MENA Industrial Cybersecurity Conference 2021
DAY 1 | 15th November 2021, MONDAY
10:00 – 17:00
10:00 AM
WELCOME NOTE
10:05 AM
OPENING KEYNOTE – GUEST OF HONOR
10:15 AM
OVERCOMING IT/OT CYBERSECURITY CONVERGENCE ROADBLOCKS
- Securing the rapidly changing Industrial IT/OT Landscape
- How IT/OT collaborations enhance customer visibility and cyber security
- Major considerations while transitioning to an IT/OT SOC
10:30 AM
PANEL DISCUSSION | CISO PANEL: REDEFINING THE ROLE OF CISO IN INDUSTRY 4.0 REVOLUTION
- Key factors to consider while building a comprehensive cyber security program?
- Security at the core of an enterpise – Re-internalisation of cyber security
- AI/ML and Automation – A CISO’s Playbook in the digital era
11:00 AM
NETWORKING BREAK, MEETINGS & CONTESTS
11:15 AM
CYBER AI & ITS ROLE IN SAFEGAURDING OT SYSTEMS
- Securing OT in remote working conditions
- Operational Integrity: Safeguarding OT Systems Artificial Intelligence
- How AI can solve the growing problem of network security
11:30 AM
PANEL DISCUSSION | ROLE OF CIO IN IIOT INTEGRATION AT INDUSTRIAL ORGANIZATIONS
- Developing the IIoT reference architecture
- Securing the IIoT value chain and ecosystem structure
- Barriers in cyber physical security and how to overcome them?
12:00 PM
NETWORKING BREAK, MEETINGS & CONTESTS
12:15 PM
SECURING BUILDING MANAGEMENT SYSTEMS & DATA CENTERS WITH OT SECURITY MONITORING
- The changing landscape threat of data centers
- Defining standard metrics to track and measure OT security
- Developing OT-specific incident response processes
12:30 PM
HARDWARE CYBERSECURITY – SECURING INDUSTRIAL DEVICES AND NETWORK
- Hardware security technologies for Industrial IoT
- What are the biggest hardware security threats
- How to secure your industrial network and all its connected devices
12:45 PM
Q&A | CLOSING REMARKS
12:45 – 05:00 PM
SCHEDULED NETWORKING MEETINGS
DAY 2 | 16th NOVEMBER 2021, TUESDAY
10:00 – 17:00
10:00 AM
WELCOME NOTE
10:05 AM
OPENING KEYNOTE – INTERNATIONAL GUEST SPEAKER
10:20 AM
CYBERSECURITY POSTURE OF ICS – HOW TO IMPROVE ?
- How to conduct cybersecurity risk assemment
- A solid approch to protect your ICS systems
- How to implement automation cybersecurity solutions
10:35 AM
PANEL DISCUSSION : HOW TO PREVENT PRODUCT DISRUPTION AND ENSURE BUSINESS CONTINUITY BYIMPROVING IT/OT SECURITY
- Aligning OT security plans to larger enterprise objectives of digital transformation
- Ensuring secure remote access to your OT environment
- Discussing the impact of cyber threats on energy and utilities operations and production
11:05 AM
NETWORKING BREAK, MEETINGS & CONTESTS
11:20 AM
HOW TO IMPROVE VISIBITY AND REDUCE RISK BY EFFECTIVE ASSET MANAGEMENT
- Identifying, classifying and controlling all connected IT devices, IIoT systems and OT assets
- Making sure all connected devices – even legacy OT systems – comply with regulatory requirements and policies
- Analyzing alerts, prioritizing threats and responding to incidents in a timely manner with minimal business disruption
11:35 AM
PANEL DISCUSSION: REFRAMING CRITICAL CYBER SECURITY INFRASTRUCTURE RESILIENCE POST COVID ERA
- Minimizing attacks through real-time monitoring and protection systems
- Identifying the key measures for a secure and efficient cloud transition
- Shielding your industrial control system (ICS) with intrusion detection and prevention systems (IDPS)
12:05 PM
NETWORKING BREAK, MEETINGS & CONTESTS
12:20 PM
HOW TO IDENTIFY SUPPLY CHAIN SOFTWARE VULNERABILITIES AND PROTECT YOUR OT/ICS NETWORKS
- What are the risks associated with a digitally vulnareable supply chain
- Key steps to implement to address major digital security challenges
- What are the ideal tools to enhance supply chain digital security
12:35 PM
FOCUS ON KSA : MAPPING SECURITY FRAMEWORKS FOR CRITICAL ASSETS
- How to discover and maintain accurate asset inventory
- How to establish standard communications between assets
- How to detect deviations from the standard and potentially malicious activities
12:50 PM
Q&A | CLOSING REMARKS
12:50 – 05:00 PM
SCHEDULED NETWORKING MEETINGS