Grosvenor House, a Luxury Collection Hotel, Dubai, United Arab Emirates

Sponsors – 5th CISO 360 Middle East 2024

To find out about Sponsorship opportunities for the 5th CISO 360 Middle East or to book a meeting with us please contact: sponsorship@pulseconferences.com

Many thanks to our  2024 Sponsors

Platinum Protector

RiskRecon, a Mastercard Company, enables you to easily achieve better risk outcomes for your enterprise and your supply chain. RiskRecon’s cybersecurity ratings and assessments make it easy for you to understand and act on your risks, delivering accurate, risk-prioritized action plans custom-tuned to match your risk priorities.

RiskRecon traces its beginnings to 2011 when our founder, Kelly White, asked himself, “Is it possible to measure the security program quality of any company simply by looking its Internet-facing presence?”

Kelly is a long-time information security practitioner and bank CISO who witnessed first-hand the need for adapting third-party risk controls to meet the new challenges resulting from decentralized IT and SaaS apps. He has many years of hands-on experiencing building big data and analytics solutions to detect fraud and security vulnerabilities in high-velocity transaction environments.

Like most organizations at the time, his bank’s third-party risk management assessments relied heavily on questionnaires and other vendor attestations. This approach worked well ten years ago with a small number of large vendors, mostly in-house deployments, purchases controlled by central IT, and a well-defined set of Internet vulnerabilities. With the decentralization of IT purchasing and rapid adoption of SaaS, this approach was becoming less effective and more resource-intensive.

What if instead of trying to use the “old” risk management model, his institution could trust an objective source that automatically pinpointed specific gaps in any organization’s security programs and performance? Questionnaires and surveys are helpful in evaluating one’s intent but provide little verifiable insight into actual practices and discipline.

After realizing there were no such solution available, he decided to build his own. After testing and validating his solution with many peers, Kelly decided to pursue the idea full time and founded RiskRecon, officially incorporating in October of 2015.

RiskRecon is headquartered in Salt Lake City, UT with a presence in Boston, MA and representatives around the world.

www.riskrecon.com

Emerald Enforcer

Nozomi Networks protects the world’s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience.

www.nozominetworks.com

 

Supporting Organisations – 5th CISO 360 Middle East 2024

Are you part of a cybersecurity community? Find out about mutual promotional opportunities for the 5th CISO 360 Middle East, or to book a meeting with us please contact: teampulse@pulseconferences.com.

(ISC)2 UAE Chapter  

Connect | Educate | Inspire | Secure

Encourage educational and networking opportunities to promote the exchange of ideas, knowledge, and member’s growth within the information security profession in UAE.

Promote adequate communication to keep members abreast of current events in information security by conducting workshops and seminars.

Visit www.isc2.org

The ‘Women in Cyber Security Middle East’ group was formed to promote and increase women participation in the field of cyber security. It is a voluntary group and has a vision to

Build a strong, dependable, and increasing network of passionate female cyber security professionals in the Middle East and African countries.

Increase women in the field of cyber security in the region and encourage more female leadership in cyber security.

For more information, visit: www.womenincybersecurity.me

The UAE Chapter was formed on 25th June 1997 and is the 150th Chapter of growing International organization. UAE Chapter serves the members from all the emirates of UAE namely Abu Dhabi, Dubai, Sharjah, Ajman, Umm Al Quwain, Ras Al Khaimah and Fujairah. ISACA® UAE Chapter has become one of the most active and successful chapters by hosting meetings, seminars, conferences and workshops for promotion and propagation of Information Technology Governance, Information Systems (IS) Audit, IS Security and IS Control in UAE. The ISACA® UAE Chapter has been conducting classes for candidates appearing for ISACA®s prestigious Certifications namely Certified Information Systems Auditor (CISA®), Certified Information Security Manager (CISM®), Certified in Governance of Enterprise IT (CGEIT), Certified in Risk and Information Systems Control (CRISC) examinations. The chapter also hosts regular meetings and seminars in Abu Dhabi & Dubai designed for both GRC, Cyber Security, Assurance and Audit professionals.

www.engage.isaca.org/uaechapter/aboutchapter/about

The Cybersecurity Advisors Network (CyAN) is a multidisciplinary and international network of cybersecurity advisors.

Established in 2015, CyAN enables its members to access the expertise of its community, participate in projects and events organised by partner institutions, and develop their own projects to contribute to a safer digital world. Cybersecurity, ethical hacking, privacy, capacity building, content regulation (Trust & Safety), and mental resilience are among the key themes of the organisation.

The ISF is a leading authority on information security and risk management. A not-for-profit organisation, we provide independent opinion and guidance on all aspects of information security. We deliver practical solutions to overcome the wide-ranging information security and risk management challenges that impact business.

For more information, visit: www.securityforum.org

Back to Pulse Conferences

You currently have JavaScript disabled!

This site requires JavaScript to be enabled. Some functions of the site may not be usable or the site may not look correct until you enable JavaScript. You can enable JavaScript by following this tutorial. Once JavaScript is enabled, this message will be removed.