28.11.2014 Views

Chief Information Security Officer Middle East 2009 - MIS Training

Chief Information Security Officer Middle East 2009 - MIS Training

Chief Information Security Officer Middle East 2009 - MIS Training

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong> <strong>Middle</strong> <strong>East</strong> <strong>2009</strong> Executive Summit & Roundtable<br />

9–11 November <strong>2009</strong>, Intercontinental Hotel, Muscat, Sultanate of Oman<br />

Day Two: Tuesday 10 November <strong>2009</strong><br />

<strong>Information</strong> <strong>Security</strong> Risk Management: The Threat Within & the External Threat Horizon & Counter-Measures<br />

06:45 COFFEE<br />

06:55 CHAIRMAN’S RE-OPENING<br />

KEYNOTE 07:00 DIGITAL EVIDENCE – A JUDICIAL & LEGAL PERSPECTIVE<br />

Judge Dr. Ehab Maher Elsonbaty, BA, MA, LLM, PhD, Senior Judge in Egypt & Secondment to the State of Qatar, Legal Expert, Amiri Diwan, State of Qatar (QATAR)<br />

Judge Dr. Ehab Maher Elsonbaty is a senior judge & a member of the civil, criminal &commercial panel of the Damanhor Court. He lectures on cyber law topics & technology in litigation to the Arab Academy for Science and Technology and Private International Law. He is a consultant to the Council of Europe, UNODC & ITU.<br />

07:40 EVACUATION PLANNING – EMERGENCY RESPONSE & BUSINESS REINSTATEMENT<br />

• Corporate Emergency Contingency Plans • Local Intelligence • Post evacuation action<br />

• Evacuation Planning • Recovery & reinstatement • Pre evacuation tasks<br />

Major Robert Noble MBE, Managing Director/Partner, International <strong>Security</strong> Consultancy Group Gulf WLL (QATAR)<br />

Mr. Noble has nearly 30 years experience in international security of precious metals & minerals, protection of diplomats, diplomatic missions & corporates, technical & physical security & training of police & security personnel. Mr. Noble is a veteran of some 15 military coups & insurgency actions & was involved in safe<br />

evacuations of diplomatic & corporate staff in various African countries, most notably in Mogadishu, Somalia, in 1991 when, under constant hostile fire, he ensured the safe movement of diplomats & their families, from Oman, Qatar, UAE, Kuwait, Sudan, Kenya, Nigeria, Turkey, Germany, Great Britain, Russia & USA, from<br />

their exposed city locations, to the relative safety of the US Embassy compound, prior to evacuation to Muscat, Oman by US Naval forces. In 1995, he also managed the evacuation of some 3000 multi national personnel & families from the northern industrial & mining areas of Sierra Leone, whilst under attack by rebel<br />

insurgents, to safety in the port of Freetown. This evacuation was accomplished under his personal supervision, at night & by sea, with no loss of life. Mr. Noble was awarded the MBE for services to British overseas security interests & is a holder of the US Secretary of State's Superior Honor Award for Heroism. In addition,<br />

he has over 30 awards & commendations from amongst others, the US Diplomatic <strong>Security</strong> Service, German Diplomatic Protection Police and several other entities. He wrote the Global Emergency Response Plan for a major US IT Corporation & served 10 years in British military in armored, airborne & MOD posts.<br />

08:20 THE EASY WAY TO AVOID BECOMING THE NEXT DATA LEAKAGE HEADLINE<br />

Data security is a legal, operational & reputational risk issue for any organisation in any part of the world. Hear top tips for avoiding becoming the next headline.<br />

• Data loss/breach legislation - how does it apply to me, what does it mean to me? • Evaluating data loss management & encryption technology<br />

• How to enable the safe use of removable storage such as USB memory sticks • Integration - data controls<br />

• What data loss prevention (DLP) can bring to the enterprise • Top tips & best practice<br />

Mr. Richard Cross, CISO, Toyota Motor Europe (BELGIUM)<br />

09:00 THE BUSINESS CASE FOR INFORMATION SECURITY & ITS BOUNDARIES WITH MATURE IT PROCESSES<br />

Dr. Eduardo Gelbstein, Adjunct Professor, Webster University, Geneva, Former Advisor to the UN Board of Auditors and Former Director, UN International Computing Centre (SWITZERLAND)<br />

Ed has worked in IT for over 40 years in the private & public sectors of several countries, & in executive positions since the mid 1980s. In 2002 he “retired” from the UN, where he was Director of the International Computing Centre with 24*7 operations in Geneva, New York, & Brindisi for clients including UN<br />

Peace Keeping, the World Food Programme & the UN High Commission for Refugees – an environment where responding to crises are common events. He then became an IT advisor & auditor, for the UN Board of Auditors and the Cour des Comptes (National Audit Office of France). Ed is author of several books<br />

& publications, he is adjunct professor of Business Systems Management at Webster University in Geneva, an advisor to the Master of Advanced Studies programme of Zürich Technical University & a senior fellow of the Diplo Foundation, dedicated to the training of young diplomats from all over the world.<br />

KEYNOTE<br />

PANEL CASE STUDY<br />

KEY CASE STUDY<br />

CASE STUDY KEY CASE STUDY<br />

PANEL DEBATE<br />

KEY CASE<br />

STUDY<br />

SPECIAL<br />

KEYNOTE<br />

CASE<br />

STUDY<br />

09:40 MORNING COFFEE BREAK<br />

10:00 CREATING VALUE & TRUST BETWEEN INFORMATION SECURITY & THE BUSINESS THROUGH EXTENSIVE CHANGE & DURING DIFFICULT TIMES<br />

As executive boards globally are threatening to reduce security & IT budgets, how can you resist the pressure to cut corners & ensure that your security strategy remains focused, integral to the business &<br />

that security is not compromised? How can security add real business value? Evidence suggests that information leakage & industrial sabotage activity increases in such an economic climate so this is no time<br />

to be cutting back on your intelligence, security controls & governance operations.<br />

• Measuring cost efficiency of information security while avoiding reliance on<br />

• Finding new ways to do things<br />

key performance indicators<br />

• Potential pitfalls<br />

• Can the trust brought by online security really drive bottom line results?<br />

• Winning the trust of the business<br />

• Adopting cost cutting strategies versus maintaining business security & sustainability<br />

• Understand the urgent imperative for your business<br />

• Top tips to create value between information security & the business<br />

• Plan in advance to remain flexible & adaptable<br />

Chaired by: Mr. Ray Stanton, Global Head of Business Continuity, <strong>Security</strong> & Governance Practice, BT<br />

Panellists: Mr. Andreas Wuchner-Bruehl, Global Head of IT <strong>Security</strong>, Novartis Pharma AG (SWITZERLAND)<br />

Dr. Iman Baba, Head of <strong>Information</strong> <strong>Security</strong> & Business Continuity, BankMed (LEBANON)<br />

Dr. Eduardo Gelbstein, Senior <strong>Security</strong> Advisor, United Nations Board of External Auditors (SWITZERLAND)<br />

Mr. Tariq Elsadik, <strong>Chief</strong> Excellence/<strong>Information</strong> <strong>Officer</strong>, Al Fahim Group (Abu Dhabi, UAE)<br />

10:35 THE FAST SPEED OF CHANGE: BUSINESS OPPORTUNITIES & RISKS GOING ALONG WITH THE USE OF SOCIAL MEDIA<br />

Why should you care about Social Media<br />

• How to address the topic • What are the risks • One solution approach which has worked<br />

Mr. Andreas Wuchner-Bruehl, Global Head of IT <strong>Security</strong>, Novartis Pharma AG (SWITZERLAND)<br />

11:10 PATCH MANAGEMENT: INCREASINGLY A FACET OF EFFECTIVE RISK MANAGEMENT<br />

Patch management is nothing new; by now we should have moved away from the 'install & forget' days of old to a position of comprehensive patch management across the enterprise. Nevertheless, we still<br />

see the exploitation of vulnerabilities hitting the headlines with many organisations not only vulnerable to attack but successfully attacked & exploited. In this presentation we examine the increasingly critical<br />

role of Patch Management in the overall risk management framework & in doing so we look at:<br />

• The underlying trends driving the need for Patch Management to be proactive & preventative, not reactive & curative<br />

• What effective Patch Management looks like & what key considerations need to be taken into account<br />

• Why Patch Management in isolation is ineffective & how it fits into the bigger scheme of things<br />

• How people & process play as important a role as technology in making effective Patch Management a reality<br />

Mr. Marcus Alldrick, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong>, Lloyd’s (UK)<br />

11:50 LUNCH<br />

13:15 PLEASE SELECT YOUR PREFERRED STREAMED SESSIONS:<br />

The Threat Within<br />

13:15 – 14:00 CONDUCTING AN EFFECTIVE INFORMATION SECURITY & RISK ASSESSMENT<br />

Mr. Lalit Gandhi, Divisional Manager Audit and <strong>Information</strong> <strong>Security</strong>, Oman Trading<br />

Establishment (SULTANATE OF OMAN)<br />

Lalit is a qualified chartered accountant. Currently Divisional Manger Audit at Oman Trading Establishment (OTE), one of the largest private sector<br />

organizations in Oman. Lalit is also responsible for <strong>Information</strong> <strong>Security</strong> at OTE as <strong>Information</strong> <strong>Security</strong> Manager, & is Project Manager for the<br />

ISO27001 implementation project at OTE.<br />

14:00 – 14:40 NEW INTERACTIVE SESSION - HOW CAN SENSITIVE INFORMATION STAY<br />

FAITHFUL TO ITS ORGANISATION?<br />

This will be an interactive session with the audience split into three groups: 1. The<br />

disaffected employee; 2. The over-worked employee; 3. The CISO. The challenge: We all<br />

have security policies & measures in place that aim to protect the business from data<br />

leakage from our systems & our people. Backing up data & holding documents in central<br />

repositories provide a sense of well-being & comfort. We have the technology – we can<br />

achieve. However, the fact remains that to protect corporate data & intellectual property is<br />

a real challenge when we consider the people aspect. Where are all your data stored? Do<br />

you know? Greed, Envy, ambition, desperation & poverty are key characters in this play<br />

that convert even the most corporately versioned employee. Add ignorance; lack of<br />

training, education & awareness; time pressure & general lack of ability into the pot & the<br />

mix becomes worse. This exercise is about protecting your most valuable corporate asset.<br />

Dr. Cheryl Hennell, Head of IT <strong>Security</strong> and <strong>Information</strong> Assurance, Openreach<br />

Prior to her current position, Cheryl was a Senior Lecturer at the University of Portsmouth. Following 3 decades in the IT industry working for the<br />

Ministry of Defence, The Office of Population, Censuses & Surveys & as a European consultant for a blue chip organisation, she entered academia.<br />

Cheryl is an active CISSP & has recently been appointed as an ambassador for Childnet delivering training sessions in schools. Her academic<br />

interests lie in the analysis & design of information systems; developing secure information systems; business continuity & disaster recovery, &<br />

digital forensics. She designed, developed & led lectures on the BSc (Hons) Digital Forensics degree for the University of Portsmouth. In her<br />

current position she is responsible for delivering & maintaining strategy & policy for all issues relating to IT <strong>Security</strong> & <strong>Information</strong> Assurance within<br />

Openreach which is part of the BT Group.<br />

14:40 AFTERNOON TEA BREAK<br />

The External Threat Horizon & Counter-Measures<br />

13:15 – 14:00 OUTSOURCING CHALLENGES & ETHICAL ISSUES<br />

• The seven lifecycle stages of<br />

• What are the future challenges?<br />

outsourcing contracts<br />

• Third parties & subcontracts<br />

• Maintaining security & privacy throughout • Agree the security & business processes for the<br />

the contact lifecycle<br />

transformation of IT & security solutions over<br />

• Are there new/additional security risks? the life of the contract<br />

• What needs to be considered during due • Management & change of cryptographic keys<br />

diligence of offshore suppliers?<br />

• Ensure vendor continuity plans meet specified<br />

• Assurance & conformance audits<br />

business needs including; backups, recovery,<br />

• Change management<br />

standby & people<br />

• Specification of subject access request • Incident management<br />

(SAR) process with the vendor<br />

Mr. Hugh Penri-Willams, <strong>Information</strong> <strong>Security</strong> Forum<br />

14:00 – 14:40 IDENTITY & ACCESS CONTROL<br />

The management of administrative passwords such as ‘root,’ in Unix , ‘administrator,’ in Windows & ‘sa,’ in<br />

Database & 'enable’ in Routers is a problem that has existed since distributed systems made their way into<br />

business environments. Traditionally, this issue has been dealt with through procedure based controls, which is not<br />

always effective. Saudi Hollandi Bank had implemented a Password Auto Repository & sessions recording solution<br />

that was designed to solve the problem of shared administrative passwords & record their activities. Hear about the<br />

how these core features operate to enhance control of users to:<br />

• Protects infrastructure from rogue users, compromised devices, & applications<br />

• Assist with regulatory compliance through granular access control<br />

• Capture keystroke logging to provide a complete recording of internal support activities<br />

• Deliver clear, centralized reporting through the collection & aggregation of access & management logs<br />

• Offer session recording for event reconstruction purposes<br />

Mr. Ali Alotaibi, IT <strong>Security</strong> Manager, Saudi Hollandi Bank & Vice-Chairman for <strong>Information</strong> <strong>Security</strong>, Saudi<br />

Banking Committee (KINGDOM OF SAUDI ARABIA)<br />

Mr. Ali Alotaibi brings with him 17 years of experience in IT, mostly in banks in the field of Communication & IT security. He is also currently a vice chairman of<br />

Saudi Banking Committee for <strong>Information</strong> <strong>Security</strong>.<br />

15:00 WHAT ARE THE CEO’S EXPECTATIONS OF THE INFORMATION SECURITY FUNCTION?<br />

Mr. Osman Sultan, CEO, Du, (UAE) - INVITED<br />

15:30 LEGAL ASPECTS OF INFORMATION SECURITY<br />

Mr. Mustafa Ali Mahmood Al Hemeid, Head of Legal Division, National Bank of Oman (OMAN)<br />

16:00 PRIVACY, SECURITY & IDENTITY MANAGEMENT: CAN THEY CO-EXIST? WHAT IS THE PAY OFF?<br />

• Can they co-exist? What is the pay off? • Identity management & signature technologies • What are you doing to safeguard intellectual assets?<br />

• <strong>Security</strong> vs. privacy: which is more important? • Vulnerabilities of emerging identity technologies • Managing federated identities – what is the reality?<br />

• The problems of security in an organisation without perimeters<br />

Chaired by: Mr. Marcus Alldrick, <strong>Chief</strong> <strong>Information</strong> <strong>Security</strong> <strong>Officer</strong>, Lloyd’s (UK)<br />

Panellists: Major Robert Noble MBE, Managing Director/Partner - International <strong>Security</strong> Consultancy Group Gulf WLL (UAE), Mr. Ali Alotaibi, IT <strong>Security</strong> Manager, Saudi Hollandi Bank & Vice-<br />

Chairman for <strong>Information</strong> <strong>Security</strong>, Saudi Banking Committee (KINGDOM OF SAUDI ARABIA), Mr. Yousuf Alihamed Al Harty, Managing Director, InfoShield LLC (OMAN)<br />

Mr. Andreas Wuchner-Bruehl, Global Head of IT <strong>Security</strong>, Novartis Pharma AG (SWITZERLAND)<br />

16:30 CLOSE OF DAY TWO<br />

CASE STUDY<br />

CASE STUDY<br />

16:45 TOUR OF MUSCAT FOLLOWED BY RECEPTION AT BAIT AL ZUBAIR MUSEUM<br />

All networking activities are provisional to date.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!