IDC IT Security Summit 2018

This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC IT Security Summit 2018

Delivering Pervasive Security for the Digital Era

Riyadh, April 23, 2018


Digital transformation is becoming increasingly mainstream, with the majority of organizations in the region either planning or already starting their journey. To assist this process, they have started using innovative technologies such as cognitive systems, virtual and augmented reality, robotics, and the Internet of Things to streamline their operations and improve their customer experience. Running alongside 3rd Platform solutions like cloud, mobile, social, and big data, these new innovation-accelerating technologies are creating a complex ecosystem that is introducing a new series of IT security challenges.

As such, security incidents are becoming far more complex and persistent than ever before. Recent high-profile breaches showcase that a new breed of stealthy attackers are using vulnerabilities in systems and even the Internet of Things to bring down services. With digital transformation, security needs to become more pervasive; it needs to be embedded into the vision of the organization and treated as a core metric. Organizations can no longer settle for standard security solutions; they must move forward by embracing a proactive approach to the issues of defense, protection, mitigation, compliance, trust, and risk.

Against this backdrop, IDC’s Security Summit 2018 will equip you with expert insights into the security metrics, threat vectors, and solutions that you should keep in mind as you work to develop a sustainable security roadmap for your organization.



Time Event Speakers

Registration, Networking & Welcome Coffee & Tea


Welcome Address

Hamza Naqshbandi
Country Manager – IDC Saudi Arabia

Security Priorities for the Digital Era

Uzair Mujtaba
Program Manager — IDC Saudi Arabia

This presentation will address the complexity of the region’s security landscape, examining the uptake of digital transformation and contextualizing the rising security risks. It will also outline the security priorities that organizations need to consider while engaging in digital transformation


Integrated Cyber Defense at the Heart of Digital Transformation

Jamil Abu Aqel
Technology Sales and ServicesManager, Symantec Corporation

This session starts by discussing the key trends in digitization across various industries along with the cyber security challenges being faced today. It then focuses on the typical attack surfaces organizations are trying to defend in their environments and how core technologies from Symantec can support them. There is a specific focus on building an Integrated Cyber Defense platform followed by how organizations need to begin this journey by incorporating a Cyber Resilience strategy. We close by discussing what key questions the board should ask in order to stay engaged in building this integrated future. 


Strategies to Meet Compliance Demands

Vali Ali
HP Fellow and Chief Technologist, Security and Privacy Business Personal Systems, HP Inc KSA

The following session addresses how organizations can deal with new regulations such as GDPR or industry or local regulations


Tea/Coffee Break


Raffle Draw: Win a Samsung S2 Gear


Case Study: The Role of Orchestration in Incident Response and Security Operations.

Ashraf Abdelazim
MEA Region Leader, IBM MENA

With the current landscape and challenges that face incident response and the security operations in the decade of response, this case study provides an overview about the current market landscape and the key challenges face Incident response in the security operations, how the InfoSec industry working on solving such challenges, how to build maturity and capability in the security operations for incident response along with a case study for a global enterprise that took advantage of IR Orchestration to align people, processes and technology and built maturity and capability in their operations so it can act faster, smarter and more efficient on cyber security incidents.


Security Transformation with Cognitive

Farrukh H Farhat
Associate Partner, KSA Practice Lead, IBM

Vision 2030... Time to Transform NOW

Ziad Mortaja
Managing Director, MIS

Prayer Break


Gold Track (Parallel Sessions)

Gold Track Session A:Strategies for New Age Cybercrime

12:05 - 12:10

Raffle Draw

12:10 - 12:30

The Cost of our Connected World

Dimitris Raekos
General Manager , ESET Middle East
12:30 - 12:50

Deception for Detection and Automated Response

Bahi Hour,
SE Manager, META, Attivo Networks
12:50 - 13:10

Complete attack surface visibility - an essential component for mature cyber security

Mike Heredia
Regional Sales Director, EMEA North & Middle East, Skybox Security
13:10 - 13:25

Cybercrime and How It Affects You!

Tariq Jitan
Pre-Sales consultant - Security, CA Technologies
13:25 - 13:55

Raffle Draw

Gold Track Session B: Protecting Your Crown Jewel- Data!

12:05 - 12:10

Raffle Draw

12:10 - 13:10

Artificial Intelligence and Machine Learning in Security (Security Monitoring and Analytics)

Dragan Petkovic
META Security Leader, Oracle
12:30 - 12:50

Database Security

Mohammad Al Ghudayyer
Data management & IaaS team lead, Oracle
12:50 - 13:10

Monitoring and Securing Cloud Applications (Covers delivering combined value through Cloud Security, Identity and Access Management, and SIEM Monitoring)

Dragan Petkovic
META Security Leader, Oracle
13:10 - 13:30

Email: The Number One Threat Vector

Raafat Kastoun
Sales Engineering Manager - Middle East & Turkey, Barracuda
13:30 - 13:50

Defense in Depth (Unified IT)

Samer Hani
Territory Sales Manager, Ivanti
15:50 - 13:55

Raffle Draw



Silver Track (Parallel Sessions)

Silver Track Session A: Enterprise Mobility & Security

14:30 - 14:35

Raffle Draw from Raffle coupon A

14:35 - 14:50

Exposing the hidden threat

Mohammad Al Tenbakji
Sales Engineer, Infoblox
14:50 - 15:05

Phishing Human Defense – From Inbox to SOC

Alex Depret-Bixio
Vice President Sales, META Region, Cofense Inc.
15:05 - 15:20

Modernize Your Endpoint Security: No Magic Bullets, you need an Arsenal!

Michel Tannous
Enterprise Sales Engineer, Middle East, Bitdefender
15:20 - 15:35

Securing the Modern Enterprise

Mohamed Helmy
ME Regional Manager, Mobileiron
15:35 - 15:40

Roadmap 2018

15:40 - 15:50

Final Raffle Draw from feedback forms

Silver Track Session B: Emerging Security Tactics

14:30 - 14:35

Raffle Draw

14:35 - 14:50

Security and Privacy Challenges

Bahaa Salem
Applications Product Manager - EMEA, Global Knowledge
14:50 - 15:05

Software- Defined Secure Network

Mohammed Al Waheidi
System Engineering Team, Juniper Networks - ME
15:05 - 15:20

Securing the Unsecured: A Saudi View

Saud Al Otaibi
Director of Security Delivery, AEC
15:20 - 15:35

Detect and Respond to Modern Cyber Attacks Using Automated Detection and Response with Intelligent Deception

Roland Daccache
Senior Sales Engineer – Fidelis Cybersecurity
15:35 - 15:40

Final Raffle Draw from feedback forms

15:35 - 15:40

Roadmap 2018

Uzair Mujtaba
Program Manager — IDC Saudi Arabia

Summary & Closing

General Information

Date and Time

Monday, April 23, 2018



Registration Fee

  • Free of Charge : For End Users (not IT +consultant companies)


For More Information, contact:

Sughand Tolani - 04 3642189 / 056 4145987 /


Strategic Partner(s)

Platinum Partner(s)

Gold Partner(s)

Silver Partner(s)

Exhibit Partner(s)

Partnership Opportunities

Why sponsor the IT Security 2018?

  • Brand association with Senior IT Decision Makers, CISOs and Influencers via the extensive promotional campaign pre- and post-event
  • Position your company as one of the leading Security Solutions players in the Region
  • Meet face-to-face and build connections with a targeted group of qualified end users and decision makers
  • Hold meaningful conversations with potential customers – generous time set aside for networking
  • Secure post show appointments by collecting leads & conducting surveys through the exhibition


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Shabana Mahadiwala via email, at



Shabana Mahadiwala

Conference Director

+971 56 414 5986

About IDC

54 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit