IDC Day Tbilisi: Cloud, Security, Virtualization&Infrastructure Management 2016

This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC Day Tbilisi: Cloud, Security, Virtualization&Infrastructure Management 2016

They know where they're headed. Do you?

Tbilisi, May 31, 2016


IDC Day Tbilisi: Security Virtualization & Infrastructure Efficiency Roadshow 2016 is the part of the international roadshow, which covers 23 cities across Central and Eastern Europe including Sofia, Bucharest, Bratislava, Zagreb, Budapest, Baku, Almaty, Minsk, Warsaw, and others.

IDC Roadshow is an excellent occasion to meet analysts, independent experts, and industry leaders to discuss everything datacenter, security, cloud and mobility topics. IDC traditionally invites global visionaries as well as local ITC experts to address Georgian CIO community key pain points.

This year event will focus on Digital Transformation shift which sets out IT align to key business functions and dramatically changes the approach to technology adoption. How to deal with disruptive technologies? What are new priorities for CIO? What does this mean IT infrastructure ready for future? How does DX affect customer and employee behavior, both with compliance and data lifecycle management to the availability of high-quality data, loss prevention, and security issues? - these and other hot questions on IDC Day Tbilisi 2016.

Topics structured by key groups:

  • Rise of the Disruptive CIO: Flexibility and Agility vs Security and Standardization
  • Cloud Adoption Myths, Challenges and Best Practices​​
  • Key Components of Highly Effective IT Infrastructure
  • Security Priorities within Digital Transformation Strategy

Who Should Attend

  • Chief Security Officers, Directors of Enterprise Security, CIOs, CTOs, CISOs, IT Strategists
  • Privacy Officers, Network Security Managers, Server Application Managers
  • Antivirus, Email Monitoring, VPN, and 3A Managers
  • Heads of Digital Strategy, IT Managers, Heads of Departments
  • Purchase Managers, IT Specialists

Industries Represented

  • Banking and Financial Services Providers, Insurance and Pension Funds
  • Healthcare
  • Energy and Utilities
  • Government and Public Sector
  • Manufacturing , Wholesale and Retail Trading
  • Transportation and Logistics
  • Telecommunications and Media
  • Business Services


Time Event & Speakers

Registration & Welcome Coffee


Welcome Remarks from IDC

Vladimir Pozdnyakov
Country Manager, Ukraine, Belarus, Moldova, Caucasus

Keynote: Internet Identifiers. Your Most Undervalued And at Risk Assets?

Alexandra Kulikova
Global Stakeholder Engagement Manager Eastern Europe and Central Asia, ICANN

It might not be intuitive to think of IP addresses, domain names or protocol parameters as corporate assets which need protection measures and strategies. Yet the unique Internet identifiers lie at the core of business continuity whereby insufficient preemptive efforts to avert and/or mitigate their compromise could cause significant business loss. We’ll take a quick look at the ‘plumbing’ core of internet identifiers as at risk assets and possible tools of risk mitigation.



The Future of Malware Protection

Oleksandr Chubaruk
Sales Manager for Ukraine, Check Point® Software Technologies Ltd.

Hackers constantly modify their strategies and techniques to evade detection and reach corporate resources.

Zero-day and advanced persistent threats use the element of surprise to bypass traditional security, making these threats difficult to protect against—and very popular with hackers. Traditional sandboxing was designed to help with these types of threats, but cybercriminals have evolved their techniques, creating evasive malware that can avoid detection by many sandbox solutions. As a result, many organizations find themselves taking reactive steps to counteract infection, rather than preventing it in the first place.

To get ahead, enterprises need a multi-faceted prevention strategy that combines proactive protection that eliminates threats before they reach users, and state-of-the-art CPU-level exploit detection to expose even the most highly camouflaged threats.


Master your cloud from strategy to delivery

Roman Lobus
Business critical consultant, Hewlett-Packard Enterprise

Cloud computing radically changes the way infrastructure, applications, and information are sourced and consumed through highly scalable and elastic technology-enabled services on a pay-per-use basis. Today, IT organizations are moving beyond basic investigation towards cloud adaption for revenue growth and competitive advantage. We believe organizations may need to implement a hybrid delivery strategy that can leverage cloud services as part of their IT delivery and consumption strategy.

There is a way how to deliver these promises by leading organizations on a pragmatic journey to the cloud and hybrid delivery. We can help organizations understand the implications of the technology aspects of your strategy and also identify the people and process elements. This approach provides unconstrained access to IT resources that organization requires to fulfill their objectives and provides access to infrastructure anywhere, applications anywhere, and information anywhere


Coffee Break and Partners Exhibition


Keynote: CyberThreat Evolution 2016 and beyond

David Inaneishvili

Cyberthreats are developing at a fast pace, evolving, and becoming increasingly sophisticated.

Presentation will provide audience with an overview of contemporary threat actors and respective behavior changes, target surface change and innovative attack styles, including integrity attacks, ransomware, critical infrastructure attacks, while at same time evidencing the rise of cybercrime-as-a-service, involving sale of stolen information.

It will also provide some hints on how cybersecurity leaders shall adjust traditional defense approaches and adapt to new realities, such as actively sharing threat intelligence within and across Georgian and international communities.


Cyber Hygiene - Basic Information Security Processes

Pavel Sotnikov
Managing Director for Eastern Europe, Caucasus and Central Asia, Qualys

 • The job of CISO and what is expected from us

• The ABC (basic rules) of a CISO

• You cannot protect what you do not know

• Qualys AssetView - Free service to inventory your assets

• What to do after inventory - basic cyber hygiene rules

• Showcase of Qualys platform


Data Loss Prevention: Information Should Work on You, Not the Other Way Around.

Pavel Nazarevych
Head of Symantec/Veritas in the CIS countries and Georgia, MONT GROUP

Is data working on your company/organization or it is other way around? Data and information – what’s the difference from the security point of view?

This questions are sensitive issues in modern data loss prevention process for all kind of companies.

During presentation audience will get review of modern tools for classification, monitoring and leak prevention for all kind of digital data and information.

Speaker will share information about best practice and cases in data loss prevention field.


DCG -strategy of development

Oleg Gokun
Head of Corporate Department Relationship, Lenovo

Coffee Break and Partners Exhibition


Keynote: Experience of the investigation cyber-attacks on Blackenergy example - the story of one incident

Alexey Yasinskiy
Chief Information Security Officer, StarLight Media

In the presentation, I will share experience of investigation of one cyber security incident that has eventually evolved into a global investigation connected with an attack based on BlackEnergy that has hit a number of industries in Ukraine. As we progressed through investigation and performed a systematic retrospective analysis, we have mapped the attack to the Lockheed Martin’s Cyber Kill Chain methodology and thus I will refer to its structure during my story.


Enterprise Solutions update

Iryna Bernatska
System Consultant, DELL

Data and services protection - investment in the future

Rodion Tulsky
Territory Account Manager for CIS, Georgia, Ukraine, Moldova, Mongolia, Veeam

The speaker will address the issues of the complexity of the implementation of the availability, the consequences and results of the lack of planned data protection strategy


Round-table discussion with CIOs: "IT Security & Infrastructure Efficiency Best Practices"


Event Wrap-Up

General Information


Holiday Inn Tbilisi 
1 Twentysix May Square,  Tbilisi, Georgia, 0171

Conference Language

 The conference will be held in Russian and English


You can register online at the IDC web site.
For more detailed information please call our Kyiv office: +38 (044) 467 6722

Registration deadline for end-users: 27th of May 2016

FREE Attendance
Free attendance for senior IT representatives of end-user community, companies that purchase and operate IT and telecommunications products and services.
Free attendance is reserved for a total of 80 persons. Register today and get your free ticket!

Participation for IT vendors and consultants is on a fee basis.


Business & Casual


 If you cannot attend, a substitute delegate may attend in your place.  But registration for him/her is obligatory.

We reserve the right to refuse registrations.


Zhanna Kotliar
Conference Project Manager
IDC Ukraine
Voloska Str., 2
Kyiv, Ukraine, 04070
Tel/Fax: +38 (044) 467 6722


Gold Partner
Gold Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner

Become a Partner


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Nadia Karpova via email, at


Nadia Karpova

Sales Manager

About IDC

52 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit