3rd Annual CISO Round Table

13
THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON INFORMATION SECURITY & ICT IN THE MIDDLE EAST 3 rd Annual Chief Information Security Officer Middle East Summit & Roundtable 2011 31 st January ~ 2 nd February 2011 - Habtoor Grand Resort Hotel & Spa Jumeirah Beach , Dubai United Arab Emirates 2011 – , CISO MIDDLE EAST SUMMIT & ROUNDTABLE DUBAI THE UNITED ARAB EMIRATES Firmly established as the Middle East’s premier event for thought-leaders & practitioners in information security, cyber security & IT risk assurance, MIS Training Institute is delighted to announce that the 3 rd 2011 Annual CISO Middle East Summit & Roundtable will take place in , Dubai UAE , 31 st - 2 January nd 2011 February . This unique event will bring together business & government to share direct experience, best practice in threat response & regional professionalism in information security. The simple objective being: to stay one step ahead of rapidly changing business environments on key issues impacting heads of ICT and information security specifically within the Middle East. Predict change and better plan your strategy on challenges such as: Regional solutions tied into regional & global information security risk management needs & best practice! Securing mobility solutions , Planning prevention & response to data breaches Identity & access management and associated social networking threats Lawful interception & digital espionage - Capex utilisation maximising information security cost efficiency & measuring return on security investment Emerging national cyber threats Cloud security roundtable discussion - ? Risk based approach to data security how has risk changed in the global financial crisis fall out Managing reputational risk Achieving integrated information security governance EVENT BACKGROUND Last year MIS were honoured to host the 2 nd CISO Middle East Summit under the official patronage of ITA Oman / e.oman. Opened by Dr. Salim Sultan Al Ruzaiqi, Chief Executive Officer of ITA, the event was a key part of the national initiative to launch ‘e.oman’ as the pioneering nation in e-services and security within the Middle East, and internationally. In addition to the 3 Confirmed Sponsors for rd 2011 – , Annual CISO Summit Middle East Dubai The United Arab Emirates : Mobile Security Sponsor : Gold Sponsor : CISO Roundtable Sponsor

description

I am speaking at the third annual CISO Round Table Conference to be held in Dubai in February 2011.

Transcript of 3rd Annual CISO Round Table

Page 1: 3rd Annual CISO Round Table

THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON

…INFORMATION SECURITY & ICT IN THE MIDDLE EAST

3rd Annual

Chief Information Security Officer Middle East

Summit & Roundtable 201131st January ~ 2nd February 2011

- Habtoor Grand Resort Hotel & Spa Jumeirah Beach

, Dubai United Arab Emirates

2011 – , …CISO MIDDLE EAST SUMMIT & ROUNDTABLE DUBAI THE UNITED ARAB EMIRATES

Firmly established as the Middle East’s premier event for thought-leaders & practitioners in information security, cyber security & IT risk assurance, MIS Training Institute is delighted to

announce that the 3rd 2011 Annual CISO Middle East Summit & Roundtable will take place in , Dubai UAE, 31 st

- 2January nd 2011February . This unique event will bring together business & government to share

direct experience, best practice in threat response & regional professionalism in information security. The simple objective being: to stay one step ahead of rapidly changing business environments on key issues impacting heads of ICT and information security specifically within the Middle East. Predict change and better plan your strategy on challenges such as: Regional solutions tied into regional & global information security risk management needs & best practice!

Securing mobility solutions

, Planning prevention & response to data breaches

Identity & access management and associated social networking threats

Lawful interception & digital espionage

- Capex utilisation maximising information security cost efficiency & measuring return on security investment

Emerging national cyber threats

Cloud security roundtable discussion

– - ? Risk based approach to data security how has risk changed in the global financial crisis fall out Managing reputational risk

Achieving integrated information security governance

…EVENT BACKGROUND

Last year MIS were honoured to host the 2nd CISO Middle East Summit under the official patronage of ITA Oman / e.oman. Opened by Dr. Salim Sultan Al Ruzaiqi, Chief Executive Officer of ITA, the event was a key part of the national initiative to launch ‘e.oman’ as the pioneering nation in e-services and security within the Middle East, and internationally. In addition to the

3Confirmed Sponsors for rd 2011 – , …Annual CISO Summit Middle East Dubai The United Arab Emirates

:Mobile Security Sponsor :Gold Sponsor : CISO Roundtable Sponsor

Page 2: 3rd Annual CISO Round Table

THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON

…INFORMATION SECURITY & ICT IN THE MIDDLE EAST

numerous Information Security and ICT Directors attending the summit from business sectors across the Middle East, the event was also attended by numerous security directors and VIPS from across Business Sectors, Ministries of Defence, Police Forces, the Royal Navy, Central Banks and Directors from CERTS in Oman and across the Middle East. This year, the Opening Keynote Speech will be made by: . Eng Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency

( ). Response Team aeCERT Practitioner and thought leadership sessions will provide pragmatic and

cost-effective advice to address the inherent vulnerabilities within processes, people & technologies. The interactive CISO Middle East Roundtable held under the Chatham House Rule on

Wednesday 2nd February provides executives with the ideal opportunity to benchmark security strategy against peers and thought leaders globally.

2011 …CONFIRMED SPEAKERS FOR INCLUDE

Keynote by: • . Eng Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency Response Team of The

Telecommunications Regulatory Authority (TRA) - The United Arab Emirates

:International Speaker Panel includes

• . . ' ,Mr Dino C Dell Accio Chief Auditor for Information and Communications Management, , United Nations Secretariat New – . .York Headquarters U S

• . Mr Scott Totzke, VP, BlackBerry Security Group

• , Ray Stanton Global Head of Business Continuity, Security & Governance Practice, British Telecom

• . Mr Chetan Gor, Regional Head of Information Security - Middle East, – HSBC Bank Middle East Limited UAE

• . , Mr Marcus Alldrick Chief Information Security Officer & Senior Manager, Information Risk and Protection, ' Lloyd s

• . , Mr Richard Lingard Head of IT Risk EMEA, - Credit Suisse UK

• . , Mr Kim Aarenstrup Chief Information Security Officer, . . - / A P Moller Maersk A S & Chairman, Information Security ( ) - Forum ISF Denmark

• . Mr David Cripps, Chief Information Security Officer, Investec

• . . , Mr Charles V Pask Managing Director, ITSEC Associates Ltd

• , Vinoth Sivasubramanian Project Manager-IT Department, . . .UAE Exchange Centre L L C

• . , Mr Eddie Schwartz Chief Security Officer, - . .NetWitness Corporation U S

• Dr Sally Leivesley , Managing Director, – Newrisk Limited UK

• . Dr Eduardo Gelbstein, Adjunct Professor, , , Webster University Geneva Former Advisor, UN Board of Auditors and Former

Director, – UN International Computing Centre Switzerland

… EVENT OBJECTIVES

Develop further talent to grow Emirati professional capability and regional professionalism in

information security, ICT and cyber assurance through exposure to international information security best practices

Stay one step ahead of rapidly changing business environments –

o capital expenditure utilisation & ensuring maximum efficiency on your security investments!

3Confirmed Sponsors for rd 2011 – , …Annual CISO Summit Middle East Dubai The United Arab Emirates

:Mobile Security Sponsor :Gold Sponsor : CISO Roundtable Sponsor

Page 3: 3rd Annual CISO Round Table

THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON

…INFORMATION SECURITY & ICT IN THE MIDDLE EAST

o securing mobility solutionso preventing data breacheso identity and access managemento social networkingo lawful interception, lawful interception & digital espionageo emerging national cyber threats…

Introduce information security directors & experts from around the world for benchmarking purposes & for

participants to EXPAND valuable, trust based contacts within the information security community – regionally & internationally

CAPITAL EXPENDITURE UTILISATION -& information security E nsure that you are achieving maximum efficiency . out of your information security solutions & services Ensure that infosec remains integral to the core business as a service

based model: linking with internal & external customers & building teams that return money to

business lines Provide ultimate assurance on managing the latest threats day to day & prepare for the future – are you

missing any tricks on how to manage the latest cyber security threats & data leakage - especially through periods of extensive change & development?

