IDC IT Security Roadshow 2008

This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.

READ MORE COOKIE SETTINGS

IDC IT Security Roadshow 2008

Securing Your Business: Technology Meets People

Warsaw, March 20, 2008

Agenda

Time Event Speakers
08:30

Registration and welcome coffee

09:00

Welcome speech

09:05

IDC Keynote Presentation: Changes in Information Security and the Implications for CISOs

Thomas Vavra
Research Director, Software, CEMA Region, IDC CEMA
The nature of IT security threats is evolving rapidly, as is the role security plays in the organization. No longer regarded as an isolated solution area, security must be understood as something more than merely "protecting the perimeter." In this presentation, IDC explores the changing relationships between security and other aspects of the enterprise, while outlining recommendations for security practitioners trying to cope with these changes.
09:35

Computing ‘Environment’: It’s more than Binary Code – It’s About Criminals!!

Edward P. Gibson
Chief Security Adviser , Microsoft Ltd, United Kingdom
Despite the mutating threats of cyber attacks, online extortion, or spam, a well-structured information security strategy can safeguard your business and ensure that risks are managed with commitment and understanding. It can also help to reassure your customers, who in the UK (for example) according to a recent study now fear internet crime more than burglary, mugging or car theft. Yet, because the internet is not territorial or jurisdictionally bound, organized crime efforts to steal everything you hold dear by extortion, threats, intimidation – not in the bricks and mortar world but in the online world, our normal responses to ‘attack’ are not as effective. But there are solutions . . . and sometimes they are free. Ed Gibson will give you a peek inside his 'cyber life' utilizing anecdotes from his 20 year career with the FBI including the most recent 5 years when he was assigned as a Diplomat to the US Embassy London in charge of all the FBI's cyber investigations in the UK, and the reasons he was asked by Microsoft to be its Chief Security Advisor in the UK.
10:00

7 Habits for Highly Effective Implementation of Strong Authentication

Shlomi Yanai
VP eToken, Aladdin
Increasingly, organizations are adopting strong authentication solutions to meet their security requirements. How successful are these implementations and what actions lead to the best results? How does authentication integrate with the overall identity management and IT strategy? Get insight and customer-focused approaches in this session based on actual strong authentication deployments.
10:25

Coffee break

10:45

New Generation of Data Leak and Threat Security Protection

Filip Demianiuk
Technical Account and Channel Manager for Poland, Trendmicro
The majority of data leaks happen from within, either by accident or on purpose by valid users who have access to the data within a corporate network. A company's greatest asset – its employees – can also be its greatest security liability. The new interactive endpoint alerts of Trend Micro LeakProof 3.0 enable IT managers to define content-sensitive dialog boxes that appear directly on an employee's computer screen. These alert boxes educate employees on the appropriate handling of confidential information, raise awareness of security issues and enlist their support in preventing data from “walking out of the door”. The presentation will also show you that LeakProof aligns with the move to mobile working by providing full data loss protection outside the corporate network.
11:10

Guest Keynote Presentation: Enigma – the world’s most infamous code

Simon Singh
Writer, journalist, TV producer, simon singh.net
Simon Singh, author of The Code Book, will discuss how the Enigma code transformed the history of codes. He will also explain how Allied codebreakers revealed Enigma's weaknesses and changed the course of the Second World War. He will be bringing a genuine Enigma cipher machine, so this will be a rare opportunity to see a fully functioning Enigma cipher machine. Dr. Singh will demonstrate and explain how the machine operates. He will also discuss what lessons can be learned today from the mistakes made in the Second World War.
11:40

Managing Infrastructure Risks by Deploying a Vulnerability Management Solution

Marek Skalický
Managing Director for Central and Eastern Europe, Qualys

The IT infrastructure of modern enterprises must support business processes; enable fast and uncomplicated communication between departments, partners and customers; and be durable and safe at the same time. In addition, it must handle increasingly complex attacks and threats. Monitoring security and risk exposure within complex and heterogeneous IT infrastructures is difficult, due to the limitations of available tools. Often, the IT staff does not even know the exact number of systems in an enterprise network, or its vulnerabilities. The growing number of compliance requirements intensifies this problem by requiring regular reporting. This presentation highlights Best Practices and includes a case study in which these issues were solved with the implementation of an automated Vulnerability Management Process.

12:05

Coffee break

12:25

Securing Your Organization Against Web 2.0 Threats

Michael Rudrich
Director of Eastern Europe, Secure Computing
Web 2.0 has enabled organizations to increase employee efficiency and productivity, unfortunately, the technology behind Web 2.0 has become a target for cyber criminals. During this presentation Secure Computing will highlight the risks of using Web 2.0 applications and show why security technology in use today is becoming less effective against targeted attacks that leverage Web 2.0 technology.
12:50

Identity Management: strategies and solutions

Jerzy Suchodolski
Product Director Identity Management, ORACLE
13:15

Blended threats - effective remediation

Michał Ceklarz
Major Account Manager, Fortinet
A blended threat is a computer network attack that seeks to maximize the severity of damage and speed of contagion by combining methods, for example using characteristics of both viruses and worms, while also taking advantage of vulnerabilities in computers, networks, or other systems. During the presentation we will focus on those attacks and try to find a remediation.
13:40

Lunch

Lila Weneda Restaurant
14:30

(Parallel Sessions)

14:40

(Parallel Sessions)

15:05

(Parallel Sessions)

15:30

Coffee break

15:50

(Parallel Sessions)

16:15

(Parallel Sessions)

16:40

(Parallel Sessions)

17:00

17:05

IDC Happy Hour

Questionaries, Gifts & lotteries

Speakers

Thomas Vavra

Research Director, Software, CEMA Region, IDC CEMA

Edward P. Gibson

Chief Security Adviser , Microsoft Ltd, United Kingdom

Shlomi Yanai

VP eToken, Aladdin

Filip Demianiuk

Technical Account and Channel Manager for Poland, Trendmicro

Simon Singh

Writer, journalist, TV producer, simon singh.net

Marek Skalický

Managing Director for Central and Eastern Europe, Qualys

Michael Rudrich

Director of Eastern Europe, Secure Computing

Jerzy Suchodolski

Product Director Identity Management, ORACLE

Michał Ceklarz

Major Account Manager, Fortinet

Tomasz Sloniewski

Senior Analyst, IDC Poland

Partners

Platinum Partner(s)

Gold Partner(s)

Silver Partner(s)

Media Partner(s)

Partner(s)

Proceedings

To access the content, please enter the password you have received from IDC. If you do not have a password, please contact Katarzyna Maniszewska via email, at kmaniszewska@idc.com.

Photo Gallery

This event has no photogallery images.

Contacts

Katarzyna Maniszewska

Conference Manager

+48 22 548 40 72

About IDC

44 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.