12.07.2015 Views

Chief Information Security Officer Middle East - MIS Training

Chief Information Security Officer Middle East - MIS Training

Chief Information Security Officer Middle East - MIS Training

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3rd Annual <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> <strong>Middle</strong> <strong>East</strong>Summit & Roundtable 201131st January – 2nd February 2011, Habtoor Grand Resort Hotel & Spa - Jumeirah Beach, Dubai – UAECISO <strong>Middle</strong> <strong>East</strong> Summit - Day One: Monday 31st January 201107:30 REGISTRATION & COFFEE08:00 CHAIRMAN'S OPENING & INVITED CHIEF GUEST SPEAKERS08:10 PROMOTING CYBER SAFE CULTURE IN THE UAE: EDUCATION ON A NATIONALLEVEL KEYNOTEEng. Tariq Al Hawi, Director, The United Arab Emirates Computer EmergencyResponse Team of The Telecommunications Regulatory Authority (TRA)08:40 CLOUD SECURITY & THE FUTURE OF INFORMATION SECURITY KEYNOTEMr. Dave Cullinane, CISO & VP, eBay & Chairman of the Board, Cloud<strong>Security</strong> Alliance - U.S.09:20 SECURING YOUR ENTERPRISE MOBILITY KEYNOTEMr. Scott Totzke, VP, BlackBerry <strong>Security</strong> Group10:00 CYBER INSECURITY: A GLOBAL CHALLENGE WITH MAJOR IMPLICATIONS TOGOVERNMENT & BUSINESS IN THE MIDDLE EAST KEYNOTEDr. Alastair MacWillson, Managing Director of Global <strong>Security</strong> Practice,Accenture10:30-10:40 JOINT QUESTIONS10:40 MORNING COFFEE BREAK & EXHIBITION OPENING11:00 NATIONAL CYBER SECURITY & PRIVACY: AWARENESS, COUNTER-MEASURES &EVOLUTION PANEL• How can international efforts to combat the cyber threats be utilised in yourorganisation• Fostering regional & international cooperation on information & intelligencesharing• Privacy, security & transparency of information: regional concerns• How to improve contingency planning & resilience against cyber attacks• Do nation-state sponsored advanced threats occur frequently?• Setting up a national CERT programme & increasing awareness on anational scale• Cyber security evolution in the following 5 years or so• Policies to secure critical infrastructure from attacks - privacy implicationsin the region• How do you protect sensitive, often classified government data from theever-growing threats of cyber attack if the data resides in cloudsomewhere?Led by: Eng. Tariq Al Hawi, Director, The United Arab Emirates ComputerEmergency Response Team of The Telecommunications Regulatory Authority(TRA); Mr. Abdullah Al-Barwani, <strong>Chief</strong> of <strong>Security</strong>, The <strong>Information</strong> TechnologyAuthority (ITA) of Oman / e.oman; Mr. Khalid N.Sadiq Al-Hashmi, ExecutiveDirector, Cyber <strong>Security</strong>/QCERT, Supreme Council of <strong>Information</strong> andCommunication Technology, State of Qatar; Mr. Haythem El Mir, Head of theIncident Response Team, cert-Tcc (& Technical Manager, National Agency forComputer <strong>Security</strong>) Tunisia11:40 PATCHING PROGRESS IN THE ENTERPRISE & HOW TO EXPEDITE ITMr. Khaled Chatila, Technical Account Manager – <strong>Middle</strong> <strong>East</strong>, Qualys, Inc.12:00 LUNCH13:30 CYBER TERRORISM & EMERGING CYBER THREATS SPECIAL KEYNOTEAt the Chertoff Group (a strategic security & risk management advisory firm),Mr. Chertoff provides high-level strategic counsel to corporate & governmentleaders on a broad range of security issues, from risk identification &prevention to preparedness, response & recovery. From 2005 – 2009, Mr.Chertoff served as Secretary of the U.S. Department of Homeland <strong>Security</strong>,where he led the country in blocking would-be terrorists from crossing ourborders or implementing their plans if they were already in the country. Beforeheading up the Department of Homeland <strong>Security</strong>, Mr. Chertoff served as afederal judge on the U.S. Court of Appeals for the Third Circuit. Earlier, duringmore than a decade as a federal prosecutor, he investigated & prosecutedcases of political corruption, organized crime, corporate fraud & terrorism –including the investigation of the 9/11 terrorist attacks.Secretary Michael Chertoff, Former U.S. Department of Homeland <strong>Security</strong>Secretary and Co-founder and Managing Principal, Chertoff Group, LLC14:30 BANK INITIATIVES IN THE MIDDLE EAST TO TACKLE EMERGING CYBER THREATS:PHISHING, CREDIT CARD FRAUD & PCI COMPLIANCEKEY CASE STUDIES & DISCUSSIONMr. Chetan Gor, Regional Head of <strong>Information</strong> <strong>Security</strong> - <strong>Middle</strong> <strong>East</strong>, HSBCBank <strong>Middle</strong> <strong>East</strong> Limited; Mr. David Cripps, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong><strong>Officer</strong>, Investec Bank Group15:00 LAWFUL INTERCEPTION, DIGITAL ESPIONAGE & EAVESDROPPING THREATSKEY CASE STUDYMr. Ray Stanton, Global Head of Business Continuity, <strong>Security</strong> & GovernancePractice, British Telecom15:30 AFTERNOON TEA BREAK15:50 ICT CATASTROPHIC RISK MANAGEMENT: CRITICAL INFRASTRUCTUREPROTECTION & CASE STUDIES LONDON 2012 & MARITIME TERRORISM KEYNOTEDr. Sally Leivesley, Managing Director, Newrisk Limited (Adviser toGovernments & Companies on Catastrophic Risk, Continuity & <strong>Security</strong>)16:30 ADDRESSING REPUTATIONAL RISK FROM AN INFORMATION SECURITYPERSPECTIVE KEY CASE STUDYMr. Marcus Alldrick, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> & Senior Manager,<strong>Information</strong> Risk and Protection, Lloyd's17:10 CURRENT & EMERGING E-COMMERCE THREATS: SECURITY BREACHES &THE ADVANCED THREAT ENVIRONMENT PANELCISOs & practitioners talk frankly about their experiences of recent securitybreaches, how they responded, detection…• During the last year, have the reports of advanced threats raised yourconcern about how secure your network is?• What do you personally feel is the greatest source of human threat to yourdata?• Which technology do you believe best protects data from leaking out ofyour network?• Where does the majority of your sensitive data reside?• Over the past year, has your organization been the target of an advancedthreat?• How does your organization detect or discover threats?• What happened to your organization as a result of a threat?• What advanced threat attack methods or technologies were unleashedagainst your organization?Chaired by: Mr. Eddie Schwartz, <strong>Chief</strong> <strong>Security</strong> <strong>Officer</strong>, NetWitnessCorporationPanellists: Mr. Dave Cullinane, CISO & VP, eBay & Chairman of the Board,Cloud <strong>Security</strong> Alliance - U.S.; Mr. Haythem El Mir, Head of the IncidentResponse Team, cert-Tcc (& Technical Manager, National Agency forComputer <strong>Security</strong>) Tunisia; Mr. Kim Aarenstrup, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong><strong>Officer</strong>, A.P. Moller - Maersk A/S & Chairman, <strong>Information</strong> <strong>Security</strong> Forum(ISF); Mr. Stefan Frei, Research Analyst Director, Secunia17:40 CLOSE OF DAY ONE17:45 - 19:00 DRINKS KINDLY SPONSORED BY: TBC19:00 - 21:00 DINNER KINDLY SPONSORED BY:


3rd Annual <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> <strong>Middle</strong> <strong>East</strong>Summit & Roundtable 201131st January – 2nd February 2011, Habtoor Grand Resort Hotel & Spa - Jumeirah Beach, Dubai – UAECISO <strong>Middle</strong> <strong>East</strong> Summit - Day Two: Tuesday 1st February 201107:30 - 08:00 BREAKFAST BRIEFING: “BACK TO BASICS: VULNERABILITYMANAGEMENT” KINDLY SPONSORED BY:Chaired by: Mr. Federico De-la-Mora, Director, nCirclePanellists: Mr. Emad Ali Maisari, Director of IT <strong>Security</strong>, Jumeirah Group;Mr. Mohammad Arif, <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong>, Ahli Bank; Mr. RoshanDaluwakgoda, Director Strategy Planning, Risk Assessment and DR, DUTelecom; Mr. Suresh Kumar, CISO, ADSIC08:05 CHAIRMAN'S OPENING08:10 DIGITAL EVIDENCE: A JUDICIAL & LEGAL PERSPECTIVE FOR CISOS KEYNOTEJudge Dr. Ehab Maher Elsonbaty, Legal Expert, Amiri Diwan State of Qatar08:40 A CISO FOR THE NATION: THE NATIONAL AGENCY FOR COMPUTER SECURITY& THE TUNISIAN CERT KEY CASE STUDYMr. Haythem El Mir, Head of the Incident Response Team, cert-Tcc, (&Technical Manager, National Agency for Computer <strong>Security</strong>) Tunisia09:20 FORENSICS: THE IMPENDING PARADIGM SHIFT: USING FORENSICS TONAVIGATE TOMORROW'S CONSTANTLY EVOLVING DIGITAL THREATS• What is “Digital Forensics” & why is it being heralded as the future of IT security• What is the role of network, host, & memory forensics in providingadvanced situational cyber awareness• Why is this pervasive forensics approach so critical to achieving anorganizations information risk management goals• Why we have to overcome the “ attack prevention” status quo as animperfect & naive approach to IT security management• Making the shift to forensics oriented network protection using innovative& agile approaches to build more effective intrusion detection, analysis &management processesMr. Eddie Schwartz, <strong>Chief</strong> <strong>Security</strong> <strong>Officer</strong>, NetWitness Corporation09:50 MOBILE & WIRELESS SECURITY: PROTECTING YOUR TOP EXECUTIVES ON THEMOVE PANEL• Why do we need mobile security?• Top recommendations• Privacy versus security - specific regional challenges• Mobile security awareness - proven lessons learned• New threats & risksChaired by: Mr. Scott Totzke, VP, BlackBerry <strong>Security</strong> GroupPanellists: Mr. Marco Bresciani, Accenture; Mr. Jonathan Martin, TechnicalDirector, ArcSight10:30 - 10:50 SPEAKER TABLES - Please select the speaker that you would like toquestion further from the morning sessions & go to their corner of the room todrill down & get some answers!10:50 MORNING COFFEE & EXHIBITION11:10 THE FUNDAMENTAL FAILURES OF END-POINT SECURITYMr. Frei explores the fundamental failings of end-point security that continueto turn most Internet users (corporate and private) into easy prey forcybercriminals. Data from 3.0 Million users of Secunia PSI provide a uniqueinsight into the exposure end-point systems.Mr. Stefan Frei, Research Analyst Director, Secunia11:30 EMERGING SECURITY THREATS ASSOCIATED WITH THE CLOUD &VIRTUALIZATION TECHNOLOGYKEY CASE STUDY, FOLLOWED BY ROUNDTABLE DISCUSSION• Thoughts on Cloud computing architecture & security• Operating in the Cloud & the associated security threats.• Cloud computing threats, governance, compliance & risk management• Cloud-specific vulnerabilities• Cloud <strong>Security</strong> standards, initiatives, tools & certifications• Cloud computing vendors security insightsLed by: Mr. Mohamed El-Refaey, Head of R&D, EDC (subsidiary ofN2Venture), & Founder, Egypt Cloud Community Forum (ECF), Director,Cloud <strong>Security</strong> Alliance, Egypt Chapter & Mr. Dave Cullinane, CISO & VP,eBay & Chairman of the Board, Cloud <strong>Security</strong> Alliance - U.S.12:10 BE PREPARED: WHAT VERIZON'S 2010 DATA BREACH REPORT TELLS USCrucial to tackling data breaches is the ability to recognise patterns & knowwhere to focus your security efforts. Insight from Verizon's 2010 Data BreachInvestigations Report, including contributions from the U.S. Secret Service,will help you learn from the mistakes of others so you can be better preparedMr. Gavan Egan, Verizon EMEA <strong>Security</strong> Solution Sales Director, Verizon12:30 LUNCH13:30 SECURING MONEY TRANSFER PAYMENTS KEYNOTELady Olga Maitland, CEO, Money Transfer International & Founder,Defence and <strong>Security</strong> Forum14:00 DATA LEAKAGE: PUTTING A VALUE ON A SECURITY BREACHDr. Cheryl Hennell, Head of IT <strong>Security</strong> & <strong>Information</strong> Assurance, Openreach, BT14:30 CAPEX UTILISATION FOR INFOSEC: SERVICE BASED MODEL TO MAXI<strong>MIS</strong>ECOST EFFICIENCY & ENSURE THAT SECURITY IS INTEGRAL TO THE COREBUSINESS PANEL• How do you link with internal & external customers & building teams thatreturn money to business lines?• Moving ICT and information security into the service model sphere to addvalue to the business• Maximising the cost-efficiency ratio of the information security strategy• Capital expenditure utilisation - maximising information security cost efficiency• Measuring <strong>Security</strong> return on investment (key indicators, & ways to obtain them)• Implementing security policies that are effective in changing behaviourChaired by: Mr. Ghassan T. Youssef, CEO, T & K Investments LebanonPanellists: Mr. Peter Crowley, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong>,Musanada; Mr. Floris Van Den Dool, <strong>Security</strong> Practice Leader, Europe,Africa and Latin America, Accenture; Dr. Cheryl Hennell, Head of IT<strong>Security</strong> and <strong>Information</strong> Assurance, Openreach, BT; Mr. Frank Coggrave,Vice-President, Guidance Software15:10 THE RISKS OF SOCIAL MEDIA KEY CASE STUDYThe dramatic rise of Web2.0 & Social Media has many benefits for bothindividuals & organisations, however there are many risks that a companyhas to manage if they allow their staff access from the workplace. Davidwill identify the risk that social media introduces & help your organisationto decide whether to educate or restrict your employees' access. David isresponsible for the group's information security programme; developing &implementing the security policies, coordinating standards & guidelineswithin a globally decentralised environment. He ensures that the Group'sinformation assets are given a level of protection consummate to theirvalue. David has recently been awarded a master's degree in Internet andTelecommunications Law (LLM) from Strathclyde University.Mr. David Cripps, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong>, Investec Bank Group15:40 AFTERNOON TEA BREAK & SPONSORS PRIZE DRAW16:10 – 16:50 PLEASE SELECT YOUR PREFERRED BREAKOUT SESSION:EITHER THE RISE OF THE CISO – HOW WILL THE JOB EVOLVE?Dr. Eduardo Gelbstein, Adjunct Professor, Webster University, Geneva,Former Advisor, UN Board of Auditors & Former Director, UN InternationalComputing Centre<strong>Information</strong> security is not only “everybody’s job” it is large & complex &requires many parties to be accountable for specific aspects of it (informationrisk management, operational & often outsourced services, applicationsdevelopment, regulatory compliance, business continuity, etc., all of whichlead to fragmentation & potentially gaps between what is required & what isdelivered. Examine how the role & responsibilities of the CISO could evolve tomaximise the effectiveness of information security measures?OR TOP ICT RISK STRATEGIES FOR CONTINUITY WORKSHOP SCENARIOCHALLENGESDr. Sally Leivesley, Managing Director, Newrisk LimitedThe workshop teams will prepare a report on the top ICT risk strategies thatthey can design to defeat top risks to a government, a global company or asmall/ medium business. The statement is to cover the ICT riskmanagement strategies for continuity of operations in your organisation.This statement will show how your organisation has resilience & will beable to continue despite the top risks that may threaten its operations &cause a catastrophic failure. Two challenges for a global company, agovernment department or a local business.1. Prepare a simple paragraph or a simple table of the Top ICT Risks -When preparing this report, consider the consequences of any physicalsecurity risks in the list of top ICT risks2. Prepare a verbal statement no more than two minutes in length for thenews media (A team member will ‘volunteer’ to present this to theworkshop from the podium)16:50 ADVANCEMENTS IN ENDPOINT (CLIENT) SECURITY TECHNOLOGIESDr. Yasser Rasheed, Director, Business Client Architecture, IntelCorporation17:20 LEADERSHIP FROM THE FRONT: HOW CAN THE CISO MAXI<strong>MIS</strong>E THEEFFECTIVENESS OF INFORMATION SECURITY MEASURES? PANEL• Modern day challenges for the CISO• Technological, operational & people challenges• Innovative strategies & approaches to overcome operational,technological & people challenges• Bridging generational gaps• Change management, segregation of duties, encryption• <strong>Training</strong> & continual improvementChaired by: Mr. Ray Stanton, Global Head of Business Continuity, <strong>Security</strong>& Governance Practice, British TelecomPanellists: Mr. Vinoth Sivasubramanian, Project Manager-IT Department,UAE Exchange Centre L.L.C.; Mr. Kim Aarenstrup, <strong>Chief</strong> <strong>Information</strong><strong>Security</strong> <strong>Officer</strong>, A.P. Moller - Maersk A/S & Chairman, <strong>Information</strong> <strong>Security</strong>Forum (ISF)17:20 CLOSE OF DAY TWO18:00 DINNER KINDLY SPONSORED BY:


3rd Annual <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> <strong>Middle</strong> <strong>East</strong>Summit & Roundtable 201131st January – 2nd February 2011, Habtoor Grand Resort Hotel & Spa - Jumeirah Beach, Dubai – UAEDay Three: Wednesday 2nd February 2011CISO <strong>Middle</strong> <strong>East</strong> RoundtableAgenda timings:09:00 Start; 11:00 Coffee Break; 13:00 Lunch; 14:45 Close of DayChaired by:CISO <strong>Middle</strong> <strong>East</strong> Roundtable Sponsor:• Mr. Charles V. Pask, Managing Director, ITSEC Associates LtdFacilitators:• Mr. Eddie Schwartz, <strong>Chief</strong> <strong>Security</strong> <strong>Officer</strong>, NetWitness Corporation - U.S.• Mr. Marcus Alldrick, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> & Senior Manager, <strong>Information</strong> Risk and Protection, Lloyd's• Mr. Floris Van Den Dool, <strong>Security</strong> Practice Leader, Europe, Africa and Latin America, Accenture• Dr. Cheryl Hennell, Head of IT <strong>Security</strong> and <strong>Information</strong> Assurance, Openreach, BT• Mr. John Colley, Managing Director, EMEA, (ISC)2 EMEACISO Roundtable <strong>Middle</strong> <strong>East</strong> held under the Chatham House Rule is a progressive & open benchmarking forum on topics requesteddirectly by you the attendee around new e-business threats, information risk & governance, probing CISO leadership roles.The CISO <strong>Middle</strong> <strong>East</strong> Roundtable 2011 is well-established as the best place for thought-leaders in information security to discuss keysecurity challenges & strategy with peers & to develop team expertise & professional skills. Debates from the CISO Roundtable also influencebest practice approaches for the information security community at large. The focus is on roundtable discussion & group work, with sessionsfacilitated by established information security practitioners & industry experts. You will meet global security industry leaders & network withprofessionals who face a similar set of challenges as you in a 'hands on', proactive & inspirational environment.• Held Under The Chatham House Rule - No press are permitted. The entire session will be conducted as a 'closed doors' session, allowingparticipants to discuss real life information security incidents & benchmark proven & possible approaches• Notes from the session - each session has a dedicated 'note taker' who will write up discussion outlines & conclusions for distribution to allroundtable attendees following the event• Key topic areas of focus - will be determined by the input of participants beforehand & a briefing document will be distributed in advance toallow participants to fully contribute in the honest sharing of ideas. Draft items are listed below.ITEM 1 ACHIEVING INTEGRATED INFORMATION SECURITY GOVERNANCEITEM 2 HOW HAS INFORMATION RISK CHANGED IN THE GLOBAL FINANCIAL CRISIS FALL-OUT? HOW DOES THIS IMPACT THE CISO ROLE?ITEM 4 CURRENT & EMERGING E-BUSINESS THREATS: PHISHING ATTACKS, CREDIT CARD FRAUD & PCI COMPLIANCEITEM 5 TO BE DECIDED BASED ON AUDIENCE FEEDBACKITEM 6 WRAP UP DEBATE, FINAL QUESTIONS & ACTION POINTSWhy Sponsor or Exhibit at CISO <strong>Middle</strong> <strong>East</strong> Summit & Roundtable -Dubai UAE 2011•Meet senior decision-makers in information security, cyber crime & ICT riskfrom across business & governmental sectors in the <strong>Middle</strong> <strong>East</strong> who areseeking guidance on the latest security technologies & guidance•An excellent chance to influence branding or launch a product! This gathering ofnormally difficult to reach CISO executives is an excellent platform for you tomeet a guaranteed 98% 'practitioner' audience! Why not be remembered forhosting the ultimate reception or panel discussion highlight of the event?•Invite your clients for free & be seen with the best! All sponsorship packagesinclude a number of free client places, table top exhibition & speaking options.For more information, please contact klafferty@mistieurope.comor telephone +44 (0)20 7779 8293.TESTIMONIALS FROM CISO EXECUTIVE SUMMIT MIDDLE EAST 2009“Excellent networking with other CISOs from around the world”“The best opportunity to interact with security professionals from across theglobe & to share news on emerging security trends”“Smooth running, the lectures were challenging & reflected our real lifeproblems”“Very useful on risk decision taking & creating value & trust between IT security& the business”“An eye opening summit with engaging & informative speakers: you just can'thave enough of it. Highly recommended!”2 EVENTS, 1 TIME, 1 PLACE - DUAL EVENT PASS AVAILABLE!<strong>Middle</strong> <strong>East</strong> Fraud & Corruption Summit See back page for details


3rd Annual <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> <strong>Middle</strong> <strong>East</strong>Summit & Roundtable 201131st January – 2nd February 2011, Habtoor Grand Resort Hotel & Spa - Jumeirah Beach, Dubai – UAE5 Easy Ways to RegisterTel: +44 (0)20 7779 8944 Email: conferences@mistieurope.comFax: +44 (0)20 7779 8293 Web: www.mistieurope.com/cisoMEMail: Guy Cooper, <strong>MIS</strong> <strong>Training</strong>, Nestor House, Playhouse Yard, LondonEC4V 5EX UKCustomer <strong>Information</strong>(please print or attach business card)Delegate 1 NamePositionDelegate 2 NameDelegate 3 NameOrganisationE-Mail Address (Required)AddressPositionPositionRegistration <strong>Information</strong>The summit fees:3rd Annual CISO <strong>Middle</strong> <strong>East</strong> Summit & Roundtable £1,995The fee includes:• Entry to 3-day event • Continued Education Points & certificate • All lunches & daily refreshments• Official presentation materials on USB • Post-event web-link of materials• Networking functions (receptions, dinners, local activities – details subject to confirmation)2 Events – 1 Place, 1 Date!At the same time, in the same venue as CISO <strong>Middle</strong> <strong>East</strong> Summit & Roundtable 2011, <strong>MIS</strong> ishosting The <strong>Middle</strong> <strong>East</strong> Fraud & Corruption Summit. Both events will be held at the HabtoorGrand Resort Hotel & Spa - Jumeirah Beach Dubai, UAE, 31st January – 2nd February 2011.<strong>Middle</strong> <strong>East</strong> Fraud & Corruption Summit 2011 - Sharing successes & lessons learned in the<strong>Middle</strong> <strong>East</strong> & globally from recent projects & cases involving fraud & corruption, this global eventfor directors of audit, risk, & fraud prevention arrives in the <strong>Middle</strong> <strong>East</strong> for the first time!Programme supports <strong>Middle</strong> <strong>East</strong> government & business commitments to achieve transparencygoals & reduce exposure to financial risk by addressing prevention, detection, investigation,deterrence & recovery from fraud & corruption www.mistieurope.com/fraudME.Discounts & Special Offers!• Book 1 person to access 2 summits with the ‘Dual Event Pass’ & only pay 30% extra £2,593(saving £1,396!)• Book 1 person on each summit & save 30% on fees (overall £1,197 savings!) Ideal team workingfor Heads of <strong>Information</strong> <strong>Security</strong> / IT Risk & Heads of Internal Audit & Fraud Prevention!For more information & terms & conditions of these offers please call+44 (0)207 779 8944, email mis@mistieurope.comAbout the Venue & AccommodationWhen registering for this conference please quote: WebThe 3rd Annual CISO <strong>Middle</strong> <strong>East</strong> Summit & Roundtable 2011 will beheld at Habtoor Grand Resort & Spa Al Sufouh Road, Dubai Marina,Jumeirah Beach, P. O. Box 24454, Dubai, U.A.ETel: +971 4 408 4444 Fax: +971 4 399 4207www.grandjumeirah.habtoorhotels.comFacilities & Location:Situated on Jumeirah Beach & overlooking Dubai Marina, this 5 star luxury sparesort hotel is set amid lush gardens with views of the sea & occupies one ofDubai's most enchanting beachside locations. The airport is approximately 30kilometres from the Habtoor Grand Hotel; drive time is 25 to 30 minutes. It is inclose proximity to Dubai Internet City, Dubai Media City & Shopping Malls. TheHabtoor Grand Resort & Spa offers pools, restaurants & bars set amidst thehotel's tropical gardens where lush landscapes meet the warm Arabian Gulf,fringed by an immaculate beach & embraced by clear blue skies. Two poolsare set within the resort's landscaped gardens, a third 'infinity pool' is locatedon the mezzanine level of the Towers & a large private beach offers unrestrictedviews of the clear Arabian Gulf. Guests can play tennis or squash or visit thehotel's Elixir Spa. The 446 guestrooms, reflecting Arabian touches in thefurnishings & style, have views of the sea or the landscaped gardens.Accommodation & Reservations:<strong>MIS</strong> <strong>Training</strong> Institute has arranged the following discounted rates at the Habtoor Grand Resort & Spa:• Standard Single Room: AED 900.00 per room• Standard Double Room: AED 1000.00 per roomAll rates are valid per room per night & include 10% municipality fee, 10% service charge & breakfast.To make a reservation please complete the booking form available onwww.mistieurope.com/cisoME & send to Mr. Maheshan Premanathan onmaheshan.premanathan@habtoorhotels.com, Tel: 00971 4 4084165 Fax: 00971 4 3994210.Please note that delegates are responsible for the arrangement & payment of their ownaccommodation in Dubai. <strong>MIS</strong> <strong>Training</strong> is not liable or responsible for any hotel bookings & cannotguarantee availability as limited rooms are available. <strong>MIS</strong> would advise booking as soon as possible.CountryTelephonePostcodeThe information you provide will be safeguarded by the Euromoney Institutional Investor Plc. group whosesubsidiaries may use it to keep you informed of relevant products and services. We occasionally allow reputablecompanies outside the Euromoney Institutional Investor Plc. group to contact you with details of products thatmay be of interest to you. As an international group we may transfer your data on a global basis for the purposesindicated above. If you object to contact by telephone , fax , or email please tick the relevant box. If youdo not want us to share your information with other reputable companies please tick this boxPayment MethodPay Online at www.mistieurope.com(all fees must be paid in advance of the event)Cheque enclosedPlease invoice my company PO#(payable to <strong>MIS</strong> <strong>Training</strong>)Credit cards can be taken over the phone or online.Please call +44 (0)20 7779 8944 or visit www.mistieurope.com/cisoMEPlease include billing address if different from address given abovePlease note that in completing this booking you undertake to adhere to thecancellation policy and payment terms.SignatureDateApproving ManagerFaxPositionPlease send me information on:4th Annual <strong>Chief</strong> <strong>Security</strong> <strong>Officer</strong> (CSO) Summit,1 – 3 December 2010, Radisson Blu Palais Hotel, Vienna – Austria<strong>Middle</strong> <strong>East</strong> Fraud & Corruption Summit,31 Jan – 2 Feb 2011, Habtoor Resort & Spa Hotel, Dubai – UAEFraud & Corruption Africa Summit, 14– 18 March 2011, Vineyard Hotel & Spa,Cape Town - South Africa5th Annual Fraud & Corruption Summit - Europe,6 – 8 April 2011, Copenhagen - Denmark2nd Annual ICT <strong>Security</strong> Summit Africa,17 – 20 May 2011, La Palm Beach Royal Hotel, Accra – Ghana8th Annual CISO Summit & Roundtable, 22 – 24 June 2011, Rome – Italy6th Annual Audit, Risk & Governance Africa Conference, 22 – 25 July 2011, Mauritius3rd Annual <strong>Security</strong> Africa Summit, September 2011, Cape Town – South AfricaConferencia Latinoamericana: La Lucha Contra Fraudes y Corrupción,Republic of PanamaCISO Summit Latin America / Conferencia Latinoamericana de Responsables deSeguridad de la Información, Septiembre 2011, BrazilFor further information on the above events, please contact Sara Hook, Director ofConferences, <strong>MIS</strong> <strong>Training</strong> Institute Tel: +44 (0)207 779 7200or Email: shook@mistieurope.comCancellation Policy: Should a delegate be unable to attend, a substitute may attend in his or herplace. A credit or refund, minus 10% administration charge, is available if written notification isreceived by 11th January 2011. Thereafter, no refunds will be given. <strong>MIS</strong> reserves the right tochange or cancel this programme due to unforeseen circumstances. Founded in 1978, <strong>MIS</strong><strong>Training</strong> Institute is the international leader in providing training & conferences to informationsecurity, audit, fraud & IT audit professionals. With offices in the USA, UK, & Asia, <strong>MIS</strong> is a divisionof Euromoney Institutional Investor Plc (FTSE250) and is part of the Daily Mail & General Trust (DMGT).www.mistieurope.com. To Register Call +44 (0) 20 779 8944, Fax +44 (0) 20 7779 8293,Email: conferences@mistieurope.com or Visit www.mistieurope.com/cisoME.Register now at conferences@mistieurope.com, www.mistieurope.com/cisoME, Tel: +44 (0)20 7779 8944

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!