IDC IT Security and Datacenter Transformation Roadshow 2013

This site uses cookie including third parties cookies which helps us provide and improve our services. Find more on our Cookie Policy


IDC IT Security and Datacenter Transformation Roadshow 2013

Bucharest, April 17, 2013


Datacenters are undergoing a period of disruption and transformation. In addition to ensuring operating efficiency and flexibility through the utilization of modern technologies such as virtualization, maintaining the security of ever-growing amounts of data is imperative. New initiatives such as cloud computing, together with the mobile and social revolutions, increase demand for computing, storage, and networking power while adding new levels of complexity to IT security.

Thomas Vavra

Associate Vice President, Software, IDC CEMA

"The largest threat that many companies and organizations now face is not a hacker, a virus, or an errant employee. The new enemy is sprawl. The vastness of infrastructures now in place represents a danger in and of itself. Increasingly, companies need to address this growing problem and provide better management of their environments and the technologies they will need in the future and, as importantly, those already in place." Thomas Vavra, research director, IDC CEMA.

The IDC IT Security and Datacenter Transformation Roadshow 2013 will focus on the most pressing data management and security issues facing modern organizations, including:

  • General Datacenter Market Trends in CEE
  • Datacenter Cost Optimization; Integrating New Energy-Efficient Solutions; Modernization
  • New Trends in Datacenter Operations in the Age of Cloud Computing and Big Data
  • Secure Enterprise and Business Strategy
  • Next-Generation IT Trends and what They Mean for Information Security
  • Security in the Cloud Era

Who Should Attend

  • Storage Manager, Storage/Data Specialist
  • Chief Security Officers, Directors of Enterprise Security, CIOs, CTOs, CISOs
  • CIOs, CTOs, CISOs
  • Privacy Officers, Network Security Managers, Server Application Managers
  • Antivirus, Email Monitoring, VPN, and 3A Managers
  • Disaster recovery and business continuity managers
  • Technical managers, Facility managers
  • Other managers responsible for data retention

Representatives from the following industries:

  • Banking and other financial services
  • Transportation, energy, and utilities
  • Travel and transportation services
  • Telecommunications and media
  • Government bodies
  • Manufacturing and engineering
  • Trade, warehouses, and logistics


Time Event Speakers

Registration & Welcome Coffee


Welcome address IDC Romania

Laurentiu Popescu
Country Manager, IDC Romania

IDC Keynote Presentation: Next Generation IT Security - Securing the 4 Forces of IT

Thomas Vavra
Associate Vice President, Software, IDC CEMA
In his presentation Mr. Vavra will discuss the 4 forces currently shaping the IT world: Mobility, Big Data, Cloud and Social. Vavra will also discuss how each force presents its own set of challenges and implications for IT security as well as potential strategies and things to consider when addressing them.

How Is Cyber-War Impacting Your Corporate Security

Stefan Tanase
Senior Security Researcher, Kaspersky Lab

Cyber criminals were the only ones, up until recently, who were creating malware. They were, are and will be in the malware game just for the money. But malware nowadays is not created just by cybercriminals. Nation states around the world started using trojans, viruses and worms since as early as 5 years ago.
Stuxnet, Flame or Red October are just some of the cyber espionage and cyber sabotage toolkits which were discovered. It is just the tip of the iceberg, as with each discovery, security researchers are amazed by how complex these tools are getting and to what lengths the attackers are willing to go to get the information that they want.
Find out why the innovations from cyber-weapons are so dangerous, who are the collateral victims of this war and most importantly how exactly is cyber-war impacting the security of your organization.


End to end with no End in sight

Serban Zirnovan
Business Development Manager, Central Emerging Europe, DELL
More than three years ago, we made a decision to become the leading end-to-end solutions provider for customers around the world - empowering IT organizations to achieve their full potential by delivering IT solutions that create competitive advantage. Dell is a very different company today than it was a few years ago. Please join us in a journey about consumerization of IT, cloud approach as well as software and security solutions.

Coffee Break


Conventional information security measures, including anti-virus and next-generation firewalls, aren't enough to protect your organization from today's deluge of sophisticated web threats

Miroslav Bajgar
Sales Engineer, Websense

The global threat landscape has significantly changed over the last twelve months; during this session we will discuss this landscape and primary issues that social media, mobility and the increasingly sophisticated inbound and outbound threats organisations need to address. Whilst, web and email remain the primary intrusion vectors with the primary goal to steal data, we will end this session by identifying the methods employed to do so.


A Connected World in Transformation. Energy Efficiency, or how the cost of Energy could be reduced.

Eduard Bodor
Data Center Business Development Manager for Central Europe, APC by Schneider Electric

The Cybercrime Game: Why Aren’t We Winning?

We are losing the cybercrime game. There is no shortage of data that supports that fact. The 2012 Verizon Data Breach Report provided the most alarming of all statistics: 92% of data breaches that were discovered by a third-party. This highlights that enterprises are not prepared to detect attacks they face each day. What’s worse is threats are now being engineered to be slow and stealthy. In fact, that same report showed that, in 85% of the cases, the breach took more than two weeks to discover[1]. Yet, 97% of breaches that took place in 2011 were avoidable with just “basic or intermediate” controls.
Why aren’t more organizations able to get to the basics? Find out in this session led by John Hopkins from Sensage |KEYW. You will learn:

  • Why security teams are getting buried under security technologies and processes
  • How to turn security event data in to powerful security intelligence
  • Why context-aware security management will improve alerts, policies and investigations
  • What Sensage delivers to the most proactive security practitioners around the world

Lowering Data Center TCO through the strategic application of storage

Remus Dosa
Territory Sales Representative - Balkans Region, Seagate

Storage accounts for >50% of the total compute cost in a Data Center. Seagate can help you lower TCO through the strategic application of storage. We have the portfolio of products, the technologies and technical expertise to help you implement a smart solution in your Data Center.


A new take on Mobile Data Security and the optimization of Server Infrastructure

Gabriel Gidea
Business Development Manager Romania and Bulgaria, Kingston

Questions & Answers


Networking Lunch


VIP Speaker presentation - Data Breach Notification - a legal obligation

Bogdan Manolea
Director executiv, Asociatia pentru Tehnologie si Internet - ApTI

D-Link – Connect to more. Integrated Networking Business Solutions

Mihai Marcu
Country Sales Manager, D-Link

Mihai Marcu will present information about D-Link future-proof network solutions for companies and end users. An expansive portfolio of cloud-ready solutions and a personal cloud concept are tailored for digital home, and advanced D-Link business solutions are addressing SME segment, Service providers and SMB in Romania.
Mihai Marcu will underline also that D-Link is the only networking vendor offering a complete solution, which includes routers, access points, professional IP cameras, storage devices,  Smart Switches, Wireless Controllers and performant unified wireless routers for enhanced security .


Secure Your Enterprise. Data is the New Perimeter.

Mark Fitchett
Global Channel Director, TITUS

Despite our best efforts to stop information leakage/loss, organizations are still plagued by this problem. With firewalls, gateways and DLP solutions at the organization’s perimeter why do these leaks continue? Perhaps you are protecting the wrong perimeter? Let TITUS explain how Data is the New Perimeter and how TITUS can help you stop these leaks.


Panel Discussions


Raffle Draw & End of conference

General Information

Wednesday, 17th of April 2013

Intercontinental Hotel
4 Nicolae Balcescu Bd.
Bucharest, 1st District, Romania
Conference room: Ronda, 1st floor
Registration deadline for end-users: 12th of April 2013

Conference Language 
The conference will be held in English and Romanian (with simultaneous translation).


  • For senior representatives of end-user companies, governmental institutions, Media and companies from other sectors than IT (not IT + not IT consultancy companies): participation is FREE of charge (registration is required)
  • For IT vendors, and IT consultancy companies: 
    Early Bird Fee: 300 EUR+24% VAT untill 27th of March 2013. 
    Standard Fee: 350 EUR+24% VAT after 27th of March 2013
    Registration includes conference participation, documentation and access to presentation material, plus all refreshments and lunch. The attendance fee will be paid to our bank account in Romania.


FREE* Attendance 
Free attendance for senior IT representatives of end-user community, companies that purchase and operate IT and telecommunications products and services. Free attendance is reserved for a total of 100 persons. We are only able to accept up to three attendees from each company due to limited space at each event. If we have already received registrations from three members of your company we will inform you as soon as possible in order for you to discuss attendance internally. Register today and secure your free ticket!
All registration payments must reach IDC prior to the conference. Payments are made by bank transfer to the IDC bank account in Romania as per invoice received from IDC.
If you cannot attend, a substitute delegate may attend in your place. A delegate who cancels his/her registration before 27th of March 2013 will receive a full refund, less a 10% administration charge. No refund will be made for cancellations received after 27th of March 2013.
Clothing Business
We reserve the right to refuse registrations.

for end-users - Cristina Bazilescu,
for partners - Cristina Pasla,
tel: +4021 411 27 43 or +4021 411 45 69

*IDC reserves the right to investigate and authenticate registrations submitted under this category and to apply the stated registration fee if deemed necessary. The applicant will be informed in advance if this is the case.


Gold Partner(s)

Silver Partner(s)


Exhibition Partner(s)

Media Partner(s)


To access the content, please enter the password you have received from IDC. If you do not have a password, please contact Cristina Pasla via email, at

Photo Gallery


Cristina Pasla

Regional Conference Manager

+40 731 321 795

About IDC

49 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit