CYSEC
SAUDI 2023
Securing Kingdom's Critical Infrastructure in The Newly Connected World
20th – 21st JUNE 2023 | DAMMAM | SAUDI ARABIA
CYSEC
SAUDI 2023
Securing Kingdom's Critical Infrastructure in The Newly Connected World
20th – 21st JUNE 2023 | DAMMAM | SAUDI ARABIA
About Us
About Us

We are excited to bring back our second edition of the CYSEC SAUDI Summit and Awards in the Kingdom of Saudi Arabia taking place on the 20 – 21 June 2022 in Dammam. As cyber threats become more sophisticated and prevalent, it is critical for those responsible for securing critical infrastructure to stay up-to-date on the latest threats, trends, and best practices in cybersecurity. The CYSEC SAUDI Summit and Awards is the premier cybersecurity event focused on redefining Cybersecurity for Saudi’s Critical Infrastructure. By attending this conference, you will have the opportunity to learn from cybersecurity experts, government officials, and industry leaders about the latest cybersecurity challenges, solutions, and strategies for protecting our nation’s critical infrastructure.
We welcome you to join us at the CYSEC SAUDI Summit and Awards. See you there!
ADVISORY BOARD
ADVISORY BOARD

Abdullah Algumaijan
Director of Security, Operations Department
Government Entity

Dr. Hussain Aldawood
Cyber Security Innovation Director
NEOM

Nasser Bostan
Chief Data Integrity Officer
Tonomous

Shaker Hashlan
Advisor Consultant for ICS and OT cyber security
GCC’s Leading Electricity Company

Doaa Zamzami
ICS Cybersecurity Engineer
Saudi Aramco

Darweesh Al-Buainain
CISO
Saudi Aramco Total Refining and Petrochemical Company (SATORP)

Abdullah Aljaber
CISO
Government Entity
AGENDA
AGENDA
- 20th June
- 21st June
08:00
Registration and Networking
09:00
Welcome Address & Introduction to Conference
09:10
Opening Government Keynote Speech
10:10
Keynote: "Quantum Cybersecurity"
10:30
Keynote: “Role of Network Segmentation"
08:00
Registration and Networking
09:00
Welcome Address & Introduction to Conference
09:10
Opening Government Keynote Speech
10:10
Keynote: "Quantum Cybersecurity"
10:30
Keynote: “Role of Network Segmentation"
08:00
Registration and Networking
09:00
Welcome Address & Introduction to Conference
09:10
Opening Government Keynote Speech
10:10
Keynote: "Quantum Cybersecurity"
10:30
Keynote: “Role of Network Segmentation"
08:00
Registration and Networking
09:00
Opening remarks and summary from Day 1
09:10
Government Keynote: Prioritising OT security
09:10
Keynote: Cyber - Physical Security
09:30
Panel Discussion: Securing Third-Party Networks
08:00
Registration and Networking
09:00
Opening remarks and summary from Day 1
09:10
Government Keynote: Prioritising OT security
10:10
Keynote: Cyber - Physical Security
10:30
Panel Discussion: Third-Party Networks
08:00
Registration and Networking
09:00
Opening remarks and summary from Day 1
09:10
Government Keynote: Prioritising OT security
10:10
Keynote: Cyber - Physical Security
10:30
Panel Discussion: Third-Party Networks
- 20th June
- 21st June
08:00
Registration and Networking
09:00
Welcome Address & Introduction to Conference
09:10
Opening Government Keynote Speech
10:10
Keynote: "Quantum Cybersecurity"
10:30
Keynote: “Role of Network Segmentation"
08:00
Registration and Networking
09:00
Welcome Address & Introduction to Conference
09:10
Opening Government Keynote Speech
10:10
Keynote: "Quantum Cybersecurity"
10:30
Keynote: “Role of Network Segmentation"
08:00
Registration and Networking
09:00
Welcome Address & Introduction to Conference
09:10
Opening Government Keynote Speech
10:10
Keynote: "Quantum Cybersecurity"
10:30
Keynote: “Role of Network Segmentation"
08:00
Registration and Networking
09:00
Opening remarks and summary from Day 1
09:10
Government Keynote: Prioritising OT security
09:10
Keynote: Cyber - Physical Security
09:30
Panel Discussion: Securing Third-Party Networks
08:00
Registration and Networking
09:00
Opening remarks and summary from Day 1
09:10
Government Keynote: Prioritising OT security
10:10
Keynote: Cyber - Physical Security
10:30
Panel Discussion: Third-Party Networks
08:00
Registration and Networking
09:00
Opening remarks and summary from Day 1
09:10
Government Keynote: Prioritising OT security
10:10
Keynote: Cyber - Physical Security
10:30
Panel Discussion: Third-Party Networks
WHY ATTEND
CYSEC SAUDI
WHY ATTEND
CYSEC SAUDI
WHY PARTNER
WITH CYSEC SAUDI
WHY PARTNER
WITH CYSEC SAUDI

Brand Exposure
Increase the level of visibility and awareness of your brand amongst the target audience who are relevant to your business through pre, during, and post-event marketing. Have your brand seen, recognized, and remembered by potential customers for potential business collaborations.

Strategic Networking
Opportunity to network with other businesses, pre-qualified attendees, and industry leaders to achieve specific goals and objectives, which may lead to valuable partnerships, business opportunities, expanding professional circle, and achieving collective objectives.

Community Involvement
Collaborate with other local businesses and organizations to support community development and growth. Create positive social impact, and build stronger, more resilient relationships. Contribute to the well-being of the region's goal and foster a sense of shared responsibility.

Customizable Solutions
Leverage packages that can be tailor-made, to meet the specific needs and priorities of your organization. Differentiate yourself from competitors, provide significant value to customers, and build stronger customer relationships based on their unique needs and preferences.

Brand Exposure
Increase the level of visibility and awareness of your brand amongst the target audience who are relevant to your business through pre, during, and post-event marketing. Have your brand seen, recognized, and remembered by potential customers for potential business collaborations.

Strategic Networking
Opportunity to network with other businesses, pre-qualified attendees, and industry leaders to achieve specific goals and objectives, which may lead to valuable partnerships, business opportunities, expanding professional circle, and achieving collective objectives.

Community Involvement
Collaborate with other local businesses and organizations to support community development and growth. Create positive social impact, and build stronger, more resilient relationships. Contribute to the well-being of the region's goal and foster a sense of shared responsibility.

Customizable Solutions
Leverage packages that can be tailor-made, to meet the specific needs and priorities of your organization. Differentiate yourself from competitors, provide significant value to customers, and build stronger customer relationships based on their unique needs and preferences.
WHO SHOULD ATTEND
WHO SHOULD ATTEND
CXO | VP | DIRECTOR
Chief Information Security Officer
Chief Information Officer
Chief Data Officer / Chief Digital Officer
Chief Technology Officer
Chief Risk Officer
SVP/VP/Director/Head/Manager of IT/OT
HEADS | MANAGERS
Network Security
Data Security
Identity and Access Management
IT /OT
ICS Cybersecurity
Information Security
Cloud Security
Threat Intelligence
Vulnerability Management
Cyber Risk Management
Incident Response
Business Continuity and Disaster Recovery
Third-Party Risk Management
Compliance
IT Audits
PROFESSIONALS
SCADA/ICS Security Engineers
Penetration Testers
Automation & Process Control
Security Consultant