Agenda (TBC)

Visitor Pass

  • Expo Area
  • Cyber Block Stage
  • Guinness World Record Area

Student Pass

  • Expo Area
  • Cyber Block Stage
  • Guinness World Record Area
  • Room42

GWR Pass

  • Expo Area
  • Cyber Block Stage
  • Guinness World Record Area

Media Pass

  • Expo Area
  • Cyber Block Stage
  • Guinness World Record Area
  • CISO Lounge

Delegate Pass

  • Expo Area
  • Cyber Block Stage
  • Main Stage
  • CISO Lounge
  • Guinness World Record Area
  • Room42

Delegate Pass Pricing

Ends 1 November 2023
Early Bird:
US$ 499
Ends 15 November 2023
Regular:
US$ 699
Ends 2 December 2023
Late:
US$ 849
Ends 6 December 2023
Onsite:
US$ 999
For group reservations, please contact: sreekumar@faalyat.com

Laptops are essential for participation in the following labs:

  • CyberXDefense - Lab & Workshop: Level Up YourStatic Analysis Skills with STRELKA
  • CyberXDefense - Lab & Workshop: The Art of Malware Detection with Advanced Yara
  • CyberXDefense - Lab & Workshop: The Ultimate Guide to OSINT with Bash

Laptop requirements:

Download and install VMware Workstation Pro 16.2.X+ or VMware Player 16.2.X+ (for Windows 10 hosts), VMware Workstation Pro 17.0.0+ or VMware Player 17.0.0+ (for Windows 11 hosts). If you do not own a licensed copy of VMware Workstation Pro or VMware Fusion Pro, you can download a free 30-day trial copy from VMware.

NOTE: MacOS 10.15.x or newer running VMware Fusion Player 11.5+ is compatible with the labs, but on-site technical support is not offered.

CRITICAL: Apple systems using the M1/M2/M3 processor line are not supported. Other configurations may limit your ability to be able to participate in some labs.

CPU: 64-bit Intel i5/i7 (8th generation or newer), or AMD equivalent. A x64 bit, 2.0+ GHz or newer processor.

BIOS settings must be set to enable virtualization technology, such as "Intel-VTx" or "AMD-V" extensions. Please be absolutely certain you can access your BIOS if it is password protected, in case changes are necessary.

RAM: 8GB or more.

Storage: 100GB of free storage space.

At least one available USB 3.0 Type-A port. A Type-C to Type-A adapter may be necessary for newer laptops. Some endpoint protection software prevents the use of USB devices, so test your system with a USB drive prior to the event.

Wireless networking (802.11 standard) Wi-Fi capability.

Local Administrator Access.

You should ensure that antivirus or endpoint protection software is disabled and fully removed, or that you have the administrative privileges to do so.

Admissions will follow a first-come, first-served basis, regardless of registration.

Cyber Leaders Forum

Registration

08:00

Welcome Address

09:30

National Anthem

Opening Remarks by:

Sara Abu Alfateh, MC, Arab International Cybersecurity Conference and Exhibition

Patron/ Representative

09:40

Reserved for Patron/​Representative

Opening Keynote

09:50

James Lyne, Chief Technology and Innovation Officer, SANS Institute

Keynote

10:00

The role of Generative A.I in Cyber Security

Dr. Shaikh Khalid Al Khalifa, CEO, Beyon Cyber

Exhibition Opening and VIP Tour

10:10

Keynote

10:40

Creating Trust and Resilience for Digital Economies

Merike Kaeo, CISO, Board Member & Technical Advisor, US Embassy

Leadership Panel

11:00

Collaborative Approaches for Global Cyber Resilience

Moderator: Ed Sleiman, Head of Special Projects & Fmr. Head of Information Security, King Abdullah University of Science and Technology (KAUST), Saudi Arabia

Panelists:

H.E. Dr Mohamad Al Kuwaiti, Head of the Cyber Security, UAE Cybersecurity Council Captain Patrick Ghion, Chief Cyber Strategy Officer, Head Regional Cyber Competence Center — Western Switzerland and Executive Head of Department Forensic Science Geneva State Police

Engr. Badar Al Salehi, Director General, Oman National CERT Gene Yoo, Chief Executive Officer, Resecurity

Keynote

11:40

Detailing the intricacies of the efficiency in Jordan’s National Cybersecurity Framework

Eng. Bassam Maharmeh, President, National Cyber Security Center, Jordan (NCSC- JO)

Keynote

12:00

Huawei’s End-to-End Cybersecurity Assurance Framework

Sultan Mahmood Malik, Cybersecurity and Privacy Protection Office, Huawei Gulf North

Keynote

12:20

Overcoming The Attack Surface Risk Management” Challenges

Mohammed AlSammarraie, Vision One Director- MMEA, Trend Micro

Panel

12:40

Standardization in Service of Cyber Resilience
Moderator: Merike Kaeo, Chief Information Security Officer, Board Member & Technical Advisor, US Embassy

Panelists:

Mirza Asrar Baig, Founder & CEO, CTM360
Dr. Bushra Alblooshi, Director General Senior Consultant, Dubai Electronic Security Center
Khaled Alteneiji, Cyber Security Head, Emirates National Oil Company (ENOC)
Dr. Lina Oueidat, National ACT and Cyber Security Coordinator, Presidency of the Council of Ministers, Lebanon
Dr. Fatimah, Alakheel, Cybersecurity Consultant

Lunch & Prayer Break

13:20

Fire Side Chat

14:10

Fire Side Chat: Emerging Tech — Jumping the Gun — Addressing the Convergence of AI, IoT, and Cybersecurity

Moderator — Ed Sleiman, Head of Special Projects & Fmr. Head of Information Security, King Abdullah University of Science and Technology (KAUST)

Participant — Sandip Patel KC, Chairperson, Cybercrime Practitioners Association & International Cyber Crime Prosecutor

Keynote

14:40

Building Malaysia’s Cyber Resilience Through Collaborative Effort

Dato’ Dr. Amirudin Abdul Wahab, CEO, Cybersecurity Malaysia

Keynote

14:50

Securing Bahrain’s SME market

Shaikh Ahmed Al Khalifa, Director of Business Development, Beyon Cyber

Keynote

15:00

Applications of AI in Cybersecurity

Dr. Jassim Haji, Executive Advisor, Nasser Artificial Intelligence Research & Development Centre and President-International Group of Artificial Intelligence.

Keynote

15:10

TBC

Panel

15:40

Public — Private Partnerships: Strengthening Collaboration for Enhanced Cyber Defense 

Moderator: Mirza Asrar Baig, Founder & CEO, CTM360

Expected/​Confirmed Panelists:

David Woodfine, Former Head — Cyber Attack and Defence, UK Ministry of Defense
Unguec Stephen Kang, A/​Director for Cybersecurity, National Communication Authority (NCA), South Sudan
Miguel Angel Cañada, Head of National Coordination Centre (NCC-ES), INCIBE, Spain
Atul Kumar, Lead- Government Initiatives & Global Trade, Data Security Council of India Kamal Zian, Cyber Security and Privacy Protection, Huawei Kuwait

Keynote

16:20

Assessing Cybersecurity and Multidimensional Risk Beyond the Perimeter

Peter Ling, Vice President, Mastercard Global Cybersecurity Partnerships and Cyber Resilience Programs

Panel

16:50

Creating Leaders of the Future: Cybersecurity Capacity Building


Moderator: Sophie De Ferranti, Senior Managing Director — Global Cybersecurity,

Global CEO Advisory Firm — Teneo

Panelists:

Nani Mohammed Butti, Director — Information System, Director General — Planning & Resources, Supreme Council for Youth & Sport.

Ed Sleiman, Head of Special Projects & Fmr. Head of Information Security, King Abdullah University of Science and Technology (KAUST), Saudi Arabia
Maryam Majed, Head — Digital Transformation & Project Management Centre, Bahrain Institute of Banking and Finance (BIBF)

Dr. Ammar Alhusaini, Deputy Director General, Central Agency for Information Technology (CAIT), Kuwait
Amna AlMadhoob, Chief Information Security Officer (CISO), FACEKI, Bahrain

Closing Remarks and End of Day 1

17:20

Awards and Recognition

17:30

Cyber Block Stage

Welcome & Opening Remarks

11:30

Maryam Abu Alfateh, MC, Arab International Cybersecurity Conference and Exhibition

Keynote

11:40

Keynote: Emerging Threat Landscape

Allen Ohanian — Information Security Office — Los Angeles County Department of Children and Family Services 

Keynote

12:00

Strategic, Operational, and Tactical Intelligence for Better-Informed Decisions

Feras Alqaisi, Presales Group Manager, Kaspersky

Keynote

12:20

5g and Cyber risk — Cyber threats in law enforcement environments and Cyber Risk challenges in digital transformation era

Lt Col Dr Hamad Khalifa Al NUAIMI, Co-Founder of Digital Barza & Telecommunications Specialist & Telecom Division Manager, Abu Dhabi Police

Keynote

12:40

The Evolution of Industrial Threat Landscape

Omar Al Barghouthi, Regional Director — Middle East, Dragos

Lunch Break

13:00

How bug bounty will benefit the cyber security industry

14:00

How bug bounty will benefit the cyber security industry

Mohammed Tareq Alawadhi, CEO, BUGLOUD 

Keynote

14:20

Phishing and Social Engineering Prevention — Sharing best practices for educating users, implementing email filtering solutions, and using technology to prevent phishing attacks. 

Youssef Bentaleb, Director, National Campaign Against Cybercrime (CNLCC), Morocco

Keynote

14:40

The AI behind Vectra AI for Erasing the Unknown

Yazan Hammoudeh, Director Security Engineering, Vectra AI

Keynote

15:00

Does my service provider deserve the access I give them?

Sebastian Madden, Middle East Lead, CREST

Cisco Security Overview

15:20

Cisco Security Overview

Hadi Tannous, Technical Solutions Architect, ACME

Keynote

15:40

Cybersecurity: Significance of Compliance & IT Security Policy to Safeguard Against Cyber Attacks

Tarun Malhotra, Founder & MD — Cyber Cops and Cyber Security Consultant & Auditor

Panel

16:00

Reserved for NGN

Closing Remarks and End of Day 1

16:40

End of Day 1 

Room 42 - Workshops and Sessions

// CyberXDefense //

Join us at CyberDefense for cutting-edge talks and interactive, technical workshops exclusive to AICS23!

Delivered by globally renowned cybersecurity experts, this series is designed to thrill and to challenge and enhance your skills. We have 2 days packed with engaging content created for cybersecurity practitioners and professionals, showcasing the latest techniques used by the leaders and innovators in the industry!

Click here for full details!

Meeting Room C.18

Talk: Unveiling the Anatomy of High- Profile Cyber Incidents

10:00 - 10:50

Meeting Room C.18

An introduction to CyberXDefense, and an exploration into the inner workings of high-profile cyber incidents that have rocked critical national infrastructure (CNI) sectors. In this captivating and accessible talk, we’ll dissect real-world breaches affecting vital sectors, and unveil the tactics, techniques, and procedures employed by threat actors as we dive into the anatomy of these attacks.

Speaker: Chris Crowley, SANS Senior Instructor and course author, and leading expert in building an effective SOC.

Technical Talk: Defending Against the Most Dangerous New Attack Techniques

11:00 - 11:50

Meeting Room C.18

In this dynamic talk aimed at technical individuals and practitioners, we’ll unveil the most dangerous new attack techniques threatening organizations today. From advanced malware and zero-day exploits to AI-driven attacks and supply chain vulnerabilities, we’ll dissect the emerging threats that keep security experts up at night and provide actionable insights and strategies to defend against these evolving dangers.

Speaker: Ian Reynolds, SANS Principal Instructor, and SOC, Forensic, and Incident Response specialist.

Lab & Workshop Part 1: Level Up Your Static Analysis Skills with STRELKA

13:30 - 14:15

Meeting Room C.18

Delegates will be introduced to Strelka, through practical demonstrations of its capability across a number of popular file types, and in particular the ever-present Windows portable executable. Watch us put Strelka through its paces as we show how it can be used in the hands of a skilled analyst. Through hands-on exercises, learn how you can become your own anti-virus vendor, and use Strelka to optimize your static analysis tradecraft. 

Speakers: Led by Michael Pantridge and the team at Secure Impact, with special guests Ian Reynolds, Chris Crowley, and Taz Wake.

Note: Practical Session, LAPTOP required. Refer to Check the Laptop Requirements” at the top of this page.

Technical Talk: Next-Gen Tactics for Insider Threat Detection

15:30 - 16:20

Meeting Room C.18

Designed for technical experts in the field, this session will delve deep into the cutting-edge strategies and technologies that promise to revolutionize the way we combat insider threats. 

Speakers: Ian Reynolds, SANS Principal Instructor, and SOC, Forensic, and Incident Response specialist, and Taz Wake, SANS Instructor and course author.

Meeting Room C.15, C.16 & C.17

Lab & Workshop Part 2: Level Up Your Static Analysis Skills with STRELKA

14:15 - 15:00

Meeting Room C.15, C.16 & C.17

Delegates will be introduced to Strelka, through practical demonstrations of its capability across a number of popular file types, and in particular the ever-present Windows portable executable. Watch us put Strelka through its paces as we show how it can be used in the hands of a skilled analyst. Through hands-on exercises, learn how you can become your own anti-virus vendor, and use Strelka to optimize your static analysis tradecraft. 

Speakers: Led by Michael Pantridge and the team at Secure Impact, with special guests Ian Reynolds, Chris Crowley, and Taz Wake

Note: Practical Session, LAPTOP required. Refer to Check the Laptop Requirements” at the top of this page.

Meeting Room C.05

Encryption Experts by Reboot Coding Institute - High School Batch 1

09:00 - 12:30

Meeting Room C.05

Level 1: Introduction to Social Engineering (with Twittboot)

Level 2: Introduction to Linux and the Command Line

Encryption Experts by Reboot Coding Institute - University Batch 1

13:00 - 17:00

Meeting Room C.05

Level 1: Introduction to Linux and the Command Line with a Learning CTF

Level 2: Introduction to Web CTF with a Following CTF Challenge (Rebootown)

Meeting Room C.06

International Telecommunication Union (ITU) Session - 1

10:00 - 12:30

Meeting Room C.06

Tabletop Exercise: CyberCrisis Preparedness and Management in the Financial sector — Batch 1

International Telecommunication Union (ITU) Session - 2

13:00 - 15:30

Meeting Room C.06

Tabletop Exercise: CyberCrisis Preparedness and Management in the Financial sector — Batch 2

Meeting Room C.07

National Cyber Security Center (NCSC), Bahrain

10:00 - 17:00

Meeting Room C.07

Capture the Flag

Meeting Room C.09

BIBF - AWS Security Essentials (Professional Qualification Training)

10:00 - 16:00

Meeting Room C.09

AWS Security Essentials covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, participants will learn where they are responsible for implementing security in the AWS Cloud and what security-oriented services are available to them and why and how the security services can help meet the security needs of their organization. This course enables participants to dive deep, ask questions, work through solutions, and get feedback from AWS-accredited instructors with deep technical knowledge.

Meeting Room C.10

BIBF - Data Privacy Practices and Principles (PDPL)

10:00 - 16:00

Meeting Room C.10

This workshop offers a meticulous overview of preserving sensitive data in today’s digital landscape, emphasizing the principles of privacy by design” and privacy regulations like PDPL. Participants will acquire the expertise to evaluate privacy risks, employ security measures, and adeptly manage data breaches. Ethical considerations and the pivotal role of individuals and organizations in upholding data privacy are also explored. Upon completion, students will be equipped to navigate the intricacies of data privacy and compliance, embodying the principles of privacy by design” and adhering to regulations such as PDPL with professionalism and precision. Moreover, the workshop will also cover pressing concerns on the potential for AI systems to perpetuate biases, infringe upon privacy, and undermine trust. This conference workshop aims to provide a comprehensive overview of the ethical and privacy considerations in building AI models that are free from bias.

Meeting Room C.11

CyberNas - Data Protection and Cyber Security Training - Leadership

10:00 - 17:00

Meeting Room C.11

Batch 1:

Join the training and earn the prestige Certificated Data Protection Leader Certificate CDPL. Earn your certificate immediately upon completing your training. 

The exam will be proctored by a TUV certified proctor from 4:00 pm — 5:00 pm.

Meeting Room C.12

Secure Code Warrior Tournaments - Professional Workforce

10:00 - 13:00

Meeting Room C.12

Batch 1:

Challenge yourself with vulnerable code puzzles and improve your skills. 

Note: Practical Session, LAPTOP required.

Secure Code Warrior Tournaments- University Students

14:00 - 17:00

Meeting Room C.12

Batch 1:

Challenge yourself with vulnerable code puzzles and improve your skills. 

Note: Practical Session, LAPTOP required.

Meeting Room C.14

Break out Session

10:00 - 10:45

Meeting Room C.14

Navigate the Data Sovereignty Landscape” (with focus on Oil & Gas industry)

Speaker: Walid AlShaari, Senior Solution Architect, Amazon

Break Out Session

11:00 - 11:45

Meeting Room C.14

Mitigating SIM Swap fraud in Telcos

Speaker: Dr. Srinivasan Rajavelu, Senior Telco Solution Architect, Amazon Web Services, Dubai, UAE

Break out Session

12:00 - 12:45

Meeting Room C.14

The AI behind Vectra AI for Erasing the Unknown

Speaker: Yazan Hammoudeh, Director Security Engineering, Vectra

Break out Session

13:00 - 13:45

Meeting Room C.14

Securing the Smart Cities of Tomorrow: Cybersecurity Challenges and Threats!

Speaker: Osama Abduo, Sr.Manager, Systems Engineering, Fortinet Middle East

Break out Session

14:15 - 15:00

Meeting Room C.14

Enhancing Cybersecurity Through Advanced Penetration Testing

Speaker: Amin Rawah, Penetration Testing Manager, Cipher

Break out Session

15:15 - 16:00

Meeting Room C.14

Use Threat Intelligence to Accelerate Incident Response

Speaker: Arwa Alomari, Threat Intelligence Lead, Cipher

Break out Session

16:15 - 17:00

Meeting Room C.14

Building a Resilient Organization: The Role of Business Continuity and Cyber GRC.

Speaker: Nowaf Alaboudi, Head of Cyber GRC Advisory, Cipher

Meeting Room C.19

Executive Security Simulation by AWS - Executives

11:00 - 13:00

Meeting Room C.19

Learn through an experiential exercise that illuminates key decision points for a successful and secure cloud journey. During this team based,game-like competitive simulation, you will leverage an industry case study to make strategic security, risk, and compliance time based decisions and investments.