Agenda - IDC IT Security Roadshow 2017 | Events | IDC CEMA

08:30 – 09:15

Registration, Networking & Welcome Coffee & Tea

09:15 – 09:20

Early Bird Raffle Draw

09:20 – 09:25

Welcome Note

Megha Kumar
Research Director, Software, Middle East & Africa

09:25 – 09:50

Building The New Security Roadmap

Megha Kumar
Research Director, Software, Middle East & Africa

Organizations are striving to execute digital transformation processes and bring innovation to the forefront. Organizations are further aiming to transform their processes, operations, and leadership to become digital enterprises. Specifically, companies are investing in 3rd Platform technologies and innovation accelerators to meet their targets within given timelines. However, organizations have to deal with the rapidly changing demands of their customers as well as a threat landscape that is getting increasingly complex. Organizations also have to contend with new vulnerabilities and technologies, meet customer demand for a seamless experience, and increasingly address issues relating to risk and trust.

The following keynote presentation will look at the trends impacting the security landscape in the region. It will also explore the issues that organizations will need to address in the digitally transformed era and outline what factors they need to consider in their security road maps for the future.

09:50 – 10:15

Building You Cloud Security Strategy

Waseem Halim
Senior Security Consultant - GULF, Palo Alto Networks

Not too long ago, the core of the traditional data centers was on premises servers running all manner of apps. With the maturing of virtualization technology and the need to standardize infrastructure and be more agile/flexible, private clouds are widely adopted by customers. Almost as rapidly as private cloud adoption occurred, organizations are moving workloads to public cloud environments such as amazon or azure.

In this keynote, Tarek Abbas will look at the trends of both private and public cloud adoption impacting the security landscape and how Palo Alto Networks platform help in securing such deployments.



10:15 – 10:35

Data Encryption: Can We Still Keep Secrets?

Edward Ganom
CISO- Commercial Bank in Qatar

10:35 – 11:30

Panel Discussion:Addressing the New Security Ecosystem

Shaju Bhaskaran
Chief Information Security Officer, Ahlibank

Shaik Abdulkhader
Chief Technology Security Officer, Vodafone

Krishnakumar Kottekkat
Head of IT Strategy & Governance, Aspire Zone Foundation

Samir Pawaskar
Head - Cyber Security Policy & Standards, Cyber Security Division, Ministry of Information & Communications Technology, Qatar

This panel discussion will examine how organizations are addressing the new set of security channels and dynamics associated with the drive for digital transformation. The panel will provide valuable insights into the practices and protocols they have incorporated within their own organizations.

11:30 – 11:45

Tea & Coffee break in the Expo Area

Ballroom 1
Track Session A
Session Chairperson: Saurabh Verma, Program Manager - IT Services, Middle East, Africa & Turkey - IDC

Ballroom 2
Track Session B
Session Chairperson: Megha Kumar, Research Director, Software, Middle East & Africa - IDC

12:00 – 12:05

Raffle Draw

12:00 – 12:05

Raffle Draw

12:05 – 12:25

Protecting the Human Point Against Rising Data Security Threats

Mr. Elias Samarani
Sales Engineer, Forcepoint

12:05 – 12:25

It’s Time To Change the Way We Think About Cyber Security

Jai Prakash
Systems Engineer for Middle East - Fortinet, Fortinet

It’s harder than ever to secure the enterprise network, confirmed by the continuing string of high profile data breaches. While being attacked and possibly breached is not going to change, what can change is how we perceive cyber security and how to defend your organization’s network. This session will focus on some of the key contributors to successful data breaches and what an enterprise can do to break the cycle of attack, breach and spend.

12:25 – 12:40

The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defence

Michael D’Arcy
Commercial Director, Darktrace

12:25 – 12:40

DNS Security – The Lost Conversation

Wissam Saadeddine
Regional Sales Manager, Infoblox Middle East

As you know, while our digital age has opened new paths to prosperity, it has also created a cybercrime landscape that threatens the success of all who embrace it.

Newer, more advanced, and more dynamic attack vectors are introduced every single day. Several high-profile data breaches have been in the news recently and we read that millions of customer records are stolen, emails hacked, and sensitive information leaked. Most enterprises have multiple defense mechanisms and security technologies in place, such as next-generation firewalls, intrusion detection systems (IDSs), and intrusion-prevention systems (IPSs). Yet somehow malicious actors find a way to appropriate data. Hackers can use multiple pathways to steal data, but the one that is often unknowingly left open is DNS, or the Domain Name System. DNS is increasingly being used for data exfiltration, either by malware-infected devices or by rogue employees. The nature of the DNS protocol, which was invented more than 30 years ago, is such that it is trusted, yet vulnerable to hackers and malicious insiders. During this presentation, we will discuss how Infoblox can help you use core network services to:

• Prevent Data Exfiltration via Secure DNS

• Detect sophisticated cyberattacks that affect and use internal/external DNS

• Integrate with your security ecosystem to reduce the cyber kill-chain


12:40 – 12:55

Ransomware Exposed

Muazzam Qazi
Qatari Territory Account Manager, Check Point Software Technologies

12:40 – 12:55

One Platform

Rami Al-Ajrami
Regional Director MENA - SOTI Inc., Soti

12:55 – 13:15

Panel Discussion: Threat Intelligence

Syed Peer
IT Manager, Qatar Fertilizer Company (QAFCO)

Cybersecurity is one of the top IT topics due to the continuous hacks, data thefts, and high profile breaches taking place. Cyber defense thus requires a holistic security approach that includes broader process and technology strategies. To be better prepared and to decrease the probability of targeted breaches, future and potential threats need to be considered as well. This session looks at how threat intelligence will help organizations identify ongoing security threats and take precautions against future dangers.
12:55 – 13:00

Roadmap to 2017

Megha Kumar
Research Director, Software, Middle East & Africa

13:15 – 13:20

Roadmap to 2017

Saurabh Verma
Senior Research Manager, IT Services, Middle East & Africa

13:00 – 13:10

Raffle Draw

13:20 – 13:30

Raffle Draw

13:30 – 14:45

Lunch in the Sridan Restaurant

Please note that the topics identified above are representative only. The conference agenda will be kept up to date.