Into the unknown, Securing the links
The Cyber Security Lab at Intersec provides a platform where information security, emergency responses and safety professionals create a community village based around shared needs and objectives. Professionals actively involved in Cyber Security; network, discuss, and evaluate best practice approaches and tactics to manage evolving cyber threats. Global luminaries join the stage to share their cyber security insights, innovation, and expertise.
Against the backdrop of digital transformation, technology development and disruption; Cyber Security has become crucial for the safety of nations, corporations, and civilians. From securing critical infrastructure to preventing data breaches, hiding online identity to securing business; Cyber Security is a lot more than just encryption and changing password.The Intersec Cyber Lab hosted a diversity of cyber experts, from national leaders to public & private sector professionals, from cyber connoisseurs to advisors, hackers to responders, and cyber economists to corporate buyers. The carefully crafted Cyber Security Lab programme covered topics that need evaluation, attention, and discussion. The live demonstration of hacking and cyber games kept visitors glued to seats!
Supported by UAE Cyber Security Council, the main stage shared by industry bright minds and ethical hackers who shred solutions for the rising risk, ways to shield information and the need for mutual support and collaboration to be resilient and fight cyber intimidation by notorious actors. The three-day dynamic programme included topics on cybercrime detection & investigation, updates on stringent information regulations, intriguing real life case studies, confessions of a CISO, cybercrime and cryptos, Internet of Things (IoT) and network vulnerability, Use of Artificial Intelligence (AI) in threat detection and response, Blockchain and its use in security protocols, Mass Cloud Migration and many more trending topics.
The Cyber Lab provided actionable insights for security managers, IT professionals, facility managers and company management in a practical and interactive format to help future proof current plans and improve resilience and agility in response.
Past Agenda
Conference Day 1 - Sunday 16 January 2022
Conference Day 2: Monday 17 January 2022
Conference Day 3: Tuesday 18 January 2022
09:45-10:00 | Registration & Networking |
10:00-10:05 | Opening of Day 3 by Conference Chair Paul Friedberg, Head of Global Business Acceleration, Cellebrite |
10:05-11:00 | Live Practical Demo 1 - Inside the Criminal Mind of a Real Hacker: - Why cyber security “experts” are the reason why cyber-crime will reach $10.5 Trillion by 2025? - How to hack hotels? - How to hack into ATM’s? - Who is the #1 in Ransomware attacks? - What you are not doing to protect the company you work for Speaker - Gregory D Evans, Director, National Cyber Security Ventures, USA |
11:00-11:20 | Tech Spotlight: Re-shaping cyber security using AI and blockchain Speaker - Steven Sim Kok Leong, President, ISACA Singapore Chapter |
11:20-11:50 | Cyber Hygiene – Beyond the Common Talk Speaker - David Brown, Security Operations Director, Axon Technologies |
11:50-13:00 | Lunch Break & Networking |
13:00-13:20 | Real-life use case for analyzing unstructured data to investigate organized crime using Artificial Intelligence Speaker - Dr. Jassim Haji, President, International Group of Artificial Intelligence - Bahrain |
13:20-13:45 | Harnessing Digital Intelligence Solutions to Solve Crime This session is about how to improve your daily operations and workflows using best-in-class digital technology solutions to equip you with everything your organization needs to gather intelligence, tackle investigations, and resolve cases faster and more efficiently than ever before. Speaker - Paul Friedberg, Head of Global Business Acceleration, Cellebrite |
13:45-14:30 | Coffee Break & Networking |
14:30-14:50 | Research Driven Education in Cybersecurity Speaker - Dr. Ernesto Damiani, Director, Khalifa University Center for Cyber Physical Systems (C2PS) & Professor, Electrical Engineering and Computer Science, Khalifa University |
14:50-5:10 | Demo - National Bug Bounty Platform Speaker - Yassir Kazar, CEO & Co Founder, Yogosha |
16:00 | Close of Conference |
Past Speakers

Hussein Shafik Bahgat
Regional Information Security Risk Officer (CISRO), Africa and Middle East, Standard Chartered Bank

Majed Al Ali
Cyber Security Operations Department, Abu Dhabi Digital Authority (ADDA)

Orhan Osmani
Senior Coordinator - Cybersecurity, International Telecommunications Union (ITU)
Advisory Board Members:-
Who should attend?
C-Suite executives: CTO, CIO, CEO, CFO, CISO Directors: Digital Operations Director, ICT Director, Director for Compliance, Deputy Director General, IT Deputy Director, Digital Cloud Hosting Programme Director, Cyber Security Strategy Director, Director of IT, Director – Finance, Portfolio Director, Managing Director, Security Director Department Heads: Head of IT, Head of Information & Records Management Service, Head of Communications, Security Manager, Head of Procurement & Contract Management, Head of Business Applications, Head of IT Security, Head of Operations, Head of ICT Business Performance, Head of Business Intelligence, Head of ICT Services, Head of Procurement, Head of Service, Head of IS Service Delivery, Head of procurement & Supplier Management, Head of Business Engagement, Head of Information and Management & Compliance |