Under the patronage of H.H. Sheikh Hazza Bin Zayed Al Nahyan, Deputy Chairman of Abu Dhabi Executive Council

International Exhibition for National Security & Resilience (ISNR)

reg
Organised BY Reed Exhibition
Please Contact Nehme Shehab Group Sales Director +971 2 409 0346 nehme.shehab@reedexpo.ae
Please Contact Nehme Shehab Group Sales Director +971 2 409 0346 nehme.shehab@reedexpo.ae

We sell defence and intelligence related equipment and we wanted to meet officials. Our local contact said that we have to go to ISNR to do that. We were very happy with the show because we met the people we were looking for

Bull SAS, France
FEATURED EXHIBITOR

Infosecurity Middle East 2016 Workshop Programme

Infosecurity Middle East 2016 Workshop By (ISC)2
Workshop Programme
March 15 – 17, 2016 (Tuesday, Wednesday & Thursday)
Tuesday March 15 PM
Risk and Governance (Part 1)
Speaker: Muntaser Bdair
14:00 – 14:45 Session 1: Security Governance Principles
Delegates will learn how to align security functions to strategy, goals, mission and objectives of the business as well as define organizational processes, security roles and responsibilities and understand control frameworks.
15:00 – 15:45 Session 2: Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines
•  This session will cover :
    • Organization Policies
    • Practical Implementation of Procedures, Standards, and Guidelines
    • Personnel Security Policies
Wednesday March 16
Cloud Security
Speaker: Peter van Eijk
10:00 – 10:45 Session 1: Cloud Computing and cloud security
As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced professionals equipped with the right cloud security knowledge and skills to be successful. This session will provide a brief introduction to cloud computing and why it requires new attention to security, governance and risk management. The focus is on useful applications of cloud computing and generic cloud risks. We will also present the CSSP certification scheme for cloud security backed by the two leading non-profits focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)2.
11:00 – 11:45 Session 2: Data security in the cloud
In the CCSP certification a substantial amount of attention is given to security from the data perspective. We will discuss the relevance of the data perspective and hint at some of the approaches that are touched upon in the CCSP certification. This includes the data lifecycle model, and encryption at multiple layers of abstraction.
14:00 – 14:45 Session 3: Infrastructure security in the cloud
Infrastructure security was traditionally the focus area of IT Security. While it is no longer sufficient, it is more than ever required. Significant changes in approach are necessary. In this session, we will highlight cloud infrastructure components such as virtualization controls and automation, existing threats, and mitigating and developing plans to deal with those threats.
15:00 – 15:45 Session 4: Cloud, the legal and compliance perspective
Cloud computing is a form of IT outsourcing, very often crossing national borders. Together these two characteristics create a complicated legal and compliance environment in which cloud deployments will have to be considered. This session will cover the main challenges concerning compliance with regulatory frameworks and requirements to address these issues.
Thursday March 17 AM
Risk and Governance (Part 2)
Speaker: Muntaser Bdair
10:00 – 10:45 Session 1: Risk Assessment and Management
This session will highlight risk assessment frameworks and methodology, and will cover the effectiveness of assessment methods mainly vulnerability assessment, penetration testing and application security testing.
11:00 – 11:45 Session 2: Business Continuity & Awareness Programs Requirements
•  In this session, delegates will learn how to develop and document project scope and plan for Business Continuity requirements and conduct a business impact analysis. Delegates will also learn how to establish and manage security education, training and awareness.

 

Networking Lunch
17 March, 12:30–14:00
(ISC)² Workshop Area

(ISC)² is inviting all members and professionals to a networking lunch at Infosecurity Middle East. This is a great opportunity for you to network and discuss the latest cybersecurity trends, while enjoying complimentary lunch and refreshments.