16th Annual e-Crime & Cybersecurity Congress in Abu Dhabi

Beyond Silos – Holistic Security for a Hyper-Connected World

10th September, 2025 • The St Regis (Corniche), Abu Dhabi, UAE 

The convergence of cyber & physical security has profound implications for CISOs, CSOs and the technology they use. What do they need to know?

 

The next phase of intelligent defence

The once-discrete realms of physical and cyber security are becoming ever more tightly integrated—and inseparable. Digital connectivity and control of physical assets increases the stakes of cyber intrusions. In addition, modern physical security systems —surveillance networks, access control, biometric authentication— are now deeply reliant on IP connectivity, cloud infrastructures, and AI-driven analytics.

These systems, once standalone, are now nodes in the broader attack surface. A vulnerability in a smart lock or networked camera isn’t just a device-level flaw—it’s an entry point into critical infrastructure.

As threats increasingly span both cyber and physical domains, traditional siloed security models are becoming a liability.

CISOs, CSOs and vendors all need to understand the high-level implications of physical/digital convergence and they need to translate that into updated real-world frameworks, cross-domain incident response planning, and threat modelling that integrates physical and cyber domains.

One way to think about this is security convergence: if attackers are exploiting the seams between digital and physical systems then converged teams reduce duplication and align security with business goals. They also deliver unified visibility into cyber-physical risks, faster, more coordinated incident response and improved compliance, communication, and strategic oversight.

So, what are the action points for CISOs?

CISOs need to take the lead in unifying cyber and physical security teams and leadership. They need to define shared roles, responsibilities, and escalation paths. And they need to develop joint security policies and standards.

More generally, the converged security challenge is to keep on top of cross-domain vulnerabilities regularly and implement the technologies that can cope with this new and evolving environment.

But security convergence is not a one-time project—it’s a strategic evolution. CISOs must tailor their approach to their organization’s structure and risk profile, engaging cross-functional leaders and expert advisors along the way. Many organizations lack the in-house talent to execute this comprehensive vision. So, where can they turn to for help in architecting and operationalizing truly unified security strategies?

Holistic security isn’t a trend—it’s the next phase of intelligent defence. If you're not building it, you're behind. CISOs must lead the charge toward security convergence to ensure operational resilience and business continuity.

This event will look at the skills, people, processes, technologies and governance models needed to secure complex, hybrid environments. And we will explore how technologies like AI and quantum computing will affect both sides of the security equation.

 

The e-Crime & Cybersecurity Congress in Abu Dhabi will look at how cybersecurity professionals need to deal with the challenges of holistic security.
Join our real-life case studies and in-depth technical sessions from the most sophisticated teams in the market.

  • Making the best use of threat intelligence

    • In a pre-emptive security model, timing is everything — success depends on detecting and neutralizing threats before they become active incidents.
    • To do this, security operations can't just rely on internal telemetry (e.g., endpoint or network logs).
    • They need external, real-time context about emerging threats — where do they get it?
  • Security Posture Management

    • Traditional vulnerability scanners don’t handle cloud native architectures well.
    • Today’s cloud environments spin up thousands of ephemeral assets without a traditional OS, without an IP address for long.
    • So how do you adapt to that dynamic, API-driven reality? How can traditional tools connect the dots – not just generate tickets?
  • AI, quantum and the rest

    • New technologies are changing how both attackers and defenders operate.
    • For security professionals, the challenge is to separate the signal from the noise, to determine what is useful today, and how they can begin to incorporate new technologies without having to disrupt existing workflows and teams too much.
    • What kinds of solutions and vendors offer the most efficient entry-point?
  • Improving continuous attack surface discovery

    • You need to know what attackers can see and what they can actually attack – and you need it on a continuous basis, not in some static inventory.
    • Ideally you also need assets ranked by risk priority and put into the current threat and vulnerability context.
    • Is this feasible and is it cost effective?
  • The power of automation

    • There’s too much manual intervention in security.
    • SOAR pulls data from SIEMs, EDRs, firewalls, cloud APIs, ticketing systems, threat intelligence feeds, and even email servers.
    • It also coordinates actions across tools via APIs and prebuilt integrations and intelligent playbooks.
    • Well, that’s the theory. How does it work in the real world?
  • Adversary simulation and behavioural analysis

    • Automated adversary simulation identifies telemetry blind spots.
    • They provide prioritized remediation guidance and control effectiveness metrics. They track progress trends and validate security ROIs as well as providing board and audit reporting.
    • How well do they work in practice?
  • Pen testing for OT / SCADA

    • Testing is key to identifying and fixing vulnerabilities before they're exploited. 
    • Regulations like NERC CIP require utilities to assess and mitigate risk. 
    • Testing checks OT security controls are functioning properly and shows regulators an organization's commitment to security.Can you help?
  • Why zero trust, isolation and segmentation are key

    • There has been a shift in recent attacks away from the theft of data – now threat actors are concerned with interrupting all operation activity.
    • It is now critical that business functions are separated, and that internet access to OT networks is limited.
    • Can security teams keep up with sophisticated foes? 
  • OT and the regulations

    • DORA, NIS2 and other regulations put more responsibility for resilience on firms deemed important or critical.
    • Many have focused on IT networks but the regulations include all resilience and so OT environments matter. 
    • What does this new emphasis from regulators mean practically for OT security?
  • Defending against the latest ransomware variants

    • Ransomware is effective precisely because it can exploit whatever weaknesses exist in your security architecture and processes
    • The threat and the actors are constantly evolving, and that evolution is forcing the hand of the government and causing havoc in the insurance market
    • What can CISOs do to better defend against ransomware?
  • Transitioning OT to the Cloud?

    • OT traditionally was localized in particular sites and air-gapped from IT systems.
    • But connectivity with broader corporate networks and the need to manage technology more centrally (especially during COVID) has seen companies looking at managed services in the Cloud for OT.
    • Is this a way forward?
  • Achieving visibility across ecosystems

    • From exposed initial access points such as warehouse management systems to complex machine control software, simply understanding your device and application landscape, its connection and data flows and dependencies is a huge challenge.
    • Can you help with asset tracking and endpoint visibility?
    • And what about anomaly detection after that?

Who attends

Job titles

CISO
Chief Information Officer
Sr. VP - Operational Risk, Fraud, BCP & Technology Risk
Senior Fraud Investigator
Chief Risk Officer
Regional Head of Information Security & Risk - Middle East
Senior IT Security Manager
Director of Information Security
Group CIO
Associate Director - PCI Compliance
Senior Exec IT Infrastructure
CISO & Information Security Head
Director - Information Security
Head of Information Security & IT Compliance
Senior Specialist - Critical Infrastructure Security
Group Head of Risk Management & Internal Audit
Manager, Security Operation Center
Director, Digital Transformation & Technology
Chief Technology Officer
Head of IT Security
Manager, Cyber Defence Centre
Fraud Operations Manager
CISO
Manager, Information Security Risk
Manager, Operational Risk
Director of IT Security
Head of IT
Manager, IT Security and Controls Assurance
Head of Information Security & Technology Risk
Director of Cybercrime Dept
CISO
Manager, Security Architecture & Compliance
Head of I.T. Security
Senior Manager, IT Security Operations
Head of IT Security Operations
Head of Regional Security & Fraud Risk
Group Information Security Officer
Head - Information Technology Risk Management & CISO
Senior IT Risk & Security Officer
Regional Fraud Prevention Manager
Group I.T. Compliance Manager
I.T. Security Manager
I.T. Manager - Network & Security
Head of Information Security
SVP - Head of Information & Physical Security
CISO/ IT Manager
Head of Information Technology
Director of Information Security Department
ICS Head of Security
CIO
Head Enterprise Risk Management
Director of IT Security and Infrastructure
ICT Director
Group Chief Security Officer
Manager SOC Operations
Head of Information Security Risk and Governance
Regional Compliance Head - MENA
Vice President, Chief Information Security Officer
Head of Cybersecurity Strategy
Head of Fraud Prevention
Group IT Security Manager
VP - Operational Security Group Head
Director of Information Technology
Head of Cyber Security
Head of IT Solutions & Delivery
Senior Computer Security Officer
National Head - Fraud & Operational Risk
CIO
Group ICT Manager
IT Compliance, Security and Architecture
Special Agent
Security Solutions Architect
PCI Project Manager
Group Chief Information Officer
Senior Manager, Enterprise Security
Head of Technology
Cyber-Crime and Digital Forensics Specialist
Regional Head Fraud Risk
Group Head of Systems and Monitoring
Director of IT Security Governance
IT Project Manager - Special Projects
IT Infrastructure Manager
Manager, IT Security and Networks
Vice President - Security Architecture
Group IT Infrastructure Manager
Zone CISO
Head of ICT Technical Security Services
Senior IT Security Architect
Chief Compliance and Information Security Head
Manager Security Operations Center
Manager I.T. Governance Risk Management
Associate Vice President – IT Security, Risk & Business Resilience
Chief Compliance Officer
Head of Information Security & Compliance
Group Head of IT
Application Security Officer
Project Manager, Cards & Channels, MENAP and AFRICA
Head of ICT
Chief Security Officer
AVP and Audit Manager - Technology
Senior Information Security Manager
Head of Compliance
IT Security Officer
Senior Director - Security Risk Management
Head of Fraud Risk Management
CISO
Vice President & Manager, IT Network
Head Fraud Investigations
Threat Intelligence Program Lead and Senior Manager Information Security Risk Team
Group Director of Information Security
Head of Business Information Security
Technology Deployment Manager
Senior Manager, Security Architect & IT Governance
Senior Manager Information Security
Regional IT/IS Manager - Middle East & Asia
Manager, Security Architecture
Senior I.T. Security Engineer
CTO
Head of IT Compliance & Security Architecture
VP & Head of Audit - Applications
Manager – Technology Risk & Security
Head of Threats and Intelligence
IT Manager Network and Security
VP - Risk & Governance and Information Risk
Manager of Information & Physical Security Governance
Group Chief Information Officer (CIO)
Senior Information Security Officer
Regional Head, Strategic Security Threats
Senior Network & Security Engineer
Group Leader - Vulnerability Management
Director, Information Security & Architecture
Manager - Information Security
Manager – IT Security,Group Risk Management
Chief Risk Officer
Chief Information Security Officer
IT Security Manager
IS Manager
Regional Director Information Technology Middle East
CISO
Head Operational Risk MENA
Group Head of I.T. & CISO
Head of SOC
SVP Specialist, Security Threat Intelligence
Group Chief Information Security Officer
CISO
Head of Information Security, UAE, Africa, Middle East & Pakistan
Head of e-Crime Unit
Security and Network Officer
Senior IT Security Engineer
Deputy CIO / CISO

Companies

Abu Dhabi Health Services Company (SEHA)
Barclays
Emirates Palace
Nokia
Daman Health
Abu Dhabi Police
AXA Insurance Gulf
Commercial Bank of Dubai
Atlantis the Palm
Abu Dhabi Department of Economic Development
Ministry of Economy UAE
GE Capital
Burjeel Hospital
Abu Dhabi National Insurance Company
Mashreq Bank
Hospitality Management Holdings
RAK Bank
Munich Re Syndicate
Merck Group
Statistics Department Abu Dhabi
Mobily
Du
United Arab Emirates Ministry of Labour
Union National Bank
Rotana Hotel Management Corporation
Consolidated Contractors Company (CCC)
United Arab Shipping Co
Etihad Airways
Standard Chartered Bank
Royal Jet Group
The Petroleum Institute
Al Tamimi & Co
Abu Dhabi Global Market (ADGM)
Nakheel
Emirates National Oil Company Limited (ENOC)
TIME Hotels
Wall Street Exchange
Herbert Smith Freehills LLP
Prestige Jet
Schlumberger
Ecobank
British American Tobacco
Abu Dhabi National Energy Company (TAQA)
American Express
Abu Dhabi Accountability Authority
Air Liquide
Emirates Nuclear Energy Corporation
RSA Insurance Group
Mubadala Development Company
MIG Holding
Sport360
Emirates Airlines
Honeywell
Petrofac Ltd
Citigroup
Tamweel
Abu Dhabi Finance
Department of Finance Abu Dhabi
Masdar Institute of Science and Technology
Mafraq Hospital
Emirates Investment Authority
Health Authority Abu Dhabi
Ajman Bank
Al Ghurair Group
Emarat - Emirates General Petroleum Corporation
Emirates NBD
Zayed University
Gulf Agency Company
Abu Dhabi Aviation
Abu Dhabi Airports Company
Abu Dhabi General Secretariat of the Executive Council
UAE Armed Forces
Intrum
Tatweer Petroleum
Network International
Crowne Plaza
Al Najah Education LLC
Al Masraf Bank
Emirates Group
Abu Dhabi Islamic Bank
Panasonic
First Abu Dhabi Bank
Gulf International Bank
Deyaar Development Co.
Ericsson
National Bank of Umm Al Qaiwain
Sky News Arabia
Emirates Islamic
Budenberg Middle East
ADNOC - Abu Dhabi National Oil Company
Ministry of Presidential Affairs
Abu Dhabi Terminals
Dunia Finance
ADNOC Gas Processing
Al Futtaim Group
Abu Dhabi Investment Authority
Damac Holding Company
Orient Exchange
National Corporation for Tourism & Hotels
Belhasa International
Moneygram International
Abu Dhabi Media
Arab Bank
Medtronic
Lulu Group International
Al Ansari Exchange
Aramex
Al Fardan Group
Cleveland Clinic Abu Dhabi
Emirates Investment Bank
National Bank of Fujairah
Central Bank of the UAE
Jumeirah Group
VPS Healthcare
DBA - Darwish Bin Ahmed & Sons
Global Development Group - GDG
LandMark Group
UAE Government
Al Ahalia Money Exchange Bureau
Baker Hughes
Commercial Bank International
Al Fahim Group
Abu Dhabi Commercial Bank
Muthoot Exchange
Dolphin Energy
Majid Al Futtaim Group
Ministry of Foreign Affairs - UAE
HSBC
UAE Exchange Centre
Habib Bank AG Zurich
Federal Authority for Identity and Citizenship
LUKOIL
Abu Dhabi Water & Electricity Authority
Sharjah Islamic Bank
MAN Truck & Bus Middle East
Federal Transport Authority UAE
Al Rostamani Group
Emaar Industries & Investments
Al Hilal Bank
Ahmed Seddiqi & Sons
Bird & Bird LLP
Watania
Etisalat Group
Western Union
Ministry of Interior UAE
DHL
Noor Bank
Vodafone
Starwood Hotels & Resorts
Union Insurance
Al Maryah Community Bank

Industries

Banking
Industrial Engineering
Industrial Engineering
Oil/Gas
Telecommunications
Banking
Banking
Banking
Media
Retail
Oil/Gas
Retail
National Law Enforcement
Banking
National Law Enforcement
Telecommunications
Retail
Electronic/Electrical Equipment
Insurance
Central Government
Banking
Healthcare
National Law Enforcement
Travel/Leisure/Hospitality
Media
Banking
Aerospace/Defence
Media
Insurance
Banking
Casinos/Gaming
Banking
Mining/Metals
Banking
Retail
Electronic/Electrical Equipment
Banking
Food/Beverage/Tobacco
Banking
Insurance
Banking
Household/Personal Products
Retail
Retail
Retail
Legal
Media
Banking
Charity
Casinos/Gaming
Software
Retail
Media
Retail
Banking
Automobiles/Parts
Banking
Banking
Central Government
Insurance
Central Government
Oil/Gas
Banking
Banking
Banking
Insurance
Banking
Media
Central Government
Retail
Media
Central Government
Healthcare Services
Banking
Food/Beverage/Tobacco
Insurance
Transportation/Shipping
Retail
National CERT
Transportation/Shipping
Legal
Insurance
Banking
Education
Banking
Retail
Transportation/Shipping
Charity
Banking
National Law Enforcement
Industrial Engineering
Industrial Engineering
Regional Law Enforcement
Transportation/Shipping
Transportation/Shipping
Telecommunications
Media
Transportation/Shipping
Banking


Venue

The St. Regis, Abu Dhabi

ABU

Location:

The St. Regis Abu Dhabi

Nation Tower, Corniche, Abu Dhabi, United Arab Emirates
Telephone: + 971 (2) 694 4444

Coordinates:

24.464006°N
54.328015°E


Description:

Boasting a landmark address on the Corniche, in the iconic Nation Towers, The St. Regis Abu Dhabi offers worldly refinement and timeless traditions just steps from the Federal National Council, Supreme Court, and prestigious corporate headquarters. Dedicated to uncompromised living, the hotel features 1,700 square meters of meeting space along with a pool and Rémede Spa.

Accommodation:

Please contact the venue for further information.


Directions:

Please click here