13:00 – 13:50 :
14:00 – 14:20 :
  • H.E. Abdellatif Loudiyi, Minister Delegate to the Head of Government in charge of the National Defense Administration, Morocco
  • H.E. Mr Abdellatif Miraoui, Minister of Higher Education, Scientific Research and Innovation
  • Ghita Mezzour, Minister in charge of Digital Transition and Administration Reform

14:20 – 14:40 :

Explore recent attacks, drawing insights from their impact and challenges. Analyze their consequences and identify best practices to enhance resilience against cyber threats in today’s environments. Participants will gain valuable insights into cybersecurity challenges and explore effective strategies for protecting critical infrastructures and sensitive data.

  • Brigadier General El Mostafa RABII, Vice President of ANCA.

14:50 – 15:20 :

Explores the creation of standards and guidelines to tackle diverse cybersecurity domains such as network and information security, risk management, cybersecurity frameworks, and management systems. Also, focuses on handling emerging technologies and threats like IoT, cloud computing, and artificial intelligence security.

  • H.E. Shaikh Salman bin Mohammed Al-Khalifa, CEO of the National Cyber Security Centre (NCSC) of Bahrain
  • Major General Eng. Mohammad Boarki, President, Kuwait National Cyber Security Center
  • Engg. Bassam Maharmeh, CEO of National cybersecurity Center, Jordan
  • Dr. Ahmed Ali Abdel-Hafez, Vice President for Cyber Security Affairs, National Telecommunication Regulatory Authority, Egypt
  • Arnold Mangeni, Director of Information Security, National Information Technology Authority – Uganda.
  • Dr. Vincent Ngundi, Acting Director of Cyber Security and Head of the National Cybersecurity Centre at the Communications Authority of Kenya
  • Kwadwo Osafo-Maafo, Head of Cyber Security Division and Chief Information Security Officer (CISO), NCA, Ghana
  • Moderator: Swapna

15:20 – 15:40 :

Cybersecurity skills are crucial for developing competent defense teams capable of protecting organizations from evolving cyber threats. These skills encompass a range of technical competencies, including network security, cryptography, incident response, and ethical hacking, as well as soft skills such as communication, problem-solving, and collaboration. Strengthening cybersecurity skills is vital for building resilient defense teams and safeguarding against the increasingly complex cyber landscape.

  • Kashifu Inuwa Abdullahi, Director General National Information Technology Development Agency of Nigeria

15:40 – 16:00 :

Although vulnerabilities pose significant risks to systems and applications, there is a positive side. By integrating security measures during the design phase, robust protection against potential vulnerabilities can be ensured. Additionally, the content will delve into recommended strategies for effective vulnerability management, shedding light on industry best practices and standards.

  • Jeremy Thompson (Huawei)

16:00 – 16:20 :

16:20 – 16:40 :

This collaborative effort involves various stakeholders, including organizations, governmental entities, and cybersecurity communities. The primary objective is to enhance the collective capacity for detecting and responding to cyber threats. By fostering an environment conducive to information exchange, the overarching goal is to strengthen defenses against the ever-evolving landscape of modern cyber threats.

  • TBD

16:40 – 17:00 :

Protecting against manipulative tactics necessitates a deep understanding of social engineering’s deceptive strategies. This approach involves educating individuals on recognizing and thwarting social engineering ploys aimed at exploiting human psychology. By cultivating awareness and vigilance, organizations can fortify their defenses against various forms of manipulation, such as phishing attacks and pretexting. Proactive measures, coupled with robust cybersecurity protocols, empower individuals to navigate social engineering attempts and safeguard sensitive information from unauthorized access or compromise.

  • TBD

17:00 – 17:20 :

Analyzing the complex cybersecurity landscape entails recognizing the profound influence of integrating artificial intelligence (AI). While AI offers transformative potential, its integration also introduces new vulnerabilities, broadening the spectrum of cyber threats. This discussion explores the convergence of AI and cybersecurity, examining emerging risks and vulnerabilities. Through strategic insights, stakeholders are empowered with proactive measures to defend against evolving cyber threats in the AI era.

  • LOUZHIQIANG (Louis) (Huawei)

17:20 – 17:40 :

The exploration of security orchestration to enhance the effectiveness of cyber defense is paramount in today’s digital landscape. This approach entails optimizing cybersecurity operations by incorporating automated workflows and responses. By streamlining processes and centralizing control, organizations can swiftly and effectively respond to cyber threats and incidents. This proactive strategy enables early detection of threats, rapid incident resolution, and ultimately strengthens the overall security posture. Through careful orchestration, businesses can better protect their digital assets and maintain resilience in the face of evolving cyber risks.

  • Krystie Paine (Cisco Splunk)

17:40 – 18:00 :

This approach utilizes Dark Web surveillance as a proactive security measure to identify and mitigate hidden threats before they materialize. By monitoring illicit online activities, organizations can anticipate potential security breaches, safeguard sensitive data, and protect against cyberattacks. This approach not only strengthens cybersecurity posture but also enhances overall risk management strategies, enabling businesses to stay resilient in the face of evolving threats lurking in the depths of the Dark Web.

  • Martin Lee (Cisco Talos)

18:00 – 18:20 :

Enhancing blockchain security is paramount in safeguarding digital assets against emerging threats. By implementing robust encryption protocols and decentralized consensus mechanisms, vulnerabilities can be mitigated, ensuring the integrity and confidentiality of transactions. Moreover, continuous monitoring and auditing practices bolster resilience, providing stakeholders with confidence in the reliability of blockchain networks. Proactive measures are essential to fortify security measures and foster trust in digital asset management.

  • TBD

18:20 – 18:40 :

Delve into the intricate landscape of banking fraud within the African banking sector. Gain firsthand insights and practical strategies derived from real-world experiences, empowering individuals to navigate and mitigate fraudulent activities effectively. From understanding emerging trends to implementing robust solutions, this session offers essential tips and knowledge for success in combatting banking fraud.

  • Ali EL AZZOUZI (DATAPROTECT)

18:40 – 19:00 :

Explores critical aspects of secure coding and software development practices. It delves into methodologies, techniques, and tools essential for ensuring software resilience and integrity. By examining industry standards and effective coding strategies, developers are equipped with knowledge and skills to mitigate vulnerabilities and protect against cyber threats throughout the software development lifecycle.

  • Colm Murphy (Huawei)

19:00 – 19:20 :

Moving from awareness to action is crucial for scaling security teams to effectively tackle cyber threats. This transition requires going beyond merely acknowledging potential risks and taking proactive steps. Providing teams with adequate resources and training cultivates a culture of vigilance, enabling organizations to swiftly respond to emerging threats. By empowering teams in this manner, organizations strengthen their ability to protect against evolving cybersecurity challenges.

  • Colm Murphy (Huawei)

20:15 – 21:00 :

Scroll to Top