IDC Security Forum The emergence of a successful and secure organization

DIGITAL Event | May 20, 2021

Overview

This decade has already provided many lessons. One is that the mantra “never let a good crisis go to waste” could have been written for the cybercriminal fraternity. Another is that the concept of digital trust is rapidly becoming a business imperative in the digital era. At the heart of this all, as always, is security: the critical barrier between data integrity and compromise and a fundamental building block for digital trust. But trust encompasses so much more. From privacy and compliance to sustainability; from ecommerce to trusted ecosystems; and from ethics and transparency to brand reputation and loyalty. Engendering digital trust is a business imperative, but it requires leadership and governance from board level to ensure that it becomes part of the very fabric of the business.


Event Highlights


We would like to thank all the delegates and the partners who participated at this event.

A selected group of IT and business leaders came together to network and learn from IDCs analysts, inspiring speakers and dedicated advisory board members, who were at the forefront of the lively and interactive discussion.

If you missed the event or if you would like more information on any of the topics we discussed, click the button below to watch a recording or access the post-event content.


Watch Video

General Information

 

Digital Format

 

May 20

 

9:30-12:00

Audience

Designed as an information-sharing forum and networking platform for select groups of senior security decision makers and security experts from the most prominent enterprises in Hungary.
 
CISOs, CSOs, Directors of Enterprise Security, CIOs, CTOs, Privacy Officers, Risk Managers, Auditors from organizations maintaining critical infrastructure & large data processing centers.

Key Topics

 

DIGITAL TRUST & LEADERSHIP

 

  • Compliance is the bare minimum. What are other imperatives for building digital trust?
  • Next role for the CISO: Chief Trust Officer?

 

 

SECURITY & THE BUSINESS

 

  • Risk management — aligning security with business & trust goals
  • Limited resources – managed security services
  • Hybrid environments: Cloud, Multicloud

 

 

FOUNDATIONS OF TRUST TECHNOLOGIES & ELEMENTS

 

  • Data lost management
  • Using automation to overcome cyber security challenges
  • Bringing cryptographic capabilities to hybrid and multicloud environments
  • Network & security convergence, with a slice of cloud management — ensuring availability, performance & resilience

 

Agenda

Time Event & Speakers
9:30

Surprise Guest

9:33

Welcome Address

József Bakk

Country Manager, IDC Hungary

Tamás Barna

IT-security expert

 

9:36

From Secure to Trusted: A Journey to Digital Leadership

Mark Child

Research Manager, European Security, IDC CEMA

The past year has been characterized by dramatic transformation and a shift of engagement models from physical to digital. Relationships in the digital sphere need to be underpinned by trust – which can take a long time to accrue yet be easily lost. What drives trust between an organization and its employees, its partners, and its customers? Security is a core pillar, aligned with risk. Privacy and compliance are also of paramount importance. But ethics and sustainability or corporate social responsibility are also on the radar. To become a trusted digital business requires focus on multiple disciplines; however, without trust those fundamental business relationships will not thrive.

9:46

The impact of artificial intelligence and machine learning on cyberspace security

Roland Kovács

Head of Information Security Department, OTP Bank Plc.

An IT device with an Internet connection is tried to be hacked every 39 seconds on average, but after the first successful move, the human attacker is still there to decide how to proceed. Artificial intelligence, on the other hand, will plan each step on its own and make decisions. It attacks continuously, 7/24 hours, in the most imperceptible way. Have there ever been attacks with the support of artificial intelligence? In which technologies can we encounter artificial intelligence? More and more manufacturers and researchers are developing a solution supported by artificial intelligence for defense purposes. What are the benefits of doing our business with the support of artificial intelligence and machine learning, and are there any dangers?

10:00

Lessons to minimize the effectiveness of cyber attacks at our company

Árpád Hódy

Senior tech specialist manager, Microsoft

High-impact changes usually occur almost explosively in a short period of time. This is also true for technological change, innovation, or catastrophic cyber attacks that can change the future of companies and those who work there, from one moment to another.

In Árpád Hódy's presentation, you can learn from industry experiences, what different rules exist in war and why it is a real professional challenge to rebuild the company's entire IT system after loosing the war. And also to build castles in peacetime so that we only have to win battles, is still much more effective.

10:12

POLL Question Break

József Bakk

Country Manager, IDC Hungary
10:15

Optimal level of security automatically

Árpád Tóth

Country Manager Hungary, Enterprise Account Manager South-East Europe, Kaspersky

Suppose your company's endpoint protection is satisfactory. What is the reason for investing in additional solutions in addition? Too much to budget and spend?

Above all, the endpoint protection solution must pre-filter events fully effectively before more advanced solutions (e.g. EDR, Sandbox are included in the picture). The vast majority of threats need to be automatically identified at the earliest point in the counter-attack chain and the necessary countermeasures taken, and the smaller the overall impact of the threats on resources and the extent of the damage to our wallets. The majority of security incidents (approximately 90%) are immediately addressed by a good EPP solution and do not occupy either the EDR solution or security personnel who can focus on more advanced and therefore more dangerous threats.

What about the remaining, much more dangerous 10% of pests?

10:25

Digital Trust in Healthcare

Ákos Hazslinszky

IT Director, Budai Egészségközpont

József Bakk

Country Manager, IDC Hungary

Interview with Ákos Hazslinszky, IT Director of the Buda Health Center

Like many other sectors, healthcare has been hit hard by the pandemic, accelerating the pace of digitalisation. We’ve never talked about health as much as we did last year. Even a decade ago, IT security was not the first thing to come to mind when it came to healthcare, but the blackmail attacks of recent years and the digital renewal of the sphere have also put the sector in the spotlight. How did the pandemic transform the sector? What strategy is being used to address IT security issues now, and what to expect in the future? Join the IDC Security Roadshow, where we talk to Ákos Hazslinszky, the CIO of the Buda Health Center.

10:37

Interoperability and automation of inhomogeneous cyber defense systems

Zoltán Kiss

Cybersecurity Expert, Fortinet

Until recently, large companies used various cyber defense tools to address threats, leading to silo-like system operations.

This has increased the congestion, complexity and associated operating costs for professionals.

Nowadays, the complexity of the attacks has increased and it is important to understand the purpose for which we were attacked, whether there was an intrusion or possibly a data leak.

In our presentation, we show how in an inhomogeneous cyber defense network, automations can be used to reduce the workload and assist in the incident analysis required by large companies.

10:45

The last line of defense

László Várkonyi

Leader of ISG Consulting Group, Dell Technologies
10:53

IT & OT Convergence

Tamás Barna

IT-security expert

László Huszár

Director, Hydro Cyber Defense Center, Norsk Hydro ASA

IT-OT convergence enables more direct control and more complete monitoring, with easier analysis of data from these complex systems, from anywhere in the world. This enables workers to do their jobs more efficiently and improves decision-making, as they have access to real-time insights that the date provides. However, the Industry 4.0 (digital) transformation raises a number of security issues arising from the convergence of these systems, primarily in the areas of visibility and control.

What does the security challenges below mean in practice from the perspective of a major market player in this field? The conversation tries to formulate answers to this in an understandable form.

- Malware infiltration via external hardware and removable media. ...

- Human error

- DDoS attacks and IoT-botnets

- Malware infection via Internet and Intranet

- Compromising cloud components

 

11:07

Establishing Trust from the Start

Richard Archdeacon

EMEA Advisory CISO, Duo Security at Cisco
11:15

How to protect your data from the first user to the last byte - Passwordless access and universal data encryption

Attila Paksi

Regional Sales Manager, Access Management, SEE & Hungary, Thales, Thales

Gábor Hirsch

Regional Sales Manager, Data Protection, Adriatics & Hungary Thales, Thales

With the rise of work from home, hackers are also keeping pace, making it more essential to control access to company data in more detail, to properly combine authentication factors, and to properly encrypt data stored in different locations and manage keys in a consistent manner. The two areas are closely linked, with a presentation by two Thales experts covering users and the entire data lifecycle.

11:23

Cooperation in a conflicting role ?! IT security, IT operation and efficient operation of information security in a large enterprise environment!

Tibor Szöllősi

Director of IT Operation, Hungarian Post

The presentation provides a brief insight into the differences in the tasks, responsibilities and scopes of the areas of IT security, IT operation and information security at Magyar Posta Zrt. It will highlight the conditions for effective and flexible cooperation between these areas; and present the conditions and plans for the optimal and efficient operation of the Security Operation Center in the present environment.

11:37

Combined Forces for Active Directory Security

Daniel Conrad

CISSP, CEH, IAM Strategist at Quest/One Identity

Mark Child

Research Manager, European Security, IDC CEMA

Secure Privileged Account Management Expanded with User Lifecyle Management

11:45

The SEVEN principles

Zsolt Vilhelm

Security Engineer, Check Point Software Technologies Ltd.

The new security paradigm is “Zero Trust,” a security model that constitutes a more data-centric and identity-aware approach that is designed to handle the new challenges of our “perimeter-everywhere” world. Zero Trust is driven by the precepts of never trusting anything inside nor outside the organization’s security perimeters. Rather, before access is granted, anything and everything that is attempting to connect to an organization’s systems must always be verified. With Zero Trust, the security team puts policies in place to validate every connection attempt and every device, and to intelligently limit access. During the presentation we will guide you through the 7 principles of the Zero Trust model.

 

11:53

Paris Call roundtable discussion

Jakub Jamnicky MPH

Clinical IT applications Director, Penta Hospitals International, a.s.

Nikolas Ott

Project Manager (Cybersecurity and Digital Diplomacy), European Government Affairs, Microsoft

Anett Mádi-Nátor

President, Women4Cyber Foundation

Cyberspace now plays a crucial role in every aspect of our lives and it is the shared responsibility of a wide variety of actors, in their respective roles, to improve trust, security and stability in cyberspace. Building trust and security in cyberspace requires sustained global engagement and collaboration across key multilateral and multi-stakeholder dialogues. The Paris Call for Trust and Security in Cyberspace, establishing voluntary multistakeholder cybersecurity principles and commitments to further cooperation on meaningful rules of the road in cyberspace. This represents the largest ever multi-stakeholder group assembled to support a cybersecurity focused document. The panel discussion between the panellist from V4 countries will be focusing on the opportunities of this multistakeholder cooperation.

12:13

Block Summary, and moving to "Expo" and "Networking"

József Bakk

Country Manager, IDC Hungary

Tamás Barna

IT-security expert
12:16

Networking and Event Expo exploring​

Partners

Roadshow Partner
Platinum Partner
Platinum Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Professional Partner
Professional Partner
Professional Partner
Media Partner

Contact Us

Bettina Bodnar

Conference Project Manager

+3620 535 0306

About IDC

57 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.