (USCENTCOM)-led
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationCYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona
2 nd National Conference on CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions Regional Headquarters, The University of the West Indies, Mona November 20-21, 2014 Conference
More informationSecuring the Internet of Things (IoT) at the U.S. Department of Veterans Affairs
Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber
More informationWelcome. Chris Sortzi, VP of Public Sector RightNow Technologies. March 19, RightNow Technologies, Inc.
Welcome Chris Sortzi, VP of Public Sector RightNow Technologies March 19,2008 2008 RightNow Technologies, Inc. Agenda 9:30 9:45 a.m. 9:45 10:45 a.m. 10:45 11:00 a.m. Welcome/Opening Remarks Chris Sortzi,
More information2017 RIMS CYBER SURVEY
2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the
More information29-31 OCTOBER cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE
29-31 OCTOBER 2019 cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE CYBERSECURITY AND ETHICAL HACKING CONGRESS The Barcelona Cyber Ethical Days Congress will be the
More information11 December 2017, Westin Resort & Spa Hotel, Abu Dhabi, UAE
Organised by: Co-located with Lighting Tech Under the patronage from Abu Dhabi Municipality 11 December 2017, Westin Resort & Spa Hotel, Abu Dhabi, UAE Confirmed speakers: - Pierre Langlois, President,
More information5 th IRF Latin America Regional Congress
Host 5 th IRF Latin America Regional Congress Bogotá, Colombia December 13-15, 2017 Program About the IRF OUR MISSION: Building Partnerships We assist countries in progressing towards better, safer and
More informationBREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE
BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE 31st Annual SoCal ISSA Security Symposium Wendy T. Wu Vice President Agenda + CISO: Then and Now + Who are the Stakeholders and What Do They Care About?
More informationInternational Exhibition and Conference on Security & Safety. March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE
PROTECT 2019 International Exhibition and Conference on Security & Safety March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE WHAT IS PROTECT? The only government-private sector
More informationENISA Cooperation in the EU / NIS Directive
ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security
More informationNomination Form Architecture Excellence Awards 2018
Nomination Form Architecture Excellence Awards 2018 Presented by: [Presenter's name] Company Overview 1. Name of the Company: 2. Name of the CEO (Chief Executive Officer): 3. Name of the CIO (Chief Information
More informationWHO-ITU National ehealth Strategy Toolkit
WHO-ITU National ehealth Strategy Toolkit Context and need for a National Strategy A landscape of isolated islands of small scale applications unable to effectively communicate and to share information
More informationAchieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)
Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Florida Hospital Association Welcome! John Wilgis Director, Emergency Management Services Florida Hospital Association
More informationPublic Sector Cyber Security Series
2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September
More informationAccelerating CCUS: A Global Conference to Progress CCUS
Accelerating CCUS: A Global Conference to Progress CCUS 28-29 November 2018 EDINBURGH, SCOTLAND, UNITED KINGDOM There is broad international consensus that CCUS has a vital role to play in meeting global
More informationSecuring Europe's Information Society
Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU
More informationWelcome John Harris, Director General
Business Plan 2018 Welcome John Harris, Director General Agenda - speakers Chief Minister, Senator Ian Gorst, Government of Jersey Key highlights of Lord Eatwell, Chairman, JFSC Strategic and major priorities
More informationCyber Resilience. Think18. Felicity March IBM Corporation
Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationMid-Market Data Center Purchasing Drivers, Priorities and Barriers
Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales
More informationCritical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.
Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,
More informationCall for Expressions of Interest
Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationCLOUDERA GOVERNMENT FORUM rd annual. Machine Learning, Artificial Intelligence, and the Future of Big Data Analytics.
3rd annual CLOUDERA GOVERNMENT FORUM 2018 Machine Learning, Artificial Intelligence, and the Future of Big Data Analytics QT Hotel, Canberra 250+ Attendees Tuesday, 4th December 70+ Departments 25+ Speakers
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationCYBER SECURITY AIR TRANSPORT IT SUMMIT
CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER
More informationCSA Government Cybersecurity Forum
Post Event Report CSA Government Cybersecurity Forum 12 October 2016 Suntec Convention & Exhibition Centre in Singapore CSA Government Cybersecurity Forum The Cloud Security Alliance (CSA) had successfully
More informationSecurity Survey Executive Summary October 2008
A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government
More informationIPv6 deployment in the Gulf Region. Guirari Mustapha, CTO Case Technology Abu Dhabi-UAE
ITU Workshop on IPv6 Geneva, Switzerland, 4 5 September 2008 IPv6 deployment in the Gulf Region Guirari Mustapha, CTO Case Technology Abu Dhabi-UAE Geneva, Switzerland, 4-5 September 2008 Milestones 2001
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationTIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE
TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,
More informationRESOLUTION 67 (Rev. Buenos Aires, 2017)
524 Res. 67 RESOLUTION 67 (Rev. Buenos Aires, 2017) The role of the ITU Telecommunication Development Sector in child online protection The World Telecommunication Development Conference (Buenos Aires,
More informationDynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION
9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More information5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America
5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,
More informationThe Rise of the CSO Welcome
The Rise of the CSO Welcome David Profozich Senior Vice President North America Sales Oracle October 27, 2015 WELCOME THE 5 CSO TH SUMMIT @ OPEN WORLD 3 We re in the Age of Mega Breaches 200M Experian
More informationBuilding a Resilient Security Posture for Effective Breach Prevention
SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationKENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D
KENYA YOUR RELIABLE PARTNER AT THE ITU Candidate for the ITU Council in Region D KENYA: CANDIDATE FOR ITU COUNCIL IN REGION D (AFRICA) The Republic of Kenya has been a member of the International Telecommunication
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationDriving Internet of Things (IoT) standardization to build smart sustainable cities. Cristina Bueti, Adviser, ITU
Driving Internet of Things (IoT) standardization to build smart sustainable cities Cristina Bueti, Adviser, ITU The world is Mobile broadband penetration globally is reaching 47% in 2015, a value that
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationSmart Provinces Summit 2015
Smart Provinces Summit 2015 28 th & 29 th January 2015, Hotel Al Khozama, Riyadh, Kingdom of Saudi Arabia Transforming Smart Cities to Kingdom-wide Smart Provinces SASIA ENDORSEMENT LETTER The Saudi Arabia
More informationSecure Societies Work Programme Call
Secure Societies Work Programme 2018-2020 2019 Call Andrea DE CANDIDO Deputy Head of Unit Innovation and Industry for Security European Commission andrea.de-candido@ec.europa.eu Outline 1. Policy context
More information