February 2026 proved to be a month of contrasts for cybersecurity in the UAE. Following the high-profile exposure of a data leak from December's Abu Dhabi Finance Week forum, the country's authorities unveiled a new protection strategy at the World Government Summit (WGS), successfully repelling tens of thousands of attacks.

In December 2025, the largest financial event in the MENA region – Abu Dhabi Finance Week (ADFW) – took place, gathering over 35,000 attendees. However, the digital repercussions of the event have only now come to light: a critical incident involving a data breach. An investigation by the Financial Times and Reuters revealed a vulnerability that left highly sensitive participant data exposed for two months.
As a result of the data leak, the following information belonging to delegates was discovered on an unsecured cloud server:
The Third-Party Problem: The Weak Link in a Reliable Chain
The ADFW incident has become a classic example of third-party risk. The leak did not occur due to a hack of Abu Dhabi's government systems, but rather through the fault of an external contractor responsible for the registration and document storage platform.
The third-party vendor's cloud storage was misconfigured: the data was accessible to any user through a standard web browser, with no password or authentication required. Organizers of events at this level often delegate IT infrastructure to contractors who do not always ensure a sufficient level of security.
WGS as a Response to Cyber Threats
In early February 2026, Dubai hosted the World Government Summit (WGS) – an event where world leaders and heads of international organizations gather to discuss global challenges. This time, cybersecurity issues took priority, and the summit transformed not only into a platform for dialogue but also into a primary target for hackers.
Dr. Mohamed Al Kuwaiti, Head of the Cybersecurity Council for the UAE Government, reported that over 90,000 targeted cyberattacks were successfully repelled during WGS. It was also mentioned that the country's digital ecosystem faces an average of 200,000 intrusion attempts daily, with more than 33% directed against government entities.
The contrast between these recent events is evident. The UAE is successfully building centralized information protection at the state level, as demonstrated by the repelled attacks at WGS and the establishment of strategic partnerships with global leaders in the field. However, the ADFW leak has served as yet another reminder that cybersecurity is a shared priority for all. In today's reality, a single insufficiently protected link in the business chain automatically jeopardizes the entire chain.
Effective cyber protection requires multi-layered security: defense not only against external threats but also against internal risks. Learn more about efficient practice of ensuring your organization's protection with the help of SearchInform Risk Monitor. The Next-Gen Data Loss Prevention (DLP) solution is designed to safeguard businesses from a wide range of internal threats and provides companies with highly sought-after protective capabilities, such as data classification, data loss prevention, and watermarks. Refer to the white paper to discover how a DLP system helps prevent hacker intrusions.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!