This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC IT Security Summit 2018

Delivering Pervasive Security for the Digital Era

Kuwait, March 26, 2018


Digital transformation is becoming increasingly mainstream, with the majority of organizations in the region either planning or already starting their journey. To assist this process, they have started using innovative technologies such as cognitive systems, virtual and augmented reality, robotics, and the Internet of Things to streamline their operations and improve their customer experience. Running alongside 3rd Platform solutions like cloud, mobile, social, and big data, these new innovation-accelerating technologies are creating a complex ecosystem that is introducing a new series of IT security challenges.

As such, security incidents are becoming far more complex and persistent than ever before. Recent high-profile breaches showcase that a new breed of stealthy attackers are using vulnerabilities in systems and even the Internet of Things to bring down services. With digital transformation, security needs to become more pervasive; it needs to be embedded into the vision of the organization and treated as a core metric. Organizations can no longer settle for standard security solutions; they must move forward by embracing a proactive approach to the issues of defense, protection, mitigation, compliance, trust, and risk.

Against this backdrop, IDC’s Security Summit 2018 will equip you with expert insights into the security metrics, threat vectors, and solutions that you should keep in mind as you work to develop a sustainable security roadmap for your organization.



Time Event & Speakers

Registrations, Networking & Welcome Tea & Coffee


Early Bird Raffle - Win a One Night Stay at the JW Marriott Hotel Kuwait City


Welcome Address

Uzair Mujtaba
Program Manager — IDC Saudi Arabia

Security Priorities for the Digital Era

Uzair Mujtaba
Program Manager — IDC Saudi Arabia

This presentation will address the complexity of the region’s security landscape, examining the uptake of digital transformation and contextualizing the rising security risks. It will also outline the security priorities that organizations need to consider while engaging in digital transformation


Integrated Cyber Defense at the Heart of Digital Transformation

Ziad A. Kesrouani
Enterprise Sales Manager, Kuwait , Symantec Gulf

This session starts by discussing the key trends in digitization across various industries along with the cyber security challenges being faced today. It then focuses on the typical attack surfaces organizations are trying to defend in their environments and how core technologies from Symantec can support them. There is a specific focus on building an Integrated Cyber Defense platform followed by how organizations need to begin this journey by incorporating a Cyber Resilience strategy. We close by discussing what key questions the board should ask in order to stay engaged in building this integrated future.


Digital Transformation: Cure-all, Placebo or Poison Pill?

Osama Abduo
Principal Systems Engineer,Fortinet Middle East, Fortinet

Are you really ready for Digital Transformation? While the business benefits are clear, technology adoption, the escalating threat landscape and compliance to any number of standards and legal requirements are all challenges to any DX efforts. If your organization is moving into the Digital future, you need to make sure that your security infrastructure isn’t stuck in the past.

This session will provide the insight towards a comprehensive and adaptive security architecture that can support your organization’s changing objectives and more importantly, evolve as the cyber threat challenge evolves as well.



Complete Attack Surface Visibility - An Essential Component for Mature Cyber Security

Paul Sherry
Regional Director Middle East, Skybox Security


Tea & Coffee Break


Raffle Draw – Coffee machine


Transform Your Security To Stop The Cyber-Criminal

Waseem Halim
Senior Systems Engineer – GULF, Palo Alto Networks

Digital transformation never stops but it is difficult for security to keep pace. For many customers the struggle to manage threats, patching, reporting is making the infrastructure too expensive and unmanageable. We need to transform security to keep pace and in this session we will look at the future of security and how it will save most organizations


Cybercrime and How It Affects You!

Dario Pattarini
Practice Manager - Security,MDS-CA

Due to more and more successful hacking attacks as well as cybercrime, organizations need to protect their data against theft. Privileged accounts have access to the “crown jewels” of the company – and the access needs to monitored. In this presentation we will tell how you can protect your valuable assets against cybercrime.


Stepping Up to GEN V Cybersecurity

Jayendra Raman
Channel Manager - Kuwait, Bahrain & KSA, Check Point

In 2017, an unprecedented number of large-scale, multi-vector cyberattacks damaged the reputations and operations of businesses around the world. As these 'Gen V' cyberattacks occurred across all networks, endpoints, cloud systems, and mobile platforms, organizations will now need to adopt a consolidated cybersecurity architecture that fully protects their assets. This session will examine how such an architecture can resolve the complexities of the expanding threat landscape by sealing security gaps, enabling automatic threat intelligence sharing across all environments, and unifying security management operations.


Rethinking Cyber Security

Elias Samarani
Senior Security Consultant, Forcepoint

In today’s fast moving world, a misuse or breach of data can occur seemingly out of nowhere. Old approaches to security simply don’t work. You need real-time insights that expose risky behaviour from accidental, compromised or malicious users - a system that allows you to make swift and effective behavioural, data flow and threat remediation decisions: The Human Point System.


Modernize Your Endpoint Security: No Magic Bullets, You Need an Arsenal!

Michel Tannous
Enterprise Sales Engineer, Middle East, Bitdefender

29% of attacks that the companies faced during 2017 were file-less and this rate is expected to reach 35% in 2018. Such elusive threats cause a severe impact on companies and enterprises resulting a damage equal to 300$ per employee in system downtime, stealing information assets, damaging IT infrastructure, and affecting end user productivity.Traditional endpoint security solutions are doing a little to stop this trend. Therefore, some companies are looking for different solutions which increase the cost of protection with different management platforms – A magic bullet cannot stop such types of attacks at early stages With adaptive-layered next generation endpoint protection platform, Elusive Threats are blocked in the pre-execution phase where both Traditional and so-called "next-gen AV" defenses miss!



Panel Discussion: New Age Security Strategies

Bhaskar Majumdar
Chief Risk Officer,Industrial Bank of Kuwait
Suraj Kollabathula
IT Advisor, Ministry of Information
Syed Abdul Samad
Sr. Manager - Group Information Security Management, Kuwait Finance House

This panel discussion will examine how organizations are addressing the new set of security channels and dynamics associated with the drive for digital transformation. The panel will provide valuable insights into the practices and protocols they have incorporated within their own organizations.


Roadmap for 2018

Uzair Mujtaba
Program Manager — IDC Saudi Arabia

Raffle Draw from meeting vouchers


Lunch & Networking

General Information

Date and Time

Monday, March 26, 2018



Registration Fee

  • Free of Charge : For End Users (not IT +consultant companies)


For More Information, contact:

Sughand Tolani - 04 3642189 / 056 4145987 /


Premium Partner
Premium Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Silver Partner
Silver Partner
Silver Partner
Exhibit Partner
Exhibit Partner

Become a Partner

Partnership Opportunities

Why sponsor the IT Security 2018?

  • Brand association with Senior IT Decision Makers, CISOs and Influencers via the extensive promotional campaign pre- and post-event
  • Position your company as one of the leading Security Solutions players in the Region
  • Meet face-to-face and build connections with a targeted group of qualified end users and decision makers
  • Hold meaningful conversations with potential customers – generous time set aside for networking
  • Secure post show appointments by collecting leads & conducting surveys through the exhibition


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Shabana Mahadiwala via email, at

Photo Gallery



Raddison Blu,Kuwait City


Contact Us

Shabana Mahadiwala

Conference Director

+971 56 414 5986

About IDC

54 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit