Fahad I. Aljutaily is the Vice President of the Cyber Security Business Unit in STC Solutions, leading the Cyber Security Business and managing the Cyber Security portfolio/capabilities.
Fahad holds more than 14 years of ICT industry experience. In addition to his wide experience, Fahad is also an author for sets of articles in information security domains.
Prior to joining STC Solutions in 2017, Fahad was the lead for Cisco Advanced Services Business in Saudi Arabia; leading the AS business delivery for the enterprise market segment. Before foraying into business leadership, Fahad was working with Cisco Advanced Services as a Cyber Security Solutions Architect and Technical Lead.
Fahad’s area of expertise encompasses security architecture assessments, on-going deep optimization services, identity management, and applied confidentiality, integrity and availability for complex security solutions. Fahad worked in major and complex projects for customers in Saudi Arabia and in the Middle East region.
Fahad holds a Master in Science degree in Management of Information System from King Saud University, Riyadh and a Master of Business Administration degree from Dar Al Uloom University, Riyadh. He is also certified as a double CCIE (Security and Routing & Switching), CISSP, CEH, TOGAF and ITIL.
Fahad is currently Consultant Member of King Saudi University Advisory Board, Consultant Member of Princess Nourah bint Abdulrahman University Industrial Advisory Board and he was a consultant Member of the MBA program for Dar Aluloom University. Recently, Fahad has received the Scientific Excellence Award from His Royal Highness, Prince Faisal Bin Bandar Al Saud, Governor of Riyadh.
Speech Topic & Synopses
The challenges of cybersecurity are ever increasing in sophistication and frequency.
A pain point that almost every organization faces is over utilization of their valuable cybersecurity team and resources on repetitive activities and attacks.
With the advent of Cybersecurity Orchestration; an organization can now elevate the use of their cybersecurity team to more complex issues by defining playbooks for various scenarios and use cases and automate the response with cybersecurity orchestration technology.