IDC IT Security Roadshow 2009

This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC IT Security Roadshow 2009

Balancing Reality and Perception in a New Economic Era

Warsaw, March 31, 2009


A computer virus spreading beyond Earth to the International Space Station and a hacker intrusion into the Large Hadron Collider computer network illustrate how IT security, or rather a lack of it, can endanger major human undertakings, whether due to human error or negligence, technical failure, or faulty design. With new attack vectors and vulnerabilities being discovered on a daily basis, IT security has come to the fore for every business striving to protect its investments. Furthermore, new technologies such as Web 2.0, widespread mobile solutions, and new regulatory requirements create additional demands on IT security across all sectors.

IDC’s IT Security Roadshow has established itself as a flagship regional event providing a platform for the exchange of ideas, sharing of experience, and discussion on best practices among independent experts, analysts, industry leaders, and users of IT security solutions.

In addition to its traditional stops in major cities across Central and Eastern Europe, IDC's IT Security Roadshow has expanded for 2009 into major new business centers in the east of the region.

The seventh IDC Security Roadshow has invited top IT security experts to share their unique expertise. Among them are the following:

    John Austen
    Director of QCC
    John was Head of the Computer Crime Unit, New Scotland Yard, until 1996. He was a career detective for 30 years, investigating the first major UK computer crime and founding the Computer Crime Unit.

    Tomasz Słoniewski
    Research Manager, Software, IDC Poland, Joining IDC in January 2003, Tomasz Sloniewski researches and analyzes the software markets in Poland and the Baltic states and oversees software research for Central and Eastern Europe.

  • Roger Halbheer, Chief Security Advisor for Microsoft Europe, the Middle East and Africa (EMEA)

  • Michał Ceklarz, Security & Privacy Services Leader, IBM

  • Filip Demianiuk, Technical Channel Manager for Central and Eastern Europe (CEE), Trend Micro

  • Podinsp. dr inż. Jerzy Kosiński, Wyższa Szkoła Policji w Szczytnie

  • Dariusz Kulawik, Dyrektor Działu Bezpieczeństwa, Netia

  • prof. dr hab. Mirosław Kutyłowski, Instytut Matematyki i Informatyki, Politechnika Wrocławska

  • Shlomi Yanai, Vice President eToken, Aladdin

  • Jan-Willem Keinke, Senior Sales Engineer for CEE; CIS and Russia, Blue Coat Systems

  • Michał Kułakowski, System Engineer, Fortinet

  • Alexander Raczynski, Systems Engineer Eastern Europe, WebSense

  • Tomasz Śnieżyński, Dyrektor Konsultingu Bezpieczeństwa IT, Comarch SA

  • Zbigniew Szmigiero, Tivoli Security Sales Manager, IBM

  • Piotr Tutak, Prezes Zarządu, eModus - Exclusive Partner of HITACHI

  • Tomasz Kojm, Project CTO, ClamAV

  • Grzegorz Flak, Senior Solution Architect - IT Security, Qumak - Partner of RSA

  • Jarosław Bazydlo, Comp Safe Support S.A. - Partner of WebSense

  • Marcin Fryzik, Microsoft Solution Sales Professional – Security & Management

Who Should Attend

  • Chief Security Officers, Directors of Enterprise Security, CIOs, CTOs, CISOs
  • Privacy Officers, Network Security Managers, Server Application Managers
  • Antivirus, Email Monitoring, VPN, and 3A Managers
Representatives from the following industries:
  • Banking, Financial Services
  • Transportation, Utilities, and Logistics
  • Telecommunications
  • Government and Public Administration
  • Manufacturing
  • Trade


Time Event Speakers

About security during the breakfast - Registration


Welcome speech

Andrzej Jarosz
Managing Director, IDC Poland

IDC Keynote Presentation: Balancing Reality and Perception in a New Economic Era

Tomasz Sloniewski
Research Manager, Software, IDC Poland
In a world where rapid changes occur in the economic environment, companies are seeking ways to rationalize spending and reduce costs. In the process of cutting IT budgets, IT security can also be affected. In this presentation, IDC will outline the economic challenges companies will have to cope with in the upcoming years. We will also point out why security levels should not be diminished during "troubled times" and what business value security solutions bring to an organization.

End-to-End Trust: The Internet and MS Platform – a safer place to work, play, learn and do business

Roger Halbheer
Chief Security Advisor, Microsoft EMEA
Threats change, criminals evolve new ways of stealing money and valuable data, and trust in the Internet continues to come under attack. It’s a classic tale of good versus evil with the future of the Internet and business infrastructures are at stake. The industry is faced with a challenge – either secure the Internet and gain users’ trust, or lose control to the bad guys and see the value of one of man’s greatest inventions dwindle. This session will give you insight into next generation security and Trustworthy Computing’s vision for creating an Internet and Infrastructure Platform we can trust from end-to-end. Learn about the latest vulnerability report, Microsoft’s Secure Platform and Industry Internet activities. Also, learn about our latest Security Roadmap.

Beyond Passwords: The Future of Strong Authentication for Online Services

Shlomi Yanai
VP eToken, Aladdin
In this presentation we will give an overview of advanced authentication technologies, discuss alternatives to passwords being used today and provide insight into innovative strong authentication technologies that are designed to secure the future of online services.

IT Virtualization - New challenges for IT Security Management

Michał Ceklarz
Security & Privacy Services Leader, IBM
Intense pressures on IT-operations budgets, combined with the increasing recognition of sophisticated IT being an essential tool for success in the marketplace, are driving a lot of companies to consider and implement large virtualization projects. Virtualization in IT greatly enhances efficiency and, at the same time, separates the physical location of an IT infrastructure from the point of service delivery. This mechanism thus creates entirely new challenges for the security set-up of companies and must be managed with a proper blend of technological and organizational solutions in the area of security management. IBM shows you the typical challenges of a virtual security environment, a set of solutions, and how you can overcome these challenges with minimal costs while using cutting-edge security technology.

Cofee Break


Special Guest Presentation: The Changing Threats to Information Security

John Austen
Director of QCC, InfoSec Ltd.
This presentation discusses the changes in threats to information security, from the 1980s to 2009. Looking at the balance between the technology available at the time and the motives of the attackers, as well as their skill levels in developing hacking tools and malware, is a vital step in the understanding how to build effective responses and defences in information security. Attackers' actions against information systems and networks – that, many years ago, started as technical challenges or pranks/games committed by amateurs – have evolved into a criminal profession where money and resources are aimed at obtaining information from (or distributing malware to) specific targets within organizations. We will look at examples of attacks and the attackers from each era until the present day, including: hackers and hacking methodologies, fraud, virus distribution, worms, denial of service attacks, Trojans, and bots.

A New Approach to Cloud-Client Security with a Next-Generation Infrastructure

Filip Demianiuk
Technical Channel Manager (CEE), Trend Micro
Trend Micro examines current IT management options for integrating its Trend Micro Smart Protection Network into current security architectures. Additionally, it discusses how this transition will evolve an approach to data security that provides rapid, real-time security status “look-up” capabilities in the cloud and reduces costs and overhead associated with corporate-wide signature deployments. The Trend Micro Smart Protection Network can promptly protect enterprises from the latest threats with continuously updated and correlated threat databases (Web/Email/File). With such a high volume of threats emerging, a new approach is needed to reduce the heavy burden computers have to store and deliver protection information. The Trend Micro Smart Protection Network is a unique, next-generation cloud-client content security infrastructure – designed to protect customers from Web threats, including data-stealing malware. Cloud-client file reputation technology, a component of the Trend Micro Smart Protection Network, is designed to offload the storage of traditional signatures away from computers and into the Internet cloud.

See, accelerate and secure - how you manage your business in the internet without compromising your security

Jan-Willem Keinke
, Senior Sales Engineer for CEE; CIS and Russia, Blue Coat Systems
Two major trends are impacting the way that our networks look and where data and applications sit, Server consolidation and Increased Internet access. The Internet is becoming an economic alternative to create site to site connections as well as the preferred method for remote access by employees, business partners and customers. It is also the delivery platform for outsourced applications (SaaS). Ideally the Internet and the Corporate net would be connected seamlessly, however, this has serious security implications. This presentation considers the implications, choices to be made and solutions offered today.

Internet Black Market - mechanisms and their consequences for network users

Michał Kułakowski
System Engineer, Fortinet
Understanding attacker's motivation is key to effective defense. In this speech author will show current and try to predict future trends in information security threats basing on return on investment model for various cybercriminal activities.

Lunch Lilla Weneda Restaurant


(Parallel Sessions)


Cofee Break


(Parallel Sessions)


IDC Happy Hour - Questionaries, Gifts & lotteries

General Information

Marriott Hotel
Al. Jerozolimskie 65/79
00-697 Warszawa

The conference will be conducted in Polish and English (with simultaneous translation).

For attendees representing IT sector the standard fee is Euro 250. The registration fee includes conference participation, documentation, lunch, refreshments and reception.

If you cannot attend, a substitute delegate may attend in your place. A delegate who will not cancel his or her registration before March 16, 2008 will be charged with administration fee in amount of Euro 250. No refund will be made if the invitation was purchased and not cancelled before March 16, 2009.


Platinum Partner(s)

Gold Partner(s)

Silver Partner(s)

Media Partner(s)


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Katarzyna Maniszewska via email, at


Katarzyna Maniszewska

Conference Manager

+48 22 548 40 72

About IDC

45 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit