Agenda

IT Security Xchange & Awards UAE

Agenda

IT Security Xchange & Awards UAE

One Day Event

8:30 am

Registration & Networking

9:00 am

IDC Welcome Address

Shilpi Handa

Shilpi Handa

Associate Research Director (META), IDC

9:05 am

IDC Keynote: Orchestrating Resilience Amid Transformation, Regulation, and Emerging Threats

META’s cybersecurity agenda is shaped by unprecedented digital acceleration, regulatory dynamism, and the proliferation of advanced threats across IT, OT, and cloud. As organizations embrace AI, platform-centric architectures, and hybrid environments, the attack surface expands and adversaries become more sophisticated—leveraging GenAI, identity compromise, and cyber-physical exploits. At the same time, regulatory mandates around data sovereignty and trust are intensifying. CISOs are challenged to orchestrate holistic defense strategies that unify technology, process, and people: integrating real-time detection, adaptive controls, and continuous compliance, while investing in workforce upskilling and AI augmentation. Achieving resilience in this environment demands a proactive, inclusive approach—balancing innovation, operational continuity, and regulatory alignment across the region’s diverse digital landscape.

Shilpi Handa

Shilpi Handa

Associate Research Director (META), IDC

9:15 am

Sovereign Security: Localizing Talent, Data, and Infrastructure

Middle East organizations are embedding digital sovereignty into their transformation strategies by localizing talent, infrastructure, and AI systems. Sovereign security platforms ensure sensitive data is stored and governed within national borders, reducing exposure to foreign jurisdiction and geopolitical risks. This approach is central to national security, public sector modernization, and technological independence.

9:30 am

AI-Powered Threat Detection and Response

Security service providers in the Middle East are integrating large language models and behavioral analytics to deliver real-time, AI-powered threat detection and response. These systems accelerate threat hunting, automate incident classification, and enable proactive defense against advanced cyber threats, transforming SOC operations and improving regulatory compliance.

9:45 am

Zero Trust Security Models for Government and BFSI

Zero trust security is gaining traction in government and BFSI sectors, driven by regulatory mandates and the need for robust data protection. Middle East governments are updating privacy laws and deploying zero trust frameworks to ensure continuous verification, minimize attack surfaces, and comply with evolving regulations.

9:55 am

Cloud Security: Compliance, Visibility, and Resilience

Cloud security strategies in the region focus on regulatory compliance, data sovereignty, and operational resilience. Organizations are prioritizing local cloud regions, hybrid architectures, and sovereign controls to meet data residency requirements, reduce latency, and ensure visibility across distributed environments.

10:05 am

Group Innovation Challenge

10:35 am

Tea/ Coffee & Networking Break

11:05 am

Identity and Access Management (IAM): The Only Perimeter

With identity attacks on the rise, IAM is now the primary security perimeter. Organizations are shifting to platform-based IAM solutions, integrating advanced authentication, access controls, and behavioral analytics to defend against credential theft and insider threats.

11:15 am

Operational Technology (OT) Security for Critical Infrastructure

Energy, utilities, and manufacturing sectors are strengthening OT security to counter sophisticated cyber threats. The focus is on segmenting networks, deploying real-time monitoring, and integrating AI-driven analytics to protect critical infrastructure and ensure regulatory compliance.

11:25 am

Data Privacy and Protection: Navigating New Regulations

Middle East is rapidly updating data privacy laws, requiring organizations to adapt governance frameworks and compliance strategies. The emphasis is on data localization, consent management, and continuous monitoring to meet stringent regulatory standards.

11:35 am

Xchange Table- First Cycle

11:55 am

Xchange Table- Second Cycle

12:15 pm

Workshop Roundtable Sessions

Workshop Roundtable

12:15 pm – 1:05 pm

Session 1- Managed Detection and Response (MDR): The Digital Control Plane

12:15 pm – 1:05 pm

Session 2- AI-Driven Security Automation and Orchestration

12:15 pm – 1:05 pm

Session 3- Cybersecurity Talent Development and Certification

12:15 pm – 1:05 pm

Session 4- Supply Chain Security: Mitigating Third-Party Risks

1:05 pm

CISO Excellence Awards Ceremony

1:35 pm

Winner Announcement of Group Innovation Challenge

1:40 pm

Lunch & Networking

Be Part of It!

REGISTER NOW