{"id":1687,"date":"2022-12-20T11:19:40","date_gmt":"2022-12-20T11:19:40","guid":{"rendered":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/?page_id=1687"},"modified":"2024-03-08T14:23:20","modified_gmt":"2024-03-08T14:23:20","slug":"why-attend","status":"publish","type":"page","link":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/","title":{"rendered":"Why Attend"},"content":{"rendered":"<p>[vc_row type=&#8221;vc_default&#8221; gap=&#8221;20&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-default&#8221; bg_image_new=&#8221;id^2061|url^https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-content\/uploads\/2024\/03\/3474969.jpg|caption^null|alt^null|title^3474969|description^null&#8221; bg_override=&#8221;ex-full&#8221; enable_overlay=&#8221;enable_overlay_value&#8221; overlay_color=&#8221;rgba(0,0,0,0.18)&#8221; overlay_pattern=&#8221;02.png&#8221; overlay_pattern_attachment=&#8221;fixed&#8221; css=&#8221;.vc_custom_1709885930429{padding-top: 50px !important;padding-bottom: 60px !important;}&#8221; el_id=&#8221;about&#8221;][vc_column css=&#8221;.vc_custom_1621510941945{padding-top: 0px !important;}&#8221;][vc_tta_tabs style=&#8221;outline&#8221; color=&#8221;vista-blue&#8221; active_section=&#8221;1&#8243; el_class=&#8221;tab-area-isaca&#8221;][vc_tta_section title=&#8221;Join Peers&#8221; tab_id=&#8221;1709379414408-1ecaae4a-9e10&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709388238316{padding-top: 10px !important;padding-bottom: 10px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;]<div id=\"ultimate-heading-888169fa5baf3dedb\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-888169fa5baf3dedb uvc-3203 accent-title-color color-title\" data-hspacer=\"no_spacer\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-888169fa5baf3dedb .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;color:#ffffff;margin-bottom:20px;\">Join your fraternity from the security and IT industries to maximise learning, gain insights into industry best practices, brainstorm the latest trends &amp; ideas and consolidate key insights and takeaways.<\/div><\/div>[vc_toggle title=&#8221;CISOs&#8221; style=&#8221;simple&#8221; color=&#8221;green&#8221; size=&#8221;lg&#8221; custom_font_container=&#8221;tag:h4|font_size:18|text_align:left|color:%23ffffff&#8221; custom_use_theme_fonts=&#8221;yes&#8221; use_custom_heading=&#8221;true&#8221; el_class=&#8221;isaca-faq&#8221; css=&#8221;.vc_custom_1709389904257{margin-bottom: 5px !important;}&#8221;]Define strategies for cyber resilience and agility as digital transformation accelerates and the threat landscape becomes more complicated.[\/vc_toggle][vc_toggle title=&#8221;SECURITY EXECUTIVES&#8221; style=&#8221;simple&#8221; color=&#8221;green&#8221; size=&#8221;lg&#8221; custom_font_container=&#8221;tag:h4|font_size:18|text_align:left|color:%23ffffff&#8221; custom_use_theme_fonts=&#8221;yes&#8221; use_custom_heading=&#8221;true&#8221; el_class=&#8221;isaca-faq&#8221; css=&#8221;.vc_custom_1709389961283{margin-bottom: 5px !important;}&#8221;]Formulate security policies that effectively empower your organisation to respond to threats, both new and existing.[\/vc_toggle][vc_toggle title=&#8221;RISK MANAGEMENT LEADERS&#8221; style=&#8221;simple&#8221; color=&#8221;green&#8221; size=&#8221;lg&#8221; custom_font_container=&#8221;tag:h4|font_size:18|text_align:left|color:%23ffffff&#8221; custom_use_theme_fonts=&#8221;yes&#8221; use_custom_heading=&#8221;true&#8221; el_class=&#8221;isaca-faq&#8221; css=&#8221;.vc_custom_1709389989035{margin-bottom: 5px !important;}&#8221;]Develop robust risk management programs that manage risk and align risk appetite with the company\u2019s business interests.[\/vc_toggle][vc_toggle title=&#8221;DATA SECURITY MANAGERS&#8221; style=&#8221;simple&#8221; color=&#8221;green&#8221; size=&#8221;lg&#8221; custom_font_container=&#8221;tag:h4|font_size:18|text_align:left|color:%23ffffff&#8221; custom_use_theme_fonts=&#8221;yes&#8221; use_custom_heading=&#8221;true&#8221; el_class=&#8221;isaca-faq&#8221; css=&#8221;.vc_custom_1709390014848{margin-bottom: 5px !important;}&#8221;]Keep pace with the technology landscape and changing data regulations. Develop new best practices to secure enterprise data and the cloud.[\/vc_toggle][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div id=\"ultimate-video-955669fa5baf3df1f\" class=\"ult-video  ult-adjust-bottom-margin ultimate-video-955669fa5baf3df1f ultv-240 \"><div class=\"ultv-video ultv-aspect-ratio-16_9 ultv-subscribe-responsive-none\" data-videotype=\"uv_iframe\">\n\t\t\t\t\t\t<div class=\"ultv-video__outer-wrap\" data-autoplay=\"0\" data-device=\"false\"  data-iconbg=\"#3A3A3A\" data-overcolor=\"\" data-defaultbg=\"#1f1f1e\" data-defaultplay=\"image\"><div class=\"ultv-video__play\" data-src=\"https:\/\/www.youtube.com\/embed\/MftNgtvmPrI?rel=0&amp;start&amp;end&amp;controls=1&amp;mute=0&amp;modestbranding=0&amp;autoplay=1\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"ultv-video__thumb lazyload\" data-src=\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-content\/uploads\/2024\/03\/ISACA-2023-video-thumb.jpg\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 1000px; --smush-placeholder-aspect-ratio: 1000\/564;\" \/>\n\t\t\t\t\t\t\t\t<div class=\"ultv-video__play-icon  ultv-animation-none\" style=\"width:75px\"><img decoding=\"async\" data-src=\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-content\/uploads\/2024\/03\/play-button-icon-white.png\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" class=\"lazyload\" style=\"--smush-placeholder-width: 200px; --smush-placeholder-aspect-ratio: 200\/200;\" \/><\/div> <\/div> <\/div><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Key Highlights&#8221; tab_id=&#8221;1709379414448-8b0e6196-7783&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709390788209{padding-top: 20px !important;padding-bottom: 20px !important;background-color: rgba(0,0,0,0.42) !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column_inner]<div class=\"standard-arrow list-divider bullet-top\"><ul style=\"color: #ffffff;\">\n<li><strong>Cutting-edge Research:<\/strong> Explore groundbreaking research and developments in cybersecurity, including AI-driven threat detection, blockchain for secure transactions, and quantum-safe cryptography.<\/li>\n<li><strong>Industry Insights:<\/strong> Gain insights from industry leaders on best practices, case studies, and emerging technologies shaping the cybersecurity landscape.<\/li>\n<li><strong>Interactive Panel Discussions:<\/strong> Participate in interactive and engaging panel discussion with leading CISO&#8217;s sharing their immense knowledge covering topics such as governance and risk management, incident response strategies, generative and cognitive role of AI in cyber crime, fighting the new age risks of deep fake and security architecture design.<\/li>\n<li><strong>Networking Opportunities:<\/strong> Connect with cybersecurity professionals, researchers, and enthusiasts from GCC through interactive sessions, panel discussions, and networking events.<\/li>\n<li><strong>Expo Hall:<\/strong> Visit the expo hall to discover the latest cybersecurity products, services, and solutions from leading vendors and startups.<\/li>\n<\/ul>\n<\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Expositors&#8221; tab_id=&#8221;1709392040819-c7232745-6ad4&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709535270944{padding-top: 10px !important;padding-bottom: 10px !important;background-color: rgba(0,0,0,0.42) !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;2261&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div id=\"ultimate-heading-166369fa5baf3e3a3\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-166369fa5baf3e3a3 uvc-2774 accent-title-color color-title\" data-hspacer=\"no_spacer\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-166369fa5baf3e3a3 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;color:#ffffff;margin-bottom:20px;\">Connect with top security solution providers pioneering technology advancements at the upcoming ISACA Infosec and Cyber Security Congress 2024\u00a0 in Dubai and Abu Dhabi, UAE. In an era dominated by technology, it is imperative to be proactive, an early technology adapter \u2014 and the ISACA Infosec and Cyber Security Congress 2024 grants you precisely that. Access cutting-edge vendors driving technological innovation. Seize this exclusive chance to network with industry peers, assess solution providers, and delve into the benefits they offer. Our premier conferences facilitate informed, efficient decision-making to address your organization&#8217;s most vital objectives.<\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Meet Experts&#8221; tab_id=&#8221;1709392543302-fab1d2d8-2f97&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709535451430{padding-top: 10px !important;padding-bottom: 10px !important;background-color: rgba(0,0,0,0.42) !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;2262&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div id=\"ultimate-heading-339169fa5baf3e3c7\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-339169fa5baf3e3c7 uvc-9103 accent-title-color color-title\" data-hspacer=\"no_spacer\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-339169fa5baf3e3c7 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;color:#ffffff;margin-bottom:20px;\">Learn from cybersecurity and risk management leaders as well as engage with ISACA members and leading industry vendors at the upcoming ISACA Infosec and Cyber Security Congress 2024 in Dubai and Abu Dhabi, UAE. Gain insights from top-notch security keynote speakers and industry experts. Our guest keynote speakers, seasoned practitioners, and unbiased industry experts will broaden your perspective and introduce fresh strategies to enhance your business decision-making. Stay tuned for the finalized list of speakers, which will be available soon.<\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; full_width=&#8221;stretch_row&#8221; bg_type=&#8221;video&#8221; video_url=&#8221;https:\/\/904b000694b598abf2a9-801920451bc203c83f441c16862a4158.ssl.cf2.rackcdn.com\/1118760_4k_pattern_numbers_3840x2160.mp4&#8243; video_opts=&#8221;loop,muted&#8221; video_poster=&#8221;id^2134|url^https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-content\/uploads\/2024\/03\/venue-sec-bg.jpg|caption^null|alt^null|title^venue-sec-bg|description^null&#8221; viewport_vdo=&#8221;viewport_play&#8221; bg_override=&#8221;ex-full&#8221; enable_overlay=&#8221;enable_overlay_value&#8221; overlay_color=&#8221;rgba(0,0,0,0.9)&#8221; css=&#8221;.vc_custom_1709636044454{border-top-width: 1px !important;border-top-color: #81d742 !important;border-top-style: solid !important;}&#8221;][vc_column][vc_empty_space][vc_column_text]<div data-post-id=\"1951\" class=\"insert-page insert-page-1951 \"><style type=\"text\/css\" data-type=\"vc_shortcodes-custom-css\">.vc_custom_1683701811284{margin-top: 10px !important;margin-bottom: 30px !important;}.vc_custom_1683701811284{margin-top: 10px !important;margin-bottom: 30px !important;}.vc_custom_1683701811284{margin-top: 10px !important;margin-bottom: 30px !important;}.vc_custom_1718364745574{padding-right: 8% !important;padding-left: 8% !important;}.vc_custom_1714473274588{padding-top: 10px !important;}.vc_custom_1714473274588{padding-top: 10px !important;}.vc_custom_1709636608656{padding-right: 10% !important;padding-left: 10% !important;}.vc_custom_1683701735502{margin-top: 10px !important;margin-bottom: 20px !important;}<\/style><p>[vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; css=&#8221;.vc_custom_1683701811284{margin-top: 10px !important;margin-bottom: 30px !important;}&#8221;][vc_column]<div class=\"dt-fancy-separator style-dashed accent-border-color\" style=\"width: 100%;\"><div class=\"dt-fancy-title bg-on\" style=\"color: #ffffff;\"><span class=\"separator-holder separator-left\"><\/span>GOLD SPONSORS<span class=\"separator-holder separator-right\"><\/span><\/div><\/div>[vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2361&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.commvault.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2426&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/delinea.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2301&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/gbmme.com\/&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2339&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.arubanetworks.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2424&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.opswat.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; css=&#8221;.vc_custom_1683701811284{margin-top: 10px !important;margin-bottom: 30px !important;}&#8221;][vc_column]<div class=\"dt-fancy-separator style-dashed accent-border-color\" style=\"width: 100%;\"><div class=\"dt-fancy-title bg-on\" style=\"color: #ffffff;\"><span class=\"separator-holder separator-left\"><\/span>SILVER SPONSORS<span class=\"separator-holder separator-right\"><\/span><\/div><\/div>[vc_empty_space height=&#8221;20px&#8221;][vc_row_inner css=&#8221;.vc_custom_1718364745574{padding-right: 8% !important;padding-left: 8% !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1714473274588{padding-top: 10px !important;}&#8221;][vc_single_image image=&#8221;2428&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/finessedirect.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2306&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.oneidentity.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;10px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1714473274588{padding-top: 10px !important;}&#8221;][vc_single_image image=&#8221;2431&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.vectra.ai\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; css=&#8221;.vc_custom_1683701811284{margin-top: 10px !important;margin-bottom: 30px !important;}&#8221;][vc_column]<div class=\"dt-fancy-separator style-dashed accent-border-color\" style=\"width: 100%;\"><div class=\"dt-fancy-title bg-on\" style=\"color: #ffffff;\"><span class=\"separator-holder separator-left\"><\/span>OFFICIAL PUBLICATIONS<span class=\"separator-holder separator-right\"><\/span><\/div><\/div>[vc_empty_space height=&#8221;20px&#8221;][vc_row_inner css=&#8221;.vc_custom_1709636608656{padding-right: 10% !important;padding-left: 10% !important;}&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2204&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;http:\/\/www.tahawultech.com\/magazine-archive\/?site=cnme&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2206&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.tahawultech.com\/magazine-archive\/?site=resellerme&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2207&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.tahawultech.com\/magazine-archive\/?site=securityadvisorme&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;]<div class=\"dt-fancy-separator style-dashed accent-border-color\" style=\"width: 100%;\"><div class=\"dt-fancy-title bg-on\" style=\"color: #ffffff;\"><span class=\"separator-holder separator-left\"><\/span>HOSTED BY<span class=\"separator-holder separator-right\"><\/span><\/div><\/div>[vc_row_inner css=&#8221;.vc_custom_1683701735502{margin-top: 10px !important;margin-bottom: 20px !important;}&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2210&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.tahawultech.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;]<div id=\"ultimate-heading-524769fa5baf3e9de\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-524769fa5baf3e9de uvc-7046 sponsor-title\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-524769fa5baf3e9de h2'  data-responsive-json-new='{\"font-size\":\"desktop:14px;\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;color:#ffffff;\">Organised by CPI<\/h2><\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n<\/div>[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;vc_default&#8221; gap=&#8221;20&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-default&#8221; bg_image_new=&#8221;id^2061|url^https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-content\/uploads\/2024\/03\/3474969.jpg|caption^null|alt^null|title^3474969|description^null&#8221; bg_override=&#8221;ex-full&#8221; enable_overlay=&#8221;enable_overlay_value&#8221; overlay_color=&#8221;rgba(0,0,0,0.18)&#8221; overlay_pattern=&#8221;02.png&#8221; overlay_pattern_attachment=&#8221;fixed&#8221; css=&#8221;.vc_custom_1709885930429{padding-top: 50px !important;padding-bottom: 60px !important;}&#8221; el_id=&#8221;about&#8221;][vc_column css=&#8221;.vc_custom_1621510941945{padding-top: 0px !important;}&#8221;][vc_tta_tabs style=&#8221;outline&#8221; color=&#8221;vista-blue&#8221; active_section=&#8221;1&#8243; el_class=&#8221;tab-area-isaca&#8221;][vc_tta_section title=&#8221;Join Peers&#8221; tab_id=&#8221;1709379414408-1ecaae4a-9e10&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709388238316{padding-top: 10px !important;padding-bottom: 10px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_toggle title=&#8221;CISOs&#8221; style=&#8221;simple&#8221; color=&#8221;green&#8221; size=&#8221;lg&#8221; custom_font_container=&#8221;tag:h4|font_size:18|text_align:left|color:%23ffffff&#8221; custom_use_theme_fonts=&#8221;yes&#8221; use_custom_heading=&#8221;true&#8221; el_class=&#8221;isaca-faq&#8221; css=&#8221;.vc_custom_1709389904257{margin-bottom: 5px !important;}&#8221;]Define strategies for cyber resilience and agility as digital&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"class_list":["post-1687","page","type-page","status-publish","hentry","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Attend - Infosec &amp; Cybersecurity Congress 2024<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Attend - Infosec &amp; Cybersecurity Congress 2024\" \/>\n<meta property=\"og:description\" content=\"[vc_row type=&#8221;vc_default&#8221; gap=&#8221;20&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-default&#8221; bg_image_new=&#8221;id^2061|url^https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-content\/uploads\/2024\/03\/3474969.jpg|caption^null|alt^null|title^3474969|description^null&#8221; bg_override=&#8221;ex-full&#8221; enable_overlay=&#8221;enable_overlay_value&#8221; overlay_color=&#8221;rgba(0,0,0,0.18)&#8221; overlay_pattern=&#8221;02.png&#8221; overlay_pattern_attachment=&#8221;fixed&#8221; css=&#8221;.vc_custom_1709885930429{padding-top: 50px !important;padding-bottom: 60px !important;}&#8221; el_id=&#8221;about&#8221;][vc_column css=&#8221;.vc_custom_1621510941945{padding-top: 0px !important;}&#8221;][vc_tta_tabs style=&#8221;outline&#8221; color=&#8221;vista-blue&#8221; active_section=&#8221;1&#8243; el_class=&#8221;tab-area-isaca&#8221;][vc_tta_section title=&#8221;Join Peers&#8221; tab_id=&#8221;1709379414408-1ecaae4a-9e10&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709388238316{padding-top: 10px !important;padding-bottom: 10px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_toggle title=&#8221;CISOs&#8221; style=&#8221;simple&#8221; color=&#8221;green&#8221; size=&#8221;lg&#8221; custom_font_container=&#8221;tag:h4|font_size:18|text_align:left|color:%23ffffff&#8221; custom_use_theme_fonts=&#8221;yes&#8221; use_custom_heading=&#8221;true&#8221; el_class=&#8221;isaca-faq&#8221; css=&#8221;.vc_custom_1709389904257{margin-bottom: 5px !important;}&#8221;]Define strategies for cyber resilience and agility as digital&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/\" \/>\n<meta property=\"og:site_name\" content=\"Infosec &amp; Cybersecurity Congress 2024\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-08T14:23:20+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/\",\"url\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/\",\"name\":\"Why Attend - Infosec &amp; Cybersecurity Congress 2024\",\"isPartOf\":{\"@id\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/#website\"},\"datePublished\":\"2022-12-20T11:19:40+00:00\",\"dateModified\":\"2024-03-08T14:23:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Attend\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/#website\",\"url\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/\",\"name\":\"Infosec &amp; Cybersecurity Congress 2024\",\"description\":\"Tahawultech.com &amp; ISACA UAE\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Attend - Infosec &amp; Cybersecurity Congress 2024","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/","og_locale":"en_US","og_type":"article","og_title":"Why Attend - Infosec &amp; Cybersecurity Congress 2024","og_description":"[vc_row type=&#8221;vc_default&#8221; gap=&#8221;20&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-default&#8221; bg_image_new=&#8221;id^2061|url^https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-content\/uploads\/2024\/03\/3474969.jpg|caption^null|alt^null|title^3474969|description^null&#8221; bg_override=&#8221;ex-full&#8221; enable_overlay=&#8221;enable_overlay_value&#8221; overlay_color=&#8221;rgba(0,0,0,0.18)&#8221; overlay_pattern=&#8221;02.png&#8221; overlay_pattern_attachment=&#8221;fixed&#8221; css=&#8221;.vc_custom_1709885930429{padding-top: 50px !important;padding-bottom: 60px !important;}&#8221; el_id=&#8221;about&#8221;][vc_column css=&#8221;.vc_custom_1621510941945{padding-top: 0px !important;}&#8221;][vc_tta_tabs style=&#8221;outline&#8221; color=&#8221;vista-blue&#8221; active_section=&#8221;1&#8243; el_class=&#8221;tab-area-isaca&#8221;][vc_tta_section title=&#8221;Join Peers&#8221; tab_id=&#8221;1709379414408-1ecaae4a-9e10&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709388238316{padding-top: 10px !important;padding-bottom: 10px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_toggle title=&#8221;CISOs&#8221; style=&#8221;simple&#8221; color=&#8221;green&#8221; size=&#8221;lg&#8221; custom_font_container=&#8221;tag:h4|font_size:18|text_align:left|color:%23ffffff&#8221; custom_use_theme_fonts=&#8221;yes&#8221; use_custom_heading=&#8221;true&#8221; el_class=&#8221;isaca-faq&#8221; css=&#8221;.vc_custom_1709389904257{margin-bottom: 5px !important;}&#8221;]Define strategies for cyber resilience and agility as digital&hellip;","og_url":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/","og_site_name":"Infosec &amp; Cybersecurity Congress 2024","article_modified_time":"2024-03-08T14:23:20+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/","url":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/","name":"Why Attend - Infosec &amp; Cybersecurity Congress 2024","isPartOf":{"@id":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/#website"},"datePublished":"2022-12-20T11:19:40+00:00","dateModified":"2024-03-08T14:23:20+00:00","breadcrumb":{"@id":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/why-attend\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/"},{"@type":"ListItem","position":2,"name":"Why Attend"}]},{"@type":"WebSite","@id":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/#website","url":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/","name":"Infosec &amp; Cybersecurity Congress 2024","description":"Tahawultech.com &amp; ISACA UAE","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/pages\/1687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/comments?post=1687"}],"version-history":[{"count":18,"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/pages\/1687\/revisions"}],"predecessor-version":[{"id":2264,"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/pages\/1687\/revisions\/2264"}],"wp:attachment":[{"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/media?parent=1687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}