Are you a cybersecurity leader, practitioner, or researcher with deep experience in vulnerability management? Join us as a speaker at the Saudi Vulnerability Management Conference and share your knowledge, innovations, and lessons learned with an audience of professionals dedicated to strengthening the region’s cyber defense.
As a speaker, you’ll gain visibility among decision-makers in both government and private sectors, contribute to advancing industry practices, and help shape the national conversation around proactive cybersecurity.

Key Topics of Interest
We welcome proposals on a wide range of topics, including but not limited to:
  • Threat Intelligence Integration with VM
  • Risk-Based Vulnerability Prioritization
  • Patch Management in Complex Environments
  • Building a Scalable Vulnerability Management Program
  • CVSS Scoring and Beyond (EPSS, KEV, etc.)
  • Cloud & Container Vulnerability Management
  • Vulnerability Management in OT/ICS Environments
  • Regulatory Compliance (NCA, SAMA, ISO 27001, etc.)
  • Red Teaming and Blue Teaming Collaboration
  • Case Studies on Successful Remediation Programs
  • Vulnerability Disclosure Policies and Bug Bounty Programs
  • Automation and AI in Vulnerability Management
  • DevSecOps and Continuous Scanning
*
*
*
*
*
*
*
*