Building Qatar s cyber security resilience

Size: px
Start display at page:

Download "Building Qatar s cyber security resilience"

Transcription

1 QATAR 13 th - 14 th September 2015 Marriott Marquis City Center Doha Hotel, Doha, Qatar Building Qatar s cyber security resilience Proactive, Reactive and Collective Cyber Security Post event report naseba.com Industry meeting by

2 2 INTRODUCTION Introduction Dear reader, This post-event report gives a detailed breakdown and reference guide to the 7 th Edition Cyber Defence Summit held on 13 th and 14 th September 2015 in Doha, Qatar. In all, the summit hosted 153 participants mainly representing government agencies, defence and security authorities, financial institutions, oil and gas companies, utilities, telecom and ISPs, universities, large enterprises and other critical national infrastructure organisations. Under the theme Building Qatar s cyber security resilience, the agenda addressed pressing cyber security aspects such as high-level strategic planning; critical infrastructure protection; advanced persistent threat prevention; securing the cloud, mobile, big data and social platforms; addressing the human factor; risk management, business continuity and disaster recovery; collaboration and capacity building, to name a few. To address the current and future cyber security challenges of Qatar, and to propose appropriate strategies, solutions, training and technologies, 10 leading IT and Security companies showcased their capabilities in the corporate networking area. Special mention to: Gold Sponsors: BAE Systems Applied Intelligence, Fortinet, Ooredoo and Spire Solutions. Silver Sponsors: Fidelis Cybersecurity, Global Security Network and Stormshield. Bronze Sponsors: Cyberoam, Entrust and Solucom. Training Sponsor: MIH Training Academy. Most importantly, I would like to acknowledge the summit s Advisory Board, distinguished speakers, delegates and the members of the media who committed their time and support. Respectfully yours, Naveen Bharadwaj Senior Project Manager Naseba

3 3 OVERVIEW Day one, 13 th September 2015 Naseba s Managing Director Nicholas Watson welcomed the attendees and presented key statistics from a survey Naseba had conducted with over 200 CIOs and CISOs based in Qatar. Eng. Samir Pawaskar, the Summit s Chairperson, connected with the audience through his welcome address revolving around the immediate need for cyber security awareness and the various efforts being carried out by the Ministry of Information and Communications Technology (ictqatar). The opening panel, chaired by Mustapha Huneyd, emphasized the need for smart planning and effective strategies as critical national infrastructures and sensitive information are constantly falling under the radar of cyber criminals. Panelists included Claudio Lo Cicero, Simon Goldsmith, Farrukh Ahmed and Eng. Samir Pawaskar. During the 90 minute networking break, over 80 pre-scheduled and adhoc meetings were conducted between the delegates and the solution providers, all based on the current and future cyber security needs of the delegates. Immediately after the break, the participants witnessed four highly interesting presentations which included a combination of case studies, lessons learned, best case examples, product specifications and more. The presenters were Kalle Bjorn, Sameh Sabrey, Gilles Loridon and Jim Jaegar. Last session of the day was an interactive panel discussion revolving around cyber security challenges in the energy sector and practical solutions to overcome them. Moderated by Jim Jaegar, the session was joined by Aarn Wennekers, Abdul Sathar, Yasir Hamza and Claudio Lo Cicero. Day two, 14 th September 2015 Naveen Bharadwaj, Senior Project Manager at Naseba, welcomed the audience back and gave a recap of the sessions held on day one. The first session of day two was an interactive panel discussion on the subject of security implications with disruptive technologies such as cloud, mobility, big data and social media. Mohammad Ballan, Aftab Afzal and Satyanarayan Banjapally were the panelists while Sami Al Shammari was the moderator. Over 40 pre-scheduled meetings were conducted during the 60 minutes break in addition to several introductions facilitated between the delegates and solution providers. The closing panel discussion hosted Dr. Marc Dacier, Trevor Moore, Dr. Munir Tag and Gaurav Sharma. Chaired by Aarn Wennekers, the panelists elaborated the need for a collaborative approach and how capacity building can help overcome challenges. As networking plays a key role in one s professional career, the tipping point and final session of the Summit was the Naseba Networking Hub. Over 60 participants met with at least 20 of their industry peers, for 2 minutes each, all within a short span of 40 minutes.

4 4 OVERVIEW The 4 key takeaways from the interactive discussions and presentations of the agenda were: 1. Developing a culture of cyber security A lot of emphasis has been placed on upgrading infrastructures and huge amounts of money is being spent on fancy cyber security products and solutions. However, these spending and efforts would be meaningless without educating and creating awareness amongst all the stake holders of companies and people of the nation. Worldwide, actors at all levels, from individuals to nations, need to ensure that cyberspace and the systems dependent on it are resilient to evolving threats. Simple acts such as employees (from receptionist to CEO) locking their computers while not at their desks and not sharing their login credentials with colleagues to encouraging children to not divulge details online (social media) will go a long way in adding impetus to ensuring utmost cyber security. 2. Cyber security capacity building This is one key area which will decide the future of effective cyber security. ictqatar, Ooredoo, Qatar University, Qatar Foundation and several other national entitles are investing a lot of money in developing local cyber security resilience and workforces. Children are being taught cyber security at school; college students are being encouraged to take up cyber security as main stream; young innovators and entrepreneurs are being backed by physical facilities and funds to pursue cyber security as a career; and the industry is collaborating to set up local cyber security facilities that can help protect systems, detect threats, mitigate risks, report incidents and restore normal operations. All of these with an inherent emphasis on building local national resilience. 3. Protection of disruptive technologies such as cloud, mobile and big data Increasing number of enterprises are embracing cloud and mobile technologies to have the competitive edge and to better serve their customers. Volume of information being collected and processed has grown manifolds, and is contributing to business intelligence in the form of big data. While these are positive developments, they automatically open the Pandora box of security concerns. Instead of shying away from these technologies because of the threats they entail or jumping onto the bandwagon because these technologies are cool to have, organisations need to thoroughly review the pros and cons that would particularly impact their organisation and seek maximum security protection if a decision is made to implement them. Contractually pressing the solution providers to cover for security can be a great start. 4. Industry specific security focus along with dedicated risk management practices One size does not fit all therefore sectors need to come together to set up committees and panels to collectively address topics such as identification of risks in that particular sector, sector critical infrastructures, sector crisis management, standards & best practice, training and awareness, and areas for research and development. Qatar is a great example for this given the ictqatar s efforts in setting up industry specific information security risk committees such as Energy Sector Information Risk Expert Committee (EN-IREC) and Financial Sector Information Risk Expert Committee (FS-IREC). After all, ensuring utmost cyber security is a choice, a choice that is becoming mandatory. View session videos View photo gallery

5 5 ATTENDEE BREAKDOWN Understanding Qatar s current cyber security landscape In the build up to the summit, we conducted a survey with over 200 heads of IT and security from Qatar. Below are the results of some of the key questions asked. How important is cyber security to their organisation? (Rank on the scale of 1 to 10 with 10 being the most important) 1 (3%) 2 (1%) 21% 35% 3 (3%) 4 (2%) 5 (4%) 18% 6 (4%) 10% 3% 3% 1% 4% 4% 2% 7 (10%) 8 (18%) 9 (21%) 10 (35%) Does their company have existing cyber security systems and/or services? 46% Yes (54%) No (46%) 54%

6 6 ATTENDEE BREAKDOWN What is their budget allocation for cyber security? (In US$ million) 17% 11% 4% 4% 1% (63%) 1-2 (17%) 2-5 (11%) 5-10 (4%) (4%) 50+ (1%) 63% When are they looking to procure? (In months) 37% 32% 0-3 (10%) 3-6 (22%) 6-12 (37%) 10% 5-10 (32%) 22%

7 7 ATTENDEE BREAKDOWN Which of the following cyber security services and solutions are they interested in? Enterprise Security, Big Date and Security Analytics (90) Cloud, Mobile and Web Security (82) Fraud Prevention and Banking/Transaction Security (28) Network Security and Monitoring, End Point Security (115) Antivirus, Antimalware and Firewall (105) APT, Zero Day, DDoS and Targeted Attack Prevention (59) GRC, ERM, Back up, Business Continuity and Disaster Recovery (43) Incident Response, Digital Forensics, Network and Host Forensics (50) Penetration Testing and Intrusion Detection/Prevention (65) Identity, Access and API Management (47) Security Consultation and Training (55) Other (4) % 90% 92% 80 82% % 43% 50% 65% 47% 55% 28% %

8 8 SPEAKERS Speakers Aarnout (Aarn) Wennekers Advisor, Audit and Corporate Governance Ministry of Energy & Industry and Qatar Petroleum Abdul Sathar Head of ICT, IT Department Qatar Fuel Additives Company (QAFAC) Aftab Afzal Director Security BU SER and EMEA East Akamai Technologies Claudio Lo Cicero Chief Information Security Officer Maersk Oil Farrukh Ahmad Chief Information and Technology Security Officer (CIO and CTSO) Vodafone Qatar Eng. Gilles Loridon Chief Executive Officer Global Security Network Gaurav Sharma Security Architect Ooredoo Qatar Jim Jaeger Chief Cyber Services Strategist Fidelis Cybersecurity Kalle Bjorn Director, Systems Engineering Middle East Fortinet Dr. Marc Dacier Principal Scientist and Acting Director, Cybersecurity Research Group Qatar Computing Research Institute

9 9 SPEAKERS Mohamad Ballan Chief Information Security Officer Doha Bank Dr. Munir Tag Program Manager, ICT, Qatar National Research Fund (QNRF) Qatar Foundation Mustapha Huneyd Head of Corporate Information Security Ooredoo Qatar Sameh Sabry Associate Vice President Spire Solutions Sami Al Shammari IT and Telecommunications Manager Oryx GTL Eng. Samir Pawaskar Head of Cyber Security Policy and Standards Ministry of Information & Communications Technology (ictqatar) Satyanarayan Banjapally Head of SAP and IT Qatar National Cement Company Simon Goldsmith Director Cyber Security (Commercial), Middle East BAE Systems Applied Intelligence Trevor Moore Chief Information Officer Qatar University

10 10 OFFICIAL SPONSORS Official sponsors GOLD SPONSORS SILVER SPONSORS

11 11 OFFICIAL SPONSORS BRONZE SPONSORS TRAINING SPONSOR

12 12 PHOTO GALLERY Photo gallery Chairperson Samir presenting the opening remark to over 120 CIOs and CISOs Energy sector cyber security being elaborated by Aarn, Claudio, Sathar, Yasir and Jim

13 13 PHOTO GALLERY Kalle, Sameh, Gilles and Jim briefing the audience on APT, next generation threats, security automation and SCADA-IT Security. One-to-one business meeting to source cyber security solutions and services

14 14 PHOTO GALLERY Tailored peer-to-peer networking International and local solution and service providers presenting their offerings

15 15 PHOTO GALLERY Protection of disruptive technologies (cloud, mobile, big data and social media) being discussed by Sami, Satya, Aftab and Mohamad. International cyber security solution providers discussing local requirements

16 16 PHOTO GALLERY Capacity building and collaboration discussion featuring (L to R) Aarn, Dr. Tag, Gaurav, Trevor and Dr. Dacier Speed dating with a business card - corporate networking with a twist To view the complete image gallery, please click here

17 17 ATTENDEE LIST Attendee list COMPANY NAME AECOM Al Jazeera Media Networks Al Muftah Group Aspire Zone Foundation (Qatar) Aspire Zone Foundation (Qatar) Audit Bureau Bein Media Group Bein Media Group College of the North Atlantic - Qatar ConocoPhilips Customs and Ports General Authority Customs and Ports General Authority Dar Al Sharq (Media) Dar Al Sharq (Media) Doha Bank Doha Cables Doha Cables Doha Film Institute Energy City Qatar Energy City Qatar Exxon Mobil Ezdan Holding General Retirement and Social Insurance Authority Gulf Drilling International Ltd. (Q.S.C.) Gulf Drilling International Ltd. (Q.S.C.) Gulf Warehousing Gulf Warehousing Hamad International Airport Hamad Medical Corporation HSBC Bank Middle East Ltd International Medical Company Investment House Jaidah Group JX Nippon Oil & Gas Exploration (Qatar) Limited, Doha Office KEMCO Group JOB TITLE (ATTENDEE NAME) Head of Technology Architecture I T Manager Information Security Officer Head of IT Strategy & Governance Head of IT Executive Director of Technology Dean of I T & BP, Russia,Caspian,Africa & Middle East Network & Security Manager Network Manager ITI Section Head Information Security Officer Assistant Head of Information Technology CTO Sr. Electrical Manager Middle East System and Network Unit Supervisor IT Security & Governance Specialist Senior Internal Auditor Senior Manager IT IT Audit Manager IT Security Manager HICT Manager Country Head-Security and Fraud Risk Internal Audit Manager IT Director

18 18 ATTENDEE LIST COMPANY NAME KG Group Khalid Cement Mada (Qatar Assistive Tecnology) Mall of Qatar Masraf Al Rayan Ministry of Administrative Development Ministry of Economy and Finance Ministry of Economy and Finance Ministry of Interior Ministry of Interior Ministry of Interior Ministry of Interior Ministry of Labour and Social Affairs Ministry of Youth and Sports Mowasalat Nasser Bin Khaled New Port Project Occidental Petroleum - OXY Ooredoo Petroserv Primary Health Care Corporation (PHCC) Q Post Q Post Qatalum Qatar Aeronautical College Qatar Central Bank Qatar Computing Research Institute - Qatar Foundation Qatar Development Bank Qatar Foundation for Elderly People Care Qatar Fuel - WOQOD Qatar Fuel - WOQOD Qatar Fuel Additives Company Qatar Gas Transport Company Qatar International Islamic Bank Qatar International Islamic Bank Qatar Investment Authority Qatar Investment Authority Qatar Lubricants Co. Ltd JOB TITLE (ATTENDEE NAME) Director of IT Information Security Manager Head of System Administration IT Director Senior IT Advisor IT Security Head IT Security Officer IT Security Officer IT Security Manager Information Security Manager IT Director IT Applications Manager Director of BIT Finance & Team Lead - IT Infrastructure & Operations Head- IT Security Head of IT Head of IT Projects Chief of Systems Development IT Director Head of IS/IT infrastructure & security IT Consultant & Acting Head of IT Head of Information Security Unit Manager of Research Computing IT Security Administrator Applications Development Manager Application Security Manager Head of ICT Head of Infrastructure, Information Technology Head of Information Security Head of IT Infrastructure, Support and Delivery Enterprise IT Security IT Service Manager Systems Manager

19 19 ATTENDEE LIST COMPANY NAME Qatar Meteorology Department CAA Qatar Meteorology Department CAA Qatar National Cement Company Qatar National Library Qatar National Research Fund Qatar National Research Fund Qatar News Agency Qatar Olympic Committee Qatar Petrochemical Company (QAPCO) Qatar Petrochemical Company (QAPCO) Qatar Petrochemical Company (QAPCO) Qatar Petrochemical Company (QAPCO) Qatar Petrochemical Company (QAPCO) Qatar Petrochemical Company (QAPCO) Qatar Ports Management Company Qatar Power Qatar Red Crescent Society Qatar Steel Company Qatar Steel Company Qatar University Qatar Vinyl Company LTD Qatari Investors Group Qatari Public Prosecution Qatari Public Prosecution Ras Laffan Power Company (RLPC) - Qatar Petroleum Salam International Investment Sidra Medical and Research Center The Commercial Bank of Qatar The Commercial Bank of Qatar The Commercial Bank of Qatar The Commercial Bank of Qatar The Group Securities Total Global Transind Holding United Bank Limited Weill Cornell Medical College Weill Cornell Medical College JOB TITLE (ATTENDEE NAME) Network Manager Head of Networks head of IT and SAP Associate Director for Library Information Technology Program Officer IT Advisor CIO IT Security Consultant Head of Automation & Head of E & A Head of Automation Assistant Head of Engineering E & A Lead Specialist IT Security Lead Assistant Head of IT Security Director of Information Technology Information Security Lead Information Security Manager Senior Information Security Officer Consultant Network Manager Senior Security Consultant Administration Manager Unix and Security Manager Head of Systems Security Acting Head of Information Security Head of Information Security Information Security Specialist Senior IT Auditor IT Perfomance Manager Lead IT Security (RSSI-L), Compliance (IMCM) and Projects Head of IT Head Of I T Director, ITS Operations Senior Manager Network/ Telecommunications/Audio Visual

20 20 TESTIMONIALS Testimonials Majority of the attendees were decision makers and key influencers. We are confident of doing business with them soon. Spire Solutions Associate Vice President Naseba staff were very well organised and helped us to the maximum extent. The event is successful for us. BAE Systems Director Cyber Security (Commercial) Middle East This truly is better than regular exhibitions and conferences. We will definitely consider participating again. Fidelis Cyber Security Chief Cyber Security Strategist Lots of high level attendees. One to one meetings are a great idea. Very satisfied. Ooredoo Head of Corporate Information Security Very professional and well organised platform. Global Security Network Chief Executive Officer

21 21 UPCOMING EVENTS Upcoming events Hotel Technology Summit November 22 nd - 23 rd 2015 Dubai, United Arab Emirates Municipality Expansion & Excellence Summit (Smart Cities) November 25 th - 26 th 2015 Riyadh, Saudi Arabia 8 th Edition Cyber Defence Summit February 23 rd - 24 th 2016 Riyadh, Saudi Arabia 7 th Annual Kingdom Smart Government Summit May 8 th - 9 th 2016 Riyadh, Saudi Arabia 9 th Edition Cyber Defence Summit September 6 th - 7 th 2016 Doha, Qatar Upcoming training Certified Information Systems Risk and Compliance Professional Training February 14 th 18 th 2016 Dubai, UAE COBIT 5 Foundation Certification Training November 29 th December 1 st 2015 Doha, Qatar Lean IT Management Foundation Course February 7 th 9 th 2016 Doha, Qatar

22 22 CONTACT INFORMATION Contact information NASEBA Boutique Villa No 5, Dubai Media City Dubai - United Arab Emirates P F [email protected] WE ARE ON Contacts NAVEEN BHARADWAJ Senior Project Manager [email protected] ROMELL GUMMBS Sponsorship Manager [email protected] SUMEDHA JOSHI Marketing Manager [email protected] PATRICK WILLIAMS Delegates Manager [email protected]

23 23 ABOUT NASEBA About naseba Naseba offers business facilitation expertise in growth markets. We create deal flow, foster networking and enhance knowledge exchange. Naseba supports you with educating your workforce, entering new markets, raising capital, securing partners and closing sales. Our services include investor introductions, industry meetings, leadership forums, and professional trainings. Investor introductions provide pre-qualified business cases with direct meetings with pre-screened investors. Industry meetings connect pre-screened purchasing decision makers with solution providers to shorten their sales cycle. Leadership forums bring together business executives through an interactive agenda of keynotes, panels and workshops produced to drive change. Professional trainings offer a wide range of executive courses, crafted to advance careers and execute business strategy. Naseba partners with governments, key figures in media, industry and academia to add real value to our network worldwide. Since inception in 2002, Naseba has connected over 80,000 executives globally through more than 700 proprietary business platforms. Naseba operates from 4 main offices in India, Saudi Arabia, United Arab Emirates and the United States, and local representatives in Algeria, China, Malaysia, Portugal and Spain. Naseba. Creating opportunity.... For more information visit

24 24 ABOUT NASEBA Since inception in 2002 naseba has produced over 700 events and played host to 80,000 delegates globally. 700 INITIATIVES DELEGATES Naseba operates from 4 main offices in India, Saudi Arabia, United Arab Emirates and the United States, and local representatives in Algeria, China, Malaysia, Portugal and Spain.

25 Investor introduction Industry meetings Leadership forums Professional training

POST EVENT REPORT 2015

POST EVENT REPORT 2015 HOW THE BIG DATA REVOLUTION CAN POWER YOUR BUSINESS! POST EVENT REPORT 2015 ORGANISED BY: TABLE OF CONTENTS 3 4 5 6 7 8 9 12 Thank you Letter Sponsors and Partners Masterclass Leaders and Speakers Workshops

More information

March 23 rd 2014 Grosvenor House, Dubai, UAE www.uae.conceptsmideast.com. Post Event Report

March 23 rd 2014 Grosvenor House, Dubai, UAE www.uae.conceptsmideast.com. Post Event Report March 23 rd 2014 Grosvenor House, Dubai, UAE www.uae.conceptsmideast.com Post Event Report 2 INTRODUCTION Introduction naseba thanks you for your support Dear Participant, I would like to thank you for

More information

SECURING PAYMENTS IN THE CYBER WORLD

SECURING PAYMENTS IN THE CYBER WORLD The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages

More information

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

ISACA S CYBERSECURITY NEXUS (CSX) October 2015 ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration

More information

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK 1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association

More information

KINGDOM e-government SUMMIT

KINGDOM e-government SUMMIT KINGDOM e-government SUMMIT 10 th - 11 th May 2015 Riyadh, Kingdom of Saudi Arabia kingdomegovsummit.com 6 TH ANNUAL KINGDOM E-GOVERNMENT SUMMIT - FINAL AGENDA - DAY 1 08:00 08:50 Day One Registration

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s IDC Middle East, Africa, and Turkey, Al Thuraya Tower 1, Level 15, Dubai

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

Qatar Computer Emergency Team

Qatar Computer Emergency Team Cyber Security Division Qatar Computer Emergency Team An initiative Introduction Qatar aims to fully exploit information and communications technology to become one of the most successful knowledge-based

More information

Partnership prospectus

Partnership prospectus Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office

More information

WFES 2014 Overview Where the World of Future Energy Comes Together

WFES 2014 Overview Where the World of Future Energy Comes Together WFES 2014 Overview Where the World of Future Energy Comes Together Since its inception in 2008, the World Future Energy Summit (WFES) has fast emerged as the leading renewable energy conference and exhibition

More information

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack A New Security Publication About Risk and Security for Business Leaders Sponsorship & Advertising Media Pack Introduction from the Team All organisations need to manage and protect their information effectively,

More information

Glimpses of Media coverage of the 3 rd Business & IT Resilience Summit 2014, Dubai

Glimpses of Media coverage of the 3 rd Business & IT Resilience Summit 2014, Dubai SPECIAL ADDRESS 1: Dr. Saif Al Dhaheri, Director Safety & Prevention, NCEMA Some of our distinguished speakers SPECIAL ADDRESS 2: Steve Mellish, who has just finished his 2-year term as The BCI Global

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

CURRICULUM VITAE. 3. Intermediate Accounting I 4. Intermediate Accounting II

CURRICULUM VITAE. 3. Intermediate Accounting I 4. Intermediate Accounting II Last update: 16 May 2014 CURRICULUM VITAE PERSONAL PROFILE Name: Rajab Abdulla Al Esmail, PhD Designation: Assistant Professor Nationality: Qatari Telephone (Office): (974) 4403 5022 Department: Accounting

More information

[ sponsor prospectus ]

[ sponsor prospectus ] EMIRATES PALACE +2011 UNITED ARAB EMIRATES In partnership with: Supported by: [ sponsor prospectus ] EXPO: DECEMBER 14 15 www.blackhat.com BLACK HAT IS THE WORLD S MOST IMPORTANT INFORMATION SECURITY CONFERENCE

More information

The 3rd Gulf Intelligence Qatar Energy R&D Forum

The 3rd Gulf Intelligence Qatar Energy R&D Forum The 3 rd Gulf Intelligence Qatar Energy R&D Forum Under the Patronage of Qatar University Event: The 3rd Gulf Intelligence Qatar Energy R&D Forum Date: April 28 th 2015 Time: 07:30 14:30 Venue: Theme:

More information

T 902-424-1404 C 902-717-8605

T 902-424-1404 C 902-717-8605 PREPARED BY: Alicia Billard Acting Director, Fund Development Canadian Red Cross Atlantic Zone 133 Troop Avenue Dartmouth Nova Scotia CA B3B 2A7 [email protected] T 902-424-1404 C 902-717-8605

More information

The 2 nd MENA Healthcare Infrastructure Investment & Finance Summit 2011

The 2 nd MENA Healthcare Infrastructure Investment & Finance Summit 2011 10 10 & 11 11 October October 2011 2011 Infrastructure Investment & Finance Summit 2011 Riyadh Marriott Hotel, Saudi Arabia Euroconvention Conferences Brussels Office: avenue Victor Jacobs 78, B - 1040

More information

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015 Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key

More information

INTERNATIONAL EMPLOYMENT GROUP. Employment Services in Oman

INTERNATIONAL EMPLOYMENT GROUP. Employment Services in Oman INTERNATIONAL EMPLOYMENT GROUP Employment Services in Oman We continue to recommend them to others because of their strength in dealing with detail CHAMBERS GLOBAL 2015 10-5112821-9 0 Addleshaw Goddard's

More information

DIGITAL ENTERPRISE TRANSFORMATION (DET) SUMMIT, 2015

DIGITAL ENTERPRISE TRANSFORMATION (DET) SUMMIT, 2015 DIGITAL ENTERPRISE TRANSFORMATION (DET) SUMMIT, 2015 Overview We find ourselves in the thick of the Digital Revolution. Riding on the back of a broadband economy, there is a growing emphasis on creating

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

Qatar Transport Infrastructure 2015

Qatar Transport Infrastructure 2015 Qatar Transport Infrastructure 2015 13th 14th October 2015 Sheraton Doha Resort & Convention Hotel, Qatar Benefits of attending this Premier Conference include: Capitalising in the GCC s rapidly expanding

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]

More information

HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS

HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS 8 10 March 2016 Farnborough, Hampshire Dedicated CYBER ZONE! HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS Key theme for 2016: Transformational Change POLICING & COUNTER TERRORISM CRITICAL NATIONAL

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

Secure by design: taking a strategic approach to cybersecurity

Secure by design: taking a strategic approach to cybersecurity Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

First World Summit Award Mobile Content

First World Summit Award Mobile Content UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION First World Summit Award Mobile Content Releasing mobile potential for development Keynote Address by Mr. Jānis Kārkliņš Assistant Director

More information

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National

More information

DESIGN WEEK. www.bidw.co

DESIGN WEEK. www.bidw.co DESIGN WEEK www.bidw.co BAHRAIN INTERNATIONAL DESIGN WEEK ANNUAL EXHIBITION 5 th 7 th DECEMBER 2013 KINGDOM OF BAHRAIN EXHIBITION SUMMARY BAHRAIN INTERNATIONAL DESIGN WEEK (BIDW) is dedicated to gather

More information

Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research

Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 5-11 5 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa

More information

Security First 2007 Seminar

Security First 2007 Seminar Organizer Diamond Sponsor Platinum Sponsor Patron s SEMINAR AGENDA Introduction As ICT advancements happen, convergence of networks takes on an even faster pace. Protection against intrusions, prohibited

More information

National Cyber Security Strategy of Afghanistan (NCSA)

National Cyber Security Strategy of Afghanistan (NCSA) Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA

More information

Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information www.wipro.com RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information Saritha Auti Practice Head - Enterprise Security Solutions, Wipro Table of Contents 03... Abstract 03... Why

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

STATE, GOVERNMENT, & LEGISLATIVE INSTITUTIONS

STATE, GOVERNMENT, & LEGISLATIVE INSTITUTIONS USEFUL CONTACTS NUMBERS GENERAL INFORMATION ON KUWAIT Kuwait Information Office 2600 Virginia Avenue, NW, Suite 404, Washington DC, 20037, USA Tel: (+1) (202) 338 0211 Fax: (+1) (202) 338 0957 Eml: [email protected]

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

Press January 2014. Intersec 2014, Dubai International Convention and Exhibition Centre, Dubai, UAE January 19 21, 2014

Press January 2014. Intersec 2014, Dubai International Convention and Exhibition Centre, Dubai, UAE January 19 21, 2014 Press January 2014 Intersec 2014, Dubai International Convention and Exhibition Centre, Dubai, UAE January 19 21, 2014 For more information, please contact: Roisin Bailey Epoc Messe Frankfurt GmbH P.O.

More information

Smart Security. Smart Compliance.

Smart Security. Smart Compliance. Smart Security. Smart Compliance. SRM are dedicated to helping our clients stay safe in the information environment. With a wide range of knowledge and practical experience, our consultants are ready to

More information

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually

More information

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security

More information

Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director

Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director 2 Thanks To the ITU for sponsoring the initiative ictqatar has worked closely with the ITU-D since the project s inception,

More information

IOSCO s Education and Training Programs

IOSCO s Education and Training Programs IOSCO s Education and Training Programs IOSCO s Education and Training Program has become a powerful vehicle for advancing the organization s regulatory goals and building the regulatory capacity of its

More information

ATM Security Training Middle East Riyadh, Saudi Arabia 23 rd & 24 th February 2013

ATM Security Training Middle East Riyadh, Saudi Arabia 23 rd & 24 th February 2013 ATM Security Training Middle East Riyadh, Saudi Arabia There are now over 2 million ATM s in use globally according to the ATM Industry Association and a recent report by RBR estimates that there will

More information

www.questevents.com.au

www.questevents.com.au and the implications for Australian gas exports and project viability Sponsorship and Exhibition Opportunities Organised by: EXAMINING THE IMPLICATIONS OF GLOBAL ENERGY MARKET MOVEMENTS FOR AUSTRALIAN

More information

Professional Certificate in Ethics and Anti-Corruption Compliance

Professional Certificate in Ethics and Anti-Corruption Compliance in partnership with Professional Certificate in Ethics and Anti-Corruption Compliance Maxwell Chambers, Singapore, November 18th & 19th 2015 Enhance & develop your understanding of Ethics & Compliance

More information

BURSTING WITH EDUCATION IDEAS

BURSTING WITH EDUCATION IDEAS BURSTING WITH EDUCATION IDEAS GESS DUBAI 2015 SHOW REVIEW GESS DUBAI 2016 1-3 MARCH 2016 DUBAI WORLD TRADE CENTRE THE LEADING EDUCATION EXHIBITION AND CONFERENCE IN THE MIDDLE EAST W W W. G E S S D U B

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Protecting critical infrastructure from Cyber-attack

Protecting critical infrastructure from Cyber-attack Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale

More information

Cyber Security solutions

Cyber Security solutions Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside

More information

presents Energy Summit 2015 STOCKHOLM SEPTEMBER 23-24 SPONSORSHIP PROSPECT The conference is organized and arranged by: www.energysummit.

presents Energy Summit 2015 STOCKHOLM SEPTEMBER 23-24 SPONSORSHIP PROSPECT The conference is organized and arranged by: www.energysummit. presents Energy Summit 2015 STOCKHOLM SEPTEMBER 23-24 SPONSORSHIP PROSPECT The conference is organized and arranged by: www.energysummit.nu SUMMARY SVD ENERGY SUMMIT 2015 STOCKHOLM SEPTEMBER 23-24 DELEGATE

More information

Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards

Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards Private Banking: London 2015 asks important questions about the future of private banking in the face of a dramatically

More information

1 ST ANNUAL CIVIL PROJECTS DIVISION (CPD) PROJECT MANAGEMENT FORUM

1 ST ANNUAL CIVIL PROJECTS DIVISION (CPD) PROJECT MANAGEMENT FORUM 1 ST ANNUAL CIVIL PROJECTS DIVISION (CPD) PROJECT MANAGEMENT FORUM CONSTRUCTION PROJECTS IN OIL AND GAS CHALLENGES AND IMPROVEMENTS Tuesday 10 November 2015 Co-located with the Abu Dhabi International

More information

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing

More information

AL ABDULKARIM HOLDING

AL ABDULKARIM HOLDING AL ABDULKARIM HOLDING Industrial Systems Group Naizak Global Engineering Systems East West Trading International Saudi Arabia / Dubai / Bahrain / Qatar / Kuwait / Jordan / India / Kazakhstan Group Profile

More information

Cyber Security: from threat to opportunity

Cyber Security: from threat to opportunity IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Udyen Jain & Associates Quality and expertise that you deserve. OCA, Organisation Conseil Audit Your vision, our expertise

Udyen Jain & Associates Quality and expertise that you deserve. OCA, Organisation Conseil Audit Your vision, our expertise Udyen Jain & Associates Quality and expertise that you deserve OCA, Organisation Conseil Audit Your vision, our expertise Mikaël Ouaniche Mikaël Ouaniche is a Chartered Accountant and Legal Auditor, Graduate

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool

ICBA Summary of FFIEC Cybersecurity Assessment Tool ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary

More information

SAP Learning Hub: Learning Rooms. List of available and upcoming learning rooms as of March 2015

SAP Learning Hub: Learning Rooms. List of available and upcoming learning rooms as of March 2015 SAP Learning Hub: Learning Rooms List of available and upcoming learning rooms as of March 2015 Learning Rooms Learning Rooms are expert-moderated social learning components within SAP Learning Hub. They

More information

BIG DATA BIG FUTURE. www.bigdataworldshow.com. 25-26 March 2014 Singapore. HRDF Claimable (SBL Scheme)

BIG DATA BIG FUTURE. www.bigdataworldshow.com. 25-26 March 2014 Singapore. HRDF Claimable (SBL Scheme) www.bigdataworldshow.com HRDF Claimable (SBL Scheme) BIG DATA BIG FUTURE 25-26 March 2014 Scan the QR code above for more info on Big Data World Show WHO SHOULD SPONSOR? Why you should attend? SINGAPORE

More information

Making M2M communications the heart of your corporate ecosystem

Making M2M communications the heart of your corporate ecosystem Making M2M communications the heart of your corporate ecosystem POST SHOW REPORT 2014 Thank you The 2nd M2M Middle East Forum and Etisalat M2M Awards were held from 11-12 May 2014 at the Address Dubai

More information

Playing Our Part in Responding to National Threats

Playing Our Part in Responding to National Threats Agenda Item 7 Report of: The Secretary of the Police and Crime Panel Date: 1 February 2016 1. Purpose of Report Playing Our Part in Responding to National Threats 1.1 This report provides Members with

More information

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime. Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the

More information

CyberSecurity Innovation Assessing your Organizations Vulnerability to a Cyber breach

CyberSecurity Innovation Assessing your Organizations Vulnerability to a Cyber breach CyberSecurity Innovation Assessing your Organizations Vulnerability to a Cyber breach Steve Mullan Co Founder of Cognition Secure Ltd https://cognitionsecure.com Thank You 7/12/2015 Copyright Cognition

More information

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 HPC IN Cybersecurity 2015 Annual Technical Meeting Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 FEATURED SPEAKERS Addison Snell CEO, Intersect360 Research Addison Snell is the CEO of Intersect360

More information

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack

More information

Challenges and Opportunities for Online Distance Learning in the UAE

Challenges and Opportunities for Online Distance Learning in the UAE Challenges and Opportunities for Online Distance Learning in the UAE 19 th September 2014 Pune, India Dr. Naji AlMahdi Chief of the National Institute for Vocational Education Content The United Arab Emirates

More information

Halo. NZ s leading business conferences. Business Intelligence. From

Halo. NZ s leading business conferences. Business Intelligence. From From Supporting Organisations Silver Sponsors Halo Business Intelligence NZ s leading business conferences DAY 1 19th February 8.30 Registration and coffee 9.00 Opening remarks from the Chair David Bloch,

More information

PhoenIx. Integrated Fire Protection & Security Solutions. www.phoenixinternational.com.qa

PhoenIx. Integrated Fire Protection & Security Solutions. www.phoenixinternational.com.qa PhoenIx Integrated Fire Protection & Security Solutions www.phoenixinternational.com.qa A major fire, with its devastating effects, could be the end of your business. Lives can be placed at risk, proper

More information

aerospace www.aerosupplychain.com 2nd supply chain summit 2016 18 th -19 th May, 2016

aerospace www.aerosupplychain.com 2nd supply chain summit 2016 18 th -19 th May, 2016 2nd aerospace supply chain summit 2016 Hosted by Dubai South, Head Office building (Master Hall), Jebel Ali, Dubai, United Arab Emirates Organised by 2nd annual Aerospace Supply Chain Summit to Coincide

More information

Conference SPONSORSHIP PROPOSAL

Conference SPONSORSHIP PROPOSAL APNIC Sponsors are exposed Why sponsor the APNIC 40? Reach and engage with the Internet community to a highly engaged international audience of technical, operational, and policy-making Internet communities.

More information

Sponsorship Opportunities 5-2016. Thomas Odams. Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents.

Sponsorship Opportunities 5-2016. Thomas Odams. Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents. Sponsorship Opportunities 5-2016 Thomas Odams Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 [email protected] About The RANT Forum (Risk and Network Threat Forum) The RANT Forum

More information

FIDIC is the International Federation of Consulting Engineers. Its members are national associations of consulting engineers.

FIDIC is the International Federation of Consulting Engineers. Its members are national associations of consulting engineers. About FIDIC FIDIC is the International Federation of Consulting Engineers. Its members are national associations of consulting engineers. Founded in 1913, FIDIC is charged with promoting and implementing

More information

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber

More information

California Counties Information Security Programs A look into the progress and future plans across counties

California Counties Information Security Programs A look into the progress and future plans across counties CCISDA California Counties Information Services Directors Association California Counties Information Security Programs A look into the progress and future plans across counties 2010 Progress Report April

More information

Defending Against Cyber Security Threats to the Payment and Banking Systems

Defending Against Cyber Security Threats to the Payment and Banking Systems NYU Leonard N. Stern School of Business Master of Science Risk Management RISK MANAGEMENT SYMPOSIUM 2015 Defending Against Cyber Security Threats to the Payment and Banking Systems Andrew Koh Class of

More information

Eyefortransport Middle East Summit - Dubai

Eyefortransport Middle East Summit - Dubai Middle East - Connecting the Middle East to the World: Key Success Factors for Logistics Companies by Dr. Mehmet Gumus American University of Outline 1. Logistics costs as % GDP 2. Integrated Logistics

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information