Академический Документы
Профессиональный Документы
Культура Документы
Abdulsalam Al-Bastaki | Afraa Ali Al Shamsi | Ahmad Al Madani | Ahmad Al Mulla | Ahmed Ebrahim Al Ahmad | Ahmed Yahya | Ajay
Rathi | Alaeddin Al Badawna | Ali Abdul Aziz Ali | Ali Ghunaim | Ali Mohamed Al Ali | Ali Radhi | Aliasgar Bohari | Amin Al-Zarouni
| Amit Kanchan | Anwar Almulla | Arun Tewary | Basem Burgan | Deepu Thomas Philip | Entesar Al Hosani | Esam Alfalasi | Esam
Hadi | Fady Sleiman | Faisal Eledath | Farid Farouq | Fuad Al Ansari | George Yacoub | Ghazi Qarout | Hamdan Alkalbani | Hazem
Turki El Khatib | Hisham Iran | Hussam Al Nowais | Ibrahim Al Emadee | Imad Taha | Jassim Haji | Jawed Akhtar | Joseph Nettikaden
| Kashif Rana | Khaled Al Rashaid | Khalid AlMansouri | Khalid bin Hamad AlKhalifa | Khalid Buhindi | Kirit Shah | Kumar Prasoon
| M N Chaturvedi | Madhav Rao | Madhusudhan Sarangi | Maisam Zaidi | Mazen Chilet | Mehmet Akdeniz | Michael Reagan |
Michaella Kerckhof | Mohamed Sabah | Mohammad Javeed | Mohammad Raffi | Mohammed Saeed Al Shehhi | Mubarik Hussein
| Muhammad Ali Albakri | Nadeem Busheri | Nawwaf Awwad | NSN Murthy | Omar Al Nuaimi | Patrick Naef | Prasanna Rupasinghe
| Ramesh Varma | Roland El Khoury | Rusty Bruns | Sabri Ali Yahya | Sabri Hamed Al Azazi | Saeed Al Ghailani | Saeed Al Dashti
| Saif Ketbi | Saif Salem Bamadhaf | Saji Oommen | Samer Awajan | Samir Abi Frem | Samir Khan | Sebastian Samuel | Shrikant
Kabboor | Sreedhar
issue 277 Reddy
| february 2015 | Sumit Sarkar | Tariq Al Hawi | Tariq AL-Usaimi | Terence Sathyanarayan | V Suresh | Vignesh Unadkat
WWW.CNMEONLINE.COM
| Vinay Sharma | Vishal Sood | Wissam Ismail | Wissam Mattout | Juma Al Ghaith | Yousif Almutawa | Zaki Sabbagh | Zuhair Lardhi |
Abdul Razack Dileep | Raj Abdulla Ahli | Abdullah Al-Attas | Abdulmajeed Malek | Abdulnasser Alkaabi | Abdulrahman Alonaizan |
Abdulsalam Al-Bastaki | Afraa Ali Al Shamsi | Ahmad Al Madani | Ahmad Al Mulla | Ahmed Ebrahim Al Ahmad | Ahmed Yahya | Ajay
Rathi | Alaeddin Al Badawna | Ali Abdul Aziz Ali | Ali Ghunaim | Ali Mohamed Al Ali | Ali Radhi | Aliasgar Bohari | Amin Al-Zarouni
| Amit Kanchan | Anwar Almulla | Arun Tewary | Basem Burgan | Deepu Thomas Philip | Entesar Al Hosani | Esam Alfalasi | Esam
Hadi | Fady Sleiman | Faisal Eledath | Farid Farouq | Fuad Al Ansari | George Yacoub | Ghazi Qarout | Hamdan Alkalbani | Hazem
Turki El Khatib | Hisham Iran | Hussam Al Nowais | Ibrahim Al Emadee | Imad Taha | Jassim Haji | Jawed Akhtar | Joseph Nettikaden
| Kashif Rana | Khaled Al Rashaid | Khalid AlMansouri | Khalid bin Hamad AlKhalifa | Khalid Buhindi | Kirit Shah | Kumar Prasoon
| M N Chaturvedi | Madhav Rao | Madhusudhan Sarangi | Maisam Zaidi | Mazen Chilet | Mehmet Akdeniz | Michael Reagan |
Michaella Kerckhof | Mohamed Sabah | Mohammad Javeed | Mohammad Raffi | Mohammed Saeed Al Shehhi | Mubarik Hussein
| Muhammad Ali Albakri | Nadeem Busheri | Nawwaf Awwad | NSN Murthy | Omar Al Nuaimi | Patrick Naef | Prasanna Rupasinghe
| Ramesh Varma | Roland El Khoury | Rusty Bruns | Sabri Ali Yahya | Sabri Hamed Al Azazi | Saeed Al Ghailani | Saeed Al Dashti
| Saif Ketbi | Saif Salem Bamadhaf | Saji Oommen | Samer Awajan | Samir Abi Frem | Samir Khan | Sebastian Samuel | Shrikant
Kabboor | Sreedhar Reddy | Sumit Sarkar | Tariq Al Hawi | Tariq AL-Usaimi | Terence Sathyanarayan | V Suresh | Vignesh Unadkat
| Vinay Sharma | Vishal Sood | Wissam Ismail | Wissam Mattout | Juma Al Ghaith | Yousif Almutawa | Zaki Sabbagh | Zuhair Lardhi |
Abdul Razack Dileep | Raj Abdulla Ahli | Abdullah Al-Attas | Abdulmajeed Malek | Abdulnasser Alkaabi | Abdulrahman Alonaizan |
Abdulsalam Al-Bastaki | Afraa Ali Al Shamsi | Ahmad Al Madani | Ahmad Al Mulla | Ahmed Ebrahim Al Ahmad | Ahmed Yahya | Ajay
Rathi | Alaeddin Al Badawna | Ali Abdul Aziz Ali | Ali Ghunaim | Ali Mohamed Al Ali | Ali Radhi | Aliasgar Bohari | Amin Al-Zarouni
| Amit Kanchan | Anwar Almulla | Arun Tewary | Basem Burgan | Deepu Thomas Philip | Entesar Al Hosani | Esam Alfalasi | Esam
Hadi | Fady Sleiman | Faisal Eledath | Farid Farouq | Fuad Al Ansari | George Yacoub | Ghazi Qarout | Hamdan Alkalbani | Hazem
Turki El Khatib | Hisham Iran | Hussam Al Nowais | Ibrahim Al Emadee | Imad Taha | Jassim Haji | Jawed Akhtar | Joseph Nettikaden
| Kashif Rana | Khaled Al Rashaid | Khalid AlMansouri | Khalid bin Hamad AlKhalifa | Khalid Buhindi | Kirit Shah | Kumar Prasoon
| M N Chaturvedi | Madhav Rao | Madhusudhan Sarangi | Maisam Zaidi | Mazen Chilet | Mehmet Akdeniz | Michael Reagan |
Michaella Kerckhof | Mohamed Sabah | Mohammad Javeed | Mohammad Raffi | Mohammed Saeed Al Shehhi | Mubarik Hussein
| Muhammad Ali Albakri | Nadeem Busheri | Nawwaf Awwad | NSN Murthy | Omar Al Nuaimi | Patrick Naef | Prasanna Rupasinghe
| Ramesh Varma | Roland El Khoury | Rusty Bruns | Sabri Ali Yahya | Sabri Hamed Al Azazi | Saeed Al Ghailani | Saeed Al Dashti
| Saif Ketbi | Saif Salem Bamadhaf | Saji Oommen | Samer Awajan | Samir Abi Frem | Samir Khan | Sebastian Samuel | Shrikant
Kabboor | Sreedhar Reddy | Sumit Sarkar | Tariq Al Hawi | Tariq AL-Usaimi | Terence Sathyanarayan | V Suresh | Vignesh Unadkat
| Vinay Sharma | Vishal Sood | Wissam Ismail | Wissam Mattout | Juma Al Ghaith | Yousif Almutawa | Zaki Sabbagh | Zuhair Lardhi |
Abdul Razack Dileep | Raj Abdulla Ahli | Abdullah Al-Attas | Abdulmajeed Malek | Abdulnasser Alkaabi | Abdulrahman Alonaizan |
Abdulsalam Al-Bastaki | Afraa Ali Al Shamsi | Ahmad Al Madani | Ahmad Al Mulla | Ahmed Ebrahim Al Ahmad | Ahmed Yahya | Ajay
Rathi | Alaeddin Al Badawna | Ali Abdul Aziz Ali | Ali Ghunaim | Ali Mohamed Al Ali | Ali Radhi | Aliasgar Bohari | Amin Al-Zarouni
| Amit Kanchan | Anwar Almulla | Arun Tewary | Basem Burgan | Deepu Thomas Philip | Entesar Al Hosani | Esam Alfalasi | Esam
Hadi | Fady Sleiman | Faisal Eledath | Farid Farouq | Fuad Al Ansari | George Yacoub | Ghazi Qarout | Hamdan Alkalbani | Hazem
Turki El Khatib | Hisham Iran | Hussam Al Nowais | Ibrahim Al Emadee | Imad Taha | Jassim Haji | Jawed Akhtar | Joseph Nettikaden
| Kashif Rana | Khaled Al Rashaid | Khalid AlMansouri | Khalid bin Hamad AlKhalifa | Khalid Buhindi | Kirit Shah | Kumar Prasoon
| M N Chaturvedi | Madhav Rao | Madhusudhan Sarangi | Maisam Zaidi | Mazen Chilet | Mehmet Akdeniz | Michael Reagan |
Michaella Kerckhof | Mohamed Sabah | Mohammad Javeed | Mohammad Raffi | Mohammed Saeed Al Shehhi | Mubarik Hussein
| Muhammad Ali Albakri | Nadeem Busheri | Nawwaf Awwad | NSN Murthy | Omar Al Nuaimi | Patrick Naef | Prasanna Rupasinghe
| Ramesh Varma | Roland El Khoury | Rusty Bruns | Sabri Ali Yahya | Sabri Hamed Al Azazi | Saeed Al Ghailani | Saeed Al Dashti
| Saif Ketbi | Saif Salem Bamadhaf | Saji Oommen | Samer Awajan | Samir Abi Frem | Samir Khan | Sebastian Samuel | Shrikant
Kabboor | Sreedhar Reddy | Sumit Sarkar | Tariq Al Hawi | Tariq AL-Usaimi | Terence Sathyanarayan | V Suresh | Vignesh Unadkat
| Vinay Sharma | Vishal Sood | Wissam Ismail | Wissam Mattout | Juma Al Ghaith | Yousif Almutawa | Zaki Sabbagh | Zuhair Lardhi
Introducing Managed
Firewall that works
for your business
Tackling todays shifting threat landscape requires
the ability to constantly manage, respond and react
to maintain a secure perimeter. Etisalats Managed
Firewall service gives you the flexibility to choose an
on premise or in cloud solution, powered by Etisalats
state of the art Security Operations Centres, ensuring
24/7 monitoring, maintenance and remote management
coupled with the best of the breed technologies.
T&C apply
GROUP CEO
Nadeem Hood
A new value
GROUP COO
Georgina OHara
Editorial
Talk to us: If you havent put together an awards programme of such
E-mail: Group Editor
jeevan.thankappan@ magnitude and scale as our CIO 100 Awards, let me tell you Jeevan Thankappan
jeevan.thankappan@cpimediagroup.com
cpimediagroup.com what really goes on behind the scenes. First off, bringing a +971 4 440 9133
through technology. Our first crop of 100 CIOs bear testimony to analou.balbero@cpimediagroup.com
+971 4 440 9132
the new ways IT is being used to meet business
objectives in the region. Be it pioneering a new DIGITAL SERVICES
of CNME.
Stay tuned. Published by
Registered at IMPZ
PO Box 13700
Abdul Razack Dileep | Raj Abdulla Ahli | Abdullah Al-Attas | Abdulmajeed Malek | Abdulnasser Alkaabi | Abdulrahman Alonaizan |
Dubai, UAE
Abdulsalam Al-Bastaki | Afraa Ali Al Shamsi | Ahmad Al Madani | Ahmad Al Mulla | Ahmed Ebrahim Al Ahmad | Ahmed Yahya | Ajay
Rathi | Alaeddin Al Badawna | Ali Abdul Aziz Ali | Ali Ghunaim | Ali Mohamed Al Ali | Ali Radhi | Aliasgar Bohari | Amin Al-Zarouni
| Amit Kanchan | Anwar Almulla | Arun Tewary | Basem Burgan | Deepu Thomas Philip | Entesar Al Hosani | Esam Alfalasi | Esam
Hadi | Fady Sleiman | Faisal Eledath | Farid Farouq | Fuad Al Ansari | George Yacoub | Ghazi Qarout | Hamdan Alkalbani | Hazem Tel: +971 4 440 9100
Turki El Khatib | Hisham Iran | Hussam Al Nowais | Ibrahim Al Emadee | Imad Taha | Jassim Haji | Jawed Akhtar | Joseph Nettikaden
| Kashif Rana | Khaled Al Rashaid | Khalid AlMansouri | Khalid bin Hamad AlKhalifa | Khalid Buhindi | Kirit Shah | Kumar Prasoon
| M N Chaturvedi | Madhav Rao | Madhusudhan Sarangi | Maisam Zaidi | Mazen Chilet | Mehmet Akdeniz | Michael Reagan |
Fax: +971 4 447 2409
Michaella Kerckhof | Mohamed Sabah | Mohammad Javeed | Mohammad Raffi | Mohammed Saeed Al Shehhi | Mubarik Hussein
| Muhammad Ali Albakri | Nadeem Busheri | Nawwaf Awwad | NSN Murthy | Omar Al Nuaimi | Patrick Naef | Prasanna Rupasinghe
| Ramesh Varma | Roland El Khoury | Rusty Bruns | Sabri Ali Yahya | Sabri Hamed Al Azazi | Saeed Al Ghailani | Saeed Al Dashti
| Saif Ketbi | Saif Salem Bamadhaf | Saji Oommen | Samer Awajan | Samir Abi Frem | Samir Khan | Sebastian Samuel | Shrikant
Kabboor | Sreedhar
issue 277 Reddy
| february 2015 | Sumit Sarkar | Tariq Al Hawi | Tariq AL-Usaimi | Terence Sathyanarayan | V Suresh | Vignesh Unadkat
Printed by
Jeevan Thankappan
WWW.CNMeONLiNe.COM
| Vinay Sharma | Vishal Sood | Wissam Ismail | Wissam Mattout | Younis Othman | Yousif Almutawa | Zaki Sabbagh | Zuhair Lardhi |
Abdul Razack Dileep | Raj Abdulla Ahli | Abdullah Al-Attas | Abdulmajeed Malek | Abdulnasser Alkaabi | Abdulrahman Alonaizan |
Abdulsalam Al-Bastaki | Afraa Ali Al Shamsi | Ahmad Al Madani | Ahmad Al Mulla | Ahmed Ebrahim Al Ahmad | Ahmed Yahya | Ajay
Rathi | Alaeddin Al Badawna | Ali Abdul Aziz Ali | Ali Ghunaim | Ali Mohamed Al Ali | Ali Radhi | Aliasgar Bohari | Amin Al-Zarouni
Al Ghurair Printing & Publishing
Group Editor | Amit Kanchan | Anwar Almulla | Arun Tewary | Basem Burgan | Deepu Thomas Philip | Entesar Al Hosani | Esam Alfalasi | Esam
Hadi | Fady Sleiman | Faisal Eledath | Farid Farouq | Fuad Al Ansari | George Yacoub | Ghazi Qarout | Hamdan Alkalbani | Hazem
Turki El Khatib | Hisham Iran | Hussam Al Nowais | Ibrahim Al Emadee | Imad Taha | Jassim Haji | Jawed Akhtar | Joseph Nettikaden
| Kashif Rana | Khaled Al Rashaid | Khalid AlMansouri | Khalid bin Hamad AlKhalifa | Khalid Buhindi | Kirit Shah | Kumar Prasoon
| M N Chaturvedi | Madhav Rao | Madhusudhan Sarangi | Maisam Zaidi | Mazen Chilet | Mehmet Akdeniz | Michael Reagan |
Michaella Kerckhof | Mohamed Sabah | Mohammad Javeed | Mohammad Raffi | Mohammed Saeed Al Shehhi | Mubarik Hussein
| Muhammad Ali Albakri | Nadeem Busheri | Nawwaf Awwad | NSN Murthy | Omar Al Nuaimi | Patrick Naef | Prasanna Rupasinghe
Regional partner of
| Ramesh Varma | Roland El Khoury | Rusty Bruns | Sabri Ali Yahya | Sabri Hamed Al Azazi | Saeed Al Ghailani | Saeed Al Dashti
| Saif Ketbi | Saif Salem Bamadhaf | Saji Oommen | Samer Awajan | Samir Abi Frem | Samir Khan | Sebastian Samuel | Shrikant
Kabboor | Sreedhar Reddy | Sumit Sarkar | Tariq Al Hawi | Tariq AL-Usaimi | Terence Sathyanarayan | V Suresh | Vignesh Unadkat
| Vinay Sharma | Vishal Sood | Wissam Ismail | Wissam Mattout | Younis Othman | Yousif Almutawa | Zaki Sabbagh | Zuhair Lardhi |
Abdul Razack Dileep | Raj Abdulla Ahli | Abdullah Al-Attas | Abdulmajeed Malek | Abdulnasser Alkaabi | Abdulrahman Alonaizan |
Abdulsalam Al-Bastaki | Afraa Ali Al Shamsi | Ahmad Al Madani | Ahmad Al Mulla | Ahmed Ebrahim Al Ahmad | Ahmed Yahya | Ajay
Rathi | Alaeddin Al Badawna | Ali Abdul Aziz Ali | Ali Ghunaim | Ali Mohamed Al Ali | Ali Radhi | Aliasgar Bohari | Amin Al-Zarouni
| Amit Kanchan | Anwar Almulla | Arun Tewary | Basem Burgan | Deepu Thomas Philip | Entesar Al Hosani | Esam Alfalasi | Esam
Hadi | Fady Sleiman | Faisal Eledath | Farid Farouq | Fuad Al Ansari | George Yacoub | Ghazi Qarout | Hamdan Alkalbani | Hazem
Turki El Khatib | Hisham Iran | Hussam Al Nowais | Ibrahim Al Emadee | Imad Taha | Jassim Haji | Jawed Akhtar | Joseph Nettikaden
| Kashif Rana | Khaled Al Rashaid | Khalid AlMansouri | Khalid bin Hamad AlKhalifa | Khalid Buhindi | Kirit Shah | Kumar Prasoon
| M N Chaturvedi | Madhav Rao | Madhusudhan Sarangi | Maisam Zaidi | Mazen Chilet | Mehmet Akdeniz | Michael Reagan |
Michaella Kerckhof | Mohamed Sabah | Mohammad Javeed | Mohammad Raffi | Mohammed Saeed Al Shehhi | Mubarik Hussein
Copyright 2015 CPI
If youd like to receive your own copy of CNME
| Muhammad Ali Albakri | Nadeem Busheri | Nawwaf Awwad | NSN Murthy | Omar Al Nuaimi | Patrick Naef | Prasanna Rupasinghe
| Ramesh Varma | Roland El Khoury | Rusty Bruns | Sabri Ali Yahya | Sabri Hamed Al Azazi | Saeed Al Ghailani | Saeed Al Dashti
| Saif Ketbi | Saif Salem Bamadhaf | Saji Oommen | Samer Awajan | Samir Abi Frem | Samir Khan | Sebastian Samuel | Shrikant All rights reserved
While the publishers have made every effort
Kabboor | Sreedhar Reddy | Sumit Sarkar | Tariq Al Hawi | Tariq AL-Usaimi | Terence Sathyanarayan | V Suresh | Vignesh Unadkat
| Vinay Sharma | Vishal Sood | Wissam Ismail | Wissam Mattout | Younis Othman | Yousif Almutawa | Zaki Sabbagh | Zuhair Lardhi |
EDITORIAL
Rewarding
excellence
Talk to us: February has been a busy month here at CNME. For the first
E-mail:
annie.bricker@ time in the region, we hosted the IDG-endorsed CIO 100
cpimediagroup.com Awards. Sorting through the nominations of hundreds of
applicants was exhausting, but also rewarding. The variety of
projects taken on throughout the region is astounding, and
while not everyone could be awarded a trophy, every single
project contained an element that made it both innovative
and unique.
In addition to the Awards, our team has been tirelessly
working to open a new division the CNME Research Hub.
The Hub will leverage our access to the sharpest minds in
the IT industry to shed light on market and industry trends Big
Data
in the region. Our first report, IT Security Spending Trends Symposium
in the Middle East, polled 250 C-level IT executives to
reveal security concerns and drivers of IT security spending.
CNME Research Hub has been an extremely
interesting new project, and we are proud to
We want to honour announce that the report is now available.
IT professionals With the CIO 100 Awards under our belt, we
who demonstrate are already looking forward to CNMEs Network
innovative World ME Awards. Entering its sixth year,
leadership on Network World ME Awards is a major event that
recognises and celebrates networking excellence.
all sides of the
The awards are unique in that they are open to
industry. Our online platforms
both users and vendors alike. With these awards,
we want to honour IT and business professionals
who have demonstrated innovative leadership
on all sides of the industry. The deadline for submission is
February 26th, so don't miss out; make sure your work gets
the recognition it deserves.
facebook.com/computernewsme
Annie Bricker
Deputy Editor
twitter.com/computernewsme
linkedin.com/in/computernewsme
For deeper network security
Copyright 2013 Dell Inc. All rights reserved. Dell SonicWALL is a trademark of Dell Inc. and all other Dell SonicWALL product and service names and slogans are trademarks of Dell Inc.
Our Strategic Partners
Contents
ISSUE 277 | february 2015
Strategic ICT Partner Strategic Technology
Partner
Strategic
Innovation Partner
16 CNME Research
hub-it security
CIO 100
winners 33
16 CNME Research Hub 60 Cyber subversives
26
port CNME debuts its first research report. Debating political issues, promoting free
authority This quarter, we investigate the IT speech and supporting human rights,
security spending habits of the region's the illegal cyber activities of hacktivists
IT decision makers - have a sneak peak. divide opinion.
26 Port authority
Perhaps he never intended on becoming
a CIO, but Yousif Almutawa, CIO, DP NEW SECTIONS
World has always taken chances. From
boom to crash, this CIO is simply not 13 CIO Soundbites
afraid to take a chance. Security threats - CIOs from
around the region sound off
33 High achievers
The CIO 100 Awards celebrated IT 71 Vintage tech
leaders who have made the best use of IBM System/360 mainframe - CNME
technology. Check out the Middle East's takes a walk down memory lane
best of the best.
62 CXO Corner
60
Cyber subversives 52 Dream of seamless clouds Mohammed Faisal, CFO, Al
Employees demand mobile solutions, Mostajed - How do your decisons as
CIO is concerned with security. In a the CIO effect your other departments?
new workplace, is a seamless solution Khoury lets us know.
possible?
Familiar Targets
Hackers will continue to follow the money
Hackers will continue to find
success on mobile platforms
34%surge in online
8 million
banking malware
infections between
Q1 2014 & Q3 2014
40%
2/3
of CIOs are already of enterprises will have
employing Big Data a dedicated security
analytics to improve data warehouse by the
their security stance end of the decade
emerging
vulnerabilities More hackers will turn their attention
to open source applications
5%
Consumer interest in mobile
payments will attract significant
cybercriminal interest
$400
Billion
The Internet of Things will intoduce risk in entirely new places
25 billion
devices will be
worth of mobile payments will connected to the
be processed globally in 2015 Internet in 2015
Column James Dartnell
Online Editor, CNME
Esam Hadi,
Senior Manager, IT,
Aluminium Bahrain
The greatest threat to any business comes from Ali Radhi, Head
within. Its easy to put a security fence around
the business - physical or virtual - to deny access
of IT, MBC
to outsiders who are trying to hack in in order to Working in broadcast media, and
cripple your business. However, its not as simple specifically a news network, has a different scale
preventing internal users from doing something of security threat from other industries. We need
that may result in leaking confidential information. to be ready to respond to governments and
This includes clicking on malicious links, opening electronic armies attack scale. The size, frequency,
unknown attachments, sharing passwords, giving diversity and depth of attacks are exceptional and
information to a social engineer attacker, disclosing the perpetrators do not fear prosecution, hence
company secrets to competitors, plugging unknown security preparation and defence mechanisms
USB drives into their computers and attempting to must be of an even bigger scale.
bypass security controls. Security threats generally target a
We raise security awareness through company's brand, service availability and
training, alerts and information updates to credibility and are of no commercial benefits
boost our overall security stance. Several to attackers.
effective IT controls are in place to protect Internal security is another
systems and networks, but it is difficult dimension of threat where
to protect against users doing solutions can offer very little in
malicious things, whether terms of prevention.
intentional or not.
The UAE has made significant progress in its global Worldwide IT spending is on pace to total
ranking in the ICT Development Index (IDI), jumping $3.8 trillion in 2015, a 2.4 percent increase
from a ranking of 46th to 32nd. from 2014, according to the latest forecast by
The report states that the UAE is the highest Gartner.
ranking country in the world in terms of the The growth rate forecast has been revised
proportion of the rural population covered by at least from Gartners initial prediction of 3.9 percent.
a 3G mobile network.
IT security
spending CNME Research Hub debuts the first of
many research projects with a report
on IT security spending in the Middle
East. Here is a sneak peek of the
sixteen-page report.
T
he need for statistical its long-standing relationships to infrastructure acquirement. As
data and analysis for the and credibility in the region to cull hardware and infrastructure are
IT industry in the Middle genuine data and investigate trends in procured, it follows that investment
East has been felt for years. the Middle East. in relevant security solutions will
The rapid pace at which the industry This data is then distilled into follow. If IT department budgets
is growing and changing, coupled practical and actionable insights that are set to remain constant, it can
with the nature of business culture provide a complete picture of the be difficult to determine which
in the region, has made it difficult for Middle Easts expanding and unique demographic is likely to invest in
researchers that are not in the field IT industry. security solutions, and what concerns
to garner true and meaningful insight This quarter, CNME Research will drive their potential spending.
into IT trends in the Middle East. Hub debuts its projects with a report CNME Research Hub aims to
CNME Research Hub on IT security spending trends and provide insight on the following
methodologies combine both driving forces. While IT security questions:
quantitative and qualitative data spending trends in the Middle East Which demographic is most
collected from IT industry leaders are predicted to increase in the next likely to increase spending on IT
and decision-makers throughout the year, it pays to bear in mind that security in the next year?
region. CNME Research Hub leverages spending predictions are often tied What are the main concerns of
social Slander
In a world always on social media, its easy to be convinced that online views are legitimate
examples of citizen journalism, and that devious business practices, marketing snake oil
and downright deception belong only to the physical world. Nothing could be further from
the truth, argues food writer Dave Reeder, who warns against bogus, biased reviews.
spend my life talking to and mine. Theyre put in to increase you can see how this can quickly
Server shift
numerous concerns among CIOs about
the process and end result of a switch.
Shams Hasan, Enterprise Product
Manager, Dell Middle East, framed the
issue of migration as one that had to
be resolved. Doing nothing is not an
option, he said. You need to consider
With Microsoft due to end support for its Windows Server your workloads and make the
2003 operating system in July 2015, time is running out decision accordingly. He then homed
to make the jump to other alternatives. In association with in on the main errors that can result
Dell, the vendor hosted a roundtable which drew a mix of from a poorly managed migration,
Mistakes made during a migration
esteemed CIOs to discuss the key issues of a migration. include insufficient planning and
assessment, underestimating the user
s is the case in life, with server is likely to be dated and in need and organisational impact, inadequate
untapped info
poison or a type of car. Over 80
percent of the information we gain is
based on context.
Ali Radhi, Head of IT, MBC,
expressed his concerned regarding
the linguistic aspects of certain Big
In association with CNME, research firm Gartner and HP hosted Data tools, These tools need to
accommodate different languages, he
a roundtable packed with IT decision-makers to discuss the said. Live feeds, phone, TV, social and
prospects of Big Data solutions in the Middle East. YouTube all require different specs for
Arabic.
xploiting the vast pools of think that looking forward, it's very Ahmed Ebrahim Al Ahmad,
Code Halos
and ultimately scale to drive value for
organisations, he explained.
To provide a regional example,
Ghazi Qarout, CIO, Qatar Islamic Bank,
joined the discussion. Peter Steward,
Director Middle East, CBC, Cognizant
CNME and Cognizant hosted a roundtable discussion on cloud, Technology Solutions moderated what
mobility and other disruptive technologies in the industry. Transforming became a lively and interactive group
discussion on digital technologies.
business models with digital technology was the topic of the day, as Qarout kicked off the discussion using
CIOs sat down to talk about the future of digitally-enabled business. his own experiences at Qatar Islamic
Bank with the digital transformation.
ver 20 CIOs from around Cognizant Technology Solutions, then We are interacting with our customers
Port Authority
Yousif Almutawa, CIO, DP World, has seen some ups and downs. From a start-up in California during the
Internet boom and subsequent crash, to the surge in construction in Dubai in the mid-2000s, Almutawa has
learned a few things about success and failure.
lmutawa did not intend to do what he does best reach out technology like that.
A on becoming a CIO,
though from an early
age he had an interest in
to people.
He showed an early interest in
physics and maths, as well as space
Still, his interest in science trumped
his interest in technology when it
came time to choose his university
technology. He spent his youth and sci-fi. I remember reading about degree. His father, a lawyer, supported
between Bahrain and the UAE and things like light speeds and Einsteins his decision to go into medicine. He
remembers fondly playing a bit of theory of relativity, and thinking was accepted, on a scholarship, to an
Pong on an early gaming machine. that they were science fiction, he extremely competitive programme
When he was 11, in 1983, he says. As he studied more, however, in a preparation course for the Royal
received his first major piece of he realised that these things were College of Surgeons in Ireland directly
technology, a Commodore 64 the actually possible and real, and his after secondary school in 1990. My
kind that still used tapes as storage. passion was ignited. To me it wasnt English was weak, he says in his now
However, Almutawa's true science fiction anymore, I knew that perfected accent, and the programme
involvement with technology came these things were true and I imagined was very competitive.
later, as a result of his endless drive myself in a world where I could use After a year and a half in Ireland,
the Internet bubble burst. Though past landmarks like the Burj Khalifa, he themselves. You have a lot of business
the company disbanded and its knows that he was part of making the people becoming IT savvy.
employees scattered, Almutawa left dream of Dubai come true. I feel lucky In 2012 he returned to DP
with a wealth of lessons. I learned that I was a part of the Internet boom, World and brought with him his
what it meant to be in a start-up and then also part of the Dubai boom spirit of innovation. In addition
environment, he says, and I learned as well, he says. to running the technology
what it takes to make a business run. At the end of 2005, a new infrastructure of DP World, he
With these lessons learned, he company was formed. du was to has brought his start-up savvy
moved on to another California-based become one of the main telecom to secondary projects. As the
company, Synergex. He was hired providers in the UAE. The telecom Accelerator Program Director for
as an e-business consultant. His role department was acquired by du at DP World-funded seed accelerator
was to perform system integration that time. Almutawa continued with TURN8, Almutawa has put himself
for companies with legacy systems du implementing fixed line projects. back in the start-up game. TURN8
that needed to get on board with the By 2008, du and his department were is designed to encourage innovative
Internet and with mobile applications. stable, and it was time for Almutawa entrepreneurship worldwide, he
Through his interactions with to take on a new challenge. explains. We look for people with
Synergex clients, he learned about That new new ideas that
other industries and how they do challenge came We look for people can be refined
business. in the form and brought
Finally, in August 2001, he of DP World. with new ideas to market. The
made his return to the UAE and was When he began that can be refined program then
quickly hired at a branch of the Dubai at the ports selects start-
government that had only just opened management
and brought to the up teams with
Dubai eGovernment. Though Dubai company, there market. The program marketable
eGovernment was a government was no CIO. ideas and
agency, to Almutawa, the environment There had not
then selects start- supports them
was akin to the start-ups that he was been a CIO for up teams with with funding,
used to. As the Manager of Technology two years, and marketable ideas and mentoring and
and Information, he established the IT Almutawa took training.
infrastructure and systems integration on the role. supports them with The idea is
architecture models for a number of They hired me funding, mentoring to give young
government departments. because I could innovators a
In 2003, Almutawa moved on think outside the
and training. chance to make
to Dubai Internet City telecoms box, he says, I their business
department as a Program Manager. wasnt from the port industry, and work. We provide a great space,
Dubai Internet City had promised they wanted fresh eyes. says Almutawa, where our teams can
to provide certain services, he says From 2009 to 2012, Almutawa was simply work, and dedicate their time to
of his projects. We had to meet with secounded by Dubai World Holding their ideas. In short, he says, TURN8 is
developers to ensure that things like Company. After the crisis, there was like a boot camp for start-ups.
connectivity could be rolled out. a lot of restructuring going on, he Almutawa seems to be a master of
Dubai was booming with construction recalls, and I needed to change the turning crashes into booms and failures
at the time, and Almutawa had to shared services department from into successes. He continually reaches
manage the teams that were in charge a cost centre to a profit centre. As out to people to encourage them to
of making sure that the brief could such, he changed the culture of the fulfil their potential. Perhaps it was
be met. It was almost like I was in a company, shifting the way that they the Internet crash, or perhaps it began
start-up again, he says, I felt like I were thinking about IT. The role earlier on in his history, but Almutawa
was part of the team that was building of IT has completely changed, he is a CIO that can turn any situation on
Dubai. These days, when he walks says, people can do basic tasks for its head and make it positive.
One of the things in manufacturing is that automated systems tend to be isolated and run and
managed only by engineers. But today everything is connected. Therefore IT was brought into
the picture to set best practices for automation usage. Today both IT and OT is managed under
a single umbrella.
Today, the Alba way with vendors is not by buying. Its about partnership with a technology
vendor who believes in your dream. HP has been able to be that partner by offering us open
contact with the entire chain.
Taking cover
Third-party administrator NEXtCARE takes the confusion
out of healthcare insurance.
I
t is no secret that the healthcare health insurance management and Wissam Mattout, Head of IT,
industry is becoming more administration services to healthcare
MEA region, NEXtCARE
complex. Understanding payers, including self-insured
company health benefits, employers. The company is present
or even choosing a primary care throughout the region and operates Accountability is one of
provider can seem like a daunting in 11 countries with four main hubs. NEXtCAREs core values, says
task for any individual. If the With over 700 employees, 85 percent Mattout, and as such, they company
unthinkable does happen, and an of which are medical professionals, is committed to meeting the ever-
injury or illness occurs, sorting NEXtCARE responds to the needs of rising expectations of its clients. To
through paperwork to determine over two million insured members meet these goals, they recruit and
what is covered and what is not can and supports a network of over 7, 000 train specialised employees, and push
add additional stress to any situation. providers across the region. through pioneering technologies.
NEXtCARE, a third-party Having regional presence with The IT team prepared an
administrator for the insurance a global reach, NEXtCARE provides ambitious roadmap to achieve
industry in the GCC and MENA its clients with a balance between their goals, which supported the
region, works closely with insurance customer service and maximum cost transformation of NEXtCAREs
companies to take the guesswork optimisation. NEXtCARE develops infrastructure to accommodate and
out of healthcare coverage. What innovative solutions to ensure serve challenging business needs.
sets NEXtCARE apart, says Wissam efficiency and transparency. A fully Building our private cloud is an
Mattout, Head of IT, MEA region, dedicated team works on developing expensive but secure solution, says
NEXtCARE, is the companys solutions that enable electronic data Mattout. For NEXtCARE to ensure its
dedication to leveraging technology exchange between stakeholders of support services are in line with its
to streamline every individuals the industry, including insurance and global reach, a robust, and secure IT
healthcare experience. reinsurance companies, self-insured infrastructure is a must.
Third-party administrators employers, regulators, health service Enter TATSH. TATSH turnkey
process insurance claims for providers and end-users. Technology software is at the core of NEXtCAREs
individuals by partnering with health is key to serving our clients in the operations. This software, developed
insurance companies. In addition, they best way. We therefore streamline in-house by NEXtCARE, delivers a
may manage the claims processing, and focus our efforts on building cost effective electronic solution
provider networks, utilisation review, state-of-the-art and unrivalled IT to private healthcare schemes by
or membership functions of a number Infrastructure, ensuring high-level IT streamlining processes while ensuring
of insurance companies. In short, security, says Mattout. competitiveness and profitability. All
individuals that use third-party The aim is to ensure that all partners are trained and connected
administrators like NEXtCARE can NEXtCAREs specialised employees to TATSH in order to communicate,
forgo much of the complications that work together in order to address exchange live information and
those that who do not use them may business challenges and connect the perform transactions.
experience. dots between implemented solutions, Putting first things first, Mattout
Established in 1999, NEXtCARE all while keeping IT infrastructure and says, NEXtCARE has an internal
specialises in providing complete security at the forefront of users minds. online helpdesk system that keeps
US$ 6.5
products offered backed up into
by providers We deal with people's a secure private
through a web lives and health. IT cloud." trillion
enabled solution security and data In Total global expenditure for health
called PULSE. confidentiality is collaboration
This platform
allows users
to benefit
our highest priority.
With that in mind, all the
with its clients,
company
is focused
US$ 948
Total global expenditure for health per
from PULSEs sensitive information on proactive person per year
front-end is protected, and all solution Highest total spending per person per
and supports data is backed up into development. year on health
a secure, private cloud. The NEXtCARE
United States
eligibility
checking, Mobile
preapprovals Application is US$ 8,362
claims submissions and reconciliation. currently in pilot testing and will
PULSE improves efficiency, decreases enable people, whether NEXtCARE Lowest total spending per person per
turnaround time for pre-certification members or not,to check public year on health
and manages processing and
reconciliation between NEXtCARE and
the provider community.
information related to NEXtCARE,
the companys news, health tips
and videos. The mobile application
Eritrea
US$ 12
With the goal to provide daily and will allow users to access the
easy access to data such as medical MyNEXtCARE portal from any mobile Highest government spending per
person per year on health
information, lab testing and medical device.
claims, and to keep medical history
accessible, NEXtCARE has implemented
Mattout says NEXtCARE delivers a
complete package from business, to
Luxembourg
US$ 6,906
a comprehensive disaster recovery IT, to risk management to consultancy
plan. Our DRS plan is part of the and more. IT support is an integral Lowest government spending per person
holistic business continuity plan that part of our business. Innovation, per year on health
ensures smooth running of business at
all times, says Mattout.
Maintaining growth in a
information, and integration are
pillars to success, he says.
With a solid infrastructure in
Myanmar
US$ 2
technology enabled world is a place and constant and consistent
continuous challenge, he says. innovation and development, Highest annual out-of-pocket household
spending on health
Furthering NEXtCAREs efforts to NEXtCARE is able to administer
provide new services and solutions
to provide managed care services, the
custom-designed healthcare plans
in response to clients unique
Switzerland
US$ 2,412
IT team at the company has designed requirements, providing them
MyNEXtCARE, a beneficiary portal. with a competitive advantage. The Lowest annual out-of-pocket household
This platform enables beneficiaries to company is able to mix and match spending on health
submit their reimbursement claims,
view their claims history, find a
healthcare provider and access their
various services with the aim of
providing a 'plug and play' concept
which efficiently complements
Kiribati
US$ 0.2
policy information in the easiest and existing products.
Fortinets FortiGate 1500D Next Generation Firewall (NGFW) is specifically designed to deal with these changes.
Whether in the data center or at the perimeter of your network, the FortiGate 1500D meets the dual challenge of high
performance and security effectiveness.
The FortiGate 1500D was recently tested by NSS Labs and received the coveted Recommended while demonstrating
industry best value of all of the products tested.
Give your network the performance and protection that it needs with the FortiGate 1500D.
For more information, please visit fortinet.com.
DISTRIBUTED BY
Amit Kanchan Col. Anwar Abduallah Al Mulla
Landmark Hospitality Abu Dhabi Police
RED E F I N E
FLASH
Flash is transforming the way we think about storage.
Ubiquitous in data centers at all levels, its enabling innovation across IT.
StorIT Distribution fzco | P.O.Box 17417 Jebel Ali Freezone Dubai, United Arab Emirates
Tel: +971.4.881.9690 | Fax: +971.4.887.1637 | Email: info@storit.ae | Web: www.storit.ae
Fady Sleiman Faisal Eledath
Waha Capital National Bank of Oman
C 15
25-26 February 2015, Atlantis- The Palm
ID
Co-partnered with:
Saeed Al Dashti Saif Ketbi
Jumeirah Group Abu Dhabi Airports
Ibrahim Alhosani (on behalf of Juma Al Ghaith) Afzal Khalfay ( on behalf of Yousif Almutawa)
Dubai Customs DP World
The Dream of a
Seamless cloud
82
applications and services belong where to from on-premises infrastructure to
create an optimised user experience while a cloud environment. Applications
protecting data and processes is key. that are cloud-worthy are those
Meeting the demands and requirements percent that need to be scalable, agile
of creating a seamless cloud to on-premise of companies saved money by
and accessible in a mobile work
experience can be a challenge for CIOs, most moving one or more services environment.
experts would agree. Enterprise IT is faced to the cloud in 2014. In our experience, the
with the challenge of providing a seamless applications that move to the
experience across on-premise infrastructure cloud first are the ones that are
and the public cloud, says Suda Srinivasa, variable in nature, where the load varies
Director, Product Marketing, Nutanix. Many over time, enabling you to take advantage
applications built for traditional environments of the hourly billing and dynamic scaling
use a monolithic architecture, he explains of cloud, to only pay for what you require
futher, Successful migration to the cloud at the time. Also Internet facing web-based
requires re-architecting these application to applications, test and development systems
fit the scale-out, fractional consumption model and disaster recovery use cases are ideal for
that cloud offers. cloud, says Grant Morgan, General Manager,
Still, enterprises throughout the world Cloud, Dimension Data Middle East and Africa.
and in the region are beginning to create There are other challenges that may come
what aim to be seamless cloud to on-premise up when attempting to create a seamless
environments to meet the needs of their users. cloud environment. CIOs and IT managers
The key to creating such a user experience, may find themselves trying to standardise
says Sudheer Subramanian, IT Solutions
Harnessing Gigabit
Wi-FiWhat to consider as you prepare for the transition to 802.11ac.
T
he newest version of the
802.11 standard 802.11ac
is ready for prime time. The The growth predictions for this
official IEEE standard is year alone are astounding, with
finished, the Wi-Fi Alliance has
issued a specification for interoperability,
Infonetics estimating that 802.11ac
essentially all enterprise-class Wi-Fi system routers will make up 42 per cent -
vendors are shipping (or have at least 74 million devices if the market stays at
announced) 802.11ac products, and price/ the 2014 level of 176 million routers - of
performance is significantly improved over
802.11n products.
all Wi-Fi enabled router shipments.
The move to gigabit Wi-Fi is picking up
Valerie Maguire, Director of Standards & Technology, Siemon
steam for obvious reasons 802.11ac is faster,
more agile and more robust than any of its
predecessors. Providing Wi-Fi at the speed of
a wired network, the latest version of wireless text to streaming video and multimedia, and
standard is revolutionising how enterprises limits on cellular data plans that encourage
support the large number of devices users to 'off-load' to Wi-Fi are all driving the
connecting to their networks. need for faster Wi-Fi networks. Clients with
Though installing this next-generation Wi- 802.11n installations underway are strongly
Fi technology will become mandatory soon, encouraged to transition their design to
there are many questions that you need to support 802.11ac to avoid bottlenecks and
address before making the move. The biggest congestion, increase capacity, and reduce
challenge facing IT managers is justifying the latency in their wireless network.
investment given the fact that many 802.11n
installations are still underway, and the vast
majority of these are far from saturated or
1
billion
Manish Bhardwaj, Marketing
Manager, Middle East & Turkey,
Aruba Networks, offers
even fully depreciated. another reason for deploying
802.11ac is the most rapidly adopted is the estimated sales of 802.11ac, Now the 100 Mbps
consumer devices with
wireless Ethernet application ever," says 802.11ac capability this or 200 Mbps rates enabled by
Valerie Maguire, Director of Standards & year 802.11n, breakthrough figures
Technology, Siemon. "The growth predictions that put it on a par with 10/100
for this year alone are astounding, with Mbps Ethernet just a few years ago
Infonetics estimating that 802.11ac routers seem barely adequate for some emerging
will make up 42 per cent (74 million devices video applications. If organisations are
if the market stays at the 2014 level of 176 forward thinking and are looking to improve
million routers) of all Wi-Fi enabled router performance, then 802.11ac is the answer.
shipments. Strategy Analytics also estimates Luckily for users, a broad range of
that sales of consumer devices with 802.11ac deployment scenarios are available with
Wi-Fi capability (including routers and what might just be the last major WLAN
gateways) will exceed the $1 billion mark. upgrade, which enables a cost-effective fit
She adds that the increasing presence for virtually every situation. Given the higher
and capacity of mobile and handheld devices, throughput of 802.11ac, is it safe to assume
the evolution of information content from that only fewer access points will be required
The security of your business is at risk if there is no monitoring system in place to protect your business assets. Choosing to
implement IP Surveillance offers the advantage of leveraging your existing network infrastructure to maximise your investment.
D-Link can supply end-to-end networking solutions to build an affordable and easy-to-deploy system to ensure the security and
safety of people, possessions and places.
facebook.com/dlinkmea info.me@dlinkmea.com
Cyber subversives
Debating political issues, promoting free speech, and supporting human rights,
the illegal cyber activities of hacktivists divide opinion. Are they criminals like
any other, or are their cases of their work justifying their underhand means?
For sponsorship enquiries, please reach: For agenda-related enquiries, please reach:
www.cnmeonline.com/nwmeawards/2015
PRESENTED BY
Telecoms World
LTE
Cashing in on
LTE
With the increasing number of LTE roll outs in
the region, a key challenge facing operators
is how to boost the revenue with next-
generation mobile services. Industry pundits
say there are many new models operators
can tap into, thanks to LTE.
L
TE is more mature than ever, LTE networks up and running. GSMA
with higher speeds, more Intelligence estimates that Saudi alone will
device selection and more chip account for more than half of all LTE
suppliers adding to the connection in the Middle East by this year
ecosystem for the fast mobile with the total number of LTE connections
technology. In the GCC, almost every major reaching over 16 million, which is about five
carrier has a LTE network in place now and percent of the global total.
countries such as Saudi have three commercial Though growing demand for data is
Tailored offerings
driving interest in LTE, the challenge facing Should operators primarily target SME and
these operators is how to monetise their Enterprise markets for LTE services, where
investments in LTE and find a right pricing the ARPU is much higher compared with
framework for mobile data profitability. With consumer market?
voice revenues in terminal decline, most of Hassan Sabry, Wireless Business
the operators that have invested heavily in Development Lead META Region, Alcatel-
4G networks are looking at the new revenue Lucent, says business-focused solutions in
streams that can developed around LTE to general offer a good way for operators to
22nd Feb
24th Feb
25th Feb
www.cnmeonline.com/cloudroadshow/2015
For sponsorship enquiries, please reach: For agenda-related enquiries, please reach:
Organised by
Telecoms World
LTE
Forward-thinking
financials
Mohammed Faisal, CFO, Al Mostajed Technologies Group, has a good
relationship with all departments in the company but that doesn't mean he
sugarcoats his opinion when it comes to funding projects.
GISECDUBAI
REGISTER www.gisec.ae
+971 4 308 6468 / 6566 GISECDUBAI
TO ATTEND gisec@dwtc.com GISEC - GULF INFORMATION
SECURITY EXPO AND CONFERENCE
The IBM System/360 mainframe computer was the first line of computers designed to cover a
complete range of applications, both scientific and commercial. The first in the family,
the Model 30 was the precursor to modern day computing. It could perform up to 34,500
instructions per second and had a memory from 8 to 64KB. This was the largest investment
by IBM into computing, and cost $5 billion to develop in todays terms, about $38
billion. The system was built on a solid logic semiconductor and allowed different
applications to communicate. Though it went against industry practices at the time, IBM
created an entire family of computers under the System/360 from low to high performance.
This allowed consumers to dip their toe in by purchasing a smaller, less powerful
model, and upgrade in the future when their needs and comfort levels increased. The
System/360 line of computers was extremely successful, largely due to their scalability.
The systems flexibility greatly lowered barriers to entry for individuals and companies
alike. It is thought to be one of the most successful computers of all time, and
certainly had an effect on computer design for decades to come.
Dubious cause,
What are a CISOs top concerns?
Resources. Its the same everywhere,
theres a great disparity between the
resources of attackers and defenders.
For so long, IT security has been a
dubious outcome
cost centre, where IT has to get the
maximum benefit from minimal
resources; If we can pass the test with
70 percent, why bother aiming for 100?
CISOs are becoming more skilled with
As Chief Information Security Officer of automated threat response tools, processes and technology. Theyre
firm CSG Invotas, Peter Clay always has his hands full. He tells becoming better at stretching budgets.
CNME about his biggest pain points, the processes that can ease Nonetheless, the fact remains that in
the burden on IT security teams, and the dire shortcomings that the the U.S there is a shortage of 300,000 IT
industry faces. security professionals, and the number
is as much as 800,000 worldwide.
H
This gap further necessitates more
ow do you see the developed huge offensive cyber innovative tools and processes, which
global threat landscape capabilities, while nation states are cant be created overnight. People
changing? going after private corporations. need to understand that IT security is a
IT security is There is a huge disconnect between necessity for success.
undoubtedly a global problem. motives and capabilities - a lot of
Whatever happens in this realm is countries have assembled such an What strategies are now most
ubiquitous, and no longer locally arsenal that they have the power to important for CISOs around the world?
confined. Certain countries have take down targets at will. Theyre looking at automating
A New Approach to
Its all about focus
CEOs need to task the DRO to
investigate the risk implications of
Digital Security
digital innovation and the level of
risk that is acceptable across the
organisation in a world of increasing
digitalisation of both physical and
virtual assets and processes. The
T
he start of any year always businesses, they will require a digital assessment of risk needs to span the
brings about the dreaded 'all- risk and security program. digital business from one end to the
day meetings.' This is when In speaking with our Chief of other, not in isolated pockets such as
CEOs and their teams hunker down Research for Security and Risk, Paul products, business units or traditional
with leaders throughout the business Proctor, it is clear that CEOs must channels. It must be across the entire
in daylong meetings to kick-off plans, own the responsibility of redefining process to be successful.
programs and initiatives. If youre what security and risk means for To be successful, the DRO needs
anything like me then you know their organisations as they become a deep level of understanding of the
youve been in too many of these digital businesses. To address these Internet of things (IoT), operational
meetings when you catch yourself challenges head on, our research technology (OT), physical security,
using terms like I think we need a strongly recommends that CEOs information security, privacy,
bio-break. Sigh. consider the role the digital risk business continuity management and
I have been working with a lot of officer (DRO), which is a new role or risk. The DRO needs to understand
client CEOs and their teams over the an expanded set of responsibilities the entire digital platform of the
past few weeks, and one topic keeps for the chief information security organisation. In many organisations
coming up over and over again officer (CISO). the CISO may assume these expanded
information security. The sensational As organisations, marketplaces, responsibilities, but may not continue
headlines from last year about customers and every other factor to report to the CIO.
systems breaches, compromised impacting our strategy constantly
customer data and brand attacks have change, new opportunities and What next?
struck a chord for leaders who see risks inevitably present themselves Digital risk and security is only one of
this as a very real and present danger to CEOs and senior leaders. New several capabilities that CEOs need to
for their organisations. roles with defined responsibilities re-evaluate, assume accountability for
are often created to focus the and then assign specific responsibility
Whats to be done? necessary time, resources and for to a leader within their organisation.
The same headlines that have clearly expertise on these issues so that, Digital business requires an added set
spooked CEOs into putting information putting it simply, something gets of capabilities as a CEO. Gartner believes
security on their priority list have done about it. These roles are the rapid digital change around us leaves
also polarised them into a perilously sometimes transient, or a way every CEO with only 24 months to
narrow way of thinking about what of defining a specific additional develop a digital strategy, reassign and/
actually constitutes information focus for an existing senior leader. or expand corporate responsibilities and
security risk. Too often they see the Either way, the title of Digital start executing change.
solution as merely improving the tools Risk Officer acts as a rallying flag A recent article in the Wall Street
and platforms managed by their CIO within the organisation for all these Journal noted that experienced CISOs
and IT organisations. initiatives to coalesce in one place. with these skills are now commanding
But this is not sufficient. And rather than own a specific new $1M+ packages. Its clear that the
Information security is no longer initiative, which inevitably causes size of the challenge does not match
just a technical problem handled by friction within the C-suite, the most the number of professionals who are
technical people. It requires systemic successful executives instead focus qualified to help, which creates a high
behaviour change in business on coordinating the multitude of price for this scarce competence.
process and by all employees. And activities and direct efforts in one So theres no time to lose. Is this
as more enterprises become digital coherent direction. on your all-day meeting agenda?
MOBILITY
& SECURITY
STRATEGY FOR
MIDDLE EAST
GOVERNMENT &
ENTERPRISE
www.gemec.ae
26 - 28 APRIL 2015
Dubai World Trade Centre
PRODUCT
OF THE
MONTH
PRODUCT
WATCH
A breakdown of the top
products and solutions launched
and released in the last month.
#2 A new DDoS
amplification attack
will emerge
on a single physical server. We predict
that in 2015, attackers will execute more
brute force attacks and conduct new and
that these attacks will continue, the
migration to chip-and-pin smartcards
towards the end of 2015 will make
Over the past two years, creative attacks on virtual desktops. To it harder for hackers to monetise the
cybercriminals have exploited DNS protect VDI environments, organisations data stolen from POS systems. They
and NTP servers to amplify the size should implement operating system or wont be able to use fake magnetic
of their DDoS attacks. With DNS and application isolation. cards and will primarily be relegated
NTP amplification attacks, an attacker to online payment fraud. What should
impersonates the attack target and
sends a small request to a reflector,
which is a server that replies with a
#4 The Internet of Things
(IoT) will expose new
security risks
organisations do to prevent POS-
based breaches? They can protect POS
systems from malware using white-
much larger response to the victim, More knowledge and convenience is listing, code-signing and behavioural
flooding the victims network. DNS not always a good thing. The Internet techniques, harden systems against
amplification attacks can increase the of Things (IoT) promises to make compromise by controlling who and
size of DDoS attacks by up to 54 times, our lives easier, but without proper what can access POS terminals, and
while NTP amplification attacks can safeguards, it also opens us up to an monitor for infiltrations with advanced
magnify DDoS onslaughts by a factor array of new security threats. Even threat prevention platforms.