Safeguarding Critical Infrastructure

Defense, preparedness and response to protect critical infrastructure - a three day conference from 16 – 18 January 2022

The 23rd edition of Intersec presents the industry’s most comprehensive showcase to date as it brings together regional and international government leaders, agencies and organisational heads with outstanding world class speakers’ innovative products, technology & solutions across all key sectors.

The coronavirus pandemic has caused a surge in threats, a lot of which have targeted stakeholders and companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home.

This year’s launch of the Safeguarding Critical Infrastructure Conference ensures that stakeholders have a place to discuss keeping infrastructure assets safe and protected against physical harm and cyber-attacks. We expect international, regional, and local organisations to attend and address these our circumstances and the importance of building resilience. This year’s theme is perfectly placed to compass “Defending, preparing, responding and building resilience”.

The conference will address topics such as: smart cities security, how we might protect critical infrastructure assets and systems against cyber-attacks, ICSs, climate risks issues, global supply chains and the future of 5G networks.  In addition, we address national emergency preparedness, physical security of infrastructure and sector specific opportunities to help industry prepare and defend, as well as respond to disruption.

The Safeguarding Critical Infrastructure Conference brings together government services, law enforcement, civil defense, emergency services, oil, gas, energy, transport, and telecommunications as they are the key pillars of many nations’ economic infrastructure.  Speakers will discuss success and initiatives in place to further safeguard their nations critical infrastructure, we invite leading nations, organizations and project leaders to come together once again at Intersec in 2022.


10:00 - 10:15  Chairs welcome 
10:15 - 10:30 Opening welcome:
Building safety mechanisms into critical infrastructure
10:30 - 11:00 Keynote:
A shared responsibility between stakeholders to maintain and improve security and resilience of infrastructure
11:00 -11:15 Keynote:
Anticipating threats and hazards 
11:15 - 12:00 Multi-stakeholder dialogue:
Promoting engagement at all levels of government and industry to foster mutual understanding, information sharing and practical exchanges that enable the success of national preparedness efforts 
12:00 – 12:45  Smart Cities panel discussion:
The power, the risks, the response
- Securing the smart city and its critical infrastructure 
- What have been the expanding risks in smart cities and how do we defend against threats?
- What is the current threat landscape?
- What successes have we seen in highly urbanized cities?

Dr. Marwan Alzarouni, Director of Information Services, Dubai Electronic Security Center
12:45 - 13:00 Networking Lunch 
13:00 -13:30 International speaker: 
Digital security of critical infrastructure and essential services

Tonu Tammer,
Executive Director CERT-EE, Estonian Information Systems Authority
13:30 - 14:15 Panel discussion: Global threats trends and analysis: cross boarder and cross-sector interdependencies
- Examining the evolving threat landscape: Preparing for the challenges of tomorrow
- Coordinate, share, monitor, collect, analyse and forecast, national level threats to critical
- How can stakeholders take into account globally distributed digital infrastructures (e.g. Cloud computing) as well as potential systemic risk from widespread vulnerabilities (e.g. Meltdown and Spectre)?

William Brown, Director, Crisis and Resilience Consulting, Middle East, Control Risks
Dr. Sandro Gaycken,
Director, Digital Society Institute, Germany
14:15 - 14:45 Zero-trust approaches to defend against cyber threats in critical Infrastructure 
- Zero-trust: a more comprehensive approach to protecting IT and OT networks
- A zero-trust mindset at the highest level, along with zero-trust gateways at the nexus of IT and OT
- The necessary steps explained
Simone Vernacchia, Partner, Digital, Cyber security, Resilience and Infrastructure, PwC Middle 
14:45 - 15:15 Mitigating possible disruption of economic and social activities by building resilience in critical infrastructure assets
- Addressing higher dependencies on digital technologies what the world looks like now and in the future
- Case study: Demonstrating a largescale crisis 

Alessandro Bassano, Principal Digital Security Scientist, Technology Innovation Institute Abu Dhabi
15:15 - 15:30 Networking Break
15:30 - 16:15 Panel discussion: The ICS challenge
The convergence of physical and cybersecurity processes and increasing integration of ICS with business networks and internet-based applications has vastly increased the prevalence and complexity of cyber threats to ICS. ICS manage physical operational processes which may result in cyberattacks that have physical consequences such as loss of life, property damage. Making ICS attractive targets for malicious actors.
-  How do we identify, detect, protect, respond, and recover to threats? 
-  To what extent is digital transformation changing the protection of critical information infrastructures and the management of digital security risk?
-  Balancing technology opportunities with risk management strategies
-  Encouraging integrated partnerships across the value chain 
16:15 - 16:30 Closing remarks and end of day 1
10:00 - 11:00   Registration &  Networking
11:00- 11:30 Oil & Gas: Pipelines, Refineries, Production Facilities
-  Securing oil and gas assets – understanding the current threat landscape
-  What needs to be in place to prevent attacks on pipelines and refineries

Shahab Siddiqui, Global Head of Cyber Security, Petrofac
11:30 - 12:00 How systems need to be designed with the future in mind
-  Building system-wide resilience depends on all actors and stakeholders being aware of the risks
-  Maintaining cyber hygiene and incorporating security objectives into research and design
-  Preserving the continuity of critical infrastructure operations

Hafiz Farooq, Senior Cyber Security Architect, Saudi Aramco's Global Security Operations Center
12:00 - 12:45 Panel Discussion:
Security effects of climate change  
- Safeguarding against extreme weather conditions and challenge for stable energy supply
- Is global critical infrastructure ready for climate change as we move towards greater cross boarder dependencies?  
-  Preparing capabilities necessary to mitigate and recover from disruptions when they occur 
12:45 - 13:15 Networking Lunch
13:15 - 13:45 Contingency planning as a key to crisis preparedness and response
This session will discuss the policies and structures in place that provide a backbone for contingency planning: - Ensuring capital cities and the population can access critical products in critical emergencies 
-  What does a critical facilities protection plan look like? Considerations for large-scale events and pandemic-like disasters
-  How might we establish an on-going program to implement recommended actions taken from lessons learned?
-  Case study focusing on resilience improvement and better understanding systemic emergency management risks in order to plan accordingly
13:45 - 14:15 Worth the risk? Cultivating risk-based security strategies
- Find out how risk-based strategies can be applied to vital OT systems
- Spend more wisely, and get the most security for your money
- Limit the damage cyber criminals can do to your systems when prevention doesn’t work
Dr. Patrick Noack, Executive Director - Future, Foresight and Imagination, Dubai Future Foundation
14:15 - 14:45  Presentation: Securing 5G networks and infrastructure from cybersecurity risks
- Addressing threats to progressing policy and standards a foundation for securing 5Gs future communications standards 
- Addressing supply chain risks tied to ICT threats and why we should slow down the pace of deployment to protect the integrity of 5G networks
- Securing 5G Systems architecture by keeping an eye on new weaknesses presented by ICT components  

Lt. Col. Dr. Hamad Khalifa Al Nueimi, Head of Telecommunications Section Information Technology Center, Abu Dhabi Police General Head Quarter             
15:00 - 15:15  A case study from Huawei followed by an onstage discussion  
15:15- 16:00 Panel discussion: Developing robust, secure, and resilient transport, logistics and supply chains
-  Ensuring capital cities and the population can access critical products in critical emergencies – the case for supply chain shortages 
-  How can we modernize legacy systems in the transport and logistics sector?
-  Where does all the data go? How do we safeguard it against digital security attacks?
-   Building a resilient ICT supply chain by strengthening: a view of how goods and services flow through countries and various interdependencies 
16:00 - 16:45  Panel Session: Digital security risks in the financial sectors 
- The convergence of regtech to help curb major security gaps
- Staying protected while meeting the needs of users and balancing need for high security standards to maintain the integrity of financial systems
-  What regulation, information-sharing or financial incentives exist?

Sultan Altukhaim, Chief Information Security and Risk Officer, The Saudi Investment Bank
Charanjeet Singh,
Senior Vice President & Head - Fraud Risk & Investigation, First Abu Dhabi Bank
Amit Mehta, Cybersecurity Advisory Practice Lead, Mastercard
16:45 - 17:10 Fire-side chat
What is the role of the individual within organisations?
- The changing customer, supplier and individual – how do we secured our systems from human and malicious errors
-  Driving a culture of integrity and trust in organisations – what does this look like for highly secured infrastructure? 

Kris Voorspels, Regional Technical Manager, Owl Cyber Defense



Closing remarks and end of Day 2
10:00 - 10:45  
10:30 -11:30  
11:30  – 12:00

Exploring new techniques to improve the security-critical control systems in the face of emerging threats
- IIoT security
- Intrusion detection and prevention
- Emerging threats to ICS
- Performance evaluation of security methods and tools in control systems
- Innovative ICS/SCADA testbed designs
11:30 – 12:30

Evolution of security strategy in transformational times: asking the right questions
What security, whose security and what is national security? 
How to identify and prioritize security threats and opportunities and divide new skills among security institutions and agencies? 
-  What is the rationale for national security strategies? 
-   What are the desirable methodology, processes and elements of national security strategy development? 
-   How to link national security strategy formulation with strategic leadership, national vision and ownership, resources management, civilian oversight, interagency coordination, and external partnership? 
-   What national security strategy development and implementation lessons could countries consider?
12:00 – 12:30

How to adjust your post-covid cyber strategy
- Get informed on the threats facing CNI sectors and find out why the Covid pandemic is putting our systems at greater risk
- Discover how you can take action to make interconnected systems a benefit and not a burden
- Create opportunity out of crisis by securing your systems against new trends, such as working from home
Building capacity and capabilities in new critical infrastructure threat detection

- What certification schemes have been useful to strengthen mitigation measures for cyber risks in critical infrastructure?
- What are the most effective ways to raise awareness and train personnel with respect to cyber risks in critical infrastructure sectors?
- What policy tools would work best to reduce cyber vulnerabilities of critical infrastructures? 
How do we build a dynamic defense for critical infrastructure?

What have been the biggest technological trends over the past year?
-  How has these technologies reacted to the current threat landscape?
-  What limitations do these technologies possess and how have you addressed them?

Ashish Khanna, CISO Advisor & Cyber Security Specialist
Closing remarks and end of conference 
Closing remarks and end of conference 


Advisory Board Members:-

Defence Preparedness Response
  • Surveillance Systems – How do we manage multiple systems?
  • Human Assets – Selection, training, motivation
  • Defending national treasures–Oil and gas refineries, LNG, ports, power stations
  • Critical Communications and control
  • International and National Agency Co-operation
  • Planning for Disaster – Risk management and resilience (including pandemics)
  • Ariel Assets – What’s the future? – Fixed wing, rotor craft, UAV’s, satellites
  • Perimeter Security – Do long perimeters mean weak security?
  • Security and Resilience in Design
  • Standardisation for Improving CIP Solutions
  • CNI Threat and Vulnerability Analysis
  • Identity Management & Access Control
  • Information exchange and interoperability
  • Working with private sector in a more collaborative way
  • Emerging and Future threats, identification and management
  • The Human Factor – Operator Protection
  • Energy Infrastructure Security
  • Transport Infrastructure Security
  • Telecomms Infrastructure Security
  • Emergency Preparedness and Response Coordination
  • Government: Ministries, Departments and related agencies           
  • Global/Group CEO’s
  • General Managers
  • Head of IT
  • CIOs
  • CTOs
  • Chief Innovation Officers
  • Chief Digital Officer
  • SVPs/VPs of IT
  • Heads of Cyber Security
  • Senior Directors of IT 
  • Cyber security of complex and distributed critical infrastructures across sectors
  • Situational Awareness towards oil, gas and energy Incidents
  • Prevention, resilience and preparedness and lessons learned across sectors
  • Safety-security interactions and collaborative approaches in the financial sector
  • Protection of industrial control systems, the emerging threats
  • Performance evaluation of security methods and tools in control systems
  • Vulnerability and risk assessment methodologies for government services and transportation
  • Detection and response mechanisms across law enforcement
  • Supply chain vulnerabilities and protections