Day 1
11:30 - 11:50
Main Stage
Day 3
10:20 - 10:30
Start-up Stage
10:30 - 10:40
11:00 - 11:10
11:15 - 11:25
11:30 - 11:45
11:45 - 11:55
12:00 - 12:10
12:15 - 12:25
12:25 - 12:45
12:45 - 12:55
13:00 - 13:10
13:00 - 10:10
13:15 - 13:25
13:30 - 13:40
14:00 - 14:10
14:15 - 14:25
14:30 - 14:40
14:45 - 14:55
15:00 - 15:10
15:30 - 15:40
15:45 - 15:55
16:00 - 16:10
16:15 - 16:25
Joint police operations: Identification of threats and impact regionally and nationally
There is no absolute security for an ICS in the world of evolving cyberthreats and ever-growing risks. Learn how you can improve your ICS visibility and minimize possible negative impact with CL DATAPK.
Through practical and tactical security validation practices, we will demonstrate a new approach to risk-based remediation prioritization and how to shift from legacy security practices to risk-based strategies in order to continuously reduce exposure and increases security awareness that you can leverage to build a risk-based security strategy.
Axioma cyber services is a boutique firm that specializes in incident response. Partnered with world renowned Mentalist, Ben Cale, we will demonstrate live Mind Hacking, and talk about how it related to securing your network.
The rising risks of airborne threats through the attack surfaces of WiFi, Bluetooth and IoT devices. Introducing Harmony IoT that monitors, detects and mitigates those threats, and comply with organizational policies and industry regulations.
From the baseline of real-time Cyber Situational Awareness in million-node networks, Isophene bio-x will show how underlying cyber technologies for diverse data acquisition, automated analysis, and human-computer teaming can be applied to deliver bio-intelligence – for both know and as yet unknown pathogens – at global scale.
As the CISO, Head of Security, or CTO of your organization, you''re probably well versed in just how difficult it can be to hire high-caliber cybersecurity talent. As the world makes headway in digital transformation, organisations of all sizes, from all industries are increasingly concerned with cybersecurity risks. Security failures can be detrimental to your business – whether it be compliance violations, reputational damage and economic fallout. Now, more than ever, hiring and retaining top cyber talent is paramount to your business. This session will look at the full cyber talent lifecycles:
Resilience is not just cyber security. Using examples from real-world deployments, Resilio will show how technologies developed for cyber security have been successfully adapted to create and event-driven infrastructure that provides a single point-of-access to events as they emerge: both across the organisation and from the environment in which it operates.
Overlooking cybersecurity in favour of projects that have an immediate impact on business operations inevitably leads to unaddressed vulnerabilities and security misconfigurations in Active Directory. AD is a key component for corporates and nearly all threat actors and APT groups is targeting AD for gaining access to the crown jewels of a company. In this session, we will look at:
In the time of social distancing, there has been a significant increase in the need for messaging apps in order to stay connected. The COVID-19 pandemic has only heightened the risks as we are living more of our lives online than ever before. Now is the time to be extra vigilant about digital security – for you and your children – as increased used can mean increased risk. Finally, a ‘verifiable chat application'', Dr. NEE which seeks to reduce these risks to children face when interacting with others via online chatting apps. Protecting them from cyberbullying and exploitation of personal and sensitive data is part of the societal change required. How has OMANEE changed society for the better?
When an incident occurs, your speed of response depends on having the right information available to the right people at the right time. This is as true for line of business operations as it is in the cyber security layer. Carnet Systems will show how big data and analytics can be used to cut through the complexity of available information; allowing you to understand incidents in context and response accordingly.
It doesn''t matter if you''re a CISO, Infrastructure Manager, MSSP or Helpdesk Manager; if the business is small, medium or large – Security automation is not a luxury anymore, it''s a life-saver. In this presentation we will discuss the importance of implementing the right security automation platform, and provide some tips on what you should be careful of, and demonstrate how simple it can be to start automating – with no previous skills required.
Securing your cloud environment using a cloud native product running in your environment will ensure not only that you get the most suited and effective solution, but will also help you save your cloud consumption costs. Learn how Reblaze''s unified cloud-native web security is designed to work seamlessly with all major cloud providers.
Purpose-build for securing Active Directory, Semperis delivers first-of-its-kind solutions to address the entire lifecycle of a directory attack – from finding and fixing security vulnerabilities, intercepting privilege escalation and persistence, and quickly responding to ransomware and other data integrity emergencies.
If you''re like most organizations, you are heavily invested in the right set of security tools to help you keep ahead of rapidly evolving threats and compliance requirements. However, managing those tools is incredibly complex and time-consuming. How are you able to see coverage gaps with the security tools you are using? How do you know if the tools you have implemented are actually doing what you and your customers think they should be doing? What you need is a single solution that continuously monitors and reports on your security controls that can be easily managed from a single interface, integrates with your cybersecurity tools, and maps to the standards and frameworks that matter to your business.
Join Shimon Becker, VP Product and Co-Founder Cyber Observer, to gain insight into how Cyber Observer with Continuous Controls Monitoring (CCM) empowers you to establish a measurable benchmark of cyber hygiene, continuously close critical security gaps, and advance your cybersecurity posture.
The OT Security Company for over 15 years, Waterfall Security Solutions continues to innovate solutions for today''s challenges. Join us to learn about today''s threats to critical infrastructure and industrial automation, as well as modern solutions to enable the enterprise.
Oren Elimelech, Founder and CEO of CyberTeam360 brings his 25+ years of security and IT experience, with real life stories on Cyber Incidents and attack vectors which were observed during DFIR activity. Oren will provide you with five insights that will definitely reduce your exposure to Cyber Incidents and help you better prepare for your next Cyber Incident.
In this session, Matthew Platten CISSP, will showcase the most common Phishing attacks methodology, and explain how this can easily be defeated by implementing either a Cloud base or within your infrastructure:
Mobile threat space intensifies and challenges the benefits of mobility by imposing a risk of stealing money and altering business courses. In this session, you will gain invaluable insights on (1) modern mobile cyberattacks; (2) combating mobility state-of-mine, and (3) how to deploy defense controls fusion to protect mobile communications.
Director, Cybercrime Department and Chairman of Advisory Board, Dubai Police HQ
Col. Saeed M. Al Hajri is currently the Director of the Cybercrime Dept. at Dubai Police ? Criminal Investigation Dept., and he has been with the force for over 25 years combatting cyber and financial fraud-related crime; backed by a team of professionals who work tirelessly around the clock 24 hours a day, every day of the year to protect both private and public interests. He was previously the Chairman of the Interpol MENA Division overseeing and coordinating high-tech crimes. He holds a BSc in Law and Police Science from the prestigious Dubai Police Academy, and two postgraduate degrees in; (1) MSc in Innovation and Technology from Boston University (2007), and (2) MSc in Forensic Computing and Cybercrime Investigation from UCD Dublin Ireland (2015). His goal is to serve the United Arab Emirates in his best capabilities under the wise leadership of the President of the UAE, Vice-President of the UAE, Minister of Interior of the UAE and Commander in Chief of Dubai Police.
Cybercrime Director, INTERPOL
Radio Host, Pulse 95 FM
The master of all things cool
Foreign Markets BDM, CyberLympha
Regional Sales Director, Pentera
Mentalist, Israel
CTO, Carnet Systems, United Kingdom
Co-Founder & CTO, baraka
Senior Consultant – Information Security, Cander Group
CEO, Immediacy Labs
Co-Founder, Forestall
Managing Director, OMANEE
CEO & Founder, Cyberm8
CEO, Radiflow
CEO & Co-Founder, Reblaze
EVP Business Development, Semperis
CEO, Cyber Observer
Sales Director – Middle East, Waterfall Security Solutions
Founder & CEO, CyberTeam360
CEO, HackenProof
Operations Director – Fraud Management, Channel IT
Sales Director, CommuniTake Technologies