IDC Security Forum The Future Enterprise: Trusted, Resilient, Sovereign

In-Person Event | May 19, 2022

Overview

馃攼Where should organizations shift their primary focus in digital-first world?
IDC鈥檚 concept of the Future Enterprise spans all disciplines, but at the core of all of them is Trust. Security is, of course, at the heart of Trust, but Trust also encompasses compliance, sustainability, brand reputation, customer experience, and other key aspects. 

 
馃攼What can the organization learn from security's tactics to achieve a resilient stance?
IDC defines digital resilience as the ability of companies to withstand disruption by leveraging robust digital platforms and processes which enable them to maintain operations and performance. 
 
馃攼Why will digital sovereignty rise on the agenda of priorities for security professionals?
The issue of sovereignty is increasingly in the spotlight, as policymakers and advocates raise concerns over ownership and control of IT assets, infrastructure, and data. 
 
Curious for the answers? Join us on the 19th of May in-person at the Corinthia Budapest Hotel, and find out more.
 
The event is supported by the ISACA Budapest Chapter. CPE scores are available!

Event Highlights


We would like to thank all the delegates and the partners who participated at this event.

A selected group of IT and business leaders came together to network and learn from IDCs analysts, inspiring speakers and dedicated advisory board members, who were at the forefront of the lively and interactive discussion.

If you missed the event or if you would like more information on any of the topics we discussed, click the button below to watch a recording or access the post-event content.


Watch Video

General Information

 

In-Person Format

End-User: FREE Entry
Vendor (NOT an official partner of the event): 350 EUR/ticket

 

May 19

 

9:00-17:00

Audience

Designed as an information-sharing forum and networking platform for select groups of senior security decision makers and security experts from the most prominent enterprises in Hungary.
 
CISOs, CSOs, Directors of Enterprise Security, CIOs, CTOs, Privacy Officers, Risk Managers, Auditors from organizations maintaining critical infrastructure & large data processing centers.

Key Topics

 

SHIFTING THE FOCUS

 

  • Has accelerated cloud adoption increased vulnerability levels and forced us to accept more risk?
  • More agile and secure IoT, and the converging worlds of OT and IT
  • The convergence of networking and security: a clash between network technicians and security practitioners, or one big happy family?

 

 

TACTICS TO RESILIENT STANCE

 

  • How does zero trust help manage risk and how should organizations set out their zero-trust strategy?
  • Can we be better at mitigating risk with powerful new threat intelligence and detection and response tools?
  • A SOC with no humans? The dawn of a new era with the automated SOC

 

 

RISE OF DIGITAL SOVEREIGNTY

 

  • Navigating the murky waters of data sovereignty and conflicting data regulations
  • The evergreen topic: How to manage the end-users in our company?

 

Agenda

Time Event & Speakers
8:30

Registration at the Venue & Welcome Drinks

9:00

Welcome Address

J贸zsef Bakk

Country Manager, IDC Hungary

L谩szl贸 Dellei

IT Security Expert
9:06

Reflections on risk analysis from the perspective of a financial institution security manager

Istv谩n Rag贸

Chief Security Officer, Erste Bank Hungary

The principle of risk-based protection is a fundamental principle that guides the work of security professionals, and this is nothing new. However, one of the consequences of the past period is that we need to review previously well-established methodologies and processes, or at least change the pace, because, among other things, the acceleration of everyday digitalisation has created a new situation in this respect.

9:27

Modern day security challenges and establishing trust

Yoad Dvir

Security Sales Specialist, Microsoft

The volume of security events continues to grow, and the scope and sophistication of attacks are increasing. We can define the known attack scenarios, but how about the emerging and unknown threats in your environment? Our extended Fusion ML detection capability can help you find the emerging and unknown threats in your environment by applying extended ML analysis and by correlating a broader scope of anomalous signals, while keeping the alert fatigue low.

9:42

Future of Work with Cisco

Gy枚rgy 脕cs

Cybersecurity Technical Solution Architect, Cisco

Szil谩rd Csord谩s

Technical Solution Architect, Cisco

Richard Archdeacon

EMEA Advisory CISO, Cisco Duo

The Future of Work is coming. And it鈥檚 borderless, lightning-fast, highly creative.

According to Cisco鈥檚 Workforce of the Future survey, employees want greater ownership and choice in the new world of work. The study captured their feelings about working from home this year, their expectations for their organizations in 2021, and what learnings and new working practices they wish to adopt for the future. Finally, it sets a path forward for business leaders looking beyond the new normal.

Join Richard Archdeacon as he discusses Cisco鈥檚 Future of Work by establishing a secure and trusted workplace environment anywhere and everywhere your workforce is, with a SASE and Zero Trust approach. 

9:57

Viva la (Cyber) Resilience

Zsolt Hargitai

Business Development Manager, Micro Focus

Resiliency focuses on key aspects of the business withstanding and recovering from cyber disruptions. During the session we will share our experience on how to build both cyber and business resiliency, especially in the areas of Data Privacy & Protection, applications hardening, detecting and responding to threats, and securing identities.

10:12

Resilience at airlines and in the flightdeck

Imre K谩rolyi

Airline Pilot, Captain

"The instinctive startle effect is also unavoidable by airline pilots. The right level of resilience triggers the appropriate response. How can the two main pillars of resilience be maintained: confidence and competence? Especially if a pilot does not fly for weeks or months (see Covid-19)?

Airlines are prepared for accidents and operational disruptions to ensure an adequate level of resilience. The "Emergency Response Plan", an internal manual, summarizes the expected scenarios. These must be simulated and practised. Are airlines fully resilient to completely unexpected business disruption as well?

I try to give practical examples of these issues during a short presentation."

10:28

The future of IT security - arm and organise smart

P茅ter Saj贸

Division Manager, Network and IT Security Division, Euro One Zrt.

Up until the last 2-3 years, large enterprises have generally sought to protect their assets with island solutions, guarded by SIEM systems as the first integrating technology. Depending on which vendor's solution was used, these SIEM systems monitored a smaller or larger part of the IT environment. Building, maintaining and analysing their alert rules consumed significant resources from SOC teams. Today, many feel the limitations of this approach. Building and maintaining newer and newer rules requires methodology, a lot of manpower and time, and somehow keeping up with rapidly changing attack methods and techniques. Teams are thin on the ground, lacking significant manpower. There are of course many promising new/brand-new technology beacons on the horizon, but can a new manufacturer, a new technology element, really bring some improvement? Alongside this, in what direction are we developing our processes? How do we strengthen our team? What results should we be satisfied with? How do we arm and organise ourselves wisely?

10:39

The Games Shape Plays - Mitigate Bots and other Automated Attacks with F5

Lubos Klokner

Senior Solutions Engineer, F5

In this slot, rather than a product presentation you will hear a story of attackers and defenders in the play of automated attacks. We will discuss costs and values of protected assets as well as the cost of the attack itself.

10:50

The dynamics of cyber defence progress

Zolt谩n Kiss

Cybersecurity Expert, Fortinet

The year 2022 brought us never thought changes. We see these evolving dynamics in the field of cyber defence, such as the daily presence of earlier unknown 鈥渮ero-day鈥 exploits within corporate infrastructure followed by trojan or ransomware attacks. Internal innovation is part of the cyber defence strategy. It requires new dynamics from teams working with networks and cyber security. Although the converging competence is not just a challenge. It is the solution to cure the relevant expert scarcity as well.

We introduce directions in the domains of automatization, dynamic analysis and zero trust via architectural cases.

11:00

Coffee Break & 1to1 Meetings

11:30

Rising risks, changing world 鈥 telecommunication security in practice

Gy枚rgy Teod贸r Horv谩th

Senior Non-Core Product manager, Yettel

Network security, network background. Public and private networks and a telecom proposal from the base. Public internet everywhere, but what about the leased lines? IP VPN, IPSec, network separation.

Network perimeter security and the cost of the trust. Cybersecurtiy and the trend of home working. Being up to date in a cost efficient era.

Protected network, unprotected employees? The benefit of the Mobile device management.

11:41

SOC or Shock?

P茅ter Gyenese

Security Leader, Hungary, IBM

Organizations are facing an unprecedented number of attacks, that are more complex, than they鈥檝e ever faced before. An efficient SOC could help a lot to build an efficient defense. The presentation will raise questions about what a modern SOC is 鈥 and what it isn鈥檛, who and how should start create one.

11:52

Panel Discussion: From war to servers 鈥 Layers of security policy

Dr. Ferenc Gazdag

Professor Emeritus, University of Public Service

G谩bor Monori

Senior Consultant, IDC Hungary

Dr. Csaba Krasznay

Head of Institute of Cybersecurity, University of Public Service

The modern understanding of security defines the complex problem of what is colloquially referred to as "security policy" as layers of interdependence. Two security experts help us understand the incomprehensible. Is it a communication war in our neighbourhood? On one hand, we need to understand the fundamental layer of security studies. What is military power good for and why is it useful when it is not in operation? By the end of the panel discussion, we have a better picture of the cybersecurity experts鈥 future once the conventional battles end at our borders. 

12:13

Security 2.0 - or how to take security up a level?

Istv谩n Hagen

CISO, Bonafarm

It has become almost a clich茅 to say "cyber threat is growing", "there is no 100% security"and "risk-proportional defence". In the corporate environment, we have all the answers, the proven solutions, we feel safe. Are we aware that in many cases we have a false sense of security? We can really get the answer when we have to perform in a crisis situation.

In this presentation we will hear a brief summary of recent and ongoing events around us, with new risks, and then I will try to show how we can and should respond to this false sense of security, and finally I will show how important the human factor, the teamwork and real teamwork are in a crisis situation. I would call this evolution Security 2.0.

12:29

Sophos MTR 鈥 the simplest way to cover the cybersecurity gap.

Grzegorz Noco艅

System Engineer, Sophos CEE

The cybersecurity industry is experiencing a massive gap in talent and experience. As a result, organizations are struggling to build effective security operations (SecOps) programs to detect, investigate, and respond to threats before damage occurs. While tools, such as EDR, are built to hunt for threats and respond to incidents, they still require a skilled operator to benefit from all their capabilities. Only a few organizations have the right tools, people, and processes in-house to effectively manage their security program around-the-clock while proactively defending against new and emerging threats. As a result, organizations are increasingly looking toward managed detection and response (MDR) services to run their security operations program. With Sophos MTR, your organization is backed by an elite team of threat hunters and response experts who take targeted actions on your behalf to neutralize even the most sophisticated threats. This session provides clarity by walking you through the key considerations when choosing such a kind of service. 

12:40

Roundtable Discussions (Parallel Sessions)

Discussion I.

12:40聽-聽13:10

The value of people

Andrea Szeiler

Global CISO, Transcom / President, WITSEC

J贸zsef Bakk

Country Manager, IDC Hungary

Discussion II.

12:40聽-聽13:10

Trailer of the post-quantum world

G谩bor Monori

Senior Consultant, IDC Hungary

Dr. L谩szl贸 Bacs谩rdi

Associate Professor, BME Department of Networked Systems and Services
Discussion I.
12:40聽-聽13:10

The value of people

Discussion II.
12:40聽-聽13:10

Trailer of the post-quantum world

13:10

Lunch & 1to1 Meetings

14:01

Cautious trust

Dr. Kitti Alm谩si

Clinical Psychologist, Author

Today, the development of trust is hampered by a number of negative experiences. The quality of loyalty and commitment to each other has changed in both personal and work life, which keeps people in a state of readiness. They are cautious in expressing trust in each other or in a situation: they do not dare to fully commit to it, lest they be disappointed, and this can start a negative spiral...

14:22

Easy to Hack, hard to Patch. AN EVER-EXPANDING ATTACK SURFACE

Zsolt Vilhelm

Security Engineer, Check Point Software Technologies Ltd.

Integrated into every aspect of our lives, internet of things (IoT) devices and operational technology (OT) assets automate and streamline operations. Yet every time a smart device is added to our network, it expands your attack surface. This is because connected devices are inherently vulnerable and easy to hack.

Encompassing network- and device-level IoT security, Check Point IoT Protect prevents IoT cyber attacks, adapting protections to any IoT or OT device across smart-office, smart-building, healthcare and industrial environments.

14:31

To infinity and beyond... but securely

J贸zsef Bakk

Country Manager, IDC Hungary

Szilviusz Tapaszt贸

IT Security Leader, Waberer's International

Almost five years ago, the case of Maersk, a global transport company, sparked a debate about how to protect our organisation from the attacks that are coming. Now, in 2022, we ask Szilviusz Tapaszt贸, head of security at a prominent Hungarian company in a similar field, where Waberers is heading on this journey, what are the key questions they are looking to answer along the lines of challenges such as network security, user management, the rise of cloud technology, the Internet of Things and, more generally, proportionate and effective security management.

14:47

Oracle Database consolidation platform based on Oracle Exadata Cloud@Customer

G谩bor Budai-T眉ske

Co-founder / CTO, R34DY

Oracle Exadata Cloud@Customer solution, where you can enjoy the benefits of both cloud and on-premise solutions in a flexible licensing environment where you can tailor your costs to your needs. You can go with your current operating environment with your existing licenses or easily manage a temporary capacity increase if needed.

14:56

Zero Trust: the only way?

Vencel Cserh谩ti

CSPO, Huawei Technologies, Hungary & West Balkan

Zero Trust as a concept and approach has a long history but just became a popular buzzword in the last two years. Following this principle organizations should not automatically trust anything inside or outside its perimeters. It looks like to have lots of benefits but how easy is to implement? Can this be applied to vendors? In this presentation, we will have a look at some of the key concepts, benefits and also myths about Zero Trust.

15:05

Panel Discussion: It's all over the news. The network, the security and the utility IT issues

Aur茅l Huszthy-T枚r枚k

IT Security Program Manager, Raiffeisen Bank Hungary

Tibor F枚ldi

Head of IT Security, CIG Pann贸nia Life Insurance

Imre Balla

Local Security Officer, UNIQA

"Network is a utility service: we realize its existence only when it is not available. The same is true for IT security: it is only cared about by management or media, when there is an incident. Although, during my IT security career I equally needed the cooperation of network engineers and any other IT specialists responsible for all other aspects of IT. This panel session tries to get network security out of this shadow and show its crucial part of IT security, while also tries to address some key messages like "perimeter is dead" or the recently hyped "zero trust"."

15:26

False ideas and real challenges, the role and trials of the CISO

J贸zsef Bakk

Country Manager, IDC Hungary

While IDC has been tracking security spending trends, new solutions and interviewing thousands of business leaders for decades about what has changed in their organisation on this front, security leaders are constantly struggling to cope with external threats, the challenges of a changing organisation and often resistance from their own colleagues, false beliefs and cognitive dissonance. It is often said that the most important corporate challenge lies between the chair and the keyboard. Add to that the fact that that chair may be occupied by a technologist or a non-technologist, and it is now a question of whether the chair is in the office or at home, or on the beach or in a war zone.

IDC's closing interactive session will focus on the role and challenges of the human being, including the CISO. To help us understand this, we drew on a global IDC survey of 1,500 corporate executives and a range of other sources that shaped the speaker's views on the topic.

15:45

Networking & Surprise Program

Speakers

J贸zsef Bakk

Country Manager, IDC Hungary

L谩szl贸 Dellei

IT Security Expert

Istv谩n Rag贸

Chief Security Officer, Erste Bank Hungary

Yoad Dvir

Security Sales Specialist, Microsoft

Richard Archdeacon

EMEA Advisory CISO, Cisco Duo

Gy枚rgy 脕cs

Cybersecurity Technical Solution Architect, Cisco

Szil谩rd Csord谩s

Technical Solution Architect, Cisco

Zsolt Hargitai

Business Development Manager, Micro Focus

Imre K谩rolyi

Airline Pilot, Captain

P茅ter Saj贸

Division Manager, Network and IT Security Division, Euro One Zrt.

Location

Corinthia Budapest

1073, Budapest, Erzs茅bet krt. 43-49.

  Orfeum

Partners

Platinum Partner
In-Person
Platinum Partner
In-Person
Platinum Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Silver Partner
In-Person
Silver Partner
In-Person
Silver Partner
In-Person
Professional Partner
In-Person
Professional Partner
In-Person
Professional Partner
In-Person
Media Partner
In-Person

Countdown

 

 

Contact Us

Bettina Bodnar

Conference Project Manager

+3620 535 0306

About IDC

58 Years | 1200 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,200 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.