Admissions will follow a first-come, first-served basis, regardless of registration.
Meeting Room C.16
The Cloud Village explores the security challenges of cloud computing, including misconfigurations, identity and access management (IAM), and container security. Attendees gain hands-on experience with cloud pentesting, securing multi-cloud environments, and preventing supply chain attacks. With cloud adoption growing rapidly, this village helps security professionals understand evolving threats, implement best practices, and defend against real-world cloud vulnerabilities.
Meeting Room C.17
The Space and Aerospace Village is dedicated to securing aviation, space, and satellite systems against cyber threats. With modern aircraft, drones, and space infrastructure becoming more interconnected, this village provides hands-on training, expert discussions, and live demonstrations on air traffic control security, satellite communications, and avionics system defenses. Participants engage with engineers, pilots, and cybersecurity professionals to explore real-world vulnerabilities and solutions in the aerospace industry.
Meeting Room C.04
The Cryptocurrency Village at DEF CON is a dedicated space for exploring blockchain and crypto security. It offers hands-on activities, demonstrations, and discussions on securing digital assets, understanding vulnerabilities, and staying ahead of emerging threats in the cryptocurrency ecosystem.
Meeting Room C.15
The AI Village explores the intersection of artificial intelligence and cybersecurity, focusing on securing machine learning models, detecting adversarial attacks, and preventing AI-driven threats. Attendees can participate in live challenges, technical talks, and hands-on workshops covering topics like model poisoning, prompt injection, deepfake detection, and AI governance. With AI increasingly integrated into critical systems, this village provides a space to test, analyze, and improve AI security in real-world applications.
Meeting Room C.18
The ICS Village at DEF CON brings critical infrastructure to life, offering a hands-on, immersive experience into the world of industrial control systems and operational technology (OT) security. Focused on protecting power grids, water systems, factories, and other essential services, the village features live ICS/SCADA environments, simulated attacks, and defensive challenges. Attendees can explore real-world ICS hardware, learn how vulnerabilities are exploited, and practice securing systems through CTF competitions, red/blue team exercises, and expert-led workshops. Whether you’re an OT engineer, security professional, or curious newcomer, the ICS Village provides a rare, in-depth look at the intersection of cyber and physical systems.
• Deepfakes, offensive AI, and defensive automation.
• How leaders are preparing for an AI-centric cyber future
PANELISTS: TBA
MODERATOR: TBA
• How to enable secure, real-time intelligence sharing across regions and sectors.
• Role of AI/ML in proactive threat detection.
PANELISTS:
1. William Theyer, Head of Cyber (Gulf), UK
2. Mohammed Aldossari, Ciso and CDO, Tasheel Finance
3. Andrea Billet, Director of Certification and Supervision
ServiceNational Cybersecurity Agency
4. Sultan Alowais, Chief AI Officer, Ministry of Cabinet Affairs UAE
MODERATOR: TBA
Coordinated approaches to protect energy, water, health, transport
PANELISTS:
1. Abdulatif Alrushaid, Cybersecurity General Manager, Ministry of Industry and Mineral Resources, KSA
2. Khaled Alteneji, CISO, ENOC
3. Ali Abdulla Hassan Salman, Chief of Information Technology, Ministry of oil and environment, Bahrain
4. Goran Novkovic, Director, Industrial Cybersecurity, Toronto Transit Commission (TTC)
MODERATOR: TBA
PANELISTS:
1. Ahmed Al Bahdoor, Head of Cybersecurity, Oman Airport
MODERATOR: TBA
Company / Sponsors: AWS
Training session description / Inclusive: This session brings together leaders to discuss Bahrain’s cloud security journey, governance, and risk management. Participants will explore best practices, share experiences, and address regional cloud security challenges while building trust and resilience in cloud infrastructure.
Target Audience: Executives, C‑Suit
Note: Please bring your laptop
Registration Type: Invitations/AICS Private Registration
Company / Sponsors: EC-Council/ Kanoo IT
Training session description / Inclusive: This session builds essential cybersecurity awareness, helping participants recognize and prevent common threats through real-world examples and interactive activities. It equips employees and professionals with the foundational knowledge needed to protect themselves and their organizations from everyday cyber risks.
Target Audience: Employees, IT Professional
Note: Please bring your laptop
Registration Type: AICS Online Registration
Meeting Room C.05
Company / Sponsors: Reboot Coding Institute
Training session description / Inclusive: Project Theseus is an interactive AI security learning platform that utilizes gamification to educate users about the security challenges posed by artificial intelligence. The platform provides a dynamic environment where participants engage with an AI chatbot through practical scenarios, helping them understand AI security concepts, promote ethical use, and develop proactive protection strategies.
Target Audience: Youth, University Students
Note: Please bring your laptop
Registration Type: AICS Online Registration
Meeting Room C.05
Company / Sponsors: Reboot Coding Institute
Training session description / Inclusive: Project Theseus is an interactive AI security learning platform that utilizes gamification to educate users about the security challenges posed by artificial intelligence. The platform provides a dynamic environment where participants engage with an AI chatbot through practical scenarios, helping them understand AI security concepts, promote ethical use, and develop proactive protection strategies.
Target Audience: Youth, University Students
Note: Please bring your laptop
Registration Type: AICS Online Registration
Meeting Room C.07
Company / Sponsors: Immersive Labs
Training session description / Inclusive: Step into the Boardroom Challenge, where cybersecurity professionals experience the pressures of a real-world cyber crisis. This immersive simulation tests your decision-making, communication, and leadership under intense conditions, giving firsthand insight into managing complex incidents and safeguarding critical systems.
Target Audience: Executives C‑Suit
Note: Please bring your laptop
Registration Type: Invitations/AICS Private Registration
Meeting Room C.08
Company / Sponsors: Immersive Labs
Training session description / Inclusive: Step into the Resilience Arena and prove your cyber skills in a series of high-intensity, real-world challenges. Whether you’re a seasoned professional or an aspiring student, the Cyber Games are designed to test your speed, strategy, and resilience against evolving threats.
Target Audience: IT Professional , University Students
Note: Please bring your laptop
Registration Type: AICS Online Registration
Meeting Room C.09
Company / Sponsors: BIBF
Training session description / Inclusive:This two-day course equips participants with the knowledge, skills, and competence to implement and manage a compliance framework for the protection of personal data. It focuses on enabling delegates to fulfil the role of a Data Protection Officer (DPO) under data privacy practices. The training covers regulations in depth, including implementation requirements, necessary policies and processes, and key elements of effective data security management.
Target Audience: Data Privacy Officers (DPOs) and Data Guardians, and professionals in Risk, Compliance, Cybersecurity, and Legal functions.
Note: Please bring your laptop
Registration Type: BIBF Registration
Meeting Room C.10
Company / Sponsors: BIBF
Training session description / Inclusive:The CSX‑F programme is a foundational cybersecurity course designed to equip learners with essential knowledge of cybersecurity principles, security operations, and threat management. It provides a solid grounding in protecting organizational assets, understanding threats, and implementing core information security practices.
Target Audience: University Students , IT professionals
Note: Please bring your laptop
Registration Type: BIBF Registration
Meeting Room C.11
Company / Sponsors: UOB
Training session description / Inclusive: In today’s rapidly evolving digital landscape, software and mobile applications are increasingly targeted by sophisticated cyber threats. Proactive security measures are essential to identify and mitigate vulnerabilities before they can be exploited. This workshop aims to provide participants with a comprehensive understanding of static analysis techniques, empowering them to integrate these powerful methods into their software development lifecycle to build more secure and resilient applications.
Target Audience: University Students
Note: Please bring your laptop
Registration Type: AICS Online Registration
Meeting Room C.12
Company / Sponsors: Paramount
Training session description / Inclusive: This session explores Advanced Persistent Threats (APTs) and the MITRE D3FEND framework, showing how organizations can shift from reactive to proactive defense. It highlights how D3FEND maps defensive techniques to attacker tactics, enabling smarter decisions, stronger resilience, and targeted protection of Bahrain’s critical infrastructure against sophisticated cyber threats.
Target Audience: Executives , C‑Suit
Note: Please bring your laptop
Registration Type: AICS Online Registration
Meeting Room C.14
Company / Sponsors: AWS
Training session description / Inclusive: TBD
Target Audience: IT Professionals
Note: Please bring your laptop
Registration Type: AICS Online Registration
Meeting Room C.14
Company / Sponsors: AWS
Training session description / Inclusive: TBD
Target Audience: IT Professionals
Note: Please bring your laptop
Registration Type: AICS Online Registration
Meeting Room C.14
Company / Sponsors: AWS
Training session description / Inclusive: TBD
Target Audience: IT Professionals
Note: Please bring your laptop
Registration Type: AICS Online Registration
Meeting Room C.14
Company / Sponsors: AWS
Training session description / Inclusive: TBD
Target Audience: IT Professionals
Note: Please bring your laptop
Registration Type: AICS Online Registration