Leading OT & IT security event in Saudi Arabia

CYSEC
SAUDI 2024

Hack-Proofing Critical Infrastructure: Where OT & IT Security Gets Real

Hack-Proofing Critical Infrastructure:
Where OT & IT Security Gets Real

21st-22nd May 2024 | Al Khobar | Saudi Arabia

Supporting Partner

Event Overview

MicrosoftTeams-image (52)

We are thrilled to announce the return of the CYSEC SAUDI Summit and Awards, now in its 9th global edition, taking place on the 21st-22nd May 2024 in Al Khobar, the industrial heart of the Kingdom of Saudi Arabia.

As the lines between the digital and physical worlds blur, the importance of securing Operational Technology (OT) and Information Technology (IT) infrastructures has never been more paramount. This summit serves as a crucial meeting point for leaders in OT and IT security, offering a prime opportunity to explore the latest insights, trends, and strategies in the field. A unique chance for the security pros to ensure our critical sectors are robust and resilient. Join us to explore the intricacies of OT and IT security, discover cutting-edge solutions, and build partnerships that will safeguard the Critical Assets.

We’re not just discussing OT and IT Security; we’re at the forefront, leading the charge.

ADVISORY BOARD

Hussain_AlJahdali-removebg-preview

Dr. Hussain AlJahdali

Advisor (ITET)

Communications, Space & Technology Commission

Muhammad_Khurram_Khan-removebg-preview

Prof. Muhammad Khurram Khan

Founder & CEO of Global Foundation for Cyber Studies and Research | Professor of Cybersecurity at King Saud University

CYSEC SAUDI 2024 SPEAKERS

Aamir Khalid Pirzada 1

Aamir Khalid Pirzada

Chief Information Officer

National Metal Manufacturing and Casting Company (Maadaniyah)

MUHAMMAD SIDDIQUE 1

Muhammad Siddique

General Manager IT

Al-Ittefaq Steel Products Company

Ahmed Al-Barrak

Ahmad Al-Barrak

OT Cybersecurity Leader

Aramco

Ahmed Al Saleh - Aramco

Ahmed Al Saleh

OT Cybersecurity Lead

Aramco

CYSEC SAUDI 2024 - AGENDA

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

09:10

Keynote: Cyber - Physical Security

09:30

Panel Discussion: Securing Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

09:10

Keynote: Cyber - Physical Security

09:30

Panel Discussion: Securing Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Welcome Address & Introduction to Conference

09:10

Opening Government Keynote Speech

10:10

Keynote: "Quantum Cybersecurity"

10:30

Keynote: “Role of Network Segmentation"

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

09:10

Keynote: Cyber - Physical Security

09:30

Panel Discussion: Securing Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

08:00

Registration and Networking

09:00

Opening remarks and summary from Day 1

09:10

Government Keynote: Prioritising OT security

10:10

Keynote: Cyber - Physical Security

10:30

Panel Discussion: Third-Party Networks

WHY ATTEND CYSEC SAUDI

Learn About
With Peers And Colleagues
Achievements

WHY PARTNER
WITH CYSEC SAUDI

Brand Exposure

Increase the level of visibility and awareness of your brand amongst the target audience who are relevant to your business through pre, during, and post-event marketing. Have your brand seen, recognized, and remembered by potential customers for potential business collaborations.

Strategic Networking

Opportunity to network with other businesses, pre-qualified attendees, and industry leaders to achieve specific goals and objectives, which may lead to valuable partnerships, business opportunities, expanding professional circle, and achieving collective objectives.

Community Involvement

Collaborate with other local businesses and organizations to support community development and growth. Create positive social impact, and build stronger, more resilient relationships. Contribute to the well-being of the region's goal and foster a sense of shared responsibility.

Customizable Solutions

Leverage packages that can be tailor-made, to meet the specific needs and priorities of your organization. Differentiate yourself from competitors, provide significant value to customers, and build stronger customer relationships based on their unique needs and preferences.

WHO SHOULD ATTEND

CXO | VP | DIRECTOR

Chief Information Security Officer

Chief Information Officer

Chief Data Officer / Chief Digital Officer

Chief Technology Officer

Chief Risk Officer

SVP/VP/Director/Head/Manager of IT/OT

HEADS | MANAGERS

Network Security

Data Security

Identity and Access Management

IT /OT

ICS Cybersecurity

Information Security

Cloud Security

Threat Intelligence

Vulnerability Management

Cyber Risk Management

Incident Response

Business Continuity and Disaster Recovery

Third-Party Risk Management

Compliance

IT Audits

PROFESSIONALS

SCADA/ICS Security Engineers

Penetration Testers

Automation & Process Control

Security Consultant

INDUSTRY

Oil & Gas

Chemicals

Utilities

Government

Agriculture

Healthcare

Metals & Mining

Critical Manufacturing

Defense Industrial Base Sector

Nuclear Reactors, Materials & Waste Sector

EVENT HIGHLIGHTS

Video gallery

Image gallery

SPONSORS & PARTNERS 2024

HEADLINE SPONSOR

GOLD SPONSORs

SILVER SPONSORS

BRONZE SPONSORs

MEDIA PARTNERS

WHO SHOULD ATTEND

CYSEC GLOBAL SERIES SPONSORS

CYSEC GLOBAL SERIES 2024

Doha, Qatar

Abu Dhabi, UAE

South Africa, Africa

About TXOne Networks

TXOne Networks provides cybersecurity solutions for ICS and OT environments using the OT zero trust methodology.

TXOne Networks offers cybersecurity solutions that ensure the reliability and safety of industrial control systems and operational technology environments through the OT zero trust methodology. TXOne Networks works together with both leading manufacturers and critical infrastructure operators to develop practical, operations-friendly approaches to cyber defense. TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission-critical devices in a real-time, defense-in-depth manner.

LogRhythm

Founded in 2003 and headquartered in Colorado, USA, LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency.

With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com.

Odyssey

We Secure Your Cyber Resilient Future Odyssey is a leader in Cybersecurity, supporting organizations globally through their journey towards attaining and sustaining cyber resilience, in a highly volatile threat landscape.

Driven by our core values: INNOVATION, PASSION FOR EXCELLENCE, and CLIENT FOCUS, empowered by a rich skillset and stealth code of ethics, we help clients build digital ecosystems capable of anticipating, responding, withstanding, adapting to adverse conditions, and quickly recovering from disruptive cyber-attacks while meeting compliance obligations.

To fulfill this mission, we have developed a 360° Holistic Approach for Achieving Cyber Resilience, consisting of solutions, services, and product offerings classified into five distinct yet synergistic pillars, namely: Managed Services, Advisory Services, Threat Risk Assessment Services, Hybrid Integrated Solutions, and ClearSkies TDIR Platform. 

Unique to our approach is the breadth and depth of our World Class Professional Services’ involvement in delivering our solutions, services and products, which come to optimize and amplify the efficiency, effectiveness, and value of our offerings.

We operate state-of-the-art SOC2® attested Security Operations Centers in multiple regions, serving clients globally. We are ISO 27001, ISO 9001, and ISO 22301 certified. Also, accredited by the Payment Card Industry Security Standards Council (PCI SSC) as a Qualified Security Assessor (QSA).

Through our two-decade journey, we have received numerous global and national awards and recognitions, among which, inclusion in the Gartner Magic Quadrant for Security Event Management Systems in 2021, 2023-24, and Data Impact Award for the Most Admirable Architecture, both for our ClearSkies™ TDIR Platform. Additionally, we have received several service excellence and innovation awards from national and international bodies.

About Quest

At Quest, we create and manage the software that makes the benefits of new technology real while empowering users and data, streamlining IT operations, and hardening cybersecurity from the inside out. Companies turn to us to manage, modernize and secure their business, from on-prem to in-cloud, from the heart of the network to the vulnerable endpoints. We help you conquer your next challenge confidently and achieve true IT resilience — because the next is here now.

About Xage

Xage is the first and only zero-trust real-world security company. Xage’s solutions and services accelerate and simplify the way enterprises secure, manage, and transform digital operations across OT, IT, and cloud. Xage products include Identity-based access management, remote access, and zero-trust data exchange, all powered by the Xage Fabric. Xage also offers Cybersecurity Services, which deliver expert design, implementation, and support services to accelerate the adoption of proactive cyber-defense and underpin secure digital transformation.

About Nozomi Networks

Nozomi Networks protects the world’s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience.

Amiviz

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, representing over 40 leading and niche vendors. An ideal blend of channel empowerment of over 500 partners and a deep-rooted ethos of attaining excellent customer experiences has helped AmiViz build a strong customer capital of 3000+ across industries like Government, BFSI, Oil & Gas, Telcos, and large enterprises.

About WALLIX

WALLIX is the European access and digital identity security specialist and the world leader in PAM (Privileged Access Management). Its technologies enable organizations to meet today’s challenges in IT network protection and data security. They also provide detection and resilience to cyberattacks, protect organizations’ digital assets, and maintain business continuity of IT systems in the cloud and industrial networks. These technologies simplify compliance with regulatory requirements for critical IT infrastructure and data access. With its PAM4ALL, PAM4OT, and Trustelem solutions, WALLIX helps its customers modernize their information systems and put cybersecurity at the service of their digital transformation.

About SECUREWORKS

Secureworks (NASDAQ: SCWX) is a global cybersecurity leader that protects customer progress with Secureworks® Taegis™, a cloud-native security analytics platform built on 20+ years of real-world threat intelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions.

EMT Distribution

emt Distribution is a leading value-added distributor in the META region, specializing in cybersecurity solutions. With a wide range of innovative technologies and an experienced team, emt Distribution provides top-notch cybersecurity solutions and services to its clients, helping them stay secure in the ever-changing digital landscape. With its extensive experience and strong presence in the META cybersecurity market, emt is well-positioned to make the most of its partnerships and helps organizations in the region stay ahead of evolving security threats.

Corelight

Corelight transforms network and cloud activity into evidence so that data-first defenders can stay ahead of ever-changing attacks. Delivered by our Open NDR Platform, Corelight’s comprehensive, correlated evidence gives you unparalleled visibility into your network. This evidence allows you to unlock new analytics, investigate faster, hunt like an expert, and even disrupt future attacks.

Our on-prem and cloud sensors go anywhere to capture structured, industry-standard telemetry and insights that work with the tools and processes you already use. Corelight’s global customers include Fortune 500 companies, major government agencies, and research universities.

Immersive Labs

Immersive Labs, the forefront leader in cultivating people-centric cyber resilience, empowers your entire organization to proactively prevent and respond to cyber threats effectively. With their cutting-edge Enterprise platform, you can continuously assess, develop, and validate your cyber capabilities tailored to individual roles, ensuring your team stays ahead of the constantly evolving threat landscape.

XONA

XONA enables frictionless user access that’s purpose-built for operational technology (OT) and other critical infrastructure systems. Technology agnostic and configured in minutes, XONA’s proprietary protocol isolation and zero-trust architecture immediately eliminates common attack vectors, while giving authorized users seamless and secure control of operational technology from any location or device.

With integrated multi-factor authentication, user-to-asset access controls, user session analytics, and automatic video recording, XONA is the single, secure portal that connects the cyber-physical world and enables critical operations to happen from anywhere with total confidence and trust.

Phosphorus

Phosphorus Cybersecurity® is the leading CPS Protection Platform delivering a proactive approach to security management for the exploding IoT, OT, IIoT, and IoMT attack surface. Designed to find and secure the unknown and often unmonitored world of devices, our Unified xIoT Security Management Platform provides security management across every industry —delivering high-fidelity discovery and risk assessment, proactive hardening and remediation, and continuous monitoring and management. With patented Intelligent Active Discovery and risk assessment, Phosphorus automates the mitigation and remediation of the most significant device vulnerabilities – including unknown and inaccurate asset inventory, default credentials, out-of-date and vulnerable firmware, risky configurations, banned and end-of-life devices, and expired or self-signed certificates.

Abdullah Gumaijan

Director of Cybersecurity Operations

Government Entity, Kingdom of Saudi Arabia

As the Director of Cybersecurity Operations in the Ministry of Energy, Abdullah Algumaijan is leading a team of talents responsible for monitoring the Ministry’s assets, responding to cybersecurity incidents, evaluating the security posture of the ministry and implementing security controls aims to protect the Ministry’s digital infrastructure. Prior to this role he specialized in offensive security in STC Solutions and Saudi Aramco.

Abdullah is interested in delivering training for ethical hacking courses, he published online courses in multiple learning platforms and marketplaces. He also collaborates with non-profit organizations to deliver public awareness sessions in cybersecurity.