This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC IT Security Summit 2018

Delivering Pervasive Security for the Digital Era

Jeddah, April 25, 2018


Digital transformation is becoming increasingly mainstream, with the majority of organizations in the region either planning or already starting their journey. To assist this process, they have started using innovative technologies such as cognitive systems, virtual and augmented reality, robotics, and the Internet of Things to streamline their operations and improve their customer experience. Running alongside 3rd Platform solutions like cloud, mobile, social, and big data, these new innovation-accelerating technologies are creating a complex ecosystem that is introducing a new series of IT security challenges.

As such, security incidents are becoming far more complex and persistent than ever before. Recent high-profile breaches showcase that a new breed of stealthy attackers are using vulnerabilities in systems and even the Internet of Things to bring down services. With digital transformation, security needs to become more pervasive; it needs to be embedded into the vision of the organization and treated as a core metric. Organizations can no longer settle for standard security solutions; they must move forward by embracing a proactive approach to the issues of defense, protection, mitigation, compliance, trust, and risk.

Against this backdrop, IDC’s Security Summit 2018 will equip you with expert insights into the security metrics, threat vectors, and solutions that you should keep in mind as you work to develop a sustainable security roadmap for your organization.



Time Event & Speakers

Registrations, Networking & Welcome Tea & Coffee


Early Bird Raffle, Win a One-night stay for a couple at the Park Hyatt Hotel, Jeddah


Welcome Address

Uzair Mujtaba
Program Manager — IDC Saudi Arabia

Security Priority for the Digital Era

Uzair Mujtaba
Program Manager — IDC Saudi Arabia

This presentation will address the complexity of the region’s security landscape, examining the uptake of digital transformation and contextualizing the rising security risks. It will also outline the security metrics that organizations need to consider as a part of a comprehensive security strategy.


Complete Attack Surface Visibility: An Essential Component for Mature Cyber Security

Mike Heredia
Regional Sales Director, EMEA North & Middle East, Skybox Security

How do we regain the insight in our environments? We have lost much insight in how our IT operations and security is operated and more importantly how it is performing. With the relentless move to cloud platforms, being a private or public one, or perhaps even a hybrid, we stand to lose even more visibility and control in our day 2 day and strategic operations. What do enterprises need to do to regain control? How have Qualys customers taken on this challenge?

In this presentation we aim to help you see a path forward, and roads into the near and distant future of your IT infra and asset management.



Presentation by HP Inc

Vali Ali
Chief Technologist, Security and Privacy, HP Inc KSA

Transform Your Security not to Lose the Cyber War

Mohammed Hamdan
System Engineers Manager and Threat Intelligence Expert, Saudi Arabia, Palo Alto Networks

Building Out Security In Your Organizations

Dr. Adnan Mustafa AlBar
VP - Jeddah City Council

Tea & Coffee Break


Developing Information Security Strategy & Roadmap for the Digital Era

eng. Majed Mohammad Alshodari
Head of Information Security Department – Jabal Omar Development Company

Enabling an Integrated Security Strategy with Security

Dimitris Raekos
General Manager , ESET Middle East

Software Defined Secure Networks

Redouane El Magroud
Network Security Specialist, Juniper Networks - ME

Stepping up to GEN V of Cyber Security

Jayendra Raman
Channel Manager - Kuwait, Bahrain & KSA, Check Point

In 2017 we saw unprecedented cyber-attacks carried out as large-scale, multi-vector mega attacks that inflicted major damage on businesses and their reputation. Check Point Infinity is the only fully consolidated cyber security architecture that protects against GEN V mega cyber-attacks across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. It provides complete threat prevention which seals security gaps, enables automatic, immediate threat intelligence sharing across all security environments, and a unified security management for an utmost efficient security operation.



Small & Medium Enterprises Security – The 1st Step or Where to Begin?

Abdullah Al Tolbah
Manager of Cyber GRC, AEC

Vision 2030 empower the SME’s by addressing 3 main objectives to become an important part of Saudi Arabia’s Economic Diversification. By 2030, the total target of Saudi SMEs is 104,000, which required a digital eco-system and cyber infrastructure.

It is not possible for any business to be completely secure. Nevertheless, it is possible to implement a program that balances security with the needs and capabilities of SME’s environment.

The AEC presentation provides SME’s with basic practices and tools needed to develop a cyber-security program that protects business critical information & customer sensitive information.



Presentation by ISACA, Jeddah Chapter


Panel Discussion: Security Strategies for the Digital Era

eng. Majed Mohammad Alshodari
Head of Information Security Department – Jabal Omar Development Company
Dr. Adnan Mustafa AlBar
VP - Jeddah City Council

Digital transformation is changing the way we engage with customers, suppliers, and employees, requiring organizations to change the way they incorporate security into their ecosystems. This panel discussion will explore a series of best-practice strategies for proactively addressing security in the modern enterprise.


Raffle Draw


Roadmap 2018

Uzair Mujtaba
Program Manager — IDC Saudi Arabia

Lunch & Networking

General Information

Date and Time

Wednesday, April 25, 2018



Registration Fee

  • Free of Charge : For End Users (not IT +consultant companies)


For More Information, contact:

Sughand Tolani - 04 3642189 / 056 4145987 /


Strategic Partner
Gold Partner
Gold Partner
Gold Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Exhibit Partner
Exhibit Partner
Exhibit Partner
Exhibit Partner
Exhibit Partner

Become a Partner

Partnership Opportunities

Why sponsor the IT Security 2018?

  • Brand association with Senior IT Decision Makers, CISOs and Influencers via the extensive promotional campaign pre- and post-event
  • Position your company as one of the leading Security Solutions players in the Region
  • Meet face-to-face and build connections with a targeted group of qualified end users and decision makers
  • Hold meaningful conversations with potential customers – generous time set aside for networking
  • Secure post show appointments by collecting leads & conducting surveys through the exhibition


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Shabana Mahadiwala via email, at



Shabana Mahadiwala

Conference Director

+971 56 414 5986

About IDC

54 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit