Agenda - IDC IT Security 2017 Roadshow | Events | IDC CEMA

08:30 – 09:20

Welcome Tea/Coffee & Networking

09:20 – 09:30

Welcome Address

Andries Lombaard
Country Manager, IDC South Africa

09:30 – 10:00

Building The New Security Roadmap

Jonathan Tullett
Research Manager, IT Services

Organizations are striving to execute digital transformation processes and bring innovation to the forefront. Organizations are further aiming to transform their processes, operations, and leadership to become digital enterprises. Specifically, companies are investing in 3rd Platform technologies and innovation accelerators to meet their targets within given timelines. However, organizations have to deal with the rapidly changing demands of their customers as well as a threat landscape that is getting increasingly complex. Organizations also have to contend with new vulnerabilities and technologies, meet customer demand for a seamless experience, and increasingly address issues relating to risk and trust.

The following keynote presentation will look at the trends impacting the security landscape in the region. It will also explore the issues that organizations will need to address in the digitally transformed era and outline what factors they need to consider in their security road maps for the future.

10:00 – 10:30

The Convergence of Information and Operational Security

Organizations across sectors in the region are increasingly deploying devices in order to achieve new efficiencies with the Internet of Things (IoT). The IoT ecosystem is not just limited to sensors, but includes autonomous cars, wearables, and connected consumer devices as well. This brings in a new set of challenges in terms of securing such devices and the data generated by them. This session looks at how organizations can address informational and operational security more holistically.

10:30 – 11:00

Collaboration of Security and Risk: Why Business and IT Need to be Aligned

For the longest time, there has been a disconnect between business and IT. However, this situation is changing as the need to improve ROI and optimize cost has prompted IT departments to align their projects with business goals. In this presentation, discussions will revolve around why companies need to consider their risk portfolios and ensure that security is well aligned in order to protect their operations without impeding progress.

11:00 – 11:30

How not to be a victim of Ransomware?

Cybercrime remains a financially motivated activity and an increasing number of organizations are becoming victims of ransomware. This bring about a number of issues ranging from the complexity of attacks to resolution and accountability problems. The following session will look at how ransomware is impacting organizations and provide guidelines on how businesses can build their mitigation plans.

11:30 – 12:00

Mid Morning Tea/Coffee Break and Networking

12:00 – 12:25

Managing Security Complexity

Organizations need to adopt strategies to better manage their security posture. Indeed, with multiple devices, policies, users, and optimized budgets, security is getting increasingly complex. This session looks at the factors taken into account by organizations attempting to improve their overall security.

12:25 – 12:50

Threat Intelligence

Cybersecurity is one of the top IT topics due to the continuous hacks, data thefts, and high profile breaches taking place. Cyber defense thus requires a holistic security approach that includes broader process and technology strategies. To be better prepared and to decrease the probability of targeted breaches, future and potential threats need to be considered as well. This session looks at how threat intelligence will help organizations identify ongoing security threats and take precautions against future dangers.

 

12:50 – 13:10

DNS Security – The Lost Conversation

Rene Bosman
Manager, Infoblox

 

·        As you know, while our digital age has opened new paths to prosperity, it has also created a cybercrime landscape that threatens the success of all who embrace it.
Newer, more advanced, and more dynamic attack vectors are introduced every single day. Several high-profile data breaches have been in the news recently and we read that millions of customer records are stolen, emails hacked, and sensitive information leaked. Most enterprises have multiple defense mechanisms and security technologies in place, such as next-generation firewalls, intrusion detection systems (IDSs), and intrusion-prevention systems (IPSs). Yet somehow malicious actors find a way to appropriate data. Hackers can use multiple pathways to steal data, but the one that is often unknowingly left open is DNS, or the Domain Name System. DNS is increasingly being used for data exfiltration, either by malware-infected devices or by rogue employees. The nature of the DNS protocol, which was invented more than 30 years ago, is such that it is trusted, yet vulnerable to hackers and malicious insiders. During this presentation, we will discuss how Infoblox can help you use core network services to:

• Prevent Data Exfiltration via Secure DNS

• Detect sophisticated cyberattacks that affect and use internal/external DNS

• Integrate with your security ecosystem to reduce the cyber kill-chain

 

13:10 – 13:30

Identity: Organization new currency?

In a digitally transformed world, organizations need to comprehend the extended network that includes devices, solutions, and users that are outside their purview. Identities will be critical in ensuring that interactions are legitimate and systems are accessed by legitimate parties. This presentation will highlight how critical identity solutions are in mitigating risks and security concerns.

13:30 – 14:00

Panel Discussion: Addressing the New Security Ecosystem

This panel discussion will examine how organizations are addressing the new set of security channels and dynamics associated with the drive for digital transformation. The panel will provide valuable insights into the practices and protocols they have incorporated within their own organizations, offering answers to the following questions:

  • What new technologies have you recently deployed and how are you securing them?
  • What challenges are organizations in your industry facing when it comes to security and digital transformation?
  • What security-related aspects do organizations typically fail to address from a people, process, and technology perspective?
  • If people are the weakest link, what issues continue to cause the biggest challenge when it comes to security and users?
  • How are you addressing security as your organization moves into an increasingly connected world?

 

14:00 – 14:15

Roadmap for 2017

Jonathan Tullett
Research Manager, IT Services

14:15 – 14:20

Summary & Close

14:20 – 14:25

Raffle Draw

14:25 – 15:25

Lunch & Networking

Please note that the topics identified above are representative only. The conference agenda will be kept up to date.