Agenda - IDC IT Security Roadshow 2017 | Events | IDC CEMA

08:00 – 08:45

Registration, Networking & Welcome Coffee & Tea

08:45 – 08:50

Early Bird Raffle Draw

08:50 – 08:55

Welcome Address

Hamad AlSaghir
Country Manager, IDC Saudi Arabia, IDC Saudi Arabia

08:55 – 09:20

Building The New Security Roadmap

Hamza Naqshbandi
Principal Analyst, IT Services, Middle East & Africa

Download the Presentation

Organizations are striving to execute digital transformation processes and bring innovation to the forefront. Organizations are further aiming to transform their processes, operations, and leadership to become digital enterprises. Specifically, companies are investing in 3rd Platform technologies and innovation accelerators to meet their targets within given timelines. However, organizations have to deal with the rapidly changing demands of their customers as well as a threat landscape that is getting increasingly complex. Organizations also have to contend with new vulnerabilities and technologies, meet customer demand for a seamless experience, and increasingly address issues relating to risk and trust.

The following keynote presentation will look at the trends impacting the security landscape in the region. It will also explore the issues that organizations will need to address in the digitally transformed era and outline what factors they need to consider in their security road maps for the future.

09:20 – 09:45

Threats are evolving. A New Approach to Cyber Security is required.

Yasser Ali
KSA Country Manager, LogRythm

Download the Presentation

09:45 – 10:10

On Cloud Security and Identity SOC

Dragan Petkovic
META Security Leader, Oracle

10:10 – 10:35

The Emerging Threat Landscape – A view on Global and Local Cyber Threats

Jamil Abu Aqel
Technology Sales and ServicesManager, Symantec Corporation

Download the Presentation

10:45 – 11:15

Tea & Coffee Break

Session A

Session B

11:13 – 11:15

Raffle Draw

11:14 – 12:25

Track Session B: Securing the " New" Enterprise

Uzair Mujtaba
Senior Research Analyst, Software and IT Services

11:14 – 12:25

Track Session A: Defense Mechanisms : Staying One Step Ahead

Hamza Naqshbandi
Principal Analyst, IT Services, Middle East & Africa

11:14 – 11:15

Raffle Draw

11:15 – 11:35

Rise of Ransomware

Rani Hmayssi
Advanced Endpoint Solution Manager, Palo Alto Networks

Download the Presentation

11:15 – 11:35

Presentation by Ebttikar

Khalid Ahmed Al Shangiti
CEO, Ebittkar

Download the Presentation

11:35 – 11:55

It’s Time To Change the Way We Think About Cyber Security

Charbel Sarkis
Principal Systems Engineer, Fortinet

Download the Presentation

11:35 – 11:55

Securing the Modern Enterprise

Mohamed Helmy
ME Regional Manager, Mobileiron

Download the Presentation

11:55 – 12:15

Internet security, wireless and mobility solutions.

Bhawani Singh
Security Solution Architect at Checkmarx, Checkmarx

Download the Presentation

11:55 – 12:15

Anti DDoS- Presentation by ITC

12:15 – 12:15

Raffle Draw

12:15 – 12:15

Raffle Draw

12:15 – 12:35

Tea,Coffee break & Prayer Break

Session A

Session B

12:34 – 13:30

Track Session C: End to End Security - Putting the pieces together

Hamza Naqshbandi
Principal Analyst, IT Services, Middle East & Africa

12:34 – 13:30

Track Session D: How to win the battle over Malware ?

Uzair Mujtaba
Senior Research Analyst, Software and IT Services

12:35 – 12:40

Raffle Draw

12:35 – 12:40

Raffle Draw

12:40 – 12:55

Threat Intelligence

Abdirashid Samater
Information Security Advisor, Ministry of Justice

Download the Presentation

Most CEOs & CIOs say security is their top priority, and their security team are actively monitoring and analyzing threat intelligence to help detect risks and incidents, and yet organizations are still compromised. In this presentation I will try to shed a light some of the reasons why breach continues to happen, regardless of  how much we invest in security.

12:40 – 12:55

Privacy and security of patents’ information and health professionals security behavior

Prof. Ahmed I. Albarrak
Vice Rector, Planning, Quality and Development IT, Saudi Electronic University

High quality healthcare services can be achieved only by utilizing information technology. Information security is an ongoing challenge and security breaches emerging from user misbehavior are considered to be a devastating latent source of threats to patient data.  Most of healthcare professionals agree that the principle of password authentication is important, however their behavior in practice is completely inconsistent with this principle. This is clearly indicated by the fact that about majority of the interviewed staff have never changed their system generated passwords, more than half do not change their passwords after these have been released to unauthorized persons, one third share and communicate passwords with colleagues, and allow others to use their account credentials, and a good percentage do not log off applications after work sessions. The  information security practices of healthcare professionals may represent a potential threat to the security and privacy of patients. We call for raising the level of security awareness among nurses to reduce the security threats posed by user misbehavior

12:55 – 13:10

How a small USB drive can cause a lot of trouble and how Kingston can help you

Hani Suwwan
Business Development Manager, Kingston Technology

Download the Presentation

Employees carrying data out of the office on a USB drive increase the risk of these data being compromised, leaving a company open to hefty fines, recovery costs and a potential PR disaster. This presentation shows how to minimise the risks of moving data on USB drives by using hardware-based encryption and to comply with internal as well as legal requirements.

12:55 – 13:10

DNS Security – The Lost Conversation

Ammar Ibrahim
Country Manager, Infoblox KSA

Download the Presentation

13:10 – 13:25

Networks, workstations and data

Hakam Kayed
Sales Director MEA - APAC, Stormsheild

Download the Presentation

13:10 – 13:25

Anti-Phishing Solutions

Mazen Halawi
DIRECTOR – SALES, PhishMe

Download the Presentation

13:25 – 13:30

Raffle Draw

13:25 – 13:30

Raffle Draw

13:30 – 14:10

Lunch & Networking

14:15 – 15:00

Panel Discussion: Addressing the New Security Ecosystem

Abdul Manan Qureshi
Vice President and Head of Business Continuity, Riyadh Bank

Adeel Ashraf
Director ICT, Abunayyan Holding

Sultan Altukhaim
Head of Information Security - Capital Market Authority

This panel discussion will examine how organizations are addressing the new set of security channels and dynamics associated with the drive for digital transformation. The panel will provide valuable insights into the practices and protocols they have incorporated within their own organizations

15:00 – 15:20

Regaining Control of the Digital Enterprise - Countering the Digital Storm

Adeel Ashraf
Director ICT, Abunayyan Holding

Download the Presentation

Massive digital storms are being experienced within enterprises as disruptive technological innovations continue to affect business dynamics. On one hand, the continuous and rapid evolution of technology makes enterprises more competitive, but on the other hand technological progress creates fertile ground for cyberthreats of all kinds, especially considering that threats are always ahead of any possible mitigation plan. This presentation will examine the ongoing evolution of cyberthreats and highlight the strategies enterprises can use to mitigate attacks.
15:20 – 15:25

Roadmap 2017

Hamza Naqshbandi
Principal Analyst, IT Services, Middle East & Africa

15:25 – 15:30

Mega Raffle

Please note that the topics identified above are representative only. The conference agenda will be kept up to date.