IDC IT Security Roadshow 2013

This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC IT Security Roadshow 2013

Prague, March 14, 2013


Security investment remains a top priority for the IT department. However, there has been a big change in IT security strategies that has come about due to new initiatives such as Cloud and virtualization. Furthermore, the mobile and social revolutions have added a new level of complexity to IT security practice with the explosion of devices and platforms that are now commonplace.

Mark Child

Research Manager, Software & Enterprise Applications, IDC CEMA

"For this reason, the largest threat that many companies and organizations now face is not a hacker, a virus or an errant employee. The new enemy is sprawl. The vastness of infrastructures now in place represents a danger in and of itself. More and more, companies need to address this growing problem and try to better manage their environments and the technologies they will need in the future and, as importantly, those already in place." - Thomas Vavra, Research Director, IDC CEMA.

Timo Kasper

Research Assistant at the Horst Görtz Institute for IT Security, Ruhr-University Bochum

The IDC IT Security Roadshow 2013 will focus on the most pressing security issues facing modern organizations, including:

  • Secure Enterprise and Business Strategy
  • Next Generation IT Trends and What They Mean for Information Security
  • Security in the Cloud Era
  • Big Data and Security
  • Next Generation Firewalls and IP
  • Network and Mobile Security
  • Security and Risk Governance

Who Should Attend

  • Chief Security Officers, Directors of Enterprise Security, CIOs, CTOs, CISOs
  • Privacy Officers, Network Security Managers, Server Application Managers
  • Antivirus, Email Monitoring, VPN, and 3A Managers

Representatives from the following industries:

  • Banking, Financial Services
  • Transportation, Utilities, and Logistics
  • Telecommunications
  • Government and Public Administration
  • Manufacturing
  • Trade


Time Event Speakers



Securing the Next-Generation Enterprise

Mark Child
Research Manager, Software & Enterprise Applications, IDC CEMA

Secrets of Contactless Smartcards

Timo Kasper
Research Assistant at the Horst Görtz Institute for IT Security, Ruhr-University Bochum

Contactless smartcards have become widespread for applications such as ticketing (e.g., Opencard), access control (e.g., access to CVUT buildings), identification (e.g., electronic passport), and payments. The cards are supposed to safely store confidential information, such as credit balances or personal data, so that the information cannot be modified or read by unauthorized persons.

The talk analyzes, from the perspective of an attacker, how securely the data is stored on the cards, and if their content (and the respective systems) can be manipulated to enable fraud. The talk goes on to introduce open-source tools – developed by the speaker – for analyzing contactless smartcards, including an ISO 14443 RFID reader and the card emulator Chameleon. The talk illustrates a flawed realization of a contactless payment system based on Mifare Classic cards, and details various real-world attacks on this widespread system that can, in effect, convert the stored zeroes and ones into real money by modifying the credit balance.

Furthermore, side-channel analysis (SCA) – a powerful implementation attack that enables the extraction of secret cryptographic keys – is also introduced. Using the example of Mifare DESfire MF3ICD40 smartcards (as used in Opencards), it is shown that SCA attacks can reveal the cryptographic keys of these cards, and allow attackers to arbitrarily access and modify the cards' data.



Security and Management of Mobile Devices in the Enterprise Environment

Luis Francisco González
Head of Business Development for Global Enterprise Security, Telefónica Digital

The marked rise in the use of mobile devices in enterprise environments brings new security risks. The variety of mobile platforms further compounds these risks, complicates their management, and increases costs. Companies face challanges in efficiently securing employees' mobile devices that contain sensitive corporate data: The solution is the new O2 MDM from Telefonica Czech Republic, which comprehensively addresses the aforementioned challenges and concerns, and meets the needs of customers.




Coffee Break


Next Generation Security Solution

Ondřej Bačina
Dell Enterprise Brand Manager, Dell Czech Republic

Dell has become the leading provider of security solutions in recent years. The presentation will focus on:

  • The Dell SonicWALL next-generation firewall solution
  • The Dell SecureWorks managed security services solution
  • One Identity, from the Dell Quest solution



Red October Detection Technology

Vladimir Zapolyansky
Deputy Director GREAT, Head of Technology Positioning, Kaspersky Lab

We have been hearing increasingly often of complex targeted cyberattacks, and names such as Stuxnet, Duqu, Flame, and Gauss are known to many. On January 14, Kaspersky Lab announced the detection of another cyberthreat. This time it was not just a targeted attack, but an extended network of cyberspying against diplomatic and government structures, research institutes, industrial companies, and military agencies of various countries. Investigation revealed that the essential part of a malicious code was blocked by Kaspersky Lab technologies even before any information on this cyberthreat had appeared. This proves that Automatic Exploit Prevention technology is one of the key components of protection against unknown threats, including zero-day vulnerability. We will study the principle of operation of this technology in the presentation.


Analysis of Security Threats in 2013

Daniel Šafář
Country Manager CZR, Check Point Software Technologies, Check Point

"Just as water retains no constant shape, so in warfare there are no constant conditions." Gain insight into the latest security analysis from Check Point Software Technologies, which uses the wise words of General Sun Tzu as an analogy for the current state of IT security.






Panel Discussion


Give Your Customers More Confidence to Click and Buy

Andrew Horbury
Product marketing manager, Symantec

While ecommerce has demonstrated rapid growth and innovation, it has yet to reach its full potential. Even today, many consumers are either afraid to shop online or do so with great caution due to concerns about security. Given that more than 286 million versions of malware affect websites, in addition to the thousands of phishing websites established every day, the situation comes as no surprise. Countless studies reflect this sentiment, showing that identity theft and information security are leading drivers of online shopping basket abandonment. However, it is still possible to build customer trust online despite these challenges. In this session, you will gain tips and insight on how to:

- Improve conversion and click-through rates, reducing shopping basket abandonment

- Increase traffic by clearly demonstrating that your website is safe

- Protect yourself and your customers from online fraud

- Reduce risk of lost business due to security breaches



Modern DCIM as the Basis of Operational Accessibility of IT Technologies

Václav Míka
District Manager Czech Republic, APC

Risks of Data Misuse and Data Protection Options

Boleslav Bobčík
Solution Architect, T-Systems Czech Republic a.s.

Private data protection is an evergreen in ICT. It is becoming increasingly important to pay attention to the security of sensitive data (e.g., user and customer data) due to the growing number of systems and the development of cloud services. One example of data protection failure is the data theft from the Sony PlayStation Network user database in June 2011, for which the company received a record penalty from the Information Commissioner's Office of the U.K. at the beginning of this year. The data in the information systems pertained to different aspects of individual identity (name, contact information, age, credit card details, etc.). Since the interconnection of sensitive data is not controlled, the risk of data misuse is high. T-Systems has developed a unique product, ISBI, which can protect data from attacks, even internal ones. It provides customers with solutions to their data-protection problems.


What Is the Biggest Firewall Issue for Enterprises?

Seweryn Jodlowski
System Engineer, Palo Alto Networks



Coffee Break


Can Cloud be Safer Than Your Own IT?

Ondřej Štrba
Strategic Advisor for Windows Azure Platform, Microsoft s.r.o.

The universal opinion that an in-house IT environment is safer than the cloud is still widespread. In this presentation, we will demonstrate the security of Microsoft’s cloud functions and will enable attendees to compare it with their own corporate IT security systems. In addition to covering the technical measures taken at all levels, we will look into the certifications and attestations with which the cloud environment must comply.


Architecting Visibility in Big Data Networks

Drahomír Hrubý
CEO, Brain Force Software

- What is a BIG data?

- Impact on business

- Lack of visibility

- Optimization and Monitoring



Today’s Security Threats and Their Effective Elimination

Jakub Jiříček
Senior Principal Presales Consultant, Symantec

Cybernetic threats are more common than ever before. The Internet underworld is full of stolen information and personal data trading, and it almost seems as if security companies were just standing by idly. However, the list of newly developed back-end technologies designed to eliminate threats and information about Symantec’s research activities in the field of vulnerability, threats, and attacks will hopefully convince you that all is not lost.


Case Study: The Reliable Archiving of Documents

Miroslav Šedivý
Senior IT Specialist - Team Leader, Telefónica Czech Republic

If information is up-to-date and frequently used, we tend to take care of its security. When documents are no longer needed, they are usually archived. With electronic documents, however, it is imperative to ensure their continued security; otherwise, their value, including legal value, is undermined – far more so than in the case of hardcopies.

Telefonica's presentation introduces the company’s approach to electronic document archiving, including the solutions that ensure the long-term protection of archived documents.



Case Study: The Importance of Network Protection in Real Time

Jan Ježek
Technical Director, business communication, s.r.o.

Raffle Draw


End of Conference

General Information


March 14, 2013


Congress Centre U Hájků

Na Poříčí 42
Prague 1, 110 00

Conference Language

 The conference will be conducted in Czech and English.

Delegate Fee

  • FREE - End users
  • 200 EUR + 21% VAT - IT vendors

Delegate fee includes conference participation, documentation, lunch and refreshments.

All registration payments must reach IDC CEMA prior to the conference. Payments are made by bank transfer as per invoice received from IDC CEMA.


 If you cannot attend a substitute delegate may attend in your place. Delegate who will cancel his/her registration by February 22, 2013 will receive full refund less a 10% administration charge. No refunds will be made for cancellations received after February 22.


 For further information please contact Pavla Kozakova, phone +420 221 423 226,



Check out last year's IDC IT Security Roadshow!

The video cannot be displayed directly on this page, because you have not agreed with IDC cookie policy. To see the video, follow the link to YouTube


Platinum Partner(s)

Gold Partner(s)

Silver Partner(s)


Exhibition Partner(s)

Official support(s)

Media Partner(s)


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Pavla Kozakova via email, at

Photo Gallery


Pavla Kozakova

Senior Conference Specialist, CZ & SK

+420 736 608 563

Jaromir Valenta

Sales Director, CEE Region

+420 731 503 236

About IDC

49 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit