Issue 144 July 2025

Page 1


NEXT-GEN HOTEL SECURITY

Discover how March Networks is reimagining hospitality protection for the future

MIDDLE EAST SECURITY UNPACKED

Relive the ground-breaking insights from the Security Middle East Conference 2025

IDENTITY: EASE OR SAFETY?

Exploring the critical balance for getting digital access right

CONTACT US

EDITORIAL

Publisher

Barry Bebbington +44 1708 229354 barry@pubint.co.uk

Editor Cora Lydon +44 7834 244613 cora.lydon@securitymiddleeastonline.com

ADVERTISING

Worldwide

Mike Dingle +44 1752 267330 mike@securitymiddleeastonline.com

Ryan Bickerton +44 1752 265802 ryan@securitymiddleeastonline.com

Gareth Driscoll +44 1752 260603 gareth@securitymiddleeastonline.com

Rahul Vara +44 1752 604352 rahul@securitymiddleeastonline.com

Will Russell +44 7800 513300 will@securitymiddleeastonline.com

Digital Editor Britt Jones britt@securitymiddleeastonline.com

UP FRONT

Welcome to the latest issue of Security Middle East magazine, packed with insights and analyses from the heart of the region’s dynamic security landscape. As always, our aim is to bring you the most relevant discussions and developments shaping our industry.

PUBLISHED BY

Publications International Ltd +44 1708 229354 166 Front Lane, Upminster, Essex, RM14 1LN, UK

This publication may not be reproduced or transmitted in any form in whole or in part without the written consent of the publishers.

©Publications International Ltd. 2025

For subscriptions and advertising enquires, or for further information on the magazine visit our website at: securitymiddleeastmagazine.com

In this issue, we take a comprehensive look back at the recent Security Middle East Conference in Riyadh (page 13). We were thrilled by the energy and engagement on display, and our review captures the essence of the day’s high-level discussions, keynotes and technology demonstrations that drove our pillars of Education, Networking and Future-proofing.

We’re also excited to announce the official launch of our Security Middle East Ambassadors Panel. This new initiative brings together leading voices from across the sector. In their inaugural contribution, some of our esteemed Ambassadors share their perspectives on a critical contemporary debate: the intricate balance between security and convenience in digital identities (page 38). Their insights offer a balanced view on how the region is navigating this complex challenge amidst its rapid digital transformation.

Furthermore, this issue delves deep into the burgeoning field of security tourism. As the Middle East continues its focus on attracting visitors, the need for robust and sophisticated security solutions in the hospitality sector becomes paramount. We feature an exclusive Q&A with the newly graduated students from Red Sea Global’s first ever Tourism Security training programme, offering a direct perspective on the future of tourism safeguarding (page 30). You’ll also find a closer look at how March Networks’ intelligence solutions are transforming security in the hospitality sector (page 10), along with a piece from Traka that explores the vital role of key management and access control within hotels (page 28).

We trust this issue provides valuable knowledge and sparks further discussion within our community.

Cora

cora.lydon@securitymiddleeastonline.com

MONITOR

03 Up front Foreword from the Editor

06 News Monitor

The latest regional and international security news

08 Market Monitor

A roundup of the latest security products and solutions

10 Cover story: March Networks

March Networks is supporting the transformation of Saudi Arabia’s hospitality sector with its intelligent video surveillance and business intelligence solutions

FEATURES

13 Security Middle East Conference 2025

The Security Middle East Conference was a compelling and truly valuable event for the security sector. Find out more about May’s event in Riyadh

20 Security Middle East Conference – Chairperson’s take-aways

Daniel Norman, Middle East Regional Director, Information Security Forum, was our Chair for this event. Find out what he thought about the on-stage discussions

24 AI in security: evolution, regulation and regional landscape

John Lynch, Director, Kiteworks, examines AI’s impact on security operations, the pressing need for regulation and how these developments are unfolding both in the Middle East and globally

28 The key to control

Roshin Roy, Director, Traka, looks at the heart of hotels and why key management and access control must be top priorities when it comes to security

30 Safeguarding Saudi’s tourism future

June 2025 saw the first wave of students graduate from the Red Sea Global Tourism Security training programme. We find out more about the programme and what those students thought of it

34 The AI imperative: security first

Premchand Kurup, CEO of Paramount Computer Systems, looks at how the full potential of AI can be unlocked to enhance effective security for organisations

36 Intersec Saudi Arabia preview Intersec Saudi Arabia returns with record exhibition space showcasing the innovations securing the Kingdom’s future

38 Convenience Vs security in digital identities

Our newly formed Security Middle East Ambassador Panel has been tackling the topic of digital identities: how to navigate the Middle East’s digital frontier and how to balance the need for security with user convenience

CYBERSECURITY

42 Cyber defence strategies

From AI-powered threats to deepfake scams, Azeem Aleem, Executive Director, Cyber Resilience Services at CPX, outlines the top best practices to combat cyber threats

INDUSTRY MONITOR

46 PSSA: Strengthening security through collaboration

PSSA shares more about the partnerships it is forging to help drive forwards the future of security

49 Interview: cybersecurity

Meshal Aljohani, CPP, PSP, PCI, Security Operations Specialist, talks with Fadwa AlBawardi, Founder and CEO, FSAB Consulting

50

Diary dates for forthcoming security exhibitions, conferences and events

THIS ISSUE’S PARTNERS & CONTRIBUTORS

Daniel Norman

Regional Director, EMEA, Information Security Forum (ISF)

Daniel Norman’s role at the ISF is to help organisations manage their current and emerging cyber risks.

Premchand Kurup

Chief Executive Officer, Paramount Computer Systems

Premchand has over 30 years of leadership experience, and spearheads the company’s operations across the Middle East.

Azeem Aleem

Executive Director, Cyber Resilience Services, CPX

Azeem is specialised in cyber defence technologies, security operations design and implementation, threat intelligence, incident response and behavioural analytics.

Sponsors

PORT OF FUJAIRAH SIGNS ON 5-YEAR DIGITAL TRANSFORMATION WITH ENDAVA

Port of Fujairah has signed a strategic agreement with Endava to spearhead a comprehensive digital transformation initiative aimed at unifying and modernising the port’s operational landscape.

Spanning five years and structured in six progressive modules, this initiative will introduce cutting-edge digital solutions to optimise vessel call management, dry and liquid bulk operations, gate pass security and real-time analytics, ensuring world-class efficiency and transparency across all port operations.

At the initiative’s core is a new Port Community System branded ‘MarHub’, signalling an inclusive, connected gateway for every stakeholder.

Mr Khalil Ebrahim, Deputy Managing Director at Port of Fujairah, said: “Efficiency is the cornerstone of our operations – every moment saved translates directly to enhanced service quality and economic gains. With this transformation, we are not only optimising our processes but also reinforcing full transparency, which ensures security, trust and streamlined workflows.”

Zero-Day

Threats

and Compliance Failures are forcing a rethink of vendor selection

SOPHOS TO EXPAND MIDDLE EAST OPERATIONS

SentinelOne joins AWS Customers

SentinelOne® has announced that it has joined the Amazon Web Services (AWS) Independent Software Vendor (ISV) Workload Migration Programme, a programme that supports AWS Partner Network (APN) members with a Softwareas-a-Service (SaaS) offering on AWS, to drive and deliver workload migrations.

By participating in the AWS ISV Workload Migration Programme, SentinelOne will offer AWS customers accelerated secure cloud migration support to help them rapidly migrate securely with modern, AI-powered CNAPP capabilities.

With the new programme, SentinelOne will use incremental funding, technical support and go-to-market support from AWS to ensure customers benefit from reduced migration timelines and costs as they transition their software to the cloud. With SentinelOne’s AI-powered Singularity Cloud Security, they also gain real-time visibility and protection throughout the migration journey — whether moving from on-premises or another cloud environment, ensuring a secure and seamless transition to AWS.

44%

of zero-day vulnerabilities targeted enterprise data exchange systems

The Data Security and Compliance Buying Behavior Survey, conducted by Centiment, reveals that security is the dominant factor in vendor selection decisions.

This focus on security comes at a critical time, as Google’s 2024 Zero-Day Exploitation Analysis Report found that 44% of zero-day vulnerabilities targeted enterprise data exchange systems, such as Managed File Transfer (MFT) platforms.

Sophos has unveiled plans to launch a new data centre in the UAE by year-end.

The expansion is part of Sophos’ broader regional investment strategy and reinforces its commitment to supporting the UAE’s vision of becoming a global digital hub, while enabling local organisations to benefit from enhanced performance, data sovereignty and regulatory compliance.

Hosted on Amazon Web Services (AWS)’s infrastructure within the UAE, the data centre will power Sophos’ advanced, cloud native security solutions – bringing improved performance, regulatory compliance and data sovereignty to organisations across the region.

“This launch reflects our mission to defend organisations of all sizes against inevitable cyberattacks with unmatched expertise and adaptive defenses,” said Gerard Allison, Senior Vice President EMEA Sales at Sophos. “This expansion supports our strategy of democratising, leveraging AI and automation, and empowering our partners to scale securely.”

Cisco reveals 96% of organisations in the UAE leverage AI for threat intelligence

According to Cisco’s 2025 Cybersecurity Readiness Index, a total of 30% of organisations in the UAE have achieved the ‘Mature’ or ‘Progressive’ levels of readiness required to effectively withstand today’s cybersecurity threats.

This represents an improvement from last year’s Index, however, further efforts are required to address cybersecurity preparedness as hyperconnectivity and AI introduce new complexities for security practitioners.

AI is revolutionising security and escalating threat levels, with 93% of organisations in the country having faced AI-related incidents last year.

However, only 62% of respondents are confident their employees fully understand AI-related cybersecurity threats, and only 57% believe their teams fully grasp how malicious actors are using AI to execute sophisticated attacks. This awareness gap leaves organisations critically exposed.

Cloudera Joins AI-RAN Alliance to drive real-time data innovation and AI-native telecommunications

Cloudera announced it has joined the AI-RAN Alliance.

The AI-RAN Alliance, which counts NVIDIA as a founding member and Dell, SoftBank, T-Mobile, KT and LG U+ as members, was created to help drive innovation at the intersection of AI and telecommunications.

Together, the AI-RAN Alliance members are standardising the integration of AI into existing and new networks, enabling shared infrastructure for AI optimisation, accelerating the development of edge AI applications, and establishing real-world proof points to help telecommunications deploy AI reliably and profitably.

“Cloudera is proud to bring its data and AI expertise to the AI-RAN Alliance. The network is the heart of the telecom business, both in driving margin growth and in service transformation, and AI can unlock substantial value across those dimensions,” said Abhas Ricky, Chief Strategy Officer at Cloudera.

IN BRIEF

KUWAIT

The United Kingdom’s Secretary of State for Foreign, Commonwealth and Development Affairs, David Lammy, confirmed on 6 June that the UK hopes to strengthen its cooperation with Kuwait across a range of sectors, including security and defence.

DUBAI

The UAE and Israel’s national defence and foreign affairs committees held a virtual meeting, stressing the importance of a ‘responsible political approach’ in managing regional crises, chaired by Dr Ali Rashid Al Nuaimi and Yuli Edelstein.

UAE

Morocco and the UAE advanced their security partnership with a meeting in Rabat between Morocco’s Director General of National Security, Abdellatif Hammouchi, and UAE’s National Intelligence Service head, Ali Obaid Al Dhaheri, where they discussed enhancing operational cooperation, improving information exchange, and addressing security challenges.

UAE

EC-Council, a cybersecurity training and certification provider, and CyberSHE, an initiative to bolster female participation in cybersecurity, are expanding their CyberSHE programme across the Middle East. It was launched in Kuwait, and will now roll out across the UAE, Saudi Arabia, Oman, Bahrain, Jordan and Qatar.

UAE

After releasing a draft regulation titled “Security Tokens and Commodity Tokens Contracts” in January 2025, the UAE Securities and Commodities Authority has now published the full regulations for security tokens and commodity contract tokens.

IDIS LAUNCH ALL-BLACK EDGE AI TURRET CAMERAS

Designed to blend neatly with luxury retail, restaurants, hospitality, corporate settings and any location with modern, minimalist aesthetics, the NDAA-compliant DC-D4512WERA and DC-D4532WERA turret

5MP cameras from IDIS deliver exceptional image quality even in low-light environments thanks to their advanced LightMaster NIR sensors.

With Edge AI powered by IDIS Deep Learning Analytics (IDLA), the cameras allow automated detection and alerts to a wide range of potential incidents of interest, including linecrossing, loitering and intrusion.

They also allow easy and affordable surveillance system upgrades, with analytics targeting exactly where needed. Plus, the all-black colourway ensures they blend seamlessly with high aesthetic environments.

The cameras benefit from IDIS DirectIP® plug-and-play installation and mutual authentication with IDIS NVRs, enabling instant and seamless operability. idisglobal.com

Ocean Infinity launches NeedleFish USV in Kuwait

Ocean Infinity launched its NeedleFish Uncrewed Surface Vessel (USV) during an official event with the Kuwaiti Coast Guard (KCG).

The NeedleFish is designed to be a key component of the new integrated national maritime surveillance system being implemented by SRT Marine Systems. This USV is custom-equipped with a range of specialised maritime surveillance sensor systems and utilises the company’s leading software, advanced robotics and marine intelligence technology.

The aim is to provide the Kuwaiti Coast Guard with a new class of unmanned patrol, surveillance, mapping and surveying capabilities to effectively monitor its 11,000 km² of territorial waters.

All operations are controlled from KCG’s new purpose-built onshore Command Centres, fully integrated within the new SRT C5iSR maritime surveillance system. oceaninfinity.com

NordPass aims to solve password sharing issues

NordPass has introduced a unique, userfriendly dashboard that gives businesses control over all their shared credentials and folders.

This new feature will give dedicated administrators in the organisation the ability to oversee and modify permissions, as well as revoke access to those items from a centralised sharing control panel.

“As organisations scale, credentials and other sensitive resources are frequently shared across teams informally or without consistent oversight. Without a centralised system to manage these interactions, organisations face several critical risks, like retaining access to sensitive resources for offboarded or role-changed users”, said Karolis Arbaciauskas, Head of Business Product at NordPass.

The Sharing Hub provides full visibility into shared data, including who has access, the level of their access, and who shared the items.

nordpass.com

SUPREMA REVEALS NEW ACCESS CONTROL SOLUTIONS

Suprema has launched the CoreStation 20 (CS-20) 2-door access controller and the Door Interface (DI-24) module, designed for both 2-door and 4-reader configurations.

These new additions mark a significant expansion of Suprema’s Access Control Unit (ACU) portfolio, aimed at bolstering the security, flexibility and scalability of access control systems.

The comprehensive ACU portfolio from Suprema caters to a wide spectrum of operational requirements, ranging from small facilities to large-scale enterprises. Suprema’s flagship controller, the CoreStation (CS-40), provides advanced biometric matching capabilities, making it suitable for high-security environments. supremainc.com

Security by design in control rooms

Control rooms are the central intelligence hubs of critical installations and infrastructures. Their software platforms require cybersecurity at their core to prevent unauthorised intrusions

When securing a control room, organisations face a fundamental choice: connect to IP networks or isolate completely. While ‘airgapping’ offers protection from external threats, it severely limits operational capabilities.

The reality is that most modern control rooms must connect to IP-networks to access their many content sources. This means that there are gateways to the outside world, and where cybercriminals see a gateway, they smell an opportunity. It is the task of the platform designers to outsmart any intruder, and this can only be achieved by a thought-through design that leaves nothing to chance.

This must be done without interrupting the intuitive operation for the users. They need to securely connect to their sources, from any location, and interact with the content on any video wall or operator desk, without entering 37 passwords.

Security by design

How do you waterproof a house? Do you just build it, and then patch up all locations where it rains in? Or do you consider rain management from the first

drawings onwards? It’s logical to go for the second option, so why would it be different for control room software? You can only make a system secure if you make it the essential foundation for the software. That’s where Security by Design principles become key.

When designing CTRL, Barco wanted to create a rock-solid control room software and hardware platform, that could be deployed in even the most critical environments. By using the Security by Design principles, Barco made sure that all communication layers between devices are fully secured. This also applies to legacy devices, which often pose the biggest hazard in secure systems.

A dedicated in-house product security team ensures CTRL stays at the forefront of any evolutions or changing regulations and legislations. Updating the system is a matter of minutes, so rolling out a security update is very swift.

The armoured system approach

Barco CTRL’s security architecture is built on five clearly defined concepts:

1. Identity management: Zero-trust architecture upholding authentication and authorisation.

2. Communication protection: Certificate-based using TLS1.2/1.3 for confidentiality and integrity.

3. System protection: Full 360-degree protection from booting through system updates.

4. Audit logging: Building comprehensive audit trails for accountability.

5. Media protection: Data protection at the device level.

Fully featured to prevent downtime

Making a platform secure also means it is reliable. That is why Barco CTRL takes all possible measures to prevent any possible downtime. Redundancy options for critical components make sure that even in the unlikely event a hardware device fails, a spare will take over and the system will continue to work seamlessly. Also, on the software side, a lot of measures were taken to keep the system running. For example, all services run in containers on the server. One service malfunctioning does not take down the complete system. The same occurs in the decoders, where one source can never prevent the complete hardware device from working. Coupled with excellent health monitoring, the result is a platform that has the best possible uptime. Would you like to know more about Barco CTRL in general, its security features, or book a live demo (physical or virtual)? Then scan the QR-code and make your choice.

Contact us for more information at controlrooms@barco.com

A transformative moment for hospitality in Saudi Arabia

Saudi Arabia’s hospitality sector is undergoing an unprecedented transformation. With the Kingdom’s Vision 2030 fueling massive investment in tourism, entertainment and hospitality, the country is rapidly becoming a global destination. From luxury resorts and Red Sea developments to bustling business hotels in Riyadh and Jeddah, the demand for technology-driven guest experiences and operational excellence has never been higher.

March Networks is proud to support this evolution by offering intelligent video surveillance and business intelligence solutions that align with the unique needs of the region’s fast-growing hospitality sector. Our focus is clear: lead with hospitality, starting with Saudi Arabia – and extend these benefits across the broader Middle East.

Hospitality meets intelligence: the March Networks’ advantage Hospitality is all about the customer experience. At March Networks, we

enhance that experience through AI-powered video surveillance and analytics that deliver security, efficiency and actionable insights. Our solutions

aren’t just about watching; they’re about understanding patterns, proactively responding to issues and improving performance.

Our platform supports seamless integration with existing hospitality infrastructure, including property management systems, POS, BMS, RFID and access control platforms. This means that every data point – from a guest check-in to a restaurant transaction –can be linked to real-time video, offering unparalleled visibility and control.

Key opportunities in the Saudi market

Saudi Arabia is central to our strategy, and our local engagement reflects our commitment. March Networks is proud to be vendor-approved by three Public Investment Fund (PIF) entities: Rua Madinah, Al Soudah Development and the globally recognised Red Sea Global (RSG). While RSG approval will appear on public

vendor lists by June, our collaboration is already active, underscoring our credibility and readiness to serve the most prestigious projects in the region.

We are also working with six system integrators (SIs) that specialise in hospitality – ensuring we have local boots on the ground and deep expertise tailored to hotel environments. Additionally, our solutions are approved by leading global hotel brands, including Marriott, IHG and Hilton, allowing for streamlined deployment and compliance with brandspecific technology requirements.

Real-world momentum: active opportunities

Our business development in Saudi Arabia is not just theoretical – it’s tangible. We are actively engaged in several major hospitality projects. These opportunities represent just the beginning. As more hotels recognise the value of intelligent video analytics – not just for security but for enhancing the entire guest journey – the pipeline is expected to grow rapidly.

Enhancing guest experience & VIP services

Today’s luxury travellers expect personalisation. Our advanced video solutions help hotels deliver it. Through technologies like license plate recognition (LPR) and facial recognition, properties can:

Identify and greet VIP guests the moment they arrive; Offer customised room settings and services; Flag known offenders discreetly to protect other guests.

People-counting capabilities also help hotels understand foot traffic, enabling tailored services and optimised layouts for lobbies, lounges and event spaces.

Strengthening security & ensuring compliance

Guest safety is paramount in hospitality, and our AI-driven surveillance solutions are built to support that priority. With features like:

AI Smart Search for detecting suspicious behaviour, loitering, or overcrowding.

Integrated Access Control linked to check-in/check-out data.

Real-time alerts for unauthorised access, emergencies, or safety violations.

Security teams can act faster and more effectively. In addition, our platform generates full audit trails to simplify investigations and support regulatory compliance.

Operational efficiency & loss prevention

March Networks empowers hotels to operate smarter. By integrating with building management systems (BMS), our video analytics can help automate climate control, lighting and other energy-saving measures. Our asset tracking solutions, leveraging RFID, reduce losses due to theft or misplacement, especially valuable in large resorts and conference centres.

Point-of-sale (POS) analytics in restaurants, bars and retail outlets detect anomalies and suspicious transactions. Coupled with video verification, this not only curbs internal fraud but also improves service by identifying process gaps or peak time inefficiencies.

Securing hospitality construction sites

With the explosion of hotel construction across Saudi Arabia – particularly in megaprojects like Red Sea Global –securing development sites is critical. March Networks provides proactive video surveillance to monitor worker safety, deter theft and ensure compliance on construction sites. Our integration with IoT devices allows for asset tracking and remote alerts, keeping projects on time and under control.

Cloud capabilities: future-ready solutions

While many hotels still prefer on-premise solutions for data control and latency reasons, our Cloud Suite offers a futureready pathway for scalability. Ideal for multi-property hotel groups, the Cloud Suite enables:

Centralised video management across hundreds to thousands of locations; Remote access to security and analytics dashboards; Streamlined video sharing across teams.

Though not a primary focus for most hotels today, the cloud represents a valuable add-on for those looking to modernise their operations incrementally over time.

Cybersecurity you can trust

In an age where guest data is as sensitive as the physical security of the premises, our solutions come with robust cybersecurity protections. March Networks’ CyberSuite includes: System-wide asset reporting; Real-time health monitoring; User audit logs and incident alerts; Regular security updates and penetration testing.

Trusted by over 2,000 retail and financial institutions globally, our systems are designed to protect both operational and personal data from evolving cyber threats.

Why partner with March Networks?

March Networks brings a unique blend of global credibility and local commitment. We understand the intricacies of the hospitality industry and offer customised, intelligent solutions that are:

Scalable for single properties or hotel chains; Compliant with international brand standards;

Proven across luxury, business and resort segments;

Supported by local experts in Saudi Arabia and across the region.

As Saudi Arabia continues to lead the hospitality renaissance in the Middle East, we are here to support every step of that journey – with vision, intelligence and integrity.

marchnetworks.com

A CONVERGING VISION

The air in Riyadh on May 13 2025 hummed with a tangible energy as the Security Middle East Conference convened, drawing together a diverse array of professionals, innovators and leaders from across the region and beyond. As delegates streamed into the venue, there was a clear sense of anticipation – a shared understanding that this was a pivotal moment for an industry rapidly transforming. The day unfolded with a dynamic rhythm, guided expertly by our MC, Daniel Norman, Regional Director, EMEA, Information Security Forum (ISF), who navigated the high-level discussions and networking opportunities with an engaging presence. From the outset, the conference delivered on its promise to delegates, solidifying its three core pillars: Education, Networking and Futureproofing and was a truly compelling and valuable event for the security industry in the Middle East.

This comprehensive gathering would not have been possible without the continuing support of our dedicated sponsors. A big thank you goes out to Genetec, Magnet Forensics, Limitless Parking, CTF Consoles, ThreatLocker, Betafence Group, Gallagher Security, Allied Telesis, ONVIF, Convergint, Traka, Al Furaih Group, AlMalath AlArabia LTD., PureTech Systems, ICON Training Company, Eagle Eye Networks, Comm Port Technologies Inc., and Xntinel. Their commitment underpinned the day’s insights and innovations.

Strategic dialogue

The morning commenced with an immediate dive into strategic thinking, setting a forward-looking tone for the day. Our first keynote speaker, Eng Walid Abukhaled, Chairman, EMIR Saudi Arabia, took to the stage to discuss ‘Transforming Security: Innovation, Collaboration and

“As the conference moved into its mid-day segments, the energy within the exhibition area became palpable”

Vision 2030’. His presentation quickly honed in on Artificial Intelligence, a topic that would resonate throughout the day, as he highlighted the potential risks of AI usage, specifically referencing instances where confidential documents were being uploaded to platforms like ChatGPT, potentially compromising business operations. Eng. Abukhaled also offered a glimpse into the future, envisioning a landscape populated by autonomous aircraft and self-launching autonomous boats. He concluded his keynote with a powerful call to action: “Insecurity thrives in silence, security thrives in collaboration”, underscoring the collective effort needed for robust security. This sentiment immediately resonated with the audience, establishing a collaborative atmosphere for the day ahead.

Following this, the first panel discussion, ‘Security as a Profit Centre: Unlocking ROI Through Safety & Security’ gathered a distinguished group of experts. Moderated by Luke Bencie, Managing Director of Security Management International, the panel explored the tangible connections between proactive security strategies and business value. Bencie initiated the discussion by emphasising the need for C-suite awareness regarding security’s benefits, challenging panellists on how security professionals can effectively justify larger budgets. Dr. Ahmad Al-Ghamdi, Vice President HSE at International Maritime

Industries, articulated that security must strategically prove its value to secure improved funding. Nouf Aljalaud, Safety & Security Senior Manager at King Salman Park Foundation, addressed the anticipated influx of visitors due to Vision 2030, stressing the readiness of regulations and Law Enforcement, and the importance of correct implementation of security technologies for optimal visitor experience. Brett Taylor, Security Strategy & Design Senior Director at Diriyah Company, emphasised collaboration, stating the need to “align more with enterprise risk teams” and highlighting that the cost of an incident far outweighs the cost of security, empowering all departments with market confidence.

The panel also touched upon the issue of unreported incidents, particularly intellectual property theft, suggesting a larger hidden problem. Bencie raised the critical question of beneficial security training in the Kingdom, to which Aljalaud responded by identifying humans and technology as security partners, requiring training to support teams using emerging technologies. Taylor pinpointed critical thinking and critical analysis as fundamental core skills, while Bencie added a cautionary note about over-reliance on AI tools like ChatGPT. Dr. Al-Ghamdi concluded this segment by stressing that security leadership should be at the forefront of training programmes. The discussion underlined the necessity of effective communication within organisations, with Taylor advocating for transparency in risk assessment to enable better decisionmaking and break cyclical processes.

The morning continued with another essential keynote from Dr. Mansoor Alghamdi, Dean of Applied College at the University of Tabuk. His presentation, ‘Investing in Security: The Need for Advanced Training Programmes for Guards’ directly addressed challenges faced by the security sector, including gaps between workforce supply and employer demand, limited professional development opportunities, and the absence of standardised qualifications. Dr. Alghamdi shared how the University of Tabuk collaborates with companies to ensure security operators possess the necessary skills. His address powerfully highlighted the crucial role security guards play in public safety and the

need for appropriate upskilling and professional development for the security workforce. These sessions unequivocally served the Education pillar, equipping attendees with knowledge and strategic frameworks for immediate and future application.

Innovation in motion

As the conference moved into its mid-day segments, the energy within the exhibition area became palpable, fulfilling the Networking pillar. Delegates capitalised on opportunities to connect with peers, forge new relationships and engage in spontaneous discussions that often sparked fresh ideas. A significant

draw during these breaks was the Tech Innovation Stage, a vibrant hub showcasing the industry’s forward trajectory and embodying the Futureproofing pillar.

Numerous companies presented their cutting-edge solutions live on this stage. Maxp kicked off the demonstrations, highlighting its forward-looking security technology that equips security and emergency services with the tech they need. Throughout the day, delegates also had the chance to see Magnet Forensics share its latest security advancements, Limitless Parking feature its newest innovation in secure parking technology, and Genetec showcase the

Behind every door in a healthcare facility there’s a critical narrative - from protecting staff, to securing vital pharmaceuticals and patient records. ICT’s customizable solutions provide built-in access control, intrusion detection, and building automation, with extensive integrations that give you the flexibility to scale, streamline operations, and safeguard what matters most. Save costs without compromising security.

Secure your success with ICT.

real-world impact of its cutting-edge security technology. Allied Telesis kept our audience informed on its 38 years of reliable infrastructure, while ThreatLocker presented its pioneering security solutions. Betafence Group shared its latest innovations in security technology, including the TriMax Delay Entry Fence System, and PureTech Systems explored the deployment of autonomous mobile platforms and how they are set to redefine the security landscape. These live demonstrations provided attendees with a tangible look at the solutions available today and those shaping tomorrow, fostering direct engagement with experts.

The afternoon also featured a crucial panel discussion on ‘Mega Event Security’, a timely topic given Saudi Arabia’s upcoming hosting of the World Expo, Asian Winter Games and FIFA World Cup. Moderated by Craig Ross, Associate Director Safety & Security at Diriyah Company, the panel included Ahmed Alshammari, Security Operations Expert; Regina Dagueva, Safety and Security Operations, Committee of Qatar; and Mohamad Saad, Country Director KSA, Genetec. Ross opened by acknowledging the risks associated with the Kingdom’s strategic plan to host numerous megaevents. Dagueva shared her perspective on the positive legacy these events bring to the Middle East, emphasising that successful events require a strong strategy and vision, alongside regular exercises to prepare for unforeseen challenges during execution. She advocated for a multi-layered, governed planning approach and specialised command centres for events. Saad focused on the importance of day-to-

day security and managing operations, stressing that security information must effectively unify all modules into a cohesive programme to aid operator decision-making. He also spoke to the future, envisioning intelligent systems managing the immense flow of data from over 15 million projected residents and visitors. The insights from this panel underscored the complex planning and unified approaches required for securing large-scale public gatherings.

Further emphasising the theme of integrated security, Saif Al Shahrani from Convergint then presented on how cities are evolving their real-time intelligence. He articulated how, within the framework of Saudi Vision 2030, security is no longer a mere sub-system but a city-wide transformation, interconnecting every aspect of the urban landscape.

Deep dives

The commitment to Education extended beyond the main stage, with delegates having the opportunity to engage in more focused learning. Notably, a select group of security professionals had participated in an IFPO (International Federation for Protection Officers) workshop, the ‘Security Strategy Practicum,’ hosted by the esteemed Nadeem Iqbal, held two days prior to the main conference. The conference acknowledged these graduates, highlighting a deeper dive into professional development.

On the conference day itself, an insightful workshop by ICON Training Company – the CARVER Leadership Workshop – provided an engaging session for delegates. Led by renowned global security expert Luke Bencie, this

interactive workshop offered a chance to hone decision-making skills using the time-tested CARVER methodology, a framework utilised by leaders for over 70 years. Participants gained practical tools for enhancing leadership, organisational and operational capabilities through case studies, along with Carver Training Institute/University of South Florida Alumni status and a digital badge from the University of South Florida.

The afternoon also introduced a new dimension to the conference experience with its first-ever live podcast sessions. The inaugural live podcast, ‘Building Trust Through Investigations: Security as a Pillar in Corporate and Community’, featured Sameeha Assayari, Senior Investigations Manager at Red Sea Global, in conversation with our MC, Daniel Norman. Assayari clarified that investigations in corporate settings, often misunderstood as punitive, actually ensure transparency, accountability and foster a learning culture. She emphasised that investigations protect both people and sites, stressing that “documentation is protection” and “cultural intelligence does matter”. While acknowledging the role of AI-driven technologies in data analysis, she maintained that “human judgment is irreplaceable”, underscoring the proactive role of security in building trust through understanding root causes and implementing preventive measures.

Another critical keynote followed, delivered by Dr Khalid Koser, Executive Director of the GCERF (Global Community Engagement and Resilience Fund), who addressed ‘The value of investing in National Security and strengthening prevention to safeguard global and domestic interests’. Dr. Koser highlighted youth as the region’s greatest resource, detailing how GCERF employs youth through training, civic engagement and entrepreneurship to disrupt extremist recruitment. He emphasised the security sector’s critical role in counter-terrorism through community interactions, advocating for a networked approach. Dr. Koser explained GCERF’s localised, context-specific approach, focusing on addressing root causes like marginalisation and isolation, providing valuable insights into building a more stable world.

The day concluded with a crucial final panel discussion: ‘Protecting your digital assets: third-party risk management strategies for the Middle East’s evolving

threats’. Moderated by Daniel Norman, the panel featured Betania Allo, Cyber Policy & Law Expert; Dr. Nasser Alamri, Cybersecurity Executive Director, Institute of Public Administration, Saudi Arabia; and Dr Faisal Alfouzan, Director of Cybersecurity. The discussion underlined that cybersecurity affects all stakeholders, not just security professionals, with Dr. Alamri stressing the need for collective engagement. Allo emphasised the importance of cross-functional teams for rapid problem-solving. Dr. Alfouzan highlighted the need for organisations to go beyond bi-annual risk assessments prescribed by regulations. The role of AI was also revisited, with Allo advocating for AI transparency from vendors, questioning their failure risks and model update cycles. Norman shifted the conversation to business longevity through robust third-party continuity. Dr. Alfouzan asserted joint responsibility in cybersecurity, stating that no single third party is ever solely accountable. Allo noted Saudi Arabia’s leverage for higher expectations regarding metrics, accountability and AI usage. Dr. Alamri added that due diligence should be integrated throughout the life cycle, including risk assessment. Norman concluded by noting that cybersecurity teams provide transparency to support business decision-making with vendors.

The second live podcast of the day saw Alex Bomberg, Chairman of Intelligent (UK Holdings) Limited and Founder of International Intelligence Limited, join Daniel Norman for a crucial discussion on ‘The growing risks associated

with Artificial Intelligence and Social Engineering globally’. Bomberg explained that social engineering is not new, but its methods have evolved, significantly enabled by technology like telephone banking and fraud. He highlighted how the advent of social media has led to individuals unknowingly publishing vast amounts of data, which malicious actors can leverage for targeted attacks. Alex detailed a real-world incident involving deepfake technology used to manipulate an individual into releasing $26 million. Both experts stressed that education from the top down within organisations is the primary defence. They also touched on how the shift to remote work post-covid has removed simple physical checks that once mitigated risks, and warned about the future impact of geopolitical deepfakes.

Lastly, Abdulmalik Abdulaziz Abu Tayli, Security Strategy & Design Assistant Manager for Diriyah Company, delivered a keynote on ‘Diriyah: Jewel of the Kingdom and its innovative approach to Security’. He shared insights into how Diriyah strives to seamlessly blend urban security design with its distinctive architecture, history and heritage assets, including its masterplan for Wadi Safer, an ultraluxurious gated community, emphasising the reliance on master plan regulations and guidance documents to ensure security.

Future-focused thinking

The Security Middle East Conference in Riyadh concluded, leaving a lasting impression of the vibrancy and commitment within the region’s security

sector. The atmosphere throughout the day remained charged with positive energy, driven by engaging discussions and tangible connections. From thoughtprovoking keynote addresses that illuminated the path to future-proofing careers in a dynamic sector, to insightful panel discussions that shared invaluable knowledge and best practices, the level of expertise and collaboration was evident in every interaction. The buzz of the exhibition floor, with attendees exploring the latest innovations and solutions from our diverse exhibitors, truly embodied the power of networking within the community.

The day served as a clear testament to the strength and dedication of security professionals across the Middle East and beyond. The unwavering commitment to advancing the industry and tackling its most pressing challenges was palpable in every session and conversation. A heartfelt thank you extends to our phenomenal speakers and panellists for sharing their invaluable expertise, shaping the future of security. Our sincere gratitude also goes to our dedicated sponsors and supporters, whose partnership was instrumental in making this exceptional day possible. Finally, a massive thank you to each attendee; their active participation, insightful questions and eagerness to connect are what made the Security Middle East Conference such an impactful event. The conversations and connections forged today are merely the beginning of a continued journey of learning, collaboration and growth for the industry.

PROTECTING HIGH-THREAT FACILITIES & CRITICAL INFRASTRUCTURE

Secure your checkpoint with our industry-leading X-ray inspection, optical inspection, and radiation detection technologies that help to uncover threats and identify and authenticate vehicles and occupants. With our comprehensive checkpoint security solutions, we can help you maximize threat detection and operational success.

rapiscan.com

SECURITY MIDDLE EAST CONFERENCE: CHAIRPERSON’S KEY TAKEAWAYS

The third Security Middle East Conference was a major success, surpassing previous years in terms of the number of delegates and speakers. There was a broad variety of international and Middle Eastern keynote speakers and panellists, from government leaders to industry experts. Each individual brought a wealth of experience and knowledge to the conference making the entire event highly valuable for audiences.

Each Security Middle East Conference is a sobering reminder of the countdown to Vision 2030 and what is still yet to be achieved; the fact that Saudi Arabia has secured so many internationally recognised events for the future, such as the World Cup, The World Expo and Asian Winter Games, presents security leaders with an array of challenges, risks and opportunities to demonstrate the value of our industry

in ensuring smooth, seamless, safe and spectacular events.

Ambition of the region and future challenges

In my role at the Information Security Forum, our team covers all countries (and subsequently leading businesses) in Europe, the Middle East and Africa – each region has significantly different business drivers, risks and ambitions. Nowhere in

the world currently is pressing ahead with investment and international cooperation quite like the Middle East, and especially Saudi Arabia. The focus on technological innovation, manufacturing, tourism and hospitality is becoming a focal point of the nation’s aspiration to improve the lives of Saudi Arabians and to bring further wealth to the region.

The fact that the conference in 2025 fell on the exact same date Donald Trump sent a US trade envoy to meet with the Crown Prince Mohammed bin Salman underscores the significance of the region. It furthermore highlights the need for our security industry to pay close attention to international and local events that will certainly impact our community, with billions of dollars expected to be invested in cloud data centres, private equity, weapons, real estate and many other industries. It was incredibly clear to me that our audience was becoming all too aware of the impact robust security needs to have on not only securing the industries of the future, but also the influx of people – both from the business world and from other countries seeking worldclass tourism.

The risks of emerging technology

Emerging technologies, such as artificial intelligence (AI) and quantum computing, were topics on the lips of the majority of technical security leaders at this years’ conference. It is clear that boards and senior management have invested significantly in these technologies for operational efficiency, computing power and increased value propositions. But our panellists are all too aware of the security risks.

In terms of implementing AI, individuals made it clear that AI must be governed properly by responsible and accountable functions, and the danger of pressing ahead with investments in technology without proper risk assessments and understanding of the security implications can present organisations with a variety of challenges downstream. Data protection and privacy regulations are becoming the norm in the region, so organisations must tread carefully between racing ahead to pioneer commercial advantages or running into challenges in the future.

Another key discussion topic was the other side of the AI-coin, which was

“Each Security Middle East Conference is a sobering reminder of the countdown to Vision 2030”

focused on nefarious use of AI to target executives in the form of deepfakes. Essentially, deepfake technologies that mimic the image and voice of senior leadership, or anyone for that matter, has become cheaper and easier to build at scale. Anyone in the world can have their identity stolen by using ready-made solutions found on the dark web or even using established AI platforms.

Globally, our speakers and panellists have seen a significant rise in attacks on executives by nation-state-backed actors and criminal groups aiming to steal information or convince individuals to steal money from companies by pretending to be an individual from the C-Suite with the authority to send money. In addition, there are major reputational risks posed by AI – especially with actors using deepfakes on social media to change the perceptions of brands, government and business leaders and even civilians by promoting fake material, videos and imagery that is difficult to prove is not real.

Third-party risk management:

With the continued global investment from a variety of local and international companies, governments and institutions, the third-party eco-system in the Middle East is becoming even more complex and challenging to secure. All cybersecurity leaders are familiar with the fact that many data breaches and cyber-attacks can manifest outside of your own network perimeter. As organisations begin to onboard and trade with even more global suppliers and contractors, the risks of cyber-attacks rise.

Many of our panellists provided cogent advice for building third-party assurance frameworks, defining the criticality of suppliers, building robust supplier assessments that take open-source and direct data from clients, and how to monitor suppliers over time. All steps

of this process must be owned and managed effectively to firstly identify risk, but also to proactively manage risk in the supply chain.

In summary, the depth and breadth of the quality of our speakers, panellists and audience members provided a unique spectacle for the third year running. We covered a broad spectrum of topics across physical and digital security domains –including mega-events, tourism, emerging technologies and skills of the future security leader. It is clear to me that both physical and digital security domains are converging at a rapid pace, so security leaders must adapt their skillsets to suit the requirements of the business.

I look forward to the fourth iteration of the Security Middle East Conference and hope to see many familiar faces once again!

SCALING

IS NOT A GOAL BUT A SYSTEM

When security should do more than just record.

In times of increasing complexity, a static video system is no longer enough. What is needed are flexible solutions that grow with the requirements. Intelligent, reliable and future-proof.

Geutebrück: Scalable Security. Intelligent Insight.

Video Management Systems don’t just need to work. They need to grow with you. Whether you're securing a single site or managing hundreds across the globe, Geutebrück delivers a future-proof video management solution that scales effortlessly with your operations.

Our modular platform powered by G-Core and G-SIM adapts to your needs:

From small stand-alone installations to complex, decentralized architectures

Seamless integration of thousands of cameras and third-party systems

AI-driven video analytics that reduce false alarms and surface what really matters

GDPR-compliant by design

Encrypted video recording in our unique “gbf” format

Built in Germany. Trusted worldwide.

With Geutebrück, you don’t just add more cameras. You gain insight, efficiency and reliability at every level.

Let your video system grow smarter as your needs grow bigger.

Why Geutebrück for scalable systems?

Modular platform for any size or sector

Dual-database architecture: fast search, high performance

Failover, redundancy & edge recording built-in

Integration with ERP, access control & other third-party systems

Adaptable to Operator’s requirements

AI in security: Evolution, regulation and regional landscape

John Lynch, Director, Kiteworks, examines AI’s impact on security operations, the pressing need for regulation and how these developments are unfolding both in the Middle East and globally

Artificial intelligence (AI) has fundamentally transformed the security landscape, creating both unprecedented opportunities and complex challenges. As organisations increasingly integrate AI into their security architecture, the need for robust regulatory frameworks has become more urgent.

AI’s transformative impact on security

The integration of AI into security operations represents a paradigm shift

in how organisations detect, analyse and respond to threats. This transformation is evident across multiple domains:

Enhanced threat detection and response AI has revolutionised cybersecurity by enabling systems to process vast amounts of data in real-time, identifying patterns and anomalies that would be impossible for human analysts to detect manually. According to research from the Institute of Electrical and Electronics Engineers (IEEE), 91% of enterprise

leaders anticipate a generative AI ‘reckoning’ in 2025, as organisations fully grasp the technology’s capabilities and limitations in security contexts.

Traditional rule-based security systems are increasingly being replaced by AI-powered solutions that can adapt to evolving threats through machine learning algorithms. These systems continuously monitor networks, automatically identifying and neutralising potential threats without human intervention – often before they can cause significant damage.

Evolution of Security Operations Centres (SOCs)

AI is transforming Security Operations Centres from reactive monitoring centres to proactive threat-hunting environments. This shift is characterised by:

Automated incident prioritisation that reduces alert fatigue.

Predictive analytics that anticipate emerging threats.

Continuous learning systems that improve detection accuracy over time.

Enhanced visualisation tools that help security professionals understand complex attack patterns.

However, this evolution comes with significant challenges. The same technologies enhancing defensive capabilities are simultaneously being weaponised by malicious actors. So much so, that a report from

HiddenLayer revealed that 77% of businesses have experienced breaches of their AI systems within the past year. This highlights the dual-edged nature of this technological revolution.

AI security arms race

As both defenders and attackers leverage increasingly sophisticated AI capabilities, a technological arms race has emerged. Organisations deploy AI to analyse data and identify anomalies in real-time, while threat actors use the same technologies to:

Create more convincing phishing campaigns that evade traditional detection.

Automate malware development and deployment at unprecedented scale. Conduct more effective network vulnerability scanning through machine learning algorithms.

This continuous cycle of innovation requires security teams to remain vigilant and adaptable, constantly updating their defensive strategies to counter emerging AI-powered threats.

A critical need for AI regulation

As AI becomes more deeply embedded in security infrastructure, the need for comprehensive regulation has become increasingly apparent. Several critical concerns drive this regulatory imperative:

Data privacy and security risks

AI systems fundamentally rely on data − often vast amounts of it − creating inherent privacy risks that must be addressed. These systems frequently access and process sensitive information, from health records to financial transactions and biometric data. Without proper handling protocols, this information becomes vulnerable to breaches and unauthorised access.

Public awareness of these risks has grown significantly, with IAPP’s Privacy and Consumer Trust Report 2023 indicating that 57% of consumers globally believe AI poses a significant threat to their privacy. Approximately three in four consumers expressed concern about AI’s potential risks, creating a perception challenge that organisations must address.

‘Black box’ problem and accountability

Many AI systems operate with a level of complexity that makes identifying

vulnerabilities and tracking data flow exceptionally difficult. This lack of transparency creates blind spots in security monitoring and complicates the detection and prevention of security breaches.

The ‘black box’ nature of many AI algorithms also raises profound questions about accountability. When AI systems make decisions affecting individuals without clear explanation or recourse, fundamental rights may be compromised. This is particularly concerning in sensitive domains like hiring, lending and law enforcement, where algorithmic bias can perpetuate discrimination.

Understanding adversarial AI attacks

Among the most sophisticated AI-specific threats are adversarial attacks, which involve deliberately manipulating AI models to produce incorrect outputs or extract sensitive information. These attacks manifest in several common forms:

Evasion attacks: Attackers modify input data to confuse AI models, causing misclassification.

Data poisoning: This involves introducing corrupted data during the AI training process.

Inference attacks: Attackers exploit AI model outputs to reveal sensitive details about the training data.

Research indicates that 41% of organisations have already experienced AI security incidents, including adversarial attacks on their systems. Without regulatory guardrails, these vulnerabilities will likely proliferate as AI adoption increases.

Regional landscape: AI in security in the Middle East

The Middle East represents one of the most dynamic regions for AI adoption in security applications, with varying approaches across different countries:

United Arab Emirates

The UAE has positioned itself as a leader in AI adoption through its National AI Strategy 2031, which explicitly prioritises security applications. Dubai’s Security Industry Regulatory Agency (SIRA) has integrated AI into surveillance systems throughout the city, creating one of the world’s most advanced security monitoring networks.

The Dubai Police force has implemented AI-powered facial

recognition systems and predictive policing tools, significantly reducing response times and improving crime prevention capabilities. The UAE’s approach balances innovation with emerging regulatory frameworks that emphasise data protection and ethical AI development.

Saudi Arabia

Saudi Arabia’s Vision 2030 places significant emphasis on AI as a transformative technology, with security applications forming a critical component of this strategy. The Kingdom has established dedicated AI centres of excellence focused on developing security solutions tailored to regional needs.

The Saudi Data and Artificial Intelligence Authority (SDAIA) oversees AI implementation across sectors, ensuring alignment with national security objectives while developing regulatory standards for responsible AI deployment. Smart city initiatives in Neom and elsewhere incorporate advanced AI security systems as foundational elements.

Qatar

Qatar has leveraged AI extensively in its security infrastructure, particularly in preparation for major international events. The country’s Smart Nation initiative emphasises integrated security systems that utilise AI for threat detection and response.

Qatar’s National Cybersecurity Strategy explicitly addresses AI-related risks and establishes frameworks for securing AI systems against emerging threats. The country has also invested heavily in developing indigenous AI expertise through education initiatives and international partnerships.

Regional challenges and opportunities

The Middle East faces unique challenges in balancing security imperatives with emerging AI capabilities:

Data localisation requirements that may limit AI training capabilities.

Cross-border cooperation challenges in threat intelligence sharing.

The need to develop region-specific AI models that understand local languages and cultural contexts.

Talent shortages in specialised AI security roles.

However, these challenges are counterbalanced by significant opportunities, including:

Substantial government investment in security infrastructure.

Strong public-private partnerships for technology development.

The opportunity to build security systems that incorporate AI from the ground up, rather than retrofitting existing infrastructure.

Global overview: AI regulation and best practices

Key regulatory frameworks

EU AI Act: The most comprehensive AI regulatory framework globally, establishing a risk-based classification system with stringent requirements for high-risk AI applications, including security systems.

US approach: The Biden-Harris administration’s Executive Order 14110 established guidelines for responsible AI development, emphasising a sectorspecific regulatory approach rather than comprehensive legislation.

International standards: ISO/IEC standards for AI (including ISO/IEC 42001 for AI management systems) are emerging as global benchmarks for responsible AI implementation.

Organisations should implement a comprehensive security framework that addresses technical, operational and governance aspects of AI systems. These best practices can be grouped into three essential categories:

Technical security measures:

Implement zero-trust architecture: Verify identity for all access attempts; limit access to minimum necessary permissions; continuously monitor and validate all interactions.

Deploy adversarial defence strategies: Implement defensive distillation,

gradient masking and adversarial training to protect AI models against manipulation attempts.

Embrace explainable AI: Where possible, utilise AI models that provide transparency into their decisionmaking processes, enabling better security monitoring and compliance verification.

Operational excellence:

Conduct regular security assessments: Perform penetration testing, vulnerability scanning and comprehensive reviews of AI model security to identify potential vulnerabilities before they can be exploited.

Create robust incident response plans: Identify key personnel responsible for incident management; establish clear communication channels; detail procedures for containing breaches and mitigating damage.

Secure the AI supply chain: Evaluate third-party AI components for security vulnerabilities; implement robust vendor management procedures.

Human and organisational factors:

• Develop a security-aware culture: Establish clear protocols for data handling and AI system use; regularly train employees on AI-specific threats and vulnerabilities.

The integration of artificial intelligence into security operations represents both an extraordinary opportunity and a significant challenge. Organisations in the Middle East that proactively address AI security risks through comprehensive strategies, including deployment of AI data gateways, employee training and robust incident response planning, will be better positioned to harness AI’s benefits while mitigating its inherent risks. As regulatory frameworks continue to evolve globally, security leaders must stay informed about emerging requirements and best practices to ensure their AI implementations remain both effective and compliant.

kiteworks.com

Source: Electrical and Electronics Engineers (IEEE)
Source: IAPP’s Privacy and Consumer Trust Report 2023

Era is the first series of compact outdoor stations with advanced access control functions, specifically designed for residential applications.

It can be expanded up to 4 users or in a version with numeric keypad and includes a proximity reader with MIFARE/NFC technology as standard.

It is a product entirely designed and manufactured in Italy.

The key to control

Roshin Roy, Director, Traka, looks at the heart of hotels and why key management and access control must be top priorities when it comes to security

With hotel construction continuing to increase in the Middle East, it’s critical for operators to fully grasp all aspects of access control to protect their guests, staff and vendors. While many will immediately (and understandably) think first of guest room access when evaluating security measures, it’s equally important to establish standard operating procedures for back-office operations, especially before the first guest ever walks through the lobby. Creating a comprehensive and foundational access control framework is the signature of many successful hotels, and there are several concepts that every operator should adopt and include in employee training.

One of the most overlooked aspects of access control is the physical keys that many hotels leverage for a variety of uses, including redundancy for electronic

access control, plus daily operations in electrical, plumbing and food service. Too many hotels are haphazardly managing their physical keys by storing them on a pegboard or in an employee’s desk drawer. There’s no audit trail on who has which key, which can make locating lost or stolen keys difficult for hotel managers. Additionally, a lost key could trigger several negative consequences, including a financial burden of having to replace a key or re-key a facility, plus a security risk if that key ends up in the wrong person’s hands.

Simple solutions

Fortunately, some of the most modern hotels are safeguarding their operations against these scenarios by leveraging advanced key management technology. Solutions like intelligent cabinets safely

store a variety of physical keys in a single location, and managers remotely designate who has access to which key. Staff access the cabinet through a variety of credentials, including a badge, pin code and/or biometrics. The cabinet keeps a real-time log of who has checked out which key, which helps instill a sense of accountability. Managers can pull audit reports at any time, which is especially useful when handling security incidents or staying within compliance regulations.

For hotels that have a larger physical footprint, multiple cabinets can be used, which can help group keys of a similar nature and reduce the time spent returning a key to a certain cabinet. For instance, an electrician vendor returns a key to a cabinet closest to the maintenance department, while at the other end of the building, all the food

service keys may be kept closest to the kitchen. Managers can monitor all key usage from all cabinets remotely, which eliminates the need to have staff physically distribute keys.

Getting results

A hotel in India recently installed an intelligent key cabinet, and the results were immediate. The biggest impact was felt in the distribution and return process at the beginning and end of shifts. What previously took several minutes to check each key out was reduced to just seconds through the cabinet. When you extrapolate that impact to hundreds of keys, the overall time savings are truly significant. Managers had a much stronger grasp on overall key usage, and no longer did an employee have to maintain the logbook and try to identify who had a key last. Employees embraced the solution as a catalyst in helping them achieve their daily tasks more efficiently.

Another critical element that hotel operators need to keep in mind when evaluating access control solutions is integration. How does technology like cabinets communicate with an existing access control platform? If that solution can’t integrate seamlessly, it will likely require superfluous monitoring to ensure it’s functioning properly and additional training for current and new staff. Moreover, if there’s a security incident, it could impact different systems in different ways and complicate how a hotel responds. Conversely, if the solutions are integrated, that response process can be

“Ultimately, access control in hotels is centred on comprehensive management of who has access to what.”

drastically simplified. If an employee’s badge grants them access to guest rooms, key cabinets and general access to the facility, a manager can deactivate that badge, which eliminates their access holistically. This is especially helpful in trying to reduce potentially harmful, retaliatory responses from employees who have just left or have been terminated.

Testing times

It’s important to note that, with any access control technology, hotel operators should test the solution on a smaller scale before integrating it system-wide. There are several advantages to taking this approach. First, operators can identify how exactly that solution will impact processes and work out any issues before integrating it on a larger scale. Second, operators can save money by purchasing perhaps only one solution in the beginning and then scaling additional resources as necessities arise. Scalability is an important factor in evaluating technology, as needs often shift over time. Finally, by implementing a solution in a single department, operators develop

advocates within the hotel who can attest to the solution’s effectiveness and serve as ambassadors for its expanded integration. If one department sees that it could work for another one, they may be quicker to adopt it into their processes. Ultimately, access control in hotels is centred on comprehensive management of who has access to what. It’s vital for guest operations to be safe and seamless, so it behooves operators to have the systems and technology in place for their staff to make sure that experience is a positive one. While there are a variety of technologies that claim to improve efficiencies, integrated solutions like intelligent key cabinets represent the future of hotel operations in the Middle East. Cabinets safeguard the most fundamental of physical security assets while also representing a flexible solution that can be deployed and scaled throughout the facility. Operators should prioritise future-proof solutions like these that have a clear return on investment and serve as the foundation for operational workflow throughout the hotel. traka.com

Safeguarding Saudi’s tourism future

June 2025 saw the first wave of students graduate from the Red Sea Global Tourism Security training programme. We find out more about the programme and what those students thought of it

Red Sea Global (RSG) recently marked a significant milestone with the first graduation of students from its new Tourism Security training programme. This initiative was developed against the backdrop of Saudi Arabia’s Vision 2030, which outlines ambitious plans for economic diversification and a substantial increase in tourism.

As the Kingdom focuses on attracting more visitors and developing new destinations within the region, there is a corresponding requirement to ensure the safety and security of guests, residents and assets across these evolving environments. This programme was created to address that need, preparing candidates for the comprehensive security requirements of the future.

A collaboration with King Abdulaziz University led to the development of a two-year vocational curriculum and an associated degree, with an initial plan

to educate 400 nationals. Its content included English language skills, hospitality fundamentals and emergency response capabilities – focusing on react, control and resume protocols – alongside soft security principles.

The first group, consisting of 194 students – 133 female and 81 male –began their three-month English language training in September 2023. This was followed by 18 months of vocational training and then a six-month internship, with their graduation taking place in June 2025. A second group of 194 students is expected to complete their training and graduate in October 2025.

Students from the first graduation have shared their insights with Security Middle East magazine, reflecting on their experiences within the programme and their role in supporting the region’s evolving security landscape.

What inspired you to specialise in Tourism Security?

“What inspired me most was realising how crucial it is to ensure that visitors feel safe while enjoying their travel experiences. I wanted to be part of a field that not only promotes tourism but also protects it. Growing up in a country rich in culture and destinations like Saudi Arabia made me see the importance of security in sustaining tourism development.”

What are you most proud of achieving during your studies?

“I’m most proud of representing my classmates and delivering the graduation speech at our commencement ceremony. It was the result of years of hard work, perseverance and growth. I also earned Second Class Honors and became a certified Guest Service Professional,

which reflects my dedication to both the academic and practical sides of the tourism industry.”

JAWAD GHARIB

Why did you choose the Red Sea Security programme?

“I chose the Red Sea Security Programme because it is considered one of the rare and advanced fields globally, and one of the first programmes dedicated to securing this vital and strategic maritime corridor. What attracted me most was the Kingdom’s vision to develop this sector and its commitment to preparing qualified national cadres to protect maritime and coastal interests. Additionally, I have previous experience working in coastal areas, which has given me valuable insight into the challenges and opportunities in such environments. Since many Red Sea destinations are coastal and tourism-focused, I felt that this programme aligns perfectly with my background and future aspirations.”

How has the practical experience at Red Sea Security prepared you for the realities of the job?

“My practical experience provided me with a unique opportunity to apply theoretical knowledge in real-life situations, enhancing my skills in risk assessment, quick decision-making and teamwork across multidisciplinary groups. I also gained an understanding of how security integrates with sustainability and environmental protection in the vital tourism region of the Red Sea. This experience equipped me with the confidence and skills necessary to face

job challenges and protect one of the Kingdom’s most strategic areas.”

MAANSOUR ASIRI

What were some of the most interesting things you learned during your studies?

“I learned how to do investigations and inspections in the security field. I also learned about hazardous materials – how to identify them, move them safely and deal with them in emergencies. In addition, I studied how to manage a marine fleet, including the main departments, types of trips and different kinds of ships.”

What are some of the key takeaways from working within a live tourism development environment?

“One of the key takeaways from working in a live tourism development environment is understanding how sustainability can be applied in real life. I saw how solar energy is used to power the whole project, even the airport. I was also surprised by the eco-friendly choices in small details, like tourist toothbrushes and staff uniforms. It showed me how every part of the project can support the environment while still giving visitors a high quality experience.”

REMAS ALOTAIBI

How important do you think community engagement is in ensuring effective tourism security?

“I believe that community involvement is essential for effective tourism security. Local communities are often the first to interact with tourists, so their awareness of safety procedures and cultural values helps create a positive and welcoming image of the country. They can also identify unusual behaviour or emergency situations early and report them quickly. Collaboration between local residents and tourism security professionals helps build a safe, cooperative environment that enhances the overall visitor experience. In my view, tourism security is not just the responsibility of officials – it’s a shared duty that involves everyone.”

What advice would you give to future students considering the Tourism Security programme at Red Sea Security?

“My advice would be to approach it seriously and be prepared for real-world challenges. The programme is excellent — it combines hands-on training with strong security and tourism knowledge — but it requires commitment, discipline and initiative. It’s also important to build strong communication and teamwork skills, as these are essential in a global tourism destination like the Red Sea. It’s a great opportunity, and the field needs qualified national professionals who can proudly represent Saudi Arabia.”

SARAH ALSHEHRI

What are you most excited about as you embark on your career in tourism security?

“I look forward to using both my training and passion to contribute to a sector that connects people from all over the world.”

What are your aspirations for your career in tourism security?

“I aspire to become a leader and innovator in the field of tourism security. I aim to contribute to the development of proactive strategies and technologies that enhance safety without affecting the visitor’s experience. We are here to welcome tourists from all around the world and to add something exceptional and unforgettable to their journey.”

JOUD MAJED

What kind of impact do you hope to make?

“I really hope to make a difference by showing how important the human side of security is in tourism. I want visitors to feel safe, not just because of rules and procedures, but because they’re being welcomed with care and respect. I also hope to inspire other young Saudis to see this field as something meaningful and full of potential.”

How does it feel to be among the first graduates of this programme?

“Honestly, it feels amazing and a bit surreal. Being part of the first group trained by Red Sea Global makes me really proud, especially knowing that we’re helping shape something new and important for the future of tourism in Saudi Arabia. It’s exciting to know that we’re opening doors for others, and that we’ve been trusted to lead the way.”

SECURE ID BADGES

Muffadal Shehrawala, Magicard’s Head of Regional Sales and Technical Support, shares with Security Middle East magazine firsthand insight into how Magicard’s UKmanufactured printers do more than just produce high-quality cards; they embed unparalleled security features from the ground up

In an era where securing identities is more critical than ever, especially amidst escalating cyber threats and the proliferation of digital solutions, the foundational role of robust physical ID cards remains paramount. Few companies embody pioneering spirit and continuous innovation in this space like Magicard. Established in 1993, and now part of the Brady family, Magicard brings over three decades of expertise in ID card printer manufacturing, with security consistently at the forefront of its design philosophy.

Magicard is known for its pioneering ID card printing technologies. Could you explain the core technologies, and how these translate into tangible benefits like

enhanced security, durability and print quality for end-users?

Magicard, established in 1993 and since 2021 part of the Brady family, boasts over 30 years of experience in ID card printer manufacturing. We continually evolve our products to include the latest technological advancements, customer needs and market trends. Our current range of NEO printers highlights our commitment to reliability, industry leading support and security, all while being manufactured in Britain.

Our printer lineup includes directto-card printers (DTC) with dye sublimation technology, as well as retransfer technology. And we keep looking at new market needs. Recently

we launched our E+ NEO, a DTC printer perfect for events, sports and leisure, capable of printing on long cards of 109mm and 140mm, alongside the standard 86mm cards.

Security is also always paramount. We’ve integrated Magicard features like HoloKote (R), Digital Shredding, and Threat Benchmarking to ensure robust customer data protection. To keep pace with the increasing use of smart cards, our printers come equipped with encoders that can read and write data on virtually all types of technology cards, whether with a contact chip or contactless. Additionally, our printers are compatible with ISO and JIS standards for magnetic encoding.

In an increasingly digital world, how does Magicard define effective visual verification? What innovative features and techniques are integrated into your printers and cards to bolster this? Identity theft and duplication are significant concerns, and Magicard has always prioritised addressing these issues. In 1996, we pioneered and patented the HoloKote watermark technology, enabling customers to have a unique, customisable anti-copying security feature on their printed cards. The Holokote watermark appears when the card is held against a light source at a specific angle. The customer’s logo is encrypted in the printer’s memory, and the design is reproduced on the card using a clear overlay layer.

Magicard remains the only Original Equipment Manufacturer (OEM) to offer the HoloKote feature, with our headquarters controlling the artwork to prevent duplication. Our latest printers offer 10 custom HoloKote slots for customers with multiple logos.

Beyond visual security, how do Magicard solutions contribute to robust data protection and authentication on identity cards?

Magicard designs and manufactures GDPR-compliant products. This commitment is exemplified by the implementation of Digital Shredding in all our printers.

What is Digital Shredding? When you print with a regular printer, the data remains in the printer’s memory until the next print or until the printer is switched

off. This leaves the data vulnerable to hackers. Magicard’s Digital Shredding technology removes this vulnerability by making data irretrievable immediately after printing. Regardless of whether the printer is left on or another print job is sent, hackers will not find any user data in our printers’ memory.

We also offer Threat Benchmarking, similar to antivirus software. We monitor the National Vulnerabilities Database (NVD) and release firmware updates to patch for any new threats, which are provided free of charge to the end user.

Considering the rise of purely digital or app-based identity solutions, what are the inherent strengths and continued advantages of physical ID cards, especially those produced with Magicard’s advanced visual and digital security features, in terms of reliability, accessibility and real-world application? Physical ID cards maintain significant advantages. They are universally accessible and don’t rely on digital devices, internet access, or battery power. With security features like HoloKote, UV and microtext, they are highly resistant to forgery or duplication.

For example, a college campus that switched to digital ID cards eventually reverted to physical cards after students were unable to access the campus because their phone battery died.

Physical ID cards avoid this problem entirely. While digital IDs have their place, physical IDs are crucial in many areas.

Could you elaborate on Magicard’s current operational footprint and strategic plans for future growth and expansion in the Middle East? Are there specific countries or sectors within the region where you see the greatest opportunities?

The Middle East is a key business hub for Magicard. The region demands highquality products with stringent security standards, and Magicard can respond to these needs.

Our established partners have a strong presence and are expanding their network. People in the UAE have been using MagiCard printers and badges for many years, and we are now extending our focus to Saudi Arabia. The country’s Vision 2030 initiative involves numerous infrastructure projects that will require physical identification for access control

and other applications. In addition, Saudi Arabia also harbours a large healthcare, education and logistics sector who also rely on physical identification.

Magicard relies heavily on a strong partner network. Could you describe the structure and importance of your partner ecosystem in the Middle East?

Magicard works with a select group of dedicated partners who are focused on our people identification solutions. We collaborate with value-added partners who are not just distributors but also solution providers. In the Middle East, we partner with Smart World Nextgen, which has been in the market since 2006 with a strong hardware and software portfolio. Track International, founded in Egypt in 1996, supports our customers in North Africa, while Doculam PTY, established in 1979 in South Africa provides optimal support in their region. All our partners have decades of experience in their respective regions.

What advice would you offer to organisations in the Middle East who are looking to upgrade their identity management systems to be more secure and future-proof?

Organisations looking to upgrade their ID management systems should choose systems that produce high-quality cards and incorporate features to protect against forgery and digital data breaches, while also being compatible with the latest technology in people ID cards. Working with suppliers that offer turnkey solutions and excellent after-sales technical support is crucial. Select a Magicard ID card printer that seamlessly integrates with existing infrastructure and enhances physical identification solutions.

Tell us a bit about yourself and your role in the region.

I have been with Magicard for nearly two decades. I started as a technical support engineer and gained extensive product and market knowledge through excellent mentorship. Magicard promotes internal talent, and I was given the opportunity to manage regional sales and technical support, which is my current role. I have seen our printers help many organisations with their people ID, and I am 100% confident in their quality and reliability. magicard.com

The AI imperative: security first

Premchand Kurup, CEO of Paramount Computer Systems

FZ-LLC, looks at how the full potential of AI can be unlocked to enhance effective security for organisations

The UAE and Saudi Arabia are currently racing ahead with artificial intelligence (AI) adoption, each advancing ambitious national strategies – such as the UAE’s National AI Strategy and Saudi Arabia’s Vision 2030 – to cement their status as global AI leaders. This also reflects a broader shift, where governments and enterprises are harnessing the disruptive power of AI.

Yet, despite this growing recognition, around 70 per cent of the companies consider AI as a critical and powerful business tool but only 14 per cent have

scaled its use across all their operations, according to a March 2025 research report from Accenture. This stems from a mix of factors, including poor data, unclear strategy, security concerns and a lack of skilled talent. To truly unlock AI’s potential, businesses must address these challenges, especially those associated with cybersecurity.

Evolution of AI integration in Middle Eastern businesses

Enterprises leverage AI to streamline operations, enhance decision-making

and drive efficiency through intelligent automation, while government entities use it for urban planning, smart city management and public service delivery.

However, as AI becomes more deeply embedded in business operations, it introduces unprecedented security challenges. Many organisations lack a clear, enterprise-wide strategy for AI, leading to siloed pilot projects that do not scale. Data quality is another major barrier as poor, inconsistent, or siloed data limits the effectiveness of AI models. Security and compliance concerns also

play a role, as businesses fear data breaches, AI misuse and regulatory fallout.

Additionally, many organisations lack AI-literate leadership and specialised talent. The high cost and complexity of computing infrastructure required to train and run advanced AI models also make scaling a resource-intensive effort.

Regulatory scrutiny is also intensifying. In one landmark case, OpenAI’s ChatGPT was fined for violations of data privacy regulations, highlighting the growing legal exposure businesses face when deploying AI. Governments in the Middle East are still adapting to these rapid changes, often leaving businesses in a regulatory grey zone.

Major AI cybersecurity risks

As artificial intelligence becomes increasingly integrated into business operations, it also introduces complex cybersecurity risks. Gartner forecasts a period of ‘AI turbulence’ by 2025, as attackers shift from traditional infrastructure to the more vulnerable components of AI systems, such as data pipelines, machine learning models and AI agents.

One of the most concerning threats is data poisoning, where attackers manipulate the training data used to build AI models. Even minor alterations can distort outputs, leading to reputational damage, financial losses, or even systemwide failures. In addition, AI models are at risk of being reverse-engineered through model extraction or inversion attacks. These tactics enable cybercriminals to steal proprietary algorithms or infer sensitive training data, putting intellectual property and data privacy at significant risk.

Generative AI systems face another layer of vulnerability through prompt injection attacks with malicious inputs manipulating system behaviour and integrity. Meanwhile, model evasion techniques allow adversaries to bypass detection, rendering security models useless.

Cybersecurity framework for organisational resilience

Securing artificial intelligence is not a one-time task but a continuous, end-to-end process that demands a comprehensive approach. For instance, at Paramount, we address this through a cybersecurity framework built on four essential pillars.

“Many organisations lack a clear, enterprisewide strategy for AI”

The first pillar is Governance and Policy, which provides the foundational guardrails for safe AI usage. This involves developing clear, enforceable policies covering ethical AI use, data privacy, thirdparty integration and data minimisation.

The second pillar is Secure AI Lifecycle Management, where security is integrated at every stage, from data collection and model training to deployment and decommissioning. For example, rigorous validation should be conducted during training to detect poisoned datasets and realtime monitoring to identify anomalies indicative of adversarial inputs. Like an aircraft requiring both pre-flight checks and in-air maintenance, AI systems must be scrutinised throughout their lifecycle.

The third pillar positions AI as a Cybersecurity Ally. AI-driven security tools can analyse vast datasets, detect anomalies and automate responses with exceptional speed and precision. In areas like Identity and Access Management (IAM), AI can dynamically adjust access privileges based on risk signals, providing critical protection in modern, hybrid IT environments.

Finally, Data and Integration Security ensures the integrity and confidentiality of data shared across systems. With the rise of cloud-first and multi-cloud environments in the Middle East, practices such as encryption, zero-trust architecture, secure APIs and integration firewalls are crucial to protecting sensitive information from misuse.

By aligning with industry frameworks like AI TRiSM, organisations can go beyond technical protection to build trust and operational confidence. Ultimately, cybersecurity should be seen as a strategic enabler of secure, scalable AI adoption.

The way forward: emerging trends and transformative potential of AI

Looking ahead, the future of AI security is being shaped by several emerging trends. These include AI Red Teaming, which simulates adversarial attacks to detect weaknesses in AI models, and QuantumResistant AI Encryption, which prepares systems for the post-quantum era, where current encryption may no longer be viable. Additionally, Compliance-as-aService (CaaS) platforms are becoming essential as regulatory frameworks such as the EU AI Act and upcoming standards in the GCC region make compliance a core business requirement.

However, effectively harnessing these advancements requires a shift in approach, prioritising requirement-first thinking. Rather than beginning with tools, organisations must first define the business outcomes they seek, the risks they can tolerate, and the data they need to safeguard. In regions like the Middle East, where initiatives such as Saudi Arabia’s Vision 2030 and the UAE’s digital economy strategy rely heavily on technology, maintaining trust through strong cybersecurity measures is vital for AI to truly drive progress.

AI holds immense potential to transform businesses across sectors – from predictive maintenance in oil rigs to smart city planning and hyperpersonalised banking – but its power also poses significant risks if misused. For organisations, especially in the Middle East, the path forward lies in balancing innovation with robust cybersecurity. Security should be seen as the foundation for ethical, sustainable AI adoption. As we advance into the digital era, deploying secure AI systems will be key to responsibly leading in innovation. paramountassure.com

INTERSEC SAUDI ARABIA PREVIEW

Intersec Saudi Arabia returns with record exhibition space showcasing the innovations securing the Kingdom’s future

7

The seventh edition of Intersec Saudi Arabia, featuring increased government support, will be held at the Riyadh International Convention and Exhibition Centre (RICEC) from 29 September to 1 October.

This market-leading exhibition will showcase innovations in security, safety and fire protection, hosting industry experts from around the world.

+25%

The size of the exhibition has increased by 25% following a record-breaking edition in 2024.

27,000+

Over 27,000 visitors expected to attend in 2025.

Intersec Saudi Arabia, the premier industry platform for security, safety and fire protection, will return to the Riyadh International Convention and Exhibition Centre (RICEC) from 29 September to 1 October.

Aligning global innovation with national priorities, Intersec Saudi Arabia brings together government authorities, industrial leaders and international solution providers to secure the infrastructure, environments and communities building the nation’s prosperous future.

Organised by 1st Arabia and licensed by Messe Frankfurt, Intersec Saudi Arabia will be held in association with a range of government entities under the theme ‘Securing progress, igniting safety: Unveiling tomorrow’s solutions for Saudi Arabia’.

With a series of giga-projects underway in Saudi Arabia, including Neom, Qiddiya and Red Sea Global, and major global events on the horizon, such as Expo 2030

and the 2034 FIFA World Cup, the Kingdom is undergoing a significant transformation. Together, these developments mark a pivotal moment in Saudi Arabia’s evolution, positioning it as a key player in global tourism, sports and industry.

Bilal Al Barmawi, CEO and Founder of 1st Arabia Trade Shows & Conferences, said: “Intersec Saudi Arabia provides an important platform for decision makers across Saudi Arabia’s major projects to connect with global innovators and work together to build a secure, futureready environment. We look forward to facilitating important business connections that support the country’s growth and long-term success.”

After a record-breaking edition in 2024, this year, Intersec Saudi Arabia will showcase over 370 exhibitors from more than 35 countries, with over 27,000 visitors anticipated to attend. Intersec Saudi Arabia will feature over 1,000 brands across seven halls, and the exhibition space has been extended by

25% this year to cover 13,908 net square metres, reflecting the growing interest in the event.

Intersec Saudi Arabia now features CPD-certified content theatres, including the Future Security and Safety Summit Powered by ASIS, and the Fire Protection & Technology Summit. The event will also introduce a Thought Leadership Pavilion and see the return of The Premium Club, providing a host of benefits for select buyers and influencers.

The Future Security and Safety Summit will feature the latest insights and engaging discussions on emerging global threats, crisis response strategies and responsible AI innovation among other vital industry topics. The highlevel speakers for the summit include representatives from FIFA, Red Sea Global, Diriyah Company, Kearney and Saudi Aramco, among many others.

The Fire Protection and Technology Summit at Intersec Saudi Arabia will gather the most prominent fire and emergency service leaders from across the region to address key challenges, opportunities, standards, policies and technologies. During the summit, attendees will gain valuable insights from Saudi Civil Defense,

“The conference and events element of Intersec Saudi Arabia continues to grow each year and will once again bring together the brightest minds in security, safety and fire protection from around the world”

International Maritime Industries and AESG alongside other industry experts.

Riham Sedik, Exhibition Director, Intersec Saudi Arabia, Messe Frankfurt Middle East, said: “The conference and events element of Intersec Saudi Arabia continues to grow each year and will once again bring together the brightest minds in security, safety and fire protection from around the world. The event will offer interactive showcases, live demonstrations and engaging panel discussions, all tailored to the unique needs of the Kingdom.”

Intersec Saudi Arabia will be held in Halls 1-7 at RICEC and a purpose-built outdoor area. The event comprises five product sectors, which include Commercial & Perimeter Security, Homeland Security & Policing, Fire & Rescue, Safety & Health and Cybersecurity.

CONTACT

Riham Sedik, Exhibition Director riham.sedik@uae.messefrankfurt.com

For more information visit: www.intersec-ksa.com

Convenience vs. security in digital identities

Our newly formed Security Middle East Ambassador Panel has been tackling the topic of digital identities: how to navigate the Middle East’s digital frontier and how to balance the need for security with user convenience

The Middle East is rapidly embracing digital transformation, with ambitious projects ranging from national digital identity schemes to expansive smart city initiatives. This push aims to create seamless digital experiences for citizens and residents, facilitating everything from government services and financial transactions to integrated urban living. However, at the heart of this evolution lies a fundamental tension: how to strike the right balance between user convenience and robust identity security. This is not a straightforward choice between two

opposing forces but rather a nuanced challenge requiring careful consideration.

Convenience calls

On one side of the argument, the drive for convenience prioritises ease of access and streamlined user journeys. Proponents argue that for digital services to achieve widespread adoption and deliver their promised efficiencies, they must be simple to use. Systems that require minimal effort, such as single sign-on (SSO) across multiple platforms, or biometric authentication like facial

recognition and fingerprint scans, can significantly reduce friction. This approach aims to enhance accessibility for a broader population, accelerate digital transactions and integrate services more smoothly into daily life within smart city ecosystems. The logic is that if digital interactions are cumbersome, users may revert to traditional methods, undermining the very goals of digital transformation. Overly complex security protocols, for instance, might frustrate users, leading to workarounds or a reluctance to engage with digital platforms.

Protection at all costs

Conversely, the emphasis on robust security focuses on protecting individuals, data and national infrastructure from potential threats. Advocates highlight the increasing sophistication of cyberattacks, identity theft and fraud. They contend that lax security measures can lead to significant financial losses for individuals and institutions, erode public trust in digital systems and expose sensitive personal data. From a national perspective, robust security is seen as essential for safeguarding critical infrastructure and maintaining stability. Strategies for achieving this include multifactor authentication (MFA), advanced encryption, zero-trust architectures that verify every access request and continuous monitoring for suspicious activity. Neglecting these measures in favour of convenience could result in widespread vulnerabilities, making digital identities a prime target for malicious actors and potentially compromising the integrity of new digital services.

Achieving balance

The challenge lies in integrating these two objectives without compromising either. It is generally accepted that neither extreme offers a sustainable path forward. A system that is entirely convenient but insecure is inherently fragile, while one that is completely secure but unusable will not be adopted. The solution often involves a layered approach: employing multiple security controls that adapt to the context of the transaction. This might mean simpler authentication for low-risk actions and more stringent verification for high-value or sensitive operations. User education also plays a role, empowering individuals to understand and manage their digital identities responsibly.

Ultimately, balancing convenience and security in the Middle East’s digital identity landscape requires ongoing innovation, flexible policy frameworks and a commitment to continuous risk assessment. The goal is to create digital environments that are not only efficient and accessible but also resilient against evolving threats, fostering trust and enabling the long-term success of the region’s digital ambitions.

So let’s find out what our Ambassadors think.

“Balancing user convenience and robust identity security is crucial in the Middle East’s digital push. While seamless services like digital IDs and smart cities improve efficiency and citizen experience, security must protect against fraud, theft and threats to national security.

“A risk-based, layered approach works best: low-sensitivity services can prioritise convenience, while high-sensitivity transactions – such as healthcare or financial services – should employ stronger security measures like multi-factor authentication or biometrics.

“In my view, security should take precedence, especially with sensitive data and infrastructure. A breach can erode trust and cause costly consequences. However, security measures should be designed to minimise user friction, ensuring a balance where convenience remains accessible without compromising safety.

“The ultimate goal is a secure, seamless digital environment that fosters trust, encouraging widespread adoption and long-term resilience.”

“I believe digital identification is a vital enabler of progress — particularly in environments with low threat levels or in corporate settings where convenience, efficiency and access control are key. Striking the right balance is essential, but in many business applications, streamlined identity verification processes enhance productivity without significantly compromising security. In lowrisk scenarios, user experience can take priority, provided that baseline safeguards like encryption, multi-factor authentication and data privacy protocols are in place. However, in high-risk or critical infrastructure environments, identity security must always outweigh convenience. Ultimately, context should drive the balance — but I fully support the continued adoption of digital identity solutions where risk is manageable and benefits are clear.”

“In the Middle East’s drive for seamless digital services, from federated digital IDs to smart city platforms, security must shape convenience from the outset. Robust identity assurance through multi-factor authentication, biometric cryptography and PKIbacked credentials is essential to mitigate risks such as identity fraud, unauthorised access and infrastructure vulnerabilities. Convenience has value only when the integrity, confidentiality and non-repudiation of digital identities are preserved. In a region where digital sovereignty and national security are critical, convenience should be designed within the boundaries of strong security, ensuring usability while maintaining trust and resilience.”

“In today’s rapidly evolving digital landscape, convenience and security must go hand in hand, but robust identity security should always take priority. In the Middle East, and especially within the framework of KSA Vision 2030, the drive to adopt national digital IDs and smart city platforms is central to delivering seamless, people-centric services. However, if security is compromised for the sake of convenience, the risks of identity theft, data breaches and misuse can undermine trust in these transformational initiatives. True convenience is only achieved when people have confidence that their personal data is protected at every step. A balanced approach (combining strong authentication, clear privacy controls and user-friendly design) is critical to enabling the secure, smart services that Vision 2030 aspires to deliver, without exposing individuals or national infrastructure to avoidable threats.”

How universal readers enhance physical and digital security

In today’s fast-evolving threat landscape, securing access to buildings, systems and data demands an integrated approach to identity and authentication. Yet many organisations still rely on a fragmented patchwork of access control technologies, each with its own limitations and vulnerabilities. As the boundaries between physical and digital access continue to blur, universal RFID readers from ELATEC offer a streamlined and security-forward approach.

These intelligent devices support a broad range of credential types while enabling centralised management, strong encryption and seamless interoperability. By serving as a common interface across diverse security systems, universal readers help organisations close gaps, reduce risks and strengthen overall resilience.

What is a universal reader?

ELATEC’s universal RFID reader is built to support virtually any transponder technology, credential type, communication protocol or system interface. This allows security teams to simplify infrastructure while maximising flexibility. Key aspects of a universal RFID reader include:

Transponder Technology Support: Compatible with a wide range of

transponder technologies, including low-frequency (LF) and high-frequency (HF) RFID, NFC and BLE, providing a foundation for both traditional and emerging access systems.

Access Credential Flexibility: Supports a full range of access credentials, from legacy proximity cards (e.g. HID Prox, EM4100) to secure smart cards (e.g. MIFARE®, DESFire®, iCLASS®, LEGIC®), as well as modern mobile credentials stored in Apple Wallet, Google Wallet and other digital identity platforms.

Communication Protocols: Supports both legacy (e.g. Wiegand) and modern secure protocols like OSDP with AES encryption for end-to-end data protection.

System Interfaces & Connectivity: Offers flexible integration with USB, RS-232, RS-485 and other interfaces to connect with a wide variety of control systems and hardware.

Ongoing Adaptability: Firmware and software can be updated remotely, making it easy to adapt to new credentials, threats or compliance needs without replacing hardware.

How universal readers support higher security

Siloed physical and digital access systems complicate security, increase administrative burden and expose organisations to compliance risks.

Inconsistent Protection Across Environments: Using different reader types for different sites or applications creates uneven security enforcement.

Disconnected Identity Systems: Separate platforms for physical and digital access hinder unified identity management and auditability.

Limited Visibility: Fragmented systems make it difficult to monitor access events in real-time or correlate physical and digital activity.

Slower Threat Response: Security teams lose agility when updates, credential changes or revocations must be managed across multiple platforms.

The universal readers from ELATEC directly address security challenges by enabling tighter integration, stronger encryption and future-ready adaptability. By integrating with IT identity platforms, universal readers support convergence between physical access (e.g. doors and equipment) and logical access (e.g. computers, networks and digital applications), enabling a more unified security posture.

Centralised Credential Management: By supporting multiple credential types natively (including RFID badges and mobile credentials on the smartphone or watch), universal readers allow organisations to move towards unified identity-based access policies.

Improved Auditability: A single, standardised reader fleet simplifies access logging and anomaly detection. This enables faster incident response, more robust compliance reporting and better alignment with security frameworks like ISO 27001, NIS2 or NIST 800-53.

Reduced Human Error: Standardising access infrastructure simplifies training and reduces mistakes. Administrators and end users benefit from a consistent, intuitive experience across all access points.

Real-Time Threat Response: Remote update capabilities and centralised access management allow organisations to respond rapidly to emerging threats – pushing patches, revoking credentials or enforcing new policies instantly across distributed systems.

By simplifying security protocols, ELATEC’s multi-technology readers empower organisations to strengthen access control, streamline operations and stay ahead of evolving threats.

Since the beginning of this year, ELATEC has strengthened its global presence with a regional hub in Dubai — providing dedicated local support and expertise for the Middle East.

elatec-rfid.com

In a world of ever-evolving access challenges, security professionals need technology that keeps up. ELATEC’s universal RFID readers support a wide range of transponder technologies, including low-frequency (LF) and high-frequency (HF) RFID, NFC and BLE. With versatile interfaces and multiprotocol communication support – including Wiegand, OSDP and RS-485 – they integrate easily into diverse environments. Configuration and customization are handled via ELATEC’s powerful DevPack software suite.

YOUR BENEFITS AT A GLANCE

Support of 99 physical and mobile credentials

Quality at 19 locations worldwide

Compatible with 60+ transponder technologies

Remotely configurable and updatable

Certified in up to 110 countries

Cyber defence strategies

From AI-powered threats to deepfake scams, Azeem Aleem, Executive Director, Cyber Resilience Services at CPX, outlines the top best practices to combat cyber threats

The United Arab Emirates (UAE) is charting an ambitious course through a rapidly evolving digital landscape. Its commitment to innovation has propelled the nation to the forefront of global cybersecurity, evidenced by its top ranking in the ‘Pioneering Model’ category of the 2024 Global Cybersecurity Index (GCI). However, as AI transforms industries and reshapes global security dynamics, the UAE – and the world – must prepare for an era where cyber threats become increasingly sophisticated, automated and unpredictable.

The evolving cyber threat landscape in the UAE and beyond necessitates a proactive and comprehensive approach to cybersecurity. Effectively addressing these threats goes beyond technological defenses; it requires a nuanced understanding of human factors, strategic foresight, and sustained international cooperation. By integrating AI-driven cybersecurity measures, fostering publicprivate partnerships, and enhancing global threat intelligence sharing, the UAE can solidify its position as a global leader in cybersecurity.

The AI-powered threat landscape

The rise of AI presents both an opportunity and a challenge for cybersecurity. On the one hand, AIdriven security tools can enhance threat detection and response, but on the other, cybercriminals are leveraging AI to launch highly sophisticated attacks. The recently released State of the UAE Cybersecurity Report 2025 from CPX reveals that over 223,800 assets within the UAE are potentially exposed to cyber-attacks, with half of the critical vulnerabilities remaining unaddressed for over five years.

This trend is not unique to the UAE. Globally, nations are struggling to keep pace with AI-powered cyber threats, resulting in significant vulnerabilities in critical infrastructure and sensitive data protection. Cybercriminal enterprises, statesponsored threat actors, insider risks and ideologically motivated hacktivists are increasingly harnessing AI to automate attacks, circumvent detection mechanisms and scale their operations with unprecedented sophistication. Tactics such as AI-generated phishing campaigns and deepfake-enabled social engineering represent a significant escalation in the threat landscape. In response, organisations must adopt a forward-looking, proactive approach to cybersecurity. For business leadership, this necessitates the development of a comprehensive cyber resilience strategy –one that not only ensures robust

Here are some key strategic frameworks that organisations can embrace to effectively combat evolving threats and enhance their cyber resilience.

1. Implementing Endpoint Detection & Response (EDR) Systems

One of the foundational steps in fortifying cybersecurity defences is the deployment of Endpoint Detection and Response (EDR) systems. These solutions continuously analyse endpoint activities, detecting and neutralising threats in real time. Given that misconfigurations account for 32% of cyber incidents in the UAE, AI-driven EDR systems can play a pivotal role in identifying and mitigating vulnerabilities before they are exploited.

2. Establishing a 24/7 Detection and Response Capability

In today’s threat landscape, cyber-attacks can occur at any time, necessitating round-the-clock vigilance. AI has transformed Security Operations Centres (SOCs) by automating threat analysis and response. Establishing a 24/7 AI-driven SOC ensures continuous monitoring of networks, systems and data. The State of the UAE Cybersecurity Report 2025 highlights that the government, finance and energy sectors are the most targeted by cyber threat actors. By leveraging AI-powered threat detection, organisations within these critical sectors can respond to threats faster, minimising potential damage and ensuring business continuity.

3. Conducting Regular AI-Powered Security Audits

Traditional security audits are no longer enough. AI-driven security audits use machine learning algorithms to analyse vast amounts of security data, identifying anomalies and vulnerabilities that human analysts might overlook. The report indicates that improper usage and unlawful activity account for 19% of cyber incidents in the UAE. By integrating AI into security audits, organisations can enhance predictive risk management and improve their overall security posture.

4. Integrating a Robust Actionable Threat Intelligence Function

Proactive defence mechanisms are crucial in staying ahead of emerging threats. Integrating a robust cyber threat intelligence function allows organisations to gather, analyse and share information about potential threats. This intelligence aids in anticipating and mitigating attacks before they occur. The report notes a 58% increase in ransomware groups operating in the UAE, underscoring the importance of threat intelligence in identifying and defending against such adversaries.

5. Securing Nations with Tailored Cybersecurity Services

To address these challenges, specialised cybersecurity services are essential. Using a dedicated cybersecurity service ensures a coordinated and effective response to cyber threats and helps strengthen an organisation’s digital resilience. These may include solutions to enhance cyber defences at both national and international levels, such as EDR systems, continuous threat monitoring, actor analysis, proactive intelligence and Extended Detection and Response (XDR) capabilities.

local defences but also integrates seamlessly with international best practices and global threat intelligence frameworks.

CPX’s own offering, Secure the Nation, provides tailored solutions to support state-of-the-art cyber SOCs. cpx.net

In the rapidly evolving landscape of the Middle East, where digital transformation and ambitious national visions are reshaping urban and industrial environments, the role of advanced security solutions has never been more critical.

Here, Saad shares Genetec’s strategies for supporting Vision 2030, navigating the convergence of physical and cybersecurity, harnessing the power of AI and future-proofing security infrastructures in a region poised for unprecedented growth.

Genetec has demonstrated a growing commitment to the Saudi Arabian market. What initiatives, investments, or expansion plans highlight this commitment, and how do you foresee Genetec’s presence evolving in the Kingdom?

With close to 10 years of local operations, Genetec has significantly deepened its footprint in Saudi Arabia through strategic investments in local talent, infrastructure and channel partner development. We have a strong grasp of the local market and our dedicated in-country team provide technical support and consulting services tailored to the Kingdom’s evolving security needs. We have also strengthened our partnerships with local channel partners to ensure scalable deployment and localised service. Over

GENETEC EXPANDS STRATEGIC FOCUS IN SAUDI ARABIA

Security Middle East magazine chats with Mohamad Saad, Country Manager for Genetec, a global leader in unified security, to discuss the company’s deepening commitment to Saudi Arabia

the next five years, we see our presence growing through deeper collaborations in national-scale projects tied to Vision 2030 – especially in sectors like critical infrastructure, transportation and public safety – where unified security and data intelligence are essential. Our roadmap also includes investments in local training programmes and innovation hubs to align with the Kingdom’s workforce development goals.

How is Genetec’s cutting-edge technology and its focus on innovation contributing to the national objective of advancing digital transformation agenda?

Genetec plays a pivotal role in Saudi Arabia’s digital transformation by delivering intelligent, unified security platforms that integrate video surveillance, access control and analytics. Our open-architecture solutions enable seamless IoT integration, making them ideal for smart city applications. Our technology has been deployed in commercial zones and critical infrastructure sites across the Kingdom, ensuring future-ready protection. For example, we have worked with the public sector to implement traffic monitoring systems that combine video analytics with license plate recognition for smarter urban mobility. We are also enabling organisations to make real-time, datadriven decisions through advanced

dashboards and AI-powered threat detection. These capabilities support not only security but broader operational insights, driving digital efficiency.

Saudi Vision 2030 is a transformative blueprint encompassing economic diversification, infrastructure development and quality of life improvement. How do Genetec’s comprehensive security solutions specifically support these overarching pillars?

The Genetec security solutions align seamlessly with Saudi Vision 2030’s pillars by going beyond traditional surveillance. Our platforms enhance public safety through city-wide situational awareness and support smart mobility by managing traffic flow and incident response in real time. In emerging industries, we help optimise operational efficiency by integrating physical security data with business systems for predictive maintenance and risk reduction. For example, in critical infrastructure and smart industrial zones in Saudi Arabia, Genetec enables centralised monitoring and data-sharing between stakeholders, boosting responsiveness and compliance. This unified approach directly contributes to infrastructure modernisation, economic diversification and citizen well-being which are the key elements of the Vision 2030 blueprint.

Could you discuss Genetec’s collaborative efforts with both KSA government agencies and key private sector partners?

Collaboration is at the heart of Genetec’s strategy in Saudi Arabia. We work closely with government agencies, law enforcement and critical infrastructure operators to co-develop security frameworks that align with national objectives. Our partnerships with private sector leaders in sectors like oil & gas, logistics and real estate have enabled the deployment of scalable, intelligent security ecosystems. These collaborations ensure local relevance, faster implementation and better customisation. It also supports us to expand our market presence and innovation capabilities within the Kingdom. By aligning our solutions with Saudi Arabia’s digital and security goals, we contribute to creating a safer, more resilient and technologically advanced nation.

What do you identify as the most significant overarching trends currently shaping the wider physical and converged security sector across the Middle East?

From my point of view, I see the Middle East’s physical security sector entering a phase of strategic maturity. Organisations

“I

see the Middle East’s physical security sector entering a phase of strategic maturity”

are moving beyond the hype of new technologies, instead focusing on maximising existing infrastructure while integrating innovation in practical, outcome-driven ways. Hybrid deployments that are blending on-premises, cloud and edge solutions are becoming the norm, allowing for cost-effective modernisation without discarding past investments. AI is another key trend, with nearly half of industry professionals planning to implement some form of AI soon. However, what sets successful deployments apart is a focus on solving real-world operational challenges using responsible, explainable AI thereby enhancing human decision-making rather than replacing it.

Data privacy and compliance are also taking centre stage, especially as regulatory pressures and breach costs rise. According to our 2025 State of Physical Security Report, these trends reflect a growing demand for scalable, secure solutions that enable measurable results. Cross-functional collaboration and integrated tools that serve IT, facilities and HR will define the next chapter of smart, converged security.

The convergence of physical security and cybersecurity is a critical topic globally. How mature is this convergence in the Middle East?

The convergence of physical and cybersecurity is no longer optional, it is essential. In the Middle East, and particularly in Saudi Arabia, awareness of this integration is growing, but maturity levels vary. Many organisations still view physical and cyber systems in silos, despite the fact that any IPconnected device, from video cameras to access control systems, can become a point of vulnerability. For example, if access control systems lack proper cyber defenses, they can be exploited to unlock or block entry points without authorisation, creating both digital and physical threats.

At Genetec, we embed cybersecurity into the very design of our solutions. Our dedicated cybersecurity and security architecture team continually monitors industry threats, applies best practices and swiftly integrates necessary fixes. As organisations across the region move to more connected, IoT-driven security ecosystems, it’s critical that they adopt a unified approach, treating access control with the same scrutiny as surveillance and aligning with global cybersecurity standards.

genetec.com

STRENGTHENING SECURITY THROUGH COLLABORATION

We are delighted to announce that PSSA jointly participated with SIRA in the World Police Summit held at the Dubai World Trade Centre from 13 to 15 May 2025. The summit brought together professionals from policing, law enforcement, government bodies and private security companies from over 110 countries

The summit was a great opportunity for PSSA to promote its vision and engage with global security professionals. PSSA was created to give private security professionals a platform to connect, share knowledge, support each other and grow. It is a voluntary group and proudly supported by SIRA, the official body regulating the private security sector in Dubai.

“Being part of the World Police Summit in Dubai as an exhibitor was a real privilege. The event brought together a wide range of professionals all under one roof. I was proud to represent the Professional Security and Safety Alliance (PSSA) and share what we stand for,” said Liz Jajal, PSSA representative.

One of the major highlights during the event was the level of interest in training and education in the private security industry. Many visitors — from law enforcement and private companies — were keen to understand how private security staff in the UAE are trained and certified. This opened many useful discussions about professional development, staying compliant with UAE laws and the need for proper certification.

A key point often discussed was the clear legal boundaries that private security professionals in the UAE must follow. They are not law enforcement officers and cannot act outside their defined role. This is why regular, highquality training is so important. Security staff must know the law, understand their duties and respond professionally within their legal limits.

Another important achievement during the summit was the growing partnership between PSSA and Security Middle East Magazine. Earlier this year, at Intersec

2025, PSSA and Security Middle East magazine signed a Memorandum of Understanding (MoU) to build a long-term collaboration. This partnership focuses on promoting awareness, training and improved industry standards across the security sector.

Security Middle East’s presence at the summit also helped amplify key conversations around security innovation, professionalism and the future of privatepublic collaboration. By combining PSSA’s field experience with Security Middle East’s strong communication network, both organisations are working together to support better practices and stronger relationships in the security community.

This partnership has already attracted more attention from stakeholders and collaborators who want to see a more

unified and skilled private security sector. Together, PSSA and Security Middle East are making it easier for professionals to access information, training and connections that help them grow and succeed.

In summary, the World Police Summit was not only a proud moment for PSSA but also a stepping stone for greater cooperation across the industry. It showed how vital partnerships, proper training and shared knowledge are in keeping our communities and workplaces safe.

PSSA looks forward to continuing this journey — raising awareness, building stronger partnerships and improving the quality of the private security industry in the UAE and beyond.

pssa.global

WE’RE WITH YOU EVERY STEP OF THE WAY

As the industry leader in power and data transmission innovation, Altronix designs and manufactures electronic products that ensure security systems run at optimal performance. We pride ourselves on providing the best technical and customer support in the business. That’s the Altronix advantage.

NETWAY SPECTRUM

Hardened PoE Switches & Fiber Media Converters

• Deploy IP devices at remote locations with or without local power

• Supports up to 90W per port

Rapid battery charging provides extended power backup

115/230VAC or 277VAC input

• Manage and reset devices remotely with LINQ™ Network Power Management

• Lifetime warranty

© 2025 Altronix Corporation.

Industry Interview

Meshal Aljohani, CPP, PSP, PCI, Security Operations

Specialist talks with Fadwa AlBawardi, Founder and CEO, FSAB Consulting

Can you please tell us about your career experience and journey?

I am a Saudi Arabian entrepreneur, with more than 21 years of working experience, who established my own consultancy office (FSAB) in April 2022, to provide consulting services in digital transformation, strategic planning, data and AI strategies.

Moreover, I am a certified trainer in KSA as well as United Nations Institute for Training and Research (UNITAR), and an Elsevier reviewer for international AI & technical research papers and articles. In addition, I am also an author and a public speaker in several national and international conferences including: United Nations ITU IGF2023 in Kyoto Japan, as well as UN ITU AI for Good Summits 2024 and 2025 in Geneva Switzerland. I am also a USA Today Bestselling Author.

I have a Master’s degree in Computer Science from Boston University, USA, and my Computer Science Bachelor Degree was from the American University in Cairo. I have also attended a Strategic Management course in Harvard University, USA, in 2019.

How would you describe the current state of cybersecurity in the Middle East, and what key threats are emerging?

Governments in the Middle East are recognising the importance of cybersecurity as part of their national security strategy. Many countries are investing in advanced cybersecurity measures, establishing national cybersecurity agencies and developing frameworks for incident response and management. Saudi Arabia has introduced new cybersecurity regulations and frameworks aimed at improving resilience and compliance across industries. This regulatory environment promotes a culture of cybersecurity awareness and responsibility.

As for the key threats, many countries in the Middle East have been targeted by hacking groups, often linked to geopolitical tensions. Nation-state actors are increasingly using cyber techniques to gather intelligence, conduct espionage and disrupt critical infrastructure. In addition, Phishing attacks continue to rise, exploiting social media and email to deceive individuals and organisations into revealing sensitive and confidential information.

In what ways is Artificial Intelligence transforming cybersecurity practices in the region?

AI is significantly reshaping the cybersecurity landscape of the Middle East, providing organisations with tools and strategies to defend against increasingly sophisticated cyber threats. However, while AI brings numerous advantages, it also necessitates new considerations regarding ethics, potential biases and the need for human oversight in cybersecurity practices. As organisations continue to integrate AI into their cybersecurity frameworks, the region will likely see enhanced resilience against cyber threats.

What are the main challenges facing women in cybersecurity and AI, and how can the industry promote greater inclusion?

I believe that the challenges are universal. Stereotypes about gender roles may discourage some women from pursuing careers in cybersecurity and AI fields. Additionally, the tech industry’s male-dominated culture may lead to some isolation and fewer support networks for women.

However, to promote greater inclusion, the industry can implement mentorship and sponsorship programmes to connect aspiring female professionals with experienced mentors. Offering

scholarships and training specifically for women in tech can enhance their skills and confidence. In addition, companies should prioritise diversity in hiring and create inclusive workplace environments that celebrate female contributions.

What trends or innovations do you believe will shape the future of cybersecurity and AI in the Middle East?

The future of AI and cybersecurity in the Middle East will be shaped by several key trends and innovations. First, AI-driven threat detection will become standard, utilising machine learning to analyse data in real time, identifying and responding to threats with unprecedented accuracy. Second, the growth of Cybersecurity as a Service will enable access to advanced cybersecurity tools for organisations of all sizes, powered by AI technologies.

Additionally, behavioural and predictive analytics will enhance anomaly detection, revealing potential insider threats and compromised accounts. These advancements will foster a robust cybersecurity ecosystem, essential for safeguarding the region’s rapidly digitalising economy and critical infrastructure.

SECC, Ho Chi Minh City, Vietnam

secutechvietnam.tw. messefrankfurt.com

24–26 August NEXT GENERATION IOT EXPO

RICEC, Riyadh, KSA

ngiotex.com

12–14 January

Dubai World Trade Centre

intersec.ae. messefrankfurt.com

18 September

CISO MIDDLE EAST SUMMIT 2025 (UAE EDITION) Dubai

exeglobe.com/cisomiddle-east-summit-2025/ 29 September–1 October INTERSEC SAUDI ARABIA

International Convention and Exhibition Centre (RICEC) intersec-ksa.com

Queen Sirikit National Convention Center, Bangkok secutechthailand.tw. messefrankfurt.com

11–12 November OFSEC Oman Convention & Exhibition Centre, Muscat, Oman

ofsecevent.com

18–21 November MILIPOL PARIS

Paris Nord Villepinte, France

milipol.com

19–21 November

SICUREZZA INTERNATIONAL SECURITY & FIRE EXHIBITION

Strada Statale, Italy

sicurezza.it

1 December

SECURITY & FIRE AWARDS FOR EXCELLENCE

JW Marriott Grosvenor House, London, UK securityandfireawards.com

From Vision to Victory: The Remarkable Success Story of Frontier Pitts Middle East's Regional Growth

www.fpgulf.com

Through methodical growth and deepening regional expertise, the company has established itself as an essential component of the Middle East's infrastructure security ecosystem. As the region continues its remarkable transformation, this strategic expansion ensures it remains ready to secure the infrastructure powering continued prosperity across all markets it serves.

Strategic Regional Expansion

Growth began with a strategic foundation in Abu Dhabi, leveraging the UAE's position as the region's commercial hub. From this base, the company systematically expanded across the Emirates before extending operations throughout the Gulf Cooperation Council nations, including Saudi Arabia, Qatar, and Oman.

This expansion was methodical and strategic, focused on establishing local expertise, regulatory compliance, and cultural understanding in each market. The team invested heavily in regional talent, building workforce capabilities that merge international security standards with deep local knowledge—enabling effective implementation across diverse Middle Eastern environments.

Vision and Mission: Regional Security Leadership

The company’s expansion reflects a clear vision: to serve as the premier guardian of Middle Eastern security, with a strong focus on critical and high-security infrastructure. This mission has driven systematic regional growth, establishing it as a trusted partner across multiple markets. Its commitment extends beyond individual projects to supporting broader national development goals. As each country pursues economic diversification and technological advancement, the team continues to deliver solutions aligned with these transformative ambitions.

Success Through Strategic Partnership

This expansion represents a strategic alignment with the region's development aspirations. With a presence across multiple countries, the company supports cross-border projects and regional infrastructure networks, while its systematic approach creates opportunities to develop and share best practices throughout all markets.

Trusted and Verified: Our Commitment to Quality and Standards

The company’s credibility as a regional leader in infrastructure security is reinforced by a series of prestigious certifications and institutional recognitions. It holds ICV (In-Country Value) certification, aligning with the UAE’s national agenda to promote local content and support Emiratization initiatives.

It is also DUNS registered, providing international credibility through a globally recognized business identifier. As part of its commitment to brand integrity and protection, the company has achieved official trademark registration, safeguarding its identity across regional markets.

Its strong connection to the UAE business community is reflected in active membership with the Abu Dhabi Chamber of Commerce—a platform that fosters collaboration and regulatory alignment.

Operational excellence is further validated by the Veritas System Quality Certification, ensuring all systems and procedures meet rigorous international standards. Additionally, it holds a license to practice monitoring and control systems, certifying its capability to deliver specialized security solutions in full compliance with regulatory requirements. These achievements collectively demonstrate an unwavering commitment to transparency, regulatory compliance, and high-performance service at every level.

“Success is the result of continuous progress, not sudden perfection.” -Anonymous-

Project Spotlight: Cultural Heritage Meets Modern Security

The company’s regional operations have evolved from a small outpost into a comprehensive organization managing multiple large scale projects simultaneously. Each success laid the groundwork for further expansion, with a growing reputation for excellence opening doors to increasingly critical infrastructure assignments.

Among these is one of the most culturally sensitive and technically complex projects to date: securing Al Masjid An Nabawi in Madinah Al Munawarah, one of the most revered religious sites in the Islamic world. This assignment involved deploying advanced security bollards that deliver high impact resistance while blending seamlessly with the mosque’s historic architecture. The project is a testament to the company’s ability to deliver cutting edge perimeter security without compromising cultural and spiritual heritage.

Coming Soon: Securing Sacred Spaces

This iconic project will be featured in our upcoming article, where we reveal how technical innovation and cultural reverence came together in the heart of Madinah. Stay tuned to explore the full story behind the protection of this globally significant landmark.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.