IDC Cloud & Security

Jak być bezpiecznym i w pełni wykorzystać możliwości oferowane przez chmurę?

DIGITAL CONNECTIONS | Poland | November 25, 2021
Watch Video


How do you simplify security management in the cloud?
Everything needs to be made as simple as possible, but not simpler. Simplicity is the key to solving most problems, and we couldn't agree more with Albert Einstein. However, cloud security is still inherently complicated and when it comes to simplifying your cloud security strategy, there are a few basic steps to keep in mind in order to use the cloud safely and securely.
Cloud security and security in the cloud
Cloud security and security in the cloud are two concepts that, while they sound similar, are separate issues. The security associated with using infrastructure that does not belong to an organization is still one of the most critical aspects of cloud use. On the other hand, how can you secure your data in a variety of cloud environments, and what should you be wary of when using cloud services?
How do you protect yourself from a cloud leak?
Downtime, financial loss, loss of company reputation and hard-won customer loyalty can carry disastrous consequences. Securing data in the cloud gives many a security manager sleepless nights. And it's enough to remember a few elementary issues related to digital security. Let's systematize this knowledge. Let's present practical tips that most security managers recommend.

Event Highlights

We would like to thank all the delegates and the partners who participated at this event.

A selected group of IT and business leaders came together to network and learn from IDCs analysts, inspiring speakers and dedicated advisory board members, who were at the forefront of the lively and interactive discussion.

If you missed the event or if you would like more information on any of the topics we discussed, click the button below to watch a recording or access the post-event content.

Watch Video

Key Topics


Data security


Identity management


Data governance


Disaster Recovery & Business Continuity



General Information


Technology Users - free of charge

Technology Providers - PLN 450


November 25th, 2021


10am - 1pm


Time Event & Speakers

Security in the cloud and cloud security


Welcome word and introduction

Ewa Zborowska

Senior Research Manager, IDC Poland

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Securing and simplifying the cloud

Dr. Nimrod Kozlovsky

Founder & Partner, Cytactic, Cyber Crisis Management

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Business Case - An effective way to modernize your IT environment and migrate to the cloud in 3 easy steps

Marek Andrzejuk

Head of Service Portfolio & Innovation, T-Mobile Polska | Digital & Cloud Services

Katarzyna Karpińska

Head of Sales CEE, T-Mobile Polska | Digital & Cloud Services

Data management challenges in a multi-cloud world

Olga Budziszewska

Security Strategy and Risk Manager, Accenture Polska

Ewa Zborowska

Senior Research Manager, IDC Poland

Unfortunately, using several platforms simultaneously, is usually resulting in organizational chaos and problems with managing a multi-cloud environment. However, there are techniques and tools that can significantly simplify this process.


How to effectively manage a multi-cloud environment

Tomasz Zięba

IBM Cloud and Data Platform Leader, IBM Polska

By the end of 2021, 98% of organizations plan to deploy multi-cloud architecture. However, only 41% have a multi-cloud management strategy. It is already worth considering the management aspects and resource optimization of multi-cloud environments. Automation using artificial intelligence helps create smarter and more innovative solutions for managing application resources.

*When you interact with IBM, this serves as your authorization to IDC Polska Sp. z. o o or its vendor to provide your contact information to IBM in order for IBM to follow up on your interaction. IBM's use of your contact information is governed by the IBM Privacy Policy.


Case Study: Before you say YES, a cloud breakthrough in a bank

Łukasz Kotlarz

Digitization Leader, Nicolaus Bank

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Ransomware, the scourge of our times

Przemysław Mazurkiewicz

EMEA CEE Sales Engineering Director, Commvault

Zabezpieczanie krytycznych informacji biznesowych jest z pewnością koniecznością dla każdej organizacji. A ochrona tych informacji przed atakami ransomware powinna być najwyższym priorytetem dla każdej firmy. Co oznacza tu Security by Design dotyczące systemu backupowego – zabezpieczające przed atakiem typu ransomware, z uwzględnieniem istotnego elementu jakim jest chmura publiczna? Podpowiadamy, jak się zabezpieczyć i jak odzyskać dane w razie ataku ransomware.


Is your Disaster Recovery strategy ready for a hybrid?

Jacek Bochenek

Cloud & Security Team Leader

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Establishing Trust from the Start

Richard Archdeacon

EMEA Advisory CISO, Cisco Duo

This decade has provided many lessons. One is to “not let a good crisis be wasted”, a mantra that groups of cybercriminals could have written. The other is that the concept of digital trust has quickly become a basic business requirement in the digital age. At the heart of it all, as always, is security: the critical barrier between data integrity and trade-offs, and the fundamental building block of digital trust. But trust involves much more. From data protection and compliance to sustainability, from e-commerce to trusted ecosystems; from ethics and transparency to brand reputation and loyalty. Building digital trust is essential to business, but it requires top-level leadership and management to truly become part of the organization.

Richard is giving a brief submission to, “Establishing Trust from the start”:

In this submission you will gain insight into:  


  • Why implementing Zero Trust help secure organizations
  • Highlight the five key steps on your journey to zero trust
  • The basic principle every Zero Trust strategy should include
  • What a practical to Zero Trust looks like 



Time for a paradigm shift in access management

Michał Nieżurawski

Head of Global IT Security Competence Center, DB Schenker

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Common cyberattacks and abuses show that weaknesses in Identity and Access Management can lead to enormous losses and sometimes even to the downfall of a company. Well-designed and implemented Identity and Access Management processes bring significant savings compared to traditional, manual procedures.


Commercial break

Data is the oil of the 21st century - How do you protect against cloud leaks?


Introduction to the II part of the meeting

Ewa Zborowska

Senior Research Manager, IDC Poland

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

With the rise of artificial intelligence and machine learning offering increasingly efficient ways to analyze data, companies are racing against time to stay ahead of their rivals and gain a competitive advantage. At the same time, every increase in the amount of data collected and processed puts additional pressure on CISOs. More data increases the number of security threats that need to be analyzed. Interesting facts from IDC's data security reports.


Panel discussion: On-prem or cloud? Or, how to deal with a nagging problem?

Magdalena Jończak

VP Strategy & Transformation, UPC Poland

Michał Jaworski


Robert Kanigowski

Head of Information Security & Business Continuity, Provident Polska SA

Ewa Zborowska

Senior Research Manager, IDC Poland

Recent attacks on on-prem systems show us that the cloud is proving to be a more secure place to store data. Is the cloud more secure than on-prem? How do we build a unified security policy in an era of hybrid digital platforms; we don't choose cloud or on-prem today, each of which we must secure, but we operate in complex environments that must be equally secure no matter what IT delivery model we have.


A simpler life in a hybrid reality

Paweł Wojciechowski

Business Development Manager, Fortinet

What is the shared responsibility model? Where does cloud provider responsibility end and customer responsibility begin? How do you ensure unified security and make life easier in a hybrid reality? These questions will be answered during my talk. A simpler life in a hybrid reality


Artificial intelligence: enemy or a friend?

Aleksander P. Czarnowski

Chief Executive Officer, DefenseLayers

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Cybercriminals use artificial intelligence designed for legitimate purposes, in illegal activities. Cybercriminals are using artificial intelligence to accelerate password cracking, identify lucrative attack targets, and optimize supply chains and criminal infrastructure. We are seeing incredibly short response times from hackers - they can shut down and restart attacks with millions of transactions in just minutes.


Introducing the future of the corporate network

Vivek Ganti

Product Marketing, Cloudflare

As enterprises migrate applications and data to the cloud and adapt to a larger remote workforce over the foreseeable future, managing a network perimeter becomes costly and complicated. Today, more of the workloads in a modern enterprise run and are accessed outside the castle than inside. Why are enterprises still spending money applying band-aids to an increasingly ineffective moat rather than applying a zero trust approach everywhere?


Data Governance - new game, new rules

Małgorzata Olszewska

Director of Technology, Agora

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

When an organization is ready to launch a formal Data Governance program, the first step is to think about where the initial data governance policies have fallen short and start working to fix them. The Data Governance team should select projects that have the most value - for example, a sensitive customer database that needs to be secured - and that can be completed fairly quickly. With a few small projects behind you, you can move on to broader problems in the organization.


Seeing and reacting. Monitoring of distributed environments.

Piotr Jagielski

Area Manager, NASK

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

It is alarming that nearly half of organizations do not know if they have been attacked, while detection solutions are readily available to provide this awareness. Monitoring is a critical part of cloud security and management. Typically relying on automated solutions, cloud security monitoring oversees virtual and physical servers to continuously assess and measure data, application or infrastructure behavior for potential security threats.


Democratization of data - Data Lake instead of Excel

Piotr Motłoch

Sales Engineer, Splunk

All modern companies operate on massive amounts of data. By introducing the Splunk solution to the enterprise, we can create a single place to turn data into valuable information for business operations. The same Big Data solution can be used by employees responsible for monitoring infrastructure, IT security or conducting business analysis.


Why is data sovereignty becoming so important?

Dariusz Śpiewak

PIIT Board Representative for GAIA-X Hub in PL, member of the Chamber Council

Ewa Zborowska

Senior Research Manager, IDC Poland

It is assumed that by the end of 2023 every second company in Poland will be using cloud tools. In this context, the concept of data sovereignty or, more broadly, technological sovereignty of Poland becomes interesting. Why does this initiative make sense for companies operating in PL/EU, what are its assumptions, what role do national hubs play?


What's in the law?

Agnieszka Besiekierska, Ph.D.


Ewa Zborowska

Senior Research Manager, IDC Poland

The issue of cyber security and related requirements is increasingly subject to legal regulation. The dynamic development of technology, and the resulting increase in cyber threats poses a significant challenge for lawmakers. The issue of cybersecurity is a complex one, therefore the legal regulation of this area is a number of thematically interrelated legal acts, both at the EU and national level.


Summary and closing speeche

Ewa Zborowska

Senior Research Manager, IDC Poland

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland


Communications Partner

Contact Us

Natalia Toporkiewicz

Conference Project Manager


Katarzyna Wodzinowska

Associate Sales Director, CEE Sales, IDC Poland

+48601 606 962

About IDC

57 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit