ESRM DUBAI UAE

Enterprise Security & Risk Management

17 September 2019

The Conrad Hotel, Dubai

SOCIAL


LATEST TWEETS

The LEADING STRATEGY EVENT FOR INFOSEC, CYBER SECURITY & RISK MANAGEMENT
professionals across every major business sector

At a glance

INFORMATION SECURITY REMAINS A CRITICAL CONCERN FOR THE UAE‘S GROWING ECONOMY AND IS FUELLED BY INCREASED AWARENESS OF SECURITY CHALLENGES AS THE COUNTRY TRANSITIONS TOWARDS DIGITAL MODELS OF SERVICE DELIVERY.

Regional ICT spending in the MENA region is expected to exceed $230 billion this year. The ascendancy of emerging tech trends like cloud, mobile, AI, big data, blockchain and IoT – all of which are key to the Dubai smart city initiative – are enhancing the need for reliable and agile processes that are secure by default. Security is fundamental for the adoption of the most advanced technologies as the UAE looks to diversify its economy, make businesses more efficient, and government more responsive.

Join hundreds of leading InfoSec, cyber security and risk management professionals at Whitehall Media’s prestigious 3rd annual ESRM Dubai conference to discuss the latest developments and best practices needed to address the most pressing security risks of tomorrow. Our line-up of expert speakers will discuss the cyber risk landscape, opportunities to detect and deter cyber-attacks through appropriate skills and capabilities, and best practice required to protect critical national systems and networks.

Join us to:

  • Learn about the latest advancements in Information Security / Cyber Security resources, source new products, meet suppliers and understand how to deploy innovative solutions to improve performance and mitigate security risks.
  • Stay up-to-date with emerging and changing trends within the industry.
  • Hear keynote speeches on ground-breaking policies and gain insight from real-life case studies about how technology is solving strategic security issues.
  • Gain new ideas about how to drive forward your information security strategies.
  • Equip yourself with knowledge about the latest tools and technologies to help you support the delivery of your business objectives.
  • Engage in a series of interactive seminars designed to debate the theory and practice of overcoming real-life security challenges and risks.
  • Network with peers and develop business relationships with industry experts to help you drive forward your own cyber security and information security strategies.
  • Celebrate milestones in the information security space.
  • Connect with new suppliers and find out new, cost-effective solutions to your existing security processes.

FEATURED TOPICS

  • Active Defence Mechanisms, Tools and Techniques
  • Advanced Persistent Threats/Advanced Evasive Techniques
  • Breach Response Workflow/Planning
  • Building a Secure Cyberspace
  • Building Cyber Skills and Capabilities
  • Business Continuity Management and Contingency Planning
  • End-User Devices / Application / Mobile Security
  • Change Management/Programme Management
  • Cloud Security Principles, Practice, Integration
  • Combatting Cybercrime
  • Critical Infrastructure and Operational Technology Security
  • Cyber Hygiene and Compliance
  • Cyber Policing / Incidence Detection / Response Management
  • Cyber Risk Management and Insurance
  • Data Governance and Protection
  • Data Loss Prevention, Disaster Recovery, Hardware Security
  • Detecting Espionage / Managing Data Theft and Leakage
  • Digital Rights Management
  • Disruptive Technologies – IoT, AI, Machine Learning, Blockchain (Opportunities and Risks)
  • Encryption, firewall technology, anti-virus, Cryptography, Cryptanalysis, Network Security
  • Fraud Detection and Response
  • IaaS, PaaS, SaaS
  • Identity Assurance and Access Management
  • Infrastructure Management and Security
  • Legacy Systems and Continuous Improvement Challenges
  • Mobile Risks and Mitigation
  • Penetration Testing
  • Personnel Security / changing role of HR
  • Risk Management Frameworks, Metrics, Strategy
  • Securing Critical National Infrastructure
  • Securing Online Transactions
  • Security Classification and Policy Enforcement
  • Social Media Challenges / Risks
  • Supply Chain Security
  • Technical Surveillance Counter Measures
  • Understanding the Risk Landscape and Threat Actors
  • User Awareness and Training
  • Vulnerability Assessment and Management

Previous Speakers

SPONSORS

cpd-membercpd-certified

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking