-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders ForumForum members will be asked to reflect on and identify the key areas in which global collaboration across government, law enforcement, industry, academia and society can have the most impact in improv ...
-
Cyber Leaders ForumForum members will be asked to reflect on how law enforcement, industry, academia and individuals can minimise the impact of cyber criminals by working together effectively on both demand and supply. ...
-
Cyber Leaders ForumForum members will be asked to reflect on how industry, government and academia can work together to focus their efforts on building secure and resilient infrastructure to enable the benefits of digital transformation. This might include recommending cutting edge approaches or capability for mitigating the risks to connected places, healthcare and clean energy.
-
Cyber Leaders Forum
-
Cyber Leaders ForumWith cooperation at the heart of our event theme this year, this session will talk about the best practice and importance of working together as a regional team - Is offensive the new way forward? Wha ...
-
Cyber Leaders ForumWe have enjoyed the global benefits of rapid digitisation, efficiencies of scale and connectivity across our populations, regions and countries. But these benefits and the opportunities they present a ...
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders ForumWe have enjoyed the global benefits of rapid digitisation, efficiencies of scale and connectivity across our populations, regions and countries. But these benefits and the opportunities they present a ...
-
Cyber Leaders ForumDiscussing various insights on emerging cyber security trends and how the future cyber security landscape is evolving.
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Block Stage
-
Block Stage
The session will explore the latest cloud security challenges, how to combat them and how to tackle the risks, threats and vulnerabilities when moving to the cloud.
-
Block Stage
-
Block Stage
-
Block Stage-How can we integrate security into the fabric of IT Ops
-CyberSec has its own frameworks which ties into governance, just as IT Ops does
-How can we bridge these frameworks and reduce duplicate work while increasing transparency? -
Block Stage
-
Block Stage-Learn how 5G is a new age of virtual experiences and digital content
-Current and future vulnerabilities of the existing internet infrastructure and comparing it to the 5G era -
Block StageThe consequences of cybercrime originating from the Dark Web impact nearly every industry and cost the global economy as much as $600 billion — about 0.8 percent of global GDP. Security industry experts project that companies around the world could incur costs and lost revenue amounting to more than $5 trillion over the next five years due to cyberattacks. The dark web — those trackless parts of the internet that traditional search engines do not index and where individuals mask their identities through powerful anonymization tools — is home to innumerable hidden marketplaces, communities, groups and forums used to traffic in illegal goods and services — from child pornography, drugs and weapons to tools for malware and ransomware distribution, even stolen data that can affect national security. The presentation will cover the results of the six-year effort to create the first comprehensive index of the Dark Web, and application of Data Science and AI to make collected intelligence actionable for law enforcement needs.
-
Block Stage
-
Block StageIn-depth visibility into cyber threats targeting your organization
Feras Alqaisi, Senior Security Consultant, Kaspersky
Prioritizing Cyber Resilience in Digital Transformation Era
Mohamed Abdel Kader, Regional Cyber Resilience Sales Manager – Middle East, Micro Focus
Cyber Resiliency for Data Protection
Mesut Mert, Distinguished Engineer, Veritas -
Block Stage-Metaverse – new opportunities for business & government
- Fostering metaverse innovation and providing the highest level of service to diverse communities by adopting new disruptive technologies
- The bundle between Metaverse, Digital Twin and Conversational AI -
Block Stage
-
Block Stage
-
Block StageCase studies: ‘Facebook Hacker’, ‘Dark Market’, ‘Anonymous’ and ‘Boy Who Almost Broke the Internet’.
Are cybercrime laws fit for purpose? -
Block Stage-Government and FSIs face unique and highly dynamic threats (numerous new threat types at increased frequency, expanding in complexity and in attack
surfaces
- We work with “forward thinking” organizations who realized that investments in tools and technology in not sufficed
- These organizations adopted an approach of enhancing the capabilities and readiness of the human element as it is a force multiplier – both on the infosec team and management team
- We will present a few examples from across the world and the actual results they achieved -
Block Stage
-
Block StageArtificial Intelligence (AI) is used by both cybersecurity professionals and cybercriminals. AI can help in building sophisticated cybersecurity systems and at the same time can help in launching sophisticated cyberattacks.
- Learn about the applications of AI in combating cybercrime
- Limitations of AI in cybersecurity
- Adversarial AI -
Block Stage
-
Room 42A company is concerned as an employee has recently handed in their notice to leave the company; however they have been unhappy for some time. As the companies’ policy states, the member of staff has h ...
-
Room 42Learn about modern techniques for conducting Memory Forensics using MemProcFS, and how the tool can be used to enhance analysis. This session will highlight the advantages of being able to leverage Me ...
-
Room 42Participate in the handling of an incident as it unfolds in real time with the choices you make having a direct impact on how the scenario unfolds. Your technical skills will be tested as you attempt to uncover the root cause of the breach, and the intentions of the attacker whilst trying to contain and remediate the incident.
-
Room 42
-
Room 42This moderated roundtable session will provide a space for you and fellow executive attendees to explore lessons learned from high profile breaches and how to apply these lessons to preventing breaches in the future. This will be a space designed to enable discussion of priorities and practices that work in the real world.
-
Room 42This moderated roundtable session will provide a space for you and fellow executive attendees to explore lessons learned from high profile breaches and how to apply these lessons to preventing breache ...
-
Room 42This session will take you through a business decision-making exercise where you and fellow executive attendees explore the management of an incident when defences fail. We will explore not only the ramifications of decisions made during an incident but also how best to utilise potentially limited resources. The focus of this session is about cyber security incidents unfold, the pressures on your technical teams, and the impact of decisions placed before them. This session can be joined both as an individual and as a team.
-
Hack ArenaThe AICS CTF is a capture-the-flag cyber range consisting of over 125 multi-disciplinary cybersecurity challenges, and while the focus is on defensive tools and techniques there are challenges designe ...
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders ForumExposure management is the new approach to consolidate practices of vulnerability management, penetration testing, breach and attack simulation, external attack surface management, and more. As securi ...
-
Cyber Leaders Forum
-
Cyber Leaders ForumThanks to stringent legislation and the highly sensitive nature of the data involved, the financial services sector has spearheaded investment in cyber security. Meanwhile, health organisations – whi ...
-
Cyber Leaders ForumFour out of the six Gulf states have pledged Net Zero targets, while others aim to significantly reduce their carbon emissions. As economies throughout the GCC transition to renewables and more sustai ...
-
Cyber Leaders Forum
-
Cyber Leaders Forum- What are your current national challenges when it comes to cybersecurity? - How can regional cooperation contribute to your own resilience? - What do you think the first moves should be getting ther ...
-
Cyber Leaders Forum
-
Cyber Leaders ForumIn this session, we will demystify the concept of Cyber Threat Intelligence (CTI) and demonstrate how having an effective CTI Program doesn't have to be complex or expensive, how it takes away the gue ...
-
Cyber Leaders ForumMaking the right kind of security investments in the ever evolving threat landscape can make for a win-win situation for today’s CISO. This session does explore pivotal aspects of the same.
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders ForumOftentimes security is considered a 'blocker' within an organisation. In this talk, we will go through how a judicious approach to cybersecurity controls can help not just change that perception but a ...
-
Cyber Leaders ForumProtecting critical assets from cyber threats has always been at the forefront of key governments. Any disruption here can lead to immense consequences. This session will shed led on one such critical infrastructure, which is Oil, Gas and Petrochemicals.
-
Cyber Leaders Forum
-
Cyber Leaders ForumZero Trust as a concept has been around since 2004. While navigating the challenges of expansion of attack surface through accelerated digital transformation, convergence of Information Technology (IT ...
-
Cyber Leaders Forum
-
Block Stage
-
Block Stage
This session will talk about the changing nature of conflict and the increasingly unstable Global situation, relating the various challenges to cyber security in an industrial context. He will give a view as to how governments and companies will need to evolve to meet these challenges collectively, touching on leadership, regulation, collaboration and the need to achieve the right balance between technology and human capital
-
Block Stage
-
Block Stage
-
Block Stage
-
Block Stage
-
Block StageCyber threat intelligence enhances an organization's security capabilities, helping to strengthen IT operations. Gain insights on how Croatia implemented its national cybersecurity strategy
-
Block Stage
-
Block Stage- Security profile of the connected autonomous systems and the machine economy - Emerging principles of real-time cyber threat prevention to address the connected autonomous digital safety and securit ...
-
Block Stage- Each nation is different; faces different threats and has different needs - how do you decide what needs to be protected?
- Real life example of how protection and visibility at scale has supported national resilience
- How international collaboration contributes to accelerating national resilience -
Block StageFast-moving cyber-attacks like ransomware can strike at any time, and security teams are often unable to react quickly enough. Join Kévin Perrin, Country Manager at Darktrace, to learn how Autonomous Response uses Self-Learning AI’s understanding of ‘self’ to take targeted action to stop in-progress attacks, without disrupting your business. · Learn how Autonomous Response knows exactly the right action to take, at the right time, to contain an in-person attack
· How AI takes precise action to neutralize threats on the behalf of security teams
· Use of real-world threat finds to illustrate the workings of Autonomous Response technology
-
Block Stage
-
Block StageConvergence of endpoint defenses against advanced threats
Feras Alqaisi, Senior Security Consultant, Kaspersky
From Asset Management to Asset Intelligence
Tapio Vaaramaki, Senior Channel Manager, Axonius
Breaking into organizations: The dangers of passwords in a password-less future
Rami Kayyali, CTO, The Kernel -
Block Stage- Investments in cyber security infrastructure
- Identifying the most cost effective approach to build a trustworthy infrastructure -
Block Stage-Identifying an infiltration at the point of attack so manufacturers can prevent malware being passed further through the supply chain
- How to ensure adequate security and business resiliency is maintained -
Block Stage- Over interventionism in security
- Reliance on supply chain
- Development over survival -
Block Stage
-
Room 42A company is concerned as an employee has recently handed in their notice to leave the company; however they have been unhappy for some time. As the companies’ policy states, the member of staff has h ...
-
Room 42Learn about modern techniques for conducting Memory Forensics using MemProcFS, and how the tool can be used to enhance analysis. This session will highlight the advantages of being able to leverage MemProcFS's rapid performance and compare with it with Volatility. A number of use cases will be explored along with the general relevance of memory forensics for malware analysis.
-
Room 42Participate in the handling of an incident as it unfolds in real time with the choices you make having a direct impact on how the scenario unfolds. Your technical skills will be tested as you attempt to uncover the root cause of the breach, and the intentions of the attacker whilst trying to contain and remediate the incident.
-
Room 42
-
Room 42Delivered largely through the CyberStart platform, an engaging and interactive environment will be created to enable attendees to gain hands on time with the tools and techniques used by cybersecurity professionals in a safe environment, building a stronger awareness of not only the implications of cybersecurity on their day to day lives, but the opportunities available to them.
-
Room 42Ransomware attacks have been on the rise for the past several years leading to disastrous consequences for businesses across the globe. In its continued thrust to disseminate learnings gained from forensics investigations, security operations, and incident response activities from
across the world, SISA is hosting an exclusive session on ‘Ransomware Prevention and Rapid Recovery.
-
Hack ArenaWelcome to the first cyber range team competition ever to take place at AICS!
Who is the cyber range competition for?
The competition is intended for cyber defense teams: incident response, SOC, or CSIRT team
members.
What is unique about this competition?
Unlike traditional CTFs and hackathons, the teams will be challenged in defending against real
world cyber-attacks in a virtual SOC.
How Does it Work?
The tournament will take place onsite - at AICS, in teams of three.
Each team will log into a cyber range, where you will collaborate to respond to a fully
simulated attack, running in a virtual network. You will use commercial security tools like a SIEM,
firewall and network analysis tools to respond to the incident. The tournament takes place in
teams of three, one team per organization. Please enter your organization name in registration
and we will assign you to your team. You will receive a confirmation and a calendar invite
once all three team members have registered and qualified.
What do you need?
A laptop with the option to connect to the WIFI in the room, without restrictions to connect to
the cloud-based cyber range. -
Hack ArenaA hackathon revolving around cyber security will take place for university level students. In the hackathon, the participants will obtain and apply basic security skills to solve a challenge and come ...
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders ForumThe evolution of cybersecurity in a hyper-connected world What is Cognitive Cyber and how will it address the challenges?
