CYBER RESILIENCE FOR SECURING DIGITAL KSA
Cyber Resilience for Tomorrow: Mapping trends, and Unlocking Challenges, Opportunities, and Implications
Cyber Asset Management policy for a strong overall cybersecurity posture
Threat Intelligence: Preventing advanced persistent threat (APT), Distributed denial of service (DDoS) and Man-in-the-middle attack (MitM) and Password attacks.
Risk & Compliance: Understanding the current status of an organization's security posture requires constant evaluation of evolving risks, security standards and cyber regulations
Mitigating Cyber Security Threats: Application security, Zero trust polices and Extended Detection and Response
New Role of AI in Cyber Security: How Ai based solutions can help protect cloud data and network security.
Data Security & Privacy: Mapping policies, procedures and multi-level points to avoid data breach
Saudi Arabian Olympic Committee
The Saudi Investment Bank
King Abdullah University of Science & Technology
National Guard Health Affairs, Saudi Arabia
Government of Saudi Arabia
*Timings are Saudi Arabia Local Time (GMT +3) .
DRIVING HYBRID CLOUD, COMPLIANCE AND CYBER RESILIENCE IN KSA
In the period of Big Data and the Internet of Things, data generated by the web, email, and social media applications, it creates a challenge to Security Information and Event Management (SIEM) and, as a result, it is likely to propel the growth in the cybersecurity market. LET’S LISTEN FROM THE DATA LEADER ON HOW SUCH A POWERFUL TOOL, SUCH AS BIG DATA EXAMINING HUGE AMOUNTS OF DATA THAT MAY BE VULNERABLE TO CYBER THREATS.
Two-days of industry-driven dialogue featuring over 25 Cybersecurity Leaders from Saudi Arabia, GCC, and the globe,discussing the latest opportunities and solutions for the cybersecurity industry across sectors.
Dedicated Tech Zone to explore new ideas and solutions, and map your cybersecurity needs
Meet key decisionmakers from the public and private sector to learn about cutting-edge cybersecurity products and solutions
Take advantage of peer-to-peer discussions to develop new ideas and get insights.
Cyber Next Dialogues attract a senior and diverse audience allowing you to build lasting relationships with key decision makers from the public and private sectors.
Meet pre-qualified 100+ cybersecurity leaders and with limited suppliers to reinforce and position your brand as a thought leader fostering collaboration.
Cyber Next provides an ideal environment to showcase yourself virtually and participate in one-to-one conversations during scheduled networking breaks.
Schedule one-to-one meetings with potential clients in a conducive B2B environment during and after the event.
Online registration for CYBER Next Saudi is open to professionals from end-user companies only. To register please complete the following registration form.
Note : If you work for a company which provides cyber security and related software products, solutions and services or a consultant, re-seller or distributor OR work in a sales, marketing, business development, product and service delivery role please email email@example.com for further information of how you can be involved in this event.
Press and Journalists may reach our marketing team at firstname.lastname@example.org