Title |
Speakers |
Summary |
Topic Types |
The Strategy Concept - Cyber Resilience |
Samir Omar
|
N/A |
|
Next Generation Of Pentesting |
Mohammed Ali Alghamdi
|
N/A |
|
Building The Cyber-Resilient Smart City |
William Malik
|
N/A |
|
The Cybersecurity Blind Spots Of Connected Things |
Rasheed A. Alodah
|
N/A |
|
The New Security Playbook: Taming The Unmanaged And IoT Device Tsunami |
Curtis Simpson
|
N/A |
|
eCrime Evolution |
Greg Foss
|
N/A |
|
De-Risk Your Business Through Zero Trust |
Baldeep Dogra
|
N/A |
|
Resilient Security In A Remote World - Using Asymmetry For The Defenders |
Sam Curry
|
N/A |
|
Next-Generation Cyber Ranges. From Skills Development To Cyber Resilience |
Dr. Almerindo Graziano
|
N/A |
|
Cyber Resilience In The Data Age |
James Hanlon
|
Nationalizing |
|
Ransomware Innovation Is Not Only For The Adversary |
Mike Sentonas
|
N/A |
|
Protecting What’s Now And What’s Next |
Shelly Blackburn
|
N/A |
|
Zero-Trust, The Cornerstone Of Future Cyber Resilience |
Jeff Roemer
|
N/A |
|
Securing Cloud Environments, Staying On Top Of Cloud Configurations To Prevent Data Leaks And Inadvertent Exposure |
Paul ‘pj’ Norris
|
N/A |
|
How Secure Are You ? |
Adam Palmer
|
N/A |
|
Panel Session: Methodologies To Track And Identify Targeted Activity From Specific Adversaries |
Nicholas Palmer
,
Majd Sinan
,
Joost Van Hest
,
Ian Schenkel
,
Syed Abid Ali
,
Mohammed A Tayeb
|
N/A |
|
Managing Security And Operational Risk In Critical Infrastructure |
James Carder
|
N/A |
|
Panel Session: Women In Cyber - Nationalizing Our Most Precious Resources |
Adenike Cosgrove
,
Basma Ahmadoush
,
Dr. Fatimah Alakeel
,
Sanara Marsh
|
N/A |
|
An Overdue Shift To People-Centric Security |
Andrew Cosgrove
|
N/A |
|
Strategic Security Priorities For 2020 And Beyond |
Cyril Voisin
|
N/A |
|
Artificial Intelligence For Cyber Security: Are We There Yet? |
Bushra Alahmadi
|
N/A |
|
Navigating The Cyber Threat Intelligence Noise |
Andrew De Lange
|
N/A |
|
IoT And Digital Risk |
Arthur Fontaine
|
N/A |
|
Smarter Cities Will Require Smarter Security |
Geraldine Price
|
N/A |
|
Connecting The Dots... Cyber Security Domains |
Samir Omar
|
N/A |
|
Trend Micro 2020 Midyear Cybersecurity Report Securing The Pandemic-Disrupted Workplace |
Bilal Baig
|
N/A |
|
Minimising Risk From Cyber Threats: Focus On Reducing Time To Containment |
Jan Tietze
|
N/A |
|
Using Threat Intelligence To Improve Your Cyber Resilience |
Kiri Addison
|
N/A |
|
Know Your Friends Well, Know Your Enemies Better.. Threats That Matter |
Jamil Abu Aqel
|
N/A |
|
10 Steps To Universal Privilege Management |
Morey J. Haber
|
N/A |
|
Thinking Beyond Technology Adaption In SecOps |
Anas Hadidi
|
N/A |
|
The Evolution Of Networks From Cyber Resistance To Resilience; In An Age Of Smart Cities, Digital Economies & IOT |
Yasir Liaqatullah
|
N/A |
|
The Human Element |
Erik Wallace
|
N/A |
|
New Threats And The New Normal - Secure Mobile Working In The COVID Era |
Tom Davison
|
N/A |
|
Towards Cyber Defending Organizations From Physical World Calamities |
Dr. Amin Hasbini
|
N/A |
|
Building A Root Of Trust To Secure Your Digital Transformation |
Sébastien Pavie
|
N/A |
|
Other People’s Platforms: Defeating Online Fraud Outside Your Virtual Jurisdiction |
Dr. Sam Small
|
N/A |
|
Panel Session: Zero Trust And The Importance Of Securing Data |
Vishal Gupta
,
Osman Khan
,
Rajiv Raghunarayan
,
Daniel Wright
,
Ashraf Koheil
,
Mohamed Almuzanen
|
N/A |
|
Security Operation Center And Effectiveness |
Mohannad Alkalash
|
N/A |
|
How Cyber Deception Fit In The MITRE ATT&CK Cyber Framework And Shield Cyber Knowledge Base? |
Ray Kafity
|
N/A |
|
Women In Cybersecurity: The Changing Face Of The Workforce |
Deshini Newman
|
N/A |
|
The Future Of Security Operations With Machine Learning And Analytics |
Rami Gherbal
|
N/A |
|
Closing Speech |
Samir Omar
|
N/A |
|