IDC IT Security Roadshow 2014

This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC IT Security Roadshow 2014

Prague, March 13, 2014


IT security is changing visibly in response to threats arising from the latest technological developments, including the rapid growth of Web-based technologies in business (e.g., cloud computing, social networks, mobile apps), more complex IT infrastructure, the expansion of wireless technologies, the bring-your-own-device (BYOD) trend, expanding government regulations, and increasingly sophisticated cyberattacks.

Enterprises continue to struggle with the appropriate security level for meeting the demands on modern IT to ensure its flexibility, agility, and scalability while meeting the regulatory requirements. IDC's prestigious IT Security Roadshow brings together IT professionals, independent experts, and industry leaders to discuss the latest trends and developments that help organizations across all industries to make smart strategic investments in IT security as well as to improve the effectiveness of day-to-day operation.

Mark Child

Research Manager, Software, Central & Eastern Europe

Daniel Schalberger

IT Security Consultant and Live Hacker, SysS GmbH

Aleš Špidla

ředitel odboru bezpečnostní politiky, Ministry of Labour and Social Affairs of the Czech Republic

Running from February to September 2014, the IDC Security Roadshow will visit most capitals in Central and Eastern Europe, the Middle East, and Africa, covering topics including:

  • Cybersecurity in a highly connected world
  • IT and business alignment: Balancing the needs and risks
  • IT security management
  • Managing the bring-your-own-device (BYOD) risk
  • Response and continuity
  • Network security
  • Cloud security
  • Privacy and data protection regulations
  • Security and risk governance
  • Next-generation firewalls and IP

Who Should Attend

  • Chief Security Officers, Directors of Enterprise Security, CIOs, CTOs, CISOs
  • Privacy Officers, Network Security Managers, Server Application Managers
  • Antivirus, Email Monitoring, VPN, and 3A Managers

Representatives from the following industries:

  • Banking, Financial Services
  • Transportation, Utilities, and Logistics
  • Telecommunications
  • Government and Public Administration
  • Manufacturing
  • Trade


Time Event Speakers

Registration and Starbucks Coffee


Welcome Note


Mobile Workers and Agile Hackers Creating Demand for Expert Partners

Mark Child
Research Manager, Software, Central & Eastern Europe

The explosion of smart mobile devices and the demand for remote access to corporate networks, applications, and data have been well documented over the last couple of years. The need for CIOs to secure their infrastructure and assets is more pertinent and complex than it has ever been. Modern malware trends point to a polarization of approaches: increasingly sophisticated and hard-to-detect threats and low-overhead targeted attempts to steal user credentials. The challenges for overburdened CIOs are to stay abreast of these developments and identify where the weaknesses are in their organizations. For security vendors and their partners, it is no longer sufficient just to deliver traditional endpoint security packages: Clients will benefit from solutions and services for vulnerability and risk assessment, monitoring and analysis, data back-up and data protection, and employee training and education. The modern threat environment provides both a challenge and an opportunity for security specialists and their prospective customers.


Introduction to Hacking

Daniel Schalberger
IT Security Consultant and Live Hacker, SysS GmbH

One Step Ahead


Next-Generation Security Solutions

Jan Ježek
Technical Director, business communication, s.r.o.

The Time for Forensic Analysis Is Here

Jiří Slabý
Business Solution Architect, IBM Czech Republic

Coffee Break


Mobile Device Management

Jakub Geršl
Product Manager, Mobility Products and Propositions, Vodafone Czech Republic

One of the newest trends in IT is Mobile Device Management, which is the remote management of mobile devices, whether phones or tablets. What benefits can Mobile Device Management bring to companies, and vice versa; what are the pitfalls? Is the bring-your-own-device (BYOD) concept an effective tool for companies that do not provide cell phones to their employees?


Software-Defined Protection: An Enterprise Security Blueprint


How Is Cyberespionage Impacting Your Corporate Security

Stefan Tanase
Senior Security Researcher, Kaspersky Lab

Until recently, it was only cybercriminals who were actively creating malware. They were, are, and will be in the malware game just for the money. But malware nowadays is not created just by cybercriminals. Nation states around the world started using trojans, viruses, and worms as long as five years ago. Stuxnet, Flame, and Red October are just some of the cyberespionage and cybersabotage toolkits that have been discovered: These are just the tip of the iceberg, as with each discovery, security researchers are amazed by how complex these tools are becoming, and the lengths to which attackers are willing to go to obtain the information that they want. Find out why the cyberweapons innovations are so dangerous, who the collateral victims of this war are, and most importantly, exactly how cyberwar is impacting the security of your organization.



The Privileged Pathway: Avoid a Targeted Attack by Locking Down the Road Most Traveled

Ana-Maria Boldizsar
Regional Sales Manager SEE&Turkey, Cyber-Ark

Targeted cyberattacks continue to hit the headlines as the pinnacle of security issues businesses face. Once the perimeter of a network has been breached, attackers always hijack and exploit privileged accounts to achieve their goals. In this session, we will discuss how targeted threat analytics can help organizations analyze the right data, rather than analyzing all of the data, in order to protect the company against such targeted attacks. Machine learning techniques can build normal behavior profiles for privileged users, helping businesses discover anomalies and spot suspicious behavior. This enables the incident response team to respond immediately and stop attacks, before they stop business.

The benefits of attending:

• Understand the importance of analyzing the right data rather than all of the data when it comes to protecting your company against APTs.

• Learn how targeted threat analytics can help organizations stop attacks, before they stop business.

• Understand how spotting anomalies in privileged account behavior — such as abnormal activity hours and user locations — can help IT teams prevent internal and external targeted attacks.



When Log Management and SIEM Are Not Enough

Ing. Peter Jankovský
Security Monitoring Architect, Axenta a.s.

In an age in when an online presence demands high-level cybersecurity, correlation and analysis tools such as security information and event management (SIEM) are becoming indispensible. Log management underpins such security systems, as it provides the inputs that are monitored and analyzed. But what can be done during system downtime or when the logging of particular systems is insufficient? How are we to be certain that the administrators — system masters usually limited only by procedural settings — do not perform unauthorized operations and corrupt the data? This presentation will introduce a possible solution for monitoring privileged access — in this case, related to the implementation of such controls within a secure environment for the completion of the Temelin nuclear power plant.




Application of Cybersecurity Law in Government — How to Start and Never End

Aleš Špidla
ředitel odboru bezpečnostní politiky, Ministry of Labour and Social Affairs of the Czech Republic

Panel Discussion


Current Requirements for Audit and User Activity Monitoring Systems

Dalibor Sommer
Business Development Manager, Hewlett Packard, s.r.o.

Secure Remote Access to Central Company Resources

Frank Wittmann
Account Manager, HOB GmbH & Co. KG

Remote working can no longer be described as just a trend. Currently, the vast majority of employees already work while on the move, or require the ability to work from remote locations. Whether working at home, holding a presentation at the customer’s location, or editing documents while at a hotel, modern remote access solutions make it possible. Furthermore, enterprises in today’s mobile and cloud-based global workforce require highly secure and flexible remote access solutions that protect the company's resources. Since sensitive corporate data is a particularly valuable asset, data privacy and security must be top priority. This session provides insights into new solutions and options. It also demonstrates enhanced security features in secure remote access.


Modern Network Security, or What Is Hidden in Data Traffic?

Pavel Minařík
Technical Director, INVEA-TECH

Network perimeter security (firewall, IDS/IPS, UTM) and security of terminal stations (antiviruses, endpoint security solutions) are a standard aspect of the security strategy in every organization today. According to analytical agencies, the next crucial security technology is behavior analysis of network traffic/service (NBA), which allows for the detection of threats that other tools cannot detect. In conjunction with network traffic monitoring, NBA facilitates the implementation of behaviour analysis, which is not only a highly effective tool in defending against modern malware and targeted attacks (APT), but also helps network administrators to improve efficiency, obtain detailed reports about network usage, and optimize operational costs.



Coffee Break


New Trends in Datacenter Infrastructure

Václav Míka
District Manager Czech Republic, APC by Schneider Electric

Případová studie nasazení Next-Generation Security řešení

Jan Ježek
Technical Director, business communication, s.r.o.

QRadar Implementation and Daily-Use Cases

Jan Švihla
System Engineer, Kooperativa pojišťovna, a.s., Vienna Insurance Group

Live Hacking - How Hackers Break into IT Networks

Daniel Schalberger
IT Security Consultant and Live Hacker, SysS GmbH

During this live performance, several real hacker techniques are demonstrated, explained and discussed. In particular, there are attacks taking place on systems on the Internet, too. Take a look over the shoulder of a professional and see how security barriers can be circumvented.


Raffle Draw


End of Conference

General Information


Thursday, March 13, 2014


National Museum

Václavské náměstí 68

115 79 Prague 1

Conference Language

 The conference will be conducted in Czech and English.

Delegate Fee

  • FREE - End users
  • 200 EUR + 21% VAT - IT vendors (160 EUR Early Bird Fee - by February 20, 2014)

Delegate fee includes conference participation, documentation, lunch and refreshments.

All registration payments must reach IDC CEMA prior to the conference. Payments are made by bank transfer as per invoice received from IDC CEMA.


 If you cannot attend a substitute delegate may attend in your place. Delegate who will cancel his/her registration by February 20, 2014 will receive full refund less a 10% administration charge. No refunds will be made for cancellations received after February 20.


 For further information please contact Pavla Kozakova, phone +420 221 423 226,



The Voice of IDC Experts

  • “Organizations in CEE are taking an increasingly mature and proactive approach to threat mitigation and the management of security solutions and infrastructure.”
  • “Solutions need to support the entire organization, the employees, and external stakeholders, as networks, mobile solutions, applications, and cloud services are increasingly becoming used for collaboration purposes.”
  • “Cybercrime, ransomware, and mobile adware (madware) are on the rise, as the lines of traditional IT security are crossed when we increase the use of mobile devices, social media, and cloud implementations.”
  • “Vulnerability assessment, network and host intrusion detection, policy compliance, and incident management are the key investment areas for CEE organizations over the next 12  months.”

The Voice of Attendees

What are your organization’s top three IT-related priorities?

Source: IDC IT Buyers’ Pulse 2012, N=739 companies across CZ, HU, PL, RO, RU

Status of Security Deployments in CEE             

Source: IDC CEE Security Roadshow 2013 Attendee Survey, N=280−440


Platinum Partner(s)

Gold Partner(s)

Silver Partner(s)

Technological Partner(s)

Coffee Break Partner(s)

Content Partner(s)

Media Partner(s)


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Pavla Kozakova via email, at

Photo Gallery


Pavla Kozakova

Senior Conference Specialist, CZ & SK

+420 736 608 563

Jaromir Valenta

Sales Director, CEE Region

+420 731 503 236

About IDC

50 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit