Agenda
09:00
Networking & Registration
WHD Team
Badge Collection
Light breakfast
Informal Networking
10:00
Opening
Khalid Al-Hashmi
Safety
Opening Speech
​
10:05
Keynote
Rebel Powell
Homefiled Advantage when dealing with ATPs: Highlighting practices and techniques any audience member can use to protect their organization without a nation-state level budget.
10:30
Breaking Through the Illusion of Safety:
Ashraf Aboukass (M), Kenan Begovic, Rebell Powell
Worth of Security Tools: Questions the effectiveness of advanced tools and teams in preventing cyber breaches.
Effort vs. Efficiency in Teams: Discusses strategies for cybersecurity teams to work smartly.
Importance of Process and Procedure: Examines the often-underestimated role of process and procedures.
Prevention vs. Response Strategies: Considers whether the industry overemphasizes prevention over response.
​
11:00
Navigating Cyber Security Talent Challenges:
Abdulla Al-Emadi (M), Shaikh Khalifa bin Ali Al-Thani, Dr Ali Al-Rashid, Sarah Al-Mawlawi
Addressing the Talent Gap: Focuses on challenges in attracting and retaining top cybersecurity talent.
Mentorship and Career Development: Discusses the importance of mentorship and career development Interdisciplinary Skills in Cybersecurity: Explores the significance of integrating skills from other disciplines.
Education and Certification: Examines the role of higher education and certifications in cybersecurity.
11:30
Interlude
Break
Refreshments
​
12:00
Emerging Challenges in Cyber Security Arising from the Advancement of Artificial Intelligence:
Zehan Teoh (M), Dr Alex Constantinidis, Hasan Chocor
AI-Driven Cyber Threats: Explores how AI advancements shape cyber threats.
Cybersecurity Defense: Considers how AI can be used to bolster defenses against sophisticated AI-powered cyberattacks.
Future of Cybersecurity Jobs in an AI-Dominated Landscape: Examines the implications of AI's growing dominance in cybersecurity for the job market.
Ethical and Privacy Concerns with AI: Addresses the ethical and privacy issues related to using AI in cybersecurity
12:30
Challenges in running a SOC for critical organisations
Ashraf Aboukass (M), Benjamin Beaston, V. Susan Peediyakkal
Unique Challenges in Critical Organizations: Discusses specific challenges faced by SOCs
Impact of Fear on Decision-Making in SOCs: Explores how fear of mistakes affects decision-making.
Balancing Threat Perception and Resources: Considers the risk of overestimating threats.
Limits in Use Case Development for SOCs: Questions whether there's a practical limit to the number of use cases that can be developed.
13:00
Interlude
Break
Refreshments
13:30
The Human Factor: Beyond Blaming the User
Salih Abdullah (M) Suzzane Bitter, Dr. Fadi Aloul
Redefining User Responsibility: Focuses on shifting from blaming users in cybersecurity incidents to empowering them as a key defense line.
Understanding User Behavior and Security:
Aims to understand how user behavior impacts cybersecurity.
The Role of Training and Awareness Programs:Examines the critical components of effective cybersecurity training and awareness programs.
Balancing Usability and Security: Discusses the balance between creating systems that are user-friendly and ensuring they are secure.
14:00
Awards
Immersive labs
CTF Awards
14:15
Closing Ceremony
Abdulla Al-Emadi
Closing Speech
14:30
Lunch
Guests
Lunch