Are you a cybersecurity leader, practitioner, or researcher with deep experience in vulnerability management? Join us as a speaker at the Saudi Vulnerability Management Conference and share your knowledge, innovations, and lessons learned with an audience of professionals dedicated to strengthening the region’s cyber defense. As a speaker, you’ll gain visibility among decision-makers in both government and private sectors, contribute to advancing industry practices, and help shape the national conversation around proactive cybersecurity.
Key Topics of Interest We welcome proposals on a wide range of topics, including but not limited to:
Threat Intelligence Integration with VM
Risk-Based Vulnerability Prioritization
Patch Management in Complex Environments
Building a Scalable Vulnerability Management Program
CVSS Scoring and Beyond (EPSS, KEV, etc.)
Cloud & Container Vulnerability Management
Vulnerability Management in OT/ICS Environments
Regulatory Compliance (NCA, SAMA, ISO 27001, etc.)
Red Teaming and Blue Teaming Collaboration
Case Studies on Successful Remediation Programs
Vulnerability Disclosure Policies and Bug Bounty Programs