The most anticipated Cyber Security event in Doha
FEATURING
20+
Speakers from across the globe
CTF
Your chance to display your skills
6
Cyber Security Villages
450+
Attendees from all sectors
GOLD SPONSORS
SILVER SPONSORS
BRONZE SPONSORS
International Special Guest Speakers from
NASA, US Department of Energy, American University of Sharjah, Cyber Security Forum Initiative
CONFERENCE THEMES
Emerging Threats
Discussing AI-driven attacks, ransomware, Supply chain and advanced phishing attacks.
Artificial Intelligence
Artificial Intelligence is revolutionizing cybersecurity, enhancing defense and complicating potential threats.
Risk Management
Effective risk management is essential, identifying, assessing, and mitigating threats to safeguard organizational goals.
Cyber Strategy
Discussions on Cyber security Strategy, effective leadership, board visibility, resilience, and Incident Response
PROGRAMME AGENDA
On December 2nd, 2023, we will gather in the Diplomatic Club Qatar Doha for an all-day event. Featuring three main halls. One hall will focus on a speaking track, another on a cybersecurity village, and a third will be dedicated to solution providers.
Discover how to protect yourself and your business from the latest threats and learn from the industry's top experts.
Morning Session
09:00
Networking & Registration
Badge Collection
Light breakfast
Informal Networking
10:00
Opening
Opening Speach
10:05
Keynote
Homefiled Advantage when dealing with ATPs: Highlighting practices and techniques any audience member can use to protect their organization without a nation-state level budget.
10:30
Breaking Through the Illusion of Safety:
Worth of Security Tools: Questions the effectiveness of advanced tools and teams in preventing cyber breaches.
Effort vs. Efficiency in Teams: Discusses strategies for cybersecurity teams to work smartly.
Importance of Process and Procedure: Examines the often-underestimated role of process and procedures.
Prevention vs. Response Strategies: Considers whether the industry overemphasizes prevention over response.
11:00
Navigating Cyber Security Talent Challenges:
Addressing the Talent Gap: Focuses on challenges in attracting and retaining top cybersecurity talent.
Mentorship and Career Development: Discusses the importance of mentorship and career development Interdisciplinary Skills in Cybersecurity: Explores the significance of integrating skills from other disciplines.
Education and Certification: Examines the role of higher education and certifications in cybersecurity.
11:30
(Break)
Refreshments
Afternoon Session
12:00
Emerging Challenges in Cyber Security Arising from the Advancement of Artificial Intelligence:
AI-Driven Cyber Threats: Explores how AI advancements shape cyber threats.
Cybersecurity Defense: Considers how AI can be used to bolster defenses against sophisticated AI-powered cyberattacks.
Future of Cybersecurity Jobs in an AI-Dominated Landscape: Examines the implications of AI's growing dominance in cybersecurity for the job market.
Ethical and Privacy Concerns with AI: Addresses the ethical and privacy issues related to using AI in cybersecurity
12:30
Challenges in running a SOC for critical organisations
Unique Challenges in Critical Organizations: Discusses specific challenges faced by SOCs
Impact of Fear on Decision-Making in SOCs: Explores how fear of mistakes affects decision-making.
Balancing Threat Perception and Resources: Considers the risk of overestimating threats.
Limits in Use Case Development for SOCs: Questions whether there's a practical limit to the number of use cases that can be developed.
13:00
(Break)
Refreshments
13:30
The Human Factor: Beyond Blaming the User
Redefining User Responsibility: Focuses on shifting from blaming users in cybersecurity incidents to empowering them as a key defense line.
Understanding User Behavior and Security:
Aims to understand how user behavior impacts cybersecurity.
The Role of Training and Awareness Programs:Examines the critical components of effective cybersecurity training and awareness programs.
Balancing Usability and Security: Discusses the balance between creating systems that are user-friendly and ensuring they are secure.
14:00
Awards
CTF Awards
14:15
Closing Ceremony
Closing Speech
14:30
Lunch
Lunch
SPEAKING TRACK
We are thrilled to introduce our exceptional international and national guest speakers who will captivate your attention with their profound insights.
Shaikh Khalifa bin Ali Al-Thani
Cyber Security Specialist
V. Susan Peediyakkal
Cyber Security Operations Manager
Rana Khalil
Application Security Lead Consultant
Suzzane Bitter
Head of Regional Strategic Alliances
Ashraf Aboukass
Head of Security Operations Center
Dr Ali Al-Rashid
AI & Cyber Security Expert
Yuri Kramarz
Principal Security Engineer
Abdulla Al-Emadi
Head of Cyber Security
Rebel Powell
Cyber Security
Expert
Benjamin Beaston
Chief Information Security Officer
Kamran Saifullah
Cyber Defense Researcher
Evangelos Mantas
Cyber Security Operations
Kenan Begovic
Group Director of Information Security
Alexandru Stamate
Digital Forensics Incident Response Consultant
Hasan Chocor
Senior Information Security Officer
Dr Alex Constantinidis
Chief Information Security Officer
Sarah Al-Mawlawi
Director of Corporate Information Security
Dr. Fadi Aloul
Dean – College of Engineering
SECTORS IN ATTENDANCE
Energy
Banking
Construction
Health Care
Broadcasting
CYBER SECURITY VILLAGES
AI in Cyber Security
The AI in Cyber Village village offers an immersive blend of cybersecurity and AI/ML innovation. Attendees gain insights into how AI and ML are reshaping threat detection, incident response, and vulnerability assessment, ensuring a safer digital landscape. From fundamental data understanding to advanced anomaly detection, participants explore the vast potential of machine learning in enhancing security. Join and witness the future of security through the lens of AI and ML.
Drone Exploitation
This village provides a baseline understanding of Unmanned Aerial System components and challenges perceptions of drones. It focuses on the current challenges in applying forensic techniques in the field and the practical use and impact of drones.
OPSEC Tradecraft
The village delves into offensive security and OPSEC methods for evading detection. It explores advanced techniques used by threat actors to breach security perimeters while staying covert, emphasizing strategies to minimize detection risk within target environments. Additionally, it highlights the significance of OPSEC in avoiding traces within corporate networks and cloud infrastructure, offering insights for proactive defense measures.
Modern Disk Forensics
In the field of digital forensics, disk analysis is vital for uncovering valuable insights in security investigations. This village delves into advanced disk analysis techniques that surpass the limitations of standard tools, enabling attendees to extract more data and gain a comprehensive system understanding. It's designed for those looking to elevate their disk forensic analysis skills for security investigations.