Scroll to top






08:50Opening Remarks by Conference Director (MS Events)
09:00Opening Remarks by Mr. Sultan Al – Owais, Digital Lead Ministry of Cabinet Affairs
09:20Securing The Digital Future.
Public sector websites and networks can be attacked for a variety of reasons.
How network can handle the largest-ever attacks many times over, and mitigates close to the attack source for faster response times.
Aloysius Cheang, Chief Security Officer, Huawei, UAE

Winning the Race Against Ransomware

  • What ransomware is, and how a ransomware attack works
  • Tips and tricks on boosting your defenses against ransomware
  • Using the MITRE ATT&CK framework to identify vulnerabilities

Dan Caban, Director – Mandiant Consulting (META) – Mandiant


The Data Protection Journey During Periods of Change 

  • Introduction to Data Security challenges
  • Digital Sovereignty & Impact
  • Three main pillars of Digital Sovereignty
  • How to accelerate the cloud journey without compromising the digital sovereignty of customer

Peter D’souza, Regional Sales Manager – CPL Data Protection, Thales 

10:40Networking and coffee break
11:10                                                                                                       Round Table / Secret Briefing Hosted by
11:10Focus Sessions

“Top Challenges in Cyber Risk
Management & Current Best Practices”

“Cyber Innovation to Cater for
Digital Transformation and Metaverse “

“Threat Intelligence and Cyber Defense”


“Enabling the Local Cyber Security Workforce“ 


Future of Cyber Security: Challenges, best practices, and effective strategies to create Cyber-Safe Society.

  • Three pillars of Cyber Security strategy: Securing Federal Networks, Protecting Critical Infrastructure, providing Cybersecurity Governance
  • Network Security: An essential element of any organization’s cybersecurity
  • Two-factor authentication, encryption for sensitive data and other effective mechanisms of Cyber Security for Governments
  • Instilling a culture that enables the sharing of threat intelligence, extending cyber resilience across the supply chain

Nicholas Charnley, Vice President Cyber Security, TAQA – Abu Dhabi National Energy Company PJSC

Dr. Fene Osakwe, Council Member, Forbes Technology Council Member

Amit Bhatia, Head of Information Security, Maximus Gulf

Hulk Zhang, Principle Cybersecurity Engineer, Huawei UAE


Setting up a 360 degree IT & cyber risk management process

Agnishwar Banerjee , Marketing Director, MetricStream


Be Proactive. Think Threat-Centric Know your Gaps

Laurence Elbana, Regional Sales Director, Middle East & Africa, Picus Security


Looking at Cybersecurity as an Enabler for Digital Transformation

As world undergoes a massive wave of digital transformation, businesses today are invariably looking at adopting
new technologies to improve efficiency. As things change it is becoming increasingly important that cybersecurity
is built into a company’s organization structure

Jacob Mathew, Head of Information Technology, Government of Abu Dhabi Entity


Threat Intelligence Role Within the Cyber Defense Strategy

As threat actors get more sophisticated and their attacks challenge the most advanced enterprises and nations, many are taking the battle one step further adopting a cyber-defense strategy. Kaspersky is discussing the drivers of this strategy and how CTI is empowering its decision-making mechanisms converting it into a manageable task.

Emad Haffar, Head of Pre-Sales- META- Kaspersky

13:30Networking and lunch break

End-to-End Network Visibility and Management with SD-Wan

  • Constructing Converged Services to Reduce Complexity, Improve Speed, Enable Multicloud Networking and Secure the SD-WAN-Enabled Architecture
  • Using SD-Wan Extend the Reach of their Internal Networks to Remote Offices or Home Workers
  • Security Challenges While Transmitting Data via Public SD-Wan Channel

Padam Sundar Kafle, Head IT and Automation, Healthcare Information Technology, Aster Hospitals – UAE


Panel Discussion: Protection begins from humans. Educating and revisiting organizational culture

  • Creating a cyber-minded culture to minimize disruptions, attacks, and breaches.
  • The age of PAM and Authentications. Adopting the best tools and solutions for ensuring utmost protection of sensitive assets.
  • Conducting regular trainings, assessments, audits, and programs to increase resiliency

Richard Uhunmwagho, Regional Head, Information and Cybersecurity – Middle East & Africa, Standard Chartered Bank

Kashif R. Rana, Group Head of IT, HSA Group

Bader Husni Zyoud, Senior Information Security & Risk Management Specialist & Incidents Manger, Government Entity

El bachir EL ALAOUI, Cybersecurity and Infrastructure Manager – Asia, Middle East and Africa, ENGIE
Lakhwinder Singh,
Pre-Sales Manager, Middle-East, Turkey & Africa – Digital Identity & Security, CPL – Thales
Jasmita Malik,
Assistant Manager Information Security-Landmark Group


Data Protection Against Evolving Threats

Securing today’s complex, distributed, hybrid, and/or multicloud computing environments. These include understanding where data resides, keeping track of who has access to it, and blocking high-risk activities and potentially dangerous file movements.

Jeevan Badigari, Director – Information Security (CISO), DAMAC Group

15:50Closing Remarks and End of Day 1

Our clients describe us as a product team which creates amazing UI/UX experiences, by crafting top-notch user experience.

Our clients describe us as a product team which creates amazing UI/UX, by crafting top-notch user experience.

We’ve structured our workflow processes were from the funny the century rather.

Work and general inquiries

Assistance hours:
Monday – Friday
6 am to 8 pm EST

541 Melville Ave, Palo Alto,
CA 94301,
United States

We’re a team of creatives who are excited about unique ideas and help fin-tech companies to create amazing identity by crafting top-notch UI/UX.

We use cookies to give you the best experience.

Founded in 1987, Huawei is a leading global provider of information and communications technology (ICT) infrastructure and smart devices. We have more than 197,000 employees, and we operate in more than 170 countries and regions, serving more than three billion people around the world.
Our vision and mission is to bring digital to every person, home and organization for a fully connected, intelligent world. To this end, we will drive ubiquitous connectivity and promote equal access to networks; bring cloud and artificial intelligence to all four corners of the earth to provide superior computing power where you need it, when you need it; build digital platforms to help all industries and organizations become more agile, efficient, and dynamic; redefine user experience with AI, making it more personalized for people in all aspects of their life, whether they’re at home, in the office, or on the go. For more information, please visit at  or follow us on:

About Mandiant, Inc. 
Since 2004, Mandiant® has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.
Join the conversation. Follow them on Twitter, LinkedIn, Facebook, and YouTube.
© 2022 Mandiant, Inc. All rights reserved. Mandiant is a registered trademark of Mandiant, Inc. in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

At Picus Security, we help organizations to continuously validate, measure and enhance the effectiveness of their security controls so that they can more accurately assess risks and strengthen cyber resilience.As the pioneer of Breach and Attack Simulation (BAS), our Complete Security Control Validation Platform is used by security teams worldwide to proactively identify security gaps and obtain actionable insights to address them

For more information, visit our website:

MetricStream is the global SaaS leader of Integrated Risk Management and GRC solutions that empower organizations to thrive on risk by accelerating growth via risk-aware decisions. We connect governance, risk management, and compliance across the extended enterprise. Our ConnectedGRC and three product lines – BusinessGRC, CyberGRC, and ESGRC – are based on a single, scalable platform that supports you wherever you are on your GRC journey. Recognized by top industry analysts as a leader in GRC, MetricStream has been helping customers thrive on risk for more than 20 years.

Defensys is a cybersecurity solutions vendor. Since 2011, the company provides the whole product’s ecosystem that helps companies to withstand modern cyber threats and ensure reliable security management worldwide.

Inspira is a professional services company that specializes in providing leading edge cybersecurity solutions and services to its customers in all industry verticals. Over the years, Inspira has led cybersecurity initiatives with a team of over 1300+ professionals, successfully deploying next-gen solutions for our clients across the globe. Inspira’s security practice has been serving clients for more than 12 years, and we have successfully delivered some of the largest and most complex security initiatives in the banking & financial services industry. Our cybersecurity services span across Cyber Advisory, Cyber Transformation and Cyber Operations.

ESET is the #1 endpoint security partner from EU specializing in cybersecurity for more than 30 years. ESET´s security products are made in Europe and provide security software in over 200 countries and territories worldwide, and its software is localized into more than 30 languages. The company aims to protect human progress globally through the provision of security software and services.