Conference Agenda - Doha

  • Day 1 - MESCON Conference

08:00   Coffee and Registration

09:00  Welcome Note from MESA

09:10  OPENING REMARKS from the CHAIRMAN

KEYNOTE SESSION

09:30     INTERNATIONAL KEYNOTE: The Benefits of Security Automation and Orchestration for CISOs

Must Humans Be Replaced by Artificial Intelligence and Machine Learning? - The speaker will demonstrate why fully unattended and unconditional automation is a path and not a turnkey. Dario will also share the results of a 100+ CISO Survey on this topic, proposing a gradual and effective approach to security automation and orchestration based upon Supervised Active Intelligence. All the above with the goal of lowering the reaction time up to 80% and guaranteeing the Return on Investment.

Dario V. Forte - Founder & C.E.O – DFLABS

10:00     CISO INSIGHTS PANEL: Cybersecurity Innovation & Future Traits

The digitalization phenomenon in the hyper-connected world has made the businesses think seriously about the cyber threats as it impacts the business growth and digital economy. This session discussed the latest security tactics and strategies from the regional and global security executives.

MODERATOR: Ahmed Baig, Founder, CISO Council

Kenan Begovich, Group Director of Information Security – beIN MEDIA GROUP

Abdulla Al Sayari, Chief Information Security Officer (CISO) – HAAD

Sameer Pawaskar, Manager - Cyber Security Strategy and Policy, Cyber Security Division (Q-CERT) – ictQATAR

10:30     Headline Keynote: Adversarial Thinking — The Single Most Effective Way to Improve Your Security
In Cybersecurity is full of hits and misses. With an every changing threat landscape, it’s easy to end up trying numerous new defences, only to watch them fail. After studying the wins (and the losses) for the last two decades, we’ll explain what Adversarial Thinking really means, and how it can fundamentally change your approach to security.

              Shenoy Sandeep –AVP– Spire Solutions

11:00     ASSOCIATE PARTNER KEYNOTE: Emerging Cyber Threats & Attack Trends:

The threats that will keep your security team awake this year – and what can you do to help. The session highlights the attack trends expected to be on rise in 2017 and emphasizes on the lessons to be learnt from the recent past attacks on various organizations.

Ahmed Qurram Baig, Co-Founder – CISO CONNECT

11:20        Networking Coffee Brneak

11:45     EMERGING SECURITY PANEL: Defending your business: Earlier Detection and Effective Response?

Organizations today are preparing themselves against the unknown and unseen attacks. The cyber threats have evolved from relatively simple to highly complex targeted and sophisticated attacks. Unfortunately, organizations have to defend themselves at all levels and have a robust incident response. However, the time taken to detect an attack and track the activity of adversaries on you network is a challenge. Join us in a conversation about what businesses can do to reduce time for detection and response to improve their ability to protect their critical assets.

              MODERATOR: Ahmed Baig, Founder, CISO Council

Faisal Babu – Security Specialist – GDI

Mustafa Bengali – CISO - Ooredo

Prem Kumar Boddu, CISO - Doha Bank

12:15     Guest Keynote: A FireEye-Mandiant perspective on emerging Cyber Threats

The session will look at Mandiants M-Trends report for 2017, based on the analysis of the many breaches we responded to in the past year. It will examine the emerging attacker and defensive trends as well as FireEye’s approaches to mitigating these threats.

Dennis Oommen, Government Sales - FireEye

12:40     TECHNICAL TRACK: 2017 State of Malware

This comprehensive report covers the currnt global threat landscape with specifics for the Middle East and looks at how Malwarebytes can provide the protection you need for each phase of the threat lifecycle.

Mehdi Benali, Security Engineer - Malwarebytes

13:10        Lunch & Prayer Break

14:00     SECURITY MANAGEMENT TRACK: Securing Digital Transformation in Financial Industry

The threats that will keep your security team awake this year – and what can you do to help. The session highlights the attack trends expected to be on rise in 2017 and emphasizes on the lessons to be learnt from the recent past attacks on various organizations.

Vivek Silla, Executive Manager - Corporate Security – Bank Saudi Fransi

14:25     Guest Keynote: Known vulnerabilities can become your major risk – a process approach to tackle the problem

Advanced threats and zero-day attacks are hot topics on cyber security, but common vulnerabilities remain a major issue for CISOs. The overall risks around vulnerabilities are known. However, the rapidly changing and new technologies are making IT environments more complex and thus making the vulnerability management more challenging. In this presentation, we cover the challenges posed by vulnerabilities and look at them in the light of example breaches. Further, we look into a process approach to tackle the problem.

Jukka Puputti – Regional Director – F - Secure Corporation

14:50     DATA PROTECTION: Data Security and GDPR – Compliance Strategies to Middle Eastern Organizations

European Union General Data Protection Regulation (GDPR) introduces significant compliance, security and data privacy challenges; and every organization trading in the EU and processing personal data of EU residents shall comply with this regulation. The topic will focus on the impacts of this regulation to the Middle East Organizations, the strategies to achieve the compliance by implementing data governance and security control measures, and how to protect the full lifecycle of personal data through a ‘privacy by design’ concept mandated by GDPR.

Faisal Babu– IT Governance and Security Specialist – Gulf Drilling International Ltd (Q.S.C.), Qatar.

15:15    Closing Remarks from Chair Person

15:30    Closing Remarks from MESCON

15:40   CLOSING Coffee Break

Industry Talks

Presentations & Panels by experts sharing best practices and success stories.

Live Demos

Experience demonstration and walk through of over 100 leading cyber-security solutions by security vendors

Security Workshops

Take this unique opportunity to learn from the experts from industry and your peers