--> -->

Leading OT & IT security event in Saudi Arabia

CYSEC
SAUDI 2023

Building Saudi Arabia's Cyber Resilience for Critical Infrastructure Protection

13th – 14th JUNE 2023 | DAMMAM | SAUDI ARABIA

CYSEC
SAUDI 2023

Building Saudi Arabia's Cyber Resilience for Critical Infrastructure Protection

13th – 14th JUNE 2023 | SHERATON DAMMAM HOTEL | DAMMAM | SAUDI ARABIA

CYSEC
SAUDI 2023

Building Saudi Arabia's Cyber Resilience for Critical Infrastructure Protection

13th – 14thJUNE 2023 |















SHERATON DAMMAM HOTEL |















DAMMAM | SAUDI ARABIA

Event Overview

Event Overview

image_outline.png

We are excited to bring back our second edition of the CYSEC SAUDI Summit and Awards in the Kingdom of Saudi Arabia taking place on the 13th – 14th June 2023 in Sheraton Dammam Hotel, Dammam. As cyber threats become more sophisticated and prevalent, it is critical for those responsible for securing critical infrastructure to stay up-to-date on the latest threats, trends, and best practices in cybersecurity. The CYSEC SAUDI Summit and Awards is the premier cybersecurity event focused on redefining Cybersecurity for  Saudi’s Critical Infrastructure. By attending this conference, you will have the opportunity to learn from cybersecurity experts, government officials, and industry leaders about the latest cybersecurity challenges, solutions, and strategies for protecting our nation’s critical infrastructure.

We welcome you to join us at the CYSEC SAUDI Summit and Awards. See you there!

ADVISORY BOARD

ADVISORY BOARD

Yazeed Al Tamimi

Cybersecurity GRC Director

Government Entity

Mohammed Al Ghamdi

Cybersecurity Sector Manager

The Saudi Federation for Cyber Security and Programming (SAFCSP)

Shaker Hashlan

OT/ ICS Cybersecurity Advisor

GCC’s Leading Electricity Company

Dr. Fatimah Alakeel

Assistant Professor

King Saud University

Doaa Zamzami

OT/ ICS Cybersecurity Engineer

Saudi Aramco

Dr. Hussain Al Dawood

Director of Cybersecurity Innovation

NEOM

Mazen Qasim

CISO

John Hopkins Aramco Healthcare

Ali Hasan

Head of Aramco Cybersecurity Strategy and Policy

Saudi Aramco

Mohammed Alkorbi

OT/ICS Cybersecurity Specialist

Tasnee

SPEAKERS

speakers

chairman & keynote speaker

Ed Sleiman

Head of Special Projects

(Former CISO)
KAUST

Event Speakers

Ali Abdulla Al Sadadi

Chief of Information Technology

Ministry of Oil and Environment - Bahrain

Dr. Shaheela Banu Abdul Majeed

Chief Information Security Officer

Kuwait Gulf Oil Company

Ali Al Janadebah

IT Deputy Director and Director of E-Services

Ministry of Municipal and Rural Affairs Al Baha

Alaa K Falimban

Manager, Cyber Security Operations

Saudi Arabian Mining Company (MA'ADEN)

Shaker Al Hashlan

OT/ ICS Cybersecurity Advisor

GCC’s Leading Electricity Company

Obay Al Jerian

Cybersecurity Advisor

Confidential

Dr. Hussain Al Wasly

Director of Information Technology

NEOM Green Hydrogen Company

Adeel Agha

Senior Analyst Cyber Security

Al Ittefaq Steel Production Co.

Danah Almajid

Business System Analyst

GCC Lab

AGENDA

AGENDA

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

09:10

Keynote: Cyber - Physical Security

09:30

Panel Discussion: Securing Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

09:10

Keynote: Cyber - Physical Security

09:30

Panel Discussion: Securing Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

09:10

Keynote: Cyber - Physical Security

09:30

Panel Discussion: Securing Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

WHY ATTEND
CYSEC SAUDI

WHY ATTEND
CYSEC SAUDI

Learn About
With Peers And Colleagues
Achievements
Learn About
With Peers And Colleagues
Achievements
Learn About
With Peers And Colleagues
Achievements

WHY PARTNER
WITH CYSEC SAUDI

WHY PARTNER
WITH CYSEC SAUDI

Brand Exposure

Increase the level of visibility and awareness of your brand amongst the target audience who are relevant to your business through pre, during, and post-event marketing. Have your brand seen, recognized, and remembered by potential customers for potential business collaborations.

Strategic Networking

Opportunity to network with other businesses, pre-qualified attendees, and industry leaders to achieve specific goals and objectives, which may lead to valuable partnerships, business opportunities, expanding professional circle, and achieving collective objectives.

Community Involvement

Collaborate with other local businesses and organizations to support community development and growth. Create positive social impact, and build stronger, more resilient relationships. Contribute to the well-being of the region's goal and foster a sense of shared responsibility.

Customizable Solutions

Leverage packages that can be tailor-made, to meet the specific needs and priorities of your organization. Differentiate yourself from competitors, provide significant value to customers, and build stronger customer relationships based on their unique needs and preferences.

Brand Exposure

Increase the level of visibility and awareness of your brand amongst the target audience who are relevant to your business through pre, during, and post-event marketing. Have your brand seen, recognized, and remembered by potential customers for potential business collaborations.

Strategic Networking

Opportunity to network with other businesses, pre-qualified attendees, and industry leaders to achieve specific goals and objectives, which may lead to valuable partnerships, business opportunities, expanding professional circle, and achieving collective objectives.

Community Involvement

Collaborate with other local businesses and organizations to support community development and growth. Create positive social impact, and build stronger, more resilient relationships. Contribute to the well-being of the region's goal and foster a sense of shared responsibility.

Customizable Solutions

Leverage packages that can be tailor-made, to meet the specific needs and priorities of your organization. Differentiate yourself from competitors, provide significant value to customers, and build stronger customer relationships based on their unique needs and preferences.

Brand Exposure

Increase the level of visibility and awareness of your brand amongst the target audience who are relevant to your business through pre, during, and post-event marketing. Have your brand seen, recognized, and remembered by potential customers for potential business collaborations.

Strategic Networking

Opportunity to network with other businesses, pre-qualified attendees, and industry leaders to achieve specific goals and objectives, which may lead to valuable partnerships, business opportunities, expanding professional circle, and achieving collective objectives.

Community Involvement

Collaborate with other local businesses and organizations to support community development and growth. Create positive social impact, and build stronger, more resilient relationships. Contribute to the well-being of the region's goal and foster a sense of shared responsibility.

Customizable Solutions

Leverage packages that can be tailor-made, to meet the specific needs and priorities of your organization. Differentiate yourself from competitors, provide significant value to customers, and build stronger customer relationships based on their unique needs and preferences.

WHO SHOULD ATTEND

WHO SHOULD ATTEND

CXO | VP | DIRECTOR

Chief Information Security Officer

Chief Information Officer

Chief Data Officer / Chief Digital Officer

Chief Technology Officer

Chief Risk Officer

SVP/VP/Director/Head/Manager of IT/OT

HEADS | MANAGERS

Network Security

Data Security

Identity and Access Management

IT /OT

ICS Cybersecurity

Information Security

Cloud Security

Threat Intelligence

Vulnerability Management

Cyber Risk Management

Incident Response

Business Continuity and Disaster Recovery

Third-Party Risk Management

Compliance

IT Audits

PROFESSIONALS

SCADA/ICS Security Engineers

Penetration Testers

Automation & Process Control

Security Consultant

INDUSTRY

INDUSTRY

Oil & Gas

Chemicals

Utilities

Government

Agriculture

Healthcare

Metals & Mining

Critical Manufacturing

Defense Industrial Base Sector

Nuclear Reactors, Materials, and Waste Sector

EVENT HIGHLIGHTS 2022

EVENT HIGHLIGHTS 2022

SPONSORS & PARTNERS 2023

SPONSORS & PARTNERS 2023

HEADLINE SPONSOR

PLATINUM SPONSORS

GOLD SPONSORS

SILVER SPONSORS

BRONZE SPONSORS

Media Partners

Sponsor Testimonials

CYSEC GLOBAL SERIES SPONSORS

CYSEC GLOBAL SERIES

CYSEC GLOBAL SERIES

Doha, Qatar

South Africa, Africa

HW_POS_RGB_Horizontal-150ppi

About Huawei

Founded in 1987, Huawei is a leading global provider of information and communications technology (ICT) infrastructure and smart devices. We have more than 195,000 employees, and we operate in more than 170 countries and regions, serving more than three billion people around the world. Our vision and mission is to bring digital to every person, home and organization for a fully connected, intelligent world. To this end, we will drive ubiquitous connectivity and promote equal access to networks; bring cloud and artificial intelligence to all four corners of the earth to provide superior computing power where you need it, when you need it; build digital platforms to help all industries and organizations become more agile, efficient, and dynamic; redefine user experience with AI, making it more personalized for people in all aspects of their life, whether they’re at home, in the office, or on the go.
For more information, please visit Huawei online at www.huawei.com or follow us on:  
http://www.linkedin.com/company/Huawei
http://www.twitter.com/Huawei
http://www.facebook.com/Huawei
http://www.youtube.com/Huawei

About Kaspersky

Kaspersky is a global cybersecurity and digital privacy company founded in 1997. Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky technologies and we help 240,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

About Resilience Co.

Founded in 2019, Resilience Co. is a Cybersecurity consultancy firm in Saudi Arabia. We came from a pure cybersecurity background combined with technicality and academia that positions us as the go-to when the client needs to build some security controls and enhance their resilience against evolving threats. With the continuous evolution of threats across the organization, Resilience understands the importance of continuous visibility and threat hunting.

The team at Resilience Co. is highly qualified, with over 20+ years of experience within the fields of Cybersecurity and Cybersecurity strategies. Understanding our client’s needs and customizing solutions to fit those needs is a competitive advantage that sets us apart.

Our mission at Resilience is to build and develop the cybersecurity frameworks that enhance our clients to be more resilient since we believe that there is no system or information technology secure 100 %, and that’s the story behind our brand “Resilience.SA”  Learn more at resilience.sa 

Cipher-logo-

About Cipher

Cipher was founded with the objective to simplify the perception of complexity surrounding cybersecurity problems and solutions. With well over 20 years of cybersecurity experiences, The Cipher’s Founders and Our Senior Team of cybersecurity experts realized that a new, innovative, and game-changing perspective was needed in how Security Vendors implement Digital Security for their clients. A simpler and more efficient way. While we certainly do not think CyberSecurity is an easy job, we believe implementing and managing Digital Security shouldn’t be our client’s problem. SMEs have plenty of things to deal with daily: they have their product to make, their services to provide, their customers to please, and their companies to grow. 

Learn more at cipher.com.sa

About SSH

SSH Communications Security is a defensive cybersecurity company with the mission to secure critical data and communications between systems, automated applications, and people. Our products are developed to defend your business secrets and access to them – now and in the future.

Founded in 1995 in Helsinki, Finland, SSH is one of the pioneers of cybersecurity and it was responsible for the introduction of the world’s first communication protocol dedicated to protect electronic transactions across the internet – the SSH protocol. Our company continued to focus on the development of other solutions to protect data in transit and at rest, based on Zero-Trust architecture. Backed up by over than 5,000 customers such as Wal-Mart, Western Union, Disney, OCBC Bank and the US IRS, SSH Communications Security later expanded its product portfolio to include solutions for OT/Infrastructure applications, with the release of an Access Control solution dedicated to the Industrial Automation environment named PrivX OT.

Visit us at Cybersec Saudi 2023 in Dammam to learn more about how we can help your business to embrace the use of digital services while protecting your assets against cyber threats.

Bulwark-Technologies-Logo

About Bulwark

Bulwark is the leading provider for IT Security and Information Communications & Technology (ICT) products in the Middle East region & India. Bulwark serves the entire region with innovations from more than 20+ technology vendors and works with more than 750+ partners with the aim of bringing the best in technology to the region. Customers from various sectors, including Banking & Finance, Government, Oil & gas, Manufacturing, retail chain, Hospitality, Healthcare, Education, and more, rely on solutions distributed by Bulwark for securing and managing their IT infrastructure. Bulwark has won numerous industry awards for leadership in IT sales and support and has been rated as the best VAD in the region.

For more information, please visit www.bulwark.biz

WALLIX-logo

About WALLIX

WALLIX is the European access and digital identity security specialist and the world leader in PAM (Privileged Access Management). Its technologies enable organizations to meet today’s challenges in IT network protection and data security. They also provide detection and resilience to cyberattacks, protect organizations’ digital assets, and maintain business continuity of IT systems in the cloud and industrial networks. These technologies simplify compliance with regulatory requirements for critical IT infrastructure and data access. With its PAM4ALL, PAM4OT, and Trustelem solutions, WALLIX helps its customers modernize their information systems and put cybersecurity at the service of their digital transformation. Learn more at www.wallix.com

Mime-cast-logo

About Mimecast

Since 2003, Mimecast has stopped bad things from happening to good organizations by enabling them to Work Protected. We empower over 40,000 customers to help mitigate risk and manage complexities across a threat landscape driven by malicious cyberattacks, human error, and technology fallibility. Our advanced solutions provide the proactive threat detection, brand protection, awareness training, and data retention capabilities that evolving workplaces need today. Mimecast solutions are designed to transform email and collaboration security into the eyes and ears of organizations worldwide. For more information, visit www.mimecast.com 

About Quest

At Quest, we create and manage the software that makes the benefits of new technology real while empowering users and data, streamlining IT operations, and hardening cybersecurity from the inside out. Companies turn to us to manage, modernize and secure their business, from on-prem to in-cloud, from the heart of the network to the vulnerable endpoints. We help you conquer your next challenge confidently and achieve true IT resilience — because the next is here now. Know more: https://www.quest.com/

About Honeywell

Honeywell Building Technologies (HBT) is transforming how every building operates to help improve the quality of life. We are a leading building controls company with operations in over 75 countries supported by a global channel partner network. Commercial building owners and operators use our hardware, software, and analytics to help create safe, efficient, and productive facilities. Our solutions and services are used in more than 10 million buildings worldwide.

Honeywell (www.honeywell.com) delivers industry-specific solutions that include aerospace products and services, control technologies for buildings and industry, and performance materials globally. Our technologies help aircraft, buildings, manufacturing plants, supply chains, and workers become more connected to make our world smarter, safer, and more sustainable. For more news and information on Honeywell, please visit www.honeywell.com/newsroom.

ME_Logo

About ManageEngine

ManageEngine crafts the industry’s broadest suite of IT management software. It has everything organizations need—more than 60 enterprise products—to manage all components of IT operations. From desktops, mobile devices, networks, and servers, to applications, service desks, Active Directory, and security, ManageEngine brings IT together. Since 2002, IT teams have turned to ManageEngine for affordable, feature-rich software that’s easy to use. ManageEngine’s on-premises and cloud solutions power the IT of over 280,000 companies worldwide, including nine out of every ten Fortune 100 companies.  Learn more at www.manageengine.com.

Novigo Logo

About Novigo Solutions

Novigo Solutions is a technology-focused organization that specializes in providing comprehensive Cybersecurity services like VAPT, SIEM, SOC, AI Enabled Next Gen Cyber defense solutions as well as Technology / Business Consulting, Power Apps, SharePoint Development, .Net Development,  Analytics, Low Code / No Code Solutions and Robotic Process Automation (RPA) solutions. Since its inception in 2012, Novigo has become a leading provider of cutting-edge technology solutions, with over 700+ employees and a global presence in countries such as the United States, Saudi Arabia, United Arab Emirates, UK,  India, and Singapore. With a diverse portfolio of clients across 10+ countries, Novigo Solutions prides itself on delivering exceptional service and innovative solutions that help businesses achieve their goals. Learn more at www.novigosolutions.com.

About Binalyze

Binalyze is a leading cybersecurity company specializing in DFIR (Digital Forensics and Incident Response) solutions. With a mission to empower investigators and analysts with cutting-edge tools, Binalyze offers a range of innovative software products and services tailored to the needs of cybersecurity professionals. Their flagship product, Binalyze AIR, sets a new standard in digital investigation by providing a comprehensive suite of features designed to streamline and expedite the analysis of digital evidence. Trusted by organizations worldwide, Binalyze continues to push the boundaries of digital forensics technology, delivering solutions that empower professionals to uncover critical insights and protect against cyber threats. Visit binalyze.com to learn more about their industry-leading solutions and how they can assist in your cybersecurity efforts.

Abdullah Gumaijan

Director of Cybersecurity Operations

Government Entity, Kingdom of Saudi Arabia

As the Director of Cybersecurity Operations in the Ministry of Energy, Abdullah Algumaijan is leading a team of talents responsible for monitoring the Ministry’s assets, responding to cybersecurity incidents, evaluating the security posture of the ministry and implementing security controls aims to protect the Ministry’s digital infrastructure. Prior to this role he specialized in offensive security in STC Solutions and Saudi Aramco.

Abdullah is interested in delivering training for ethical hacking courses, he published online courses in multiple learning platforms and marketplaces. He also collaborates with non-profit organizations to deliver public awareness sessions in cybersecurity.