HOSTED BY

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

OFFICIALLY SUPPORTED BY

3 GUINNESS WORLD RECORDS

11:00 – 12:15
GISEC Academy 2 [Workshops]   Fortifying National Defense: Safeguarding the Supply Chain for Unassailable Security Synopsis: In this workshop, we will delve into the critical imperative of infusing cybersecurity measures into the contracts and supply chain processes within the Ministry of Defense or other Ministries where they have to deal with organizations building defense products. As cyber threats continue to evolve, it is paramount for defense personnel to adopt proactive strategies to secure the products and services procured for national security. Participants will leave the workshop with a heightened awareness of cybersecurity challenges in defense contracts and a set of actionable strategies to implement in their roles, contributing to the overall security and resilience of the national defense supply chain.

Key Learning:

In this workshop, we will delve into the critical imperative of infusing cybersecurity measures into the contracts and supply chain processes within the Ministry of Defense or other Ministries where they have to deal with organizations building defense products. As cyber threats continue to evolve, it is paramount for defense personnel to adopt proactive strategies to secure the products and services procured for national security. Participants will leave the workshop with a heightened awareness of cybersecurity challenges in defense contracts and a set of actionable strategies to implement in their roles, contributing to the overall security and resilience of the national defense supply chain.
Speakers

Dr. Shri Kulkarni Defense Security Advisor & Strategist North America, Canada

12:15 – 12:45
GISEC Academy 2 [Workshops]   Networking Get ready to revitalize your networking game! It's time to dive into the networking break with enthusiasm and zest.
12:45 – 14:00
GISEC Academy 2 [Workshops]   Seeing is no longer believing: The future of Deepfakes & Gen AI Realities Synopsis: With an increase in the amount of deepfakes — deceptive images, content, and videos created by AI and floated on the internet; we have started doubting our own eyes. The deepfake technology has the potential to be used for both positive and negative purposes. On the positive side, it could be used to create more realistic visual effects in movies or to generate realistic simulations for training purposes. On the negative side, it could be used to spread false information or to manipulate public opinion by creating fake videos of people saying or doing things that they never actually said or did. While the possibility of someone fabricating a fake but persuasive video, there are software engineers, governments, and journalists who can often determine if it’s real or fake. Unfortunately, as deepfake technology improves, identifying these fabrications will become harder to spot. Yet, as this technology evolves, detection tools will also evolve. In this workshop, we will seek a better understanding of existing practices of OSINT (Open Source Intelligence) and SIFT to focus on a better understanding of deepfakes.

Key Learnings :

* Understanding Deep fakes and Generative AI: Gain a clear definition of deepfakes and generative AI technologies and  Explore the different techniques used to create deepfakes and their potential applications.
* Deepfakes Opportunities and Challenges: Identify the positive uses of deepfakes in various fields like IT Industry, education, entertainment, and creative expression. * Recognize the potential risks and challenges associated with deepfakes, such as misinformation, Cybercrime, Malware, fraud, and manipulation.
* The Evolving Landscape of Truth: Discuss the impact of deepfakes on trust, credibility, and the perception of reality. Explore strategies for identifying and verifying information in the age of deepfakes.
* Navigating the Future: Consider potential solutions and ethical frameworks to mitigate the negative impacts of deepfakes. Discuss individual and collective responsibility in navigating the increasingly complex information landscape.
Speakers

Dr. Deepak Kumar Sr. Cyber Intelligence & Digital Forensics Expert India

14:00 – 14:30
GISEC Academy 2 [Workshops]   Networking Innovation meets inspiration, where the next breakthrough is just a handshake away. Let's hack the networking matrix and rewrite the future of cybersecurity together Step into the networking break - where handshakes meet high-fives and where every conversation ignites a potential partnership.
14:30 – 15:45
GISEC Academy 2 [Workshops]   TBA
15:15 – 16:30
GISEC Academy 2 [Workshops]   From CISO to BISO: Bringing Security to Business Workshop 3 Synopsis: 
CISOs are now key players in big boardroom chats, breaking down geeky cybersecurity jargon into business talk and having a say in the big decisions. As companies dive headlong into the digital age, the CISO is the go-to person navigating through the stormy cybersecurity seas. In this workshop, we will understand how the fast-paced evolution of the digital landscape has birthed the concept of BISO, a role envisaged to bridge the sometimes-gaping chasm between technical cybersecurity realms and business objectives. In addition, we will learn,
a. Leadership styles and attributes
b. Dealing with regulators and navigating complexity
c. Communicating during a crisis

Key Learning:
Acquire a comprehensive understanding of the evolving role of CISOs and the emergence of the BISO role. Participants would gain insights into the leadership styles and attributes required to excel in these positions. Additionally, the workshop would provide strategies for effectively navigating regulatory requirements, managing complexity, and communicating during crisis situations. Overall, attendees would leave with the knowledge and tools needed to bridge the gap between technical cybersecurity expertise and overarching business objectives in today's rapidly evolving digital landscape.
Speakers

Ayad (Ed) Sleiman Head of Information Security King Abdullah University of Science and Technology

15:45 – 15:45
GISEC Academy 2 [Workshops]   Close
11:45 – 12:15
GISEC Academy 2 [Workshops]   NETWORKING
12:15 – 13:30
GISEC Academy 2 [Workshops]   From CISO to BISO: Bringing Security to Business Workshop 11 Synopsis:
CISOs are now key players in big boardroom chats, breaking down geeky cybersecurity jargon into business talk and having a say in the big decisions. As companies dive headlong into the digital age, the CISO is the go-to person navigating through the stormy cybersecurity seas. In this workshop, we will understand how the fast-paced evolution of the digital landscape has birthed the concept of BISO, a role envisaged to bridge the sometimes-gaping chasm between technical cybersecurity realms and business objectives. In addition, we will learn,
a. Leadership styles and attributes
b. The ideal BISO from an experienced headhunter
c. Dealing with regulators and navigating complexity
d. Communicating during a crisis

Key Learning:

Accquire a comprehensive understanding of the evolving role of CISOs and the emergence of the BISO role. Participants would gain insights into the leadership styles and attributes required to excel in these positions. Additionally, the workshop would provide strategies for effectively navigating regulatory requirements, managing complexity, and communicating during crisis situations. Overall, attendees would leave with the knowledge and tools needed to bridge the gap between technical cybersecurity expertise and overarching business objectives in today's rapidly evolving digital landscape.
Speakers

Ayad (Ed) Sleiman Head of Information Security King Abdullah University of Science and Technology

13:30 – 14:00
GISEC Academy 2 [Workshops]   Networking
14:00 – 15:15
GISEC Academy 2 [Workshops]   Incident Response Tabletop Exercise for energy and utilities sector Workshop 12 Synopsis:
• Workshop with representation from senior stakeholders for ‘gold’ command and other stakeholder representation for ‘silver/bronze’ command depending on background
• Scenario based with several ‘injects’ based on incident timeline
• Outside disruptions affecting timely responses to the incident
• Discussions and presentations from respective tables, with review and feedback
• Prizes and awards for secret ‘finds’ and intuitive actions
Speakers

Mohammed Zumla Independent Consultant Head Cyber Security and Resilience UK

15:15 – 15:45
GISEC Academy 2 [Workshops]   Networking
15:45 – 16:30
GISEC Academy 2 [Workshops]   Cracking the Code: Unveiling Heists and Securing Our Futures Synopsis:
An open talk about actual heists that Paul and his team have completed in the past, and what could have been done to stop the team, as well as exploring ways that we can all make it harder for thieves to break through.

Key Learning Outcomes:
• Understanding the Tactics: Participants will gain insights into the real-life heists executed by Paul and his team, learning about the strategies and methods used to breach security measures. This understanding will enable attendees to recognize potential vulnerabilities in their environments.
• Enhancing Security Awareness: Through exploring what could have been done to prevent these heists, attendees will develop a heightened sense of security awareness. They'll learn practical steps and best practices to deter thieves and strengthen defenses against similar threats.
• Empowering Action: The workshop will empower participants to take proactive steps to safeguard their assets and environments. By discussing ways to make it harder for thieves to break through, attendees will be equipped with actionable strategies to protect themselves and their organizations against potential security breaches.
Speakers

Paul Newton Mind Reader, Hypnotist, and Magician MentalTheft UK

16:30 – 16:30
GISEC Academy 2 [Workshops]   Close
11:00 – 12:00
GISEC Academy 2 [Workshops]   From the darknet to the surface web: How criminals will attack your business. Synopsis : In this interactive workshop, we will examine how darknet practices are now being seen on the surface web. Whilst these may all look like scams targeted at your customers or staff, this session will show you how criminals will use them to target your business. Before considering how you can protect yourself and your organisation.

Key Learnings :

* Darknet practices are making it to the surface web and targeting your customers and staff.
* The data obtained in scams is also being used to launder money and/or commit fraud in your organisation.
* Criminals are also using these tactics to recruit insider threats.
* KYC is one of the most important ways to protect your business from harm.
* You will see different attack vectors from real-world criminal attacks.
Speakers

Nicola Harding CEO We Fight Fraud UK

12:00 – 12:30
GISEC Academy 2 [Workshops]   Networking
12:30 – 13:45
GISEC Academy 2 [Workshops]   Enhancing Cybercrime Investigation Capabilities Synopsis : This workshop offers senior managers in law enforcement and the private sector a comprehensive guide to establishing and enhancing cybercrime investigative capabilities within their organizations. It focuses on navigating the complexities of setting up a dynamic, robust cybercrime investigative unit that is prepared for current and future challenges. Participants will learn about adapting investigative frameworks for cybercrime, balancing generalist knowledge with specialist expertise, and implementing essential components such as selecting and assessing training needs of personnel, utilizing advanced software and tools, and establishing effective structures and operational processes. This workshop is an invaluable resource for leaders tasked with developing a forward-thinking cybercrime investigative capacity.

Key Learning Outcome :

Participants will understand how to adapt existing investigative frameworks to address the unique challenges of cybercrime, learn strategies for balancing broad cybersecurity knowledge with in-depth expertise in specific areas, and acquire insights into building and managing an effective cybercrime investigation team within their organizations.
Speakers

Juan Castellaz-Faico Cyber Security Expert Singapore

13:45 – 14:15
GISEC Academy 2 [Workshops]   Networking
14:15 – 15:30
GISEC Academy 2 [Workshops]   The Business of Cybercrime Synopsis: This workshop provides an analytical overview of the cybercrime ecosystem, focusing on darknet marketplaces and cyber fraud mechanisms. It highlights the strategic use of artificial intelligence by cybercriminals to enhance their operations. The content is structured to impart a nuanced understanding of the digital underworld, aiming to equip participants with the knowledge to navigate and counteract advanced cyber threats.

Key Learnings:

Participants will gain an understanding of the cybercrime landscape affecting organisations in the Middle East Region, including insights into dark web and darknet marketplaces. Participants will learn about the acquisition and profitability of cybercrime methods, the role of AI in cybercrime, specifically in business email compromise and the use of large language models. The workshop also includes a case study on the Conti ransomware group, offering perspectives on cybercriminal organizational structures and business models.
Speakers

Garren Hamilton Cyber Security Expert Australia

15:30 – 15:30
GISEC Academy 2 [Workshops]   Close