AICS AICS Logo

Partner Organizations

Hosted By

National Cyber Security Center

Organised By

Faalyat

Strategic Partner

EDB Bahrain

In Collaboration with

DEFCON

Agenda

Admissions will follow a first-come, first-served basis, regardless of registration.

DEF CON Villages

Meeting Room C.16

DEF CON Cloud Village

09:00 - 16:00

Meeting Room C.16

The Cloud Village explores the security challenges of cloud computing, including misconfigurations, identity and access management (IAM), and container security. Attendees gain hands-on experience with cloud pentesting, securing multi-cloud environments, and preventing supply chain attacks. With cloud adoption growing rapidly, this village helps security professionals understand evolving threats, implement best practices, and defend against real-world cloud vulnerabilities.

Meeting Room C.17

DEF CON Space and Aerospace Village

09:00 - 16:00

Meeting Room C.17

The Space and Aerospace Village is dedicated to securing aviation, space, and satellite systems against cyber threats. With modern aircraft, drones, and space infrastructure becoming more interconnected, this village provides hands-on training, expert discussions, and live demonstrations on air traffic control security, satellite communications, and avionics system defenses. Participants engage with engineers, pilots, and cybersecurity professionals to explore real-world vulnerabilities and solutions in the aerospace industry.

Meeting Room C.04

DEF CON Cryptocurrency Village

09:00 - 16:00

Meeting Room C.04

The Cryptocurrency Village at DEF CON is a dedicated space for exploring blockchain and crypto security. It offers hands-on activities, demonstrations, and discussions on securing digital assets, understanding vulnerabilities, and staying ahead of emerging threats in the cryptocurrency ecosystem.

Meeting Room C.15

DEF CON AI Village

09:00 - 16:00

Meeting Room C.15

The AI Village explores the intersection of artificial intelligence and cybersecurity, focusing on securing machine learning models, detecting adversarial attacks, and preventing AI-driven threats. Attendees can participate in live challenges, technical talks, and hands-on workshops covering topics like model poisoning, prompt injection, deepfake detection, and AI governance. With AI increasingly integrated into critical systems, this village provides a space to test, analyze, and improve AI security in real-world applications.

Meeting Room C.18

DEF CON ICS Village

09:00 - 16:00

Meeting Room C.18

The ICS Village at DEF CON brings critical infrastructure to life, offering a hands-on, immersive experience into the world of industrial control systems and operational technology (OT) security. Focused on protecting power grids, water systems, factories, and other essential services, the village features live ICS/SCADA environments, simulated attacks, and defensive challenges. Attendees can explore real-world ICS hardware, learn how vulnerabilities are exploited, and practice securing systems through CTF competitions, red/​blue team exercises, and expert-led workshops. Whether you’re an OT engineer, security professional, or curious newcomer, the ICS Village provides a rare, in-depth look at the intersection of cyber and physical systems.

Plenary Stage

Strategic Cyber Leadership in an AI Disrupted World

VIP Registration & Networking Breakfast

08:00

Official Opening & Royal Welcome Address Remarks by His Royal Highness the Crown Prince (or representative)

09:45

Welcome Address by NCSC Bahrain

09:50

Welcome Address by Jeff Moss, CEO and founder DEFCON

09:55

Opening Leadership Panel | Cybersecurity in the Age of AI Disruption

10:15

• Deepfakes, offensive AI, and defensive automation.

• How leaders are preparing for an AI-centric cyber future

PANELISTS: TBA

MODERATOR: TBA

Keynote Presentation AWS

11:00

Panel 2: Cyber Threat Intelligence Without Borders

11:20

• How to enable secure, real-time intelligence sharing across regions and sectors.

• Role of AI/ML in proactive threat detection.

PANELISTS:

1. William Theyer, Head of Cyber (Gulf), UK

2. Mohammed Aldossari, Ciso and CDO, Tasheel Finance

3. Andrea Billet, Director of Certification and Supervision

ServiceNational Cybersecurity Agency

4. Sultan Alowais, Chief AI Officer, Ministry of Cabinet Affairs UAE

MODERATOR: TBA

VIP Exhibition Tour & Networking Break

12:00

Fireside Chat: From Cyber Strategy to Cyber Culture: Embedding security into national and corporate DNA.

12:30

Panel 3: Resilience by Design: Securing Critical National Infrastructure

12:45

Coordinated approaches to protect energy, water, health, transport

PANELISTS:

1. Abdulatif Alrushaid, Cybersecurity General Manager, Ministry of Industry and Mineral Resources, KSA

2. Khaled Alteneji, CISOENOC

3. Ali Abdulla Hassan Salman, Chief of Information Technology, Ministry of oil and environment, Bahrain

4. Goran Novkovic, Director, Industrial Cybersecurity, Toronto Transit Commission (TTC)

MODERATOR: TBA

Keynote Address/Fire side Chat: Cyber Diplomacy in a Fragmented World

13:30

Panel 4: Beyond Compliance: Measuring Cyber Readiness From tick-box compliance to active resilience – developing meaningful metrics.

13:50

PANELISTS:

1. Ahmed Al Bahdoor, Head of Cybersecurity, Oman Airport

MODERATOR: TBA

Keynote Presentation

14:30

Closing Remarks – Day 1

14:45

Networking Lunch & Exhibition & Meetings

14:45 - 16:00

VIP AND SPEAKERS’ DINNER

16:00

Training Sessions

Executive Cloud Security Roundtable

00:00 - 02:00

Company / Sponsors: AWS

Training session description / Inclusive: This session brings together leaders to discuss Bahrain’s cloud security journey, governance, and risk management. Participants will explore best practices, share experiences, and address regional cloud security challenges while building trust and resilience in cloud infrastructure.


Target Audience: Executives, C‑Suit

Note: Please bring your laptop

Registration Type: Invitations/​AICS Private Registration 

Cybersecurity Awareness Foundations

10:00 - 14:00

Company / Sponsors: EC-Council/ Kanoo IT

Training session description / Inclusive: This session builds essential cybersecurity awareness, helping participants recognize and prevent common threats through real-world examples and interactive activities. It equips employees and professionals with the foundational knowledge needed to protect themselves and their organizations from everyday cyber risks.


Target Audience: Employees, IT Professional 

Note: Please bring your laptop

Registration Type: AICS Online Registration

Meeting Room C.05

Training Session: Project Theseus: interactive AI security learning platform (BATCH 1)

10:00 - 13:00

Meeting Room C.05

Company / Sponsors: Reboot Coding Institute

Training session description / Inclusive: Project Theseus is an interactive AI security learning platform that utilizes gamification to educate users about the security challenges posed by artificial intelligence. The platform provides a dynamic environment where participants engage with an AI chatbot through practical scenarios, helping them understand AI security concepts, promote ethical use, and develop proactive protection strategies.

Target Audience: Youth, University Students

Note: Please bring your laptop

Registration Type: AICS Online Registration

Training Session: Project Theseus: interactive AI security learning platform (BATCH 2)

02:00 - 17:00

Meeting Room C.05

Company / Sponsors: Reboot Coding Institute

Training session description / Inclusive: Project Theseus is an interactive AI security learning platform that utilizes gamification to educate users about the security challenges posed by artificial intelligence. The platform provides a dynamic environment where participants engage with an AI chatbot through practical scenarios, helping them understand AI security concepts, promote ethical use, and develop proactive protection strategies.

Target Audience: Youth, University Students 

Note: Please bring your laptop

Registration Type: AICS Online Registration

Meeting Room C.07

Crisis Simulation: The Boardroom Challenge ( Batch - 1 )

10:00 - 12:00

Meeting Room C.07

Company / Sponsors: Immersive Labs

Training session description / Inclusive: Step into the Boardroom Challenge, where cybersecurity professionals experience the pressures of a real-world cyber crisis. This immersive simulation tests your decision-making, communication, and leadership under intense conditions, giving firsthand insight into managing complex incidents and safeguarding critical systems.

Target Audience: Executives C‑Suit

Note: Please bring your laptop

Registration Type: Invitations/​AICS Private Registration 

Meeting Room C.08

Cyber Games: The Resilience Arena (BATCH -1 Cyber Pro)

10:00 - 12:00

Meeting Room C.08

Company / Sponsors: Immersive Labs

Training session description / Inclusive: Step into the Resilience Arena and prove your cyber skills in a series of high-intensity, real-world challenges. Whether you’re a seasoned professional or an aspiring student, the Cyber Games are designed to test your speed, strategy, and resilience against evolving threats.

Target Audience: IT Professional , University Students

Note: Please bring your laptop

Registration Type: AICS Online Registration

Meeting Room C.09

Data Privacy Mastery: Principles and Practices

09:00 - 14:00

Meeting Room C.09

Company / Sponsors: BIBF

Training session description / Inclusive:This two-day course equips participants with the knowledge, skills, and competence to implement and manage a compliance framework for the protection of personal data. It focuses on enabling delegates to fulfil the role of a Data Protection Officer (DPO) under data privacy practices. The training covers regulations in depth, including implementation requirements, necessary policies and processes, and key elements of effective data security management.

Target Audience: Data Privacy Officers (DPOs) and Data Guardians, and professionals in Risk, Compliance, Cybersecurity, and Legal functions.

Note: Please bring your laptop

Registration Type: BIBF Registration

Meeting Room C.10

Cybersecurity Fundamentals (CSX-F) Training Programme

09:00 - 16:00

Meeting Room C.10

Company / Sponsors: BIBF

Training session description / Inclusive:The CSX‑F programme is a foundational cybersecurity course designed to equip learners with essential knowledge of cybersecurity principles, security operations, and threat management. It provides a solid grounding in protecting organizational assets, understanding threats, and implementing core information security practices.

Target Audience: University Students , IT professionals

Note: Please bring your laptop

Registration Type: BIBF Registration

Meeting Room C.11

Enhancing Software and Mobile Defences with Static Analysis (Batch - 1)

10:00 - 03:00

Meeting Room C.11

Company / Sponsors: UOB

Training session description / Inclusive: In today’s rapidly evolving digital landscape, software and mobile applications are increasingly targeted by sophisticated cyber threats. Proactive security measures are essential to identify and mitigate vulnerabilities before they can be exploited. This workshop aims to provide participants with a comprehensive understanding of static analysis techniques, empowering them to integrate these powerful methods into their software development lifecycle to build more secure and resilient applications.


Target Audience: University Students

Note: Please bring your laptop

Registration Type: AICS Online Registration

Meeting Room C.12

Decoding MITRE D3FEND for Building Strategy for Cyber Resilience

10:30 - 01:00

Meeting Room C.12

Company / Sponsors: Paramount

Training session description / Inclusive: This session explores Advanced Persistent Threats (APTs) and the MITRE D3FEND framework, showing how organizations can shift from reactive to proactive defense. It highlights how D3FEND maps defensive techniques to attacker tactics, enabling smarter decisions, stronger resilience, and targeted protection of Bahrain’s critical infrastructure against sophisticated cyber threats.

Target Audience: Executives , C‑Suit

Note: Please bring your laptop

Registration Type: AICS Online Registration

Meeting Room C.14

Simplifying security at scale

14:00 - 15:00

Meeting Room C.14

Company / Sponsors: AWS

Training session description / Inclusive: TBD


Target Audience: IT Professionals

Note: Please bring your laptop

Registration Type: AICS Online Registration

AWS zero trust accelerator for government

12:30 - 13:30

Meeting Room C.14

Company / Sponsors: AWS

Training session description / Inclusive: TBD


Target Audience: IT Professionals

Note: Please bring your laptop

Registration Type: AICS Online Registration

Risk and Resilience: Architecting for resiliency and high availability

11:00 - 12:00

Meeting Room C.14

Company / Sponsors: AWS

Training session description / Inclusive: TBD

Target Audience: IT Professionals

Note: Please bring your laptop

Registration Type: AICS Online Registration

Security in the age of AI

09:30 - 10:30

Meeting Room C.14

Company / Sponsors: AWS

Training session description / Inclusive: TBD


Target Audience: IT Professionals

Note: Please bring your laptop

Registration Type: AICS Online Registration