Agenda - IDC IT Security Roadshow 2017 | Events | IDC CEMA

08:30 – 09:25

Registrations, Networking & Welcome Tea & Coffee

09:25 – 09:30

Early Bird Raffle Draw

09:30 – 09:35

Welcome Address

Hamad AlSaghir
Country Manager, IDC Saudi Arabia, IDC Saudi Arabia

09:35 – 10:00

Building The New Security Roadmap

Hamza Naqshbandi
Principal Analyst, IT Services, Middle East & Africa

Download the Presentation

Organizations are striving to execute digital transformation processes and bring innovation to the forefront. Organizations are further aiming to transform their processes, operations, and leadership to become digital enterprises. Specifically, companies are investing in 3rd Platform technologies and innovation accelerators to meet their targets within given timelines. However, organizations have to deal with the rapidly changing demands of their customers as well as a threat landscape that is getting increasingly complex. Organizations also have to contend with new vulnerabilities and technologies, meet customer demand for a seamless experience, and increasingly address issues relating to risk and trust.

The following keynote presentation will look at the trends impacting the security landscape in the region. It will also explore the issues that organizations will need to address in the digitally transformed era and outline what factors they need to consider in their security road maps for the future.


10:00 – 10:20

Cyber Attacks – Understanding the Mind of the Hacker

Dr. Abdulrahman Alghamdi
CIO, Shaqra University

Download the Presentation

The internet has become an essential part of everyday life; people use the internet to shop online, pay bills, plan finances, find jobs, work from home, promote business, and reach out to people. However, people and organizations have become more vulnerable to cyberthreats due the ever-expanding use of the internet. To protect and secure information or data, people now must think like a hacker — they must try to find out what an attacker would do as well as the means the attacker would utilize. This presentation will thus highlight the importance in understanding how and why a hacker could infiltrate a system. By learning more about the methods attackers use, individuals will be able to resolve security issues preemptively and more effectively.
10:20 – 10:30

Partner Felicitation

10:30 – 11:10

Tea / Coffee Break & Raffle Draw

11:10 – 11:50

Panel Discussion: Addressing the New Security Ecosystem

Rasha M Abu AlSaud
CISO,The National Commercial Bank

Dr. Abdulrahman Alghamdi
CIO, Shaqra University

This panel discussion will examine how organizations are addressing the new set of security channels and dynamics associated with the drive for digital transformation. The panel will provide valuable insights into the practices and protocols they have incorporated within their own organizations, offering answers to the following questions

11:50 – 12:05

Security as an Enabler to Digital Transformation

Hadi Jaafarawi
Managing Director - Qualys Middle East, Qualys Middle East FZE

Download the Presentation

How do we regain the insight in our environments? We have lost much insight in how our IT operations and security is operated and more importantly how it is performing. With the relentless move to cloud platforms, being a private or public one, or perhaps even a hybrid, we stand to lose even more visibility and control in our day 2 day and strategic operations. What do enterprises need to do to regain control? How have Qualys customers taken on this challenge? In this presentation we aim to help you see a path forward, and roads into the near and distant future of your IT infra and asset management.

12:05 – 12:20

How a Small USB Drive Can Cause a Lot of Trouble

Hani Suwwan
Business Development Manager, Kingston Technology

Download the Presentation

Employees carrying data out of the office on a USB drive increase the risk of these data being compromised, leaving a company open to hefty fines, recovery costs and a potential PR disaster. This presentation shows how to minimise the risks of moving data on USB drives by using hardware-based encryption and to comply with internal as well as legal requirements.

12:20 – 12:35

Securing the Modern Enterprise

Mohamed Helmy
ME Regional Manager, Mobileiron

Download the Presentation

Mobile operating systems such as Android, iOS, and Windows 10 address many old security issues but also create new and complex security requirements. In the traditional PC environment, security focused on restricting employees’ access to corporate resources and the actions they could take. Security meant users could do less. In the new world, the right security model means that employees can do more. The MobileIron platform was built to secure and manage modern operating systems in a world of mixed-use devices. With MobileIron, security means enabling business not restricting it.

12:35 – 12:50

End-Users Threats & Analytics

Abdulrehman Al Karariah
Technology Consultant, Nexthink

Download the Presentation

12:50 – 13:10

Get Security Serious before it Gets you Down

Dr. Adnan Mustafa Al-Bar
Vice President of Jeddah City Council
CIO of General Authority of Meteorology and Environmental Protection

Download the Presentation

13:10 – 13:20

Roadmap 2017

Hamza Naqshbandi
Principal Analyst, IT Services, Middle East & Africa

13:20 – 13:25

Mega Raffle: Treasure Hunt

13:25 – 14:25

Lunch & Networking

Please note that the topics identified above are representative only. The conference agenda will be kept up to date.