Академический Документы
Профессиональный Документы
Культура Документы
5th ANNUAL
4
Keynotes from acknowledged security leaders:
Benefits of Attending
participation guaranteed ample time for Q&A, 1 Active speaker tables, group debate, panel discussions, roundtables. corporate case studies speakers are tasked 2 Practical with delivering premium business intelligence to tackle the key issues and arm you with insider information on recent projects & unique achievements. definitive assurance on managing security threats 3 Gain & preparing for the future. Ensure you have the latest knowledge on how to manage the threat of malware, data leakage risks, advanced targeted attacks and cloud security challenges. networking enjoy sponsored receptions & dinners 4 Dedicated with like-minded senior peers.
Shawn Henry, Former Executive Assistant Director, FBI & President, Crowdstrike Services
Suleyman Anil, Head, Cyber Defence Section, Emerging Security Challenges Division, NATO Global Heads of Security from UK, EU and US organisations share exclusive insights on recent projects and achievements:
Viktor Polic, Information Technology Security Officer, International Labour Organization (United Nations) & Adjunct Faculty, Webster University Geneva Avtar Sehmbi, Head of Information Security and Risk Management, Centrica Dr. John Meakin, Global Head of Security Solutions & Architecture, Deutsche Bank Simon Riggs, Senior Vice President, Information Security Officer, Global Information Security, Bank of America Merrill Lynch
One-to-One Meetings Sponsor
Session leaders include heads of information security and Chief Information Officers from:
American University of Sharjah, UAE Bank AlBilad Centrica CAIT Kuwait DU Dubai Bank Emaar Misr Emirates Investment Authority (UAE) Emirates Etisalat Gulf Air International Labour Organization (United Nations) Jumeirah Group Khalifa University of Science Technology and Research (KUSTAR) National Bank of Abu Dhabi Maaden (Saudi Arabian Mining Company) Mobily Oman Data Park Saudi Aramco Saudi Hollandi Bank
Lunch Sponsor
Bronze Sponsor
www.mistieurope.com/cisome
5th ANNUAL
MIDDLE EAST
You are invited to participate in the programme that speaks directly to CIOs, CISOs, heads of information security, CTOs and senior technology risk executives in the Middle East. Now firmly established as the Middle Easts premier networking and thought leadership forum, MIS Training Institute is delighted to announce the 5th Annual CISO Middle East Summit & Roundtable (18th-20th February 2013), taking place in Dubai, the United Arab Emirates.
Mahmoud Yassin, Lead Systems & Security Eng. Data Center Group,, National Bank of Abu Dhabi Maitham Al-Lawati, Head -Governance, Risk & Compliance, Oman Data Park Majed Al-Shangiti, IT Director, Maaden Phosphate Company (MPC) Moataz Hassouna, Chief Information Officer, Emaar Misr Rashed Al Othman, Chief Information Officer, Information Technology Division, Bank AlBilad Roshan Daluwakgoda, Senior Director Strategy Planning, Risk Assessment & DR, DU (Emirates Integrated Telecommunications Company) Sameer Shaikh, IT Security Policies Manager, Emirates Sarith Bhavan, IT Security Manager, Jumeirah Group Taimur Ijlal, Head of Information Security, Dubai Bank Tareque Choudhury, Chief Security Officer MEA, British Telecom (BT) Walid Kamal, Senior Vice President, Technology Security & Risk Management, DU (Emirates Integrated Telecommunications Company) Zaki Alowini Director, Network and Information Security, Mobily Dr. Fadi Aloul, Associate Professor, Department of Computer Science & Engineering, American University of Sharjah, UAE
Speaker PanelIncludes Information Security Directors& Cyber Experts from the region Including:
Ahmad Kamali, Senior Director, Business Continuity & Crisis Management, Etisalat Ali Al-Otaibi, Head of Information Security, Operations & Technology Group, Saudi Hollandi Bank Guru Periyasamy, Head IT Support Services, Emirates Eng. Hussain Alsafran, Unit Head, CERT, CAIT Kuwait Furqan Ahmed Hashmi, (PMP, CCIE, CISSP, TOGAF), Network and Security Architect, Emirates Investment Authority, UAE Dr. Jassim Haji, Director of IT, Gulf Air Jacob Kuriyan, Director, Information Technology, Khalifa University of Science Technology and Research (KUSTAR) Dr. John Meakin, Global Head of Security Solutions & Architecture, Deutsche Bank Kais Barakat, Senior Information Protection Analyst - Information Protection Management Division, Saudi Aramco
Bronze Sponsor
HP is a leading provider of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products from ArcSight, Fortify, and TippingPoint, the HP Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and network defense technology to protect todays applications and IT infrastructures from sophisticated cyber threats.
BeyondTrust is the global leader in securing the perimeter within to mitigate internal threat and the misuse of privileges. With more than 25 years of global success, BeyondTrust is the pioneer of Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the worlds 10 largest banks, seven of the worlds 10 largest aerospace and defense firms, and six of the 10 largest U.S. pharmaceutical companies, as well as renowned universities.
Lunch Sponsor
Qualys, Inc. -is the leading provider of on demand IT security risk & compliance management solutions delivered as a service. Qualys Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate & continuous view of their security & compliance postures. The QualysGuard service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100 & performs more than 200 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers & consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, SecureWorks, Symantec, Tata Communications, TELUS & VeriSign.
Opening 9.30
Keynote
Relations & Communications - How Security can Convince and Influence Senior Management to Achieve Greater Buy-in Throughout the Business?
ariq Al Hawi, Director, The United Arab Emirates Computer T Emergency Response Team, aeCERT (a TRA Initiative) invited
Keynote: 9.50
The cyber threat to our information networks is one of the most significant economic and national security threats we face, and it is increasing at an unprecedented rate. The hostile environment we operate in has rendered traditional security strategies obsolete. How can you best understand this threat, and make your networks more resilient? Shawn Henry, Former Executive Assistant Director, FBI & President, Crowdstrike Services
The Cyber Threat to Critical Infrastructure and How We Change the Security Paradigm
10.30 Keynote
Suleyman Anil, Head, Cyber Defence Section, Emerging Security Challenges Division, NATO
Practical ways to raise the profile of security: is reporting at board-level a pipedream, or a viable solution? Presentation tips to put forward your business case Developing meaningful security and risk metrics to deliver a return on security investment Chaired by: Simon Riggs, Senior Vice President, Information Security Officer, Global Information Security, Bank of America Merrill Lynch Co-Facilitators: Rashed Al Othman, Chie f Information Officer, Information Technology Division, Bank AlBilad Sarith Bhavan, IT Security Manager, Jumeirah Group Roshan Daluwakgoda, Senior Director Strategy Planning, Risk Assessment & DR, DU (Emirates Integrated Telecommunications Company) Sameer Shaikh, IT Security Policies Manager, Emirates Jacob Kuriyan, Director, Information Technology, Khalifa University of Science Technology and Research (KUSTAR) 3.20 3.50 Afternoon Coffee Break & Exhibition Deployment Roundtables benchmarking discussions led by experts & peers who will share proven experiences in these 2 topical areas requested by the audience. Attendees will be asked to select their preferred discussion. Key learning points will be shared back to the group.
Keynote
Keynote
10.50
Keynote: Risk and Security Metrics: Knowing Your Enemies and Knowing Yourself
Viktor Polic, Information Technology Security Officer, International Labour Organization (United Nations) & Adjunct Faculty, Webster University Geneva Coffee Break
11.20
Building 11.50
Case Study
Social media, mobile and smart devices and the cloud: How should security strategy differ when coping with these new technologies?
Building a security awareness culture around social
12.20 The
Todays CIO needs to be more aware of the new and emerging security risks than ever before. What is the CIOs perspective of security? What keeps the CIO awake at night? How can we build pragmatic technology infrastructures within the business risk framework? Where does the CIO sit in relation to the CISO? How can security influence business strategy & drive performance? Managing the complex change agenda Panellists: Dr. Jassim Haji, Director of IT, Gulf Air Majed Al-Shangiti, IT Director, Maaden Phosphate Company (MPC) Moataz Hassouna, Chief Information Officer, Emaar Misr Rashed Al Othman, Chief Information Officer, Information Technology Division, Bank AlBilad
networking and mobile applications and services which access the cloud Identifying the key challenges around employee education and awareness Key risks and opportunities around deploying Bring Your Own Device in the enterprise Benefits and risks of leveraging community developers for corporate application development Facilitators include: Dr John Meakin, Global Head of Security Solutions & Architecture, Deutsche Bank Avtar Sehmbi, Head of Information Security and Risk Management, Centrica Dr. Fadi Aloul, Associate Professor, Department of Computer Science & Engineering, American University of Sharjah, UAE Cloud Computing
Interview Panel
Lessons learned: How to take positives from the crisis to help the business to move forward Implementing a robust disaster recovery plan to prevent future issues from occurring Kais Barakat, Senior Information Protection Analyst -Information Protection Management Division, Saudi Aramco
Assessing public, private and hybrid clouds and their suitability as a regional cloud solution Defining the cloud- some aspects of cloud computing are well-documented, but how many Middle East companies are actually using the cloud? Key GCC legal and regulatory issues- data centre location Facilitators Include: Simon Riggs, Senior Vice President, Information Security Officer, Global Information Security, Bank of America Merrill Lynch Eng. Hussain Alsafran, Unit Head, CERT, CAIT Kuwait Moataz Hassouna, Chief Information Officer, Emaar Misr Maitham Al-Lawati, Head -Governance, Risk & Compliance, Oman Data Park Close of Day One
4.40
9.00 Data Loss Prevention Dr John Meakin, Global Head of Security Solutions & Architecture, Deutsche Bank 9.30
Case Study
Integrating cyber security intelligence into risk and security incident management Facilitators include: Roshan Daluwakgoda, Senior Director Strategy Planning, Risk Assessment & DR, DU (Emirates Integrated Telecommunications Company) Taimur Ijlal, Head of Information Security, Dubai Bank
9.50
Case Study
10.10
The key challenges of training and skill-set generation Next steps for more experienced security professionals - How to find a well-rounded team member when hiring staff - How to develop and retain your security team Panellists: Dr John Meakin, Global Head of Security Solutions & Architecture, Deutsche Bank Tareque Choudhury, Chief Securit Officer MEA, British Telecom (BT) Advise MEA
Panel
Case Study
Driving strategic change while leading a highly motivated information security function
Key case study from the information security head of a leading FTSE 100, multi-national utility company, headquartered in the UK. Avtar Sehmbi, Head of Information Security and Risk Management, Centrica
Case Study
Furqan Ahmed Hashmi, (PMP, CCIE, CISSP, TOGAF), Network and Security Architect, Emirates Investment Authority, UAE
1.20
How the application security game has changed. New threat agents and new vulnerabilities Malware vs Insecure Applications. How malware is now application aware and self-sufficient Why you need to update your Risk Management Model. Technical and Management controls to combat the new threats Taimur Ijlal, Head of Information Security, Dubai Bank 1.40
Panel
Case Study
D efining the CIO/CISO role in the absence of co-ordinated governance and regulation across the GCC region
10.30 11.00
Case Study
ow Oman Data Park provides data backup H and secure cloud hosting services to government, banking and oil and gas sector clients in the domestic and regional markets
Maitham Al-Lawati, Head -Governance, Risk & Compliance, Oman Data Park
2.30
Comparing and understanding the differences in policy and legislation across emirates and countries in the region Assessing the top 5 security implementations in the last year Strategies for improving the level of information security expertise in the GCC- developing security awareness campaigns, security committees and management orientation programmes Panellists: Walid Kamal, Senior Vice President, Technology Security & Risk Management, DU (Emirates Integrated Telecommunications Company) Sameer Shaikh, IT Security Policies Manager, Emirates Afternoon Coffee Break & Sponsors prize draw (Must be present to win!)
11.20
Deployment Roundtables benchmarking discussions led by experts & peers who will share proven experiences in these 2 topical areas requested by the audience. Attendees will be asked to select their preferred discussion. Key learning points will be shared back to the group.
Hacktivism 3.00 Tareque Choudhury, Chief Security Officer MEA, British Telecom (BT)
3.20 Developing
Case Study Case Study
3.40 Advanced
4.00
eld under the Chatham House Rule - a progressive H & open benchmarking forum on topics requested in advance directly by you the attendee. Draft items are listed below.
10.30
Facilitators include: Shawn Henry, Former Executive Assistant Director, FBI & President, Crowdstrike Services Simon Riggs, Senior Vice President, Information Security Officer, Global Information Security, Bank of America Merrill Lynch Suleyman Anil, Head, Cyber Defence Section, Emerging Security Challenges Division, NATO Dr John Meakin, Global Head of Security Solutions & Architecture, Deutsche Bank Kais Barakat, Senior Information Protection Analyst Information Technology, Saudi Aramco Avtar Sehmbi, Head of Information Security and Risk Management, Centrica Viktor Polic, Information Technology Security Officer, International Labour Organization (United Nations) & Adjunct Faculty, Webster University Geneva 9.30 9.40 Chairmans Opening & Introductions
Delegates will assume various roles in this interactive discussion of how to deal with a major cyber attack. Participants take on the role of various parts of the organisation and discuss how best to prepare for and tackle the crisis; management, investor relations, press & media, information security, etc How to develop a resilient business continuity plan and a durable workforce Gaining greater management buy-what do executive management wish to see in order to approve funding for a security initiative and how do you show value? 11.10 11:30 Coffee Break
12.20
Large or complex malware is always thought to be statesponsored, but this is not always the case. The media has created much Fear, Uncertainty & Doubt (FUD) around malware. This session focuses on de-FUD-ing the hype around targeted malware and hacktivists and provides a guide to dealing with the real issues. Whats really changed and whats still the same? Who are the new actors? e.g. well-funded criminal organisations How must security strategy differ when coping with these threats? Interpreting what the journalists say- Dealing with media hype around cyber threats
Session 1 Dealing with the Growing Threat of Targeted Regional Malware in the Middle East
12:50 13.00
Web: www.mistieurope.com/cisome
MIDDLE EAST
IS130401-W
To register visit: www.mistieurope.com/cisome For enquiries, call: +44 (0)20 7779 8202
Special Residential Rate!
Special CISO Rate *
Vendor/Advisory Rate:
Price
1,500
2,195
Accommodation Reservations
Guests will be able to make their bookings on a first come first served basis at the conference rates: AED 1250.00 per single room, per night, and AED 1350 per double, per night. Room rates are inclusive of buffet breakfast, 10% municipality fee and 10% service charge. (All fee structures & percentages are subject to change without notice). o reserve your room, please email lmccrave@ T mistieurope.com quoting CISO Middle East. elegates are responsible for the arrangement and D payment of their own accommodation in Dubai, MIS Training Institute cannot guarantee availability or specific rates.
CISO must demonstrate that they are currently practising as CISO, head of information security, or in a senior information risk or corporate security role (& not in a sales or marketing related role.) The Guest must not be working for an organisation (or subsidiary, or independent consultant) that provides professional security product, vendor or recruitment services, software development, outsourcing, ICT or consultancy / advisory services to security or technology professionals. The rate applies to registrations for the CISO Middle East Summit & Roundtable (3 days) & fully paid registrations. The final decision on the rate applicable is at the discretion of MIS Training Institute.
Cancellation Policy:
Cancellation or transfer requests must be made in writing (letter or fax) and reach the MIS Training office 30 days before the conference commencement date. A full refund less a 100 administration fee will be given. Delegates who cancel less than 30 days before the conference commencement date, or who do not attend, are liable to pay the full fee and no refunds will granted. If you wish to transfer to a different conference within a six month period, you will be invoiced a 25% additional charge to transfer your registration and any difference in conference prices. You will not incur any additional charges if you wish to send a replacement delegate and your registration meets the above terms. Marketing choices: If you object to contact by telephone , fax , or email , or post , please tick the relevant box and return to K Bevan, MIS Training, Nestor House, Playhouse Yard, London EC4V 5EX. If you do not want us to share your information with other companies (including the sponsors) please tick this box .