Agenda - IDC IT Security and Datacenter Transformation Roadshow 2013 | Events | IDC CEMA

08:30 – 09:30

Registration & Welcome Coffee

09:30 – 09:35

Welcome address IDC Romania

Laurentiu Popescu
Country Manager, IDC Romania

09:35 – 10:00

IDC Keynote Presentation: Next Generation IT Security - Securing the 4 Forces of IT

Thomas Vavra
Associate Vice President, Software, IDC CEMA

Download the Presentation

In his presentation Mr. Vavra will discuss the 4 forces currently shaping the IT world: Mobility, Big Data, Cloud and Social. Vavra will also discuss how each force presents its own set of challenges and implications for IT security as well as potential strategies and things to consider when addressing them.
10:00 – 10:25

How Is Cyber-War Impacting Your Corporate Security

Stefan Tanase
Senior Security Researcher, Kaspersky Lab

Download the Presentation

Cyber criminals were the only ones, up until recently, who were creating malware. They were, are and will be in the malware game just for the money. But malware nowadays is not created just by cybercriminals. Nation states around the world started using trojans, viruses and worms since as early as 5 years ago.
Stuxnet, Flame or Red October are just some of the cyber espionage and cyber sabotage toolkits which were discovered. It is just the tip of the iceberg, as with each discovery, security researchers are amazed by how complex these tools are getting and to what lengths the attackers are willing to go to get the information that they want.
Find out why the innovations from cyber-weapons are so dangerous, who are the collateral victims of this war and most importantly how exactly is cyber-war impacting the security of your organization.

10:25 – 10:50

End to end with no End in sight

Serban Zirnovan
Business Development Manager, Central Emerging Europe, DELL

Download the Presentation

More than three years ago, we made a decision to become the leading end-to-end solutions provider for customers around the world - empowering IT organizations to achieve their full potential by delivering IT solutions that create competitive advantage. Dell is a very different company today than it was a few years ago. Please join us in a journey about consumerization of IT, cloud approach as well as software and security solutions.
10:50 – 11:20

Coffee Break

11:20 – 11:45

Conventional information security measures, including anti-virus and next-generation firewalls, aren't enough to protect your organization from today's deluge of sophisticated web threats

Miroslav Bajgar
Sales Engineer, Websense

Download the Presentation

The global threat landscape has significantly changed over the last twelve months; during this session we will discuss this landscape and primary issues that social media, mobility and the increasingly sophisticated inbound and outbound threats organisations need to address. Whilst, web and email remain the primary intrusion vectors with the primary goal to steal data, we will end this session by identifying the methods employed to do so.

11:45 – 12:10

A Connected World in Transformation. Energy Efficiency, or how the cost of Energy could be reduced.

Eduard Bodor
Data Center Business Development Manager for Central Europe, APC by Schneider Electric

Download the Presentation

12:10 – 12:35

The Cybercrime Game: Why Aren’t We Winning?

Gabriella Apergi
Senior Sales Manager, Unisystems SRL

John Hopkins
Director of Global Channel Sales, Sensage

Download the Presentation

We are losing the cybercrime game. There is no shortage of data that supports that fact. The 2012 Verizon Data Breach Report provided the most alarming of all statistics: 92% of data breaches that were discovered by a third-party. This highlights that enterprises are not prepared to detect attacks they face each day. What’s worse is threats are now being engineered to be slow and stealthy. In fact, that same report showed that, in 85% of the cases, the breach took more than two weeks to discover[1]. Yet, 97% of breaches that took place in 2011 were avoidable with just “basic or intermediate” controls.
Why aren’t more organizations able to get to the basics? Find out in this session led by John Hopkins from Sensage |KEYW. You will learn:

  • Why security teams are getting buried under security technologies and processes
  • How to turn security event data in to powerful security intelligence
  • Why context-aware security management will improve alerts, policies and investigations
  • What Sensage delivers to the most proactive security practitioners around the world
12:35 – 12:50

Lowering Data Center TCO through the strategic application of storage

Remus Dosa
Territory Sales Representative - Balkans Region, Seagate

Storage accounts for >50% of the total compute cost in a Data Center. Seagate can help you lower TCO through the strategic application of storage. We have the portfolio of products, the technologies and technical expertise to help you implement a smart solution in your Data Center.

12:50 – 13:05

A new take on Mobile Data Security and the optimization of Server Infrastructure

Gabriel Gidea
Business Development Manager Romania and Bulgaria, Kingston

Download the Presentation

13:05 – 13:25

Questions & Answers

13:25 – 14:15

Networking Lunch

14:15 – 14:35

VIP Speaker presentation - Data Breach Notification - a legal obligation

Bogdan Manolea
Director executiv, Asociatia pentru Tehnologie si Internet - ApTI

Download the Presentation

14:35 – 14:55

D-Link – Connect to more. Integrated Networking Business Solutions

Mihai Marcu
Country Sales Manager, D-Link

Download the Presentation

Mihai Marcu will present information about D-Link future-proof network solutions for companies and end users. An expansive portfolio of cloud-ready solutions and a personal cloud concept are tailored for digital home, and advanced D-Link business solutions are addressing SME segment, Service providers and SMB in Romania.
Mihai Marcu will underline also that D-Link is the only networking vendor offering a complete solution, which includes routers, access points, professional IP cameras, storage devices,  Smart Switches, Wireless Controllers and performant unified wireless routers for enhanced security .

14:55 – 15:15

Secure Your Enterprise. Data is the New Perimeter.

Mark Fitchett
Global Channel Director, TITUS

Download the Presentation

Despite our best efforts to stop information leakage/loss, organizations are still plagued by this problem. With firewalls, gateways and DLP solutions at the organization’s perimeter why do these leaks continue? Perhaps you are protecting the wrong perimeter? Let TITUS explain how Data is the New Perimeter and how TITUS can help you stop these leaks.

15:15 – 15:45

Panel Discussions

15:45 – 16:00

Raffle Draw & End of conference