top of page

Agenda

09:00

Networking & Registration

WHD Team

Badge Collection

Light breakfast

Informal Networking

10:00

Opening

Khalid Al-Hashmi

Safety

Opening Speech

​

10:05

Keynote

Rebel Powell

Homefiled Advantage when dealing with ATPs: Highlighting practices and techniques any audience member can use to protect their organization without a nation-state level budget.

10:30

Breaking Through the Illusion of Safety:

Ashraf Aboukass (M), Kenan Begovic, Rebell Powell

Worth of Security Tools: Questions the effectiveness of advanced tools and teams in preventing cyber breaches.

Effort vs. Efficiency in Teams: Discusses strategies for cybersecurity teams to work smartly.

Importance of Process and Procedure: Examines the often-underestimated role of process and procedures.

Prevention vs. Response Strategies: Considers whether the industry overemphasizes prevention over response.

​

11:00

Navigating Cyber Security Talent Challenges:

Abdulla Al-Emadi (M), Shaikh Khalifa bin Ali Al-Thani, Dr Ali Al-Rashid, Sarah Al-Mawlawi

Addressing the Talent Gap: Focuses on challenges in attracting and retaining top cybersecurity talent.

Mentorship and Career Development: Discusses the importance of mentorship and career development Interdisciplinary Skills in Cybersecurity: Explores the significance of integrating skills from other disciplines.

Education and Certification: Examines the role of higher education and certifications in cybersecurity.

11:30

Interlude

Break

Refreshments

​

12:00

Emerging Challenges in Cyber Security Arising from the Advancement of Artificial Intelligence:

Zehan Teoh (M), Dr Alex Constantinidis, Hasan Chocor

AI-Driven Cyber Threats: Explores how AI advancements shape cyber threats.

Cybersecurity Defense: Considers how AI can be used to bolster defenses against sophisticated AI-powered cyberattacks.

Future of Cybersecurity Jobs in an AI-Dominated Landscape: Examines the implications of AI's growing dominance in cybersecurity for the job market.

Ethical and Privacy Concerns with AI: Addresses the ethical and privacy issues related to using AI in cybersecurity

12:30

Challenges in running a SOC for critical organisations

Ashraf Aboukass (M), Benjamin Beaston, V. Susan Peediyakkal

Unique Challenges in Critical Organizations: Discusses specific challenges faced by SOCs

Impact of Fear on Decision-Making in SOCs: Explores how fear of mistakes affects decision-making.

Balancing Threat Perception and Resources: Considers the risk of overestimating threats.

Limits in Use Case Development for SOCs: Questions whether there's a practical limit to the number of use cases that can be developed.

13:00

Interlude

Break

Refreshments

13:30

The Human Factor: Beyond Blaming the User

Salih Abdullah (M) Suzzane Bitter, Dr. Fadi Aloul

Redefining User Responsibility: Focuses on shifting from blaming users in cybersecurity incidents to empowering them as a key defense line.

Understanding User Behavior and Security:

Aims to understand how user behavior impacts cybersecurity.

The Role of Training and Awareness Programs:Examines the critical components of effective cybersecurity training and awareness programs.

Balancing Usability and Security: Discusses the balance between creating systems that are user-friendly and ensuring they are secure.

14:00

Awards

Immersive labs

CTF Awards

14:15

Closing Ceremony

Abdulla Al-Emadi

Closing Speech

14:30

Lunch

Guests

Lunch

bottom of page