Advanced Drupal 8 Devlopment

Date: 
Thursday, March 16, 2017
Time: 
10:00am - 10:50am
Session Level: 

Agenda – Day 1

  • 07:30    REGISTRATION & NETWORKING

  • 08:30    WELCOME ADDRESS BY KING KHALED UNIVERSITY

  • 9:00    KEYNOTE BY GOVERNMENT

  • 09:40    KEYNOTE BY IDC

  • 10:00    TEA / COFFEE BREAK & NETWORKING (EXHIBIT AREA)

  • 11:00    H.E PRINCE FAISAL BIN KHALID BIN ABDUL AZIZ AL SAUD VISIT THE CONFERENCE

  • 11:20    WELCOME ADDRESS BY SCIENTIFIC COMMITTEE

  • 11:30    END USER CASE STUDY

  • 11:40    PRESENTATION BY PRESIDENT OF KING KHALED UNIVERSITY

  • 11:50    FACILITATION OF SPEAKERS

  • 12:10    PRAYER BREAK

  • 12:30    SESSION A: AN INTELLIGENCE-DRIVEN RISK BASED APPROACH TO PREVENT CYBERCRIME

Synopsis: We need to understand the Role played by parties involved in combating cybercrimes by combing technology and human intelligence. Also, Understanding personal and behavioral characteristics of cybercrime perpetrators as a counterintelligence tool.

  • 14:00    LUNCH BREAK

  • 15:00    SESSION B: EVOLUTION OF CYBERCRIME: FROM MORRIS WORM TO RANSOMWARE TO CYBER WARFARE

Synopsis: A technology perspective on different types of cyber crimes and their implications. Regulations and modulations on the legalities of international and regional local laws around cyber crime.

 

 

  •  16:30    CLOSING & NETWORKING

Agenda – Day 2

  • 08:00    OPEN & NETWORKING

  • 09:00    KEYNOTE BY IDC

  • 09:40    SESSION C: DEFENSE MECHANISM: NEW STRATEGIES AND PREVENTION TECHNIQUES

Synopsis: Cybercrime is ever evolving and therefore evolution of techniques in fighting cybercrime is imperative to keep pace with cyber perpetrators. This session will also address on cyber investigation tools like Digital forensics and cyber crime data mining.

  • 11:10    TEA / COFFEE BREAK & NETWORKING

  • 11:40    PRESENTATION BY GOVERNMENT

  • 12:15    PRAYER BREAK

  • 12:30    SESSION D: SPREADING AWARENESS AND CREATING COLLABORATIVE CHANNELS TO COMBAT CYBER THREATS

Synopsis: A technology perspective on different types of cyber crimes and their implications. Regulations and modulations on the legalities of international and regional local laws around cyber crime.

  • 14:00    CLOSING, LUNCH & NETWORKING