SlideShare ist ein Scribd-Unternehmen logo
1 von 13
THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
                                INFORMATION SECURITY & ICT IN THE MIDDLE EAST…



3rd Annual
Chief Information Security Officer
Middle East
Summit & Roundtable 2011
31st January ~ 2nd February 2011
Habtoor Grand Resort Hotel & Spa - Jumeirah Beach
Dubai, United Arab Emirates


CISO MIDDLE EAST SUMMIT & ROUNDTABLE 2011 – DUBAI, THE UNITED ARAB EMIRATES…
Firmly established as the Middle East’s premier event for thought-leaders & practitioners in
information security, cyber security & IT risk assurance, MIS Training Institute is delighted to
announce that the 3rd Annual CISO Middle East Summit & Roundtable 2011 will take place in Dubai, UAE, 31st
January - 2nd February 2011. This unique event will bring together business & government to share
direct experience, best practice in threat response & regional professionalism in information
security. The simple objective being: to stay one step ahead of rapidly changing business
environments on key issues impacting heads of ICT and information security specifically within the
Middle East. Predict change and better plan your strategy on challenges such as: Regional
solutions tied into regional & global information security risk management needs & best practice!

      Securing mobility solutions
      Planning, prevention & response to data breaches
      Identity & access management and associated social networking threats
      Lawful interception & digital espionage
    Capex utilisation - maximising information security cost efficiency & measuring return on security investment
      Emerging national cyber threats
    Cloud security roundtable discussion
    Risk based approach to data security – how has risk changed in the global financial crisis fall-out? Managing
       reputational risk
      Achieving integrated information security governance

EVENT BACKGROUND…
Last year MIS were honoured to host the 2nd CISO Middle East Summit under the official
patronage of ITA Oman / e.oman. Opened by Dr. Salim Sultan Al Ruzaiqi, Chief Executive Officer
of ITA, the event was a key part of the national initiative to launch ‘e.oman’ as the pioneering
nation in e-services and security within the Middle East, and internationally. In addition to the
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor:                 Gold Sponsor:                  CISO Roundtable Sponsor:
THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
                                   INFORMATION SECURITY & ICT IN THE MIDDLE EAST…


numerous Information Security and ICT Directors attending the summit from business sectors
across the Middle East, the event was also attended by numerous security directors and VIPS
from across Business Sectors, Ministries of Defence, Police Forces, the Royal Navy, Central
Banks and Directors from CERTS in Oman and across the Middle East. This year, the Opening
Keynote Speech will be made by: Eng. Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency
Response Team (aeCERT). Practitioner and thought leadership sessions will provide pragmatic and
cost-effective advice to address the inherent vulnerabilities within processes, people &
technologies. The interactive CISO Middle East Roundtable held under the Chatham House Rule on
Wednesday 2nd February provides executives with the ideal opportunity to benchmark security
strategy against peers and thought leaders globally.

CONFIRMED SPEAKERS FOR 2011 INCLUDE…
Keynote by:
•       Eng. Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency Response Team of The
        Telecommunications Regulatory Authority (TRA) - The United Arab Emirates



International Speaker Panel includes:
•       Mr. Dino C. Dell'Accio, Chief Auditor for Information and Communications Management, United Nations Secretariat, New
        York Headquarters – U.S.
•       Mr. Scott Totzke, VP, BlackBerry Security Group
•       Ray Stanton, Global Head of Business Continuity, Security & Governance Practice, British Telecom
•       Mr. Chetan Gor, Regional Head of Information Security - Middle East, HSBC Bank Middle East Limited– UAE
•       Mr. Marcus Alldrick, Chief Information Security Officer & Senior Manager, Information Risk and Protection, Lloyd's
•       Mr. Richard Lingard, Head of IT Risk EMEA, Credit Suisse - UK
•       Mr. Kim Aarenstrup, Chief Information Security Officer, A.P. Moller - Maersk A/S & Chairman, Information Security
        Forum (ISF) - Denmark
•       Mr. David Cripps, Chief Information Security Officer, Investec
•       Mr. Charles V. Pask, Managing Director, ITSEC Associates Ltd
•       Vinoth Sivasubramanian, Project Manager-IT Department, UAE Exchange Centre L.L.C.
•       Mr. Eddie Schwartz, Chief Security Officer, NetWitness Corporation - U.S.
•       Dr Sally Leivesley , Managing Director, Newrisk Limited – UK
•       Dr. Eduardo Gelbstein, Adjunct Professor, Webster University, Geneva, Former Advisor, UN Board of Auditors and Former
        Director, UN International Computing Centre – Switzerland


EVENT OBJECTIVES…
       Develop further talent to grow Emirati professional capability and regional professionalism in
        information security, ICT and cyber assurance through exposure to international information
        security best practices
       Stay one step ahead of rapidly changing business environments –
    o    capital expenditure utilisation & ensuring maximum efficiency on your security investments!

Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor:                      Gold Sponsor:                     CISO Roundtable Sponsor:
THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
                                     INFORMATION SECURITY & ICT IN THE MIDDLE EAST…


    o securing mobility solutions
    o preventing data breaches
    o    identity and access management
    o    social networking
    o    lawful interception, lawful interception & digital espionage
    o    emerging national cyber threats…

       Introduce information security directors & experts from around the world for benchmarking purposes & for
        participants to EXPAND valuable, trust based contacts within the information security
        community – regionally & internationally
       CAPITAL EXPENDITURE UTILISATION & information security - Ensure that you are achieving maximum efficiency
        out of your information security solutions & services. Ensure that infosec remains integral to the core business as a service
        based model: linking with internal & external customers & building teams that return money to
        business lines
       Provide ultimate assurance on managing the latest threats day to day & prepare for the future – are you
        missing any tricks on how to manage the latest cyber security threats & data leakage -
        especially through periods of extensive change & development?
       Learn lessons from proven new case studies, hear inspiring keynotes, participate in panel debates &
        roundtables that will probe the information security role
       Provide cutting edge discussion for CISOs with like-minded peers at the CISO Roundtable Middle East 2011 –
        held under The Chatham House Rule

TESTIMONIALS FROM CISO EXECUTIVE SUMMIT MIDDLE EAST 2009
o        “Streamlined and strengthened my existing thoughts & skills”
o       “Great to have get answers to questions & learn from security experts”
o       “Excellent networking with other CISOs from around the world”
o       “Found out best practice in information security & share experience with people”
o       “The best opportunity to interact with security professionals from across the globe & to share experiences/news on emerging security
        trends”
o       “Smooth running, the lectures were challenging & reflected our real like problems”
o       “Very useful on risk decision taking & creating value & trust between IT security & the business”
o        “An eye opening summit with engaging and informative speakers: you just can't have enough of it. Recommended highly”
o       “A very good platform to meet people from multi-disciplinary industry experience, all working from their experience and background
        great experience and insight into information securities keep it up if everybody knows his rights and responsibility we won't have to
        think about IT security” (Central Bank of Oman)
o       “Provides an exceptional opportunity for networking with security professionals from different regions and to learn more about
        emerging security threats and counter measures” (BAE systems)
o       “An extremely well constructed conference that brought together experts in their field who addressed challenging issues at a grass roots
        level”
TWO EVENTS AT ONE TIME IN ONE PLACE! MIS is hosting at the same time, in the same venue
the Middle East Fraud & Corruption Summit.


DRAFT AGENDA




Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor:                         Gold Sponsor:                        CISO Roundtable Sponsor:
THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
                                INFORMATION SECURITY & ICT IN THE MIDDLE EAST…


CISO Middle East Summit
Day One: Monday 31st January 2011
07:30      REGISTRATION & COFFEE
08:00      MASTER OF CEREMONIES INTRODUCTIONS
08:15      CHAIRMAN’S OPENING


08:25      OPENING SPEECH BY CHIEF GUEST: DEFINING A NEW ERA & DECREASING CYBER SECURITY RISK IN
           THE FACE OF AN 'UNCERTAIN' WORLD – KEYNOTE


1.      IMPLEMENTING SECURITY AWARENESS, EDUCATION TRAINING & CERTIFICATION ON A NATIONAL
     LEVEL – OPENING KEYNOTE SPEECH
     Eng. Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency Response Team (aeCERT)


2.   GOVERNANCE OF SECURITY & SECURITY OF GOVERNANCE – KEYNOTE
     Information security governance requires clearly defined goals, roles, responsibilities, resources, policies &
     procedures. Challenging questions arise when we focus our attention beyond the overwhelming amount of data
     generated by ever-advancing technologies. The following questions will be addressed drawing from the extensive
     experience gained in conducting information security audits of the United Nations offices & peacekeeping missions
     across the world. Dino is responsible for the development & implementation of the global information &
     communications audit strategy of the United Nations Secretariat, including the definition of common auditing
     standards, risk assessment methodologies, best practices & guidelines.
          Is there adequate consideration of the need to protect the information, processes & relationships that support &
           enable the governance of security?
          What happens to governance when disasters occur? Is it enough to have policies, disaster recovery & business
           continuity plans?
          Is there adequate awareness of what are the relationships between the major components of information
           security governance?
     Mr. Dino C. Dell'Accio, Chief Auditor for Information and Communications Management at the United Nations Secretariat,
     New York Headquarters, USA


 3. SECURING YOUR ENTERPRISE MOBILITY – KEYNOTE
         Mr. Scott Totzke, VP, BlackBerry Security Group


4.   NATIONAL STRATEGIES TO IMPROVE CYBER SECURITY: AWARENESS, COUNTER-MEASURES &
     EVOLUTION – KEYNOTE PANEL
          International efforts to combat the cyber threat
          How to improve contingency planning and resilience against cyber attacks
          Do nation-state sponsored advanced threats occur frequently?
          Cybercrime (protecting the organization & users from organized cybercrime)
          What will be the main facts for the security evolution in the following 5 years or so
          Securing critical infrastructure from attacks (hacks, DDoS / Botnets & extortion, data breaches, fraud & identity
           crime)
          Fostering regional & international cooperation on information sharing
          Addressing unforeseen problems during implementation of e-government projects
     Keynote Panellists:



Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor:                  Gold Sponsor:                   CISO Roundtable Sponsor:
THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
                                    INFORMATION SECURITY & ICT IN THE MIDDLE EAST…


         Eng. Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency Response Team of The
         Telecommunications Regulatory Authority (TRA) - The United Arab Emirates


MORNING COFFEE BREAK


5.       THE INFORMATION SECURITY THREAT HORIZON – KEYNOTE
         Mr. Kim Aarenstrup, Chief Information Security Officer, A.P. Moller - Maersk A/S & Chairman, Information Security
         Forum (ISF)


6.       CAPEX UTILISATION FOR INFORMATION SECURITY: MAXIMISING INFORMATION SECURITY COST
         EFFICIENCY & ENSURING THAT SECURITY IS INTEGRAL TO THE CORE BUSINESS AS A SERVICE BASED
         MODEL – PANEL
             How do you link with internal & external customers & building teams that return money to business lines?
             Moving ICT and information security into the service model sphere to add value to the business
             Maximising the cost-efficiency ratio of the information security strategy
             Capital expenditure utilisation - maximising information security cost efficiency
             Measuring Security return on investment (key indicators, & ways to obtain them)
             Implementing security policies that are effective in changing behavior


7.       ADDRESSING INFORMATION SECURITY RISK & REPUTATION – KEY CASE STUDY
         Marcus Alldrick, Chief Information Security Officer & Senior Manager, Information Risk and Protection, Lloyd's


 8       LAWFUL INTERCEPTION, DIGITAL ESPIONAGE & EAVESDROPPING – KEYNOTE


LUNCH


 9. IDENTITY MANAGEMENT & ACCESS MANAGEMENT: NEW CHALLENGES, TRENDS & TECHNOLOGIES –
 KEYNOTE
            Integrating social networking passwords
            Securing & simplifying the user experience


AFTERNOON TEA BREAK

10. MOBILE & WIRELESS SECURITY: PROTECTING YOUR TOP EXECUTIVES ON THE MOVE – PANEL
             Why do we need mobile security?
             Top recommendations
             Privacy versus security – specific regional challenges
             Mobile security awareness – proven lessons learned
             New threats & risks
              ILD versus PLD & security considerations
         Chaired by: Mr. Scott Totzke, VP, BlackBerry Security Group
         Panellists:


11. THE RISE OF THE CISO – HOW WILL THE JOB EVOLVE? HOW CAN THE CISO MAXIMISE THE
     EFFECTIVENESS OF INFORMATION SECURITY MEASURES?
             Change management, segregation of duties, encryption


Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor:                       Gold Sponsor:                     CISO Roundtable Sponsor:
THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
                                INFORMATION SECURITY & ICT IN THE MIDDLE EAST…


        Policy development and implementation – a non-technical activity. Standards and best practices from ISO, NIST,
         ISF and others were followed by legislation on “computer misuse” and “computer crime”, increasingly calling
         for compliance
        Information security is not only “everybody’s job” it is large and complex and requires many parties to be
         accountable for specific aspects of it.
     Dr. Eduardo Gelbstein, Adjunct Professor, Webster University, Geneva, Former Advisor, UN Board of Auditors and Former
     Director, UN International Computing Centre


12. SOCIAL ENGINEERING – A LIVE DEMONSTRATION!


15:45    CLOSE OF DAY ONE


DINNER KINDLY SPONSORED BY:




Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor:                Gold Sponsor:                   CISO Roundtable Sponsor:
THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
                                 INFORMATION SECURITY & ICT IN THE MIDDLE EAST…


CISO Middle East Summit
Day Two: Tuesday 1st February 2011
08:00      REGISTRATION & COFFEE
08:30      CHAIRMAN’S OPENING


1. HOW TO DESTROY A COMPUTER FORENSICS INVESTIGATION – KEYNOTE
   Michael Colao, Recently Global CISO & Director Information Management, Dresdner Kleinwort


2. ANTI-PHISHING, COUNTERFEIT WEBSITES & EMERGING E-BUSINESS SECURITY THREATS

3. INVESTING HEAVILY IN SECURING ICT INFRASTRUCTURE TO PREVENT HACKING - KEYNOTE

4. CLOUD SECURITY & VIRTUALIZATION: KEY RISKS & APPROACHES FOR SUCCESS
   • What level of security of unstructured data will information leakage prevention really offer? • How to manage the
   leakage of business data via the use of externally host web applications? • Managing business issues in the cloud:
   how does one do records management in the cloud? •What control structures should be used when working with 3rd
   party cloud service providers• What are the minimum security services required to ensure adequate cloud &
   virtualization security?


MORNING COFFEE

5. SECURITY BREACHES & THE ADVANCED THREAT ENVIRONMENT – CISO PANEL
   •       During the last year, have the reports of advanced threats raised your concern about how secure your network is?
   •       What do you personally feel is the greatest source of human threat to your data?
   •       Which technology do you believe best protects data from leaking out of your network?
   •       Where does the majority of your sensitive data reside?
   •       Over the past year, has your organization been the target of an advanced threat?
   •       How does your organization detect or discover threats?
   •       What happened to your organization as a result of an threat?
   •       What advanced threat attack methods or technologies were unleashed against your organization?
   Chaired by: Eddie Schwartz, Chief Security Officer, NetWitness Corporation- U.S.
   Panel of CISOs talk frankly about their experiences of recent security breaches, how they responded, detection

6. HOW TO LINK INFORMATION SECURITY INTO ENTERPRISE RISK MANAGEMENT & BUSINESS VALUE


7. RISK MANAGEMENT: DO WE NEED RISK MANAGEMENT & ROBUST FRAMEWORKS? ARE THERE
       LIGHTER, CHEAPER, MORE PALATABLE ALTERNATIVES? - PANEL
           What risk do immature platforms for virtualization bring to our business?
           In the current recession, does an appetite to manage risks within tight, formal frameworks exist
            anymore?
           Regulatory uncertainty – is there a better framework? Assessing different risk cultures & fall out –
            higher risk postures
       Chaired by: Mr. Dino C. Dell'Accio, Chief Auditor for Information and Communications Management at the United Nations
       Secretariat, New York Headquarters, U.S
       Panellists:

Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor:                   Gold Sponsor:                  CISO Roundtable Sponsor:
THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
                                INFORMATION SECURITY & ICT IN THE MIDDLE EAST…


     Marcus Alldrick, Chief Information Security Officer & Senior Manager, Information Risk and Protection, Lloyd's
     Richard Lingard, Head of IT Risk EMEA, Credit Suisse


LUNCH

9. BUSINESS CONTINUITY, DISASTER RECOVERY PLANS


10. THE LEGAL RISKS: EVERYTHING A CISO SHOULD KNOW


11. TRANSNATIONAL CRIMES - WAY FORWARD IN ADDRESSING THEM

AFTERNOON TEA BREAK

12. LEADERSHIP FROM THE FRONT – CASE STUDY
        Modern day challenges for the CISO.
        Technological, operational & people challenges
        Innovative strategies & approaches to overcome operational, technological & people challenges
        Security posture index
        Achieving a proactive & resilient security posture
        Continual improvement
     Vinoth Sivasubramanian, Project Manager-IT Department, UAE Exchange Centre L.L.C.


13. DATA LEAKAGE: PUTTING A VALUE ON A SECURITY BREACH

14. THE ART OF ETHICAL HACKING


15. SOCIAL NETWORKING & IM: OPPORTUNITY PRESENTED BY NEW TECHNOLOGY & INTERFACES VERSUS
    EMPLOYEE SECURITY


15:00     CLOSE OF DAY TWO


DINNER KINDLY SPONSORED                                          BY:




ICT CATASTROPHIC RISK MANAGEMENT: CRITICAL INFRASTRUCTURE AND CASE STUDIES LONDON 2012
AND MARITIME TERRORISM
Chief Executives and ICT Security Directors face catastrophic losses to ICT from serious organised crime,
terrorism, espionage and cyber attacks. Two very different case studies of catastrophic risk are discussed:
the forthcoming London 2012 event and the 28 July 2010 maritime incident on the M/V Starr carrying
250,000 tons of crude oil.
ICT Security Challenges
•   Discussion by participants on catastrophic risks in the Region
•   Catastrophic risk management as a generic task
•   Reporting to the Board on ICT catastrophic risk management
•   Integration of physical and ICT security risks
•   Terrorism and ICT risks
•   Terrorists use of ICT in real-time

Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor:                   Gold Sponsor:                     CISO Roundtable Sponsor:
THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
                                INFORMATION SECURITY & ICT IN THE MIDDLE EAST…

•   Creation of a forensic strategy
•   Network analysis, cloud management and new risks
•   Stress testing as a forensic method
•   Soft assurance issues and litigation preparedness
•   On site and off site vulnerabilities
•   Reputation Risk testing – the speed of media reporting
Dr Sally Leivesley, Managing Director, Newrisk Limited (morning)

TOP ICT RISK STRATEGIES FOR CONTINUITY - WORKSHOP SCENARIO CHALLENGES
The workshop teams will prepare a report on the top ICT risk strategies that they can design to defeat top
risks to a government, a global company or a small/ medium business.
Two Challenges for a global company, a government department or a local business
1. Prepare a simple paragraph or a simple table of the Top ICT Risks.
When preparing this report, consider the consequences that any physical security risks in the list of top ICT
risks.
2. Prepare a verbal statement no more than two minutes in length for the news media. (A team member will
‘volunteer’ to present this to the Workshop from the Podium.)
The statement is to cover the ICT risk management strategies for continuity of operations in your
organisation. This statement will show how your organisation has resilience and will be able to continue
despite the top risks that may threaten its operations and cause a catastrophic failure.
Dr Sally Leivesley , Managing Director, Newrisk Limited (afternoon)
Dr Leivesley advises governments and companies on catastrophic risk, continuity and security. She has interests in
development of systems for security beyond encryption, SCADA protection and real time distributed systems for C4I risk
management. She is a specialist in top threats from terrorism including chemical, nuclear, radiological, explosives and
cyber and she assists the international media including the BBC, BSkyB, Al Jazeera English, and USA and European
media with advice when extreme events impact on national security and corporate reputation. These incidents have
included maritime (sinking of the South Korean warship 2010); international aviation liquid explosives 2006; Christmas
Day 2009 Yemen origin concealed underpants device plot and subsequent incident at Heathrow on armed forces
removal of bomb threat passengers on Middle East bound flight; hostage taking; national security data loss events;
cyber terrorism and protection. Before the 2000 Sydney Olympics she provided extensive training to emergency
services and critical infrastructure corporations on top risks and the securing of vulnerabilities prior to the 2000 Olympics
and other national events. Dr Leivesley is a member of the Register of Security Engineers and Assessors with the
Institution of Civil Engineering, British Computer Society Information Security Group (up to 2008) and the Royal United
Services Institute for Defence Studies. She is a Fellow of the Institute of Civil Protection and Emergency Management
and the Royal Society for Arts Manufacturing and Science. She trained in chemical, biological, radiological and nuclear
threats as a Scientific Advisor with the British Home Office and was awarded a PhD from the University of London based
on research on extreme events across the world. She co-chairs an international science group that works on mitigation
of terrorism with specific focus on nuclear terrorism, biological, chemical and other extreme threats.




Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor:                Gold Sponsor:                    CISO Roundtable Sponsor:
THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
                                INFORMATION SECURITY & ICT IN THE MIDDLE EAST…




Wednesday 2nd February 2011                                                                            CISO Roundtable Sponsor:


CISO Middle East Roundtable
Information Security Governance for Strategic Business Value

Agenda timings - 09:00 Start; 11:00 Coffee Break; 13:00 Lunch; 14:45 Close of Day


Chaired by: Mr. Charles V. Pask, Managing Director, ITSEC Associates Ltd
Facilitators:
•   Mr. Eddie Schwartz, Chief Security Officer, NetWitness Corporation - U.S.
•   Mr. Marcus Alldrick, Chief Information Security Officer & Senior Manager, Information Risk and Protection, Lloyd's - UK
•   Mr. Dino C. Dell'Accio, Chief Auditor for Information and Communications Management at the United Nations Secretariat,
    New York Headquarters, U.S
•   Mr. Richard Lingard, Head of IT Risk EMEA, Credit Suisse - UK
•   Speaker – The UAE

The CISO Roundtable, held under The Chatham House Rule, is the unrivalled benchmarking forum
for senior management to open up discussions on the most critical challenges in information
security. The core theme of this years’ roundtable is how to improve competitive advantage and
profitability directly through information security and improving ICT assurance. The CISO Middle
East Roundtable 2011 is well-established as the best place for heads of information security to
discuss key security challenges & strategy with peers to develop team expertise & professional
skills, as well as to advance debate & approaches for the information security community at
large. The focus is on roundtable discussions & group work, with sessions facilitated by
established information security practitioners & industry experts. You will meet global security
industry leaders & network with professionals who face a similar set of challenges as you in a
‘hands on’, proactive & inspirational environment.

•   Held Under The Chatham House Rule - No press are permitted. The entire session will be conducted
    as a ‘closed doors’ session, allowing participants to discuss real life information security
    incidents & benchmark proven & possible approaches
•   Notes from the session – each session has a dedicated ‘note taker’ who will write up discussion
    outlines & conclusions for distribution to all roundtable attendees following the event
•   Key topic areas of focus - will be determined by the input of participants beforehand & a briefing
    document will be distributed in advance to allow participants to fully contribute in the honest
    sharing of ideas. Draft items are listed below.

       Securing mobility solutions
       Planning, prevention & response to data breaches – reputation, reputation, reputation!
       Identity & access management and associated social networking threats
       Lawful interception & digital espionage


Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor:                  Gold Sponsor:                     CISO Roundtable Sponsor:
THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
                                INFORMATION SECURITY & ICT IN THE MIDDLE EAST…

      Capex utilisation - maximising information security cost efficiency & measuring return on security investment
      Emerging national cyber threats
      Risk based approach to data security – how has risk changed in the global financial crisis fall-out?
      Achieving integrated information security governance


ITEM 1 Current & Emerging Threats
          Led by: Mr. Eddie Schwartz
ITEM 2           Achieving integrated information security governance
         Led by: Mr. Dino C. Dell'Accio
ITEM 2 Honing A Risk Based Approach To ICT Security Risk & Reputation
             Led by: Mr. Marcus Alldrick & Mr. Richard Lingard
ITEM 3           Proven Deliverables to Improve Competitive Advantage & Profitability
ITEM 4           To be decided based on audience feedback
ITEM 5 To be decided based on audience feedback
ITEM 6           WRAP UP DEBATE, FINAL QUESTIONS & ACTION POINTS




Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor:                  Gold Sponsor:                   CISO Roundtable Sponsor:
THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
                                INFORMATION SECURITY & ICT IN THE MIDDLE EAST…


REGISTRATION INFORMATION:                                        Fee


3rd Annual CISO Middle East Summit & Roundtable         £1,995

Included in the Fee:
•   Entry to 3-day event
•   Continued Education Points & certificate
•   Official presentation materials on USB
•   Post-event web-link of materials
•   All lunches & daily refreshments
•   Networking functions (receptions, dinners, local activities – details subject to confirmation)

2 EVENTS – 1 PLACE, 1 DATE!

At the same time, in the same venue as CISO Middle East Summit & Roundtable 2011, MIS is hosting The Middle East
Fraud & Corruption Summit. Both events will be held at the Habtoor Grand Resort Hotel & Spa - Jumeirah Beach
Dubai, UAE, 31st January – 2nd February 2011. Middle East Fraud & Corruption Summit 2011 - Sharing successes &
lessons learned in the Middle East & globally from recent projects & cases involving fraud & corruption, this
global event for directors of audit, risk, & fraud prevention arrives in the Middle East for the first time!
Programme supports Middle East government & business commitments to achieve transparency goals &
reduce exposure to financial risk by addressing prevention, detection, investigation, deterrence & recovery
from fraud & corruption www.mistieurope.com/fraudME.


DISCOUNTS & SPECIAL OFFERS!
•   Book 1 person to access 2 summits with the ‘Dual Event Pass’ & only pay 30% extra £2,593 (saving
    £1,396!)

•   Book 1 person on each summit & save 30% on fees (overall £1,197 savings!) Ideal team working for Heads of
    Information Security / IT Risk & Heads of Internal Audit & Fraud Prevention!
•   For more information & terms & conditions of these offers please call +44 (0)207 779 8944, email
    mis@mistieurope.com)


ABOUT THE VENUE:

The 3rd Annual CISO Middle East Summit & Roundtable 2011 will be held at:

Habtoor Grand Resort & Spa
Al Sufouh Road
Dubai Marina, Jumeirah Beach
P. O. Box 24454, Dubai, U.A.E
Tel: +971 4 408 4444 Fax: +971 4 399 4207
http://grandjumeirah.habtoorhotels.com

Facilities & Location:
Situated on Jumeirah Beach & overlooking Dubai Marina, this 5 star luxury spa resort hotel is set amid lush
gardens with views of the sea & occupies one of Dubai's most enchanting beachside locations. The airport
is approximately 30 kilometres from the Habtoor Grand Hotel; drive time is 25 to 30 minutes. It is in close
proximity to Dubai Internet City, Dubai Media City & Shopping Malls. The Habtoor Grand Resort & Spa offers
pools, restaurants & bars set amidst the hotel's tropical gardens where lush landscapes meet the warm
Arabian Gulf, fringed by an immaculate beach & embraced by clear blue skies. Two pools are set within the
resort's landscaped gardens, a third 'infinity pool' is located on the mezzanine level of the Towers & a large
private beach offers unrestricted views of the clear Arabian Gulf. Guests can play tennis or squash or visit
the hotel's Elixir Spa. The 446 guestrooms, reflecting Arabian touches in the furnishings & style, have views
of the sea or the landscaped gardens.

Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor:                Gold Sponsor:                   CISO Roundtable Sponsor:
THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
                                INFORMATION SECURITY & ICT IN THE MIDDLE EAST…

Accommodation & Reservations:
MIS Training Institute has arranged the following discounted rates at the Habtoor Grand Resort & Spa:
•  Standard Single Room: AED 900.00 per room
•  Standard Double Room: AED 1000.00 per room
•  All rates are valid per room per night & include 10% municipality fee, 10% service charge & breakfast.
•   To make a reservation please complete the booking form available on www.mistieurope.com/CISOme &
    send to Mr. Maheshan Premanathan on maheshan.premanathan@habtoorhotels.com, Tel: 00971 4
    4084165 Fax: 00971 4 3994210.

Please note that delegates are responsible for the arrangement & payment of their own accommodation in
Dubai. MIS Training is not liable or responsible for any hotel bookings. We cannot guarantee availability as
limited rooms are available. We would advise booking as soon as possible.

CANCELLATION POLICY:
Should a delegate be unable to attend, a substitute may attend in his or her place. A credit or refund, minus
10% administration charge, is available if written notification is received by 11th January 2011. Thereafter, no
refunds will be given. MIS reserves the right to change or cancel this programme due to unforeseen
circumstances.




Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor:               Gold Sponsor:              CISO Roundtable Sponsor:

Weitere ähnliche Inhalte

Was ist angesagt?

20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final ResultsCIONET
 
News letter June 11
News letter June 11News letter June 11
News letter June 11captsbtyagi
 
Think Cyber Think Resilience | William Barker | March 2016
Think Cyber Think Resilience | William Barker  | March 2016Think Cyber Think Resilience | William Barker  | March 2016
Think Cyber Think Resilience | William Barker | March 2016Anna Fenston
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 
20101116 deckers
20101116 deckers20101116 deckers
20101116 deckersCIONET
 
Bci italy conf 17 10 josh zaroor - black berry athoc presentation sd
Bci italy conf 17   10 josh zaroor - black berry athoc presentation sdBci italy conf 17   10 josh zaroor - black berry athoc presentation sd
Bci italy conf 17 10 josh zaroor - black berry athoc presentation sdTheBCI
 
SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016Dale Butler
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb GhallabFahmi Albaheth
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsITpreneurs
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
Collateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisationsCollateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisationsPECB
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber StrategyIan Kelly
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceDale Butler
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 

Was ist angesagt? (19)

Centre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS OverviewCentre for Strategic Cyberspace + Security Science / CSCSS Overview
Centre for Strategic Cyberspace + Security Science / CSCSS Overview
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
 
Think Cyber Think Resilience | William Barker | March 2016
Think Cyber Think Resilience | William Barker  | March 2016Think Cyber Think Resilience | William Barker  | March 2016
Think Cyber Think Resilience | William Barker | March 2016
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
20101116 deckers
20101116 deckers20101116 deckers
20101116 deckers
 
Bci italy conf 17 10 josh zaroor - black berry athoc presentation sd
Bci italy conf 17   10 josh zaroor - black berry athoc presentation sdBci italy conf 17   10 josh zaroor - black berry athoc presentation sd
Bci italy conf 17 10 josh zaroor - black berry athoc presentation sd
 
SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and Certifications
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Collateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisationsCollateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisations
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conference
 
ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 

Ähnlich wie 3rd Annual CISO Round Table

Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Rhys A. Mossom
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfChinatu Uzuegbu
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Gunnebo Global Customer Magazine
Gunnebo Global Customer MagazineGunnebo Global Customer Magazine
Gunnebo Global Customer MagazineGunnebo UK
 
E-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityE-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityLucy Nicholas
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookInfluential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookCIO Look Magazine
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016Dale Butler
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEY
 

Ähnlich wie 3rd Annual CISO Round Table (20)

Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
MECSCE 2015 - Brochure
MECSCE 2015 - BrochureMECSCE 2015 - Brochure
MECSCE 2015 - Brochure
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Gunnebo Global Customer Magazine
Gunnebo Global Customer MagazineGunnebo Global Customer Magazine
Gunnebo Global Customer Magazine
 
E-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityE-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_Security
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookInfluential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO Look
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architecture
 

Mehr von Vinoth Sivasubramanan

The notorious nine_cloud_computing_top_threats_in_2013
The notorious nine_cloud_computing_top_threats_in_2013The notorious nine_cloud_computing_top_threats_in_2013
The notorious nine_cloud_computing_top_threats_in_2013Vinoth Sivasubramanan
 
Linux Firewall - NullCon Chennai Presentation
Linux Firewall - NullCon Chennai PresentationLinux Firewall - NullCon Chennai Presentation
Linux Firewall - NullCon Chennai PresentationVinoth Sivasubramanan
 
Business Continuity Management - Best Practice Across Industries
Business Continuity Management - Best Practice Across IndustriesBusiness Continuity Management - Best Practice Across Industries
Business Continuity Management - Best Practice Across IndustriesVinoth Sivasubramanan
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 EnvironmentVinoth Sivasubramanan
 
4th Annual Corporate Governance Congress
4th Annual Corporate Governance Congress4th Annual Corporate Governance Congress
4th Annual Corporate Governance CongressVinoth Sivasubramanan
 

Mehr von Vinoth Sivasubramanan (9)

The notorious nine_cloud_computing_top_threats_in_2013
The notorious nine_cloud_computing_top_threats_in_2013The notorious nine_cloud_computing_top_threats_in_2013
The notorious nine_cloud_computing_top_threats_in_2013
 
Linux Firewall - NullCon Chennai Presentation
Linux Firewall - NullCon Chennai PresentationLinux Firewall - NullCon Chennai Presentation
Linux Firewall - NullCon Chennai Presentation
 
Business Continuity Management - Best Practice Across Industries
Business Continuity Management - Best Practice Across IndustriesBusiness Continuity Management - Best Practice Across Industries
Business Continuity Management - Best Practice Across Industries
 
Storage Security Governance
Storage Security GovernanceStorage Security Governance
Storage Security Governance
 
Security kaizen cloud security
Security kaizen   cloud securitySecurity kaizen   cloud security
Security kaizen cloud security
 
Security kaizen consumerization
Security kaizen   consumerizationSecurity kaizen   consumerization
Security kaizen consumerization
 
DDOS Audit
DDOS AuditDDOS Audit
DDOS Audit
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 Environment
 
4th Annual Corporate Governance Congress
4th Annual Corporate Governance Congress4th Annual Corporate Governance Congress
4th Annual Corporate Governance Congress
 

3rd Annual CISO Round Table

  • 1. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST… 3rd Annual Chief Information Security Officer Middle East Summit & Roundtable 2011 31st January ~ 2nd February 2011 Habtoor Grand Resort Hotel & Spa - Jumeirah Beach Dubai, United Arab Emirates CISO MIDDLE EAST SUMMIT & ROUNDTABLE 2011 – DUBAI, THE UNITED ARAB EMIRATES… Firmly established as the Middle East’s premier event for thought-leaders & practitioners in information security, cyber security & IT risk assurance, MIS Training Institute is delighted to announce that the 3rd Annual CISO Middle East Summit & Roundtable 2011 will take place in Dubai, UAE, 31st January - 2nd February 2011. This unique event will bring together business & government to share direct experience, best practice in threat response & regional professionalism in information security. The simple objective being: to stay one step ahead of rapidly changing business environments on key issues impacting heads of ICT and information security specifically within the Middle East. Predict change and better plan your strategy on challenges such as: Regional solutions tied into regional & global information security risk management needs & best practice!  Securing mobility solutions  Planning, prevention & response to data breaches  Identity & access management and associated social networking threats  Lawful interception & digital espionage  Capex utilisation - maximising information security cost efficiency & measuring return on security investment  Emerging national cyber threats  Cloud security roundtable discussion  Risk based approach to data security – how has risk changed in the global financial crisis fall-out? Managing reputational risk  Achieving integrated information security governance EVENT BACKGROUND… Last year MIS were honoured to host the 2nd CISO Middle East Summit under the official patronage of ITA Oman / e.oman. Opened by Dr. Salim Sultan Al Ruzaiqi, Chief Executive Officer of ITA, the event was a key part of the national initiative to launch ‘e.oman’ as the pioneering nation in e-services and security within the Middle East, and internationally. In addition to the Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates … Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
  • 2. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST… numerous Information Security and ICT Directors attending the summit from business sectors across the Middle East, the event was also attended by numerous security directors and VIPS from across Business Sectors, Ministries of Defence, Police Forces, the Royal Navy, Central Banks and Directors from CERTS in Oman and across the Middle East. This year, the Opening Keynote Speech will be made by: Eng. Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency Response Team (aeCERT). Practitioner and thought leadership sessions will provide pragmatic and cost-effective advice to address the inherent vulnerabilities within processes, people & technologies. The interactive CISO Middle East Roundtable held under the Chatham House Rule on Wednesday 2nd February provides executives with the ideal opportunity to benchmark security strategy against peers and thought leaders globally. CONFIRMED SPEAKERS FOR 2011 INCLUDE… Keynote by: • Eng. Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency Response Team of The Telecommunications Regulatory Authority (TRA) - The United Arab Emirates International Speaker Panel includes: • Mr. Dino C. Dell'Accio, Chief Auditor for Information and Communications Management, United Nations Secretariat, New York Headquarters – U.S. • Mr. Scott Totzke, VP, BlackBerry Security Group • Ray Stanton, Global Head of Business Continuity, Security & Governance Practice, British Telecom • Mr. Chetan Gor, Regional Head of Information Security - Middle East, HSBC Bank Middle East Limited– UAE • Mr. Marcus Alldrick, Chief Information Security Officer & Senior Manager, Information Risk and Protection, Lloyd's • Mr. Richard Lingard, Head of IT Risk EMEA, Credit Suisse - UK • Mr. Kim Aarenstrup, Chief Information Security Officer, A.P. Moller - Maersk A/S & Chairman, Information Security Forum (ISF) - Denmark • Mr. David Cripps, Chief Information Security Officer, Investec • Mr. Charles V. Pask, Managing Director, ITSEC Associates Ltd • Vinoth Sivasubramanian, Project Manager-IT Department, UAE Exchange Centre L.L.C. • Mr. Eddie Schwartz, Chief Security Officer, NetWitness Corporation - U.S. • Dr Sally Leivesley , Managing Director, Newrisk Limited – UK • Dr. Eduardo Gelbstein, Adjunct Professor, Webster University, Geneva, Former Advisor, UN Board of Auditors and Former Director, UN International Computing Centre – Switzerland EVENT OBJECTIVES…  Develop further talent to grow Emirati professional capability and regional professionalism in information security, ICT and cyber assurance through exposure to international information security best practices  Stay one step ahead of rapidly changing business environments – o capital expenditure utilisation & ensuring maximum efficiency on your security investments! Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates … Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
  • 3. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST… o securing mobility solutions o preventing data breaches o identity and access management o social networking o lawful interception, lawful interception & digital espionage o emerging national cyber threats…  Introduce information security directors & experts from around the world for benchmarking purposes & for participants to EXPAND valuable, trust based contacts within the information security community – regionally & internationally  CAPITAL EXPENDITURE UTILISATION & information security - Ensure that you are achieving maximum efficiency out of your information security solutions & services. Ensure that infosec remains integral to the core business as a service based model: linking with internal & external customers & building teams that return money to business lines  Provide ultimate assurance on managing the latest threats day to day & prepare for the future – are you missing any tricks on how to manage the latest cyber security threats & data leakage - especially through periods of extensive change & development?  Learn lessons from proven new case studies, hear inspiring keynotes, participate in panel debates & roundtables that will probe the information security role  Provide cutting edge discussion for CISOs with like-minded peers at the CISO Roundtable Middle East 2011 – held under The Chatham House Rule TESTIMONIALS FROM CISO EXECUTIVE SUMMIT MIDDLE EAST 2009 o “Streamlined and strengthened my existing thoughts & skills” o “Great to have get answers to questions & learn from security experts” o “Excellent networking with other CISOs from around the world” o “Found out best practice in information security & share experience with people” o “The best opportunity to interact with security professionals from across the globe & to share experiences/news on emerging security trends” o “Smooth running, the lectures were challenging & reflected our real like problems” o “Very useful on risk decision taking & creating value & trust between IT security & the business” o “An eye opening summit with engaging and informative speakers: you just can't have enough of it. Recommended highly” o “A very good platform to meet people from multi-disciplinary industry experience, all working from their experience and background great experience and insight into information securities keep it up if everybody knows his rights and responsibility we won't have to think about IT security” (Central Bank of Oman) o “Provides an exceptional opportunity for networking with security professionals from different regions and to learn more about emerging security threats and counter measures” (BAE systems) o “An extremely well constructed conference that brought together experts in their field who addressed challenging issues at a grass roots level” TWO EVENTS AT ONE TIME IN ONE PLACE! MIS is hosting at the same time, in the same venue the Middle East Fraud & Corruption Summit. DRAFT AGENDA Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates … Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
  • 4. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST… CISO Middle East Summit Day One: Monday 31st January 2011 07:30 REGISTRATION & COFFEE 08:00 MASTER OF CEREMONIES INTRODUCTIONS 08:15 CHAIRMAN’S OPENING 08:25 OPENING SPEECH BY CHIEF GUEST: DEFINING A NEW ERA & DECREASING CYBER SECURITY RISK IN THE FACE OF AN 'UNCERTAIN' WORLD – KEYNOTE 1. IMPLEMENTING SECURITY AWARENESS, EDUCATION TRAINING & CERTIFICATION ON A NATIONAL LEVEL – OPENING KEYNOTE SPEECH Eng. Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency Response Team (aeCERT) 2. GOVERNANCE OF SECURITY & SECURITY OF GOVERNANCE – KEYNOTE Information security governance requires clearly defined goals, roles, responsibilities, resources, policies & procedures. Challenging questions arise when we focus our attention beyond the overwhelming amount of data generated by ever-advancing technologies. The following questions will be addressed drawing from the extensive experience gained in conducting information security audits of the United Nations offices & peacekeeping missions across the world. Dino is responsible for the development & implementation of the global information & communications audit strategy of the United Nations Secretariat, including the definition of common auditing standards, risk assessment methodologies, best practices & guidelines.  Is there adequate consideration of the need to protect the information, processes & relationships that support & enable the governance of security?  What happens to governance when disasters occur? Is it enough to have policies, disaster recovery & business continuity plans?  Is there adequate awareness of what are the relationships between the major components of information security governance? Mr. Dino C. Dell'Accio, Chief Auditor for Information and Communications Management at the United Nations Secretariat, New York Headquarters, USA 3. SECURING YOUR ENTERPRISE MOBILITY – KEYNOTE Mr. Scott Totzke, VP, BlackBerry Security Group 4. NATIONAL STRATEGIES TO IMPROVE CYBER SECURITY: AWARENESS, COUNTER-MEASURES & EVOLUTION – KEYNOTE PANEL  International efforts to combat the cyber threat  How to improve contingency planning and resilience against cyber attacks  Do nation-state sponsored advanced threats occur frequently?  Cybercrime (protecting the organization & users from organized cybercrime)  What will be the main facts for the security evolution in the following 5 years or so  Securing critical infrastructure from attacks (hacks, DDoS / Botnets & extortion, data breaches, fraud & identity crime)  Fostering regional & international cooperation on information sharing  Addressing unforeseen problems during implementation of e-government projects Keynote Panellists: Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates … Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
  • 5. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST… Eng. Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency Response Team of The Telecommunications Regulatory Authority (TRA) - The United Arab Emirates MORNING COFFEE BREAK 5. THE INFORMATION SECURITY THREAT HORIZON – KEYNOTE Mr. Kim Aarenstrup, Chief Information Security Officer, A.P. Moller - Maersk A/S & Chairman, Information Security Forum (ISF) 6. CAPEX UTILISATION FOR INFORMATION SECURITY: MAXIMISING INFORMATION SECURITY COST EFFICIENCY & ENSURING THAT SECURITY IS INTEGRAL TO THE CORE BUSINESS AS A SERVICE BASED MODEL – PANEL  How do you link with internal & external customers & building teams that return money to business lines?  Moving ICT and information security into the service model sphere to add value to the business  Maximising the cost-efficiency ratio of the information security strategy  Capital expenditure utilisation - maximising information security cost efficiency  Measuring Security return on investment (key indicators, & ways to obtain them)  Implementing security policies that are effective in changing behavior 7. ADDRESSING INFORMATION SECURITY RISK & REPUTATION – KEY CASE STUDY Marcus Alldrick, Chief Information Security Officer & Senior Manager, Information Risk and Protection, Lloyd's 8 LAWFUL INTERCEPTION, DIGITAL ESPIONAGE & EAVESDROPPING – KEYNOTE LUNCH 9. IDENTITY MANAGEMENT & ACCESS MANAGEMENT: NEW CHALLENGES, TRENDS & TECHNOLOGIES – KEYNOTE  Integrating social networking passwords  Securing & simplifying the user experience AFTERNOON TEA BREAK 10. MOBILE & WIRELESS SECURITY: PROTECTING YOUR TOP EXECUTIVES ON THE MOVE – PANEL  Why do we need mobile security?  Top recommendations  Privacy versus security – specific regional challenges  Mobile security awareness – proven lessons learned  New threats & risks  ILD versus PLD & security considerations Chaired by: Mr. Scott Totzke, VP, BlackBerry Security Group Panellists: 11. THE RISE OF THE CISO – HOW WILL THE JOB EVOLVE? HOW CAN THE CISO MAXIMISE THE EFFECTIVENESS OF INFORMATION SECURITY MEASURES?  Change management, segregation of duties, encryption Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates … Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
  • 6. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST…  Policy development and implementation – a non-technical activity. Standards and best practices from ISO, NIST, ISF and others were followed by legislation on “computer misuse” and “computer crime”, increasingly calling for compliance  Information security is not only “everybody’s job” it is large and complex and requires many parties to be accountable for specific aspects of it. Dr. Eduardo Gelbstein, Adjunct Professor, Webster University, Geneva, Former Advisor, UN Board of Auditors and Former Director, UN International Computing Centre 12. SOCIAL ENGINEERING – A LIVE DEMONSTRATION! 15:45 CLOSE OF DAY ONE DINNER KINDLY SPONSORED BY: Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates … Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
  • 7. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST… CISO Middle East Summit Day Two: Tuesday 1st February 2011 08:00 REGISTRATION & COFFEE 08:30 CHAIRMAN’S OPENING 1. HOW TO DESTROY A COMPUTER FORENSICS INVESTIGATION – KEYNOTE Michael Colao, Recently Global CISO & Director Information Management, Dresdner Kleinwort 2. ANTI-PHISHING, COUNTERFEIT WEBSITES & EMERGING E-BUSINESS SECURITY THREATS 3. INVESTING HEAVILY IN SECURING ICT INFRASTRUCTURE TO PREVENT HACKING - KEYNOTE 4. CLOUD SECURITY & VIRTUALIZATION: KEY RISKS & APPROACHES FOR SUCCESS • What level of security of unstructured data will information leakage prevention really offer? • How to manage the leakage of business data via the use of externally host web applications? • Managing business issues in the cloud: how does one do records management in the cloud? •What control structures should be used when working with 3rd party cloud service providers• What are the minimum security services required to ensure adequate cloud & virtualization security? MORNING COFFEE 5. SECURITY BREACHES & THE ADVANCED THREAT ENVIRONMENT – CISO PANEL • During the last year, have the reports of advanced threats raised your concern about how secure your network is? • What do you personally feel is the greatest source of human threat to your data? • Which technology do you believe best protects data from leaking out of your network? • Where does the majority of your sensitive data reside? • Over the past year, has your organization been the target of an advanced threat? • How does your organization detect or discover threats? • What happened to your organization as a result of an threat? • What advanced threat attack methods or technologies were unleashed against your organization? Chaired by: Eddie Schwartz, Chief Security Officer, NetWitness Corporation- U.S. Panel of CISOs talk frankly about their experiences of recent security breaches, how they responded, detection 6. HOW TO LINK INFORMATION SECURITY INTO ENTERPRISE RISK MANAGEMENT & BUSINESS VALUE 7. RISK MANAGEMENT: DO WE NEED RISK MANAGEMENT & ROBUST FRAMEWORKS? ARE THERE LIGHTER, CHEAPER, MORE PALATABLE ALTERNATIVES? - PANEL  What risk do immature platforms for virtualization bring to our business?  In the current recession, does an appetite to manage risks within tight, formal frameworks exist anymore?  Regulatory uncertainty – is there a better framework? Assessing different risk cultures & fall out – higher risk postures Chaired by: Mr. Dino C. Dell'Accio, Chief Auditor for Information and Communications Management at the United Nations Secretariat, New York Headquarters, U.S Panellists: Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates … Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
  • 8. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST… Marcus Alldrick, Chief Information Security Officer & Senior Manager, Information Risk and Protection, Lloyd's Richard Lingard, Head of IT Risk EMEA, Credit Suisse LUNCH 9. BUSINESS CONTINUITY, DISASTER RECOVERY PLANS 10. THE LEGAL RISKS: EVERYTHING A CISO SHOULD KNOW 11. TRANSNATIONAL CRIMES - WAY FORWARD IN ADDRESSING THEM AFTERNOON TEA BREAK 12. LEADERSHIP FROM THE FRONT – CASE STUDY  Modern day challenges for the CISO.  Technological, operational & people challenges  Innovative strategies & approaches to overcome operational, technological & people challenges  Security posture index  Achieving a proactive & resilient security posture  Continual improvement Vinoth Sivasubramanian, Project Manager-IT Department, UAE Exchange Centre L.L.C. 13. DATA LEAKAGE: PUTTING A VALUE ON A SECURITY BREACH 14. THE ART OF ETHICAL HACKING 15. SOCIAL NETWORKING & IM: OPPORTUNITY PRESENTED BY NEW TECHNOLOGY & INTERFACES VERSUS EMPLOYEE SECURITY 15:00 CLOSE OF DAY TWO DINNER KINDLY SPONSORED BY: ICT CATASTROPHIC RISK MANAGEMENT: CRITICAL INFRASTRUCTURE AND CASE STUDIES LONDON 2012 AND MARITIME TERRORISM Chief Executives and ICT Security Directors face catastrophic losses to ICT from serious organised crime, terrorism, espionage and cyber attacks. Two very different case studies of catastrophic risk are discussed: the forthcoming London 2012 event and the 28 July 2010 maritime incident on the M/V Starr carrying 250,000 tons of crude oil. ICT Security Challenges • Discussion by participants on catastrophic risks in the Region • Catastrophic risk management as a generic task • Reporting to the Board on ICT catastrophic risk management • Integration of physical and ICT security risks • Terrorism and ICT risks • Terrorists use of ICT in real-time Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates … Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
  • 9. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST… • Creation of a forensic strategy • Network analysis, cloud management and new risks • Stress testing as a forensic method • Soft assurance issues and litigation preparedness • On site and off site vulnerabilities • Reputation Risk testing – the speed of media reporting Dr Sally Leivesley, Managing Director, Newrisk Limited (morning) TOP ICT RISK STRATEGIES FOR CONTINUITY - WORKSHOP SCENARIO CHALLENGES The workshop teams will prepare a report on the top ICT risk strategies that they can design to defeat top risks to a government, a global company or a small/ medium business. Two Challenges for a global company, a government department or a local business 1. Prepare a simple paragraph or a simple table of the Top ICT Risks. When preparing this report, consider the consequences that any physical security risks in the list of top ICT risks. 2. Prepare a verbal statement no more than two minutes in length for the news media. (A team member will ‘volunteer’ to present this to the Workshop from the Podium.) The statement is to cover the ICT risk management strategies for continuity of operations in your organisation. This statement will show how your organisation has resilience and will be able to continue despite the top risks that may threaten its operations and cause a catastrophic failure. Dr Sally Leivesley , Managing Director, Newrisk Limited (afternoon) Dr Leivesley advises governments and companies on catastrophic risk, continuity and security. She has interests in development of systems for security beyond encryption, SCADA protection and real time distributed systems for C4I risk management. She is a specialist in top threats from terrorism including chemical, nuclear, radiological, explosives and cyber and she assists the international media including the BBC, BSkyB, Al Jazeera English, and USA and European media with advice when extreme events impact on national security and corporate reputation. These incidents have included maritime (sinking of the South Korean warship 2010); international aviation liquid explosives 2006; Christmas Day 2009 Yemen origin concealed underpants device plot and subsequent incident at Heathrow on armed forces removal of bomb threat passengers on Middle East bound flight; hostage taking; national security data loss events; cyber terrorism and protection. Before the 2000 Sydney Olympics she provided extensive training to emergency services and critical infrastructure corporations on top risks and the securing of vulnerabilities prior to the 2000 Olympics and other national events. Dr Leivesley is a member of the Register of Security Engineers and Assessors with the Institution of Civil Engineering, British Computer Society Information Security Group (up to 2008) and the Royal United Services Institute for Defence Studies. She is a Fellow of the Institute of Civil Protection and Emergency Management and the Royal Society for Arts Manufacturing and Science. She trained in chemical, biological, radiological and nuclear threats as a Scientific Advisor with the British Home Office and was awarded a PhD from the University of London based on research on extreme events across the world. She co-chairs an international science group that works on mitigation of terrorism with specific focus on nuclear terrorism, biological, chemical and other extreme threats. Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates … Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
  • 10. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST… Wednesday 2nd February 2011 CISO Roundtable Sponsor: CISO Middle East Roundtable Information Security Governance for Strategic Business Value Agenda timings - 09:00 Start; 11:00 Coffee Break; 13:00 Lunch; 14:45 Close of Day Chaired by: Mr. Charles V. Pask, Managing Director, ITSEC Associates Ltd Facilitators: • Mr. Eddie Schwartz, Chief Security Officer, NetWitness Corporation - U.S. • Mr. Marcus Alldrick, Chief Information Security Officer & Senior Manager, Information Risk and Protection, Lloyd's - UK • Mr. Dino C. Dell'Accio, Chief Auditor for Information and Communications Management at the United Nations Secretariat, New York Headquarters, U.S • Mr. Richard Lingard, Head of IT Risk EMEA, Credit Suisse - UK • Speaker – The UAE The CISO Roundtable, held under The Chatham House Rule, is the unrivalled benchmarking forum for senior management to open up discussions on the most critical challenges in information security. The core theme of this years’ roundtable is how to improve competitive advantage and profitability directly through information security and improving ICT assurance. The CISO Middle East Roundtable 2011 is well-established as the best place for heads of information security to discuss key security challenges & strategy with peers to develop team expertise & professional skills, as well as to advance debate & approaches for the information security community at large. The focus is on roundtable discussions & group work, with sessions facilitated by established information security practitioners & industry experts. You will meet global security industry leaders & network with professionals who face a similar set of challenges as you in a ‘hands on’, proactive & inspirational environment. • Held Under The Chatham House Rule - No press are permitted. The entire session will be conducted as a ‘closed doors’ session, allowing participants to discuss real life information security incidents & benchmark proven & possible approaches • Notes from the session – each session has a dedicated ‘note taker’ who will write up discussion outlines & conclusions for distribution to all roundtable attendees following the event • Key topic areas of focus - will be determined by the input of participants beforehand & a briefing document will be distributed in advance to allow participants to fully contribute in the honest sharing of ideas. Draft items are listed below.  Securing mobility solutions  Planning, prevention & response to data breaches – reputation, reputation, reputation!  Identity & access management and associated social networking threats  Lawful interception & digital espionage Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates … Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
  • 11. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST…  Capex utilisation - maximising information security cost efficiency & measuring return on security investment  Emerging national cyber threats  Risk based approach to data security – how has risk changed in the global financial crisis fall-out?  Achieving integrated information security governance ITEM 1 Current & Emerging Threats Led by: Mr. Eddie Schwartz ITEM 2 Achieving integrated information security governance Led by: Mr. Dino C. Dell'Accio ITEM 2 Honing A Risk Based Approach To ICT Security Risk & Reputation Led by: Mr. Marcus Alldrick & Mr. Richard Lingard ITEM 3 Proven Deliverables to Improve Competitive Advantage & Profitability ITEM 4 To be decided based on audience feedback ITEM 5 To be decided based on audience feedback ITEM 6 WRAP UP DEBATE, FINAL QUESTIONS & ACTION POINTS Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates … Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
  • 12. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST… REGISTRATION INFORMATION: Fee 3rd Annual CISO Middle East Summit & Roundtable £1,995 Included in the Fee: • Entry to 3-day event • Continued Education Points & certificate • Official presentation materials on USB • Post-event web-link of materials • All lunches & daily refreshments • Networking functions (receptions, dinners, local activities – details subject to confirmation) 2 EVENTS – 1 PLACE, 1 DATE! At the same time, in the same venue as CISO Middle East Summit & Roundtable 2011, MIS is hosting The Middle East Fraud & Corruption Summit. Both events will be held at the Habtoor Grand Resort Hotel & Spa - Jumeirah Beach Dubai, UAE, 31st January – 2nd February 2011. Middle East Fraud & Corruption Summit 2011 - Sharing successes & lessons learned in the Middle East & globally from recent projects & cases involving fraud & corruption, this global event for directors of audit, risk, & fraud prevention arrives in the Middle East for the first time! Programme supports Middle East government & business commitments to achieve transparency goals & reduce exposure to financial risk by addressing prevention, detection, investigation, deterrence & recovery from fraud & corruption www.mistieurope.com/fraudME. DISCOUNTS & SPECIAL OFFERS! • Book 1 person to access 2 summits with the ‘Dual Event Pass’ & only pay 30% extra £2,593 (saving £1,396!) • Book 1 person on each summit & save 30% on fees (overall £1,197 savings!) Ideal team working for Heads of Information Security / IT Risk & Heads of Internal Audit & Fraud Prevention! • For more information & terms & conditions of these offers please call +44 (0)207 779 8944, email mis@mistieurope.com) ABOUT THE VENUE: The 3rd Annual CISO Middle East Summit & Roundtable 2011 will be held at: Habtoor Grand Resort & Spa Al Sufouh Road Dubai Marina, Jumeirah Beach P. O. Box 24454, Dubai, U.A.E Tel: +971 4 408 4444 Fax: +971 4 399 4207 http://grandjumeirah.habtoorhotels.com Facilities & Location: Situated on Jumeirah Beach & overlooking Dubai Marina, this 5 star luxury spa resort hotel is set amid lush gardens with views of the sea & occupies one of Dubai's most enchanting beachside locations. The airport is approximately 30 kilometres from the Habtoor Grand Hotel; drive time is 25 to 30 minutes. It is in close proximity to Dubai Internet City, Dubai Media City & Shopping Malls. The Habtoor Grand Resort & Spa offers pools, restaurants & bars set amidst the hotel's tropical gardens where lush landscapes meet the warm Arabian Gulf, fringed by an immaculate beach & embraced by clear blue skies. Two pools are set within the resort's landscaped gardens, a third 'infinity pool' is located on the mezzanine level of the Towers & a large private beach offers unrestricted views of the clear Arabian Gulf. Guests can play tennis or squash or visit the hotel's Elixir Spa. The 446 guestrooms, reflecting Arabian touches in the furnishings & style, have views of the sea or the landscaped gardens. Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates … Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
  • 13. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST… Accommodation & Reservations: MIS Training Institute has arranged the following discounted rates at the Habtoor Grand Resort & Spa: • Standard Single Room: AED 900.00 per room • Standard Double Room: AED 1000.00 per room • All rates are valid per room per night & include 10% municipality fee, 10% service charge & breakfast. • To make a reservation please complete the booking form available on www.mistieurope.com/CISOme & send to Mr. Maheshan Premanathan on maheshan.premanathan@habtoorhotels.com, Tel: 00971 4 4084165 Fax: 00971 4 3994210. Please note that delegates are responsible for the arrangement & payment of their own accommodation in Dubai. MIS Training is not liable or responsible for any hotel bookings. We cannot guarantee availability as limited rooms are available. We would advise booking as soon as possible. CANCELLATION POLICY: Should a delegate be unable to attend, a substitute may attend in his or her place. A credit or refund, minus 10% administration charge, is available if written notification is received by 11th January 2011. Thereafter, no refunds will be given. MIS reserves the right to change or cancel this programme due to unforeseen circumstances. Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates … Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor: