Agenda - IDC IT Security Roadshow 2017 | Events | IDC CEMA

08:30 – 08:50

Registrations, Networking & Welcome Tea & Coffee

08:50 – 09:00

Early Bird Raffle

09:00 – 09:05

Welcome Address

Hamad AlSaghir
Country Manager, IDC Saudi Arabia, IDC Saudi Arabia

09:05 – 09:45

Presentation by Government Affiliate

09:45 – 10:15

Building The New Security Roadmap

Hamza Naqshbandi
Principal Analyst, IT Services, Middle East & Africa

Organizations are striving to execute digital transformation processes and bring innovation to the forefront. Organizations are further aiming to transform their processes, operations, and leadership to become digital enterprises. Specifically, companies are investing in 3rd Platform technologies and innovation accelerators to meet their targets within given timelines. However, organizations have to deal with the rapidly changing demands of their customers as well as a threat landscape that is getting increasingly complex. Organizations also have to contend with new vulnerabilities and technologies, meet customer demand for a seamless experience, and increasingly address issues relating to risk and trust.

The following keynote presentation will look at the trends impacting the security landscape in the region. It will also explore the issues that organizations will need to address in the digitally transformed era and outline what factors they need to consider in their security road maps for the future.

 

10:15 – 10:35

Presentation by ITC

10:35 – 10:50

Security as an Enabler to Digital Transformation

Hadi Jaafarawi
Managing Director - Qualys Middle East, Qualys Middle East FZE

How do we regain the insight in our environments? We have lost much insight in how our IT operations and security is operated and more importantly how it is performing. With the relentless move to cloud platforms, being a private or public one, or perhaps even a hybrid, we stand to lose even more visibility and control in our day 2 day and strategic operations. What do enterprises need to do to regain control? How have Qualys customers taken on this challenge? In this presentation we aim to help you see a path forward, and roads into the near and distant future of your IT infra and asset management.

10:50 – 11:10

Tea & Coffee Break

11:10 – 11:30

Cyber Attacks – Understanding the Mind of the Hacker

Dr. Abdulrahman Alghamdi
CIO, Shaqra University

The internet has become an essential part of everyday life; people use the internet to shop online, pay bills, plan finances, find jobs, work from home, promote business, and reach out to people. However, people and organizations have become more vulnerable to cyberthreats due the ever-expanding use of the internet. To protect and secure information or data, people now must think like a hacker — they must try to find out what an attacker would do as well as the means the attacker would utilize. This presentation will thus highlight the importance in understanding how and why a hacker could infiltrate a system. By learning more about the methods attackers use, individuals will be able to resolve security issues preemptively and more effectively.
11:30 – 11:45

Presentation by Kingston

Hani Suwwan
Business Development Manager, Kingston Technology

 

11:45 – 12:00

Presentation by MobileIron

12:00 – 12:15

Nexthink Presentation

12:15 – 12:30

Panel Discussion: Addressing the New Security Ecosystem

Rasha M Abu AlSaud
CISO,The National Commercial Bank

Dr. Abdulrahman Alghamdi
CIO, Shaqra University

This panel discussion will examine how organizations are addressing the new set of security channels and dynamics associated with the drive for digital transformation. The panel will provide valuable insights into the practices and protocols they have incorporated within their own organizations, offering answers to the following questions

12:30 – 13:00

Get Security Serious before it Gets you Down

Dr. Adnan Mustafa AlBar
CIO, General Authority of Meteorology and Environment Protection
Vice Chairman, Jeddah Municipality

13:00 – 14:00

Lunch

Please note that the topics identified above are representative only. The conference agenda will be kept up to date.