Agenda
CSO Conference is where you see what success looks like and learn from the best. Check back soon for 2025!

IDC Security Roadshow & CISO Excellence Awards
One day event
Registration & Networking
Welcome Address
IDC Keynote: Evolving Threats, Advanced Defenses: Cybersecurity in the Next Era
Cyber Protection for the Threats of Today and Tomorrow: Dynamic Security Strategies for Minimizing Risk
The Role of Cloud Security in the Edge Ecosystem
Implementing Effective Application Security Strategies
Cybersecurity as the Basis for Agile and Resilient Digital Business
Tea/Coffee & Networking
Platinum Tracks (Parallel Sessions)
Platinum Track A
10:54 – 10:55 > Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win iPhone 16
10:55 – 11:05 > Supply Chain Vulnerabilities and Mitigation Strategies
Delve into the increasing threat of supply chain attacks and discuss best practices for securing the supply chain in a globalized economy
11:05 – 11:10 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:10 – 11:20 > Securing Edge Devices in a Hybrid Work Environment
Focus on the security challenges posed by the proliferation of edge devices in hybrid work settings and explore strategies for securing these critical points in an organization’s infrastructure.
11:20 – 11:25 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:25 – 11:35 > AI-Driven Social Engineering
Discuss the rise of AI in social engineering attacks, including how threat actors utilize AI to craft more sophisticated phishing and social engineering schemes.
11:35 – 11:40 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:40 – 11:41 > Announcement of the iPhone 16 Raffle Draw Winner
Platinum Track B
10:54 – 10:55 > Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win iPhone 16
10:55 – 11:05 > The Future of Ransomware
Examine the latest trends in ransomware attacks, including double extortion tactics, and discuss evolving defence mechanisms and incident response strategies.
11:05 – 11:10 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:10 – 11:20 > Cyber Resilience for OT Environments
Address the specific challenges of protecting critical infrastructure sectors, such as energy, healthcare, and transportation, from sophisticated cyber threats and attacks.
11:20 – 11:25 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:25 – 11:35 > Regulatory Compliance in Cybersecurity
Discuss the evolving landscape of cybersecurity regulations, focusing on GDPR and other global data protection laws, and their impact on organizational security practices.
11:35 – 11:40 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:40 – 11:41 > Announcement of the iPhone 16 Raffle Draw Winner
Platinum Track C
10:54 – 10:55 > Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win iPhone 16
10:55 – 11:05 > Proactive Defense Against AI-Enhanced Cyber Threats
Explore how AI is being used not only by threat actors but also as a tool for proactive defense, including threat detection, incident response, and threat hunting.
11:05 – 11:10 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:10 – 11:20 > AI Hallucinations, Misinformation and Disinformation Campaigns
Analyze the impact of disinformation, misinformation and the inaccuracies generated by generative AI models in cyberspace, particularly in the context of geopolitical conflicts and elections.
11:20 – 11:25 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:25 – 11:35 > Threat Hunting: Proactive Defense Strategies
Introduce the concept of threat hunting and how organizations can actively seek out hidden threats before they result in breaches. Highlight methodologies and tools used in effective threat-hunting initiatives.
11:35 – 11:40 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
11:40 – 11:41 > Announcement of the iPhone 16 Raffle Draw Winner
Tea/Coffee & Networking
Blockchain and Cybersecurity: A Double-Edged Sword
Explore the intersection of blockchain technology and cybersecurity. Discuss potential benefits for securing data and the vulnerabilities that can arise from its implementation.
Future-Proofing Your Cybersecurity Strategy
Discuss strategies for developing a forward-looking cybersecurity strategy that anticipates future threats and technological advancements. Emphasize the importance of continuous adaptation and investment in security.
Cybersecurity Metrics: Measuring Success
Learn about the key metrics and KPIs that organizations should track to measure their cybersecurity posture. Discuss how to use these metrics for continuous improvement and reporting.
Mobile Security: Safeguarding Your Devices
Explore the specific security threats faced by mobile devices. Provide strategies for securing mobile applications and protecting sensitive data on smartphones and tablets.
Fireside Chat on Supply Chain Security: Ensuring Trustworthiness
Discuss the growing importance of securing supply chains in a globalized economy. Examine risks posed by third-party vendors and how to assess and manage these vulnerabilities.
Gold Tracks (Parallel Sessions)
Gold Track A
13:04 – 13:05 > Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win iPhone 16
13:05 – 13:15 > Software Supply Chain Attack Trends in 2025: Malicious Code, Exposed Secrets, AI, Containers, and More
Modern software development technologies and processes have given rise to a software supply chain rife with vulnerabilities that attackers can exploit. To help enterprise development and security teams understand what they are up against, this session will dive into some of the fastest growing, and most damaging, types of software supply chain attacks. It will present practical measures that enterprises can take to protect themselves against each of these specific attack vectors and conclude with a holistic approach that enterprises can take to achieve comprehensive software supply chain security.
13:15 – 13:20 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:20 – 13:30 > Securing Generative AI Models from Adversarial Attacks
Explore the vulnerabilities of GenAI models to adversarial attacks, where malicious actors subtly manipulate inputs to deceive AI systems and discuss strategies to safeguard these models.
13:30 – 13:35 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:35 – 13:45 > AI-Powered Cyberdefense: Securing Saudi Arabia’s Digital Vision 2030
As Saudi Arabia accelerates its Vision 2030 digital transformation, AI is both a powerful enabler and an emerging cybersecurity challenge. AI-driven cyberthreats, identity-based attacks, and insider risks are evolving rapidly, requiring organizations to rethink their security strategies. With 59% of CISOs increasing their security budgets, the focus is shifting to autonomous threat detection, AI-powered response, and proactive risk management. This session will explore how AI-driven cybersecurity solutions can help Saudi organizations stay ahead of evolving threats, safeguard critical infrastructure, and build a resilient digital ecosystem that supports the Kingdom’s ambitious vision for the future.
13:45 – 13:50 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:50 – 14:15 > End User Panel Discussion: AI security playbook: Actionable insights for CISOs
This panel explores the evolving cyber threat landscape and equips CISOs with actionable strategies to counter today’s most pressing challenges. Key discussions include emerging threats, modernizing incident response, and leveraging cutting-edge technologies like AI to strengthen cybersecurity defenses.
14:15 – 14:16 > Announcement of the iPhone 16 Raffle Draw Winner
Gold Track B
13:04 – 13:05 > Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win iPhone 16
13:05 – 13:15 > The Cybersecurity Landscape: Trends and Threats
Explore the evolving cybersecurity landscape, including emerging threats like ransomware, phishing, and insider attacks. Understand how these trends impact businesses and the importance of proactive measures.
13:15 – 13:20 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:20 – 13:30 > Zero Trust Architecture: Redefining Security
Delve into the principles of Zero Trust architecture and how it shifts the security paradigm from perimeter-based defences to continuous verification of user identities and device health.
13:30 – 13:35 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:35 – 13:45 > Incident Response: Building a Robust Plan
Discuss the critical components of an effective incident response plan. Learn how to prepare for, detect, respond to, and recover from security incidents to minimize damage and maintain business continuity.
13:45 – 13:50 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:50 – 14:15 > End User Panel Discussion: Designing Quantum and AI ready Cyber Strategies: Best Practices and Innovative Approaches for CISOs
Focusing on the development of robust cyber strategies, this panel examines how organizations can align their security initiatives with overarching business goals. Topics include balancing innovation with security, integrating threat intelligence into planning, and measuring the effectiveness of cybersecurity investments.
14:15 – 14:16 > Announcement of the iPhone 16 Raffle Draw Winner
Gold Track C
13:04 – 13:05 > Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win iPhone 16
13:05 – 13:15 > The Role of AI in Cybersecurity
Examine how artificial intelligence and machine learning are transforming cybersecurity strategies. Discover the benefits and challenges of integrating AI into threat detection and response.
13:15 – 13:20 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:20 – 13:30 > Phishing Attacks: Awareness and Prevention
Highlight the various types of phishing attacks and the tactics used by cybercriminals. Provide strategies for recognizing and preventing phishing attempts within organizations.
13:30 – 13:35 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:35 – 13:45 > Data Privacy Regulations: What You Need to Know
Review key data privacy regulations such as GDPR and CCPA. Discuss the implications for businesses and how to ensure compliance while safeguarding sensitive information.
13:45 – 13:50 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:50 – 14:15 > End User Panel Discussion: Outcome based security: Balancing Compliance and Budgets
This discussion addresses the challenges organizations face in meeting regulatory compliance requirements while managing budget constraints. Panelists will share insights on prioritizing cybersecurity investments, demonstrating ROI to stakeholders, and ensuring that financial limitations do not compromise security postures.
14:15 – 14:16 > Announcement of the iPhone 16 Raffle Draw Winner
Gold Track D
13:04 – 13:05 > Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win iPhone 16
13:05 – 13:15 > Securing Remote Work: Best Practices
Explore the unique challenges of securing remote work environments. Offer practical tips for securing endpoints, networks, and data in a distributed workforce.
13:15 – 13:20 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:20 – 13:30 > Cloud Security: Navigating Risks and Solutions
Discuss the security challenges associated with cloud computing and provide strategies for securing cloud environments. Address topics such as shared responsibility and data encryption.
13:30 – 13:35 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:35 – 13:45 > IoT Security: Protecting the Connected World
Investigate the security vulnerabilities of Internet of Things (IoT) devices. Discuss best practices for securing IoT ecosystems and mitigating risks associated with interconnected devices.
13:45 – 13:50 > Q&A (Ask Questions & Stand a Chance to Win a Raffle)
13:50 – 14:15 > End User Panel Discussion: Securing National Critical Infrastructure: Current Status and Future Directions
This session presents an assessment of the current security measures for national critical infrastructure and discusses future improvements and innovations.
14:15 – 14:16 > Announcement of the iPhone 16 Raffle Draw Winner
Mega Raffles
Lunch & Continued Networking
Stay tuned for exciting news!
Lorem ipsum dolor sit amet consectetur. Dui egestas in senectus suspendisse enim.Lorem ipsum dolor sit amet consectetur.
Register Now