20th - 21st NOV 2017 Sheraton Hotel, Oman

Size: px
Start display at page:

Download "20th - 21st NOV 2017 Sheraton Hotel, Oman"

Transcription

1 The 6th Regional Cybersecurity Summit اﻟﻤﺆﺗﻤﺮ ا ﻗﻠﻴﻤﻲ اﻟﺴﺎدس ﻟ ﻣﻦ اﻟﺴﻴﺒﺮاﻧﻲ Towards Efficient Cyber Resilience 20th - 21st NOV 2017 Official Host Organizer Endorsed by Sheraton Hotel, November 2017 Sheraton Hotel, Muscat, Platinum Sponsor Gold Sponsor Researched & Event Managed by

2 350+ DELEGATES 30+ SPEAKERS 75+ COUNTRIES 25+ REGIONAL & GLOBAL CERT's Event Overview: Cyber threats are constantly evolving and threatening to affect global organizations in their day to day activities. In a view of tackling such threats, the cost of implementing IT security solutions has significantly increased and expected to reach USD 101 billion in 2018 globally (Gartner). Middle East and North Africa (MENA) spending on cyber security technology and services is on pace to reach $13.43 billion by 2019, with an expected CAGR of 13.7% for the period By 2019, 30% of large enterprises will increase their security consulting services spending as they transition into digital business. With the advent of digitization among the countries of the Middle East and growing exposure to the risk of cyber-attacks, governments in the middle east have now directed their focus more on cybersecurity, releasing cybersecurity frameworks and mandating country-specific regulatory policies emphasizing on the need to have efficient monitoring and detection in place. Considering cyber resilience as the key, and continuing the success of the previous editions, ITA is hosting The 6th Annual Regional Cybersecurity Summit in collaboration with White Paper Summits (WPS) and Nispana Innovative Platforms. The 6th edition will cover a range of topics, highlighting the current trends and future threats, which are affecting the organizations & business effectiveness. RCS Summit will bring over 350+ attendees from across the Middle East to form new partnerships, discuss new policies and identify latest technologies to combat cyber threats. The premium 2-day summit will also, host and engage the most promising and emerging regional & global firms, from critical national Infrastructure sectors including: Energy & Utilities, Defense & Aviation, Financial Institutions, Hospitality, Healthcare, Manufacturing and Government Institutions. The event format will feature Keynote Presentations, Case Studies, Panel Discussions and Technology Showcase & Demos. We look forward to meeting you at the 6th Regional Cybersecurity Summit SPONSORS & EXHIBITORS 20+ PRESS & MEDIA

3 Who will you meet MDs / Chairman's & CEOs CIOs / CISOs & CTOs VPs / Directors / Heads of IT and Cybersecurity Cybersecurity Experts Delegate Demographics Energy & Utilities 10% Banks & Financial Institutions 10% Telecom 10% Healthcare 10% Retail 8% Government 15% Aviation 10% Manufacturing 8% ICT Companies 15% Academia 5% Regional CERT's 20%

4 Who Should Attend Energy and Utilities Banks & Financial Institutions Telecom Government Healthcare Retail Aviation Manufacturing Technology Firms ICT Companies Academia

5 Event Features Explore the latest innovations for the integration of security and safety technologies Understand the global Cybersecurity market condition Learn about the current trends of Cybersecurity Meet and network with the top global Cybersecurity experts Implement changes that will help secure region s major infrastructure 75% 60% 63% 75% of all data breaches are accomplished within days of the attack 60% of attackers are able to compromise an organization within minutes 63% of enterprises don t learn about breaches until months after data has been compromised

6 Steering Committee Eng. Badar Al Salehi Director General, National Cert Head ITU Regional Cyber Security Center Eng. Ebrahim Al Haddad Regional Director Arab Regional Office International Telecommunication Union (ITU) Egypt Dr. Sherif Hashem Vice President, Cybersecurity National Telecom Regulatory Authority Chairman Executive Bureau of the Egyptian Supreme Cybersecurity Council Egypt Mr. Mohamed Naoufel Frikha Director General The National Agency for Computer Security Tunis Cert Tunis Technical Committee Ms. Aziza Al Rashdi Director Of Cybersecurity Professional Services, National Cert Eng. Waleed Zakarya Executive Director Eg Cert Egypt Mr. Hamid Sediq Manager Qatar Cert Qatar Dr. Nadher Al-Safwani Cybersecurity Consultant Information Technology Authority ITU Arab Regional Cybersecurity Center Kanupriya Singh Director of Production White Paper Summits (WPS)

7 Speaker Panel Dr. Salim Al Ruzaiqi, CEO Information Technology Authority Eng. Ebrahim Alhaddad Regional Director International Telecommunication Union SA. Donald William Freese Deputy Assistant Director Federal Bureau of Investigation (FBI) USA Mr. Moosa Al Farei Chief Editor Atheer Dr. Serge Droz Vice President, OS-CERT Board Director Forum of Incident Response and Security Teams (FIRST) Switzerland Mr. Nick Vora Senior Vice President Enterprise Security and Processing MEA Mastercard Worldwide UAE Ms. Cherie Pardue CIO American Hospital Dubai UAE Dr.Almerindo Graziano CEO SILENSEC UK Eng. Badar Al Salehi Director General National Cert Head ITU Regional Cyber Security Center Dr. Sherif Hashem Vice President, Cybersecurity National Telecom Regulatory Authority Chairman Executive Bureau of the Egyptian Supreme Cybersecurity Council Egypt Mr. Christophe Durand Head of Strategy & Outreach Digital Investigative Support Cybercrime Directorate INTERPOL Global Complex For Innovation Singapore Dr. Basel Alomair Founding Director National Center for Cybersecurity Technologies King Abdulaziz City for Science & Technology Kingdom of Saudi Arabia Dr. Zahri Yunos Chief Operating Officer CyberSecurity Malaysia Malaysia Ms. Astrid Hansen VP - Head of Technology Risk, MENA Barclays Bank UAE Mr. Francois Rivasseau Head of Security Policy Division European External Action Service (EEAS) Belgium Mr.Muntaser Bdair Authorized (ISC)² Instructor (ISC)² USA

8 20 th November 2017 Sheraton Hotel, Muscat Agenda DAY 1 08:00 Registration & Refreshments 08:55 Welcome Note 09:00 Welcome Address by Information Technology Authority (ITA) Dr. Salim Al Ruzaiqi, CEO, Information Technology Authority, 09:05 Welcome Address by International Telecommunication Union Eng.EbrahimAlhaddad, Regional Director, Arab Regional Office 09:10 The Summit Chairperson opening Eng. Badar Al Salehi, Director General, National CERT, Head of ITU Arab Regional Cyber Security Center 9:20 Keynote: Understanding the Key Elements Contributing Towards Building a Cyber Safe Nation 9:40 Solution Provider Presentation, please contact Mausam Ali Khan at Mausam@wpsummits.com 10:00 VIP Exit Networking & Coffee Break 10:30 How to collectively improve the attribution process? Introduction of INTERPOL Global Cybercrime strategy Mitigating the digital risk by tackling the cyber threat Mr. Christophe Durand, Head of Cyber Strategy, Strategy & Outreach Cyber Innovation and Outreach Directorate, INTERPOL Global Complex for Innovation, Singapore 10:50 Global and Regional Collaboration is Key to Cyber Resilience The Cyber underground today is an organized service economy The only way to keep the upper hand is by collaboration What ingredients makes collaboration successful Dr. Serge Droz, Vice President, OS-CERT Board Director Forum of Incident Response and Security Teams (FIRST) 11:05 The EU Perception of the Threats The EU responses Perspectives of cooperation between EU and third countries EU approaches to Cybersecurity Dr. Francois Rivasseau, Head of Security Policy Division, European External Action Service (EEAS), Belgium 11:25 Interactive Panel Discussion:Building a Robust Cyber Response and Resilience Strategy Discussing and evaluating the current GCC state of cyber resilience to benchmark their own organisation's resilience Public-private sector partnership and coordination Importance role for media in cybersecurity 12:00 Presentation by: GBM 12:20 Networking & Coffee Break 12:50 Empowering National Vision to Tackle Cyber Threats and Fight Cybercrime Developing a national Cybersecurity strategy Ensuring effective steps taken by the stakeholders to address cybercrime in GCC Describing policies & regulations deployed by the region towards securing their countries assets Addressing investments to combat Cybersecurity threats Dr.Sherif Hashem Vice President, Cybersecurity National Telecom Regulatory Authority Chairman Executive Bureau of the Egyptian Supreme Cybersecurity Council, Egypt

9 20 th November 2017 Sheraton Hotel, Muscat Agenda DAY 1 13:10 Solution Provider Presentation, please contact Mausam Ali Khan at Mausam@wpsummits.com 13:30 Solution Provider Presentation, please contact Mausam Ali Khan at Mausam@wpsummits.com 13:50 Cyber Middle East Index What is security level of the country? Which sectors are the most exposed and which organizations within each sector? What type of threats are most relevant? Has there been any improvement from last year? How quickly and easily could a threat actor answer those questions Dr. Almerindo Graziano, CEO, SILENSEC, UK 14:10 Interactive Panel Discussion: Media as a Tool for Cyberwarfare Moderator : Mr. Moosa Al Farei, Chief Editor, Atheer, 14:50 Lunch and End of Conference Day 1

10 21 st November 2017 Sheraton Hotel, Muscat Agenda DAY 2 08:00 Registration & Refreshments 08:55 Welcome Note 09:05 Cybersecurity Related to Technology Outsourcing in Banking Entering collaborative technology models in banking, what does this mean from a Cybersecurity perspective? How should we treat data privacy and security concerns? What about regulation? Who is leading the regulative environments for banks worldwide and what is to come? Ms. Astrid Hansen, VP - Head of Technology Risk, MENA Barclays, UAE 09:25 Solution Provider Presentation, please contact Mausam Ali Khan at Mausam@psummits.com 09:45 Improving Cyber Hygiene to Prevent Attacks Creating a well-rounded, current Cybersecurity approach Working against the evolving cyber threat landscape High demand for medical records in the black market Internet enables medical device is under threat radar Ms. Cherie Pardue, CIO, American Hospital Dubai, UAE 10:05 Interactive Panel Discussion: Active Role of Women Leaders in Cybersecurity Why involvement of women in Cybersecurity really matter? Prioritizing the need of threat risk assessment in the region Panellists: Ms. Astrid Hansen, VP - Head of Technology Risk, MENA Barclays, UAE Ms. Cherie Pardue, CIO, American Hospital Dubai, UAE 10:40 Networking & Coffee Break 11:10 Mind the gap: The recruitment challenge in cyber & information security Mr. Muntaser Bdair, Authorized (ISC)² Instructor, (ISC)² 11:30 The Evolving and Expanding Nature of Cyber Threats Changes in Fraud Attacks and Responses with the proliferation of connected devices (Internet of Things) Importance of Balancing Security and Convenience or how do you stop people from writing down their password? Utilizing Artificial Intelligence & Machine Learning to detect and prevent fraud in systems The critical importance of Tokenization in for banks, merchants and others Mr. Nick Vora, Senior Vice President, Enterprise Security and Processing, MEA, Mastercard Worldwide, UAE 11:50 Solution Provider Presentation, please contact Mausam Ali Khan at Mausam@wpsummits.com 12:10 Creating the Need for More Cybersecurity Experts Understanding the importance of experiencedcybersecurity experts in the organizations Emphasizing the importance of re-education ofemployees within the organization Understanding the process of hiring the right cybersecurity expert Dr. ZahriYunos, Chief Operating Officer, Cybersecurity Malaysia, Malaysia

11 21 st November 2017 Agenda Sheraton Hotel, Muscat DAY 2 12:30 Networking & Coffee Break 13:00 Solution Provider Presentation, please contact Mausam Ali Khan at Mausam@wpsummits.com 13:20 The Future of Encryption How do we secure our data? Encryption: from handwriting to digital age Encryption and the cloud, quantum computing, and IoT Dr. Basel Alomair, Founding Director, National Center for Cybersecurity Technologies-King Abdulaziz City for Science and Technology, Kingdom of Saudi Arabia 13:40 Interactive Panel Discussion: Steps to Increase Cyber Resiliency Importance of incorporating a cyber risk management framework Developing a cyber incident response plan & ensuring regulators are notified where applicable Understanding the need to work with policy makers and regulators 14:15 Closing Remarks from the Chairperson 14:20 Lunch and End of Conference Iman Mahmoud Odeh Ahmed Senior Business Development Specialist Arab Regional Cyber Security Center Tel: Iman.mahmoud@ita.gov.om For more information, please contact: Satish Anand Conference Director Mobile: (India) Tel: +91 (80) satish.a@nispana.com Mausam Khan Sales Director Mobile: mausam@wpsummits.com

Venue. Sheraton Oman Hotel. P. O. Box 3260, Ruwi 112 Muscat, Sultanate of Oman Tel: Website:

Venue. Sheraton Oman Hotel. P. O. Box 3260, Ruwi 112 Muscat, Sultanate of Oman Tel: Website: Venue Sheraton Oman Hotel Sheraton Oman Hotel P. O. Box 3260, Ruwi 112 Muscat, Sultanate of Oman Tel: +968 2237 7777 Website: http://www.sheratonoman.com For reservations, please contact: Ms. Mary Antonette

More information

PARTICIPANTS VISITORS. Importance of SEF 2017 to. Importance of SEF 2017 to. Registration fees can be obtained through the following link:

PARTICIPANTS VISITORS. Importance of SEF 2017 to. Importance of SEF 2017 to. Registration fees can be obtained through the following link: The organizing of the Saudi Electricity Forum 2017 (SEF 2017), under the patronage and support of the Ministry of Energy, Industry and Mineral Resources, comes as one of the most important events in the

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

PROTECT International Exhibition and Conference on Security & Safety. March 12 13, 2018 at New World Makati Hotel, Manila, Philippines

PROTECT International Exhibition and Conference on Security & Safety. March 12 13, 2018 at New World Makati Hotel, Manila, Philippines International Exhibition and Conference on Security & Safety E-BROCHURE Doing Business Amidst New Threats, Series 13 In cooperation with the Anti-Terrorism Council WHAT IS PROTECT? Organized in 2005 in

More information

Cyber Security: Are digital doors still open?

Cyber Security: Are digital doors still open? Cyber Security: Are digital doors still open? Introduction Security is becoming a rapidly evolving and complex issue that various organizations are contending with today. It continues to be one of the

More information

EVENT BROCHURE SECURITY WORLD APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY.

EVENT BROCHURE SECURITY WORLD APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY. EVENT BROCHURE www.security.org.vn SECURITY WORLD 2017 4 APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY Ministry of Public Security Authority of Cyber Security - MPS Authority of Information

More information

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

Introduction. ISNR Abu Dhabi 2020 Program. Participation & Partnership Opportunities

Introduction. ISNR Abu Dhabi 2020 Program. Participation & Partnership Opportunities Event brochure Introduction ISNR Abu Dhabi 2020 Program Participation & Partnership Opportunities ISNR ABU DHABI 2018 was under the Patronage of H.H Sheikh Hazza bin Zayed Al Nahyan, Deputy Chairman of

More information

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore 6 th annual CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore Organised By: Event Schedule Tuesday 20 th March 2018 Full Day Workshop

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

The UK s National Cyber Security Strategy

The UK s National Cyber Security Strategy The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands

Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life s conference provides the ideal setting for the industry to come together to discuss its progress

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

25-27 February 2019 The Ritz-Carlton Bahrain Manama, Bahrain

25-27 February 2019 The Ritz-Carlton Bahrain Manama, Bahrain 25-27 February 2019 The Ritz-Carlton Bahrain Manama, Bahrain Under the Patronage of His Excellency, Lieutenant General, Sheikh Rashid bin Abdullah Al Khalifa, Minister of Interior, Kingdom of Bahrain Sponsorship

More information

December 5-6,

December 5-6, December 5-6, 2019 The Hyatt Hyatt Regency, Regency, Baltimore Baltimore Inner Inner Harbor, Harbor, MD MD The www.cybermarylandconference.com www.cybermarylandconference.com CyberMaryland @CyberMaryland

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

EU policy on Network and Information Security & Critical Information Infrastructures Protection

EU policy on Network and Information Security & Critical Information Infrastructures Protection EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and

More information

INDUSTRY 4.0 Summit 2018

INDUSTRY 4.0 Summit 2018 EVENT BROCHURE 12th 13th July 2018 JW Marriott Hotel Hanoi INDUSTRY 4.0 Summit 2018 HOSTED & ORGANIZED BY EVENT OVERVIEW Industry 4.0 Summit 2018 hosted by the Government of the Socialist Republic of Viet

More information

Itu regional workshop

Itu regional workshop Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on

More information

The African Internet Governance Forum AfIGF December 2017 Hyatt Regency Hotel, Sharm El-Sheikh, Egypt

The African Internet Governance Forum AfIGF December 2017 Hyatt Regency Hotel, Sharm El-Sheikh, Egypt The African Internet Governance Forum AfIGF 2017 4 6 December 2017 Hyatt Regency Hotel, Sharm El-Sheikh, Egypt Draft Outcome Document: Recommendations Background of AfIGF The African Internet Governance

More information

Welcome to the Second Annual Intelligence & National Security Forum

Welcome to the Second Annual Intelligence & National Security Forum Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence

More information

INDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS

INDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS SEPTEMBER 2017 INDIA - UAE COMPREHENSIVE STRATEGIC PARTNERSHIP OVER THE YEARS INDIA UAE Over the years UAE is India s 3rd largest trade partner globally UAE is the second largest export destination of

More information

ITU- Arab Regional Cyber Security Center s Activities & Regional Threats landscape

ITU- Arab Regional Cyber Security Center s Activities & Regional Threats landscape ITU- Arab Regional Cyber Security Center s Activities & Regional Threats landscape ENG. BADAR ALI ALSALEHI HEAD OF ITU-ARAB REGIONALCYBER SECURITY CENTER DG OF OMAN NATIONAL CERT Dar es Salaam November

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing

More information

The First Annual Privacy & Data Protection SOUTH AFRICA 2016

The First Annual Privacy & Data Protection SOUTH AFRICA 2016 The First Annual Privacy & Data Protection SOUTH AFRICA 2016 TransAtlantic Events 2016 Conference Series "POPI, The new horizon for South Africa: linking GDPR, The Cloud, Social Media and Information Security."

More information

Regional Cybersecurity Week

Regional Cybersecurity Week Regional Cybersecurity Week The 6 th Regional Cyber Drill Official Host Organizer Endorsed by 21-25 October 2018 Jumeirah Messilah Beach Hotel & Spa, Kuwait www.rcssummit.com www.arcc.om Event Researched

More information

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best

More information

RICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc.

RICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc. RICK RAMPOLLA ITDM Security Operations, Publix Super Markets Inc. Intelligence shared through the R-CISC has played a key role in our efforts to combat cyber threats. We can directly correlate the value

More information

Data privacy and cloud security

Data privacy and cloud security Data privacy and cloud security Abstract The use of cloud computing is rapidly evolving in many Arab & African countries due to its costefficiency and flexibility. This technology holds the potential to

More information

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 130 (REV. BUSAN, 2014) RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

ITU Forum on Smart Sustainable Cities Abu Dhabi-UAE, 3-4 May 2015

ITU Forum on Smart Sustainable Cities Abu Dhabi-UAE, 3-4 May 2015 Brief Description: ITU Forum on Smart Sustainable Cities Abu Dhabi-UAE, 3-4 May 2015 DRAFT AGENDA This forum is being organized as part of the implementation of the Regional Initiative on the "Use of telecommunications/icts

More information

Cyber Security in Smart Commercial Buildings 2017 to 2021

Cyber Security in Smart Commercial Buildings 2017 to 2021 Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Enhancing the cyber security &

Enhancing the cyber security & Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

National Cyber Security and Cyber Terrorism Summit

National Cyber Security and Cyber Terrorism Summit Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing

More information

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

4A Healthcare Data Security & Privacy

4A Healthcare Data Security & Privacy 4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits

More information

ISACA West Florida Chapter - Cybersecurity Event

ISACA West Florida Chapter - Cybersecurity Event ISACA West Florida Chapter - Cybersecurity Event Presented by Sri Sridharan Managing Director & Chief Operating Officer Florida Center for Cybersecurity CURRENT TRENDS Top Cybersecurity Trends of 2015

More information

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved. FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who

More information

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Cyber Security and Inside Threats: Turning Policies into Practices Presented by Ingrid Fredeen and Pamela Passman Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Presented By Ingrid Fredeen, J.D.

