23 October, 2018 03:30 PM Improving the Business Relevance of the Security and Risk Management Program Abdullah Al Barwani, ciso, Omantel Omantel has newly established the information security division headed by a general manager who is reporting to the. Increasingly, enterprises in the Middle East region are talking about establishing security operations centers. Which of these are you using successfully? Tuesday, 23 October, 2018 09:45 AMTuesday, 23 October, 2018 10:30 AM, networking Refreshment Break, tuesday, 23 October, 2018 09:50 AMTuesday, 23 October, 2018 10:20 AM, group IB: Cybercrime in trends and figures: key threats in 2018 and reliable forecasts for 2019. We share this knowledge to arm corporates, governments and law enforcement with information to enhance their security posture and stay safe in challenging cybersecurity landscape.
Mark ruehl Umeå, Sofia karlsson umeå,
Tuesday, 23 October, 2018 10:30 AMTuesday, 23 October, 2018 11:15 AM gdpr the Day After: 3 Myths and 6 Key Capabilities Discussed Nader Henein, Sr Director Analyst, Gartner After ample preparation time in anticipation of the gdpr, Gartner has observed a few misconceptions on privacy. The PAM maturity model. Tuesday, 23 October, 2018 10:30 AMTuesday, 23 October, 2018 11:30 AM Penetration Testing Experience, the Good, the Bad, the Ugly Mohammad AlNasser, Director of Information Security, Tamkeen Technologies The purpose of this session is to share the experience of how conducting penetration testing, whether following. 3) How do you use third parties gracefully and effectively? This is based on Symantecs threat intelligence research projects such as Dragonfly (attacks against energy sector). Hear about: cloud adoption, security stories recommendations. Tuesday, 23 October, 2018 11:30 AMTuesday, 23 October, 2018 12:00 PM Infoblox: Bridging Enterprise Security Silos Cherif Sleiman, Senior Vice President, International Bus, Infoblox On average a Medium to Large Enterprise spends millions of dollars on security solutions to protect their data and defend against. This will also include the analysis of dependencies to critical activities and associated risks. Conventional cyber risk assessment focused on IT asset, threat, vulnerability etc. We will also examine how employee monitoring can be a key facet of an enterprise following Gartner's carta model. Tuesday, 23 October, 2018 03:00 PMTuesday, 23 October, 2018 03:30 PM Supply Chain and Third Party Cybersecurity Framework Nourah Al-Sohmi, Cybersecurity Governance Specialist, Saudi Aramco As organizations mature in securing their network parameter and data within, adversaries nowadays are trying to bypass and evade these. Roll to Defeat ALS.