28.11.2014 Views

Chief Information Security Officer Middle East 2009 - MIS Training

Chief Information Security Officer Middle East 2009 - MIS Training

Chief Information Security Officer Middle East 2009 - MIS Training

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ALIGNING BUSINESS AND IT STRATEGIES FOR THE MIDDLE EAST<br />

THE UNIQUE EVENT FOR<br />

INFORMATION SECURITY<br />

DIRECTORS IN THE MIDDLE EAST<br />

Under the Patronage of ITA<br />

2nd Annual<br />

Agenda at a Glance<br />

Day One Integrating information security into the core<br />

business strategy & infrastructure to deliver pragmatic &<br />

value-added security<br />

Day Two <strong>Information</strong> security risk management<br />

Stream A: The threat within / Stream B: The external threat<br />

horizon: analysis & counter-measures<br />

Day Three CISO Roundtable <strong>Middle</strong> <strong>East</strong> <strong>2009</strong>: Delivering<br />

Measurable Results During Tougher Times<br />

<strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong><br />

<strong>Middle</strong> <strong>East</strong> <strong>2009</strong><br />

Executive Summit & Roundtable<br />

Integrating <strong>Information</strong> <strong>Security</strong> Into The Core Business Strategy<br />

& Infrastructure To Deliver Pragmatic & Value-Added <strong>Security</strong><br />

9-11 November <strong>2009</strong>,<br />

Intercontinental<br />

Hotel, Muscat,<br />

Sultanate of Oman<br />

Top reasons to justify your<br />

attendance at this years’<br />

CISO <strong>Middle</strong> <strong>East</strong> Summit<br />

& Roundtable <strong>2009</strong>!<br />

• Hear directly from international information<br />

security practitioners & experts globally<br />

how to ensure that information security<br />

remains integral to the business: linking<br />

with internal & external customers &<br />

building teams that return money to<br />

business lines.<br />

• Gain assurance on managing threats day<br />

to day & preparing for the future – are you<br />

missing any tricks on how to manage the<br />

human factor, the insider threat, data<br />

leakage - especially through periods of<br />

extensive change & development.<br />

• Innovative new case studies, inspiring<br />

keynotes, panel debates & roundtables<br />

will probe the information security role &<br />

interaction with other functions to address<br />

real business realities.<br />

• CISO Roundtable <strong>Middle</strong> <strong>East</strong> – held under<br />

the Chatham House Rule: safely compare<br />

& share challenges on IT risk metrics, the<br />

key emerging security risks & security<br />

technologies to enhance operational<br />

capabilities.<br />

• Dedicated time to build trust based<br />

relationships with security peers from<br />

across the <strong>Middle</strong> <strong>East</strong>, Europe & the US.<br />

Perfect to expand your global security<br />

network with professionals who face the<br />

same set of challenges as you!<br />

Reserve your place by<br />

1st October <strong>2009</strong><br />

& receive 3 FREE books on<br />

information security,<br />

authored by speakers at the<br />

CISO Summit <strong>Middle</strong> <strong>East</strong> <strong>2009</strong>!<br />

Confirmed <strong>Chief</strong> Guest:<br />

• Dr. Salim Sultan Al Ruzaiqi, <strong>Chief</strong> Executive <strong>Officer</strong>, The <strong>Information</strong> Technology Authority (ITA) of Oman<br />

A Prestigious International Speaker Panel Includes<br />

• Mr. Abdullah AlBrwani, <strong>Chief</strong> of <strong>Security</strong>, The <strong>Information</strong> Technology Authority (ITA) (OMAN)<br />

• Mr. Ali Al-Otaibi, IT <strong>Security</strong> Department Manager - Technology Services Division,<br />

Saudi Hollandi Bank (KINGDOM OF SAUDI ARABIA)<br />

• Mr. Ameen Najm, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong>, Samba Financial Group (KINGDOM OF SAUDI ARABIA)<br />

• Mr. Andreas Wuchner-Bruehl, Global Head of IT <strong>Security</strong>, Novartis Pharma AG (SWITZERLAND)<br />

• Mr. Badar Alsalehi, Director, Omani Cert. (OMAN)<br />

• Mr. Charles V. Pask, Managing Director, ITSEC Associates Ltd (UK)<br />

• Dr. Cheryl Hennell, Head of IT <strong>Security</strong> and <strong>Information</strong> Assurance, Openreach (UK)<br />

• Mr. David Lacey, <strong>Information</strong> <strong>Security</strong> Management (UK)<br />

• Dr. Eduardo Gelbstein, Adjunct Professor, Webster University, Geneva,<br />

Former Advisor to the UN Board of Auditors and Former Director, UN International Computing Centre (SWITZERLAND)<br />

• Mr. Eddie Schwartz, <strong>Chief</strong> <strong>Security</strong> <strong>Officer</strong>, NetWitness (U.S.)<br />

• Judge Dr. Ehab Maher Elsonbaty, Senior Judge in Egypt & Secondment to the State of Qatar,<br />

Legal Expert, Amiri Diwan, State of Qatar (QATAR)<br />

• Mr. Ghassan T. Youssef, Executive Director, Saraya Holdings,<br />

& Former Group Director, CISBC, Bank Audi Sal, Audi Saradar Group (UAE)<br />

• Mr. Hugh Penri-Willams, <strong>Information</strong> <strong>Security</strong> Forum (FRANCE)<br />

• Mr. John Colley, Managing Director EMEA, (ISC) 2 (UK)<br />

• Colonel Kamel Alsuwaidi, Deputy Director of General Department of Operations, Dubai Police (UAE)<br />

• Dr. Iman Baba, Head of <strong>Information</strong> <strong>Security</strong> & Business Continuity, BankMed (LEBANON)<br />

• Mr. Lance Spitzner, Founder and President, HoneyTech (UAE)<br />

• Mr. Lalit Gandhi, Divisional Manager Audit and <strong>Information</strong> <strong>Security</strong>, Oman Trading Establishment (OMAN)<br />

• Mr. Marcus Alldrick, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong>, Lloyd’s (UK)<br />

• Mr. Mustafa Ali Mahmood Al Hemeid, Head of Legal Division, National Bank of Oman (OMAN)<br />

• Mr. Osman Sultan, CEO, Du, (UAE) - INVITED<br />

• Mr. Ray Stanton, Global Head of Business Continuity, <strong>Security</strong> & Governance Practice, BT (UK)<br />

• Mr. Richard Cross, CISO, Toyota Motor Europe (BELGIUM)<br />

• Major Robert Noble MBE, Managing Director/Partner, International <strong>Security</strong> Consultancy Group Gulf WLL (QATAR)<br />

• Mr. Tariq Elsadik, <strong>Chief</strong> Excellence/<strong>Information</strong> <strong>Officer</strong>, Al Fahim Group (Abu Dhabi, UAE)<br />

• Mr. Yousuf Alihamed Al Harty, Managing Director, InfoShield LLC (OMAN)<br />

• Mr. Zaki Sabbagh, <strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong>, Zamil Industrial Investment Co. (SAUDI ARABIA)<br />

Register now at www.mistieurope.com/cisome Tel: +44 (0) 20 7779 8944<br />

Lead CISO<br />

Roundtable Sponsor<br />

Lunch<br />

Sponsors<br />

Cocktail<br />

Sponsor<br />

Gigabyte<br />

Sponsor<br />

Oman<br />

Partner<br />

Association Partners<br />

Publishing<br />

Partner<br />

Media Partners<br />

Oman, Jeddah, Hyderabad,<br />

Mumbai & Chennai Chapters


ALIGNING BUSINESS AND IT STRATEGIES FOR THE MIDDLE EAST<br />

<strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> <strong>Middle</strong> <strong>East</strong> <strong>2009</strong><br />

Executive Summit & Roundtable<br />

9–11 November <strong>2009</strong>, Intercontinental Hotel, Muscat, Sultanate of Oman<br />

Under the Patronage of ITA<br />

Dear Colleague,<br />

<strong>MIS</strong> <strong>Training</strong> Institute is delighted to announce the 2nd Annual CISO Executive Summit & Roundtable <strong>Middle</strong> <strong>East</strong> <strong>2009</strong>! A new international speaker panel of information security directors & experts will share<br />

real life experiences & views on how they are approaching key security strategies & current threats & responses. The new programme has been designed to inspire & reinvigorate your information security<br />

strategy with a programme dedicated to the upper echelon of the information security profession – the CISO or Head of <strong>Information</strong> <strong>Security</strong>. The interactive CISO Roundtable on the 11 November will provide the<br />

ideal forum to benchmark your security strategy against peers & international thought leaders – held under The Chatham House Rule. The unique learning format – case studies, typically inaccessible keynote<br />

speakers, panel discussions, thought leadership exercises, roundtables – makes this the ideal opportunity to innovate approaches to information security strategy amongst like-minded peers.<br />

Agenda at a glance<br />

Day One Integrating information security into the core business strategy &<br />

infrastructure to deliver pragmatic & value-added security<br />

Day Two <strong>Information</strong> security risk management<br />

Stream A: The threat within / Stream B: The external threat horizon: analysis &<br />

counter-measures<br />

Day Three CISO Roundtable <strong>Middle</strong> <strong>East</strong> <strong>2009</strong>: Delivering Measurable Results<br />

During Tougher Times<br />

Reserve Your Place by 1st October <strong>2009</strong><br />

& Receive 3 FREE Books on <strong>Information</strong> <strong>Security</strong>,<br />

Authored by Speakers at the CISO Summit <strong>Middle</strong> <strong>East</strong> <strong>2009</strong>!<br />

• “Managing the Human Factor in <strong>Information</strong> <strong>Security</strong>: How to Win Over Staff and<br />

Influence Business Managers”, by David Lacey<br />

• “Honeypots: Tracking Hackers” by Lance Spitzner<br />

• “Crossing the Executive Digital Divide, The Course Book” by Eduardo Gelbstein<br />

5 more reasons to attend<br />

• Hear a candid mix of how heads of information security are actually responding to current threats &<br />

responses & what they would like to do in an ideal world<br />

• Meet & build trust based relationships with peers & an international panel of security experts from across<br />

the <strong>Middle</strong> <strong>East</strong>, Europe, The Americas, & Asia<br />

• Bring back proven information security strategies to reinvigorate & hone a top information security team<br />

• Stay one step ahead of rapidly changing business environments & emerging threats<br />

• Don’t miss the interactive CISO Roundtable <strong>Middle</strong> <strong>East</strong> <strong>2009</strong> - the ideal place to meet global security industry<br />

leaders & network with professionals who face a similar set of challenges as you<br />

Thank You<br />

Sincere thanks to the world-leading security experts, solution providers,<br />

associations, & delegates within the information security community who have<br />

played a major role in contributing to the programme. A special thank you goes<br />

out to all the speakers for their time & contribution, & also to the supporting<br />

organisations. <strong>MIS</strong> <strong>Training</strong> Institute wishes you an enjoyable & productive time<br />

at the summit, & looks forward to meeting you in Muscat in November.<br />

Sponsorship & Exhibition Opportunities at the 2nd Annual CISO Executive Summit <strong>Middle</strong> <strong>East</strong> <strong>2009</strong><br />

Attendees at <strong>MIS</strong> <strong>Training</strong>’s CISO Executive Summit <strong>Middle</strong> <strong>East</strong> <strong>2009</strong> are senior decision makers within the information security community – from across business & governmental sectors from across the<br />

<strong>Middle</strong> <strong>East</strong> region. This gathering of normally difficult to reach executives is an excellent platform for companies to influence with brand profiling & to ensure market position. Given <strong>MIS</strong>’ background in<br />

training, delegates typically comprise 95% ‘practitioners’ (e.g. heads of information security/ CISOs, CIOs, CTOs, IT security managers & system security professionals). All sponsorship packages include: a<br />

number of free client places, table top exhibition & speaking options. For more information, please contact: Sara Hook, Conference Director, Email: shook@mistieurope.com Tel: +44 (0)20 7779 7200<br />

Extend your stay in Muscat by 1-day & attend (ISC) 2 ’s adjoining SecureMuscat Conference, Sunday 8th November <strong>2009</strong>!<br />

(ISC) 2 kindly invites you attend its unique event, SecureMuscat Conference, taking place at the Intercontinental Muscat the day prior to the 2nd Annual CISO Executive Summit & Roundtable <strong>Middle</strong> <strong>East</strong> <strong>2009</strong>.<br />

SecureMuscat Conference takes place on Sunday 8th November <strong>2009</strong> & (ISC)2 kindly offers all <strong>MIS</strong> <strong>Training</strong> Institute attendees a special discounted rate of 40% = $333 off the standard published fee of $555!<br />

Under the Patronage of ITA<br />

ITA / e.Oman - The <strong>Information</strong> Technology Authority (ITA), established by Royal Decree No. 52/2006 issued on 31 May 2006, is an independent national authority with financial and administrative independence. As an independent body, the ITA is<br />

chiefly responsible for implementing the Digital Oman strategy – e.oman for short, promoting <strong>Information</strong> Communications Technologies (ICTs), and supervising all infrastructure projects to enable delivery of electronic services under the<br />

framework of Digital Oman.<br />

ITA serves as a competency centre on best practices in eGovernance and in harnessing <strong>Information</strong> and Communication Technologies (ICT), offering efficient and timely services, integrating processes and improving efficiency in service delivery.<br />

ITA undertakes projects to increase technology penetration and empower its people with required digital literacy and higher levels of competence through training and innovation centres.<br />

ITA is solely responsible for driving the Digital Oman Strategy which was approved on 30 November 2002, conceptualized from a future vision of the Omani economy in 2020 AD. e.oman comprises a wide range of the initiatives and services that<br />

are designed and created to electronically transform the government, improve the efficiency of government services, enhance the activities of businesses and empower individuals with skills and knowledge in order to meet society’s needs and<br />

expectations and to direct Oman towards becoming a knowledge-based economy.<br />

Lead CISO Roundtable Sponsor<br />

NetWitness - NetWitness Corporation provides patented, next generation network & host-based security solutions that help public & private organizations discover, prioritize & remediate complex IT risks. Users of NetWitness NextGen & InSight<br />

solutions concurrently solve a wide variety of information security problems including: advanced persistent threat management; sensitive data discovery & data leakage protection; malware activity detection; insider threat management; policy &<br />

controls verification & e-discovery. Originally developed for the US Intelligence Community, NetWitness has evolved to provide enterprises around the world with breakthrough methods of network content analysis & host-based risk discovery &<br />

prioritization. NetWitness customers include Defense, National Law Enforcement & Intelligence Agencies, Top US & European Banks, Critical Infrastructure, & Global 1000 organizations. NetWitness has offices in the U.S. & the U.K. & partners<br />

throughout Europe, the <strong>Middle</strong> <strong>East</strong>, South America & Asia. For more information & to try our software visit: www.netwitness.com<br />

Lunch Sponsors<br />

Qualys - Qualys, Inc. is the leading provider of on demand IT security risk and compliance management solutions – delivered as a service. Qualys’ Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing<br />

customers an immediate and continuous view of their security and compliance postures. The QualysGuard® service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100 and performs more than 200<br />

million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers and consulting organizations<br />

including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, SecureWorks, Symantec, Tata Communications, TELUS and VeriSign. For more information, please visit: www.qualys.com<br />

Oman, Jeddah, Hyderabad,<br />

Mumbai & Chennai Chapters<br />

Crypto AG – To Remain Sovereign- Crypto AG is your ideal partner for the efficient and secure handling of information, no matter what information or communication network you use. As a legally and economically independent Swiss company, we are<br />

neither subject to export restrictions on powerful encryption technology nor governmental supervision. We have developed, manufactured and implemented customised security solutions for over 55 years. Our highly developed <strong>Security</strong> Architecture helps<br />

support your organisation’s security policy. The package we offer features the latest technology solutions and comprehensive services; our efficient project management creates user-friendly systems in your organisation – with ciphering taking place in<br />

the background. Our support services guarantee autonomous operation and high availability over the system’s entire lifetime, whatever the user environment. You too can rely on the expertise and capabilities of Crypto AG – just like governments,<br />

ministries, diplomatic services, police, border control and armed forces in over 130 countries.<br />

Cocktail Sponsor<br />

e-Cop - e-Cop is the trusted partner for managed risk and information security services to enterprises, and governments. It offers a comprehensive suite of services to identify and deal effectively with threats and risks related to information security<br />

management. These services include Managed <strong>Security</strong> Services, Technology Consulting Services, and Professional <strong>Security</strong> Services. Widely hailed as an innovative and leading information security industry bluechip , e-Cop operates and<br />

maintains several <strong>Security</strong> Operations Centres (SOC) around the world. All of which are ISO/IEC 27001 certified and powered by its highly advanced, award-winning security event correlation technology developed internally by its R&D team. e-<br />

Cop’s sedulous commitment to deliver a multi-pronged integrated suite of Professional <strong>Security</strong> Services and Technology Consultancy Services has earned itself numerous accolades as the industry’s leader. Our clients tell us that they value the<br />

vision, leadership, and customised services and solutions that we bring to our projects. Entrusting their information security management needs in the hands of e-Cop allows them to focus on what they do best and respond to the market faster.<br />

Gigabyte Exhibition Sponsor<br />

Omnisec - Omnisec AG, an independent Swiss company, is a leading provider of information risk management services and ICT security solutions. They address the exacting demands for confidentiality set by government agencies, military<br />

organizations, financial service institutions and industrial enterprises worldwide. With more than 60 years of experience, we have become famous for our secure collaboration, telephone, fax, multi-link, IP-VPN and security management solutions.<br />

More recently we have made a name for ourselves in the complex areas of secure radio and satellite communications. All Omnisec's products are based on our proprietary OmnicryptTM <strong>Security</strong> Architecture, including 256-bit symmetric-key<br />

encryption methods. Omnisec’s extensive consulting, system engineering, project management and education services empower our customers to manage their complex ICT systems securely. Where a standard solution is inadequate, we are<br />

ready to work together with our customer's specialists to develop an integrated security solution tailored to their specific requirements.<br />

Oman Partner<br />

InfoShield LLC. - InfoShield LLC is the leading security solutions provider based in Muscat. It provides a wide range of information security services from risk assessment to implementation of security solutions to protect your information.<br />

InfoShield offers the broadest range of professional, effective & affordable security awareness products & services. An active security awareness program can greatly reduce many risks which cannot be addressed through security software<br />

and hardware devices. In these cases, it's the human element of security that must be addressed which is exactly what our products are designed to do. By implementing InfoShield products you can immediately begin to increase the level of<br />

security awareness in your organization. <strong>Training</strong> - InfoShield offers world class & up to date <strong>Information</strong> <strong>Security</strong> <strong>Training</strong>. Our educational team is composed of certified instructors that are proficient in the field of information security backed<br />

by several years of experience in handling the security products, thus adding real world knowledge & experience. Consultancy - InfoShield's <strong>Security</strong> Consulting Services help companies understand information security requirements, laws &<br />

regulations, security vulnerabilities, attacks response, reduce risk, & meet the security compliance requirements of your business & industry. <strong>Security</strong> tools - InfoShield provide world leading information security tools to satisfy the various<br />

security needs. Mainly we focus on data & endpoint security solutions. Our main goal is to offer effective security solutions that are easy to implement & maintain while providing high returns on investment. www.information-shield.com<br />

Association Partners<br />

<strong>Information</strong> <strong>Security</strong> Forum - ISF is recognised as the world’s leading <strong>Information</strong> <strong>Security</strong> organisation & independent industry authority. Through its members, the ISF brings together & harnesses the knowledge & experience of over 300<br />

major international business & government agencies to meet the increasing demand for practical, business-driven solutions to information security & risk management problems. The <strong>Information</strong> <strong>Security</strong> Forum is an independent, not-for-profit<br />

organisation, established in 1989. It is owned & governed by its members & managed by a professional team. www.securityforum.org<br />

ISACA – Oman, Jeddah, Hyderabad, Mumbai & Chennai Chapters - ISACA’s membership – more than 65,000 strong worldwide – is characterised by its diversity. Members live & work in more than 140 countries & cover a variety of<br />

professional IT-related positions—to name just a few, IS auditor, consultant, educator, IS security professional, regulator, chief information officer & internal auditor. ISACA has more than 170 chapters established in over 70 countries worldwide,<br />

& those chapters provide members education, resource sharing, advocacy, professional networking & a host of other benefits on a local level. www.isaca.org<br />

ISSA – EMEA & Egypt - The <strong>Information</strong> Systems <strong>Security</strong> Association (ISSA)® is a not-for-profit international organisation of information security professionals & practitioners. It provides education forums, publications & peer interaction<br />

opportunities that enhance the knowledge, skill & professional growth of its members. www.issa.org<br />

(ISC) 2 - The International <strong>Information</strong> Systems <strong>Security</strong> Certification Consortium, Inc. [(ISC)2®] is the internationally recognised Gold Standard for certifying information security professionals. Founded in 1989, (ISC)2 has certified over 54,000<br />

information security professionals in 135 countries. The CISSP, CISSP-ISSEP“, CISSP-ISSAP“& SSCP are among the first information technology credentials to meet the stringent requirements of ANSI/ISO/IEC Standard 17024. (ISC)2® is the<br />

non-profit global leader in educating & certifying information security professionals throughout their careers. www.isc2.org<br />

ASIS International - ASIS International (ASIS) is the largest organisation for security professionals, with more than 35,000 members worldwide. Founded in 1955, ASIS is dedicated to increasing the effectiveness & productivity of security<br />

professionals by developing educational programs & materials that address broad security interests. ASIS also advocates the role & value of the security management profession to business, the media, governmental entities, standardisation<br />

bodies & the public. By publishing the industry's number one magazine - <strong>Security</strong> Management - ASIS leads the way for advanced & improved security performance. www.asisonline.org<br />

The CSO Roundtable of ASIS International - The CSO Roundtable of ASIS International brings together senior security executives from the world's largest & most influential organizations. This by-invitation only organization is dedicated both to<br />

assisting security executives in their careers & to elevating the status of security professionals in the C-suite. Benefits include CSO-only educational & networking opportunities, special sessions at ASIS events, & an annual conference. Contact<br />

Peter Piazza at ppiazza@asisonline.org<br />

Media Partners


<strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> <strong>Middle</strong> <strong>East</strong> <strong>2009</strong> Executive Summit & Roundtable<br />

9–11 November <strong>2009</strong>, Intercontinental Hotel, Muscat, Sultanate of Oman<br />

Day One: Monday 9 November <strong>2009</strong><br />

Integrating <strong>Information</strong> <strong>Security</strong> Into The Core Business Strategy & Infrastructure to Deliver Pragmatic & Value-Added <strong>Security</strong><br />

KEYNOTE<br />

KEYNOTE KEYNOTE KEY NOTE<br />

KEYNOTE<br />

KEY CASE STUDY<br />

06:45 REGISTRATION & COFFEE<br />

07:00 CHAIRMAN’S OPENING<br />

07:30 CREATING A SECURE GLOBAL BUSINESS INFRASTRUCTURE FOR THE<br />

MIDDLE EAST<br />

•What does the current security landscape look like for the <strong>Middle</strong> <strong>East</strong>?<br />

•What are some of the approaches to increase coordination among<br />

governments?<br />

• Emerging challenges around cyber-crime & information infrastructure protection<br />

•Counter-measures to combat growing cyber threats to public & private sector<br />

organisations<br />

Senior Omani Government Speaker - to be announced<br />

08:00 ROLE PLAYED BY CERT OMAN AS PART OF THE NATIONAL INFORMATION<br />

SECURITY<br />

The Director of the esteemed Omani Cert will talk about role that is played by<br />

CERT as part of the national IS infrastructure.<br />

Mr. Abdullah Al-Brwani, <strong>Chief</strong> of <strong>Security</strong>, The <strong>Information</strong> Technology<br />

Authority (ITA) (OMAN)<br />

Mr. Badar Al-Salehi, Director, Omani Cert. (OMAN)<br />

08:40 SECURITY & THE YOUNGER GENERATION<br />

Mr. Ray Stanton, Global Head of Business Continuity, <strong>Security</strong> & Governance<br />

Practice, BT<br />

09:20 MANAGING THE HUMAN FACTOR IN INFORMATION SECURITY<br />

We all know that it’s people, not computers that commit crime. It’s also people<br />

that create security breaches through bad system design or misuse. But people<br />

also identify risks, report incidents & manage crises. Their influence is<br />

increasing as we become a networked society. Using social networks we can<br />

now extend the size of our security function to encompass the whole<br />

organisation & every networked customer. But people pay little attention to<br />

policies & rules. We need a more sophisticated approach, one that understands<br />

the human dimension. David will explain how to transform culture & behaviour,<br />

drawing on lessons from psychology, criminology & marketing, as well as many<br />

years of practical experience.<br />

Mr. David Lacey, <strong>Information</strong> <strong>Security</strong> Management (UK)<br />

David is a leading expert on information security & risk management with more than 25 years professional experience, most recently<br />

as Director of <strong>Security</strong> and Risk Management for the Royal Mail Group. Prior to that, David was responsible for global information<br />

security policy & standards for the Royal Dutch/Shell Group & Head of Computer <strong>Security</strong> for the UK Foreign & Commonwealth Office.<br />

David is now an independent director, researcher & writer. He writes a blog for Computer Weekly & is the author of the John Wiley<br />

book ‚”Managing the Human Factor for <strong>Information</strong> <strong>Security</strong>”. David is a keen futurist & innovator, believing that the best way to<br />

predict the future is to invent it. He originated & pioneered many contemporary techniques for information security, including<br />

developing the original content of the British Standard BS7799 & gaining the world’s first accredited certification for Shell IT Services<br />

across Europe. David has also pioneered many new concepts such as de-perimeterisation, computational immunology for fraud<br />

detection & real-time analysis of human behaviour in digital communications. David is a regular speaker at international conferences<br />

and has served on many advisory boards in the energy, banking & government sectors. Amongst many other affiliations, he is a<br />

founder of the Jericho Forum, of which he is an Honorary Fellow.<br />

10:00 MORNING COFFEE BREAK<br />

10:20 HOW TO PREVENT DATA LEAKAGE? SECURING YOUR MOST VALUABLE<br />

INFORMATION ASSETS<br />

•Who is most likely to remove sensitive data from your organisation?<br />

•What technology is available to address the problem?<br />

•When is data most likely to be removed?<br />

•Where will the leak occur?<br />

•Why is it happening?<br />

•How will it most likely be removed?<br />

•What can you do to stop it?<br />

•Top tips to secure your CEO<br />

•Top tips to counter the PDA & mobile device threat<br />

Panellists:<br />

Dr. Cheryl Hennell, Head of IT <strong>Security</strong> and <strong>Information</strong> Assurance, Openreach (UK)<br />

Dr. Iman Baba, Head of <strong>Information</strong> <strong>Security</strong> & Business Continuity, BankMed (LEBANON)<br />

Mr. Richard Cross, CISO, Toyota Motor Europe (BELGIUM)<br />

11:00 CYBER THREATS: WILL CYBER THREATS LEAD TO ANOTHER 9/11?<br />

Reports indicates that nuclear weapon & a cyber attack on critical government<br />

or private computer networks top the list of concerns for intelligence agencies.<br />

•Definition of cyber threats<br />

•Examples<br />

•Sources description<br />

•How to protect ourselves<br />

• Introduction to IMPACT (International Multilateral Partnership Against Cyber Threats)<br />

•Q&A<br />

Mr. Ameen Najm, CISO, Samba Financial Group (KINGDOM OF SAUDI ARABIA)<br />

Ameen Najm is a senior information technology professional with 16+ years of experience. He is currently the CISO of Samba<br />

Financial Group, a leading financial services group in the Kingdom of Saudi Arabia with presence in, Dubai, Pakistan, and UK. His<br />

expertise includes devising IS policies and standards, security framework and strategy, security program management, & security<br />

architecture. Skilled in access assurance, risk management, legal/regulatory compliance, system configuration & availability, network<br />

security, system security, information security awareness, security operations, audit & assessment, incident management, & computer<br />

forensic investigation. Ameen is a Member of several IT & <strong>Information</strong> <strong>Security</strong> organizations & Chairman of the Banking Committee<br />

for <strong>Information</strong> <strong>Security</strong> in Saudi Arabia.<br />

11:40 WAR STORIES FROM THE IT SECURITY & COMPLIANCE EDGE (AKA COULD<br />

THIS HAPPEN TO YOU?!)<br />

Software companies have been automating IT security and compliance<br />

processes for over a decade. This session will provide true stories and lesson<br />

learned from companies that sought to automate IT Governance, Risk and<br />

Compliance (IT-GRC) initiatives. It also offers insight into what’s needed for a<br />

successful IT <strong>Security</strong> and Compliance program to stay relevant with the<br />

challenges faced today.<br />

Amer Deeba, <strong>Chief</strong> Marketing <strong>Officer</strong>, Qualys, Inc.<br />

Amer is responsible for product direction, marketing and customer relations activities. Amer has been in the security industry for the<br />

last 10 years with a proven track record in driving company growth in fast moving technology fields. Amer came to Qualys from<br />

VeriSign, where he was the General Manager for the Payment Services Division, and helped establish VeriSign as a leader in the online<br />

payments space. Amer earned MS and BS degrees in Computer Sciences and he is a frequent speaker at customers’ events and<br />

security forums.<br />

11:55 LUNCH - KINDLY SPONSORED BY QUALYS<br />

13:10 SECURITY AWARENESS & CULTURE<br />

Mr. Yousuf Alihamed Al Harty, Managing Director, InfoShield LLC(OMAN)<br />

13:40 GOVERNANCE IS NOT AN OPTION ANYMORE - IT IS A MUST<br />

Mr. Ghassan T. Youssef, Executive Director, Saraya Holdings, (DIFC - DUBAI) &<br />

Recently Group Director, CISBC, Bank Audi Sal, Audi Saradar Group, (LEBANON)<br />

14:20 UNDERSTANDING THE GLOBAL THREAT ENVIRONMENT & HOW TO DEAL<br />

WITH ADVANCED THREATS FROM NATION-SPONSORED & ORGANIZED<br />

CRIME GROUPS & INSIDERS<br />

Mr. Eddie Schwartz, Vice President, <strong>Chief</strong> <strong>Security</strong> <strong>Officer</strong>, NetWitness Corporation<br />

15:00 AFTERNOON TEA BREAK & EXHIBITION<br />

15:20 e-Cop CASE STUDY<br />

Speaker to be confirmed<br />

15:35 OPERATIONS SYSTEMS & TECHNOLOGIES TO SUPPORT DUBAI POLICE<br />

SECURITY EFFORTS<br />

A unique look at security issues from the operational perspective, you will hear<br />

insights on practical operations systems & technologies used by Dubai Police to<br />

support security efforts & enhance operational capabilities.<br />

Colonel Kamel Alsuwaidi, Deputy Director of General Department of Operations,<br />

Dubai Police (UAE)<br />

16:10 WHAT ARE THE KEY EMERGING SECURITY RISKS IN <strong>2009</strong> & BEYOND?<br />

DETECTING MASSIVE CONTROL FAILURES - IS THIS A ROLE FOR TODAY’S<br />

SECURITY CHIEFS?<br />

CISOs / CSOs list their Top 3 ‘Hot Buttons’ & Focus for <strong>2009</strong> & beyond, sharing<br />

the latest threats they face, as well as their planned security strategy going<br />

forward & key lessons for other industry sectors. Panellists will also reveal their<br />

views on how recent high profile scandals have impacted their role & whether<br />

this should be the ideal role for today’s CISO.<br />

•What are the top 3 technology risks on your priority list?<br />

•How has the global financial crisis & the uncovering of recent high profile<br />

frauds impacted your approach to security & controls?<br />

•Growth of organised crime - how will trends affect your organisation?<br />

•What is the next big technology threat & enabler?<br />

•What are your plans to take a proactive stance?<br />

•Does information security need redefinition?<br />

Panellists:<br />

Mr. Ameen Najm, CISO, Samba Financial Group (KINGDOM OF SAUDI ARABIA)<br />

Colonel Kamel Alsuwaidi, Deputy Director of General Department of Operations,<br />

Dubai Police (UAE)<br />

Mr. Ray Stanton, Global Head of Business Continuity, <strong>Security</strong> & Governance Practice, BT<br />

Zaki Sabbagh, <strong>Chief</strong> <strong>Information</strong> <strong>Officer</strong>, Zamil Industrial Investment Co.<br />

(SAUDI ARABIA)<br />

16:40 CLOSE OF DAY ONE<br />

16:50 CISO SUNSET DHOW CRUISE RECEPTION - KINDLY SPONSORED BY e-COP<br />

All networking activities are provisional to date.<br />

KEY CASE<br />

STUDY<br />

KEY CASE<br />

STUDY<br />

KEYNOTE<br />

KEYNOTE<br />

PANEL


<strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> <strong>Middle</strong> <strong>East</strong> <strong>2009</strong> Executive Summit & Roundtable<br />

9–11 November <strong>2009</strong>, Intercontinental Hotel, Muscat, Sultanate of Oman<br />

Day Two: Tuesday 10 November <strong>2009</strong><br />

<strong>Information</strong> <strong>Security</strong> Risk Management: The Threat Within & the External Threat Horizon & Counter-Measures<br />

06:45 COFFEE<br />

06:55 CHAIRMAN’S RE-OPENING<br />

KEYNOTE 07:00 DIGITAL EVIDENCE – A JUDICIAL & LEGAL PERSPECTIVE<br />

Judge Dr. Ehab Maher Elsonbaty, BA, MA, LLM, PhD, Senior Judge in Egypt & Secondment to the State of Qatar, Legal Expert, Amiri Diwan, State of Qatar (QATAR)<br />

Judge Dr. Ehab Maher Elsonbaty is a senior judge & a member of the civil, criminal &commercial panel of the Damanhor Court. He lectures on cyber law topics & technology in litigation to the Arab Academy for Science and Technology and Private International Law. He is a consultant to the Council of Europe, UNODC & ITU.<br />

07:40 EVACUATION PLANNING – EMERGENCY RESPONSE & BUSINESS REINSTATEMENT<br />

• Corporate Emergency Contingency Plans • Local Intelligence • Post evacuation action<br />

• Evacuation Planning • Recovery & reinstatement • Pre evacuation tasks<br />

Major Robert Noble MBE, Managing Director/Partner, International <strong>Security</strong> Consultancy Group Gulf WLL (QATAR)<br />

Mr. Noble has nearly 30 years experience in international security of precious metals & minerals, protection of diplomats, diplomatic missions & corporates, technical & physical security & training of police & security personnel. Mr. Noble is a veteran of some 15 military coups & insurgency actions & was involved in safe<br />

evacuations of diplomatic & corporate staff in various African countries, most notably in Mogadishu, Somalia, in 1991 when, under constant hostile fire, he ensured the safe movement of diplomats & their families, from Oman, Qatar, UAE, Kuwait, Sudan, Kenya, Nigeria, Turkey, Germany, Great Britain, Russia & USA, from<br />

their exposed city locations, to the relative safety of the US Embassy compound, prior to evacuation to Muscat, Oman by US Naval forces. In 1995, he also managed the evacuation of some 3000 multi national personnel & families from the northern industrial & mining areas of Sierra Leone, whilst under attack by rebel<br />

insurgents, to safety in the port of Freetown. This evacuation was accomplished under his personal supervision, at night & by sea, with no loss of life. Mr. Noble was awarded the MBE for services to British overseas security interests & is a holder of the US Secretary of State's Superior Honor Award for Heroism. In addition,<br />

he has over 30 awards & commendations from amongst others, the US Diplomatic <strong>Security</strong> Service, German Diplomatic Protection Police and several other entities. He wrote the Global Emergency Response Plan for a major US IT Corporation & served 10 years in British military in armored, airborne & MOD posts.<br />

08:20 THE EASY WAY TO AVOID BECOMING THE NEXT DATA LEAKAGE HEADLINE<br />

Data security is a legal, operational & reputational risk issue for any organisation in any part of the world. Hear top tips for avoiding becoming the next headline.<br />

• Data loss/breach legislation - how does it apply to me, what does it mean to me? • Evaluating data loss management & encryption technology<br />

• How to enable the safe use of removable storage such as USB memory sticks • Integration - data controls<br />

• What data loss prevention (DLP) can bring to the enterprise • Top tips & best practice<br />

Mr. Richard Cross, CISO, Toyota Motor Europe (BELGIUM)<br />

09:00 THE BUSINESS CASE FOR INFORMATION SECURITY & ITS BOUNDARIES WITH MATURE IT PROCESSES<br />

Dr. Eduardo Gelbstein, Adjunct Professor, Webster University, Geneva, Former Advisor to the UN Board of Auditors and Former Director, UN International Computing Centre (SWITZERLAND)<br />

Ed has worked in IT for over 40 years in the private & public sectors of several countries, & in executive positions since the mid 1980s. In 2002 he “retired” from the UN, where he was Director of the International Computing Centre with 24*7 operations in Geneva, New York, & Brindisi for clients including UN<br />

Peace Keeping, the World Food Programme & the UN High Commission for Refugees – an environment where responding to crises are common events. He then became an IT advisor & auditor, for the UN Board of Auditors and the Cour des Comptes (National Audit Office of France). Ed is author of several books<br />

& publications, he is adjunct professor of Business Systems Management at Webster University in Geneva, an advisor to the Master of Advanced Studies programme of Zürich Technical University & a senior fellow of the Diplo Foundation, dedicated to the training of young diplomats from all over the world.<br />

KEYNOTE<br />

PANEL CASE STUDY<br />

KEY CASE STUDY<br />

CASE STUDY KEY CASE STUDY<br />

PANEL DEBATE<br />

KEY CASE<br />

STUDY<br />

SPECIAL<br />

KEYNOTE<br />

CASE<br />

STUDY<br />

09:40 MORNING COFFEE BREAK<br />

10:00 CREATING VALUE & TRUST BETWEEN INFORMATION SECURITY & THE BUSINESS THROUGH EXTENSIVE CHANGE & DURING DIFFICULT TIMES<br />

As executive boards globally are threatening to reduce security & IT budgets, how can you resist the pressure to cut corners & ensure that your security strategy remains focused, integral to the business &<br />

that security is not compromised? How can security add real business value? Evidence suggests that information leakage & industrial sabotage activity increases in such an economic climate so this is no time<br />

to be cutting back on your intelligence, security controls & governance operations.<br />

• Measuring cost efficiency of information security while avoiding reliance on<br />

• Finding new ways to do things<br />

key performance indicators<br />

• Potential pitfalls<br />

• Can the trust brought by online security really drive bottom line results?<br />

• Winning the trust of the business<br />

• Adopting cost cutting strategies versus maintaining business security & sustainability<br />

• Understand the urgent imperative for your business<br />

• Top tips to create value between information security & the business<br />

• Plan in advance to remain flexible & adaptable<br />

Chaired by: Mr. Ray Stanton, Global Head of Business Continuity, <strong>Security</strong> & Governance Practice, BT<br />

Panellists: Mr. Andreas Wuchner-Bruehl, Global Head of IT <strong>Security</strong>, Novartis Pharma AG (SWITZERLAND)<br />

Dr. Iman Baba, Head of <strong>Information</strong> <strong>Security</strong> & Business Continuity, BankMed (LEBANON)<br />

Dr. Eduardo Gelbstein, Senior <strong>Security</strong> Advisor, United Nations Board of External Auditors (SWITZERLAND)<br />

Mr. Tariq Elsadik, <strong>Chief</strong> Excellence/<strong>Information</strong> <strong>Officer</strong>, Al Fahim Group (Abu Dhabi, UAE)<br />

10:35 THE FAST SPEED OF CHANGE: BUSINESS OPPORTUNITIES & RISKS GOING ALONG WITH THE USE OF SOCIAL MEDIA<br />

Why should you care about Social Media<br />

• How to address the topic • What are the risks • One solution approach which has worked<br />

Mr. Andreas Wuchner-Bruehl, Global Head of IT <strong>Security</strong>, Novartis Pharma AG (SWITZERLAND)<br />

11:10 PATCH MANAGEMENT: INCREASINGLY A FACET OF EFFECTIVE RISK MANAGEMENT<br />

Patch management is nothing new; by now we should have moved away from the 'install & forget' days of old to a position of comprehensive patch management across the enterprise. Nevertheless, we still<br />

see the exploitation of vulnerabilities hitting the headlines with many organisations not only vulnerable to attack but successfully attacked & exploited. In this presentation we examine the increasingly critical<br />

role of Patch Management in the overall risk management framework & in doing so we look at:<br />

• The underlying trends driving the need for Patch Management to be proactive & preventative, not reactive & curative<br />

• What effective Patch Management looks like & what key considerations need to be taken into account<br />

• Why Patch Management in isolation is ineffective & how it fits into the bigger scheme of things<br />

• How people & process play as important a role as technology in making effective Patch Management a reality<br />

Mr. Marcus Alldrick, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong>, Lloyd’s (UK)<br />

11:50 LUNCH<br />

13:15 PLEASE SELECT YOUR PREFERRED STREAMED SESSIONS:<br />

The Threat Within<br />

13:15 – 14:00 CONDUCTING AN EFFECTIVE INFORMATION SECURITY & RISK ASSESSMENT<br />

Mr. Lalit Gandhi, Divisional Manager Audit and <strong>Information</strong> <strong>Security</strong>, Oman Trading<br />

Establishment (SULTANATE OF OMAN)<br />

Lalit is a qualified chartered accountant. Currently Divisional Manger Audit at Oman Trading Establishment (OTE), one of the largest private sector<br />

organizations in Oman. Lalit is also responsible for <strong>Information</strong> <strong>Security</strong> at OTE as <strong>Information</strong> <strong>Security</strong> Manager, & is Project Manager for the<br />

ISO27001 implementation project at OTE.<br />

14:00 – 14:40 NEW INTERACTIVE SESSION - HOW CAN SENSITIVE INFORMATION STAY<br />

FAITHFUL TO ITS ORGANISATION?<br />

This will be an interactive session with the audience split into three groups: 1. The<br />

disaffected employee; 2. The over-worked employee; 3. The CISO. The challenge: We all<br />

have security policies & measures in place that aim to protect the business from data<br />

leakage from our systems & our people. Backing up data & holding documents in central<br />

repositories provide a sense of well-being & comfort. We have the technology – we can<br />

achieve. However, the fact remains that to protect corporate data & intellectual property is<br />

a real challenge when we consider the people aspect. Where are all your data stored? Do<br />

you know? Greed, Envy, ambition, desperation & poverty are key characters in this play<br />

that convert even the most corporately versioned employee. Add ignorance; lack of<br />

training, education & awareness; time pressure & general lack of ability into the pot & the<br />

mix becomes worse. This exercise is about protecting your most valuable corporate asset.<br />

Dr. Cheryl Hennell, Head of IT <strong>Security</strong> and <strong>Information</strong> Assurance, Openreach<br />

Prior to her current position, Cheryl was a Senior Lecturer at the University of Portsmouth. Following 3 decades in the IT industry working for the<br />

Ministry of Defence, The Office of Population, Censuses & Surveys & as a European consultant for a blue chip organisation, she entered academia.<br />

Cheryl is an active CISSP & has recently been appointed as an ambassador for Childnet delivering training sessions in schools. Her academic<br />

interests lie in the analysis & design of information systems; developing secure information systems; business continuity & disaster recovery, &<br />

digital forensics. She designed, developed & led lectures on the BSc (Hons) Digital Forensics degree for the University of Portsmouth. In her<br />

current position she is responsible for delivering & maintaining strategy & policy for all issues relating to IT <strong>Security</strong> & <strong>Information</strong> Assurance within<br />

Openreach which is part of the BT Group.<br />

14:40 AFTERNOON TEA BREAK<br />

The External Threat Horizon & Counter-Measures<br />

13:15 – 14:00 OUTSOURCING CHALLENGES & ETHICAL ISSUES<br />

• The seven lifecycle stages of<br />

• What are the future challenges?<br />

outsourcing contracts<br />

• Third parties & subcontracts<br />

• Maintaining security & privacy throughout • Agree the security & business processes for the<br />

the contact lifecycle<br />

transformation of IT & security solutions over<br />

• Are there new/additional security risks? the life of the contract<br />

• What needs to be considered during due • Management & change of cryptographic keys<br />

diligence of offshore suppliers?<br />

• Ensure vendor continuity plans meet specified<br />

• Assurance & conformance audits<br />

business needs including; backups, recovery,<br />

• Change management<br />

standby & people<br />

• Specification of subject access request • Incident management<br />

(SAR) process with the vendor<br />

Mr. Hugh Penri-Willams, <strong>Information</strong> <strong>Security</strong> Forum<br />

14:00 – 14:40 IDENTITY & ACCESS CONTROL<br />

The management of administrative passwords such as ‘root,’ in Unix , ‘administrator,’ in Windows & ‘sa,’ in<br />

Database & 'enable’ in Routers is a problem that has existed since distributed systems made their way into<br />

business environments. Traditionally, this issue has been dealt with through procedure based controls, which is not<br />

always effective. Saudi Hollandi Bank had implemented a Password Auto Repository & sessions recording solution<br />

that was designed to solve the problem of shared administrative passwords & record their activities. Hear about the<br />

how these core features operate to enhance control of users to:<br />

• Protects infrastructure from rogue users, compromised devices, & applications<br />

• Assist with regulatory compliance through granular access control<br />

• Capture keystroke logging to provide a complete recording of internal support activities<br />

• Deliver clear, centralized reporting through the collection & aggregation of access & management logs<br />

• Offer session recording for event reconstruction purposes<br />

Mr. Ali Alotaibi, IT <strong>Security</strong> Manager, Saudi Hollandi Bank & Vice-Chairman for <strong>Information</strong> <strong>Security</strong>, Saudi<br />

Banking Committee (KINGDOM OF SAUDI ARABIA)<br />

Mr. Ali Alotaibi brings with him 17 years of experience in IT, mostly in banks in the field of Communication & IT security. He is also currently a vice chairman of<br />

Saudi Banking Committee for <strong>Information</strong> <strong>Security</strong>.<br />

15:00 WHAT ARE THE CEO’S EXPECTATIONS OF THE INFORMATION SECURITY FUNCTION?<br />

Mr. Osman Sultan, CEO, Du, (UAE) - INVITED<br />

15:30 LEGAL ASPECTS OF INFORMATION SECURITY<br />

Mr. Mustafa Ali Mahmood Al Hemeid, Head of Legal Division, National Bank of Oman (OMAN)<br />

16:00 PRIVACY, SECURITY & IDENTITY MANAGEMENT: CAN THEY CO-EXIST? WHAT IS THE PAY OFF?<br />

• Can they co-exist? What is the pay off? • Identity management & signature technologies • What are you doing to safeguard intellectual assets?<br />

• <strong>Security</strong> vs. privacy: which is more important? • Vulnerabilities of emerging identity technologies • Managing federated identities – what is the reality?<br />

• The problems of security in an organisation without perimeters<br />

Chaired by: Mr. Marcus Alldrick, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong>, Lloyd’s (UK)<br />

Panellists: Major Robert Noble MBE, Managing Director/Partner - International <strong>Security</strong> Consultancy Group Gulf WLL (UAE), Mr. Ali Alotaibi, IT <strong>Security</strong> Manager, Saudi Hollandi Bank & Vice-<br />

Chairman for <strong>Information</strong> <strong>Security</strong>, Saudi Banking Committee (KINGDOM OF SAUDI ARABIA), Mr. Yousuf Alihamed Al Harty, Managing Director, InfoShield LLC (OMAN)<br />

Mr. Andreas Wuchner-Bruehl, Global Head of IT <strong>Security</strong>, Novartis Pharma AG (SWITZERLAND)<br />

16:30 CLOSE OF DAY TWO<br />

CASE STUDY<br />

CASE STUDY<br />

16:45 TOUR OF MUSCAT FOLLOWED BY RECEPTION AT BAIT AL ZUBAIR MUSEUM<br />

All networking activities are provisional to date.


<strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> <strong>Middle</strong> <strong>East</strong> <strong>2009</strong> Executive Summit & Roundtable<br />

9–11 November <strong>2009</strong>, Intercontinental Hotel, Muscat, Sultanate of Oman<br />

Day Three: Wednesday 11 November <strong>2009</strong><br />

CISO Roundtable <strong>Middle</strong> <strong>East</strong> <strong>2009</strong> - Delivering Measurable Results During Tougher Times<br />

The CISO Roundtable - <strong>Middle</strong> <strong>East</strong> is the benchmarking highlight of the event. The agenda is set in advance by the participants who<br />

all have the opportunity to input directly into the <strong>2009</strong> agenda prior to the event! A further vote of agenda priorities is voted upon at the<br />

event itself. This facilitated roundtable briefing is for heads & senior managers of information security to drive & influence security<br />

strategy & policy, while benchmarking approaches to the key security challenges of the day. The challenge for the CISO role today is how to stay relevant & effective in an ever<br />

changing environment. How do you recognise when you need to change approach? Are there transferable skills & approaches you can use to address new challenges? Has<br />

the profile of the staff changed? Distinguished security experts & seasoned practitioners will co-ordinate interactive roundtable discussions & streamed group work. These<br />

open exchanges will ensure that you take away important new ideas to implement in your organisation. This is the ideal opportunity to compare strategy & tactics with global<br />

security industry leaders & network with professionals who face the same set of challenges as you. Furthermore, it is you the participant who sets the agenda! *The Chatham<br />

House Rule applies. No press permitted.<br />

CHAIRED BY: Charles V. Pask, Managing Director, ITSEC Associates Ltd<br />

FACILITATORS: Eddie Schwartz, <strong>Chief</strong> <strong>Security</strong> <strong>Officer</strong>, NetWitness (U.S.), Andreas Wuchner-Bruehl, Global Head of IT <strong>Security</strong>, Novartis Pharma AG (SWITZERLAND)<br />

John Colley, Managing Director EMEA, (ISC) 2 , Dr. Cheryl Hennell, Head of IT <strong>Security</strong> and <strong>Information</strong> Assurance, Openreach (UK)<br />

Marcus Alldrick, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong>, Lloyd’s (UK), Richard Cross, CISO, Toyota Motor Europe (BELGIUM)<br />

Mr. Badar Al-Saleh, Director, Omani Cert. (OMAN), Mr. Abdullah Al-Barwani, <strong>Chief</strong> of <strong>Security</strong>, The <strong>Information</strong> Technology Authority (ITA) (OMAN)<br />

PROVISIONAL AGENDA- you will be asked for your input on the topics in advance to set the agenda based around your current challenges!<br />

08:30 – 09:00 REGISTRATION & COFFEE<br />

09:00 – 09:10 WELCOME, GROUP INTRODUCTIONS & SETTING OF AGENDA PRIORITIES<br />

Chaired by: Charles V. Pask<br />

09:10 – 10:10 SESSION 1: RISK DECISION TAKING: ARE DECISIONS MORE INSTINCT THAN INFORMED JUDGEMENT?<br />

Lead Facilitator: Marcus Alldrick<br />

10:10 – 11:00 SESSION 2: IT RISK METRICS: WHAT’S WRONG WITH THEM & WHAT NEEDS TO BE FIXED TO MAKE THEM WORK<br />

Lead Facilitator: Eddie Schwartz<br />

11:00 – 11:20 MORNING COFFEE BREAK<br />

11:20 – 12:00 SESSION 3: TOPIC BE CONFIRMED BASED ON PARTICIPANTS FEEDBACK<br />

Lead Facilitator: Richard Cross<br />

12:00 – 13:00 LUNCH<br />

13:00 – 13:45 SESSION 4: BREAKOUT SESSIONS<br />

The group will break into two teams for specific discussions. Each team will have the support of 4 facilitators, including a 10-minute presentation by the facilitator, 30-minutes of<br />

group discussion, and 5-minutes to present the key learning points from each session back to the full group after the break.<br />

SESSION 4A: TOPIC BE CONFIRMED BASED ON PARTICIPANTS FEEDBACK<br />

Lead Facilitator: John Colley<br />

13:45 – 14:00 FEEDBACK FROM THE BREAKOUT SESSIONS TO THE FULL GROUP<br />

14:00 – 14:50 SESSION 5: TOPIC BE CONFIRMED BASED ON PARTICIPANTS FEEDBACK<br />

14:50 – 15:15 AFTERNOON TEA BREAK<br />

15:15 – 15:45 SESSION 6: OPTIONAL - 30 MINUTE CLOSE SESSION FOR REAL-LIFE SECURITY INCIDENTS<br />

Lead Facilitator: Charles V. Pask<br />

Supported by: All Facilitators<br />

16:00 CHAIRMAN’S SUMMARY, GOODBYES & CLOSE OF DAY<br />

Lead CISO Roundtable Sponsor<br />

Don’t miss the new information survey<br />

for heads of information security<br />

conducted by security vendor<br />

NetWitness, Lead Sponsor of the CISO<br />

Roundtable <strong>Middle</strong> <strong>East</strong> <strong>2009</strong> & <strong>MIS</strong><br />

<strong>Training</strong> Institute! Survey live soon on<br />

www.mistieurope.com/CISOMEsurvey<br />

SESSION 4B: TOPIC BE CONFIRMED BASED ON PARTICIPANTS FEEDBACK<br />

Lead Facilitator: Andreas Wuchner-Bruehl<br />

ABOUT THE CISO ROUNDTABLE MIDDLE EAST <strong>2009</strong> FACULTY<br />

CHAIRMAN: Mr. Charles V. Pask, Managing Director, ITSEC Associates Ltd<br />

Charles is responsible for delivering global IT security & IT audit services, including public training courses, in-house training courses,<br />

conferences & symposiums. Previously, he was a Director with <strong>MIS</strong> <strong>Training</strong>,& Director of <strong>Information</strong> <strong>Security</strong> Institute (ISI) European & <strong>Middle</strong><br />

<strong>East</strong> e-<strong>Security</strong> Services. Mr. Pask has over 20 years’ experience in IT, IT audit,& IT security, & was the <strong>Information</strong> <strong>Security</strong> Manager for Alliance<br />

& Leicester plc prior to joining <strong>MIS</strong>. More recently Charles was the Global Head of Strategy, Development & Globalisation for the BT Business<br />

Continuity, <strong>Security</strong> & Governance Practice.<br />

FACILITATORS: Mr. Eddie Schwartz, Vice President, <strong>Chief</strong> <strong>Security</strong> <strong>Officer</strong>, NetWitness<br />

Corporation<br />

Eddie is <strong>Chief</strong> <strong>Security</strong> <strong>Officer</strong> of NetWitness and has 25 years experience in the information security and privacy fields. Previously, he was <strong>Chief</strong><br />

Technology <strong>Officer</strong> of ManTech <strong>Information</strong> Systems and Technology Corporation, EVP and General Manager for Global Integrity/Predictive Systems,<br />

SVP of Operations at Guardent, CISO for Nationwide Insurance; a Senior Computer Scientist at CSC where he was Technical Director of the DSS<br />

<strong>Information</strong> <strong>Security</strong> Laboratory, and a Foreign Service <strong>Officer</strong> with the U.S. Department of State. Mr. Schwartz has advised a number of security<br />

companies, and served on the Executive Committee for the Banking <strong>Information</strong> Technology Secretariat (BITS). Mr. Schwartz has a B.I.S. in<br />

<strong>Information</strong> <strong>Security</strong> Management and an M.S. in <strong>Information</strong> Technology Management from the George Mason University School of Management.<br />

Mr. Andreas Wuchner-Bruehl, Global Head of IT <strong>Security</strong>, Novartis Pharma AG<br />

(SWITZERLAND)<br />

Andreas, CISO, CISA, CISSP, leads IT <strong>Security</strong> & <strong>Security</strong> Emergency Response globally across the corporation. In this role he & his team are responsible<br />

for the planning & supervision of Novartis’ worldwide computer & network information security systems, defining the company’s IT security policies,<br />

baselines & standards & enhancing the security of Novartis IT services & global infrastructure. Andreas has more than 12 years’ experience managing all<br />

aspects of information technology management, with deep expertise in rapidly changing, highly demanding large-scale environments. Prior to joining<br />

Novartis Pharmaceuticals, Andreas worked for Ciba Geigy & IBM on various IT projects covering different aspects of information technology.<br />

Mr. John Colley, Managing Director EMEA, (ISC) 2<br />

Mr. Colley, CISSP, is the Managing Director for EMEA & Co- Chair of the European Advisory Board for (ISC)2 , a non-profit professional<br />

consortium which has certified over 60,000 members worldwide. He served on the (ISC)2 Board of Directors for eight years including two as<br />

chairman. John has over fifteen years experience in information security. He has formerly held posts as Head of Risk Services at Barclays, Group<br />

Head of <strong>Information</strong> <strong>Security</strong> at the Royal Bank of Scotland Group, Director of <strong>Information</strong> <strong>Security</strong> at Atomic Tangerine & as Head of <strong>Information</strong><br />

<strong>Security</strong> at ICL. John has also worked as an independent consultant providing value added advice and guidance to blue chip organisations.<br />

Mr. Marcus Alldrick, CISO, Lloyd's<br />

In his role at Lloyd’s Marcus is responsible for ensuring that risks to information are understood & adequately mitigated in a cost<br />

effective manner throughout the organisation, both in the UK and in its overseas locations, & that assurance to this effect is provided to<br />

Executive, Senior and Line Management. Marcus has worked in IT for over 30 years, specialising in information risk & security for the<br />

latter 17 years. Prior to joining Lloyd’s, Marcus was a Principal Advisor for KPMG, working in IT Advisory & specialising in information<br />

security strategy definition & implementation. Before that Marcus was Head of <strong>Information</strong> <strong>Security</strong> for Abbey National plc, a leading UK<br />

bank, a position he held for six years following seven years as <strong>Information</strong> Risk and <strong>Security</strong> Manager for Barclaycard, part of Barclays<br />

plc & Europe’s largest credit card issuer.<br />

Mr. Richard Cross, CISO, Toyota Motor Europe (BELGIUM)<br />

Richard has been the Corporate <strong>Security</strong> <strong>Officer</strong> in Toyota Motor Europe since 2002 & has led the organisation through a maturing process in<br />

implementing a full <strong>Information</strong> <strong>Security</strong> lifecycle. His journey in Toyota has been a cross-cultural one both in terms of business approach &<br />

nationalities, understanding how to apply the world famous “Toyota Production System” into security activities. The focus of his activity has<br />

moved away from pure <strong>Information</strong> <strong>Security</strong> into the broader sphere of Corporate Risk Management, with a corresponding change in reporting<br />

line, from CIO to the Corporate Planning Offices. Further back in his career he worked for a British Government intelligence agency in a technical<br />

security role, involving the design of systems to support data warehouse analysis.<br />

Networking Opportunities - Build Trust-Based Relationships In Muscat!<br />

Meeting your security peers to exchange ideas & build trust-based networks is an integral part of the CISO<br />

Executive Summit & Roundtable <strong>Middle</strong> <strong>East</strong>. As such, <strong>MIS</strong> & Sponsors have set aside dedicated time for<br />

networking, which will allow you to enjoy your time in Muscat. Please note that all activities are all provisional to<br />

date & are sponsorship-related.<br />

MONDAY 9TH NOVEMBER SUNSET DHOW CRUISE WELCOME DRINKS<br />

Join information security peers for the Sunset Dhow cruise – a leisurely cruise down the coast.<br />

The ‘dhow’ has been in use for centuries, & is an essential part of Oman’s proud maritime<br />

tradition. Enjoy the dramatic mountains cascading into the sea from a different perspective, while<br />

enjoying drinks & talking to peers. Followed by a typical Arabic dinner (BBQ) on the beach<br />

TUESDAY 10TH NOVEMBER TOUR OF MUSCAT FOLLOWED BY DRINKS RECEPTION AT<br />

BAIT AL ZUBAIR MUSEUM<br />

Drive along the waterfront Corniche visiting the Fish Market & the colourful Muttrah Souq that<br />

awaits you with sights, sounds & aroma of the orient. Stop at the Bait Al Zubair Museum for<br />

an introduction that traces Oman’s history & development, followed by a drinks reception.<br />

About the Venue<br />

The hotel is situated in the prime<br />

residential, government & diplomatic<br />

quarter, only 15 minutes from the<br />

airport. Set in 35 acres of palm<br />

gardens between the imposing Hajjar<br />

Mountains & the pale sand of the Gulf<br />

Coast, offering stunning views on<br />

each side, it is a ‘resort within the<br />

city’. With its proximity to the capital’s<br />

business & commercial district, the<br />

hotel is the ideal place to stay for<br />

business or leisure & to host<br />

meetings, company conventions, gala<br />

dinners or receptions! See back page<br />

for more details.


<strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> <strong>Middle</strong> <strong>East</strong> <strong>2009</strong><br />

Executive Summit & Roundtable<br />

9–11 November <strong>2009</strong>, Intercontinental Hotel, Muscat, Sultanate of Oman<br />

Under the Patronage of ITA<br />

5 Easy Ways to Register<br />

Tel: +44 (0)20 7779 8944 Email: mis@mistieurope.com<br />

Fax: +44 (0)20 7779 8293 Web: www.mistieurope.com/CISOME<br />

Mail: Guy Cooper, <strong>MIS</strong> <strong>Training</strong>, Nestor House, Playhouse Yard, London<br />

EC4V 5EX UK<br />

Customer <strong>Information</strong><br />

(please print or attach business card)<br />

Title<br />

Surname<br />

Position<br />

Organisation<br />

First name<br />

E-Mail Address (Required)<br />

Address<br />

Country<br />

Postcode<br />

When registering please quote reference: WEB<br />

Reserve Your Place by 1st October <strong>2009</strong><br />

& Receive 3 FREE Books on <strong>Information</strong> <strong>Security</strong>,<br />

Authored by Speakers at the CISO Summit <strong>Middle</strong> <strong>East</strong> <strong>2009</strong>!<br />

• “Managing the Human Factor in <strong>Information</strong> <strong>Security</strong>: How to Win Over Staff and<br />

Influence Business Managers”, by David Lacey<br />

• “Honeypots: Tracking Hackers” by Lance Spitzner<br />

• “Crossing the Executive Digital Divide, The Course Book” by Eduardo Gelbstein<br />

* Please note that these book titles are subject to availability at the time.<br />

Registration <strong>Information</strong> (fees must be paid in advance of the event)<br />

Fee<br />

2nd Annual CISO Executive Summit & Roundtable £1,750<br />

<strong>Middle</strong> <strong>East</strong> <strong>2009</strong> (9-11 November <strong>2009</strong>)<br />

Included in the Fee:<br />

• Entry to 3-Day Event<br />

• CPEs & Certificates<br />

• Official Summit Materials & USB Stick<br />

• Web-link to Updated Presentation Materials Will be Made Available<br />

Immediately Following the Summit (Subject to Speaker’s Permission)<br />

• All Lunches & Daily Refreshments<br />

• Networking Functions (Subject to Further Confirmation)<br />

Please send me information on<br />

3rd Annual <strong>Chief</strong> <strong>Security</strong> <strong>Officer</strong> (CSO) Summit <strong>2009</strong>,<br />

14 - 16 October <strong>2009</strong>, Hotel R Juan Carlos I, Barcelona – Spain<br />

2nd Annual <strong>Security</strong> Africa Summit <strong>2009</strong>, 1 – 4 December <strong>2009</strong>,<br />

La Palm Beach Royal Beach Hotel, Accra – Ghana<br />

4th Annual Fraud & Corruption Summit 2010, 17 - 19 March 2010, UK<br />

Conferencia Latinoamericana: Gobernanza, Riesgo y Auditoria 2010,<br />

23 – 26 marzo 2010, Panama<br />

7th Annual CISO Executive Summit 2010, 9 - 11 June 2010, Madrid<br />

5th Annual Audit, Risk & Governance Africa Conference 2010,<br />

19 - 23 July 2010, Africa (location TBC)<br />

Audit, Risk & Governance <strong>Middle</strong> <strong>East</strong> 2010, 1 – 3 November 2010, Dubai – UAE<br />

Telephone<br />

Fax<br />

The information you provide will be safeguarded by the Euromoney Institutional Investor Plc. group whose subsidiaries may<br />

use it to keep you informed of relevant products and services. We occasionally allow reputable companies outside the<br />

Euromoney Institutional Investor Plc. group to contact you with details of products that may be of interest to you. As an<br />

international group we may transfer your data on a global basis for the purposes indicated above. If you object to contact by<br />

telephone , fax , or email please tick the relevant box. If you do not want us to share your information with other<br />

reputable companies please tick this box<br />

Payment Method<br />

Pay Online at www.mistieurope.com (all fees must be paid in advance of the event)<br />

Cheque enclosed<br />

Please invoice my company PO#<br />

(payable to <strong>MIS</strong> <strong>Training</strong>)<br />

Credit cards can be taken over the phone only. Please call +44 (0)20 7779 8944<br />

Please include billing address if different from address given above<br />

Please note that in completing this booking you undertake to adhere to the<br />

cancellation policy and payment terms.<br />

Signature<br />

Approving Manager<br />

Date<br />

Position<br />

Summit Venue & Accommodation<br />

The CISO Executive Summit & Roundtable <strong>Middle</strong> <strong>East</strong> <strong>2009</strong> will take place at:<br />

Intercontinental Muscat P.O. Box 398, Muscat, Sultanate of Oman. Phone: +968 24 680 000<br />

www.ichotelsgroup.com/intercontinental/en/gb/locations/overview/muscat<br />

• To get the best available rate, please contact Mrs Mercy Anil directly on + 968 24 680 000<br />

or email mercy.anil@icmuscathotel.com<br />

• When making your booking with the hotel, please quote: '<strong>MIS</strong> <strong>Training</strong> Institute's 2nd Annual CISO Summit & Roundtable'.<br />

• Limited rooms are available, so to avoid any disappointments, please book early.<br />

• <strong>MIS</strong> <strong>Training</strong> Institute is not liable & responsible for any hotel bookings & cannot guarantee availability or specific rates<br />

• Delegates are responsible for the arrangement & payment of their own accommodation while in Muscat<br />

About the Intercontinental Muscat – please view the full fact sheet & map via this web-link:<br />

www.ichotelsgroup.com/intercontinental/en/gb/locations/overview/mscha<br />

The hotel is only 15 minutes from the airport. High speed/broad-band Internet is available in all guest rooms & all function<br />

What other potential NEW conferences would you or colleagues be interested in<br />

attending in the <strong>Middle</strong> <strong>East</strong>?<br />

Fraud & Corruption Summit <strong>Middle</strong> <strong>East</strong><br />

(for internal auditors & fraud prevention professionals)<br />

Digital Evidence Conference <strong>Middle</strong> <strong>East</strong><br />

(for heads of IT investigations / legal professionals & in-house counsel)<br />

Tax Audit & Compliance Conference <strong>Middle</strong> <strong>East</strong><br />

(for tax authorities & corporate tax directors)<br />

<strong>Chief</strong> <strong>Security</strong> <strong>Officer</strong>s Summit <strong>Middle</strong> <strong>East</strong><br />

(for corporate / physical / business security directors)<br />

Other conferences – please list focuses<br />

Cancellation Policy: Should a delegate be unable to attend, a substitute may attend in his or her place. A credit<br />

or refund, minus 10% administration charge, is available if written notification is received by 20th October <strong>2009</strong>.<br />

Thereafter, no refunds will be given. <strong>MIS</strong> reserves the right to change or cancel this programme due to<br />

unforeseen circumstances. Founded in 1978, <strong>MIS</strong> <strong>Training</strong> Institute is the international leader in providing<br />

training & conferences to information security, audit, fraud & IT audit professionals. With offices in the USA, UK,<br />

& Asia, <strong>MIS</strong> is a division of Euromoney Institutional Investor Plc (FTSE250) and is part of the Daily Mail &<br />

General Trust (DMGT). www.mistieurope.com<br />

rooms. There are various restaurants & bars within the hotel premises including: Trader Vic’s: (Hawaiian, Tahitian &<br />

Polynesian in a south pacific setting); Señor Pico (bringing alive the colours, moods & excitement of rustic Mexico with<br />

latino music); Musandam Café & Terrace Restaurant: breakfast, lunch & dinner buffets offer a vast selection of hot & cold<br />

dishes; Tomato (open-air restaurant serves Italian & Mediterranean delicacies); Al Ghazal Pub (typical British pub); Majlis Al<br />

Shams (open-plan seating area epitomises traditional Arabic hospitality with its Arabian tent & ethnic décor); The Majlis<br />

(range of tea, coffee, snacks, pastries, light meals & beverages). The fitness club features a lap-pool, resort-style single<br />

depth pool & children’s pool, six flood-lit tennis courts, two air-conditioned squash courts, a 900 sqm health club, featuring<br />

a hi-tech, fully air-conditioned fitness centre, jacuzzi, sauna, steam-bath & plunge pool. Outdoor facilities include a football<br />

pitch, volleyball court & access to the beach. The hotel’s beautifully landscaped spacious gardens lead directly onto miles<br />

of sandy beach, bordered by clear, sapphire-blue ocean. The hotel can arrange for jet-skiing, windsurfing, fishing, sailing,<br />

water-skiing & scuba-diving. The main shopping area is only 10 minutes away from the hotel. Muttrah Souq is the oldest<br />

market place in the capital & offers a fascinating insight into authentic Omani culture. Gold, silver, antiques, spices, dates &<br />

frankincense can all be found in abundance in this colourful corner of Muscat. Oman is the home of frankincense so a visit<br />

to Muttrah Souq would not be complete without picking up a few pieces of this ancient luxury!<br />

To Register Call +44 (0) 20 779 8944 Fax +44 (0) 20 7779 8293<br />

Email mis@mistieurope.com or visit www.mistieurope.com/CISOME

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!