مؤتمر الكويت لأمن المعلومات والاتصالات

Kuwait Info Security & Communications Conference

Days
Hours
Minutes
Seconds
Official Sponsor
Strategic Sponsor
Main Sponsor
GBM-logo
Organized by
Conex-logo

Overview

We are pleased to announce Kuwait Info Security Conference & Exhibition, the premier event for infosecurity, risk and IT professionals, will be held on 27 – 28 Nov 2024 at the Radisson Blu Hotel. We invite you to hear strategies, cutting edge research, user case studies and best practice from some of the most prominent names in the IT se- curity arena in key areas such as trusted com- puting, identity management, awareness raising, and security management.

Kuwait Info Security Conference & Ex- hibition fosters opportunities for IT profession- als to network, build relationships, and explore new ideas. It brings together IT professionals, developers, decisions and policy makers, governmental officials, experts, consultants, indus- try leaders, bankers, law enforcement officials, academics, networks security managers, data-base administrators, IT marketing executives, surveyors, etc. to share their protection experience in IT security and exchange ideas on the most emerging technology trends, applications and practices.
Kuwait Info Security Conference & Ex-hibition aims to keep you at the forefront of the latest security developments. Do not miss this opportunity to learn fresh approaches and de- velop innovative strategies and tactics to defeat today’s biggest information security threats.

With special emphasis placed on case studies and innovative trusted security solutions, the event will focus on key security topics such as:

  • IT systems & network security
  • Wireless network security
  • Internet & E-mail security
  • Cryptography, Stegnography, Watermarking
  • Security of eCommerce, eBusiness & eGovernment
  • Infrastructure Security
  • Social network threats
  • Network intrusion, detection & prevention
  • Information security policies & strategies
  • Identity Management
  • Biometrics
  • CERT & Incident Management
  • New cybercrime threats
  • IT business continuity, disaster recovery plans
  • Security Education – Awareness, Training and Certification
  • Cybersecurity
  • CEOs & Directors of IT.
  • Systems and Network Managers.
  • Business Continuity Managers.
  • Researchers and academics.
  • Investigators.
  • Computer Specialists.
  • InfoSec Specialists.
  • Crime Prevention Specialist.
  • Data Security Engineers.
  • Network & Systems Analysts.
  • Network Engineers.
  • Technical Consultants.
  • Network Security Analysts.
  • Security Administrators.
  • Security Architects.
Participants in the Conference and Exhibition
logos copy 8
logos copy 6
Media Partner

FEATURED SPEAKERS

Dr. Huda Al Rashidi

Assistant Professor, Information Technology & Computing Dept, Arab Open University - Kuwait

Faisal Abul

Founder & CEO, AFCyberNest Kuwait

Dr Ahmad Alqatan

Assistant Professor, Arab Open University Kuwait

Dr. Belal Al-Sheikh Ali

Cybersecurity Consultant, Palo Alto Networks Kuwait

Dr. Feda AlShahwan

Associate Professor College of Technological Studies , PAAET Kuwait

Tamer El-Hossary

IT Planning professional Kuwait Integrated Petroleum Industries Company (KIPIC)

Dr. Shaheela Abdul Majeed

Information Security & Compliance Officer & Auditor - Oil & Gas Industry, Kuwait

Yousif El- Kordi

Group Head of Information Technology, City Group Co Kuwait

Dr Basel Alothman

Associate Professor at KCST Managing Director of Kout Labs for Computer Research & Development

Hany Sayed

CIO and MENA Digital Mentor, UAE

Dr. Abdul Wahab Baroun

Assistant Professor of Management & HRM Arab Open University

Sherif El Moshneb

Security Technical Specialist Microsoft - Kuwait

Naeem Mirza

Vice President | Robotics, AI & cyber security. AI Doctrine Inc. Canada

Mohammed Alrasheedi

Chairman of The Cybersecurity Commitee at The Electronic Media Union

Omar Alrayyan

PMP, BPM, CSM Manager Business Architecture

WORKSHOPS

Workshop ( A )

Big Data In Action Government & Industrial experience Workshop
ورشة عمل البيانات الضخمة في القطاعين الحكومي والصناعي

Overview

This interactive workshop will explore the real-world applications of big data in government and industry through case studies, hands-on activities, and expert discussions. Participants will gain valuable insights into how data is driving decision-making, improving efficiency, and tackling crucial challenges across diverse sectors.

Target Audience:
  • Government officials, policymakers, and analysts
  • Industry professionals looking to leverage big data
  • Professionals interested in learning about how big data impacts various sectors
  • Data enthusiasts and aspiring data scientists
Objectives:
  • Understand the key concepts and challenges of big data in government and industry.
  • Explore case studies showcasing successful big data implementations across different sectors.
  • Gain practical skills in data analysis and visualization using interactive tools.
  • Learn about ethical considerations and privacy concerns related to big data usage.
  • Network with fellow participants and experts in the field.
Schedule:

Day 1:

  • Morning: Introduction to Big Data: Definitions, technologies, and the 3 Vs.
  • Government Applications: Case studies in public safety, resource management, and citizen services.
  • Hands-on Activity: Exploring government datasets and identifying insights.
  • Afternoon: Industry Applications: Case studies in manufacturing, healthcare, and finance.
  • Tools and Techniques: Introduction to data analysis and visualization software like Tableau and Python.
  • Panel Discussion: Expert insights on challenges and opportunities of big data in government and industry.

Day 2:

  • Morning: Ethical Considerations: Privacy, security, and responsible data usage.
  • Future Trends: Exploring emerging technologies like AI and machine learning in the big data landscape.
  • Group Challenges: Participants tackle real-world problems using big data analysis and present their solutions.
  • Afternoon: Open Q&A and Discussion: Address participants’ questions and engage in an interactive dialogue.
  • Workshop Wrap-up: Key takeaways, resources, and next steps.
Adapting the Workshop:

This workshop outline can be tailored to suit specific needs and target audiences. The focus can be adjusted to particular government or industry sectors, or specific big data tools and technologies.
By combining theoretical knowledge with practical activities and real-world examples, this workshop will equip participants with valuable insights and skills to navigate the ever-evolving world of big data in government and industry.
I hope this outline provides a helpful starting point for your big data workshop! Please feel free to ask if you have any further questions or need further details on specific workshop elements.

Instructor

Omar Alrayyan

PMP, BPM, CSM Manager Business Architecture

Workshop ( B )

The Data Security and Privacy Workshop
ورشة عمل حماية خصوصية البيانات

Overview

The increasing reliance on stored data has raised significant concerns for many individuals, private and public organizations, especially regarding escalating cyber threats and privacy issues.

As a decision maker in your professional life, you may find yourself weighing the benefits and risks of using new and emerging technologies to collect and roast personal data, and Data Privacy and Technology will help you think critically about the trade-offs and threats posed by today’s digital landscape.

Topics:

The Data Security and Privacy Workshop, through real-world examples with expert speakers, policymakers, and privacy researchers, will explore the following key topics:

  • The legal and ethical implications of data collection
  • Understanding who is responsible for protecting data.
  • Understanding the concepts behind privacy and ethics in information technology.
  • Discovering the risks and rewards of surveillance.
  • Examining the future of data privacy ethics, collection, use, and artificial intelligence.
  • Understanding personal data collection technology.
  • Understanding and preparing for the impacts of emerging technologies on the future of privacy, protection, and law.
  • Think critically about privacy issues from multiple perspectives, exploring political, cultural, and societal implications.
  • Protect data and information on the intranet and cloud.
  • Analyze the challenges of data anonymization and the tensions between privacy and utility.
Conclusion

By the end of the course, you will be prepared to contribute to your organization as it navigates the interplay between privacy and big data, and to engage in dialogue and decision-making about data collection and security in your workplace.

Instructor

Mohammed Hassan

Cybersecurity Consultant, DTS Solution

Registration Form

Registration Form
Conference Package

The Registration Fee includes Full Conference Package with:

  • Conference Proceedings
  • Admission to all the Technical Sessions
  • Opening Ceremony
  • Daily Lunch & Coffee Breaks
  • Certificate of Attendance
  • Accommodations are NOT included in the registration fee
Group Discounts
  • There will be 10% on registration of more
  • than 5 delegates from one organization.
Payment Details
  • bank transfer to :
    Account Name: Conex Kuwait co
  • Bank: National Bank of Kuwait
  • Account #: 2020951848
  • IBAN: KW03NBOK00 0000 0000 0020 2095 1848

venue

Get In Touch With Us!

Organized by
Exhibition & Sponsorship Inquiries:
Conference Inquiries
Office address