{"id":2321,"date":"2024-05-03T10:58:13","date_gmt":"2024-05-03T10:58:13","guid":{"rendered":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/?page_id=2321"},"modified":"2024-05-03T10:58:13","modified_gmt":"2024-05-03T10:58:13","slug":"abu-dhabi-panel-discussion","status":"publish","type":"page","link":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/","title":{"rendered":"Abu Dhabi Panel Discussion"},"content":{"rendered":"<p>[vc_row type=&#8221;vc_default&#8221; gap=&#8221;20&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-default&#8221; bg_image_new=&#8221;id^2061|url^https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-content\/uploads\/2024\/03\/3474969.jpg|caption^null|alt^null|title^3474969|description^null&#8221; bg_override=&#8221;ex-full&#8221; enable_overlay=&#8221;enable_overlay_value&#8221; overlay_color=&#8221;rgba(0,0,0,0.18)&#8221; overlay_pattern=&#8221;02.png&#8221; overlay_pattern_attachment=&#8221;fixed&#8221; css=&#8221;.vc_custom_1709550325896{padding-top: 50px !important;padding-bottom: 20px !important;}&#8221; el_id=&#8221;about&#8221;][vc_column css=&#8221;.vc_custom_1621510941945{padding-top: 0px !important;}&#8221;][vc_tta_tabs style=&#8221;outline&#8221; color=&#8221;vista-blue&#8221; active_section=&#8221;1&#8243; el_class=&#8221;tab-area-isaca&#8221;][vc_tta_section title=&#8221;Topic 1&#8243; tab_id=&#8221;1709379414408-1ecaae4a-9e10&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; gap=&#8221;15&#8243;][vc_column_inner]<div id=\"ultimate-heading-981569f7cfe2831db\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-981569f7cfe2831db uvc-3632 accent-title-color color-title\" data-hspacer=\"no_spacer\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-981569f7cfe2831db h2'  data-responsive-json-new='{\"font-size\":\"desktop:30px;\",\"line-height\":\"desktop:32px;\"}' ><h2 style=\"font-weight:bold;margin-bottom:20px;\">RISK QUANTIFICATION: A NEW PARADIGM FOR CISO\u2019S APPROACH<\/h2><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-981569f7cfe2831db .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;color:#ffffff;margin-bottom:20px;\">The Panel Discussion aims to explore the evolving role of Chief Information Security Officers (CISOs) in quantifying and managing cybersecurity risks. The discussion may include topics such as the integration of quantitative risk analysis into cybersecurity strategies, the use of risk metrics to prioritize investments, challenges in implementing risk quantification frameworks, and emerging best practices in the field.<\/p>\n<p><strong>Thought ideas\/topics for discussion:<br \/>\n<\/strong>1. Challenges and opportunities in communicating risk metrics effectively to stakeholders.<br \/>\n2. Collaborative approaches to risk quantification involving crossfunctional teams.<br \/>\n3. Incorporating scenario-based analysis to simulate potential cyber threats and their impact.<br \/>\n4. Emerging technologies and tools for automating risk quantification processes.<\/div><\/div><div class=\"ult-spacer spacer-69f7cfe28321d\" data-id=\"69f7cfe28321d\" data-height=\"10\" data-height-mobile=\"10\" data-height-tab=\"10\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Topic 2&#8243; tab_id=&#8221;1709379414448-8b0e6196-7783&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709390788209{padding-top: 20px !important;padding-bottom: 20px !important;background-color: rgba(0,0,0,0.42) !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column_inner]<div id=\"ultimate-heading-536769f7cfe283246\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-536769f7cfe283246 uvc-2615 accent-title-color color-title\" data-hspacer=\"no_spacer\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-536769f7cfe283246 h2'  data-responsive-json-new='{\"font-size\":\"desktop:30px;\",\"line-height\":\"desktop:32px;\"}' ><h2 style=\"font-weight:bold;margin-bottom:20px;\">SECURITY GOVERNANCE: BEST PRACTICES FOR BOARD-LEVEL ENGAGEMENT<\/h2><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-536769f7cfe283246 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;color:#ffffff;margin-bottom:20px;\">The Panel Discussion will address the critical role of corporate boards in overseeing cybersecurity strategies and risk management. Discussions may include the importance of boardlevel involvement in setting security policies, the alignment of security initiatives with business objectives, strategies for enhancing board understanding of cybersecurity risks, and the establishment of effective communication channels between security leaders and board members.<\/p>\n<p><strong>Thought ideas\/topics for discussion:<\/strong><br \/>\n1. The board\u2019s responsibility in ensuring adequate resources for cybersecurity initiatives.<br \/>\n2. Regulatory and legal considerations shaping board oversight of cybersecurity.<br \/>\n3. Case studies and lessons learned from cybersecurity incidents and their impact on board governance.<br \/>\n4. The role of external advisors and cybersecurity experts in supporting board-level engagement.<\/div><\/div><div class=\"ult-spacer spacer-69f7cfe28326a\" data-id=\"69f7cfe28326a\" data-height=\"10\" data-height-mobile=\"10\" data-height-tab=\"10\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Topic 3&#8243; tab_id=&#8221;1709392040819-c7232745-6ad4&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709535270944{padding-top: 10px !important;padding-bottom: 10px !important;background-color: rgba(0,0,0,0.42) !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column_inner]<div id=\"ultimate-heading-195869f7cfe283288\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-195869f7cfe283288 uvc-4310 accent-title-color color-title\" data-hspacer=\"no_spacer\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-195869f7cfe283288 h2'  data-responsive-json-new='{\"font-size\":\"desktop:30px;\",\"line-height\":\"desktop:32px;\"}' ><h2 style=\"font-weight:bold;margin-bottom:20px;\">EMERGING TECHNOLOGIES (DEEP FAKE, AI) AND CYBERSECURITY: OPPORTUNITIES AND RISKS<\/h2><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-195869f7cfe283288 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;color:#ffffff;margin-bottom:20px;\">The Panel Discussion will explore the intersection of artificial intelligence, deep fake technology, and cybersecurity. Discussions may include the potential applications of AI in enhancing cybersecurity defenses, the risks posed by deep fake technology in social engineering attacks and misinformation campaigns, ethical considerations surrounding the use of AI in cybersecurity, and strategies for mitigating emerging threats.<\/p>\n<p><strong>Thought ideas\/topics for discussion:<br \/>\n<\/strong>1. Regulatory challenges in addressing the risks posed by emerging technologies.<br \/>\n2. Collaborative efforts between researchers, industry, and policymakers to address cybersecurity challenges associated with AI and deep fake technology.<br \/>\n3. Building resilience against AI-driven cyber threats through employee training and awareness programs.<br \/>\n4. The role of interdisciplinary approaches in understanding and addressing the evolving cybersecurity landscape shaped by emerging technologies.<\/div><\/div><div class=\"ult-spacer spacer-69f7cfe2832a8\" data-id=\"69f7cfe2832a8\" data-height=\"10\" data-height-mobile=\"10\" data-height-tab=\"10\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; full_width=&#8221;stretch_row&#8221; bg_type=&#8221;video&#8221; video_url=&#8221;https:\/\/904b000694b598abf2a9-801920451bc203c83f441c16862a4158.ssl.cf2.rackcdn.com\/1118760_4k_pattern_numbers_3840x2160.mp4&#8243; video_opts=&#8221;loop,muted&#8221; video_poster=&#8221;id^2134|url^https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-content\/uploads\/2024\/03\/venue-sec-bg.jpg|caption^null|alt^null|title^venue-sec-bg|description^null&#8221; viewport_vdo=&#8221;viewport_play&#8221; bg_override=&#8221;ex-full&#8221; enable_overlay=&#8221;enable_overlay_value&#8221; overlay_color=&#8221;rgba(0,0,0,0.9)&#8221; css=&#8221;.vc_custom_1709636044454{border-top-width: 1px !important;border-top-color: #81d742 !important;border-top-style: solid !important;}&#8221;][vc_column][vc_empty_space][vc_column_text]<div data-post-id=\"1951\" class=\"insert-page insert-page-1951 \"><style type=\"text\/css\" data-type=\"vc_shortcodes-custom-css\">.vc_custom_1683701811284{margin-top: 10px !important;margin-bottom: 30px !important;}.vc_custom_1683701811284{margin-top: 10px !important;margin-bottom: 30px !important;}.vc_custom_1683701811284{margin-top: 10px !important;margin-bottom: 30px !important;}.vc_custom_1718364745574{padding-right: 8% !important;padding-left: 8% !important;}.vc_custom_1714473274588{padding-top: 10px !important;}.vc_custom_1714473274588{padding-top: 10px !important;}.vc_custom_1709636608656{padding-right: 10% !important;padding-left: 10% !important;}.vc_custom_1683701735502{margin-top: 10px !important;margin-bottom: 20px !important;}<\/style><p>[vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; css=&#8221;.vc_custom_1683701811284{margin-top: 10px !important;margin-bottom: 30px !important;}&#8221;][vc_column]<div class=\"dt-fancy-separator style-dashed accent-border-color\" style=\"width: 100%;\"><div class=\"dt-fancy-title bg-on\" style=\"color: #ffffff;\"><span class=\"separator-holder separator-left\"><\/span>GOLD SPONSORS<span class=\"separator-holder separator-right\"><\/span><\/div><\/div>[vc_empty_space height=&#8221;20px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2361&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.commvault.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2426&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/delinea.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2301&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/gbmme.com\/&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2339&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.arubanetworks.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2424&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.opswat.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; css=&#8221;.vc_custom_1683701811284{margin-top: 10px !important;margin-bottom: 30px !important;}&#8221;][vc_column]<div class=\"dt-fancy-separator style-dashed accent-border-color\" style=\"width: 100%;\"><div class=\"dt-fancy-title bg-on\" style=\"color: #ffffff;\"><span class=\"separator-holder separator-left\"><\/span>SILVER SPONSORS<span class=\"separator-holder separator-right\"><\/span><\/div><\/div>[vc_empty_space height=&#8221;20px&#8221;][vc_row_inner css=&#8221;.vc_custom_1718364745574{padding-right: 8% !important;padding-left: 8% !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1714473274588{padding-top: 10px !important;}&#8221;][vc_single_image image=&#8221;2428&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/finessedirect.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2306&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.oneidentity.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;10px&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1714473274588{padding-top: 10px !important;}&#8221;][vc_single_image image=&#8221;2431&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.vectra.ai\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; css=&#8221;.vc_custom_1683701811284{margin-top: 10px !important;margin-bottom: 30px !important;}&#8221;][vc_column]<div class=\"dt-fancy-separator style-dashed accent-border-color\" style=\"width: 100%;\"><div class=\"dt-fancy-title bg-on\" style=\"color: #ffffff;\"><span class=\"separator-holder separator-left\"><\/span>OFFICIAL PUBLICATIONS<span class=\"separator-holder separator-right\"><\/span><\/div><\/div>[vc_empty_space height=&#8221;20px&#8221;][vc_row_inner css=&#8221;.vc_custom_1709636608656{padding-right: 10% !important;padding-left: 10% !important;}&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2204&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;http:\/\/www.tahawultech.com\/magazine-archive\/?site=cnme&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2206&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.tahawultech.com\/magazine-archive\/?site=resellerme&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2207&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.tahawultech.com\/magazine-archive\/?site=securityadvisorme&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;]<div class=\"dt-fancy-separator style-dashed accent-border-color\" style=\"width: 100%;\"><div class=\"dt-fancy-title bg-on\" style=\"color: #ffffff;\"><span class=\"separator-holder separator-left\"><\/span>HOSTED BY<span class=\"separator-holder separator-right\"><\/span><\/div><\/div>[vc_row_inner css=&#8221;.vc_custom_1683701735502{margin-top: 10px !important;margin-bottom: 20px !important;}&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2210&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css_animation=&#8221;none&#8221; link=&#8221;https:\/\/www.tahawultech.com\/&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;]<div id=\"ultimate-heading-738269f7cfe2839d6\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-738269f7cfe2839d6 uvc-3807 sponsor-title\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-738269f7cfe2839d6 h2'  data-responsive-json-new='{\"font-size\":\"desktop:14px;\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;color:#ffffff;\">Organised by CPI<\/h2><\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n<\/div>[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;vc_default&#8221; gap=&#8221;20&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-default&#8221; bg_image_new=&#8221;id^2061|url^https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-content\/uploads\/2024\/03\/3474969.jpg|caption^null|alt^null|title^3474969|description^null&#8221; bg_override=&#8221;ex-full&#8221; enable_overlay=&#8221;enable_overlay_value&#8221; overlay_color=&#8221;rgba(0,0,0,0.18)&#8221; overlay_pattern=&#8221;02.png&#8221; overlay_pattern_attachment=&#8221;fixed&#8221; css=&#8221;.vc_custom_1709550325896{padding-top: 50px !important;padding-bottom: 20px !important;}&#8221; el_id=&#8221;about&#8221;][vc_column css=&#8221;.vc_custom_1621510941945{padding-top: 0px !important;}&#8221;][vc_tta_tabs style=&#8221;outline&#8221; color=&#8221;vista-blue&#8221; active_section=&#8221;1&#8243; el_class=&#8221;tab-area-isaca&#8221;][vc_tta_section title=&#8221;Topic 1&#8243; tab_id=&#8221;1709379414408-1ecaae4a-9e10&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; gap=&#8221;15&#8243;][vc_column_inner][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Topic 2&#8243; tab_id=&#8221;1709379414448-8b0e6196-7783&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709390788209{padding-top: 20px !important;padding-bottom: 20px !important;background-color: rgba(0,0,0,0.42) !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column_inner][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Topic 3&#8243; tab_id=&#8221;1709392040819-c7232745-6ad4&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709535270944{padding-top: 10px !important;padding-bottom: 10px !important;background-color: rgba(0,0,0,0.42) !important;*background-color:&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"class_list":["post-2321","page","type-page","status-publish","hentry","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Abu Dhabi Panel Discussion - Infosec &amp; Cybersecurity Congress 2024<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Abu Dhabi Panel Discussion - Infosec &amp; Cybersecurity Congress 2024\" \/>\n<meta property=\"og:description\" content=\"[vc_row type=&#8221;vc_default&#8221; gap=&#8221;20&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-default&#8221; bg_image_new=&#8221;id^2061|url^https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-content\/uploads\/2024\/03\/3474969.jpg|caption^null|alt^null|title^3474969|description^null&#8221; bg_override=&#8221;ex-full&#8221; enable_overlay=&#8221;enable_overlay_value&#8221; overlay_color=&#8221;rgba(0,0,0,0.18)&#8221; overlay_pattern=&#8221;02.png&#8221; overlay_pattern_attachment=&#8221;fixed&#8221; css=&#8221;.vc_custom_1709550325896{padding-top: 50px !important;padding-bottom: 20px !important;}&#8221; el_id=&#8221;about&#8221;][vc_column css=&#8221;.vc_custom_1621510941945{padding-top: 0px !important;}&#8221;][vc_tta_tabs style=&#8221;outline&#8221; color=&#8221;vista-blue&#8221; active_section=&#8221;1&#8243; el_class=&#8221;tab-area-isaca&#8221;][vc_tta_section title=&#8221;Topic 1&#8243; tab_id=&#8221;1709379414408-1ecaae4a-9e10&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; gap=&#8221;15&#8243;][vc_column_inner][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Topic 2&#8243; tab_id=&#8221;1709379414448-8b0e6196-7783&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709390788209{padding-top: 20px !important;padding-bottom: 20px !important;background-color: rgba(0,0,0,0.42) !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column_inner][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Topic 3&#8243; tab_id=&#8221;1709392040819-c7232745-6ad4&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709535270944{padding-top: 10px !important;padding-bottom: 10px !important;background-color: rgba(0,0,0,0.42) !important;*background-color:&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/\" \/>\n<meta property=\"og:site_name\" content=\"Infosec &amp; Cybersecurity Congress 2024\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/\",\"url\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/\",\"name\":\"Abu Dhabi Panel Discussion - Infosec &amp; Cybersecurity Congress 2024\",\"isPartOf\":{\"@id\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/#website\"},\"datePublished\":\"2024-05-03T10:58:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Abu Dhabi Panel Discussion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/#website\",\"url\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/\",\"name\":\"Infosec &amp; Cybersecurity Congress 2024\",\"description\":\"Tahawultech.com &amp; ISACA UAE\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Abu Dhabi Panel Discussion - Infosec &amp; Cybersecurity Congress 2024","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/","og_locale":"en_US","og_type":"article","og_title":"Abu Dhabi Panel Discussion - Infosec &amp; Cybersecurity Congress 2024","og_description":"[vc_row type=&#8221;vc_default&#8221; gap=&#8221;20&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-default&#8221; bg_image_new=&#8221;id^2061|url^https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-content\/uploads\/2024\/03\/3474969.jpg|caption^null|alt^null|title^3474969|description^null&#8221; bg_override=&#8221;ex-full&#8221; enable_overlay=&#8221;enable_overlay_value&#8221; overlay_color=&#8221;rgba(0,0,0,0.18)&#8221; overlay_pattern=&#8221;02.png&#8221; overlay_pattern_attachment=&#8221;fixed&#8221; css=&#8221;.vc_custom_1709550325896{padding-top: 50px !important;padding-bottom: 20px !important;}&#8221; el_id=&#8221;about&#8221;][vc_column css=&#8221;.vc_custom_1621510941945{padding-top: 0px !important;}&#8221;][vc_tta_tabs style=&#8221;outline&#8221; color=&#8221;vista-blue&#8221; active_section=&#8221;1&#8243; el_class=&#8221;tab-area-isaca&#8221;][vc_tta_section title=&#8221;Topic 1&#8243; tab_id=&#8221;1709379414408-1ecaae4a-9e10&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; gap=&#8221;15&#8243;][vc_column_inner][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Topic 2&#8243; tab_id=&#8221;1709379414448-8b0e6196-7783&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709390788209{padding-top: 20px !important;padding-bottom: 20px !important;background-color: rgba(0,0,0,0.42) !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column_inner][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Topic 3&#8243; tab_id=&#8221;1709392040819-c7232745-6ad4&#8243;][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1709535270944{padding-top: 10px !important;padding-bottom: 10px !important;background-color: rgba(0,0,0,0.42) !important;*background-color:&hellip;","og_url":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/","og_site_name":"Infosec &amp; Cybersecurity Congress 2024","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/","url":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/","name":"Abu Dhabi Panel Discussion - Infosec &amp; Cybersecurity Congress 2024","isPartOf":{"@id":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/#website"},"datePublished":"2024-05-03T10:58:13+00:00","breadcrumb":{"@id":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/abu-dhabi-panel-discussion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/"},{"@type":"ListItem","position":2,"name":"Abu Dhabi Panel Discussion"}]},{"@type":"WebSite","@id":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/#website","url":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/","name":"Infosec &amp; Cybersecurity Congress 2024","description":"Tahawultech.com &amp; ISACA UAE","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/pages\/2321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/comments?post=2321"}],"version-history":[{"count":1,"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/pages\/2321\/revisions"}],"predecessor-version":[{"id":2322,"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/pages\/2321\/revisions\/2322"}],"wp:attachment":[{"href":"https:\/\/www.tahawultech.com\/infosec-cybersecurity-congress\/2024\/wp-json\/wp\/v2\/media?parent=2321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}