Download and install VMware Workstation Pro 16.2.X+ or VMware Player 16.2.X+ (for Windows 10 hosts), VMware Workstation Pro 17.0.0+ or VMware Player 17.0.0+ (for Windows 11 hosts). If you do not own a licensed copy of VMware Workstation Pro or VMware Fusion Pro, you can download a free 30-day trial copy from VMware.
NOTE: MacOS 10.15.x or newer running VMware Fusion Player 11.5+ is compatible with the labs, but on-site technical support is not offered.
CRITICAL: Apple systems using the M1/M2/M3 processor line are not supported. Other configurations may limit your ability to be able to participate in some labs.
CPU: 64-bit Intel i5/i7 (8th generation or newer), or AMD equivalent. A x64 bit, 2.0+ GHz or newer processor.
BIOS settings must be set to enable virtualization technology, such as "Intel-VTx" or "AMD-V" extensions. Please be absolutely certain you can access your BIOS if it is password protected, in case changes are necessary.
RAM: 8GB or more.
Storage: 100GB of free storage space.
At least one available USB 3.0 Type-A port. A Type-C to Type-A adapter may be necessary for newer laptops. Some endpoint protection software prevents the use of USB devices, so test your system with a USB drive prior to the event.
Wireless networking (802.11 standard) Wi-Fi capability.
Local Administrator Access.
You should ensure that antivirus or endpoint protection software is disabled and fully removed, or that you have the administrative privileges to do so.
Admissions will follow a first-come, first-served basis, regardless of registration.
National Anthem
Opening Remarks by:
Sara Abu Alfateh, MC, Arab International Cybersecurity Conference and Exhibition
Reserved for Patron/Representative
James Lyne, Chief Technology and Innovation Officer, SANS Institute
The role of Generative A.I in Cyber Security
Dr. Shaikh Khalid Al Khalifa, CEO, Beyon Cyber
Creating Trust and Resilience for Digital Economies
Merike Kaeo, CISO, Board Member & Technical Advisor, US Embassy
Collaborative Approaches for Global Cyber Resilience
Moderator: Ed Sleiman, Head of Special Projects & Fmr. Head of Information Security, King Abdullah University of Science and Technology (KAUST), Saudi Arabia
Panelists:
H.E. Dr Mohamad Al Kuwaiti, Head of the Cyber Security, UAE Cybersecurity Council Captain Patrick Ghion, Chief Cyber Strategy Officer, Head Regional Cyber Competence Center — Western Switzerland and Executive Head of Department Forensic Science Geneva State Police
Engr. Badar Al Salehi, Director General, Oman National CERT Gene Yoo, Chief Executive Officer, Resecurity
Detailing the intricacies of the efficiency in Jordan’s National Cybersecurity Framework
Eng. Bassam Maharmeh, President, National Cyber Security Center, Jordan (NCSC- JO)
Huawei’s End-to-End Cybersecurity Assurance Framework
Sultan Mahmood Malik, Cybersecurity and Privacy Protection Office, Huawei Gulf North
Overcoming “The Attack Surface Risk Management” Challenges
Mohammed AlSammarraie, Vision One Director- MMEA, Trend Micro
Standardization in Service of Cyber Resilience
Moderator: Merike Kaeo, Chief Information Security Officer, Board Member & Technical Advisor, US Embassy
Panelists:
Mirza Asrar Baig, Founder & CEO, CTM360
Dr. Bushra Alblooshi, Director General Senior Consultant, Dubai Electronic Security Center
Khaled Alteneiji, Cyber Security Head, Emirates National Oil Company (ENOC)
Dr. Lina Oueidat, National ACT and Cyber Security Coordinator, Presidency of the Council of Ministers, Lebanon
Dr. Fatimah, Alakheel, Cybersecurity Consultant
Fire Side Chat: Emerging Tech — Jumping the Gun — Addressing the Convergence of AI, IoT, and Cybersecurity
Moderator — Ed Sleiman, Head of Special Projects & Fmr. Head of Information Security, King Abdullah University of Science and Technology (KAUST)
Participant — Sandip Patel KC, Chairperson, Cybercrime Practitioners Association & International Cyber Crime Prosecutor
Building Malaysia’s Cyber Resilience Through Collaborative Effort
Dato’ Dr. Amirudin Abdul Wahab, CEO, Cybersecurity Malaysia
Securing Bahrain’s SME market
Shaikh Ahmed Al Khalifa, Director of Business Development, Beyon Cyber
Applications of AI in Cybersecurity
Dr. Jassim Haji, Executive Advisor, Nasser Artificial Intelligence Research & Development Centre and President-International Group of Artificial Intelligence.
TBC
Public — Private Partnerships: Strengthening Collaboration for Enhanced Cyber Defense
Moderator: Mirza Asrar Baig, Founder & CEO, CTM360
Expected/Confirmed Panelists:
David Woodfine, Former Head — Cyber Attack and Defence, UK Ministry of Defense
Unguec Stephen Kang, A/Director for Cybersecurity, National Communication Authority (NCA), South Sudan
Miguel Angel Cañada, Head of National Coordination Centre (NCC-ES), INCIBE, Spain
Atul Kumar, Lead- Government Initiatives & Global Trade, Data Security Council of India Kamal Zian, Cyber Security and Privacy Protection, Huawei Kuwait
Assessing Cybersecurity and Multidimensional Risk Beyond the Perimeter
Peter Ling, Vice President, Mastercard Global Cybersecurity Partnerships and Cyber Resilience Programs
Creating Leaders of the Future: Cybersecurity Capacity Building
Moderator: Sophie De Ferranti, Senior Managing Director — Global Cybersecurity,
Global CEO Advisory Firm — Teneo
Panelists:
Nani Mohammed Butti, Director — Information System, Director General — Planning & Resources, Supreme Council for Youth & Sport.
Ed Sleiman, Head of Special Projects & Fmr. Head of Information Security, King Abdullah University of Science and Technology (KAUST), Saudi Arabia
Maryam Majed, Head — Digital Transformation & Project Management Centre, Bahrain Institute of Banking and Finance (BIBF)
Dr. Ammar Alhusaini, Deputy Director General, Central Agency for Information Technology (CAIT), Kuwait
Amna AlMadhoob, Chief Information Security Officer (CISO), FACEKI, Bahrain
Maryam Abu Alfateh, MC, Arab International Cybersecurity Conference and Exhibition
Keynote: Emerging Threat Landscape
Allen Ohanian — Information Security Office — Los Angeles County Department of Children and Family Services
Strategic, Operational, and Tactical Intelligence for Better-Informed Decisions
Feras Alqaisi, Presales Group Manager, Kaspersky
5g and Cyber risk — Cyber threats in law enforcement environments and Cyber Risk challenges in digital transformation era
Lt Col Dr Hamad Khalifa Al NUAIMI, Co-Founder of Digital Barza & Telecommunications Specialist & Telecom Division Manager, Abu Dhabi Police
The Evolution of Industrial Threat Landscape
Omar Al Barghouthi, Regional Director — Middle East, Dragos
How bug bounty will benefit the cyber security industry
Mohammed Tareq Alawadhi, CEO, BUGLOUD
Phishing and Social Engineering Prevention — Sharing best practices for educating users, implementing email filtering solutions, and using technology to prevent phishing attacks.
Youssef Bentaleb, Director, National Campaign Against Cybercrime (CNLCC), Morocco
The AI behind Vectra AI for Erasing the Unknown
Yazan Hammoudeh, Director Security Engineering, Vectra AI
Does my service provider deserve the access I give them?
Sebastian Madden, Middle East Lead, CREST
Cisco Security Overview
Hadi Tannous, Technical Solutions Architect, ACME
Cybersecurity: Significance of Compliance & IT Security Policy to Safeguard Against Cyber Attacks
Tarun Malhotra, Founder & MD — Cyber Cops and Cyber Security Consultant & Auditor
Reserved for NGN
End of Day 1
Join us at CyberDefense for cutting-edge talks and interactive, technical workshops exclusive to AICS23!
Delivered by globally renowned cybersecurity experts, this series is designed to thrill and to challenge and enhance your skills. We have 2 days packed with engaging content created for cybersecurity practitioners and professionals, showcasing the latest techniques used by the leaders and innovators in the industry!
Meeting Room C.18
An introduction to CyberXDefense, and an exploration into the inner workings of high-profile cyber incidents that have rocked critical national infrastructure (CNI) sectors. In this captivating and accessible talk, we’ll dissect real-world breaches affecting vital sectors, and unveil the tactics, techniques, and procedures employed by threat actors as we dive into the anatomy of these attacks.
Speaker: Chris Crowley, SANS Senior Instructor and course author, and leading expert in building an effective SOC.
Meeting Room C.18
In this dynamic talk aimed at technical individuals and practitioners, we’ll unveil the most dangerous new attack techniques threatening organizations today. From advanced malware and zero-day exploits to AI-driven attacks and supply chain vulnerabilities, we’ll dissect the emerging threats that keep security experts up at night and provide actionable insights and strategies to defend against these evolving dangers.
Speaker: Ian Reynolds, SANS Principal Instructor, and SOC, Forensic, and Incident Response specialist.
Meeting Room C.18
Delegates will be introduced to Strelka, through practical demonstrations of its capability across a number of popular file types, and in particular the ever-present Windows portable executable. Watch us put Strelka through its paces as we show how it can be used in the hands of a skilled analyst. Through hands-on exercises, learn how you can become your own anti-virus vendor, and use Strelka to optimize your static analysis tradecraft.
Speakers: Led by Michael Pantridge and the team at Secure Impact, with special guests Ian Reynolds, Chris Crowley, and Taz Wake.
Note: Practical Session, LAPTOP required. Refer to “Check the Laptop Requirements” at the top of this page.
Meeting Room C.18
Designed for technical experts in the field, this session will delve deep into the cutting-edge strategies and technologies that promise to revolutionize the way we combat insider threats.
Speakers: Ian Reynolds, SANS Principal Instructor, and SOC, Forensic, and Incident Response specialist, and Taz Wake, SANS Instructor and course author.
Meeting Room C.15, C.16 & C.17
Delegates will be introduced to Strelka, through practical demonstrations of its capability across a number of popular file types, and in particular the ever-present Windows portable executable. Watch us put Strelka through its paces as we show how it can be used in the hands of a skilled analyst. Through hands-on exercises, learn how you can become your own anti-virus vendor, and use Strelka to optimize your static analysis tradecraft.
Speakers: Led by Michael Pantridge and the team at Secure Impact, with special guests Ian Reynolds, Chris Crowley, and Taz Wake
Note: Practical Session, LAPTOP required. Refer to “Check the Laptop Requirements” at the top of this page.
Meeting Room C.05
Level 1: Introduction to Social Engineering (with Twittboot)
Level 2: Introduction to Linux and the Command Line
Meeting Room C.05
Level 1: Introduction to Linux and the Command Line with a Learning CTF
Level 2: Introduction to Web CTF with a Following CTF Challenge (Rebootown)
Meeting Room C.06
Tabletop Exercise: CyberCrisis Preparedness and Management in the Financial sector — Batch 1
Meeting Room C.06
Tabletop Exercise: CyberCrisis Preparedness and Management in the Financial sector — Batch 2
Meeting Room C.07
Capture the Flag
Meeting Room C.09
AWS Security Essentials covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, participants will learn where they are responsible for implementing security in the AWS Cloud and what security-oriented services are available to them and why and how the security services can help meet the security needs of their organization. This course enables participants to dive deep, ask questions, work through solutions, and get feedback from AWS-accredited instructors with deep technical knowledge.
Meeting Room C.10
This workshop offers a meticulous overview of preserving sensitive data in today’s digital landscape, emphasizing the principles of “privacy by design” and privacy regulations like PDPL. Participants will acquire the expertise to evaluate privacy risks, employ security measures, and adeptly manage data breaches. Ethical considerations and the pivotal role of individuals and organizations in upholding data privacy are also explored. Upon completion, students will be equipped to navigate the intricacies of data privacy and compliance, embodying the principles of “privacy by design” and adhering to regulations such as PDPL with professionalism and precision. Moreover, the workshop will also cover pressing concerns on the potential for AI systems to perpetuate biases, infringe upon privacy, and undermine trust. This conference workshop aims to provide a comprehensive overview of the ethical and privacy considerations in building AI models that are free from bias.
Meeting Room C.11
Batch 1:
Join the training and earn the prestige Certificated Data Protection Leader Certificate CDPL. Earn your certificate immediately upon completing your training.
The exam will be proctored by a TUV certified proctor from 4:00 pm — 5:00 pm.
Meeting Room C.12
Batch 1:
Challenge yourself with vulnerable code puzzles and improve your skills.
Note: Practical Session, LAPTOP required.
Meeting Room C.12
Batch 1:
Challenge yourself with vulnerable code puzzles and improve your skills.
Note: Practical Session, LAPTOP required.
Meeting Room C.14
Navigate the Data Sovereignty Landscape” (with focus on Oil & Gas industry)
Speaker: Walid AlShaari, Senior Solution Architect, Amazon
Meeting Room C.14
Mitigating SIM Swap fraud in Telcos
Speaker: Dr. Srinivasan Rajavelu, Senior Telco Solution Architect, Amazon Web Services, Dubai, UAE
Meeting Room C.14
The AI behind Vectra AI for Erasing the Unknown
Speaker: Yazan Hammoudeh, Director Security Engineering, Vectra
Meeting Room C.14
Securing the Smart Cities of Tomorrow: Cybersecurity Challenges and Threats!
Speaker: Osama Abduo, Sr.Manager, Systems Engineering, Fortinet Middle East
Meeting Room C.14
Enhancing Cybersecurity Through Advanced Penetration Testing
Speaker: Amin Rawah, Penetration Testing Manager, Cipher
Meeting Room C.14
Use Threat Intelligence to Accelerate Incident Response
Speaker: Arwa Alomari, Threat Intelligence Lead, Cipher
Meeting Room C.14
Building a Resilient Organization: The Role of Business Continuity and Cyber GRC.
Speaker: Nowaf Alaboudi, Head of Cyber GRC Advisory, Cipher
Meeting Room C.19
Learn through an experiential exercise that illuminates key decision points for a successful and secure cloud journey. During this team based,game-like competitive simulation, you will leverage an industry case study to make strategic security, risk, and compliance time based decisions and investments.