preloader

Dark

Light

Dark

Light

Scroll to top

MEDIA PARTNERS

INPERSON EVENT:
CYBERSECURITY INNOVATION SERIES (CSIS) – KSA CRITICAL INFRASTRUCTURE CHAPTER

Secure infrastructures. Resilient businesses.
ADAPT. PREPARE. PROTECT.

Date and Timings: 24-25 October 2022 | 09:00 – 17:30 GMT +3

Location: Riyadh, KSA

GCC region witnessed some major cyber-attacks against their critical infrastructure over the years. According to international media the goal was not only to destroy data and shutdown operations but possibly go further and cause an explosion! A case of cyber weaponization! This will not be the last! This situation creates a huge responsibility for ICS & IT professionals to ensure the safety and security of these critical assets to ensure the safety of human lives, the environment, and the economy of the country. With this objective in mind, we present the Cyber Security Innovation Series (CSIS), built around the theme of “Building a Resilient Critical Infrastructure”

Critical Infrastructures are vital to nations and states. Disruption or destruction of such infrastructures or their services would have a devastating impact on economy, national security, public health & safety. Their protection is not only needed and recommended, but required, since several specific national and international regulatory frameworks have been published all over the world.

Analyzing and understanding the cybersecurity risks these infrastructures are facing today, their interdependencies, and the specifics about industrial cybersecurity and how Operational Technology (OT) is totally different from Information Technology (IT), is paramount to properly approach to their effective protection at the entity, sector, and national level.

This Event will take the attendees through the state of the art of Critical Infrastructures Protection, Industrial Cybersecurity, and Industrial Control Systems Cybersecurity. A specific approach to IT and OT cybersecurity and information security management taking into consideration the specifics of Middle East will be shared, including regulatory requirements, existing standards, management frameworks, applicable technologies, and relevant initiatives.

WHY KSA?

  • The Kingdom was named the “Top Digital Riser” among the G20 nations due to the rigorous government support for digital transformation in the Kingdom, as part of Vision 2030
  • Under Third action plan: 2020 – 2024 of The National Strategy for Digital Transformation the Kingdom is focusing on delivering the future through a digitally capable, inclusive workforce
  • Digital Government Authority aims at governance of the digital government, cloud business and cloud; related to the digital government sector
  • National Cybersecurity Strategy aims at achieving a resilient, secure, and trusted Saudi cyberspace that enables growth and prosperity
  • The digital economy in KSA is estimated to have contributed 17.7 percent GDP in 2020 (SAR 449 bn) and expected to reach 19.4 percent by 2025 (SAR 586 bn)

WHY ATTEND?

Join industry leaders and movers within the cybersecurity space and discuss:

  • Identify advances in regional cyber threat trends, vulnerabilities, outlets for support and best of breed solution providers/partners to ensure development of your security practice
  • Regulatory requirement and guidance toward Critical Infrastructure Protections.
  • How to protect your control systems from malicious intrusions
  • Learn to bridge the gap between IT & OT security
  • Cyber Threats to the Critical Infrastructure Control Systems
  • Information security solutions to optimize successful Implementation

What are the lessons learned?:

  • State of the art of Critical Infrastructures Protection
  • Differentiate cybersecurity within IT and ICS domains
  • Identify the impact of an attack against a control system
  • Discuss different stages of an ICS attack
  • Understand issues of Smart Grid cybersecurity
  • Identify vulnerable devices and protocols on the Internet
  • Understand not only cybersecurity organizational details, but technical approaches to protect and ICS infrastructure
  • Understand how to inject Cybersecurity throughout the industrial infrastructure’s lifecycle

WHO SHOULD ATTEND?

Chiefs/Heads/VPs/Managers of:

From industries including:

  • Chief Information Security Officer (CISO)
  • Chief Information Officer (CIO)
  • Chief Security Officer (CSO)
  • Chief Technology Officer (CTO)
  • SVP/Head/Director/Manager of:
     – SCADA/ICS/DCS
     – Cyber Security
     – Information Security
     – IT, Technology
     – Technology Risk
     – Information Risk
     – IT Security
     – IT Risk
     – Security
     – Regulatory & Compliance
     – Network Security
    – Process Control and Automation
    – Data Management Centers
     – Digital Transformation
  • Banking, Financial Services, Insurance
  • Energy and Utilities
  • Government Authorities
  • eCommerce and Retail
  • Manufacturing & Industrial
  • Aviation & Transportation
  • Education
  • Hospitality & Real Estate
  • Healthcare
  • Telecoms & Media
 
                                                                                                   
                                                                                     and more

What we do

Does more then ever platform to achieve goal stages.

Our clients describe us as a product team which creates amazing UI/UX experiences, by crafting top-notch user experience.

Icon
Data Tracking

We help digital companies to volume their self-interest and get a space.

Icon
Financial Audit

We utilize the intensity of structure to tackle complex issues and change.

Icon
Press Releases

Regulatory oneven an enterprises such she and pushed.

Icon
Website/App Design

We utilize the intensity of structure to tackle complex issues and change.

Capabilities

Team
Management.
Brand strategy.

Showcase

Our most recent
digital and strategy
projects.

Capabilities

We help to create
visual strategies.

Website & Mobile Development
0%
Website & Mobile App Design

Cepteur sint occaecat cupidatat proident, taken possession of my entire soul, like these sweet mornings of spring which I enjoy with my whole.

Motion Graphics & Animation

Cepteur sint occaecat cupidatat proident, taken possession of my entire soul, like these sweet mornings of spring which I enjoy with my whole.

User Experience

Cepteur sint occaecat cupidatat proident, taken possession of my entire soul, like these sweet mornings of spring which I enjoy with my whole.

0
Succeeded
projects

Our clients describe us as a product team which creates amazing UI/UX, by crafting top-notch user experience.

0
Working hours
were spent

We’ve structured our workflow processes were from the funny the century rather.

Testimonials

We help to achieve
mutual goals.

Get in touch

Work and general inquiries
+1.809.120.6705

Assistance hours:
Monday – Friday
6 am to 8 pm EST

Post address

541 Melville Ave, Palo Alto,
CA 94301,
United States

Careers

Join our team to
create the best digital
solutions.

We’re a team of creatives who are excited about unique ideas and help fin-tech companies to create amazing identity by crafting top-notch UI/UX.

We use cookies to give you the best experience.