Under the High Instructions of His Majesty King Mohammed VI, may God bless Him, DGSSI is organising the Africa Cyber Safe Symposium

27th & 28th May, 2024

Palmeraie Rotana Resort, Marrakech


The inaugural Africa Cyber Safe Summit is being hosted by DGSSI on 27th & 28th May, 2024 at Rotana Palmeraie Rotana, Marrakech. The 2-day initiative has been curated as a gathering of 450+ high-level attendees from Africa and will consist of a cutting-edge conference agenda, replete with keynotes, panel-discussions, workshops, fireside chats and various mini-events, running concurrent to the main conference.




Hours of Keynotes & Panels




Gala Dinner

G2G & B2B












H.E. Abdellatif Loudiyi

Minister Delegate to the Head of Government in charge of the National Defense Administration, Morocco

H.E. Abdellatif Miraoui

Minister of Higher Education, Scientific Research and Innovation

H.E. Dr. Ghita Mezzour

Minister in charge of Digital Transition and Administration Reform

Mr. Mohammed Drissi Melyani

Director General Manager Digital Development Agency
President of CAITA

Brigadier General El Mostafa Rabii

Vice President

H.E. Shaikh Salman bin Mohammed Al-Khalifa

National Cyber Security Centre (NCSC) of Bahrain

Major General Eng. Mohammad Boarki

Kuwait National Cyber Security Center.

H.E. Tahina Michel Razafindramalo

Minister Digital Madagascar

Eng. Bassam Maharmeh

National cybersecurity Center, Jordan

Eng. Badar Ali AlSalehi

Director General , Oman National CERT , Chairman of OIC National Cybersecurity Centers Head of ITU Regional Cybersecurity Center

Dr. Ahmed Ali Abdel Hafez

Vice President
Cyber Security Affairs, National Telecommunication Regulatory Authority, Egypt

H.E. Dr Mohammed Al Kuwaiti

President,UAE Cyber Security Council

Mr. Khalil Nossair

Director of Assistance, Audit, Training, Control and Expertise, DGSSI

Dr. Albert Antwi Boasiako

Director-general of Cyber Security Authority, Ghana, Director of ANCA

Mr. Ait Kaddour Youssef

Head of Cybersecurity of Huawei Morocco

Col (Dr.) James J Kimuyu

National Computer And Cybercrime Coordination Committee, NC4 Kenya

Mr. Arnold Mangeni

Director of Information Security
National Information Technology Authority - Uganda

Dr. Vincent Ngundi

Acting Director of Cyber Security and Head of the National Cybersecurity Centre at the Communications Authority of Kenya

Mr. Kwadwo Osafo-Maafo

Head of Cyber Security Division and Chief Information Security Officer (CISO), NCA, Ghana

Gillian Makamara

Project Officer, International Telecommunication Union (ITU)

Mr. Mohamed Fakhry

Head of Information Security Abu Dhabi Commercial Bank, Egypt

Mr. Sean Yang

GSPO for Huawei & Director of Huawei Global Cyber Security & Privacy Office

Mr. Nitin Bhatnagar

Regional Director- India, South Asia and Middle East, PCI Security Standard Council

Mr. Raphael Marichez

Regional Chief Security Officer (South Europe) Palo Alto

Mr. Jeremy Thompson

Executive Vice President

Mr. Shaun Cooney

Field CTO Cisco

Mr. Francis Ofungwu

Global field CISO

Mr. ⁠Saad Lkhadiri

Director of Strategy and Regulation

Mr. Jean De Laulanie


Mr. Gerhard Auer

Vice President EMEA

Dr. Sherif Hazem

Vice President
CBE Fincert

Mr. Ali El Azzouzi


Mr. Hamza Waraki

Co Founder
Techso Group

Mr. Colm Murphy

Senior Cybersecurity Advisor

Mr. Abdallah Zabian

Managing Partner – Asia, MEA DXC Consulting, Data and AI

Mr. Sebastian Perez

Leader, Talos Incident Response / Purple Team

Mr. Abishek Kumar

Business Solutions Architect, CISCO Advisory

Mr. Babacar Wagne

Leader, Cybersecurity Systems Engineering APJC/EMEAR, Cisco

Mr. Kashifu Inuwa Abdullahi

Director General National Information Technology Development Agency of Nigeria

Asmae El Morabit

Chief Information Risk Compliance & Security Officer PS HPS

Mr. Aly Sabry

Cybersecurity Regional Sales Manager -Africa and Levant, Cisco

Sofia Lahmidi

Senior Cybersecurity Consultant
Techso Group

Mr. Othmane Menouar

Professional Services & Security Operations Center Manager, Techso Group

Imane Bachane

SOC Expert

Mr. Zanga Ouattara

Cybersecurity Expert

Prof. Doctor Eng. Lourino Alberto Chemane

Professor of Computer Systems, Security of Information Systems, Eduardo Mondlane University

Mr. Yasir El Kabbany

Senior Regional Director, MiddleEast & Africa at CompTIA

Mr. Jeff Wang

Deputy Director of Global Cybersecurity and Privacy Protection Office

Mr. Hadi Anwar

Head of CPX

Mr. Chancard kanga

Territory Leader

Mr. Karim Aboulasse

Country Manager
Palo Alto Network

Mr. Tarek Abbas

Senior Systems Engineering Director, Emerging Markets
Palo Alto Networks

Mr. Wassem Youssef

Sr. Manager Systems engineering - MENA, Palo Alto Networks

Mr. Imad Abdessadki

Offensive Security Business Unit Manager, Dataprotect

Mr. Lou Zhiquiang Louis

Marketing Manager

Mr. Philippe Lafoucrière

Security Architect, Gitlab

Mr. Vitor Meireles De Sousa

Application Security Specialist, Gitlab

Mr. Taha El Majidi

Spectrum Group

Mr. Mefthe Aynalem

Senior Director of cybersecurity in Huawei Ethiopia office

Xiaoya Yang

ITU-T Study Group 17 Counselor

Mr. Victor Abu Sesay

Director Ecosystem and Capability Development National Cybersecurity Coordination Center (NC3), Sierra Leone. Cybersecurity Center, International Telecommunication Union

Mr. Haisam Ghaly

Regional Sales Manager - Cortex- Egypt, North Africa and Levant,Palo Alto Group

Mr. Predrag Petrovic

Principal Professional Services Consultant (XSIAM)
Palo Alto Networks

Mr. ⁠Madou Coulibaly

Solutions Architect

Mr. Gbota Gwaliba

Directeur Général de l'Agence Nationale de la Cybersécurité, Togo.

Mr. Vladimir Aman

Head of CE-CERT
Ivory Coast.

Mr. Yassine Moudatir

Directeur Solution Factory
Sanlam Maroc

Mr. Abeer Abuzgaia

Acting ICT Manager
Mabruk-oil Libya



Africa Cyber Safe Summit will host an exclusive audience of 450+ senior professionals who form the value chain of the continent’s Cyber Security Eco-system.

The Summit has been curated for the following job titles:
  • Ministers
  • Government Officials
  • CEOs
  • CIO
  • Head of Information Security
  • Head of IT
  • DSI


  • Gain insights from renowned global cybersecurity experts
  • Network with industry peers and thought leaders to understand the key innovations and adoption of security strategies
  • High-Octane idea exchanging and networking platform
  • 450+ attendees
  • Meet cybersecurity solution providers to gain practical insights into latest digital developments
  • Hear real world experiences from end users sharing success stories


Africa Cyber-Safe Symposium, 27th May 2024
Fortifying Cybersecurity & performance: Insights and Strategies for Resilience

11:00 – 12:30:

12:40 – 13:00:

  • H.E. Abdellatif Loudiyi, Minister Delegate to the Head of Government in charge of the National Defense Administration, Morocco.
  • H.E. Dr. Mrs. Ghita Mezzour, Minister in charge of Digital Transition and Administration Reform.
  • H.E. Abdellatif Miraoui, Minister of Higher Education, Scientific Research and Innovation.

13:00 – 13:20:

Explore recent attacks, drawing insights from their impact and challenges. Analyze their consequences and identify best practices to enhance resilience against cyber threats in today’s environments. Participants will gain valuable insights into cybersecurity challenges and explore effective strategies for protecting critical infrastructures and sensitive data.
  • Brigadier General El Mostafa RABII, Vice President of ANCA.

13:20 – 13:30:

  • Jeff Wang, Deputy Director of Global Cybersecurity and Privacy Protection Office, Huawei.

13:30 – 14:00:

In the context of geopolitical conflicts, concerns about breaches of personal and sensitive data can significantly hinder a country’s embrace of cloud technology, potentially disrupting services to citizens and hindering global connectivity. However, the concept of sovereign clouds presents a promising solution by maintaining the advantages of cloud computing while effectively mitigating associated risks. Governments are increasingly acknowledging the critical role of data security as a fundamental component of their national defense strategies. They recognize that sovereign cloud solutions offer enhanced control over data localization, compliance, and security measures tailored to meet national standards and requirements.
  • Major General Eng. Mohammad Boarki, President, Kuwait National Cyber Security Center.
  • H.E. Dr Mohammed Al Kuwaiti, President, UAE Cyber Security Council.
  • Eng. Mr. Badar Ali Al Salehi, Director General, Oman National CERT, Chairman of OIC National Cybersecurity Centers Head of ITU Regional Cybersecurity Center.
  • Hadi Anwar Head of CPX.
  • Brigadier General El Mostafa RABII, Vice President of ANCA.
  • Moderator : Swapna.

14:00 – 14:30:

This keynote addresses the critical task of safeguarding major events through robust security measures, with a particular focus on cloud-based solutions. Exploring strategies to mitigate risks and ensure the safety of participants, it delves into the role of cloud technology, collaboration, and preparedness. Attendees will gain insights into best practices and innovative approaches aimed at securing large-scale gatherings effectively, fostering resilience in the face of evolving security challenges.
  • Chancard kanga, Territory Leader, HCL.
  • Predrag Petrovic, Palo Alto Networks.
  • Abdallah ZABIAN, DXC
  • Ali EL AZZOUZI, Dataprotect.
  • Khalil Nossair, Director of Assistance, Audit, Training, Control and Expertise, DGSSI.
  • Moderator: Tarek Abbas, Palo Alto Networks

14:30 – 15:00:

Delving into the advancement of cybersecurity standards, this session focuses on frameworks such as PCI DSS and industry guidelines. It explores the evolving landscape of cybersecurity regulations and best practices, offering insights into the latest updates and developments. Through practical examples and case studies, the presentation highlights the importance of adherence to these standards in protecting against cyber threats. Participants will leave equipped with actionable strategies to enhance their organization’s cybersecurity posture and ensure compliance with industry regulations.
  • Abhishek, Cisco
  • Francis, Gitlab.
  • Aly Sabry, Cisco.
  • Nitin Bhatnagar, PCI Security Standards Council.
  • Babacar Wagne, Cisco.
  • Asmae Elmorabit, HPS.
  • Moderator : Sofia Lahmidi, Techso Group

15:00 – 15:20:

Explores critical aspects of secure coding and software development practices. It delves into methodologies, techniques, and tools essential for ensuring software resilience and integrity. By examining industry standards and effective coding strategies, developers are equipped with knowledge and skills to mitigate vulnerabilities and protect against cyber threats throughout the software development lifecycle.
  • Colm Murphy (Huawei)

15:20 – 15:40:

15:40 – 16:00:

Delve into the intricate landscape of banking fraud within the African banking sector. Gain firsthand insights and practical strategies derived from real-world experiences, empowering individuals to navigate and mitigate fraudulent activities effectively. From understanding emerging trends to implementing robust solutions, this session offers essential tips and knowledge for success in combatting banking fraud.
  • Ali El Azzouzi, Dataprotect.

16:00 – 16:30:

Discover the essential role of AI for CIOs and CISOs. Uncover AI-boosted attackers, AI’s advantages in simplifying cybersecurity solution administration, and the effectiveness of Precision AI integration. See firsthand how AI revolutionizes defense against threats, enhances operational efficiency, and facilitates robust cybersecurity structures, guiding organizations towards a digitally secure future.
  • Wassem Youssef, Palo Alto Networks.
  • Raphael Marichez, Palo Alto Networks.

16:30 – 16:50:

In an era where networks are growing in complexity and management costs are escalating, the demand for enhanced digital service quality from users and customers is soaring. This keynote session delves into the imperative need for solutions that not only optimize network management efficiency but also simplify operations, all while ensuring a seamless quality of experience. Discover how AI-driven performance assurance and predictive analytics, characterized by real-time responsiveness, service-centricity, and integration across various network layers and domains, serve as pillars for resilient network and service delivery.
  • Gerhard Auer, Cisco.

17:10 – 17:30:

Although vulnerabilities pose significant risks to systems and applications, there is a positive side. By integrating security measures during the design phase, robust protection against potential vulnerabilities can be ensured. Additionally, the content will delve into recommended strategies for effective vulnerability management, shedding light on industry best practices and standards.
  • Rafal Jaczynski, Senior Director, European Cyber Security and Privacy Protection, Huawei.

17:30 – 17:50:

Moving from awareness to action is crucial for scaling security teams to effectively tackle cyber threats. This transition requires going beyond merely acknowledging potential risks and taking proactive steps. Providing teams with adequate resources and training cultivates a culture of vigilance, enabling organizations to swiftly respond to emerging threats. By empowering teams in this manner, organizations strengthen their ability to protect against evolving cybersecurity challenges.
  • Amal Ziouani, Dataprotect.

17:50 – 18:10:

This keynote presentation provides a comprehensive exploration of the vital importance of adopting a business-driven approach to security. It underscores the significance of proactive strategies and risk mitigation techniques in fortifying organizations against potential threats while enhancing operational effectiveness. Attendees will benefit from tailored insights and practical guidance, equipping them to align security initiatives with business goals, thus fostering greater resilience and success.
  • Abishek Kumar, Cisco.

18:10 – 18:30:

Due to AI-driven efficiencies, incidents now progress rapidly from breach to attackers’ objectives within 24 hours. Manually integrating security sensors proves impractical and fails to align with cost-saving strategies. Regulatory scrutiny of cybersecurity response capability intensifies. Mere consolidation of solutions lacks efficacy without leveraging AI for real-time telemetry data processing. An AI-enabled platform facilitates autonomous incident response, empowering SOC activities to surpass adversaries.
  • Raphael Marichez, Palo Alto Networks.

18:30 – 18:50:

This collaborative effort involves various stakeholders, including organizations, governmental entities, and cybersecurity communities. The primary objective is to enhance the collective capacity for detecting and responding to cyber threats. By fostering an environment conducive to information exchange, the overarching goal is to strengthen defenses against the ever-evolving landscape of modern cyber threats.
  • Othmane Menouar, Techso Group.

19:30 – 20:30:

Africa Security Day 28th May 2024
Security by Design 28th May 2024

Africa Security Day 28,th May 2024

12:40 – 13:00:

13:00 – 13:30:

Explores the creation of standards and guidelines to tackle diverse cybersecurity domains such as network and information security, risk management, cybersecurity frameworks, and management systems. Also, focuses on handling emerging technologies and threats like IoT, cloud computing, and artificial intelligence security.

13:30 – 13:50:

Explore the strategic dimensions of cybersecurity, examining essential frameworks, threat evaluations, and proactive defense tactics. Discover insights into emerging threats, regulatory adherence, and the significance of innovative solutions in protecting digital assets. This presentation provides practical strategies for enhancing cybersecurity resilience, managing risks effectively, and staying abreast of evolving security challenges.

13:50 – 14:10:

Explore the concept of digital sovereignty in the ever-evolving technology era. Delve into the implications of asserting control over digital infrastructure and data governance to protect national interests and promote autonomy. Discover strategies to navigate the complex landscape of digital globalization while safeguarding sovereignty. Gain insights into leveraging technology to empower nations in shaping their digital futures while preserving sovereignty in the digital age.

14:10 – 14:40:

The keynote delves into the cybersecurity governance landscape across African nations, exploring strategic approaches, policies, regulations, capacity building, and compliance frameworks. It offers valuable insights into the region’s journey, highlighting key challenges and successes in fostering cybersecurity resilience. Attendees gain a comprehensive understanding of the evolving governance frameworks shaping cybersecurity initiatives, empowering them with actionable strategies to navigate the complex cybersecurity landscape effectively.

14:40 – 15:00:

Explore the integration of Zero Trust principles and compliance frameworks. This session elucidates strategies to enhance security postures through continuous monitoring, access controls, and compliance automation. Attendees gain insights into proactive risk mitigation and regulatory adherence, empowering them to architect resilient systems that withstand evolving threats while ensuring regulatory compliance.

15:00 – 15:20:

15:20 – 15:40:

Mobile device security is critical in protecting smartphones, tablets, and other portable devices from a multitude of cyber threats. It involves implementing robust security measures such as encryption, biometric authentication, and mobile device management (MDM) solutions to prevent unauthorized access, data breaches, and malware infections. Threats to mobile device security include phishing attacks, insecure Wi-Fi networks, and malicious apps. By prioritizing mobile device security, organizations can safeguard sensitive data, ensure user privacy, and maintain the integrity of their digital infrastructure in an increasingly mobile-centric world.

15:40 – 16:10:

In the cybersecurity landscape of telecommunications, compliance is paramount for ensuring data protection, network integrity, and consumer trust. Navigating complex regulatory frameworks demands a proactive approach, integrating policies, automated monitoring tools, and employee training. Compliance not only mitigates risks but also unlocks market opportunities and fosters innovation. By prioritizing and implementing robust compliance strategies, industry professionals fortify their defenses and thrive in the dynamic cybersecurity landscape.

16:10 – 16:30:

Explore the imperative of safeguarding AI usage in today’s intelligent landscape. This keynote illuminates essential strategies for ensuring responsible and secure deployment of AI technologies. Led by industry pioneers, the session highlights proactive measures such as ethical guidelines, transparency, and robust cybersecurity protocols. Through insightful narratives and actionable insights, attendees gain a comprehensive understanding of AI governance, empowering them to navigate the complexities of the intelligent world with confidence and integrity.

16:30 – 16:50:

Explore the critical realm of Supply Chain Security Practice in a keynote speech. Delivered at the onset of an event or conference, it illuminates strategies to safeguard the integrity and resilience of supply chains. Addressing risks like cyber threats and geopolitical tensions, the speech underscores the importance of supplier due diligence, information security, and contingency planning. Through insightful narratives and expert analysis, it fosters a culture of proactive risk management and regulatory compliance.

16:50 – 17:10:

17:10 – 17:40:

Delve into cutting-edge technologies, policies, and collaborative approaches essential for mitigating cyber threats and ensuring robust digital security infrastructure across the continent. Gain insights into emerging trends and best practices shaping Africa’s cybersecurity landscape, empowering stakeholders to drive forward the region’s digital transformation.

17:40 – 18:00:

Discover the intricacies of a resilient Cloud Security Framework in this illuminating keynote presentation. Uncover essential strategies for safeguarding data and infrastructure within cloud environments, including encryption, access controls, and threat detection. Led by industry luminaries, this session emphasizes the significance of proactive security measures and regulatory compliance. Through compelling narratives and actionable insights, attendees will gain a comprehensive understanding of cloud security best practices, empowering them to navigate complex security landscapes effectively.

18:10 – 19:00:

19:00 – 20:00:

Security by Design, 28th May 2024

12:40 – 13:00:

  • Mr. Mohammed Drissi Melyani: General Manager of the Digital Development Agency, President of CAITA, ADD
  • Mr. Khalil Nossair Director of Assistance, Audit, Training, Control and Expertise, DGSSI

13:00 – 13:20:

Cybersecurity skills are crucial for developing competent defense teams capable of protecting organizations from evolving cyber threats. These skills encompass a range of technical competencies, including network security, cryptography, incident response, and ethical hacking, as well as soft skills such as communication, problem-solving, and collaboration. Strengthening cybersecurity skills is vital for building resilient defense teams and safeguarding against the increasingly complex cyber landscape.
  • Kashifu Inuwa Abdullahi, Director General National Information Technology Development Agency of Nigeria

13:20 – 13:40:

Explore insights gleaned from software development audits across both public and private sectors in this keynote address. Delve into case studies, best practices, and strategies for enhancing software quality and compliance within diverse organizational contexts.
  • Mr. Imad Abdessadki (Dataprotect).

13:40 – 14:00:

Securing your organization is hard. A compromise is almost inevitable. But there are some things that you can do to make yourself a harder target and to help you recover when you do suffer a compromise. In this keynote we’ll explore key concepts and principles to help you improve your cyber resilience. We’ll discuss key business, regulatory and technology shifts that provide both opportunities and threats to your organization and share some tangible foundational steps that you can implement to make your organization more secure.
  • Shaun Cooney, Cisco, Splunk

14:00 – 14:20:

Explores critical aspects of secure coding and software development practices. It delves into methodologies, techniques, and tools essential for ensuring software resilience and integrity. By examining industry standards and effective coding strategies, developers are equipped with knowledge and skills to mitigate vulnerabilities and protect against cyber threats throughout the software development lifecycle.
  • Mr. Francis Ofungwu, Gitlab

14:20 14:50:

This talk will delve into the practical strategies, tools, and technologies employed by GitLab to reinforce security across its software development lifecycle. Attendees will gain insights into actionable best practices for enhancing supply chain security and implementing a zero-trust architecture within their own organizations. By leveraging the lessons learned from GitLab’s security journey, attendees will be empowered to bolster their defenses and navigate the evolving threat landscape with confidence.
  • Philippe Lafoucrière, Gitlab
  • Vitor Meireles De Sousa, Gitlab

14:50 – 15:10:

15:10 15:40:

Discover the proactive dimension of cybersecurity, emphasizing the crucial role of anticipating and preventing cyber threats before they arise, in contrast to reactive methods. Acquire valuable knowledge about preemptive strategies designed to strengthen digital environments and remain ahead of evolving risks. Join us as we delve into the proactive approach as a fundamental aspect of effective cybersecurity, guaranteeing resilience in the face of a continually shifting threat landscape.
  • Imane Bachane, Groupe CBI
  • Zanga Ouattara, Groupe CBI
  • Cd. El Maataoui, DGSSI

15:40 16:00:

Exploring the integration of GenAI by developers, encompassing code generation from functional specifications, testing, documentation, and more, unveils a realm where security risks intertwine with technological advancements. While GenAI has revolutionized daily life, its implementation poses inherent security vulnerabilities. Safeguarding companies and customers necessitates proactive measures. Balancing security with innovation requires robust encryption protocols, continuous monitoring for anomalies, and comprehensive employee training on cybersecurity best practices. Such initiatives are crucial for fostering a secure environment without hindering GenAI adoption.

  • Abdallah ZABIAN, DXC

16:00 16:20:

This session will explore the dynamic global cybersecurity threat landscape, with a particular focus on Africa, highlighting the unique challenges faced by this emerging markets. We will discuss the impact of cyber threats and emphasize the important measures that can be taken to foster cyber resilience.
  • Sebastian Perez, Cisco, Talos

16:20 16:40:

Discover innovative strategies and best practices for bolstering cloud security in the digital era throughout this keynote session. Gain valuable insights into strengthening defenses against evolving cyber threats and safeguarding your digital infrastructure. Essential for professionals navigating the intricate landscape of modern cybersecurity.
  • Chancard kanga, HCL

16:40 17:00:

Explore advanced strategies and best practices for strengthening cloud security in the digital age throughout this talk. Acquire valuable insights into fortifying defenses against evolving cyber threats and safeguarding your digital infrastructure.
  • Taha El Majidi, Spectrum Group

17:00 – 17:20:

17:20 17:50:

Uncover prevalent threats in software development and learn proactive strategies to safeguard against them. Explore common vulnerabilities such as injection attacks, cross-site scripting, and insecure authentication. Discover effective mitigation techniques, including code reviews, input validation, and security testing. Equip your team with the knowledge and tools to fortify applications, ensuring a robust defense against cyber threats throughout the development lifecycle.
  • Philippe Lafoucrière, Gitlab
  • Shaun Cooney, Cisco, Splunk

17:50 18:10:

Discover essential security practices within the realm of software development during this keynote session. Delve into crucial strategies and methodologies aimed at safeguarding software systems against potential threats and vulnerabilities. Gain insights into industry-leading approaches and practical recommendations to enhance the security posture of your software projects.
  • Haisam Ghaly, Palo Alto Group

18:10 18:30:

Dive into the ever-evolving challenges posed by cyber threats and the significant deficit in skilled professionals. Uncover and implement actionable strategies aimed at bridging these gaps, thereby fortifying defences against a myriad of cyber-attacks. Let’s pave the way for a notably more secure digital terrain, ensuring the interests of all stakeholders involved.
  • Yasir Elkabbany, Senior Regional Director, Middle East, Noth Africa and Levant, CompTIA

18:30 – 18:40:

18:40 – 19:20:

19:20 – 20:20:

DGSSI Cybersecurity Dark Stage
Thursday, 30 May 2024

10:00 – 10:20:

Leveraging AI in a Hacking Scenario
  • Abdul Rahman Abdul Hamid, Chief Information Security officer, AICS-Dubai
  • 10:20 – 11:00:

    Investigating Collaborative Strategies for Cybersecurity in Africa: Examining collaborations between cybersecurity authorities and additional regional alliances to strengthen security capabilities and resilience throughout the continent
    • Dr. Albert Antwi-Boasiako Director-general of Cyber Security Authority, Ghana, Director Of ANCA
    • Kashifu Inuwa Abdullahi, Director General National Information Technology Development Agency of Nigeria
    • Col (Dr.) James J Kimuyu, National Computer And Cybercrime Coordination Committee, NC4 Kenya
    • Lourino Alberto Chemane, Chairman of the Board at INTIC in Mozambique.
    • Victor Abu Sesay, Director Ecosystem and Capability Development National Cybersecurity Coordination Center (NC3), Sierra Leone. Cybersecurity Center.
    • Moderator: Gillian Makamara, Project Officer, International Telecommunication Union.

    11:00 – 11:30:

    The debate between securing national data and ensuring cloud sovereignty revolves around balancing data protection and regulatory control. Securing national data emphasizes safeguarding sensitive information within a country’s borders, while cloud sovereignty focuses on maintaining control and jurisdiction over data stored in cloud environments, often in compliance with local regulations and policies.
    • Brigadier General El Mostafa RABII, Vice President of ANCA.
    • Eng. Mr. Badar Ali AlSalehi, Director General, Oman National CERT, Chairman of OIC National Cybersecurity Centers Head of ITU Regional.
    • Major General Eng. Mohammad Boarki, President, Kuwait National Cyber Security Center.
    • Moderator: Swapna.

    11:30 – 11:50:

    Explore the strategic roadmap for “Moroccan National Cyber Security 2030”, examining the axes and priorities of the regulatory framework developed to protect the country’s digital infrastructure. From proactive threat detection to incident response strategies, delve into the details of preventive and reactive measures essential to ensuring the security of Morocco’s computer systems.
    • Speaker : Saad Lkhadiri, Director of Strategy and Regulation, DGSSI.

    11:50 – 12:20:

    Delving into the complexities of safeguarding critical infrastructure involves exploring the protection of vital systems and services against cyber threats. Insights from regulatory authorities and technology vendors converge to provide comprehensive strategies for fortifying resilience in today’s dynamic cybersecurity landscape. This discussion unravels the intricacies of securing critical infrastructure in an ever-evolving digital environment.regulations and policies.
    • Khalil Nossair, Director of Assistance, Audit, Training, Control and Expertise, DGSSI
    • Babacar Wagne, Cisco.
    • Karim Aboulasse, country manager Palo Alto Network
    • Moderator: Francois CHANCARD KANGA.

    12:20 – 12:40:

    Explore the tactics employed to tackle fraudulent activities within telecommunications networks. Acquire valuable insights into real-time monitoring, anomaly detection, authentication techniques, and customer education campaigns. Learn how these proactive measures strengthen network security, guaranteeing the safety of both telecom providers and their customers.
    • Mefthe Aynalem, Senior Director of cybersecurity in Huawei Ethiopia office.

    12:40 – 13:00:

    Dive into the evolving realm of Cybercrime as a Service (CaaS), where nefarious entities peddle hacking tools and services through covert dark web platforms. Learn how organizations can fortify their defenses against this threat by implementing robust defense strategies, leveraging comprehensive threat intelligence, continuous monitoring, and resilient incident response tactics. Discover how these measures safeguard critical assets and preserve data integrity in the face of CaaS-driven cyber threats.
    • Keyser Tabi, Dataprotect.

    13:00 – 14:00:

    14:00 – 14:20:

    Description : As data becomes increasingly crucial, organizations encounter fresh hurdles in tackling cybercrime. With the ascent of AI and the emergence of sophisticated threats, transitioning from conventional User Behavior Analytics (UBA) to advanced ML/AI models is imperative. These models reveal previously undetected correlations, enabling organizations to pinpoint unknown threats and fortify their cybersecurity measures. Join us to delve into this pivotal subject and uncover strategies for maintaining an edge in the cybersecurity landscape.
    • Abdallah ZABIAN, DXC.

    14:20 – 14:40:

    Explore the Transformative Power of Platforms in SecOps: Uncover the vital role that platforms play in managing the intricacies of cybersecurity. Explore how these platforms reshape Security Operations (SecOps), streamlining processes and bolstering threat detection and response capabilities. Gain valuable insights into the evolving cybersecurity landscape and discover effective strategies for leveraging platforms to safeguard digital assets and infrastructure.
    • Francis Ofungwu, Field CISO, Gitlab.
    • Madou Coulibaly, Solutions Architect, Gitlab.

    14:40 – 15:20:

    Diving into regulatory requirements and compliance standards is crucial for cybersecurity authorities and solution providers. Active participation ensures alignment with regional regulations, fostering trust and security in digital ecosystems. It also facilitates effective collaboration and innovation within the cybersecurity domain.
    • Col. El Maataoui, DGSSI, Morocco.
    • Gbota GWALIBA, Directeur Général de l’Agence Nationale de la Cybersécurité, Togo.
    • Ait Kaddour Youssef, Head of Cybersecurity of Huawei Morocco.
    • Moderator: Vladimir Aman, Head of CE-CERT, Ivory Coast.

    15:20 – 15:40:

    Explore the emerging risks posed by artificial intelligence (AI) and machine learning (ML) in cybersecurity. Understand how these technologies can be exploited by threat actors to launch sophisticated attacks. Discover strategies for mitigating AI and ML threats, including enhanced monitoring, robust authentication, and leveraging AI-driven defense mechanisms to safeguard digital assets and infrastructure
    • Chancard kanga, Territory Leader, HCL.

    15:40 – 16:00:

    Dive into the realm of Post-Quantum Encryption, essential for safeguarding data in the era of quantum computing. It provides a robust defense against potential vulnerabilities posed by quantum computing, ensuring data security amidst rapidly evolving technology. By exploring this field, we strengthen our defenses against emerging threats and maintain data integrity in the digital era.
    • Said Dahmani, DGSSI.

    16:00 – 16:40:

    Navigating cybersecurity challenges involves addressing the trilogy of threats, technology, and resources. In this keynote panel, esteemed leaders will discuss strategies for effectively managing cyber threats in the evolving international digital landscape. From identifying emerging threats to leveraging technology and optimizing resources, the discussion aims to provide actionable solutions for safeguarding organizations against cyber risks
    • Abu Dhabi Commercial Bank, Mohamed Fakhry.
    • Mabruk-oil Lybia, Abeer Abuzgaia.
    • Yassine Moudatir, Sanlam.
    • Moderator: Palo Alto Networks (Wassem Youssef).

    16:40 – 17:00:

    Explore the delicate balance between the advancements of Industry 4.0 and the pressing need for robust cybersecurity measures with this keynote. It delves into the symbiotic relationship between automation, the Internet of Things, artificial intelligence, and cybersecurity, shedding light on how organizations can effectively leverage Industry 4.0 technologies while mitigating cyber risks. Through the examination of case studies, acquire actionable insights to fortify digital infrastructure and securely advance Industry 4.0 initiatives into the future.
    • Tamer Hamed, CIO, Dubai Cables, United Arab Emirates

    For more information please submit your query via the form below

        Contact Us

        QNA MARCOM

        QNA Marcom, serves to be a vibrant global marketing agency offering holistic one-stop-shop marketing solutions. Our expertise spans impactful event orchestration, lead generation, digital marketing, content, research, exhibition services, B2B conferences and growth engineering. Having hosted over 150+ B2B conferences, summits, and roadshows in partnership with government authorities across India, APAC, Middle East, and Africa, we have established ourselves as a trusted name in the events industry.
        This extensive experience ensures excellence and success in every endeavor we undertake, making QNA Marcom a preferred choice for businesses seeking comprehensive marketing and event solutions.

        Locate Us: QNA Marcom, 15 Avenue Al abtal appart 4 Agdal, Rabat, Morocco
        Scroll to Top