Kuwait | Kuwait City
Grand Hyatt | September 02 | 09:00 am

Registration for this event is now closed

By submitting this form. I understand Trend Micro will process my personal information in accordance with their Privacy Notice.

Thank you for your interest to attend the Risk to Resilience World Tour. An email will be sent to you shortly to confirm your registration.

AGENDA AT A GLANCE

 

START TIME SESSION DETAILS
09:00 AM Welcome & registration
10:00 AM Keynote | Race Against Threats: Resilience in the Era of Modern Threats

The Risk to Resilience keynote session unpacks a forward-looking analysis of the latest threat research and threat predictions exposing emerging tactics, techniques, and the current characteristics of the cyber threat landscape. Cybersecurity leaders and defenders will gain insights into the adversary's playbook, learning about novel vectors such as AI-driven attacks and evolutions in ransomware. The session is designed to empower cybersecurity professionals with knowledge to anticipate and meet the challenge of these advanced threats.

10:30 AM CISO | On The Fast Track: Winning Strategies for Cyber Consolidation and Communication

Access the strategic advantages of minimizing tool sprawl and consolidating visibility and security controls.
Tailored for senior security leaders, experience the live benefits of a unified platform at play. See how centralized strategies minimize complexity and enhance risk communication to enable you to articulate cybersecurity concerns effectively to executives and board members, particularly in the wake of high-profile breaches. This session offers key insights into leveraging platform integration to maximize existing investments, streamline reporting, drive informed risk-based decision-making, and advocate for a security-aware culture within your organization.

11:00 AM SOC | Supercharged Defense: Rapid Detection & Response

Dive deep into innovative threat detection, investigation and response strategies to modernize SOC and security team performance using the tools already in your kit. We will explore of the latest innovations and impact of generative AI to improve SOC and security performance and how integrated telemetry from native and third-party feeds are working together to accelerate threat identification and yield more complete response. The session includes immersive, scenario-based lessons to deliver practical guidance on how to leverage technology, process, automation, and integration to improve security outcomes.

11:30 AM Coffee Break
12:00 PM
Ops | Minimize Your Attack Surface: Revolutionizing IT Operations Strategies

What are the opportunities to proactively improve your cybersecurity posture? In this session, explore the impact of real-time attack surface risk management to optimize operational strategies and address modern cyber risks.
Learn how critical components of exposure management, from initial attack surface discovery to the deployment of virtual patching and the pivotal role of next-gen endpoint protection can work together to shrink your attack surface, preemptively strengthen defenses and reduce the likelihood of a breach. Supported by a real-world inspired scenario-based workflow, you will walk away with actionable insights and strategies to elevate your security posture and readiness.

12:30 PM Cloud | Mitigating Risks and Threats in the Cloud

Navigate the cloud security realm in this session focused on mitigating risks and neutralizing threats across multi-cloud environments. Identifying cloud assets is tough and determining which assets require high priority attention can be even more challenging. We'll dissect the layers of cloud exposure management, container security, file security, and workload security, each a cornerstone in building a robust defense-in-depth strategy for cloud infrastructure required for digital modernization projects.

1:00 PM Why SOCs Fail

A Journey Through Common mistakes offers a captivating exploration into the often-overlooked challenges of establishing and managing Security Operations Centers, both in-house and outsourced. Through a series of engaging real-life case studies, the presentation sheds light on frequent mistakes and misconceptions, transforming them into valuable learning opportunities. You will be equipped with actionable insights on avoiding these pitfalls, enhancing your SOCs' operational efficiency and strategic effectiveness. This enlightening journey promises not just a reflection on past errors but a roadmap towards achieving excellence in cybersecurity operations.

1:15 PM BEC Trends

Business Email Compromise (BEC) has been around for quite a while and is a very profitable attack vector for cybercriminals. The challenge is the email message typically will request an employee to perform a job function they normally do via a well crafted socially engineered message that does not contain a link or an attachment. This may cause messaging security solutions that focus on those to be bypassed. BEC can target financial, HR, legal or other job functions that allow them to obtain what they need. Recently BEC

1:30 PM Lunch

FEATURED SPEAKERS

Bhavin Gandhi
Architect, Managed Service, MMEA, Trend Micro
Trend Micro
Bilal Issa
Manager Technical UAE, Qatar, Kuwait, Iraq, Levant
Trend Micro
Oscar Castro
Regional Sr. Sales Engineer, MMEA
Trend Micro
Ahmad Farouq
Senior Manager Security Operation Center
Leading Bank in Kuwait
Husain A Alnakkas
Director of information technology
National Assembly Kuwait
Feras Fakhri Karzoun
Regional Account Manager
Trend Micro
Mohammad Hafi
Sales Engineer
Trend Micro
Motaz Atout
Major Account Manager, Kuwait
Trend Micro
Mohammad Ahmed Ali
Senior Officer - Network Administration
Burgan Bank
Roland Abi Nejem
CEO
Revotips
Speaker Name 11
Speaker Designation
Company name
Speaker Name 12
Speaker Designation
Company name
Speaker Name 13
Speaker Designation
Speaker Name 14
Speaker Designation
Speaker Name 15
Speaker Designation

OUR PARTNERS

Platinum Partner

Gold Partner

EXPLORE MORE