Speakers Session

Non Technical Track
November 14th, 2020 10:50 AM -- 11:35 AM (GMT+3)
The Arms Race for Cyber Power - The implications for governments, critical national infrastructure and commercial companies.

Category: Education and Awareness

We are in an arms race for cyber power with multiple countries investing significant funds into developing offensive cyber capability. At present, there is no global agreement or even a collective understanding of the responsible use of cyber power and as a result the possible impact to CNI and commercial organisations is uncertain. In a war is it OK to target a countries power supply or should cyber-attacks be targeted only at the military? To increase awareness in the challenges faced by the military. I will share some thinking on what the military strategy around offensive and defensive cyber needs to be going forward. I will also look at possible actions CNI and commercial organisations could take to pre-empt any intentional or unintentional cyber-warfare escalations.

November 14th, 2020 11:35 (AM) – 12:15 (PM) (GMT+3)
Build a robust performance management

Category: Organizationl Management

Build a robust performance management, If you can't measure it, You can't improve it ..   
Where you stand and where you want to be?  Answering the C-suite questions:  

  • Are we in track?  
  • Are we improving?  
  • Are we realizing business impact?    

Challenges to beware of    Tips for successful performance

November 14th , 2020 01:00 PM – 01:45 PM (GMT+3)
Cyber Resilience Oversight Guidelines for the Arab Countries, Concerning Financial Market Infrastructures

Category: Cyber Resilience Oversight

I am the proud author of the Arab Regional Fintech Working Group of the Arab Monetary Fund's published paper entitled: Cyber Resilience Oversight Guidelines for the Arab Countries, Concerning Financial Market Infrastructures, published in May 2020 - ACKNOWLEDGEMENT Arab Regional Fintech Working Group This document was produced within the Arab Regional Fintech Working Group activities. The Arab Regional Fintech WG has a comprehensive structure from the different Fintech industry stakeholders, within the Arab region and outside, to enhance the proper Fintech ecosystem in Arab countries. Which implies the exchange of knowledge and expertise, strengthening the capacitybuilding of the Arab regulators, as well as building a network of relations between Arab and international experts from the public and private sectors to promote Fintech industry and the development of innovation. The Cyber resilience oversight guidelines document was prepared by Kokila Alagh and Luna de Lange of KARM Legal Consultants, member of MENA Fintech Association, in collaboration with Nouran Youssef from the Arab Monetary Fund, and has benefited from the contributions and consultant support provided by Anomali Incorporated (and Anomali Solutions, Dubai, United Arab Emirates). Moreover, the paper has benefited from valuable review, comments and suggestions provided by Ahmed Albalooshi and Khalid Waheed Abdulrahman from Al Baraka Banking Group B.S.C, the Policy team from CGAP World Bank, and Fredesvinda Fatima Montes, Dorothee Delort; Finance, Competitiveness, and Innovation Department, The World Bank.

November 14th, 2020 01:45 (PM) – 02:30(PM) (GMT+3)
Beat Stress Your Way! - Mastering Stress based in Your Personality Type

Category: Leadership & Empowerment

Cybersecurity stress is an industrywide epidemic among security professionals. Burnout is a hard conversation, but it is necessary for CISOs to face workplace stress before it compromises productivity, talent retention or individual well-being. The impact of workplace stress can be particularly debilitating when it is coupled with mental health issues. It is time for CISOs to collaborate with other industry leaders to create new solutions for a healthier, happier workforce.
November 14th 2020 2:30 PM – 3:15 PM (GMT+3)
Cybercrime Fighting - it takes a village

Category: Insights into Cyber Crime

GCybercrime is an umbrella term that covers a wide gamut of criminal activities ranging from activities such as web defacements, and hacktivism, through to phishing, fraud, romance scams, DDoS, ransomware, intellectual property theft, unauthorised access to restricted databases and child exploitation material. Perpetrators of cybercrime are also diverse ranging from individuals, loosely bound collectives and large criminal syndicates. With the increased dependence on technology comes an increased target for cybercrime. Fighting all these diverse cybercrime types Is not just the responsibility of law enforcement and cyber security / cybercrime specialists, but in fact all users of technology have a role to play in making their communities safer from cybercrime. Just it is said that it takes a village to raise a child, so it does also take a village to fight cybercrime. All users of technology regardless of their age, culture, background, skills, jobs, and education have a part to play in making their communities safer from cybercrime. This presentation will look at some examples of cybercrime activity, explain some of the types of people behind cybercrime, and then will segue into how all users of technology can help to make their own communities a harder target against cybercrime.

November 14th, 2020 04:00 (PM) – 04:30(PM) (GMT+3)
Kids Online Safety (Our Kids Safety Online ...?)

Category: Education and Awareness

The Internet can be wonderful for kids. They can use it to research school reports, communicate with teachers and other kids, and play interactive games. But online access also comes with risks, like inappropriate content, cyberbullying, and online predators. Using apps and websites where kids interact, predators may pose as a child or teen looking to make a new friend. They might prod the child to exchange personal information, such as address and phone number, or encourage kids to call them, seeing their phone number via caller ID. Parents should be aware of what their kids see and hear on the Internet, who they meet, and what they share about themselves. Talk with your kids, use tools to protect them, and keep an eye on their activities.Also Parents should be aware of their smart kids who have the skills and knowledge that may lead them to commit cybercrime unintentionally.
November 15th, 2020 10:45 AM - 11:15 AM (GMT+3)
Universities role in promoting cybersecurity in the Kingdom of Saudi Arabia: A Case Study

Category: Education and Awareness

With the world wide movement towards automation and digital transformation and the increased dependence on technology in most of life domains, such as education, banking, medicine and communication. The risks associated with using these technologies are consequently increasing. Adopting cybersecurity at national level IT systems is a must to ensure safe usage of systems and to protect data, services and network resources. The contribution to national level cybersecurity comes from securing each and every domain. This talk aims to explore how universities as educational entities, contribute to the overall security emphasising their role in enforcing cybersecurity concepts in the Kingdom of Saudi Arabia.

November 15th , 2020 11:15 AM– 11:45 AM (GMT+3)
Cybersecurity KARMA (Knowledge Asset Risk Managment Approach)

Category: CyberSecurity Risk Management

Knowledge Asset Risk Management Approach for Cybersecurity: The presenter harmonizes the ISO9000 Quality Management, ISO31000 Risk Management and ISO27000 Information Security and the emerging U.S. DoD Cybersecurity Maturity Model Certification standard to provide a model that can be used for strategic management of cybersecurity the prioritizes Knowledge Assets protection as a basis for cybersecurity risk management.

November 15th, 2020 01:15 (PM) – 01:45(AM) (GMT+3)
Perception of Cybersecurity as a Result of Societal and Technological Trends

Category: CyberSecurity Trends

The evolvement of technologies along with the users’ dynamic needs resulted in the expansion the threat landscape that users are exposed to due to the capabilities and sophistication of our technologies. In addition, the user expectations along with common user behaviours are critical factors to consider as they provide a gateway that cybercriminals exploit. Hence, cybersecurity became a more relevant as it became now integrated into the design of products and systems.

November 15th , 2020 02:30 PM – 03:00 PM (GMT+3)
Difference between cyber criminals Vs hackers

Category: Education and Awaireness

Sixty percent of hackers don’t submit vulnerabilities due to the fear of out-of-date legislation, press coverage, and companies misdirected policies. This fear is based on socially constructed beliefs. This talk dives into the brain's response to fear while focusing on increasing public awareness in order to bring legislation that supports ethical hackers, ending black hoodie and ski mask imagery, and encourage organizations to support bilateral trust within their policies.

November 15th , 2020 03:00 PM - 03:30 PM (GMT+3)
Cyber Security Entry point

Category: Education and Awareness

The presentation is to simplify the entry point to cyber security, starting with the reason why we are interested in Cyber Security career to the courses that enrich your knowledge and build the first step to cyber security career tips based on our previous experience.

Technical Track
November 14th, 2020 10:50 AM - 11:35 AM (GMT+3)
Biohacking Lessons from COVID-19

Category: Education and Awareness

The healthcare community learned that there is a greater need for resiliency, contingency plans and backup plans in how it functions. Looking at this pandemic from a biohacking / security researcher point of view, how can we take the past ten months of pragmatic data, information, and insight and turn it into actionable knowledge to improve future decisions and outcomes for the biomedical ecosystem.

November 14th, 2020 11:35 AM – 12:15 PM (GMT+3)
Cloud Security- Leaping beyond Native toolsets

Category: CyberSecurity Trends

Have you ever felt overwhelmed with the number of cloud tools and security tools that you need to deal with? Have you been looking for a ready reckon-er to choose the best for you? Cloud adoption has grown multi-fold with the new normal and digitization journey accompanied by an exponential growth in the tools related to cloud. So, with too many tools and too many things to secure, organizations today look for suggestions on how to choose the right toolsets and strategy to secure things in the cloud. The session is to bring in views from experts in the Cloud security space on how we can systematically approach this complex issues around building security capabilities beyond cloud native controls to bring more orchestration and consistency.

November 14th 2020 1:00 PM – 1:45 PM (GMT+3)
An APT's Revenge: How Attackers Respond to Disclosure

Category: Insights into Cyber Crime

Government and industry have invested significant effort in understanding the threat landscape in order to defend their interests in cyberspace, but the issue of how defensive action can influence attacker behaviour is poorly understood. This presentation seeks to explore the question: how do attackers respond to investigation into their operations? We will review the ‘spectrum’ of response options and changes that attackers have made to their operations following incident response cases and public reporting (and attribution) of specific groups. Responses range from defensive (‘go quiet’) to aggressive (threats or targeting of researchers), and include a multitude of change-ups in tactics, techniques, and procedures in between. This analysis will draw on evidence from numerous examples both from our investigations and cases from open sources to cover high priority threat groups faced by the public and private sectors as well as unintended consequences of disclosure and thoughts from a defender perspective

November 14th 2020 1:45 PM – 2:30 PM (GMT+3)
Solving Web Security Vulnerabilities with Pentesting

Category: Insights into Cyber Crime

This presentation will cover web pentesting and present some techniques used to discover vulnerabilities in a web application. From tools used to code injections. You will discover one of the exciting aspects of pentest
November 14th , 2020 02:30 PM – 03:15 PM (GMT+3)
Security in Aviation Cyber Physical Systems

Category: Reimagining OT Resilience

An autopilot is a flight control system that allows a pilot to fly an airplane without continuous hands-on control of the airplane. Autopilot reacts quickly to a disturbance, therefore, making the airplane more comfortable to fly in and allowing more accurate maintenance of heading and altitude. It takes a pilot a certain length of time to react to a disturbance and then still further time to decide which control to move and in which direction, whereas, an autopilot has corrected the disturbance in a fraction of the time taken by the pilot to react. The purpose of this paper is to get acquainted with the security challenges of Aviation Cyber Physical System (ACPS), to see the applicability of CPS security concepts, security architecture, threats and attacks related to ACPS as well as, the countermeasures for securing them, also to learn about CPS from the outside in and to aid us in learning what is it like to describe complex arguments (i.e. specific security risks) to a technical, yet non-security-minded audience. This research paper will be showing and covering some aspects of ACPS assets, threats, vulnerabilities, architecture, and security assessment

November 14th 2020 04:30 PM – 05:00 PM (GMT+3
Cyber Security Current and Future Trends

Category: CyberSecurity Trends

This talk will touch on the current opportunities and challenges that exist for Cyber Security with the field of emerging technologies as in quantum computing, autonomous systems and AI. It will introduce different research results that are obtained within the current field of research on quantum security and cryptology, using deep learning adversarial machine learning models to attack autonomous vehicles and current research questions tackled within avionics security systems. The challenges of adapting to these technologies and building a secure models within these technical boundaries.

November 15th, 2020 10:45 (AM) – 11:15(AM) (GMT+3)
Emerging Risks From connectivity aka IOT

Category: CyberSecurity Trends

Internet of Things has become essential in business, industry and our personal lives. The economic impact of the Internet of Things will be measured in $trillions. IoT is here to stay. During this session, attendees will learn about leading security practices and risks across IoT ecosystems. IoT Security is a complex area, the speaker will provide insights on the challenges of securing IoT and why this area cannot be secured by meeting compliance requirements. With devices in all areas of our lives from Medical devices, Fitbits, Smart voice assistants like Alexa, automation in supply chain to Industrial control systems controlling the power grid the spectrum of applications is vast and so is the risk if these technologies are not implemented securely.

November 15th 2020 11:15 AM – 11:54 AM (GMT+3)
Re-shaping Cyber security – Zero-Trust Networks

Category: Assets Security Strategy

Network firewalls are becoming irrelevant, neither can we be relied upon the perimeter networks nor can they be trusted. With adoption of bring your own device and convey your own cloud, we must evolve our defences to the devices and therefore the identities. ZTA is a response to enterprise network trends that include remote users and cloud-based assets which are not located within an enterprise-owned network boundary. In this paper we will be understanding how the security state and the trustworthiness contributes to overall security posture, considerations for automated access to resources via device also the identity conditions and the way to implement these conditions to the road of business SaaS apps or on-premises web apps.

November 15th, 2020 01:15 PM -- 01:45 PM (GMT+3)
OSINT for Good - Practical Applications from Cyber Threat Intel to Finding Missing People

Category: Threat Intelligence

You may be wondering what OSINT means. It refers to open source intelligence that we can gather from publicly available sources. You may not be aware of the term OSINT, but you’ve probably used OSINT gathering techniques without knowing it. So, join this session so that the speaker can clarify what OSINT is, show you the practical uses of it, and how we can leverage it so we can use our skills and knowledge for the greater good.

November 15th , 2020 01:45 PM – 02:30 PM (GMT+3)
GRC – In pursuit of greater accountability

Category: Cybersecurity governance

We may say that the front liners in the cyber warfare are the SOC or the Cyber Threat Intelligence Team. But how they operate is governed by strategy, policies, framework and standards. What is the role of GRC in levelling up the operation’s responsibility and accountability? How do we embed a risk-based approach in handling the threats and vulnerabilities? Let us understand how GRC is mapped in the day-to-day IT operations management, SOC Operations, and the organization’s assurance to comply with applicable regulations.

November 15h 2020 02:30 PM – 03:00 PM (GMT+3)
Defending Organizations against cyber attacks with Next Generation

Category:

In today’s world of cyber-attacks and data breaches, companies of all sizes need to place an emphasis on securing their technology assets. Today's rapidly evolving threat landscape demands smarter and more responsive security services. It’s the SOC’s job to monitor the enterprise from cyber-attacks. As hackers and cyber criminals launch increasingly sophisticated attempts to steal sensitive data and worm their way into business-critical applications, security operations centres (SOC) are the dedicated teams on the front line working to stop them. They stay up-to-date on the latest threats and mitigation techniques so they can act as an early warning system. Their mission is to continually monitor cyber security health and respond to alerts and incidents. But how does it do that? What comprises the people, process and technology of a SOC? How a SOC operates? What is a next generation SOC and how to implement it? How a cyber-attack is detected by SOC team? We would be discussing all these facts in our session regarding the Next generation Security operations centre (SOC).

November 15th, 2020 03:00 PM -- 03:30 PM (GMT+3)
Controlar-Freeze: New Approach in Visual Screen Security

Category: Reimagining OT Resilience

Shoulder surfing continues to be a serious privacy threat. Despite this, practical and efficient countermeasures against such attacks are still scarce. We are proposing a Controlar-Freeze as an original yet effective precaution against various types of shoulder surfing attacks in ATMs in Financial Technology (FinTech). Our proposal consists of a face detection algorithm, which (a) detects if two or more people are in the scope of the camera; (b) shows an alert; (c) freezes the controls of the screen until the threat source is gone; and (d) captures the threat to be referred to as evidence. We implemented this approach on MatLab and Simulink Software. We then conducted preliminary evaluations to validate its performance and effectiveness. Controlar-Freeze is proven success for the proposed theory that included the studied cases of the common features. We reported few concerns about this this approach as well as suggestions for improvements.