
Agenda
We’ve got it all.
The agenda is specially curated to bring out the most pressing topics from the industry.
8:00 - 9:00
Registration
9:00 - 9:20
Securing Digital Egypt: Ramping Up Data and Cyber Capabilities for an Integrated and Secured Digital Society
- Safeguarding the nation’s digital ecosystem through innovations in cybersecurity
- Creating a robust cybersecurity policy to build a thriving digital economy
- Steering the digital nation agenda with data protection and secured networks to protect its citizens and its own sovereignty
9:20 - 9:40
Safeguarding CI With Framework Based on Layered Vigilance and Readiness for a Resilient Egypt
- Defending Critical Information Infrastructure Against Evolving Threats and Vulnerabilities
- Expanding readiness and resilience with continued collaboration amongst key security agencies
- Guiding elements of risk management: Identify, Protect, Detect, Respond & Recover
9:40 - 10:00
New-age Cyber Threats: Looking Beyond Traditional Security Approaches to Manage a Wide Range of Risks
- Leveraging the best of cloud, artificial intelligence, and analytics to fend off cybercriminals
- Detecting threats in real time to protect networks, data, devices and digital ecosystem
- Why 5G, IoT, Cloud and 4IR technologies require new approaches to cybersecurity?
10:00 - 10:20
Zero Trust - The Vigilant Enterprise: Building a Suitable ZTA to Minimize the Attack Surface
- What is the scope of a zero-trust initiative? How to inspect the security provided by “Never Trust, Always Verify” security model?
- Identity system: How to address the most critical unit for a zero-trust security posture?
- Convergence of AI and ML in zero trust model to learn and predict employee behavior
10:20 - 11:00
CISO
Panel
CISO Panel
Upgrading the Cybersecurity Stack and Collaboration to be Ahead in the Quest for Reliable & Resilient Security
- Creating a simple and agile 360-degree security strategy to ensure comprehensive security
- In a constantly shifting technological environment, leveraging the CISO leadership in enabling scalable, low-risk business frameworks to maximise enterprise protection
- Accelerating collaboration and succinctly communicating top priorities for efficient and effective workplace order

11:00 - 11:30
NETWORKING BREAK
11:30 - 11:50
Protecting Web Applications and APIs From a Rising Tide of Sophisticated Attacks
- Implementing security strategy to protect WAAPs while expanding scope and security depth
- Analyzing web transactions using a set of AI engines that operate simultaneously to protect against the most sophisticated attacks
- Integrating automated intelligence to provide contextual threat analysis and superior protection
11:50 - 12:10
DevSecOps: Building an Effective Software and Open-Source Security Program to Minimize the Attack Surface
- Enabling regulated testing since the beginning of the software evolution to avoid reckless cyber attacks
- Will automating manual processes and integrating DevSecOps congruent tools into CI/CD delivery pipeline enhance workflow and deliver services efficiently?
- Integrating SAST in the building stage to identify and prevent vulnerabilities from passing on to the further stages
12:10 - 12:30
Supply Chain Security: Securing the ITC Ecosystem from Code to Cloud
- Gathering effective and practicable input into supplier risk assessments to determine risk
- Implementing lifecycle management to mitigate and assess security threats
- Enforcing encryption practices at the interface of third-party integrations
12:30 - 12:50
Addressing New Cyber Threats with the Confluence of AI and ML in Building a Cybersecure Future
- AI helps in shaping the future of cybersecurity and contributes enormously to making minimal human errors, but how trustworthy and reliable are they?
- IIntelligent Security: How can AI become the strongest cybersecurity ally in an already convoluted world?
- Addressing the challenges in the convergence of AI, ML and Security
12:50 - 13:10
Stranger Things: Scratching the Surface of the Dark Web and Equipping to Deal with Ambiguous Risks
- Is Dark Web monitoring and scanning service worth it?
- Leveraging external threat hunting and CTI to prevent cyber attacks
- Using dark web to gain an advantage over your adversaries

13:10 - 14:00
LUNCH BREAK
14:00 - 14:40
Panel
Discussion
Panel Discussion
Cyber Secure Cloud - Protecting Cloud Data, Applications and Infrastructure from Threats
- Understanding the challenges in establishing a regulatory compliance management system for enterprises using public or hybrid cloud deployments
- Enhancing visibility into data through various controls - Data classification, DLP & Encryption
- Discussing different levels of cloud security - SaaS, PaaS & IaaS
14:40 - 15:00
Cloud Security Framework: Fortifying the Dynamic Cloud Environment to Address the Evolving Challenges & Risks
- Rethinking network security in the flourishing age of cloud services
- How will security, risk control and compliance impact cloud adoption?
- Emphasizing on the growing challenge of securing sensitive data with the rise of Data Breach
15:00 - 15:20
Breaking the Cyber Kill Chain - The Importance of Endpoint Security
- Securing endpoints or entry points of end-user devices from being exploited by malicious actors and campaigns
- Enhancing endpoint security as it's cybersecurity's frontline and represents one of the first places organizations look to secure their enterprise networks
- Providing comprehensive protection from sophisticated malware and evolving zero-day threats
15:20 - 15:40
DFIR | Digital Forensics and Incident Response: Streamlining the process to Safeguard the Network
- Investigating and evaluating incidents to respond with speed and precision
- Recovering from security events quickly and with limited disruption to business operations
- Leveraging emerging technology to help shape and strengthen preventative security measures
15:40 - 16:00
Social Engineering Prevention: Mitigating the Mounting Cyber Attacks
- Securing the passwords- Being vigilant and enabling multifactor authentication to ensure account protection
- How to strengthen the most common attack layer - Workforce?
- How to detect and identify the extent of the attack to significantly decrease the associated risk and lost productivity?

16:00 - 16:30
Networking Break
& end of Day 1
8:00 - 9:00
Registration
9:00 - 9:20
Redefining the Security Culture in Egypt for a Safe & Secure Digital Infrastructure
- Challenges in building a sustainable security culture in Egypt
- Aligning organizational determinants and individual determinants of culture to manifest a cyber secure conscious behavior
- Identify and prioritize objectives for building a national culture of cybersecurity
9:20 - 9:40
Boosting Cyber Capacity Building to Strengthen the Regional Cyber Ecosystem
- With mounting reliance on internet and ICT services, how will security in cyber space impact good governance, human rights & economic freedom?
- Developing collective capabilities and facilitating international cooperation and partnership to effectively respond to the cyber threats in the digital age
- Emphasizing the relevance of going beyond technical issues and sharing cyber secure best practices at the international level
9:40 - 10:00
Digital Identity for Everyone: Delivering a Secure Future We Can All Trust
- Securing the proof of identity and authentication with controlled access and encrypted data
- Identity of Things: Ensuring data confidentiality and integrity at the source as well as for the user
- Convergence of IAM and Privileged Access Management to secure access to systems and data
10:00 - 10:20
Combating the Weaponization of Deepfakes, Identity Fraud, Disinformation and Ever-expanding Arsenal of Malicious Software
- You thought disinformation was harmful? Deepfakes is where truth goes to die
- Protecting Information: start with what you must safeguard and how you must safeguard it
- Employing automated technologies that identify and analyze your digital footprint
10:20 - 11:00
Panel
Discussion
Panel Discussion
DMulti-Vector Attack - Fortifying Security Edges of a Growing Digital Landscape
- Understanding the various entry points used by hackers to infiltrate a network
- Use of quality threat intelligence to mitigate damaging events in an organizational cyberspace
- Securing the internal and external perimeters and verifying every entry point before granting access

11:00 - 11:30
NETWORKING BREAK
11:30 - 11:50
Amplifying Resilience Against Complex DDoS Threats With Multi-layered Defense Approach
- Defending your business from blended, sophisticated, multi-vector attacks
- Managing and deflecting malicious automated targeting of web-facing assets from myriad threats
- Ensuring network protection from remote botnet infestation that can customize attacks
11:50 - 12:10
Digital Forensics: Leveraging the Power of Threat Intelligence in Recovery and Cyber Investigation
- With anti-forensics growing powerful, can digital forensics framework ensure user privacy?
- Focus on cloud forensics with digital transformation pacing up
- Addressing the factors affecting the integrity and credibility of the digital forensics process - easy implementation, low cost, and the availability of encryption tools
12:10 - 12:30
Security at the Intersection of IoT and 5G: Building a Cyber Safe Connected Nation
- Discussing the rise in need to encrypt and protect 5G network traffic to avoid endpoint vulnerabilities
- Addressing the necessity to secure vulnerable cellular-connected devices from the unique threats faced by IoT devices on cellular networks
- Strengthening IoT security: Only way forward to a secure connected world
12:30 - 12:50
CyberAgility: Incorporating an Agile and Robust Security Strategy to Maximize Value Delivery
- Employing a company-wide recovery plan which serves as a lifesaver for different attack scenarios
- Creating a cyber vault as a backup system by crypto locking the vault storage
- Analyzing the security gaps in the network and taking prompt measures to bridge and strengthen the system
12:50 - 13:10
Securing the Pocket Device: Protecting the Critical Mobile Device from Data Thefts
- How safe is public Wi-Fi access? Is it truly free or is the free access traded with personal data theft?
- Understanding the various threat actors in mobile devices - Credential Stuffing, Brute Forcing and Guessing Attacks
- How to protect mobile devices from the rigorous phishing attacks?

13:10 - 14:00
LUNCH BREAK
14:00 - 14:40
Panel
Discussion
Panel Discussion
Evolving Ransomware Landscape - Ceasing Data Exfiltration and Preventing the Thriving Threat
- Addressing the vulnerabilities in the system that allow the attackers to penetrate successfully
- How to use deception-based model to identify the earliest attack stage?
- How to mitigate user-initiated actions? Categorizing the data based on organizational value
14:40 - 15:00
Implementing Information Security Governance and Risk Management to Protect the Digital Enterprises
- Assuring the continuous operation of Egypt's critical infostructures, public and military networks
- Implementing cyber resiliency measures to enhance the country's ability to respond to threats before, during and after the attacks
- Adopting an effective coordination with law enforcement agencies while creating a cybersecurity educated society

15:00 - 16:30