Agenda - IDC IT Security Roadshow 2017 | Events | IDC CEMA

08:00 – 09:00

Registration, Networking & Welcome Tea / Coffee
First 100 Attendees will receive Virtual Reality Boxes

09:00 – 09:25

Building The New Security Roadmap

Megha Kumar
Research Director, Software, Middle East & Africa

Download the Presentation

Organizations are striving to execute digital transformation processes and bring innovation to the forefront. Organizations are further aiming to transform their processes, operations, and leadership to become digital enterprises. Specifically, companies are investing in 3rd Platform technologies and innovation accelerators to meet their targets within given timelines. However, organizations have to deal with the rapidly changing demands of their customers as well as a threat landscape that is getting increasingly complex. Organizations also have to contend with new vulnerabilities and technologies, meet customer demand for a seamless experience, and increasingly address issues relating to risk and trust.

The following keynote presentation will look at the trends impacting the security landscape in the region. It will also explore the issues that organizations will need to address in the digitally transformed era and outline what factors they need to consider in their security road maps for the future.

09:25 – 09:50

Securing The Future: CyberSecurity In The Age of Digital Transformation

Cedric Warde
Senior Manager Commercial, Du Telecom

Download the Presentation

09:50 – 10:15

Threats are evolving. A new approach to cyber security is required

Mazen Dohaji
Regional Director – Middle East, Turkey & Africa, LogRhythm

Download the Presentation

It is a simple concept: the earlier you detect and mitigate a threat, the less the ultimate cost to your business. By implementing an effective end-to-end threat management process that focuses on reducing detection and response times, businesses can be able to prevent high-impact security incidents such as major data breaches. This presentation will thus examine how this process — which is called Threat Lifecycle Management (TLM) — can help organizations improve the efficiency of their security operations. It will also highlight how TLM can by scaled appropriately and used to lower the TCO and maximize the ROI of the security technologies in place at an organization.

10:15 – 10:45

Tea / Coffee Break & Networking

10:45 – 11:05

Red Team Exercises

David Michaux
UAE’s ‘ethical hacker’ & Director, Whispering Bell

Download the Presentation

The presentation focuses on the fact that many companies here have spent millions of AED on buying products yet still have gaping holes in their security, Red Team exercises are designed to show these flaws through simulated ‘Ethical Hacking and Social Engineering exercises’

11:05 – 11:30

Building You Cloud Security Strategy

Tarek Abbas
Technical Director, Palo Alto Networks

Download the Presentation

Not too long ago, the core of the traditional data centers was on premises servers running all manner of apps. With the maturing of virtualization technology and the need to standardize infrastructure and be more agile/flexible, private clouds are widely adopted by customers. Almost as rapidly as private cloud adoption occurred, organizations are moving workloads to public cloud environments such as amazon or azure.

In this keynote, Tarek Abbas will look at the trends of both private and public cloud adoption impacting the security landscape and how Palo Alto Networks platform help in securing such deployments.

11:30 – 11:55

The Emerging Threat Landscape – A view on Global and Local Cyber Threats

Bayan Achkar
Security Consultant, Symantec MEA

Download the Presentation

11:55 – 12:15

Tea / Coffee Break & Networking

Track A - Crystal Ballroom A
Chaired by Megha Kumar, Regional Director Software, IDC Middle East, Africa, & Turkey, IDC

Track B- Crystal Ballroom B
Chaired by Saurabh Verma - Program Manager - IT Services, MEA and Turkey, IDC

12:15 – 12:20

Raffle Draw

12:15 – 12:20

Raffle Draw

12:20 – 12:40

Protecting the Human Point Against Rising Data Security Threats

Mr. Kamlesh Luhana
Sales Engineer, Forcepoint

Download the Presentation


12:20 – 12:40

It’s Time To Change the Way We Think About Cyber Security

Mahdi Naili
Senior Systems Engineer, Fortinet

Download the Presentation

It’s harder than ever to secure the enterprise network, confirmed by the continuing string of high profile data breaches. While being attacked and possibly breached is not going to change, what can change is how we perceive cyber security and how to defend your organization’s network. This session will focus on some of the key contributors to successful data breaches and what an enterprise can do to break the cycle of attack, breach and spend.

12:40 – 12:55

The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defence

Michael D’Arcy
Commercial Director, Darktrace

Download the Presentation

12:40 – 12:55

Next Generation endpoint Protection

Amer AlSharkawi
Sales Director – MEA & Turkey, DriveLock

Download the Presentation

12:55 – 13:10

Ransomware Exposed

Ram Narayanan
Channel Manager, GCC, Check Point

Download the Presentation

12:55 – 13:10

A people Centric Approach to Security 

Samer Hani
Sales Director- EEMEA, RES

Download the Presentation

13:10 – 13:25

End-Users Threats & Analytics

Ahmed Yehia Seleem
Regional Manager, Nexthink

Download the Presentation

13:10 – 13:15

Roadmap to 2017

Saurabh Verma
Senior Research Manager, IT Services, Middle East & Africa

Download the Presentation

13:25 – 13:30

Roadmap to 2017

Megha Kumar
Research Director, Software, Middle East & Africa

Download the Presentation

13:15 – 13:35

Raffle Draw (Win a couple stay at Sofitel Corniche)

13:30 – 13:35

Raffle Draw (Win a couple stay at Sofitel Corniche)

13:35 – 14:00

Networking & Raffle Draw in Exhibition Area
(Tweet & win, Meeting Voucher Raffle Draw)

14:00 – 15:00

Lunch in Crystal Ballroom A & B

Please note that the topics identified above are representative only. The conference agenda will be kept up to date.