28.11.2014 Views

Chief Information Security Officer Middle East 2009 - MIS Training

Chief Information Security Officer Middle East 2009 - MIS Training

Chief Information Security Officer Middle East 2009 - MIS Training

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ALIGNING BUSINESS AND IT STRATEGIES FOR THE MIDDLE EAST<br />

<strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> <strong>Middle</strong> <strong>East</strong> <strong>2009</strong><br />

Executive Summit & Roundtable<br />

9–11 November <strong>2009</strong>, Intercontinental Hotel, Muscat, Sultanate of Oman<br />

Under the Patronage of ITA<br />

Dear Colleague,<br />

<strong>MIS</strong> <strong>Training</strong> Institute is delighted to announce the 2nd Annual CISO Executive Summit & Roundtable <strong>Middle</strong> <strong>East</strong> <strong>2009</strong>! A new international speaker panel of information security directors & experts will share<br />

real life experiences & views on how they are approaching key security strategies & current threats & responses. The new programme has been designed to inspire & reinvigorate your information security<br />

strategy with a programme dedicated to the upper echelon of the information security profession – the CISO or Head of <strong>Information</strong> <strong>Security</strong>. The interactive CISO Roundtable on the 11 November will provide the<br />

ideal forum to benchmark your security strategy against peers & international thought leaders – held under The Chatham House Rule. The unique learning format – case studies, typically inaccessible keynote<br />

speakers, panel discussions, thought leadership exercises, roundtables – makes this the ideal opportunity to innovate approaches to information security strategy amongst like-minded peers.<br />

Agenda at a glance<br />

Day One Integrating information security into the core business strategy &<br />

infrastructure to deliver pragmatic & value-added security<br />

Day Two <strong>Information</strong> security risk management<br />

Stream A: The threat within / Stream B: The external threat horizon: analysis &<br />

counter-measures<br />

Day Three CISO Roundtable <strong>Middle</strong> <strong>East</strong> <strong>2009</strong>: Delivering Measurable Results<br />

During Tougher Times<br />

Reserve Your Place by 1st October <strong>2009</strong><br />

& Receive 3 FREE Books on <strong>Information</strong> <strong>Security</strong>,<br />

Authored by Speakers at the CISO Summit <strong>Middle</strong> <strong>East</strong> <strong>2009</strong>!<br />

• “Managing the Human Factor in <strong>Information</strong> <strong>Security</strong>: How to Win Over Staff and<br />

Influence Business Managers”, by David Lacey<br />

• “Honeypots: Tracking Hackers” by Lance Spitzner<br />

• “Crossing the Executive Digital Divide, The Course Book” by Eduardo Gelbstein<br />

5 more reasons to attend<br />

• Hear a candid mix of how heads of information security are actually responding to current threats &<br />

responses & what they would like to do in an ideal world<br />

• Meet & build trust based relationships with peers & an international panel of security experts from across<br />

the <strong>Middle</strong> <strong>East</strong>, Europe, The Americas, & Asia<br />

• Bring back proven information security strategies to reinvigorate & hone a top information security team<br />

• Stay one step ahead of rapidly changing business environments & emerging threats<br />

• Don’t miss the interactive CISO Roundtable <strong>Middle</strong> <strong>East</strong> <strong>2009</strong> - the ideal place to meet global security industry<br />

leaders & network with professionals who face a similar set of challenges as you<br />

Thank You<br />

Sincere thanks to the world-leading security experts, solution providers,<br />

associations, & delegates within the information security community who have<br />

played a major role in contributing to the programme. A special thank you goes<br />

out to all the speakers for their time & contribution, & also to the supporting<br />

organisations. <strong>MIS</strong> <strong>Training</strong> Institute wishes you an enjoyable & productive time<br />

at the summit, & looks forward to meeting you in Muscat in November.<br />

Sponsorship & Exhibition Opportunities at the 2nd Annual CISO Executive Summit <strong>Middle</strong> <strong>East</strong> <strong>2009</strong><br />

Attendees at <strong>MIS</strong> <strong>Training</strong>’s CISO Executive Summit <strong>Middle</strong> <strong>East</strong> <strong>2009</strong> are senior decision makers within the information security community – from across business & governmental sectors from across the<br />

<strong>Middle</strong> <strong>East</strong> region. This gathering of normally difficult to reach executives is an excellent platform for companies to influence with brand profiling & to ensure market position. Given <strong>MIS</strong>’ background in<br />

training, delegates typically comprise 95% ‘practitioners’ (e.g. heads of information security/ CISOs, CIOs, CTOs, IT security managers & system security professionals). All sponsorship packages include: a<br />

number of free client places, table top exhibition & speaking options. For more information, please contact: Sara Hook, Conference Director, Email: shook@mistieurope.com Tel: +44 (0)20 7779 7200<br />

Extend your stay in Muscat by 1-day & attend (ISC) 2 ’s adjoining SecureMuscat Conference, Sunday 8th November <strong>2009</strong>!<br />

(ISC) 2 kindly invites you attend its unique event, SecureMuscat Conference, taking place at the Intercontinental Muscat the day prior to the 2nd Annual CISO Executive Summit & Roundtable <strong>Middle</strong> <strong>East</strong> <strong>2009</strong>.<br />

SecureMuscat Conference takes place on Sunday 8th November <strong>2009</strong> & (ISC)2 kindly offers all <strong>MIS</strong> <strong>Training</strong> Institute attendees a special discounted rate of 40% = $333 off the standard published fee of $555!<br />

Under the Patronage of ITA<br />

ITA / e.Oman - The <strong>Information</strong> Technology Authority (ITA), established by Royal Decree No. 52/2006 issued on 31 May 2006, is an independent national authority with financial and administrative independence. As an independent body, the ITA is<br />

chiefly responsible for implementing the Digital Oman strategy – e.oman for short, promoting <strong>Information</strong> Communications Technologies (ICTs), and supervising all infrastructure projects to enable delivery of electronic services under the<br />

framework of Digital Oman.<br />

ITA serves as a competency centre on best practices in eGovernance and in harnessing <strong>Information</strong> and Communication Technologies (ICT), offering efficient and timely services, integrating processes and improving efficiency in service delivery.<br />

ITA undertakes projects to increase technology penetration and empower its people with required digital literacy and higher levels of competence through training and innovation centres.<br />

ITA is solely responsible for driving the Digital Oman Strategy which was approved on 30 November 2002, conceptualized from a future vision of the Omani economy in 2020 AD. e.oman comprises a wide range of the initiatives and services that<br />

are designed and created to electronically transform the government, improve the efficiency of government services, enhance the activities of businesses and empower individuals with skills and knowledge in order to meet society’s needs and<br />

expectations and to direct Oman towards becoming a knowledge-based economy.<br />

Lead CISO Roundtable Sponsor<br />

NetWitness - NetWitness Corporation provides patented, next generation network & host-based security solutions that help public & private organizations discover, prioritize & remediate complex IT risks. Users of NetWitness NextGen & InSight<br />

solutions concurrently solve a wide variety of information security problems including: advanced persistent threat management; sensitive data discovery & data leakage protection; malware activity detection; insider threat management; policy &<br />

controls verification & e-discovery. Originally developed for the US Intelligence Community, NetWitness has evolved to provide enterprises around the world with breakthrough methods of network content analysis & host-based risk discovery &<br />

prioritization. NetWitness customers include Defense, National Law Enforcement & Intelligence Agencies, Top US & European Banks, Critical Infrastructure, & Global 1000 organizations. NetWitness has offices in the U.S. & the U.K. & partners<br />

throughout Europe, the <strong>Middle</strong> <strong>East</strong>, South America & Asia. For more information & to try our software visit: www.netwitness.com<br />

Lunch Sponsors<br />

Qualys - Qualys, Inc. is the leading provider of on demand IT security risk and compliance management solutions – delivered as a service. Qualys’ Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing<br />

customers an immediate and continuous view of their security and compliance postures. The QualysGuard® service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100 and performs more than 200<br />

million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers and consulting organizations<br />

including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, SecureWorks, Symantec, Tata Communications, TELUS and VeriSign. For more information, please visit: www.qualys.com<br />

Oman, Jeddah, Hyderabad,<br />

Mumbai & Chennai Chapters<br />

Crypto AG – To Remain Sovereign- Crypto AG is your ideal partner for the efficient and secure handling of information, no matter what information or communication network you use. As a legally and economically independent Swiss company, we are<br />

neither subject to export restrictions on powerful encryption technology nor governmental supervision. We have developed, manufactured and implemented customised security solutions for over 55 years. Our highly developed <strong>Security</strong> Architecture helps<br />

support your organisation’s security policy. The package we offer features the latest technology solutions and comprehensive services; our efficient project management creates user-friendly systems in your organisation – with ciphering taking place in<br />

the background. Our support services guarantee autonomous operation and high availability over the system’s entire lifetime, whatever the user environment. You too can rely on the expertise and capabilities of Crypto AG – just like governments,<br />

ministries, diplomatic services, police, border control and armed forces in over 130 countries.<br />

Cocktail Sponsor<br />

e-Cop - e-Cop is the trusted partner for managed risk and information security services to enterprises, and governments. It offers a comprehensive suite of services to identify and deal effectively with threats and risks related to information security<br />

management. These services include Managed <strong>Security</strong> Services, Technology Consulting Services, and Professional <strong>Security</strong> Services. Widely hailed as an innovative and leading information security industry bluechip , e-Cop operates and<br />

maintains several <strong>Security</strong> Operations Centres (SOC) around the world. All of which are ISO/IEC 27001 certified and powered by its highly advanced, award-winning security event correlation technology developed internally by its R&D team. e-<br />

Cop’s sedulous commitment to deliver a multi-pronged integrated suite of Professional <strong>Security</strong> Services and Technology Consultancy Services has earned itself numerous accolades as the industry’s leader. Our clients tell us that they value the<br />

vision, leadership, and customised services and solutions that we bring to our projects. Entrusting their information security management needs in the hands of e-Cop allows them to focus on what they do best and respond to the market faster.<br />

Gigabyte Exhibition Sponsor<br />

Omnisec - Omnisec AG, an independent Swiss company, is a leading provider of information risk management services and ICT security solutions. They address the exacting demands for confidentiality set by government agencies, military<br />

organizations, financial service institutions and industrial enterprises worldwide. With more than 60 years of experience, we have become famous for our secure collaboration, telephone, fax, multi-link, IP-VPN and security management solutions.<br />

More recently we have made a name for ourselves in the complex areas of secure radio and satellite communications. All Omnisec's products are based on our proprietary OmnicryptTM <strong>Security</strong> Architecture, including 256-bit symmetric-key<br />

encryption methods. Omnisec’s extensive consulting, system engineering, project management and education services empower our customers to manage their complex ICT systems securely. Where a standard solution is inadequate, we are<br />

ready to work together with our customer's specialists to develop an integrated security solution tailored to their specific requirements.<br />

Oman Partner<br />

InfoShield LLC. - InfoShield LLC is the leading security solutions provider based in Muscat. It provides a wide range of information security services from risk assessment to implementation of security solutions to protect your information.<br />

InfoShield offers the broadest range of professional, effective & affordable security awareness products & services. An active security awareness program can greatly reduce many risks which cannot be addressed through security software<br />

and hardware devices. In these cases, it's the human element of security that must be addressed which is exactly what our products are designed to do. By implementing InfoShield products you can immediately begin to increase the level of<br />

security awareness in your organization. <strong>Training</strong> - InfoShield offers world class & up to date <strong>Information</strong> <strong>Security</strong> <strong>Training</strong>. Our educational team is composed of certified instructors that are proficient in the field of information security backed<br />

by several years of experience in handling the security products, thus adding real world knowledge & experience. Consultancy - InfoShield's <strong>Security</strong> Consulting Services help companies understand information security requirements, laws &<br />

regulations, security vulnerabilities, attacks response, reduce risk, & meet the security compliance requirements of your business & industry. <strong>Security</strong> tools - InfoShield provide world leading information security tools to satisfy the various<br />

security needs. Mainly we focus on data & endpoint security solutions. Our main goal is to offer effective security solutions that are easy to implement & maintain while providing high returns on investment. www.information-shield.com<br />

Association Partners<br />

<strong>Information</strong> <strong>Security</strong> Forum - ISF is recognised as the world’s leading <strong>Information</strong> <strong>Security</strong> organisation & independent industry authority. Through its members, the ISF brings together & harnesses the knowledge & experience of over 300<br />

major international business & government agencies to meet the increasing demand for practical, business-driven solutions to information security & risk management problems. The <strong>Information</strong> <strong>Security</strong> Forum is an independent, not-for-profit<br />

organisation, established in 1989. It is owned & governed by its members & managed by a professional team. www.securityforum.org<br />

ISACA – Oman, Jeddah, Hyderabad, Mumbai & Chennai Chapters - ISACA’s membership – more than 65,000 strong worldwide – is characterised by its diversity. Members live & work in more than 140 countries & cover a variety of<br />

professional IT-related positions—to name just a few, IS auditor, consultant, educator, IS security professional, regulator, chief information officer & internal auditor. ISACA has more than 170 chapters established in over 70 countries worldwide,<br />

& those chapters provide members education, resource sharing, advocacy, professional networking & a host of other benefits on a local level. www.isaca.org<br />

ISSA – EMEA & Egypt - The <strong>Information</strong> Systems <strong>Security</strong> Association (ISSA)® is a not-for-profit international organisation of information security professionals & practitioners. It provides education forums, publications & peer interaction<br />

opportunities that enhance the knowledge, skill & professional growth of its members. www.issa.org<br />

(ISC) 2 - The International <strong>Information</strong> Systems <strong>Security</strong> Certification Consortium, Inc. [(ISC)2®] is the internationally recognised Gold Standard for certifying information security professionals. Founded in 1989, (ISC)2 has certified over 54,000<br />

information security professionals in 135 countries. The CISSP, CISSP-ISSEP“, CISSP-ISSAP“& SSCP are among the first information technology credentials to meet the stringent requirements of ANSI/ISO/IEC Standard 17024. (ISC)2® is the<br />

non-profit global leader in educating & certifying information security professionals throughout their careers. www.isc2.org<br />

ASIS International - ASIS International (ASIS) is the largest organisation for security professionals, with more than 35,000 members worldwide. Founded in 1955, ASIS is dedicated to increasing the effectiveness & productivity of security<br />

professionals by developing educational programs & materials that address broad security interests. ASIS also advocates the role & value of the security management profession to business, the media, governmental entities, standardisation<br />

bodies & the public. By publishing the industry's number one magazine - <strong>Security</strong> Management - ASIS leads the way for advanced & improved security performance. www.asisonline.org<br />

The CSO Roundtable of ASIS International - The CSO Roundtable of ASIS International brings together senior security executives from the world's largest & most influential organizations. This by-invitation only organization is dedicated both to<br />

assisting security executives in their careers & to elevating the status of security professionals in the C-suite. Benefits include CSO-only educational & networking opportunities, special sessions at ASIS events, & an annual conference. Contact<br />

Peter Piazza at ppiazza@asisonline.org<br />

Media Partners

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!