Agenda
Presentations already confirmed include:
►Quantum Computing and the Future of Security: HSBC's Strategy to Combat Emerging Threats
Philip Intallura, Group Head of Quantum Technologies, HSBC
- Discover the fundamentals of quantum computing and why HSBC is investing in it for enhanced security and innovation
- Examine the potential risks quantum computing poses to existing cryptographic systems
- Explore HSBC's initiatives in cryptographic inventory, Post-Quantum Cryptography (PQC), and Quantum Key Distribution (QKD) to ensure quantum safety
►Rebooting the CISO Role: Embracing Agility and Resilience
Olivier Busolini, Group CISO, Mashreq Bank
- Transitioning from traditional risk management to proactive business enabling
- Fostering a resilient, security-focused organizational culture
- Democratising decision-making to empower cross-functional collaboration
- Optimising security architecture for agility in an AI-driven era
►Panel Discussion: Securing Future Architectures
Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England (moderator
Rajesh Yadla, Head of Information Security, Leading Digital Bank
Bader Zyoud, Head of Information Security Governance and Risk Management, Abu Dhabi Media
Vijay Antony Velayutham, Principal Information Security Officer, UAE Ministry of Energy & Infrastructure
- How can security teams design resilient architectures to integrate and leverage emerging technologies such as AI, quantum computing, and IoT?
- What role does AI play in developing proactive rather than reactive security strategies?
- What are the best practices for integrating AI without disrupting legacy systems and existing workflows?
- How can organisations implement zero-trust principles and adaptive access controls to secure ever-evolving environments driven by AI and edge computing?
►Ransomware 3.0: Weaponizing AI for the Next Generation of Ransomware Attacks
Manit Sahib, Ethical Hacker & Former Head of Penetration Testing & Red Teaming, Bank of England
- LIVE DEMO - Inside the first AI-powered ransomware attack — See how my custom Agentic Ransomware Gang can take down a network in under 8 mins
- Firsthand insights from real-world red team ops — from legacy tech and broken access controls to the critical lack of real-world security testing
- Why traditional security fails — compliance checklists and conventional tools don’t stop modern ransomware
- What CISOs and security leaders must do now — real-world, field-tested steps to prove your controls work before attackers do it for you
►Cyber Security Horizon scan in the UAE
Hussein Bahgat, Group CISO, Abu Dhabi Islamic Bank
- Major Factors contributing to Cyber security Threats in the UAE
- Cyber Threat landscape multipliers : Scope , Speed and Scale.
- Cyber Threat Impact on People , process and technology
- Scanning the horizon : what can be done ?
- Case Example : FSIs in UAE and how we created a roadmap for Cyber horizon risk
►Fireside chat: Strengthening Business Resilience Through Proactive Threat Intelligence
Ben Kite, Defence, Security and Cyber Adviser, Kearney
Hani Bani Amer, Head of Information Security, Al Etihad Payments
Khaled Al Teneiji, Cybersecurity Head, ENOC
- Turning complex data into clear, actionable threat insights to support strategic decisions
- Using threat intelligence to anticipate and mitigate risks before they disrupt business operations
- Embedding cyber intelligence into broader operational resilience and risk management ecosystems
- Enhancing cross-functional collaboration by aligning threat intelligence with enterprise risk priorities
►How Delinea assists in reducing Identity related cybercrimes
Omar Samhouri, Senior Sales Engineer, Delinea
The landscape of existing PAM solutions
Switch from traditional PAM to a modern Identity-centric solution
Reducing attack surface across the organization
The use of AI in identity security
Education seminars
Vulnerability remediation and patching - The real challenge
Minas Awakian, Managing Director, MEInfoSEC
Here are some of the questions our customers had before implementing DarkSight:
Are you having challenges remediating vulnerabilities discovered in your VA reports(Specifically configuration Vulnerabilities)? Does your VA report include a lot of false positives that repetitively appear in every monthly report? Are you truly convinced that your 3rd party application vulnerabilities are detected and remediated in a timely manner?
We believe a healthy vulnerability management system needs the following:
1. A complete and comprehensive VA assessment - partial results have no value
2. A Solution which is flexible enough to accommodate your infrastructure needs
3. An Excellent support contract, to help you in a timely manner.
Join our session and share your thought and challenges with us and we will share with you our best practice.
Securing Data Flow for the Next Wave of the AI Era
Kousain Raza, Senior Solutions Engineer, Netskope
Sensitive data movement is often seen as a risk, but restricting it outright can create operational and security challenges. In an era of agentic AI and generative AI, organisations need security frameworks that protect data while ensuring agility. This session explores how modern security platforms enable secure data flow, adapt to diverse use cases, and prepare for the shift to an AI future.
Attendees will learn:
How to enable data flows without introducing escalating security risks
How to choose the right secure access method for each use case
Why security must be adaptive to risk, user behaviour, and AI-driven interactions
The Overlooked Risk: Why DNS is the New Frontline in Cyber Defence
Ahmed Faragallah, Solutions Architect, Infoblox
"The Overlooked Risk: Why DNS is the New Frontline in Cyber Defence" highlights how the Domain Name System (DNS), the essential service that translates network names into IP addresses, has become a critical target and entry point for modern cyber threats. unprotected DNS can undermine the entire security stack. Implementing robust DNS security, including real-time monitoring and threat intelligence integration, elevates DNS from a basic resolver to an active line of early threat detection and prevention.
Attendees will learn:
Understand the anatomy of zero-day DNS threats and how they bypass conventional security layers
Discover how to leverage AI-driven analytics to detect malicious domains in real time
Learn best practices for implementing proactive domain monitoring and threat intelligence