Critical C-Suite Security Strategy

This site uses cookie including third parties cookies which helps us provide and improve our services. Find more on our Cookie Policy

READ MORE

Critical C-Suite Security Strategy

Must-attend roundtable for Chief Security Officers from United Arab Emirates

UAE, April 20, 2017

Overview

Security breaches and hacks are no longer incidents that happen in other parts of the world. In our connected world, security incidents have become frequent occurrences that impact industries and countries at large. The Middle East has not been immune to security attacks, and with the frequently targeted energy and finance sectors and rising level of hacktivism, the cybersecurity landscape of the region is changing rapidly.

However, security investments in the Middle East, while ongoing, are rarely sufficient. Skills shortages and regulations make the achievement of robust and secure environments difficult for the present day chief information security officer (CISO).

The pressure to innovate and support strategic visions has made security a priority and a non-negotiable issue in the UAE. Depending on the sector, the purview of the security decision maker now extends to physical, operational, industrial, and information security. The CISO will have to ensure security solutions are deployed while guaranteeing that security compliance does not impact user experience. Information security is complex and requires various levels of engagement from governments, industries, and even individuals.

At this roundtable, IDC and its partners will showcase the strategies that CISOs need to consider in order to build resilient organizations that survive security incidents. The roundtable will give CISOs and security decision makers an opportunity to gain insights into managing security solutions, regulations, and teams. CISOs and security decision makers will also learn how their peers engage with the business and implement security plans.

Agenda

Time Event Speakers
08:30

Welcome Tea & Coffee

09:00

Welcome Address

Megha Kumar
Research Director, Software, Middle East & Africa
09:05

The Evolution of the CISO

Megha Kumar
Research Director, Software, Middle East & Africa

Security is the most critical element for organizations in the Digital Economy. The resilience of the Digital Economy is heavily reliant on ensuring seamless access to systems and information. The role of the security decision maker is evolving and encompasses aspects such as risk and governance. This presentation looks at security complexity and the evolving role of "security" decision makers, their engagement with the board and how they can play a proactive role in digital transformation.

09:30 – 10:15 Session 1: Using Intelligence Proactive Security Strategies
Session Chairperson: Megha Kumar, Research Director, Software, Middle East & Africa - IDC

They say you are as weak as your weakest link. Within many organizations, internal risks tend to create more cause for concern with regards to security robustness. Getting insights into network activities and threat intelligence can help improve response times and build a more proactive security strategies. The following session looks, at how organizations can leverage internal and external insights of both the landscape and customers to be more dynamic and responsive.

09:30

Protecting the Human Point Against Rising Data Security Threats

Ozgur Danisman
Head of Security Consultants, Forcepoint
09:45

Panel Discussion: Addressing Insider Risk
Session Chairperson: Megha Kumar, Research Director, Software, Middle East & Africa - IDC

This panel discussion will focus on how organizations can minimize the impact of insider risk. It will look at the strategies being adopted by peers in the industry on how they address employee awareness and the controls that they have put in place. It will also look at how data is being leveraged
10:15

Tea & Coffee Break

CISO Presentation

10:40

Understanding the Rise of Cyberthreats

Harpal Singh
Head of IT Risk & BCM - Emirates NBD
This presentation will take a look at general cybersecurity threats and examine the appropriate measures that can be taken to mitigate them.

11:00 – 11:45 Session 2: Building an Integrated Cloud Security Strategy
Session Chairperson: Ranjit Rajan, AVP Research, Middle East, Africa & Turkey - IDC

The Digital economy requires agile and responsive organization that will need to utilize solutions such as cloud to provision infrastructure and applications. Organizations can utilize cloud to provision access to security solutions while ensuring they have secure cloud environment. It also brings to light the need for advanced data governance and concern around privacy. The ideal cloud security strategy brings into play a hybrid security model and ensure overall compliance. This session will address aspects that decision makers need to keep in mind for a secure cloud deployment.

11:00

Adaptive Security from the Device to the Datacenter

Deepak Narain
Technical Director for the Middle East & North Africa, VMware Middle East
The cloud presents a unique opportunity to architect-in security, rather than bolt it on. Micro-segmentation opened the door—enabling us to see and control the infrastructure through the lens of the application. As workflows shift primarily to mobile and the Internet of Things explodes, adaptive security has unlocked the power to deliver workforce productivity and agility along with enterprise-grade security.
11:15

Panel Discussion: Cloud Governance
Session Chairperson: Ranjit Rajan, AVP Research, Middle East, Africa & Turkey - IDC

This panel discussion take into how organizations can address cloud security with proper governance around cloud use. It will look at policies that will need to be put in place for a secure hybrid environment.

CISO Presentation

11:45

Security Culture Standards, Culture and Practices – An ISO 27001 perspective

Safdar Zaman
Head of IT Strategy & Governance-IT,Nakheel

12:05 – 12:45 Session 3: Building out the Trusted World of Things
Session Chairperson: Megha Kumar, Research Director, Software, Middle East & Africa - IDC

The Internet of Things is increasingly proliferating several sectors leading to benefits and new concerns around security and governance. Responses from IoT need to secure and trusted. It has been proven that these headless devices can be hacked and lead to major disasters. This session looks at how to build secure IoT ecosystem that looks at identity, data privacy and trust.

12:05

Presentation

12:15

Panel Discussion: Securing IoT within your organization

IoT is not just limited to sensors, it takes into account all the devices ranging from clients devices, to phones, wearables and CCTV that are increasingly proliferating organizations. This will panel discussion will look the best practices adopted by organizations to address security.

CISO Presentation

12:45

Presentation by IDC Invited Speaker

13:05

Summary & Close

13:10

Lunch

Partners

Partner(s)

Proceedings

To access the content, please enter the password you have received from IDC. If you do not have a password, please contact Ronita Bhattacharjee via email, at rbhattacharjee@idc.com.

Location

Contacts

Ronita Bhattacharjee

Vice President, Conferences

+971 50 7872436

About IDC

53 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.