1. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
INFORMATION SECURITY & ICT IN THE MIDDLE EAST…
3rd Annual
Chief Information Security Officer
Middle East
Summit & Roundtable 2011
31st January ~ 2nd February 2011
Habtoor Grand Resort Hotel & Spa - Jumeirah Beach
Dubai, United Arab Emirates
CISO MIDDLE EAST SUMMIT & ROUNDTABLE 2011 – DUBAI, THE UNITED ARAB EMIRATES…
Firmly established as the Middle East’s premier event for thought-leaders & practitioners in
information security, cyber security & IT risk assurance, MIS Training Institute is delighted to
announce that the 3rd Annual CISO Middle East Summit & Roundtable 2011 will take place in Dubai, UAE, 31st
January - 2nd February 2011. This unique event will bring together business & government to share
direct experience, best practice in threat response & regional professionalism in information
security. The simple objective being: to stay one step ahead of rapidly changing business
environments on key issues impacting heads of ICT and information security specifically within the
Middle East. Predict change and better plan your strategy on challenges such as: Regional
solutions tied into regional & global information security risk management needs & best practice!
Securing mobility solutions
Planning, prevention & response to data breaches
Identity & access management and associated social networking threats
Lawful interception & digital espionage
Capex utilisation - maximising information security cost efficiency & measuring return on security investment
Emerging national cyber threats
Cloud security roundtable discussion
Risk based approach to data security – how has risk changed in the global financial crisis fall-out? Managing
reputational risk
Achieving integrated information security governance
EVENT BACKGROUND…
Last year MIS were honoured to host the 2nd CISO Middle East Summit under the official
patronage of ITA Oman / e.oman. Opened by Dr. Salim Sultan Al Ruzaiqi, Chief Executive Officer
of ITA, the event was a key part of the national initiative to launch ‘e.oman’ as the pioneering
nation in e-services and security within the Middle East, and internationally. In addition to the
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
2. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
INFORMATION SECURITY & ICT IN THE MIDDLE EAST…
numerous Information Security and ICT Directors attending the summit from business sectors
across the Middle East, the event was also attended by numerous security directors and VIPS
from across Business Sectors, Ministries of Defence, Police Forces, the Royal Navy, Central
Banks and Directors from CERTS in Oman and across the Middle East. This year, the Opening
Keynote Speech will be made by: Eng. Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency
Response Team (aeCERT). Practitioner and thought leadership sessions will provide pragmatic and
cost-effective advice to address the inherent vulnerabilities within processes, people &
technologies. The interactive CISO Middle East Roundtable held under the Chatham House Rule on
Wednesday 2nd February provides executives with the ideal opportunity to benchmark security
strategy against peers and thought leaders globally.
CONFIRMED SPEAKERS FOR 2011 INCLUDE…
Keynote by:
• Eng. Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency Response Team of The
Telecommunications Regulatory Authority (TRA) - The United Arab Emirates
International Speaker Panel includes:
• Mr. Dino C. Dell'Accio, Chief Auditor for Information and Communications Management, United Nations Secretariat, New
York Headquarters – U.S.
• Mr. Scott Totzke, VP, BlackBerry Security Group
• Ray Stanton, Global Head of Business Continuity, Security & Governance Practice, British Telecom
• Mr. Chetan Gor, Regional Head of Information Security - Middle East, HSBC Bank Middle East Limited– UAE
• Mr. Marcus Alldrick, Chief Information Security Officer & Senior Manager, Information Risk and Protection, Lloyd's
• Mr. Richard Lingard, Head of IT Risk EMEA, Credit Suisse - UK
• Mr. Kim Aarenstrup, Chief Information Security Officer, A.P. Moller - Maersk A/S & Chairman, Information Security
Forum (ISF) - Denmark
• Mr. David Cripps, Chief Information Security Officer, Investec
• Mr. Charles V. Pask, Managing Director, ITSEC Associates Ltd
• Vinoth Sivasubramanian, Project Manager-IT Department, UAE Exchange Centre L.L.C.
• Mr. Eddie Schwartz, Chief Security Officer, NetWitness Corporation - U.S.
• Dr Sally Leivesley , Managing Director, Newrisk Limited – UK
• Dr. Eduardo Gelbstein, Adjunct Professor, Webster University, Geneva, Former Advisor, UN Board of Auditors and Former
Director, UN International Computing Centre – Switzerland
EVENT OBJECTIVES…
Develop further talent to grow Emirati professional capability and regional professionalism in
information security, ICT and cyber assurance through exposure to international information
security best practices
Stay one step ahead of rapidly changing business environments –
o capital expenditure utilisation & ensuring maximum efficiency on your security investments!
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
3. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
INFORMATION SECURITY & ICT IN THE MIDDLE EAST…
o securing mobility solutions
o preventing data breaches
o identity and access management
o social networking
o lawful interception, lawful interception & digital espionage
o emerging national cyber threats…
Introduce information security directors & experts from around the world for benchmarking purposes & for
participants to EXPAND valuable, trust based contacts within the information security
community – regionally & internationally
CAPITAL EXPENDITURE UTILISATION & information security - Ensure that you are achieving maximum efficiency
out of your information security solutions & services. Ensure that infosec remains integral to the core business as a service
based model: linking with internal & external customers & building teams that return money to
business lines
Provide ultimate assurance on managing the latest threats day to day & prepare for the future – are you
missing any tricks on how to manage the latest cyber security threats & data leakage -
especially through periods of extensive change & development?
Learn lessons from proven new case studies, hear inspiring keynotes, participate in panel debates &
roundtables that will probe the information security role
Provide cutting edge discussion for CISOs with like-minded peers at the CISO Roundtable Middle East 2011 –
held under The Chatham House Rule
TESTIMONIALS FROM CISO EXECUTIVE SUMMIT MIDDLE EAST 2009
o “Streamlined and strengthened my existing thoughts & skills”
o “Great to have get answers to questions & learn from security experts”
o “Excellent networking with other CISOs from around the world”
o “Found out best practice in information security & share experience with people”
o “The best opportunity to interact with security professionals from across the globe & to share experiences/news on emerging security
trends”
o “Smooth running, the lectures were challenging & reflected our real like problems”
o “Very useful on risk decision taking & creating value & trust between IT security & the business”
o “An eye opening summit with engaging and informative speakers: you just can't have enough of it. Recommended highly”
o “A very good platform to meet people from multi-disciplinary industry experience, all working from their experience and background
great experience and insight into information securities keep it up if everybody knows his rights and responsibility we won't have to
think about IT security” (Central Bank of Oman)
o “Provides an exceptional opportunity for networking with security professionals from different regions and to learn more about
emerging security threats and counter measures” (BAE systems)
o “An extremely well constructed conference that brought together experts in their field who addressed challenging issues at a grass roots
level”
TWO EVENTS AT ONE TIME IN ONE PLACE! MIS is hosting at the same time, in the same venue
the Middle East Fraud & Corruption Summit.
DRAFT AGENDA
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
4. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
INFORMATION SECURITY & ICT IN THE MIDDLE EAST…
CISO Middle East Summit
Day One: Monday 31st January 2011
07:30 REGISTRATION & COFFEE
08:00 MASTER OF CEREMONIES INTRODUCTIONS
08:15 CHAIRMAN’S OPENING
08:25 OPENING SPEECH BY CHIEF GUEST: DEFINING A NEW ERA & DECREASING CYBER SECURITY RISK IN
THE FACE OF AN 'UNCERTAIN' WORLD – KEYNOTE
1. IMPLEMENTING SECURITY AWARENESS, EDUCATION TRAINING & CERTIFICATION ON A NATIONAL
LEVEL – OPENING KEYNOTE SPEECH
Eng. Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency Response Team (aeCERT)
2. GOVERNANCE OF SECURITY & SECURITY OF GOVERNANCE – KEYNOTE
Information security governance requires clearly defined goals, roles, responsibilities, resources, policies &
procedures. Challenging questions arise when we focus our attention beyond the overwhelming amount of data
generated by ever-advancing technologies. The following questions will be addressed drawing from the extensive
experience gained in conducting information security audits of the United Nations offices & peacekeeping missions
across the world. Dino is responsible for the development & implementation of the global information &
communications audit strategy of the United Nations Secretariat, including the definition of common auditing
standards, risk assessment methodologies, best practices & guidelines.
Is there adequate consideration of the need to protect the information, processes & relationships that support &
enable the governance of security?
What happens to governance when disasters occur? Is it enough to have policies, disaster recovery & business
continuity plans?
Is there adequate awareness of what are the relationships between the major components of information
security governance?
Mr. Dino C. Dell'Accio, Chief Auditor for Information and Communications Management at the United Nations Secretariat,
New York Headquarters, USA
3. SECURING YOUR ENTERPRISE MOBILITY – KEYNOTE
Mr. Scott Totzke, VP, BlackBerry Security Group
4. NATIONAL STRATEGIES TO IMPROVE CYBER SECURITY: AWARENESS, COUNTER-MEASURES &
EVOLUTION – KEYNOTE PANEL
International efforts to combat the cyber threat
How to improve contingency planning and resilience against cyber attacks
Do nation-state sponsored advanced threats occur frequently?
Cybercrime (protecting the organization & users from organized cybercrime)
What will be the main facts for the security evolution in the following 5 years or so
Securing critical infrastructure from attacks (hacks, DDoS / Botnets & extortion, data breaches, fraud & identity
crime)
Fostering regional & international cooperation on information sharing
Addressing unforeseen problems during implementation of e-government projects
Keynote Panellists:
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
5. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
INFORMATION SECURITY & ICT IN THE MIDDLE EAST…
Eng. Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency Response Team of The
Telecommunications Regulatory Authority (TRA) - The United Arab Emirates
MORNING COFFEE BREAK
5. THE INFORMATION SECURITY THREAT HORIZON – KEYNOTE
Mr. Kim Aarenstrup, Chief Information Security Officer, A.P. Moller - Maersk A/S & Chairman, Information Security
Forum (ISF)
6. CAPEX UTILISATION FOR INFORMATION SECURITY: MAXIMISING INFORMATION SECURITY COST
EFFICIENCY & ENSURING THAT SECURITY IS INTEGRAL TO THE CORE BUSINESS AS A SERVICE BASED
MODEL – PANEL
How do you link with internal & external customers & building teams that return money to business lines?
Moving ICT and information security into the service model sphere to add value to the business
Maximising the cost-efficiency ratio of the information security strategy
Capital expenditure utilisation - maximising information security cost efficiency
Measuring Security return on investment (key indicators, & ways to obtain them)
Implementing security policies that are effective in changing behavior
7. ADDRESSING INFORMATION SECURITY RISK & REPUTATION – KEY CASE STUDY
Marcus Alldrick, Chief Information Security Officer & Senior Manager, Information Risk and Protection, Lloyd's
8 LAWFUL INTERCEPTION, DIGITAL ESPIONAGE & EAVESDROPPING – KEYNOTE
LUNCH
9. IDENTITY MANAGEMENT & ACCESS MANAGEMENT: NEW CHALLENGES, TRENDS & TECHNOLOGIES –
KEYNOTE
Integrating social networking passwords
Securing & simplifying the user experience
AFTERNOON TEA BREAK
10. MOBILE & WIRELESS SECURITY: PROTECTING YOUR TOP EXECUTIVES ON THE MOVE – PANEL
Why do we need mobile security?
Top recommendations
Privacy versus security – specific regional challenges
Mobile security awareness – proven lessons learned
New threats & risks
ILD versus PLD & security considerations
Chaired by: Mr. Scott Totzke, VP, BlackBerry Security Group
Panellists:
11. THE RISE OF THE CISO – HOW WILL THE JOB EVOLVE? HOW CAN THE CISO MAXIMISE THE
EFFECTIVENESS OF INFORMATION SECURITY MEASURES?
Change management, segregation of duties, encryption
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
6. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
INFORMATION SECURITY & ICT IN THE MIDDLE EAST…
Policy development and implementation – a non-technical activity. Standards and best practices from ISO, NIST,
ISF and others were followed by legislation on “computer misuse” and “computer crime”, increasingly calling
for compliance
Information security is not only “everybody’s job” it is large and complex and requires many parties to be
accountable for specific aspects of it.
Dr. Eduardo Gelbstein, Adjunct Professor, Webster University, Geneva, Former Advisor, UN Board of Auditors and Former
Director, UN International Computing Centre
12. SOCIAL ENGINEERING – A LIVE DEMONSTRATION!
15:45 CLOSE OF DAY ONE
DINNER KINDLY SPONSORED BY:
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
7. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
INFORMATION SECURITY & ICT IN THE MIDDLE EAST…
CISO Middle East Summit
Day Two: Tuesday 1st February 2011
08:00 REGISTRATION & COFFEE
08:30 CHAIRMAN’S OPENING
1. HOW TO DESTROY A COMPUTER FORENSICS INVESTIGATION – KEYNOTE
Michael Colao, Recently Global CISO & Director Information Management, Dresdner Kleinwort
2. ANTI-PHISHING, COUNTERFEIT WEBSITES & EMERGING E-BUSINESS SECURITY THREATS
3. INVESTING HEAVILY IN SECURING ICT INFRASTRUCTURE TO PREVENT HACKING - KEYNOTE
4. CLOUD SECURITY & VIRTUALIZATION: KEY RISKS & APPROACHES FOR SUCCESS
• What level of security of unstructured data will information leakage prevention really offer? • How to manage the
leakage of business data via the use of externally host web applications? • Managing business issues in the cloud:
how does one do records management in the cloud? •What control structures should be used when working with 3rd
party cloud service providers• What are the minimum security services required to ensure adequate cloud &
virtualization security?
MORNING COFFEE
5. SECURITY BREACHES & THE ADVANCED THREAT ENVIRONMENT – CISO PANEL
• During the last year, have the reports of advanced threats raised your concern about how secure your network is?
• What do you personally feel is the greatest source of human threat to your data?
• Which technology do you believe best protects data from leaking out of your network?
• Where does the majority of your sensitive data reside?
• Over the past year, has your organization been the target of an advanced threat?
• How does your organization detect or discover threats?
• What happened to your organization as a result of an threat?
• What advanced threat attack methods or technologies were unleashed against your organization?
Chaired by: Eddie Schwartz, Chief Security Officer, NetWitness Corporation- U.S.
Panel of CISOs talk frankly about their experiences of recent security breaches, how they responded, detection
6. HOW TO LINK INFORMATION SECURITY INTO ENTERPRISE RISK MANAGEMENT & BUSINESS VALUE
7. RISK MANAGEMENT: DO WE NEED RISK MANAGEMENT & ROBUST FRAMEWORKS? ARE THERE
LIGHTER, CHEAPER, MORE PALATABLE ALTERNATIVES? - PANEL
What risk do immature platforms for virtualization bring to our business?
In the current recession, does an appetite to manage risks within tight, formal frameworks exist
anymore?
Regulatory uncertainty – is there a better framework? Assessing different risk cultures & fall out –
higher risk postures
Chaired by: Mr. Dino C. Dell'Accio, Chief Auditor for Information and Communications Management at the United Nations
Secretariat, New York Headquarters, U.S
Panellists:
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
8. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
INFORMATION SECURITY & ICT IN THE MIDDLE EAST…
Marcus Alldrick, Chief Information Security Officer & Senior Manager, Information Risk and Protection, Lloyd's
Richard Lingard, Head of IT Risk EMEA, Credit Suisse
LUNCH
9. BUSINESS CONTINUITY, DISASTER RECOVERY PLANS
10. THE LEGAL RISKS: EVERYTHING A CISO SHOULD KNOW
11. TRANSNATIONAL CRIMES - WAY FORWARD IN ADDRESSING THEM
AFTERNOON TEA BREAK
12. LEADERSHIP FROM THE FRONT – CASE STUDY
Modern day challenges for the CISO.
Technological, operational & people challenges
Innovative strategies & approaches to overcome operational, technological & people challenges
Security posture index
Achieving a proactive & resilient security posture
Continual improvement
Vinoth Sivasubramanian, Project Manager-IT Department, UAE Exchange Centre L.L.C.
13. DATA LEAKAGE: PUTTING A VALUE ON A SECURITY BREACH
14. THE ART OF ETHICAL HACKING
15. SOCIAL NETWORKING & IM: OPPORTUNITY PRESENTED BY NEW TECHNOLOGY & INTERFACES VERSUS
EMPLOYEE SECURITY
15:00 CLOSE OF DAY TWO
DINNER KINDLY SPONSORED BY:
ICT CATASTROPHIC RISK MANAGEMENT: CRITICAL INFRASTRUCTURE AND CASE STUDIES LONDON 2012
AND MARITIME TERRORISM
Chief Executives and ICT Security Directors face catastrophic losses to ICT from serious organised crime,
terrorism, espionage and cyber attacks. Two very different case studies of catastrophic risk are discussed:
the forthcoming London 2012 event and the 28 July 2010 maritime incident on the M/V Starr carrying
250,000 tons of crude oil.
ICT Security Challenges
• Discussion by participants on catastrophic risks in the Region
• Catastrophic risk management as a generic task
• Reporting to the Board on ICT catastrophic risk management
• Integration of physical and ICT security risks
• Terrorism and ICT risks
• Terrorists use of ICT in real-time
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
9. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
INFORMATION SECURITY & ICT IN THE MIDDLE EAST…
• Creation of a forensic strategy
• Network analysis, cloud management and new risks
• Stress testing as a forensic method
• Soft assurance issues and litigation preparedness
• On site and off site vulnerabilities
• Reputation Risk testing – the speed of media reporting
Dr Sally Leivesley, Managing Director, Newrisk Limited (morning)
TOP ICT RISK STRATEGIES FOR CONTINUITY - WORKSHOP SCENARIO CHALLENGES
The workshop teams will prepare a report on the top ICT risk strategies that they can design to defeat top
risks to a government, a global company or a small/ medium business.
Two Challenges for a global company, a government department or a local business
1. Prepare a simple paragraph or a simple table of the Top ICT Risks.
When preparing this report, consider the consequences that any physical security risks in the list of top ICT
risks.
2. Prepare a verbal statement no more than two minutes in length for the news media. (A team member will
‘volunteer’ to present this to the Workshop from the Podium.)
The statement is to cover the ICT risk management strategies for continuity of operations in your
organisation. This statement will show how your organisation has resilience and will be able to continue
despite the top risks that may threaten its operations and cause a catastrophic failure.
Dr Sally Leivesley , Managing Director, Newrisk Limited (afternoon)
Dr Leivesley advises governments and companies on catastrophic risk, continuity and security. She has interests in
development of systems for security beyond encryption, SCADA protection and real time distributed systems for C4I risk
management. She is a specialist in top threats from terrorism including chemical, nuclear, radiological, explosives and
cyber and she assists the international media including the BBC, BSkyB, Al Jazeera English, and USA and European
media with advice when extreme events impact on national security and corporate reputation. These incidents have
included maritime (sinking of the South Korean warship 2010); international aviation liquid explosives 2006; Christmas
Day 2009 Yemen origin concealed underpants device plot and subsequent incident at Heathrow on armed forces
removal of bomb threat passengers on Middle East bound flight; hostage taking; national security data loss events;
cyber terrorism and protection. Before the 2000 Sydney Olympics she provided extensive training to emergency
services and critical infrastructure corporations on top risks and the securing of vulnerabilities prior to the 2000 Olympics
and other national events. Dr Leivesley is a member of the Register of Security Engineers and Assessors with the
Institution of Civil Engineering, British Computer Society Information Security Group (up to 2008) and the Royal United
Services Institute for Defence Studies. She is a Fellow of the Institute of Civil Protection and Emergency Management
and the Royal Society for Arts Manufacturing and Science. She trained in chemical, biological, radiological and nuclear
threats as a Scientific Advisor with the British Home Office and was awarded a PhD from the University of London based
on research on extreme events across the world. She co-chairs an international science group that works on mitigation
of terrorism with specific focus on nuclear terrorism, biological, chemical and other extreme threats.
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
10. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
INFORMATION SECURITY & ICT IN THE MIDDLE EAST…
Wednesday 2nd February 2011 CISO Roundtable Sponsor:
CISO Middle East Roundtable
Information Security Governance for Strategic Business Value
Agenda timings - 09:00 Start; 11:00 Coffee Break; 13:00 Lunch; 14:45 Close of Day
Chaired by: Mr. Charles V. Pask, Managing Director, ITSEC Associates Ltd
Facilitators:
• Mr. Eddie Schwartz, Chief Security Officer, NetWitness Corporation - U.S.
• Mr. Marcus Alldrick, Chief Information Security Officer & Senior Manager, Information Risk and Protection, Lloyd's - UK
• Mr. Dino C. Dell'Accio, Chief Auditor for Information and Communications Management at the United Nations Secretariat,
New York Headquarters, U.S
• Mr. Richard Lingard, Head of IT Risk EMEA, Credit Suisse - UK
• Speaker – The UAE
The CISO Roundtable, held under The Chatham House Rule, is the unrivalled benchmarking forum
for senior management to open up discussions on the most critical challenges in information
security. The core theme of this years’ roundtable is how to improve competitive advantage and
profitability directly through information security and improving ICT assurance. The CISO Middle
East Roundtable 2011 is well-established as the best place for heads of information security to
discuss key security challenges & strategy with peers to develop team expertise & professional
skills, as well as to advance debate & approaches for the information security community at
large. The focus is on roundtable discussions & group work, with sessions facilitated by
established information security practitioners & industry experts. You will meet global security
industry leaders & network with professionals who face a similar set of challenges as you in a
‘hands on’, proactive & inspirational environment.
• Held Under The Chatham House Rule - No press are permitted. The entire session will be conducted
as a ‘closed doors’ session, allowing participants to discuss real life information security
incidents & benchmark proven & possible approaches
• Notes from the session – each session has a dedicated ‘note taker’ who will write up discussion
outlines & conclusions for distribution to all roundtable attendees following the event
• Key topic areas of focus - will be determined by the input of participants beforehand & a briefing
document will be distributed in advance to allow participants to fully contribute in the honest
sharing of ideas. Draft items are listed below.
Securing mobility solutions
Planning, prevention & response to data breaches – reputation, reputation, reputation!
Identity & access management and associated social networking threats
Lawful interception & digital espionage
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
11. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
INFORMATION SECURITY & ICT IN THE MIDDLE EAST…
Capex utilisation - maximising information security cost efficiency & measuring return on security investment
Emerging national cyber threats
Risk based approach to data security – how has risk changed in the global financial crisis fall-out?
Achieving integrated information security governance
ITEM 1 Current & Emerging Threats
Led by: Mr. Eddie Schwartz
ITEM 2 Achieving integrated information security governance
Led by: Mr. Dino C. Dell'Accio
ITEM 2 Honing A Risk Based Approach To ICT Security Risk & Reputation
Led by: Mr. Marcus Alldrick & Mr. Richard Lingard
ITEM 3 Proven Deliverables to Improve Competitive Advantage & Profitability
ITEM 4 To be decided based on audience feedback
ITEM 5 To be decided based on audience feedback
ITEM 6 WRAP UP DEBATE, FINAL QUESTIONS & ACTION POINTS
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
12. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
INFORMATION SECURITY & ICT IN THE MIDDLE EAST…
REGISTRATION INFORMATION: Fee
3rd Annual CISO Middle East Summit & Roundtable £1,995
Included in the Fee:
• Entry to 3-day event
• Continued Education Points & certificate
• Official presentation materials on USB
• Post-event web-link of materials
• All lunches & daily refreshments
• Networking functions (receptions, dinners, local activities – details subject to confirmation)
2 EVENTS – 1 PLACE, 1 DATE!
At the same time, in the same venue as CISO Middle East Summit & Roundtable 2011, MIS is hosting The Middle East
Fraud & Corruption Summit. Both events will be held at the Habtoor Grand Resort Hotel & Spa - Jumeirah Beach
Dubai, UAE, 31st January – 2nd February 2011. Middle East Fraud & Corruption Summit 2011 - Sharing successes &
lessons learned in the Middle East & globally from recent projects & cases involving fraud & corruption, this
global event for directors of audit, risk, & fraud prevention arrives in the Middle East for the first time!
Programme supports Middle East government & business commitments to achieve transparency goals &
reduce exposure to financial risk by addressing prevention, detection, investigation, deterrence & recovery
from fraud & corruption www.mistieurope.com/fraudME.
DISCOUNTS & SPECIAL OFFERS!
• Book 1 person to access 2 summits with the ‘Dual Event Pass’ & only pay 30% extra £2,593 (saving
£1,396!)
• Book 1 person on each summit & save 30% on fees (overall £1,197 savings!) Ideal team working for Heads of
Information Security / IT Risk & Heads of Internal Audit & Fraud Prevention!
• For more information & terms & conditions of these offers please call +44 (0)207 779 8944, email
mis@mistieurope.com)
ABOUT THE VENUE:
The 3rd Annual CISO Middle East Summit & Roundtable 2011 will be held at:
Habtoor Grand Resort & Spa
Al Sufouh Road
Dubai Marina, Jumeirah Beach
P. O. Box 24454, Dubai, U.A.E
Tel: +971 4 408 4444 Fax: +971 4 399 4207
http://grandjumeirah.habtoorhotels.com
Facilities & Location:
Situated on Jumeirah Beach & overlooking Dubai Marina, this 5 star luxury spa resort hotel is set amid lush
gardens with views of the sea & occupies one of Dubai's most enchanting beachside locations. The airport
is approximately 30 kilometres from the Habtoor Grand Hotel; drive time is 25 to 30 minutes. It is in close
proximity to Dubai Internet City, Dubai Media City & Shopping Malls. The Habtoor Grand Resort & Spa offers
pools, restaurants & bars set amidst the hotel's tropical gardens where lush landscapes meet the warm
Arabian Gulf, fringed by an immaculate beach & embraced by clear blue skies. Two pools are set within the
resort's landscaped gardens, a third 'infinity pool' is located on the mezzanine level of the Towers & a large
private beach offers unrestricted views of the clear Arabian Gulf. Guests can play tennis or squash or visit
the hotel's Elixir Spa. The 446 guestrooms, reflecting Arabian touches in the furnishings & style, have views
of the sea or the landscaped gardens.
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor:
13. THE UNIQUE EVENT FOR THOUGHT-LEADERS & PRACTITIONERS ON
INFORMATION SECURITY & ICT IN THE MIDDLE EAST…
Accommodation & Reservations:
MIS Training Institute has arranged the following discounted rates at the Habtoor Grand Resort & Spa:
• Standard Single Room: AED 900.00 per room
• Standard Double Room: AED 1000.00 per room
• All rates are valid per room per night & include 10% municipality fee, 10% service charge & breakfast.
• To make a reservation please complete the booking form available on www.mistieurope.com/CISOme &
send to Mr. Maheshan Premanathan on maheshan.premanathan@habtoorhotels.com, Tel: 00971 4
4084165 Fax: 00971 4 3994210.
Please note that delegates are responsible for the arrangement & payment of their own accommodation in
Dubai. MIS Training is not liable or responsible for any hotel bookings. We cannot guarantee availability as
limited rooms are available. We would advise booking as soon as possible.
CANCELLATION POLICY:
Should a delegate be unable to attend, a substitute may attend in his or her place. A credit or refund, minus
10% administration charge, is available if written notification is received by 11th January 2011. Thereafter, no
refunds will be given. MIS reserves the right to change or cancel this programme due to unforeseen
circumstances.
Confirmed Sponsors for 3rd Annual CISO Summit Middle East 2011 – Dubai, The United Arab Emirates …
Mobile Security Sponsor: Gold Sponsor: CISO Roundtable Sponsor: