ICT (3)

مؤتمر الكويت لأمن المعلومات والاتصالات

Kuwait Info Security & Communications Conference



Dr. Huda Al Rashidi

Chairman of Scientific Committee
Assistant Professor, Information Technology & Computing Dept, Arab Open University- Kuwait

اللأحداث السابقة

Supported by
Strategic Sponsor
Main Sponsor
Golden Sponsor
B. Online Logo
Media Partner
Organized by
Participants in the Conference and Exhibition


We are pleased to announce Kuwait Info Security Conference & Exhibition, the premier event for infosecurity, risk and IT professionals, will be held on 27 – 28 Nov 2024 at the Radisson Blu Hotel. We invite you to hear strategies, cutting edge research, user case studies and best practice from some of the most prominent names in the IT security arena in key areas such as trusted computing, identity management, awareness raising, and security management.

Kuwait Info Security Conference & Exhibition fosters opportunities for IT professionals to network, build relationships, and explore new ideas. It brings together IT professionals, developers, decisions and policy makers, governmental officials, experts, consultants, industry leaders, bankers, law enforcement officials, academics, networks security managers, data-base administrators, IT marketing executives, surveyors, etc. to share their protection experience in IT security and exchange ideas on the most emerging technology trends, applications and practices.

Kuwait Info Security Conference & Exhibition aims to keep you at the forefront of the latest security developments.Do not miss this opportunity to learn fresh approaches and develop innovative strategies and tactics to defeat today’s biggest information security threats.

With special emphasis placed on case studies and innovative trusted security solutions, the event will focus on key security topics such as:

  • IT systems & network security
  • Wireless network security
  • Internet & E-mail security
  • Cryptography, Steganography, Watermarking
  • Security of eCommerce, eBusiness & eGovernment
  • Infrastructure Security
  • Social network threats
  • Network intrusion detection & prevention
  • Information security policies & strategies
  • Identity Management
  • Biometrics
  • CERT & Incident Management
  • New cybercrime threats
  • IT business continuity, disaster recovery plans
  • Security Education – Awareness, Training and Certification
  • Cybersecurity
  • CEOs & Directors of IT
  • Systems and Network Managers & Administrators
  • IT and Internet Security Managers
  • Business Continuity Managers
  • Auditors
  • Senior business executives
  • Security Consultants
  • Researchers and academics
  • Investigators
  • Computer Specialists
  • InfoSec Specialists
  • Crime Prevention Specialists
  • Data Security Engineers
  • Network Analysts
  • Systems Analysts
  • Network Engineers
  • Technical Consultants
  • Network Security Analysts
  • Security Administrators
  • Security Architects


Workshop ( A )


2 Days - 5 hrs per day

TIME 09:00 - 02:00 PM
DATE 27 - 28 Nov 2023


A Certified Ethical Hacker (CEH) is a skilled professional who protects and secures systems by ethically using the same knowledge and tools as a malicious hacker. The objective of the ethical hacker is to help an organization take preventative measures against malicious attacks by attacking his own system. This ideology stems from the proven practice of trying to catch a thief by thinking like a thief. Participants will learn the latest techniques to scan, test, hack, and secure systems. This workshop is for information technology & security professionals who wish to prepare for and pass the EC Council Certified Ethical Hacking Exam as well as gain the understanding and hands on experience of an ethical hacker.

Workshop’s Content

  • Introduction to Ethical Hacking
  • Foot Printing and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking 
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflows

Workshop ( B )

Zero Trust Network Access 2.0

2 Days - 5 hrs per day

TIME 09:00 - 02:00 PM
DATE 27 - 28 Nov 2023


Zero Trust Network Access 2.0 overcomes the limitations of legacy ZTNA solutions, providing secure connections to deliver better security outcomes for businesses with hybrid workforces.

Current ZTNA 1.0 (or legacy) approaches support only coarse-grained access controls, incorporate an “allow and ignore” approach for both users and app traffic and provide either little or no advanced security consistently across all apps – including rudimentary data loss prevention (DLP) – which violates the principle of least-privileged access and exposes organizations to increased risk of a breach.

Workshop’s Content

  • Prisma Access Introduction (ZTNA 2.0 messaging highlights)
  • Securing Private Application Access with ZTNA 1.0
  • Securing Private Application Access with ZTNA 2.0
  • Security Internet and SaaS Access with ZTNA 1.0
  • Security Internet and SaaS Access with ZTNA 2.0
  • Modern Threat Protection with ML-Powered Analytics
  • Explore Prisma Access Cloud Management 
  • Prisma SD-WAN 


Belal Al-Sheikh Ali

Systems Engineer
Palo Alto Networks, Qatar

Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts and papers. The conference solicits contributions of abstracts and papers that address themes and topics of the conference, including figures, tables and references of novel research materials


Dr. Huda Al Rashidi

Chairman of Scientific Committee
Assistant Professor, Information Technology & Computing Dept, Arab Open University- Kuwait

Dr. Haitham Kadry

Managing Director
Experts House- UAE

Eng. Wioletta Sikorska

Eng. Tatiana Nekrasova


Mr. Gamal Omran

Mr. Talal Alshamari

Mr. Dawood Hussin

Eng. Dina Ismaeil

Eng. Reem Fouad

Eng. Abdullah El Amien







Training workshops


Submit your Abstract

Abstract Submission Guideline:

All honorable authors are invited to submit an abstract for the conference themes and topics. Prospective researchers are strongly encouraged to submit an abstract that might be selected for oral presentation. When submitting your abstract, please follow the guidelines below to what your abstract should include:

  • An introductory statement that outlines the background and significance of the study
  • A clear indication of the major findings of the study
  • A concluding statement

Paper Submission Guideline:

The full-text paper is a comprehensive summary of your research study. It should begin with an introduction that covers information on the background or literature reviews introduced in the study, including all citations which are referenced at the end of the paper. MS Word Users:

  • Full-Text Paper formatted according to MS Word Template in .docx format
  • PDF Version of the paper
  • Blind Version of the paper

Floor Plan

Radisson Blu Hotel Al-Hashemi 2 - Kuwait

Submission Dates :

30 July 2023

Abstract submission

6 August 2023

Acceptance notification

15 October 2023

Full paper submission

Sponsorship & Exhibition Opportunities

Strengthen your position as a key player in the region and showcase your solutions to Kuwait’s IT local, regional, and international companies, cybersecurity and communication practitioners, and experts. Our tailored sponsorship and exhibition packages will connect you with your target audience and other potential stakeholders.

Get In Touch With Us!

Phone / Whatsapp

(+965) 97772806

(+965) 99898928

Conference, Exhibition & Sponsorship Enquiries:

Speaking Enquiries:

Marketing & Media Partnership Enquiries:


Radisson Blu Hotel, Al Hashemi Hall , 
State of Kuwait