Agenda - IDC IT Security and Datacenters Transformation Roadshow 2012 | Events | IDC CEMA

08:15 – 09:00

Registration and Welcome Coffee

09:00 – 09:05

IDC Adriatics - Welcome Address

Boris Žitnik
IDC Adriatics Managing Director

09:05 – 09:30

IT Security Strategy in an Increasingly Complex Environment

Mark Child
Senior Research Analyst, Software & Enterprise Solutions, IDC CEMA

Download the Presentation

We are all aware that security infrastructures are becoming more complex and that threats continue to multiply. Changes to a rapidly evolving IT environment and landscape will only serve to multiply challenges. This presentation will take a look at what companies have done to date, and why traditional approaches to IT security will need to be rethought and strategies with them in order to prepare for the even greater challenges that lie ahead brought on by mobility, big data, among others.

09:30 – 10:00

Security methods and approaches in Cloud

Nenad Marjanović
PMP, HP

Download the Presentation

IaaS and SaaS? Are there any differences in the approach to security? Different models of delivery and cloud providers have a different perspective of security that users want or look for. The presentation is intended for a short overview of the methods that access the services of security in the cloud that HP suggests in their cloud deployments. Follow up us through the security perspective IaaS and SaaS services and their differences, and have access or be trained in security aspects of Cloud.

10:00 – 10:25

Secure Business Activity in Cloud – Time-saving by virtualization

Nikola Prib
ICT Business Solutions Sector, T-HT

Download the Presentation

Today, when we live fast and when we have feeling that 24-hour day is too short, and years go by as months, it is necessary to devise ways to reconcile the desired speed of business solutions with the need for security. Time is money and time, and there is even less time to implement your solution. We want to stay in the race with the challenges and reach the finish line as a winners, we need to think about new ways to simplify business processes. The resources we use to secure the business activity must be accessible at any time and from any location, wherever we are. We have no time to be concerned about manner of realization of ideas, and a multitude of applications, hardware and technical requirements is necessary to provide users on the most simple way. They are unified under the same name Cloud business solution and they are delivered in a short period of time. Croatian Telecom provides customers with time needed for attention during the primary activities of the users themselves, and thereby takes into account all safety requirements to be met.

10:25 – 10:50

ICT Security and Compliance SaaS solution for Enterprises

Marek Skalický
Regional Account Manager for Central & Adriatic Eastern Europe, Qualys

Download the Presentation

Automation of ICT Security Management and ICT Security Compliance processes became essential part of companies strategy how to successfully deal with current dynamic evolution of APT (Advanced Persistent Threats), Malware and Hacker attacks. Latest examples of data-breaches and web sites compromises has shown that manual penetration testing and manual configuration audits together with traffic filtering, DLP, IDS/IPS protection are not sufficient unless we solve the core of ICT risk problem: existing vulnerabilities and misconfigurations on OS, DB and Application layers. Automated ICT Security and Compliance solution covering public and private clouds, virtualization and Enterprise-wide scalability will be presented including some customer case-study examples.

10:50 – 11:15

Building Security strategy with 3D security

Daniel Šafář
Country Manager CZR, Check Point Software Technologies, Check Point

Download the Presentation

Enterprise in vulnerable world. How to effectively define a security strategy with the concept of 3D from Check Point.

11:15 – 11:35

Coffee Break

11:35 – 12:00

Datacenter Future: next 10 years of expectations and capabilities

Ratko Mutavdžić
National Technology Officer, Microsoft Hrvatska

Download the Presentation

12:00 – 12:25

APC Presentation

Nino Kovačić
Data Center Solution Architect / APC service support, KING ICT

Download the Presentation

12:25 – 12:50

FORTINET – The Power to Control

Adrian Danciu
Major Accounts Manager Romania & Balkans, Fortinet

Download the Presentation

With the current budget cuts in any organization, companies have to make hard choices on how to be more secured, without spending more. They are under pressure to open up more of their data to employees, customers, partners, and vendors; at the same time they are expected to reduce the potential of unauthorized access to the sensitive data and back end systems. The presentation shows how Fortinet's complete network security solutions can address all of those challenges.

12:50 – 13:15

Overview of Check Point solutions for the data centre security

Franjo Rebac
Network and Information Security Consultant, S&T Croatia

Download the Presentation

Challenges of the complex security infrastructure: Due to an increasing number of different security threats, company security infrastructure is becoming more and more complex. Each and every security threat brings about a new security solution, new hardware, a new vendor and demands more human resources, at the same time reducing visibility and insight into the current state of situation. As an answer to such challenges Check Point solutions offer consolidation of a complex security infrastructure into a unified, modular and scalable solution, ensuring high availability, simple manageability and forensics with lowered costs. Examples of the consolidation of security infrastructure.

 

13:15 – 13:25

Conference Raffle

13:25 – 14:30

Lunch