IDC IT Security Roadshow 2008

This site uses cookie including third parties cookies which helps us provide and improve our services. Find more on our Cookie Policy

READ MORE

IDC IT Security Roadshow 2008

Securing Your Business: Technology Meets People

Warsaw, March 20, 2008

Overview

IDC's IT Security Roadshow has become the seminal annual event for CIOs and IT managers looking for the latest information on IT security trends and wanting to meet IT security gurus and industry professionals.

The growing complexity of IT systems and their security has created multiple challenges for CIOs and IT managers across the CEMA region. They must address the explosion in the number of access points, communication technologies convergence, human behavior, company leaders still thinking in terms of antivirus software and firewalls, limited resources, and flat or even decreasing budgets. While basics remain essential, CIOs and IT security managers must also handle evolving authentication methods, well financed corporate espionage agents and cyberterrorists, as well as employee awareness.

IDC's sixth annual IT Security Roadshow will introduce you, among others,

Simon Singh
Writer, journalist, TV producer,
and author of the Code Book, the Science of Secrecy from Ancient Egypt to the Quantum Cryptography. His presentation title is: Enigma – the world’s most infamous code.

IDC’s IT Security Roadshow 2008 events help you pinpoint security solutions most appropriate to your organization. This year, we divide each event into two sessions:

  • Morning plenary sessions: These provide a foundation for addressing IT security through essential overviews of IT security trends, IT security market developments, and the implications of under-securing enterprises.
    Plenary Session I: Information Security, Business Trends, and Their Impact
    • Changes in Information Security and the Implications for CISOs
    • Computing ‘Environment’: It’s more than Binary Code – It’s About Criminals!
    • 7 Habits for Highly Effective Implementation of Strong Authentication
    • New Generation of Data Leak and Threat Security Protection
            Speakers:
    • Tom Vavra, Research Director, Software, IDC CEMA
    • Edward P. Gibson, Chief Security Adviser (CSA), Microsoft Ltd - UK
    • Shlomi Yanai, VP eToken, Aladdin
    • Filip Demianiuk, Technical Account and Channel Manager for Poland, TrendMicro

    Plenary Session II: New Developments in Enterprise Defense
    • Managing Infrastructure Risks by Deploying a Vulnerability Management Solution
    • Securing Your Organization Against Web 2.0 Threats
    • Identity Management: strategies and solutions
    • Outsourcing Security to Service Providers, On-demand Security Services
    • Blended threats - effective remediation
            Speakers:
    • Marek Skalicky, Technical Account Manager, Qualys
    • Michael Rudrich, Director Sales for Austria, Switzerland, and Eastern Europe, Secure Computing
    • Jerzy Suchodolski, Product Director Identity Management, Oracle CEE
    • Michał Ceklarz, Major Account Manager, Fortinet - Unified Threat Management Solutions
  • Afternoon break-out sessions: Two targeted sessions covering hot IT security topics allow attendees to get in-depth information on security topics most relevant to their organization.
                             

    SESSION III: Professional Development

    SESSION IV: Security Solutions

    • SABSA – the methodology of complex security management in the Organization
    • Hunting for CSOs
    • Social networking – a productivity threat only?
    • IT-Security – More than Technology
    • Managing IT convergence: Network Gateway, Content Security, Infrastructure - and Endpoint Security  
      Speakers:
    • Mirosław Ryba, Ernst & Young Business Advisory
    • Maciej Kołodziej, CSO, Security Department Director, Onet.pl SA & TVN SA Groups
    • Adam Haertle, IT Security Officer, UPC Poland
    • Uwe B.Kissmann, Regional Manager Security Business Line, CEEMEA IBM ISS
    • Dr. Klaus Gheri, CTO & Co-Founder, phion
    • Can mobile solutions be secure?
    • Securing and Managing Your Enterprise
    • An integrated security system based on Microsoft solutions, implemented in a fuel industry enterprise
    • Make sure the right data is secured in the proper way to prevent security incidents
    • External security audits — should we be afraid? 
      Speakers:
    • Tomasz Śnieżyński, IT Security Manager, Comarch SA
    • Marcin Madey, General Manager of the Novell Professional Services, Novell
    • Piotr Olszewski, Vice-chairman & consultant, ISCG Sp. z o.o.
    • Cezary Prokopowicz, Territory Manager, RSA CEE
    • Gerard Frankowski, Jakub Tomaszewski, Computer Systems and Security Analysts, Poznań Supercomputing and Networking Center

    Who Should Attend:

  • Chief Security Officers, Directors of Enterprise Security, CIOs, CTOs, CISOs
  • Privacy Officers, Network Security Managers, Server Application Managers
  • Antivirus, Email Monitoring, VPN, and 3A Managers

    Representatives from the following industries:
  • Banking, Financial Services
  • Transportation, Utilities, and Logistics
  • Telecommunications
  • Government and Public Administration
  • Manufacturing
  • Trade
  •  

Agenda

Time Event Speakers
08:30

Registration and welcome coffee

09:00

Welcome speech

09:05

IDC Keynote Presentation: Changes in Information Security and the Implications for CISOs

Thomas Vavra
Research Director, Software, CEMA Region, IDC CEMA
The nature of IT security threats is evolving rapidly, as is the role security plays in the organization. No longer regarded as an isolated solution area, security must be understood as something more than merely "protecting the perimeter." In this presentation, IDC explores the changing relationships between security and other aspects of the enterprise, while outlining recommendations for security practitioners trying to cope with these changes.
09:35

Computing ‘Environment’: It’s more than Binary Code – It’s About Criminals!!

Edward P. Gibson
Chief Security Adviser , Microsoft Ltd, United Kingdom
Despite the mutating threats of cyber attacks, online extortion, or spam, a well-structured information security strategy can safeguard your business and ensure that risks are managed with commitment and understanding. It can also help to reassure your customers, who in the UK (for example) according to a recent study now fear internet crime more than burglary, mugging or car theft. Yet, because the internet is not territorial or jurisdictionally bound, organized crime efforts to steal everything you hold dear by extortion, threats, intimidation – not in the bricks and mortar world but in the online world, our normal responses to ‘attack’ are not as effective. But there are solutions . . . and sometimes they are free. Ed Gibson will give you a peek inside his 'cyber life' utilizing anecdotes from his 20 year career with the FBI including the most recent 5 years when he was assigned as a Diplomat to the US Embassy London in charge of all the FBI's cyber investigations in the UK, and the reasons he was asked by Microsoft to be its Chief Security Advisor in the UK.
10:00

7 Habits for Highly Effective Implementation of Strong Authentication

Shlomi Yanai
VP eToken, Aladdin
Increasingly, organizations are adopting strong authentication solutions to meet their security requirements. How successful are these implementations and what actions lead to the best results? How does authentication integrate with the overall identity management and IT strategy? Get insight and customer-focused approaches in this session based on actual strong authentication deployments.
10:25

Coffee break

10:45

New Generation of Data Leak and Threat Security Protection

Filip Demianiuk
Technical Account and Channel Manager for Poland, Trendmicro
The majority of data leaks happen from within, either by accident or on purpose by valid users who have access to the data within a corporate network. A company's greatest asset – its employees – can also be its greatest security liability. The new interactive endpoint alerts of Trend Micro LeakProof 3.0 enable IT managers to define content-sensitive dialog boxes that appear directly on an employee's computer screen. These alert boxes educate employees on the appropriate handling of confidential information, raise awareness of security issues and enlist their support in preventing data from “walking out of the door”. The presentation will also show you that LeakProof aligns with the move to mobile working by providing full data loss protection outside the corporate network.
11:10

Guest Keynote Presentation: Enigma – the world’s most infamous code

Simon Singh
Writer, journalist, TV producer, simon singh.net
Simon Singh, author of The Code Book, will discuss how the Enigma code transformed the history of codes. He will also explain how Allied codebreakers revealed Enigma's weaknesses and changed the course of the Second World War. He will be bringing a genuine Enigma cipher machine, so this will be a rare opportunity to see a fully functioning Enigma cipher machine. Dr. Singh will demonstrate and explain how the machine operates. He will also discuss what lessons can be learned today from the mistakes made in the Second World War.
11:40

Managing Infrastructure Risks by Deploying a Vulnerability Management Solution

Marek Skalický
Managing Director for Central and Eastern Europe, Qualys

The IT infrastructure of modern enterprises must support business processes; enable fast and uncomplicated communication between departments, partners and customers; and be durable and safe at the same time. In addition, it must handle increasingly complex attacks and threats. Monitoring security and risk exposure within complex and heterogeneous IT infrastructures is difficult, due to the limitations of available tools. Often, the IT staff does not even know the exact number of systems in an enterprise network, or its vulnerabilities. The growing number of compliance requirements intensifies this problem by requiring regular reporting. This presentation highlights Best Practices and includes a case study in which these issues were solved with the implementation of an automated Vulnerability Management Process.

12:05

Coffee break

12:25

Securing Your Organization Against Web 2.0 Threats

Michael Rudrich
Director of Eastern Europe, Secure Computing
Web 2.0 has enabled organizations to increase employee efficiency and productivity, unfortunately, the technology behind Web 2.0 has become a target for cyber criminals. During this presentation Secure Computing will highlight the risks of using Web 2.0 applications and show why security technology in use today is becoming less effective against targeted attacks that leverage Web 2.0 technology.
12:50

Identity Management: strategies and solutions

Jerzy Suchodolski
Product Director Identity Management, ORACLE
13:15

Blended threats - effective remediation

Michał Ceklarz
Major Account Manager, Fortinet
A blended threat is a computer network attack that seeks to maximize the severity of damage and speed of contagion by combining methods, for example using characteristics of both viruses and worms, while also taking advantage of vulnerabilities in computers, networks, or other systems. During the presentation we will focus on those attacks and try to find a remediation.
13:40

Lunch

Lila Weneda Restaurant
14:30

(Parallel Sessions)

Please use the select box below to browse through the sessions.

14:40

(Parallel Sessions)

Please use the select box below to browse through the sessions.

15:05

(Parallel Sessions)

Please use the select box below to browse through the sessions.

15:30

Coffee break

15:50

(Parallel Sessions)

Please use the select box below to browse through the sessions.

16:15

(Parallel Sessions)

Please use the select box below to browse through the sessions.

16:40

(Parallel Sessions)

Please use the select box below to browse through the sessions.

17:00

17:05

IDC Happy Hour

Questionaries, Gifts & lotteries

Speakers

Thomas Vavra

Research Director, Software, CEMA Region, IDC CEMA

Edward P. Gibson

Chief Security Adviser , Microsoft Ltd, United Kingdom

Shlomi Yanai

VP eToken, Aladdin

Filip Demianiuk

Technical Account and Channel Manager for Poland, Trendmicro

Simon Singh

Writer, journalist, TV producer, simon singh.net

Marek Skalický

Managing Director for Central and Eastern Europe, Qualys

Michael Rudrich

Director of Eastern Europe, Secure Computing

Jerzy Suchodolski

Product Director Identity Management, ORACLE

Michał Ceklarz

Major Account Manager, Fortinet

Tomasz Sloniewski

Senior Analyst, IDC Poland

Partners

Platinum Partner(s)

Gold Partner(s)

Silver Partner(s)

Media Partner(s)

Partner(s)

Proceedings

To access the content, please enter the password you have received from IDC. If you do not have a password, please contact Katarzyna Maniszewska via email, at kmaniszewska@idc.com.

Photo Gallery

This event has no photogallery images.

Contacts

Katarzyna Maniszewska

Conference Manager

+48 22 548 40 72

About IDC

44 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.