Explore other IDC events

IDC Saudi Arabia CIO Summit 2023

Enabling the Digital Economy's Leaders

In 2023, we are going further, together!
Join us for the 13th Edition.

The digital economy continues to expand in scale and sophistication at an unprecedented rate, driving the transformation of citizen, customer, and employee experiences and the rise of digitally enabled services such as remote healthcare, distance learning, remote work, and mobile banking.
Overview
Digital-native firms, equipped with new business models and armed with substantial venture capital funding, have disrupted supply chains in numerous industries, fueling growth in areas such as ecommerce, direct-to-consumer services, digital payments, and cloud kitchens. With the metaverse and Web3 paradigms on the horizon, further disruption is expected to individual, enterprise, and industrial digital experiences.

As the share of the digital economy becomes increasingly significant, major governments around the world are beginning to develop dedicated strategies to enable its measurement and further development. Creating suitable regulatory environments and enriching the talent pool will be critical to the success of these strategies. Today, technology is playing an ever-increasing role in enabling, measuring, and reporting on sustainability initiatives and diversity and inclusion drives, and government and business leaders are moving these issues to the top of their digital agendas.

The IDC Saudi Arabia CIO Summit 2023 will bring together the region's foremost IT and telecom leaders, digital government pioneers, digital regulators and authorities, and industry thought leaders.

Hosting the Saudi Arabia's most prominent CIOs and Senior IT Executives, the event will examine the current state of the digital economy, assess its ongoing impact on citizens, customers, employees, and operations, address the key challenges that need to be overcome, and outline proven best practices and strategies for driving future success.
Why Attend?
• Receive critical insights from leading industry experts
• Discover solutions to pressing business challenges
• Get hands on with the industry's latest innovations
• Interact with the brands and specialists on your short list
• Engage in workshop-based technology discussions
• Participate in dedicated one-to-one meetings
• Share knowledge and network with your peers
• Take part in a series of fun, exciting, and memorable activities

Delegate Journey

Don't miss out on an extraordinary and unparalleled experience at the IDC Saudi Arabia CIO Summit 2023

Key Topics

Impact of Sustainability on Technology Vendor

Application Modernization strategies

Effective Hybrid Cloud Deployment

Developing an AIOps strategy and practices

Full stack Observability

Leveraging Low Code / No Code platforms

Orchestrating Digital Infrastructure for hybrid environments

Charting a Data-driven digital strategy

Intelligent automation

Predictive analytics strategies

Zero Trust security approaches

Cybersecurity Policies & Regulations and Compliance

5G impact – network architectures, market strategies and use cases

IDC Saudi Arabia Advisory Council 2023

2022 Event Highlights

Agenda

Filter Topics

8:00

Registration & Networking

8:30

Opening Act

8:40

IDC Welcome Address

9:00

Advisory Council Felicitation

9:10

Strategies For the CIO and Enterprise Innovation: AI Everywhere

9:40

Is the Cloud for Everyone?

10:00

Orchestrating Digital Infrastructure for Hybrid Environments.

10:20

Harnessing the Power of Observability for Digital Transformation

10:40

CIOs are Building a Digital Economy that Defines our life

11:00

Tea/Coffee & Networking Break

11:30

Summit Partner Tracks (Parallel Sessions)

13:00

Tea/Coffee & Networking Break

13:25

Platinum Partner Tracks (Parallel Sessions)

14:55

Networking Lunch

15:30

For The CIO- By The CIO Session (Parallel Sessions)

16:15

Close of Day 1

Exclusive Dinner (Limited to CIOs)

18:30

Registration & Networking

19:00

Opening Act

19:10

IDC Welcome Address

19:15

Partner Welcome Address

19:20

Partner Keynote Presentation

19:35

Dinner

20:00

Entertainment

20:10

Close of Dinner

Speakers

Hamza Naqshbandi

Associate Vice President (Saudi Arabia & Bahrain), IDC

Meredith Whalen

Chief Research Officer, IDC

Alanoud Alhudaib

Director, Cloud Product and Service Management, SITE

Saud Altowaim Show full profile linkedin

Saud Altowaim

Executive Head of Infrastructure & Managed Services, solutions by stc

Saravanan Sambandam

Head of Data Analytics & AI (MEA), Tech Mahindra Ltd

Ragy Magdy

Chief Commercial Officer, e& enterprise

Thomas Meyer

General Manager and Group Vice President of European Research, IDC

Ranjit Rajan

Vice President, Research (META), IDC

Charbel Khneisser

Vice President, Solutions Engineering, EMEA, Riverbed Technology

Hussam Abu-Rida

Technical Director, TXOne

Mark Schwartz

Enterprise Strategist and Evangelist, AWS

Amjad Al Sabbah

Vice President of North Gulf (Saudi Arabia, Qatar, Kuwait, and Bahrain), Sprinklr

Arindam Sengupta

Head of Technology Advisory, RSM Saudi Arabia

Nowaf Alaboudi

Head of Cybersecurity, Cipher

Sriram Narasimhan

Associate Vice President, Solutions, Cloud4C

Shadi Shidvash

Partner Alliance Director, Intel

Gunal Kannan

AVP, CTO Office, BMC Software

Dr. Ahmed Darwish

Head of Digital Solutions Delivery, Bank Al Bilad

Gabriele Obino

VP & GM Southern Europe & Middle East, Denodo

Jean van Vuuren

Associate Vice President of EMEA Commercial Sales, Hyland

Marc Merheb

Director of Solution Consulting, OpenText

Ayman El Marazky

Presales Senior Manager, SELL Region, Dell Technologies

Jessica Constantinidis

Field Innovation Officer EMEA – Strategy Office, ServiceNow

Roman Spitzbart

Vice President of Solutions Engineering, Dynatrace

Mehnaz Mahbub Show full profile linkedin

Mehnaz Mahbub

Solutions Manager, Rack Solutions & Integration, Supermicro B.V.

Thara Allaboon

Strategic IT Consultant Lead, VMware

Ahmad Al-Qabbat Show full profile linkedin

Ahmad Al-Qabbat

Enterprise Business Development Manager, Intel

Dana Abu Ali Show full profile linkedin

Dana Abu Ali

Data & AI Technical Specialist, IBM

Wjdan Alharthi Show full profile linkedin

Wjdan Alharthi

Senior Data & AI Technical Specialist, IBM/SBM

Nawaf Al-Ghamdi

Data and AI Director, Council of Health Insurance(CHI)

Ashley Woodbridge

Chief Technology Officer (Middle East & Africa), Lenovo

Yousef A. Alsuhaibani

Chief Information Officer, Mobily (KSA)

Mohammed Alsuhaim

Chief Executive Officer, Saudi Digital Academy

Khalid Almutairi Show full profile linkedin

Khalid Almutairi

VP, IT, Saudi Arabian Mining Company (MAADEN)

Dr. Azzam Alsudais

CIO/CDXO, Prince Sultan University

Amin Al Jaber

CIO, Aljomaih Automotive Company

Mohamed Abdel-Aal

Director, Digital Experience and Innovation (KAUST Smart), King Abdullah University of Science & Technology (KAUST)

Bandar Alshahrani

Head, Digital and Innovation, Public Investment Fund (PIF)|Projects (KSA)

Ahmad Alsubaihi Show full profile linkedin

Ahmad Alsubaihi

Senior Director IT Infrastructure and Operations, Public Sector

Mansor Alsofi

Product Manager, Communications, Space & Technology Commission (CST)

Dr. Abdulrahman Al Khnaifer

CIO, King Saud University (KSU)

Mohammad Alharbi

Assistant Deputy Minister for Digital & Innovation, Ministry of Communications & Information Technology

Dr. Faisal Al-Nasser

Head of Business Systems (CIO), Al Marai Company

Anas Mosa

IT Director, Public Investment Fund–Projects

Abdullah Al Awadh

Senior Director of Technology Services, The Council Of Cooperative Health Insurance

Kalle Bjorn

Senior Director, Systems Engineering, Fortinet

Anirban Mukherjee

Head of Tech Sales MEA, Red Hat

Ahmad Alabduljabbar Show full profile linkedin

Ahmad Alabduljabbar

General Manager (Saudi Arabia), Intel Corporation

Osama Al-Zoubi

CTO (MEA), Cisco

Jihad Nehme

Chief Business Development Officer, Edarat Group

Vineet Shukla

Business Head – HCLTech Middle East & Turkey

Raha Moharrak Show full profile linkedin

Raha Moharrak

The Youngest Arab & the first Saudi woman to climb Mount Everest

Alaa Khalid Falimban

Manager, Cybersecurity Operations, Saudi Arabian Mining Company (MA'ADEN)

Jawad Moghnieh

Regional Leader, Veeam Software

Yazan Al-Yasin Show full profile linkedin

Yazan Al-Yasin

Solutions Engineer, Cloudera

Prem Anand Velumani

Regional Manager, Zoho MEA

Taher Haj Yousef

Strategic Development Director, Rimini Street

Ahmed Hussain

Senior Regional Sales Manager, Entrust

Hanan Al Qahtani

Enterprise Sales Executive, Confluent

Ahmed Sadek

Lead Solution Engineer, Boomi

Ahmed Al-Marzouk

Business Development Manager, Data Analytics, Alnafitha IT

Yousef BaSaad

Systems Engineering Lead, Trend Micro

Karthik Ananda Rao

Chief Technical Head, ManageEngine

Maik de Wolf

Managing Director, Mendix

Karthik Chandra Akula

Regional Sales Head, Freshworks

Gopan Sivasankaran

META General Manager, Secureworks

Etienne Niken

Principal Sales Engineer, Commvault

Jerry Jalava

Head of DevSecOps, Oivan

Ahmad Saad

Regional Sales Manager, Liferay

Ilia Ovchinnikov Show full profile linkedin

Ilia Ovchinnikov

Regional Sales Director, Infinidat

Echo Li

Director, Marketing and Solution Sales, Huawei Cloud Saudi Arabia

Barrie Green Show full profile linkedin

Barrie Green

Regional Vice President UKI & Middle East, Appian

Tessa Jones

Chief Data Scientist, Nournet

Khalaf H. Alahmadi

Chief Information Security Officer, 2P

View All Speakers

Venue

Fairmont Riyadh
Area, Business Gate, Qurtubah, Riyadh 11552

Partners

Host Partner
Game Changer Partner
Cloud Innovation Partner
Cybersecurity Trailblazer Partner
Cloud Technology Partner
Strategic Partner
Smart ICT Partner
Government Partner
Digital Transformation Partner
AI Partner
Summit Partner
Summit Partner
Summit Partner
Summit Partner
Summit Partner
Summit Partner
Summit Partner
Summit Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Technology Focus Group Partner
Advance Intelligence Partner
Exhibit Partner
Exhibit Partner
Exhibit Partner
Exhibit Partner
Exhibit Partner
Exhibit Partner
Dinner Partner
Dinner Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner

Knowledge Hub

Analyst Spotlight
A New Approach to Security in the Post-Pandemic World

Frank Dickson,
Group Vice President, Security & Trust, IDC


As we enter 2023, we can finally, for the most part, put reactionary moves due to COVID-19 behind us as the disease moves from a pandemic to an endemic part of daily life. We have accepted that digital transformation moved at a feverish pace, transitioning our enterprises to digital first years before we anticipated. The possibilities of remote work gave way to the reality that hybrid work is here to stay. These are truths that we have accepted.

Analyst Spotlight
A New Approach to Security in the Post-Pandemic World

Frank Dickson,
Group Vice President, Security & Trust, IDC


As we enter 2023, we can finally, for the most part, put reactionary moves due to COVID-19 behind us as the disease moves from a pandemic to an endemic part of daily life. We have accepted that digital transformation moved at a feverish pace, transitioning our enterprises to digital first years before we anticipated. The possibilities of remote work gave way to the reality that hybrid work is here to stay. These are truths that we have accepted.

The economic headwinds we are experiencing have re-energized a trend that was muted by the pandemic. The C-suite appreciates the value and importance of security both now and into the future. C-level executives are actively planning continued investments in security to ensure the viability of their enterprises. However, C-level executives are growing tired of the continually growing financial appetite of security and are looking to reduce spending when and where possible. They are demanding accountability for the spend; in essence, they are looking for secure outcomes that are measurable and meaningful.

The result of this security confluence is a migration of approaches. The breach detection mindset of the past is giving way to a view that positions security as a way of improving an organization's cyber-risk posture, a posture that is tightly coupled with the goals of the organization and decreasing business risk. In its 2023 Future of Trust FutureScape, IDC predicted that by 2025, 45% of CEOs, fatigued by security spending without predictable ROI, will demand security metrics and results measurement to assess and validate investments made in their security program.

The IDC Middle East CIO Summit 2023 will look to address security in this new reality. We will help guide you in working with the CEO and boards of directors as we transition to delivering secure outcomes and a trusted organization to our executive constituencies.

Analyst Spotlight
Thriving in Saudi Arabia's Emerging Digital-First Economy

Ranjit Rajan,
Vice President, Research (META), IDC

Shaped by the National Vision 2030, the national transformation aspirations of Saudi Arabia are now converging with advanced technology adoption to accelerate the expansion of the Kingdom's digital economy.

Analyst Spotlight
Thriving in Saudi Arabia's Emerging Digital-First Economy

Ranjit Rajan,
Vice President, Research (META), IDC


Shaped by the National Vision 2030, the national transformation aspirations of Saudi Arabia are now converging with advanced technology adoption to accelerate the expansion of the Kingdom's digital economy.

The government's ongoing transformation efforts, together with brownfield and greenfield (e.g., giga projects) initiatives aimed at accelerating economic diversification, are looking to leverage advanced technologies to create differentiated services, experiences, and business models.

Saudi organizations are increasingly focused on deriving a larger share of their revenues from digital products, services, channels, and platforms, with 45% of the CIOs surveyed by IDC in Saudi Arabia saying this is now a major priority for their organizations.

The same survey revealed that 52% of Saudi CIOs will be prioritizing the digitalization of operations (process automation, reengineering, and productivity improvements) over the next 12–18 months, while about half of the respondents will also be focused on delivering insights at scale across their organizations by building capabilities in data and enterprise intelligence.

In order to navigate the winds of change sweeping across the Kingdom, organizations will need to invest in strengthening their digital agility so that they are better positioned to thrive in the new market environment, and ensure they are not left behind.

Giga/mega projects that envision futuristic, highly digitalized cities and communities — such as NEOM— will provide a blueprint for accelerated digitalization. Such projects will set the pace as they develop greenfield digital infrastructure and platforms, leveraging advanced technologies like AI/ML, IoT, edge, and 5G to create innovative tech-enabled use cases and customer experiences.

The rise of the digital economy and the emergence of digital-native firms in segments such as fintech, ecommerce, D2C (direct to consumer), healthtech, and edtech, among others, have accelerated the disruption of supply chains in several industries, driving the development of new business models, digitally augmented customer experiences, and automated operations.

At the same time, the government has launched numerous strategies and policies to support the growth of the digital economy, with a focus on developing the infrastructure, innovation platforms, skills, and regulations required to support the expansion of digital businesses.

The strategy of the Ministry of Communications and Information Technology (MCIT) focuses on attracting leading international tech companies, increasing the local content shared in the IT sector, expanding and improving the technical skills of the local workforce, and promoting technical and digital awareness.

The Kingdom's rapid transformation is underpinned by digitalization and advanced technology adoption. In order to thrive in this new world, organizations need a digital-first mindset, coupled with a vision to build a data-driven organization that is ingrained with a culture of innovation.

Leveraging cloud as a foundational platform, developing a data and intelligence plane powered by AI and advanced analytics, and enabling ubiquitous, consumption-based digital infrastructure will all become critical technology priorities for Saudi organizations.

Analyst Spotlight
Cloud Overspend and the Role of CloudOps and FinOps

Matt Eastwood,
Senior Vice President, Worldwide Research, IDC


Over the past few years, IDC has seen investments in cloud grow rapidly as enterprises build their digital footprints. In many cases, this growth has occurred without the proper governance necessary to ensure resources are optimized appropriately. And the impact on budgets has been significant, with cloud now representing 35-40% of a typical IT budget. Additionally, the typical enterprise is reporting that their cloud overspend can be upwards of 25-35% today. Customers are clearly struggling to understand how to best optimize cloud spend for architectural and business benefit while also allocating cloud costs to the correct team.

Analyst Spotlight
Cloud Overspend and the Role of CloudOps and FinOps

Matt Eastwood,
Senior Vice President, Worldwide Research, IDC


Over the past few years, IDC has seen investments in cloud grow rapidly as enterprises build their digital footprints. In many cases, this growth has occurred without the proper governance necessary to ensure resources are optimized appropriately. And the impact on budgets has been significant, with cloud now representing 35-40% of a typical IT budget. Additionally, the typical enterprise is reporting that their cloud overspend can be upwards of 25-35% today. Customers are clearly struggling to understand how to best optimize cloud spend for architectural and business benefit while also allocating cloud costs to the correct team.

One of the ways that enterprise IT customers are tackling this challenge is through the implementation of CloudOps and FinOps. CloudOps is the practice of optimizing and managing the use of cloud resources, while FinOps is the practice of managing financial aspects of cloud operations. Together, these practices allow customers to better understand their cloud usage and costs, and to identify areas where they can reduce expenses effectively.

For example, by using CloudOps tools, customers can monitor and adjust their usage of resources such as storage and computing to ensure they are only paying for what they need. Additionally, FinOps techniques such as forecasting and budgeting can help customers plan and control their spending, preventing unexpected or unnecessary cloud charges.

As a result of these efforts, many enterprise IT customers are seeing significant reductions in their cloud expenditures and can more effectively allocate their IT budgets to other areas of the business. This can mean the difference between a project being viable or not. It also allows these users to have a better understanding of what they pay for and predict future costs, which can help them avoid financial surprises and make more informed decisions. And as many organizations deal with financial headwinds in the market, the time to implement or augment internal CloudOps and FinOps functions is now.

Analyst Spotlight
Thriving in the Digital-First Economy

Hamza Naqshbandi,
Associate Vice President (Saudi Arabia & Bahrain), IDC

Saudi Arabia's vision for a diversified economy relies heavily on digital transformation (DX) initiatives, an area the Kingdom has always focused on and heavily invested in. The disruption caused by COVID-19 emphasized the value of DX more than ever before; indeed, DX is no longer a choice for most businesses, it has become essential. 52% of CIOs surveyed recently by IDC in Saudi Arabia said that they are now focused on changing or adapting their existing business models into digital business models, reflecting the increasing adoption of a "digital-first" mindset.


Analyst Spotlight
Thriving in the Digital-First Economy

Hamza Naqshbandi,
Associate Vice President (Saudi Arabia & Bahrain), IDC


Saudi Arabia's vision for a diversified economy relies heavily on digital transformation (DX) initiatives, an area the Kingdom has always focused on and heavily invested in. The disruption caused by COVID-19 emphasized the value of DX more than ever before; indeed, DX is no longer a choice for most businesses, it has become essential. 52% of CIOs surveyed recently by IDC in Saudi Arabia said that they are now focused on changing or adapting their existing business models into digital business models, reflecting the increasing adoption of a "digital-first" mindset.

Progressive Saudi organizations are focusing on monetizing existing products by extending core products with ecosystem partners and offering their products/services online as subscription-based services. The top 3 areas where Saudi organizations have seen the greatest impact from DX are improved customer satisfaction, advocacy, and retention; increased cost efficiencies through the digitalization of operations; and increased value derived from data for improved insights and decision making.

Over the next 12–18 months, we expect Saudi organizations to focus on the following digital priorities:
Digitalizing operations (i.e., process automation, reengineering, and productivity improvements)
Delivering insights at scale throughout the organization by building capabilities in data and enterprise intelligence
Deriving a larger share of revenues from digital products, services, channels, and platforms

The Saudi market is the largest ICT market in the region and IDC expects ICT spending in the Kingdom to reach $34.5 billion in 2023. The Saudi government has made concerted efforts to attract key multinational corporations in strategic areas of emerging tech and simultaneously stimulate demand for tech products and services among Saudi businesses. Saudi Arabia’s ICT sector strategy has dedicated workstreams aimed at attracting foreign direct investment, increasing localization, and nurturing and supporting a culture of innovation and entrepreneurship.

At the same time, regulatory enablers are evolving rapidly to keep pace with the changing dynamics of the Kingdom's technology and innovation landscape. Whether it's ensuring standardization, creating effective mechanisms of enforcement and operationalization, or illustrating responsibility and accountability, the regulatory environment is already proving to be a key enabler when it comes to attracting investment and driving innovation across the emerging technology spectrum of AI, IoT, cloud, and cybersecurity.

Saudi Arabia is set to be the fastest-growing major economy in 2023. As outlined in the guiding Vision 2030, the Kingdom aspires to be ranked among the top 15 economies worldwide by 2030. To achieve this goal, the Kingdom aims to create an attractive investment environment and diversify its economy to raise the share of non-oil exports from 16% to 50%. As we approach the execution phase of Vision 2023, IDC believes that Saudi organizations will gradually shift their strategic focus from digital transformation to digital value creation.

Increasingly the emphasis is going to be on running and scaling a viable digital business in line with nationwide transformation initiatives. This tallies with IDC’s global prediction that by 2026, 40% of the total revenue of G2000 organizations will be generated from digital products, services, and experiences. This metamorphosis will continue to be at the heart of Saudi Arabia's digital economy aspirations and will necessitate IT to transform (i.e., going from running IT as a back-office function to driving innovation by using tech as a platform to compete and differentiate).

The future is poised to be laced with disruption as Saudi Arabia transitions from the "digital transformation era" to the "digital business era". In order to thrive in this new world, a digital-first mindset is essential, coupled with a vision to build a data-driven organization that is ingrained with a culture of innovation. Leveraging cloud as a foundational platform, developing a data and intelligence plane powered by AI and advanced analytics, and enabling ubiquitous, consumption-based digital infrastructure will all become critical technology priorities.

Analyst Spotlight
The Three Core Pillars of Efficient Digital Infrastructure

Shahin Hashim,
Associate Research Director, IDC


Pandemic-induced transformation has enabled governments and enterprises across all industries to deliver their products and services through digital channels. The sheer pace of this transformation has been a once-in-a-lifetime experience worth living through. As we move forward into 2023, the digital world has become the norm for most industries and organizations.

Analyst Spotlight
The Three Core Pillars of Efficient Digital Infrastructure

Shahin Hashim,
Associate Research Director, IDC


Pandemic-induced transformation has enabled governments and enterprises across all industries to deliver their products and services through digital channels. The sheer pace of this transformation has been a once-in-a-lifetime experience worth living through. As we move forward into 2023, the digital world has become the norm for most industries and organizations. This requires them to constantly innovate and improve their digital offerings to meet changing customer expectations, making a digital-only approach the default strategy for many. Indeed, three out of five UAE organizations surveyed by IDC rank the need to digitalize their operations as their utmost digital priority.

The implementation of highly responsive, resilient, and agile infrastructure is the foundation for any digital-first/only organization. IDC defines this as digital infrastructure, and our Future of Digital Infrastructure Framework helps technology suppliers to position their infrastructure products and services. It also assists technology buyers in defining their road maps for infrastructure transformation, enabling them to attain their ultimate digital infrastructure goals.

The framework is built around three core pillars:

Cloud-Native Technologies: This refers to any modern network, compute, and storage infrastructure, as well as software solutions and technologies delivered at cloud scale and with cloud attributes. These technologies enable frictionless governance, data management and mobility, and security compliance for enterprise workloads across the edge, core, and cloud, thus proactively preparing enterprises to face the interconnected uncertainties of the new world order.

Autonomous Operations: This is a model that allows organizations to run their infrastructure services in a highly automated and self-sufficient manner. This enables more efficient and reliable operations, freeing up resources and enhancing the overall customer experience. To achieve the most advanced level of autonomous operations, organizations can use a combination of modern programmable infrastructure with an API-enabled automation control plane coupled with a suite of cloud-native tools such as full stack observability, intelligent monitoring, asset management, configuration management, application performance management, and end-user experience management. Such an API-driven control plane enables DevOps teams to increase their developer velocity. Additionally, the IT service management function can be enhanced by adopting a proactive approach using AIOps augmented with AI/ML models, helping to significantly reduce the time to detect, respond to, and resolve incidents.

Ubiquitous Consumption: This refers to the utilization of digital infrastructure building blocks based on business objectives, regardless of the location of consumption or the method of delivery. This can include the consumption of resources at the edge, core, or cloud, as well as whether they are shared or dedicated. Essentially, it is about being able to consume the necessary digital resources in a flexible and adaptable manner so that they can be used to achieve desired business outcomes.

The future of digital infrastructure is an exciting one, and it will be interesting to see how organizations continue to leverage these developments to drive their digital-only journeys.

CXO Spotlight
Artificial Intelligence Is Revolutionizing the Way Humans Live

Jason E. Roos,
CIO, King Abdullah University of Science and Technology


As a CIO for a science and technology university, I realize that artificial intelligence (AI) is revolutionizing the way humans live, work, and play, and the world is on the precipice of a new technological revolution as a result. AI is making it possible to automate repetitive tasks, streamline operations, and personalize services. The impact of AI on various industries is vast and has the potential to solve many of the world's most pressing problems.

CXO Spotlight
Artificial Intelligence Is Revolutionizing the Way Humans Live

Jason E. Roos,
CIO, King Abdullah University of Science and Technology


As a CIO for a science and technology university, I realize that artificial intelligence (AI) is revolutionizing the way humans live, work, and play, and the world is on the precipice of a new technological revolution as a result. AI is making it possible to automate repetitive tasks, streamline operations, and personalize services. The impact of AI on various industries is vast and has the potential to solve many of the world's most pressing problems.

King Abdullah University of Science and Technology (KAUST) is at the forefront of creating AI-powered experiences through its KAUST Smart Living Laboratory Program. The program aims to create a smart living environment that leverages the latest AI and smart technologies to enhance people's lives. This is done by creating smart homes, smart cities, and smart environments that are more sustainable, efficient, and convenient.

KAUST's Smart Living Laboratory Program is also focused on developing AI-powered solutions to real-world problems in fields such as energy, transportation, healthcare, and education. The program combines cutting-edge research with practical applications, making it possible to bring innovative AI solutions to market.

KAUST is also working with leading companies and universities to develop new AI technologies and applications, further establishing its position as a leader in the field. The program's focus is on developing AI solutions to real-world problems and its collaboration with leading companies and universities make it a driving force in the development of AI technologies and applications. KAUST is helping to shape the future of AI and its impact on society, making it a key player in the new technological revolution.

Partner Spotlight
Modern Data Protection in the Age of Digital Transformation

Mohamad Rizk,
Regional Director (Middle East & CIS), Veeam Software

Over the past few years, we have witnessed an acceleration of digital transformation initiatives across regional enterprises in the Middle East. This has brought with it a multitude of challenges and complexities relating to multi-/hybrid-cloud architectures and Kubernetes adoption.

Partner Spotlight
Modern Data Protection in the Age of Digital Transformation

Mohamad Rizk,
Regional Director (Middle East & CIS), Veeam Software


Over the past few years, we have witnessed an acceleration of digital transformation initiatives across regional enterprises in the Middle East. This has brought with it a multitude of challenges and complexities relating to multi-/hybrid-cloud architectures and Kubernetes adoption.

The incidence of ransomware is also on the rise. As per the Veeam Data Protection Trends Report 2023, within the region, 86% of organizations in Middle East and Africa fell prey to ransomware attacks in 2022. Businesses cannot stand still, particularly in times of crisis.

IT and data protection teams have a big task ahead keeping up with ramping workloads and ensuring they close the gap between technology and how well it is backed up and protected. So, as budgets constrict, enterprises need to optimize every dollar and make sure the right workloads and applications are prioritized and protected, and a simple, flexible, reliable, and powerful modern data protection solution is in place – one that protects all environments - Cloud, Virtual, Physical, SaaS and Kubernetes. Only then can enterprises ensure they’re sufficiently protected and ready for turbulent times ahead.

Partner Spotlight
Tech Trends 2023

Vineet Shukla,
Business Head – HCLTech Middle East & Turkey


2022 has been a transformational year in the world of tech innovation. So, what does the future hold? Here is a sneak peek. From AI to metaverse and the future of work, take a look at ETO's 10 biggest tech trends shaping the future of enterprises today.

Partner Spotlight
Tech Trends 2023

Vineet Shukla,
Business Head – HCLTech Middle East & Turkey


2022 has been a transformational year in the world of tech innovation. So, what does the future hold? Here is a sneak peek. From AI to metaverse and the future of work, take a look at ETO's 10 biggest tech trends shaping the future of enterprises today.

AI: Traversing the AI journey from software to silicon. Global AI market to reach USD 1394.3 Bn in 2029 at 20.1% CAGR

5G: Pushing the boundaries of 5G applications, 5G network subscriptions to reach 4.4 Bn by 2027

House of Cloud has new entrants: Global cloud computing market to expand at 15.7% CAGR from 2022 to 2030

Experiencing the ‘verse’: Metaverse market opportunity to reach USD 800 Bn by 2024

Backing up cybersecurity with quantum-secure communications and quantum machine learning: Global quantum cryptography market to reach USD 476.83 Mn by 2030 at 18.67% CAGR

Sustainable practices seeping into grassroots: Global green technology & sustainability market to grow to USD 60.7 Bn by 2027

Blockchain at the center of the decentralized economy: Global Web 3.0 market size to reach USD 81 Bn by 2030 as branding & marketing needs increase.

Improved humanoid robot collaboration backed by computational empathy: Global humanoid robot market value to reach USD 17.32 Bn by 2028 at a 42.1% CAGR

Low-code, no-code platforms accelerating super-app development: Low-code development platform market to grow at 25.26% CAGR to reach USD 64.56 Bn by 2026

Redefining heuristics of employee experience via tech advancements: Global learning & development industry to touch USD 402 Bn by 2025.

Partner Spotlight
Unified Observability for Digitally Agile and Resilient Organizations

Charbel Khneisser,
Vice President, Solutions Engineering, EMEA, Riverbed Technology

The role of the CIO will continue to evolve this year, especially with the emergence of new technologies and the need for organizations to deliver innovation, adapt to market dynamics, and enhance the sustainability of operations. However, as IT environments become more complex, agility is impaired and resilience decreases.

Partner Spotlight
Unified Observability for Digitally Agile and Resilient Organizations

Charbel Khneisser,
Vice President, Solutions Engineering, EMEA, Riverbed Technology


The role of the CIO will continue to evolve this year, especially with the emergence of new technologies and the need for organizations to deliver innovation, adapt to market dynamics, and enhance the sustainability of operations. However, as IT environments become more complex, agility is impaired and resilience decreases.

Unified observability has rapidly emerged as a solution to these challenges. With actionable insights gained by correlating information across disparate systems and complex remote work and SASE environments, it's empowering IT teams to understand and act upon what's happening in their environment. Going a step further, market leaders such as Riverbed offer unified observability solutions that capture end-user feedback through flexible survey components, including Net Promoter Score (NPS), to provide an enhanced view of user engagement and productivity. Such contextual insights provide a complete picture, helping organizations to avoid missing any key events due to traditional sampling-based approaches.

Unified observability is the ultimate evolution of visibility, offering cross-domain correlation of monitoring tools. Where IT teams once found themselves drowning in the deluge of data, as data becomes even more abundant, unified observability can deliver actionable insights based on the telemetry data captured from network, apps, and users.

To enable remediation/self-healing, ML/AI becomes crucial in the troubleshooting step to properly analyze baselines and behavior changes. By doing so, it surfaces the most important issues faster and with precision, making the organization more resilient in the face of rapid and unpredictable change.

As CIOs and IT leaders face immense pressure to use the latest technologies to drive competitive differentiation, unified observability delivers the agility and resilience needed to "shift left" by filtering out noise and reducing escalations.

Partner Spotlight
A CIO's Guide to Navigating Uncertain Times

Taher Haj Yousef,
Strategic Development Director, Rimini Street

Take a look at these smart moves that you can make right now to future-proof your IT strategy and do more with less.

Partner Spotlight
A CIO's Guide to Navigating Uncertain Times

Taher Haj Yousef,
Strategic Development Director, Rimini Street


Take a look at these smart moves that you can make right now to future-proof your IT strategy and do more with less.

Challenge #1: Prioritize Goals
CIOs are being asked to drive innovation while optimizing their budget spend. According to the 2023 State of IT Survey, over 80% of companies are concerned about a recession this year. Respondents reported that 40% of their budget increases in 2023 will be influenced by inflation. Taking a hard look at resource allocation can help you find places where both time and budget can be optimized to get more done.

CIO Smart Move #1: Ruthless Prioritization
• Evaluate every project and every dollar spent through the lens of ROI.
• Separate business-as-usual activities from projects that deliver capabilities and those that establish competitive differentiation.
• Consider outsourcing routine activities so that your team can focus on innovation.

Challenge #2: Modernize on a Budget
By optimizing your budget, you may find that you already have dollars in your budget to fund modernization. According to Mobile Magazine, CIOs are feeling the strain of modernizing their IT stack with unpredictable budgets: 93% of CIOs surveyed expect their IT budgets to increase this year, but 83% believe that they are expected to do more with less. This may seem paradoxical, but it’s important to keep in mind that these short-term IT budget increases are quickly diminished through rising costs and high salaries.

CIO Smart Move #2: Trim the Fat
• Get rid of the support fees that aren’t delivering value.
• Scrutinize subscriptions to eliminate unused licenses.
• Dig deep into the organization to see if any employees are putting shadow IT on the corporate card – and if they are, move them to the approved software.

Partner Spotlight
Empowering Business Users Through Low-Code Capabilities

Moussalam Dalati,
General Manager, Liferay Middle East and Africa

In today’s highly dynamic and competitive marketplace, businesses need to adapt in order to succeed — they must respond quickly to new market demands, adjust internal processes, and optimize operations. Low-code capabilities can play a significant role in helping organizations stay ahead of the competition.

Partner Spotlight
Empowering Business Users Through Low-Code Capabilities

Moussalam Dalati,
General Manager, Liferay Middle East and Africa


In today’s highly dynamic and competitive marketplace, businesses need to adapt in order to succeed — they must respond quickly to new market demands, adjust internal processes, and optimize operations. Low-code capabilities can play a significant role in helping organizations stay ahead of the competition.

The Benefits of Low-Code Solutions

Software solutions like digital experience platforms (DXPs) offer low-code functionalities that enable business users to build, deliver, and manage their own applications without specialized IT resources. Thanks to prebuilt components and templates, users can create custom applications with drag-and-drop interfaces and visual workflows, reducing or even removing the need for coding skills. This capability empowers users to take control of their own processes and make changes as needed.

Here are three major benefits of low-code capabilities:

1. Build, Deliver, and Manage Your Own Applications

Typically, traditional software development cycles can take weeks or months to deliver a new application because they require extensive coding, testing, and deployment procedures. However, low-code-enabled DXPs like Liferay can deliver new applications much faster through an accessible and visual approach to application development that is more user friendly than traditional coding methods.

2. Streamline Business Processes with Seamless Integration

Low-code platforms can help overcome the challenge of disconnectedness by enabling business users to build applications that integrate seamlessly with existing systems. With low-code functionality, it is possible to connect to different data sources and systems through prebuilt connectors and application programming interfaces that business users can easily customize to meet their specific needs. This ability creates additional value because the integration of existing systems is crucial to the provision of a unified experience.

3. Reduce Costs and Speed Up Time to Market for Complex Business Models

In a survey conducted by OutSystems, 74% of IT leaders reported that their organizations were able to deliver new applications faster with low-code capabilities, and 69% said that they were able to reduce their backlog of application development projects. Speeding up application development means businesses can reduce costs and accelerate time to market.

Conclusion

By empowering business users with low-code capabilities, organizations can transform customer experience strategies in today’s dynamic and competitive market. By reducing reliance on specialized IT resources, low-code platforms can enable business users to build and adapt applications — and ultimately reduce costs, improve efficiency, and drive innovation.

Partner Spotlight
Investing in Digital Infrastructure Is a Strategic Choice

Alaa Bawab,
General Manager, Infrastructure Solutions Group (META), Lenovo

In a recent study conducted as part of its Future of Digital Infrastructure research, IDC determined that businesses that are ahead of the curve in terms of digital transformation recognize the critical importance of digital infrastructure in achieving business objectives.

Partner Spotlight
Investing in Digital Infrastructure Is a Strategic Choice

Alaa Bawab,
General Manager, Infrastructure Solutions Group (META), Lenovo


In a recent study conducted as part of its Future of Digital Infrastructure research, IDC determined that businesses that are ahead of the curve in terms of digital transformation recognize the critical importance of digital infrastructure in achieving business objectives.

When asked about their key business objectives, and how digital infrastructure helps them achieve those objectives, businesses cited the following:

• Regulatory Compliance: Businesses that are party to a global economy must ensure that they are adhering to laws and regulations on the proper ways to collect, analyze, store, and retain data on their end users.

• Revenue and Profits: Businesses are acutely aware of the fact that DX initiatives should directly influence business differentiation, which in turn should lead to increased revenue and profits.

• Cost Reduction: Businesses are always seeking to reduce their capital and operating expenses. The lack of a holistic IT infrastructure strategy can lead to runaway costs; an aging IT infrastructure can be expensive to maintain.

• Improved Sustainability: Collectively, datacenters are one of the leading contributors to greenhouse emissions. Businesses are constantly looking for ways to align their IT infrastructure strategies with their sustainability goals.

• Increased Business Agility and Digital Business Innovation: Digital infrastructure — housed in modern datacenters — directly supports the ability of businesses to respond quickly to market needs and to innovate internally and externally.

• Improved Employee Productivity: An aging IT infrastructure can be a drag on IT employee productivity, resulting in a drag on business end-user productivity.

Partner Spotlight
Making Your Data Strategy Successful

Ali AlShami,
Regional Director, Confluent Middle East

Because the digital-first world is significantly changing industries, organizations need to rethink their data strategies and meet employee and customer demands for instant information at their fingertips.

Partner Spotlight
Making Your Data Strategy Successful

Ali AlShami,
Regional Director, Confluent Middle East


Because the digital-first world is significantly changing industries, organizations need to rethink their data strategies and meet employee and customer demands for instant information at their fingertips. Implementing a successful data strategy is harder than it needs to be because of the legacy limitations set by centralized, point-to-point batch architectures. Instead of piecing together old data from multiple points, organizations need a continuous flow of data to make appropriate decisions at a fast pace.

Data streaming platforms break these constraints by providing real-time connectivity between software-as-a-service, analytics, and database systems in a way that lets users tap more data with less redundancy and reliance on centralized teams.

Partner Spotlight
The Future of Customer Service: Trends to Watch

Haitham Elkhatib,
SVP Growth Markets, Sprinklr

Renowned architect, systems theorist, author, designer, inventor and futurist Buckminster Fuller said, “You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.”

Partner Spotlight
The Future of Customer Service: Trends to Watch

Haitham Elkhatib,
SVP Growth Markets, Sprinklr


Renowned architect, systems theorist, author, designer, inventor and futurist Buckminster Fuller said, “You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.”

Customers are, and always will be, the heart of any successful business. Yet nowhere is the stagnation of enterprise technology more evident than how we service and support them. Despite the buzz of digital transformation, it’s shocking to see how similar today’s contact centers are to the contact centers of 10 or 20 years ago.

To truly change the way businesses service customers, I’ve identified four trends that companies can capitalize on to future proof their contact centers.

1) Eliminate a voice-first approach. Many enterprise companies are still stuck with core systems that are decades old. According to some estimates, up to 85% of contact center agent seats are still supported by on-premises solutions that take a voice-first approach. I believe companies will eventually realize that voice-based systems are expensive, inefficient, and deliver a poor customer experience.
2) Shift from reactive to proactive customer service. Next-generation contact-center-as-a-service (CCaaS) solutions don’t wait for a customer’s inbound call. The new model for customer service is proactive, not reactive. Why wait for complaints or even a crisis?
3) Leverage customer data to improve experiences. Contact centers fueled by insights activate a very different model for service and dramatically improve customer experience. Every one-star review can become a prioritized ticket to resolve. Every mean tweet becomes an opportunity to create an advocate.
4) Put AI at the heart of the contact center. AI that is dynamic and trained to learn and grow sits at the heart of a leading contact center. AI powers forward-thinking brands to proactively listen for relevant conversations, to distill and quickly analyze massive volumes of data and insights to engage with customers on the digital channels of their choice.

New Model: Less Service is Better Service

For today’s consumer, the best service is no service. Proactive listening and insights inform product development, marketing, and sales to help address common pain points and eliminate the need for service at all.

The second-best service is findable, self-service help or virtual agents. Trust me, your customer does not want to call you. AI can provide answers to common issues.

When a customer needs an agent’s support, a brand is ready with its third-best option. Agents need a system that captures and preserves the context from any previous interaction — and makes that context readily available so they can move forward with the best resolution.

By taking advantage of new technology trends in the right way, contact centers of the future can shift from being cost centers to revenue drivers.

Partner Spotlight
How Companies Can Defend Against Business Email Compromise

Gopan Sivasankaran,
META General Manager, Secureworks

In 2022, across our emergency incident response engagements, we observed a significant rise in business email compromise (BEC) attacks, making it a preferred tactic for financially motivated cybercriminals.

Partner Spotlight
How Companies Can Defend Against Business Email Compromise

Gopan Sivasankaran,
META General Manager, Secureworks


In 2022, across our emergency incident response engagements, we observed a significant rise in business email compromise (BEC) attacks, making it a preferred tactic for financially motivated cybercriminals.

Hackers are opportunistic and often financially motivated, looking to make the most profit from the least effort. And tools like BEC allow cybercriminals to target multiple organizations and individuals simultaneously.

Understanding business email compromise

Our incident response engagements have identified two common methods used to steal money with BEC tactics: email chain injection and C-level fraud.

In email chain injection, the threat actor intercepts a payment-related email chain, impersonates the compromised account owner, and requests changes to payment information.

Meanwhile, C-level fraud involves the compromise of an executive’s email account, with the threat actor posing as the executive to instruct finance or accounting staff to transfer funds to a specified bank account, often creating a sense of urgency.

Business email compromise attacks often start with phishing emails that trick recipients into visiting fake login pages, enabling threat actors to steal their credentials. As such, it’s crucial that organizations look at what controls they need to have in place to help protect employees from inadvertently responding to these threats.

Security controls against BEC

From a technical standpoint, there are controls that organizations can implement to make it harder for employees to access these malicious websites.

One effective measure is using a web filter that blocks known malicious sites, newly created sites, and those without reputation scores. Running alongside this, tools in mail security solutions can defang or redirect phishing emails that contain malicious hyperlinks embedded within them.

Multifactor authentication (MFA) is highly effective in limiting the ability of threat actors to misuse credentials that do get compromised. MFA safeguards against credential-based attacks on network perimeters, such as remote desktop protocol and virtual private networks.

Another approach is geo-blocking, which restricts logins from countries where users are typically not located. Disabling legacy authentication methods, such as IMAP and POP, further reduces the risk of unauthorized access.

Of course, cybercriminals also try to get around MFA controls. Our incident responders have observed an emerging tactic known as “MFA bombing,” where threat actors use a series of MFA prompts to manipulate targeted users into granting access.

To counter this, organizations can require manual entry of MFA codes, completion of numeric challenge-response prompts, and provide additional informative prompts, such as displaying a map indicating the origin of the request.

Educating users to verify the request’s origin and location further enhances the organization’s security posture. By implementing these measures, businesses can strengthen their defense against business email compromise attacks and safeguard their sensitive information.

Working for a secure business culture

From a human perspective there are techniques and business processes that can be rolled out to mitigate user-related security risks. Security training is crucial in educating employees about the risks of BEC and how it impacts the organization.

Employees should be able to identify the warning signs of BEC attacks, verify payment or account changes through trusted communication channels, and report suspicious behavior to the appropriate business units.

Organizational culture plays a fundamental role in security. Employees should be encouraged to challenge non-standard requests (e.g., payment and account changes).

Adopting a “trust but verify” mindset towards emails, chat messages, or phone calls where even slight deviations from normal operations can raise red flags and protect the organization from falling victim to BEC attacks.

Employees should feel safe to question and report concerns — as well as mistakes. It’s better for an employee to rapidly and fully report that they may have fallen victim to one of these scams early, so that action may be taken to prevent fraud, rather than hide it and hope for the best.

By implementing controls such as the “two-person” rule, where a second employee reviews and verifies payment modifications, and requiring telephonic/in-person verification of requested changes, organizations can detect and prevent BEC attempts. These controls have proven effective in preventing substantial financial losses in real-world incidents.

Building security into the business

Ultimately, to mitigate the risks posed by BEC attacks, organizations need to raise awareness and build security into their business processes.

The motivation for threat actors to continue launching BEC attacks has never been greater than it is now. Organizations must recognize that email security controls alone are not completely effective at mitigating threats.

Threat actors will target every process that requires trust.

In the fight against BEC attacks, having solid technical controls in place will support employees, who are ultimately the organization's last line of defense. Equipping them with the necessary training, resources, and support is paramount to enhancing their ability to detect and thwart such attacks effectively.

Partner Spotlight
Navigating the Cybersecurity Landscape in the Middle East

Rasheed Alodah,
Managing Director (KSA, South UAE, Bahrain & Levant) and Services Director (MEA), TrendMicro

The Middle East and Africa region has experienced a remarkable digital revolution, wholeheartedly adopting technology at an impressive scale. While this advancement has undoubtedly boosted connections and productivity, it has also left the region more exposed to risks, resulting in a notable surge in cyberattacks.

Partner Spotlight
Navigating the Cybersecurity Landscape in the Middle East

Rasheed Alodah,
Managing Director (KSA, South UAE, Bahrain & Levant) and Services Director (MEA), TrendMicro


The Middle East and Africa region has experienced a remarkable digital revolution, wholeheartedly adopting technology at an impressive scale. While this advancement has undoubtedly boosted connections and productivity, it has also left the region more exposed to risks, resulting in a notable surge in cyberattacks.

Highlighting the severity of the situation, Trend Micro's annual cybersecurity report for 2022 uncovered a staggering 870 million cyberattacks that were identified and thwarted across the Middle East and Africa during that year alone. This alarming statistic underscores the urgent need for organizations to take proactive defensive measures and incorporate multi-layered cybersecurity solutions to shield their digital infrastructure.

Irrespective of size, businesses must now view cybersecurity as an integral part of their growth strategy. Approaching security strategically isn't merely a choice; it's a necessity. This is a mandate that will undoubtedly strengthen a company's defenses. By doing so, enterprises can confidently navigate the uncertainties of the ever-evolving business landscape, ensuring a secure and resilient future.

Partner Spotlight
Empowering the Future: Unleashing Business Potential with Data Intelligence Automation

Michael Halas,
Managing Partner, MAGNOOS Information Systems

As we gear up for the IDC Saudi Arabia CIO Summit 2023, our excitement is palpable. This gathering of industry thought leaders and tech enthusiasts provides the perfect avenue to exchange insights, delve into the latest trends, and forge connections that drive progress.

Partner Spotlight
Empowering the Future: Unleashing Business Potential with Data Intelligence Automation

Michael Halas,
Managing Partner, MAGNOOS Information Systems


As we gear up for the IDC Saudi Arabia CIO Summit 2023, our excitement is palpable. This gathering of industry thought leaders and tech enthusiasts provides the perfect avenue to exchange insights, delve into the latest trends, and forge connections that drive progress.

We are particularly eager to explore the realm of data intelligence automation (DIA). This transformative technology has been at the forefront of our endeavors, revolutionizing how we approach data-driven decision making.

Through DIA, we have witnessed enhanced efficiency, insightful analytics, and streamlined operations. We are enthusiastic about sharing our insights, experiences, and success stories.

The countdown has begun, and we cannot wait to be a part of the transformative conversations that lie ahead.

Partner Spotlight
The Growing Importance of Business Continuity in Saudi Arabia

Nowaf Alaboudi,
Head of Cybersecurity, Cipher

In today's interconnected business ecosystem, the need to understand and implement the concept of business continuity (BC) has increased due to the ever-changing factors and events that affect it — whether economic, technical, natural, legislative, or any event that directly or indirectly affects the operation of the ecosystem.

Partner Spotlight
The Growing Importance of Business Continuity in Saudi Arabia

Nowaf Alaboudi,
Head of Cybersecurity, Cipher


In today's interconnected business ecosystem, the need to understand and implement the concept of business continuity (BC) has increased due to the ever-changing factors and events that affect it — whether economic, technical, natural, legislative, or any event that directly or indirectly affects the operation of the ecosystem.

Business continuity is the ability of an organization to continue to operate its critical functions in the event of a disruption. This can be caused by a natural disaster, a cyberattack, or any other event that prevents the organization from accessing its premises, employees, or equipment.

In Saudi Arabia, the need for BC is becoming increasingly important due to the country's rapid economic growth as part of Vision 2030 and the increasing number of threats that the ecosystem faces.

The Saudi Arabian government has recognized the importance of BC and has issued several guidelines and regulations to help organizations develop and implement BC plans. The most important of these guidelines is the Business Continuity Management Framework (BCMF) issued by the Saudi Arabian Monetary Authority (SAMA).

The BCMF sets out the requirements for a comprehensive BC program that covers all aspects of an organization's operations. Additionally, the Digital Government Authority (DGA) has issued the Business Continuity Management in Digital Government Standards to support the resilience of digital infrastructure in the Kingdom.

Partner Spotlight
Data & AI: A Deadly Couple Destined to Change Our Lives.

Gunal Kannan,
AVP, CTO Office, BMC Software

Learning from our history and not having to re-invent the wheel have been mantras that we as humans abide by to make our present better than the past. This has been taken to the literal sense with data and AI. With huge amounts of our history available in the form of digitized data, AI engines can ingest and "learn" faster than any human. This, when aided by technologies like generative AI, has led to the new explosion of what tech can produce.

Partner Spotlight
Data & AI: A Deadly Couple Destined to Change Our Lives.

Gunal Kannan,
AVP, CTO Office, BMC Software


Learning from our history and not having to re-invent the wheel have been mantras that we as humans abide by to make our present better than the past. This has been taken to the literal sense with data and AI. With huge amounts of our history available in the form of digitized data, AI engines can ingest and "learn" faster than any human. This, when aided by technologies like generative AI, has led to the new explosion of what tech can produce.

From poetry to stories, from artwork to movies, GenAI has shown how it can create new content from the vast amounts of data it has consumed. This deadly combination of leveraging huge amounts of data and deriving productive outcomes instantaneously is going to change the way humans work in any enterprise.

From productivity gains to faster coding, from problem identification to resolution insights, from contextual conversational chats to situation analysis, AI — when coupled with the right data — is going to change the way we operate.

Analyst Spotlight
Embracing Data and AI to Nurture Deeper Customer Connections

Uzair Mujtaba,
Senior Research Manager, IDC

In today's ever-changing business landscape, a new paradigm centered around customer experience has emerged as an ultimate differentiator. Against this rapidly evolving backdrop, Saudi organizations are increasingly turning to data and AI as transformative tools with the potential to reshape customer intimacy. As anticipation builds for the upcoming IDC Saudi Arabia CIO Summit 2023, let's take a look at some recent IDC research insights that illustrate how data and AI are seamlessly coming together to take customer experience to new heights.

Analyst Spotlight
Embracing Data and AI to Nurture Deeper Customer Connections

Uzair Mujtaba,
Senior Research Manager, IDC


In today's ever-changing business landscape, a new paradigm centered around customer experience has emerged as an ultimate differentiator. Against this rapidly evolving backdrop, Saudi organizations are increasingly turning to data and AI as transformative tools with the potential to reshape customer intimacy. As anticipation builds for the upcoming IDC Saudi Arabia CIO Summit 2023, let's take a look at some recent IDC research insights that illustrate how data and AI are seamlessly coming together to take customer experience to new heights.

At the heart of this transformation lies the convergence of artificial intelligence and the quest for enriched customer experiences. This convergence is not merely an option, it's a shared vision. According to IDC's research, 46% of Saudi CIOs recognize the need to enhance their customer experience as a driving force behind their investments in AI. This recognition underlines AI's pivotal role in understanding, engaging with, and ultimately delighting customers.

However, as is often the case with transformative journeys, the path forward contains numerous challenges. In a landscape where the demand for personalized, context-rich interactions is increasing, organizations find themselves grappling with the scarcity of reliable and trusted data. A staggering 50% of the surveyed CIOs acknowledge the difficulties they face in accessing accurate and dependable data — a challenge that has the potential to hinder the creation of meaningful and impactful customer engagements. Adding complexity to the equation, visibility around data lineage emerges as another hurdle, with 67% of CIOs acknowledging a limited understanding of their data's journey.

Recognizing the ongoing transformation of the consumer landscape, businesses are acutely aware of the necessity to improve client experiences at speed and scale. With businesses racing to incorporate AI-driven strategies, an impressive 41% of CIOs have expressed their intent to channel investments into critical areas such as augmented customer service agents over the next 12 to 18 months. This intensified focus underscores the urgency of embracing a dynamic approach to customer engagement, infused with empathy and intimacy and powered by AI.

While the intent to adopt AI is clear, the road ahead is marked by obstacles that demand strategic navigation. Around 50% of Saudi organizations encounter diverse challenges, spanning from the scarcity of high-quality data and skilled personnel to the intricate task of selecting the most fitting algorithms and managing the costs associated with AI solutions. The complexity of these challenges also highlights the need for comprehensive solutions that align resources and strategies with delivering the appropriate outcomes and experiences to customers.

In a world where data is both a valuable asset and a potential liability, regulatory challenges loom large, impeding the seamless fusion of data and AI into customer experience strategies. The intersection of cybersecurity regulations, uncertain lines of data ownership, and stringent data privacy requirements create intricate roadblocks. As a result, nearly half of the CIOs in Saudi Arabia revealed that the collective impact of these factors inhibits their efforts to leverage the potential of data and AI in crafting elevated customer experiences.

As Saudi organizations set out on the transformative journey of customer experience enhancement, key overarching themes shared across their AI investment strategies are emerging. Drawing from the insights uncovered through IDC's research, three key priorities appear:

• Foundational Data Infrastructure: 32% of the surveyed CIOs identified the establishment of a robust data infrastructure as the cornerstone of CX transformation. This infrastructure enables the capabilities required for authentic and impactful customer interactions.
• Technology and Software Solutions: 28% of the surveyed CIOs are committed to investing in CX technologies, software solutions, and platform development. These investments will lay the groundwork for innovation, fostering agility in customer engagement.
• Professional Services and Integration: Recognizing the intricacies of operationalizing CX transformation, a considerable 24% of CIOs in the Kingdom are also prioritizing strategic partnerships with professional services and integration experts to ensure seamless alignment of technology, business operations, and solution implementation.

As we prepare to gather at the IDC Saudi Arabia CIO Summit 2023, these insights are an essential reminder of the immense potential of data and AI in elevating customer experiences. The customer intimacy narrative is evolving profoundly, guided by insights that unveil challenges and opportunities within Saudi Arabia's unique landscape. By strategically integrating data, AI, and customer-centric approaches, Saudi organizations can position themselves as pioneers in crafting a future that is driven by customer intimacy and where every customer interaction deepens the connection.

Partner Spotlight
Leveraging Data & AI for ESG

Arindam Sengupta,
Head of Technology Advisory, RSM Saudi Arabia

Business environments across the globe are being compelled to take responsible and committed steps towards achieving environmental, social, and governance (ESG) goals.

Partner Spotlight
Leveraging Data & AI for ESG

Arindam Sengupta,
Head of Technology Advisory, RSM Saudi Arabia


Business environments across the globe are being compelled to take responsible and committed steps towards achieving environmental, social, and governance (ESG) goals.

Myths surrounding ESG definitions are getting bust. Both risks and opportunities are getting unlocked. ESG is getting embedded into the basic business framework. Hence it needs to be measurable and auditable.

This necessitates the need to build a sustainability data management system (SDMS), which becomes the single source of ESG truth. This SDMS should integrate with both legacy systems like ERP, plant automation systems, etc. as a "backward linkage".

Going forward, it should also integrate with the latest AI/ML and blockchain-based ESG tech solutions as a “forward linkage” to create a comprehensive and intelligent platform, churning out actionable insights for the C-suite.

The system needs to be flexible and scalable to adapt to industry and geographic regulatory standards, which globally are in a stage of rapid evolution.

Partner Spotlight
How Hackers Use Emojisto Infect Your Devices

Karthik Ananda Rao,
Chief Technical Head, ManageEngine

Emojis are now the widely understood language of our digital world. These tiny icons that add color and life to our messages are designed to enhance online interactions by letting us express emotions and thoughts in an easy way. But hackers are seeing them as an opportunity to infect devices and exploit our personal data.

Partner Spotlight
How Hackers Use Emojisto Infect Your Devices

Karthik Ananda Rao,
Chief Technical Head, ManageEngine


Emojis are now the widely understood language of our digital world. These tiny icons that add color and life to our messages are designed to enhance online interactions by letting us express emotions and thoughts in an easy way. But hackers are seeing them as an opportunity to infect devices and exploit our personal data.

Here are some of the ways hackers can hijack your devices using emojis:

1. Emoji spoofing
Hackers can trick users into clicking on an emoji which will redirect them to malicious websites or initiate unwanted downloads. This technique capitalizes on the modest popularity of emoji domain names and a user’s inclination to click without thinking twice. You might fall prey to an emoji spoofing attack if you don’t question the reliability or authenticity of a website or link.

How to avoid
Every time you click on an emoji domain, irrespective of the medium, make sure the sender is someone you know or the source is trustworthy. An emoji domain is easy to spoof due to the number of visually similar emojis and skin tone modification options, so take care when entering an emoji URL. Be patient as you evaluate links of any kind to avoid making a hasty and regrettable decision.

2. Social engineering using emojis
Hackers have figured out how to use the emotional appeal of emojis as an effective tool for social engineering. By leveraging familiar emojis in messages or on social media, cybercriminals can create a sense of trust and familiarity, convincing users to share sensitive information or click on malicious links.

How to avoid
Do not trust anything or anybody on the internet. Flashy emojis or clickbait might tempt you, but if an offer or message sounds too good to be true, it likely is. Software should never be downloaded or installed from a source you don’t fully trust. Further, you should never execute a program that is supplied to you in an email from someone you don’t know, and never open an attachment. For brownie points, ensure your machine has an installed and activated Trojan antivirus program.

3. Malicious emojis
Emojis can be used to conceal malicious code or links. Hackers can generate seemingly normal emojis that, when clicked or interacted with, can result in malware downloads, phishing assaults, or unauthorized access to personal information by altering the unicode representation or employing invisible characters. Third-party emoji keyboards have long been known to be vectors of malware, as was the case with this popular Android keyboard app that blindsided users with purchases made by hidden code.

How to avoid
Carefully vet emoji keyboards and ensure they come from a trusted developer before installing. Use antivirus software and ensure your browser is up to date, which will be a critical line of defense if you come across unsafe apps or websites with malicious emojis.

The use of emojis as a tool for infecting devices highlights the ever-evolving tactics employed by hackers in their quest for unauthorized access and data theft. This ostensibly innocent method of communication can be used to hide dangerous code and trick unwary users, and it is crucial for people and organizations to stay alert and knowledgeable about the hazards that can lurk behind these simple icons. You can lessen the potential harm of digital traps by maintaining awareness of the dangers linked with emojis and implementing best practices for online security, such as keeping software updated and exercising caution when dealing with unknown messages or links. When it comes to staying safe from hackers, continued learning and conscious internet behavior can make all the difference.

Partner Spotlight
The Unspoken Rules of Cloud Transformation: What to Do and Not

Sriram Narasimhan,
Associate Vice President, Solutions, Cloud4C

Shadi Shidvash,
Partner Alliance Director, Intel

Cloud transformation is imperative for businesses in the modern era; digital evolution journeys will fail to attain requisite outcomes if mission-critical systems such as ERP, HRMS, and CRM run on legacy infrastructure and platforms. However, to maximize the true value of the cloud, leaders must know what needs to be done before, during, and post cloud migration.

Partner Spotlight
The Unspoken Rules of Cloud Transformation: What to Do and Not

Sriram Narasimhan,
Associate Vice President, Solutions, Cloud4C


Shadi Shidvash,
Partner Alliance Director, Intel


Cloud transformation is imperative for businesses in the modern era; digital evolution journeys will fail to attain requisite outcomes if mission-critical systems such as ERP, HRMS, and CRM run on legacy infrastructure and platforms. However, to maximize the true value of the cloud, leaders must know what needs to be done before, during, and post cloud migration.

Join the Cloud4C and Intel session to explore how to sidestep common mistakes and seize opportunities, as we navigate strategies to improve cost efficiency, modernize assets, automate key processes, and accelerate innovations on cloud. Decode the best approaches to risk-proofed hybrid and multi-cloud adoption, tuning cutting-edge technologies such as AI/ML, analytics, RPA, and FinOps to your business's advantage.

Making the cloud your growth engine isn't as tough as you think if you know the rules and risks of the game, upfront.

CXO Spotlight
Harnessing Innovation: The Transformative Power of Tech in Transportation

Mohammed AlGhannam,
General Supervisor for Information Technology & Digital Transformation, Ministry of Transport and Logistic Services

The transport sector is being reimagined through the lens of cutting-edge technologies, ushering in an era of greater efficiency, sustainability, and safety. This digital metamorphosis is reshaping how we move people, goods, and information.

CXO Spotlight
Harnessing Innovation: The Transformative Power of Tech in Transportation

Mohammed AlGhannam,
General Supervisor for Information Technology & Digital Transformation, Ministry of Transport and Logistic Services


The transport sector is being reimagined through the lens of cutting-edge technologies, ushering in an era of greater efficiency, sustainability, and safety. This digital metamorphosis is reshaping how we move people, goods, and information.

Artificial intelligence and machine learning are driving the development of autonomous vehicles, reducing reliance on human drivers, and minimizing accidents caused by human error. Blockchains are providing unparalleled transparency and security to logistics, making supply chains more resilient.

Electric vehicles, powered by increasingly efficient batteries, are reducing the carbon footprint of transportation, aligning the sector with global climate goals. At the same time, drones offer an alternative delivery method for hard-to-reach areas, improving accessibility and reducing delivery times.

Advancements in high-speed rail technology are shrinking geographical distances, boosting regional economies, and offering a less carbon-intensive alternative to air travel.

Meanwhile, data analytics is enhancing predictive maintenance, reducing downtime, and improving the lifespan of transport infrastructure.

This exciting convergence of technology and transportation is not only streamlining operations but also ensuring a cleaner, safer, and more connected world. The transport sector is poised at an exciting juncture, and these technological marvels are accelerating us toward a more sustainable and interconnected future.

Photo Gallery

Contact Us

Ronita Bhattacharjee

Vice President - Conferences, IDC Middle East, Africa, & Turkey

+971 4 391 2747

Tehseen Qazi

Sales Manager

+966 54 130 4189

About IDC

59 Years
1300 Analysts
110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,300 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.