Schedule

Timetable for the conference

Day 1

14th May

Agenda

  • 1.1 Delegates arrive in Qassim in the morning and are greeted by the conference team, ensure hotels are located and visitors are settled in. A briefing will be provided to foreign visitors unfamiliar with KSA including historical and cultural background
  • 1.2 Delegates arrive at the Conference Venue
  • 1.3 Coffee Tae and cakes on arrival at the Conference Centre after lunch about 2pm AFTER PRAYERS.
  • 1.4 Initial prayer
  • 1.5 Initial welcome to the venue and the conference once all are seated. Estimated start time 14.00
  • 1.6 Opening comments and welcome from Saudi Government
  • 1.7 Video presentation for the conference showcasing KSA and KSA technologies, history and culture
  • 1.8 Introductory speech to open the conference, thank the Crown Prince and welcome guests from outside and inside KSA
  • 1.9 Promotion of all technologies on show complete with an introduction to them. A vibrant and exciting presentation reflecting and respecting cultural norms for KSA

Keynote speeches

  • 3 Keynotes as follows
  • 1. Representing the Middle East. Outlining the current state of response to cybercrime in KSA including surrounding areas and countries. Identifying the risks threats and harms being addressed.
  • 2. Representing wider engagement Focusing on the world response to cybercrime, including how individual countries have managed to resolve challenges.
  • 3. International Organisations Looking at what is happening across a range of diverse countries and how their and other international bodies are collaborating to address cybercrime.
  • Sponsors will be provided with an opportunity of a 5 minute presentation and introduction between the main key speakers as follows
  • 3pm    Keynote Speaker 1 above
  • 3.30    Sponsoring Technology Company 1 and 2 (5mins each)
  • 3.40    Keynote Speaker 2 above
  • 4.10    Sponsoring Technology Company 3 and 4 (5 mins each)
  • 4.40    Keynote Speaker 3 above
  • 5.10    Sponsoring Technology Company 5 and 6 (5 Minutes each)
  • 5.20    Closing remarks about the introduction to the conference.
  • 5.30    Day 1 reverts to evening business sessions. These will be facilitated through the sponsors. Sponsoring Technology Company 1 and 2 will be engaged in this evening’s entertainment, meal and networking sessions

Day 2

15th May

Agenda

Theme of the day will be Cybercrime

NOTE G=Government only TC= Technology Company

08.00 First Workshop
09.15 Second Workshop. Attandees will be participating in one of many workshops run by technology companies
10.30 Break
10.45 Third Workshop
12.00 Prayers
13.00 Lunch
14.00 Conference together for Specialised Speaker 1 and 2

These will be related to cybercrime Plus short briefing on KSA- Education

15.00 Fourth Workshop
16.15 Fifth Workshop
17.30 Sixth Workshop
18.00 Day 1 reverts to evening business sessions. These will be arranged through the sponsors. Sponsoring Technology Companies 3 and 4 will be engaged in this evening’s entertainment, meal and networking sessions

Workshops and Rooms

  • Attendees will be able to select the workshops and exercises they wish to attend prior to the conference
  • Number = the workshop leader. This allows for 24 workshops delivered twice every day to a max of 20 people also allowing for the workshops to back onto each other which gives the speakers more time.

Day 3

16th May

Agenda

Theme of the day will be Cyber Security Measures

NOTE G=Government only TC= Technology Company

08.00 First Workshop
09.15 Second Workshop
10.30 Break
10.45 Third Workshop
12.00 Prayers
13.00 Lunch
14.00 Conference together for Specialised Speaker 3 and 4

These will be related to cybercrime Plus short briefing on KSA- Education

15.00 Fourth Workshop
16.15  Fifth Workshop
17.30 Sixth Workshop
18.00 Day 1 reverts to evening business sessions. These will be arranged through the sponsors. Sponsoring Technology Companies 3 and 4 will be engaged in this evening’s entertainment, meal and networking sessions

Day 4

17th May

 

Agenda

Theme of the day will be Investigation

NOTE G=Government only TC= Technology Company

08.00 First Workshop
09.15 Second Workshop
10.30 Break
10.45 Third Workshop
12.00 Prayers
13.00 Lunch
14.00 Conference together for Specialised Speaker 5 and 6

These will be related to cybercrime Plus short briefing on KSA- Education

15.00 Fourth Workshop
16.15  Fifth Workshop
17.30 Sixth Workshop
18.00 Day 3 reverts to evening business sessions. These will be arranged through the sponsors. Sponsoring Technology Companies 5 and 6 will be engaged in this evening’s entertainment, meal and networking sessions

Day 5

18th May

Agenda

  • A tour and cultural experience will be organized by local authorities for all participating members.