12.07.2015 Views

Chief Information Security Officer Middle East - MIS Training

Chief Information Security Officer Middle East - MIS Training

Chief Information Security Officer Middle East - MIS Training

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3rd Annual <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> <strong>Middle</strong> <strong>East</strong>Summit & Roundtable 201131st January – 2nd February 2011, Habtoor Grand Resort Hotel & Spa - Jumeirah Beach, Dubai – UAECISO <strong>Middle</strong> <strong>East</strong> Summit - Day One: Monday 31st January 201107:30 REGISTRATION & COFFEE08:00 CHAIRMAN'S OPENING & INVITED CHIEF GUEST SPEAKERS08:10 PROMOTING CYBER SAFE CULTURE IN THE UAE: EDUCATION ON A NATIONALLEVEL KEYNOTEEng. Tariq Al Hawi, Director, The United Arab Emirates Computer EmergencyResponse Team of The Telecommunications Regulatory Authority (TRA)08:40 CLOUD SECURITY & THE FUTURE OF INFORMATION SECURITY KEYNOTEMr. Dave Cullinane, CISO & VP, eBay & Chairman of the Board, Cloud<strong>Security</strong> Alliance - U.S.09:20 SECURING YOUR ENTERPRISE MOBILITY KEYNOTEMr. Scott Totzke, VP, BlackBerry <strong>Security</strong> Group10:00 CYBER INSECURITY: A GLOBAL CHALLENGE WITH MAJOR IMPLICATIONS TOGOVERNMENT & BUSINESS IN THE MIDDLE EAST KEYNOTEDr. Alastair MacWillson, Managing Director of Global <strong>Security</strong> Practice,Accenture10:30-10:40 JOINT QUESTIONS10:40 MORNING COFFEE BREAK & EXHIBITION OPENING11:00 NATIONAL CYBER SECURITY & PRIVACY: AWARENESS, COUNTER-MEASURES &EVOLUTION PANEL• How can international efforts to combat the cyber threats be utilised in yourorganisation• Fostering regional & international cooperation on information & intelligencesharing• Privacy, security & transparency of information: regional concerns• How to improve contingency planning & resilience against cyber attacks• Do nation-state sponsored advanced threats occur frequently?• Setting up a national CERT programme & increasing awareness on anational scale• Cyber security evolution in the following 5 years or so• Policies to secure critical infrastructure from attacks - privacy implicationsin the region• How do you protect sensitive, often classified government data from theever-growing threats of cyber attack if the data resides in cloudsomewhere?Led by: Eng. Tariq Al Hawi, Director, The United Arab Emirates ComputerEmergency Response Team of The Telecommunications Regulatory Authority(TRA); Mr. Abdullah Al-Barwani, <strong>Chief</strong> of <strong>Security</strong>, The <strong>Information</strong> TechnologyAuthority (ITA) of Oman / e.oman; Mr. Khalid N.Sadiq Al-Hashmi, ExecutiveDirector, Cyber <strong>Security</strong>/QCERT, Supreme Council of <strong>Information</strong> andCommunication Technology, State of Qatar; Mr. Haythem El Mir, Head of theIncident Response Team, cert-Tcc (& Technical Manager, National Agency forComputer <strong>Security</strong>) Tunisia11:40 PATCHING PROGRESS IN THE ENTERPRISE & HOW TO EXPEDITE ITMr. Khaled Chatila, Technical Account Manager – <strong>Middle</strong> <strong>East</strong>, Qualys, Inc.12:00 LUNCH13:30 CYBER TERRORISM & EMERGING CYBER THREATS SPECIAL KEYNOTEAt the Chertoff Group (a strategic security & risk management advisory firm),Mr. Chertoff provides high-level strategic counsel to corporate & governmentleaders on a broad range of security issues, from risk identification &prevention to preparedness, response & recovery. From 2005 – 2009, Mr.Chertoff served as Secretary of the U.S. Department of Homeland <strong>Security</strong>,where he led the country in blocking would-be terrorists from crossing ourborders or implementing their plans if they were already in the country. Beforeheading up the Department of Homeland <strong>Security</strong>, Mr. Chertoff served as afederal judge on the U.S. Court of Appeals for the Third Circuit. Earlier, duringmore than a decade as a federal prosecutor, he investigated & prosecutedcases of political corruption, organized crime, corporate fraud & terrorism –including the investigation of the 9/11 terrorist attacks.Secretary Michael Chertoff, Former U.S. Department of Homeland <strong>Security</strong>Secretary and Co-founder and Managing Principal, Chertoff Group, LLC14:30 BANK INITIATIVES IN THE MIDDLE EAST TO TACKLE EMERGING CYBER THREATS:PHISHING, CREDIT CARD FRAUD & PCI COMPLIANCEKEY CASE STUDIES & DISCUSSIONMr. Chetan Gor, Regional Head of <strong>Information</strong> <strong>Security</strong> - <strong>Middle</strong> <strong>East</strong>, HSBCBank <strong>Middle</strong> <strong>East</strong> Limited; Mr. David Cripps, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong><strong>Officer</strong>, Investec Bank Group15:00 LAWFUL INTERCEPTION, DIGITAL ESPIONAGE & EAVESDROPPING THREATSKEY CASE STUDYMr. Ray Stanton, Global Head of Business Continuity, <strong>Security</strong> & GovernancePractice, British Telecom15:30 AFTERNOON TEA BREAK15:50 ICT CATASTROPHIC RISK MANAGEMENT: CRITICAL INFRASTRUCTUREPROTECTION & CASE STUDIES LONDON 2012 & MARITIME TERRORISM KEYNOTEDr. Sally Leivesley, Managing Director, Newrisk Limited (Adviser toGovernments & Companies on Catastrophic Risk, Continuity & <strong>Security</strong>)16:30 ADDRESSING REPUTATIONAL RISK FROM AN INFORMATION SECURITYPERSPECTIVE KEY CASE STUDYMr. Marcus Alldrick, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> & Senior Manager,<strong>Information</strong> Risk and Protection, Lloyd's17:10 CURRENT & EMERGING E-COMMERCE THREATS: SECURITY BREACHES &THE ADVANCED THREAT ENVIRONMENT PANELCISOs & practitioners talk frankly about their experiences of recent securitybreaches, how they responded, detection…• During the last year, have the reports of advanced threats raised yourconcern about how secure your network is?• What do you personally feel is the greatest source of human threat to yourdata?• Which technology do you believe best protects data from leaking out ofyour network?• Where does the majority of your sensitive data reside?• Over the past year, has your organization been the target of an advancedthreat?• How does your organization detect or discover threats?• What happened to your organization as a result of a threat?• What advanced threat attack methods or technologies were unleashedagainst your organization?Chaired by: Mr. Eddie Schwartz, <strong>Chief</strong> <strong>Security</strong> <strong>Officer</strong>, NetWitnessCorporationPanellists: Mr. Dave Cullinane, CISO & VP, eBay & Chairman of the Board,Cloud <strong>Security</strong> Alliance - U.S.; Mr. Haythem El Mir, Head of the IncidentResponse Team, cert-Tcc (& Technical Manager, National Agency forComputer <strong>Security</strong>) Tunisia; Mr. Kim Aarenstrup, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong><strong>Officer</strong>, A.P. Moller - Maersk A/S & Chairman, <strong>Information</strong> <strong>Security</strong> Forum(ISF); Mr. Stefan Frei, Research Analyst Director, Secunia17:40 CLOSE OF DAY ONE17:45 - 19:00 DRINKS KINDLY SPONSORED BY: TBC19:00 - 21:00 DINNER KINDLY SPONSORED BY:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!