Conference Day Two: Thursday, 4 October 2018
8:00 am - 8:45 am REGISTRATION, COFFEE AND NETWORKING
8:50 am - 9:00 am OPENING REMARKS FROM CHAIRMANReserved for - ., Kuwait National Petroleum Company
SECURING AND CONNECTING ORGANISATION INFRASTRUCTURE
9:00 am - 9:30 am EVALUATING THE MONETARY IMPACT OF CYBER CRIMES IN THE ENERGY AND UTILITY SECTORSenior Representative - Sadara Chemical Company, Saudi Arabia
- Addressing the growing concerns of cyber attacks and evaluating the costs
- Understanding the monetary value of breach in systems and the potential value of loss
- Formulating strategies to invest in solutions and defences to avoid future losses
Senior RepresentativeSadara Chemical Company
9:30 am - 10:00 am CONNECTING IT AND OPERATIONS FOR ENHANCING EFFICIENCY AND SMOOTH FLOW
10:00 am - 10:30 am DEPLOYING DATA LOSS PREVENTION: COOKBOOK FOR A SUCCESSFUL DLP IMPLEMENTATIONRafiq A. Khurshid - Data Loss, Leakage Prevention (DLP) Consultant, Saudi Aramco, Saudi Arabia
- Ensuring safety of critical information and minimising the risk of data transfer
- Understanding DLP and the best practices available to ensuring loss prevention
- Monitoring and detecting real time threats and data leakages with advanced systems and practices
Rafiq A. KhurshidData Loss, Leakage Prevention (DLP) Consultant
Saudi Aramco, Saudi Arabia
10:30 am - 11:00 am NETWORKING BREAK
IMPLEMENTATION, INTEGRATION AND THE NEED FOR COLLABORATION
11:00 am - 11:30 am SECURING PLANTS' CRITICAL INTERFACESBader Alkhaldi - Head of NA Data Network Operations Unit, Saudi Aramco, Saudi Arabia
11:30 am - 12:00 pm Cyber Security Strategy for Securing What Matters MostAbdirashid Samater - Cyber Security Advisor, Ministry of Justice, Saudi Arabia
In this presentation and will share common false sense of cyber security, where organizations heavily invest in cyber security but unfortunately end up missing many of the cyber security fundamentals, which allows adversaries come and go undetected.
Abdirashid SamaterCyber Security Advisor
Ministry of Justice, Saudi Arabia
12:00 pm - 12:10 pm NETWORKING BREAK
12:10 pm - 12:30 pm ENTERPRISE ASSET MANAGEMENT (EAM) AS YOUR NEXT BEST SOURCE OF INTEGRATION AND HARMONY
- Evaluating the use of EAM systems for the perfect IT resonance
- How an EAM can not only enhance IT but also OT
- Integrating complex and different tasks and operations to enhance operability
12:30 pm - 12:40 pm IT SERVICE LIFECYCLE MANAGEMENT: CREATING AND DELIVERING A NEW GENERATION OF IT MANAGED SERVICESReserved for - ., Kuwait National Petroleum Company
The following session will feature a series of interactive group discussions set in a round table format.
During this session each group leader will introduce a concept/case study to the participants followed by an interactive discussion and live feedback.
Interactive group discussions are an excellent opportunity to get straight to the point and ask the questions that you want to know the answers to.
The group format also facilitates an excellent opportunity for networking between industry professionals
HUDDLE ONE12:40 pm - 1:20 pm DEVELOPING A CLEAR VALUE PROPOSITION
The huddle leader will discuss why investing in such solutions are important given the market situation and how operators can benefit from such investments. Participants will discuss on the risks and opportunities, digital technology possesses and will share best practices and knowhow on value creation by these solutions.
HUDDLE TWO12:40 pm - 1:20 pm RISKS IN IMPLEMENTING A DIGITAL STRATEGY Amit Kar - IM Advisor, Basrah Gas Company (Royal Dutch Shell)
The huddle leader will raise the risks digital solutions possess and strategies needed to eliminate all possible risks. The participants will share their experiences on the requirements and areas to focus on whilst implementing a digital infrastructure so as to mitigate risks of failure.
Amit KarIM Advisor
Basrah Gas Company (Royal Dutch Shell)
HUDDLE THREE12:40 pm - 1:20 pm CYBER SECURITY: NO MORE A LUXURY, BUT A NECESSITY
One of the biggest challenges in integrating digital solutions is the need for a secure infrastructure to ensure assets, data and operations are not compromised, by internal or external threats and attacks. The huddle leader will share insights and highlight why cyber security is not a luxury anymore but should be one of the main agendas of every organisation.
1:20 pm - 1:30 pm CLOSING REMARKS
1:30 pm - 2:00 pm NETWORKING LUNCH BREAK
2:00 pm - 2:00 pm END OF CONFERENCE
The published programme is correct at time of printing. However, given the seniority of our speakers and the nature of their roles, speakers may subsequently substitute or remove themselves from the programme. This is always regrettable, and we will always try to replace the speaker with a speaker with equivalent insight.