Venue
The St. Regis Abu Dhabi
The St. Regis Abu Dhabi, Corniche, Nation Towers, 1st St, Al Bateen, Abu Dhabi, UAE

What is Qwoted?

Qwoted is a free expert network: we help reporters connect with experts & we help those same experts build relationships with top reporters.

Event Date Wed May 10 +04 (over 1 year ago)
In your timezone (EST): Tue May 9 4:00pm - Tue May 9 4:00pm
Location The St. Regis Abu Dhabi
Corniche, Nation Towers, 1st St, Al Bateen, Abu Dhabi, UAE
Region EMEA
Details

All too often cybersecurity is still seen as a binary, IT issue: is our IT infrastructure secure? The problem with that approach is first, the answer is always ‘not 100%’, and second, the question completely avoids the factors that should drive a real-world security programme. Cybersecurity is a business risk like any other; its significance is a function of the risk cyber-crime is to the business; there is a finite level of resourcing to mitigate the most material elements of that risk; and there will always be residual risk that cannot be mitigated – this represents the limitations of the budget and the risk appetite of the firm.

So, is there a better way to do cybersecurity than thinking of it as a constant battle to purchase the latest IT to keep up with ever more technologically advanced hackers? One answer is to move away from a granular focus on IT. For example, the foundation of many cybersecurity programmes is the asset inventory. Get a list of every device and application on the network so that you can monitor and log activity, ensure regular patching and check for anomalous behaviours. But treating every device and every application the same, regardless of how they contribute to risk, is wasteful without a business-led evaluation of business-critical processes.

Taking a risk-based approach to security creates a more efficient and effective programme, it reduces waste and maximises the allocation of resources to issues that are of genuine, material significance to the business. It may also result in evidence that can be used to increase the resources available to the security team by demonstrating real business value.

Another way to apply real-world thinking to cybersecurity is to start with people: buying technology that is too complex, or that requires significant IT resources or ongoing staffing, means under-using that technology or even exposing the organisation to increased risk. So, start with the team you can afford and then think about what tech that implies. A realistic evaluation of the skillsets available and the flexibility of in-house resources may well lead to a decision to outsource.

And other business risks can at least partly be hedged or insured. Right now, the cybersecurity insurance market sems to be in flux, with some insurers even saying that cybersecurity is becoming an ‘uninsurable’ risk. In reality premiums are finally being adjusted to reflect the cybersecurity posture of firms that want to buy it. So, what do you need to prove to ensure continued access to cyber-insurance and are those requirements consistent with current levels of security resourcing?

Speakers

2023 Speakers

H.E. Dr. Mohamed Al Kuwaiti
Head of Cybersecurity, United Arab Emirates Government

Abdulla Al Dhaheri
Cybersecurity Specialist, UAE Government

Rajesh Yadla
Head of Information Security, Al Hilal Bank

Jeevan Badigari
Director of Information Security and Governance, DAMAC Properties

Hussein Hassan Shafik
CISO, Abu Dhabi Islamic Bank

Zaheer Shaikh
Chief Information Security Officer, Al Maryah Community Bank LLC

Vikalp Shrivastava
Global CISO, Kerzner International

Hussain AlKhalsan
Chief Information Security Officer, ZAND

Aus Alzubaidi
Director of IT, Cybersecurity & Management, MBC Group

Philippe Lopez
Head of Security, Cigna International Health

Steve Kinghan
Head of Cyber Operations, Hiscox

Khalid Abubaker
Regional Sales Manager, Gatewatcher

Theshan Mudaly
Solutions Engineer, BeyondTrust

John Smith
CTO EMEA, Veracode

Sponsors & Partners

2023 Sponsors

STRATEGIC SPONSORS
• BeyondTrust
• Declinea
• GateWatcher

EDUCATION SEMINAR SPONSORS:
• B!nalyze
• Cequence Security
• Entrust
• ManageEngine
• Mandiant
• Seclore
• Veracode

NETWORKING SPONSORS:
• iZOOlogic
• PhishRod