IDC IT Security Roadshow 2015

This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC IT Security Roadshow 2015

They know where they're headed. Do you know?

Budapest, March 19, 2015


IDC's Security Roadshow examines global and regional trends related to security and provides actionable advice and best practices for organizations in an era of digital transformation

"Over the years, security trends have remained relatively static. It was always about threats and finding the appropriate product to stop attackers. However, the 3rd Platform is changing how security is acquired, deployed, and used," explains Charles Kolodgy, Research Vice President for IDC's Security Products. "We are now seeing companies strive to expand the reach of security by better controlling access to information and by utilizing threat intelligence to gain an understanding of what attackers are doing in order to anticipate their actions. In addition, enterprises are looking for solutions that are closely aligned to the applications they protect."

IDC's Security Roadshow 2015 will focus on the impact of 3rd-Platform technologies (mobility, cloud, big data, and social business) on security, both as an enabler of innovative solutions and a source of new risks. As always, participants will comprise industry experts, thought leaders, C-level decision makers, key private-sector and government stakeholders, and our own IDC experts.

We look forward to welcoming you at one of the event series to participate in discussions about:

  • IT Security Infrastructure Management
  • Security and the Human Factor in a Highly Connected World
  • Security and Mobility
  • Risk Governance and Managing Vulnerability
  • Security Metrics: Cost-Effective Security Investment Decisions
  • Securing the Next-Generation Workplace
  • The Impact of Data Protection Regulations
  • Next Steps in Security - Diving into 3rd Platform: Big Data vs Security; From the Internet of Things to the Internet of Everything; Social Business and the Blurring Borders Between Public and Private

Who Should Attend

  • Chief Security Officers, Directors of Enterprise Security, CIOs, CTOs, CISOs, IT Strategists
  • Privacy Officers, Network Security Managers, Server Application Managers
  • Antivirus, Email Monitoring, VPN, and 3A Managers
  • Heads of Digital Strategy, IT Managers, Heads of Departments
  • Purchase Managers, IT Specialists

Industries Represented

  • Banking and Financial Services Providers, Insurance and Pension Funds
  • Healthcare
  • Energy and Utilities
  • Government and Public Sector
  • Manufacturing , Wholesale and Retail Trading
  • Transportation and Logistics
  • Telecommunications and Media
  • Business Services


Time Event Speakers

Registration and morning coffee


Welcome Note, Opening of the Conference

Zoltán Komáromi
Senior Research Manager IDC CEE, Country Manager IDC Hungary

Security Challenges from Managing Mobility to Detecting Vulnerability

Mark Child
Research Manager, Software, CEE Region, IDC CEMA

Against a backdrop of ever-more frequent cyberattacks and well-publicised breaches at major organizations worldwide, CE nations are putting in place national cybersecurity initiatives, infrastructure, and legislation. While these establish frameworks and benchmarks to help companies calibrate their security stance, the ultimate responsibility lies with the organization itself to adopt the appropriate security measures and deploy the necessary solutions. IDC will look at some of the major IT security challenges facing our organizations in 2015 and provide insights into some of the steps being taken by our contemporaries to maximize the protection of their IT infrastructure and their data.


What would you do differently if you knew you were going to be compromised?

Szilárd Csordás
Security Consulting Systems Engineer, Cisco Systems Magyarország Kft.

Numbers do not lie. Investigation of multinational companies show evidence of internal compromise. Suspicious traffic is emanating from their network and attempting to connect to questionable sites. 100 percent of companies are calling malicious malware hosts. To effectively protect our network against the targeted and complex attacks we have to understand the criminal mind, motives in the complete attack continuum. Cisco’s security strategy is focusing not just on prevention and detection but we cover the attacks in the during phase and in the after phase as well. Cisco’s Advanced Malware Protection (AMP) solution is a continuous process to detect, track, analyze and remediate the threats on the network and on the endpoints. Retrospection delivers continuous capability which utilize big data analytics for constant file tracking and analysis , alerting on and remediating files initially deemed safe but now known to be malicious.


eCSI: Next Step of The IT Security Evolution

Balázs Scheidler
Chief Technology Officer, BalaBit IT Security

Mobile, Secure, and Performant Access to Central Company Resources

Joachim Gietl
Head of Sales Department - Central and Eastern Europe, HOB GmbH & Co. KG
Mobile workplaces that utilize public networks have become standard in today’s business environments. Modern remote access solutions enable comfortable access to crucial business resources – but they also contain certain risks. This session introduces several options for accessing centrally stored company data in a secure manner. It addresses important topics such as multi-client capability, high availability, and usability in case multiple devices are employed. In addition to that, various scenarios such as access to terminal servers, exchange and file servers are introduced.

Coffee Break, Partner's Exhibition


Zero-Day Protection Today and Tomorrow

László Csósza
Security Engineer, Check Point Software Technologies Ltd.

The threat landscape is rapidly evolving away from the days of network disruption to a more prevalent and persistent generation of cybercrime, hactivism, cyber espionage, and targeted attacks. Check Point ThreatCloud provides immediate protection against new, unknown, and targeted attacks before they infect the network.This protection eliminates the vulnerability gap that existed between when an infection occurs and the time a new detection signatures becomes available.


Fighting threats with logs?

Péter Gyenese
Security Channel Leader, CEE, IBM Magyarországi Kft.

A lot has happened in 2014 in the area of IT Security. Many people call 2014 as the year of the breaches, so one important question arises - what can we do to protect our critical infrastructure and data? We all know, that there will be no silver bullet to solve the issue, but we can use logs and analytics as an ally to help fight against threats. With the information we can gather from logs, the integrated security solutions of IBM and other companies there is a way to strengthen security posture of our organizations .


Protection of The Critical Infrastructure on The Field

Gábor Hirsch
Sales Manager, Fortinet
Fortinet, as a market leading network security vendor provides end-to-end solutions to the Enterprise, Carrier and Data Center customers. The wide product portfolio covers the SCADA security as well. The presentation is briefly discussing the Fortinet product portfolio, concentrating to the SCADA security and its security management and monitoring tools.

Panel Discussion with The Participation of The Morning Speakers

András Szabolcs
Board Member, ISACA Budapest Chapter, Moderator of the Panel Discussion

Buffet Lunch and Networking


IDC IT Security Arenas: parallel sessions in the given topics with two presentations and a round-table discussion (Parallel Sessions)

'Human Factors in Information Security Management' Arena

13:55 - 14:20

The Weakest Link

Ákos Solymos
CISM, CRISC, Head of Information Security Department, Security Directorate, Erste Bank
14:20 - 14:45

How to Update a Human Firewall? – User Security Awareness Requirements at an Insurance Company

Tibor Földi
CISO, CIG Pannónia Életbiztosító Nyrt.
14:45 - 15:15

Interactive Panel Discussion

'New Trends and Challenges in IT Security' Arena

13:55 - 14:20

Current Challenges of The Vulnerability of Information Systems

Dr. Boldizsár Bencsáth
Assistant Professor, Laboratory of Cryptography and System Security
14:20 - 14:45

What we do not know, we cannot protect - what is the use of network admission control, anyway?

András Szemmelveisz
Senior Department Manager, KBC Group Magyarországi fióktelepe
14:45 - 15:15

Interactive Panel Discussion

'Risk Management, Compliance and IT Policy' Arena

13:55 - 14:20

Business Goals vs. Information Cecurity - Are their directions the same?

Pál Kerékfy
ex CIO at Deloitte CEE, Honorary Member of Hungarian IT Leaders Association
14:20 - 14:45

Advice to The Leader Who Has Nothing to Gain but Everything to Lose

Tamás Gaidosch
Independent IT Risk Management Expert, CISA, CISM, CISSP
14:45 - 15:15

Interactive Panel Discussion


Closing Remarks, End of The Conference

General Information


19th March 2015, Thursday, from 08:15


Hotel Novotel Centrum, 1088 Budapest, Rákóczi út 43-45.

Conference language

Hungarian and English with simultaneous translation

Delegate fee

  • For governmental institutions and end-user companies:

free of charge (registration is required)

  • For the Media:

exclusively with preliminary accreditation of IDC Hungary

  • For ICT vendors, ICT consultancy companies, and not accredited media:

180.-EUR/pax + 27% VAT

Registration fee includes conference participation, documentation and meals but does not cover parking fee.


Cancellation is permitted only in writing, at least 5 working days before the event. In case of cancellation within 5 days before the event, the participant is obligated to pay the whole admission fee.

Dress Code

Business formal


We reserve the right of refusal to registration and the modification of the program.


The Voice of Attendees - Status of Security Deployments in CEE

Source: IDC CEE Security Roadshow 2014 Attendee Survey, N=347

Polish Staff Most Trusted in CEE When it Comes to IT Security

IT managers in Poland are probably more relaxed than their international counterparts in Central and Eastern Europe. The main reason: trust. A recent IDC survey creates an informal trust index that indicates IT managers in Poland, relative to managers in other CEE countries, are less worried about staff messing up carefully configured systems or leaking data. read more

IDC Worldwide Security Predictions for 2015

IDC's security research team has identified 10 strategic security decision imperatives that enterprises will be called upon to address over the next several years. The decision imperatives are all designed to move the approach to enterprise security from reactive to proactive.

IDC FutureScapes are designed to help shape IT strategy and planning for the enterprise by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future.

FutureScape Security Predictions for 2015 and beyond:

1. Risk-Based Budgeting – By 2016, 25% of large enterprises will make security-related spending decisions based on analytical determinations of risk.
2. Biometric Identification – Mobile devices have biometric capabilities, and, in 2015, we expect that 15% of those devices will be accessed biometrically. That number will grow to 50% by 2020.
3. Threat Intelligence – By 2017, 75% of large enterprises will receive custom threat intelligence information tailored to their industry, company, brand, and environment.
4. Data Encryption – By the end of 2015, 20% of proprietary data in the cloud will be encrypted. By 2018, that will quickly rise to 80%.
5. Security SaaS – Security software as a service (SaaS) will represent a greater share of enterprise security spending. By the end of 2015, 15% of all security will be delivered via SaaS or be hosted, and this will exceed 33% by 2018.
6. User Management – By 2016, multi-factor authentication will be the primary method of access control used by 20% of enterprises for highly privileged or otherwise sensitive accounts.
7. Hardening Endpoints – By 2017, 90% of an enterprise's endpoints will utilize some form of hardware protection to ensure that endpoint integrity is maintained.
8. Security as a Feature – Security features are rapidly being embedded into business applications. By 2018, 25% of security applications that were previously purchased independently will be incorporated directly into business applications.
9. Software Security – By the end of 2015, 10% of all enterprise commercial web sites and mobile applications will have been scanned for vulnerabilities; by 2018, 40% will be scanned regularly.
10. Executive Visibility – By 2018, a full 75% of chief security officers (CSO) and chief information security officers (CISOs) will report directly to the CEO, not the CIO.

An audio replay of IDC FutureScape web conferences on security are available by registering here:


Platinum Partner(s)

Gold Partner(s)

Exhibition Partner(s)

Official support(s)

Media Partner(s)


To access the content, please enter the password you have received from IDC. If you do not have a password, please contact Szabolcs Uveges via email, at


Szabolcs Uveges

Senior Conference Manager

+36 209 674 428

Gabor Fauszt

Country Manager, CEE Regional Account Manager

+36 205 736 317

About IDC

51 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit