EXHIBITOR LIST GET YOUR FREE PASS

HOSTED BY

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

OFFICIALLY SUPPORTED BY

ORGANISED BY

10:50 – 16:30
Critical Infrastructure  
11:10 – 11:20
Critical Infrastructure   Moderator Opening Remarks
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

11:20 – 11:40
Critical Infrastructure   Special Address: What is Your Incident Response Plan? As per a industry report cyberattacks targeting critical infrastructure around the world jumped from 20% to 40% in 2022. How are organizations assessing business continuity plans when reacting to these attacks? What are the initiatives to combat malicious activity for both physical & virtual assets? 
Speakers

Karen Evans MD, Cyber Readiness Institute, USA

11:40 – 11:55
Critical Infrastructure   Hello, Mantis just sent you 26 million request per second  Have you met Mantis? This powerful botnet was able to generate the 26M HTTPS requests per second attack using only 5,000 bots. Who is this botnet attacking? How to protect against Mantis and other DDoS attacks, find your answers here.
Speakers

Bader Shaath Senior Solutions Engineer, Enterprise, Cloudflare, UAE

11:55 – 12:10
Critical Infrastructure   Security Validation at the Heart of Exposure Management Surprisingly, the majority of breach-reasons today are NOT vulnerability-related, but rather caused by misconfiguration, application interfaces, supply chain or credential related security gaps. Exposure Management is here to allow a strategy and process for addressing the reduction of risk over the entire attack surface. This presentation will highlight a simple, pragmatic approach to implementing an Exposure Management strategy with minimal incremental investment while focusing on automation and validation.
Speakers

Oren Kaplan Senior Director MEA, Pentera, Israel

12:10 – 12:50
Critical Infrastructure   Panel: Critical Infrastructure Apocalypse Now? Blurring threat attack landscape with digitization increases vulnerability. Imagine millions of homes and businesses are plunged into darkness, communications are cut, banks go offline, hospitals close and air traffic is grounded. With more than 41 billion IoT devices across enterprise and consumer environments expected by 2025, what are the risks of IT/OT convergence? What should our response to those risks be?
Moderator

Ali Khan Risk Advisory – Cyber Partner, Deloitte, UAE

Speakers

Nicholas Charnley Chief information Security Officer, TAQA Group, UAE

Christos Syngelakis Group CISO & DPO, Group Motor Oil, Greece

Lieutenant Colonel Francel Margareth Taborlupa Battalion Commander, 7th Signal Bn, Army Signal Regiment, Philippine Army

Prof. Dr. Rob de Wijk Founder, The Hague Centre for Strategic Studies, Netherlands

12:50 – 13:10
Critical Infrastructure   The evolution of the information security – hunting for fake domains
Speakers

Tural Mammadov Director of CERT.gov.az, Special Communication and Information Security State Service, Azerbaijan

13:10 – 13:25
Critical Infrastructure   A Strategic Approach to Protecting National Digital Assets and Critical Infrastructure  The continued success of digitization initiatives in Middle Eastern countries brings an additional and growing risk of cyberattacks. These attacks can derail the progress of digitization and jeopardize its benefits Every national government in the region strives to create a secure digital environment, but too often, these efforts are fragmented, tactical, and reactive. As a result, government responses often need to catch up to the ever-evolving threat landscape, and defenses put in place are circumvented or exploited.  Middle Eastern governments are the only actors with the power, reach, and resources to develop and advance a genuinely national cybersecurity agenda that ensures alignment of efforts and promotes collaboration and continuous improvement. It is imperative that Middle Eastern governments define a national cybersecurity program, assign high-level responsibility, and launch the program. Therefore, a strategic approach to cybersecurity is needed to build preventive and reactive cybersecurity capabilities that provide the foundation for national cybersecurity and its critical infrastructures.
Speakers

Pranav Bhopatkar Director Cybersecurity EEMEA, Honeywell – Connected Enterprise, UAE

13:25 – 13:45
Critical Infrastructure   Australian Enormous Cyberattacks, Government 2030 Response
Speakers

Khaled Abdulsalam Managing Partner - Cyber Security, iTEAM SYSTEMS, Australia

13:45 – 14:30
Critical Infrastructure   Break
14:30 – 14:45
Critical Infrastructure   How HCO and observability can assist a critical organization or critical infrastructure
Speakers

Moaz Deyab Solutions Engineer, Solarwinds, UAE

14:45 – 15:05
Critical Infrastructure   Protecting critical infrastructure from terrorist cyber-attacks
Speakers

Akvile Giniotiene Head of Cyber and New Technologies, UN Counter-Terrorism Centre (UNCCT), UN Office of Counter-Terrorism (UNOCT), USA

15:05 – 15:25
Critical Infrastructure   Evolving Landscape of Ransomware and Next steps
Speakers

Karanveer Padghane Chief Architect, Enterprise Business Group, Huawei Middle East & Central Asia

15:25 – 15:45
Critical Infrastructure   Live Hack: Hacking into a SCADA system simulation The presentation on hacking into SCADA systems is an exploration of the techniques and tactics used by attackers to breach industrial control systems (ICS). The presentation covers the history of SCADA systems and how they are used to control critical infrastructure, as well as the vulnerabilities and attack vectors that make them susceptible to compromise. The presentation also provides an overview of the tools and techniques used by attackers to exploit SCADA systems, including network scanning, SQL injection, and social engineering. Real-world examples of successful attacks on SCADA systems are discussed, along with the potential consequences of such attacks, including physical damage, environmental hazards, and loss of life. The presentation concludes with a discussion of best practices for securing SCADA systems, including network segmentation, user access controls, and regular security assessments. The goal of the presentation is to raise awareness of the vulnerabilities in SCADA systems and to provide guidance on how to protect these critical infrastructure systems from attack.
Speakers

Shahmeer Amir Founder, Younite, Authiun, Veiliux, Pakistan

15:45 – 16:00
Critical Infrastructure   Fireside Chat: Enhancing Aviation Safety with Cloud Computing and AI As aviation safety regulations become more stringent, the industry must find innovative ways to improve. The use of cloud computing and AI provide efficient solutions to increase safety, lower costs, and continue to innovate in the aviation industry.
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

Speakers

Patrick Moshe Perelsztejn Infrastructures Security & Cyber Manager, EL AL Israel Airlines Ltd, Israel

16:00 – 16:45
Critical Infrastructure   Panel: Cloud Vulnerability & Crucial Security Strategies Rapid adoption of remote working has accelerated the need for cloud-based services, creating security and privacy-related considerations for enterprises. Following industry reports, it is estimated that by 2025, over 85% of organizations will adopt a cloud-first approach. As such, CISOs must ensure cloud security is properly implemented to ensure operational continuity during their cloud migration. This panel will discuss the security and privacy frameworks for managing hybrid cloud infrastructure, explain the potential risks associated with cloud-based systems, and analyze the security measures and protocols that may exist in place to protect these systems. 
Moderator

Jaspal Singh Sawhney Chief Information Security Officer, TATA Communications, India

Speakers

Shahab Siddiqui Global Head of Cyber Security, Petrofac, UAE

Dr. Raed Al-Shaikh EXPEC Information Security Manager, Saudi Aramco, Saudi Arabia

Syed Ubaid Ali Jafri Head of Cyber Defense and Offensive Security Information Security, Habib Bank Limited, Pakistan

Sanil Anand Nadkarni CISO, Cummins

Prasanna Kumar Burri Group Chief Information Officer, Dangote Group [Nigeria]

16:45 – 16:45
Critical Infrastructure   End of Day 1
10:50 – 16:15
Critical Infrastructure  
11:00 – 11:10
Critical Infrastructure   Moderator Opening Remarks
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

11:10 – 11:25
Critical Infrastructure   Special Address: Digitalization of Interconnected Complex and Fragile critical National Information Infrastructure
Speakers

Dato’ Ts. Dr Amirudin Abdul Wahab CEO, Cybersecurity Malaysia

11:25 – 11:40
Critical Infrastructure   Keynote: Towards a Critical Cybersecurity Culture Embedding sustainable cyber-awareness across the organisation.
Speakers

Prof. Dr. Rob de Wijk Founder, The Hague Centre for Strategic Studies, Netherlands

11:40 – 12:10
Critical Infrastructure   Ensuring Cybersecurity Maturity Across the Connected Grid Moving beyond a compliance-based approach towards an integrated outcome-focused model to increase capability, maturity and resilience. Establishing trusted and effective information sharing mechanisms to help drive end-to-end grid security and become more responsive to active threats.
Speakers

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric, UAE

Christos Syngelakis Group CISO & DPO, Group Motor Oil, Greece

Ali Abdulla Hassan Chief of Information Technology, Ministry of Oil and Environment, Bahrain

Suhail Khalid ISR Auditor, DESC, UAE

Dr. Ebrahim Al Alkeem Al Zaabi Assistant Information and Cyber Security Operations Director, ENEC, UAE

Dr. Ernesto Damiani Director, Khalifa University Center for Cyber Physical Systems (C2PS), Khalifa University, UAE

12:10 – 12:30
Critical Infrastructure   Examining the depths of Industrial IoT (IIoT) for CI protection This session will elaborate on the risks and threats caused by using IIoT devices and Ecosystems that might allow process manipulation and harm the data integrity. This Fireside Chat discussion will highlight the needed measures to ensure operation safety and business continuity. 
Moderator

Daniel Ehrenreich Consultant and Lecturer – Cyber Security, Secure Communications and Control Experts, Israel

Speakers

Jaspal Singh Sawhney Global Chief Information Security Officer, TATA Communications, India

12:30 – 12:45
Critical Infrastructure   Invincible Critical Infrastructure: Best Practices for Safeguarding Revenue-Generating Operations
Speakers

Eric Vedel Director,  CISOs Advisory EMEA, Cisco Secure, France

12:45 – 13:00
Critical Infrastructure   Why XDR is the way forward to protect critical infrastructure
Speakers

Hani Nofal VP of Digital Infrastructure Solutions, GBM

Jennifer Lavender Director & Integration Executive Randori, IBM, USA.

13:00 – 13:20
Critical Infrastructure   CYBER AWARENESS SESSION BY MOI UAE •Blue team roadmap
•Incidents response 
•Social engineering 
•how cyber security is important in life
•Different between SOC and CERT
Speakers

Eng. Mariam Eissa Alhammadi Senior Information Security Specialist - MOI, Blue team leader, CERT member, Ministry of Interior, UAE

13:20 – 13:30
Critical Infrastructure   BREAK
13:30 – 14:00
Critical Infrastructure   FIRESIDE CHAT: THE ESSENTIAL ROLE OF PPP''S IN SECURING CRITICAL INFRASTRUCTURE Public-private partnerships are the foundation for effective critical infrastructure security and resilience strategies.
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

Speakers

Karen Evans MD, Cyber Readiness Institute, USA

Christopher Painter President,The Global Forum on Cyber Expertise, USA

14:00 – 14:15
Critical Infrastructure   Deeper Data, Better Protection: How A Middle Eastern Energy Company Harnessed the Potential of OT Asset Data A middle eastern natural gas production company did not have an asset management system in place for their complex OT/ICS and IT infrastructure. By implementing a comprehensive asset management solution, they were able to use hybrid asset data collection methods to quickly discover configurations and vulnerabilities in their large OT environment. This presentation will explain why implementing an OT asset management solution helped this organization achieve comprehensive asset management, configuration change management, detailed and automated compliance reporting and actionable intelligence for threat detection.
Speakers

Greg Valentine SVP, Solutions Engineering, Industrial Defender, USA

14:15 – 14:45
Critical Infrastructure   Panel: Focus - Telecom Cybersecurity To protect the telecom industry from cyber threats, companies must invest in robust and comprehensive security solutions like firewalls, spam filters, encryption, and security protocols. Cybersecurity policies and procedures must be developed and implemented as well, to ensure that best practices are followed and all threats are detected, isolated, and mitigated. There must also be ongoing training and awareness programs to ensure that staff are educated and kept up to date on the latest security trends.
Moderator

Dr. Paul de Souza President & Founder, Cyber Security Forum Initiative (CSFI), USA

Speakers

Celia Mantshiyane Chief Information Security Officer, MTN (Mobile Telephone Network), South Africa

Roja Kiran Basukala Deputy Director, Telecommunications Authority & Vice President, Centre for Cyber Security Research and Innovation, Nepal

Walaa SalahEldeen Group Cyber Security Director, Telecom Egypt, Egypt

14:45 – 15:05
Critical Infrastructure   Rethinking Critical Infrastructure Protection through Blockchain By taking advantage of the transparent nature of blockchain, organizations can better safeguard their CI from cyber-attacks. It offers a secure and verifiable data storage layer and provides secure authentication of users, devices, and applications within the infrastructure. Blockchain can be used to facilitate the secure transfer of data between different sites and networks. However, the implementation of this technology comes with its own challenges. Complexity, scalability, cost, regulations and more. 
Speakers

Dr Deepak Kumar Sr. Cyber Intelligence & Digital Forensics Expert, India

15:05 – 15:35
Critical Infrastructure   Panel: Focus - Aviation Security Digital or connected airplanes as well as the airport of things, brings new vulnerabilities to the table. Big Data and Predictive Analytics plays an important role as with aircraft sensors and processors this will add security to the aviation data throughout all the aviation ecosystem, from connectivity,  operations to predictive maintenance.
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

Speakers

Thomas Heuckeroth SVP IT Infrastructure & CyberSecurity, Group CISO, The Emirates Group, UAE

Mohammad Sarhan General Manager - Cybersecurity, General Authority of Civil Aviation, Saudi Arabia

Yuosof Radi Director of Cyber Security, SAL Saudi Logistics Services, Saudi Arabia

15:35 – 15:55
Critical Infrastructure   Ensuring Robustness of AI-ML systems
Speakers

Dr. Ernesto Damiani Director, Khalifa University Center for Cyber Physical Systems (C2PS), Khalifa University, UAE

15:55 – 16:15
Critical Infrastructure   Focus - Maritime Cybersecurity • What pressing challenges do maritime policymakers, industry stakeholders, naval forces and practitioners face in the cyber era?
• How do we effectively secure critical national information infrastructure in today’s maritime domain? 
•What can policymakers, industry and practitioners in national security do about it?
Speakers

Dr. Osei Bonsu Dickson Chief Legal Advisor, Ministry of National Security,Ghana

16:15 – 17:00
Critical Infrastructure   Workshop: City preparedness to terrorist cyber-attacks
Speakers

Akvile Giniotiene Head of Cyber and New Technologies, UN Counter-Terrorism Centre (UNCCT), UN Office of Counter-Terrorism (UNOCT), USA

17:00 – 17:00
Critical Infrastructure   End of Day 2
10:30 – 15:30
Critical Infrastructure  
10:30 – 10:40
Critical Infrastructure   Moderator Opening Remarks
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

10:40 – 11:10
Critical Infrastructure   Fireside Chat: Risks Associated with Emerging Technologies from the Global Law Enforcement Perspective
Moderator

Karen Evans MD, Cyber Readiness Institute, USA

Speakers

Dr Madan Oberoi Executive Director for Technology and Innovation, Interpol, Singapore

11:10 – 11:25
Critical Infrastructure   National Cyber Ecosystem This presentation will shed light on how building a National Cyber Ecosystem offers broader defence capabilities relative to solely depending on Cybersecurity technologies.
Speakers

Fadi Mutlak Risk Advisory – Cyber Partner, Deloitte, UAE

11:25 – 12:00
Critical Infrastructure   Panel: Look into Your OT Environments The challenge across critical infrastructure is, you can’t defend your environments if you don’t know what’s in them, and you can’t proactively detect a threat unless you’re actively looking for it. This session will provide an in-depth overview of the current cyber security threats facing OT environments, identify attack vectors, outline the steps needed to create a resilient OT environment and discuss the importance of including people and processes in any OT security strategy. 
Moderator

Siham Benhamidouche MEA Cybersecurity Officer, Schneider Electric

Speakers

Dr. Srijith Nair Chief Information Security Officer, Careem, UAE

Ekrem Zoroglu Group Manager, Mercedes-Benz Tech Turkiye, Turkey

Javed Habib Global Head of ICS Cybersecurity – Thermal & Supply Global Business Unit, Engie, UAE

Safal Shrestha, Deputy Director, National Information Technology Center, Ministry of Communication and Information Technology, Nepal

12:00 – 12:15
Critical Infrastructure   Biggest Cyber Threats to Space Systems If the space vehicle''s ability to communicate is subverted, what are the tactics used to attackTelemetry, Tracking & Command (TT&C) systems? Disabling the asset to support its mission, what happens next?
Speakers

Panagiotis Kikiras Head of Unit Technology and Innovation, European Defence Agency, Belgium

12:15 – 12:35
Critical Infrastructure   Exploring the Satellite Vulnerability to Cyberattacks What does this mean for the satellites on orbit used every day for weather predictions, communications, or GPS?
Speakers

Adham Etoom Director of Policy and Compliance, National Cybersecurity Center, Jordan

12:35 – 12:55
Critical Infrastructure   Secured Integration of ICS-OT with IIoT in CI facilities
Speakers

Daniel Ehrenreich Consultant and Lecturer – Cyber Security, Secure Communications and Control Experts, Israel

12:55 – 14:00
Critical Infrastructure   Workshop: Effective ICS/OT Tabletop Exercise Design and Facilitation
Speakers

Michael Hoffman SANS Instructor, Technical Lead Consultant, Dragos, USA

14:00 – 14:20
Critical Infrastructure   Risk Management and Cybersecurity Measures for Space Assets
Speakers

Dr. Aquib Moin Associate Professor at UAE University & CEO at Alhazen Space, UAE

14:20 – 14:40
Critical Infrastructure   Focus - 5G Security Standards Rapid expansion of 5G coverage in 2023 will allow devices to communicate faster. Governments and regulators can be expected to step up efforts to ensure that connected devices comply with latest cybersecurity standards. 
Speakers

Unguec Stephen Kang Ilario Assistant Director for Cybersecurity, National Communication Authority (NCA), South Sudan

14:40 – 15:00
Critical Infrastructure   Cyber-attacks exploitations in nuclear power generation plants for discovering hidden vulnerabilities
Speakers

Dr. Abdullah A.I. Alnajem Licensed Nuclear Cybersecurity Professional, Saudi Arabia

15:00 – 15:20
Critical Infrastructure   Strengthening partnerships between government and private sector for CI protection
Speakers

Abdul-Hakeem Ajijola Chair, African Union Cyber Security Expert Group, Nigeria

15:20 – 15:20
Critical Infrastructure   End of Day 3
10:50 – 11:00
CRITICAL INFRASTRUCTURE   Moderator Opening Remarks CRITICAL INFRASTRUCTURE STAGE
11:00 – 11:20
CRITICAL INFRASTRUCTURE   KEYNOTE CRITICAL INFRASTRUCTURE STAGE AI-powered Ransomware Attacks: Are we ready to counterattack the attack? 
Ransomware attacks on critical infrastructure have emerged as a grave threat, jeopardizing the functioning of essential services and posing significant risks to national security. In recent years, more than one-third of the ransomware attacks reported last year targeted critical infrastructure sectors affecting sectors such as healthcare, energy, manufacturing, government facilities, and financial services. This session provides an overview of the escalating threat landscape concerning ransomware attacks on critical infrastructure, analyzing notable incidents, tactics employed by threat actors, and the implications for society. 
11:20 – 11:35
CRITICAL INFRASTRUCTURE   Knowledge Showcase Huawei CRITICAL INFRASTRUCTURE STAGE
11:35 – 11:55
CRITICAL INFRASTRUCTURE   TRUE STORIES FROM THE REGION CRITICAL INFRASTRUCTURE STAGE Betting Your IT/IoT Infrastructure''s Future on AI (topic tbc)
Speakers

Shaheela Banu Akbar Sheriff Chief Information Security Officer Kuwait Gulf Oil Company Kuwait

11:55 – 12:15
CRITICAL INFRASTRUCTURE   TRUE GLOBAL STORIES - MARITIME FOCUS CRITICAL INFRASTRUCTURE STAGE Cybersecurity in the High Seas
The maritime sector, a crucial component of global trade & tourism, has increasingly become a target for cyber threats, as evidenced by several high-profile incidents in recent years. Notable examples include the 2018 cyber-attack on the Port of San Diego, disrupting IT systems and payment processing; the 2019 attack on COSCO Shipping Lines, crippling email and network systems; and the 2020 attack on CMA CGM Group, impacting its booking system and customer services. In our upcoming session, Jairo Orea, CISO for Royal Caribbean Group, will share his expert insights on the latest cybersecurity developments and emerging threats in the maritime industry. This discussion is an essential opportunity for professionals in the sector to learn about safeguarding their operations in the digital age.
12:15 – 12:30
CRITICAL INFRASTRUCTURE   Knowledge Showcase Honeywell CRITICAL INFRASTRUCTURE STAGE
12:30 – 12:50
CRITICAL INFRASTRUCTURE   TRUE STORY CRITICAL INFRASTRUCTURE STAGE Cyber Incident Response on India’s Largest Integrated Power Company
In October of 2023, Tata Power faced a cyber-attack affecting some IT systems. This further leads to the unauthorized release of sensitive information. In response to the same, we will learn about the attack and measures implemented by Tata Power and Learnings.
Speakers

Mihir Joshi Group Chief Cyber Security and Information Officer Tata Power India

12:50 – 13:20
CRITICAL INFRASTRUCTURE   CISO Panel - The Growing Interconnectivity: Cyber Resilience of the Power Grid GISEC MAINSTAGE The cyber resilience of power grids is paramount in safeguarding critical infrastructure. There were 608 reported cyber incidents targeting the energy sector, with a 22% increase from the previous year. These incidents resulted in an estimated $23 billion in economic losses. Regarding specific threats, ransomware attacks on power utilities rose by 50%, emphasizing the urgent need for robust cybersecurity measures. The power grid''s increasing interconnectivity, with an average of 13,000 devices per substation, heightens vulnerability. However, proactive measures, such as investment in Artificial Intelligence for threat detection, have shown promise in enhancing resilience. What ongoing efforts are essential to mitigate risks and fortify the cyber Defences of power grids to ensure reliable energy supply and national security?
Speakers

Mohammed Zumla Head Cyber Security and Resilience Independent Cybersecurity Consultant United Kingdom

13:20 – 13:40
CRITICAL INFRASTRUCTURE   TRUE STORY CRITICAL INFRASTRUCTURE STAGE AI for Cyber Defence: Industrial Internet of Things – IoT (topic tbc)
13:40 – 14:10
CRITICAL INFRASTRUCTURE   CISO Panel - Assessing the Cybersecurity Risk in the Renewable Energy Landscape CRITICAL INFRASTRUCTURE STAGE In pursuit of fulfilling their SDGs, nations are increasingly turning to renewable energy sources. This shift has fueled growth in energy generation through wind, solar, hydro, geothermal, and other renewable means. The global market for renewable energy is projected to reach approximately US$ 2182.99 billion by 2032, expanding at a CAGR of 8.50% from 2023 to 2032. However, the burgeoning appeal of the renewable energy sector has also attracted a surge in cyber attacks, resulting in substantial financial losses for numerous organizations. Engage in a conversation with top CISOs, CTOs, and CIOs from the renewable energy industry as they share their expertise on best practices and strategies for safeguarding their organizations against such digital threats.
14:10 – 14:25
CRITICAL INFRASTRUCTURE   Knowledge Showcase Nozomi CRITICAL INFRASTRUCTURE STAGE
14:25 – 14:55
CRITICAL INFRASTRUCTURE   CISO Panel - Capitalizing on AI & ML to address Cyber-Security Challenges in the Energy Sector CRITICAL INFRASTRUCTURE STAGE AI is at the forefront of a transformative wave in the energy industry, propelling digitalization and enhancing predictive capabilities. This digital and technological revolution has reshaped the landscape of the energy sector. It enables energy companies, utilities, and consumers to integrate new OT energy assets – including power generation, transmission, distribution, and end-use technologies – with IT control systems. The integration is a game-changer, facilitating cost reduction, efficiency improvement, and lower emissions. However, with these substantial benefits comes a significant risk: each digitally connected node introduces potential cybersecurity vulnerabilities. In light of this, CISOs will delve into the discussion of AI integration within their IT/OT systems, addressing the challenges and solutions in maintaining robust cyber Defences in this evolving landscape.
Speakers

Shaheela Banu Akbar Sheriff Chief Information Security Officer Kuwait Gulf Oil Company Kuwait

14:55 – 16:00
CRITICAL INFRASTRUCTURE   CRITICAL INFRASTRUCTURE CONFERENCE ROUNDTABLES CRITICAL INFRASTRUCTURE STAGE
ROUNDTABLE 1
Digital Fortification of Your Manufacturing Empire
Avinash Tiwari, Chief Information Security Officer (CISO), Pidilite Industries Limited, India
Top-rated Indian CISO for India''s largest adhesives manufacturing company
 
ROUNDTABLE 2
Integration of IT & OT Security
The merging of Information Technology (IT) and Operational Technology (OT) security is now essential for a comprehensive cybersecurity strategy. As OT becomes more standardized, IT-based cyber-attacks are on the rise. How is the industry enhancing the efficiency of threat detection and response? 
 
ROUNDTABLE 3
Supply Chain Security – The Weakest Link in CI
Dependence on external suppliers is crucial in the Critical Infrastructure (CI) sector for the provision of their services. Each supplier linked to the Critical Infrastructure represents a potential access point for cyber attackers. To counteract threats from supply chain attacks, what strategies should the industry adopt? Additionally, what specific procedures and safeguards should be implemented to ensure the security of this essential infrastructure?
Dimitri van Zantvliet, Cybersecurity Director / CISO, Dutch Railways
Securing the world’s third-busiest railway network
 
ROUNDTABLE 4
AI in Critical Infrastructure
In today''s era of digital evolution, managing cybersecurity risks has grown increasingly complex. With the advancement and complexity of cyberattacks, it''s now crucial to safeguard both tangible and intangible assets by incorporating artificial intelligence. How will AI reshape the realm of security? What are the advantages and disadvantages of using AI in this context?
16:00 – 16:00
CRITICAL INFRASTRUCTURE   Closing Remarks CRITICAL INFRASTRUCTURE STAGE
10:50 – 11:00
CRITICAL INFRASTRUCTURE   Moderator Opening Remarks CRITICAL INFRASTRUCTURE STAGE
11:00 – 11:20
CRITICAL INFRASTRUCTURE   Fireside Chat - Nuclear Energy: Greater the Power, Greater the Security CRITICAL INFRASTRUCTURE STAGE Nuclear power reactors are an important component of clean, net-zero energy systems, particularly in the context of energy independence and national security. Nuclear reactors are well-positioned to ensure an all-weather, low-carbon, uninterrupted supply of electricity and heating, and new generation plants are built to ensure safe and economical power generation. Therefore, safety and security are paramount. Hear from experts on how the safety of plant is ensured and what role is AI playing?
11:20 – 11:35
CRITICAL INFRASTRUCTURE   Knowledge Showcase DESC CRITICAL INFRASTRUCTURE STAGE
11:35 – 11:55
CRITICAL INFRASTRUCTURE   TRUE STORY CRITICAL INFRASTRUCTURE STAGE Darkness to Light: The Ghanaian Utility Company''s Resilient Victory Over a 5-Day Cyber Attack Blackout
In a striking blow to the nation''s largest electricity vendor, a sophisticated ransomware attack left customers in the lurch, unable to purchase power or check their meters, with some plunged into darkness for days. This cyber onslaught crippled critical systems, causing significant disruptions. Swiftly responding, the utility company rolled out its incident response strategy, isolating compromised systems and enlisting the expertise of cybersecurity professionals. The ordeal temporarily halted essential services, leading to widespread inconvenience and notable financial repercussions. In the aftermath, the company embarked on a rigorous enhancement of its Defences, focusing on employee cybersecurity awareness, bolstering its digital fortifications, and engaging in proactive industry collaboration to tackle four pressing challenges: technical, legal, reputational, and financial. This incident illuminated the pivotal lessons on the necessity of continuous training, advanced cybersecurity protocols, and the power of collective industry efforts.
Speakers

Dr. Osei Bonsu Dickson Chief Legal Advisor Ministry of National Security Ghana

11:55 – 12:10
CRITICAL INFRASTRUCTURE   Knowledge Showcase Pulsec CRITICAL INFRASTRUCTURE STAGE
12:10 – 12:30
CRITICAL INFRASTRUCTURE   TRUE STORY CRITICAL INFRASTRUCTURE STAGE Dutch National Railway: Three Cybersecurity Drivers and a 780,000 Customers Data Leak
Keeping your cybersecurity posture in check is one thing. But managing third and fourth-party risks is another. In a quintessential example of a supply chain attack, the Dutch National Railways warned approximately 780,000 travelers about a potential compromise of their personal information. This situation arose when a market research firm they employed fell victim to a cyberattack. The National Railways engaged this firm to conduct market research and distribute surveys, highlighting the interconnected risks in modern supply chains.
Speakers

Dimitri van Zantvliet Cybersecurity Director / CISO Dutch Railways Netherlands

12:30 – 12:50
CRITICAL INFRASTRUCTURE   TRUE STORY CRITICAL INFRASTRUCTURE STAGE A case-file analysis  on the ransomware attack on the Philippine Health Insurance Corporation (PhilHealth) 
The case file seeks to present the breach report on the ransomware attack on the Philippine Government Health Insurance Corporation, it seeks to outline the point of detection and the subsequent actions taken to recover and address the situation as well as the aftermath of the incident and the policy recommendations gleaned from the experience.
Speakers

Marc Padilla Assistant Schools Division Superintendent Department of Education - Philippines Philippines

12:50 – 13:05
CRITICAL INFRASTRUCTURE   Knowledge Showcase TxOne CRITICAL INFRASTRUCTURE STAGE
13:05 – 13:35
CRITICAL INFRASTRUCTURE   CISO Panel: The Evolution of Disruptionware: From Cyberespionage to Malware-as-a-Service CRITICAL INFRASTRUCTURE STAGE The evolution from cyberespionage to the commodification of threats through Malware-as-a-Service (MaaS) is underscored by compelling statistics. In recent years, cyberespionage incidents have surged globally, noting a 67% increase in state-sponsored cyber activities. Concurrently, the rise of MaaS has become a prominent concern, with a 2023 cybersecurity report revealing a 120% year-over-year growth in the availability of malicious services in underground markets. Notably, MaaS has lowered the barrier of entry into cybercrime, as evidenced by a 150% uptick in small-scale actors utilizing MaaS tools. This trend emphasizes the need for organizations to confront both the covert tactics of cyberespionage and the democratized threats posed by MaaS. Strengthening cybersecurity Defences through advanced threat intelligence and adaptive strategies is imperative to navigate this dynamic landscape effectively. 
13:35 – 13:55
CRITICAL INFRASTRUCTURE   TRUE STORY CRITICAL INFRASTRUCTURE STAGE Critical Infrastructure Attacks - A Review 
As our society becomes increasingly reliant on interconnected systems and digital technologies, the vulnerability of critical infrastructure to cyber threats has become a pressing concern. This talk aims to provide a comprehensive examination of the evolving landscape of cyber threats targeting essential services and infrastructure in the United States and beyond. The presentation will commence with an overview of the current state of critical infrastructure, highlighting the sectors that are most susceptible to cyber attacks, including energy, transportation, healthcare, and financial services. Drawing from recent incidents and historical cases, the talk will analyze the tactics, techniques, and procedures employed by threat actors to compromise and disrupt vital systems. 
Speakers

Joshua Copeland Director of Enterprise Security Bose United States of America

13:55 – 14:15
CRITICAL INFRASTRUCTURE   A Practical Guide for Human Risk Management (Security Awareness and Culture) (topic tbc) CRITICAL INFRASTRUCTURE STAGE Several industry reports continue to suggest that end-users are the weakest link in cybersecurity. Claims that more than 90 percent of cybersecurity breaches are caused by human error are common. This presentation positions a different approach; it acknowledges that end-users will make mistakes, explores the reasons why mistakes occur, and presents a tested 7-step methodology to shift from cybersecurity awareness to cybersecurity careness. A success story will be shared on how this 7-step methodology made a positive impact in reducing human risk. Delegates will leave with practical insights and quick wins that can be implemented at their organizations rapidly to reduce human risk. This presentation will be supported with implemented the frameworks at organizations. 
Speakers

Grant Hughes Manager: Cyber Security and GRC Engen Oil South Africa

14:15 – 14:30
CRITICAL INFRASTRUCTURE   Knowledge Showcase Industrial Defender CRITICAL INFRASTRUCTURE STAGE
14:30 – 15:00
CRITICAL INFRASTRUCTURE   CISO PANEL: AI in CI: Securing Critical Infrastructure in the Age of Artificial Intelligence CRITICAL INFRASTRUCTURE STAGE Given the rising cyber threats, securing critical infrastructure in the age of artificial intelligence (AI) is imperative. The World Economic Forum reported a 67% increase in cyber-attacks on critical infrastructure. AI''s integration has introduced both innovative Defence mechanisms and sophisticated attack vectors. 60% of critical infrastructure providers globally acknowledged facing AI-driven cyber threats. Governments and enterprises are investing heavily in AI-driven cybersecurity solutions, with a global spending of $42 billion in 2023. Effective collaboration between the public and private sectors is crucial to fortify Defences and mitigate the evolving risks associated with AI in critical infrastructure.
15:00 – 16:00
CRITICAL INFRASTRUCTURE   CRITICAL INFRASTRUCTURE CONFERENCE ROUNDTABLES CRITICAL INFRASTRUCTURE STAGE ROUNDTABLE 5
Exploring Cyber Threats in the Aerospace and Aviation Sectors

This roundtable delves into the evolving landscape of cyber threats within the aerospace and aviation sector. It explains and examines targeted attacks, vulnerabilities, and preventive measures crucial for industry professionals to safeguard critical systems and maintain air travel security.

ROUNDTABLE 6
Incident Response Plan Executive Roundtable

In this team-based tabletop exercise, participants will be faced with critical cybersecurity scenarios. The aim is to develop and present effective strategies to address these challenges collaboratively. This activity offers a chance to assess different approaches and identify the most successful strategy through practical application.

ROUNDTABLE 7
Cloud First Strategy – Critical Infrastructure

Cloud computing has evolved from being a mere option to a crucial necessity. It now stands as a pivotal element in the broader landscape of information technology (IT). This evolution fosters enhanced agility, optimized costs, innovative approaches, and strengthened security. However, the journey towards cloud migration presents its own set of challenges. One pertinent question remains: How secure is it, really?
Speakers

Dr. Deepak Kumar Sr. Cyber Intelligence & Digital Forensics Expert Government of India India

16:00 – 16:00
CRITICAL INFRASTRUCTURE   Closing Remarks GISEC MAINSTAGE