IDC IT Security Roadshow 2013

This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC IT Security Roadshow 2013

IT Security in the Hacktivist Era

Ankara, March 5, 2013


Security investment remains a top priority for the IT department. However, there has been a big change in IT security strategies that has come about due to new initiatives such as Cloud and virtualization. Furthermore, the mobile and social revolutions have added a new level of complexity to IT security practice with the explosion of devices and platforms that are now commonplace.

Thomas Vavra

Associate Vice President, Software, IDC CEMA

"For this reason, the largest threat that many companies and organizations now face is not a hacker, a virus or an errant employee. The new enemy is sprawl. The vastness of infrastructures now in place represents a danger in and of itself. More and more, companies need to address this growing problem and try to better manage their environments and the technologies they will need in the future and, as importantly, those already in place." - Thomas Vavra, Research Director, IDC CEMA.

The IDC IT Security Roadshow 2013 will focus on the most pressing security issues facing modern organizations, including:

  • Secure Enterprise and Business Strategy
  • Next Generation IT Trends and What They Mean for Information Security
  • Security in the Cloud Era
  • Big Data and Security
  • Next Generation Firewalls and IP
  • Network and Mobile Security
  • Security and Risk Governance

Who Should Attend

  • Chief Security Officers, Directors of Enterprise Security, CIOs, CTOs, CISOs
  • Privacy Officers, Network Security Managers, Server Application Managers
  • Antivirus, Email Monitoring, VPN, and 3A Managers

Representatives from the following industries:

  • Banking, Financial Services
  • Transportation, Utilities, and Logistics
  • Telecommunications
  • Government and Public Administration
  • Manufacturing
  • Trade


Time Event Speakers

Registration, Tea / Coffee & Networking


Welcome Address

Nevin Cizmeciogullari
Country Manager, IDC Turkey

Evolving IT Security Strategies in a World of Uncertainty

Ayse Kaptanoglu
Research Analyst, Software, IDC Turkey
The past two years have seen the threat landscape intensify as attacks increase in frequency and complexity. Attacks have evolved and the region has become one of the first ever battlegrounds for cyber warfare. Recent incidents in the Gulf's energy sector and the Anonymous attacks in Turkey and South Africa have pushed IT security to the forefront of the IT decision maker's agenda. Companies are now re-evaluating their strategies and realize that they need to invest in solutions to better pre-empt and contain future attacks. This presentation will assess the evolving threat landscape as attacks become more targeted and examine the strategies companies should seek for risk mitigation.


Cyber Security in Turkey

Dr. Hayrettin Bahşi
Director of Cyber Security Institute, TÜBİTAK BİLGEM
In this presentation, you’ll hear about recent developments about cyber security and cyber threats in the world and how TUBITAK is interpreting these developments. Moreover, during this presentation you’ll have detailed information about Cyber Security Institution of TUBITAK, as well as Cyber Security Board & its action plans.

Understanding the DDoS Threat

Do you understand the current threat to your organization from DDoS attacks? This presentation will talk through the evolution of DDoS attacks from a motivational and technical perspective, as well as providing a good background on the types of attacks that are out there and how they work. DDoS attacks should now be considered as a significant risk to business continuity given our increased dependence on Internet connectivity in the business world – this presentation will explain how we can protect our organizations from the growing DDoS threat.


Modern Malware Protection

During this presentation, you’ll have detailed information about next generation firewall architecture in enterprise networks & modern malware protection with integrated firewall solutions.


Tea & Coffee Break


Presentation by Symantec


Seven Stages of Modern Attacks

Umut Özbozkurt
Senior Account Manager, Websense
Hackers today are organised, sophisticated and committed. Their targeted attacks can easily bypass URL and AV defences, and traditional security systems do little to prevent data theft and cybercrime call-home communications. Add to this the continued growth in SSL traffic due to Cloud apps, increased mobility and remote users, and you have the potential for "blind spots" in your defences that hackers use to their advantage.
To learn more about these increased risks and sophisticated threats, join us during our presentation. It will help you understand the signs of advanced attacks and provide insight on how you should respond—which is the first stage in stopping hackers in their tracks.

Red October Disclosure Technology

Ercüment Ekim
Kurumsal Satış Müdürü, Kaspersky Lab
Lately, we hear complex targeted attacks more often and names such as Stuxnet, Duqu, Flame and Gauss are familiar to many people. On January 14th, one more cyber-threat was detected. This time it was not just a targeted attack but an extended network of cyber-spying against diplomatic and governmental structures, research institutes, industrial companies and military agencies of several countries. The investigation revealed that the essential part of this malicious code was blocked even before information on this cyber-threat has appeared. This refers to technology of Automatic Exploit Prevention as one of the key components of unknown threats protection, including vulnerability of day 0. We will study the principle of this technology operation in the presentation.

Redefining and Defending the Enterprise Perimeter

Zekeriya Eskiocak
Security Consultant, F5 Networks
Trends in the market such as BYOD, the growth of internet-facing applications, and cloud computing are allowing organizations to extend the enterprise beyond the physical boundaries of the traditional office/datacenter environments. As these technology drivers are adopted, IT departments are challenged to rethink concept of network perimeter security to focus on protecting the corporate applications and their data. This presentation will discuss how the perimeter has evolved and the protections needed in order to security corporate assets from a changing threat landscape.

Security Risk Analysis : Analyzing Your Network Infrastructure

Özgür Köse
Security Consultant, Check Point

Do you know which high risk web 2.0 applications are being used in your organization? Which intrusion exploits your organization is exposed to? What sensitive data is being sent outside your organization?  We investigate your network and provide a comprehensive security analysis - exposing security risks and suggesting remediation.


Our New Defense Layer: DNS Firewall

Altuğ Yavaş
Solution Architect, Infoblox
DNS is a critical infrastructure service that serves both to internal and external users who needs to access company resources. DNS service needs to be uninterrupted and should have integrity for healthy operation. Attacking to DNS infrastructure of an enterprise may cause service interruption and may falsely lead users by violating integrity of the DNS service. Security vulnerabilities in DNS service may cause loss of time, money and reputation company or even country wide. Meanwhile, DNS is an IT service that is not taken very seriously during security risk management activities. In this context, a DNS firewall that aims to protect DNS infrastructure for enterprises will provide a new and powerful defense line against emerging threats.

Lunch & Networking


Case Study by Arbor


Next Generation Firewall Solutions in Data Centers

İrfan Keskin
System Manager, Anadolu Ajansı

Case Study by Symantec


Ethical Hacker Presentation

Tamer Şahin
Ethical Hacker

Malware Analysis

Ömer Faruk Acar
Nowadays, malware is the major threat among rapidly increasing cyber dangers developed by people. This software is leaking into personal computers and servers by using different techniques everyday. It is getting more and more difficult to detect and block these applications in environments, that they have leaked into to damage the systems & reputation of the organizations. In this presentation, how malwares can be detected and analyzed and moreover what are the solutions will be discussed.

Panel Discussion: Evolving Technologies and Changing Security

Moderated by:

Nevin Çizmecioğulları, Country Manager, IDC

Panelists :

Tamer Şahin, Ethical Hacker, Terra Medusa

Bahattin Vidinli, İletişim Uzmanı, BTK - TİB

Bünyamin Karadeniz, Business Development Manager, Havelsan A.Ş.

Bahtiyar Bircan, Senior Researcher, Siber Güvenlik Enstitüsü, TÜBİTAK BİLGEM

Ahmet Ünal, Komiser Yardımcısı, EGM Bilişim Suçlarıyla Mücadele Daire Başkanlığı


IDC Summary & Raffle Draw



General Information

Date and Time

Tuesday, March 5, 2013


Swissotel Ankara

Yildizevler Mah. Jose Marti Caddesi 21.Sokak No:2, Cankaya

Swissotel Ankara is a boutique luxury hotel located in Cankaya, an exclusive area that is also home to the Presidential Palace and many embassies. Only a 45-minute drive from Esenboga airport and five minutes from the city centre and central business district. The Business Executive floors offer opulent rooms and suites and the Swiss Executive Club lounge provides additional luxury and exclusivity. The restaurants, bar and gourmet deli serve everything from quick & refreshing snacks to elegant formal dining, with Swiss and Turkish specialities highlighting the international cuisine.



Registration Fee

  • FREE Attendance for all End Users
  • Standard Fee for Non-sponsoring ICT companies – 500 USD
  • Delegate fee is valid for vendors of IT products and solutions.
  • Attendance, conference materials, coffee breaks and lunch are included in the registration fee.


Strategic Partner(s)

Platinum Partner(s)

Gold Partner(s)

Silver Partner(s)

Exhibition Partner(s)

Technological Partner(s)

Media Partner(s)


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Zeliha Bige Yagmur via email, at


Zeliha Bige Yagmur

Conference Project Manager, Turkey

+90 532 7613786

Nevin Cizmeciogullari

Country Director, IDC Turkey

+90 533 666 5587

About IDC

49 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit