Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Hossam Elshenraki presents a framework to counter increasing ransomware attacks in the Middle East, sharing key lessons from Dubai Police on early detection, active defense and prevention strategies.
Rohit Bajpai, Hussain AlKhalsan, Sagar Sethi, Irshad Syed, Dr. Sharique Raza, and Hossam Elshenraki examine AI's dual role in both creating and mitigating cybersecurity challenges in the Middle East.
Mostafa Nassar examines why standard GRC platforms fail in industrial settings and provides strategies for developing OT-specific solutions that integrate with IT frameworks while addressing specialized operational needs.
Mohsan Tanvir of Magnet Forensics shares actionable tips on aligning DFIR teams with organizational objectives, measuring return on security investment, and demonstrating how digital forensics delivers tangible business value.
Dr. Mohamed Abdur Rahman demonstrates how generative AI can monitor OT operations, detect attacks, block attackers and restore assets to working states, showing how AI-driven tools can fortify OT networks against evolving threats.
Zain Abdurehman discusses comprehensive employee awareness training strategies to strengthen organizations' first line of defense against cyberattacks and change mindsets toward security.
Kiran Kumar of Alpheya examines strategies to protect against data breaches and ransomware in the Middle East, where breach costs reach $8.07 million, using case studies to illustrate effective data protection methods.
Rahul Banga of GIG Gulf discusses approaches to embed cybersecurity awareness in society's culture, communicate security concepts in layman's language, and create effective human firewalls throughout organizations and society.
Dr. Sharique Raza of UAE Financial Institutions UAE explores zero trust principles and regional cybersecurity regulations. Learn practical approaches to align with UAE and Saudi frameworks while strengthening your organization's security posture.
Asim Ahmad shares successful strategies for transitioning to a security-oriented mindset and implementing cybersecurity culture from the CEO throughout all organizational levels.
Sharique Raza, senior security architect at Financial Institutions UAE, explores the shift from implicit trust to zero trust architecture, detailing the five key pillars of zero trust implementation.
Nasser Al-Alawi demonstrates a life cycle-based security assurance approach, exploring best practices for stakeholder engagement, implementing "security walks" and embedding cybersecurity in change management.
Rohit Bajpai of Gulf Islamic Investments explores approaches to combat AI-generated fraud and deepfakes in the Middle East, focusing on detection techniques, multi-layered security protocols and organizationwide preparedness.
Vipin Raj shares how Ahalia Hospital adapted its processes to align with cybersecurity regulations, highlighting how regulatory compliance has strengthened organizational maturity and enhanced critical infrastructure protection.
Rohit Bajpai, Kiran Kumar, Moayad Al Ghanmi, and Hani Bani Amer explore effective cybersecurity strategies despite financial limitations, leveraging automation and AI to defend against expanding threats.
Moayad Al Ghanmi of the National Bank of Kuwait discusses essential cybersecurity strategies, securing board buy-in, and ensuring fundamentals are solid before implementing new innovations through practical case studies.
Dr. Fouad Abou Chacra, Vipin Raj, Irshad Mohammed and Paul Barnes discuss lessons from the CrowdStrike outage, strategies for mitigating third-party risks in OT environments and AI's role in developing risk management tools.
Paul Barnes, Malek Abu Tayeh, Asma Habeeb, Dr. Mohamed Abdur Rahman and Jean-Baptiste Abbal discuss presenting risk-based approaches to boards, securing budgets, improving communication and developing compelling business cases for OT security.
Kapil Matta, James Wiles, Hussain AlKhalsan, Biju Hameed and Kausar Mukeri discuss strategies to mitigate human risk factors, improve communication and prevent security team burnout in Middle Eastern organizations.
Biju Hameed shares insights from two decades in the energy and aviation sectors, focusing on effective communication between IT and OT teams, understanding true convergence, and addressing barriers that create an "illusion of understanding."
Islam Soliman explores essential monitoring tools for third-party access, incident notification mechanisms and the role of zero trust architecture in managing vendor relationships and protecting critical infrastructure.
Noha Moustafa of ALEXBANK explores effective vendor risk management frameworks, strategies to mitigate third-party provider risks, and methods to protect environments from bad actors attempting to access your third parties.
Amr Ahmed examines limitations of traditional remote access solutions in OT environments, presenting more secure approaches with granular, time-limited access controls and agentless security solutions that protect system integrity.
Gopinath Kishorekumar presents a case study on how an oil and gas organization discovered, mitigated and responded to a cyber breach, sharing lessons to improve incident response frameworks.
Abdulhakeem Al Alawi shares a framework for managing supply chain risk, exploring standardized third-party risk management across supply chain participants, and discussing protection strategies against cyberattacks.
Hessa Almatrooshi of Ajman Free Zone addresses the cyber skills gap, discussing strategies to attract graduates, increase workforce diversity and evaluate whether AI can realistically help address cybersecurity staffing shortages.
Rohit Bajpai, Mohammed Alshahrani, Hessa Almatrooshi, Ahmed Nabil and Zain Abdurehman debate whether regulations enhance security or if internal frameworks are more effective in the Middle Eastern context.
Abdulhakeem Al Alawi, Gopinath Kishorekumar, Dr. Ali Ismail Awad, Ahmed Al-Bahdoor and Keith Christie-Smith explore security-by-design approaches, vendor selection, zero trust architecture and easy wins to protect ICS systems.
Dr. Basel Halak reveals the scale of hardware-level attacks in globally distributed electronic supply chains, demonstrating how physical unclonable functions with blockchain and AI-based monitoring can create tamper-resistant systems.
Rehan Ul Badar of Abu Dhabi Islamic Bank examines how organizations can leverage generative AI technologies while mitigating the risks they pose as gateways for fraud and sophisticated phishing attacks.
Gagandeep Singh examines strategies to boost human firewalls through awareness training, shifting organizational mindsets toward security-oriented approaches, and shares a case study of successful internal culture change.