IDC Security Roadshow 2020

The Future of Information Security: Trust in Digital Technologies

Moscow, October 29, 2020


The security industry has passed an inflection point, security operational excellence now a prerequisite for every organization to function securely, efficiently, and effectively. Risk management goes hand in hand with that, quantifying security measures in the context of the business to demonstrate the business value of security.

IDC views the achievement of lasting "digital trust" as the apex — the realization of full alignment between security and business, providing a fundamental basis of trust that connects the organization, employees, partners, and customers

IDC’s Security Roadshow 2020 will provide you with the vision to navigate the security landscape of the new digital business environment.

Why Attend


Explore key trends shaping security decisions across the region


Learn about proven best practices through real-life case studies


Get inspired by the professional stories shared by industry pioneers and IDC analysts


Gain a clearer understanding of current security challenges


Engage 1-2-1 with the region's foremost ICT pioneers


Time Event & Speakers

Registration, Coffee


Welcome Speech

Robert Farish
Vice President, IDC Russia & CIS

Event web application presentation


Five Trends that will Drive your Cybersecurity Program in 2020

Pete Lindstrom
Vice President of Security Strategies, IDC

In the world of Digital Transformation, cybersecurity plays a crucial role. Whether preparing for 5G on the edge, artificial intelligence at the core, or software-defined everything, enterprises have begun to realize that intelligent adversaries will be looking for ways to manipulate the confidentiality, integrity, and availability of their data and systems throughout the environment.

Traditional cybersecurity programs are built on formal processes and "doing the basics" in ways that don’t always apply to these transformative initiatives. Organizations need a way to align and adapt the principles and practices of the past with those of this new world in order to succeed.

This session will identify and describe five key trends driving cybersecurity and provide a roadmap for protection in the age of digital transformation.


Communication aspects of secure development and implementation of Agile methodology

Anatoliy Gubskiy
Head of Information Security Development, MegaFon

Panel discussion "Board of Directors vs CISO - is there a consensus?"

Andrey Suvorov
General Director, APROTECH
Gleb Ligachyov
IT Director, SO UPS
Timur Zhirnov
CIO, TC "Tsvetnoy"
Armen Gyulumyan
Vice President, Marsh
Yuriy Lysenko
Head of Information Security Department, Metallinvestbank

Coffee, Networking, Meetings


Don't Trust, Check. Zero Trust in Modern Companies

Sergey Zabula
Head of Partnering Engineering Group, Check Point Software Technologies

Machines Revolt or Automation vs. Bots

Pavel Zhivov
Senior System Engineer, Juniper Networks, Russia & CIS

In a world where automation is penetrating deeper and deeper into every process and every home, attackers are also widely using automation to increase the effectiveness of malware, phishing emails, etc. by increasing the scale, speed, and frequency of attacks.
By closing the detection-identification-neutralization loop, automated response in network security solutions helps network threat fighters ensure the shortest possible time to stop threats, reducing monotonous work and missed incidents, and freeing valuable time for experts to apply their skills and knowledge to other needed and important tasks.


Focus of attention. Examples of right and wrong SOC tasks

Alexey Pavlov
Head of Products and Services Presales Department, Rostelecom-Solar

Visual Data Protection as One of the Elements of Comprehensive Information Protection (3M)

Alisa Shevchenko
Marketing manager, 3M Russia

Tenerife News


Lunch, Networking, Meetings


Cyber studies by PWC "Cybersecurity. Episode I: Hidden treat"

Yuriy Veselov
Analysis and Risks Control Manager, PwC Russia

An interactive game that allows you to become a member of an imitated cyberattack that could happen in real life. It allows managers of organizations and enterprises  better understand what measures need to be taken to protect their organizations. and how to build an effective strategy to ensure information security in the company.


Foresight Session "The Future of Information Security: Fantasy and Reality. What Trends will be Relevant in 10 Years?

Lev Paley
Head of IT Security Department, SO UPS

Is my secretary a hacker? How employees have quietly become the most dangerous infringes

Roman Zhukov

1. Digital reality, a little bit about trends in Cyber Security and the views of ordinary users.
2. Top Google requests from ordinary users that Security doesn't know about.
3. Cases in practice: what users can do using just Google, YouTube and a little charm.
4. Portrait of the Cyber Security in the eyes of ordinary employees and why they are usually afraid to ask for help.
5. Conclusions: checklist for the Security to be convenient for the employees and to minimize the risks of "secretary hackers" appearance.


Three levels of information security

Evgeniy Matyushonok
Sales Director, SearchInform, Russia&CIS

Let's talk about integrated safety in three periods: past, present and future.


Immune Approach to Cybersecurity

Andrey Dukhvalov
Strategic Architect, Head of Advanced Technologies Department, Kaspersky Lab

New high-tech risks, their possible consequences, and minimization

Armen Gyulumyan
Vice President, Marsh

Panel discussion "Information Security Personnel in the Digital Economy Era"

Dmitriy Manannikov
Corporate Security Director, OZON
Maria Sigaeva
HR Director, Rostelecom-Solar
Sergey Demidov
Director of Information Security and Operational Risks, Moscow Exchange
Evgeniy Akimov
Сybersecurity Expert
Margarita Dingilevskaya
Senior Consultant Professional Recruitment, ManpowerGroup, Russia & CIS

IDC Closing Remarks


Cocktail Reception

Main Topics


Security Operational Excellence

Enterprises need to build "security by design" into company culture and outsource to fill any gaps around scale and capability.


Risk Management

A risk-driven security strategy will have greater impact and justify security investment.


Security Governance

Setting a governance model that links business objectives and security goals is key to sustaining enterprise performance.


Digital Trust

Trust is the outcome of full alignment between security and business throughout the organization, enhancing governance, transactions, and supply ecosystems.


Building Resilience

A resilient infrastructure is crucial for maintaining operations despite attacks or outages, thus minimizing risk and losses.


AI, ML, and Security Automation

Harnessing ML and AI for security automation empowers analysts to build security seamlessly into business processes.

General Information




September, 2



Who Is It For?

The IDC Security Roadshow has been designed as an information-sharing forum and networking platform for select groups of 70–100 senior security decision makers from the most prominent enterprises in each country.
Every year, IDC conducts surveys and collects feedback from our event audiences. As such, the agenda is guaranteed to reflect the most pressing global security challenges, while also addressing the current needs of the local market and providing ample scope for in-depth and engaging discussions.


Gold Partner
Gold Partner
Gold Partner
Exhibition Partner
Exhibition Partner
General Media Partner
General Media Partner
Gold Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner
Media Partner

Become a Partner


Contact Us

Daria Sorokina

Senior Conference Manager, IDC Russia

+7 495 9 747 747

Mariya Zhilina

Senior Account Manager

+7 495 9 747 747

About IDC

56 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit