CYSEC SUMMIT 2024

Hack-Proofing Critical Infrastructure: Where OT & IT Security Gets Real

16th – 17th September 2024  | Movenpick, Al Khobar | Saudi Arabia

 

, taking place in 16th-17th September 2024 in Movenpick, Al Khobar, the industrial heart of the Kingdom of Saudi Arabia

ATTENDEES
0 +
SPEAKERS
0 +
SPONSORS & PARTNERS
0 +
GOVT. ADVISORS & POLICYMAKERS
0 +

CYSEC SUMMIT IN A GLANCE

We are thrilled to announce the return of the Cysec Summit and Awards 2024 Saudi edition, now in its 9th global edition. As the lines between the digital and physical worlds blur, the importance of securing Operational Technology (OT) and Information Technology (IT) infrastructures has never been more paramount. This summit serves as a crucial meeting point for leaders in OT and IT security, offering a prime opportunity to explore the latest insights, trends, and strategies in the field. A unique chance for the security pros to ensure our critical sectors are robust and resilient. Join us to explore the intricacies of OT and IT security, discover cutting-edge solutions, and build partnerships that will safeguard the Critical Assets. We’re not just discussing OT and IT Security; we’re at the forefront, leading the charge.

JOIN US

ADVISORY BOARD MEMBERS

WHY ATTEND CYSEC SUMMIT 2024

Exclusive Insights
Learn the latest in cybersecurity from influential leaders and top experts.
Engaging Discussions
Participate in dynamic panel discussions and valuable technical presentations.
Recognition
Celebrate outstanding contributions to cybersecurity with CYSEC Saudi Awards 2024
Interactive Challenges
Engage in on-site simulations and other exciting activities.
Previous slide
Next slide
Showcase Your Tech
Present your cutting-edge technology in our dedicated exhibition space.
Connect with Leaders
Network with VPs, directors, and C-level executives to forge valuable collaborations.
Boost Your Brand
Gain significant brand exposure in the cybersecurity community.
Personalized Engagement
Conduct 1:1 meeting and offer customized solutions to demonstrate your expertise.
Previous slide
Next slide

WHY PARTNER WITH CYSEC SUMMIT

CYSEC SUMMIT

Saudi Arabia’s Vision 2030 aims to transform the country by improving its digital infrastructure and keeping pace with global progress in digital transformation. To support this goal, the country is prioritizing information flow, security, and system integrity, while also focusing on maintaining and enhancing cybersecurity to protect national security, critical infrastructure, high-priority sectors, and government services.

Saudi Arabia’s Vision 2030 aims to transform the country by improving its digital infrastructure and keeping pace with global progress in digital transformation. To support this goal, the country is prioritizing information flow, security, and system integrity, while also focusing on maintaining and enhancing cybersecurity to protect national security, critical infrastructure, high-priority sectors, and government services.

Businesses in Saudi Arabia plan to increase cybersecurity budgets by 12% in the next 3 years

Compliance / legal requirements
20%
New location of our business
23%
New risks due to geopolitical/ economic uncertainity
32%
Increased Profits
37%
Increased complexity of our IT infrastructure
37%
Recent security incidents
40%
Improving the level of specialist security expertise
42%
New Business Activities/ Expansion
43%

WANT TO POSITION YOURSELF AS MARKET LEADER?

THEMES SPOTLIGHT

who should attend

ATTENDEES’ PROFILE

INDUSTRY

SPONSORS & PARTNERS

2024

SUPPORTING PARTNERS

OFFICIAL PODCAST PARTNER

OFFICIAL DIGITAL MEDIA PARTNER

HEADLINE SPONSOR

GOLD SPONSORS

EXHIBITOR

CYSEC GLOBAL SERIES

2024

7th FEBRUARY 2024
DOHA, QATAR

18th SEPTEMBER 2024
ROSEWOOD,
ABU DHABI, UAE

3rd OCTOBER 2024,
NH JOHANNESBURG SANDTON
SOUTH AFRICA

4th DECEMBER 2024,
MUSCAT, OMAN

CYSEC GLOBAL SERIES SPONSORS

About TXOne Networks

TXOne Networks provides cybersecurity solutions for ICS and OT environments using the OT zero trust methodology.

TXOne Networks offers cybersecurity solutions that ensure the reliability and safety of industrial control systems and operational technology environments through the OT zero trust methodology. TXOne Networks works together with both leading manufacturers and critical infrastructure operators to develop practical, operations-friendly approaches to cyber defense. TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission-critical devices in a real-time, defense-in-depth manner.

ConnectSecure

ConnectSecure LLC (www.connectsecure.com) is one of the leading cloud based vulnerability management and compliance platforms serving more than 2500 MSP’s worldwide . ConnectSecure focuses on empowering MSP’s and their customers for securing their data and critical business systems . ConnectSecure is described as the only MSP software vendor dedicated to cybersecurity, with a platform designed to assist organisations in assessing ,managing and remediating vulnerabilities to strengthen their cyber defenses by focusing on the reduction of the attack surface. ConnectSecure’s offerings include a thorough assessment of cyber vulnerabilities, effective vulnerability management strategies, compliance management and robust remediation solutions.

Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations. High-integrity data ingestion, powerful analytics, and workflow automation power the industry’s most advanced self-managed and cloud-native security operations platform for threat detection, investigation, and response (TDIR). With a history of leadership in SIEM and UEBA, and a legacy rooted in AI, Exabeam empowers global security teams to combat cyberthreats, mitigate risk, and streamline security operations.

Google Cloud Security

Make Google part of your security team with Mandiant frontline experts, intel-driven security operations, and a secure cloud platform — supercharged by AI. Organizations can address their tough security challenges with many of the same capabilities Google uses to keep more people and organizations safe online than anyone else in the world: frontline intelligence and expertise, a modern, intel-driven security operations platform, and a secure-by-design cloud foundation.

Recorded Future

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape, empowering clients to act with speed and confidence to reduce risk and securely drive business forward. Headquartered in Boston with offices and employees around the world, Recorded Future works with over 1,700 businesses and government organizations across more than 75 countries to provide real-time, unbiased and actionable intelligence.

Barracuda

Barracuda builds cloud-first, enterprise grade security solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. They are continually innovating to deliver tomorrow’s security technology, today. 

About Quest

At Quest, we create and manage the software that makes the benefits of new technology real while empowering users and data, streamlining IT operations, and hardening cybersecurity from the inside out. Companies turn to us to manage, modernize and secure their business, from on-prem to in-cloud, from the heart of the network to the vulnerable endpoints. We help you conquer your next challenge confidently and achieve true IT resilience — because the next is here now.

Acronis

Acronis is a global cyber protection company that provides natively integrated cybersecurity, data protection, and endpoint management for managed service providers (MSPs), small and medium businesses (SMBs), and enterprise IT departments. Acronis solutions are highly efficient and designed to identify, prevent, detect, respond, remediate, and recover from modern cyberthreats with minimal downtime, ensuring data integrity and business continuity. Acronis offers the most comprehensive security solution on the market for MSPs with its unique ability to meet the needs of diverse and distributed IT environments.

A Swiss company founded in Singapore in 2003, Acronis has 15 offices worldwide and employees in 50+ countries. Acronis Cyber Protect is available in 26 languages in 150 countries and is used by over 20,000 service providers to protect over 750,000 businesses.

About Xage

Xage is the first and only zero-trust real-world security company. Xage’s solutions and services accelerate and simplify the way enterprises secure, manage, and transform digital operations across OT, IT, and cloud. Xage products include Identity-based access management, remote access, and zero-trust data exchange, all powered by the Xage Fabric. Xage also offers Cybersecurity Services, which deliver expert design, implementation, and support services to accelerate the adoption of proactive cyber-defense and underpin secure digital transformation.

Tenable®

Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies.

CyberArk

CyberArk is the leading Identity Security provider, empowering organizations to fortify access to critical business assets and infrastructure. 

Specializing in safeguarding distributed workforces and facilitating cloud-driven growth, CyberArk’s foundation in Privileged Access Management (PAM) addresses pivotal breach points, such as compromised identities and credentials. By prioritizing intelligent privilege controls, CyberArk’s Identity Security solutions seamlessly protect all identities, automating lifecycle management with continuous threat detection. Trusted by over 7,500 global organizations, including Fortune 500 and Global 2000 leaders, CyberArk ensures security across datacenter, hybrid, multi-cloud, and SaaS environments. 

Through strategic collaboration with over 400 resellers and 200 technology partners, CyberArk empowers customers to proactively defend against cyber threats, foster digital transformations, and achieve compliance objectives.

About Nozomi Networks

Nozomi Networks protects the world’s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience.

Amiviz

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, representing over 40 leading and niche vendors. An ideal blend of channel empowerment of over 500 partners and a deep-rooted ethos of attaining excellent customer experiences has helped AmiViz build a strong customer capital of 3000+ across industries like Government, BFSI, Oil & Gas, Telcos, and large enterprises.

Intercede

For over two decades, Intercede has been the trusted partner for global organizations across government, aerospace and defense, financial services, healthcare, telecommunications, cloud services, and information technology. Their expertise in digital identity solutions has enabled these organizations to safeguard their mission-critical data and systems with the highest level of assurance. Intercede’s comprehensive suite of products provides customers with the flexibility to choose the security level that best suits their specific needs. From secure registration and ID verification to password security management, one-time passwords, FIDO, and PKI, Intercede offers a complete range of authentication options. Uniquely, they support customers on their journey to passwordless and stronger authentication environments, ensuring their digital identities remain secure in an ever-evolving threat landscape.

About WALLIX

WALLIX is the European access and digital identity security specialist and the world leader in PAM (Privileged Access Management). Its technologies enable organizations to meet today’s challenges in IT network protection and data security. They also provide detection and resilience to cyberattacks, protect organizations’ digital assets, and maintain business continuity of IT systems in the cloud and industrial networks. These technologies simplify compliance with regulatory requirements for critical IT infrastructure and data access. With its PAM4ALL, PAM4OT, and Trustelem solutions, WALLIX helps its customers modernize their information systems and put cybersecurity at the service of their digital transformation.

Neusol

Neusol – Global IT Services, a prominent software and infrastructure solution provider with a presence across four continents—North America, Australia, Europe, and Asia—is at the forefront of Digital Transformation, Big Data Analytics, Product Development, Mobile App Development, Cloud & Infrastructure Services, and Cybersecurity. With a focus on adaptability to evolving business needs and future-forward technology requirements, Neusol Global tailors its IT services and solutions to enhance efficiency, organization, digitization, and cost-effectiveness for its clients.

BeyondTrust

BeyondTrust is the worldwide leader in intelligent identity and access security, enabling organizations to protect identities, stop threats, and deliver dynamic access. We are leading the charge in innovating identity-first security and are trusted by 20,000 customers, including 75 of the Fortune 100, plus a global ecosystem of partners.

Phosphorus

Phosphorus Cybersecurity® is the leading CPS Protection Platform delivering a proactive approach to security management for the exploding IoT, OT, IIoT, and IoMT attack surface. Designed to find and secure the unknown and often unmonitored world of devices, our Unified xIoT Security Management Platform provides security management across every industry —delivering high-fidelity discovery and risk assessment, proactive hardening and remediation, and continuous monitoring and management. With patented Intelligent Active Discovery and risk assessment, Phosphorus automates the mitigation and remediation of the most significant device vulnerabilities – including unknown and inaccurate asset inventory, default credentials, out-of-date and vulnerable firmware, risky configurations, banned and end-of-life devices, and expired or self-signed certificates.

About SECUREWORKS

Secureworks (NASDAQ: SCWX) is a global cybersecurity leader that protects customer progress with Secureworks® Taegis™, a cloud-native security analytics platform built on 20+ years of real-world threat intelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions.

Corelight

Corelight transforms network and cloud activity into evidence so that data-first defenders can stay ahead of ever-changing attacks. Delivered by our Open NDR Platform, Corelight’s comprehensive, correlated evidence gives you unparalleled visibility into your network. This evidence allows you to unlock new analytics, investigate faster, hunt like an expert, and even disrupt future attacks.

Our on-prem and cloud sensors go anywhere to capture structured, industry-standard telemetry and insights that work with the tools and processes you already use. Corelight’s global customers include Fortune 500 companies, major government agencies, and research universities.

Immersive Labs

Immersive Labs, the forefront leader in cultivating people-centric cyber resilience, empowers your entire organization to proactively prevent and respond to cyber threats effectively. With their cutting-edge Enterprise platform, you can continuously assess, develop, and validate your cyber capabilities tailored to individual roles, ensuring your team stays ahead of the constantly evolving threat landscape.

XONA

XONA enables frictionless user access that’s purpose-built for operational technology (OT) and other critical infrastructure systems. Technology agnostic and configured in minutes, XONA’s proprietary protocol isolation and zero-trust architecture immediately eliminates common attack vectors, while giving authorized users seamless and secure control of operational technology from any location or device.

With integrated multi-factor authentication, user-to-asset access controls, user session analytics, and automatic video recording, XONA is the single, secure portal that connects the cyber-physical world and enables critical operations to happen from anywhere with total confidence and trust.

Manage Engine

ManageEngine is a division of Zoho Corporation that offers comprehensive on-premises and cloud-native IT and security operations management solutions for global organizations and managed service providers. Established and emerging enterprises—including nine of every 10 Fortune 100 organizations—rely on ManageEngine’s real-time IT management tools to ensure the optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. ManageEngine has 18 data centers, 20 offices and 200+ channel partners worldwide to help organizations tightly align their business to IT.

Check Point

Check Point Software Technologies Ltd. is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.

Saudi Paramount Computer Systems (SPCS)

Established in 2001, Saudi Paramount Computer Systems (SPCS) proudly stands as Saudi Arabia’s premier Cybersecurity company specialized in providing solutions and services. We provide global and local standard services and cutting-edge solutions to secure institutional entities, encompassing healthcare, education, government, military, commercial, and other vital sectors. Serving as pioneers in improving security nationwide across KSA, SPCS offers the most up-to-date solutions for a secure working environment protected from any potential threats.

TRINEXIA

Established in 1999, TRINEXIA (formerly Credence Security, Cyber Security Africa Distribution and Cyber Security South Africa) a PAN-EMEA specialty Value-added Distributor, and a leader in providing the most trusted solutions within Cyber Security, Digital Forensics, Application Security, Identity & Payments, Data Security & Governance space. We are a pure-play provider of cybersecurity and forensics solutions, to both public and private sector enterprises. At TRINEXIA, we are consistently and successfully adding great value to our partner community, with our partners, we design and deliver intuitive, trusted, and leading solutions that are customized to achieve the required results, whilst being admired for our people, partnerships, and performance. For more information visit www.trinexia.com and follow us across all social media platforms.

Sectigo

Sectigo is the leading provider of Digital Trust. We deliver automated Certificate Lifecycle Management (CLM) solutions for businesses of all sizes. Our cloud-based universal CLM platform automates the lifecycles of public and private digital certificates issued by Sectigo and other Certificate Authorities to secure every human and machine identity across your enterprise.

Jamf

The Jamf platform allows your users to feel empowered and productive, while also maintaining the
highest levels of protection for your devices and sensitive company data — regardless of where work
happens. Trusted Access ensures that only trusted users on enrolled, safe devices can access
company data. This dramatically increases the security of your modern workplace while streamlining
work for your users.

Paratus

Paratus, a dynamic and passionate cybersecurity provider headquartered in Dubai, UAE, is dedicated to bridging the gap for organizations in the Middle East and Africa that inadvertently expand their cyber-attack surface through business-driven initiatives like digital transformation, cloud computing, and interconnectivity. With a pragmatic, consulting-driven approach, Paratus helps companies protect and defend against external and internal cyber threats through innovative and cost-effective cybersecurity services and solutions. 

ThreatLocker®

ThreatLocker® has been at the forefront of pioneering security solutions for decades, safeguarding organizations against emerging threats that often fly under the radar Challenging conventional ideologies of endpoint protection, we recognized a critical gap in traditional approaches heavily reliant on detection and threat hunting technologies, which often falter in real-world scenarios
In response, ThreatLocker® developed a revolutionary zero-trust endpoint platform Rooted in the principle of proactive prevention, our platform operates on a default block-and-control mechanism, staying one step ahead of malicious actors by automatically thwarting emerging threats without the need for detection By prioritizing prevention over detection, we empower organizations to fortify their defenses effectively and decisively in the face of evolving cyber risks