sessions

sessions

Awareness Sessions Tracks:

·         Leaders: Leaders and Executives

Topics covered:

·         Cyber risks

·         Cybersecurity at the national level

·         Tasks and responsibilities of national entities

·         Responsibilities of individuals

 

·           Users: Employees at all levels of the national entities

Topics covered:

o   Cyber security

o   Methods used for cyber attacks

o   Cyber risks

o   Examples of cyber attacks

o   Examples of previous cyber incidents in Saudi Arabia

o   Protecting your computer

o   Mobile phone security

o   Family and community protection

o   The role of the user in enhancing cybersecurity

o   Data confidentiality

o   Safe internet browsing

o   Social engineering

o   Email security

 

·           Technicians: Cybersecurity specialists at national entities

Topics covered:

o   Cyber security

o   Essential Cybersecurity Controls (ECC – 1: 2018)

o   Cybersecurity tools

o   Roles and responsibilities of cybersecurity professionals

o   Enhancing entities’ cybersecurity and potential risks

o   The importance of continuous cybersecurity awareness

o   Relevant security frameworks and standards

o   Data confidentiality

o   Network security

o   Cybersecurity program and methods of its application in the entities

o   The role of the Supervisory Committee for Cybersecurity in national entities

o   Malware

o   Internal threats and means of preventing them

o   The most prominent challenges in the implementation of cybersecurity controls

o   Reviewing successful models and experiences of national entities

sess

Objectives



 

    Raising cybersecurity awareness 

 

     Creating a strong cybersecurity culture among employees of national entities    

 

    Reducing internal cyber threats

  Maintaining national 

 

Exhibition Pavilions


 

     Cybersecurity overview 

 This pavilion offers insights into the importance of cybersecurity on a national scale and explores NCA's efforts to bolster cybersecurity across the Kingdom.

 Cyberattack simulation

 visitors experience two simulated cyber breach scenariosone through a mobile device and the other via a computerto demonstrate how breaches occur and the potential impact of cyberattacks on individuals.

 Advice and recommendations

This booth provides expert guidance and consultations, where visitors can discuss cybersecurity assessments and be provided with educational leaflets to better understand cybersecurity measures.

 

Cyber assessment

Visitors evaluate their internet behaviors by answering diagnostic questions on available devices. After completing the assessment, they can consult with experts to discuss their results