This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC IT Security 2017 Roadshow

Retaining Control of the Digital Enterprise

Johannesburg, August 17, 2017


Across the region, organizations are now having to operate under extremely challenging conditions, characterized by low oil prices, currency fluctuations, and a delicate political ecosystem. This has led to a prioritization of projects, with organizations realizing that they must now innovate and provide a superior user experience if they are to succeed in the face of aggressive competition. As such, there has been a considerable increase in the number of organizations exploring, planning, and engaging in digital transformation.

But if this drive for digital transformation is to bear fruit, the implementation of best-practice security measures is an absolute must. Indeed, as organizations across South Africa increasingly embrace connectivity, a new series of security vulnerabilities, challenges, and regulations are beginning to reveal themselves. And this increasingly complex threat landscape is piling yet more pressure onto IT decision makers to re-evaluate their security strategies, develop dynamic policies, and create new synergies capable of enabling a secure, resilient, and compliant ecosystem.

Against this backdrop, IDC’s IT Security Roadshow 2017 will offer expert advice on establishing a seamlessly secure enterprise that utilizes a cutting-edge security roadmap as the foundation for delivering true digital transformation.


Do you think security is about scare tactics?

It isn’t. These days, it isn’t even about fear or doubts. It is about the desire to learn more, to be ahead of the game, to know when to embrace new technologies and when to discard old ones.

Our mission is to provoke thoughtful exchange through a holistic approach to information security and what it means for organizations today. We want to change the view of security from a cost center and a “police entity” to an integral element of business initiative. We believe it’s time to shift the paradigm of security from the preserve of IT to a key component of company culture.

All forward-thinking leaders welcome

IDC’s Security Summit is a must-attend event that brings together IT Security professionals from the top organizations, thought-leading IDC analysts, industry gurus, and vendors of cutting-edge security solutions for networking, learning, and experience exchange.

Come speak, share, and challenge ideas with other IT Security professionals like you. All in the interest of improving security and furthering the culture that surrounds it.


Key Agenda Topics

Find answers to your questions:

  • Did you know that the number of CISOs that "provide valuable guidance to senior leadership related to cybersecurity” is declining?
  • Do you have an issue with finding skilled people and retaining talent?
  • Do your line-of-business colleagues drive you insane because they bought another app or service?
  • How solid is your cloud strategy?
  • Is BYOD right for your organization?
  • How do you react to GDPR and other upcoming regulations?
  • How responsive is your incident response?
  • Do you feel like the board gives you plenty of responsibility, but not enough autonomy?

Key Discussion Areas:

  • The Evolution of Security
  • Aligning Security with Business Objectives
  • Closing the Security Expertise Gap
  • Cyber Security Laws in Turkey
  • Soft Skills Needed for inter-department Communication
  • Privileged Account Management
  • Behavioral Analysis on Social Networks
  • IoT Security
  • Critical Infrastructure Protection
  • Big Data Analytics for Security



Time Event & Speakers

Welcome Tea/Coffee & Networking


Welcome Address

Andries Lombaard
Country Manager, IDC South Africa

Building The New Security Roadmap

Hamza Naqshbandi
Principal Analyst, IT Services, Middle East & Africa

Organizations are striving to execute digital transformation processes and bring innovation to the forefront. Organizations are further aiming to transform their processes, operations, and leadership to become digital enterprises. Specifically, companies are investing in 3rd Platform technologies and innovation accelerators to meet their targets within given timelines. However, organizations have to deal with the rapidly changing demands of their customers as well as a threat landscape that is getting increasingly complex. Organizations also have to contend with new vulnerabilities and technologies, meet customer demand for a seamless experience, and increasingly address issues relating to risk and trust.

The following keynote presentation will look at the trends impacting the security landscape in the region. It will also explore the issues that organizations will need to address in the digitally transformed era and outline what factors they need to consider in their security road maps for the future.


Protecting Against The Insider Threat

Christo van Staden
Regional Manager: Sub-Saharan Africa
Historically DLP and Insider Threat products have been kept separate with well defined boundaries limiting each product to solving its own set of problems. This is where the combined Forcepoint DLP and Insider Threat solutions bridge the chasm and provide the kind of visibility into user behavior that is needed to more comprehensively protect their data.



Security – a fundamental pillar of digital transformation

Lionel Moyal
Business Group Lead for Productivity

As sophisticated threats continue to be the number one security concern for organisations, CISOs face rising challenges due to increasing complexity, lack of visibility and ineffective response.Learn how to simplify and accelerate the journey to better threat management, response and risk control and establish a foundation of trust paving the way to digital transformation.



Mobile Device Lifecycle Management

David Moncur
Technical Account Manager, South Africa, Samsung

As mobile devices are ubiquities in our work lives organisations are constantly looking for ways to manage the lifecycle of these devices. Samsung have been a part of this journey within many organizations and have a number of innovative solutions that can help you through these steps and alleviate some of your headaches.



Mid Morning Tea/Coffee Break and Networking


Managing Security Complexity

Gareth James
Network & Security Specialist, Vmware

Organizations need to adopt strategies to better manage their security posture. Indeed, with multiple devices, policies, users, and optimized budgets, security is getting increasingly complex. This session looks at the factors taken into account by organizations attempting to improve their overall security.


Software Defined Security Networks

Waseem Raza Ebrahim
Senior System Engineer

Cybersecurity is one of the top IT topics due to the continuous hacks, data thefts, and high profile breaches taking place. Cyber defense thus requires a holistic security approach that includes broader process and technology strategies. To be better prepared and to decrease the probability of targeted breaches, future and potential threats need to be considered as well. This session looks at how threat intelligence will help organizations identify ongoing security threats and take precautions against future dangers.



Collective Security – Meerkats vs Humans

Mazen Halawi
As the security industry has continued to under invest in the human element of security, phishing has become the top attack vector for cyber criminals. Breaches continue to occur in record numbers, identification takes an exorbitantly long time, and the most preferred target is an organization’s human assets. Empowering human assets to provide vetted intelligence into your incident response teams is often overlooked. Every organization has these human sensors, and there’s a natural desire for these employees to want to help.

In this presentation, Mazen Halawi will discuss:

•Why the cyber security industry is broken

•How to reduce susceptibility to human-targeted attacks

•How to empower users to become human sensors to recognize and report suspected attacks



Lunch & Networking


Raffle Draw


DNS Security – The Lost Conversation

Rene Bosman
Manager, Infoblox
As you know, while our digital age has opened new paths to prosperity, it has also created a cybercrime landscape that threatens the success of all who embrace it.

Newer, more advanced, and more dynamic attack vectors are introduced every single day. Several high-profile data breaches have been in the news recently and we read that millions of customer records are stolen, emails hacked, and sensitive information leaked. Most enterprises have multiple defense mechanisms and security technologies in place, such as next-generation firewalls, intrusion detection systems (IDSs), and intrusion-prevention systems (IPSs). Yet somehow malicious actors find a way to appropriate data. Hackers can use multiple pathways to steal data, but the one that is often unknowingly left open is DNS, or the Domain Name System. DNS is increasingly being used for data exfiltration, either by malware-infected devices or by rogue employees. The nature of the DNS protocol, which was invented more than 30 years ago, is such that it is trusted, yet vulnerable to hackers and malicious insiders. During this presentation, we will discuss how this can help you use core network services to:

• Prevent Data Exfiltration via Secure DNS

• Detect sophisticated cyberattacks that affect and use internal/external DNS

• Integrate with your security ecosystem to reduce the cyber kill-chain



How a Small USB Drive Can Cause a Lot of Trouble?

Grant Rau
Business Development Manager - Africa - Kingston Technology Picture

Presentation by Mimecast


Panel Discussion: Addressing the New Security Ecosystem

This panel discussion will examine how organizations are addressing the new set of security channels and dynamics associated with the drive for digital transformation. The panel will provide valuable insights into the practices and protocols they have incorporated within their own organizations, offering answers to the following questions:

  • What new technologies have you recently deployed and how are you securing them?
  • What challenges are organizations in your industry facing when it comes to security and digital transformation?
  • What security-related aspects do organizations typically fail to address from a people, process, and technology perspective?
  • If people are the weakest link, what issues continue to cause the biggest challenge when it comes to security and users?
  • How are you addressing security as your organization moves into an increasingly connected world?



Summary & Close


Networking / Cocktails


Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Gold Partner
Silver Partner
Silver Partner
Silver Partner
Exhibit Partner

Become a Partner

General Information

Date and Time

Thursday, August 17th



Registration Fee

  • Free of Charge : For End Users (not IT +consultant companies)
  • USD 500 Per Participant : For IT vendors, and IT consultant companies


For More Information, contact:

Eileen Gengan - +27 11 5173240 /


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Eileen Gengan via email, at

Partnership Opportunities

Why sponsor the IT Security 2017?

  • Brand association with Senior IT Decision Makers, CISOs and Influencers via the extensive promotional campaign pre- and post-event
  • Position your company as one of the leading Security Solutions players in the Region
  • Meet face-to-face and build connections with a targeted group of qualified end users and decision makers
  • Hold meaningful conversations with potential customers – generous time set aside for networking
  • Secure post show appointments by collecting leads & conducting surveys through the exhibition

Photo Gallery


The Sandton Convention Centre in Johannesburg has been selected as the host venue for the 25th Ordinary Session of the Assembly of the African Union (AU), comprising membership from over 50 African countries. This will be the second largest Heads of State meeting held at Sandton Convention Centre in its 15 year history, the largest being the World Summit on Sustainable Development in 2002.

Sandton Convention Centre is located in Sandton business hub, adjacent to a wide range of accommodation, shopping malls, dining and entertainment option. This, together with its easy access to the Gautrain network and OR Tambo International Airport, are likely to have been factors in the organisers’ selection of the SCC as host venue.


Contact Us

Eileen Gengan

Conference Manager

+27 84 088 1020

Michelle Meldau

Senior Sales Manager, Conferences and Events

+27 794 670 920

About IDC

53 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit