Leading OT & IT security event in Saudi Arabia

CYSEC
SAUDI 2024

Hack-proofing Critical Infrastructure: Where OT & ICS Security Gets Real

21st-22nd May 2024 | DAMMAM | SAUDI ARABIA

CYSEC
SAUDI 2024

Hack-Proofing Critical Infrastructure: Where OT & ICS Security Gets Real

21st-22nd May 2024 | DAMMAM | SAUDI ARABIA

CYSEC
SAUDI 2024

Hack-proofing Critical Infrastructure: Where OT & ICS Security Gets Real

21st-22nd May 2024 | DAMMAM | SAUDI ARABIA

Event Overview

Event Overview

image_outline.png
We are thrilled to announce the return of the CYSEC SAUDI Summit and Awards for its 9th global edition, setting the stage on the 21st-22nd May 2024 in Dammam, the industrial heartland of the Kingdom of Saudi Arabia. As the digital and physical worlds converge, the security of Operational Technology (OT) and Industrial Control Systems (ICS) is more critical than ever. This summit is the cornerstone event for those at the forefront of OT and ICS security, providing a vital platform for gaining the latest insights, trends, and strategies. It’s a unique opportunity for Dammam’s industrial professionals to strengthen their defenses, ensuring our critical sectors remain resilient against the digital challenges of the future. Join us as we navigate the complexities of OT and ICS security, unveiling next-generation solutions and forging alliances that will shield our critical assets. We’re not just talking about OT Security; we’re leading it. See you there!

ADVISORY BOARD

ADVISORY BOARD

Fatimah Aljulaih

Head of Cybersecurity (CISO)

AlUla Development Company

Prof. Muhammad Khurram Khan

Founder & CEO of Global Foundation for Cyber Studies and Research | Professor of Cybersecurity at King Saud University

Hussain AlJahdali

Advisor (ITET)

Communications, Space & Technology Commission (CST)

Mohammad Hammoudeh

Cybersecurity Chair Professor

Saudi Aramco

CYSEC SAUDI 2023 - SPEAKERS

chairman & keynote speaker

Ed Sleiman

Head of Special Projects

(Former CISO)
KAUST

Event Speakers

Ali Abdulla Al Sadadi

Chief of Information Technology

Ministry of Oil and Environment - Bahrain

Dr. Shaheela Banu Abdul Majeed

Chief Information Security Officer

Kuwait Gulf Oil Company

Ali Al Janadebah

IT Deputy Director and Director of E-Services

Ministry of Municipal and Rural Affairs Al Baha

Alaa K Falimban

Manager, Cyber Security Operations

Saudi Arabian Mining Company (MA'ADEN)

Shaker Al Hashlan

OT/ ICS Cybersecurity Advisor

GCC’s Leading Electricity Company

Obay Al Jerian

Cybersecurity Advisor

Confidential

Dr. Hussain Al Wasly

Director of Information Technology

NEOM Green Hydrogen Company

Adeel Agha

Senior Analyst Cyber Security

Al Ittefaq Steel Production Co.

Danah Almajid

Business System Analyst

GCC Lab

CYSEC SAUDI 2024 - AGENDA

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

09:10

Keynote: Cyber - Physical Security

09:30

Panel Discussion: Securing Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

09:10

Keynote: Cyber - Physical Security

09:30

Panel Discussion: Securing Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

09:10

Keynote: Cyber - Physical Security

09:30

Panel Discussion: Securing Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

WHY ATTEND
CYSEC SAUDI

WHY ATTEND
CYSEC SAUDI

Learn About
With Peers And Colleagues
Achievements
Learn About
With Peers And Colleagues
Achievements
Learn About
With Peers And Colleagues
Achievements

WHY PARTNER
WITH CYSEC SAUDI

WHY PARTNER
WITH CYSEC SAUDI

Brand Exposure

Increase the level of visibility and awareness of your brand amongst the target audience who are relevant to your business through pre, during, and post-event marketing. Have your brand seen, recognized, and remembered by potential customers for potential business collaborations.

Strategic Networking

Opportunity to network with other businesses, pre-qualified attendees, and industry leaders to achieve specific goals and objectives, which may lead to valuable partnerships, business opportunities, expanding professional circle, and achieving collective objectives.

Community Involvement

Collaborate with other local businesses and organizations to support community development and growth. Create positive social impact, and build stronger, more resilient relationships. Contribute to the well-being of the region's goal and foster a sense of shared responsibility.

Customizable Solutions

Leverage packages that can be tailor-made, to meet the specific needs and priorities of your organization. Differentiate yourself from competitors, provide significant value to customers, and build stronger customer relationships based on their unique needs and preferences.

Brand Exposure

Increase the level of visibility and awareness of your brand amongst the target audience who are relevant to your business through pre, during, and post-event marketing. Have your brand seen, recognized, and remembered by potential customers for potential business collaborations.

Strategic Networking

Opportunity to network with other businesses, pre-qualified attendees, and industry leaders to achieve specific goals and objectives, which may lead to valuable partnerships, business opportunities, expanding professional circle, and achieving collective objectives.

Community Involvement

Collaborate with other local businesses and organizations to support community development and growth. Create positive social impact, and build stronger, more resilient relationships. Contribute to the well-being of the region's goal and foster a sense of shared responsibility.

Customizable Solutions

Leverage packages that can be tailor-made, to meet the specific needs and priorities of your organization. Differentiate yourself from competitors, provide significant value to customers, and build stronger customer relationships based on their unique needs and preferences.

Brand Exposure

Increase the level of visibility and awareness of your brand amongst the target audience who are relevant to your business through pre, during, and post-event marketing. Have your brand seen, recognized, and remembered by potential customers for potential business collaborations.

Strategic Networking

Opportunity to network with other businesses, pre-qualified attendees, and industry leaders to achieve specific goals and objectives, which may lead to valuable partnerships, business opportunities, expanding professional circle, and achieving collective objectives.

Community Involvement

Collaborate with other local businesses and organizations to support community development and growth. Create positive social impact, and build stronger, more resilient relationships. Contribute to the well-being of the region's goal and foster a sense of shared responsibility.

Customizable Solutions

Leverage packages that can be tailor-made, to meet the specific needs and priorities of your organization. Differentiate yourself from competitors, provide significant value to customers, and build stronger customer relationships based on their unique needs and preferences.

WHO SHOULD ATTEND

CXO | VP | DIRECTOR

Chief Information Security Officer

Chief Information Officer

Chief Data Officer / Chief Digital Officer

Chief Technology Officer

Chief Risk Officer

SVP/VP/Director/Head/Manager of IT/OT

HEADS | MANAGERS

Network Security

Data Security

Identity and Access Management

IT /OT

ICS Cybersecurity

Information Security

Cloud Security

Threat Intelligence

Vulnerability Management

Cyber Risk Management

Incident Response

Business Continuity and Disaster Recovery

Third-Party Risk Management

Compliance

IT Audits

PROFESSIONALS

SCADA/ICS Security Engineers

Penetration Testers

Automation & Process Control

Security Consultant

INDUSTRY

INDUSTRY

Oil & Gas

Chemicals

Utilities

Government

Agriculture

Healthcare

Metals & Mining

Critical Manufacturing

Defense Industrial Base Sector

Nuclear Reactors, Materials, and Waste Sector

EVENT HIGHLIGHTS

EVENT HIGHLIGHTS

SPONSORS & PARTNERS 2024

SPONSORS & PARTNERS 2024

HEADLINE SPONSOR

PLATINUM SPONSORS

GOLD SPONSORS

SILVER SPONSORS

BRONZE SPONSORS

Media Partners

Sponsor Testimonials

CYSEC GLOBAL SERIES SPONSORS

CYSEC GLOBAL SERIES 2024

CYSEC GLOBAL SERIES 2024

Doha, Qatar

South Africa, Africa

Abu Dhabi, UAE

About TXONE NETWORKS

TXOne Networks provides cybersecurity solutions for ICS and OT environments using the OT zero trust methodology.

TXOne Networks offers cybersecurity solutions that ensure the reliability and safety of industrial control systems and operational technology environments through the OT zero trust methodology. TXOne Networks works together with both leading manufacturers and critical infrastructure operators to develop practical, operations-friendly approaches to cyber defense. TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission-critical devices in a real-time, defense-in-depth manner.

VISIT WEBSITE

About Kaspersky

Kaspersky is a global cybersecurity and digital privacy company founded in 1997. Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky technologies and we help 240,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

About Resilience Co.

Founded in 2019, Resilience Co. is a Cybersecurity consultancy firm in Saudi Arabia. We came from a pure cybersecurity background combined with technicality and academia that positions us as the go-to when the client needs to build some security controls and enhance their resilience against evolving threats. With the continuous evolution of threats across the organization, Resilience understands the importance of continuous visibility and threat hunting.

The team at Resilience Co. is highly qualified, with over 20+ years of experience within the fields of Cybersecurity and Cybersecurity strategies. Understanding our client’s needs and customizing solutions to fit those needs is a competitive advantage that sets us apart.

Our mission at Resilience is to build and develop the cybersecurity frameworks that enhance our clients to be more resilient since we believe that there is no system or information technology secure 100 %, and that’s the story behind our brand “Resilience.SA”  Learn more at resilience.sa 

Cipher-logo-

About Cipher

Cipher was founded with the objective to simplify the perception of complexity surrounding cybersecurity problems and solutions. With well over 20 years of cybersecurity experiences, The Cipher’s Founders and Our Senior Team of cybersecurity experts realized that a new, innovative, and game-changing perspective was needed in how Security Vendors implement Digital Security for their clients. A simpler and more efficient way. While we certainly do not think CyberSecurity is an easy job, we believe implementing and managing Digital Security shouldn’t be our client’s problem. SMEs have plenty of things to deal with daily: they have their product to make, their services to provide, their customers to please, and their companies to grow. 

Learn more at cipher.com.sa

About SSH

SSH Communications Security is a defensive cybersecurity company with the mission to secure critical data and communications between systems, automated applications, and people. Our products are developed to defend your business secrets and access to them – now and in the future.

Founded in 1995 in Helsinki, Finland, SSH is one of the pioneers of cybersecurity and it was responsible for the introduction of the world’s first communication protocol dedicated to protect electronic transactions across the internet – the SSH protocol. Our company continued to focus on the development of other solutions to protect data in transit and at rest, based on Zero-Trust architecture. Backed up by over than 5,000 customers such as Wal-Mart, Western Union, Disney, OCBC Bank and the US IRS, SSH Communications Security later expanded its product portfolio to include solutions for OT/Infrastructure applications, with the release of an Access Control solution dedicated to the Industrial Automation environment named PrivX OT.

Visit us at Cybersec Saudi 2023 in Dammam to learn more about how we can help your business to embrace the use of digital services while protecting your assets against cyber threats.

About Quest

At Quest, we create and manage the software that makes the benefits of new technology real while empowering users and data, streamlining IT operations, and hardening cybersecurity from the inside out. Companies turn to us to manage, modernize and secure their business, from on-prem to in-cloud, from the heart of the network to the vulnerable endpoints. We help you conquer your next challenge confidently and achieve true IT resilience — because the next is here now. Know more: https://www.quest.com/

WALLIX-logo

About WALLIX

WALLIX is the European access and digital identity security specialist and the world leader in PAM (Privileged Access Management). Its technologies enable organizations to meet today’s challenges in IT network protection and data security. They also provide detection and resilience to cyberattacks, protect organizations’ digital assets, and maintain business continuity of IT systems in the cloud and industrial networks. These technologies simplify compliance with regulatory requirements for critical IT infrastructure and data access. With its PAM4ALL, PAM4OT, and Trustelem solutions, WALLIX helps its customers modernize their information systems and put cybersecurity at the service of their digital transformation. Learn more at www.wallix.com

Bulwark-Technologies-Logo

About Bulwark

Bulwark is the leading provider for IT Security and Information Communications & Technology (ICT) products in the Middle East region & India. Bulwark serves the entire region with innovations from more than 20+ technology vendors and works with more than 750+ partners with the aim of bringing the best in technology to the region. Customers from various sectors, including Banking & Finance, Government, Oil & gas, Manufacturing, retail chain, Hospitality, Healthcare, Education, and more, rely on solutions distributed by Bulwark for securing and managing their IT infrastructure. Bulwark has won numerous industry awards for leadership in IT sales and support and has been rated as the best VAD in the region.

For more information, please visit www.bulwark.biz

About Honeywell

Honeywell Building Technologies (HBT) is transforming how every building operates to help improve the quality of life. We are a leading building controls company with operations in over 75 countries supported by a global channel partner network. Commercial building owners and operators use our hardware, software, and analytics to help create safe, efficient, and productive facilities. Our solutions and services are used in more than 10 million buildings worldwide.

Honeywell (www.honeywell.com) delivers industry-specific solutions that include aerospace products and services, control technologies for buildings and industry, and performance materials globally. Our technologies help aircraft, buildings, manufacturing plants, supply chains, and workers become more connected to make our world smarter, safer, and more sustainable. For more news and information on Honeywell, please visit www.honeywell.com/newsroom.

ME_Logo

About ManageEngine

ManageEngine crafts the industry’s broadest suite of IT management software. It has everything organizations need—more than 60 enterprise products—to manage all components of IT operations. From desktops, mobile devices, networks, and servers, to applications, service desks, Active Directory, and security, ManageEngine brings IT together. Since 2002, IT teams have turned to ManageEngine for affordable, feature-rich software that’s easy to use. ManageEngine’s on-premises and cloud solutions power the IT of over 280,000 companies worldwide, including nine out of every ten Fortune 100 companies.  Learn more at www.manageengine.com.

Novigo Logo

About Novigo Solutions

Novigo Solutions is a technology-focused organization that specializes in providing comprehensive Cybersecurity services like VAPT, SIEM, SOC, AI Enabled Next Gen Cyber defense solutions as well as Technology / Business Consulting, Power Apps, SharePoint Development, .Net Development,  Analytics, Low Code / No Code Solutions and Robotic Process Automation (RPA) solutions. Since its inception in 2012, Novigo has become a leading provider of cutting-edge technology solutions, with over 700+ employees and a global presence in countries such as the United States, Saudi Arabia, United Arab Emirates, UK,  India, and Singapore. With a diverse portfolio of clients across 10+ countries, Novigo Solutions prides itself on delivering exceptional service and innovative solutions that help businesses achieve their goals. Learn more at www.novigosolutions.com.

About Binalyze

Binalyze is a leading cybersecurity company specializing in DFIR (Digital Forensics and Incident Response) solutions. With a mission to empower investigators and analysts with cutting-edge tools, Binalyze offers a range of innovative software products and services tailored to the needs of cybersecurity professionals. Their flagship product, Binalyze AIR, sets a new standard in digital investigation by providing a comprehensive suite of features designed to streamline and expedite the analysis of digital evidence. Trusted by organizations worldwide, Binalyze continues to push the boundaries of digital forensics technology, delivering solutions that empower professionals to uncover critical insights and protect against cyber threats. Visit binalyze.com to learn more about their industry-leading solutions and how they can assist in your cybersecurity efforts.

Abdullah Gumaijan

Director of Cybersecurity Operations

Government Entity, Kingdom of Saudi Arabia

As the Director of Cybersecurity Operations in the Ministry of Energy, Abdullah Algumaijan is leading a team of talents responsible for monitoring the Ministry’s assets, responding to cybersecurity incidents, evaluating the security posture of the ministry and implementing security controls aims to protect the Ministry’s digital infrastructure. Prior to this role he specialized in offensive security in STC Solutions and Saudi Aramco.

Abdullah is interested in delivering training for ethical hacking courses, he published online courses in multiple learning platforms and marketplaces. He also collaborates with non-profit organizations to deliver public awareness sessions in cybersecurity.