SCCS Dubai
SCCS Dubai
SPONSORED BY:
WWW.SUPPLYCHAINCYBERSECURITYSUMMIT.COM
ABOUT THE SUMMIT
Learn the latest case studies on the end-to-end cyber security implementation
practices when working with third parties to ensure a truly resilient and secure
supply chain network at the Third Party & Supply Chain Cyber Security Summit:
Middle East Edition.
Led by the TOP information security professionals from leading companies the
discussion will give you an opportunity to see the issue from the perspective of
different industries & angles and identify the complex solution to be implemented.
video gallery
photo gallery
EXPECTED
SPEAKERS INCLUDE NADAV KEDEM
Senior AppSec Engineer
MULTINATIONAL
MISSION-CRITICAL
SOFTWARE PROVIDER
Raymond Stanton
NED/Board Member/
Consultant/CiSO/CRO/CSO
Keynote
09:00 Fingerprinting Cyber Security
in the Supply Chain
Ashish Khanna
Group CISO
Panel Discussion
09:30 Third Party Cyber Risk Management
• Automation & Digitalisation
• Tools to enhance visibility and mitigate digital supply chain threats
• Hands-on strategies on identifying & managing risky vendors in your ecosystem
• How to measure and monitor vendor compliance to company policy
• Raising awareness and fostering a supply chain cyber security culture
MODERATOR:
Olivier Busolini
Head of Information
Security Group
MULTINATIONAL
Seshadri P S Alex Bodryk MISSION-CRITICAL
VP, Senior Director - GRC Divisional CISO SOFTWARE PROVIDER
Networking
10:20 Coffee Break & Refreshments
DAY 1
Quality face-to-face networking is not only the fastest way to find solutions for your current challenges but
also a key to professional and personal growth.
Grab a drink and chat with your peers!
11:00
Case Study
Cyber Risk Quantification, Aggregation & Mitigation: 6/11
2023
Actionable Advice
Seshadri P S
VP, Senior Director - GRC
Case Study
11:20 AI Security Risks and How to Manage Them
in Your Supply Chain
• Understanding AI in the Supply Chain: An explanation of how Artificial Intelligence has been
incorporated into supply chains, emphasizing both its benefits and potential hazards.
• Potential AI Security Threats: Investigate potential AI supply chain security threats, such as data
intrusions, unauthorized access, model tampering, and adversarial attacks.
• Implications of AI Security Breaches: Real-world examples illustrating the potentially catastrophic
effects of unmanaged AI security risks on the supply chain and the business.
• Strategies for Proactive Risk Management: Introduction of proactive risk management strategies,
including AI security audits, access controls, data encryption, and robust anomaly detection systems.
• AI Ethics and Compliance with Regulations: Exploration of the role of AI ethics and regulations in
mitigating security risks, including data privacy laws, AI transparency and explainability requirements.
Martin Ignatovski
Chief Information Officer
Sponsoeship opportunity
Networking
12:10 Interactive Lunch
It’s all about networking, isn’t it?
Choose a table with the topic of your interest and discuss it with your peers while having a lunch.
Ubaid Jafri
Head of Cyber Defense
& Offensive Security
Expert View
15:00 Establishing Cybersecurity Mindset
• The weakest and the strongest links in every cybersecurity program
• What can companies do to protect themselves and their employees?
• Importance of the cybersecurity mindset
Yana Li
Director of IT and
Platform Security
Networking
15:30 Coffee Break & Refreshments
Quality face-to-face networking is not only the fastest way to find solutions for your current challenges but
also a key to professional and personal growth. Grab a drink and chat with your peers!
Demo
16:10 Incident Response & Crisis Management
in a Multi-Vendor Environment Scenario
Kais Barakat*
Senior Information Security Specialist
Saudi Aramco
Case Study
16:40 Roadmap to the Mature Supply Chain Ecosystem
& Fundamentals of Its Cyber Security
DAY 1
Sponsoeship opportunity
17:00
Panel Discussion
Securing the Supply Chain:
6/11
Hands-on Strategies for End-to-End Cyber Security
2023
MODERATOR:
Networking
19:30 Dinner & Live Music
Jelena Zelenovic
CISO
Panel Discussion
09:25 Global Regulatory Framework
when Dealing with Third Parties
• Regulations around the corner and a shared approach
• What changes to expect in terms of compliance risks, rules
and requirements in supply chain security?
• Compliance with security clauses through standardisation
MODERATOR:
Jelena Zelenovic
CISO
Case Study
10:15 Journey to Standardisation -
Optimising Efficiency and Maturation of Strategic
Supplier Management Programs
• How can standards and regulations align?
• The integrated acceptance of standard risk frameworks and diligence practices
• Achieving common set of set of third-party diligence and management
• Focus on cyber, ESG, and privacy standards
• Guidance to program managers and risk professionals – so does and don’t dos
DAY 2
Sean O’Brien
UK/EU Steering
Committee Co-Chair
Networking
10:40 Coffee Break & Refreshments
Quality face-to-face networking is not only the fastest way to find solutions for your current challenges but
also a key to professional and personal growth. Grab a drink and chat with your peers!
11:20 Roundtable Discussions
Dive in deeper into the topic of your interest. This is a session, where participants are split into smaller
groups to get to know each other’s challenges and brainstorm the solutions together.
RT1: AI in TPRM
Moderated by: Bilal Lodhia, Gargash Group
Case Study
12:10 Secure Software Development Lifecycle
Panel Discussion
SBOM: Increasing Transparency and
12:30
Security in the Digital Supply Chain
•Why should we care about SBOM
•Top items to have in mind when working on SBOM
and how to secure third parties involved
MODERATOR:
Nadav Kedem
Senior AppSec Engineer
DAY 2
Mohsin Alhilal
Senior Cybersecurity
Consultant
Case Study
14:40 Open Source in Your Supply Chain
Closing Remarks
15:50 Gifts & Giveaways from the Organiser and Partners
POST-EVENT WORKSHOP
in third-party risk management (TPRM). CTPRP holders attain thorough
knowledge of risk management concepts and principles, including:
The exam is held remotely, and class attendees are eligible to schedule and
take the exam within 15 weeks of completing the class. Shared Assessments
will send registrants more information about the exam and class logistics.
Register here
* Please note that the course is organised by Shared Assessments and paid separately from the main conference
participation fee. Participating in the course doesn’t include participation at the main conference (6-7 November
2023) as well as participation at the main conference doesn’t include the course fee.
ABOUT
THE ORGANISER
GIA Global Group is a team of the experienced market research and event management professionals aiming
to boost business intelligence with a focus on cyber security, data analytics and operational excellence.
Through the high quality international events gathering leading experts and senior level executives globally we strive
to provide businesses with the best industry practices and help companies to grow and achieve commercial success.
Our mission is to bring the maximum value to improve your business strategy and operations empowered by growth,
innovation and agility.
WWW.SUPPLYCHAINCYBERSECURITYSUMMIT.COM