This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC IT Security Summit 2018

Delivering Pervasive Security for the Digital Era

Manama City, March 22, 2018


Digital transformation is becoming increasingly mainstream, with the majority of organizations in the region either planning or already starting their journey. To assist this process, they have started using innovative technologies such as cognitive systems, virtual and augmented reality, robotics, and the Internet of Things to streamline their operations and improve their customer experience. Running alongside 3rd Platform solutions like cloud, mobile, social, and big data, these new innovation-accelerating technologies are creating a complex ecosystem that is introducing a new series of IT security challenges.

As such, security incidents are becoming far more complex and persistent than ever before. Recent high-profile breaches showcase that a new breed of stealthy attackers are using vulnerabilities in systems and even the Internet of Things to bring down services. With digital transformation, security needs to become more pervasive; it needs to be embedded into the vision of the organization and treated as a core metric. Organizations can no longer settle for standard security solutions; they must move forward by embracing a proactive approach to the issues of defense, protection, mitigation, compliance, trust, and risk.

Against this backdrop, IDC’s Security Summit 2018 will equip you with expert insights into the security metrics, threat vectors, and solutions that you should keep in mind as you work to develop a sustainable security roadmap for your organization.




Time Event & Speakers

Registrations, Networking & Welcome Tea & Coffee


Early Bird Raffle Draw – Win a one-night stay for a couple at the Wyndham Grand


Welcome Address

Megha Kumar
Research Director, Software, Middle East & Africa

Security Priorities for the Digital Era

Megha Kumar
Research Director, Software, Middle East & Africa


This presentation will address the complexity of the region’s security landscape, examining the uptake of digital transformation and contextualizing the rising security risks. It will also outline the security metrics that organizations need to consider as a part of a comprehensive security strategy.


Integrated Cyber Defense at the Heart of Digital Transformation

Haider Pasha
Chief Technology Officer - Emerging Markets, Symantec Middle East 2018

This session starts by discussing the key trends in digitization across various industries along with the cyber security challenges being faced today. It then focuses on the typical attack surfaces organizations are trying to defend in their environments and how core technologies from Symantec can support them. There is a specific focus on building an Integrated Cyber Defense platform followed by how organizations need to begin this journey by incorporating a Cyber Resilience strategy. We close by discussing what key questions the board should ask in order to stay engaged in building this integrated future.


Are we doing the best we can?

Niraj Mathur
Manager Security Practice,Gulf Business Machines


Tea & Coffee and Networking (Exhibit room)


Cyber security culture in aviation is it time to change our mind-set?

Najwa Abdul Rahim Abdulla
Vice President for Information and Communications Technology,Bahrain Airport Company (BAC)

Digital Transformation: Cure-all, Placebo or Poison Pill?

Ahmad Ghannoum
Senior Systems Engineer,Fortinet

Are you really ready for Digital Transformation? While the business benefits are clear, technology adoption, the escalating threat landscape and compliance to any number of standards and legal requirements are all challenges to any DX efforts. If your organization is moving into the Digital future, you need to make sure that your security infrastructure isn’t stuck in the past.

This session will provide the insight towards a comprehensive and adaptive security architecture that can support your organization’s changing objectives and more importantly, evolve as the cyber threat challenge evolves as well.



Speed Up the Hunt: Make the Bad Guys’ Lives Harder with Threat-hunting

Arshad Sheikh
Sales Manager Saudi Arabia & Bahrain,Carbon Black

Modern security teams recognize that compromise is inevitable in today's threat landscape. However, this does not mean that a breach should be inevitable as well. Rather, today’s security leaders must bring together people, processes, and technologies to enable effective threat hunting. Detect and alert strategies need to shift from reactive forms of incident response to proactive threat hunting postures. This session will provide an understanding of the role threat hunting plays in a resilient cybersecurity strategy, and examine how IT executives can create and embed a culture of threat hunting within an organization. It will further provide practical insights into the steps organizations can take to start threat hunting programs.


Transform your security not to lose the cyber war

Waseem Halim
Senior Systems Engineer – GULF, Palo Alto Networks

Digital transformation never stops but it is difficult for security to keep pace. For many customers the struggle to manage threats, patching, reporting is making the infrastructure too expensive and unmanageable. We need to transform security to keep pace and in this session we will look at the future of security and how it will save most organizations.


Internal and External Threats

Karthik Ananda Rao
Technical Consultant, Manage Engine

Eradicate internal and external threats with easy-to-use and affordable software.



Stepping Up to GEN V Cybersecurity

Jayendra Raman
Channel Manager - Kuwait, Bahrain & KSA, Check Point

In 2017, an unprecedented number of large-scale, multi-vector cyberattacks damaged the reputations and operations of businesses around the world. As these 'Gen V' cyberattacks occurred across all networks, endpoints, cloud systems, and mobile platforms, organizations will now need to adopt a consolidated cybersecurity architecture that fully protects their assets. This session will examine how such an architecture can resolve the complexities of the expanding threat landscape by sealing security gaps, enabling automatic threat intelligence sharing across all environments, and unifying security management operations.



Panel Discussion: Security Strategies for the Digital Era

Mishal Al-Hellow
CIO, Arcapita Group
Abubakar Latif
Cybersecurity Advisor at TRA Bahrain
Ashraf Mahir Atabani
Head of Information Technology-United Gulf Bank
Dr.Mazen Mohamed Abdulla Ali
Chairperson of the Department of Information Systems, University of Bahrain
Najwa Abdul Rahim Abdulla
Vice President for Information and Communications Technology,Bahrain Airport Company (BAC)

Digital transformation is changing the way we engage with customers, suppliers, and employees, requiring organizations to change the way they incorporate security into their ecosystems. This panel discussion will explore a series of best-practice strategies for proactively addressing security in the modern enterprise.


Roadmap for 2018

Megha Kumar
Research Director, Software, Middle East & Africa

Mega Raffle Draw (Presentation Room)


Lunch in the Expo Area

General Information

Date and Time

Thursday, March 22, 2018



Registration Fee

  • Free of Charge : For End Users (not IT +consultant companies)


For More Information, contact:

Sughand Tolani - 04 3642189 / 056 4145987 /


ICT Partner
Platinum Partner
Platinum Partner
Platinum Partner
Gold Partner
Gold Partner
Gold Partner
Silver Partner
Silver Partner
Exhibit Partner
Exhibit Partner

Become a Partner

Partnership Opportunities

Why sponsor the IT Security 2018?

  • Brand association with Senior IT Decision Makers, CISOs and Influencers via the extensive promotional campaign pre- and post-event
  • Position your company as one of the leading Security Solutions players in the Region
  • Meet face-to-face and build connections with a targeted group of qualified end users and decision makers
  • Hold meaningful conversations with potential customers – generous time set aside for networking
  • Secure post show appointments by collecting leads & conducting surveys through the exhibition


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Ronita Bhattacharjee via email, at

Photo Gallery


Wyndham Grand Hotel

Contact Us

Ronita Bhattacharjee

Vice President, Conferences

+971 4 391 2747

About IDC

54 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit