IDC IT Security and Datacenter Transformation Roadshow 2013

This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC IT Security and Datacenter Transformation Roadshow 2013

Bratislava, April 18, 2013


Datacenters are undergoing a period of disruption and transformation. In addition to ensuring operating efficiency and flexibility through the utilization of modern technologies such as virtualization, maintaining the security of ever-growing amounts of data is imperative. New initiatives such as cloud computing, together with the mobile and social revolutions, increase demand for computing, storage, and networking power while adding new levels of complexity to IT security.

Zoltan Komaromi

Country Manager, IDC Hungary

Timo Kasper

Research Assistant at the Horst Görtz Institute for IT Security, Ruhr-University Bochum

"The largest threat that many companies and organizations now face is not a hacker, a virus, or an errant employee. The new enemy is sprawl. The vastness of infrastructures now in place represents a danger in and of itself. Increasingly, companies need to address this growing problem and provide better management of their environments and the technologies they will need in the future and, as importantly, those already in place." Thomas Vavra, research director, IDC CEMA.

The IDC IT Security and Datacenter Transformation Roadshow 2013 will focus on the most pressing data management and security issues facing modern organizations, including:

  • General Datacenter Market Trends in CEE
  • Datacenter Cost Optimization; Integrating New Energy-Efficient Solutions; Modernization
  • New Trends in Datacenter Operations in the Age of Cloud Computing and Big Data
  • Secure Enterprise and Business Strategy
  • Next-Generation IT Trends and what They Mean for Information Security
  • Security in the Cloud Era

Who Should Attend

  • Storage Manager, Storage/Data Specialist
  • Chief Security Officers, Directors of Enterprise Security, CIOs, CTOs, CISOs
  • CIOs, CTOs, CISOs
  • Privacy Officers, Network Security Managers, Server Application Managers
  • Antivirus, Email Monitoring, VPN, and 3A Managers
  • Disaster recovery and business continuity managers
  • Technical managers, Facility managers
  • Other managers responsible for data retention

Representatives from the following industries:

  • Banking and other financial services
  • Transportation, energy, and utilities
  • Travel and transportation services
  • Telecommunications and media
  • Government bodies
  • Manufacturing and engineering
  • Trade, warehouses, and logistics


Time Event Speakers



Secrets of Contactless Smartcards

Timo Kasper
Research Assistant at the Horst Görtz Institute for IT Security, Ruhr-University Bochum

Contactless smartcards have become widespread for applications such as ticketing (e.g., Opencard), access control (e.g., access to CVUT buildings), identification (e.g., electronic passport), and payments. The cards are supposed to safely store confidential information, such as credit balances or personal data, so that the information cannot be modified or read by unauthorized persons.

The talk analyzes, from the perspective of an attacker, how securely the data is stored on the cards, and if their content (and the respective systems) can be manipulated to enable fraud. The talk goes on to introduce open-source tools – developed by the speaker – for analyzing contactless smartcards, including an ISO 14443 RFID reader and the card emulator Chameleon. The talk illustrates a flawed realization of a contactless payment system based on Mifare Classic cards, and details various real-world attacks on this widespread system that can, in effect, convert the stored zeroes and ones into real money by modifying the credit balance.

Furthermore, side-channel analysis (SCA) – a powerful implementation attack that enables the extraction of secret cryptographic keys – is also introduced. Using the example of Mifare DESfire MF3ICD40 smartcards (as used in Opencards), it is shown that SCA attacks can reveal the cryptographic keys of these cards, and allow attackers to arbitrarily access and modify the cards' data.


Analysis of Security Threats in 2013

Peter Kovalčík
Security Engineer Eastern Europe, Check Point Software Technologies

Modern Data Protection in Virtual Environments

Martin Štětka
Regional manager CZ/SK/HU, Veeam

Real Power Management for the Virtualised World

Tatu Valjakka
Product Manager for Software and Connectivity (EMEA), Eaton Elektrotechnika s.r.o.

Today’s Security Threats and Their Effective Elimination

Jakub Jiříček
Pre-sales Consultant, Symantec

Cybernetic threats are more common than ever before. The Internet underworld is full of stolen information and personal data trading, and it almost seems as if security companies were just standing by idly. However, the list of newly developed back-end technologies designed to eliminate threats and information about Symantec’s research activities in the field of vulnerability, threats, and attacks will hopefully convince you that all is not lost.


Coffee Break


The Security and Datacenter Challenges of the Extended Enterprise

Zoltan Komaromi
Country Manager, IDC Hungary

Modern trends in servers and storage

Jan Petrák
CTO, Abacus electric, s.r.o.

The Datacenter Infrastructure as the Basis of its Accessibility

Václav Míka
District Manager Czech Republic, APC

Archive Not the End

Antonín Drahovzal
Sales Director, Software602

Architecting Visibility in Big Data Networks

Drahomír Hrubý
CEO, Brain Force Software

- What is a BIG data?

- Impact on business

- Lack of visibility

- Optimization and Monitoring


Security Flaws of Contactless Cards in Practice

Timo Kasper
Research Assistant at the Horst Görtz Institute for IT Security, Ruhr-University Bochum

Raffle Draw


End of the Conference and Lunch

General Information


April 18, 2013


Radisson Blu Carlton Hotel (Hviezdoslavovo nám. 3, Bratislava)

Conference Language

The conference will be conducted in Slovak and English (with simultaneous translation).

Delegate Fee

  • FREE - End users
  • 200 EUR + 19% VAT - IT vendors

Delegate fee includes conference participation, documentation, lunch and refreshments.

All registration payments must reach IDC CEMA prior to the conference. Payments are made by bank transfer as per invoice received from IDC CEMA.


If you cannot attend a substitute delegate may attend in your place. Delegate who will cancel his/her registration by March 28, 2013 will receive full refund less a 10% administration charge. No refunds will be made for cancellations received after March 28.


For further information please contact Daniela Hanouskova, phone +420 221 423 163,


Gold Partner(s)

Silver Partner(s)


Exhibition Partner(s)

Media Partner(s)


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Daniela Hanouskova via email, at

Photo Gallery


Daniela Hanouskova

Conference Specialist

+420 221 423 163

Jaromir Valenta

Sales Director, CEE Region

+420 731 503 236

About IDC

49 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit