Alliance - A union formed for mutual benefit

CISO Digital Alliances Session Information

Date: Thursday, 16th February 2023

Time: 09:00 – 10:30 pm (EGY)

Location:  Invite only by Regional Director – Microsoft Teams

The Alliances chapter is a gathering consists of business risk, information and cyber security leaders who have been highlighted as being able to offer value in terms of content and influence. It is designed to form alliances and to drive progressive change in the business world and beyond.

The content and format is designed to talk together, learn better and experience more. 

Format: Invite only Security Leaders debating pertinent, real life issues through the form of digital open forum.

Chatham House Rule will be applied


  1. Depth achieved around business objectives where the opportunity of experience within the attendees is leveraged
  2. Benchmarking and verification of thought processes outside of existing networks i.e. the broader CISO Alliances community
  3. Industry progression and unity in impacting the challenges of the common business objectives
  4. Not corporate flag waiving or sales pitches.  We insist, do that elsewhere.


A union formed for mutual benefit


Digital Alliances Chapter Overview

Welcome Remarks & Joining Time

Focused Session

Session Leader: Islam Tharwat, Ph.D., Assistant Professor at the School of Information Technology and Computer Sciences at Nile University, and Chair of Awareness and Customer Advocacy S/C at IEEE Computer Society Distinguished Visitor Program (DVP).

Session Title: “Harnessing Machine Learning and Artificial Intelligence in Cybersecurity”

Session Synopsis:

Because of their ability to rapidly analyze millions of events and identify a wide range of threats, Artificial Intelligence (AI), and Machine Learning (ML) have emerged as critical technologies in information security, from malware exploiting zero-day vulnerabilities to identifying risky behavior that could lead to a phishing attack or the download of malicious code. These systems learn over time, depending on previous experiences to recognize new hazards in the present. Some of the themes of interest include, but are not limited to:

• Zero Trust models and zero-day attacks.
• Intrusion deception techniques.
• Attack detection and defending.
• Information-theoretic security and privacy.
• Autonomous intrusion response systems.
• Data confidentiality and privacy.
• Authentication and access control.
• Application of efficient machine intelligence to cybercrimes and attacks.
• Efficient machine intelligence application to cybercrimes and attacks.

Dr. Tharwat will lead the discussion drawing on recent scientific research, case studies, and experiences to help information security teams reduce breach risks and improve their security posture efficiently and effectively.

Debate & Questions

Action Areas and Next Steps