Skip to main content

Agenda

AICS

Loading
Cyber Leaders Forum
  1. Cyber Leaders Forum
  2. Cyber Leaders Forum
  3. Cyber Leaders Forum
  4. Cyber Leaders Forum
  5. Cyber Leaders Forum
  6. Cyber Leaders Forum
  7. Cyber Leaders Forum
  8. Cyber Leaders Forum
  9. Cyber Leaders Forum
  10. Cyber Leaders Forum
  11. Cyber Leaders Forum
    Forum members will be asked to reflect on and identify the key areas in which global collaboration across government, law enforcement, industry, academia and society can have the most impact in improv ...
  12. Cyber Leaders Forum
    Forum members will be asked to reflect on how law enforcement, industry, academia and individuals can minimise the impact of cyber criminals by working together effectively on both demand and supply. ...
  13. Cyber Leaders Forum
    Forum members will be asked to reflect on how industry, government and academia can work together to focus their efforts on building secure and resilient infrastructure to enable the benefits of digital transformation. This might include recommending cutting edge approaches or capability for mitigating the risks to connected places, healthcare and clean energy.
  14. Cyber Leaders Forum
  15. Cyber Leaders Forum
    With cooperation at the heart of our event theme this year, this session will talk about the best practice and importance of working together as a regional team - Is offensive the new way forward? Wha ...
  16. Cyber Leaders Forum
    We have enjoyed the global benefits of rapid digitisation, efficiencies of scale and connectivity across our populations, regions and countries. But these benefits and the opportunities they present a ...
  17. Cyber Leaders Forum
  18. Cyber Leaders Forum
  19. Cyber Leaders Forum
    We have enjoyed the global benefits of rapid digitisation, efficiencies of scale and connectivity across our populations, regions and countries. But these benefits and the opportunities they present a ...
  20. Cyber Leaders Forum
    Discussing various insights on emerging cyber security trends and how the future cyber security landscape is evolving.
  21. Cyber Leaders Forum
  22. Cyber Leaders Forum
  23. Cyber Leaders Forum
Block Stage
  1. Block Stage
  2. Block Stage

    The session will explore the latest cloud security challenges, how to combat them and how to tackle the risks, threats and vulnerabilities when moving to the cloud.

  3. Block Stage
  4. Block Stage
  5. Block Stage
    -How can we integrate security into the fabric of IT Ops
    -CyberSec has its own frameworks which ties into governance, just as IT Ops does
    -How can we bridge these frameworks and reduce duplicate work while increasing transparency?
  6. Block Stage
  7. Block Stage
    -Learn how 5G is a new age of virtual experiences and digital content
    -Current and future vulnerabilities of the existing internet infrastructure and comparing it to the 5G era
  8. Block Stage
    The consequences of cybercrime originating from the Dark Web impact nearly every industry and cost the global economy as much as $600 billion — about 0.8 percent of global GDP. Security industry experts project that companies around the world could incur costs and lost revenue amounting to more than $5 trillion over the next five years due to cyberattacks. The dark web — those trackless parts of the internet that traditional search engines do not index and where individuals mask their identities through powerful anonymization tools — is home to innumerable hidden marketplaces, communities, groups and forums used to traffic in illegal goods and services — from child pornography, drugs and weapons to tools for malware and ransomware distribution, even stolen data that can affect national security. The presentation will cover the results of the six-year effort to create the first comprehensive index of the Dark Web, and application of Data Science and AI to make collected intelligence actionable for law enforcement needs.
  9. Block Stage
  10. Block Stage
    In-depth visibility into cyber threats targeting your organization
    Feras Alqaisi, Senior Security Consultant, Kaspersky
    Prioritizing Cyber Resilience in Digital Transformation Era
    Mohamed Abdel Kader, Regional Cyber Resilience Sales Manager – Middle East, Micro Focus
    Cyber Resiliency for Data Protection
    Mesut Mert, Distinguished Engineer, Veritas
  11. Block Stage
    -Metaverse – new opportunities for business & government
    - Fostering metaverse innovation and providing the highest level of service to diverse communities by adopting new disruptive technologies
    - The bundle between Metaverse, Digital Twin and Conversational AI
  12. Block Stage
  13. Block Stage
  14. Block Stage
    Case studies: ‘Facebook Hacker’, ‘Dark Market’, ‘Anonymous’ and ‘Boy Who Almost Broke the Internet’.
    Are cybercrime laws fit for purpose?
  15. Block Stage
    -Government and FSIs face unique and highly dynamic threats (numerous new threat types at increased frequency, expanding in complexity and in attack
    surfaces
    - We work with “forward thinking” organizations who realized that investments in tools and technology in not sufficed
    - These organizations adopted an approach of enhancing the capabilities and readiness of the human element as it is a force multiplier – both on the infosec team and management team
    - We will present a few examples from across the world and the actual results they achieved
  16. Block Stage
  17. Block Stage
    Artificial Intelligence (AI) is used by both cybersecurity professionals and cybercriminals. AI can help in building sophisticated cybersecurity systems and at the same time can help in launching sophisticated cyberattacks.
    - Learn about the applications of AI in combating cybercrime
    - Limitations of AI in cybersecurity
    - Adversarial AI
  18. Block Stage
Room 42
  1. Room 42
    A company is concerned as an employee has recently handed in their notice to leave the company; however they have been unhappy for some time. As the companies’ policy states, the member of staff has h ...
  2. Room 42
    Learn about modern techniques for conducting Memory Forensics using MemProcFS, and how the tool can be used to enhance analysis. This session will highlight the advantages of being able to leverage Me ...
  3. Room 42
    Participate in the handling of an incident as it unfolds in real time with the choices you make having a direct impact on how the scenario unfolds. Your technical skills will be tested as you attempt to uncover the root cause of the breach, and the intentions of the attacker whilst trying to contain and remediate the incident.
  4. Room 42
  5. Room 42
    This moderated roundtable session will provide a space for you and fellow executive attendees to explore lessons learned from high profile breaches and how to apply these lessons to preventing breaches in the future. This will be a space designed to enable discussion of priorities and practices that work in the real world. 
  6. Room 42
    This moderated roundtable session will provide a space for you and fellow executive attendees to explore lessons learned from high profile breaches and how to apply these lessons to preventing breache ...
  7. Room 42
    This session will take you through a business decision-making exercise where you and fellow executive attendees explore the management of an incident when defences fail. We will explore not only the ramifications of decisions made during an incident but also how best to utilise potentially limited resources. The focus of this session is about cyber security incidents unfold, the pressures on your technical teams, and the impact of decisions placed before them. This session can be joined both as an individual and as a team.
Hack Arena
  1. Hack Arena
    The AICS CTF is a capture-the-flag cyber range consisting of over 125 multi-disciplinary cybersecurity challenges, and while the focus is on defensive tools and techniques there are challenges designe ...
Cyber Leaders Forum
  1. Cyber Leaders Forum
  2. Cyber Leaders Forum
  3. Cyber Leaders Forum
  4. Cyber Leaders Forum
  5. Cyber Leaders Forum
    Exposure management is the new approach to consolidate practices of vulnerability management, penetration testing, breach and attack simulation, external attack surface management, and more. As securi ...
  6. Cyber Leaders Forum
  7. Cyber Leaders Forum
    Thanks to stringent legislation and the highly sensitive nature of the data involved, the financial services sector has spearheaded investment in cyber security.  Meanwhile, health organisations – whi ...
  8. Cyber Leaders Forum
    Four out of the six Gulf states have pledged Net Zero targets, while others aim to significantly reduce their carbon emissions. As economies throughout the GCC transition to renewables and more sustai ...
  9. Cyber Leaders Forum
  10. Cyber Leaders Forum
    - What are your current national challenges when it comes to cybersecurity? - How can regional cooperation contribute to your own resilience? - What do you think the first moves should be getting ther ...
  11. Cyber Leaders Forum
  12. Cyber Leaders Forum
    In this session, we will demystify the concept of Cyber Threat Intelligence (CTI) and demonstrate how having an effective CTI Program doesn't have to be complex or expensive, how it takes away the gue ...
  13. Cyber Leaders Forum
    Making the right kind of security investments in the ever evolving threat landscape can make for a win-win situation for today’s CISO. This session does explore pivotal aspects of the same.  
  14. Cyber Leaders Forum
  15. Cyber Leaders Forum
  16. Cyber Leaders Forum
    Oftentimes security is considered a 'blocker' within an organisation. In this talk, we will go through how a judicious approach to cybersecurity controls can help not just change that perception but a ...
  17. Cyber Leaders Forum
    Protecting critical assets from cyber threats has always been at the forefront of key governments. Any disruption here can lead to immense consequences. This session will shed led on one such critical infrastructure, which is Oil, Gas and Petrochemicals.
  18. Cyber Leaders Forum
  19. Cyber Leaders Forum
    Zero Trust as a concept has been around since 2004. While navigating the challenges of expansion of attack surface through accelerated digital transformation, convergence of Information Technology (IT ...
  20. Cyber Leaders Forum
Block Stage
  1. Block Stage
  2. Block Stage

    This session will talk about the changing nature of conflict and the increasingly unstable Global situation, relating the various challenges to cyber security in an industrial context. He will give a view as to how governments and companies will need to evolve to meet these challenges collectively, touching on leadership, regulation, collaboration and the need to achieve the right balance between technology and human capital

  3. Block Stage
  4. Block Stage
  5. Block Stage
  6. Block Stage
  7. Block Stage
    Cyber threat intelligence enhances an organization's security capabilities, helping to strengthen IT operations. Gain insights on how Croatia implemented its national cybersecurity strategy
  8. Block Stage
  9. Block Stage
    - Security profile of the connected autonomous systems and the machine economy - Emerging principles of real-time cyber threat prevention to address the connected autonomous digital safety and securit ...
  10. Block Stage
    - Each nation is different; faces different threats and has different needs - how do you decide what needs to be protected?
    - Real life example of how protection and visibility at scale has supported national resilience
    - How international collaboration contributes to accelerating national resilience
  11. Block Stage
    Fast-moving cyber-attacks like ransomware can strike at any time, and security teams are often unable to react quickly enough. Join Kévin Perrin, Country Manager at Darktrace, to learn how Autonomous Response uses Self-Learning AI’s understanding of ‘self’ to take targeted action to stop in-progress attacks, without disrupting your business. · Learn how Autonomous Response knows exactly the right action to take, at the right time, to contain an in-person attack 

    · How AI takes precise action to neutralize threats on the behalf of security teams

    · Use of real-world threat finds to illustrate the workings of Autonomous Response technology

  12. Block Stage
  13. Block Stage
    Convergence of endpoint defenses against advanced threats
    Feras Alqaisi, Senior Security Consultant, Kaspersky
    From Asset Management to Asset Intelligence
    Tapio Vaaramaki, Senior Channel Manager, Axonius
    Breaking into organizations: The dangers of passwords in a password-less future
    Rami Kayyali, CTO, The Kernel
  14. Block Stage
    - Investments in cyber security infrastructure
    - Identifying the most cost effective approach to build a trustworthy infrastructure
  15. Block Stage
    -Identifying an infiltration at the point of attack so manufacturers can prevent malware being passed further through the supply chain
    - How to ensure adequate security and business resiliency is maintained
  16. Block Stage
    - Over interventionism in security
    - Reliance on supply chain
    - Development over survival
  17. Block Stage
Room 42
  1. Room 42
    A company is concerned as an employee has recently handed in their notice to leave the company; however they have been unhappy for some time. As the companies’ policy states, the member of staff has h ...
  2. Room 42
    Learn about modern techniques for conducting Memory Forensics using MemProcFS, and how the tool can be used to enhance analysis. This session will highlight the advantages of being able to leverage MemProcFS's rapid performance and compare with it with Volatility. A number of use cases will be explored along with the general relevance of memory forensics for malware analysis.
  3. Room 42
    Participate in the handling of an incident as it unfolds in real time with the choices you make having a direct impact on how the scenario unfolds. Your technical skills will be tested as you attempt to uncover the root cause of the breach, and the intentions of the attacker whilst trying to contain and remediate the incident.
  4. Room 42
  5. Room 42
    Delivered largely through the CyberStart platform, an engaging and interactive environment will be created to enable attendees to gain hands on time with the tools and techniques used by cybersecurity professionals in a safe environment, building a stronger awareness of not only the implications of cybersecurity on their day to day lives, but the opportunities available to them.
  6. Room 42
    Ransomware attacks have been on the rise for the past several years leading to disastrous consequences for businesses across the globe. In its continued thrust to disseminate learnings gained from forensics investigations, security operations, and incident response activities from
    across the world, SISA is hosting an exclusive session on ‘Ransomware Prevention and Rapid Recovery.
Hack Arena
  1. Hack Arena
    Welcome to the first cyber range team competition ever to take place at AICS!
    Who is the cyber range competition for?
    The competition is intended for cyber defense teams: incident response, SOC, or CSIRT team
    members.
    What is unique about this competition?
    Unlike traditional CTFs and hackathons, the teams will be challenged in defending against real
    world cyber-attacks in a virtual SOC.
    How Does it Work?
    The tournament will take place onsite - at AICS, in teams of three.
    Each team will log into a cyber range, where you will collaborate to respond to a fully
    simulated attack, running in a virtual network. You will use commercial security tools like a SIEM,
    firewall and network analysis tools to respond to the incident. The tournament takes place in
    teams of three, one team per organization. Please enter your organization name in registration
    and we will assign you to your team. You will receive a confirmation and a calendar invite
    once all three team members have registered and qualified.
    What do you need?
    A laptop with the option to connect to the WIFI in the room, without restrictions to connect to
    the cloud-based cyber range.
  2. Hack Arena
    A hackathon revolving around cyber security will take place for university level students. In the hackathon, the participants will obtain and apply basic security skills to solve a challenge and come ...
Cyber Leaders Forum
  1. Cyber Leaders Forum
  2. Cyber Leaders Forum
  3. Cyber Leaders Forum
  4. Cyber Leaders Forum
  5. Cyber Leaders Forum
    The evolution of cybersecurity in a hyper-connected world What is Cognitive Cyber and how will it address the challenges?
  6. Cyber Leaders Forum
    In this session, I examine the growth in AI-based cyber security solutions and their impact on the security sector, focussing on the essential work from research institutes globally pushing forward ca ...
  7. Cyber Leaders Forum
  8. Cyber Leaders Forum
    Diversity, inclusion and belongingness has always been an integral part of any industry, with tech being no different. This session will bring together industry experts who are working towards connect ...
  9. Cyber Leaders Forum
    This session will consider the key areas in which global collaboration across government, law enforcement, industry, academia and society can have the most impact in improving global cyber resilience. ...
  10. Cyber Leaders Forum
    This session will consider how law enforcement, industry, academia and individuals can minimise the impact of cyber criminals by working together effectively on both demand and supply. Panellists will ...
  11. Cyber Leaders Forum
    This session will consider how industry, government and academia can work together to focus their efforts on building secure and resilient infrastructure to enable the benefits of digital transformati ...
  12. Cyber Leaders Forum
  13. Cyber Leaders Forum
  14. Cyber Leaders Forum
    The session will shed light on not only filling the talent gaps which are visible at the moment but also developing and upskilling for the future, in order to avoid any shortages within business and i ...
  15. Cyber Leaders Forum
    This session will deal with in an important aspect of the cyber scene, which is human psychology. Understanding both the criminal and the victim is an important part of the incident.
  16. Cyber Leaders Forum
  17. Cyber Leaders Forum
  18. Cyber Leaders Forum
  19. Cyber Leaders Forum
  20. Cyber Leaders Forum
  21. Cyber Leaders Forum
Block Stage
  1. Block Stage
  2. Block Stage
    The use of AI solutions in Cyber Security defence solutions is rapidly increasing. They have good potential to provide autonomous, quick and adaptable interventions to cyberattacks. However, they alwa ...
  3. Block Stage
  4. Block Stage
  5. Block Stage
  6. Block Stage
  7. Block Stage
    The session explores the importance and necessity of cyber governance in ensuring cybersecurity from a research organization perspective. It will also touch upon computer law and approach against a cybercrime.
  8. Block Stage
  9. Block Stage
Room 42
  1. Room 42