Learn lessons from proven new case studies, hear inspiring keynotes, participate in panel debates &

roundtables that will probe the information security role - Provide cutting edge discussion for CISOs with like minded peers at the CISO Roundtable Middle East 2011 –

held under The Chatham House Rule

2009 TESTIMONIALS FROM CISO EXECUTIVE SUMMIT MIDDLE EAST

o “Streamlined and strengthened my existing thoughts & skills”o “Great to have get answers to questions & learn from security experts”o “Excellent networking with other CISOs from around the world”o “Found out best practice in information security & share experience with people”o “The best opportunity to interact with security professionals from across the globe & to share experiences/news on emerging security

trends”o “Smooth running, the lectures were challenging & reflected our real like problems”o “Very useful on risk decision taking & creating value & trust between IT security & the business”o “An eye opening summit with engaging and informative speakers: you just can't have enough of it. Recommended highly” o “A very good platform to meet people from multi-disciplinary industry experience, all working from their experience and background

great experience and insight into information securities keep it up if everybody knows his rights and responsibility we won't have to think about IT security” (Central Bank of Oman)

o “Provides an exceptional opportunity for networking with security professionals from different regions and to learn more about emerging security threats and counter measures” (BAE systems)

o “An extremely well constructed conference that brought together experts in their field who addressed challenging issues at a grass roots level”

! TWO EVENTS AT ONE TIME IN ONE PLACE , MIS is hosting at the same time in the same venue the Middle East Fraud & Corruption Summit.

DRAFT AGENDA

3Confirmed Sponsors for rd 2011 – , …Annual CISO Summit Middle East Dubai The United Arab Emirates

:Mobile Security Sponsor :Gold Sponsor : CISO Roundtable Sponsor

Page 4: 3rd Annual CISO Round Table

THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON

…INFORMATION SECURITY & ICT IN THE MIDDLE EAST

CISO Middle East Summit

: 31Day One Monday st 2011 January

07:30 REGISTRATION & COFFEE

08:00 MASTER OF CEREMONIES INTRODUCTIONS

08:15 ’ CHAIRMAN S OPENING

08:25 OPENING SPEECH BY CHIEF GUEST: DEFINING A NEW ERA & DECREASING CYBER SECURITY RISK IN ' ' – THE FACE OF AN UNCERTAIN WORLD KEYNOTE

1. , IMPLEMENTING SECURITY AWARENESS EDUCATION TRAINING & CERTIFICATION ON A NATIONAL – LEVEL OPENING KEYNOTE SPEECH

. Eng Tariq Al Hawi, Director, ( ) The United Arab Emirates Computer Emergency Response Team aeCERT

2. – GOVERNANCE OF SECURITY & SECURITY OF GOVERNANCE KEYNOTE

Information security governance requires clearly defined goals, roles, responsibilities, resources, policies & procedures. Challenging questions arise when we focus our attention beyond the overwhelming amount of data generated by ever-advancing technologies. The following questions will be addressed drawing from the extensive experience gained in conducting information security audits of the United Nations offices & peacekeeping missions across the world. Dino is responsible for the development & implementation of the global information & communications audit strategy of the United Nations Secretariat, including the definition of common auditing standards, risk assessment methodologies, best practices & guidelines.

Is there adequate consideration of the need to protect the information, processes & relationships that support & enable the governance of security?

What happens to governance when disasters occur? Is it enough to have policies, disaster recovery & business continuity plans?

Is there adequate awareness of what are the relationships between the major components of information security governance?

. . ' ,Mr Dino C Dell Accio Chief Auditor for Information and Communications Management at the ,United Nations Secretariat , New York Headquarters USA

3. – SECURING YOUR ENTERPRISE MOBILITY KEYNOTE

. Mr Scott Totzke, VP, BlackBerry Security Group

4. : ,NATIONAL STRATEGIES TO IMPROVE CYBER SECURITY AWARENESS - COUNTER MEASURES & – EVOLUTION KEYNOTE PANEL

International efforts to combat the cyber threat

How to improve contingency planning and resilience against cyber attacks Do nation-state sponsored advanced threats occur frequently? Cybercrime (protecting the organization & users from organized cybercrime) What will be the main facts for the security evolution in the following 5 years or so Securing critical infrastructure from attacks (hacks, DDoS / Botnets & extortion, data breaches, fraud & identity

crime) Fostering regional & international cooperation on information sharing Addressing unforeseen problems during implementation of e-government projects

Keynote Panellists:

3Confirmed Sponsors for rd 2011 – , …Annual CISO Summit Middle East Dubai The United Arab Emirates

:Mobile Security Sponsor :Gold Sponsor : CISO Roundtable Sponsor

Page 5: 3rd Annual CISO Round Table

THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON

…INFORMATION SECURITY & ICT IN THE MIDDLE EAST

. Eng Tariq Al Hawi, Director, The United Arab Emirates Computer Emergency Response Team of The Telecommunications Regulatory Authority (TRA) - The United Arab Emirates

MORNING COFFEE BREAK

5. – THE INFORMATION SECURITY THREAT HORIZON KEYNOTE

. , Mr Kim Aarenstrup Chief Information Security Officer, . . - / A P Moller Maersk A S & Chairman, Information Security ( )Forum ISF

6. : CAPEX UTILISATION FOR INFORMATION SECURITY MAXIMISING INFORMATION SECURITY COST EFFICIENCY & ENSURING THAT SECURITY IS INTEGRAL TO THE CORE BUSINESS AS A SERVICE BASED

– MODEL PANEL

How do you link with internal & external customers & building teams that return money to business lines? Moving ICT and information security into the service model sphere to add value to the business Maximising the cost-efficiency ratio of the information security strategy Capital expenditure utilisation - maximising information security cost efficiency Measuring Security return on investment (key indicators, & ways to obtain them) Implementing security policies that are effective in changing behavior

7. – ADDRESSING INFORMATION SECURITY RISK & REPUTATION KEY CASE STUDY

, Marcus Alldrick Chief Information Security Officer & Senior Manager, Information Risk and Protection, 'Lloyd s

8 , – LAWFUL INTERCEPTION DIGITAL ESPIONAGE & EAVESDROPPING KEYNOTE

LUNCH

9. : , –IDENTITY MANAGEMENT & ACCESS MANAGEMENT NEW CHALLENGES TRENDS & TECHNOLOGIES KEYNOTE

Integrating social networking passwords Securing & simplifying the user experience

AFTERNOON TEA BREAK

10. : – MOBILE & WIRELESS SECURITY PROTECTING YOUR TOP EXECUTIVES ON THE MOVE PANEL Why do we need mobile security? Top recommendations

Privacy versus security – specific regional challenges Mobile security awareness – proven lessons learned

New threats & risks

ILD versus PLD & security considerations

:Chaired by . ,Mr Scott Totzke VP, BlackBerry Security Group :Panellists

11. – ? THE RISE OF THE CISO HOW WILL THE JOB EVOLVE HOW CAN THE CISO MAXIMISE THE ?EFFECTIVENESS OF INFORMATION SECURITY MEASURES

Change management, segregation of duties, encryption

3Confirmed Sponsors for rd 2011 – , …Annual CISO Summit Middle East Dubai The United Arab Emirates

:Mobile Security Sponsor :Gold Sponsor : CISO Roundtable Sponsor

Page 6: 3rd Annual CISO Round Table

THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON

…INFORMATION SECURITY & ICT IN THE MIDDLE EAST

Policy development and implementation – a non-technical activity. Standards and best practices from ISO, NIST, ISF and others were followed by legislation on “computer misuse” and “computer crime”, increasingly calling for compliance

Information security is not only “everybody’s job” it is large and complex and requires many parties to be accountable for specific aspects of it.. Dr Eduardo Gelbstein, Adjunct Professor, , , Webster University Geneva Former Advisor, UN Board of Auditors and Former

Director, UN International Computing Centre

12. – ! SOCIAL ENGINEERING A LIVE DEMONSTRATION

15:45 CLOSE OF DAY ONE

:DINNER KINDLY SPONSORED BY

3Confirmed Sponsors for rd 2011 – , …Annual CISO Summit Middle East Dubai The United Arab Emirates

:Mobile Security Sponsor :Gold Sponsor : CISO Roundtable Sponsor

Page 7: 3rd Annual CISO Round Table

THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON

…INFORMATION SECURITY & ICT IN THE MIDDLE EAST

CISO Middle East Summit

: 1Day Two Tuesday st 2011 February

08:00 REGISTRATION & COFFEE

08:30 ’ CHAIRMAN S OPENING

1. – HOW TO DESTROY A COMPUTER FORENSICS INVESTIGATION KEYNOTE

, Michael Colao Recently Global CISO & Director Information Management, Dresdner Kleinwort

2. - , ANTI PHISHING COUNTERFEIT WEBSITES & EMERGING - E BUSINESS SECURITY THREATS

3. - INVESTING HEAVILY IN SECURING ICT INFRASTRUCTURE TO PREVENT HACKING KEYNOTE

4. : CLOUD SECURITY & VIRTUALIZATION KEY RISKS & APPROACHES FOR SUCCESS

• What level of security of unstructured data will information leakage prevention really offer? • How to manage the leakage of business data via the use of externally host web applications? • Managing business issues in the cloud: how does one do records management in the cloud? •What control structures should be used when working with 3rd

party cloud service providers• What are the minimum security services required to ensure adequate cloud & virtualization security?

MORNING COFFEE

5. SECURITY BREACHES & THE ADVANCED THREAT ENVIRONMENT – CISO PANEL

• During the last year, have the reports of advanced threats raised your concern about how secure your network is?

• What do you personally feel is the greatest source of human threat to your data?

• Which technology do you believe best protects data from leaking out of your network? • Where does the majority of your sensitive data reside? • Over the past year, has your organization been the target of an advanced threat? • How does your organization detect or discover threats?• What happened to your organization as a result of an threat?• What advanced threat attack methods or technologies were unleashed against your organization?

Chaired by: , Eddie Schwartz Chief Security Officer, - . .NetWitness Corporation U S

, , Panel of CISOs talk frankly about their experiences of recent security breaches how they responded detection

6. HOW TO LINK INFORMATION SECURITY INTO ENTERPRISE RISK MANAGEMENT & BUSINESS VALUE

7. : ? RISK MANAGEMENT DO WE NEED RISK MANAGEMENT & ROBUST FRAMEWORKS ARE THERE , , ? - LIGHTER CHEAPER MORE PALATABLE ALTERNATIVES PANEL

What risk do immature platforms for virtualization bring to our business? In the current recession, does an appetite to manage risks within tight, formal frameworks exist

anymore? Regulatory uncertainty – is there a better framework? Assessing different risk cultures & fall out –

higher risk postures : Chaired by . . ' ,Mr Dino C Dell Accio Chief Auditor for Information and Communications Management at the United Nations

, , .Secretariat New York Headquarters U S

Panellists:

3Confirmed Sponsors for rd 2011 – , …Annual CISO Summit Middle East Dubai The United Arab Emirates

:Mobile Security Sponsor :Gold Sponsor : CISO Roundtable Sponsor

Page 8: 3rd Annual CISO Round Table

THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON

…INFORMATION SECURITY & ICT IN THE MIDDLE EAST

, Marcus Alldrick Chief Information Security Officer & Senior Manager, Information Risk and Protection, 'Lloyd s

, Richard Lingard Head of IT Risk EMEA, Credit Suisse

LUNCH

9. , BUSINESS CONTINUITY DISASTER RECOVERY PLANS

10. : THE LEGAL RISKS EVERYTHING A CISO SHOULD KNOW

11. - TRANSNATIONAL CRIMES WAY FORWARD IN ADDRESSING THEM

AFTERNOON TEA BREAK

12. – LEADERSHIP FROM THE FRONT CASE STUDY

Modern day challenges for the CISO. Technological, operational & people challenges Innovative strategies & approaches to overcome operational, technological & people challenges Security posture index Achieving a proactive & resilient security posture Continual improvement

, Vinoth Sivasubramanian Project Manager-IT Department, . . .UAE Exchange Centre L L C

13. DATA LEAKAGE: PUTTING A VALUE ON A SECURITY BREACH

14. THE ART OF ETHICAL HACKING

15. SOCIAL NETWORKING & IM: OPPORTUNITY PRESENTED BY NEW TECHNOLOGY & INTERFACES VERSUS EMPLOYEE SECURITY

15:00 CLOSE OF DAY TWO

DINNER KINDLY SPONSORED : BY

: 2012ICT CATASTROPHIC RISK MANAGEMENT CRITICAL INFRASTRUCTURE AND CASE STUDIES LONDON AND MARITIME TERRORISM

Chief Executives and ICT Security Directors face catastrophic losses to ICT from serious organised crime, terrorism, espionage and cyber attacks. Two very different case studies of catastrophic risk are discussed: the forthcoming London 2012 event and the 28 July 2010 maritime incident on the M/V Starr carrying 250,000 tons of crude oil.ICT Security Challenges• Discussion by participants on catastrophic risks in the Region • Catastrophic risk management as a generic task • Reporting to the Board on ICT catastrophic risk management • Integration of physical and ICT security risks • Terrorism and ICT risks• Terrorists use of ICT in real-time

3Confirmed Sponsors for rd 2011 – , …Annual CISO Summit Middle East Dubai The United Arab Emirates

:Mobile Security Sponsor :Gold Sponsor : CISO Roundtable Sponsor

Page 9: 3rd Annual CISO Round Table

THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON

…INFORMATION SECURITY & ICT IN THE MIDDLE EAST

• Creation of a forensic strategy • Network analysis, cloud management and new risks • Stress testing as a forensic method• Soft assurance issues and litigation preparedness • On site and off site vulnerabilities • Reputation Risk testing – the speed of media reporting

, Dr Sally Leivesley Managing Director, Newrisk Limited (morning)

- TOP ICT RISK STRATEGIES FOR CONTINUITY WORKSHOP SCENARIO CHALLENGES

The workshop teams will prepare a report on the top ICT risk strategies that they can design to defeat top risks to a government, a global company or a small/ medium business. Two Challenges for a global company, a government department or a local business1. Prepare a simple paragraph or a simple table of the Top ICT Risks. When preparing this report, consider the consequences that any physical security risks in the list of top ICT risks. 2. Prepare a verbal statement no more than two minutes in length for the news media. (A team member will ‘volunteer’ to present this to the Workshop from the Podium.)The statement is to cover the ICT risk management strategies for continuity of operations in your organisation. This statement will show how your organisation has resilience and will be able to continue despite the top risks that may threaten its operations and cause a catastrophic failure.

Dr Sally Leivesley , Managing Director, Newrisk Limited (afternoon)Dr Leivesley advises governments and companies on catastrophic risk, continuity and security. She has interests in development of systems for security beyond encryption, SCADA protection and real time distributed systems for C4I risk management. She is a specialist in top threats from terrorism including chemical, nuclear, radiological, explosives and cyber and she assists the international media including the BBC, BSkyB, Al Jazeera English, and USA and European media with advice when extreme events impact on national security and corporate reputation. These incidents have included maritime (sinking of the South Korean warship 2010); international aviation liquid explosives 2006; Christmas Day 2009 Yemen origin concealed underpants device plot and subsequent incident at Heathrow on armed forces removal of bomb threat passengers on Middle East bound flight; hostage taking; national security data loss events; cyber terrorism and protection. Before the 2000 Sydney Olympics she provided extensive training to emergency services and critical infrastructure corporations on top risks and the securing of vulnerabilities prior to the 2000 Olympics and other national events. Dr Leivesley is a member of the Register of Security Engineers and Assessors with the Institution of Civil Engineering, British Computer Society Information Security Group (up to 2008) and the Royal United Services Institute for Defence Studies. She is a Fellow of the Institute of Civil Protection and Emergency Management and the Royal Society for Arts Manufacturing and Science. She trained in chemical, biological, radiological and nuclear threats as a Scientific Advisor with the British Home Office and was awarded a PhD from the University of London based on research on extreme events across the world. She co-chairs an international science group that works on mitigation of terrorism with specific focus on nuclear terrorism, biological, chemical and other extreme threats.

3Confirmed Sponsors for rd 2011 – , …Annual CISO Summit Middle East Dubai The United Arab Emirates

:Mobile Security Sponsor :Gold Sponsor : CISO Roundtable Sponsor

Page 10: 3rd Annual CISO Round Table

THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON

…INFORMATION SECURITY & ICT IN THE MIDDLE EAST

2Wednesday nd 2011 February :CISO Roundtable Sponsor

CISO Middle East Roundtable Information Security Governance for Strategic Business Value

- 09:00 ; 11:00 ; 13:00 ; 14:45 Agenda timings Start Coffee Break Lunch Close of Day

Chaired by: . . , Mr Charles V Pask Managing Director, ITSEC Associates Ltd

Facilitators: • . , Mr Eddie Schwartz Chief Security Officer, - . .NetWitness Corporation U S

• . , Mr Marcus Alldrick Chief Information Security Officer & Senior Manager, Information Risk and Protection, ' - Lloyd s UK

• . . ' ,Mr Dino C Dell Accio Chief Auditor for Information and Communications Management at the ,United Nations Secretariat , .New York Headquarters U S

• . , Mr Richard Lingard Head of IT Risk EMEA, - Credit Suisse UK

• – Speaker The UAE

The CISO Roundtable, held under The Chatham House Rule, is the unrivalled benchmarking forum for senior management to open up discussions on the most critical challenges in information security. The core theme of this years’ roundtable is how to improve competitive advantage and profitability directly through information security and improving ICT assurance. The CISO Middle

2011East Roundtable is well-established as the best place for heads of information security to

discuss key security challenges & strategy with peers to develop team expertise & professional skills, as well as to advance debate & approaches for the information security community at large. The focus is on roundtable discussions & group work, with sessions facilitated by established information security practitioners & industry experts. You will meet global security industry leaders & network with professionals who face a similar set of challenges as you in a ‘hands on’, proactive & inspirational environment.

• Held Under The Chatham House Rule - No press are permitted. The entire session will be conducted

as a ‘closed doors’ session, allowing participants to discuss real life information security incidents & benchmark proven & possible approaches

• Notes from the session – each session has a dedicated ‘note taker’ who will write up discussion

outlines & conclusions for distribution to all roundtable attendees following the event• Key topic areas of focus - will be determined by the input of participants beforehand & a briefing

document will be distributed in advance to allow participants to fully contribute in the honest sharing of ideas. Draft items are listed below.

Securing mobility solutions

, – , , ! Planning prevention & response to data breaches reputation reputation reputation

Identity & access management and associated social networking threats

Lawful interception & digital espionage

3Confirmed Sponsors for rd 2011 – , …Annual CISO Summit Middle East Dubai The United Arab Emirates

:Mobile Security Sponsor :Gold Sponsor : CISO Roundtable Sponsor

Page 11: 3rd Annual CISO Round Table

THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON

…INFORMATION SECURITY & ICT IN THE MIDDLE EAST

- Capex utilisation maximising information security cost efficiency & measuring return on security investment

Emerging national cyber threats

– - ?Risk based approach to data security how has risk changed in the global financial crisis fall out

Achieving integrated information security governance

1ITEM Current & Emerging Threats

:Led by . Mr Eddie Schwartz

2 ITEM Achieving integrated information security governance

Led by: . . 'Mr Dino C Dell Accio

2ITEM Honing A Risk Based Approach To ICT Security Risk & Reputation

Led by: . Mr Marcus Alldrick & . Mr Richard Lingard

3 ITEM Proven Deliverables to Improve Competitive Advantage & Profitability

4 ITEM To be decided based on audience feedback

5ITEM To be decided based on audience feedback

6 ITEM , WRAP UP DEBATE FINAL QUESTIONS & ACTION POINTS

3Confirmed Sponsors for rd 2011 – , …Annual CISO Summit Middle East Dubai The United Arab Emirates

:Mobile Security Sponsor :Gold Sponsor : CISO Roundtable Sponsor

Page 12: 3rd Annual CISO Round Table

THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON

…INFORMATION SECURITY & ICT IN THE MIDDLE EAST

:REGISTRATION INFORMATION Fee

3rd Annual CISO Middle East Summit & Roundtable 1,995£

Included in the Fee:• Entry to 3-day event• Continued Education Points & certificate • Official presentation materials on USB • Post-event web-link of materials • All lunches & daily refreshments • Networking functions (receptions, dinners, local activities – details subject to confirmation)

2 – 1 , 1 ! EVENTS PLACE DATE

At the same time, in the same venue as 2011CISO Middle East Summit & Roundtable , MIS is hosting The Middle East Fraud & Corruption Summit. Both events will be held at the Habtoor Grand Resort Hotel & Spa - Jumeirah Beach

Dubai, UAE, 31st January – 2nd February 2011. Middle East Fraud & Corruption 2011 - Summit Sharing successes &

lessons learned in the Middle East & globally from recent projects & cases involving fraud & corruption, this global event for directors of audit, risk, & fraud prevention arrives in the Middle East for the first time! Programme supports Middle East government & business commitments to achieve transparency goals & reduce exposure to financial risk by addressing prevention, detection, investigation, deterrence & recovery from fraud & corruption . . /www mistieurope com fraudME .

!DISCOUNTS & SPECIAL OFFERS

• Book 1 person to access 2 summits with the ‘Dual Event Pass’ & only pay 30% extra £2,593 (saving 1,396!)£

• Book 1 person on each summit & 30% save on fees ( 1,197 overall £ savings!) Ideal team working for Heads of

Information Security / IT Risk & Heads of Internal Audit & Fraud Prevention!

• For more information & terms & conditions of these offers please call +44 (0)207 779 8944, email [email protected])

: ABOUT THE VENUE

The 3 rd 2011Annual CISO Middle East Summit & Roundtable will be held at:

Habtoor Grand Resort & Spa

Al Sufouh Road Dubai Marina, Jumeirah BeachP. O. Box 24454, Dubai, U.A.E Tel: +971 4 408 4444 Fax: +971 4 399 4207http://grandjumeirah.habtoorhotels.com

Facilities & Location:Situated on Jumeirah Beach & overlooking Dubai Marina, this 5 star luxury spa resort hotel is set amid lush gardens with views of the sea & occupies one of Dubai's most enchanting beachside locations. The airport is approximately 30 kilometres from the Habtoor Grand Hotel; drive time is 25 to 30 minutes. It is in close proximity to Dubai Internet City, Dubai Media City & Shopping Malls. The Habtoor Grand Resort & Spa offers pools, restaurants & bars set amidst the hotel's tropical gardens where lush landscapes meet the warm Arabian Gulf, fringed by an immaculate beach & embraced by clear blue skies. Two pools are set within the resort's landscaped gardens, a third 'infinity pool' is located on the mezzanine level of the Towers & a large private beach offers unrestricted views of the clear Arabian Gulf. Guests can play tennis or squash or visit the hotel's Elixir Spa. The 446 guestrooms, reflecting Arabian touches in the furnishings & style, have views of the sea or the landscaped gardens.

3Confirmed Sponsors for rd 2011 – , …Annual CISO Summit Middle East Dubai The United Arab Emirates

:Mobile Security Sponsor :Gold Sponsor : CISO Roundtable Sponsor

Page 13: 3rd Annual CISO Round Table

THE UNIQUE EVENT FOR - THOUGHT LEADERS & PRACTITIONERS ON

…INFORMATION SECURITY & ICT IN THE MIDDLE EAST

Accommodation & Reservations:MIS Training Institute has arranged the following discounted rates at the Habtoor Grand Resort & Spa:• Standard Single Room: AED 900.00 per room• Standard Double Room: AED 1000.00 per room• All rates are valid per room per night & include 10% municipality fee, 10% service charge & breakfast.

• To make a reservation please complete the booking form available on www.mistieurope.com/CISOme & send to Mr. Maheshan Premanathan on [email protected], Tel: 00971 4 4084165 Fax: 00971 4 3994210.

Please note that delegates are responsible for the arrangement & payment of their own accommodation in Dubai. MIS Training is not liable or responsible for any hotel bookings. We cannot guarantee availability as limited rooms are available. We would advise booking as soon as possible.

:CANCELLATION POLICY Should a delegate be unable to attend, a substitute may attend in his or her place. A credit or refund, minus 10% administration charge, is available if written notification is received by 11th January 2011. Thereafter, no refunds will be given. MIS reserves the right to change or cancel this programme due to unforeseen circumstances.

3Confirmed Sponsors for rd 2011 – , …Annual CISO Summit Middle East Dubai The United Arab Emirates

:Mobile Security Sponsor :Gold Sponsor : CISO Roundtable Sponsor