Agenda - IDC IT Security Roadshow 2018 | Events | IDC CEMA

08:30 – 09:20

Registration & Welcome Tea / Coffee

09:20 – 09:25

Early Bird Raffle

09:25 – 09:30

Welcome Address

Andries Lombaard
Country Manager, IDC South Africa

09:30 – 10:00

Building The New Security Roadmap

Jonathan Tullett
Research Manager, IT Services

Organizations are striving to execute digital transformation processes and bring innovation to the forefront. Organizations are further aiming to transform their processes, operations, and leadership to become digital enterprises. Specifically, companies are investing in 3rd Platform technologies and innovation accelerators to meet their targets within given timelines. However, organizations have to deal with the rapidly changing demands of their customers as well as a threat landscape that is getting increasingly complex. Organizations also have to contend with new vulnerabilities and technologies, meet customer demand for a seamless experience, and increasingly address issues relating to risk and trust.

10:00 – 10:30

Security as an Enabler to Digital Transformation

How do we regain the insight in our environments? We have lost much insight in how our IT operations and security is operated and more importantly how it is performing. With the relentless move to cloud platforms, being a private or public one, or perhaps even a hybrid, we stand to lose even more visibility and control in our day 2 day and strategic operations. What do enterprises need to do to regain control? In this presentation we aim to help you see a path forward, and roads into the near and distant future of your IT infra and asset management.

 

10:30 – 11:00

Protection against the Unknown

11:00 – 11:30

Tea & Coffee Break

Security Tracks

Track A

Track B

11:30 – 11:35

Raffle Draw

11:30 – 11:35

Raffle Draw!

11:35 – 12:00

The Convergence of Information and Operational Security

Organizations across sectors in the region are increasingly deploying devices in order to achieve new efficiencies with the Internet of Things (IoT). The IoT ecosystem is not just limited to sensors, but includes autonomous cars, wearables, and connected consumer devices as well. This brings in a new set of challenges in terms of securing such devices and the data generated by them. This session looks at how organizations can address informational and operational security more holistically.

 

11:35 – 12:00

Dealing with Insider Risk

Insider risk remains a great challenge within the threat landscape. This session highlights what factors end-user organizations should took into account when building an improved mitigation strategy for insider risks.

12:00 – 12:25

Collaboration of Security and Risk: Why Business and IT Need to be Aligned

For the longest time, there has been a disconnect between business and IT. However, this situation is changing as the need to improve ROI and optimize cost has prompted IT departments to align their projects with business goals. In this presentation, discussions will revolve around why companies need to consider their risk portfolios and ensure that security is well aligned in order to protect their operations without impeding progress.

 

12:00 – 12:25

Identity: Organization new currency?

In a digitally transformed world, organizations need to comprehend the extended network that includes devices, solutions, and users that are outside their purview. Identities will be critical in ensuring that interactions are legitimate and systems are accessed by legitimate parties. This presentation will highlight how critical identity solutions are in mitigating risks and security concerns.

 

12:25 – 12:50

Threat Intelligence

Cybersecurity is one of the top IT topics due to the continuous hacks, data thefts, and high profile breaches taking place. Cyber defense thus requires a holistic security approach that includes broader process and technology strategies. To be better prepared and to decrease the probability of targeted breaches, future and potential threats need to be considered as well. This session looks at how threat intelligence will help organizations identify ongoing security threats and take precautions against future dangers.

 

12:25 – 12:50

Cloud Security Strategies

Cloud is increasingly becoming pervasive within organizations. The following session provides insights into how some entities are better securing their cloud strategies. It also outlines the best practices that need to be adopted with respect to cloud security.

 

12:50 – 13:20

Lunch & Networking

13:20 – 13:40

Managing Security Complexity

Organizations need to adopt strategies to better manage their security posture. Indeed, with multiple devices, policies, users, and optimized budgets, security is getting increasingly complex. This session looks at the factors taken into account by organizations attempting to improve their overall security.

 

13:40 – 14:00

Collaboration of Security and Risk: Why Business and IT Need to be Aligned

For the longest time, there has been a disconnect between business and IT. However, this situation is changing as the need to improve ROI and optimize cost has prompted IT departments to align their projects with business goals. In this presentation, discussions will revolve around why companies need to consider their risk portfolios and ensure that security is well aligned in order to protect their operations without impeding progress.

 

14:00 – 14:20

Roadmap for 2018

14:20 – 14:40

How not to be a victim of Ransomware?

Cybercrime remains a financially motivated activity and an increasing number of organizations are becoming victims of ransomware. This bring about a number of issues ranging from the complexity of attacks to resolution and accountability problems. The following session will look at how ransomware is impacting organizations and provide guidelines on how businesses can build their mitigation plans.

 

14:40 – 14:45

Final Raffle Draw

14:45 – 14:55

IDC Summary & Close

Please note that the topics identified above are representative only. The conference agenda will be kept up to date.