IDC IT Security Summit 2018

This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.


IDC IT Security Summit 2018

Delivering Pervasive Security for the Digital Era

Muscat, March 29, 2018


Digital” has, in the recent past, heralded a metamorphosis in the way organizations in Middle East  approach and transact their business. Leaders envisage a new world order triggered by a transformation in Business Models, Customer Experience, Worksource and Information Management.

With a subsequent rapid rise in “Digital”, the threat landscape for organizations also stands to undergo enhanced levels of complexity and diversity in the coming years. Already, we have been witness to large scale Cyber Security incidents (WannaCry) that have shook the foundations of the existing security postures of organizations both in Middle East and globally. In such a scenario, it will become all the more imperative for organizations to build appropriate levers for security in their business strategy.

IDC Security Roadshow 2018 will examine the current security landscape and explore the challenges that organizations are likely to encounter as they embark on their digital transformation efforts. It will also explore the issues that organizations will need to address in the digitally transformed era and outline what factors they need to consider in their security road maps for the future.


Time Event & Speakers

Registrations, Networking & Welcome Tea & Coffee


Early Bird Raffle Draw – Win a two-night stay for a couple at the Crowne Plaza


Welcome Address

Megha Kumar
Research Director, Software, Middle East & Africa

Security Priorities for the Digital Era

Megha Kumar
Research Director, Software, Middle East & Africa



Integrated Cyber Defense at the Heart of Digital Transformation

Syed Parvez Akhtar
Solution System Engineer, Symantec Middle East and Africa

This session starts by discussing the key trends in digitization across various industries along with the cyber security challenges being faced today. It then focuses on the typical attack surfaces organizations are trying to defend in their environments and how core technologies from Symantec can support them. There is a specific focus on building an Integrated Cyber Defense platform followed by how organizations need to begin this journey by incorporating a Cyber Resilience strategy. We close by discussing what key questions the board should ask in order to stay engaged in building this integrated future


Digital Transformation: Cure-all, Placebo or Poison Pill?

Hadi Tannous
Computer Communication Engineer, Fortinet
29% of attacks that the companies faced during 2017 were file-less and this rate is expected to reach 35% in 2018. Such elusive threats cause a severe impact on companies and enterprises resulting a damage equal to 300$ per employee in system downtime, stealing information assets, damaging IT infrastructure, and affecting end user productivity. Traditional endpoint security solutions are doing a little to stop this trend. Therefore, some companies are looking for different solutions which increase the cost of protection with different management platforms – A magic bullet cannot stop such types of attacks at early stages With adaptive-layered next generation endpoint protection platform, Elusive Threats are blocked in the pre-execution phase where both Traditional and so-called "next-gen AV" defenses miss!


Complete attack surface visibility - an essential component for mature cyber security

Ben Vaux
Technical Director Middle East, Skybox Security


Tea & Coffee and Networking (Exhibit room)


Implementing Critical Infrastructure Security

Maiysa Al Dhanki
Cyber security Cooperation Specialist, Information Technology Authority Sultanate Of Oman

This presentation will explain how organizations can address critical infrastructure security and outline strategies for collaborating


A contingency plan for ever-rising cyber threats

Pavish Kumar R
IT Security Analyst and Developer, ManageEngine

The very fundamentals of our technological architectures are flawed, making large-scale attacks, a common occurrence. After the discovery of vulnerabilities like Spectre and Meltdown, the rise of record-breaking DDoS attacks like the 1.35 Tbps DDoS attack on GitHub, the global reach of ransomware like WannaCry, and ever-increasing data breaches like the Equifax breach, what can businesses do to keep their cyberspace safe?This session will discuss the placement of an effective strategy, that can be implemented in your network to prevent such attacks and the remedial measures that should be taken to save your business, if an attack occurs.


Stepping Up to GEN V Cybersecurity

Prashant Menon
Channel Sales & Product Management, Checkpoint

In 2017, an unprecedented number of large-scale, multi-vector cyberattacks damaged the reputations and operations of businesses around the world. As these 'Gen V' cyberattacks occurred across all networks, endpoints, cloud systems, and mobile platforms, organizations will now need to adopt a consolidated cybersecurity architecture that fully protects their assets. This session will examine how such an architecture can resolve the complexities of the expanding threat landscape by sealing security gaps, enabling automatic threat intelligence sharing across all environments, and unifying security management operations.


Emerging technology in improving cybersecurity

Saleh Said Khamis Al Hashmi
Director of Government Security Service, Information Technology Authority Sultanate Of Oman

Panel Discussion: Security Strategies for the Digital Era

Marwan Al Khouli
GM Head of Operation, Oman Arab Bank, Oman
Vaishal Mehta
Head of Operational Risk, National Bank of Oman
Saleh Said Khamis Al Hashmi
Director of Government Security Service, Information Technology Authority Sultanate Of Oman

Digital transformation is changing the way we engage with customers, suppliers, and employees, requiring organizations to change the way they incorporate security into their ecosystems. This panel discussion will explore a series of best-practice strategies for proactively addressing security in the modern enterprise.


Closing Keynote

Dr. Salim Al Ruzaiqi
CEO, ITA, Information Technology Authority Sultanate Of Oman

Roadmap for 2018

Megha Kumar
Research Director, Software, Middle East & Africa

Raffle Draw
Win a Samsung Gear S3 Frontier


Lunch & Networking

General Information

Date and Time

Thursday, March 29, 2018



Registration Fee

  • Free of Charge : For End Users (not IT +consultant companies)


For More Information, contact:

Sughand Tolani - 04 3642189 / 056 4145987 /


ICT Partner
Platinum Partner
Platinum Partner
Gold Partner
Gold Partner
Silver Partner
Silver Partner
Exhibit Partner
Exhibit Partner

Become a Partner

Partnership Opportunities

Why sponsor the IT Security 2018?

  • Brand association with Senior IT Decision Makers, CISOs and Influencers via the extensive promotional campaign pre- and post-event
  • Position your company as one of the leading Security Solutions players in the Region
  • Meet face-to-face and build connections with a targeted group of qualified end users and decision makers
  • Hold meaningful conversations with potential customers – generous time set aside for networking
  • Secure post show appointments by collecting leads & conducting surveys through the exhibition


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Shabana Mahadiwala via email, at


Crowne Plaza Hotel


Shabana Mahadiwala

Conference Director

+971 56 414 5986

About IDC

54 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit