<H1> EVENT OVERVIEW </H1> |
<H1> CYBERX QATAR </H1> |
<H1> FEATURED DISCUSSIONS </H1> |
<H1> SPEAKERS </H1> |
<H1> AGENDA </H1> |
<H1> WHY ATTEND CYBERX </H1> |
<H1> WHY PARTNER WITH CYBERX 2021 </H1> |
<H1> SPONSORS AND PARTNERS </H1> |
<H1> UPCOMING EVENTS </H1> |
<H2>
JOIN THE LIVE VIRTUAL STREAM ONLINE </H2> |
<H2> WHO SHOULD
ATTEND? </H2> |
<H2> WHO WILL YOU NETWORK WITH? </H2> |
<H2> OFFICIAL DISTRIBUTION PARTNER </H2> |
<H2> PLATINUM SPONSOR </H2> |
<H2> GOLD SPONSOR </H2> |
<H2> SILVER SPONSOR </H2> |
<H2> BRONZE PARTNER </H2> |
<H2> STRATEGIC MEDIA PARTNERS </H2> |
<H3> Recent Search keywords </H3> |
<H3> "Unwrapping the “New Normal” </H3> |
<H3> CYBERSECURITY TRANSFORMATION </H3> |
<H3> How Industries Are Preparing For Evolving Cybersecurity Threats ? </H3> |
<H3> Collaborating, Empowering & Securing Future </H3> |
<H3> Thought Leadership </H3> |
<H3> It Couldn’t Be More Convenient </H3> |
<H3> Connect |Collaborate | Drive </H3> |
<H3> It Is The Perfect Platform To Blend And Innovate </H3> |
<H3> Unmatched Networking & One to One Meetings </H3> |
<H4> Contact Info </H4> |
<H4> Dr. R. Seetharaman </H4> |
<H4> Benjamin Beaston </H4> |
<H4> Mounir Kamal </H4> |
<H4> Imran Chowdhury </H4> |
<H4> 09:00- </H4> |
<H4> Welcome Note from Ibento Global </H4> |
<H4> 09:05- </H4> |
<H4> Opening Remarks from the Master of Ceremonies </H4> |
<H4> </H4> |
<H4> </H4> |
<H4> 09:10- </H4> |
<H4> C-Suite Keynote Presentation </H4> |
<H4> The Making Of Cybersecurity Culture </H4> |
<H4>
</H4> |
<H4> </H4> |
<H4> 09:40- </H4> |
<H4> Presentation </H4> |
<H4> -Securing your Supply Chain: Lessons to learn from
the Sunburst attack </H4> |
<H4>
</H4> |
<H4> </H4> |
<H4> 10:10- </H4> |
<H4> Presentation </H4> |
<H4> -Artificial Intelligence for Blockchains and
Cryptocurrencies </H4> |
<H4>
</H4> |
<H4> </H4> |
<H4> </H4> |
<H4> </H4> |
<H4> 10:40- </H4> |
<H4> Presentation </H4> |
<H4> -Securing the Future of Work with Cyber AI </H4> |
<H4>
</H4> |
<H4> </H4> |
<H4> 11:10- </H4> |
<H4> Networking, Exhibition & One-to-one meetings </H4> |
<H4> 11:30- </H4> |
<H4> Presentation </H4> |
<H4> -Why Traditional Penetration Testing Is Not Enough: Your Need for
Advanced, Crowdsourced Testing </H4> |
<H4>
</H4> |
<H4> </H4> |
<H4> 12:00- </H4> |
<H4> Panel Discussion </H4> |
<H4> -The Evolving and Expanding Nature of Cyber Threats </H4> |
<H4>
</H4> |
<H4> </H4> |
<H4> </H4> |
<H4> Speakers: </H4> |
<H4> 12:40- </H4> |
<H4> Closing Remarks by the Master of Ceremonies </H4> |
<H4> </H4> |
<H4> 12:50- </H4> |
<H4> End of Day 1 </H4> |
<H4> </H4> |
<H4> </H4> |
<H4> </H4> |
<H4> 09:00- </H4> |
<H4> Recap for Day 2 from the Master of Ceremonies </H4> |
<H4> </H4> |
<H4> </H4> |
<H4> 09:05- </H4> |
<H4> Presentation </H4> |
<H4> -Why a Zero Trust Mindset is driving an Identity
centric security strategy </H4> |
<H4>
</H4> |
<H4> </H4> |
<H4> 09:35- </H4> |
<H4> Panel Discussion </H4> |
<H4> -Managing the Cyber Security and Operational Sides: Industrial Cyber
Security (ICS/OT Security) </H4> |
<H4>
</H4> |
<H4> </H4> |
<H4> </H4> |
<H4> Speakers: </H4> |
<H4> 10:20- </H4> |
<H4> Presentation </H4> |
<H4> -The Need for Zero-Trust Runtime Protection </H4> |
<H4>
</H4> |
<H4> </H4> |
<H4> </H4> |
<H4> </H4> |
<H4> 10:50- </H4> |
<H4> Panel Discussion </H4> |
<H4> -Improving Collaboration Between Security & Risk Management </H4> |
<H4>
</H4> |
<H4> </H4> |
<H4> </H4> |
<H4> Speakers: </H4> |
<H4> 11:30- </H4> |
<H4> Networking, Exhibition & One-to-one meetings </H4> |
<H4> </H4> |
<H4> 11:50- </H4> |
<H4> Presentation </H4> |
<H4> -Why Integrated Endpoint-to-Cloud Security is Essential </H4> |
<H4>
</H4> |
<H4> </H4> |
<H4> 12:20- </H4> |
<H4> Session: #beyondthecurve success story </H4> |
<H4> Presentation: Redefine Cybersecurity With A Compliant Hybrid
Workspace </H4> |
<H4>
</H4> |
<H4> </H4> |
<H4> 12:45- </H4> |
<H4> Closing Remarks by the Master of Ceremonies </H4> |
<H4> </H4> |
<H4> 10:50- </H4> |
<H4> End of Day 2 </H4> |
<H4> </H4> |
<H4> Cutting Edge Discussions: Cybersecurity Experts & Innovators </H4> |
<H4> Social Breakout Sessions- Your opportunity to customise your learning! </H4> |
<H4> Not to miss- Engagement Activities! </H4> |
<H4> Tech Demo Drive </H4> |
<H4> Meeting Your Cybersecurity Needs </H4> |
<H4> Network & Connect – The New Normal Way </H4> |
<H5> DAY 1 - 7th JUNE’ 2021 </H5> |
<H5> Dr. R. Seetharaman | Group Chief Executive Officer | Doha Bank, Qatar </H5> |
<H5> Abdessabour Arous | Security Researcher - Global Research & Analysis Team (GReAT) | Kaspersky </H5> |
<H5> Dr. Devrim Unal | Assistant Research Professor | KINDI Center for
Computing Research, Qatar University </H5> |
<H5> Andrew Tsonchev | Director of Technology | Darktrace </H5> |
<H5> Ron Peeters | Vice President Middle East & Emerging Markets | Synack </H5> |
<H5> Moderator: Sameer Ahmed | Country Manager | Spire Solutions </H5> |
<H5> Benjamin Beaston | Chief Information Security Officer |Commercial
Bank, Qatar
Mounir Kamal | Cybersecurity Advisor, Incident Handling & Digital
Forensic Manager| Q-CERT, Qatar
Abdulsalam Al Yafei | ISIT and Engineering Group Manager | Qatalum,
Qatar
Manja Kuchel | Principal Product Marketing Manager for Security |
SolarWinds </H5> |
<H5> DAY 2 - 8th JUNE’ 2021 </H5> |
<H5> David Higgins, | EMEA Technical Director | CyberArk </H5> |
<H5> Moderator: Malek Abu Tayeh | IT/OT Manager | SUEZ Middle East & Central
Asia </H5> |
<H5> Javed Habib | Regional Head of Plant Controls, Lifecycle Management,
and ICS Cyber Security MESCATA | Engie, UAE
Mounir Kamal | Cybersecurity Advisor, Incident Handling & Digital
Forensic Manager| Q-CERT, Qatar
Mohamed Youssef | Dubai Chapter President- Control Systems Cyber
Security Association International | CS2AI,& ICS/OT Cyber Security
Expert, UAE
Jude Pereira | Managing Director | Nanjgel Solutions </H5> |
<H5> Rahil Ghaffar| Regional Director for MEA | Virsec </H5> |
<H5> Moderator:
Jude Pereira | Managing Director | Nanjgel Solutions </H5> |
<H5> AbdulKhader Shaik | CISO for Leading Energy Company | Qatar
Shaju Bhaskaran | Information Security Officer for a leading global MNC
| Qatar
Imran Chowdhury | Global Head of Data Protection & Governance | Al
Jazeera Media Network, Qatar
Tarun Kumar, CISO, Nissan Digital, India </H5> |
<H5> Tom Davison | Director Mobile Security Threat Intelligence, | Lookout </H5> |
<H5> Vijender Yadav | CEO, CTO & Co-Founder |Accops </H5> |
Social
Social Data
Cost and overhead previously rendered this semi-public form of communication unfeasible.
But advances in social networking technology from 2004-2010 has made broader concepts of sharing possible.