Agenda - Critical C-Suite Security Strategy | Events | IDC CEMA

08:30 – 09:00

Welcome Tea & Coffee

09:00 – 09:05

Welcome Address

Megha Kumar
Research Director, Software, Middle East & Africa

09:05 – 09:30

The Evolution of the CISO

Megha Kumar
Research Director, Software, Middle East & Africa

Download the Presentation

Security is the most critical element for organizations in the Digital Economy. The resilience of the Digital Economy is heavily reliant on ensuring seamless access to systems and information. The role of the security decision maker is evolving and encompasses aspects such as risk and governance. This presentation looks at security complexity and the evolving role of "security" decision makers, their engagement with the board and how they can play a proactive role in digital transformation.

09:30 – 10:15 Session 1: Using Intelligence Proactive Security Strategies
Session Chairperson: Megha Kumar, Research Director, Software, Middle East & Africa - IDC

They say you are as weak as your weakest link. Within many organizations, internal risks tend to create more cause for concern with regards to security robustness. Getting insights into network activities and threat intelligence can help improve response times and build a more proactive security strategies. The following session looks, at how organizations can leverage internal and external insights of both the landscape and customers to be more dynamic and responsive.

09:30 – 09:45

Protecting the Human Point Against Rising Data Security Threats

Ozgur Danisman
Head of Security Consultants, Forcepoint

Download the Presentation

09:45 – 10:15

Panel Discussion: Addressing Insider Risk
Session Chairperson: Megha Kumar, Research Director, Software, Middle East & Africa - IDC

Megha Kumar
Research Director, Software, Middle East & Africa

Ozgur Danisman
Head of Security Consultants, Forcepoint

Hariprasad Chede
Senior Manager Information Security, National Bank Of Fujairah

Saqib Chaudhry
CISO, Cleveland Clinic (Abu Dhabi)

Gordon Stewart
CIO, GEMS Education

This panel discussion will focus on how organizations can minimize the impact of insider risk. It will look at the strategies being adopted by peers in the industry on how they address employee awareness and the controls that they have put in place. It will also look at how data is being leveraged
10:15 – 10:40

Tea & Coffee Break

CISO Presentation

10:40 – 11:00

Understanding the Rise of Cyberthreats

Harpal Singh
Head of IT Risk & BCM - Emirates NBD

This presentation will take a look at general cybersecurity threats and examine the appropriate measures that can be taken to mitigate them.

11:00 – 11:45 Session 2: Building an Integrated Cloud Security Strategy
Session Chairperson: Ranjit Rajan, AVP Research, Middle East, Africa & Turkey - IDC

The Digital economy requires agile and responsive organization that will need to utilize solutions such as cloud to provision infrastructure and applications. Organizations can utilize cloud to provision access to security solutions while ensuring they have secure cloud environment. It also brings to light the need for advanced data governance and concern around privacy. The ideal cloud security strategy brings into play a hybrid security model and ensure overall compliance. This session will address aspects that decision makers need to keep in mind for a secure cloud deployment.

11:00 – 11:15

Adaptive Security from the Device to the Datacenter

Deepak Narain
Technical Director for the Middle East & North Africa, VMware Middle East

Download the Presentation

The cloud presents a unique opportunity to architect-in security, rather than bolt it on. Micro-segmentation opened the door—enabling us to see and control the infrastructure through the lens of the application. As workflows shift primarily to mobile and the Internet of Things explodes, adaptive security has unlocked the power to deliver workforce productivity and agility along with enterprise-grade security.
11:15 – 11:45

Panel Discussion: Cloud Governance
Session Chairperson: Ranjit Rajan, AVP Research, Middle East, Africa & Turkey - IDC

Ranjit Rajan
Associate Vice President, Consulting, IDC Middle East, Africa & Turkey

Deepak Narain
Technical Director for the Middle East & North Africa, VMware Middle East

Pillairkulam Parthasarathy
Snr. Vice President - Head Operational Risk, BCP, Technology Risk, Fraud Risk & CISO-First Gulf Bank

Walid Kamal
Senior Vice President for Technology Security, Risk, and Fraud - Du

This panel discussion take into how organizations can address cloud security with proper governance around cloud use. It will look at policies that will need to be put in place for a secure hybrid environment.

CISO Presentation

11:45 – 12:05

Security Culture Standards, Culture and Practices – An ISO 27001 perspective

Safdar Zaman
Head of IT Strategy & Governance-IT,Nakheel

Download the Presentation

12:05 – 12:45 Session 3: Building out the Trusted World of Things
Session Chairperson: Megha Kumar, Research Director, Software, Middle East & Africa - IDC

The Internet of Things is increasingly proliferating several sectors leading to benefits and new concerns around security and governance. Responses from IoT need to secure and trusted. It has been proven that these headless devices can be hacked and lead to major disasters. This session looks at how to build secure IoT ecosystem that looks at identity, data privacy and trust.

12:05 – 12:15

Presentation

12:15 – 12:45

Panel Discussion: Securing IoT within your organization

Roshan Daluwakgoda
Senior Director - Managed Services Design Operations, Du Telecom

Muhammad Irfan Bashir
Senior Specialist - Risk & Compliance Enterprise Security, Emirates Global Aluminium

IoT is not just limited to sensors, it takes into account all the devices ranging from clients devices, to phones, wearables and CCTV that are increasingly proliferating organizations. This will panel discussion will look the best practices adopted by organizations to address security.

CISO Presentation

12:45 – 13:05

Presentation by IDC Invited Speaker

13:05 – 13:10

Summary & Close

13:10 – 14:10

Lunch

Please note that the topics identified above are representative only. The conference agenda will be kept up to date.