- 15:45
- Thu
- 28 Nov
Presenter:
- 16:10
- Thu
- 28 Nov
In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.
Presenter:
- 16:30
- Thu
- 28 Nov
This panel explores Saudi Arabia's role in shaping global cyber governance as the Kingdom drives policy development for the digital age. Experts will discuss collaborative strategies for building resilient frameworks, addressing international cybersecurity challenges, and fostering innovation in alignment with global standards. Attendees will gain insights into Saudi Arabia's impact on global cyber policies and its vision for a secure, interconnected digital future.
Presenter:
- 17:15
- Thu
- 28 Nov
Presenter:
- 17:50
- Thu
- 28 Nov
- 13:00
- Tue
- 26 Nov
Presenter:
- 13:40
- Tue
- 26 Nov
In this session, cybersecurity leaders from the finance, technology, and aerospace sectors, will reveal strategies for maintaining resilience and business continuity in the face of cyber threats. Attendees will gain insights into how these high-stakes industries prepare for, respond to, and recover from cybersecurity events. Expect to leave with actionable steps for strengthening organizational resilience, implementing robust disaster recovery plans, and minimizing downtime during critical incidents.
Presenter:
- 14:20
- Tue
- 26 Nov
Presenter:
- 15:00
- Tue
- 26 Nov
In today's rapidly evolving technological landscape, organizations face a tough choice: stick to outdated compliance strategies and defensive tactics or push the boundaries while trying to stay compliant at the cost of business innovation. This briefing highlights teams who have taken a different approach, leveraging technologies like AI and data science to create transformative compliance programs and cyber defensive strategies. Their success stories, as heard from an attacker perspective, reveal not only how they outmaneuvered adversaries but also how they disrupted those attempting to mimic their strategies. Leave with applicable strategies you can put to work for your organization's program and see results today!
Presenter:
- 15:40
- Tue
- 26 Nov
Presenter:
- 16:40
- Tue
- 26 Nov
Join us for an exclusive book signing of Cyber Defense Matrix: The Essential Guide to Navigating the Cybersecurity Landscape. Meet the author, gain insights into building a resilient cybersecurity framework, and take home your own signed copy!
Presenter:
- 17:00
- Tue
- 26 Nov
Explore the role of cybersecurity in shaping Saudi Arabia's ambitious smart city projects. This session delves into safeguarding advanced infrastructure, protecting critical data, and ensuring seamless connectivity in the Kingdom's cutting-edge urban developments.
Presenter:
- 17:40
- Tue
- 26 Nov
Presenter:
- 18:20
- Tue
- 26 Nov
Presenter:
- 18:50
- Tue
- 26 Nov
Don’t miss the chance to meet the author of Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About Them. Explore the fascinating world of machine learning vulnerabilities and get your own signed copy of this must-read book!
Presenter:
- 12:35
- Wed
- 27 Nov
Presenter:
- 13:15
- Wed
- 27 Nov
Presenter:
- 13:55
- Wed
- 27 Nov
Presenter:
- 14:35
- Wed
- 27 Nov
Presenter:
- 15:15
- Wed
- 27 Nov
Presenter:
- 16:15
- Wed
- 27 Nov
World Network is tackling the challenge of "proof of human" by creating a secure, scalable identity framework accessible to all - the universal World ID, designed to protect individual privacy. This session explores how World balances technical innovation with risks tied to data security and the rising threats of AI-driven disinformation. Attendees will gain insights into how World's approach to digital identity could transform trust and access on a global scale.
Presenter:
- 16:55
- Wed
- 27 Nov
Cloud computing has delivered every organization an ability to forge their own technology destiny and avoid getting locked-in to a single application vendor.
From a user identity perspective, Single Sign On (via standards like SAML and OIDC) and automated user provisioning (via standards like SCIM) provided guardrails for safely integrating new cloud applications without increasing an organization’s attack surface.
But where federated identity has denied numerous opportunities for attackers, it’s also created new ones: motivated adversaries will attempt to exploit the blind spots created in integrations between cloud applications.
Closing these gaps requires a lift from every participant in the ecosystem: identity providers, SaaS apps and the end consumer of these applications. In this session, Okta APJ CSO Brett Winterford provides a checklist for what every CISO should require from their application vendors to secure their SaaS ecosystem.
Presenter:
- 17:35
- Wed
- 27 Nov
Presenter:
- 18:05
- Wed
- 27 Nov
Join us for an exclusive book signing featuring top cybersecurity authors. Explore The CISO Desk Reference Guide, Executive Primer for strategic insights tailored to CISOs, and Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level for expert guidance on building a successful career in the field. Don’t miss this chance to connect with the authors and take home signed copies of these essential reads!
Presenter: