Conference Tracks

  • Critical Infrastructure

    This track focuses on the most interesting and challenging elements of current security architecture and extended supply chain security. It provides content on architecture, strategic planning, security monitoring, industrial controls, and vulnerability perspectives for security of networks, endpoints, and systems including rights management, mobile systems, devices, and ethical hacking.

  • Cybercrime & Threats

    This track provides the latest information and practical demonstrations of techniques to address cybercrime and threats. Sessions will explore the threat landscape, financial fraud, cyber terrorism & warfare, child protection, malware, exploitation techniques, hacktivism, and how to combat these problems.

  • Policy & Strategy

    Governments across the Middle East are developing and implementing cyber security, data protection and privacy policies that affect both the public and private sector. This track will feature sessions on current and proposed government strategies, policies, legislation and standards that could shape the direction of critical infrastructure protection, cyber threat intelligence sharing, and security compliance requirements for years to come.

  • Security for a Smart City

    Smart cities need good answers to more and more complex security and safety issues. This track covers the latest on the Internet of Things, mobile, mobile apps, drones, cloud, Big Data analytics, smart grid, social engineering, machine learning, and identity.

  • Security Operations

    Security operations and incident response is one of the most pressing industry issues. This track examines investigation and analysis techniques that help organizations reduce time to containment and incident response as well as discover patterns for future prevention. It will cover analytics & forensics, intelligence sharing, audit & compliance, operational risk management, and awareness & education.

  • Sponsor Special Topics

    Listen to a spectrum of experts and security issues delivered and discussed by leading edge companies.

This document was retrieved from on Thu, 27 Oct 2016 20:31:17 -0400.
© 2016 EMC Corporation. All rights reserved.