Agenda - IDC IT Security Roadshow 2012 | Events | IDC CEMA

08:30 – 09:00


09:00 – 09:15

Official Opening by Valery Borisov, Deputy Minister, Bulgarian Ministry of Transport, Information Technology and Communications

Valery Borissov
Deputy Minister, Ministry of Transport, Information Technology and Communications

09:15 – 09:45

Security and Business Strategy

Thomas Vavra
Research Director, Software, IDC CEMA

Download the Presentation

We are all aware that security infrastructures are becoming more complex and that threats continue to multiply. Changes to a rapidly evolving IT environment and landscape will only serve to multiply challenges. This presentation will take a look at what companies have done to date, and why traditional approaches to IT security will need to be rethought and strategies with them in order to prepare for the even greater challenges that lie ahead brought on by mobility, big data, among others.

09:45 – 10:25

Future Technology Trends in Global Business IT Risk Management

Dan Lohrmann
CTO, Michigan Department of Information Technology

Download the Presentation

Future Technology Trends in Global Business IT Risk Management in an Increasingly Complex Environment.

Enterprise Security Intelligence

10:25 – 10:50

Cyber-Ark Predicts: What’s Next on the Privileged Horizon

Ana-Maria Boldizsar
Regional Sales Manager SEE&Turkey, Cyber-Ark

Download the Presentation

Over the past year we’ve witnessed several spectacular attacks that demonstrated just how dangerous cyber criminals have become. These attacks have emphasized that a narrow focus on protecting against the insider threat is short-sighted and that more preventative approaches are needed to guard against external, highly targeted and persistent attacks that focus on high value information such as customer data and intellectual property. In taking stock of the threat landscape and emerging IT trends, we’ve summarized three key areas that we think will evolve significantly in the coming year, both in terms of technology innovation and risk.





10:50 – 11:15

Oracle – Security Inside Out

Des Powley
Director of Security Solutions and Security Business Development Leader for EMEA

Download the Presentation

An organization’s wealth is in its information, its intellectual property. Innovation drives organizations, technology fuels innovation and that innovation creates vulnerability. Cyber Security is just the latest threat vector to reach wider public awareness, but how and why is it different? Is it fuelling the change in the regulatory landscape by bringing data privacy and protection to the fore which in turn is creating new challenges for organizations.  Can we deal with this holistically  or do we need to take a pragmatic approach, i.e. protect what we can and do it now? Oracle’s Security Inside Out approach offers a different perspective on Cyber Security and the threat it poses to Governments and Business. While others view the threat from the outside in this presentation we will explore the need to understand the value of information and securing that from the inside out.

11:15 – 11:35

Coffee Break

11:35 – 12:05

Managing Security and Resilience- A Resilience Management Model overview

George Sharkov
Director, European Software Institute, Center Eastern Europe

Download the Presentation

The Resilience Management Model - RMM of CERT at Software Engineering Institute (SEI, Carnegie Mellon) serves as a foundation from which an organization can measure its current competency, set improvement targets, and establish plans and actions to close any identified gaps. As a result, the organization repositions and repurposes its security and business continuity activities and adopts a process improvement mindset that helps to keep services and assets productive in the long term.

12:05 – 12:30

Panel Discussion

12:30 – 12:55

Social networking and corporate security threats

Boris Goncharov
IT & Information Security Director, G4S Bulgaria

Download the Presentation

12:55 – 13:20

Securing The Ever-Expanding Enterprise Networks

Florian Malecki
Head of Product Marketing for EMEA, SonicWALL

Download the Presentation

The 'Bring Your Own Device' (BYOD) movement that is becoming increasingly common within the workplace has been fueled by the dramatic growth and adoption of mobile platforms such as Apple iOS and Google Android, which have become a critical component of business infrastructure. Also corporations, academic institutions, and government entities alike are embracing Web 2.0 and social networking to empower their workforce and increase their business agility. However, with all these benefits come a significant number of risks, as first-generation security solutions are failing to stop the invasion of new and sophisticated threats. With this in mind, this presentation will provide expert advice for IT security professionals on solving the challenge of rebuilding security into the network's DNA.

13:20 – 14:20


14:20 – 14:40

FBI Crack down on DNSChanger Malware

Zachary Delecki
Assistant Legal Attache, Legat Riga

Download the Presentation

14:40 – 14:55

D-Link Converged Ip Surveillance

Tony Lannon
IP Surveillance Business Development Manager, D-Link

Download the Presentation

14:55 – 15:10

Protection Solutions in a Virtual Environment

Ludmil Anatchkov
Head of Information Security and Networks, IS Directorate

Download the Presentation

15:10 – 15:15

Raffle Prize Draw

15:15 – 15:15

End of Conference

Please note that the topics identified above are representative only. The conference agenda will be kept up to date.