\"

Conference Day One: Sunday, 4 September 2016

08:15 AM - 08:35 AM Registration, refreshments and networking

08:35 AM - 08:45 AM Chair’s welcome and opening remarks

, ,

08:45 AM - 09:00 AM OPENING KEYNOTE SPEECH: Moving the banking industry to the next level of cyber security to continue matching global standards of banking security

Thabet Bakheet, Head of Information Security, Central Bank, UAE
  • Securing financial market infrastructures from cyber security threats
  • Defining regulatory framework based on priority of cyber prepardness for the country and the region
  • Combining smart banking techniques with the right level of cyber security protection controls

img

Thabet Bakheet

Head of Information Security
Central Bank, UAE

09:00 AM - 09:30 AM Securing the supply chain: An information security perspective

  • Customising the entity’s information security standards to establish an objective driven policy
  • 3rd party vendor management: What data to share and what not to share
  • Monitoring and ensuring continuous improvement of information security processes and controls

09:30 AM - 10:00 AM KEYNOTE SPEECH: Compliance versus standards versus effective implementation of P1, P2, P3 and P4 modules roadmap for nationalised banks in the UAE

  • Formulating security objectives and assessing exisiting IA gaps in the organisation
  • Building cyber security controls that aim to reduce exploited gaps during vulnerability and risk assessment
  • Meeting deadlines to develop and implement P2 and P3 controls with a pre-compliance audit to monitor performance

10:00 AM - 10:30 AM Networking coffee break and exhibition tour by VIP attendees

  • Insider threats: Deploying security controls to monitor sensitive information being leaked out of the organisation
  • Deploying perimeter cyber security technologies to ensure a unified visibility and control
  • Using dashboards to regularly monitor firewalls, IPs, web proxies and secured website content to provide the right level of security support for smart banking initiatives

img

Amrut Sugandh

Associate Vice President – Information Security Assurance
Emirates NBD, UAE
img

Dinesh O’Bareja

Chairman
Open Security Alliance, UAE
img

Mohit Saraswat

Senior Manager - IT Infrastructure, Projects & Security
Dubai Refreshments (Pepsi-DRC), UAE
img

Mahmoud Yassin

Manager Data Center, National Bank of Abu Dhabi
UAE

11:00 AM - 11:30 AM Intelligent GSOC modeling & zero-day exploitation scenarios to protect smart banking transactions from sophisticated malware and phishing attacks

Hariprasad Chede, Chief Information Security Officer, National Bank of Fujairah, UAE
  • Using threat monitoring and incident response capabilities to develop GSOC models for various Finntech technologies, smart card payments, electronic gateways, digital ID encryptions and mobile device management
  • Improving security intelligence reports derived from dayto- day IT operations and audits
  • Combining forensics with intelligence, threat monitoring tools and incident response capabilities to build zero-day scenario

img

Hariprasad Chede

Chief Information Security Officer
National Bank of Fujairah, UAE

11:30 AM - 12:00 PM Investigating the latest trends in DDoS, APT & AVT attacks to build early detection and rapid response systems

Amrut Sugandh, Associate Vice President – Information Security Assurance, Emirates NBD, UAE Yazad Khandhadia, Associate Vice President – Information Security, Emirates NBD, UAE
  • Identifying peak times for attacks to analyse high volume of attacks
  • Discusing case studies from across the world on DDoS responses
  • Reducing undetected breaches by implementing a multilayered approach to enhance data protection

img

Amrut Sugandh

Associate Vice President – Information Security Assurance
Emirates NBD, UAE
img

Yazad Khandhadia

Associate Vice President – Information Security
Emirates NBD, UAE

12:00 PM - 12:30 PM Prayer and coffee break

SECURITY OF SMART BANKING SERVICES

12:30 PM - 1:00 PM IDENTITY MANAGEMENT: Mobile device management and smart phone banking security

Hussain Al Khalsan, Deputy Head IT Risk & GRC, Commercial Bank of Dubai, UAE
  • Deploying strong cryptography and authentication mechanisms to protect customer data and transactions for smart banking apps using authentic identity access controls
  • Identifying sources of exploitation: Social media apps, location permissions, IMEI numbers, storage and controls, camera photos, texts, etc
  • Implementing a robust incident response plan and managing banking transactions on smart phones

img

Hussain Al Khalsan

Deputy Head IT Risk & GRC
Commercial Bank of Dubai, UAE

1:00 PM - 1:30 PM Developing cyber resilience across managed shared security services: How to cope up with the speed of smart innovations of banking products and services

Zafar Mir, Deputy Head of Information Security Risk, HSBC, UAE
  • Categorising IT systems resilience with the operational risks involved based on priority to criticality of data
  • Protecting entry points at every shared portfolio: Wealth, treasury and advisory services that can be integrated with the enterprise cyber security systems
  • Determining business process or technological failures by integrating operational risks with cyber security programmes

img

Zafar Mir

Deputy Head of Information Security Risk
HSBC, UAE

1:30 PM - 2:00 PM Securing the cyber space with Public-Private Partnership (PPP) to enhance information security

Dinesh O’Bareja, Chairman, Open Security Alliance, UAE Mohit Saraswat, Senior Manager - IT Infrastructure, Projects & Security, Dubai Refreshments (Pepsi-DRC), UAE
  • Exploring PPPs as a way of introducing private sector technology
  • Third party integration through a converged framework
  • Building a PPP governance model to set expectations between sharing the security services

img

Dinesh O’Bareja

Chairman
Open Security Alliance, UAE
img

Mohit Saraswat

Senior Manager - IT Infrastructure, Projects & Security
Dubai Refreshments (Pepsi-DRC), UAE

2:00 PM - 2:05 PM ROUNDTABLE SESSIONS

The following session will feature a series of interactive group discussions set in a roundtable format each for 15 minutes. There will be a maximum of 4-6 group leaders who will introduce a concept/case study to the participants followed by an interactive discussion and live feedback.

WHY PARTICIPATE?
Interactive group discussions are an excellent opportunity to get straight to the point and ask the questions that you want to know the answers to. The group format also facilitates an excellent opportunity for networking between industry professionals.

ROUNDTABLE A

2:05 PM - 3:00 PM Virtually monitoring plant security networks to monitor multiple attacks at one time

, ,

ROUNDTABLE B

2:05 PM - 3:00 PM Transforming DNS from a vulnerability into a strength for banks

ROUNDTABLE C

2:05 PM - 3:00 PM Assessing cyber risks of shared and outsourced services in banks

Mahmoud Yassin, Manager Data Center, National Bank of Abu Dhabi, UAE

img

Mahmoud Yassin

Manager Data Center, National Bank of Abu Dhabi
UAE

ROUNDTABLE D

2:05 PM - 3:00 PM Learning from cross-industry: Best practices in cyber security mechanisms

Mohit Saraswat, Senior Manager - IT Infrastructure, Projects & Security, Dubai Refreshments (Pepsi-DRC), UAE

img

Mohit Saraswat

Senior Manager - IT Infrastructure, Projects & Security
Dubai Refreshments (Pepsi-DRC), UAE

3:00 PM - 3:05 PM Closing remarks by the Chair

, ,

3:05 PM - 11:59 PM Networking break and end of conference day one