Agenda - IDC IT Security Roadshow 2017 | Events | IDC CEMA

08:00 – 08:50

Registrations, Networking & Welcome Tea & Coffee

08:50 – 09:00

Early Bird Raffle

09:00 – 09:05

Welcome Address

Megha Kumar
Senior Research Manager, Software, IDC Middle East, Africa, & Turkey

09:05 – 09:45

Presentation by Government Affiliate

09:45 – 10:15

Building The New Security Roadmap

Megha Kumar
Senior Research Manager, Software, IDC Middle East, Africa, & Turkey

Organizations are striving to execute digital transformation processes and bring innovation to the forefront. Organizations are further aiming to transform their processes, operations, and leadership to become digital enterprises. Specifically, companies are investing in 3rd Platform technologies and innovation accelerators to meet their targets within given timelines. However, organizations have to deal with the rapidly changing demands of their customers as well as a threat landscape that is getting increasingly complex. Organizations also have to contend with new vulnerabilities and technologies, meet customer demand for a seamless experience, and increasingly address issues relating to risk and trust.

10:15 – 10:45

The Convergence of Information and Operational Security

Organizations across sectors in the region are increasingly deploying devices in order to achieve new efficiencies with the Internet of Things (IoT). The IoT ecosystem is not just limited to sensors, but includes autonomous cars, wearables, and connected consumer devices as well. This brings in a new set of challenges in terms of securing such devices and the data generated by them. This session looks at how organizations can address informational and operational security more holistically.

10:45 – 11:15

Collaboration of Security and Risk: Why Business and IT Need to be Aligned

For the longest time, there has been a disconnect between business and IT. However, this situation is changing as the need to improve ROI and optimize cost has prompted IT departments to align their projects with business goals. In this presentation, discussions will revolve around why companies need to consider their risk portfolios and ensure that security is well aligned in order to protect their operations without impeding progress.

11:15 – 11:40
11:40 – 12:00

How not to be a victim of Ransomware?

Cybercrime remains a financially motivated activity and an increasing number of organizations are becoming victims of ransomware. This bring about a number of issues ranging from the complexity of attacks to resolution and accountability problems. The following session will look at how ransomware is impacting organizations and provide guidelines on how businesses can build their mitigation plans.


12:00 – 12:20

Threat Intelligence

Cybersecurity is one of the top IT topics due to the continuous hacks, data thefts, and high profile breaches taking place. Cyber defense thus requires a holistic security approach that includes broader process and technology strategies. To be better prepared and to decrease the probability of targeted breaches, future and potential threats need to be considered as well. This session looks at how threat intelligence will help organizations identify ongoing security threats and take precautions against future dangers.

12:20 – 12:35

Identity: Organization new currency?

In a digitally transformed world, organizations need to comprehend the extended network that includes devices, solutions, and users that are outside their purview. Identities will be critical in ensuring that interactions are legitimate and systems are accessed by legitimate parties. This presentation will highlight how critical identity solutions are in mitigating risks and security concerns.

12:35 – 12:50

Managing Security Complexity

Organizations need to adopt strategies to better manage their security posture. Indeed, with multiple devices, policies, users, and optimized budgets, security is getting increasingly complex. This session looks at the factors taken into account by organizations attempting to improve their overall security.

12:50 – 13:45

Panel Discussion:Dealing with Insider Risk

Insider risk remains a great challenge within the threat landscape. This session highlights what factors end-user organizations should took into account when building an improved mitigation strategy for insider risks.

13:45 – 14:30

Lunch in the Expo Area

14:30 – 14:45

Cloud Security Strategies

Cloud is increasingly becoming pervasive within organizations. The following session provides insights into how some entities are better securing their cloud strategies. It also outlines the best practices that need to be adopted with respect to cloud security.

14:45 – 15:00

Predictive Security with Next Generation Firewalls

As organizations come under pressure to sustain security, they are increasingly coming under pressure to sustain performance and business continuity. In the region, threat management remains a priority but increasingly organizations would like solutions that will allow them to better manage their security posture. With next-generation firewalls, organizations are able to secure their environment at a network level and application level while at the same time gaining visibility to their security posture. This following session looks at how organisations can utilize next-generation firewalls to be able to predict their risk posture and take proactive action

15:00 – 15:45

Panel Discussion: 2016 Security Experiences from the Trenches

15:45 – 16:00

Roadmap for 2017

16:00 – 16:15

Mega Raffle Draw

Please note that the topics identified above are representative only. The conference agenda will be kept up to date.