Middle East Summit
Virtual Summit March 9 - 10, 2022
Threat intelligence practitioners confirm that enterprises from the Gulf, Saudi Arabia and United Arab Emirates, are becoming targets of sophisticated attacks aimed at stealing personal data and, in some cases, exposing state secrets. Security analysts say the data breaches in the MENA region are exceptionally costly affairs, with the average damage reaching $6.53 million, well above the global average incident cost of $3.86 million. A recent research report stated that 63% of UAE businesses paid cyber criminals between US$350,000 and US$1.4 million following ransomware attacks in the two years before June 2021. As CISOs continue to modernize their security programs and adapt the changing threat landscape in the region. The governments are escalating their preparedness strategies through entities such as the Computer Emergency Response Team for the UAE (aeCERT) and Saudi Arabia’s National Cybersecurity Authority (NCA) in the region and are working out comprehensive programs around cybersecurity and privacy to deal with such challenges. Attend our summit to gain insights from the global and regional cybersecurity thought leaders on the critical aspects of identity protection, building ransomware defenses, protecting your ‘active directory’, reducing the supply chain complexities, standardization of XDR, cloud, OT security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Mohamed Mostafa
Global Chief Information Security Officer
Egyptian Arab Land Bank
Mostafa is global CISO at Egyptian Aran Land Bank. He has 29+ years of experience in both IT and information security. He has wide experience of developing and executing information security strategy, program, roadmap and aligning with business strategy including...
Suparna Goswami
Associate Editor
ISMG
Bharat Raigangar
Global CyberSecurist & Advisor
Raigangar is a global risk advisor and a consultant. He has more than 22 years of experience and has been a cybersecurity practitioner for banks.
Jeremy Grant
Managing Director-Technology Business Strategy
Venable LLP
Grant is a managing director at Venable, where he works with the firm's clientele to develop growth strategies, identify market solutions and advise on policy impacts across the information technology and cybersecurity and government services. Prior to joining Venable, Grant...
Nisreen Al Khatib
Info Sec and Resilience Expert
At a large organisation
Al Khatib is an expert in business continuity management, cybersecurity management, IS risk management and compliance. She helps institutions manage their cyber risk to a level acceptable to business management and achieve compliance with applicable regulatory requirements along with industry...
Riyad Jazmawi
Head of InfoSec, Governance & BCM
Invest Bank
Jazmawi is head of information security and IT governance at Investment Bank, Jordan. He is experienced in cybersecurity, business continuity management, and IT governance.
Lisa J. Sotto
Partner
Hunton Andrews Kurth LLP
Sotto is partner at Hunton Andrews Kurth. She has been named among The National Law Journal’s “100 Most Influential Lawyers”. Sotto chairs Hunton Andrews Kurth’s top-ranked Global Privacy and Cybersecurity practice and is the managing partner of the firm’s New...
Ian Keller
Security Director
Leading Telecommunications Company
Ashish Khanna
Advisor to CISO & Cybersecurity Specialist
Healthcare Entity
Khanna is advisor to CISO and cybersecurity specialist at a prominent Dubai government entity. He has more than 14 years of experience and has research interests in the technology and AI aspects of cybersecurity – particularly in finding ways of...
Dr. Jassim Haji
President
International Group of Artificial Intelligence
Dr Haji is president of Artificial Intelligence Group and has more than 30 years of experience in the cybersecurity field. He participated as a key speaker and chairman in over 200 technology conferences in Middle-East and Europe to cover latest...
Geetha Nandikotkur
Managing Editor & Conference Chair, Asia & Middle East
ISMG
Parthasarathy P
EVP & Group CISO
Leading Bank in GCC
Raina Verma
Executive Board Member & Member of ACFE Advisory Council
Association of Certified Financial Crime Specialist & Association of Certified Fraud Examiners
Verma is head of Fraud and Forensics at Majid Al Futtaim, Retail. She has extensive experience in Financial Crimes, AML, Internal audits, fraud risk management, complex investigations, regulatory compliance and reporting. She established an anti-fraud function at National Bank Fujairah...
Astrid Gobardhan
Global Data Privacy and Protection Counsel
VFS Global
Gobardhan is the global data privacy and protection counsel at VFS Global. She is responsible for advising on data privacy and protection laws, regulations and best practices. She handles data subject requests. She is also responsible for structuring of data...
Shaik Abdulkhader
CISO
Leading Energy company in Qatar
Abdulkhader is the CISO of a reputed energy company in Qatar and previously he was the CISO for Vodafone. He is a proven visionary cybersecurity leader with 28+ years of experience with strong business acumen and excellent working knowledge of...
View Agenda
Keynote: Establishing a Secure Digital Future in 2022: Is the ‘C’ Suite and Board on the Same Track?
Shaik Abdulkhader, CISO, Leading Energy company in Qatar

The enterprises across the UAE region are encouraged to invest in the infrastructure needed to build a secure and robust platform for business transformation and support the digital economy.   

Can they align their strategy with the business priorities and rise to the expectations? What does digital innovation mean to security, and where is the disconnect? What needs to change both tactically and strategically to build a cyber-resilient organization?   


The keynote sets the goals for security in leveraging the right technologies, establishing the security culture, and a collaborative strategy in accomplishing the task with the ‘C’ suite and board riding on the same track.   

Shaik Abdulkhader
  • 09:15 AM
  • 09:44 AM
Plenary: An Identity Centric Approach to Cybersecurity: Building on Zero Trust
Jeremy Grant, Managing Director-Technology Business Strategy, Venable LLP

With the IAM framework growing to fame, most practitioners are toying with the idea of using IAM to address their organization’s challenges, including security, trust, risk appetite, and managing the critical business risk to drive more value. How can identity be a business enabler in the digital transformation journey? Some say implementing an IAM framework is complex, and integrating with security is a big task and expensive too.

The session will discuss:

  • Why has the strong password criteria not worked well        
  • Why IAM is not about authentication 
  • Framework for managing identity that supports ‘zero trust’
Jeremy Grant
  • 09:45 AM
  • 10:16 AM
  • 10:15 AM
  • 10:44 AM
Track A
Lisa J. Sotto
You've Been Breached: Putting Together Your Best Response Team
Lisa J. Sotto, Partner, Hunton Andrews Kurth LLP

When it comes to cyber incident response, it is not only about what you know but also about who all know. Proper response requires an appropriate team, and renowned attorney Lisa Sotto often receives a 2 am emergency incident response call. In this exclusive ISMG summit session, she shares insight on:

  • When incident response begins (hint: long before your attackers gain entry)
  • Common gaps even in updated and tested plans
  • Step by step – what happens after the call is made
  • 10:15 AM
  • 10:45 AM
Track B
Astrid Gobardhan
Implications of the UAE’s New Data Protection Federal Decree-Law on Security
Astrid Gobardhan, Global Data Privacy and Protection Counsel, VFS Global

The United Arab Emirates (UAE) has issued its first federal data protection law (Federal Decree-Law No. 45/2021 on the Protection of Personal Data) (the Data Protection Law), alongside a law establishing the new UAE Data Office (Federal Decree-Law No. 44/2021 on establishing the UAE data office.

Like the GDPR, this new law requires organizations to implement appropriate security measures to prevent data breaches. 

The session will discuss:

  • Understanding the new data protection requirements and their ingredients
  • How do security teams comply with the new data protection?
  • Important sections under data breach prevention
  • 11:00 AM
  • 11:29 AM
Track A
Raina Verma
Spike in Online Fraud: Balancing Fraud Detection and Customer Experience
Raina Verma, Executive Board Member & Member of ACFE Advisory Council, Association of Certified Financial Crime Specialist & Association of Certified Fraud Examiners

Digital channels are a must-have as customers flock to the businesses that can offer that speed and convenience. But there’s a dark side. The relative anonymity of digital channels opens up new doors for fraud.  More account openings are taking place through digital devices and the internet, which provide the access and anonymity fraudsters require. Financial institutions need to be able to verify a user’s identity, but they can’t compromise the speed and ease of the transaction for good customers. The key is to have smarter authentication and not more authentication.

The session will also discuss:

  • Why account opening has become a business for fraudsters
  • How concepts of CIAM are getting adopted in the fraud world
  • How to modernize traditional authentication tools
  • 11:00 AM
  • 11:37 AM
Track B
Ashish Khanna
Cybersecurity in Healthcare: Tackling Threats in the Post-Pandemic Era
Ashish Khanna, Advisor to CISO & Cybersecurity Specialist, Healthcare Entity

The hackers are evolving their tactics to exploit the fears escalating amongst the population during the pandemic. How are enterprises in the healthcare industry keeping pace in responding to these threats?

The session will discuss:

  • Cybersecurity best practices for keeping pace with evolving threats
  • How threats from nation-states and criminals to the health system are a growing concern 
  • Reliance on technology in responding to threats
Keynote: How Middle East Enterprises Have Taken to AI in Fighting Cyberthreats in 2022
Dr. Jassim Haji, President, International Group of Artificial Intelligence

It would not be an exaggeration to say that the security team and the CISOs are under pressure, as research reports indicate that over 70% of the organizations in the UAE region will experience a material breach this year. The simple reason is that CISOs can’t see into the corners, which is the cause for undetected attacks. Most agree that 2021 was the ‘cyber pandemic’ year. The breaches were caused due to increased APT attacks, third-party applications, process weaknesses, and out-of-date security technology.      

The keynote will highlight how enterprises across the region are poised to fight external threats and internal weaknesses by using Artificial Intelligence to fight cyber threats and detect anomalies with actionable threat intelligence using AI.

Dr. Jassim Haji
  • 11:30 AM
  • 11:59 AM
Panel Discussion: Third-Party Risks: Mitigation Techniques and Rewriting Policies
Riyad Jazmawi, Head of InfoSec, Governance & BCM, Invest Bank
Mohamed Mostafa, Global Chief Information Security Officer, Egyptian Arab Land Bank

Thanks to the SolarWinds incident, 2021 brought the focus back on third-party risks.

The third-party risk is not a new phenomenon worldwide. The ransomware attack made on Saudi Arabia’s oil giant Saudi Aramco involving a $50 million ransom which likely came from one of its third-party contractors, stands testimony to this. The attackers stole 1TB of data, including company information, customer invoices, and extensive employee profiles complete with PII data.

What are the lessons learned from such attacks despite practitioners taking due diligence that helps reduce the potential for third-party risks? The panel will deliberate on the modus operandi of such attacks and risk mitigation techniques. 

The panelists will: 

  • Walk us through the attack scenarios
  • Talk about the lessons learned from such ransomware attacks
  • Tell us how to rewrite the security policies in aligning with third-party suppliers
Riyad Jazmawi
Mohamed Mostafa
  • 12:00 PM
  • 12:34 PM
Building an Effective Risk Management Program to Drive Business Value
Nisreen Al Khatib, Info Sec and Resilience Expert, At a large organisation

As CISOs grapple with the challenge of proving themselves as business enablers, it is critical to evolve a risk management program that provides business value and enables optimization of risk profile, maximization of risk posture, improves agility and establishes effective risk controls across the environment. A strategic risk management framework is essential in defining a security strategy based on risk and establishing security operations management frameworks. 

The session will discuss: 

  • How to define, maintain, and deliver effective Security Strategy?  
  • Ways to harmonize risk management and security strategies, as well as security operations, into a unified value management strategy? 
  • How to improve agility and maximize efficiencies of key security controls with risk program
Nisreen Al Khatib
  • 12:45 PM
  • 01:17 PM
Panel Discussion: Rising Ransomware: Building an Effective Incident Response Plan
Parthasarathy P, EVP & Group CISO, Leading Bank in GCC
Bharat Raigangar, Global CyberSecurist & Advisor,
Ian Keller, Security Director, Leading Telecommunications Company

The year 2021 stands as testimony to the large ransomware attacks witnessed globally. The industry watched JBS Foods, Brenntag (chemical distribution) and UAE is not an exception. Reports say that the UAE is the second most targeted country for ‘ransomware’ attacks in the Middle East. Experts say organized gangs and nation stages increasingly target financial institutions and critical sectors.  

What needs to change as CISOs experience increasing hacking burnout in preventing such malware intrusions? Can they operationalize technology in their prevention and incident response mechanism to address ransomware issues? 

The panel will discuss:  

  • Building an effective incident response and investigation mechanism  
  • How to deal with the recovery response process in the event of an attack
  • Taking a tactical and strategic approach to battling ransomware and protecting backups
Parthasarathy P
Bharat Raigangar
Ian Keller
  • 01:15 PM
  • 01:54 PM

Threat intelligence practitioners confirm that enterprises from the Gulf, Saudi Arabia and United Arab Emirates, are becoming targets of sophisticated attacks aimed at stealing personal data and, in some cases, exposing state secrets. Security analysts say the data breaches in the MENA region are exceptionally costly affairs, with the average damage reaching $6.53 million, well above the global average incident cost of $3.86 million. A recent research report stated that 63% of UAE businesses paid cyber criminals between US$350,000 and US$1.4 million following ransomware attacks in the two years before June 2021. As CISOs continue to modernize their security programs and adapt the changing threat landscape in the region. The governments are escalating their preparedness strategies through entities such as the Computer Emergency Response Team for the UAE (aeCERT) and Saudi Arabia’s National Cybersecurity Authority (NCA) in the region and are working out comprehensive programs around cybersecurity and privacy to deal with such challenges. Attend our summit to gain insights from the global and regional cybersecurity thought leaders on the critical aspects of identity protection, building ransomware defenses, protecting your ‘active directory’, reducing the supply chain complexities, standardization of XDR, cloud, OT security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Mohamed Mostafa
Global Chief Information Security Officer
Egyptian Arab Land Bank
Mostafa is global CISO at Egyptian Aran Land Bank. He has 29+ years of experience in both IT and information security. He has wide experience of developing and executing information security strategy, program, roadmap and aligning with business strategy including...
Suparna Goswami
Associate Editor
ISMG
Bharat Raigangar
Global CyberSecurist & Advisor
Raigangar is a global risk advisor and a consultant. He has more than 22 years of experience and has been a cybersecurity practitioner for banks.
Jeremy Grant
Managing Director-Technology Business Strategy
Venable LLP
Grant is a managing director at Venable, where he works with the firm's clientele to develop growth strategies, identify market solutions and advise on policy impacts across the information technology and cybersecurity and government services. Prior to joining Venable, Grant...
Nisreen Al Khatib
Info Sec and Resilience Expert
At a large organisation
Al Khatib is an expert in business continuity management, cybersecurity management, IS risk management and compliance. She helps institutions manage their cyber risk to a level acceptable to business management and achieve compliance with applicable regulatory requirements along with industry...
Riyad Jazmawi
Head of InfoSec, Governance & BCM
Invest Bank
Jazmawi is head of information security and IT governance at Investment Bank, Jordan. He is experienced in cybersecurity, business continuity management, and IT governance.
Lisa J. Sotto
Partner
Hunton Andrews Kurth LLP
Sotto is partner at Hunton Andrews Kurth. She has been named among The National Law Journal’s “100 Most Influential Lawyers”. Sotto chairs Hunton Andrews Kurth’s top-ranked Global Privacy and Cybersecurity practice and is the managing partner of the firm’s New...
Ian Keller
Security Director
Leading Telecommunications Company
Ashish Khanna
Advisor to CISO & Cybersecurity Specialist
Healthcare Entity
Khanna is advisor to CISO and cybersecurity specialist at a prominent Dubai government entity. He has more than 14 years of experience and has research interests in the technology and AI aspects of cybersecurity – particularly in finding ways of...
Dr. Jassim Haji
President
International Group of Artificial Intelligence
Dr Haji is president of Artificial Intelligence Group and has more than 30 years of experience in the cybersecurity field. He participated as a key speaker and chairman in over 200 technology conferences in Middle-East and Europe to cover latest...
Geetha Nandikotkur
Managing Editor & Conference Chair, Asia & Middle East
ISMG
Parthasarathy P
EVP & Group CISO
Leading Bank in GCC
Raina Verma
Executive Board Member & Member of ACFE Advisory Council
Association of Certified Financial Crime Specialist & Association of Certified Fraud Examiners
Verma is head of Fraud and Forensics at Majid Al Futtaim, Retail. She has extensive experience in Financial Crimes, AML, Internal audits, fraud risk management, complex investigations, regulatory compliance and reporting. She established an anti-fraud function at National Bank Fujairah...
Astrid Gobardhan
Global Data Privacy and Protection Counsel
VFS Global
Gobardhan is the global data privacy and protection counsel at VFS Global. She is responsible for advising on data privacy and protection laws, regulations and best practices. She handles data subject requests. She is also responsible for structuring of data...
Shaik Abdulkhader
CISO
Leading Energy company in Qatar
Abdulkhader is the CISO of a reputed energy company in Qatar and previously he was the CISO for Vodafone. He is a proven visionary cybersecurity leader with 28+ years of experience with strong business acumen and excellent working knowledge of...

View Agenda
Keynote: Establishing a Secure Digital Future in 2022: Is the ‘C’ Suite and Board on the Same Track?
Shaik Abdulkhader, CISO, Leading Energy company in Qatar

The enterprises across the UAE region are encouraged to invest in the infrastructure needed to build a secure and robust platform for business transformation and support the digital economy.   

Can they align their strategy with the business priorities and rise to the expectations? What does digital innovation mean to security, and where is the disconnect? What needs to change both tactically and strategically to build a cyber-resilient organization?   


The keynote sets the goals for security in leveraging the right technologies, establishing the security culture, and a collaborative strategy in accomplishing the task with the ‘C’ suite and board riding on the same track.   

Shaik Abdulkhader
  • 09:15 AM
  • 09:44 AM
Plenary: An Identity Centric Approach to Cybersecurity: Building on Zero Trust
Jeremy Grant, Managing Director-Technology Business Strategy, Venable LLP

With the IAM framework growing to fame, most practitioners are toying with the idea of using IAM to address their organization’s challenges, including security, trust, risk appetite, and managing the critical business risk to drive more value. How can identity be a business enabler in the digital transformation journey? Some say implementing an IAM framework is complex, and integrating with security is a big task and expensive too.

The session will discuss:

  • Why has the strong password criteria not worked well        
  • Why IAM is not about authentication 
  • Framework for managing identity that supports ‘zero trust’
Jeremy Grant
  • 09:45 AM
  • 10:16 AM
  • 10:15 AM
  • 10:44 AM
Track A
Lisa J. Sotto
You've Been Breached: Putting Together Your Best Response Team
Lisa J. Sotto, Partner, Hunton Andrews Kurth LLP

When it comes to cyber incident response, it is not only about what you know but also about who all know. Proper response requires an appropriate team, and renowned attorney Lisa Sotto often receives a 2 am emergency incident response call. In this exclusive ISMG summit session, she shares insight on:

  • When incident response begins (hint: long before your attackers gain entry)
  • Common gaps even in updated and tested plans
  • Step by step – what happens after the call is made
  • 10:15 AM
  • 10:45 AM
Track B
Astrid Gobardhan
Implications of the UAE’s New Data Protection Federal Decree-Law on Security
Astrid Gobardhan, Global Data Privacy and Protection Counsel, VFS Global

The United Arab Emirates (UAE) has issued its first federal data protection law (Federal Decree-Law No. 45/2021 on the Protection of Personal Data) (the Data Protection Law), alongside a law establishing the new UAE Data Office (Federal Decree-Law No. 44/2021 on establishing the UAE data office.

Like the GDPR, this new law requires organizations to implement appropriate security measures to prevent data breaches. 

The session will discuss:

  • Understanding the new data protection requirements and their ingredients
  • How do security teams comply with the new data protection?
  • Important sections under data breach prevention
  • 11:00 AM
  • 11:29 AM
Track A
Raina Verma
Spike in Online Fraud: Balancing Fraud Detection and Customer Experience
Raina Verma, Executive Board Member & Member of ACFE Advisory Council, Association of Certified Financial Crime Specialist & Association of Certified Fraud Examiners

Digital channels are a must-have as customers flock to the businesses that can offer that speed and convenience. But there’s a dark side. The relative anonymity of digital channels opens up new doors for fraud.  More account openings are taking place through digital devices and the internet, which provide the access and anonymity fraudsters require. Financial institutions need to be able to verify a user’s identity, but they can’t compromise the speed and ease of the transaction for good customers. The key is to have smarter authentication and not more authentication.

The session will also discuss:

  • Why account opening has become a business for fraudsters
  • How concepts of CIAM are getting adopted in the fraud world
  • How to modernize traditional authentication tools
  • 11:00 AM
  • 11:37 AM
Track B
Ashish Khanna
Cybersecurity in Healthcare: Tackling Threats in the Post-Pandemic Era
Ashish Khanna, Advisor to CISO & Cybersecurity Specialist, Healthcare Entity

The hackers are evolving their tactics to exploit the fears escalating amongst the population during the pandemic. How are enterprises in the healthcare industry keeping pace in responding to these threats?

The session will discuss:

  • Cybersecurity best practices for keeping pace with evolving threats
  • How threats from nation-states and criminals to the health system are a growing concern 
  • Reliance on technology in responding to threats
Keynote: How Middle East Enterprises Have Taken to AI in Fighting Cyberthreats in 2022
Dr. Jassim Haji, President, International Group of Artificial Intelligence

It would not be an exaggeration to say that the security team and the CISOs are under pressure, as research reports indicate that over 70% of the organizations in the UAE region will experience a material breach this year. The simple reason is that CISOs can’t see into the corners, which is the cause for undetected attacks. Most agree that 2021 was the ‘cyber pandemic’ year. The breaches were caused due to increased APT attacks, third-party applications, process weaknesses, and out-of-date security technology.      

The keynote will highlight how enterprises across the region are poised to fight external threats and internal weaknesses by using Artificial Intelligence to fight cyber threats and detect anomalies with actionable threat intelligence using AI.

Dr. Jassim Haji
  • 11:30 AM
  • 11:59 AM
Panel Discussion: Third-Party Risks: Mitigation Techniques and Rewriting Policies
Riyad Jazmawi, Head of InfoSec, Governance & BCM, Invest Bank
Mohamed Mostafa, Global Chief Information Security Officer, Egyptian Arab Land Bank

Thanks to the SolarWinds incident, 2021 brought the focus back on third-party risks.

The third-party risk is not a new phenomenon worldwide. The ransomware attack made on Saudi Arabia’s oil giant Saudi Aramco involving a $50 million ransom which likely came from one of its third-party contractors, stands testimony to this. The attackers stole 1TB of data, including company information, customer invoices, and extensive employee profiles complete with PII data.

What are the lessons learned from such attacks despite practitioners taking due diligence that helps reduce the potential for third-party risks? The panel will deliberate on the modus operandi of such attacks and risk mitigation techniques. 

The panelists will: 

  • Walk us through the attack scenarios
  • Talk about the lessons learned from such ransomware attacks
  • Tell us how to rewrite the security policies in aligning with third-party suppliers
Riyad Jazmawi
Mohamed Mostafa
  • 12:00 PM
  • 12:34 PM
Building an Effective Risk Management Program to Drive Business Value
Nisreen Al Khatib, Info Sec and Resilience Expert, At a large organisation

As CISOs grapple with the challenge of proving themselves as business enablers, it is critical to evolve a risk management program that provides business value and enables optimization of risk profile, maximization of risk posture, improves agility and establishes effective risk controls across the environment. A strategic risk management framework is essential in defining a security strategy based on risk and establishing security operations management frameworks. 

The session will discuss: 

  • How to define, maintain, and deliver effective Security Strategy?  
  • Ways to harmonize risk management and security strategies, as well as security operations, into a unified value management strategy? 
  • How to improve agility and maximize efficiencies of key security controls with risk program
Nisreen Al Khatib
  • 12:45 PM
  • 01:17 PM
Panel Discussion: Rising Ransomware: Building an Effective Incident Response Plan
Parthasarathy P, EVP & Group CISO, Leading Bank in GCC
Bharat Raigangar, Global CyberSecurist & Advisor,
Ian Keller, Security Director, Leading Telecommunications Company

The year 2021 stands as testimony to the large ransomware attacks witnessed globally. The industry watched JBS Foods, Brenntag (chemical distribution) and UAE is not an exception. Reports say that the UAE is the second most targeted country for ‘ransomware’ attacks in the Middle East. Experts say organized gangs and nation stages increasingly target financial institutions and critical sectors.  

What needs to change as CISOs experience increasing hacking burnout in preventing such malware intrusions? Can they operationalize technology in their prevention and incident response mechanism to address ransomware issues? 

The panel will discuss:  

  • Building an effective incident response and investigation mechanism  
  • How to deal with the recovery response process in the event of an attack
  • Taking a tactical and strategic approach to battling ransomware and protecting backups
Parthasarathy P
Bharat Raigangar
Ian Keller
  • 01:15 PM
  • 01:54 PM

Speaker Interviews

March 9 - 10, 2022

Middle East Summit