Skip
cyber-security 2

Cyber Security Lab

Into the unknown, Securing the links

The Cyber Security Lab at Intersec provides a platform where information security, emergency responses and safety professionals create a community village based around shared needs and objectives. Professionals actively involved in Cyber Security; network, discuss, and evaluate best practice approaches and tactics to manage evolving cyber threats. Global luminaries join the stage to share their cyber security insights, innovation, and expertise.  

Against the backdrop of digital transformation, technology development and disruption; Cyber Security has become crucial for the safety of nations, corporations, and civilians. From securing critical infrastructure to preventing data breaches, hiding online identity to securing business; Cyber Security is a lot more than just encryption and changing password.The Intersec Cyber Lab hosted a diversity of cyber experts, from national leaders to public & private sector professionals, from cyber connoisseurs to advisors, hackers to responders, and cyber economists to corporate buyers. The carefully crafted Cyber Security Lab programme covered topics that need evaluation, attention, and discussion. The live demonstration of hacking and cyber games kept visitors glued to seats!

Supported by UAE Cyber Security Council, the main stage shared by industry bright minds and ethical hackers who shred solutions for the rising risk, ways to shield information and the need for mutual support and collaboration to be resilient and fight cyber intimidation by notorious actors. The three-day dynamic programme included topics on cybercrime detection & investigation, updates on stringent information regulations, intriguing real life case studies, confessions of a CISO, cybercrime and cryptos, Internet of Things (IoT) and network vulnerability, Use of Artificial Intelligence (AI) in threat detection and response, Blockchain and its use in security protocols, Mass Cloud Migration and many more trending topics.

The Cyber Lab provided actionable insights for security managers, IT professionals, facility managers and company management in a practical and interactive format to help future proof current plans and improve resilience and agility in response.

Agenda

10:30-11:00 Registration & Networking 
11:00-11:05 Welcome Address

Speaker - Steven Wilson, Cybercrime & Digital Investigator and Author, Canada
11:05-11:25 Opening Keynote: Innovation in Cybersecurity - Building A Whole Nation ApproachDubai Electronic Security Council (DESC)

Speaker - H.E. Dr. Mohamed Hamad Al-Kuwaiti, Head of Cyber Security, UAE Government
11:25-12:00 MoU Signing Ceremony
Cybersecurity Council
12:00-12:20 Policing the Metaverse

Speaker - Aloysius Cheang, Chief Security Officer, Huawei
Cybercrime At a Glance
12:25 - 12:50 Keynote - The Art & Science of Cybercrime Investigation
Right Knowledge, Exact Tools, and Different Techniques required to combat cybercrime

Speaker - Jeff Lanza, Ex Special Agent, FBI
12:50-13:00 Opening Remarks - Adel Darwish, Regional Director for Arab States, International Telecommunications Union (ITU)

Presentation: 2nd edition of the NCS Guide: What has the first edition achieved, what are the main challenges, and why the need for a 2nd edition?

Speaker - Giacomo Assenza, Cybersecurity Research Officer, International Telecommunications Union (ITU)
13:00-13:30 Fireside Chat – Challenges and Opportunities of NCS speakers
- NCS to provide a structured framework to guide digital development while ensuring a comprehensive, coordinated, and effective response to cyber risks
- NCS as a strategic approach to define shared objectives and prioritize national resources

Moderator - Ahmed Elraghy, Senior Advisor for Arab States, International Telecommunication Union (ITU)|

Speakers
Orhan Osmani, Senior Coordinator - Cybersecurity, International Telecommunications Union (ITU)
Andrea Rigoni,
Global Cyber lead for Government and Public Services, Deloitte
Francesca Spidalieri,
CRI 2.0 Co-Principal Investigator, Potomac Institute for Policy Studies (PIPS)
Anat Lewin,
Senior Digital Development Specialist, World Bank
13:30- 13:50 Workshop – Cybercrime Detection, Defense and Forensics
- Monitoring of WIFI, Geolocation, and Mobile Data traces and tracking
- What smart strategies can be adopted for information gathering? 
- How to embed IoT and Blockchain technology to make data tamper-proof?

Speaker - Ronen Kotlovsky, Business Mentor, Israel Export Institute
13:50-14:10 Keynote - Economics of Cybersecurity 

Speaker - Sultan Alowais, Digital Lead, Ministry of Cabinet Affairs & The Future (MOCAF)
14:10-14:30 Break & Networking
14:30-14:50 Keynote Session:
Cybercrime is a scary offence. How strong is our defense? 

- Today and the Future of Cybercrime 
- Most innovative Cybersecurity strategies and solutions

Speaker - Oleksiy Feshchenko, Advisor - Cybercrime and Money Laundering Section, United Nations Office on Drugs and Crime (UNODC)
14:50-15:00 In-Country Value (ICV) Overview 

Speaker - Hamad Saif Belmahaina, In-Country Value Director, Ministry of the Industy & Advanced Technology (MOIAT)
 Building Cyber Resilience 
15:00-15:20 Afternoon Keynote – eCrime reporting platform – All about statistics, customer journey and a case study.
eCrime is Unified platform specifically for cyber complaints and safe reporting for online incidents hosted by Dubai police.

Speaker - Colonel Saeed Al Hajiri, Director of Cybercrimes Department, Dubai Police
15:20-15:40 Keynote – Reference SolarWinds cyber-attack
- Why is Zero Trust framework deployment crucial? 
- Does Zero Trust ensure 360-degree security? Impact on the future of work 
- Adopting a principle of “No Trust, Always Verify”. Why is matters?

Speaker - Steven Wilson, Cybercrime & Digital Investigator and Author, Canada
15:40-16:15 Coffee Break & Networking
16:15-16:55 Panel Discussion – Moving from Cybersecurity to Cyber-resilience or the requirement of both?
- Should there be a blueprint for oil and energy sector to counter cyberthreat?
- What is the key to overcome incidents and maintain business continuity?
- Can cyber-resilience help avert cyber pandemic?
- Importance of deployment of ecosystem wide resilience plans

Moderator - Prof. Paul W. Poteete, PhD, Associate Professor, Computer Science and Cybersecurity, Geneva College

Speakers
Roshdi A. Osman, Cybersecurity Strategist, Saudi Aramco
Amna Al Blooki,
Director of Cyber Security Regulations and Compliance, Abu Dhabi Digital Authority (ADDA)
Hariprasad Chede, Chief Information Security Officer, National Bank of Fujairah (NBF)
Xiaoxin Gong, S
enior Cyber Security Expert, Huawei Enterprise Business Group - Middle East
16:55-17:10 Keynote Session - The Lawful Inspection
Top 10 tools used in cybercrime investigations

Speaker - Mark Bentey, Ex - UK Police and Director, Bentac Training and Consultancy
Cybersecurity for Zero Exploitation of Humans 
17:10-17:30 Armchair Discussion - Supply Chain Compromise
- Fostering a reliable partnership for technology supply chain
- How to protect your IP rights when entering partnership?
- Is Industry 4.0 helping in building regional cyber capacity?

Speakers
Sultan Alowais, Digital Lead, Ministry of Cabinet Affairs & The Future (MOCAF)
Biju Hameed,
Head- Technology Infrastructure Operations, Dubai Airports
17:30-17:50 Closing Keynote – CyberAware - Online gaming and Cybersecurity
- What are the risks and how not to be a victim?
- Does a secure connectivity ensure secure online gaming experience?
- Impact on the Youth – reference – Blue Whale and Momo Challenge

Speaker - Lt. Col. Bryan Miranda (Retd), CTO, Digital Insights & Ex-Indian Army
17:50 Close of Day 1 
09:45-10:00 
Registration & Networking 
9:55-10:00 Welcome Address for Day 2 by Conference Chair

Mohamed Elbashir, Lead Cyber Security Architect, Abu Dhabi Commercial Bank
10:00-10:05 Opening Address

Alaa Elshimy, Managing Director & Senior Vice President, Huawei Enterprise Business Group - Middle East
10:05-10:25 Special Address: Collaborative Leadership:  Increasing Productivity and Morale in the Cyber Workforce
Building effective teams, increasing morale & productivity, and developing key leaders from within

Speaker - Gina L. Osborn, President, Gina L. Osborn & Associates & Assistant Special Agent in Charge, (Retired), FBI
The Soft Power of Cyber Knowledge 
10:25-10:45 Morning Keynote – The Changing Landscape of Cyber Threat Over the Years
- Data Protection - Is there such a thing? 
- Data protection and its massive impact on authentication evolution
- Role of Artificial Intelligence (AI) and Machine Learning (ML) – Are they are the real game changers towards threat prevention
- Real-time data visibility in cybersecurity is the key to mitigating risk 

Speaker - Ramy AlDamati, Co-Founder & CSO, AlBrza
10:45 - 11:05 Enhancing International Law Enforcement Collaboration to Tackle Cybercrime

Speaker - Bernardo Pillot, Assistant Director – Cybercrime Operations, Interpol
11:05-11:25 Keynote Session: Building Digital Capabilities for Better City Management

Speaker - Alaa Elshimy, Managing Director & Senior Vice President, Huawei Enterprise Business Group - Middle East
11:25-11:55 Headliner Session - How your company will be hacked? Secrets of an Ethical Hacker
Synopsis:
With more than 30 years of cyber security experience, FC, the co-founder of Cygenta and renowned hacker will speak about his experience of dealing with different types of cyber criminals around the globe. During this lively presentation FC will provide a high-level look at the types of attackers we currently face. Then calling on his past experiences he will be taking a delve into the murky world of nation-state abilities. Showing that the internet is now a compound of physical and digital realms, he will discuss how to take down an entire country. FC will then conclude the presentation with a live hacking demonstration showing how your company WILL be hacked in the next few years.

Speaker -
 Freaky Clown (FC), Ethical Hacker & Social Engineer
11:55-12:15 Armchair Discussion - Knowledge Sharing is the Key to Cybersecurity Defense 
- Creating a nexus of knowledge and experience to counter cybercrime 
- Role employees must play 
- Creation of a threat intelligence platform

Speakers
Prashant Nair, Group Chief Information Security Officer, Network International
Asma Al Yassi,
Cybersecurity Governance – CISO, ENOC
Dr. Nadher Al-Safvani,
Advisor, Centre for Humanitarian Dialogue (HD)
12:155-12:45 Panel Discussion – Future of Emerging Technologies
- Cybersecurity and AI role in reducing the gender gaps
- Maximized Economic Value

Moderator - Siham Benhamidouche, MEA Cybersecurity Officer, Schneider Electric 

Speakers
Dr. Hoda Al Khazaimi, President, Emirates Digital Association for Women
Dr. Bushra AlBlooshi,
Research and Innovation Head, Dubai Electronic Security Center (DESC)
Sofia Scozzari,
Founder & CEO, Hackmanac
12:45-13:00 Lunch Break & Networking 
 Ensuring Our Nation is Safe 
13:00-13:20 Afternoon Keynote – Cybersecurity – A Matter of National Security 
- Blockchain regulation from FSI perspective for national security
- Assessing the nuances of national cybersecurity
- The shared responsibilities of government, private sector, and civilians
- Safeguarding the national infrastructure
- Is interconnectedness and communication between people and technology posing threat to national security? 

Speaker - Refael Franco, INCD- (former) Deputy DG, Israel National Cyber Directorate & Co-founder Code Blue
13:20-13:40 Keynote Session – Crime and Cryptos 
- Does Cryptocurrency drive Dark Web and Facilitate Crime?
- The uncanny alliance of Crime, Crypto and Cybersecurity 
- What the world needs to know about dark web and cybersecurity? 
- How Blockchain propels cybercrime?

Speaker - Alexandru Caciuloiu, Cybercrime and Cryptocurrency Programme Coordinator, United Nations Office on Drugs and Crime (UNODC)
13:40-14:20 Panel Discussion – The WHAT, WHYs and HOWs of cloud-migration for cybersecurity?
- Case Study/ Take Aways - An example of failure/vulnerability (Boston or NHS) when they were attacked what happened, what could they have done differently? 
- Is it the best response to cybersecurity threats?
- What to consider when migrating and how fast? 
- Establishing a proper governance mechanism for assessment and migration

Moderator - Gina L. Osborn, President, Gina L. Osborn & Associates & Assistant Special Agent in Charge, (Retired), FBI

Speakers
Ken Coghill, Director - Head of Innovation & Technology Risk Supervision, Dubai Financial Services Authority
Amer Sharaf,
Director - Compliance, Support and Alliances, Dubai Electronic Security Center (DESC)
Hussein Shafik Bahgat,
Regional Information Security Risk Officer (CISRO), Africa and Middle East, Standard Chartered Bank
Harri Sylvander,
Senior Consulting Manager, Mandiant
14:20:15:20 Coffee Break & Networking 
Office to Counter Cyber Threats 
15:20-16:00 Panel Discussion – Ransomware Protection Market – GCC Perspective
- Market size and Future Trends
- Analysis - Is the region protected?
- Is it a unified solution to curb the cybersecurity threat?

Moderator - Jeff Lanza, Ex Special Agent, FBI

Speakers
Bruno Fonseca,
Regional CSO, AXA
Somnath Sarkar,
Group Head of Information Security, Mashreq Bank
Ronen Kotlovsky,
Business Mentor, Israel Export Institute
Mohamed Elbashir,
Lead Cyber Security Architect, Abu Dhabi Commercial Bank
Speaker from Mubadala Health
16:00-16:20 Shortage of Talent vs. Increase in Cyberthreat
- Is it a growing industry issue?
- Addressing the skill gap – Educating and training the employees
- Hiring through experts to find the right candidate

Speaker - Prof. Paul W. Poteete, PhD, Associate Professor, Computer Science and Cybersecurity, Geneva College
16:30  Close of Day 2
09:45-10:00 Registration & Networking
10:00-10:05 Opening of Day 3 by Conference Chair
Paul Friedberg,
Head of Global Business Acceleration, Cellebrite
10:05-11:00 Live Practical Demo 1 - Inside the Criminal Mind of a Real Hacker:
- Why cyber security “experts” are the reason why cyber-crime will reach $10.5 Trillion by 2025?
- How to hack hotels?
- How to hack into ATM’s?
- Who is the #1 in Ransomware attacks?
- What you are not doing to protect the company you work for

Speaker - Gregory D Evans, Director, National Cyber Security Ventures, USA
11:00-11:20 Tech Spotlight: Re-shaping cyber security using AI and blockchain

Speaker - Steven Sim Kok Leong, President, ISACA Singapore Chapter
11:20-11:50 Cyber Hygiene – Beyond the Common Talk

Speaker - David Brown,
Security Operations Director, Axon Technologies
11:50-13:00 Lunch Break & Networking
13:00-13:20 Real-life use case for analyzing unstructured data to investigate organized crime using Artificial Intelligence

Speaker - Dr. Jassim Haji, President, International Group of Artificial Intelligence - Bahrain
13:20-13:45 Harnessing Digital Intelligence Solutions to Solve Crime
This session is about how to improve your daily operations and workflows using best-in-class digital technology solutions to equip you with everything your organization needs to gather intelligence, tackle investigations, and resolve cases faster and more efficiently than ever before.

Speaker - Paul Friedberg, Head of Global Business Acceleration, Cellebrite
13:45-14:30 Coffee Break & Networking
14:30-14:50 Research Driven Education in Cybersecurity

Speaker - Dr. Ernesto Damiani,
Director, Khalifa University Center for Cyber Physical Systems (C2PS) & Professor, Electrical Engineering and Computer Science, Khalifa University
14:50-5:10 Demo - National Bug Bounty Platform

Speaker - Yassir Kazar, CEO & Co Founder, Yogosha
16:00 Close of Conference

Speakers

Hussein Shafik Bahgat

Hussein Shafik Bahgat

Regional Information Security Risk Officer (CISRO), Africa and Middle East, Standard Chartered Bank

Male placeholder

Majed Al Ali

Cyber Security Operations Department, Abu Dhabi Digital Authority (ADDA)

Male placeholder

Orhan Osmani

Senior Coordinator - Cybersecurity, International Telecommunications Union (ITU)

Advisory Board Members:-

C-Suite executives: CTO, CIO, CEO, CFO, CISO

Directors: Digital Operations Director, ICT Director, Director for Compliance, Deputy Director General, IT Deputy Director, Digital Cloud Hosting Programme Director, Cyber Security Strategy Director, Director of IT, Director – Finance, Portfolio Director, Managing Director, Security Director

Department Heads: Head of IT, Head of Information & Records Management Service, Head of Communications, Security Manager, Head of Procurement & Contract Management, Head of Business Applications, Head of IT Security, Head of Operations, Head of ICT Business Performance, Head of Business Intelligence, Head of ICT Services, Head of Procurement, Head of Service, Head of IS Service Delivery, Head of procurement & Supplier Management, Head of Business Engagement, Head of Information and Management & Compliance