Documente Academic
Documente Profesional
Documente Cultură
For Finnovation
C E H C CISO
Certified Ethical Hacker Certified Chief Information Security Officer
Business Summit
December 07, 2017
www.fintechsecuritysummit.com
SUMMIT OVERVIEW
With FinTech becoming a global phenomenon, why should the Middle East be left behind? As Abu Dhabi,
UAE leads the market with innovations in the financial technologies space, we must not forget the
cyber security dynamics involved in this digital transformation.
Globally, VC funding to Fintech companies reached a record of $13.6bn in 2016, up from the $12.6bn
reported the year before. In the wake of these aggressive investments, EC Council brings to you its
“2nd Edition FinTech Security Summit” scheduled for 7th December 2017 in Abu Dhabi, UAE.
While the banking and the financial technologies services undoubtedly form the backbone of any
economy; we must not discount the importance of safeguarding these sectors from the clutches of
the cyber security threats faced by companies globally. A “connected-world” is no longer a far-fetched
dream but a nearing reality. Compliance synergies, disruptive technologies, artificial intelligence, cyber
vulnerabilities, cloud migration are all concepts keeping the banking and financial technology experts
on their toes.
With the 2nd Edition FinTech Security Summit, we bring to you answers and international solutions
to all your cyber security and technologies woes with a power packed gathering over a week with a
C|CISO training between 03 – 06 December 2017 followed by our summit on the 7th December 2017.
Meet and network with over 200 experts from the Middle East and world over to come up to speed with
the dynamic financial technologies market.
TOPICS’ OVERVIEW
• Understanding the road towards digitization and its dynamics
• Decoding the regulatory framework for fintech startups in the region
• Is Artifical intelligence, blockchain and compliance innovation and answer to your expensive
regulatory issues?
• Can RegTech save the financial industry from complicated and expensive regulatory
compliance issues?
• The Role of Cloud in the Modern Enterprise in MENA – Past, Present and Future impact their
internal shortcomings may have on their external vulnerabilities, and vice versa
• Transforming the Middle East financial services sector with Blockchain
www.fintechsecuritysummit.com
CONFIRMED SPEAKERS
Anshul Srivastav
Chief Information Officer and Charles L. McGann, Jr.
Digital Officer COO
Union Insurance, UAE McGann Consulting Group, USA
Rajesh Kumar
Director Alexander AA
Compliance Risk Control – AME Director, Cyber Intelligence & Fraud
Standard Chartered Bank, UAE Investigations, VISA, UAE
www.fintechsecuritysummit.com
FINTECH SECURITY SUMMIT
SINGAPORE - SNAPSHOT
KEY FACTS & FIGURES
Directors,
CEO’s, CIOs,
Head, AVPs & CTOs & VPs
Senior Managers
PAST SPONSORS
PRESENTING PARTNER DIAMOND PARTNERS PLATINUM PARTNER
www.fintechsecuritysummit.com
Reasons why you cannot miss the 2nd Edition FinTech Security Summit:
• Develop your competitive strategy by exploring the long- and short-term trends shaping the future
of technology for the financial industry and their security implications
• Explore how to build new internal efficiencies and improve customer experience with sessions
dedicated to Cloud, Blockchain and Regtech
• Network with your peers, building new connections with the region’s technological pioneers and
leaders
• Power packed agenda with 25+ global speakers addressing the most pressing issues in the financial
technologies market
• Hear about not only innovative technologies but also about the security vulnerabilities faced by
organisations on a daily basis while implementing these technologies
Client Testimonials
“Great event with broad spectrum of delegates actively participating with interesting
questions and good opportunity to network with thought leaders”
Citibank
“Well organised, good topics in presentations, informative discussions. Met many influential
personalities and had a great time networking”
Nepal Rastra Bank
“I am one of the first Batch of CCIOS certified professionals. I have gone through the entire
CCISO program which now directly relates to my current / previous job functions. CCISO
Body of Knowledge will truly prepare me for a role as a leader in InfoSec filed. I am confident
that I will be using almost everything I learned in the CCISO program. I am glad and CCISO is
Great certification program for information security executives.”
Cyber Security Agency, Singapore
“The certification has helped me to have a better view of the CISO or Information Security
Officer work areas that need focus. The information I learned in the class has helped me
improve my security program by expanding in the information of budgeting/ risk/ and auditing
areas that are major concerns in the CISO role”
Bank of America
“I took live in-person training. Compared to the other certifications I have it the CCISO
program is more theoretical. I had more technical background and I really missed the
management’s point of view on the security. From this perspective CCISO, was the right
choice for me to catch up on the management concepts with. I now know how to manage
risk and how to deal with information security better”
Mobile Credit Payment Pte Ltd
“I read the CCISO Body of Knowledge thoroughly to prepare for the exam. I found the exam
somewhat difficult as there were numerous topic areas that are worthy of questions.
Earning the CCISO certification assures my management that I have the required skills
and knowledge. The CCISO program material helps me because I am constantly applying
knowledge to security posture of Organization”
Singtel
“I feel that the summit was an excellent opportunity to share knowledge on various
related topics related to security, blockchain, regtech, IoT etc. The speakers were eminent
personalities in the field”
Fintech Global Group
“By providing access to some of the best cybersecurity minds and practitioners, EC-Council
has succeeded in delivering top-notch education, training and a networking platform in
Singapore”
Standard Chartered
www.fintechsecuritysummit.com
AGENDA
Keynote
Understanding the road towards digitization and building the necessary
security infrastructure for it
08.45 – 09.15 • Role of accelerator programs
• Testing and developing innovative concepts in a regulatory lenient but
controlled environment
• Fintech self-regulation
Special Address
Decoding the regulatory framework for fintech startups in the region
09.15 – 09.45 • Role of international cooperation
• Favorability of the UAE to become the fintech hub of the MENA region
• National Innovation Strategy - UAE
International Keynote
09.45 – 10.00 Topic to be announced
Hock Lai Chia, President, Singapore Fintech Association, Singapore
Panel Discussion
Blockchain, Cloud and Artificial Intelligence: Modern Innovations are
Rethinking the Future of Cybersecurity
As the global markets grow in complexity and the threat of sophisticated
cyberattacks escalates the amount of new financial regulation has skyrocketed.
Keeping current with all of these new provisions is a costly and complicated
endeavor — one with no end in sight.
• Using AI and chatbots for better customer service
• From double entry book-keeping to Blockchain ledgers
11.10 – 11.55 • Combating sophisticated cyber attacks
Session Chair
Anshul Srivastav, Chief Information Officer and Digital Officer,
Union Insurance, UAE
Panelist
Charles L. McGann, Jr.
COO, McGann Consulting Group, USA
www.fintechsecuritysummit.com
AGENDA
Panel Discussion
Addressing the cyber security vulnerabilities in the FinTech Era
• Threat environment is more dangerous and complex than ever
• Bolstering your cyber defense and responding to new threats as they
emerge at a significantly lower operational cost
• Aligning Islamic Banking with FinTech
11.55 – 12.40
Session Chair
Ahmed Baig, Co-Founder, CISOCONNECT
Panelist
James Greenwood, Chief Technology Officer, BankCLEARLY
Saleem Ahmed, Senior Vice President - Head of Information Technology,
Sharjah Islamic Bank
Panel Discussion
With the importance of cloud computing for growing your business; how
prepared are you to combat the security challenges due to scalability?
• Attitude of the MENA region about cloud adoption – Early adopters have
already started reaping the benefits
14.15 – 15.00 • Increasing employee engagement
• Accelerating faster innovation while creating a truly secure business
environment
Session Chair
Tareq Moustafa Dreiza, Partner - Head of IT Advisory, KMPG
www.fintechsecuritysummit.com
AGENDA
Panel Discussion
With security as the basis, how is the Middle East financial services
sector transforming with Blockchain?
• Resilience against cyber attacks
• Differentiating with technological capabilities
• Innovation from startups in this space
15.15 – 16.00
Session Chair
Malikkhan Kotadia, Mentor, The FinLab Pte Ltd, Singapore
Panelist
Rajesh Kumar, Director, Compliance Risk Control – AME
Standard Chartered Bank, UAE
www.fintechsecuritysummit.com
EXPERTS TO BE INVITED
www.fintechsecuritysummit.com
Ravi Jitani Anshul Shrivastav
Director – Group IT, The Abraaj Group CIO, Union Insurance
www.fintechsecuritysummit.com
PAST EVENTS
www.fintechsecuritysummit.com
INDUSTRY SECTORS
AUDIENCE MIX:
Experts from the banking and fintech community
MDs/ CEOs/ Founders Innovation/ Digital Transformation/ IoT
from the Middle East and globally:
www.fintechsecuritysummit.com
Workshop Overview
The C|CISO Training Workshop is a premium Training
Get Certified
& Certification program for aspiring Chief Information
TM
C CISO
Security Officers that wish to penetrate the inner
sanctum of Information Security Management and
Leadership. During the C|CISO Training Workshop,
participants will be challenged to develop a business
continuity plan for a company in a given industry and Certified Chief Information Security Officer
situation, use metrics to communicate cyber risk for
TRAINING WORKSHOP
different audiences, and describe how to align a given
security program with the goals of the business in which
it resides, among many other exercises. The challenges
03rd - 06th December, 2017
are aimed at helping aspiring leaders develop business
acumen, practice on their managerial skills and further UAE
hone their technical expertise by diving deep into how
security should be injected into the procurement process
and how a CISO should manage budgets and assets. The 5 Domains
Domain 1: Governance (Policy, Legal & Compliance)
Course Outline Domain 2: IS Management Controls and Auditing
Management
Duration: 4 DAYS Domain 3: Management – Projects and Operations
Certification: C|CISO Certified Chief Information (Projects, Technology & Operations)
Security Officer Domain 4: Information Security Core Competencies
On-site exam proctoring Domain 5: Strategic Planning & Finance.
(1 year exam voucher-redeem option)
The Certified CISO (C|CISO) course has certified leading The Exam
information security professionals around the world and
is the first of its kind training and certification program The C|CISO Exam was developed by practicing CISOs
aimed at producing top-level Information Security and based on the real-world scenarios professionals
Leaders. The CCISO does not focus solely on technical from across industries have faced while securing some
knowledge but on the application of information security of the most prestigious organizations in the world.
management principles from an executive management The C|CISO Exam is available at Pearson VUE testing
point of view. The program was developed by seasoned centers around the world. Applicant’s knowledge in all
CISOs for current and aspiring CISOs. five of the C|CISO Domains will be tested on the exam
that focuses on scenario-based questions and requires
C|CISO Material assumes a high-level understanding of applicants to apply their real-world experience in order
technical topics and doesn’t spend much time on strictly to answer successfully. To that end, in order to qualify
technical information, but rather on the application of to sit for the C|CISO Exam after taking the CCISO
technical knowledge to an information security class, applicants have at least 5 years of information
executive’s day-to-day work. The C|CISO aims to bridge security experience in 3 or more of the CCISO Domains.
the gap between the executive management knowledge Any student lacking this experience may take the EC-
that CISOs need and the technical knowledge that many Council Information Security Management exam and
aspiring CISOs have. This can be a crucial gap as a earn the EISM certification. In order to sit for the C|CISO
practitioner endeavors to move from mid-management exam and earn the certification, candidates must meet
to upper, executive management roles. Much of this the basic C|CISO requirements. Candidates who do not
is traditionally learned as on the job training, but the yet meet the C|CISO requirements but are interested
C|CISO Training Program can be the key to a successful in information security management can pursue the
transition to the highest ranks of information security EC-Council Information Security Management (EISM)
management. certification.
www.fintechsecuritysummit.com
OUR EXPERT TRAINER
Charles L. (Chuck) McGann, Jr., is nationally recognized information security professional recently
establishing McGann Consulting Group (MCG), focusing on small to mid-sized organizations providing
guidance in solidifying Cybersecurity programs and compliance requirements. McGann is also engaged
with the EC-Council to facilitate the Certified Chief Information Security Officer program – brining years
of firsthand knowledge and experiences to the attendees as he focuses on educating the class in
challenges they will face and how their certification will provide a validation of excellence - from Policy
and Procedures creation and review through Incident Response and Threat Mitigation.
Formally the Chief Security Strategist at Salient CRGT, a government contractor providing IT and Security
services to DOD, Army, USPS, VA among other agencies. In his current role of Chief Cyber Strategist,
McGann focused on leveraging existing Salient CRGT capabilities among the Federal Civilian agencies
as well as reviewing emerging vendors for possible partnerships engaged in increasing agency support
needs. His experience is helping solidify the strategic initiatives roadmap for Cyber and Intel Solutions.
Chuck is the former Corporate Information Security Officer for the United States Postal Service (USPS).
In this capacity, he had the responsibility of securing an intranet that is one of the largest maintained by
any organization in the world, with over 200,000 workstations; over 45,000 retail terminals; more than
16,000 servers and over 220,000 Mobile Delivery Devices. The USPS infrastructure encompasses over
600 business applications that support all aspects of business operations as well as movement of the
mail.
In his 28 years with the Postal Service, Chuck held numerous positions, Including: Manager, Information
Systems, Acting Postmaster, Business Systems Analyst, Business Project Leader, Distributed Systems
Security Specialist, Manager, Information Security and Incident Response Team Manager.
Chuck holds an MBA from Strayer University, a Bachelor’s degree from the University of Massachusetts,
and two Associate’s degrees from Springfield Technical Community College. He is a certified information
systems security professional (CISSP), a certified information security manager (CISM) and holds a
certification for information assurance methodology (IAM) from the National Security Agency (NSA).
He is the former Co-Chair of the (ISC)2 Government Advisory Board on Cyber Security, and served as
a Government Information Security Leadership Awards Judge for the last three years and chaired the
Federal CISO for CISO’s quarterly meetings. He is also a former member of the Symantec Government
Education Advisory Board, and the RedSeal Customer Advisory Board, Over his distinguished career
has received numerous awards and recognition. He belongs to various national, regional, and local
organizations such as the Government Technology Research Alliances’ group, FBI InfraGard, National
Security Agency (NSA), and Information System Audit and Control Association (ISACA) to name a few.
www.fintechsecuritysummit.com
TM
C EH
Certified Ethical Hacker
The goal of this course is to help you master an ethical hacking methodology that can be used in a
penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are
highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!
www.eccouncil.org/programs/certified-ethical-hacker-ceh
Get Involved
Speaking Opportunities
Jyoti Punjabi
Mobile: +91-99636-54422
Email: jyoti.punjabi@eccouncil.org
www.fintechsecuritysummit.com