Cyber Security Lab

Into the unknown, Securing the links

The Cybersecurity Lab provides a platform where information security, emergency responses and safety professionals create a community village based around shared needs and objectives. 

Professionals actively involved in Cybersecurity will network, discuss, and evaluate best practice approaches and tactics to manage evolving cyber threats. Global luminaries will join the stage to share their cybersecurity insights, innovation, and expertise.  

Against the backdrop of digital transformation, technology development and disruption; Cybersecurity has become crucial for the safety of nations, corporations, and civilians. From securing critical infrastructure to preventing data breaches, hiding online identity to securing business; Cybersecurity is more than just encryption and changing password. The Intersec Cyber Lab will host a diversity of cyber experts, from national leaders to public & private sector professionals, from cyber connoisseurs to advisors, hackers to responders, and cyber economists to corporate buyers. The carefully crafted Cybersecurity Lab programme includes topics that need evaluation, attention, and discussion. The live demonstration of hacking and cyber games is sure to keep you glued to your seats!

Supported by UAE Cybersecurity Council, the main stage will be shared by industry bright minds and ethical hackers who will give solutions for the rising risk, ways to shield information and the need for mutual support and collaboration to be resilient and fight cyber intimidation by notorious actors.

The three-day dynamic programme will include topics on cybercrime detection & investigation, updates on stringent information regulations, intriguing real life case studies, confessions of a CISO, cybercrime and cryptos, Internet of Things (IoT) and network vulnerability, Use of Artificial Intelligence (AI) in threat detection and response, Blockchain and its use in security protocols, Mass Cloud Migration and many more trending topics.

The Cyber Lab provides actionable insights for security managers, IT professionals, facility managers and company management in a practical and interactive format to help future proof current plans and improve resilience and agility in response.


09:30 - 10:30  Registration & Networking 
10:00-10:05 Welcome Address
10:05-10:15 Opening Keynote
10:15-10:25 Ministerial Address
Bolstering Cybersecurity Strategies for National and Economic Security – How prepared are we? 
10:25-10:30 MoU Signing Ceremony
10:30-10:45 Presentation by Huawei
10:45-11:00 Session by an Ethical Hacker 
Cybercrime At a Glance
11:00 - 11:20 Keynote - The Art & Science of Cybercrime Investigation
Right Knowledge, Exact Tools, and Different Techniques required to combat cybercrime 
11:20-11:50 Round Table - Familiarity and Updates on Cybersecurity Regulations – Asia and Middle East Focus 
- Personal Data Protection and Reporting
- Compliance with Privacy Laws 
- Standardization Challenges, Framework and Recommendations
11:50- 12:20 Workshop – Cybercrime Detection, Defense and Forensics
Monitoring of WIFI, Geolocation, and Mobile Data traces and tracking
What smart strategies can be adopted for information gathering? 
How to embed IoT and Blockchain technology to make data tamper-proof?
12:20-12:40 Plenary Session
Economics of Cybersecurity 
12:40-13:00 Plenary Session/Case Study/ Interview Session 
Cybercrime is a scary offence. How strong is our defense? 
- Today and the Future of Cybercrime 
-  Most innovative Cybersecurity strategies and solutions
13:00-14:00 Lunch Break & Networking 
 Building Cyber Resilience 
14:00 - 14:20 Afternoon Keynote – Hackers Perspective on Cybercrime and Cybersecurity
- Denial of Service (DDoS) – Its Simple but Powerful! 
- How to identify DoS?
- What is the difference between DoS and DDoS?
- How does DoS work and what are the global trends to deal with DDoS?
14:20-14:40 Fire Side Chat – Reference SolarWinds cyber-attack
- Why is Zero Trust framework deployment crucial? 
- Does Zero Trust ensure 360-degree security? Impact on the future of work 
- Adopting a principle of “No Trust, Always Verify”. Why is matters?
14:40-15:10 Panel Discussion – Moving from Cybersecurity to Cyber-resilience or the requirement of both?
- Should there be a blueprint for oil and energy sector to counter cyberthreat?
-  What is the key to overcome incidents and maintain business continuity?
-  Can cyber-resilience help avert cyber pandemic?
-  Importance of deployment of ecosystem wide resilience plans 
15:10-15:30 Plenary Session/Case Study – The Lawful Inspection
-  Top 10 tools used in cybercrime investigations 
15:30-16:00 Coffee Break & Networking 
Cybersecurity for Zero Exploitation of Humans 
16:00-16:20 Plenary Session/Case Study - Cyber Rogue Drone Takeover
- Are Drones becoming a security nightmare?
- Understanding rogue drones and ways to neutralize them
- Is it a threat to national security?
16:20-16:40 Armchair Discussion
- Fostering a reliable partnership for technology supply chain
- How to protect your IP rights when entering partnership?
- Is Industry 4.0 helping in building regional cyber capacity?
16:40-17:00 Closing Keynote – CyberAware - Online gaming and Cybersecurity
- What are the risks and how not to be a victim?
- Does a secure connectivity ensure secure online gaming experience?
- Impact on the Youth – reference – Blue Whale and Momo Challenge
17:00 Close of Day 1 
09:45-10:00  Registration & Networking 
10:00-10:15 Special Address
10:15-10:35 Policing the Metaverse
The Soft Power of Cyber Knowledge 
10:35-10:55 Morning Keynote – The Changing Landscape of Cyber Threat Over the Years
- Data Protection - Is there such a thing? 
- Data protection and its massive impact on authentication evolution
- Role of Artificial Intelligence (AI) and Machine Learning (ML) – Are they are the real game changers towards threat prevention
- Real-time data visibility in cybersecurity is the key to mitigating risk 
10:55 - 11:15 Interview Session - Confessions of a CISO
- Morphing the organizational cyberspace 
- The post pandemic return and embracing the future 
11:15-11:35 Armchair Discussion - Knowledge Sharing is the Key to Cybersecurity Defense 
-  Creating a nexus of knowledge and experience to counter cybercrime 
-  Role employees must play 
-  Creation of a threat intelligence platform
11:35-12:05 Panel Discussion – Closing the Gender Gap in Cybersecurity    
- Women embracing their superpower in the field
-  Diversity inclusion to boost innovation 
-  Vision of UAE in creating opportunities for women in cyberspace 
12:05-12:35 Round Table/ Interactive Work Group - Familiarity and Updates on Cybersecurity Regulations - Focus on GULF countries 
-  Personal Data Protection and Reporting 
-  Compliance with Privacy Laws 
-  Standardization Challenges, Framework and Recommendations
13:30 Lunch Break & Networking 
 Ensuring Our Nation is Safe 
13:30-13:50 Afternoon Keynote – Cybersecurity – A Matter of National Security 
- Blockchain regulation from FSI perspective for national security
-  Assessing the nuances of national cybersecurity
- The shared responsibilities of government, private sector, and civilians
-  Safeguarding the national infrastructure
-  Is interconnectedness and communication between people and technology posing threat to national security?   
13:50-14:10 Fire Side Chat – Crime and Cryptos 
- Does Cryptocurrency drive Dark Web and Facilitate Crime?
- The uncanny alliance of Crime, Crypto and Cybersecurity 
- What the world needs to know about dark web and cybersecurity? 
14:10-14:40 Panel Discussion – The WHAT, WHYs and HOWs of cloud-migration for cybersecurity?
- Case Study/ Take Aways - An example of failure/vulnerability (Boston or NHS) when they were attacked what happened, what could they have done differently? 
- Is it the best response to cybersecurity threats?
- What to consider when migrating and how fast? 
- Establishing a proper governance mechanism for assessment and migration  
14:40-15:00 Plenary Session/Case Study – Who is watching you? 
- Camera Surveillance Cybersecurity 
15:00-15:30 Coffee Break & Networking 
Office to Counter Cyber Threats 
15:30-16:00 Panel Discussion – Ransomware Protection Market – GCC Perspective
- Market size and Future Trends
- Analysis - Is the region protected?
- Is it a unified solution to curb the cybersecurity threat?  
16:00-16:20 Armchair Discussion – Shortage of Talent vs. Increase in Cyberthreat
- Is it a growing industry issue?
- Addressing the skill gap – Educating and training the employees
- Hiring through experts to find the right candidate  
16:20  Close of Day 2
09:45-10:00 Registration & Networking
10:00-10:30 Live Practical Demo 1 - Demonstration of Ethical Hacking
10:30-11:00 Cybersecurity Talent Hunt 
11:00-11:30 Tech Spotlight: Re-shaping cyber security using AI and blockchain
11:30-12:00 A red versus blue presentation demonstration
12:00-13:00 Lunch Break & Networking
13:00-13:30 Real-life use case for analyzing unstructured data to investigate organized crime using Artificial Intelligence
13:30-14:00 Live Hack: Online gaming fun hack 
14:00 Closing Remarks & Close of Conference

Advisory Board Members:-

C-Suite executives: CTO, CIO, CEO, CFO, CISO

Directors: Digital Operations Director, ICT Director, Director for Compliance, Deputy Director General, IT Deputy Director, Digital Cloud Hosting Programme Director, Cyber Security Strategy Director, Director of IT, Director – Finance, Portfolio Director, Managing Director, Security Director

Department Heads: Head of IT, Head of Information & Records Management Service, Head of Communications, Security Manager, Head of Procurement & Contract Management, Head of Business Applications, Head of IT Security, Head of Operations, Head of ICT Business Performance, Head of Business Intelligence, Head of ICT Services, Head of Procurement, Head of Service, Head of IS Service Delivery, Head of procurement & Supplier Management, Head of Business Engagement, Head of Information and Management & Compliance