Agenda

IT Security Summit Saudi Arabia

Agenda

IT Security Summit Saudi Arabia

One day event

8:30 am

Registration & Networking

9:00 am

IDC Welcome Address

Shilpi Handa

Shilpi Handa

Associate Research Director (META), IDC

9:05 am

IDC Keynote

Shilpi Handa

Shilpi Handa

Associate Research Director (META), IDC

9:20 am

Sovereign Security: Localizing Talent, Data, and Infrastructure

Middle East organizations are embedding digital sovereignty into their transformation strategies by localizing talent, infrastructure, and AI systems. Sovereign security platforms ensure sensitive data is stored and governed within national borders, reducing exposure to foreign jurisdiction and geopolitical risks. This approach is central to national security, public sector modernization, and technological independence.

9:40 am

AI-Powered Threat Detection and Response

Security service providers in the Middle East are integrating large language models and behavioral analytics to deliver real-time, AI-powered threat detection and response. These systems accelerate threat hunting, automate incident classification, and enable proactive defense against advanced cyber threats, transforming SOC operations and improving regulatory compliance.

9:55 am

Zero Trust Security Models for Government and BFSI

Zero trust security is gaining traction in government and BFSI sectors, driven by regulatory mandates and the need for robust data protection. Middle East governments are updating privacy laws and deploying zero trust frameworks to ensure continuous verification, minimize attack surfaces, and comply with evolving regulations.

10:10 am

Cloud Security: Compliance, Visibility, and Resilience

Cloud security strategies in the region focus on regulatory compliance, data sovereignty, and operational resilience. Organizations are prioritizing local cloud regions, hybrid architectures, and sovereign controls to meet data residency requirements, reduce latency, and ensure visibility across distributed environments.

10:25 am

Identity and Access Management (IAM): The Only Perimeter

With identity attacks on the rise, IAM is now the primary security perimeter. Organizations are shifting to platform-based IAM solutions, integrating advanced authentication, access controls, and behavioral analytics to defend against credential theft and insider threats.

10:35 am

Operational Technology (OT) Security for Critical Infrastructure

Energy, utilities, and manufacturing sectors are strengthening OT security to counter sophisticated cyber threats. The focus is on segmenting networks, deploying real-time monitoring, and integrating AI-driven analytics to protect critical infrastructure and ensure regulatory compliance.

10:45 am

Tea/ Coffee & Networking Break

11:15 am

Platinum Tracks (Parallel Sessions)

11:15 AM Start of Session Raffle

Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win Raffle prizes.

Platinum Track A

11:20 am – 11:35 am

Data Privacy and Protection: Navigating New Regulations

11:35 am – 11:50 am

Managed Detection and Response (MDR): The Digital Control Plane

11:50 am – 12:05 pm

AI-Driven Security Automation and Orchestration

Platinum Track B

11:20 am – 11:35 am

Cybersecurity Talent Development and Certification

11:35 am – 11:50 am

Supply Chain Security: Mitigating Third-Party Risks

11:50 am – 12:05 pm

Incident Response and Digital Forensics

Platinum Track C

11:20 am – 11:35 am

Security Analytics and Threat Intelligence Platforms

11:35 am – 11:50 am

Regulatory Compliance: Governance and Beyond

11:50 am – 12:05 pm

Healthcare Cybersecurity: Protecting Patient Data and Services

12:05 pm

Gold Tracks (Parallel Sessions)

Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win Raffle prizes.

Gold Track A

12:05 pm – 12:20 pm

Banking Sector Resilience: API Security and Open Banking

12:20 pm – 12:35 pm

GenAI Risks and Opportunities in Cybersecurity

12:35 pm – 12:50 pm

Security Awareness and Culture Building

12:50 pm – 1:20 pm

End User Panel Discussion: Secure AI in Action: Lessons from CISOs

Gold Track B

12:05 pm – 12:20 pm

Cloud-Native Security Architectures

12:20 pm – 12:35 pm

Quantum Readiness: Preparing for the Next Encryption Frontier

12:35 pm – 12:50 pm

Cybersecurity Talent Development and Certification

12:50 pm – 1:20 pm

End User Panel Discussion: Cloud Security: Balancing Innovation and Compliance

Gold Track C

12:05 pm – 12:20 pm

Supply Chain Security: Mitigating Third-Party Risks

12:20 pm – 12:35 pm

Incident Response and Digital Forensics

12:35 pm – 12:50 pm

Security Analytics and Threat Intelligence Platforms

12:50 pm – 1:20 pm

End User Panel Discussion: AI and Automation: Transforming Security Operations

Gold Track D

12:05 pm – 12:20 pm

Regulatory Compliance: Governance and Beyond

12:20 pm – 12:35 pm

Healthcare Cybersecurity: Protecting Patient Data and Services

12:35 pm – 12:50 pm

Banking Sector Resilience: API Security and Open Banking

12:50 pm – 1:20 pm

End User Panel Discussion: Identity Security: The New Battleground

1:20 pm

Mega Raffle Announcement

1:25 pm

Lunch & Networking

Be Part of it!

REGISTER NOW