9:00 - 10:00
|
Registration & Networking
|
10:00 - 10:15
|
Opening Remarks By HE Dr. Mohamed Al Kuwaiti, Head of Cyber Security, UAE Government
|
10:15 - 10:30
|
Fortifying the UAE Cyberspace with AI: The Road Ahead By Hadi Anwar, Executive Director - Strategic Programs, CPX While AI has been enhancing security tools, it also poses a risk to cybersecurity. Cybercriminals are inevitably adopting new AI techniques to evade the cyberspace and cause greater damages. We will shed light on a roadmap for governments, organizations, and individuals to maneuver the growing world of AI and cybersecurity and secure the UAE’s digital landscape.
|
10:30 - 10:45
|
Pushing the Limits: AI in Cybersecurity in 2024 and beyond By Freddy Alves Vaquero, Vice President, WW IBM Security Sales Leader The protection of data, systems, and IP requires constant vigilance - and while threats are scaling exponentially, the humans defending these systems have limits. Explore how AI’s evolution intersects with cybersecurity and its potential to transcend current limitations in security – so long as it’s implemented with trust and governance at the starting line.
|
10:45 - 11:05
|
AI-Powered Defense: Harnessing the Power of AI to Outpace Threats By Bob Kalka, IBM Fellow, VP & CTO IBM Security Software There's no question AI offers the potential to introduce innovations in areas including threat detection and response, but in this conversation, we'll examine the extent to which it is already improving the speed, accuracy, and efficiency of cybersecurity defenses, both today and tomorrow
|
11:05 - 11:35
|
Panel Session 1: The Impact of Generative AI on Today’s Security Operations and How to Prepare
|
11:35 - 12:00 |
Coffee Break☕ |
12:00 - 12:20
|
Building an identity fabric By Wesley Guyre, Director of Product Management, IBM As cloud migration and digital transformation continue to accelerate, organizations can be left unprepared for many of the new identity challenges: a proliferation of multi-cloud environments, complexities of traditional systems, inconsistent user experience, and security controls. We will examine how building a product-agnostic identity fabric can help enterprises reduce the complexity of identity management.
|
12:20 - 12:50
|
Panel Session 2: The Challenges of AI: Data Privacy and Security
|
12:50 - 13:10
|
Preparing for the Crypto Apocalypse in the Quantum Age By Neil Ginns, Senior Managing Consultant, IBM Consulting Cybersecurity Services As quantum computing progresses at a rapid pace, we're on track to tackle previously unsolvable problems for the benefit of humanity. However, this advancement poses a significant threat, as quantum computers approach the capability to compromise widely used security protocols. IBM, drawing on its expertise in cryptography, quantum computing, and critical infrastructure, is actively working to defuse this impending security risk. Explore how IBM is developing defenses that remain unbreakable in a quantum-powered world.
|
13:10 – 13:20
|
Closing Remarks By Frida Kleimert, Director, IBM Security MEA Hadi Anwar, Executive Director - Strategic Programs, CPX
|
13:20 - 15:00
|
Lunch🍴 |