IDC IT Security Roadshow 2016

This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC IT Security Roadshow 2016

Rethinking Security for the Digital Enterprise

Jeddah, March 14, 2016


Rethinking Security for the Digital Enterprise

The enterprise landscape in the Gulf Cooperation Council (GCC) is undergoing a transformation. The changing nature of the customer and greater demands for agility are compelling organizations to become digital enterprises.

A digital enterprise looks at transformations based around operations, leadership, and processes. Companies undergoing this shift need to consider technologies such as mobile, social, cloud ,and Big Data as well as innovation accelerators such as cognitive technology, robotics, and 3D printing. A diverse digital ecosystem also brings security to the forefront as it underpins every operation, process and service within the organization. Organizations will not only have to consider security but also address issues such as trust and privacy.

Countries in the GCC region and around the world are evolving. Specifically, countries in the GCC are looking at initiatives based around becoming “smart,” which is bringing about a need for secure, open platform and assurances from governments that they are dealing with cybersecurity issues. However, budget constraints and concerns around skills add to transformational complexity. Organizations will need to address agility in terms of meeting customers needs and ensuring a seamless and secure.


Agility, the adoption of Internet of things (IoT), open platforms, and software-defined enterprises are the most widely discussed topics in the GCC. While an enterprise can achieve all of these aspects, the lack of a secure ecosystem can hinder an organization in its quest to evolve.

In 2016, IDC is looking at the business challenges that come with transforming into a “digital enterprise” as well  as the aspects that need to be considered by IT security decision makers to ensure that they are able to build secure digital enterprises. Join us and hear from security experts and thought leaders on how to manage the ever-evolving complex threat and enterprise ecosystem.


Time Event & Speakers

Registration & Welcome Tea/Coffee


Early Bird Raffle


Welcome Address

Hamza Naqshbandi
Senior Research Manager, IT Services, Middle East & Africa

Securing the Digital World

Hamza Naqshbandi
Senior Research Manager, IT Services, Middle East & Africa

Advance visibility: moving beyond a log-centric view

Fadi Mantash
Account Manager, RSA

When you ask most security professionals why they need a SIEM, they will say it is to detect and investigate threats. However, most SIEM tools today struggle to actually provide any real detection capabilities, with true SIEMs only detecting a very small percentage of attacks. They struggle even more when trying to investigate alerts, providing little context to help you respond properly. In this session, you will learn how to combine log data with network packet and endpoint data to help spot more malware, detect more attacks and investigate rapidly down to the most granular detail.



Adaptive Trust Defense for the mobile enterprise

Muhammad AbuGhalioun
Senior System Engineer – HPE Aruba, HPE
Today's mobile workforce has completely diluted the notion of a fixed perimeter – such perimeters do not exist where users can connect and work from anywhere. To protect the enterprise and organizational resources, IT must therefore consider security that starts from the inside out. This presentation will examine a platform that allows IT functions to adapt and apply trust levels based on every user and device that requests wireless, wired, or VPN access. Participants will discover how this platform leverages real-time, contextual data – such as a person's role inside an organization, device and app attributes, location, and insights from third-party security solutions – to create policies that satisfy highly mobile security needs.


Security Intelligence

Ibrahim H. Azab
Security Consultant - HP Enterprise Security, HPE

Accelerate Response to Infections

Jayendra Raman
Channel Manager - Kuwait, Bahrain & KSA, Check Point

Tea & Coffee Break


Presentation by Mohammed Khursheed Akhthar,King Abdulaziz University


Open discussion: Building a Digital Organization


Final Raffle, Summary & Close


Lunch & Networking

General Information

Date and Time

Monday, 14th March 2016

Park Hyatt Jeddah



Registration Fee
Free of Charge:

* For End Users (not IT +consultant companies)

USD 500 Per Participant.

* For IT vendors, and IT consultant companies


For More Information, contact:

Sughand Tolani - 04 3642189 / 056 4145987 /


Gold Partner
Gold Partner
Gold Partner
Silver Partner
Silver Partner
Lunch Partner

Become a Partner


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Ronita Bhattacharjee via email, at

Photo Gallery


To Be Confirmed...


Ronita Bhattacharjee

Vice President, Conferences

+971 50 7872436

About IDC

52 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit