16th–17th September 2024

Movenpick, Al Khobar, Saudi Arabia


Hack-Proofing Critical Infrastructure: Where OT & IT Security Gets Real

16th-17th September 2024  |  Movenpick, Al Khobar  |  Saudi Arabia

0 +
0 +
0 +
0 +


We are thrilled to announce the return of the Cysec Summit and Awards 2024 Saudi edition, now in its 9th global edition, taking place on the 16th – 17th September 2024 in Al Khobar, the industrial heart of the Kingdom of Saudi Arabia. As the lines between the digital and physical worlds blur, the importance of securing Operational Technology (OT) and Information Technology (IT) infrastructures has never been more paramount. This summit serves as a crucial meeting point for leaders in OT and IT security, offering a prime opportunity to explore the latest insights, trends, and strategies in the field. A unique chance for the security pros to ensure our critical sectors are robust and resilient. Join us to explore the intricacies of OT and IT security, discover cutting-edge solutions, and build partnerships that will safeguard the Critical Assets. We’re not just discussing OT and IT Security; we’re at the forefront, leading the charge.




Exclusive Insights
Learn the latest in cybersecurity from influential leaders and top experts.
Engaging Discussions
Participate in dynamic panel discussions and valuable technical presentations.
Celebrate outstanding contributions to cybersecurity with CYSEC Saudi Awards 2024
Interactive Challenges
Engage in on-site simulations and other exciting activities.
Previous slide
Next slide
Showcase Your Tech
Present your cutting-edge technology in our dedicated exhibition space.
Connect with Leaders
Network with VPs, directors, and C-level executives to forge valuable collaborations.
Boost Your Brand
Gain significant brand exposure in the cybersecurity community.
Personalized Engagement
Conduct 1:1 meeting and offer customized solutions to demonstrate your expertise.
Previous slide
Next slide



Saudi Arabia’s Vision 2030 aims to transform the country by improving its digital infrastructure and keeping pace with global progress in digital transformation. To support this goal, the country is prioritizing information flow, security, and system integrity, while also focusing on maintaining and enhancing cybersecurity to protect national security, critical infrastructure, high-priority sectors, and government services.

Saudi Arabia’s Vision 2030 aims to transform the country by improving its digital infrastructure and keeping pace with global progress in digital transformation. To support this goal, the country is prioritizing information flow, security, and system integrity, while also focusing on maintaining and enhancing cybersecurity to protect national security, critical infrastructure, high-priority sectors, and government services.

Businesses in Saudi Arabia plan to increase cybersecurity budgets by 12% in the next 3 years

Compliance / legal requirements
New location of our business
New risks due to geopolitical/ economic uncertainity
Increased Profits
Increased complexity of our IT infrastructure
Recent security incidents
Improving the level of specialist security expertise
New Business Activities/ Expansion


Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. 



Prof. Muhammad Khurram Khan

Founder & CEO, Global Foundation for Cyber Studies and Research (USA)
Professor of Cybersecurity, King Saud University (Saudi Arabia)

Dr. Hussain AlJahdali

Advisor (ITET)

Government Entity

Aamir Khalid Pirzada

Chief Information Officer

National Metal Manufacturing and Casting Company (Maadaniyah)

Mohammed Jadher

Chief Risk Officer

Tamweel Aloula

Muhammad Siddique

General Manager IT

Al-Ittefaq Steel Products Company



who should attend












7th FEBRUARY 2024

18th SEPTEMBER 2024

3rd OCTOBER 2024,

4th DECEMBER 2024,


About TXOne Networks

TXOne Networks provides cybersecurity solutions for ICS and OT environments using the OT zero trust methodology.

TXOne Networks offers cybersecurity solutions that ensure the reliability and safety of industrial control systems and operational technology environments through the OT zero trust methodology. TXOne Networks works together with both leading manufacturers and critical infrastructure operators to develop practical, operations-friendly approaches to cyber defense. TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission-critical devices in a real-time, defense-in-depth manner.


ConnectSecure LLC (www.connectsecure.com) is one of the leading cloud based vulnerability management and compliance platforms serving more than 2500 MSP’s worldwide . ConnectSecure focuses on empowering MSP’s and their customers for securing their data and critical business systems . ConnectSecure is described as the only MSP software vendor dedicated to cybersecurity, with a platform designed to assist organisations in assessing ,managing and remediating vulnerabilities to strengthen their cyber defenses by focusing on the reduction of the attack surface. ConnectSecure’s offerings include a thorough assessment of cyber vulnerabilities, effective vulnerability management strategies, compliance management and robust remediation solutions.


Exabeam is a global cybersecurity leader that delivers AI-driven security operations. High-integrity data ingestion, powerful analytics, and workflow automation power the industry’s most advanced self-managed and cloud-native security operations platform for threat detection, investigation, and response (TDIR). With a history of leadership in SIEM and UEBA, and a legacy rooted in AI, Exabeam empowers global security teams to combat cyberthreats, mitigate risk, and streamline security operations.

Google Cloud Security

Make Google part of your security team with Mandiant frontline experts, intel-driven security operations, and a secure cloud platform — supercharged by AI. Organizations can address their tough security challenges with many of the same capabilities Google uses to keep more people and organizations safe online than anyone else in the world: frontline intelligence and expertise, a modern, intel-driven security operations platform, and a secure-by-design cloud foundation.

Recorded Future

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape, empowering clients to act with speed and confidence to reduce risk and securely drive business forward. Headquartered in Boston with offices and employees around the world, Recorded Future works with over 1,700 businesses and government organizations across more than 75 countries to provide real-time, unbiased and actionable intelligence.


We Secure Your Cyber Resilient Future Odyssey is a leader in Cybersecurity, supporting organizations globally through their journey towards attaining and sustaining cyber resilience, in a highly volatile threat landscape.

Driven by our core values: INNOVATION, PASSION FOR EXCELLENCE, and CLIENT FOCUS, empowered by a rich skillset and stealth code of ethics, we help clients build digital ecosystems capable of anticipating, responding, withstanding, adapting to adverse conditions, and quickly recovering from disruptive cyber-attacks while meeting compliance obligations.

To fulfill this mission, we have developed a 360° Holistic Approach for Achieving Cyber Resilience, consisting of solutions, services, and product offerings classified into five distinct yet synergistic pillars, namely: Managed Services, Advisory Services, Threat Risk Assessment Services, Hybrid Integrated Solutions, and ClearSkies TDIR Platform. 

Unique to our approach is the breadth and depth of our World Class Professional Services’ involvement in delivering our solutions, services and products, which come to optimize and amplify the efficiency, effectiveness, and value of our offerings.

We operate state-of-the-art SOC2® attested Security Operations Centers in multiple regions, serving clients globally. We are ISO 27001, ISO 9001, and ISO 22301 certified. Also, accredited by the Payment Card Industry Security Standards Council (PCI SSC) as a Qualified Security Assessor (QSA).

Through our two-decade journey, we have received numerous global and national awards and recognitions, among which, inclusion in the Gartner Magic Quadrant for Security Event Management Systems in 2021, 2023-24, and Data Impact Award for the Most Admirable Architecture, both for our ClearSkies™ TDIR Platform. Additionally, we have received several service excellence and innovation awards from national and international bodies.

About Quest

At Quest, we create and manage the software that makes the benefits of new technology real while empowering users and data, streamlining IT operations, and hardening cybersecurity from the inside out. Companies turn to us to manage, modernize and secure their business, from on-prem to in-cloud, from the heart of the network to the vulnerable endpoints. We help you conquer your next challenge confidently and achieve true IT resilience — because the next is here now.


Acronis is a global cyber protection company that provides natively integrated cybersecurity, data protection, and endpoint management for managed service providers (MSPs), small and medium businesses (SMBs), and enterprise IT departments. Acronis solutions are highly efficient and designed to identify, prevent, detect, respond, remediate, and recover from modern cyberthreats with minimal downtime, ensuring data integrity and business continuity. Acronis offers the most comprehensive security solution on the market for MSPs with its unique ability to meet the needs of diverse and distributed IT environments.

A Swiss company founded in Singapore in 2003, Acronis has 15 offices worldwide and employees in 50+ countries. Acronis Cyber Protect is available in 26 languages in 150 countries and is used by over 20,000 service providers to protect over 750,000 businesses.

About Xage

Xage is the first and only zero-trust real-world security company. Xage’s solutions and services accelerate and simplify the way enterprises secure, manage, and transform digital operations across OT, IT, and cloud. Xage products include Identity-based access management, remote access, and zero-trust data exchange, all powered by the Xage Fabric. Xage also offers Cybersecurity Services, which deliver expert design, implementation, and support services to accelerate the adoption of proactive cyber-defense and underpin secure digital transformation.


Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies.


CyberArk is the leading Identity Security provider, empowering organizations to fortify access to critical business assets and infrastructure. 

Specializing in safeguarding distributed workforces and facilitating cloud-driven growth, CyberArk’s foundation in Privileged Access Management (PAM) addresses pivotal breach points, such as compromised identities and credentials. By prioritizing intelligent privilege controls, CyberArk’s Identity Security solutions seamlessly protect all identities, automating lifecycle management with continuous threat detection. Trusted by over 7,500 global organizations, including Fortune 500 and Global 2000 leaders, CyberArk ensures security across datacenter, hybrid, multi-cloud, and SaaS environments. 

Through strategic collaboration with over 400 resellers and 200 technology partners, CyberArk empowers customers to proactively defend against cyber threats, foster digital transformations, and achieve compliance objectives.

About Nozomi Networks

Nozomi Networks protects the world’s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience.


AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, representing over 40 leading and niche vendors. An ideal blend of channel empowerment of over 500 partners and a deep-rooted ethos of attaining excellent customer experiences has helped AmiViz build a strong customer capital of 3000+ across industries like Government, BFSI, Oil & Gas, Telcos, and large enterprises.

Abstract Security

The Abstract Security platform allows organizations to improve efficiency, reduce SIEM costs, and enhance detection and response capabilities across multi-cloud and on-premise environments. Abstract utilizes tactical AI to assist security analysts in understanding the complexities of cloud security telemetry and addressing cloud visibility gaps. It also helps formulate and execute an effective detection strategy across numerous data sources. The company has developed a decentralized edge computing platform that focuses on streaming cyber security data, as well as a one-click data lake for long-term detection and forensics.


WALLIX is the European access and digital identity security specialist and the world leader in PAM (Privileged Access Management). Its technologies enable organizations to meet today’s challenges in IT network protection and data security. They also provide detection and resilience to cyberattacks, protect organizations’ digital assets, and maintain business continuity of IT systems in the cloud and industrial networks. These technologies simplify compliance with regulatory requirements for critical IT infrastructure and data access. With its PAM4ALL, PAM4OT, and Trustelem solutions, WALLIX helps its customers modernize their information systems and put cybersecurity at the service of their digital transformation.


Neusol – Global IT Services, a prominent software and infrastructure solution provider with a presence across four continents—North America, Australia, Europe, and Asia—is at the forefront of Digital Transformation, Big Data Analytics, Product Development, Mobile App Development, Cloud & Infrastructure Services, and Cybersecurity. With a focus on adaptability to evolving business needs and future-forward technology requirements, Neusol Global tailors its IT services and solutions to enhance efficiency, organization, digitization, and cost-effectiveness for its clients.


Bulwark is the leading provider for IT Security and Information Communications & Technology (ICT) products in the Middle East region & India. Bulwark serves the entire region with innovations from more than 20+ technology vendors and works with more than 750+ partners with the aim of bringing the best in technology to the region. 
Customers from various sectors, including Banking & Finance, Government, Oil & gas, Manufacturing, Retail Chain, Hospitality, Healthcare, Education, and more, rely on solutions distributed by Bulwark for securing and managing their IT infrastructure. Bulwark has won numerous industry awards for leadership in IT sales and support and has been rated as the best VAD in the region.

Mimecast: Work Protected™

Since 2003, Mimecast has stopped bad things from happening to good organizations by enabling them to Work Protected. We empower more than 40,000 customers to help mitigate risk and manage complexities across a threat landscape driven by malicious cyberattacks, human error, and technology fallibility. Our advanced solutions provide the proactive threat detection, brand protection, awareness training, and data retention capabilities that evolving workplaces need today. 
Mimecast solutions are designed to transform email and collaboration security into the eyes and ears of organizations worldwide. 


Phosphorus Cybersecurity® is the leading CPS Protection Platform delivering a proactive approach to security management for the exploding IoT, OT, IIoT, and IoMT attack surface. Designed to find and secure the unknown and often unmonitored world of devices, our Unified xIoT Security Management Platform provides security management across every industry —delivering high-fidelity discovery and risk assessment, proactive hardening and remediation, and continuous monitoring and management. With patented Intelligent Active Discovery and risk assessment, Phosphorus automates the mitigation and remediation of the most significant device vulnerabilities – including unknown and inaccurate asset inventory, default credentials, out-of-date and vulnerable firmware, risky configurations, banned and end-of-life devices, and expired or self-signed certificates.


Secureworks (NASDAQ: SCWX) is a global cybersecurity leader that protects customer progress with Secureworks® Taegis™, a cloud-native security analytics platform built on 20+ years of real-world threat intelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions.


Corelight transforms network and cloud activity into evidence so that data-first defenders can stay ahead of ever-changing attacks. Delivered by our Open NDR Platform, Corelight’s comprehensive, correlated evidence gives you unparalleled visibility into your network. This evidence allows you to unlock new analytics, investigate faster, hunt like an expert, and even disrupt future attacks.

Our on-prem and cloud sensors go anywhere to capture structured, industry-standard telemetry and insights that work with the tools and processes you already use. Corelight’s global customers include Fortune 500 companies, major government agencies, and research universities.

Immersive Labs

Immersive Labs, the forefront leader in cultivating people-centric cyber resilience, empowers your entire organization to proactively prevent and respond to cyber threats effectively. With their cutting-edge Enterprise platform, you can continuously assess, develop, and validate your cyber capabilities tailored to individual roles, ensuring your team stays ahead of the constantly evolving threat landscape.


XONA enables frictionless user access that’s purpose-built for operational technology (OT) and other critical infrastructure systems. Technology agnostic and configured in minutes, XONA’s proprietary protocol isolation and zero-trust architecture immediately eliminates common attack vectors, while giving authorized users seamless and secure control of operational technology from any location or device.

With integrated multi-factor authentication, user-to-asset access controls, user session analytics, and automatic video recording, XONA is the single, secure portal that connects the cyber-physical world and enables critical operations to happen from anywhere with total confidence and trust.

Manage Engine

ManageEngine is a division of Zoho Corporation that offers comprehensive on-premises and cloud-native IT and security operations management solutions for global organizations and managed service providers. Established and emerging enterprises—including nine of every 10 Fortune 100 organizations—rely on ManageEngine’s real-time IT management tools to ensure the optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. ManageEngine has 18 data centers, 20 offices and 200+ channel partners worldwide to help organizations tightly align their business to IT.

Check Point

Check Point Software Technologies Ltd. is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.


We are a team of security experts with a passion for security awareness. Over the years, we
have worked in different security domains, and every time we came to a single realization, which is the importance of the human factor in any security program and strategy. Employees are the first line of defense in the organization. However, an un-aware employee creates a high risk to the organization and its assets; This led us to focus on increasing the awareness of employees through different channels and activities. We have helped multiple organizations with different sizes to develop, implement, and measure security awareness programs that are fit for their business industry and size, which secured them against various attacks targeted the organization or the users’ unintended errors. Our experts have more than fifteen years of international cybersecurity experience, delivering and promoting cybersecurity services. SecurityFist team comprises of accredited security professionals from globally recognized international certification bodies and members of various cybersecurity associations. We are dedicated to delivering our programs based on organizations’ requirements, technical innovation, and professional excellence.


Established in 1999, TRINEXIA (formerly Credence Security, Cyber Security Africa Distribution and Cyber Security South Africa) a PAN-EMEA specialty Value-added Distributor, and a leader in providing the most trusted solutions within Cyber Security, Digital Forensics, Application Security, Identity & Payments, Data Security & Governance space. We are a pure-play provider of cybersecurity and forensics solutions, to both public and private sector enterprises. At TRINEXIA, we are consistently and successfully adding great value to our partner community, with our partners, we design and deliver intuitive, trusted, and leading solutions that are customized to achieve the required results, whilst being admired for our people, partnerships, and performance. For more information visit www.trinexia.com and follow us across all social media platforms.


Checkmarx is the Enterprise Application Security provider, offering the industry leading
cloud-native platform that builds DevSecTrust – Checkmarx One™. Fueled by intelligence from our industry leading AppSec security research team, our AI driven technology and services enable CISO, AppSec and Development leaders to prioritize their teams on what impacts their business. Our offering secures every phase of development for every application from the very first line of code until production (Shift Everywhere) while simultaneously balancing the dynamic needs of security and development teams. We are honored to serve more than 1,800 customers, including 60 percent of Fortune 100 organizations, and are committed to moving forward with an unwavering dedication to the safety and security of our customers and the applications that power our day-to-day lives.
Checkmarx. Make Shift Happen.


CYFIRMA combines cyber-intelligence with attack surface discovery and digital risk protection to deliver early warning, personalized, contextual, outside-in, and multi-layered insights. We have built the next generation of AI-powered threat intelligence platform called External Threat Landscape Management (ETLM) to provide cyber defenders with the hacker’s view to help clients prepare for impending attacks.


The Jamf platform allows your users to feel empowered and productive, while also maintaining the
highest levels of protection for your devices and sensitive company data — regardless of where work
happens. Trusted Access ensures that only trusted users on enrolled, safe devices can access
company data. This dramatically increases the security of your modern workplace while streamlining
work for your users.

EMT Distribution

emt Distribution is a leading value-added distributor in the META region, specializing in cybersecurity solutions. With a wide range of innovative technologies and an experienced team, emt Distribution provides top-notch cybersecurity solutions and services to its clients, helping them stay secure in the ever-changing digital landscape. With its extensive experience and strong presence in the META cybersecurity market, emt is well-positioned to make the most of its partnerships and helps organizations in the region stay ahead of evolving security threats.


Paratus, a dynamic and passionate cybersecurity provider headquartered in Dubai, UAE, is dedicated to bridging the gap for organizations in the Middle East and Africa that inadvertently expand their cyber-attack surface through business-driven initiatives like digital transformation, cloud computing, and interconnectivity. With a pragmatic, consulting-driven approach, Paratus helps companies protect and defend against external and internal cyber threats through innovative and cost-effective cybersecurity services and solutions.