- 14:05
- Wed
- 27 Nov
As AI reshapes our digital landscape, biometric technology is emerging as a powerful tool for establishing identity, trust, and security at scale. In this keynote, Tools for Humanity’s Chief Legal and Privacy Officer, Damien Kieran, explores how World Network’s use of biometrics not only addresses the "proof of human" challenge but also sets new standards in data protection to mitigate risk. Attendees will gain insights into navigating the ethical and practical dimensions of balancing privacy, security, and individual empowerment in the age of AI.
Presenter:
- 14:25
- Wed
- 27 Nov
This summer heralded the first 3 NIST Post Quantum Cryptography Algorithms, but many organizations don't know how to proceed further. In this talk we will discuss how to navigate the transition to post-quantum cryptography (PQC) to safeguard organizational data against future quantum threats.
Presenter:
- 14:45
- Wed
- 27 Nov
The development of the digital economy necessitates the advancement of sovereign digital security. This presentation will highlight key examples of critical mistakes made in building sovereign security systems. Despite continuous advancements in cybersecurity technologies, processes, and standards, the number of cyberattacks and the resulting damage continue to grow rapidly. A change in approach is needed, or the situation will keep worsening. A new approach will be proposed, outlining what the future of security might look like.
Presenter:
- 15:05
- Wed
- 27 Nov
The convergence of business, employees, and customers into one digital ecosystem is changing the way security leaders and practitioners must look at their business and the overall threat landscape. While we may work in specific industries, factors including the cloud, third party services, supply chain and a mobile workforce mean we must explore multiple risk scenarios for how we enable business growth, expand customer connectivity, and meet the expectations of stakeholders. This session will explore the changes taking place at a rapid pace and some of the ways we can change our mindset and strategies to grow as leaders regardless of title.
Presenter:
- 15:25
- Wed
- 27 Nov
In an era of daily breaches and growing cyber paranoia, building a brand that customers trust is your biggest competitive advantage. This high-impact presentation will reveal the art and science behind creating a cybersecurity brand that stands out in a sea of uncertainty. Learn the secrets to becoming the go-to security leader that your clients rely on, building not just products but long-term confidence and loyalty.
Presenter:
- 15:45
- Wed
- 27 Nov
In the rapidly evolving landscape of cyber warfare, where information flows freely and unpredictably, the traditional fortress mentality is no longer enough. As CISOs, we must recognise that the battlefield is neither uniform nor static—it’s constantly diversifying and reshaping. It's time to stop hiding behind excuses of inadequate funding, blaming users, or lamenting organisational silos.
The digital age is driving an unprecedented shift towards consumerisation, intertwining lives and livelihoods with connected experiences. This reality demands that security organisations pivot from merely defending against threats to becoming proactive value creators. To thrive in this new era, CISOs must lead with purpose, transforming their strategies into powerful narratives that build trust and resonate with consumers. We need to get out of our own way!
Join Ash to discuss
Redefining Value — How do you shift your approach and organisation as a driver of business value, not just a gatekeeper
Crafting the ‘Why’ — Discovering the steps to develop a compelling purpose that makes Cyber Trust a key differentiator for your brand
Stand for Something — Embrace a culture that transcends merely challenging the status quo by creating a security strategy that stands for something meaningful and impactful
Presenter:
- 16:05
- Wed
- 27 Nov
Fundamental aspects of cybersecurity and their role in building effective strategies. I will offer guidance on selecting trustworthy partners in cybersecurity, highlighting essential factors to consider in choosing service providers. This talk aims to equip organizations with insights to make well-informed decisions when strengthening their security posture.
Presenter:
- 16:25
- Wed
- 27 Nov
Presenter:
- 16:45
- Wed
- 27 Nov
Examine the complex risks of software supply chain breaches, covering legal, regulatory, and financial impacts. Experts will discuss strategies to mitigate third-party vulnerabilities and navigate the evolving landscape of compliance and accountability.
Presenter:
- 17:25
- Wed
- 27 Nov
With the high reliance on Technology that created many opportunities such as easing life and introducing smart services and products, it also creates many threat channels, with this fast paced world, Cyber Security can be missed, with this gap attackers can leverage that which may lead to negative consequences, in this presentation, Mr. Mohammad AlNasser, Chief Risk Officer @ Saudi Credit Bureau, will take us in how we complete the role of Cyber Security, in a way that supports the business grow and controls are effectively enabled!
Presenter:
- 17:45
- Wed
- 27 Nov
Ransomware remains a persistent and potent threat to organizations worldwide, inflicting financial losses and severe operational disruptions. This session will dissect the ever-evolving tactics and sophisticated attack patterns employed by ransomware actors, from encryption advancements to multi-stage infiltration techniques. Through an understanding of these intricate strategies, you'll gain critical insights needed to fortify your defenses and proactively counter ransomware threats, safeguarding your organization's essential assets and operational resilience.
Presenter:
- 18:05
- Wed
- 27 Nov
This session will explore the paradox of rising cybersecurity investments that fail to translate into stronger security postures, leaving many organizations cyber-rich but still vulnerable. As digital interconnectedness deepens, we’ll focus on how underserved groups remain disproportionately exposed to cyber threats, despite growing global cyber budgets. Attendees will learn how smarter, more inclusive cyber economic strategies can bridge this gap and create a resilient, secure digital future for all.
Presenter:
- 18:25
- Wed
- 27 Nov
Presenter:
- 18:45
- Wed
- 27 Nov
Presenter:
- 12:00
- Thu
- 28 Nov
- 12:05
- Thu
- 28 Nov
Presenter:
- 12:25
- Thu
- 28 Nov
Cyber-predictability is an emerging field that leverages advanced technologies like AI and machine learning to analyze vast amounts of data and predict future trends. This talk explores the potential of cyber-predictability to be used inside your organization today.
Key points discussed include:
• The power of predictive analytics: We can uncover hidden patterns and insights to make much better-informed decisions.
• Scenario planning: Predictive models can help us explore multiple future scenarios, enabling us to anticipate and prepare for potential challenges.
• Risk assessment and mitigation: Cyber-predictability can identify potential risks and help us develop mitigation strategies.
• Metrics and Data Sets usage: We will look at overall Cybercrime, Vulnerabilities, Patching, and trends.
Cyber-predictability offers immense potential to shape our future. By embracing this technology, we can harness its power to create forecasting and predictability for the organization.
Presenter:
- 12:45
- Thu
- 28 Nov
The role of the CISO has become more demanding than ever, requiring a balance between leadership, managing burnout, and promoting inclusive practices. This session will explore strategies for CISOs to lead effectively while maintaining personal well-being and fostering diverse, inclusive security teams. Experts will share insights on overcoming the challenges of burnout and building sustainable leadership models in an increasingly complex cybersecurity landscape.
Presenter:
- 13:25
- Thu
- 28 Nov
Presenter:
- 13:45
- Thu
- 28 Nov
Being a CISO is one of the most challenging roles in any organization, marked by high stake and relentless pressure. Yet, many of the hard-won lessons learned in this role remain unspoken. This session distills insights from interviews with over 20 veteran CISOs, exploring how to balance risk and innovation, navigate organizational dynamics, and lead with resilience. These lessons go beyond cybersecurity—they shape leadership itself. Attendees will leave with actionable strategies for thriving in the CISO role and empowering their organizations to succeed.
Presenter:
- 14:05
- Thu
- 28 Nov
As businesses continue to migrate to the cloud, ensuring privacy, authentication, and data verification is more critical than ever. This session will explore the latest strategies and technologies for securing cloud environments, focusing on privacy protections, advanced authentication methods, and reliable data verification techniques. Experts will discuss how to address emerging challenges while maintaining trust and compliance in the cloud ecosystem.
Presenter:
- 14:45
- Thu
- 28 Nov
Presenter:
- 15:05
- Thu
- 28 Nov
The digital world is rapidly evolving. Thanks to real-time security news on digital transformations, it is now evident that cyber-attacks, data leaks, and vulnerability risks have had a fair share in “staining” the entire digital landscape as our reliance on technology increases. This begs the question: are we really adapting to these rapid changes or just following the status quo?
Here’s something you want to think about. What if I told you that we may be missing a significant point? Sticking to the generally accepted cybersecurity tenets encourages a focus ONLY on confidentiality, integrity, and availability - completely eliminating the true concept of “TRUST” in digital services. Redefining these tenets will not only take us a step closer to a more balanced digital matrix, but will eventually bridge the gap between cybersecurity and digital trust, and build resilience inside out.
This session discusses the need to redefine cybersecurity and explains why adding a “Trust” tenet to the conventional CIA triad will make a lot of difference in cybersecurity and security posture management as we know it today.
Presenter:
- 15:25
- Thu
- 28 Nov
The crypto revolution is reshaping how people own and manage digital value, but the rise of self-custody and blockchain immutability also introduces paramount security challenges. As hacking methods become more sophisticated, one thing is clear: the computers and smartphones we use daily weren’t built for security purposes. Crypto and Blockchain technologies can change the world, but require new security standards and a new generation of consumer devices in order to go mainstream.
Presenter: