Leading OT & IT security event in Saudi Arabia

CYSEC global summit 2024 -
SAUDI edition

Hack-Proofing Critical Infrastructure: Where OT & IT Security Gets Real

Hack-Proofing Critical Infrastructure:
Where OT & IT Security Gets Real

September 2024 | Movenpick, Al Khobar | Saudi Arabia

Supporting Partner

Official Digital Media Partner

Event Overview

MicrosoftTeams-image (52)

We are thrilled to announce the return of the CYSEC GLOBAL Summit and Awards 2024 Saudi edition, now in its 9th global edition, taking place on the September 2024 in Al Khobar, the industrial heart of the Kingdom of Saudi Arabia.

As the lines between the digital and physical worlds blur, the importance of securing Operational Technology (OT) and Information Technology (IT) infrastructures has never been more paramount. This summit serves as a crucial meeting point for leaders in OT and IT security, offering a prime opportunity to explore the latest insights, trends, and strategies in the field. A unique chance for the security pros to ensure our critical sectors are robust and resilient. Join us to explore the intricacies of OT and IT security, discover cutting-edge solutions, and build partnerships that will safeguard the Critical Assets.

We’re not just discussing OT and IT Security; we’re at the forefront, leading the charge.

ADVISORY BOARD

Hussain_AlJahdali-removebg-preview

Dr. Hussain AlJahdali

Advisor (ITET)

Communications, Space & Technology Commission

Muhammad_Khurram_Khan-removebg-preview

Prof. Muhammad Khurram Khan

Founder & CEO, Global Foundation for Cyber Studies and Research (USA)
Professor of Cybersecurity, King Saud University (Saudi Arabia)

CYSEC SAUDI 2024 SPEAKERS

Aamir Khalid Pirzada 1

Aamir Khalid Pirzada

Chief Information Officer

National Metal Manufacturing and Casting Company (Maadaniyah)

MUHAMMAD SIDDIQUE 1

Muhammad Siddique

General Manager IT

Al-Ittefaq Steel Products Company

Ahmed Al-Barrak

Ahmad Al-Barrak

OT Cybersecurity Leader

Aramco

Ahmed Al Saleh - Aramco

Ahmed Al Saleh

OT Cybersecurity Lead

Aramco

CYSEC global summit 2024 - AGENDA

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

09:10

Keynote: Cyber - Physical Security

09:30

Panel Discussion: Securing Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

09:10

Keynote: Cyber - Physical Security

09:30

Panel Discussion: Securing Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

09:10

Keynote: Cyber - Physical Security

09:30

Panel Discussion: Securing Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

WHY ATTEND CYSEC global summit

Learn About
With Peers And Colleagues
Achievements

WHY PARTNER
WITH CYSEC global summit

Brand Exposure

Increase the level of visibility and awareness of your brand amongst the target audience who are relevant to your business through pre, during, and post-event marketing. Have your brand seen, recognized, and remembered by potential customers for potential business collaborations.

Strategic Networking

Opportunity to network with other businesses, pre-qualified attendees, and industry leaders to achieve specific goals and objectives, which may lead to valuable partnerships, business opportunities, expanding professional circle, and achieving collective objectives.

Community Involvement

Collaborate with other local businesses and organizations to support community development and growth. Create positive social impact, and build stronger, more resilient relationships. Contribute to the well-being of the region's goal and foster a sense of shared responsibility.

Customizable Solutions

Leverage packages that can be tailor-made, to meet the specific needs and priorities of your organization. Differentiate yourself from competitors, provide significant value to customers, and build stronger customer relationships based on their unique needs and preferences.

WHO SHOULD ATTEND

CXO | VP | DIRECTOR

Chief Information Security Officer

Chief Information Officer

Chief Data Officer / Chief Digital Officer

Chief Technology Officer

Chief Risk Officer

SVP/VP/Director/Head/Manager of IT/OT

HEADS | MANAGERS

Network Security

Data Security

Identity and Access Management

IT /OT

ICS Cybersecurity

Information Security

Cloud Security

Threat Intelligence

Vulnerability Management

Cyber Risk Management

Incident Response

Business Continuity and Disaster Recovery

Third-Party Risk Management

Compliance

IT Audits

PROFESSIONALS

SCADA/ICS Security Engineers

Penetration Testers

Automation & Process Control

Security Consultant

INDUSTRY

Oil & Gas

Chemicals

Utilities

Government

Agriculture

Healthcare

Metals & Mining

Critical Manufacturing

Defense Industrial Base Sector

Nuclear Reactors, Materials & Waste Sector

EVENT HIGHLIGHTS

Video gallery

Image gallery

SPONSORS & PARTNERS 2024

HEADLINE SPONSOR

GOLD SPONSORs

SILVER SPONSORS

BRONZE SPONSORs

EXHIBITOR

MEDIA PARTNERS

WHO SHOULD ATTEND

CYSEC GLOBAL SERIES SPONSORS

CYSEC GLOBAL SERIES 2024

Doha, Qatar

Abu Dhabi, UAE

South Africa, Africa

Eye Of Riyadh

EYE OF RIYADH provides effective digital marketing solutions for campaigns and events
targeting Saudi Arabia and other GCC. www.eyeofriyadh.com  is one of the most popular website in the GCC among citizen, residents , tourists and investors who are seeking for information and wish to explore the opportunities in the region.

Our Services :

  • Email and SMS campaign
  • Banner advertising
  • Social Media Campaign
  • Events and Training Marketing
  • Public Relations Services

Contact Eye of Riyadh:
info@eyeofriyadh.com
Tel: +966 11 2735522

About TXOne Networks

TXOne Networks provides cybersecurity solutions for ICS and OT environments using the OT zero trust methodology.

TXOne Networks offers cybersecurity solutions that ensure the reliability and safety of industrial control systems and operational technology environments through the OT zero trust methodology. TXOne Networks works together with both leading manufacturers and critical infrastructure operators to develop practical, operations-friendly approaches to cyber defense. TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission-critical devices in a real-time, defense-in-depth manner.

ConnectSecure

ConnectSecure LLC (www.connectsecure.com) is one of the leading cloud based vulnerability management and compliance platforms serving more than 2500 MSP’s worldwide . ConnectSecure focuses on empowering MSP’s and their customers for securing their data and critical business systems . ConnectSecure is described as the only MSP software vendor dedicated to cybersecurity, with a platform designed to assist organisations in assessing ,managing and remediating vulnerabilities to strengthen their cyber defenses by focusing on the reduction of the attack surface. ConnectSecure’s offerings include a thorough assessment of cyber vulnerabilities, effective vulnerability management strategies, compliance management and robust remediation solutions.

LogRhythm

Founded in 2003 and headquartered in Colorado, USA, LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency.

With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com.

Odyssey

We Secure Your Cyber Resilient Future Odyssey is a leader in Cybersecurity, supporting organizations globally through their journey towards attaining and sustaining cyber resilience, in a highly volatile threat landscape.

Driven by our core values: INNOVATION, PASSION FOR EXCELLENCE, and CLIENT FOCUS, empowered by a rich skillset and stealth code of ethics, we help clients build digital ecosystems capable of anticipating, responding, withstanding, adapting to adverse conditions, and quickly recovering from disruptive cyber-attacks while meeting compliance obligations.

To fulfill this mission, we have developed a 360° Holistic Approach for Achieving Cyber Resilience, consisting of solutions, services, and product offerings classified into five distinct yet synergistic pillars, namely: Managed Services, Advisory Services, Threat Risk Assessment Services, Hybrid Integrated Solutions, and ClearSkies TDIR Platform. 

Unique to our approach is the breadth and depth of our World Class Professional Services’ involvement in delivering our solutions, services and products, which come to optimize and amplify the efficiency, effectiveness, and value of our offerings.

We operate state-of-the-art SOC2® attested Security Operations Centers in multiple regions, serving clients globally. We are ISO 27001, ISO 9001, and ISO 22301 certified. Also, accredited by the Payment Card Industry Security Standards Council (PCI SSC) as a Qualified Security Assessor (QSA).

Through our two-decade journey, we have received numerous global and national awards and recognitions, among which, inclusion in the Gartner Magic Quadrant for Security Event Management Systems in 2021, 2023-24, and Data Impact Award for the Most Admirable Architecture, both for our ClearSkies™ TDIR Platform. Additionally, we have received several service excellence and innovation awards from national and international bodies.

Barracuda

Barracuda builds cloud-first, enterprise grade security solutions. More than 200,000 global customers trust Barracuda to safeguard their employees, data, and applications from a wide range of threats. Barracuda provides easy, comprehensive and affordable solutions for email protection, application protection, network protection and data protection. They are continually innovating to deliver tomorrow’s security technology, today. 

Recorded Future

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape, empowering clients to act with speed and confidence to reduce risk and securely drive business forward. Headquartered in Boston with offices and employees around the world, Recorded Future works with over 1,700 businesses and government organizations across more than 75 countries to provide real-time, unbiased and actionable intelligence.

Google Cloud Security

Make Google part of your security team with Mandiant frontline experts, intel-driven security operations, and a secure cloud platform — supercharged by AI. Organizations can address their tough security challenges with many of the same capabilities Google uses to keep more people and organizations safe online than anyone else in the world: frontline intelligence and expertise, a modern, intel-driven security operations platform, and a secure-by-design cloud foundation.

About Quest

At Quest, we create and manage the software that makes the benefits of new technology real while empowering users and data, streamlining IT operations, and hardening cybersecurity from the inside out. Companies turn to us to manage, modernize and secure their business, from on-prem to in-cloud, from the heart of the network to the vulnerable endpoints. We help you conquer your next challenge confidently and achieve true IT resilience — because the next is here now.

Acronis

Acronis is a global cyber protection company that provides natively integrated cybersecurity, data protection, and endpoint management for managed service providers (MSPs), small and medium businesses (SMBs), and enterprise IT departments. Acronis solutions are highly efficient and designed to identify, prevent, detect, respond, remediate, and recover from modern cyberthreats with minimal downtime, ensuring data integrity and business continuity. Acronis offers the most comprehensive security solution on the market for MSPs with its unique ability to meet the needs of diverse and distributed IT environments.

A Swiss company founded in Singapore in 2003, Acronis has 15 offices worldwide and employees in 50+ countries. Acronis Cyber Protect is available in 26 languages in 150 countries and is used by over 20,000 service providers to protect over 750,000 businesses.

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data. Fast and easy to use, the Netskope platform provides optimized access and zero-trust security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the
Fortune 100, trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.

About Xage

Xage is the first and only zero-trust real-world security company. Xage’s solutions and services accelerate and simplify the way enterprises secure, manage, and transform digital operations across OT, IT, and cloud. Xage products include Identity-based access management, remote access, and zero-trust data exchange, all powered by the Xage Fabric. Xage also offers Cybersecurity Services, which deliver expert design, implementation, and support services to accelerate the adoption of proactive cyber-defense and underpin secure digital transformation.

Tenable®

Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies.

CyberArk

CyberArk is the leading Identity Security provider, empowering organizations to fortify access to critical
business assets and infrastructure. 

Specializing in safeguarding distributed workforces and facilitating cloud-driven growth, CyberArk’s foundation in Privileged Access Management (PAM) addresses pivotal breach points, such as compromised identities and credentials. By prioritizing intelligent privilege controls, CyberArk’s Identity Security solutions seamlessly protect all identities, automating lifecycle management with continuous threat detection. Trusted by over 7,500 global organizations, including Fortune 500 and Global 2000
leaders, CyberArk ensures security across datacenter, hybrid, multi-cloud, and SaaS
environments. 

Through strategic collaboration with over 400 resellers and 200 technology partners,
CyberArk empowers customers to proactively defend against cyber threats, foster digital
transformations, and achieve compliance objectives.

About Nozomi Networks

Nozomi Networks protects the world’s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience.

Amiviz

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, representing over 40 leading and niche vendors. An ideal blend of channel empowerment of over 500 partners and a deep-rooted ethos of attaining excellent customer experiences has helped AmiViz build a strong customer capital of 3000+ across industries like Government, BFSI, Oil & Gas, Telcos, and large enterprises.

Abstract Security

The Abstract Security platform allows organizations to improve efficiency, reduce SIEM costs, and enhance detection and response capabilities across multi-cloud and on-premise environments. Abstract utilizes tactical AI to assist security analysts in understanding the complexities of cloud security telemetry and addressing cloud visibility gaps. It also helps formulate and execute an effective detection strategy across numerous data sources. The company has developed a decentralized edge computing platform that focuses on streaming cyber security data, as well as a one-click data lake for long-term detection and forensics.

About WALLIX

WALLIX is the European access and digital identity security specialist and the world leader in PAM (Privileged Access Management). Its technologies enable organizations to meet today’s challenges in IT network protection and data security. They also provide detection and resilience to cyberattacks, protect organizations’ digital assets, and maintain business continuity of IT systems in the cloud and industrial networks. These technologies simplify compliance with regulatory requirements for critical IT infrastructure and data access. With its PAM4ALL, PAM4OT, and Trustelem solutions, WALLIX helps its customers modernize their information systems and put cybersecurity at the service of their digital transformation.

Neusol

Neusol – Global IT Services, a prominent software and infrastructure solution provider with a presence across four continents—North America, Australia, Europe, and Asia—is at the forefront of Digital Transformation, Big Data Analytics, Product Development, Mobile App Development, Cloud & Infrastructure Services, and Cybersecurity. With a focus on adaptability to evolving business needs and future-forward technology requirements, Neusol Global tailors its IT services and solutions to enhance efficiency, organization, digitization, and cost-effectiveness for its clients.

Bulwark

Bulwark is the leading provider for IT Security and Information Communications & Technology (ICT) products in the Middle East region & India. Bulwark serves the entire region with innovations from more than 20+ technology vendors and works with more than 750+ partners with the aim of bringing the best in technology to the region. 
 
Customers from various sectors, including Banking & Finance, Government, Oil & gas, Manufacturing, Retail Chain, Hospitality, Healthcare, Education, and more, rely on solutions distributed by Bulwark for securing and managing their IT infrastructure. Bulwark has won numerous industry awards for leadership in IT sales and support and has been rated as the best VAD in the region.

Mimecast: Work Protected™

Since 2003, Mimecast has stopped bad things from happening to good organizations by enabling them to Work Protected. We empower more than 40,000 customers to help mitigate risk and manage complexities across a threat landscape driven by malicious cyberattacks, human error, and technology fallibility. Our advanced solutions provide the proactive threat detection, brand protection, awareness training, and data retention capabilities that evolving workplaces need today. 
 
Mimecast solutions are designed to transform email and collaboration security into the eyes and ears of organizations worldwide. 

About SECUREWORKS

Secureworks (NASDAQ: SCWX) is a global cybersecurity leader that protects customer progress with Secureworks® Taegis™, a cloud-native security analytics platform built on 20+ years of real-world threat intelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions.

EMT Distribution

emt Distribution is a leading value-added distributor in the META region, specializing in cybersecurity solutions. With a wide range of innovative technologies and an experienced team, emt Distribution provides top-notch cybersecurity solutions and services to its clients, helping them stay secure in the ever-changing digital landscape. With its extensive experience and strong presence in the META cybersecurity market, emt is well-positioned to make the most of its partnerships and helps organizations in the region stay ahead of evolving security threats.

Corelight

Corelight transforms network and cloud activity into evidence so that data-first defenders can stay ahead of ever-changing attacks. Delivered by our Open NDR Platform, Corelight’s comprehensive, correlated evidence gives you unparalleled visibility into your network. This evidence allows you to unlock new analytics, investigate faster, hunt like an expert, and even disrupt future attacks.

Our on-prem and cloud sensors go anywhere to capture structured, industry-standard telemetry and insights that work with the tools and processes you already use. Corelight’s global customers include Fortune 500 companies, major government agencies, and research universities.

Immersive Labs

Immersive Labs, the forefront leader in cultivating people-centric cyber resilience, empowers your entire organization to proactively prevent and respond to cyber threats effectively. With their cutting-edge Enterprise platform, you can continuously assess, develop, and validate your cyber capabilities tailored to individual roles, ensuring your team stays ahead of the constantly evolving threat landscape.

XONA

XONA enables frictionless user access that’s purpose-built for operational technology (OT) and other critical infrastructure systems. Technology agnostic and configured in minutes, XONA’s proprietary protocol isolation and zero-trust architecture immediately eliminates common attack vectors, while giving authorized users seamless and secure control of operational technology from any location or device.

With integrated multi-factor authentication, user-to-asset access controls, user session analytics, and automatic video recording, XONA is the single, secure portal that connects the cyber-physical world and enables critical operations to happen from anywhere with total confidence and trust.

Phosphorus

Phosphorus Cybersecurity® is the leading CPS Protection Platform delivering a proactive approach to security management for the exploding IoT, OT, IIoT, and IoMT attack surface. Designed to find and secure the unknown and often unmonitored world of devices, our Unified xIoT Security Management Platform provides security management across every industry —delivering high-fidelity discovery and risk assessment, proactive hardening and remediation, and continuous monitoring and management. With patented Intelligent Active Discovery and risk assessment, Phosphorus automates the mitigation and remediation of the most significant device vulnerabilities – including unknown and inaccurate asset inventory, default credentials, out-of-date and vulnerable firmware, risky configurations, banned and end-of-life devices, and expired or self-signed certificates.

Manage Engine

ManageEngine is a division of Zoho Corporation that offers comprehensive on-premises and cloud-native IT and security operations management solutions for global organizations and managed service providers. Established and emerging enterprises—including nine of every 10 Fortune 100 organizations—rely on ManageEngine’s real-time IT management tools to ensure the optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. ManageEngine has 18 data centers, 20 offices and 200+ channel partners worldwide to help organizations tightly align their business to IT.

Check Point

Check Point Software Technologies Ltd. is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.

TRINEXIA

Established in 1999, TRINEXIA (formerly Credence Security, Cyber Security Africa Distribution and Cyber Security South Africa) a PAN-EMEA specialty Value-added Distributor, and a leader in providing the most trusted solutions within Cyber Security, Digital Forensics, Application Security, Identity & Payments, Data Security & Governance space. We are a pure-play provider of cybersecurity and forensics solutions, to both public and private sector enterprises. At TRINEXIA, we are consistently and successfully adding great value to our partner community, with our partners, we design and deliver intuitive, trusted, and leading solutions that are customized to achieve the required results, whilst being admired for our people, partnerships, and performance. For more information visit www.trinexia.com and follow us across all social media platforms.

Checkmarx

Checkmarx is the Enterprise Application Security provider, offering the industry leading
cloud-native platform that builds DevSecTrust – Checkmarx One™. Fueled by intelligence from our industry leading AppSec security research team, our AI driven technology and services enable CISO, AppSec and Development leaders to prioritize their teams on what impacts their business. Our offering secures every phase of development for every application from the very first line of code until production (Shift Everywhere) while simultaneously balancing the dynamic needs of security and development teams. We are honored to serve more than 1,800 customers, including 60 percent of Fortune 100 organizations, and are committed to moving forward with an unwavering dedication to the safety and security of our customers and the applications that power our day-to-day lives.
Checkmarx. Make Shift Happen.

Cyfirma

CYFIRMA combines cyber-intelligence with attack surface discovery and digital risk protection to deliver early warning, personalized, contextual, outside-in, and multi-layered insights. We have built the next generation of AI-powered threat intelligence platform called External Threat Landscape Management (ETLM) to provide cyber defenders with the hacker’s view to help clients prepare for impending attacks.

Jamf

The Jamf platform allows your users to feel empowered and productive, while also maintaining the
highest levels of protection for your devices and sensitive company data — regardless of where work
happens. Trusted Access ensures that only trusted users on enrolled, safe devices can access
company data. This dramatically increases the security of your modern workplace while streamlining
work for your users.

Securityfist

We are a team of security experts with a passion for security awareness. Over the years, we
have worked in different security domains, and every time we came to a single realization, which is the importance of the human factor in any security program and strategy. Employees are the first line of defense in the organization. However, an un-aware employee creates a high risk to the organization and its assets; This led us to focus on increasing the awareness of employees through different channels and activities. We have helped multiple organizations with different sizes to develop, implement, and measure security awareness programs that are fit for their business industry and size, which secured them against various attacks targeted the organization or the users’ unintended errors. Our experts have more than fifteen years of international cybersecurity experience, delivering and promoting cybersecurity services. SecurityFist team comprises of accredited security professionals from globally recognized international certification bodies and members of various cybersecurity associations. We are dedicated to delivering our programs based on organizations’ requirements, technical innovation, and professional excellence.

Abdullah Gumaijan

Director of Cybersecurity Operations

Government Entity, Kingdom of Saudi Arabia

As the Director of Cybersecurity Operations in the Ministry of Energy, Abdullah Algumaijan is leading a team of talents responsible for monitoring the Ministry’s assets, responding to cybersecurity incidents, evaluating the security posture of the ministry and implementing security controls aims to protect the Ministry’s digital infrastructure. Prior to this role he specialized in offensive security in STC Solutions and Saudi Aramco.

Abdullah is interested in delivering training for ethical hacking courses, he published online courses in multiple learning platforms and marketplaces. He also collaborates with non-profit organizations to deliver public awareness sessions in cybersecurity.