    A company is concerned as an employee has recently handed in their notice to leave the company; however they have been unhappy for some time. As the companies’ policy states, the member of staff has had their roles removed, and they are on gardening leave (employer asked them not to come into work, or to work at home or another location during the notice period).


    However, during a routine review, there was some concerning access to intellectual property and customer databases. You have been asked to review it and see if there was any theft.

  2. Room 42
    Learn about modern techniques for conducting Memory Forensics using MemProcFS, and how the tool can be used to enhance analysis. This session will highlight the advantages of being able to leverage MemProcFS's rapid performance and compare with it with Volatility. A number of use cases will be explored along with the general relevance of memory forensics for malware analysis.
  3. Room 42
    Participate in the handling of an incident as it unfolds in real time with the choices you make having a direct impact on how the scenario unfolds. Your technical skills will be tested as you attempt to uncover the root cause of the breach, and the intentions of the attacker whilst trying to contain and remediate the incident.
  4. Room 42
  5. Room 42

    A company is concerned as an employee has recently handed in their notice to leave the company; however they have been unhappy for some time. As the companies’ policy states, the member of staff has had their roles removed, and they are on gardening leave (employer asked them not to come into work, or to work at home or another location during the notice period).


    However, during a routine review, there was some concerning access to intellectual property and customer databases. You have been asked to review it and see if there was any theft.

  6. Room 42
    Learn about modern techniques for conducting Memory Forensics using MemProcFS, and how the tool can be used to enhance analysis. This session will highlight the advantages of being able to leverage MemProcFS's rapid performance and compare with it with Volatility. A number of use cases will be explored along with the general relevance of memory forensics for malware analysis.
  7. Room 42
    Participate in the handling of an incident as it unfolds in real time with the choices you make having a direct impact on how the scenario unfolds. Your technical skills will be tested as you attempt to uncover the root cause of the breach, and the intentions of the attacker whilst trying to contain and remediate the incident.
Hack Arena
  1. Hack Arena

    An escape room/scavenger hunt puzzle event where high school participants get to reverse engineer, break, hack, decrypt, and use as many cyber security tools as they can to escape a digital attack.


    Students will learn about and use techniques such as cryptography, Cipher Disks, Cesar’s Codes in order to crack codes and decipher texts that will lead them to the next step of the puzzle. The participants will also create their own messages and other groups must try to decipher them to land the first place in the event. 


    The hints and puzzles will be revolving around different cyber security techniques and social media and internet safety skills by solving logic puzzles, cryptograms, do and don’t activities, word scrambles, multiple choice questions to obtain the needed codes to solve the game.


 

Hosted By


 

Telecom Partner


 

Cloud Computing Partner


 

Content Partners


 

Knowledge Partner


 

Security Partner of Choice


 

Platinum Sponsors


 

Gold Sponsors


 

Wi Fi Sponsor

Ransomware Prevention Sponsor

Security Transformation Partner

Cyber Innovation Partner


 

Cyber Resilience Leader


 

Digital Risk Protection Sponsor


 

Economic Growth Sponsor


 

Silver Sponsors


 

Networking Partner


 

Banking Partner


 

Prime Space Exhibitor


 

Official Distribution Partner


 

Cyber Readiness Partner


 

Exhibitors


 

Supported By


 

Strategic Partners


 

Official Media Partners


 

Official Regional Media Partner


 

Supporting Associations


 

Key Strategic Association


 

Online Outreach Media Partner


 

Media Partners