EXHIBITOR LIST GET YOUR FREE PASS

HOSTED BY

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

OFFICIALLY SUPPORTED BY

ORGANISED BY

GISEC AGENDA

10:30 – 10:30
DARK STAGE   Moderator Remarks DARK STAGE
Speakers

Big Hass Radio Host Pulse 95 FM UAE

10:30 – 10:50
DARK STAGE   Exploit research of World''s Largest Coffeehouse Chain DARK STAGE One thing is enjoying eating and drinking coffee and the other is actually hacking these retails stores. This sssion takes us into a deep dive into how Walid found the RCE, what kind of research was involved, what kind of tools aided in that, how does the Oracle retail system work and how the exploit was developed. 
Speakers

Walid Faour Penetration Testing Lead Alshaya Group United Arab Emirates

10:50 – 11:10
DARK STAGE   Crypto Heist through Web2 DARK STAGE Let''s explore two critical web2 vulnerabilities that could lead to transfer of funds in crypto wallets. This 20-minute talk aims to raise awareness and provide insights to fortify your web32 solution against web2 attacks.
Speakers

Dimitris Pallis Ethical Hacker Greece

11:10 – 11:30
DARK STAGE   Knowledge Showcase Microsoft DARK STAGE Paula Januszkiewicz 
11:30 – 11:30
DARK STAGE   Starship Secrets of the Modern Security Program DARK STAGE In the age of uncountable security offerings from vendors and consultants, what essentials actually matter? At the end of the day, risk reduction for compliance''s sake should not simply be a series of boxes to check; dealing with the underlying root causes of security issues will inevitably lead you to the Promised Land. In this talk, we will bypass the mountains of snake oil in the security industry and focus on the absolute prerequisites of a successful security apparatus.
Speakers

Bryce Case Jr Hacker, Rapper, Entrepreneur, USA

11:50 – 12:10
DARK STAGE   Knowledge Showcase Cisco DARK STAGE
12:10 – 12:30
DARK STAGE   Cyber Resilience in the Cloud: A Live Ethical Cloud Attack DARK STAGE As we’ve shifted to the cloud, we’ve exposed ourselves to new security risks that can’t be ignored. Join Hardeep Singh, Pentera Sr. Security Engineer, as he demonstrates a live ethical attack on the Cloud. Learn how Automated Security Validation removes assumptions and ensures cyber resilience across your entire attack surface, including the Cloud. 
Speakers

Hardeep Singh Senior Security Architect Pentera UAE

12:30 – 13:00
DARK STAGE   The Dark Side of AI - How Hackers use AI & Deepfakes DARK STAGE Mark will take you on a journey to the Dark side of AI. More than 90 % of cyber attacks are caused by human error and AI changes the nature of attacks. How do cybercriminals use Chat GPT, Worm GPT and Deepfakes? What should we do to protect ourselves? Can we use AI to fight back? Mark has met and anonymously interviewed hackers to understand the inside perspective. Get an exciting and rare insight into the Dark Side of AI. 
Speakers

Mark T. Hofmann International Profiling-Expert Germany

13:00 – 13:20
DARK STAGE   Artificial Intelligence (AI) for C4ISR - Power of Context DARK STAGE Resecurity implements Artificial Intelligence to empower military intelligence and defense agencies with unparalleled insights into emerging threats and security challenges using advanced analytics.

Resecurity''s implementation of artificial intelligence for C4ISR represents a significant leap forward in the field of national security. With Context AI, defense agencies have access to a powerful tool that not only enhances operational effectiveness and cost efficiency but also addresses the inherent challenges associated with AI-generated intelligence.
Speakers

Ahmad Halabi Managing Director Resecurity UAE

13:20 – 13:40
DARK STAGE   Knowledge Showcase ITSEC DARK STAGE
Speakers

Stevo Cvetkovic Managing Director ITSec Australia

13:40 – 14:00
DARK STAGE   Knowledge Showcase by Google Cloud Security DARK STAGE
14:00 – 14:30
DARK STAGE   The Diamond Hackers: Behind the Scenes of Meta's Bug Bounty Program DARK STAGE
Speakers

Bassem Bazzoun Security Researcher Meta Lebanon

Kassem Bazzoun Whitehat Researcher Meta Lebanon

Farah Hawa Security Analyst, Bug Bounty Meta UK

Stefan Bogdanović Security Analyst, Bug Bounty Meta UK

14:30 – 14:50
DARK STAGE   Mobile phishing in action! DARK STAGE In 2023, 71% of data breaches will target mobile phones or cloud services using sophisticated attacks. Hackers employ generative AI and social engineering for effective, payload-free attacks, directly targeting users. As email threats wane, the focus shifts to mobile devices, posing new challenges for security teams. Join our live demo to witness the creation of a mobile phishing kit and how it effortlessly bypasses multi-factor authentication protection.
Speakers

Bastien Bobe Field CTO Lookout

14:50 – 15:10
DARK STAGE   Cyber Mirage: How Artificial Intelligence is Shaping the Future of Social Engineering DARK STAGE AI''s emergence has reshaped social engineering, spawning AI-powered threats. In a recent case in Hong Kong, scammers used deepfake and voice-cloning tech to steal $25 million. This talk showcases AI''s ability to create convincing deepfakes and voice clones, emphasizing the need for robust defense mechanisms against these evolving threats.
Speakers

Brandon Kovacs Senior Red Team Operator US

15:10 – 15:30
DARK STAGE   Knowledge Showcase MiniOrange DARK STAGE
15:30 – 15:50
DARK STAGE   Phishing-as-a-Service: Unmasking the New Financial Cyber Threat DARK STAGE As cyber threats continue to evolve, a concerning trend has emerged – the rise of "Phishing-as-a-Service" (PaaS). This session delves into the intricacies of this new financial cyber threat, exploring how threat actors are leveraging sophisticated services to conduct targeted phishing campaigns. Attendees will gain insights into the mechanics of PaaS, its impact on financial institutions, and effective strategies to counteract this growing menace.
Speakers

Dr. Deepak Kumar Sr. Cyber Intelligence & Digital Forensics Expert India

15:50 – 16:10
DARK STAGE   Knowledge Showcase Kernel DARK STAGE
16:10 – 17:00
DARK STAGE   Ask the Hackers - First time @GISEC Dark Stage DARK STAGE Have you wondered what is on the mind of a hacker while they conduct a cyber-attack? Are you curious to know what motivates these hackers, what are the strategies they use? In this session, some of world’s top ethical hackers will answer everything you''ve ever wanted to know. Come ready with your questions and ask these hackers yourself and decode some exciting stories of their journey, learn their strategies, take a sneak peek into a hacker’s life.
Speakers

Valerie Thomas Independent Cybersecurity Consultant US

Bryce Case Jr Hacker, Rapper, Entrepreneur, USA

Dimitris Pallis Ethical Hacker Greece

Dhruv Bisani Head of Red/Purple Team Starling Bank UK

Brandon Kovacs Senior Red Team Operator US

17:00 – 17:00
DARK STAGE   Close DARK STAGE
10:00 – 10:05
DARK STAGE   Moderator Remarks DARK STAGE
Speakers

Big Hass Radio Host Pulse 95 FM UAE

10:05 – 10:20
DARK STAGE   Hacking Airlines and Airline Rewards Programs DARK STAGE
Speakers

Sam Curry Ethical Hacker USA

10:20 – 10:40
DARK STAGE   Hidden in Plain Sight: Exploiting Legitimate Services to Evade Email Security DARK STAGE In cybersecurity, phishing attacks persist despite advanced defenses like SPF and DMARC. Join us to learn how attackers exploit legitimate services to bypass email security, with real-world examples and strategies to mitigate risks.
Speakers

Dhruv Bisani Head of Red/Purple Team Starling Bank UK

10:40 – 11:00
DARK STAGE   Knowledge Showcase Recorded Future DARK STAGE
Speakers

Richard K. LaTulip Field Chief Information Security Officer Recorded Future US

11:00 – 11:20
DARK STAGE   Knowledge Showcase Spire DARK STAGE
Speakers

Prasanth Prasad Spire Solutions UAE

11:20 – 11:40
DARK STAGE   I Can Steal Your Sh1t DARK STAGE Most people switch off when someone starts talking about cyber security. In the time it takes you to read this synopsis, two small businesses will be successfully hacked in the UK. And yet, you still probably won’t do anything about it, because where do you even begin? If you dare to join the audience, Paul will steal your information in front of your eyes – and then he will point you in the right direction to do something about it. 
Speakers

Paul Newton Mind Reader, Hypnotist, and Magician MentalTheft UK

11:40 – 12:00
DARK STAGE   Fortifying Defenses Against AI-Powered Cyber Threats: Embracing Zero Trust Protection Strategies DARK STAGE As AI-driven cyber threats surge, this session explores the evolving landscape of attacks, emphasizing the need for robust defenses. From initial incursion to exfiltration, we delve into pivotal intervention moments and discuss zero trust strategies, resilient architectures, and more. Join to navigate the cybersecurity battlefield in the age of AI.
Speakers

Bahi Hour Sr. Director of Solution Engineering Xage Security, Inc. US

12:00 – 12:20
DARK STAGE   AI powered Email Security DARK STAGE In an era where digital threats evolve with alarming speed, traditional cybersecurity measures often find themselves outpaced by sophisticated phishing schemes.  Anxinsec, presents a compelling narrative on the role AI plays in identifying and neutralizing phishing emails and showcases how AI powered solutions can offer a formidable counter measure. The presentation will also address the challenges and ethical considerations inherent in deploying AI for security purposes. Questions around data privacy, the potential for false positives, and the ethical use of AI in monitoring communications are examined, offering a holistic view of the technological and moral landscape.
Speakers

Himesh Madhusoodanan Director of Products and Technology Anxinsec UAE

12:20 – 12:50
DARK STAGE   Unleashing GenAI ''demon'' DARK STAGE Delve into the unsettling realm of AI-generated art. This session explores the darker facets of AI creativity, including the uncanny valley effect, intentionally disturbing creations, and the ethical implications therein. Uncover AI''s potential to manipulate appearances, inviting reflection on the consequences and ethical considerations surrounding disturbing AI art.
Speakers

Minh Hieu Ngo Hacker Vietnam

12:50 – 13:10
DARK STAGE   Knowledge Showcase BugCrowd DARK STAGE
13:10 – 13:30
DARK STAGE   How profoundly do you investigate hackers network infrastructure? DARK STAGE One part of the threat intelligence process is investigating the hackers network infrastructure. The data that you will receive after this process depends on the sources and methods you use. We are used to seeing that the hackers network infrastructure consists of IP addresses, domains, and URLs. It looks like the general ingredients for IOC feeds, and they usually appear after reactive investigations. But there is more. For example, hackers are able to use popular public services such as clouds, messengers, and code storage as a control server for their malware. From one side, there is no opportunity to add these services as IOCs to your feed because they will generate false alarms. On the other hand, it gives additional context for threat intelligence to establish all aspects of an attack.  In my presentation, I am going to talk about proactive detection of the hackers network infrastructure and how to use the disadvantages of using public services by hackers.
Speakers

Denis Kuvshinov Head of Threat Intelligence Positive Technologies Russia

13:30 – 13:50
DARK STAGE   Weaponising AI for Cyber Attacks & Offensive Operations DARK STAGE Exploring how Generative AI is now being incorporated into Cyber Attack to decrease the level of effort and sophistication required from threat actors to compromise systems and payment services. How easy is it for us to replicate these attacks to steal Gold; Print money or disrupt the global economy? How can we incorporate Generative AI into Offensive Operations for a threat driven defence.  
Speakers

Manit Sahib Offensive Security Lead Global Fund, United Nations UK

13:50 – 14:10
DARK STAGE   Knowledge Showcase Qualys DARK STAGE
14:10 – 14:30
DARK STAGE   Knowledge Showcase Sekoia DARK STAGE
14:30 – 14:50
DARK STAGE   Financial Application Security: Detecting and Preventing IDOR Attacks DARK STAGE
Speakers

Ilkin Javadov Senior Penetration Tester & Ethical Hacker Azerbaijan

14:50 – 15:10
DARK STAGE   Knowledge Showcase SANS DARK STAGE
Speakers

Kevin James Ripa Senior instructor SANS Institute

15:10 – 15:30
DARK STAGE   Knowledge Showcase Deloitte DARK STAGE
Speakers

Ivan Glinkin Cyber Team Deloitte ME UAE

Kirill Bureev Cyber Team Deloitte ME UAE

15:30 – 15:50
DARK STAGE   The Artistry of Account Hijacking and the Ballet of Bank OTP Bypass Scams DARK STAGE High-stakes exploration of authentication bypass, where live demonstrations reveal vulnerabilities in active websites. Witness potential consequences – from data breaches to privacy violations – and gain actionable insights into resilient mitigations. Join for practical solutions and a firsthand look at the dynamic authentication security landscape.
Speakers

Sankarraj Subramanian Cybersecurity Expert India

15:50 – 16:10
DARK STAGE   Knowledge Showcase DARK STAGE
16:10 – 17:00
DARK STAGE   Ask the Hackers - First time @GISEC Dark Stage DARK STAGE Have you wondered what is on the mind of a hacker while they conduct a cyber-attack? Are you curious to know what motivates these hackers, what are the strategies they use? In this session, some of world’s top ethical hackers will answer everything you''ve ever wanted to know. Come ready with your questions and ask these hackers yourself and decode some exciting stories of their journey, learn their strategies, take a sneak peek into a hacker’s life.s
Speakers

Alina Tan Ethical Hacker Singapore

Sam Curry Ethical Hacker USA

Minh Hieu Ngo Hacker Vietnam

Sankarraj Subramanian Cybersecurity Expert India

17:00 – 17:00
DARK STAGE   Close DARK STAGE
10:30 – 10:35
INSPIRE [WOMEN IN CYBERSECURITY]   Moderator Remarks DARK STAGE
Speakers

Big Hass Radio Host Pulse 95 FM UAE

10:35 – 10:50
INSPIRE [WOMEN IN CYBERSECURITY]   TED Talk Movie Style session DARK STAGE Decrypt or Destruction?  Staring into the heart of a ransomware incident

Embark into the heart of a ransomware incident. Uncover the strategies employed by the cyber criminal group, and witness the customer''s response to this digital threat. The pivotal question awaits: Would the outcome remain unchanged with the incorporation of AI? Join us in uncovering the untold possibilities, just bring the popcorn along!
Speakers

Katerina Tasiopoulou CEO Exelasis United Kingdom

10:50 – 11:10
INSPIRE [WOMEN IN CYBERSECURITY]   Analysis of an in-vehicular network from the perspective of a test bench DARK STAGE Car manufacturers redefine driving experiences with Connected Vehicles, integrating extensive features for communication with external devices and wireless infrastructure. Alina discusses building a prototype test bench for vehicle CAN bus testing, introducing new protocols and explaining vehicle architecture, features, vulnerabilities, and learning points with challenges.
Speakers

Alina Tan Ethical Hacker Singapore

11:10 – 11:30
INSPIRE [WOMEN IN CYBERSECURITY]   Open Banking scares customers, but they still want what APIs can deliver DARK STAGE This exciting session covers fintech asset protection, API and Open Banking security, blockchain security, secure payment technologies, and cyber attack case studies.
Speakers

Judy Ngure Advisory Board Member CyberSafe Foundation Kenya

11:30 – 11:50
INSPIRE [WOMEN IN CYBERSECURITY]   Security Professional or Easy Target? DARK STAGE Security professionals constantly seek the latest threats, breaches, and defenses across all industries, but this pursuit raises concerns about divulging too much information. Join Valerie for insights and strategies to safeguard against unnecessary risks.
Speakers

Valerie Thomas Independent Cybersecurity Consultant US

11:50 – 12:10
INSPIRE [WOMEN IN CYBERSECURITY]   Essential tips: Bug Bounty Hunt, just another way! DARK STAGE Within the bug bounty community alone 95% of hunters are male. In this session, we will learn from a female bug bounty expert on her journey by showcasing her hacking techniques.
Speakers

Farah Hawa Security Analyst, Bug Bounty Meta UK

12:10 – 12:30
DARK STAGE   Cascading Risks: Exploring the Ripple Effects of Third-Party Risk in Software Dependencies DARK STAGE In the digital era, software development leans on third-party dependencies for innovation, fostering intricate ecosystems. Explore the risks as we dissect real-world examples and unveil methodologies to fortify your software stack against cascading vulnerabilities.
12:30 – 13:30
INSPIRE [WOMEN IN CYBERSECURITY]   Ask the Hacker - First time @GISEC Inspire Stage DARK STAGE Have you wondered what is on the mind of a hacker while they conduct a cyber-attack? Are you curious to know what motivates these hackers, what are the strategies they use? In this session, some of world’s top ethical hackers will answer everything you've ever wanted to know. Come ready with your questions and ask these hackers yourself and decode some exciting stories of their journey, learn their strategies, take a sneak peek into a hacker’s life.
Speakers

Judy Ngure Advisory Board Member CyberSafe Foundation Kenya

Farah Hawa Security Analyst, Bug Bounty Meta UK

Valerie Thomas Independent Cybersecurity Consultant US

Alina Tan Ethical Hacker Singapore

13:30 – 13:45
INSPIRE [WOMEN IN CYBERSECURITY]   Empowering the workforce: DCIPark CISO Executive Program DARK STAGE
Speakers

Moaza Al Falasi Researcher Dubai Electronic Security Center (DESC) UAE

13:45 – 14:00
INSPIRE [WOMEN IN CYBERSECURITY]   Navigating the New Era of Cyber Threats: Leveraging AI for Enhanced Cybersecurity DARK STAGE Discover how AI revolutionizes cybersecurity in this session as we explore AI's role in proactive threat detection and response, equipping organizations to thrive in today's dynamic threat landscape.
Speakers

Judy Ngure Advisory Board Member CyberSafe Foundation Kenya

Dr. Hoda A.Alkhzaimi Co-Chair for Global Future Council for Cybersecurity UAE

14:00 – 15:00
INSPIRE [WOMEN IN CYBERSECURITY]   Inspire Roundtable: Journey of our bold role models DARK STAGE
Speakers

Col Francel P Taborlupa Spokesperson Armed Forces of the Philippines Philippines

Caitlin Sarian Cybersecurity Influencer Cybersecurity Girl LLC United States of America

Carmen Marsh President United Cybersecurity Alliance United States of America

Juliette Wilcox UK Cyber Security Ambassador

Lea Boutros Cyber Director Deloitte ME UAE

Irene Corpuz Cyber Policy Expert Dubai Electronic Security Center (DESC) UAE

15:00 – 15:00
INSPIRE [WOMEN IN CYBERSECURITY]   Close DARK STAGE