-
Cyber Leaders ForumIn this session, I examine the growth in AI-based cyber security solutions and their impact on the security sector, focussing on the essential work from research institutes globally pushing forward ca ...
-
Cyber Leaders Forum
-
Cyber Leaders ForumDiversity, inclusion and belongingness has always been an integral part of any industry, with tech being no different. This session will bring together industry experts who are working towards connect ...
-
Cyber Leaders ForumThis session will consider the key areas in which global collaboration across government, law enforcement, industry, academia and society can have the most impact in improving global cyber resilience. ...
-
Cyber Leaders ForumThis session will consider how law enforcement, industry, academia and individuals can minimise the impact of cyber criminals by working together effectively on both demand and supply. Panellists will ...
-
Cyber Leaders ForumThis session will consider how industry, government and academia can work together to focus their efforts on building secure and resilient infrastructure to enable the benefits of digital transformati ...
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders ForumThe session will shed light on not only filling the talent gaps which are visible at the moment but also developing and upskilling for the future, in order to avoid any shortages within business and i ...
-
Cyber Leaders ForumThis session will deal with in an important aspect of the cyber scene, which is human psychology. Understanding both the criminal and the victim is an important part of the incident.
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Cyber Leaders Forum
-
Block Stage
-
Block StageThe use of AI solutions in Cyber Security defence solutions is rapidly increasing. They have good potential to provide autonomous, quick and adaptable interventions to cyberattacks. However, they alwa ...
-
Block Stage
-
Block Stage
-
Block Stage
-
Block Stage
-
Block StageThe session explores the importance and necessity of cyber governance in ensuring cybersecurity from a research organization perspective. It will also touch upon computer law and approach against a cybercrime.
-
Block Stage
-
Block Stage
-
Room 42
A company is concerned as an employee has recently handed in their notice to leave the company; however they have been unhappy for some time. As the companies’ policy states, the member of staff has had their roles removed, and they are on gardening leave (employer asked them not to come into work, or to work at home or another location during the notice period).
However, during a routine review, there was some concerning access to intellectual property and customer databases. You have been asked to review it and see if there was any theft. -
Room 42Learn about modern techniques for conducting Memory Forensics using MemProcFS, and how the tool can be used to enhance analysis. This session will highlight the advantages of being able to leverage MemProcFS's rapid performance and compare with it with Volatility. A number of use cases will be explored along with the general relevance of memory forensics for malware analysis.
-
Room 42Participate in the handling of an incident as it unfolds in real time with the choices you make having a direct impact on how the scenario unfolds. Your technical skills will be tested as you attempt to uncover the root cause of the breach, and the intentions of the attacker whilst trying to contain and remediate the incident.
-
Room 42
-
Room 42
A company is concerned as an employee has recently handed in their notice to leave the company; however they have been unhappy for some time. As the companies’ policy states, the member of staff has had their roles removed, and they are on gardening leave (employer asked them not to come into work, or to work at home or another location during the notice period).
However, during a routine review, there was some concerning access to intellectual property and customer databases. You have been asked to review it and see if there was any theft. -
Room 42Learn about modern techniques for conducting Memory Forensics using MemProcFS, and how the tool can be used to enhance analysis. This session will highlight the advantages of being able to leverage MemProcFS's rapid performance and compare with it with Volatility. A number of use cases will be explored along with the general relevance of memory forensics for malware analysis.
-
Room 42Participate in the handling of an incident as it unfolds in real time with the choices you make having a direct impact on how the scenario unfolds. Your technical skills will be tested as you attempt to uncover the root cause of the breach, and the intentions of the attacker whilst trying to contain and remediate the incident.
-
Hack Arena
An escape room/scavenger hunt puzzle event where high school participants get to reverse engineer, break, hack, decrypt, and use as many cyber security tools as they can to escape a digital attack.
Students will learn about and use techniques such as cryptography, Cipher Disks, Cesar’s Codes in order to crack codes and decipher texts that will lead them to the next step of the puzzle. The participants will also create their own messages and other groups must try to decipher them to land the first place in the event.
The hints and puzzles will be revolving around different cyber security techniques and social media and internet safety skills by solving logic puzzles, cryptograms, do and don’t activities, word scrambles, multiple choice questions to obtain the needed codes to solve the game.