EXHIBITOR LIST GET YOUR FREE PASS

HOSTED BY

OFFICIAL GOVERNMENT CYBERSECURITY PARTNER

OFFICIALLY SUPPORTED BY

ORGANISED BY

WORKSHOPS

11:00 – 13:00
GISEC Academy 1 [Workshops]   Cybersecurity Leadership Demystified Synopsis : Explore the future of security in 2024 and beyond, from setting up robust programs to navigating risk management and cyber strategy. Gain insights into leadership, incident response, and protecting critical assets while forging strong collaborations with IT. Uncover real-world case studies and UAE legal insights for a comprehensive understanding.

Key Learnings :

• Stay current on emerging cybersecurity threats beyond 2024.
• Establish a robust security program from scratch.
• Master risk assessment, mitigation, and prioritization strategies.
• Cybersecurity Integration: Integrate cyber initiatives with business objectives for enhanced success.
• Human-Centric Security: Implement effective leadership, team-building, and communication practices for security teams.
Speakers

Dr. Erdal Ozkaya A leading Cybersecurity Professional Australian Charles Stuart University Australia

13:00 – 13:30
GISEC Academy 1 [Workshops]   Networking Get ready to recharge your innovative spirit and power up those connections! It's not just a break, it's your chance to spark collaborations, exchange moonshot ideas, and fuel the future of cybersecurity
13:30 – 14:45
GISEC Academy 1 [Workshops]   Cyber Breach Response Synopsis - Workshop is designed to equip organisations with the essential knowledge and skills to effectively, respond to cyber security incidents. In an age where cyber threats are, prevalent, being prepared for a breach is a necessity.

Key Learning :

* Comprehensive Learning : Open to all organisational roles, from CEO to IT support staff. Everyone in your team needs to comprehend the breach response plan.
* Clear Responsibilities : Regardless of your role, this workshop empowers you to understand your responsibilities and actions during a breach.
* Cultural Shift : Contribute to changing the organisational culture, prioritizing cybersecurity, and preparedness.
* Early Decision-Making: Senior leadership will recognise the significance of making crucial decisions early, even before a breach occurs.
* Efficient Management: Managers will work more effectively as a cohesive unit, ensuring a consistent and repeatable response to cyber breaches.
Speakers

Phil Cracknell CISO for a UK Defence company & Former Cabinet Office Cyber Security Subject Matter Expert. UK Defence company United Kingdom

14:45 – 15:15
GISEC Academy 1 [Workshops]   Networking Step into the networking break - where handshakes meet high-fives and where every conversation ignites a potential partnership.
15:15 – 16:30
GISEC Academy 1 [Workshops]   From CISO to BISO: Bringing Security to Business Workshop 3 Synopsis: 
CISOs are now key players in big boardroom chats, breaking down geeky cybersecurity jargon into business talk and having a say in the big decisions. As companies dive headlong into the digital age, the CISO is the go-to person navigating through the stormy cybersecurity seas. In this workshop, we will understand how the fast-paced evolution of the digital landscape has birthed the concept of BISO, a role envisaged to bridge the sometimes-gaping chasm between technical cybersecurity realms and business objectives. In addition, we will learn,
a. Leadership styles and attributes
b. Dealing with regulators and navigating complexity
c. Communicating during a crisis

Key Learning:
Acquire a comprehensive understanding of the evolving role of CISOs and the emergence of the BISO role. Participants would gain insights into the leadership styles and attributes required to excel in these positions. Additionally, the workshop would provide strategies for effectively navigating regulatory requirements, managing complexity, and communicating during crisis situations. Overall, attendees would leave with the knowledge and tools needed to bridge the gap between technical cybersecurity expertise and overarching business objectives in today's rapidly evolving digital landscape.
Speakers

Ayad (Ed) Sleiman Head of Information Security King Abdullah University of Science and Technology

16:30 – 16:30
GISEC Academy 1 [Workshops]   Close
10:30 – 11:45
GISEC Academy 1 [Workshops]   Hands-On Physical Security Essentials Synopsis: Organizations spend millions of dollars to keep their assets safe with physical access controls, but these are not without flaw. This course is designed to help you assess, strategize, and navigate your way through the complex world of physical access controls from small to large enterprise organizations.

Many organizations rely on a group of people, apart from Infosec, to make decisions about how to restrict access to facilities, assets, and critical operations. Unfortunately, the process for evaluating technology that is implemented at the door is often very different than how Infosec selects vendors, and the criteria for doing so it far less regulated. Electronic physical access technology is highly proprietary, and as a result, the technology functions quite differently than what Infosec professionals are used to, leaving many questions or blind spots in the security coverage.

Key Learning:

This course is all about understanding physical security from a holistic view and methods to defeat many popular access controls. In your journey to the controlled area, you need to access and defeat various hardware locks, access card readers, security sensors, and often the access cards—all of which we will cover and perform hands-on exercises. We will also discuss and demonstrate how blended technical and social engineering attacks can be utilized in defeating access controls. Laptops are not required for this course. Attendees will rotate through various ""stations"" with pre-configured equipment and tools to gain hands-on experience and sharpen their skills.
Speakers

Valerie Thomas Independent Cybersecurity Consultant US

11:45 – 12:15
GISEC Academy 1 [Workshops]   Networking This isn't just a pause; it's a pit stop on the road to startup success. So rev up your networking engines and let's accelerate towards a future where cybersecurity brilliance knows no bounds. 
12:15 – 13:30
GISEC Academy 1 [Workshops]   Exploring Consumer IoT: Basic Hardware Hacking Techniques for Real-World Devices Synopsis:
Embark on an immersive journey into the realm of Consumer IoT in "Exploring Consumer IoT: Basic Hardware Hacking Techniques for Real-World Devices." This session offers a hands-on exploration of fundamental hardware hacking techniques applied to everyday IoT devices. Participants will gain practical insights into identifying vulnerabilities and enhancing security measures, empowering them to navigate the complexities of IoT ecosystems with confidence. Join us to unlock the secrets of hardware hacking and fortify your understanding of consumer IoT security.

Key Learning:
• Understanding Consumer IoT Devices: Gain insight into the architecture and functionality of consumer IoT devices, laying the foundation for effective hardware hacking techniques.
• Basic Hardware Hacking Techniques: Learn fundamental methods for identifying and exploiting vulnerabilities in real-world IoT devices, enhancing your ability to assess device security.
• Practical Application: Acquire hands-on experience through interactive demonstrations and exercises, reinforcing theoretical knowledge with real-world application.
• Security Enhancement: Discover strategies for enhancing security measures on consumer IoT devices, enabling you to mitigate common risks and threats effectively.
• Empowerment: Gain confidence in navigating the complexities of IoT ecosystems and fortifying device security, empowering you to make informed decisions and take proactive steps to protect your digital assets.
Speakers

Bryce Case Jr Hacker, Rapper, Entrepreneur US

13:30 – 14:00
GISEC Academy 1 [Workshops]   Networking Grab your coffee and sprint to meet the industry titans at our networking break! It's where your next big idea could be brewing alongside your morning cup. Let's caffeinate our conversations and fuel innovation together!
14:00 – 15:15
GISEC Academy 1 [Workshops]   Workshop 9 Workshop 9 TBA
15:15 – 15:15
GISEC Academy 1 [Workshops]   Close
11:00 – 12:15
GISEC Academy 1 [Workshops]   Advanced Cybersecurity Trends and Strategies for 2024 Synopsis: This workshop aims to explore the latest cybersecurity trends, focusing on AI-enhanced security measures, emerging threats, and strategic defense mechanisms. Participants will gain insights into advanced cybersecurity protocols and the role of artificial intelligence in fortifying digital defenses.

Key Learnings:

*Comprehensive understanding of AI's impact on cybersecurity
* Ability to identify and mitigate emerging cyber threats
* Skills to implement AI-enhanced security measures
Speakers

Ahmed Al Zarouni Ahmed Al Zarouni Vice President, Investment Corporation of Dubai (ICD)

12:15 – 12:45
GISEC Academy 1 [Workshops]   Networking Step away from the email abyss and dive into a creativity oasis! We're talking sparking collabs, swapping ideas that'll blow your mind, and fueling groundbreaking solutions in sustainability
12:45 – 13:30
GISEC Academy 1 [Workshops]   Decoding different Shades of Phishing Attacks Synopsis: With an estimated 3.4 billion spam emails generated daily, phishing is the most prevalent type of cybercrime. The most frequent reason for data breaches is the use of stolen credentials. Internet users in the Millennial and Gen-Z generations are especially susceptible to phishing scams. Phishing is a form of cybercrime in which attackers send unsolicited emails with links to malicious websites or malware in an attempt to trick recipients into downloading it or visiting fake websites. The main method used by phishing attacks to target victims is email. Globally, there have been 16.5 compromised emails for every 100 internet users on average during the past three years. Cybercriminals can buy these compromised databases from dark web black markets and utilize the addresses for spearheading phishing attacks. What precisely constitutes a phishing attack will be illustrated through live demonstrations from the attacker's point of view, including automated bots, use of open relay servers, takeovers of Instagram, YouTube, and Gmail accounts, and other publicly available open source software. Our live demos will provide learners with the expertise to recognize and foil these digital deceptions by showcasing real-world examples.

Key Learning:

Participants will gain heightened awareness and practical skills to recognize and combat diverse phishing attacks. The session offers a comprehensive understanding of the evolving phishing landscape, incorporating real-world scenarios and live demonstrations to illustrate the methods employed by cybercriminals.
Speakers

Sankarraj Subramanian Cybersecurity Expert India

13:30 – 14:00
GISEC Academy 1 [Workshops]   Networking Recharge those batteries and those conversation starters! This networking break isn't just about refueling your body, it's about sparking connections that could change your path
14:00 – 15:15
GISEC Academy 1 [Workshops]   Streamlining the Integration of Data Privacy Synopsis: UAE companies dealing with EU partners or handling EU citizens' data should adhere to Data Privacy regulations such as GDPR. This will ensure smooth international relations and business transactions. In this workshop, the presenter will focus on synergies, addressing compliance challenges, and leveraging various standards to enhance data privacy in the energy sector. The presenters will be open to questions about data privacy and GDPR implementation.

Key Learnings:

* Cultural Shift- Contribute to changing the organisational culture,prioritizing cybersecurity and preparedness.
* Early Decision-Making Senior leadership will recognise the significance of making crucial decisions early, even before a breach occurs.
* Efficient Management Managers will work more effectively as a cohesive unit, ensuring a consistent and repeatable response to cyber breaches.
* Improved Collaboration - Building better collaboration between senior leaders is a key outcome
Speakers

Susanne Bitter Independent Cybersecurity Consultant UK

15:15 – 15:15
GISEC Academy 1 [Workshops]   Close