Agenda - IDC IT Security Summit 2018 | Events | IDC CEMA

Session

Plenary Session

CISO Roundtable

08:30 – 09:00

Registration, Networking & Welcome Coffee & Tea

08:30 – 09:00

Registration, Networking & Welcome Coffee & Tea

09:00 – 09:10

Welcome Address

09:00 – 09:10

Welcome Address

09:10 – 09:40

Keynote: Security Metrics for the Digital Era

Megha Kumar
Research Director, Software, Middle East & Africa

The following presentation will provide an overview on the complexity of the security landscape in the region. It will cover the uptake of digital transformation and the rising security risks. It will cover the security metrics organizations need to consider as a part of the security strategy.

09:10 – 09:40

Keynote: Security Metrics for the Digital Era

Ranjit Rajan
Associate Vice President, Consulting, IDC Middle East, Africa & Turkey

The following presentation will provide an overview on the complexity of the security landscape in the region. It will cover the uptake of digital transformation and the rising security risks. It will cover the security metrics organizations need to consider as a part of the security strategy.

09:40 – 10:05

Securing Ever Growing And Complex Business Systems, For Tomorrow

Digital transformation leads to open ecosystems and a world where users engage with services, anytime and anywhere. It is crucial for organizations to have strong identity and access management solutions in place. This is not just about passwords but incorporating solutions such as multi-factor authentication coupled with biometrics. This session covers strategies for organizations to ensure strong and robust policy to cover credentials.

Session 1: Incorporating Data Encryption for Improved Security

10:05 – 10:30

Strategies to Meet Compliance Demands

The following session addresses how organizations can deal with new regulations such as GDPR or industry or local regulations

09:40 – 09:50

Partner Presentation

10:30 – 11:00

End User Presentation: Securing Smart Cities

09:50 – 10:00

Partner Presentation

11:00 – 11:20

Tea/Coffee Break

10:00 – 10:45

Panel Discussion

10:45 – 11:00

Tea/Coffee Break

10:59 – 12:05

Session 2: Integrated Security Strategy with Security Services
Chairperson: Ranjit Rajan, AVP Research, IDC

As complexity rises, organizations clearly need to stay ahead of threats by incorporating the use of security services. The sessions provides insights on how security services can help bridge the gaps in organizational security strategies.

11:00 – 11:10

Partner 1 presentation

11:10 – 11:20

Partner 2 presentation

11:20 – 12:05

Panel Discussion

12:04 – 13:10

Session 3: Trusted Transactions with Blockchain
Chairperson: Ranjit Rajan, AVP Research, IDC

This presentation can provide insights and guidance for new age security decision makers to build a robust security strategy.

12:05 – 12:15

Partner 1 presentation

12:15 – 12:25

Partner 2 presentation

12:25 – 13:10

Panel Discussion

13:10 – 13:55

Session 4: End User Panel Discussion: Strategies for New Age Security Decision Makers
Chairperson: Ranjit Rajan, AVP Research, IDC

13:55 – 14:00

Summary & Close

14:00 – 15:00

Lunch & Networking

Gold Track

Gold Track Session A:Strategies for New Age Cybercrime

Gold Track Session B: Protecting Your Crown Jewel- Data!

11:20 – 11:25

Raffle Draw from Raffle coupon A

11:20 – 11:25

Raffle Draw from Raffle coupon B

11:25 – 11:40

Gold Partner 1 presentation: Incorporating Data Encryption for Improved Security

As organizations increasingly utilize cloud and integrated networks, it will be critical to address data security by considering data encryption. If organizations fall victim to a breach, they are able to still mitigate the incident by having the proper data encryption solutions in place.

11:25 – 11:40

Gold Partner 3 presentation: Realities of Ransomware

The rise in ransomware, brings to the light the fact that despite security investments, many threats go undetected. Upon execution, these threats hold organizations at ransom. The following presentation provides guidance on how to detect ransomware and mitigate the incident.

11:40 – 12:05

Gold Partner 2 presentation: Trusted Transactions with Blockchain

Blockchains are distributed ledger technologies that allow for secure and trusted transactions. As new use cases arise organizations need to evaluate which use case with me be critical for them. This session looks what are blockchains, why they are needed and on-going challenges.

11:40 – 12:05

Gold Partner 4 presentation: Insider Risk – Achilles Heel of Security Strategies

Insider risk remains a great challenge within the threat landscape. This session highlights what factors end-user organizations should took into account when building an improved mitigation strategy for insider risks.

12:05 – 12:45

Panel Disscusion : New Age Security Strategies

12:05 – 12:45

Panel Disscusion :Best Practices for Data Security

12:45 – 12:50

Raffle Draw from meeting vouchers

12:50 – 13:30

Lunch & Networking

Silver Track

Silver Track Session A:Enterprise Mobility & Security

Silver Track Session B :Emerging Security Tactics

13:30 – 13:35

Raffle Draw from Raffle coupon A

13:30 – 13:35

Raffle Draw from Raffle coupon B

13:35 – 13:50

Silver Partner 1 presentation: Cloud Security

Cloud is increasingly becoming pervasive within organizations. The following session provides insights into how some entities are better securing their cloud strategies. It also outlines the best practices that need to be adopted with respect to cloud security.

13:35 – 13:50

Sliver Partner 3 presentation: Threat Intelligence

Cyber defense thus requires a holistic security approach that includes broader process and technology strategies. To be better prepared and to decrease the probability of targeted breaches, future and potential threats need to be considered as well. This session looks at how threat intelligence will help organizations identify ongoing security threats and take precautions against future dangers.

13:50 – 14:05

Silver Partner 2 presentation: Securing the Internet of Things

In a connected world, the number of devices and more importantly endpoints continue to grow. A successful IoT strategy needs to address security of the devices and the IoT network. IoT can be utilized for cyberattacks that can impact organizations and cities. This presentation covers best practices for proper operational security strategy

13:50 – 14:05

Sliver Partner 4 presentation: Building a Robust Organization with the Right Credentials

Digital transformation leads to open ecosystems and a world where users engage with services, anytime and anywhere. It is crucial for organizations to have strong identity and access management solutions in place. This is not just about passwords but incorporating solutions such as multi-factor authentication coupled with biometrics. This session covers strategies for organizations to ensure strong and robust policy to cover credentials.

14:05 – 14:45

Panel Disscusion: Building Out Security In Your Organizations.

The panel discussion allows the end users to talk about how they addressed security within one of their transformation projects.

14:05 – 14:45

Panel Disscusion: Critical Infrastructure Security

The panel discussion will provide insights as to how organizations can address critical infrastructure security. It can also provide depth as to how organizations can collaborate with national security agencies to create a secure environment.

14:45 – 14:50

Summary & Close

14:45 – 14:50

Summary & Close

14:50 – 14:55

Final Raffle Draw from feedback forms

14:50 – 14:55

Final Raffle Draw from Feedback Forms

Please note that the topics identified above are representative only. The conference agenda will be kept up to date.