Black Hat Middle East & Africa (MEA) is the region’s premier cybersecurity event where expertise meets innovation. It is a dynamic gathering of over 45,000 cybersecurity leaders, technology providers, and decision-makers from around the world – designed to exchange insights, explore emerging solutions, and experience hands-on insights from the experts shaping the future of cybersecurity.
In partnership with Logix MEA, NextLabs is proud to support Black Hat MEA 2025. Together, we help organizations achieve end-to-end cybersecurity protection, leveraging Logix’s expertise across multiple vendors – including our solutions. NextLabs delivers a Zero Trust Data-Centric Security solution that protects structured and unstructured data throughout its lifecycle – at rest, in transit, and in use – keeping sensitive information secure across applications, files, repositories, and databases, whether on-premises or in the cloud.
NextLabs is Participating in Black Hat MEA
Date: December 2 – 4, 2025
Location: Hall 01 #H1. U40 in Riyadh Exhibition & Convention Center, Malham, Riyadh, Saudi Arabia
Visit our booth or fill out the form below to schedule a personalized session and explore how Zero Trust Data-Centric Security can protect your organization.
Meet with Us
Join Our Presentation on Zero Trust Data-Centric Security
Wednesday, December 3rd, 2025 at 12:00 PM
As data spreads across cloud environments, on-premises systems, and mobile devices, protecting it requires more than traditional perimeter-based approaches. Our session will introduce Zero Trust Data-Centric Security, a modern approach that places data at the center of security while enabling seamless access for authorized users, internal or external.
Key Aspects
- Dynamic policy enforcement: Data security policies are applied in real time at the moment of access, ensuring continuous protection across all environments.
- Comprehensive coverage: Protect data at rest, in transit, and in use – across applications, databases, and structured or unstructured data stores.
- Zero trust principles: Every access request is verified and granted on a least-privilege, need-to-know basis, whether inside or outside the corporate network.
- Seamless collaboration: Maintain consistent security policies even when sharing data with partners or external stakeholders.
Learn how to implement a Zero-Trust Data-Centric strategy to secure enterprise data throughout its lifecycle, anywhere and everywhere, without sacrificing accessibility or business agility.
-
CloudAz
Unified policy management platform with Dynamic Authorization Policy Engine.
-
SkyDRM
Persistent protection of critical files and documents stored and shared anywhere.
-
Application Enforcer
Secure applications, externalize entitlement, protect data, and simplify access management.
-
Data Access Enforcer (DAE)
Zero Code approach to secure access and protect critical data independent of application.
Network with Us
- Booth #H1.U40
AI systems need to be protected to prevent unauthorized access to data and models. Enforcing the principle of least-privileged access helps secure the data used by AI systems, their outputs, and the systems themselves.
Visit us at our booth (#H1.U40) and speak with one of our subject-matter experts to discover how NextLabs safeguards AI data by granting access only to authorized users and applications. With dynamic, data-centric protection powered by the NextLabs policy engines, enterprises can maintain strong security without compromising system performance-even when working with large datasets.
About Black Hat MEA
Black Hat MEA will bring together cybersecurity professionals, elite ethical hackers, solution providers, and industry decision-makers from across the global for an intensive three days of expert sessions, networking, and learning opportunities.
Event Highlights
- Attendees and Exhibitors: The event expects 45,000+ attendees and features over 450 exhibitors, making it the largest infosec exhibition in the region.
- Expert Speakers: There will be 330+ speakers, including global cybersecurity influencers, experts, and Black-Hat-authorized trainers.
- Content and Features: Attendees can access 250+ hours of specialized content, hands-on hacking stations, live demonstration, and participate in technical training.
Networking: The event condenses several months of networking into 3 days, offering abundant opportunities for direct interaction with peers and thought leaders in the industry.
Special Activities
- Capture The Flag (CTF): Black Hat hosts the world’s largest CTF Hackathon with over 1,000 participants come to compete in a three-day, jeopardy-style tournament designed to test and sharpen ethical hacking skills.
- Executive Summit: Senior executive and cybersecurity leaders unite to share practical insight into the technologies, skills and approaches for CISOs and senior leaders to strengthen organizations’ cybersecurity resilience.
- Business Hall & Arsenal: Researchers and the open-source community come together to present their latest open-source tools and products.