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,

More information

Committed to connecting the world

Committed to connecting the world ITU-T: Standardization Sector Produces standards covering all fields of telecommunications on a worldwide basis and defines tariff and accounting principles for international telecommunication services

More information

CRCC Information for Distinguished Regional Guests. Updated 4/13/15

CRCC Information for Distinguished Regional Guests. Updated 4/13/15 CRCC 2015 Information for Distinguished Regional Guests Updated 4/13/15 Central Region Communications Conference (CRCC) Summary 12 Partner Nations Invited 2 Recurring U.S. Central Command (USCENTCOM)-led

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona 2 nd National Conference on CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions Regional Headquarters, The University of the West Indies, Mona November 20-21, 2014 Conference

More information

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber

More information

Welcome. Chris Sortzi, VP of Public Sector RightNow Technologies. March 19, RightNow Technologies, Inc.

Welcome. Chris Sortzi, VP of Public Sector RightNow Technologies. March 19, RightNow Technologies, Inc. Welcome Chris Sortzi, VP of Public Sector RightNow Technologies March 19,2008 2008 RightNow Technologies, Inc. Agenda 9:30 9:45 a.m. 9:45 10:45 a.m. 10:45 11:00 a.m. Welcome/Opening Remarks Chris Sortzi,

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

29-31 OCTOBER cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE

29-31 OCTOBER cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE 29-31 OCTOBER 2019 cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE CYBERSECURITY AND ETHICAL HACKING CONGRESS The Barcelona Cyber Ethical Days Congress will be the

More information

11 December 2017, Westin Resort & Spa Hotel, Abu Dhabi, UAE

11 December 2017, Westin Resort & Spa Hotel, Abu Dhabi, UAE Organised by: Co-located with Lighting Tech Under the patronage from Abu Dhabi Municipality 11 December 2017, Westin Resort & Spa Hotel, Abu Dhabi, UAE Confirmed speakers: - Pierre Langlois, President,

More information

5 th IRF Latin America Regional Congress

5 th IRF Latin America Regional Congress Host 5 th IRF Latin America Regional Congress Bogotá, Colombia December 13-15, 2017 Program About the IRF OUR MISSION: Building Partnerships We assist countries in progressing towards better, safer and

More information

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE 31st Annual SoCal ISSA Security Symposium Wendy T. Wu Vice President Agenda + CISO: Then and Now + Who are the Stakeholders and What Do They Care About?

More information

International Exhibition and Conference on Security & Safety. March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE

International Exhibition and Conference on Security & Safety. March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE PROTECT 2019 International Exhibition and Conference on Security & Safety March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE WHAT IS PROTECT? The only government-private sector

More information

ENISA Cooperation in the EU / NIS Directive

ENISA Cooperation in the EU / NIS Directive ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security

More information

Nomination Form Architecture Excellence Awards 2018

Nomination Form Architecture Excellence Awards 2018 Nomination Form Architecture Excellence Awards 2018 Presented by: [Presenter's name] Company Overview 1. Name of the Company: 2. Name of the CEO (Chief Executive Officer): 3. Name of the CIO (Chief Information

More information

WHO-ITU National ehealth Strategy Toolkit

WHO-ITU National ehealth Strategy Toolkit WHO-ITU National ehealth Strategy Toolkit Context and need for a National Strategy A landscape of isolated islands of small scale applications unable to effectively communicate and to share information

More information

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Florida Hospital Association Welcome! John Wilgis Director, Emergency Management Services Florida Hospital Association

More information

Public Sector Cyber Security Series

Public Sector Cyber Security Series 2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September

More information

Accelerating CCUS: A Global Conference to Progress CCUS

Accelerating CCUS: A Global Conference to Progress CCUS Accelerating CCUS: A Global Conference to Progress CCUS 28-29 November 2018 EDINBURGH, SCOTLAND, UNITED KINGDOM There is broad international consensus that CCUS has a vital role to play in meeting global

More information

Securing Europe's Information Society

Securing Europe's Information Society Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU

More information

Welcome John Harris, Director General

Welcome John Harris, Director General Business Plan 2018 Welcome John Harris, Director General Agenda - speakers Chief Minister, Senator Ian Gorst, Government of Jersey Key highlights of Lord Eatwell, Chairman, JFSC Strategic and major priorities

More information

Cyber Resilience. Think18. Felicity March IBM Corporation

Cyber Resilience. Think18. Felicity March IBM Corporation Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales

More information

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

CLOUDERA GOVERNMENT FORUM rd annual. Machine Learning, Artificial Intelligence, and the Future of Big Data Analytics.

CLOUDERA GOVERNMENT FORUM rd annual. Machine Learning, Artificial Intelligence, and the Future of Big Data Analytics. 3rd annual CLOUDERA GOVERNMENT FORUM 2018 Machine Learning, Artificial Intelligence, and the Future of Big Data Analytics QT Hotel, Canberra 250+ Attendees Tuesday, 4th December 70+ Departments 25+ Speakers

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

CYBER SECURITY AIR TRANSPORT IT SUMMIT

CYBER SECURITY AIR TRANSPORT IT SUMMIT CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER

More information

CSA Government Cybersecurity Forum

CSA Government Cybersecurity Forum Post Event Report CSA Government Cybersecurity Forum 12 October 2016 Suntec Convention & Exhibition Centre in Singapore CSA Government Cybersecurity Forum The Cloud Security Alliance (CSA) had successfully

More information

Security Survey Executive Summary October 2008

Security Survey Executive Summary October 2008 A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government

More information

IPv6 deployment in the Gulf Region. Guirari Mustapha, CTO Case Technology Abu Dhabi-UAE

IPv6 deployment in the Gulf Region. Guirari Mustapha, CTO Case Technology Abu Dhabi-UAE ITU Workshop on IPv6 Geneva, Switzerland, 4 5 September 2008 IPv6 deployment in the Gulf Region Guirari Mustapha, CTO Case Technology Abu Dhabi-UAE Geneva, Switzerland, 4-5 September 2008 Milestones 2001

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,

More information

RESOLUTION 67 (Rev. Buenos Aires, 2017)

RESOLUTION 67 (Rev. Buenos Aires, 2017) 524 Res. 67 RESOLUTION 67 (Rev. Buenos Aires, 2017) The role of the ITU Telecommunication Development Sector in child online protection The World Telecommunication Development Conference (Buenos Aires,

More information

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION 9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America 5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,

More information

The Rise of the CSO Welcome

The Rise of the CSO Welcome The Rise of the CSO Welcome David Profozich Senior Vice President North America Sales Oracle October 27, 2015 WELCOME THE 5 CSO TH SUMMIT @ OPEN WORLD 3 We re in the Age of Mega Breaches 200M Experian

More information

Building a Resilient Security Posture for Effective Breach Prevention

Building a Resilient Security Posture for Effective Breach Prevention SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D KENYA YOUR RELIABLE PARTNER AT THE ITU Candidate for the ITU Council in Region D KENYA: CANDIDATE FOR ITU COUNCIL IN REGION D (AFRICA) The Republic of Kenya has been a member of the International Telecommunication

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

Driving Internet of Things (IoT) standardization to build smart sustainable cities. Cristina Bueti, Adviser, ITU

Driving Internet of Things (IoT) standardization to build smart sustainable cities. Cristina Bueti, Adviser, ITU Driving Internet of Things (IoT) standardization to build smart sustainable cities Cristina Bueti, Adviser, ITU The world is Mobile broadband penetration globally is reaching 47% in 2015, a value that

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

Smart Provinces Summit 2015

Smart Provinces Summit 2015 Smart Provinces Summit 2015 28 th & 29 th January 2015, Hotel Al Khozama, Riyadh, Kingdom of Saudi Arabia Transforming Smart Cities to Kingdom-wide Smart Provinces SASIA ENDORSEMENT LETTER The Saudi Arabia

More information

Secure Societies Work Programme Call

Secure Societies Work Programme Call Secure Societies Work Programme 2018-2020 2019 Call Andrea DE CANDIDO Deputy Head of Unit Innovation and Industry for Security European Commission andrea.de-candido@ec.europa.eu Outline 1. Policy context

More information