Skip to main content
Search Icon
Search Icon
Predictive Intelligence
  • 15:45
  • Thu
  • 28 Nov
Stage: Executive Summit

Format: Panel

Presenter:

How To Create Successful Malware and Defend with Zero Trust
  • 16:10
  • Thu
  • 28 Nov
Stage: Executive Summit

Format: Sponsored Session

In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.

Presenter:

Saudi Arabia & Global Cyber Governance: Shaping Policy for the Digital Age
  • 16:30
  • Thu
  • 28 Nov
Stage: Executive Summit

Format: Panel

This panel explores Saudi Arabia's role in shaping global cyber governance as the Kingdom drives policy development for the digital age. Experts will discuss collaborative strategies for building resilient frameworks, addressing international cybersecurity challenges, and fostering innovation in alignment with global standards. Attendees will gain insights into Saudi Arabia's impact on global cyber policies and its vision for a secure, interconnected digital future.

Presenter:

Briefings Wrap Up
  • 17:15
  • Thu
  • 28 Nov
Stage: Executive Summit

Format: Panel

Presenter:

Cyberseed Pitch Finale
  • 17:50
  • Thu
  • 28 Nov
Stage: Executive Summit

Building a Threat Intelligence Program: From reactive intelligence to a threat led approach to cybersecurity
  • 13:00
  • Tue
  • 26 Nov
Stage: Deep Dive

Format: Keynote

Presenter:

Beyond the Breach: Ensuring Resiliency and Business Continuity in Cyber Crisis
  • 13:40
  • Tue
  • 26 Nov
Stage: Deep Dive

Format: Panel

In this session, cybersecurity leaders from the finance, technology, and aerospace sectors, will reveal strategies for maintaining resilience and business continuity in the face of cyber threats. Attendees will gain insights into how these high-stakes industries prepare for, respond to, and recover from cybersecurity events. Expect to leave with actionable steps for strengthening organizational resilience, implementing robust disaster recovery plans, and minimizing downtime during critical incidents.

Presenter:

Rebooting your security program: Opportunities await!
  • 14:20
  • Tue
  • 26 Nov
Stage: Deep Dive

Format: Keynote

Presenter:

Outsmarting the Adversary: Harnessing Innovative Governance, Risk, and Compliance defeat modern adversaries and tactics (auditors too!)
  • 15:00
  • Tue
  • 26 Nov
Stage: Deep Dive

Format: Keynote

In today's rapidly evolving technological landscape, organizations face a tough choice: stick to outdated compliance strategies and defensive tactics or push the boundaries while trying to stay compliant at the cost of business innovation. This briefing highlights teams who have taken a different approach, leveraging technologies like AI and data science to create transformative compliance programs and cyber defensive strategies. Their success stories, as heard from an attacker perspective, reveal not only how they outmaneuvered adversaries but also how they disrupted those attempting to mimic their strategies. Leave with applicable strategies you can put to work for your organization's program and see results today!

Presenter:

Cyber Defense Matrix
  • 15:40
  • Tue
  • 26 Nov
Stage: Deep Dive

Format: Keynote

Presenter:

Book Signing
  • 16:40
  • Tue
  • 26 Nov
Stage: Deep Dive

Format: Book Signing

Join us for an exclusive book signing of Cyber Defense Matrix: The Essential Guide to Navigating the Cybersecurity Landscape. Meet the author, gain insights into building a resilient cybersecurity framework, and take home your own signed copy!

Presenter:

Cybersecurity in the Development of Saudi Smart Cities
  • 17:00
  • Tue
  • 26 Nov
Stage: Deep Dive

Format: Fireside

Explore the role of cybersecurity in shaping Saudi Arabia's ambitious smart city projects. This session delves into safeguarding advanced infrastructure, protecting critical data, and ensuring seamless connectivity in the Kingdom's cutting-edge urban developments.

Presenter:

Unveiling the Unknown: Discovering, Analyzing, and Mitigating a New Zero-Day Attack
  • 17:40
  • Tue
  • 26 Nov
Stage: Deep Dive

Format: Keynote

Presenter:

Not with a Bug, But with a Sticker
  • 18:20
  • Tue
  • 26 Nov
Stage: Deep Dive

Format: Keynote

Presenter:

Book Signing
  • 18:50
  • Tue
  • 26 Nov
Stage: Deep Dive

Format: Book Signing

Don’t miss the chance to meet the author of Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About Them. Explore the fascinating world of machine learning vulnerabilities and get your own signed copy of this must-read book!

Presenter:

The State of VC in Cybersecurity
  • 12:35
  • Wed
  • 27 Nov
Stage: Deep Dive

Format: Panel

Presenter:

Neuro Diversity & Psychological Safety
  • 13:15
  • Wed
  • 27 Nov
Stage: Deep Dive

Format: Keynote

Presenter:

Automation to Autonomy: The Evolution of Intelligence in Cyber
  • 13:55
  • Wed
  • 27 Nov
Stage: Deep Dive

Format: Keynote

Presenter:

AI-Powered Cybersecurity: Promises & Perils
  • 14:35
  • Wed
  • 27 Nov
Stage: Deep Dive

Format: Keynote

Presenter:

Hacking the US Elections
  • 15:15
  • Wed
  • 27 Nov
Stage: Deep Dive

Format: Keynote

Presenter:

Proving Humanness in the Age of AI and Digital Interactions
  • 16:15
  • Wed
  • 27 Nov
Stage: Deep Dive

Format: Keynote

World Network is tackling the challenge of "proof of human" by creating a secure, scalable identity framework accessible to all - the universal World ID, designed to protect individual privacy. This session explores how World balances technical innovation with risks tied to data security and the rising threats of AI-driven disinformation. Attendees will gain insights into how World's approach to digital identity could transform trust and access on a global scale.

Presenter:

How To Make SaaS a Safer Choice
  • 16:55
  • Wed
  • 27 Nov
Stage: Deep Dive

Format: Keynote

Cloud computing has delivered every organization an ability to forge their own technology destiny and avoid getting locked-in to a single application vendor.


From a user identity perspective, Single Sign On (via standards like SAML and OIDC) and automated user provisioning (via standards like SCIM) provided guardrails for safely integrating new cloud applications without increasing an organization’s attack surface.


But where federated identity has denied numerous opportunities for attackers, it’s also created new ones: motivated adversaries will attempt to exploit the blind spots created in integrations between cloud applications.


Closing these gaps requires a lift from every participant in the ecosystem: identity providers, SaaS apps and the end consumer of these applications. In this session, Okta APJ CSO Brett Winterford provides a checklist for what every CISO should require from their application vendors to secure their SaaS ecosystem.


Presenter:

Gen AI and the Security Team - A Case Study
  • 17:35
  • Wed
  • 27 Nov
Stage: Deep Dive

Format: Keynote

Presenter:

Book Signing
  • 18:05
  • Wed
  • 27 Nov
Stage: Deep Dive

Format: Book Signing

Join us for an exclusive book signing featuring top cybersecurity authors. Explore The CISO Desk Reference Guide, Executive Primer for strategic insights tailored to CISOs, and Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level for expert guidance on building a successful career in the field. Don’t miss this chance to connect with the authors and take home signed copies of these essential reads!

Presenter: