Agenda

We’ve got it all.

The agenda is specially curated to bring out the most pressing topics from the industry.

8:00 - 9:00

Registration

9:00 - 9:20

Securing Digital Egypt: Ramping Up Data and Cyber Capabilities for an Integrated and Secured Digital Society

  • Safeguarding the nation’s digital ecosystem through innovations in cybersecurity
  • Creating a robust cybersecurity policy to build a thriving digital economy
  • Steering the digital nation agenda with data protection and secured networks to protect its citizens and its own sovereignty

9:20 - 9:40

Safeguarding CI With Framework Based on Layered Vigilance and Readiness for a Resilient Egypt

  • Defending Critical Information Infrastructure Against Evolving Threats and Vulnerabilities
  • Expanding readiness and resilience with continued collaboration amongst key security agencies
  • Guiding elements of risk management: Identify, Protect, Detect, Respond & Recover

9:40 - 10:00

New-age Cyber Threats: Looking Beyond Traditional Security Approaches to Manage a Wide Range of Risks

  • Leveraging the best of cloud, artificial intelligence, and analytics to fend off cybercriminals
  • Detecting threats in real time to protect networks, data, devices and digital ecosystem
  • Why 5G, IoT, Cloud and 4IR technologies require new approaches to cybersecurity?

10:00 - 10:20

Zero Trust - The Vigilant Enterprise: Building a Suitable ZTA to Minimize the Attack Surface

  • What is the scope of a zero-trust initiative? How to inspect the security provided by “Never Trust, Always Verify” security model?
  • Identity system: How to address the most critical unit for a zero-trust security posture?
  • Convergence of AI and ML in zero trust model to learn and predict employee behavior

10:20 - 11:00

CISO
Panel

CISO Panel
Upgrading the Cybersecurity Stack and Collaboration to be Ahead in the Quest for Reliable & Resilient Security

  • Creating a simple and agile 360-degree security strategy to ensure comprehensive security
  • In a constantly shifting technological environment, leveraging the CISO leadership in enabling scalable, low-risk business frameworks to maximise enterprise protection
  • Accelerating collaboration and succinctly communicating top priorities for efficient and effective workplace order
bg

11:00 - 11:30

NETWORKING BREAK

11:30 - 11:50

Protecting Web Applications and APIs From a Rising Tide of Sophisticated Attacks

  • Implementing security strategy to protect WAAPs while expanding scope and security depth
  • Analyzing web transactions using a set of AI engines that operate simultaneously to protect against the most sophisticated attacks
  • Integrating automated intelligence to provide contextual threat analysis and superior protection

11:50 - 12:10

DevSecOps: Building an Effective Software and Open-Source Security Program to Minimize the Attack Surface

  • Enabling regulated testing since the beginning of the software evolution to avoid reckless cyber attacks
  • Will automating manual processes and integrating DevSecOps congruent tools into CI/CD delivery pipeline enhance workflow and deliver services efficiently?
  • Integrating SAST in the building stage to identify and prevent vulnerabilities from passing on to the further stages

12:10 - 12:30

Supply Chain Security: Securing the ITC Ecosystem from Code to Cloud

  • Gathering effective and practicable input into supplier risk assessments to determine risk
  • Implementing lifecycle management to mitigate and assess security threats
  • Enforcing encryption practices at the interface of third-party integrations

12:30 - 12:50

Addressing New Cyber Threats with the Confluence of AI and ML in Building a Cybersecure Future

  • AI helps in shaping the future of cybersecurity and contributes enormously to making minimal human errors, but how trustworthy and reliable are they?
  • IIntelligent Security: How can AI become the strongest cybersecurity ally in an already convoluted world?
  • Addressing the challenges in the convergence of AI, ML and Security

12:50 - 13:10

Stranger Things: Scratching the Surface of the Dark Web and Equipping to Deal with Ambiguous Risks

  • Is Dark Web monitoring and scanning service worth it?
  • Leveraging external threat hunting and CTI to prevent cyber attacks
  • Using dark web to gain an advantage over your adversaries
bg

13:10 - 14:00

LUNCH BREAK

14:00 - 14:40

Panel
Discussion

Panel Discussion
Cyber Secure Cloud - Protecting Cloud Data, Applications and Infrastructure from Threats

  • Understanding the challenges in establishing a regulatory compliance management system for enterprises using public or hybrid cloud deployments
  • Enhancing visibility into data through various controls - Data classification, DLP & Encryption
  • Discussing different levels of cloud security - SaaS, PaaS & IaaS

14:40 - 15:00

Cloud Security Framework: Fortifying the Dynamic Cloud Environment to Address the Evolving Challenges & Risks

  • Rethinking network security in the flourishing age of cloud services
  • How will security, risk control and compliance impact cloud adoption?
  • Emphasizing on the growing challenge of securing sensitive data with the rise of Data Breach

15:00 - 15:20

Breaking the Cyber Kill Chain - The Importance of Endpoint Security

  • Securing endpoints or entry points of end-user devices from being exploited by malicious actors and campaigns
  • Enhancing endpoint security as it's cybersecurity's frontline and represents one of the first places organizations look to secure their enterprise networks
  • Providing comprehensive protection from sophisticated malware and evolving zero-day threats

15:20 - 15:40

DFIR | Digital Forensics and Incident Response: Streamlining the process to Safeguard the Network

  • Investigating and evaluating incidents to respond with speed and precision
  • Recovering from security events quickly and with limited disruption to business operations
  • Leveraging emerging technology to help shape and strengthen preventative security measures

15:40 - 16:00

Social Engineering Prevention: Mitigating the Mounting Cyber Attacks

  • Securing the passwords- Being vigilant and enabling multifactor authentication to ensure account protection
  • How to strengthen the most common attack layer - Workforce?
  • How to detect and identify the extent of the attack to significantly decrease the associated risk and lost productivity?
bg

16:00 - 16:30

Networking Break
& end of Day 1

8:00 - 9:00

Registration

9:00 - 9:20

Redefining the Security Culture in Egypt for a Safe & Secure Digital Infrastructure

  • Challenges in building a sustainable security culture in Egypt
  • Aligning organizational determinants and individual determinants of culture to manifest a cyber secure conscious behavior
  • Identify and prioritize objectives for building a national culture of cybersecurity

9:20 - 9:40

Boosting Cyber Capacity Building to Strengthen the Regional Cyber Ecosystem

  • With mounting reliance on internet and ICT services, how will security in cyber space impact good governance, human rights & economic freedom?
  • Developing collective capabilities and facilitating international cooperation and partnership to effectively respond to the cyber threats in the digital age
  • Emphasizing the relevance of going beyond technical issues and sharing cyber secure best practices at the international level

9:40 - 10:00

Digital Identity for Everyone: Delivering a Secure Future We Can All Trust

  • Securing the proof of identity and authentication with controlled access and encrypted data
  • Identity of Things: Ensuring data confidentiality and integrity at the source as well as for the user
  • Convergence of IAM and Privileged Access Management to secure access to systems and data

10:00 - 10:20

Combating the Weaponization of Deepfakes, Identity Fraud, Disinformation and Ever-expanding Arsenal of Malicious Software

  • You thought disinformation was harmful? Deepfakes is where truth goes to die
  • Protecting Information: start with what you must safeguard and how you must safeguard it
  • Employing automated technologies that identify and analyze your digital footprint

10:20 - 11:00

Panel
Discussion

Panel Discussion
DMulti-Vector Attack - Fortifying Security Edges of a Growing Digital Landscape

  • Understanding the various entry points used by hackers to infiltrate a network
  • Use of quality threat intelligence to mitigate damaging events in an organizational cyberspace
  • Securing the internal and external perimeters and verifying every entry point before granting access
bg

11:00 - 11:30

NETWORKING BREAK

11:30 - 11:50

Amplifying Resilience Against Complex DDoS Threats With Multi-layered Defense Approach

  • Defending your business from blended, sophisticated, multi-vector attacks
  • Managing and deflecting malicious automated targeting of web-facing assets from myriad threats
  • Ensuring network protection from remote botnet infestation that can customize attacks

11:50 - 12:10

Digital Forensics: Leveraging the Power of Threat Intelligence in Recovery and Cyber Investigation

  • With anti-forensics growing powerful, can digital forensics framework ensure user privacy?
  • Focus on cloud forensics with digital transformation pacing up
  • Addressing the factors affecting the integrity and credibility of the digital forensics process - easy implementation, low cost, and the availability of encryption tools

12:10 - 12:30

Security at the Intersection of IoT and 5G: Building a Cyber Safe Connected Nation

  • Discussing the rise in need to encrypt and protect 5G network traffic to avoid endpoint vulnerabilities
  • Addressing the necessity to secure vulnerable cellular-connected devices from the unique threats faced by IoT devices on cellular networks
  • Strengthening IoT security: Only way forward to a secure connected world

12:30 - 12:50

CyberAgility: Incorporating an Agile and Robust Security Strategy to Maximize Value Delivery

  • Employing a company-wide recovery plan which serves as a lifesaver for different attack scenarios
  • Creating a cyber vault as a backup system by crypto locking the vault storage
  • Analyzing the security gaps in the network and taking prompt measures to bridge and strengthen the system

12:50 - 13:10

Securing the Pocket Device: Protecting the Critical Mobile Device from Data Thefts

  • How safe is public Wi-Fi access? Is it truly free or is the free access traded with personal data theft?
  • Understanding the various threat actors in mobile devices - Credential Stuffing, Brute Forcing and Guessing Attacks
  • How to protect mobile devices from the rigorous phishing attacks?
bg

13:10 - 14:00

LUNCH BREAK

14:00 - 14:40

Panel
Discussion

Panel Discussion
Evolving Ransomware Landscape - Ceasing Data Exfiltration and Preventing the Thriving Threat

  • Addressing the vulnerabilities in the system that allow the attackers to penetrate successfully
  • How to use deception-based model to identify the earliest attack stage?
  • How to mitigate user-initiated actions? Categorizing the data based on organizational value

14:40 - 15:00

Implementing Information Security Governance and Risk Management to Protect the Digital Enterprises

  • Assuring the continuous operation of Egypt's critical infostructures, public and military networks
  • Implementing cyber resiliency measures to enhance the country's ability to respond to threats before, during and after the attacks
  • Adopting an effective coordination with law enforcement agencies while creating a cybersecurity educated society
bg

15:00 - 16:30

Networking Break
& end of Day 2