Personal Data Protection System: Data Protection and Business Protection

The lecture addresses the importance of securing personal data and protecting its privacy, focusing on effective strategies to protect sensitive data and ensure compliance with the Personal Data Protection System. It also reviews how to enhance business security by implementing advanced data protection systems, which contributes to enhancing trust with customers and reducing risks.

Cybersecurity Awareness - Challenges and How to Promote Safe Behaviors

In this lecture, we will discuss the importance of cybersecurity awareness and its role in reducing risks within organizations. The challenges facing awareness professionals in bridging the gap between knowledge and safe behaviors will be addressed. We will explore how traditional awareness programs can be developed and transformed into effective security practices that ensure sustainable safe behaviors. The use of multiple techniques such as interactive learning, phishing simulations, and gamification to assess employee behavior and change their security habits for the better will be demonstrated.

Data Classification and Protection

This lecture aims to address the steps of data classification and protection according to the controls and specifications of data management, governance, personal data protection, and cybersecurity controls for data issued by the National Data Management Office and the National Cybersecurity Authority, respectively, in the Kingdom of Saudi Arabia.

GRC Frameworks Implementations & Audits

GRC Frameworks Implementations & Audits GRC Stands for Governance, Risk Management & Compliance and this is a system used by many organizations to meet their statutory, regulatory & organizational requirements . This Keynote will be focusing about the complete life-cycle of GRC , enabling participants to learn that it is indispensable for organization to perform steadily and serve smoothly through implementation of standards/ frameworks by managing all associated risk amicably as per level of risk associated with each of the asset. Furthermore, this session shall cover the following topics as well. • Understanding of better Risk Management & Controls implementation • Automation of GRC activities and its benefits • Provision of internal and external transparency • Clear and defined policies and procedures for related processes of organizations • Reduction in risk across the whole organization including cybersecurity risks, operational risks and business risk

A framework for understanding hack-and-leak operations

This presentation outlines a framework for understanding hack-and-leak operations, arguing that we must rethink the effects of divulging - and fabricating - secret information in an era of ubiquitous digital technologies and severe political crises. It suggests that hack-and-leak operations sit between two paradigms of cybersecurity. The first paradigm focuses on intrusion (unauthorized access to networks), while the second concentrates on influence (the use of digital technologies to illegitimately shape public debate). Analyses generally tackle one of these two aspects: cybersecurity specialists focus on intrusion, setting aside the complexities of the digital public sphere, while media scholars do the opposite, closely analyzing flows of leaked information without considering how it was obtained. This presentation instead argues for conceptualizing hack-and-leak operations as a distinct category of incident combining these two paradigms, with specific implications for cyber policy.