IDC Adriatic Security Summit 2020

Elevating Security for Digital Trust and Risk Management

Belgrade, June 4 - June 5, 2020


Statement on the Postponement of IDC Adriatic Security Summit due to the Coronavirus

The health and safety of our customers and employees is IDC's number one priority. As regional details around the Coronavirus (COVID-19) become clearer, we have been closely monitoring the situation in order to respond accordingly.

After careful consideration, IDC has made the decision to re-schedule our Security Summit in Belgrade originally scheduled for April 6-7, 2020.

The conference will be held on June 4 - 5, 2020

We have made this choice out of an abundance of caution and believe it is the correct decision given the evolving public health concerns. The potential risk to the well-being of the event attendees and our staff is something IDC takes seriously. Please visit our conference website for the event updates.


The security industry has passed an inflection point, security operational excellence now a prerequisite for every organization to function securely, efficiently, and effectively. Risk management goes hand in hand with that, quantifying security measures in the context of the business to demonstrate the business value of security.

IDC views the achievement of lasting "digital trust" as the apex — the realization of full alignment between security and business, providing a fundamental basis of trust that connects the organization, employees, partners, and customers

IDC’s Security Roadshow 2020 will provide you with the vision to navigate the security landscape of the new digital business environment.

Why Attend


Explore key trends shaping security decisions across the region


Learn about proven best practices through real-life case studies


Get inspired by the professional stories shared by industry pioneers and IDC analysts


Gain a clearer understanding of current security challenges


Engage 1-2-1 with the region's foremost ICT pioneers


Time Event & Speakers

Registration and welcome brunch


Introductory keyword and welcome

Nevena Conic
Regional Manager, Adriatics

Cybersecurity Risk is a Board-Level Issue

Biljana Cerin
Information Security and Risk Management Consultant and Director, Risk Services, Ostendo Consulting

For years we as the cyber security professionals have struggled to bring up to the management’s attention the importance of proper and timely dealing with the cyber security risks. We were dealing with obstacles such as understanding of the business versus technology terminology, understanding the exact nature of the cyber security risks, explaining to business what may be the consequences of having these risks materialize, and what appropriate actions the responsible business owners should take in order to mitigate them. We have established the understanding, with a help of compliance requirements and of regulations, although the most responsible companies did not have to wait for laws and regulations in order to set their risk management systems right. We have done a good job as a professional community, however, it is time to move forward, or one level up – cyber security, now more than ever, needs to be seen not only as the regular agenda point on management’s meetings, but also discussed as an important Board issue too. And the CISOs – Chief Information Security Officers, need to be prepared to step up once they are called to the Board meeting.

This presentation will give an overview of the contents that should be presented to the Board, ways to gather and structure the information on cyber security risks exposure, and methods of presenting it in a relatively short time given at the Board meetings, in a way that is understandable to the Board members in order for them to make informed decisions in alignment with their responsibilities. It will also examine the prerequisites for having such a successful cyber risk management system that can deliver the requested outcome at any moment in time - a clear picture of the cyber security risks exposure and expected trends for all the relevant stakeholders.


Elevating Security for Digital Trust

Mark Child
Research Manager, European Security, IDC CEMA

In the digital era, security is at the heart of everything. Security operational excellence is a prerequisite for every organization to function safely, efficiently, and effectively. Risk management is also crucial, as it involves the quantification of security measures in the context of the business to demonstrate the value of security. IDC views the achievement of lasting "digital trust" as the apex — the realization of full alignment between security and business, providing a fundamental basis of trust that connects the organization, employees, partners, and customers.


Presentation by Summit partner


Panel: How to Manage 3rd Party Risk

Jasna Fumagalli
Compliance, Security and Risk Management Director at Mercury Processing Services International
Jaka Erjavec
Head of IT Systems & Technology at Studio Moderna Group
Božidar Dajčman
Director of Physical and Information Security Governance, Nova KBM
Rajko Sekulović
Director of Operational Risk Management, Information Security and Business Continuity Directorate, Central Bank of Montenegro

Coffee break and 1-2-1 meetings


Introduction to Cyberfortress Game


IDC Connect Sessions – Small Interactive Group Work, Moderated by IDC

From IT to OT and ICS – Security and Convergence

Managing the security of operational technology (OT) and industrial control systems (ICS) is a challenge facing almost every organization – not just manufacturing companies. Comprehensive visualization and monitoring, interconnection of non-homogenous systems, resilience and uptime… these are just the beginning. Environmental and personnel safety, protecting against corporate espionage, and adhering to national security responsibilities are significant considerations too, requiring collaboration between security teams, operations, and the business. What can be done to address these challenges?

Prioritization in Security Operations

Security teams struggle with headcount and skills shortages, lack of budget, and lack of support and communication with other departments. What needs to be done to ensure not a minute or dollar is wasted? Risk assessment can guide investment and ensure vulnerability is addressed for the most critical and high-value assets. Threat intelligence provides detailed insights into the potential threats that could impact your organization’s infrastructure and systems. Automation and orchestration accelerate the response to security incidents and can mitigate damage. What else should be on the checklist for achieving security operational excellence?

Has the Time Finally Come for SecDevOps?

This has been on everybody’s lips since agile first began accelerating the release of vulnerabilities into production. The theory is sound, the numbers back it up, but in reality it’s been an incredibly hard nut to crack. Champions from business have been hard to find, resistance from dev has stalled endeavours, and even when those two hurdles are overcome, efforts have faltered on a lack of teams and adequate tooling. But we’ve come a long way in the last 5 years – is it finally SecDevOps’ hour?

Automation Masterclass – Do You Really Want to See into the Black Box?

Security automation is like a late-night hook-up with a mysterious stranger – desirable and scary at the same time. Security directors would like nothing more than automating classification and response to alerts to reduce the administrative burden on their Tier 1 analysts and free them up for other tasks. BUT, what is that automation black box actually doing? Do you risk false positives when you switch it on? What’s the business impact of an incorrectly blocked account or a quarantined system? Some security leads call for vendors to open up the box. But do you really have the time and resources to dig into every analysis? Doesn’t that negate the original aim of security automation? Why can’t we just trust each other??

Security Services – No Silver Bullet, but a Safety Net that Might Be the Next Best Thing

Security teams are overstretched: headcounts are limited and may be shared with the general IT team - dedicated resources needed to stay abreast of the latest security threats are often lacking. No surprise then that managed security services are the fastest-growing segment of the security market, according to IDC data. Nevertheless, many organizations still have reservations about entrusting their security operations to third parties. Is that reluctance justified? What questions should a security lead ask of prospective MSS providers? What are the primary benefits and what should be considered with caution?

The Benefits of a Governance Model for Security 

Digital transformation (DX), the expansion of infrastructure and the adoption of new technologies bring demand and uncertainty in terms of securing business processes and digital assets. Adopting standards and governance models can drive the achievement of long-term security goals and strategy, making sure it is aligned with business objectives. What are the benefits of a governance approach, and what frameworks and standards should organizations consider when seeking the optimum solution for their business? 


The Art of Offensive Security Using Open Source

Mihailo Tomić
Co-founder of Trickest
Nenad Zarić
CEO and co-founder of Trickest

Although crowdsourced security and the utilization of open source are on the rise, offensive security is somehow a neglected craft.

During this talk, we will take a closer look at how the offensive cybersecurity community works, why is it constantly innovating and evolving, and how companies are powerless against it. We will walk through the chronicles of the dark side, shed some light on it and explain the differences between a breach and a bug bounty. Trust us, they are similar.



Networking Cocktail






Platinum Partner
Premium Gold Partner
Gold Partner
Gold Partner
Networking Partner
Networking Partner

Become a Partner

Key Topics


Security Operational Excellence

Enterprises need to build "security by design" into company culture and outsource to fill any gaps around scale and capability.


Risk Management

A risk-driven security strategy will have greater impact and justify security investment.


Security Governance

Setting a governance model that links business objectives and security goals is key to sustaining enterprise performance.


Digital Trust

Trust is the outcome of full alignment between security and business throughout the organization, enhancing governance, transactions, and supply ecosystems.


Building Resilience

A resilient infrastructure is crucial for maintaining operations despite attacks or outages, thus minimizing risk and losses.


AI, ML, and Security Automation

Harnessing ML and AI for security automation empowers analysts to build security seamlessly into business processes.

Who Is It For?

The IDC Security Roadshow has been designed as an information-sharing forum and networking platform for select groups of 70–150 senior security decision makers from the most prominent enterprises in each country.
Every year, IDC conducts surveys and collects feedback from our event audiences. As such, the agenda is guaranteed to reflect the most pressing global security challenges, while also addressing the current needs of the local market and providing ample scope for in-depth and engaging discussions.

General Information


Radisson Collection Hotel, Old Mill Belgrade


June 4-5




Radisson Collection Hotel, Old Mill Belgrade

Bulevar Vojvode Mišića
Beograd 11000, Serbia

Contact Us

Irina Pokrajac

Conference Specialist

+381 63 520 251

Nevena Conic

Regional Manager, Adriatics

+381 63 173 25 76

About IDC

56 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit