Scroll to top



Secure infrastructures. Resilient businesses.

Date and Timings: 24-25 October 2022 | 09:00 – 17:30 GMT +3

Location: Riyadh, KSA

GCC region witnessed some major cyber-attacks against their critical infrastructure over the years. According to international media the goal was not only to destroy data and shutdown operations but possibly go further and cause an explosion! A case of cyber weaponization! This will not be the last! This situation creates a huge responsibility for ICS & IT professionals to ensure the safety and security of these critical assets to ensure the safety of human lives, the environment, and the economy of the country. With this objective in mind, we present the Cyber Security Innovation Series (CSIS), built around the theme of “Building a Resilient Critical Infrastructure”

Critical Infrastructures are vital to nations and states. Disruption or destruction of such infrastructures or their services would have a devastating impact on economy, national security, public health & safety. Their protection is not only needed and recommended, but required, since several specific national and international regulatory frameworks have been published all over the world.

Analyzing and understanding the cybersecurity risks these infrastructures are facing today, their interdependencies, and the specifics about industrial cybersecurity and how Operational Technology (OT) is totally different from Information Technology (IT), is paramount to properly approach to their effective protection at the entity, sector, and national level.

This Event will take the attendees through the state of the art of Critical Infrastructures Protection, Industrial Cybersecurity, and Industrial Control Systems Cybersecurity. A specific approach to IT and OT cybersecurity and information security management taking into consideration the specifics of Middle East will be shared, including regulatory requirements, existing standards, management frameworks, applicable technologies, and relevant initiatives.


  • The Kingdom was named the “Top Digital Riser” among the G20 nations due to the rigorous government support for digital transformation in the Kingdom, as part of Vision 2030
  • Under Third action plan: 2020 – 2024 of The National Strategy for Digital Transformation the Kingdom is focusing on delivering the future through a digitally capable, inclusive workforce
  • Digital Government Authority aims at governance of the digital government, cloud business and cloud; related to the digital government sector
  • National Cybersecurity Strategy aims at achieving a resilient, secure, and trusted Saudi cyberspace that enables growth and prosperity
  • The digital economy in KSA is estimated to have contributed 17.7 percent GDP in 2020 (SAR 449 bn) and expected to reach 19.4 percent by 2025 (SAR 586 bn)


Join industry leaders and movers within the cybersecurity space and discuss:

  • Identify advances in regional cyber threat trends, vulnerabilities, outlets for support and best of breed solution providers/partners to ensure development of your security practice
  • Regulatory requirement and guidance toward Critical Infrastructure Protections.
  • How to protect your control systems from malicious intrusions
  • Learn to bridge the gap between IT & OT security
  • Cyber Threats to the Critical Infrastructure Control Systems
  • Information security solutions to optimize successful Implementation

What are the lessons learned?:

  • State of the art of Critical Infrastructures Protection
  • Differentiate cybersecurity within IT and ICS domains
  • Identify the impact of an attack against a control system
  • Discuss different stages of an ICS attack
  • Understand issues of Smart Grid cybersecurity
  • Identify vulnerable devices and protocols on the Internet
  • Understand not only cybersecurity organizational details, but technical approaches to protect and ICS infrastructure
  • Understand how to inject Cybersecurity throughout the industrial infrastructure’s lifecycle


Chiefs/Heads/VPs/Managers of:

From industries including:

  • Chief Information Security Officer (CISO)
  • Chief Information Officer (CIO)
  • Chief Security Officer (CSO)
  • Chief Technology Officer (CTO)
  • SVP/Head/Director/Manager of:
     – Cyber Security
     – Information Security
     – IT, Technology
     – Technology Risk
     – Information Risk
     – IT Security
     – IT Risk
     – Security
     – Regulatory & Compliance
     – Network Security
    – Process Control and Automation
    – Data Management Centers
     – Digital Transformation
  • Banking, Financial Services, Insurance
  • Energy and Utilities
  • Government Authorities
  • eCommerce and Retail
  • Manufacturing & Industrial
  • Aviation & Transportation
  • Education
  • Hospitality & Real Estate
  • Healthcare
  • Telecoms & Media
                                                                                     and more

Our clients describe us as a product team which creates amazing UI/UX experiences, by crafting top-notch user experience.

Our clients describe us as a product team which creates amazing UI/UX, by crafting top-notch user experience.

We’ve structured our workflow processes were from the funny the century rather.

Work and general inquiries

Assistance hours:
Monday – Friday
6 am to 8 pm EST

541 Melville Ave, Palo Alto,
CA 94301,
United States

We’re a team of creatives who are excited about unique ideas and help fin-tech companies to create amazing identity by crafting top-notch UI/UX.

We use cookies to give you the best experience.