IDC Security Roadshow Security in the New Normal

DIGITAL Event | Warsaw | June 5, 2020


The health and safety of our customers and employees is IDC's number one priority. As regional details around the Coronavirus (COVID-19) become clearer, we have been closely monitoring the situation in order to respond accordingly.

Due to the current regional situation, IDC have taken the decision to make the IDC Security Roadshow 2020 a virtual conference. We will be hosting the event using Hopin Platform. This decision was taken as the safety of our sponsors, delegates and staff is paramount, and our communities health should be placed above all else.


The virtual conference will be held on June 5, 2020

We have made this choice out of an abundance of caution and believe it is the correct decision given the evolving public health concerns. The potential risk to the well-being of the event attendees and our staff is something IDC takes seriously. 

General Information


Hopin Platform


June 5, 2020


10.30 am - 1.00 pm


The COVID-19 pandemic brought disruption to businesses on an unprecedented scale, yet many of the challenges were already present: enablement of secure digital transformation, remote workers accessing corporate applications and data from outside a secure perimeter, and cybercriminals probing for any vulnerability through which to penetrate the network.

The crisis invoked response at speed and scale, unveiling gaps in security programs. There remain further challenges, such as building cyber resilience in “the new normal” and ensuring business continuity. Risk assessment frameworks need to be updated and cyber exposure re-evaluated, while building digital trust takes on even greater importance as digital relationships become pervasive. Finally, as organizations look to the future and beyond COVID-19, they should seek to assess which aspects of the new normal have brought broader business benefits and should be retained.

Despite the current turbulence, security must sustain the strategic focus in line with broader enterprise strategy and be the business partner.

Event Highlights

We would like to thank all the delegates and the partners who participated at this event.

A selected group of IT and business leaders came together to network and learn from IDCs analysts, inspiring speakers and dedicated advisory board members, who were at the forefront of the lively and interactive discussion.

If you missed the event or if you would like more information on any of the topics we discussed, click the button below to watch a recording or access the post-event content.

Watch Video

Advisory Board

Key Topics


Security Operational Excellence

Enterprises need to build "security by design" into company culture and outsource to fill any gaps around scale and capability.


Risk Management

A risk-driven security strategy will have greater impact and justify security investment.


Building Resilience

A resilient infrastructure is crucial for maintaining operations despite attacks or outages, thus minimizing risk and losses.


Time Event & Speakers

Morning Networking


Welcome Word

Ewa Lis-Jezak

Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Never before have so many organizations found themselves in such a deep crisis so quickly and at the same time. There were no plans for action. The most important thing was to maintain business continuity. Cyber security came to the fore. We left "panic mode" but are we ready for New Normality? Where are our weaknesses to be turned into strengths?


IDC Keynote: Security and Business Continuity Through COVID-19 and Beyond

Mark Child

Research Manager, European Security, IDC CEMA

The current situation is a massive hurdle for security teams to overcome, equipping and enabling all staff to work from home effectively. Traditional security model based on the enterprise network has been shown to be insufficient and majority of CISOs do not have any business continuity plans in place to deal with this kind of emergencies. Initially security seemed not to be a top priority as the business imperative around productivity comes first and priority is given to enable employees to carry on working with as little disruption as possible. The crisis has prompted however companies to set up business continuity plans to ensure operations run smoothly and without much impact. This requires the necessary technological changes, processes adjustments, employee trainings and new security procedures. Organizations need to develop business continuity plans that are heavily focused on securely enabling remote access use cases.


Coronavirus vs computervirus

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Marcin Kobyliński

Supervisory Board President, ISSA Poland, ISSA Polska

Secure Cloud Receipe

Adam Marczyński

Chief Security Officer, Chmura Krajowa

As financial and operational impacts of cyberattacks and data breaches rise, what some leaders once viewed as a pure technology issue is now recognized as a broader business risk. The coronavirus pandemic has made it harder for companies to maintain security and business continuity, causing significant disruption to business-as-usual operations. With business contracting during the COVID-19 crisis, organizations need to take a different approach – with top management at the very top thinking about cyber risks as not just a technology issue but a significant business problem to be solved.


Perception vs Reality

Piotr Pobereźny

Major Account – Solution Architect, CEE Region, QUALYS

Cyber-threats evolve just like the digital world around us. The more we become "digital", the more vulnerable we are. Cyber security has become an integral part of everyday life and reaches far beyond IT teams. Visibility is the key, and awareness is the way. How do we reach audiences who are not interested or simply do not understand "our" language? How to engage and maintain the attention of Management Boards as key partners in this process?


The most worrying security risk today

Jolanta Malak

Regional Sales Director, Fortinet

Security teams must understand how their networks are connected and where risk is concentrated, just like health officials need to be able to monitor disease hotspots and high-risk areas. With this insight, cybersecurity managers can better understand where to focus their resources, enforce policies, and mitigate risk.


Security - an insurance policy or business enabler?

Ireneusz Piecuch

Managing Partner, IMP Law Firm

Małgorzata Olszewska

Director of Technology, Agora

Mirosław Maj

Prezes, Fundacja Bezpieczna Cyberprzestrzeń

Robert Kanigowski

Head of Information Security & Business Continuity, Provident Polska S.A.

The trend of digitalising everything - one of the COVID-19 outcomes - is a great opportunity to change how the role of cybersecurity and CISO are perceived in the organisation. Is IT security a cost or a source of profits? Is it rather an insurance policy or a business enabler?


Wrap Up

Ewa Lis-Jezak

Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Short Break


Why we were not surprised?

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Michał Nieżurawski

Head of Global IT Security Competence Center, DB Schenker

We're not defenseless against COVID-19. How do you strengthen your resistance to infection? We are not defenseless against hacking attacks. How to strengthen your resistance to attacks?  


Transforming Detection into Prevention: Security Operations Excellence with Connected Security

Aviram Zrahia

Security Evangelist, Juniper Networks

Connected Security is all about extending security to all points of connection across the network, allowing the network infrastructure itself to play a role in organizational security. One of the key principles of this concept is the automatic sharing of Cyber Threat Intelligence (CTI), transforming detection in one place into prevention in other places. The sharing drives security operations excellence among organizations or between security products, across geographies or within the same network. This session will explain some related terminology as well as the need for a Threat Aware Network design to utilize machine learning for detection and automation for response, so the overall dwell time of attacks is reduced.


Identity Theft is Not a Science Fiction

Krzysztof Liedel

Head of Information Analysis Institute, Collegium Civitas

Marcin Kobyliński

Supervisory Board President, ISSA Poland, ISSA Polska

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

This year there was a data leak at the Warsaw University of Technology and the leakage included sensitive data of students and employees. Identity theft is not an isolated incident anymore and it is considered to be one of the fastest growing forms of crime. It can be avoided but it requires knowledge, planning, awareness and increased vigilance.


Cybersecurity in a Digital-First World

Matt Cooke

Cybersecurity Strategist, Proofpoint, Inc.

Criminals capitalise on fear, uncertainty and anxiety. They socially engineer and exploit people by leveraging topical lures that are more likely to get people to click on malware and phishing attempts. And as more of our users work from home, collaborate via digital platforms, and process data from unsanctioned personal devices, the controls we may have implemented to protect the corporate network are rendered obsolete. Yet criminal motivations may be the same and both their opportunity and attack surface have just dramatically increased.

In this short talk, we will highlight the changes taking place in the threat landscape and the steps you can take to protect your most vulnerable users that have privileged access and that are under attack today.


What's new on the threat map?

Ewa Lis-Jezak

Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Robert Grabowski

Head of CERT, Orange Polska

What does it mean to "do the right thing"? If we were to do the most important thing to strengthen our safety in the New Normality? What would that be? Wash your hands? How does that sound in the language of cyber security?


Is COVID-19 really the biggest fear for CISO's nowadays?

Peter Elmer

Security Expert, EMEA, Office of the CTO, Check Point

Even if organizations have best-in-class security products, the risk of a hacking attack cannot be completely dismissed. That is why the competences to stop escalating attacks and remove possible consequences are essential. What is the greater threat to an organisation - COVID-19 or just... a human being?


"Cyber Fotress" - playing to win

Mirosław Maj

Prezes, Fundacja Bezpieczna Cyberprzestrzeń

Creating a budget to maintain and improve resilience is no easy task. To complicate matters, future needs are uncertain: every year there are new threats and vulnerabilities, new technologies, and often new regulatory requirements. The main idea and the task during the game is to build the best cybersecurity system to protect players’ organizations against the most likely threats and to effectively react during the incident mitigation phase.


Protect the "Cyber Fortress"!

We invite our guests to join the game - it will be hosted in the "Sessions" Tab.


Budgetary management from a CISO perspective in times of rapid change

Piotr Stecz

Chief Information Security Officer, Adamed

Ewa Lis-Jezak

Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Dariusz Czerniawski

Group IT & Cloud Security Manager, International Personal Finance Plc

In order to properly prepare the budget and justify all the costs included in it, the CISO must first and foremost develop a strategy for action based on concrete objectives. How to do this under conditions of uncertainty, new threats and unknown vulnerabilities in an ever-changing regulatory environment?


Game summary & winner announcement

Mirosław Maj

Prezes, Fundacja Bezpieczna Cyberprzestrzeń

Thank You | Event Wrap Up

Ewa Lis-Jezak

Regional Director, & MD - Poland & The Baltic States, IDC CEMA


Who Is It For?

The IDC Security Roadshow has been designed as an information-sharing forum and networking platform for select groups of 70–150 senior security decision makers from the most prominent enterprises in each country.
Every year, IDC conducts surveys and collects feedback from our event audiences. As such, the agenda is guaranteed to reflect the most pressing global security challenges, while also addressing the current needs of the local market and providing ample scope for in-depth and engaging discussions.

Photo Gallery

Watch IDC Security Roadshow 2020 #ONLINE






Utility Grid Attacks Highlight the Need for Digital Trust

Digital trust can have catastrophic consequences for organizations, especially those in highly competitive or commoditized industries. It is crucial for companies to recognize this trend and respond to it accordingly.



Cybersecurity Challenges in the Time of the New Coronavirus

Apart from the suffering that the virus has brought to many, the main victim of what is now a pandemic is the global economy. The Fed in the US has already cut interest rates, Chinese manufacturing PMI has dropped almost 30%, and investors are fleeing to buy gold.But where does this leave us from a cybersecurity perspective?



Technology Can Save or Kill You: IoT Security in Healthcare

According to the IDC IoT Global Survey 2019, European healthcare organizations see both security concerns and opportunities in the implementation of IoT projects. Internet of Things solutions in the healthcare environment can be used easily to secure environments, patients and workers but also as a weapon that can be used by hackers.



Platinum Partner
Platinum Partner
Gold Partner
Gold Partner
Silver Partner


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Karolina Dzwonnik via email, at

Contact Us

Karolina Dzwonnik

Conference Manager

+48 694 344 573

Katarzyna Wodzinowska

Associate Sales Director, CEE Sales, IDC Poland

+48601 606 962

About IDC

56 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit