Event Overview

Rate of cyberattacks and data breaches risks have increased, with the acceleration of digital transformation, in turn making the Kingdom more active to provide a secure environment for data, digital operations via robust security system. Considering this, National Cybersecurity Authority role has been made very strategical to develop, implement and supervise security systems on national level.

Kingdom’s ICT Sector has been characterized by rapid developments in the methods and complexity of attacks, in turn requiring the kingdom to be in a constant state of readiness and flexibility to neutralize cyber risks coming their way. According to TechSci research, Saudi Arabia Cybersecurity market stood at USD3749.40 million in 2021 and is forecast to grow at a CAGR of 18.73% by 2027. High adoption of the remote working regimes by the SMEs and large enterprises contributed to increased network security threats in Saudi Arabia, as well as the enterprises of Saudi Arabia have been increasingly investing in network security tools and equipment, which is likely to boost the Saudi Arabia Cybersecurity Market.

The Series continues to grow and now bringing two day in-person event on the 26th October, venue to be disclosed shortly(5-star venue) . Cyber Next Summit & Awards, Saudi Edition previously known as CyberX Saudi, is aimed to understanding the latest challenges and threats in cyber security whilst educating cyber security professionals to equip themselves with industry best practices & strategies, next gen processes and solutions to improving cyber resilience at a national and organisational level. Cyber Security leaders from the Kingdom will harness upon their knowledge and expertise to understand the increasing reliance of businesses on information technology as organizations move to the cloud to improve their performance and adopt a cloud-first policy for all new projects.

Join us for two-day event discussing the challenges and solutions for Hybrid cloud strategy, cloud security, Risk and Compliance policies, Asset Management, Application Security, Data privacy and security, Threat intelligence, Identity and access management, Ransomware protection, endpoint protection and Ai in Cyber Security with keynotes, panel discussions, case studies, solution provider showcases.

Featured Discussions

Cyber Resilience for Tomorrow: Mapping trends, and Unlocking Challenges, Opportunities, and Implications

Cyber Asset Management policy for a strong overall cybersecurity posture

Threat Intelligence: Preventing advanced persistent threat (APT), Distributed denial of service (DDoS) and Man-in-the-middle attack (MitM) and Password attacks.

Risk & Compliance: Understanding the current status of an organization's security posture requires constant evaluation of evolving risks, security standards and cyber regulations

Mitigating Cyber Security Threats: Application security, Zero trust polices and Extended Detection and Response

New Role of AI in Cyber Security: How Ai based solutions can help protect cloud data and network security.

Data Security & Privacy: Mapping policies, procedures and multi-level points to avoid data breach

Speakers for 2022

Mashari AlMusad

Director Of Information Communication Technology,

Saudi Arabian Olympic Committee

Mamdoh Alzhran

Chief Cyber Security Officer,

The Saudi Investment Bank

Ayad Sleiman

Head of Information Security,

King Abdullah University of Science & Technology

Dr. Raed Al Hazme

Executive Director, Information Services & Informatics Division,

National Guard Health Affairs, Saudi Arabia

Ayman Al-Ansari


Government of Saudi Arabia


Innovation Technology Lead Monsha’at,

Saudi Arabia

More Speakers Download Agenda

Agenda 2022

Download Full Agenda
⬅ Tap Me
  • - Chief Information Security Officer
  • - Chief Information Officers
  • - Chief Digital Officers
  • - SVP/VP/Director/Head/Manager of IT/OT
  • - Cybersecurity Leaders
  • - Cybersecurity Specialist
  • - SCADA Engineers
  • - Security Engineer
  • - Cyber Security Risk Monitoring professionals
  • - Cyber Security Operations professionals
  • - Cyber Security Governance Manager
  • - Cybersecurity Advisor
  • - Chief Data officer
  • - Cloud Architect
  • - Head of IT Infrastructure
⬅ Tap Me
  • - Government

  • - Healthcare

  • - BFSI

  • - Fintech

  • - Energy & Utilities

  • - Transportation

  • - Manufacturing

  • - Real Estate & Infrastructure

  • - Retail

  • - Sports

  • - Defence & Security

  • - Aerospace

  • - Tourism & Hospitality


Cutting Edge Discussions:

Two-days of industry-driven dialogue featuring over 25 Cybersecurity Leaders from Saudi Arabia, GCC, and the globe,discussing the latest opportunities and solutions for the cybersecurity industry across sectors.


Tech Demo Drive:

Dedicated Tech Zone to explore new ideas and solutions, and map your cybersecurity needs


Network & Connect:

Meet key decisionmakers from the public and private sector to learn about cutting-edge cybersecurity products and solutions


Join the discussions:

Take advantage of peer-to-peer discussions to develop new ideas and get insights.

Why Partner with

Thought Leadership

Cyber Next Dialogues attract a senior and diverse audience allowing you to build lasting relationships with key decision makers from the public and private sectors.

Network with Decision-makers

Meet pre-qualified 100+ cybersecurity leaders and with limited suppliers to reinforce and position your brand as a thought leader fostering collaboration.

Connect Collaborate Drive

Cyber Next provides an ideal environment to showcase yourself virtually and participate in one-to-one conversations during scheduled networking breaks.

Unmatched Networking & One to One Meeting

Schedule one-to-one meetings with potential clients in a conducive B2B environment during and after the event.

Strategic Event Partner

Supporting Partner


Silver Sponsor



Cyber Next Series Sponsors

Cyber Next Series Media Partners

Online registration for CYBER Next Saudi is open to professionals from end-user companies only. To register please complete the following registration form.

Note : If you work for a company which provides cyber security and related software products, solutions and services or a consultant, re-seller or distributor OR work in a sales, marketing, business development, product and service delivery role please email for further information of how you can be involved in this event.

Press and Journalists may reach our marketing team at

(Kindly ensure correct spelling, capitalization and spacing where necessary)