Saudi Global CISO Summit

Avatar
[[{“value”:”

May 20-21, 2024
Location: Riyadh – KSA

We are delighted to present to you the Saudi Global CISO Summit, a premier cybersecurity gathering set to take place on May 20-21, 2024, from 8 AM to 4 PM in Riyadh, KSA.

This distinguished event will unite global leaders in safeguarding the digital frontier, offering invaluable insights, networking opportunities, and innovative solutions to address the evolving challenges in information security.

With over 1,000 attendees, including 50 speakers, 100 government officials, and 500 CISO/CTO/CIOs, the Saudi Global CISO Summit promises to drive impactful discussions and connectivity among cybersecurity professionals and thought leaders from around the world.

Attendees can expect cutting-edge insights into the latest trends, challenges, and strategies shaping the cybersecurity landscape. The event will feature a CyberInnovation Expo showcasing innovative solutions and technologies, along with expert perspectives on cybersecurity best practices and emerging trends.

The two-day agenda will cover key themes such as elevating cybersecurity, securing AI in critical infrastructure, risk assessment in ICS environments, insider threat perspectives, zero trust endpoint security, incident response enhancement, cybersecurity governance best practices, and successful cybersecurity implementation case studies. The summit will culminate in a closing ceremony featuring the CISO Awards & Gala Dinner, celebrating cybersecurity excellence.

We invite you to join us in promoting this important event and together, let’s elevate cybersecurity excellence and unite global leaders in safeguarding the digital frontier.

The post Saudi Global CISO Summit appeared first on CISO MAG | Cyber Security Magazine.

“}]] 

Total
0
Shares
Previous Post

St. Louis Cybersecurity Conference

Next Post

AI in Cyber Online

Related Posts

New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet

Cybersecurity researchers have uncovered a new cryptojacking campaign targeting the Docker Engine API with the goal of co-opting the instances to join a malicious Docker Swarm controlled by the threat actor. This enabled the attackers to "use Docker Swarm's orchestration features for command-and-control (C2) purposes," Datadog researchers Matt Muir and Andy Giron said in an analysis. The attacks
Avatar
Read More