Future Technology Week 2016

Page 1

future technology week

times 29-31 preview march 2016

T ECHNOLOGY MEDIA PARTNER

HIGHLIGHTS CTF 2016

HACKATHON

SECURITY PUT TO TEST!

Welcome to the Dawn of a New Technology Age

START UP SHOWDOWN OF THE CENTURY AT THE HIVE

FutureTechnologyWeek is an amalgamation of the 4 pillars of technology that harness the power of digital transformation.

J

ust when we thought that Cloud will be the ultimate game changer in the world of technology, Big Data entered into our worlds and redefined the ways in which business was done and looked into. Then, Lo and Behold! Welcome to a world of new reality- The world of IoT—A world of opportunities that corelates to a world of cyberthreats and security scares. Together, the emerging technologies have been gaining their strengths to pave the way for the ´Digital

Transformation´. So here we stand at the doorstep of the Future Tech Week that stands on the pillars of the 4 future determinant areas— Security, Mobility, Big Data, IoT. The regional demand for security solutions and services have been climbing the ladder, offering a playground of possibilities for the regional vendors and their channel partners. Combined with the capabilities of Big Data and IoT, the region is all set for an IT roller coaster ride. The 3 days of Future Technology Week will lay out strategies to build the quintessential framework

for a robust organization, defending cyber threats and creating a synergy between the emerging technolgies to build a ´Future Ready´organization. Future Tech Week also raises the excitment this season with key attractions like; The Hackathon, Capture the Flag, The Hive- the start-up showdown of the century and many more that boosts the adrenaline rush of the tech wizards and master minds alike. The following pages will give you a glimpse into the plans and potential of the ´Future´makers and ´Future´ markets.

KEY SPEAKERS AT FTW 2016


GUARDED BY GENIUS. GOVERNANCE, RISK & COMPLIANCE

CYBER NETWORK DEFENCE

MANAGED SECURITY SERVICES

DARKMATTER UNITES THE BRIGHTEST MINDS WITH THE MOST INNOVATIVE TECHNOLOGY, AGAINST ONE OF THE WORLD’S GREATEST THREATS: ADVANCED CYBER-ATTACKS

SECURE COMMUNICATIONS

INFRASTRUCTURE & SYSTEM INTEGRATION

SMART SOLUTIONS

Working in the UAE and globally we’re a team of cyber security specialists dedicated to providing secure, trusted and integrated protection services. As a strategic partner to the UAE government, we have the proven integrity, intelligence and security standards to safeguard city and nation.

Visit us to find out more about the next generation of cyber security.

darkmatter.ae


FT WEEK PREVIEW

03

Welcome to the Future Technology Week Dear Executive, Technology is driving the creation of Future Intelligent Cities, altering business models and designing next generation ecosystems. At Future Technology Week 2016 we will be assembling four live events showcasing the technology innovations that are reshaping our world. n GISEC (Gulf Information Security Exhibition and Conference) n IoTx (Internet of Things Expo) n GEMEC (Gulf Enterprise Mobility Exhibition and Conference) n The Big Data Show Global visionaries and innovators will outline opportunities for collaborationto enhance business capabilities and deliver richer user and public experiences. Some of the profound leaders delivering keynotes include: l Tudor Enache, A leading Penetration Test expert in the, UAE for AEcert l Rt Hon Dr Liam Fox, The former UK Secretary of State for Defence l John Bumgarner One the world’s foremost authorities on Anti Malware l KarineDongin-Sauze Deputy Mayor, Greater Lyon l Jonny Voon IoT Lead, Innovate UK l Jamie Cudden, Smart Cties Program Director, Dublin City Council Many thanks for joining us at this prestigious event. Future Technology Week Team


04

FT WEEK PREVIEW

DARKMATTER

Debuting with End to End Security Portfolio work Defence; Managed Security Services; Secure Communications; Infrastructure and System Integration; Smart Solutions; Advisory; and research and development.

WHAT DOES YOUR PARTNER ECOSYSTEM LOOK LIKE? We have a broad range of partnerships and supply chain arrangements with the world’s leading technology and channel organisations to ensure the best quality of service available to our client base.

DEFINE YOUR ORGANISATION´S PRIME SECURITY RESOLUTION IN Á SENTENCE´. Underpinning all of DarkMatter’s end-toend cyber security capabilities is a commitment to the company’s Cyber Security life-cycle, which is a four-stage approach encompassing planning, detection, protection, and recovery.

HOW IS THE ROLE OF CISO/CIO EVOLVING WITH THE THREAT LANDSCAPE GETTING TRICKIER DAY BY DAY? HOW LONG HAVE YOU BEEN PARTICIPATING IN GISEC AND WHAT IS YOUR GISEC 2016 AGENDA?

networks, and hyper connectivity means there are many more points of risk and potential hacking in modern corporate and personal networks.

This is DarkMatter’s first time participating in GISEC. We are a new organisation, and are thoroughly looking forward to the opportunity.

WHAT ARE THE VARIOUS SOLUTIONS THAT YOU GO TO MARKET WITH?

HOW DO YOU PERCEIVE THE CURRENT THREAT AND SECURITY LANDSCAPE OF THE REGION? There are a number of factors defining the cyber threat and security landscape in the region which includes heightened threat levels, more data being transmitted across

DarkMatter provides a complete portfolio of cyber security solutions and services to organisations of any size, from governments and infrastructure operators to large corporations and smaller companies. We operate across several specialisations that provide a seamless and integrated cyber security offering. These areas include Governance, Risk and Compliance; Cyber Net-

“UAE is one of the most targeted countries for cyber-attacks globally. Defensive as well as proactive counter measures need to be instituted” HARSHUL JOSHI SENIOR VICE PRESIDENT, CYBER GOVERNANCE, RISK AND COMPLIANCE AT DARKMATTER

In many ways DarkMatter believes the role of CISO/CIO is becoming easier as its importance across an entire organisation is becoming better understood. The IT department, and specifically, the area of the business dealing with cyber security can no longer be considered just a back-office function.

WHICH TREND DO YOU FORECAST FOR THE REGION’S SECURITY LANDSCAPE IN THE DAYS TO COME? We believe there will always be parties motivated to undertake cyber attacks. At DarkMatter, we advise companies to adopt an outlook on cyber security in which they assume breach, and establish the necessary protocols and defences to counter.


FT WEEK PREVIEW

05

BITDEFENDER

Fending Threats, Defending Security “Three quarters of technology executives expect their companies to spend 1% to 5% of their revenue on IT security over the next 12 months.” BOGDAN BOTEZATU SENIOR E-THREAT ANALYST, BITDEFENDER

ORGANIZATION´S PRIME SECURITY RESOLUTION IN Á SENTENCE´. Always have a contingency plan for every possible threat scenario.

HOW IS THE ROLE OF CISO/CIO EVOLVING WITH THE THREAT LANDSCAPE GETTING TRICKIER DAY BY DAY?

HOW LONG HAVE YOU BEEN PARTICIPATING IN GISEC AND WHAT IS YOUR GISEC 2016 AGENDA? This is our second year when we are joining the GISEC event. This year, our main focus is on bridging the gap between Bitdefender as a company and the local distributors or dealers.

purpose bots, some specifics of the MEA region are advanced persistent threats.

WHAT ARE THE VARIOUS SOLUTIONS THAT YOU GO TO MARKET WITH?

HOW DO YOU PERCEIVE THE CURRENT THREAT AND SECURITY LANDSCAPE OF THE REGION?

Our business portfolio includes antimalware products that are fully compatible with world’s most used operating systems and mobility platforms (Windows, Linux, Mac OS X, Android and iOS). GravityZone also covers physical, virtual and hybrid environments with flexible licensing policies and dedicated MSP solutions.

While most of the threats that we see in the area are generally in line with what we see at a global scale – ransomware and generic

HOW DOES YOUR PARTNER ECOSYSTEM LOOK

LIKE? Our partner community in MEA is comprised of value added distributors, direct and indirect partners, systems integrators, and solution providers that together create a vibrant value-add network in the security market today covering SMBs, SME, and large enterprises. Together with our Ecosystem Partners we develop, market, and service end-point security solutions that enhances customer experience. Through shared processes and intellectual property, we create solutions that lead the market in flexibility, interoperability and client value.

DEFINE YOUR

CISOs/CIOs will become increasingly important in companies’ hierarchies as CEOs and board members face increasing internal and external security risks that could ruin customers’ trust and business forecasts. Security and risk management are the biggest challenges for businesses adopting mobile technologies, the cloud and the Internet of Things, according to multiple surveys.

WHICH TREND DO YOU FORECAST FOR THE REGION’S SECURITY LANDSCAPE IN THE DAYS TO COME? Security is usually difficult and useless to predict in a span of days, as security is a strategic development direction with an impact that can span over years. We are currently rolling out new technologies (such as the Hypervisor-based memory introspection) to fend off threats that will focus on virtualized environments.


06

FT WEEK PREVIEW

CISCO

Securing the Path to Digital Transformation “Cyber security must be multi-dimensional and tiered, as threats can originate from virtually anywhere and sometimes persist for months or years before the organization is aware of an attack or breach. “

“Cyber security must be multidimensional and tiered, as threats can originate from virtually anywhere and sometimes persist for months or years before the organization is aware of an attack or breach. “

HOW LONG HAVE YOU BEEN PARTICIPATING IN GISEC AND WHAT IS YOUR GISEC 2016 AGENDA? At GISEC 2016, Cisco will demonstrate and showcase how its products and solutions can support its customers safely and securely through digital transformation and how they can weave in the security techniques and deployment as part of it. Over the last three years that Cisco has participated at GISEC, the event has grown from strength to strength.

HOW DO YOU PERCEIVE THE CURRENT THREAT AND SECURITY LANDSCAPE OF THE REGION?

ADAM PHILPOTT CISCO – DIRECTOR, EMEAR CYBER SECURITY

According to the Cisco Annual Security Report, 60% of data is stolen in hours. 54% of all attacks are not detected for months or even years and, if discovered, it may take several weeks before full containment and remediation are achieved. During that time, sensitive customer information and intellectual property is compromised, putting the company’s reputation, resources, and intellectual property at risk.

HOW IS THE ROLE OF CISO/CIO EVOLVING WITH THE THREAT LANDSCAPE GETTING TRICKIER DAY BY DAY? As the threat landscape broadens and deepens, the role of CIOs has become strategic in nature now versus a more tactical approach a couple of years ago.

WHAT ARE THE VARIOUS SOLUTIONS THAT YOU GO TO MARKET WITH? Cisco has an extensive security portfolio which includes solutions for Access Control and Policy, Advanced Malware Protection, Email Security, Firewalls, Network Security, Next Generation Intrusion Prevention System (NGIPS), Security Management, VPN and Endpoint Security Clients and Web Security.

HOW DOES YOUR PARTNER ECOSYSTEM LOOK LIKE? Cisco ensures that we train, enable and certify our partners and offer them the latest security solutions such as Cisco ASA with FirePOWER and Cisco ISE. Through our Channel Partner Program, which is

WHICH TREND DO YOU FORECAST FOR THE REGION’S SECURITY LANDSCAPE IN THE DAYS TO COME?

designed to strengthen our partners’ ability to capture market opportunities, we train, enable and support our partners and help them gain a competitive edge. We also offer Master Security Specialization, which gives partners a powerful competitive advantage and qualifies them as part of an exclusive group, contributing to their profitability and accelerating their business and market growth.

DEFINE YOUR ORGANIZATION´S PRIME SECURITY RESOLUTION IN A SENTENCE. Cisco empowers customers to easily manage and dynamically update protection from the endpoint to the network, and out to the cloud, by going beyond applications and identifying and stopping threats, both known and unknown.

As networks continue to grow and expand, new devices and applications with widely varying security postures are constantly connected. In the past there was a disconnect between business and IT. However, with so many cyber attacks and security breaches taking place so frequently, CEOs are now forced to take cyber security very seriously, where it has become one of the most important aspects of their business – where it is now considered a boardroom issue and not just a technology concern.


FT WEEK PREVIEW

07

FORTINET

Uncompromised Security, Throughout “Because of the aggressive competitive marketplace for consumer devices, security is not a primary design goal, and so vulnerabilities are regularly found.”

HOW LONG HAVE YOU BEEN PARTICIPATING IN GISEC AND WHAT IS YOUR GISEC 2016 AGENDA? Fortinet has been participation at GISEC for the last 3 years. Our theme at GISEC 2016 is ‘Security without compromise’, where we will highlight the changing nature of networks, and the subsequent increase in potential attack vectors. We will also present advice on what businesses should pay attention to while deploying security strategies.

ALAIN PENEL

HOW DO YOU PERCEIVE THE CURRENT THREAT AND SECURITY LANDSCAPE OF THE REGION?

REGIONAL VICE PRESIDENT, MIDDLE EAST, FORTINET

The attacks and threats in the region aren’t limited to one segment, businesses of different sizes, serving different verticals, have all been targeted. For this reason, vendors such as Fortinet have invested in terms of on-ground staff and partners.

seamless security infrastructure for SMB, enterprises and carriers.

HOW IS THE ROLE OF CISO/CIO EVOLVING WITH THE THREAT LANDSCAPE GETTING TRICKIER DAY BY DAY?

WHAT ARE THE VARIOUS SOLUTIONS THAT YOU GO TO MARKET WITH?

The role of a CISO/ CIO is getting increasingly complex by the day. His role not only involves selecting, vetting and deploying the best security solutions for his organization, but also requires him to look into the financial implications and ROI.

Our solutions cater to every possible industry vertical, enterprises, SMBs and service providers. From wired/wireless networks and messaging systems to web applications, databases and much more, Fortinet’s solutions portfolio helps secure the broad enterprise information infrastructure, allowing customers to ensure security and control of their networks, users and data.

WHICH TREND DO YOU FORECAST FOR THE REGION’S SECURITY LANDSCAPE IN THE DAYS TO COME?

HOW DOES YOUR PARTNER ECOSYSTEM LOOK LIKE? Fortinet is a 100% channel driven company, and sells only through the channel. We have an established channel presence and network across the Middle East which has grown exponentially. 100% dedicated to security. We revamped our partner program to include new certifications and realign partner levels. Our partner program

is designed to help partners build expertise on the full range of Fortinet’s network security products, extend service offerings and expand into new areas of the security market.

DEFINE YOUR ORGANIZATION´S PRIME SECURITY RESOLUTION IN Á SENTENCE´. Fortinet is able to provide a complete and

The Internet of Things continues to grow, as vendors add connectivity to more and more everyday objects. The number of attacks on mobile devices is expected to continue to rise, as the number and performance of devices increases. The quality of information (identity and positional for example) makes it a good target for identity theft, and the connectivity options (internet, voice, SMS) provide many options for the cyber- criminal to monetize the attack.


08

FT WEEK PREVIEW

JUNIPER

Uniting the Good Guys against the Bad Guys

HOW LONG HAVE YOU BEEN PARTICIPATING IN GISEC? WHAT IS YOUR GISEC 2016 AGENDA? Juniper Networks, in conjunction with our security partner Fireware, will be present at GISEC 2016. We hope to share our vision for Software Defined Secure Networks and how this approach to security can help companies more effectively leverage their entire network for security.

HOW DO YOU PERCEIVE THE CURRENT THREAT AND SECURITY LANDSCAPE OF THE REGION? In recent years, we saw what was once considered fiction become reality. Cyberattacks are more diverse than ever before; from physical attacks by nation states on critical infrastructure and ransomware capable bringing business operations to a stop to the increasing number of data breaches exposing millions of records.

“The security layers of security infrastructure companies are putting in place to keep ahead of attackers is creating added complexity to operations, which makes securing networks more challenging than ever before.” ADRIAN PICKERING VICE PRESIDENT, MIDDLE EAST & AFRICA, JUNIPER NETWORKS

The network needs to be inherently secure and dynamically adaptable, automatically detecting aberrant behavior and respond. Businesses cannot only look at securing the perimeters and endpoints, they now have to assume that threats and bad actors are already inside.

WHAT ARE THE VARIOUS SOLUTIONS THAT YOU GO TO MARKET WITH? Juniper’s goal is to offer customers the most comprehensive secure network solution embedded within and throughout the network. Using real-time threat information, our solution can adapt to gain awareness and knowledge of activities and traffic traversing the network, and it has the unique ability to create and distribute policy across the network adaptively, and dynamically. Juniper’s Software Defined Secure Network allows businesses to operate the entire network as a single enforcement

domain. It leverages the entire network to deliver a holistic bottoms-up and topsdown approach. Firewalls, virtual or physical, are right sized for the application and provided advanced firewall, and UTM capabilities when needed. These capabilities are consistent across both physical and virtual platforms, allowing the device to fit the need and be configured the same policy netting the same result, simplifying operations of the network. Juniper Security Director combined with Juniper’s cloud-based security services (Sky ATP & Spotlight) provide the foundation for an open policy engine. Security Director works in concert with these services to push policies into the network. By providing real time feedback between firewalls, Security Director provides the ability to deploy policy across network devices the instant that it is needed. Spotlight Secure Connector policy adapts the network to protect against threats. File types that typically carry malware are copied and sent to cloud. A sandbox environment within Sky ATP using static or dynamic inspection techniques, manipulates the files to trick them in revealing their malicious behavior. Paired with Juniper’s cloud based Spotlight Secure and Connector services, then responds telling the network to block those files that are perceived as hazardous. In addition to enabling the capabilities above, the Software Defined Secure Network is grounded in integrating 3rd party capabilities, to unite the good guys against the bad guys. Our Open Convergence Framework (OCF) provides integration with our technical alliance partners, enabling customers to subscribe to critical service feeds and threat information to receive real-time updates. This ensures that their networks are protected with the most up-to-date and effective capabilities, and enables them to choose their preferred threat intelligence information sources.


FT WEEK PREVIEW

09

SPLUNK

Securing Machine Data for an M2M Age “Organizations should be conscious of the risk of employees misusing their legitimate access to systems and information.” MATTHIAS MAIER PRODUCT MARKETING MANAGER EMEA, SPLUNK

generated across IT, the business and in the cloud giving customers the ability to detect and respond to known, unknown and advanced threats.

HOW IS THE ROLE OF CISO/CIO EVOLVING WITH THE THREAT LANDSCAPE GETTING TRICKIER DAY BY DAY? Increasingly business leaders are demanding better insight into the impact of technology on the wider business, with security being no different. In 2016 we will see data science demystified, moving from Ph.D. to MBA, with easier ways emerging to consume, analyze and correlate machine data. This will inevitably impact how the CISO/ CIO works with other key stakeholders in the business, increasing the pressure upon them to provide a range of digital insight across IT and security.

HOW LONG HAVE YOU BEEN PARTICIPATING IN GISEC? Since 2013.

HOW DO YOU PERCEIVE THE CURRENT THREAT AND SECURITY LANDSCAPE OF THE REGION? As companies grow and the data that they create expands, it’s becoming easier and easier for these threats to hide within a company’s network. The key to addressing this is being able to analyze machine data in real time to uncover anything anomalous. Organizations with those capabilities will be well placed to manage both the cur-

rent and future security landscape.

Service Intelligence

WHAT ARE THE VARIOUS SOLUTIONS THAT YOU GO TO MARKET WITH?

HOW DOES YOUR PARTNER ECOSYSTEM LOOK LIKE?

Splunk software is the easy, fast and secure way to search, analyze and visualize the massive streams of machine data generated by IT systems and technology infrastructure—physical, virtual and in the cloud. Core products include: Splunk Enterprise, Splunk Cloud, Splunk Light, Hunk Premium solutions that extend the Splunk platform with purpose-built solutions include: Splunk Enterprise Security, Splunk User Behavior Analytics, Splunk IT

In the Middle East we work with StarLink as a distributor and a number of local and global organizations who assist our customers in driving value from their machine data with access to Operational Intelligence.

DEFINE YOUR ORGANIZATION´S PRIME SECURITY RESOLUTION IN Á SENTENCE´. To provide insight into the machine data

WHICH TREND DO YOU FORECAST FOR THE REGION’S SECURITY LANDSCAPE IN THE DAYS TO COME? Internet-connected systems are set to create opportunities for hacktivists and terrorist organizations to access and productize information, and businesses will have to adapt to manage this new threat surface. The Internet of Things (IoT) will become a significant threat surface for the enterprise, leading to more physical disruption and new solutions. The proliferation of IoT is also set to cause more disruption and actual physical damage versus just hardware and software disruption.


10

FT WEEK PREVIEW

PALADION

Security Services— Holistic, Integrated & Continuous HOW LONG HAVE YOU BEEN PARTICIPATING IN GISEC AND WHAT IS YOUR GISEC 2016 AGENDA? Paladion has been participating in GISEC since 2014. This year we shall be showcasing our next generation Security Command Center platform – RiskVu ADR along with End Point Security Analytics from our Technology Partner CounterTack and Advance Threat Intelligence solution from our Technology Partner, Kaspersky. Our booth shall also be hosting interesting sessions on several cyber security topics such as Vulnerabilities in IOT Network, Emerging APT’s, GRC for standards such as NESA, Building a robust, integrated Security Intelligence Center and many more.

HOW DO YOU PERCEIVE THE CURRENT THREAT AND SECURITY LANDSCAPE OF THE REGION? Threat landscape has become more advance and targeted influenced by the geo-political situation in the region and more challenging as businesses embrace the advantages brought by Social/Mobile/ Analytics/Cloud and IOT leading to far higher cyber frauds than before.

WHAT ARE THE VARIOUS SOLUTIONS THAT YOU GO TO MARKET WITH? We provide holistic, Integrated and continuous Managed Services across the pillars of Governance, Risk and Compliance, Advance Vulnerability Management program; Intelligent Security Operations and Threat Management Program using our own proprietary, Industry recognized RiskVu platform for GRC/ADR/VM. We also collaborate with leading technology partners to bring best of breed risk mitigation controls to our end customers for operating advance Cyber defence centres.

HOW DOES YOUR PART-

NER ECOSYSTEM LOOK LIKE? Paladion collaborates with leading security vendors such as HP, Kaspersky, Tenable, CounterTack, ForcePoint, Titus Labs, IBM, Arcos and others in the region.

DEFINE YOUR ORGANIZATION´S PRIME SECURITY RESOLUTION IN Á SENTENCE´. To help prevent, detect, mitigate and manage the cyber security threats by establishing active, continuous and integrated cyber defence programs based on proven methodologies, processes and best of breed technologies.

HOW IS THE ROLE OF CISO/CIO EVOLVING WITH THE THREAT LANDSCAPE GETTING TRICKIER DAY BY DAY?

“The region is by far witnessing some of the very advanced cyberattacks with the threat landscape changing rapidly with attack vectors becoming more sophisticated, pertinent and impactful.” AMIT ROY VP & REGIONAL SALES HEAD-ME & AFRICA AT PALADION

With the evolving threat landscape, the CISO should be a transformational business leader with the responsibility of devising strategy for risk mitigation, policies,

security operations, crisis management and compliance with the ability to manage and communicate clearly and concisely to the CEO/Board.

WHICH TREND DO YOU FORECAST FOR THE REGION’S SECURITY LANDSCAPE IN THE DAYS TO COME? Having a threat profile of your IT landscape could be a starting point. Establishing a 24/7 Security Command Center either insource or through a SLA backed Managed Security Services provider which focusses on proactive detection, alerting and incident management using cutting edge security technologies, predictive security analytics platform integrated with global threat feeds could help to detect APTs and prevent attacks related to Malware/phishing/DDOS/Bot Net/ Brand abuse and insider threats.



12

FT WEEK PREVIEW

DELL

Reinforcing Business Value with Big Data Analytics & Business Intelligence: We can help run any analytics on any data anywhere, streaming or at rest, to drive better decisions across your organization Data Integration Eliminate fragmented analysis with a realtime view of all your data. Integrate over 160 data sources, regardless of the underlying data platform or its location Data Management Become more productive as you develop, administer and monitor various data platforms — structured and unstructured — from Oracle® to Microsoft® SQL Server® to Hadoop® to MongoDB and many more. Infrastructure Put the right data in the right place at the right time. Let Dell’s open, scalable architected Big Data Blueprint and infrastructure set you on the path to success. Data Platforms & Partners Optimize Hadoop, Oracle, SAP HANA and Microsoft SQL Server workloads with our future-ready, proven use-case solutions

WHERE DO YOU SEE THE MIDDLE EAST REGION TRENDING TO IN TERMS OF BIG DATA? Data is fast becoming the most valuable currency in this new data economy. It is critical to making your business more successful — and it has changed the game as we knew it. Dell’s big data solutions allow you to not just change with the game, but win it — through improved customer experiences and business operations

FROM STORAGE TO APPLICATIONS, HOW READY IS YOUR ORGANIZATION FOR BIG DATA? Dell Big Data solution isn’t just the rocket science but the same step by step approach to data that helps engineers make a better rocket.

“At Dell, we’ll help customers take clear, practical steps to start generating Big Data insights for the real world” MR MUHAMMAD SHAHZAD

PRE SALES SOLUTIONS ARCHITECT, DELL SOFTWARE

According to Wall Street Journal, a lot of companies are using Big Data to track employee’s health and other areas. What key role does Big Data play in your organization and its daily activities? Big data doesn’t have to be brain surgery but the same access to Real-Time answers that helps doctors improve patients care, can help you improve product quality and

Dell Advance analytics including Internet of things really deep in to health care industries.

WHAT ARE THE MAJOR BIG DATA SOLUTIONS THAT YOU HAVE IN HAND? Big Data’s game-changing potential can sometimes make it seem highly complex and larger than life. At Dell, we’ll help customers take clear, practical steps to start generating Big Data insights for the real world Dell offer everything you need—from infrastructure to data integration and management, to advanced analytics. Second, Dell leverage systems you already have so you can run advanced analytics without starting all over. At Dell, we’re focused on what Big Data can do for you.

WHAT WOULD BE THE BIG DATA DEVELOPMENTS THAT THE MARKET SHOULD LOOK FORWARD TO IN THE FUTURE? Gain access to real-time analytics, achieve a more precise understanding of customers and improve product quality. We can help customers align their big data projects with their business goals. We can leverage systems they already have and secure access to data and analytics so more people on their teams can gain insights to make better decisions

A KEY DIFFERENTIATOR THAT MARKS YOU APART IN THE WORLD OF BIG DATA Dell has unique top Gartner product IPaaS & Advance Analytics (Boomi & Statistica) for helping the customer as well as organization who ever really into BigData.


FT WEEK PREVIEW

13

FINESSE

SPEEDING UP THE DATA DYNAMICS “We help organisations in finding new insights in data by linking different data sets, bringing data from data markets to get a bigger picture, finding creative approaches to visualize data.” FROM STORAGE TO APPLICATIONS, HOW READY IS YOUR ORGANIZATION FOR BIG DATA? Even though the growth of data storage or computational capacity has risen exponentially, where solution providers like Finesse need to prepare themselves is in the direction of improving their computational and statistical methods. Big data and analytics have become more accessible and affordable than ever before. We help organisations in finding new insights in data by linking different data sets, bringing data from data markets to get a bigger picture, finding creative approaches to visualize data. All these help Finesse have an edge in this every growing and transforming space of big data and analytics.

WHAT ARE THE MAJOR BIG DATA SOLUTIONS THAT YOU HAVE IN HAND? Finesse provides for best of breed solutions for storage, analytics engine, in-memory data management platforms that are backed by process centric deliveries and managed services enable organizations to gain insights into the extensive data collected from all business operations.

WHERE DO YOU SEE THE MIDDLE EAST REGION TRENDING TO IN TERMS OF BIG DATA? The Middle East region has been embracing the big data wave and this can be seen with the many ‘Smart City’ initiatives that are being implemented in the region. It is important to note the role played by IOT & Big data and analytics in transforming the infrastructure services in a city. IOT & Big data can offer solutions that can build intelligent infrastructure frameworks for cities, and also can build predictive data modelling to assess future needs. Dubai also plans to host the World Expo in 2020 and Qatar plans to host the 2022 FIFA World Cup. These events will

“Finesse delivers Big Data systems with unprecedented speed, scale and flexibility to enterprise companies. “ SUNIL PAUL CO-FOUNDER AND COO, FINESSE

bring with it a deluge of information to the region. Apart from several Govt initiatives, Big Data will be soon embraced by Financial Services, Telco, Retail and Healthcare segments as well.

WHAT DOES YOUR CUSTOMER PORTFOLIO LOOK LIKE FOR 2016? From our experience, most of our Big Data Projects are coming out from Government, Telecom, Banking, Retail and Healthcare industries.

WHAT DOES YOUR PARTNER PORTFOLIO LOOK LIKE FOR 2016? Finesse partners with the best in the industry in our quest to deliver the best fit solution to our clients. There are various Big Data Solutions available in the market to suit one’s requirement. Starting with Big Data Analytics Platforms such as Hadoop, Cloudera, In-memory Data Management Platforms like Terracotta for distributed inmemory data management and Analytical

tools such as SAS, IBM SPSS, Revolution Analytics and BI tools such as Qlik, Business Objects etc. Also there are various solutions /platforms build for specific industry verticals and business applications including Software AG, Customer XPS for Real time Fraud Management, Customer Experience Management etc.

WHAT WOULD BE THE BIG DATA DEVELOPMENTS THAT THE MARKET SHOULD LOOK FORWARD TO IN THE FUTURE? The Banking & Finance, Retail and the Telecom sector seem to be leading with the adoption of big data strategies in the Middle East region. Big data analytics help banks monitor and prevent fraudulent activities. With the increase in number of cashless transactions, credit card fraud is a rising issue for most banks. By using big data analytics, banks can also offer customers targeted marketing campaigns based on customer behaviour and preferences. Targeted campaigns also better address customer needs, and have better conversion rates than traditional email campaigns.

A KEY DIFFERENTIATOR THAT MARKS YOU APART IN THE WORLD OF BIG DATA With the IOT ( Internet of Things ) fast becomes a reality and for the business to have the need for collaboration of social and public data, organizations have to think of proper platforms and solutions to store, manage and analyze these massive amounts of data safely, effectively, and affordably. Finesse delivers Big Data systems with unprecedented speed, scale and flexibility to enterprise companies. Finesse helps enterprises focus on solving business problems, enabling their Big Data applications to be completed quickly and fully achieve their objectives. Finesse’s Big Data solutions offer real-time processing and enable ad hoc queries for actionable analytics.


14

FT WEEK PREVIEW

TECHWAVE

Big Benefits from Big Data “Big Data enables business outcomes beyond what can normally be achieved at lower volumes, velocities and/or varieties of data.” in Banking, Financial Services, Insurance, Telecom, Manufacturing, Retail, Healthcare & Life Sciences and Energy & Utilities. What does your partner portfolio look like for 2016? Analytics - SAS (SAS Institute), R (open source), RevR (Microsoft), Oracle Advanced Analytics (OAA), IBM SPSS Big data - Apache Hadoop (open source), Hortonworks, Cloudera, SPLUNK

FROM STORAGE TO APPLICATIONS, HOW READY IS YOUR ORGANIZATION FOR BIG DATA? Big Data Offerings: Consultancy l  Due Diligence on Big Data drivers l  Use case identification and Prioritization l  PoC definition l  Technology evaluation l  Big Data reference Architecture l  Big data framework & best practices Implementation l  Sizing, Setup & Administer Infrastructure for Big data environment l  PoC execution & Business value / ROI l  Big Data Architecture & Integration l  Design, Develop & implement l  Technology evaluation Big Data Platform Readily available Big Data Platform for NoSQL, Hadoop, Cassandra, SPLUNK, Oracle Advanced Analytics, SAP PA, R, IBM Big Insights and other BI Integration & Analytics tools for rapid proto typing Accelerators, Frameworks, Platforms –

“Big Data enables business outcomes beyond what can normally be achieved at lower volumes, velocities and/or varieties of data.”

Mobile Analytics Increased use of mobile will drive requirement for analytics applied to mobile generated data

RAJASEKHAR CHINTHAPATLA

Predictive Analytics New innovative applications of advanced algorithms and modeling techniques will advance the science of predictive analytics.

PRACTICE HEAD ANALYTICS, TECHWAVE

Social and Textual Analytics Moving beyond batch listening, Social Business Managers want to be able to analyze social conversations and influencer networks in real time.

Big Data and Analytics l  Analytics as a Service (AaaS) l  Analytical Platform as a Service (APaas) l  Big Data as a Service (BDaaS)

Real-Time Analytics As decision makers get a taste for what can be done, they will want that information faster, and eventually in real time

WHAT ARE THE MAJOR BIG DATA SOLUTIONS THAT YOU HAVE IN HAND?

WHAT DOES YOUR CUSTOMER PORTFOLIO LOOK LIKE FOR 2016?

Customer Analytics Personalized, cross-channel, customerdriven analytics will drive new focus on delivering individualized, personalized digital experiences

We are investing in innovative technologies, solutions, and partnership with OEM/technology vendors to provide cutting edge solutions in the areas of Information Management, Big Data Analytics, and Mobility, Cloud services to our clients

A key differentiator that marks you apart in the world of Big Data Techwave’s investment in innovative models with respect to Big Data is in the following areas of differentiation: Big Data infrastructure (as the core) and the below pillars as satellites l  Security l  Solutions l  Data Science l  Delivering data and data streams l  Deep technology skills and expertise

WHAT WOULD BE THE BIG DATA DEVELOPMENTS THAT THE MARKET SHOULD LOOK FORWARD TO IN THE FUTURE? High-end advanced analytics in the areas of big data, mobility, and cloud deployments, digital, IoT e.g. smart city initiatives in the Middle East are examples of organizations that can benefit from Big Data developments/solutions, leveraging insights from data integrated from various sources to derive value from data to insights.

WHAT KEY ROLE DOES BIG DATA PLAY IN YOUR ORGANIZATION AND ITS DAILY ACTIVITIES? Techwave’s Big Data platform ingests, stores and analyzes data to gain meaningful insights for its various units/activities. To name a few, HR department uses if to employee retention, C&B, attrition etc., Infrastructure Management services on server and applications usage, and customer and marketing analytics.


YOU CAN’T EVEN ADD AS MANY VIRTUAL MACHINES AS WE CAN PROTECT. GravityZone supports business growth through easy-to-scale and resilient security. Relational databases are so yesterday. For more information, visit Bitdefender DP-45 booth, during Gisec 2016.

GravityZone

unfollow the traditional www.bitdefender.com


16

FT WEEK PREVIEW

ZOHO CORP

Walking the Extra Mile with IoT integrated IoT Platform that is built of three major enterprise capabilities such as ‘energy monitoring, remote site monitoring and mobile asset management’. Having the three capabilities packed into a single platform, makes it the most sought after software for building IoT applications for smart cities and enterprises. WebNMS partners with various hardware manufacturers such as gateway and sensor makers and System Integrators to facilitate an ecosystem that builds and deploys real time IoT solutions using the customizable Platform.

HOW DO YOU MAKE THOSE SOLUTIONS AVAILABLE TO THE MARKET? Our solutions are easy to install and use. It could be bought through license. Most times we work together with our country wise partners to deploy the solutions. Even our off the shelf solutions could be altered and tailor made to fit the actual business requirement.

WHO ARE YOUR MAJOR CUSTOMERS SO FAR AND WHO ARE EVALUATING NOW?

THE NUMBER OF WIRELESS M2M CONNECTIONS IN THE MIDDLE EAST IS FORECAST TO RISE TO 119.7 MILLION BY THE END OF 2016. WHAT KIND OF TREND DO YOU SEE IN THE REGION AS FAR AS EMBRACING IOT IS CONCERNED? IS IT STILL MAJORLY A THEORY THAN PRACTICAL? IoT is evidently the next big thing in this age of Information and it is here to stay. It is no more plain theory on paper. As far as Middle Eastern market is concerned IoT or Internet of Things is profoundly a key

technology game changer for businesses which are home grown as well stationed across the globe. IoT Platform based asset monitoring and management would be of great advantage to sectors such as oil & gas, shipping and maritime, transportation and public services, power and utilities, banking and financial services, infrastructure and safety businesses and various other sectors where continuous monitoring adds value to operations as well as its people.

“With numerous countries in the Middle East championing the Smart City agenda, IoT sure has a vast scope in the years to come” PRABHU RAMCHANDRAN

WHAT IS YOUR IOT STRATEGY? WHAT ALL SOLUTIONS YOU HAVE FOR THE MARKET? WebNMS offers a highly scalable and

DIRECTOR, WEBNMS

We have substantial number of partners and customers across the globe. Projects such Smart Lighting, Power Grid Monitoring, Cell Tower Monitoring, Fire Safety equipment monitoring etc have been tested and deployed in Middle Eastern and Indian markets, so far.

WOULD YOU LIKE TO BRIEF US ABOUT ANY RECENT IOT IMPLEMENTATIONS IN THE REGION EVIDENT WITH YOUR CONTRIBUTIONS TO IT? WebNMS has deployed considerable number of IoT Solutions in the Middle East. We have tested and deployed few IoT applications in the region such a ‘Smart lighting, smart building safety management, smart ATM monitoring, Smart energy and utility monitoring etc’.


FT WEEK PREVIEW

17

UONMAP.COM

Leveraging the Spectrum of IoT devices into each part of the marked makes our solutions more attractive for customers.

WHO ARE YOUR MAJOR CUSTOMERS SO FAR AND WHO ARE YOU EVALUATING NOW? Our company is relatively new in the market, but we already have a lot of corporate customers all over the world who are eager to cooperate with us and distribute our products. Among them there are government ambulance services, insurance, logistics, taxi and real estate companies, schools, business corporations who use our product to monitor their offices, staff and fleet.

WOULD YOU LIKE TO BRIEF US ABOUT ANY RECENT IOT IMPLEMENTATIONS IN THE REGION EVIDENT WITH YOUR CONTRIBUTIONS TO IT?

THE NUMBER OF WIRELESS M2M CONNECTIONS IN THE MIDDLE EAST IS FORECAST TO RISE TO 119.7 MILLION BY THE END OF 2016. WHAT KIND OF TREND DO YOU SEE IN THE REGION AS FAR AS EMBRACING IOT IS CONCERNED? Fast growing numbers and types of IoT devices require scalable and modular solutions like our UonMap.com platform which combines connected vehicles, smart homes, video streaming, security, wide range of wireless or wired sensors. UonMap embraces different spheres of IoT including safety and public security, solutions for Smart Cities and government

“Our main idea is not just to make everything connected and easy-to-use, but to make our life safe and secure.” IGOR SARANDI-SEREDA FOUNDER AND CEO OF UONMAP

projects which are actively developing in the Middle East right now.

WHAT IS YOUR IOT STRATEGY? WHAT SOLUTIONS DO YOU HAVE FOR THE

MARKET? IoT market splits into several parts. We have built a universal modular platform UonMap.com to connect people, vehicles and smart homes. It makes our strategy more effective comparing to other companies usually covering some fragmented IoT market. Our main idea is not just to make everything connected and easy-to-use, but to make our life safe and secure.

HOW DO YOU MAKE THOSE SOLUTIONS AVAILABLE TO THE MARKET? We develop our own hardware and software what helps us advance and provide the solutions of a better quality. We offer modular systems and equipment basing on our customers’ requirements. Bringing our specially developed IoT

Our latest IoT implementation is an infrastructural project for Gazprom company. The project includes staff monitoring, safety, security and maintenance of gas pipelines and facilities.

ACCORDING TO RESEARCHERS, THE IOT ECONOMY WILL LEAD TO THE EMERGENCE OF NEW JOBS IN HYBRID VERTICALS. WHAT IS YOUR PERCEPTION OF THIS? IoT has touchpoints with many parts of life: medicine, energy, agriculture, etc. Such mixes will boost the demand for people skilled in several areas at once, those having knowledge of specific industry domains and new technologies along with management skills. It will provide more efficient interaction and deeper understanding of their sphere of work including its tendencies and requirements, and possibilities of better salaries.


future technology week

GULF ENTERPRISE MOBILITY EXHIBITION & CONFERENCE

Agenda DAY 1 10:30

TUESDAY 29 MARCH 2016 Nigel Gibbons CISA, CISSP, CITP, Microsoft Global Advisory Board Member

Opening remarks from the Chairman

TRANSFORMING CUSTOMER ENGAGEMENT 10.45

International Keynote Optimising intuitive user interfaces to enhance customer adoption

11.15

Panel Discussion How hyper connectivity will transform productivity and improve smart decisions by the workforce Eric Eifert, Senior Vice President - Managed Security Services, DarkMatter

12:00

Ashi Sheth, Manager Enterprise Platforms, Netflix

Amit Bhatia, Head of Information Security Governance, Oman Insurance Company

Dr Lee Hyeon Woo, Chair , 5G Forum Global Alliance Sub Committee, Advisor TTA IMT

Security solutions for the mobile embedded world

Dr. Najwa Aaraj, Vice President of Special Projects, DarkMatter

MOBILITY SECURITY STRATEGY 12.30

Lunch

13.30

Digital risk and the threat Landscape Microsoft’s Digital Crimes Unit (DCU) seeks to provide a safer digital experience for every person and organization on the planet by protecting vulnerable populations, fighting malware, and reducing digital risk. The DCU does this by combining big data analytics, cutting-edge forensics and novel legal strategies to protect customer data

14.10

Panel Discussion How to prevent security threats from derailing wider mobility adoption Patrick Nuttal, Head, London Digital Security Center

Dale Waterman, Corporate Attorney for Anti-Piracy, Microsoft Middle East & Africa

Akash Agarwal, Regional Director, EC- Council, MEA

Gezahegn Dugassa, Chief Technology Officer, Awash International Bank

FORENSICS, ACCESS CONTROLS, AUTHENTICATION 14.45

Utilizing business applications to boost operational efficiency

Gezahegn Dugassa, Chief Technology Officer, Awash International Bank

15.15

Presentation

Graham Hunter, Vice President, Europe and Middle East, CompTIA

15.45

What’s next for enterprise mobility? Understanding how consolidation, customisation, cloud, mobile app and content management are fuelling innovations in enterprise mobility

Benoy C S, Director & Head, Information & Communication Technologies Practice - Middle East, North Africa and South Asia, Frost &Sullivan

16.15

Enterprise Transformation: understanding the transformational impact of mobility and IOT on the enterprise of tomorrow

Shivakumar Mathapathi, Lead Instructor and Capstone Lecturer – MSIS – IoT course, Santa Clara University, California. CTO – Dew Mobility

future technology Close of conference 17.00 week

Agenda DAY 2 1

ORGANISED BY

WEDNESDAY 30 MARCH 2016

9.50

Host welcome

Nigel Gibbons, CISA, CISSP, CITP, Microsoft Global Advisory Board Member

10:00

The new dimension in state security risk: threats to security agencies and vital industries from massive, organised cyber attacks As Secretary of State for Defence, Dr Fox presided over one of the world’s most professional armed forces, and liaised with many super-advanced technology companies, during a time when the UK was receiving unprecedented organised cyber attacks and attempts to steal its intellectual property.

Rt Hon Dr Liam Fox MP, former Secretary of State for Defence, United Kingdom

10.30

National cyber security transformation As President of BT Security Mark is accountable for all elements of BT’s security activity globally, both go to market and for BT itself. We develop the most agile and effective protection for BT with the Protect BT team, safeguarding our crucial assets – our business, consumer and mobile customers and their data, and our media arm, BT Sport.

Mark Hughes, President, BT Security, BT Global Services

GOVERNMENT AND ENTERPRISE CYBER SECURITY FRAMEWORKS


10.30

National cyber security transformation As President of BT Security Mark is accountable for all elements of BT’s security activity globally, both go to market and for BT itself. We develop the most agile and effective protection for BT with the Protect BT team, safeguarding our crucial assets – our business, consumer and mobile customers and their data, and our media arm, BT Sport.

Mark Hughes, President, BT Security, BT Global Services

GOVERNMENT AND ENTERPRISE CYBER SECURITY FRAMEWORKS 11.15

Your data is hard currency With head offices in the UAE and serving regional and global customers, DarkMatter is a team of cyber security specialists dedicated to providing secure, trusted and integrated protection services. As a trusted partner to the UAE government, they have the proven integrity, intelligence and cyber security capability to safeguard a nation.

Faisal Al Bannai, Chief Executive Officer, DarkMatter

11.30

Building an optimum cyber security framework for a connected world

Harshul Joshi, Senior Vice President of Cyber Security Governance, Risk and Compliance, DarkMatter

12:00

Cyber security in the GCC: are we doing the best we can?

Hani Nofal, Vice President Networking Solutions, GBM

12:30

Defence in depth rebooted – Why analytics, context and presentation layers are needed in 2016

Neil Thacker, CISSP, CEH & OPST, Information Security & Strategy Officer, EMEA , Forcepoint

12:45

Networking lunch

14:00

Special hacking demonstration: “Smart plug, evil plug” - a demonstration of how cyber attacks will penetrate into our personal lives Smart living and the Internet of Things are set to form central features in the future connected lives of millennials but many smart items are prone to malicious attack by cyber criminals too. This live demonstration, led by the UAE government’s leading cyber security specialists, will show how a hacker can exploit a common smart plug and transform it into a WiFi attacking platform, allowing them to perform an evil twin attack and auto redirect the victim to a phishing page with the motive of stealing social media credentials.

Tudor Enache, Specialist, aeCERT

FORENSICS, ACCESS CONTROLS, AUTHENTICATION 16:00

Panel Discussion: How CNI and government are winning the struggle to protect themselves from SCADA and computer network exploitation Omar Farouk, IT Governance and Security Manager, Ministry of Finance and Industry, UAE

Engineer Ammar Almarzooqi, CISO, Abu Dhabi Department Of Economic Development

Amr Gaber, CISO, Dubai Media

Fuad Al Ansari, VP Information Technology, Abu Dhabi Oil Refining Company (Takreer)

Peter Baurichter, Head of Information Security, Maersk Oil Qatar 15.40

Forensic analysis of cyber attacks: identifying the root cause, working to counteract the threat and mitigate future attacks

Brigadier General (R) Jim Jaeger, former Director of Intelligence for the US Air Force Atlantic Command, Member of the Rhode Island State Cyber Commission and Chief Cyber Strategist, Fidelis

16:10

VMWare NSX: Building an architecture to reshape cybersecurity

Jeremy van Doorn, Director, Systems Engineering, VMWare

LIVE WIRE: INTERACTIVE ROUND TABLE DISCUSSIONS 16:40

Ensuring IoT innovation meets high security standards 50 Shades of WAF: identifying attack signatures and cross site scripting How to best protect against your organisation’s insider threat

Preparing your organisation to defend against the new wave of malware Effective defensive measure when faced with large quantity cyber attacks UAE cyber security regulations

17.50

Dr Hilal Houssain, Senior Systems Development Specialist, Islamic Research and Training Institute Dr. - Ing. Ashar Javed, Web Application Security Researcher, Hyundai AutoEver Eric Eifert, Senior Vice President-Managed Security Services, DarkMatter John Bumgarner, Chief Technology Officer, US Cyber Consequences Unit Ibrahim Abdalla, Head of IT, Abu Dhabi Aviation Dimitrios Sarris, Senior Manager Cyber Governance, Risk and Compliance, DarkMatter

Effective forensics and disaster recovery

BGen (R) Jim Jaeger, former Director Intelligence at USAF Atlantic Command

Creating a Cyber Security Literate Workforce

Patrick Nuttal, Director, London Digital Security Centre

How to leverage machine learning and mathematics for accurate threat detection

Tareque Choudhury, Head of Security Middle East and Africa, BT Security Enterprise, BT Global Services David Atkinson, Cyber Security Specialist, DarkTrace

End of Day 1


week

Agenda DAY 2

THURSDAY 30 MARCH 2016

09:20

Chairman’s opening remarks

Nigel Gibbons CISA, CISSP, CITP, Microsoft Global Advisory Board Member

09:30

The evolution of malware, understanding the current threat and knowing how to counteract it • Assessing the malware attack on the Ukrainian electrical grid in order to apply countermeasures in the Middle East • High profile attacks on corporations, understanding the Sony Pictures and Saudi Aramco attacks and methods which Middle Eastern CISOs need to implement in order to ensure their companies’ are protected • Highlighting the probable trends and likely evolution of malware and discussing ways in which organisations can future guard themselves from attacks

John Bumgarner, Chief Technology Officer, US Cyber Consequences Unit

10:30

‘Intelligent thinking’: the art of cyber

Tareque Choudhury, Head of Security Middle East and Africa, BT Security, BT Global Services

11:00

Protecting passengers and the aviation industry from cyber attacks

Dr Jassim Haji, Director of Information Technology, Gulf Air

11:30

Using expert systems to detect advanced threats

Matthew G. Harrigan, President & CEO, PacketSled Inc.

SECURING THE DIGITAL CONSUMER 12:00

Panel Discussion: Ensuring consumer-centric innovations are not threatened by emerging risks Zubair Ahmed, VP, Head of IT & Business Innovation, Emirates Islamic

Muhammad Aslam, VP - Head of IT Architecture & Channels Projects, Dubai Islamic Bank

Roshdi Osman, Head of Security Governance, Deputy CISO, Banque Saudi Fransi 12:40

Accelerating the digital journey through the adoption of a threat-centric security model

15:10

Panel Discussion: IoT and the inherent risks brought by increasingly connected living Jonny Voon, Lead Technologist - Internet Technology, InnovateUK

Dr Hilal Houssain, Senior Systems Development Specialist, Information and Knowledge Services Sharing Division, Islamic Research and Training Institute (a member of Islamic Development Bank Group)

16:00

16.50 future technology week

17:00

Adam Philpott, Cyber Security Director for Europe, Middle East, Africa and Russia, Cisco

Panel Discussion: Will we see a major commercial sector killed by cyber attacks in our lifetimes? Safdar Zaman, Head of IT Strategy and Governance, Nakheel

Dr Jassim Haji, Director of Information Technology, Gulf Air

Patrick Nuttal, Director, London Digital Security Centre

Dr.-Ing. Ashar Javed, Information Security Specialist, HAEE (Germany)

Rafik Hajem, Director of Sales EMEA, Guidance Software Inc

Nigel Gibbons CISA, CISSP, CITP, Microsoft Global Advisory Board Member

Chairman’s closing remarks Close of conference

IoTx Agenda

ORGANISED BY

TUESDAY 29 MARCH 2016

IoTx

10:30

Host Welcome

Richard Dean, Radio Host of Dubai Eye Business Breakfast Show, FM 103.8

09:15

Host

10:35

Chairman Opening Remarks

Nigel Cameron, President, Centre for Policy on Emerging Technologies

09:25

Chair

STRATE

GLOBAL DIGITALIZATION 10:45

Opening Keynote Address Creating a smart vision for the region

11:15

Keynote Panel Discussion Connecting the cities of the future: evolving from a smart city to a responsive & adaptive city Karine Dognin-Sauze, Vice President, Greater Lyon Mohammed Zaffin, IT Director, Dubai Municipality Safder Nazir, Regional Vice President Smart Cities & IoT, Huawei Jonny Voon, IoT Lead, Innovate UK

12:15

Younus Al Nasser, Assistant Director General, Dubai Smart Government Office

Dr Azeez Mohammed, President & CEO, Power Services, Middle East & Africa, GE Power

09:30

Open

09:45

Intern IoT m

10:15

IoT W

10:45

Harn

11:15

Pane Robo

Dilip Rahulan, Executive Chairman & CEO, Pacific Controls Rutger Reman, President of Industry & Society Unit, Ericsson Middle East

Powering the internet of industrial things: How to capitalise on the booming industrial IoT ecosystem

Dilip Rahulan, Executive Chairman & CEO, Pacific Controls


Safder Nazir, Regional Vice President Smart Cities & IoT, Huawei Jonny Voon, IoT Lead, Innovate UK

Dilip Rahulan, Executive Chairman & CEO, Pacific Controls Rutger Reman, President of Industry & Society Unit, Ericsson Middle East

12:15

Powering the internet of industrial things: How to capitalise on the booming industrial IoT ecosystem

Dilip Rahulan, Executive Chairman & CEO, Pacific Controls

12:45

Realizing the IoT opportunity

Anastasia Ribbing Kristoffers, Senior Managing Consultant, Huawei Technologies

13:15

Connect, transform, reimagine – the SAP story

Irfan Khan, Chief Technology Officer, SAP Global Customer Operations

13:45

10:45

Harn

11:15

Pane Robo

Moha

Prabh

Fayez 12:00

Capt powe

12:15

Interv Innov A con

12:45

Indus

13:15

Lunch

14:15

Intern Enab is set

Lunch

AMPLYIFYING ROI – AMPLYIFYING RISK 14:45

How can wearables help patients with serious chronic conditions: a use case from Empatica

15:15

Keynote Panel Discussion What can business do about their biggest IoT vulnerabilities?

Matteo Lai, Co- Founder & CEO, Empatica

Dr. Mohamed Arab, Technology & Infrastructure, National Telecommunication Regulatory Authority Egypt ( NTRA )

Mark Hughes, President, BT Security

David Prendergast, David Prendergast, Social Anthropologist and User Experience Lead, Intel Labs Europe

Shukri Eid, Customer Solutions Director, CISCO

Geoff Moore, Chief Technology Officer, Red Solutions

IOT in AC

IOT IN ACTION 16:00

OIL & GAS: Let’s make things talk - IoT readiness in KSA

Wael Ali AlGhamdi, CEO, MachinesTalk

14:45

Smar

16:30

ENERGY: Harnessing IoT for cost savings efficiencies and higher product yields

Anthony Sayers, Internet of Things Business Developer & Strategist EMEA, Dell OEM Solutions

15:15

FUTU graph

17:00

AUTOMOTIVE: Intersection of security and IOT in the manufacturing industry

Ashar Javed, AppSec Expert, Hyundai Auto Ever Europe

15:45

EDUC Appl

17:30

Closing Remarks

Nigel Cameron, President, Centre for Policy on Emerging Technologies

18:00

End of Day One

IoTx Agenda

WEDNESDAY 30 MARCH 2016

09:15

Host Welcome

Richard Dean, Radio Host of Dubai Eye Business Breakfast Show, FM 103.8

09:25

Chairman Opening Remarks

Nigel Cameron, President, Centre for Policy on Emerging Technologies

STRATEGIC OUTLOOK Keynote 09:30 Opening Government FTW 2016_Booklet_AW-print.indd 3-4

Mohammed Abdulla Shael AlSaadi, CEO, Department of Economic Development (DED)

09:45

International Keynote IoT meets Dublin- a journey to becoming the most densely “sensed” city in the world

Jamie Cudden, Smart Cities Program Director, Dublin City Council

10:15

IoT Wayfaring: From smart stadium to future city

David Prendergast, Social Anthropologist and User Experience Lead, Intel Labs Europe

10:45

Harnessing the value of IOT

Rabih Dabboussi, Managing Director and General Manager, Cisco UAE

11:15

Panel Discussion Robotics and sensors creating safer communities, cities and environments Mohamed Anis Chemli, Director GCC & Levant, Gemalto

Magnus Karlsson, Director Connected Engineering, Cybercom

Prabhu Ramachandran, Director-WebNMS, Zoho

Mohammed AlKhushail, Chairman, Machinestalk

Fayez Ibbini, CEO, Alpha Data 12:00

Capturing the IoT opportunity: Crucial steps as the industry prepares for a world powered by IoT

Rafiah Ibrahim, President, Middle East & Africa, Ericsson

12:15

Interview Innovation of everything - the journey from idea to production A conversation on innovating products, raising money, getting to market

Shaun Moore, CEO and Founder, Chui - the world’s smartest doorbell

12:45

Industrial IoT- 1001 real life applications from around the globe

Alaa Dalghan, General Manager –UAE Director – Middle East & Africa, Advantech B+B SmartWorx

13:15

Lunch

14:15

International Keynote Enabling the internet for everyone and everything with 5G – a demonstration of how 5G is set to revolutionise the customer experience

Dr Lee Hyeon Woo, Professor, Dankook University, Korea, Chair, 5G Forum Global Alliance Sub Committee, Advisor, TTA IMT

IOT in ACTION 14:45

Smart City Solutions & Return of Experience

Talal Eskandar, Sales Director, NME &Egypt, GE Grid Software Solution

Saif S (Chai

Shad 16:30

SPOR

17:30

Closin

17:45

Close


Enabling the internet for everyone and everything with 5G – a demonstration of how 5G is set to revolutionise the customer experience

University, Korea, Chair, 5G Forum Global Alliance Sub Committee, Advisor, TTA IMT

IOT in ACTION 14:45

Smart City Solutions & Return of Experience

Talal Eskandar, Sales Director, NME &Egypt, GE Grid Software Solution

15:15

FUTURE TECH MATERIALS: Mapping the value beyond the hype - printable sensors, graphene and transformative tech

Dr. Aravind Vijayaraghavan, Lecturer in Nanomaterials, The University of Manchester

15:45

EDUCATION: Panel Discussion Applying IoT in higher education - connecting future influencers, not just devices

16:30

Saif Salem Bamadhaf, CTO, Higher Colleges of Technology (Chair of the Panel Discussion)

Jacob Kurian, Director of IT, Khalifa University of Science, Technology and Research

Shadi Akour, CIO, New York University - Abu Dhabi

Ibrahim Elfadel, Professor, Masdar Institute

SPORT & FITNESS: The quantified self- a journey to creating super athletes

Patrice Coutard, Fitness Coach, UAE National Football Team Wim Bonjean, Managing & Creative Director, B.U.T

17:30

Closing Remarks

17:45

Close of the Conference

Nigel Cameron, President, Centre for Policy on Emerging Technologies

A part of

future technology week

The Big Data Show Agenda

THURSDAY 31 MARCH 2016 3/23/16 4:45 PM

09:15

Chairman Opening Remarks

GLOBAL DIGITALIZATION 09:30

Opening Keynote Speech Creating a generation of data scientists - how academia and business plug in to the wider innovation ecosystem

Aamena Alshamsi, First UAE, Phd Graduate in field of Big Data, Assistant Professor, Masdar Institute of Science and Technology

09:50

Government Keynote Speech Capturing the power of open data: enabling efficient and responsive public services and private sector innovations

Younus Abdul Aziz Al Nasser, Assistant Director General, Dubai Smart City Office

10:20

International Keynote How platform thinking and algorithms are shaping the world and predicting the future

Mike Bugembe, Global Chief Analytics Officer, JustGiving

11:00

Transform data into intelligent action

Mohamed Mikou, Region Services Lead, Microsoft

11:30

Panel Discussion Harnessing data to power smart – and safe – cities Jamie Cudden, IoT Lead, Policy Advisor, Dublin City Council Harshul Joshi, Senior Vice President - Cyber Governance of Risk and Compliance, DarkMatter

Anwer Kotob, Manager Industry Value Engineering- Public Services, SAP MENA Nader Benmessaoud, Program Manager, Microsoft

12:15

Improving life span & better patient care through integrated customer record management

Amani Mahmood Mohd Saeed Al Jassmi, IT Director, Dubai Healthcare Authority

12:45

Transparency In Real Estate Sector

Khalifa Alzeraim Alsuwaidi, CEO & Board Member, ERES - Emirates Real Estate Solutions

13:45

Lunch

SECURING THE BIG DATA ECOSYSTEM 14:15

Navigating Big Data privacy and security challenges

14:45

Panel Discussion The connected fate of the data explosion and security threats Stephen Brennan, Senior Vice President - Cyber Network Defence, DarkMatter

Nigel Cameron, President, Centre for Policy on Emerging Technologies

Gezahegn Dugassa, Chief Technology Officer, Awash International Bank

Mohamed Roushdy, Technology Advisor to CEO, Bank of Bilad 15:30

The road to big data: Key steps for CIO’s to unlock its potential & understand future trends

Mr. Jonas Zelba, Industry Analyst, Information & Communication Technologies, Middle East & North Africa, Frost & Sullivan

ALGORITHMS DRIVING BUSINESS INSIGHTS 16:00

The Blockchain meets Big Data: Securing the exchange of value within smart cities

16:30

Closing Remarks

16:45

Close of the Conference

Atif Kureishy, Principal - Cyber and Analytics, Booz Allen Hamilton

IOTX KEYNOTE SPONSOR

BIG DATA DIAMOND SPONSORS

PLATINUM SPONSORS

GOLD SPONSORS

SILVER SPONSORS

HACKATHON & BUSINESS INTELLIGENCE ANALYTICS PARTNER

future technol week

29march


One company. One source. One focus. With customer satisfaction and your profitability on the line, choosing a stable technology partner is a critical business decision. While other technology providers in the industry are splitting apart, Dell is committed to remaining a true source of end-to-end solutions. Certainty in an uncertain world — now that’s a choice you can make with confidence.

Sell with confidence. Sell with Dell. To learn more, visit Dell.com/partner/yoursuccess

Š 2015 Dell Inc. All rights reserved. Dell Emerging Markets (EMEA) Limited is registered in England and Wales. Company Registration No: 3266654. Registered address: Dell House, The Boulevard, Cain Road, Bracknell, Berkshire, RG12 1LF. Company details for other Dell UK entities can be found at www.dell.co.uk


OFFICIAL TECHNOLOGY MEDIA PARTNER


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.