IDC Security Roadshow 2020

Security in the New Normal

Warsaw, June 5, 2020


The health and safety of our customers and employees is IDC's number one priority. As regional details around the Coronavirus (COVID-19) become clearer, we have been closely monitoring the situation in order to respond accordingly.

Due to the current regional situation, IDC have taken the decision to make the IDC Security Roadshow 2020 a virtual conference. We will be hosting the event using Hopin Platform. This decision was taken as the safety of our sponsors, delegates and staff is paramount, and our communities health should be placed above all else.


The virtual conference will be held on June 5, 2020

We have made this choice out of an abundance of caution and believe it is the correct decision given the evolving public health concerns. The potential risk to the well-being of the event attendees and our staff is something IDC takes seriously. 

General Information


Hopin Platform


June 5, 2020


10.30 am - 1.00 pm


The COVID-19 pandemic brought disruption to businesses on an unprecedented scale, yet many of the challenges were already present: enablement of secure digital transformation, remote workers accessing corporate applications and data from outside a secure perimeter, and cybercriminals probing for any vulnerability through which to penetrate the network.

The crisis invoked response at speed and scale, unveiling gaps in security programs. There remain further challenges, such as building cyber resilience in “the new normal” and ensuring business continuity. Risk assessment frameworks need to be updated and cyber exposure re-evaluated, while building digital trust takes on even greater importance as digital relationships become pervasive. Finally, as organizations look to the future and beyond COVID-19, they should seek to assess which aspects of the new normal have brought broader business benefits and should be retained.

Despite the current turbulence, security must sustain the strategic focus in line with broader enterprise strategy and be the business partner.

Advisory Board

Key Topics


Security Operational Excellence

Enterprises need to build "security by design" into company culture and outsource to fill any gaps around scale and capability.


Risk Management

A risk-driven security strategy will have greater impact and justify security investment.


Building Resilience

A resilient infrastructure is crucial for maintaining operations despite attacks or outages, thus minimizing risk and losses.


Time Event & Speakers

Networking Break & Time for Commercials


Welcome word & introduction to LEADERSHIP & BUSINESS CONTINUITY block

Ewa Lis-Jezak
Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Never before have so many organizations found themselves in such a deep crisis so quickly and at the same time. There were no plans for action. The most important thing was to maintain business continuity. Cyber security came to the fore. We left "panic mode" but are we ready for New Normality? Where are our weaknesses to be turned into strengths?



IDC Keynote: Security and Business Continuity Through COVID-19 and Beyond

Mark Child
Research Manager, European Security, IDC CEMA

The current situation is a massive hurdle for security teams to overcome, equipping and enabling all staff to work from home effectively. Traditional security model based on the enterprise network has been shown to be insufficient and majority of CISOs do not have any business continuity plans in place to deal with this kind of emergencies. Initially security seemed not to be a top priority as the business imperative around productivity comes first and priority is given to enable employees to carry on working with as little disruption as possible. The crisis has prompted however companies to set up business continuity plans to ensure operations run smoothly and without much impact. This requires the necessary technological changes, processes adjustments, employee trainings and new security procedures. Organizations need to develop business continuity plans that are heavily focused on securely enabling remote access use cases.


Cyber Security Is A Business Risk, Not Just an IT Problem

Adam Marczyński
Chief Security Officer, Chmura Krajowa

As financial and operational impacts of cyberattacks and data breaches rise, what some leaders once viewed as a pure technology issue is now recognized as a broader business risk. The coronavirus pandemic has made it harder for companies to maintain security and business continuity, causing significant disruption to business-as-usual operations. With business contracting during the COVID-19 crisis, organizations need to take a different approach – with top management at the very top thinking about cyber risks as not just a technology issue but a significant business problem to be solved.


Perception vs Reality

Piotr Pobereźny
Major Account – Solution Architect, CEE Region, QUALYS

Cyber-threats evolve just like the digital world around us. The more we become "digital", the more vulnerable we are. Cyber security has become an integral part of everyday life and reaches far beyond IT teams. Visibility is the key, and awareness is the way. How do we reach audiences who are not interested or simply do not understand "our" language? How to engage and maintain the attention of Management Boards as key partners in this process?


The most worrying security risk today

Jolanta Malak
Regional Sales Director, Fortinet

Security teams must understand how their networks are connected and where risk is concentrated, just like health officials need to be able to monitor disease hotspots and high-risk areas. With this insight, cybersecurity managers can better understand where to focus their resources, enforce policies, and mitigate risk.


Security - an insurance policy or business enabler?

Ireneusz Piecuch
Managing Partner, IMP Law Firm
Małgorzata Olszewska
Director of Technology, Agora
Mirosław Maj
Fundacja Bezpieczna Cyberprzestrzeń
Robert Kanigowski
Head of Information Security & Business Continuity, Provident Polska S.A.


Ewa Lis-Jezak
Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Cyber security is no longer just a technology issue, it is a business one too. ... This is especially important as businesses are more digitized


Time for Commercials



Introduction to OPERATIONAL EXCELLENCE block

Ewa Lis-Jezak
Regional Director, & MD - Poland & The Baltic States, IDC CEMA
Robert Grabowski
Head of CERT, Orange Polska

What does it mean to "do the right thing"? If we were to do the most important thing to strengthen our safety in the New Normality? What would that be? Wash your hands? How does that sound in the language of cyber security?


Transforming Detection into Prevention: Security Operations Excellence with Connected Security

Aviram Zrahia
Security Evangelist, Juniper Networks

Connected Security is all about extending security to all points of connection across the network, allowing the network infrastructure itself to play a role in organizational security. One of the key principles of this concept is the automatic sharing of Cyber Threat Intelligence (CTI), transforming detection in one place into prevention in other places. The sharing drives security operations excellence among organizations or between security products, across geographies or within the same network. This session will explain some related terminology as well as the need for a Threat Aware Network design to utilize machine learning for detection and automation for response, so the overall dwell time of attacks is reduced.


Case Study



Introduction to CYBER-RESILIENCE block

Ewa Lis-Jezak
Regional Director, & MD - Poland & The Baltic States, IDC CEMA
Michał Nieżurawski
Head of Global IT Security Competence Center, DB Schenker

We're not defenseless against COVID-19. How do you strengthen your resistance to infection? We are not defenseless against hacking attacks. How to strengthen your resistance to attacks?  


Cybersecurity in a Digital-First World

Matt Cooke
Cybersecurity Strategist, Proofpoint, Inc.

Criminals capitalise on fear, uncertainty and anxiety. They socially engineer and exploit people by leveraging topical lures that are more likely to get people to click on malware and phishing attempts. And as more of our users work from home, collaborate via digital platforms, and process data from unsanctioned personal devices, the controls we may have implemented to protect the corporate network are rendered obsolete. Yet criminal motivations may be the same and both their opportunity and attack surface have just dramatically increased.

In this short talk, we will highlight the changes taking place in the threat landscape and the steps you can take to protect your most vulnerable users that have privileged access and that are under attack today.


Hot SeatThreat Forecast | Is COVID-19 really the biggest fear for CISO's nowadays?

Peter Elmer
Security Expert, EMEA, Office of the CTO, Checkpoint Software Technologies Ltd.

Even if an organization is equipped with the most comprehensive, state-of-the-art security products, the risk of being breached cannot be completely eliminated. Therefore, strong attack containment and remediation capabilities are critical.


Budgetary management from a CISO perspective in times of rapid change

Piotr Stecz
Chief Information Security Officer, Adamed
Marcin Kobyliński
Cybersecurity Director, ISSA Poland, ISSA Polska
Dariusz Czerniawski
Group IT & Cloud Security Manager, International Personal Finance Plc

In order to properly prepare the budget and justify all the costs included in it, the CISO must first and foremost develop a strategy for action based on concrete objectives. How to do this under conditions of uncertainty, new threats and unknown vulnerabilities in an ever-changing regulatory environment?


Intro to the game

Mirosław Maj
Fundacja Bezpieczna Cyberprzestrzeń

Creating a budget to maintain and improve resilience is no easy task. To complicate matters, future needs are uncertain: every year there are new threats and vulnerabilities, new technologies, and often new regulatory requirements. The main idea and the task during the game is to build the best cybersecurity system to protect players’ organizations against the most likely threats and to effectively react during the incident mitigation phase.




Game summary & winner announcement

Mirosław Maj
Fundacja Bezpieczna Cyberprzestrzeń
Ewa Lis-Jezak
Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Of the many well-publicized cyber-attacks that have occurred in the past decade, at least one was noteworthy because it failed to bring a company down. The online retailer immediately announced the launch of measures to reduce the impact of the crisis. Customers and security experts commended company’s incident response strategy and transparency throughout the crisis. Three weeks after the breach was announced, Amazon’s share price was higher than before it happened.


Event summary

Ewa Lis-Jezak
Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Networking Break

Who Is It For?

The IDC Security Roadshow has been designed as an information-sharing forum and networking platform for select groups of 70–150 senior security decision makers from the most prominent enterprises in each country.
Every year, IDC conducts surveys and collects feedback from our event audiences. As such, the agenda is guaranteed to reflect the most pressing global security challenges, while also addressing the current needs of the local market and providing ample scope for in-depth and engaging discussions.

Photo Gallery

Last year recap





Utility Grid Attacks Highlight the Need for Digital Trust

Digital trust can have catastrophic consequences for organizations, especially those in highly competitive or commoditized industries. It is crucial for companies to recognize this trend and respond to it accordingly.



Cybersecurity Challenges in the Time of the New Coronavirus

Apart from the suffering that the virus has brought to many, the main victim of what is now a pandemic is the global economy. The Fed in the US has already cut interest rates, Chinese manufacturing PMI has dropped almost 30%, and investors are fleeing to buy gold.But where does this leave us from a cybersecurity perspective?



Technology Can Save or Kill You: IoT Security in Healthcare

According to the IDC IoT Global Survey 2019, European healthcare organizations see both security concerns and opportunities in the implementation of IoT projects. Internet of Things solutions in the healthcare environment can be used easily to secure environments, patients and workers but also as a weapon that can be used by hackers.



Platinum Partner
Platinum Partner
Gold Partner
Gold Partner
Silver Partner

Become a Partner

Contact Us

Karolina Dzwonnik

Conference Manager

+48 694 344 573

Katarzyna Wodzinowska

Senior Account Manager

+4822 548 40 50

About IDC

56 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit