Follow GISEC
X Labs   Hall 6 Opening Remarks by Moderator Hall 6
Speakers

Laura Buckwell Former News Anchor, Event Host & MC

X Labs   Hall 6 Opening Remarks by Moderator X LABS STAGE - Hall 6
Speakers

Smith Gonsalves Director & Principal Consultant, CyberSmithSECURE

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Identity – The New Perimeter 
Speakers

Nicolai Solling Chief Technology Officer, Help AG

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Rethinking OT/IoT Security to Mitigate Cyberthreats Cybersecurity threats are always evolving, and today we’re seeing a new wave of advanced attacks specifically targeting IoT devices used in enterprise environments as well as operational technology (OT) devices used in industrial systems and critical infrastructure (like ICS/SCADA). These types of devices are often unpatched, misconfigured, and unmonitored, making them the ideal targets for attackers. To address these risks, join us to know more on Microsoft Defender for IoT and the unified XDR & SIEM advanced security analytics platform to tackle and address IT/OT/IoT security risks and challenges.
Speakers

Hesham Saad Sr. Regional Cybersecurity Technical Specialist, Microsoft

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Modernizing Identity Security Framework  Identity Governance and Access Management is a framework that connects and unifies diverse technologies with departmental islands. This session will help Organizations in strengthening their cybersecurity posture by protecting their Workforce identities, Privileged Identities, and Encryption keys of credentials management systems , such as vault.  
Speakers

Prasanth Prasad Business Unit Head Spire Solutions

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Complexity is the Enemy of Security - How Data Governance and Privacy are key Element of Cybersecurity The modern data stack consists of cloud data warehouses, data lakes and adjacent patterns such as the lakehouse, across a complex hybrid or multi-cloud environment. This has given data teams increased agility and the ability to leverage major amounts of data. At the same time, new data privacy legislation and the impact of major cybersecurity breaches has led to the call for responsible data use, requiring new approaches to data privacy and security. Organizations that can use data responsibly to accelerate innovation and protect the business will be at a significant advantage over their competitors.
Speakers

Tausif Sayyed Head, Data BU, Spire Solutions

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Emerging 2022 Intelligence Trends Across the Middle-East
Secure your world with intelligence by enhancing the capability within your organization.
What are some of the key threat and attack vectors for organizations in the Middle East that should be on your radar in 2022? This session will provide a greater understanding on how the broader application of intelligence will enable your organization to better defend against your adversaries. We will also share insights on how you can integrate intelligence into workflows whilst automating your internal processes.
Speakers

Jason Steer Director of EMEA presales, Recorded Future

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Intergrated Communication Platform "We are in an age of exponential innovation growth, and this applies to our daily lives as well as public safety and security innovation. The convergence of Audio, Video and Data into an integrated communication platform for command and control communication brings many collaboration and efficiency benefits in addition to being able to provide real time intelligence during dispatching."  
Speakers

Nadim Abdulrahim Global Government Industry Expert - Huawei Enterprise Business Group

X Labs   -Public Cyber Awareness Hall 6 Opening Remarks by Moderator X LABS STAGE - Hall 6
Speakers

Syed Abdul Qadir Executive Director, Technology Consulting & Cyber Risk Assurance, PwC, Pakistan

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 How to become Ransomware ready ? The increase in Ransomware in 2021 has been a focus for security teams in all industries and organizations of all sizes. But it isn’t inevitable. By continuously validating controls, passwords, configurations and the security stack as a whole, there is a way for organizations to ensure they are one step ahead. Join Pentera Head of Technical Channel Enablement, Sion Retzkin as he reviews an exploit-centric approach to becoming Ransomware ready. Allowing teams to prioritize remediation based on how real ransomware strains such as Maze and REvil could potentially impact the business. 
Speakers

Sion Retzkin Head of Technical Channel Enablement EMEA & APAC, Pentera

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Mobile App Security Testing Techniques and Tools Enterprises may use mobile application security tools to create dependable apps that are scalable and available across numerous platforms. In this session, we will evaluate the existing mobile application trends and take a look at some of the most promising mobile app security testing tools. 
Speakers

Harshit Agarwal Co-founder & Chief Executive Officer, Appknox

X Labs   -Public Cyber Awareness Hall 6 The Issues of Multifactor Authentication X LABS STAGE - Hall 6 The session will discuss the Issues of Multifactor Authentication and how Fraud Attempting to steal the OTP/ MFA - Based on a real case scenario.

• What is Multi- factor Authentication?
• Why do we need Multi- factor Authentication?
• Fraud Attempting to steal the OTP/ MFA
• General Security Best Practices
Speakers

1st L.T. Rashed Lootah Dubai Police

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 What You Need to Know RIGHT NOW about Securing Modern Application Development 
Speakers

Nuno Oliveira Software Development Group Manager, Checkmarx

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 TLStorm - 3 Vulnerabilities, Millions of infected devices  Modern IOT devices are using all sorts of different management interfaces - local network, physical connection and in some cases, cloud control.These interfaces open up a wide attack surface and puts a heavy burden on the security aspect of it  -- since any bug found in it can allow an attacker to abuse the connected device, and potentially breach to any network where such devices are installed. With this notion in mind, we decided to research a widely popular Cloud-connected UPS device, and have discovered critical vulnerabilities in it’s TLS implementation that can lead to remote-code-execution, in a pre-authentication stage.
Exploiting these vulnerabilities could allow attackers to remotely take over the power lifeline of impacted organizations directly from the Internet. Analysis of the discovered vulnerabilities uncovered that they stem from improper use of a 3rd party TLS library, used by a variety of industrial controllers, networking equipment and other Cloud-connected devices. We will conclude our talk by sharing analysis of vulnerable applications that were found to be affected, and outline takeaways on the security of embedded TLS implementations.
Speakers

Barak Hadad Head of Research, Armis Labs

X Labs   -PUBLIC CYBER AWARENESS Hall 6 Audience Q&A X LABS STAGE - Hall 6
X Labs   -PUBLIC CYBER AWARENESS Hall 6 English Session: New cybersecurity threats for public X LABS STAGE - Hall 6
Speakers

Ahmed Al Zarouni VP & Head of IT Department, Investment Corporation of Dubai

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Beyond encryption - Breaking Boundaries: Why protecting data in new ways is essential in a fully connected world and Zero Trust principles should not only focus on authentication.
Speakers

Karim Hosny Attia CEO & Founder, UBIRCH Cyber Security LLC

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 The Evolution of Software Supply Chain Attacks Next-generation cyber attacks, actively targeting open source software projects, have increased 430% year-over-year. Most recently, the Dependency Confusion attack and the Log4j vulnerability.  Malicious hackers are becoming increasingly adept at attacking the underbelly of the Software Supply Chain. To cause the most damage whilst remaining undetected, hackers are rapidly evolving their attack methods. Over the past years, we’ve documented multiple forms of Open Source Software (OSS) Supply Chain attacks including malicious code injection, stealing project credentials, and typo squatting. Join Mitun Zavery as he walks you through how hackers are becoming increasingly successful at breaching Software Supply Chains and what you can do about it. Key takeaways:     A short evolution of software supply chain attacks What companies have learnt the hard way from these attacks How to manage at scale these new malicious attacks Clear, practical actions to implement today to protect your software supply chain  
Speakers

Mitun Zavery Regional Vice President, Sales Engineering EMEA, Sonatype

X Labs   -PUBLIC CYBER AWARENESS Hall 6 Arabic Session: New cybersecurity threats for public X LABS STAGE - Hall 6
Speakers

Ahmed Al Zarouni VP & Head of IT Department, Investment Corporation of Dubai

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 The Application Story - Testing, Monitoring and Securing   If you have ever been responsible for an application and still you were the last to know about an outage and cause of that, you are not alone. We have a story to share with you and practical solutions to UP your application security game.
Speakers

Muhammad Rehan Head, Infrastructure BU, Spire Solutions

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 5 Strategies to Thwart Online Fraud Discover the latest identity verification and KYC strategies to help organisations protect their online channels against remote identity fraud.
Speakers

Mark Reeves Vice President Revenue Operations EMEA, Jumio Corporation

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Cyber Workforce Optimization' Evidencing the role human capabilities play in cyber resilience is a continuous challenge for security teams and boards, something amplified by a complex risk and regulation environment.  Cyber skills development, talent retention, security culture, diversity and even crisis response programs have been left behind by an otherwise data-driven business environment - leaving organizations on the back foot. Join Immersive Labs, to learn how human capabilities can stay relevant to the speed of cyber with Cyber Workforce Optimization.
Speakers

George Mehrej Director of Alliances & Channel - MENA, Immersive Labs

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 OT Incident Response between Planning and Reality
Speakers

Sultan Al-Harbi OT SOC Manager, IT Belt

X Labs   -PUBLIC CYBER AWARENESS Hall 6 Developing a culture of cybersecurity - principles and ways forward X LABS STAGE - Hall 6 A fireside chat with ITU experts, featuring audience participation, on cybersecurity awareness, the role of the public in creating a true cybersecurity culture, looking at country statistics and discussing awareness-raising challenges, ultimately co-creating with the audience a set of Action Points on improving cybersecurity awareness for the general public.
Speakers

Yasmine Idrissi Azzouzi Cybersecurity Program Officer, ITU

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Achieve Enhanced Cloud Security and Protect Against Ransomware Attacks and Data Leakage With digital collaboration skyrocketing, data now goes wherever it’s needed. Cloud apps such as SAP, Workday and Salesforce have increased productivity, but so has the risk your data is exposed to. To tap into this boosted productivity without risking your data, you need to stay in full control. In this session you will learn:

- What is SASE and how to easily deploy it to protect your cloud apps
- How SASE can help address the challenges of Ransomware and Data Breaches
- How Data Loss Prevention (DLP) enables you to stay in control of your data with advanced data protection capabilities
Speakers

Bahaa Hudairi Regional Director

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 s@y g00dby3 to Pa$$words
Are you looking for a way to Improve user experience, Reduce IT overhead and Strengthen security posture? Duo passwordless authentication will be most effective way to help you on this Journey.
Please join us in GISEC to learn more about Cisco Passwordless. 
Speakers

Nizar Wafa Duo Account Executive - MEA, CISCO

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Why are Customers Migrating to a Next-Gen Cloud-Based SIEM Platform?
Speakers

Sheik Abideen Regional Director - MEA, Securonix

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Securing data traffic in Azure deployments In this session we will show how to secure incoming and outgoing traffic from Azure workloads with a simple use case, building on it to include internal segmentation, adding components such as Advance Threat protection and support for SD-WAN and finally obtaining an architecture which mirrors some of the more complex deployments we have seen to date in the Middle East
Speakers

Apollinaire Moreno Public Cloud Sales Lead, Fortinet International Emerging Markets

X Labs   -PUBLIC CYBER AWARENESS Hall 6 Closing Remarks by Moderator X LABS STAGE - Hall 6
X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Business cases for NextGen Data diodes in the government and energy sectors UAE and the Middle East are facing a very large increase of advanced, complex and damaging cyber attacks. Because Cyber Crime pays very well and Cyber Warfare is discreet, attackers have the motivation, the knowledge and the resources to breach the smallest companies to the largest corporations. We need cyber security solutions that are battle tested, able to protect the most sensitive assets and easy to use & to maintain. Our NextGen Data diodes are the right solution offering the best protection that you expect from a data diode without the pain and the headaches you may have experienced with the older generation. We will present the technology and the business cases where our NextGen Data Diode will offer the best security for the minimum level of effort.  
Speakers

Gilles LORIDON CEO, GLOBAL SECURITY NETWORK

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Security First for Cloud Transformation
Speakers

Sunil Peer Regional CDTO - Cloud BU, Huawei Middle East

X Labs   -PUBLIC CYBER AWARENESS Hall 6 CLOSE X LABS STAGE - Hall 6
X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Seven Actions to Take Now to Increase Your OT Cybersecurity Defenses & Reduce Your Risk With critical infrastructure around the world under increasing threat from cyber attacks, now is the time to take more action but where should you start?  This session walks thru seven actions that can be taken now to help operators increases their cyber defenses and reduce the threats of a cyber attack.   The seven actions are based on Honeywell’s experience supporting 1000’s of companies around the world with OT cybersecurity solutions. Now more than ever, oil and gas critical infrastructure is increasingly targeted for cyber-attacks.  An effective operational technology (OT) cybersecurity strategy needs to be put in place to do more to detect and mitigate the threats early.  In this presentation, we’ll discuss the challenges of OT cybersecurity threat detection and best practices to drive resilience.
Speakers

Pranav Bhoptkar MEA Cybersecurity Director, Honeywell

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Securing data in a hybrid world
The growing volume of data, spread across different environments creates more and more threats. It’s essential to trust your information system. How to be sure regarding confidential handling of sensitive information, or industrial or commercial secrets and keep your client, partner and shareholder confidence? How to deal with new regulations and European directives on privacy data protection? Atos, through its cyber security solutions, is your expert in security for all your data protection regardless its location.
Speakers

Syed Ashfak Ahmed Regional Manager - Cyber Products ATOS

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 If Phishing is what you worry the most, Transform End User Behavior   Despite having the best of the breed technology controls, organizations often find themselves on the verge of losing money, brand reputation & data loss primarily due to phishing attacks. In this session, Syed Abid Ali, Co-Founder & CCO, PhishRod shares why Phishing continues to be the biggest challenge, why only technology cannot stop phishing attacks and what steps organizations can do to transform end user behavior.
Speakers

Syed Abid Ali Co-Founder & Chief Commercial Officer of PhishRod

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Combating Cyber Threats in combination with Service Automation. This presentation is about cyber security challenges faced due to lack of resources and how automation can help to overcome them.
X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Mobility Security 
Speakers

Brian Egenrieder Veteran sales strategist and executive leader

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Shrinking the Attack Surface from Ransomware Threats
Speakers

MURALIDHARAN VELLAT DIVISION MANAGER, Bulwark Technologies

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Defending your business using Automated SecOps and Compliance SecOps helps to integrate security management within the core framework of enterprise operations and enables enterprises to move on from treating security and compliance as peripheral guardians. Explore how to deploy agile automation technologies to boost SecOps and Compliance governance, implement sound data management solutions to prevent business risks and avoid expensive penalties.
X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 LATEST TRENDS IN SOLAR POWER GENERATION 
X Labs   Hall 6 Opening Remarks by Moderator Hall 6
Speakers

Laura Buckwell Former News Anchor, Event Host & MC

X Labs   Hall 6 Opening Remarks by Moderator X LABS STAGE - Hall 6
Speakers

Smith Gonsalves Director & Principal Consultant, CyberSmithSECURE

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Identity – The New Perimeter 
Speakers

Nicolai Solling Chief Technology Officer, Help AG

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Rethinking OT/IoT Security to Mitigate Cyberthreats Cybersecurity threats are always evolving, and today we’re seeing a new wave of advanced attacks specifically targeting IoT devices used in enterprise environments as well as operational technology (OT) devices used in industrial systems and critical infrastructure (like ICS/SCADA). These types of devices are often unpatched, misconfigured, and unmonitored, making them the ideal targets for attackers. To address these risks, join us to know more on Microsoft Defender for IoT and the unified XDR & SIEM advanced security analytics platform to tackle and address IT/OT/IoT security risks and challenges.
Speakers

Hesham Saad Sr. Regional Cybersecurity Technical Specialist, Microsoft

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Modernizing Identity Security Framework  Identity Governance and Access Management is a framework that connects and unifies diverse technologies with departmental islands. This session will help Organizations in strengthening their cybersecurity posture by protecting their Workforce identities, Privileged Identities, and Encryption keys of credentials management systems , such as vault.  
Speakers

Prasanth Prasad Business Unit Head Spire Solutions

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Complexity is the Enemy of Security - How Data Governance and Privacy are key Element of Cybersecurity The modern data stack consists of cloud data warehouses, data lakes and adjacent patterns such as the lakehouse, across a complex hybrid or multi-cloud environment. This has given data teams increased agility and the ability to leverage major amounts of data. At the same time, new data privacy legislation and the impact of major cybersecurity breaches has led to the call for responsible data use, requiring new approaches to data privacy and security. Organizations that can use data responsibly to accelerate innovation and protect the business will be at a significant advantage over their competitors.
Speakers

Tausif Sayyed Head, Data BU, Spire Solutions

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Emerging 2022 Intelligence Trends Across the Middle-East
Secure your world with intelligence by enhancing the capability within your organization.
What are some of the key threat and attack vectors for organizations in the Middle East that should be on your radar in 2022? This session will provide a greater understanding on how the broader application of intelligence will enable your organization to better defend against your adversaries. We will also share insights on how you can integrate intelligence into workflows whilst automating your internal processes.
Speakers

Jason Steer Director of EMEA presales, Recorded Future

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Intergrated Communication Platform "We are in an age of exponential innovation growth, and this applies to our daily lives as well as public safety and security innovation. The convergence of Audio, Video and Data into an integrated communication platform for command and control communication brings many collaboration and efficiency benefits in addition to being able to provide real time intelligence during dispatching."  
Speakers

Nadim Abdulrahim Global Government Industry Expert - Huawei Enterprise Business Group

X Labs   -Public Cyber Awareness Hall 6 Opening Remarks by Moderator X LABS STAGE - Hall 6
Speakers

Syed Abdul Qadir Executive Director, Technology Consulting & Cyber Risk Assurance, PwC, Pakistan

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 How to become Ransomware ready ? The increase in Ransomware in 2021 has been a focus for security teams in all industries and organizations of all sizes. But it isn’t inevitable. By continuously validating controls, passwords, configurations and the security stack as a whole, there is a way for organizations to ensure they are one step ahead. Join Pentera Head of Technical Channel Enablement, Sion Retzkin as he reviews an exploit-centric approach to becoming Ransomware ready. Allowing teams to prioritize remediation based on how real ransomware strains such as Maze and REvil could potentially impact the business. 
Speakers

Sion Retzkin Head of Technical Channel Enablement EMEA & APAC, Pentera

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Mobile App Security Testing Techniques and Tools Enterprises may use mobile application security tools to create dependable apps that are scalable and available across numerous platforms. In this session, we will evaluate the existing mobile application trends and take a look at some of the most promising mobile app security testing tools. 
Speakers

Harshit Agarwal Co-founder & Chief Executive Officer, Appknox

X Labs   -Public Cyber Awareness Hall 6 The Issues of Multifactor Authentication X LABS STAGE - Hall 6 The session will discuss the Issues of Multifactor Authentication and how Fraud Attempting to steal the OTP/ MFA - Based on a real case scenario.

• What is Multi- factor Authentication?
• Why do we need Multi- factor Authentication?
• Fraud Attempting to steal the OTP/ MFA
• General Security Best Practices
Speakers

1st L.T. Rashed Lootah Dubai Police

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 What You Need to Know RIGHT NOW about Securing Modern Application Development 
Speakers

Nuno Oliveira Software Development Group Manager, Checkmarx

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 TLStorm - 3 Vulnerabilities, Millions of infected devices  Modern IOT devices are using all sorts of different management interfaces - local network, physical connection and in some cases, cloud control.These interfaces open up a wide attack surface and puts a heavy burden on the security aspect of it  -- since any bug found in it can allow an attacker to abuse the connected device, and potentially breach to any network where such devices are installed. With this notion in mind, we decided to research a widely popular Cloud-connected UPS device, and have discovered critical vulnerabilities in it’s TLS implementation that can lead to remote-code-execution, in a pre-authentication stage.
Exploiting these vulnerabilities could allow attackers to remotely take over the power lifeline of impacted organizations directly from the Internet. Analysis of the discovered vulnerabilities uncovered that they stem from improper use of a 3rd party TLS library, used by a variety of industrial controllers, networking equipment and other Cloud-connected devices. We will conclude our talk by sharing analysis of vulnerable applications that were found to be affected, and outline takeaways on the security of embedded TLS implementations.
Speakers

Barak Hadad Head of Research, Armis Labs

X Labs   -PUBLIC CYBER AWARENESS Hall 6 Audience Q&A X LABS STAGE - Hall 6
X Labs   -PUBLIC CYBER AWARENESS Hall 6 English Session: New cybersecurity threats for public X LABS STAGE - Hall 6
Speakers

Ahmed Al Zarouni VP & Head of IT Department, Investment Corporation of Dubai

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Beyond encryption - Breaking Boundaries: Why protecting data in new ways is essential in a fully connected world and Zero Trust principles should not only focus on authentication.
Speakers

Karim Hosny Attia CEO & Founder, UBIRCH Cyber Security LLC

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 The Evolution of Software Supply Chain Attacks Next-generation cyber attacks, actively targeting open source software projects, have increased 430% year-over-year. Most recently, the Dependency Confusion attack and the Log4j vulnerability.  Malicious hackers are becoming increasingly adept at attacking the underbelly of the Software Supply Chain. To cause the most damage whilst remaining undetected, hackers are rapidly evolving their attack methods. Over the past years, we’ve documented multiple forms of Open Source Software (OSS) Supply Chain attacks including malicious code injection, stealing project credentials, and typo squatting. Join Mitun Zavery as he walks you through how hackers are becoming increasingly successful at breaching Software Supply Chains and what you can do about it. Key takeaways:     A short evolution of software supply chain attacks What companies have learnt the hard way from these attacks How to manage at scale these new malicious attacks Clear, practical actions to implement today to protect your software supply chain  
Speakers

Mitun Zavery Regional Vice President, Sales Engineering EMEA, Sonatype

X Labs   -PUBLIC CYBER AWARENESS Hall 6 Arabic Session: New cybersecurity threats for public X LABS STAGE - Hall 6
Speakers

Ahmed Al Zarouni VP & Head of IT Department, Investment Corporation of Dubai

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 The Application Story - Testing, Monitoring and Securing   If you have ever been responsible for an application and still you were the last to know about an outage and cause of that, you are not alone. We have a story to share with you and practical solutions to UP your application security game.
Speakers

Muhammad Rehan Head, Infrastructure BU, Spire Solutions

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 5 Strategies to Thwart Online Fraud Discover the latest identity verification and KYC strategies to help organisations protect their online channels against remote identity fraud.
Speakers

Mark Reeves Vice President Revenue Operations EMEA, Jumio Corporation

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Cyber Workforce Optimization' Evidencing the role human capabilities play in cyber resilience is a continuous challenge for security teams and boards, something amplified by a complex risk and regulation environment.  Cyber skills development, talent retention, security culture, diversity and even crisis response programs have been left behind by an otherwise data-driven business environment - leaving organizations on the back foot. Join Immersive Labs, to learn how human capabilities can stay relevant to the speed of cyber with Cyber Workforce Optimization.
Speakers

George Mehrej Director of Alliances & Channel - MENA, Immersive Labs

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 OT Incident Response between Planning and Reality
Speakers

Sultan Al-Harbi OT SOC Manager, IT Belt

X Labs   -PUBLIC CYBER AWARENESS Hall 6 Developing a culture of cybersecurity - principles and ways forward X LABS STAGE - Hall 6 A fireside chat with ITU experts, featuring audience participation, on cybersecurity awareness, the role of the public in creating a true cybersecurity culture, looking at country statistics and discussing awareness-raising challenges, ultimately co-creating with the audience a set of Action Points on improving cybersecurity awareness for the general public.
Speakers

Yasmine Idrissi Azzouzi Cybersecurity Program Officer, ITU

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Achieve Enhanced Cloud Security and Protect Against Ransomware Attacks and Data Leakage With digital collaboration skyrocketing, data now goes wherever it’s needed. Cloud apps such as SAP, Workday and Salesforce have increased productivity, but so has the risk your data is exposed to. To tap into this boosted productivity without risking your data, you need to stay in full control. In this session you will learn:

- What is SASE and how to easily deploy it to protect your cloud apps
- How SASE can help address the challenges of Ransomware and Data Breaches
- How Data Loss Prevention (DLP) enables you to stay in control of your data with advanced data protection capabilities
Speakers

Bahaa Hudairi Regional Director

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 s@y g00dby3 to Pa$$words
Are you looking for a way to Improve user experience, Reduce IT overhead and Strengthen security posture? Duo passwordless authentication will be most effective way to help you on this Journey.
Please join us in GISEC to learn more about Cisco Passwordless. 
Speakers

Nizar Wafa Duo Account Executive - MEA, CISCO

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Why are Customers Migrating to a Next-Gen Cloud-Based SIEM Platform?
Speakers

Sheik Abideen Regional Director - MEA, Securonix

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Securing data traffic in Azure deployments In this session we will show how to secure incoming and outgoing traffic from Azure workloads with a simple use case, building on it to include internal segmentation, adding components such as Advance Threat protection and support for SD-WAN and finally obtaining an architecture which mirrors some of the more complex deployments we have seen to date in the Middle East
Speakers

Apollinaire Moreno Public Cloud Sales Lead, Fortinet International Emerging Markets

X Labs   -PUBLIC CYBER AWARENESS Hall 6 Closing Remarks by Moderator X LABS STAGE - Hall 6
X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Business cases for NextGen Data diodes in the government and energy sectors UAE and the Middle East are facing a very large increase of advanced, complex and damaging cyber attacks. Because Cyber Crime pays very well and Cyber Warfare is discreet, attackers have the motivation, the knowledge and the resources to breach the smallest companies to the largest corporations. We need cyber security solutions that are battle tested, able to protect the most sensitive assets and easy to use & to maintain. Our NextGen Data diodes are the right solution offering the best protection that you expect from a data diode without the pain and the headaches you may have experienced with the older generation. We will present the technology and the business cases where our NextGen Data Diode will offer the best security for the minimum level of effort.  
Speakers

Gilles LORIDON CEO, GLOBAL SECURITY NETWORK

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Security First for Cloud Transformation
Speakers

Sunil Peer Regional CDTO - Cloud BU, Huawei Middle East

X Labs   -PUBLIC CYBER AWARENESS Hall 6 CLOSE X LABS STAGE - Hall 6
X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Seven Actions to Take Now to Increase Your OT Cybersecurity Defenses & Reduce Your Risk With critical infrastructure around the world under increasing threat from cyber attacks, now is the time to take more action but where should you start?  This session walks thru seven actions that can be taken now to help operators increases their cyber defenses and reduce the threats of a cyber attack.   The seven actions are based on Honeywell’s experience supporting 1000’s of companies around the world with OT cybersecurity solutions. Now more than ever, oil and gas critical infrastructure is increasingly targeted for cyber-attacks.  An effective operational technology (OT) cybersecurity strategy needs to be put in place to do more to detect and mitigate the threats early.  In this presentation, we’ll discuss the challenges of OT cybersecurity threat detection and best practices to drive resilience.
Speakers

Pranav Bhoptkar MEA Cybersecurity Director, Honeywell

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Securing data in a hybrid world
The growing volume of data, spread across different environments creates more and more threats. It’s essential to trust your information system. How to be sure regarding confidential handling of sensitive information, or industrial or commercial secrets and keep your client, partner and shareholder confidence? How to deal with new regulations and European directives on privacy data protection? Atos, through its cyber security solutions, is your expert in security for all your data protection regardless its location.
Speakers

Syed Ashfak Ahmed Regional Manager - Cyber Products ATOS

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 If Phishing is what you worry the most, Transform End User Behavior   Despite having the best of the breed technology controls, organizations often find themselves on the verge of losing money, brand reputation & data loss primarily due to phishing attacks. In this session, Syed Abid Ali, Co-Founder & CCO, PhishRod shares why Phishing continues to be the biggest challenge, why only technology cannot stop phishing attacks and what steps organizations can do to transform end user behavior.
Speakers

Syed Abid Ali Co-Founder & Chief Commercial Officer of PhishRod

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Combating Cyber Threats in combination with Service Automation. This presentation is about cyber security challenges faced due to lack of resources and how automation can help to overcome them.
X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Mobility Security 
Speakers

Brian Egenrieder Veteran sales strategist and executive leader

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Shrinking the Attack Surface from Ransomware Threats
Speakers

MURALIDHARAN VELLAT DIVISION MANAGER, Bulwark Technologies

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Defending your business using Automated SecOps and Compliance SecOps helps to integrate security management within the core framework of enterprise operations and enables enterprises to move on from treating security and compliance as peripheral guardians. Explore how to deploy agile automation technologies to boost SecOps and Compliance governance, implement sound data management solutions to prevent business risks and avoid expensive penalties.
X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 LATEST TRENDS IN SOLAR POWER GENERATION 
X Labs   Hall 6 Opening Remarks by Moderator Hall 6
Speakers

Laura Buckwell Former News Anchor, Event Host & MC

X Labs   Hall 6 Opening Remarks by Moderator X LABS STAGE - Hall 6
Speakers

Smith Gonsalves Director & Principal Consultant, CyberSmithSECURE

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Identity – The New Perimeter 
Speakers

Nicolai Solling Chief Technology Officer, Help AG

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Rethinking OT/IoT Security to Mitigate Cyberthreats Cybersecurity threats are always evolving, and today we’re seeing a new wave of advanced attacks specifically targeting IoT devices used in enterprise environments as well as operational technology (OT) devices used in industrial systems and critical infrastructure (like ICS/SCADA). These types of devices are often unpatched, misconfigured, and unmonitored, making them the ideal targets for attackers. To address these risks, join us to know more on Microsoft Defender for IoT and the unified XDR & SIEM advanced security analytics platform to tackle and address IT/OT/IoT security risks and challenges.
Speakers

Hesham Saad Sr. Regional Cybersecurity Technical Specialist, Microsoft

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Modernizing Identity Security Framework  Identity Governance and Access Management is a framework that connects and unifies diverse technologies with departmental islands. This session will help Organizations in strengthening their cybersecurity posture by protecting their Workforce identities, Privileged Identities, and Encryption keys of credentials management systems , such as vault.  
Speakers

Prasanth Prasad Business Unit Head Spire Solutions

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Complexity is the Enemy of Security - How Data Governance and Privacy are key Element of Cybersecurity The modern data stack consists of cloud data warehouses, data lakes and adjacent patterns such as the lakehouse, across a complex hybrid or multi-cloud environment. This has given data teams increased agility and the ability to leverage major amounts of data. At the same time, new data privacy legislation and the impact of major cybersecurity breaches has led to the call for responsible data use, requiring new approaches to data privacy and security. Organizations that can use data responsibly to accelerate innovation and protect the business will be at a significant advantage over their competitors.
Speakers

Tausif Sayyed Head, Data BU, Spire Solutions

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Emerging 2022 Intelligence Trends Across the Middle-East
Secure your world with intelligence by enhancing the capability within your organization.
What are some of the key threat and attack vectors for organizations in the Middle East that should be on your radar in 2022? This session will provide a greater understanding on how the broader application of intelligence will enable your organization to better defend against your adversaries. We will also share insights on how you can integrate intelligence into workflows whilst automating your internal processes.
Speakers

Jason Steer Director of EMEA presales, Recorded Future

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Intergrated Communication Platform "We are in an age of exponential innovation growth, and this applies to our daily lives as well as public safety and security innovation. The convergence of Audio, Video and Data into an integrated communication platform for command and control communication brings many collaboration and efficiency benefits in addition to being able to provide real time intelligence during dispatching."  
Speakers

Nadim Abdulrahim Global Government Industry Expert - Huawei Enterprise Business Group

X Labs   -Public Cyber Awareness Hall 6 Opening Remarks by Moderator X LABS STAGE - Hall 6
Speakers

Syed Abdul Qadir Executive Director, Technology Consulting & Cyber Risk Assurance, PwC, Pakistan

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 How to become Ransomware ready ? The increase in Ransomware in 2021 has been a focus for security teams in all industries and organizations of all sizes. But it isn’t inevitable. By continuously validating controls, passwords, configurations and the security stack as a whole, there is a way for organizations to ensure they are one step ahead. Join Pentera Head of Technical Channel Enablement, Sion Retzkin as he reviews an exploit-centric approach to becoming Ransomware ready. Allowing teams to prioritize remediation based on how real ransomware strains such as Maze and REvil could potentially impact the business. 
Speakers

Sion Retzkin Head of Technical Channel Enablement EMEA & APAC, Pentera

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Mobile App Security Testing Techniques and Tools Enterprises may use mobile application security tools to create dependable apps that are scalable and available across numerous platforms. In this session, we will evaluate the existing mobile application trends and take a look at some of the most promising mobile app security testing tools. 
Speakers

Harshit Agarwal Co-founder & Chief Executive Officer, Appknox

X Labs   -Public Cyber Awareness Hall 6 The Issues of Multifactor Authentication X LABS STAGE - Hall 6 The session will discuss the Issues of Multifactor Authentication and how Fraud Attempting to steal the OTP/ MFA - Based on a real case scenario.

• What is Multi- factor Authentication?
• Why do we need Multi- factor Authentication?
• Fraud Attempting to steal the OTP/ MFA
• General Security Best Practices
Speakers

1st L.T. Rashed Lootah Dubai Police

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 What You Need to Know RIGHT NOW about Securing Modern Application Development 
Speakers

Nuno Oliveira Software Development Group Manager, Checkmarx

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 TLStorm - 3 Vulnerabilities, Millions of infected devices  Modern IOT devices are using all sorts of different management interfaces - local network, physical connection and in some cases, cloud control.These interfaces open up a wide attack surface and puts a heavy burden on the security aspect of it  -- since any bug found in it can allow an attacker to abuse the connected device, and potentially breach to any network where such devices are installed. With this notion in mind, we decided to research a widely popular Cloud-connected UPS device, and have discovered critical vulnerabilities in it’s TLS implementation that can lead to remote-code-execution, in a pre-authentication stage.
Exploiting these vulnerabilities could allow attackers to remotely take over the power lifeline of impacted organizations directly from the Internet. Analysis of the discovered vulnerabilities uncovered that they stem from improper use of a 3rd party TLS library, used by a variety of industrial controllers, networking equipment and other Cloud-connected devices. We will conclude our talk by sharing analysis of vulnerable applications that were found to be affected, and outline takeaways on the security of embedded TLS implementations.
Speakers

Barak Hadad Head of Research, Armis Labs

X Labs   -PUBLIC CYBER AWARENESS Hall 6 Audience Q&A X LABS STAGE - Hall 6
X Labs   -PUBLIC CYBER AWARENESS Hall 6 English Session: New cybersecurity threats for public X LABS STAGE - Hall 6
Speakers

Ahmed Al Zarouni VP & Head of IT Department, Investment Corporation of Dubai

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Beyond encryption - Breaking Boundaries: Why protecting data in new ways is essential in a fully connected world and Zero Trust principles should not only focus on authentication.
Speakers

Karim Hosny Attia CEO & Founder, UBIRCH Cyber Security LLC

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 The Evolution of Software Supply Chain Attacks Next-generation cyber attacks, actively targeting open source software projects, have increased 430% year-over-year. Most recently, the Dependency Confusion attack and the Log4j vulnerability.  Malicious hackers are becoming increasingly adept at attacking the underbelly of the Software Supply Chain. To cause the most damage whilst remaining undetected, hackers are rapidly evolving their attack methods. Over the past years, we’ve documented multiple forms of Open Source Software (OSS) Supply Chain attacks including malicious code injection, stealing project credentials, and typo squatting. Join Mitun Zavery as he walks you through how hackers are becoming increasingly successful at breaching Software Supply Chains and what you can do about it. Key takeaways:     A short evolution of software supply chain attacks What companies have learnt the hard way from these attacks How to manage at scale these new malicious attacks Clear, practical actions to implement today to protect your software supply chain  
Speakers

Mitun Zavery Regional Vice President, Sales Engineering EMEA, Sonatype

X Labs   -PUBLIC CYBER AWARENESS Hall 6 Arabic Session: New cybersecurity threats for public X LABS STAGE - Hall 6
Speakers

Ahmed Al Zarouni VP & Head of IT Department, Investment Corporation of Dubai

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 The Application Story - Testing, Monitoring and Securing   If you have ever been responsible for an application and still you were the last to know about an outage and cause of that, you are not alone. We have a story to share with you and practical solutions to UP your application security game.
Speakers

Muhammad Rehan Head, Infrastructure BU, Spire Solutions

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 5 Strategies to Thwart Online Fraud Discover the latest identity verification and KYC strategies to help organisations protect their online channels against remote identity fraud.
Speakers

Mark Reeves Vice President Revenue Operations EMEA, Jumio Corporation

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Cyber Workforce Optimization' Evidencing the role human capabilities play in cyber resilience is a continuous challenge for security teams and boards, something amplified by a complex risk and regulation environment.  Cyber skills development, talent retention, security culture, diversity and even crisis response programs have been left behind by an otherwise data-driven business environment - leaving organizations on the back foot. Join Immersive Labs, to learn how human capabilities can stay relevant to the speed of cyber with Cyber Workforce Optimization.
Speakers

George Mehrej Director of Alliances & Channel - MENA, Immersive Labs

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 OT Incident Response between Planning and Reality
Speakers

Sultan Al-Harbi OT SOC Manager, IT Belt

X Labs   -PUBLIC CYBER AWARENESS Hall 6 Developing a culture of cybersecurity - principles and ways forward X LABS STAGE - Hall 6 A fireside chat with ITU experts, featuring audience participation, on cybersecurity awareness, the role of the public in creating a true cybersecurity culture, looking at country statistics and discussing awareness-raising challenges, ultimately co-creating with the audience a set of Action Points on improving cybersecurity awareness for the general public.
Speakers

Yasmine Idrissi Azzouzi Cybersecurity Program Officer, ITU

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Achieve Enhanced Cloud Security and Protect Against Ransomware Attacks and Data Leakage With digital collaboration skyrocketing, data now goes wherever it’s needed. Cloud apps such as SAP, Workday and Salesforce have increased productivity, but so has the risk your data is exposed to. To tap into this boosted productivity without risking your data, you need to stay in full control. In this session you will learn:

- What is SASE and how to easily deploy it to protect your cloud apps
- How SASE can help address the challenges of Ransomware and Data Breaches
- How Data Loss Prevention (DLP) enables you to stay in control of your data with advanced data protection capabilities
Speakers

Bahaa Hudairi Regional Director

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 s@y g00dby3 to Pa$$words
Are you looking for a way to Improve user experience, Reduce IT overhead and Strengthen security posture? Duo passwordless authentication will be most effective way to help you on this Journey.
Please join us in GISEC to learn more about Cisco Passwordless. 
Speakers

Nizar Wafa Duo Account Executive - MEA, CISCO

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Why are Customers Migrating to a Next-Gen Cloud-Based SIEM Platform?
Speakers

Sheik Abideen Regional Director - MEA, Securonix

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Securing data traffic in Azure deployments In this session we will show how to secure incoming and outgoing traffic from Azure workloads with a simple use case, building on it to include internal segmentation, adding components such as Advance Threat protection and support for SD-WAN and finally obtaining an architecture which mirrors some of the more complex deployments we have seen to date in the Middle East
Speakers

Apollinaire Moreno Public Cloud Sales Lead, Fortinet International Emerging Markets

X Labs   -PUBLIC CYBER AWARENESS Hall 6 Closing Remarks by Moderator X LABS STAGE - Hall 6
X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Business cases for NextGen Data diodes in the government and energy sectors UAE and the Middle East are facing a very large increase of advanced, complex and damaging cyber attacks. Because Cyber Crime pays very well and Cyber Warfare is discreet, attackers have the motivation, the knowledge and the resources to breach the smallest companies to the largest corporations. We need cyber security solutions that are battle tested, able to protect the most sensitive assets and easy to use & to maintain. Our NextGen Data diodes are the right solution offering the best protection that you expect from a data diode without the pain and the headaches you may have experienced with the older generation. We will present the technology and the business cases where our NextGen Data Diode will offer the best security for the minimum level of effort.  
Speakers

Gilles LORIDON CEO, GLOBAL SECURITY NETWORK

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Security First for Cloud Transformation
Speakers

Sunil Peer Regional CDTO - Cloud BU, Huawei Middle East

X Labs   -PUBLIC CYBER AWARENESS Hall 6 CLOSE X LABS STAGE - Hall 6
X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Seven Actions to Take Now to Increase Your OT Cybersecurity Defenses & Reduce Your Risk With critical infrastructure around the world under increasing threat from cyber attacks, now is the time to take more action but where should you start?  This session walks thru seven actions that can be taken now to help operators increases their cyber defenses and reduce the threats of a cyber attack.   The seven actions are based on Honeywell’s experience supporting 1000’s of companies around the world with OT cybersecurity solutions. Now more than ever, oil and gas critical infrastructure is increasingly targeted for cyber-attacks.  An effective operational technology (OT) cybersecurity strategy needs to be put in place to do more to detect and mitigate the threats early.  In this presentation, we’ll discuss the challenges of OT cybersecurity threat detection and best practices to drive resilience.
Speakers

Pranav Bhoptkar MEA Cybersecurity Director, Honeywell

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Securing data in a hybrid world
The growing volume of data, spread across different environments creates more and more threats. It’s essential to trust your information system. How to be sure regarding confidential handling of sensitive information, or industrial or commercial secrets and keep your client, partner and shareholder confidence? How to deal with new regulations and European directives on privacy data protection? Atos, through its cyber security solutions, is your expert in security for all your data protection regardless its location.
Speakers

Syed Ashfak Ahmed Regional Manager - Cyber Products ATOS

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 If Phishing is what you worry the most, Transform End User Behavior   Despite having the best of the breed technology controls, organizations often find themselves on the verge of losing money, brand reputation & data loss primarily due to phishing attacks. In this session, Syed Abid Ali, Co-Founder & CCO, PhishRod shares why Phishing continues to be the biggest challenge, why only technology cannot stop phishing attacks and what steps organizations can do to transform end user behavior.
Speakers

Syed Abid Ali Co-Founder & Chief Commercial Officer of PhishRod

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Combating Cyber Threats in combination with Service Automation. This presentation is about cyber security challenges faced due to lack of resources and how automation can help to overcome them.
X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Mobility Security 
Speakers

Brian Egenrieder Veteran sales strategist and executive leader

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Shrinking the Attack Surface from Ransomware Threats
Speakers

MURALIDHARAN VELLAT DIVISION MANAGER, Bulwark Technologies

X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 Defending your business using Automated SecOps and Compliance SecOps helps to integrate security management within the core framework of enterprise operations and enables enterprises to move on from treating security and compliance as peripheral guardians. Explore how to deploy agile automation technologies to boost SecOps and Compliance governance, implement sound data management solutions to prevent business risks and avoid expensive penalties.
X Labs   Hall 6 Presentation X LABS STAGE - Hall 6 LATEST TRENDS IN SOLAR POWER GENERATION